Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
26 - 50 of 1442 Matches Previous Page  |  Next Page
IT's Confidence in Threat Defenses May Be Misplaced
sponsored by McAfee, Inc.
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

McAfee, Inc.

Handelsbanken Accelerates Insight into Big Data to Mitigate Risk and Support Regulatory Compliance
sponsored by IBM
VIDEO: This webcasts puts the spotlight on one of the top 10 most profitable banks in the world. Tune in and learn how Handelsbanken enabled its data analysts to produce risk data on a daily basis with the speed and simplicity they needed to meet regulatory requirements.
Posted: 25 Sep 2015 | Premiered: 25 Sep 2015


The Art of Cyber War: A Modern Defense Strategy
sponsored by Imprivata
WHITE PAPER: In this white paper, you'll find indispensible tips on maintaining security and winning the battle against cybercrime.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Security Report: Are Your Customers Afraid to Share Data?
sponsored by Unisys
WHITE PAPER: In this report, survey results from the Australian public reveal how much consumers fear sharing their personal data and which industries they distrust the most.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Social Threat Intelligence: A New Way to Stay Ahead of Hackers
sponsored by Threatstream
PODCAST: This podcast explores social threat intelligence, a new approach to threat intelligence that enables you to share threat information with other businesses in real time.
Posted: 25 Sep 2015 | Premiered: Jun 15, 2015


How to Detect and Defend against Fraudulent Certificates
sponsored by Venafi
EGUIDE: In this expert guide, you'll find tips on detecting and mitigating the fraudulent certificates used by the Flame malware, Zeus, and more.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Social Threat Intelligence: Embracing Collaborative Security
sponsored by Threatstream
WEBCAST: This webcast discusses the benefits of social threat intelligence (STI), a form of threat intelligence that embraces collaboration across enterprises.
Posted: 24 Sep 2015 | Premiered: Jun 18, 2015


Network Security Case Study: Stealthy Tactics Define a Russian Cyber Threat Group
sponsored by FireEye
WHITE PAPER: This network security report will introduce you to HAMMERTOSS and the 5 stages of its attack, as well as how to combat threats such as these that undermine network defenders.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Sluggish Incident Response Report:: Next-Gen Security Problems and Solutions
sponsored by FireEye
WHITE PAPER: Identify the issues plaguing network incident response processes and combat shortcomings like limited human resources. Access this report now to glean an overview of the outside security services that your organization can procure to eliminate sluggish incident response.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Achieve Global PCI DSS Compliance with Managed Cloud Services
sponsored by Datapipe
CASE STUDY: This case study examines how Gateway Ticketing Systems was able to upgrade to a fully managed, PCI compliant hosting environment. Read on to see how this particular cloud platform can deliver business growth enabled with scalable, secure, redundant network, and more.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Social Threat Intelligence: A New Approach to Security
sponsored by Threatstream
TRANSCRIPT: This resource discusses social threat intelligence (STI), a collaborative approach to threat intelligence that can help you keep up with new cyber-risks.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Heartbleed and OpenSSL Risks in the UK
sponsored by Venafi
EGUIDE: This expert guide discusses why so many organizations remain vulnerable to Heartbleed and OpenSSL and suggests ways you can ensure you're not one of them.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


The State of DNS Security
sponsored by Efficientip
WHITE PAPER: This white paper discusses why traditional security solutions leave your DNS vulnerable and gives suggestions for keeping your DNS secure.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Preparing for the Next Attack: Evaluate Your Network Security with Incident Response
sponsored by FireEye
WHITE PAPER: This guide will help you evolve your ability to respond to critical security incidents. Access this paper to uncover the 6 core capabilities to keep in mind as you plan and maintain your network security response plan.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Five Reasons to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: This white paper discusses the benefits of adopting an MSSP, listing five main reasons why it might be a good investment for you.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015


Stories in Information Governance: The IGI 2015 Benchmarking Report
sponsored by Hewlett-Packard Company
WHITE PAPER: In this in-depth report, you'll learn what other IG practitioners are doing to ensure their information governance strategies are effective and successful and how to apply their approaches to your organization. View now to learn insider tips to overcoming information governance obstacles.
Posted: 21 Sep 2015 | Published: 09 Sep 2015

Hewlett-Packard Company

How to Keep Your Public Cloud Private
sponsored by HyTrust
WEBCAST: In this webcast, experts address the challenges of securing data in the public cloud.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015


Evaluate and Evolve Your Network Security Program in 10 Steps
sponsored by FireEye
WHITE PAPER: This white paper serves as a comprehensive guide for IT professionals evaluating enterprise network security. Read this report now to access the 10-step process for proper security program evaluation, how to conduct a program assessment, and more.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


Critical Security Controls for SSL/TLS Management
sponsored by Venafi
WHITE PAPER: In this SANS report, you'll find specific recommendations for managing SSL/TLS security and protecting your keys and certificates.
Posted: 18 Sep 2015 | Published: 30 Jun 2015


The Next Stage in Creating the Value-Added Finance Function
sponsored by SAP
WHITE PAPER: In the fall of 2014, CFO Research conducted a survey among senior finance executives at large companies to explore developments in the ways that finance functions employ advanced information capabilities to support business operations. This resource details the full findings of this survey.
Posted: 18 Sep 2015 | Published: 31 Oct 2014


Jump-Start Your Cybersecurity Career with Your NIST RMF Virtual Internship
sponsored by Mission Critical Institute
WHITE PAPER: Do you want to move your IT career forward? In this resource, learn how you can take part in an online NIST RMF internship that will give you the experience necessary to become a highly sought-after cybersecurity expert.
Posted: 18 Sep 2015 | Published: 18 Sep 2015

Mission Critical Institute

Case Study: Centralizing Endpoint Management for Peak Performance
sponsored by Earthlink.
WHITE PAPER: This case study tells how a global consulting firm consolidated endpoint security for 85 different offices and achieved one-stop visibility and management for mobile endpoints.
Posted: 18 Sep 2015 | Published: 18 Sep 2015


DD4BC and the Rise of Extortion
sponsored by Akamai
WEBCAST: This webcast discusses the methods, capabilities, and risks cyber-extortion groups pose to your organization.
Posted: 18 Sep 2015 | Premiered: Sep 10, 2015


A Modern Disaster Recovery Approach Fit for US Government Security Standards
sponsored by NTT America, Inc.
CASE STUDY: In this business impact summary, find out how one government organization formed a flexible, fast, and cloud-based disaster recovery strategy that held up under strict regulations.
Posted: 17 Sep 2015 | Published: 30 Apr 2015

NTT America, Inc.
26 - 50 of 1442 Matches Previous Page    1 2 3 4 5    Next Page
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement