Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementReports
76 - 100 of 1389 Matches Previous Page  | Next Page
Streamline Your Federal Contingency Planning/COOP
sponsored by RSA, The Security Division of EMC
WEBCAST: Learn how to streamline your COOP with an automated and integrated solution. Understand the nuances of the terminology and align with best practices such as NIST 800-34. Align recovery efforts with organizational objectives and priorities.
Posted: 05 Sep 2014 | Premiered: Sep 5, 2014

RSA, The Security Division of EMC

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: In this informative report, discover why McAfee's Enterprise Security Manager is turning heads in the security industry.
Posted: 05 Sep 2014 | Published: 25 Jun 2014

Intel Security

Effective Risk Assessment for Health Care Providers
sponsored by Solutionary
WHITE PAPER: In this in-depth white paper, gain critical insights into effective risk assessment implementation in today's healthcare organizations.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Solutionary

Managed Security Service Providers Vs. On-Premise SIEM
sponsored by Solutionary
WHITE PAPER: This informative white paper compares the strengths and weakness of on SIEM products with the MSSPs, including the financial, operational, and organizations considerations of each.
Posted: 05 Sep 2014 | Published: 13 Mar 2014

Solutionary

HIPAA Compliance Tips For Mobile Data Sharing
sponsored by Dell, Inc.
EGUIDE: Joy Pritts of ONC sits down with SearchHealthIT to discuss the key issues she sees playing out in health IT in the near and long-term future, as well as her thoughts on mobile data sharing.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Dell, Inc.

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Learn how identity and access management solutions from IBM Security can help organizations protect critical assets.
Posted: 04 Sep 2014 | Published: 01 Apr 2014

IBM

Top 7 Steps for Better DoS and DDoS Protection
sponsored by Solutionary
WHITE PAPER: In this essential white paper, discover the top 7 steps to help prevent these cyber-attacks and minimize their impact.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

Solutionary

Piercing the Veil of Masked Cyber Criminals
sponsored by DomainTools
WHITE PAPER: In this helpful white paper, discover a new security solution that can help you identify cyber criminals, build a cyber-attack profile, and more effectively protect your valuable data and assets.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Mitigating Security Risks at the Network's Edge: Best Practices for Distributed Enterprises
sponsored by CradlePoint
WHITE PAPER: Access this white paper to discover the keys to preventing data breaches in distributed enterprises.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

CradlePoint

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Preventing Data Breaches with Data Access Governance
sponsored by RSA, The Security Division of EMC
VIDEO: Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

RSA, The Security Division of EMC

Solutions with ROI for Today's Federal Information Assurance Challenges
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper illustrates the major challenges faced by today's Federal IA professionals, and offers solutions, along with ROI for each of those challenges.
Posted: 03 Sep 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Learn How to Successfully Manage a Continuous Monitoring Program
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper provides an introduction to Continuous Monitoring (CM), including definitions and common misperceptions. Learn how to successfully manage your own CM program.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

RSA, The Security Division of EMC

Big Data Architecture: Build, Buy or Blend?
sponsored by SearchCIO.com
EZINE: CIOs face a quandary in big data architecture: Do I buy or build? New business problems, inadequate vendor solutions and myriad new technologies complicate that question.
Posted: 03 Sep 2014 | Published: 02 Sep 2014

SearchCIO.com

Internal Audit: Challenges and Solutions to Alignment
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this whitepaper, learn how Internal Audit (IA) can benefit from partnering with these organizational groups while maintaining a certain level of independence.
Posted: 02 Sep 2014 | Published: 01 Oct 2013

RSA, The Security Division of EMC

2014 Global Threat Intelligence Report
sponsored by Solutionary
RESOURCE: This critical report outlines today's most dangerous cyber threats and the key security strategies that will keep your organization protected.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Solutionary

How Access Governance Makes Data Loss Prevention Successful
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

RSA, The Security Division of EMC

e-Guide: Conquering Advanced Persistent Threat Attacks
sponsored by CDW Corporation
EGUIDE: This expert e-Guide clears up common misconceptions about the dangers and characteristics of advanced persistent threats (APTs), and also explains how context-aware security can improve the detection of APTs within enterprises.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

App Security: Decompiling Android APK Files
sponsored by CDW Corporation
EGUIDE: In this informative e-guide, expert Andrew Hogg takes you through the steps of reverse-engineering Android applications for the purpose of scoping out security weaknesses.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

Countering Cyber Threats with Behavioral Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

RSA, The Security Division of EMC

AWS Cloud Security
sponsored by CloudPassage
WHITE PAPER: Security and risk professionals should access this Forrester research report to learn about a security solution that provides infrastructure plus a wide set of IT services.
Posted: 29 Aug 2014 | Published: 21 Feb 2014

CloudPassage

Combatting Digital Fraud: A CIO Report
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

RSA, The Security Division of EMC

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Boost Advanced Persistent Threat Security Levels in 6 Steps
sponsored by CDW Corporation
EGUIDE: This e-guide contains expert suggestions for mitigating the dangerous threat presented by APTs.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

CDW Corporation

Safety Through Synergy
sponsored by NEC Corporation of America
WHITE PAPER: Governments and city planners must be prepared for a wide variety of threats to public safety.  This makes IT Professionals realize just how important it really is to secure sensitive information.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

NEC Corporation of America
76 - 100 of 1389 Matches Previous Page    2 3 4 5 6 7    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement