Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementReports
51 - 75 of 1304 Matches Previous Page  | Next Page
Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

The New Mobile Security Agenda
sponsored by Accellion, Inc.
WHITE PAPER: This resource offers key recommendations for enhancing mobile security strategies to avoid business risk and disaster.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

Competitive Testing of Web Security Devices
sponsored by Websense, Inc.
WHITE PAPER: This informative whitepaper compares various market-leading web security tools and outlines some common threats looking to infiltrate your system.
Posted: 30 Jun 2014 | Published: 23 Jan 2014

Websense, Inc.

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

Building out an IAM Infrastructure and Strategy while Supporting Compliance Needs
sponsored by IBM
EGUIDE: In this expert E-Guide, Forrester Research's Andras Cser discusses what the steps should be when building out an IAM infrastructure and strategy.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

IBM

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
DATA SHEET: This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
Posted: 25 Jun 2014 | Published: 30 Apr 2014

Symantec Corporation

How threat intelligence can give enterprise security the upper hand
sponsored by IBM
EGUIDE: In this e-guide, expert Nick Lewis, information security officer at Saint Louis University, covers the benefits of a threat intelligence strategy for enterprises, as well as how to integrate intel feeds with existing security programs.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

I Have to Trust Someone… Don't I?
sponsored by CA Technologies.
WHITE PAPER: This whitepaper outlines the significance of insider threats within every company.
Posted: 25 Jun 2014 | Published: 31 Jul 2013

CA Technologies.

Why Strong Authentication is a Must for All Users
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper provides valuable insight into why strong authentication is essential for all users.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

CA Technologies.

Improve Enterprise APT Detection
sponsored by IBM
EGUIDE: This expert E-Guide explains why enterprises are turning to context-aware security approaches to improve their APT detection capabilities. Follow these tips to tackle advanced persistent threats in your organization.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Understanding the Cyber-Risks of your Company
sponsored by Hewlett-Packard Limited
WHITE PAPER: This informative resource explores the growing complexities of cybersecurity risks and outlines the importance of understanding your adversary.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Hewlett-Packard Limited

Managing IBM License Complexity
sponsored by Flexera Software
WHITE PAPER: In this white paper, examine the most common IBM license models under three categories -- user-based, capacity-based, and "other" -- along with helpful examples. Plus, discover a discovery, inventory and license management tool that simplifies and automates IBM license management.
Posted: 23 Jun 2014 | Published: 31 Dec 2011

Flexera Software

Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER: This informative whitepaper outlines 10 best practices for successful SIEM implementation.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

AccelOps Inc.

Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

Only Bitglass Secures Cloud And Mobile Yet Respects User Privacy
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014


IDC Technology Spotlight: Securing the Blended Data Center
sponsored by Fortinet, Inc.
WHITE PAPER: This IDC report shares critical tips on how to secure a blended IT environment featuring physical data centers and cloud computing.
Posted: 20 Jun 2014 | Published: 28 Feb 2014

Fortinet, Inc.

Secure the Open Enterprise
sponsored by CA Technologies.
WHITE PAPER: This informative resource details the need for SaaS security and how to stop insider threats and external threats with the right SIEM solution.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

CA Technologies.

Privileged Identity Management Trends from Q1 2014
sponsored by CA Technologies.
WHITE PAPER: This Forrester Research, Inc. report highlights key trends that point to privileged identity management as a must-have security strategy, and highlights the top vendors who met an 18-item requirements list.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Ensure Exceptional End-User Experience Without Over-Provisioning IT Infrastructure
sponsored by CA Technologies.
WHITE PAPER: This white paper introduces application performance management (APM) and capacity management tools that can help you maintain top performance of your business-critical applications, while keeping infrastructure costs low.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

CA Technologies.

The Total Value of Simpana Software
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper gives survey results on a backup software solution that drives additional value not only in terms of costs but also efficiency, risk reduction, and data value.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

CommVault Systems, Inc.
51 - 75 of 1304 Matches Previous Page    1 2 3 4 5 6    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement