Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
51 - 75 of 1468 Matches Previous Page  |  Next Page
Harness Operational Risk with Enterprise GRC
sponsored by RSA
WHITE PAPER: This white paper examines the four key requirements to building an effective operation risk management program. View now to learn how to understand risk across the enterprise and analyze risk across silos. Read on to learn more.
Posted: 11 May 2015 | Published: 31 Dec 2014

RSA

How to Better Guard Against a Security Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: SIEM adoption may be increasing, but only 20% of organizations use their SIEM systems to their full capacity. In this study, learn why that is – and how you can bring your SIEM use to the next level.
Posted: 11 May 2015 | Published: 11 May 2015

Hewlett-Packard Company

Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall
sponsored by Trend Micro
WEBCAST: This webcast can help you keep yourself safe from ransomware and mitigate it if you do come under attack.
Posted: 11 May 2015 | Premiered: Jan 21, 2015

Trend Micro

Mitigate Software Vulnerabilities with Virtual Patching
sponsored by Trend Micro
WEBCAST: This webcast discusses best practices for implementing virtual patching in a way that optimizes security without causing any system downtime.
Posted: 11 May 2015 | Premiered: May 11, 2015

Trend Micro

Defending Against New Ransomware Threats
sponsored by Trend Micro
WHITE PAPER: In this white paper, discover five ways to make sure you're prepared for a ransomware attack.
Posted: 11 May 2015 | Published: 11 May 2015

Trend Micro

Custom Defense Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Read this white paper to discover how you can build custom-designed security that can withstand even the most advanced targeted attack.
Posted: 08 May 2015 | Published: 31 Dec 2014

Trend Micro

SCB Builds a Defense Against Malware
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn the story of an architectural firm that dramatically decreased malware attacks while increasing productivity.
Posted: 08 May 2015 | Published: 08 May 2015


Sagicor Takes on Malware and Wins
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper tells the story of how one financial institution put a stop to their constant stream of malware attacks.
Posted: 08 May 2015 | Published: 08 May 2015


Hypertherm Cuts Malware Out of the Picture
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover how a manufacturing company dramatically cut down on the time and effort needed to mitigate malware infections.
Posted: 08 May 2015 | Published: 08 May 2015


Food for the Hungry Stops Malware in its Tracks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn how a major non-profit eradicated malware in its network.
Posted: 08 May 2015 | Published: 08 May 2015


Florida Gulf Coast University Teaches Malware a Lesson
sponsored by Malwarebytes Corporation
WHITE PAPER: In this exclusive case study, discover how a major university kept thousands of users safe from malware.
Posted: 08 May 2015 | Published: 08 May 2015


Your Guide to Matching Applications to the Right Cloud
sponsored by Verizon
WHITE PAPER: This white paper reveals three steps to select the best cloud delivery model for each of your enterprise workloads.
Posted: 07 May 2015 | Published: 30 Apr 2015

Verizon

Holistic Protection against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: This white paper discusses how you can design security customized for your network and for fighting off potential targeted attacks.
Posted: 07 May 2015 | Published: 31 Oct 2014

Trend Micro

CSI Techniques for IT Security
sponsored by Absolute Software
WEBCAST: This webinar illustrates the importance of staying ahead of the curve. Join Lance Mueller, Magnet Forensics' own Director of Forensics, to learn why you should proactively monitor for early signs of an IT security incident.
Posted: 07 May 2015 | Premiered: Jan 3, 2014

Absolute Software

Powerful Anti-Malware for Your Mobile Device
sponsored by Malwarebytes Corporation
WHITE PAPER: Those who haven't yet secured their mobile devices are courting serious risk. In this white paper, discover what mobile anti-malware can do to bolster your mobile security.
Posted: 07 May 2015 | Published: 07 May 2015


Creating a Powerful Anti-Malware Defense
sponsored by Malwarebytes Corporation
WHITE PAPER: In today's high-risk cybercrime environment, anti-malware and anti-exploit software need to be implemented on top of basic anti-virus. Read this white paper to learn more about successfully doing so.
Posted: 07 May 2015 | Published: 07 May 2015


Protect Your Data While Increasing End-User Productivity
sponsored by Absolute Software
WEBCAST: The District of Columbia National Guard (DCNG) once struggled to run inventories on devices and protect against data breaches. Tune in to the following webinar and learn how DCNG was able to improve inventory accountability and save resources.
Posted: 07 May 2015 | Premiered: Apr 8, 2014

Absolute Software

Endpoint Security for Today's Cyber Risks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover how you can create layered endpoint security with the combination of anti-malware and anti-exploit software.
Posted: 07 May 2015 | Published: 07 May 2015


Data Breaches: Technical Options to Avoid Bad Press and Sales
sponsored by Absolute Software
WEBCAST: This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.
Posted: 07 May 2015 | Premiered: Jul 22, 2014

Absolute Software

Case Study: Ensuring Automated Access Governance
sponsored by RSA
CASE STUDY: In order to ensure that data is accessed only by employees or partners with the proper permissions and unauthorized users are blocked, a strong IAM and governance is needed.  This case study explores how to develop a new IAM and governance strategy using a 4 phase framework and how to automate it to overcome common challenges.
Posted: 06 May 2015 | Published: 18 Mar 2015

RSA

Five Design Principles of an Effective Endpoint Security Strategy
sponsored by Absolute Software
WEBCAST: Access this webinar and learn about zero-day malware and other alarming virtual pests that pose a threat to organizations. Uncover the five design principals, by way of Forrester Research, that indicate an effective endpoint strategy.
Posted: 06 May 2015 | Premiered: Sep 17, 2014

Absolute Software

Secure Federal Data and Support Your Mobile Workforce
sponsored by Absolute Software
WHITE PAPER: This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.
Posted: 06 May 2015 | Published: 06 May 2015

Absolute Software

Security Reimagined
sponsored by FireEye
WHITE PAPER: It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 06 May 2015 | Published: 31 Dec 2014

FireEye

Anatomy of Cyber Attack
sponsored by Hewlett-Packard Company
WEBCAST: Attend this webinar to learn the anatomy of an advanced persistent threat and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Posted: 06 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

Think Like a Bad Guy: Understanding Advanced Threats and How to Mitigate Them
sponsored by Hewlett-Packard Company
WHITE PAPER: Increasingly, today's advanced threats circumvent traditional defenses—even sandboxing. This SlashGuide white paper helps you understand advanced threats and how to defend against them.
Posted: 06 May 2015 | Published: 31 Jan 2015

Hewlett-Packard Company
51 - 75 of 1468 Matches Previous Page    1 2 3 4 5 6    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement