Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
26 - 50 of 1514 Matches Previous Page  |  Next Page
The Benefits of Bug Bounty Programs and Security Code Testing
sponsored by Veracode, Inc.
RESEARCH CONTENT: In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Global Risks Report 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
Posted: 13 Jan 2017 | Published: 13 Jan 2017

ComputerWeekly.com

Navigating Market Complexity to Fulfill Network Security Requirements
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper explores how to take a strategic approach to selecting the right tools for modern network security. Discover how SMBs can tackle the challenge of navigating the market to make sure they're putting pragmatic, streamlined, and effective security measures in place.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

IT Security 101: Think Like A Cybercriminal
sponsored by Solarwinds MSP
EBOOK: In this ebook, learn about the motivations and tactics used by hackers, so that you can ensure your systems and data are adequately protected. Access now to discover the 6 key things to consider when assessing your IT security plan.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Solarwinds MSP

Secure, Cloud-Managed Wifi
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this white paper, learn how to implement Wi-Fi in safe, protected airspace without the normal administrative headaches.
Posted: 10 Jan 2017 | Published: 11 Dec 2016

WatchGuard Technologies, Inc.

Focus: Securing for the future
sponsored by ComputerWeekly.com
EGUIDE: 2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

ComputerWeekly.com

Malware Prevention vs. Detect and Respond
sponsored by Dell India
WHITE PAPER: Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell India

Insights Into How Math Can Defeat Malware
sponsored by Dell India
WHITE PAPER: Malware has always evolved faster than security measures could keep up...until now. Access this white paper to learn about a math and machine-learning approach that enables you to identify potential threats based on mathematical risk factors, so that you can make the right decisions in real time.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell India

Trustwave Global Security Report
sponsored by SingTel
WHITE PAPER: Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

2016 Security Pressures Report
sponsored by SingTel
WHITE PAPER: The recommendations in this resource can serve as a reliable compass for where your security efforts need to be going into the future. These best practices will not only placate security pressure, but also help make your organization more secure overall.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

IoT Strategy: 8 Key Questions to Ask
sponsored by Cisco Systems, Inc.
WHITE PAPER: IoT introduces tremendous risk if the connected products and services are not designed, deployed and supported properly. The 8 questions presented in this white paper provide a step-by-step approach for turning an IoT vision into reality.
Posted: 29 Dec 2016 | Published: 30 Nov 2016

Cisco Systems, Inc.

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Computer Weekly: Data Danger
sponsored by ComputerWeekly.com
EZINE: In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?
Posted: 16 Dec 2016 | Published: 14 Dec 2016

ComputerWeekly.com

How to Identity Web Threats in Real-Time
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Secure and Accelerate User Access to Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Deliver Complete Security for Enterprise Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

A New Trend in Agile - Incorporating Program Management
sponsored by Global Knowledge
WHITE PAPER: How can organizations in diverse industries continue to use familiar waterfall practices and at the same time be more Agile? The answer is to use Agile program management - learn more about these principles inside.
Posted: 13 Dec 2016 | Published: 13 Dec 2016

Global Knowledge

How to Transform Employee Worst Practices Into Enterprise Best Practices
sponsored by KnowBe4
WHITE PAPER: Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

The Phishing Breakthrough Point
sponsored by KnowBe4
WHITE PAPER: Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Employees at the Frontline in the Battle Against Ransomware
sponsored by KnowBe4
WHITE PAPER: In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

How Multi-Vendor DNS Can Protect Your Internet Presence
sponsored by Dyn
WEBCAST: In 2016, the DDoS attack on Dyn shined a light on the inherent vulnerabilities within the internet that were never in the forefront for many IT teams, until now. Access this webinar to learn from Dyn's vulnerabilities and the value of a secondary, multi-vendor DNS strategy for resilience within your infrastructure.
Posted: 07 Dec 2016 | Premiered: Oct 26, 2016

Dyn

Ransomware: Mitigating the Threat
sponsored by Zerto
WHITE PAPER: Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling effects don't threaten your business.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

Zerto

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by Fortinet, Inc.
EGUIDE: What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security.
Posted: 14 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.

The Rise of Fileless Malware Attacks
sponsored by Fortinet, Inc.
EGUIDE: This expert e-guide looks at how fileless malware works, how it's becoming more sophisticated, and what you can do to protect yourself from such threats.
Posted: 13 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.
26 - 50 of 1514 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement