Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
76 - 100 of 1463 Matches Previous Page  |  Next Page
Enhance Your Malware Protection
sponsored by IBM
WHITE PAPER: This white paper describes a malware protection that can accurately identify even the most advanced malware.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Case Study: A Global 1000 Enterprise Adapts Its Security
sponsored by IBM
WHITE PAPER: Read this exclusive report to discover how a global 1000 company successfully adapted their security for the BYOD era.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Stepping up the battle against advanced threats
sponsored by IBM
WHITE PAPER: This white paper examines how and why enterprises have failed to protect themselves against advanced threats and gives suggestions for better security.
Posted: 06 Mar 2015 | Published: 31 Jan 2015

IBM

Cyber Security Roadmap
sponsored by ESET
WHITE PAPER: This white paper presents a clear, easy-to-follow roadmap to creating comprehensive security on a modest budget.
Posted: 06 Mar 2015 | Published: 06 Mar 2015

ESET

Hybrid Cloud Model Enhances DNS Security
sponsored by Efficientip
WHITE PAPER: This white paper suggests one way to prevent DNS compromises – a hybrid cloud DNS server.
Posted: 05 Mar 2015 | Published: 31 Dec 2014

Efficientip

Survey Reveals the Danger of DNS Attacks
sponsored by Efficientip
WHITE PAPER: This survey on DNS attacks reveals how powerful DNS attacks are and what securities are most effective against them.
Posted: 05 Mar 2015 | Published: 30 Jun 2014

Efficientip

Cyber Risk Report 2015 - Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad overview of the threat landscape and how hackers operate.
Posted: 05 Mar 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This 2015 cyber risk report provides a broad view of the 2014 threat landscape and gives you the information you need to protect your business.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Hewlett-Packard Company

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

5 Reasons Why Your DNS Protection Isn't Doing Enough
sponsored by Efficientip
WHITE PAPER: This white paper lists 5 ways that traditional security solutions fail against DNS attacks.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Efficientip

Is it Phishing or an APT?
sponsored by Threat Track Security
WHITE PAPER: In this white paper, learn the three mechanisms of a phishing email attack and how one security platform can fill the gaps in your defense strategy.
Posted: 04 Mar 2015 | Published: 11 Feb 2015

Threat Track Security

The Financial Impact of Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This detailed report shows you just how detrimental APTs can be.
Posted: 03 Mar 2015 | Published: 01 May 2014

IBM

How to Protect Intellectual Property Against Data Breaches
sponsored by Websense
EGUIDE: The stakes and costs are high for any breached organization; the key now is to plan.  View this expert e-guide to learn the steps to protecting IP.
Posted: 03 Mar 2015 | Published: 04 Feb 2015

Websense

Gartner CIO & IT Executive Summit 2015: Topics, Speakers, and Vendors
sponsored by Gartner
BROCHURE: The Gartner CIO & IT Executive Summit 2015, focusing on Digital Leadership: Evolving the Core and Accelerating Business Value is coming to Munich, Germany on May 20 – 21. Take a look at the following brochure to view the events taking place this year and explore the topics that will be covered.
Posted: 03 Mar 2015 | Published: 03 Mar 2015

Gartner

The Secure Third Party App Buyer's Guide
sponsored by Veracode, Inc.
WEBCAST: In this webcast, gain insider tips to mitigating risk when purchasing software from vendors. Watch now to learn the key considerations for buying and how to protect your data to avoid cyberattacks.
Posted: 02 Mar 2015 | Premiered: Aug 4, 2014

Veracode, Inc.

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

The Four Key Elements of Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper helps you stop fraud by outlining the four key elements of holistic fraud prevention.
Posted: 02 Mar 2015 | Published: 31 Aug 2014

IBM

Traps Advanced Endpoint Protection: Technology Overview
sponsored by Palo Alto Networks
WHITE PAPER: This white paper describes a security approach that provides protection before the attacks can penetrate.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

Palo Alto Networks

Safeguarding Mobile, Cloud, and Social Access
sponsored by IBM
WHITE PAPER: In this white paper, explore a number of strategies and solutions for protecting your data from malicious attacks on new access channels.
Posted: 02 Mar 2015 | Published: 17 Sep 2014

IBM

Safeguard Enterprise Compliance and Remain Vigilant Against threats.
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges organizations face due to changing risk and compliance requirements.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

IBM

Preventing Insider Threats in Real-Time
sponsored by IBM
WEBCAST: Access this webcast to learn about a security identity management platform to help you thwart insider threats by tracking the users.
Posted: 27 Feb 2015 | Premiered: Jun 16, 2014

IBM

Preventing Insider Cyber Attacks
sponsored by IBM
WHITE PAPER: Access this white paper to learn how one identity and access management platform enables you to view all user activity and mitigate internal and external breach risk.
Posted: 27 Feb 2015 | Published: 17 Sep 2014

IBM

Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

Taking Control of the Digital and Mobile User Authentication Challenge
sponsored by RSA
WHITE PAPER: In this white paper, view the strategies and policies available to managing user authorization and access to reduce risk and protect yourself from cyber-attacks. Read on to see how others have taken advantage of these strategies in several case studies.
Posted: 27 Feb 2015 | Published: 07 Jan 2015

RSA

Mitigating Risk with Security Intelligence and Identity Assurance
sponsored by IBM
WHITE PAPER: Access this white paper to learn about an integrative approach that lets companies quickly identify abnormalities in user behavior, as well as fighting insider threats all while complying with regulations.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM
76 - 100 of 1463 Matches Previous Page    2 3 4 5 6 7    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement