Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
51 - 75 of 1578 Matches Previous Page  |  Next Page
Data + Security = A Most Unvirtuous Relationship
sponsored by Delphix
RESOURCE: Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

Delphix

The Hunt for IoT
sponsored by F5 Networks
WHITE PAPER: 30.6 million IoT brute force attacks were launched from January 1 to June 30 2017. This white paper provides an analysis of data collected pertaining to the rise of thingbots across the globe, specifically focusing on the Mirai and Persirai bots containing destructive malware.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

F5 Networks

The Evolving Role of CISOs and their Importance to the Business
sponsored by F5 Networks
WHITE PAPER: Explore this 67 page Ponemon Institute Security Report to gain insight into the evolution and influence of CISOs through interviews with 184 companies regarding insights, challenges and approaches to security in today's global threat landscape.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

F5 Networks

ROI Analysis: IBM BigFix Patch And BigFix Compliance
sponsored by IBM
WHITE PAPER: This Forrester report examines the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

IBM

DDoS: Strategies for Dealing With a Growing Threat
sponsored by A10 Networks
WHITE PAPER: In 2015, 10% of average DDoS attacks were above 50 Gbps. Today the average size of attacks greater than 50 Gbps quadrupled to 42%. This IDG paper provides research on recent DDoS attacks and compares the data to a similar study conducted a few years ago to discover what measures organizations need to take now to prevent the attacks.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

A10 Networks

Managed Detection and Response Service
sponsored by Rapid 7
WEBCAST: According to the 2017 SANS Incident Response Survey, 87% responded to at least one incident in the past year. Take a look at this webcast to gain insight into improving your incident response strategy by validating and identifying known and unknown threats in order to protect your company.
Posted: 20 Nov 2017 | Premiered: Nov 7, 2017

Rapid 7

Case Study: Incident Response Time Savings and Compliance Ease
sponsored by Rapid 7
CASE STUDY: This case study explores how energy provider, Energie Suedbayern (ESB), overcame its challenges of having limited IT staff resources, a growing compliance burden, and numerous threats from hackers. Uncover how ESB overcame these issues by bringing vulnerability management together with an incident detection response strategy.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

Achieve SIEM Solution Success
sponsored by Rapid 7
WHITE PAPER: Looking to unify data, detect attacks, and identify risks across your organization? SIEM can help. This white paper offers 6 challenges Gartner has identified as the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

Journey to GDPR
sponsored by IBM
WHITE PAPER: GDPR readiness is critical and a business necessity, but many organizations are struggling with the complex compliance requirements. This article provides information regarding GDPR as well as strategies to ensure you are compliant with the data processing rules.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

The Evolving Risk Landscape
sponsored by F5 Networks
WHITE PAPER: There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Get Ahead of GDPR Demands
sponsored by IBM
WHITE PAPER: The GDPR financial penalties for non-compliance are daunting; learn how to gain GDPR compliance by keeping your company's data secure. This article provides insight into preparing for the GDPR by accelerating compliance readiness and managing data breaches.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

The Hunt for IoT
sponsored by F5 Networks
WHITE PAPER: 30.6 million IoT brute force attacks were launched from January 1 to June 30 2017, according to F5 Labs. This report provides an analysis of data collected pertaining to the rise of thingbots in Europe, specifically focusing on the Mirai and Persirai bots containing destructive malware.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Cybersecurity: For Defenders, It's About Time
sponsored by McAfee, Inc.
WHITE PAPER: In multiple areas of cybersecurity, time is working in favor of the attackers. This Aberdeen Group report provides 4 examples of how recapturing an advantage of time can help defenders reduce their risk.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

McAfee, Inc.

Magic Quadrant for Enterprise Data Loss Prevention
sponsored by McAfee, Inc.
WHITE PAPER: According to Gartner, by 2020, 85% of organizations will implement at least one form of integrated DLP, up from 50% today. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's DLP products as well as, a market overview.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

McAfee, Inc.

How Malware Can Steal Your Data
sponsored by F5 Networks
EBOOK: 51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

Top Cyber Threats to the Technology Sector
sponsored by Digital Shadows
WHITE PAPER: Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

GDPR Quick Start Guide
sponsored by MarkLogic
WHITE PAPER: According to an Osterman Research Report, 64% of organizations are not ready to comply with the GDPR. This paper offers a quick start to GDPR with 3 key steps that will put you on the right track to maintaining GDPR compliance.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

MarkLogic

Top Cyber Threats to The Retail Sector
sponsored by Digital Shadows
WHITE PAPER: Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Demystifying Cloud Security
sponsored by Workday
WHITE PAPER: Enterprises deploy more applications to more endpoints than ever before, making them great targets for hackers. Take a look at this white paper to gain insight into how shifting to the cloud can protect your company's increasing applications and endpoints.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Workday

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity
51 - 75 of 1578 Matches Previous Page    1 2 3 4 5 6    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement