Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
76 - 100 of 1539 Matches Previous Page  |  Next Page
Develop a strong IAM strategy for third-party vendors
sponsored by Radiant Logic, Inc.
EGUIDE: This e-guide presents three in-depth looks at managing third-party IAM. You will learn about recent data breaches and how third-parties often prove to be the access point for hackers.
Posted: 12 Apr 2016 | Published: 28 Mar 2016

Radiant Logic, Inc.

Advanced Zero Day Protection with APT Blocker
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper shows you four key characteristics your detection software must have to adequately secure your organization. Access now to go beyond simple signatuer-based antivirus detection and gain a cloud-based sandbox with full system emulation to detect the most advanced threats.
Posted: 12 Apr 2016 | Published: 01 Feb 2016

WatchGuard Technologies, Inc.

Buyer's Guide: Network Monitoring Tools
sponsored by TechTarget
RESOURCE: In this complimentary e-guide, learn more about monitoring tools, how network monitoring works, and the difference between nice-to-have and need-to-have features in order to determine the best tool to monitor your network's performance.
Posted: 11 Apr 2016 | Published: 19 Mar 2014

TechTarget

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Seize The Data: Reduce your risk
sponsored by Hewlett-Packard Enterprise
RESOURCE: Learn how one healthcare provider was able to identify, investigate and resolve security issues before they became an issue. Download now to discover what software helped them along the way.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

Hewlett-Packard Enterprise

Business Continuity, Disaster Recovery Plan Best Practices
sponsored by Cirrity
EGUIDE: This brief e-guide highlights best practices for implementing a successful disaster recovery (DR) and business continuity (BC) plan. Discover Andre Gold's, head of IT operations and security for AutoTrader.com, tips for DR planning and learn from security expert Mike Rothman about the differences between BC planning and operational risk management.
Posted: 06 Apr 2016 | Published: 01 Apr 2016

Cirrity

Buyer’s Guide to Enterprise Collaboration Solutions
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper will help you collaborate with potential security providers and vendors when performing due diligence in choosing your right solution. Access now to learn how you can get end-to-end visibility as your data travels through complex networks.
Posted: 06 Apr 2016 | Published: 31 Dec 2014

IntraLinks, Inc

Meaningful Measurement
sponsored by LogicNow
WHITE PAPER: This white paper teaches you how to measure the true impact of cybercrime and mitigate it moving forward. Access now to better understand methods used to commit cyber attacks and what they are costing your organization and organizations around the world.
Posted: 06 Apr 2016 | Published: 01 Mar 2016

LogicNow

CIS Critical Security Controls - Accelerated & Simplified
sponsored by AlienVault
WHITE PAPER: The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Posted: 04 Apr 2016 | Published: 23 Mar 2016

AlienVault

IDS Evaluation Guide
sponsored by AlienVault
WHITE PAPER: This white paper provides a useful reference for evaluating IDS tools. In it, you'll learn the critical components of host and network IDS, giving you real-time threat intelligence to quickly respond to threats.
Posted: 04 Apr 2016 | Published: 01 Mar 2016

AlienVault

Your Legal Liability Following a Cybersecurity Breach
sponsored by SurfWatch Labs
WHITE PAPER: This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SurfWatch Labs

ICS Survey
sponsored by SurfWatch Labs
WHITE PAPER: This white paper shows the security survey results taken by 314 industry respondents. Access now to learn about organizational breach concerns and how businesses have responded to recent threats.
Posted: 31 Mar 2016 | Published: 30 Jun 2015

SurfWatch Labs

How to Secure Health Records on the Screen
sponsored by OptioLabs
WHITE PAPER: This white paper describes the unique challenges and privacy of data in the healthcare domain where every display represents a potential point of leakage.
Posted: 31 Mar 2016 | Published: 29 Feb 2016

OptioLabs

How to Choose the Right Cyber Threat Intelligence Provider
sponsored by SurfWatch Labs
WHITE PAPER: This white paper teaches you what your organization should look for from its threat intelligence software. Learn how to bring cybersecurity in line with your business operations, provide necessary context to prioritize and take meaningful action on specific threats.
Posted: 30 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Protect Your Computer Screen With OptioLabs' OptioAware
sponsored by OptioLabs
VIDEO: In this video, you will learn about organizational software to control proprietary and regulated information displayed on Windows desktops, laptops and tablets. Access now to learn how you can actively prevent visual eavesdropping by blurring your display when authorized users aren't paying attention to it.
Posted: 30 Mar 2016 | Premiered: 15 Dec 2015

OptioLabs

Defending against POS Malware
sponsored by AlienVault
WHITE PAPER: This white paper takes a look at PoS security and some of the common types of malware used to exploit these systems. Access now to learn about the wide range of hardware and applications, including ubiquitous POS terminals in retail locations.
Posted: 30 Mar 2016 | Published: 01 Feb 2016

AlienVault

Tackle IAM Issues with Risk-Based Identity Governance
sponsored by Hitachi ID Systems, Inc.
EGUIDE: Today, the key to securing the enterprise rests in an alternative IAM approach. IAM experts Warwick Ashford and Michele Chubirka present the benefits of risk-based IAM and using identity governance to secure applications and users.
Posted: 29 Mar 2016 | Published: 16 Mar 2016

Hitachi ID Systems, Inc.

Provide a Unified, Coherent Developer Experience using Cloud-based Identification
sponsored by Radiant Logic, Inc.
EGUIDE: This e-guide teaches you about a centralized security tier to enable single sign-on across multiple enterprise, partner and cloud services. Learn how to create a cloud gateway to access applications running across multiple back ends so developers spend less time implementing new security frameworks for each service.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Radiant Logic, Inc.

Cyber Risk Report - Year in Review
sponsored by SurfWatch Labs
WHITE PAPER: This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.
Posted: 29 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

The Human Factor Report
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 29 Mar 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Screen Data Protection, Eavesdropper Detection and Insider Threat Reduction
sponsored by OptioLabs
VIDEO: This video shows you a hardware solution that protects against insider threats that would result in an unattended computer screen. Access now to learn how you can curb eavesdropping and better protect your sensitive information.
Posted: 29 Mar 2016 | Premiered: 10 Mar 2016

OptioLabs

The Importance of Threat Intelligence, Visibility and Disrupting the Kill Chain
sponsored by Dell SecureWorks
WHITE PAPER: This white paper shows you a better, more comprehensive approach to endpoint security challenges. Learn how to catch bad network behavior and learn telltale signs that a breach is imminent.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Securing the Enterprise - 5 Pragmatic Steps to Security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper presents five major areas of focus for the practical CISO. Build a culture of security across your organization and ensure all employees understand that no one is excluded from responsibility.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Growing Security Concerns Across Industries
sponsored by Dell, Inc.
EGUIDE: This e-guide illustrates the survey results of more than 1,300 business and IT decision makers across seven countries. They found that, while the C-suite is more invested in data security than in the past, executives are still not allocating the energy and resources to properly address data security.
Posted: 12 Apr 2016 | Published: 07 Apr 2016

Dell, Inc.

Next-Generation Endpoint Security Market Sizing and Forecast 2016–2020
sponsored by Carbon Black
WHITE PAPER: This EMA research report provides "beyond the surface" insight on variety of enterprise-capable solution providers. Access this report now and learn about research focused on solution providers providing proactive next-generation endpoint security services covering prevention, detection and response.
Posted: 29 Mar 2016 | Published: 29 Feb 2016

Carbon Black
76 - 100 of 1539 Matches Previous Page    2 3 4 5 6 7    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement