Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
76 - 100 of 1708 Matches Previous Page  |  Next Page
How to Convince Your Board to Invest in AppSec
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to effectively express to your board why greater app layer security is paramount. See six solid arguments to bring up and discover how to get the most bang for your security buck.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Protecting the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to secure your wide area network behind a distributed enterprise firewall without sacrificing performance or usability. Learn 5 key requirements to keep all of your dispersed sites secure and keep maintenance costs low.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

Fortinet, Inc.

Accelerating Digital Transformation with Data-Driven Security (Video)
sponsored by Akamai
VIDEO: A new approach to cyber security is required to deal with bigger and badder threats. Discover how to take a data-lead approach to security. Learn how to increase your speed and accuracy when dealing with threats without sacrificing customer satisfaction through real-time threat intelligence.
Posted: 01 Nov 2016 | Premiered: 31 Oct 2016

Akamai

Application Security Testing Vendor Evaluations
sponsored by Veracode, Inc.
ANALYST REPORT: This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you.
Posted: 31 Oct 2016 | Published: 06 Aug 2015

Veracode, Inc.

Disaster recovery and business continuity: Essential guide
sponsored by ComputerWeekly.com
EGUIDE: Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

ComputerWeekly.com

DraftKings Replaces Traditional Antivirus with Next-Gen AV (NGAV)
sponsored by Carbon Black
RESOURCE: Discover how DraftKings went about finding a comprehensive next-generation antivirus solution that wouldn't impact business operations. While DraftKings evaluated over 100 different providers, only one allowed them to continue working as normal, while protecting their network in the background.
Posted: 28 Oct 2016 | Published: 25 Oct 2016

Carbon Black

Why Email Security Matters: The Advantages of Hosted Protection
sponsored by LogicNow
EBOOK: Discover the key advantages of hosted email protection. Learn this method's detailed protection mechanisms, which include blacklisting, antispam engines that look for telltale signatures, and real-time message source evaluation.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

LogicNow

Benefits of Security Intelligence Services
sponsored by Kaspersky Lab
WHITE PAPER: This white paper examines how the use of security intelligence services can help prepare your company's defenses so you can proactively mitigate threats from advanced attacks. Discover how to implement threat intelligence, leveraging data to track and manage risks before they have a negative impact on your organization.
Posted: 27 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

Closing the Circle of Network Security Defense
sponsored by Kaspersky Lab
WHITE PAPER: Explore how you can access comprehensive, trustworthy threat intelligence data so that you can defend against attacks before they're even launched. Uncover key features like accelerated incident response, threat hunting, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Kaspersky Lab

IT Security 101: Thinking Like a Cybercriminal?
sponsored by LogicNow
EBOOK: Understanding how the threat landscape is maturing means getting to grips with how cybercriminals think. This e-book illustrates 6 key considerations for bolstering cybersecurity. Download it now to establish an effective system to proactively address potential threats across the entire cyber landscape.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

LogicNow

Can One Enterprise Firewall Tool Protect Your Entire Network?
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your entire attack surface, from IoT to cloud and from users to data, behind a single pane of glass. Learn why one network security operating system could be all you need to ensure end-to-end network protection against today's most advanced security threats and targeted attacks.
Posted: 27 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

The Eaton Power Management Guide
sponsored by Eaton
WHITE PAPER: This white paper offers a five step guide to building a proper power management solution while optimizing your existing one. Engage in this intelligent power management strategy to fully reap the benefits of the existing modern IT architectures and avoid unforeseen risks.
Posted: 26 Oct 2016 | Published: 30 May 2016

Eaton

Optimal Security for your Software-Defined Data Center
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: Virtual and physical infrastructures face the same security threats - cybercriminals make no distinctions. This means you cannot afford to compromise on security for your virtual environment. Learn about a security tool designed for virtualization platform technologies that barely impacts performance.
Posted: 25 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

Intelligence Reporting: Answers to Your Security Questions
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: This product overview highlights an advanced security intelligence reporting service that can provide answers to your crucial security questions. Learn how this service can reduce damage caused by advanced attacks by accessing now.
Posted: 25 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

Information Security Policy Reference Guide
sponsored by Navex Global
WHITE PAPER: This guide can help any organization struggling with data protection policies put solid guidelines in place for employees to follow. Uncover a definite structure for information security, access control and compliance among many other critical areas.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Navex Global

DDoS: A Clear and Present Danger
sponsored by A10 Networks
WHITE PAPER: Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

A10 Networks

NSS Labs Data Center IPS Test Report: IBM XGS 7100
sponsored by IBM
PRODUCT OVERVIEW: This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

IBM

Balancing Endpoint Security vs. End User Productivity
sponsored by AppSense
TRANSCRIPT: Most IT organizations struggle to balance endpoint security and user productivity. Industry expert Simon Townsend examines both sides of the issue and suggests approaches that will help you get and maintain that balance.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

AppSense

Balancing Endpoint Security vs. End User Productivity
sponsored by AppSense
PODCAST: Most IT organizations struggle to balance endpoint security and user productivity. In this podcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.
Posted: 21 Oct 2016 | Premiered: Oct 13, 2016

AppSense

Balancing Endpoint Security vs. End User Productivity
sponsored by AppSense
WEBCAST: Most IT organizations struggle to balance endpoint security and user productivity. In this webcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.
Posted: 21 Oct 2016 | Premiered: Oct 13, 2016

AppSense

The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector
sponsored by A10 Networks
WHITE PAPER: In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

How to Enhance Your Web Security with the Cloud
sponsored by Trustwave
PRODUCT OVERVIEW: Discover how to enhance your web protection, control and visibility from a cloud security platform. Uncover the benefits of allowing security experts to monitor security alerts and manage all policy updates so you can spend resources elsewhere.
Posted: 18 Oct 2016 | Published: 30 Sep 2016

Trustwave

Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.
Posted: 21 Oct 2016 | Published: 23 Mar 2016


Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Radware
76 - 100 of 1708 Matches Previous Page    2 3 4 5 6 7    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement