Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
51 - 75 of 1721 Matches Previous Page  |  Next Page
See How Apps are Being Hacked
sponsored by Arxan
WEBCAST: This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.
Posted: 11 Jul 2016 | Premiered: Jun 1, 2016

Arxan

Protected Health Information Data Breach Report
sponsored by Verizon
RESEARCH CONTENT: Put PHI security under the microscope to help you identify threats and mitigate risks to your medical records, by accessing this exclusive "Protected Health Information Data Breach" report. Additionally, examine the top three threats that account for 73% of all healthcare data security incidents to protect your customer trust.
Posted: 08 Jul 2016 | Published: 31 Dec 2015

Verizon

IT Compliance and Security: Reduce Security Exposure from Months to Minutes
sponsored by BMC
VIDEO: Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.
Posted: 08 Jul 2016 | Premiered: 08 Jul 2016

BMC

Endpoint threat detection gets more response
sponsored by Hewlett Packard Enterprise
EGUIDE: Discover how security teams worldwide are attempting to stop cyberthreats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
Posted: 07 Jul 2016 | Published: 06 Jul 2016

Hewlett Packard Enterprise

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
sponsored by OneLogin
WEBCAST: In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.
Posted: 07 Jul 2016 | Premiered: Jun 1, 2016

OneLogin

Best Practices for Monitoring Today's Murky Threat Environment
sponsored by Hewlett Packard Enterprise
EGUIDE: In today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.
Posted: 07 Jul 2016 | Published: 24 Jun 2016

Hewlett Packard Enterprise

The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems
sponsored by Verizon
VIDEO: Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.
Posted: 06 Jul 2016 | Premiered: 29 Apr 2016

Verizon

Assessing Cybersecurity Risk in a Breached World
sponsored by Infocyte
WHITE PAPER: It's imperative you include regular compromise assessments as part of your information and IT risk management strategy. Enable your operations team to catch what prevention and monitoring technologies miss, and learn how to best mitigate the possible damage that can be caused from persistent compromises before hackers make their move.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

Infocyte

Incident Response Team: Transform Your IR Team From Reactive to Proactive
sponsored by ThreatConnect
WHITE PAPER: Discover how your IR team can become faster and more effective at protecting your network. Unite your people, processes, and technologies across your organization to eliminating barriers between the systems that used to slow you down.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

9 steps to build a better insider threat program
sponsored by Forcepoint
WEBCAST: While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.
Posted: 06 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

State of Application Security Report
sponsored by Arxan
WHITE PAPER: You know why mobile apps must be secure, now learn why in this white paper. It provides recommendations for how organizations and consumers can minimize the risk of their mobile apps being hacked and how app developers can improve protection.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Arxan

Security Operations Center: Unite People, Processes, and Technologies Across Your SOC
sponsored by ThreatConnect
WHITE PAPER: Discover how to deepen your threat intelligence, validate it, prioritize it and act on it. Bring together the people, processes, and technologies that comprise your Security Operations Center (SOC) team, and the other teams you partner with on a daily basis. Automate mundane security tasks that slow you down by leveraging tools you already have.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

22 Ways Global Firms are Increasing Security in 2016 Webcast Part 2
sponsored by Intel Security
WEBCAST: Access this informative content to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.
Posted: 05 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

First Principles for Network Defenders: A Unified Theory for Security Practitioners
sponsored by Palo Alto Networks
WHITE PAPER: In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks that support the first principle are: threat prevention, threat detection, and threat eradication.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Palo Alto Networks

Technologies to Thwart Insider Threats
sponsored by Forcepoint
WEBCAST: Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

A Business Case For Funding Your Insider Threat Program
sponsored by Forcepoint
WHITE PAPER: Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.
Posted: 01 Jul 2016 | Published: 01 Jun 2016

Forcepoint

Intelligent Endpoint Threat Defense
sponsored by Intel Security
PODCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Intelligent Endpoint Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Intelligent Endpoint Threat Defense
sponsored by Intel Security
TRANSCRIPT: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Published: 01 Jun 2016

Intel Security

The real cost of data breach
sponsored by AllClear ID
WEBCAST: Through this webinar, you learn from security experts how to effectively respond to customers after a major data breach and decrease the damage done to your brand. Discover how to establish a timeline of events for each incident, determine the scope of an incident and alleviate customer concerns in a timely manner.
Posted: 01 Jul 2016 | Premiered: Nov 10, 2015

AllClear ID

Confidence in the Breach Age: Risks, Preparation, Response & Recovery
sponsored by AllClear ID
WEBCAST: Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.
Posted: 01 Jul 2016 | Premieres: Aug 20, 2016

AllClear ID

Three Critical Steps to Launch a Data Breach Response
sponsored by AllClear ID
WHITE PAPER: This resource highlights three critical steps in launching an effective incident response plan. Learn how to assemble a team, build communication channels with that team, draft different plans around specific incidents types and offer helpful services like identity theft protection.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

AllClear ID

Infographic: Breach Preparedness
sponsored by AllClear ID
WHITE PAPER: This infographic shows you statistics from business executives and consumers on how they handle and perceive a data breach. Learn how to properly deal with a major breach now, before it's too late to formulate a proper breach response plan.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Advantages vs. Disadvantages of Taking a "Hack Back" Approach to Cyber Crime
sponsored by Hewlett Packard Enterprise
EGUIDE: This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.
Posted: 07 Jul 2016 | Published: 24 Jun 2016

Hewlett Packard Enterprise

22 Ways Global Firms are Increasing Security in 2016 Webcast Part 1
sponsored by Intel Security
WEBCAST: This webcast reviews security initiatives in order of their popularity for deployment. Access now to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security
51 - 75 of 1721 Matches Previous Page    1 2 3 4 5 6    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement