Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
76 - 100 of 1551 Matches Previous Page  |  Next Page
EMEA & APAC Culture and Compliance Benchmark Report
sponsored by Navex Global
RESEARCH CONTENT: This report details challenges faced by ethics and compliance professionals headquartered in EMEA and APAC and provides objectives, pain points and strategies for ethics and compliance professionals across industries.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Navex Global

Report: Customer Identity and Access Management
sponsored by Janrain
RESOURCE: In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.
Posted: 06 Dec 2017 | Published: 15 Jun 2017

Janrain

SmartProtect Program: Solution Brief
sponsored by Corero Network Security
RESOURCE: To avoid damage to reputation and brand, organizations are looking for DDoS mitigation techniques that have evolved to meet the changing threat landscape. Take a look at this technology overview to decide if this DDoS protection strategy is right for your organization's network security needs.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Corero Network Security

Top Trends That Will Shape CIAM in 2018 and Beyond
sponsored by Janrain
WHITE PAPER: In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Janrain

Executive Review: Consumer Identity and Access Management
sponsored by Janrain
WHITE PAPER: Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Janrain

Windows 10: If Compatibility is Not a Problem, What Is?
sponsored by Flexera Software
WHITE PAPER: Explore this white paper to gain insight into the security challenges of adopting Windows 10 and how to reduce risks when implementing and using the software.
Posted: 05 Dec 2017 | Published: 27 Apr 2017

Flexera Software

25 Simple Yet Overlooked Ways to Boost Your Ethics & Compliance Program
sponsored by Navex Global
EBOOK: Access this e-book to uncover a 25-step guide to boosting your compliance and ethics program by improving culture, getting better connected with employees and boosting program awareness.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Navex Global

Fighting Against Authorized Push Payment (APP) Scams
sponsored by HID Global
WHITE PAPER: This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.
Posted: 30 Nov 2017 | Published: 21 Nov 2017

HID Global

Staying Secure is All About Keeping One Step Ahead
sponsored by BT
WEBCAST: With the dramatic explosion of cyberattacks, it is necessary to constantly monitor for threats rather than reacting to them after the fact. This brief webcast offers strategies of staying one step ahead of the next security threat, in order to give your enterprise the security it needs.
Posted: 30 Nov 2017 | Premiered: Nov 30, 2017

BT

Securing the Digital Enterprise
sponsored by BT
WHITE PAPER: Cybersecurity dominates the media and the chances of a business or an individual becoming a victim have never been greater. This white paper provides a practical guide to organizations on their journey to using security as a business enabler as well as offering useful checklists for those who are already on their journey to protection.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

BT

Buyer's Guide: Cybersecurity
sponsored by Palo Alto Networks
RESOURCE: Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

Palo Alto Networks

DDoS Overview: Keeping the Web Open for Business
sponsored by BT
WEBCAST: 41% of global organizations surveyed by BT experienced a DDoS attack last year, with 78% hit more than once. Watch this DDoS attack overview webcast to gain insight into the basics of DDoS attacks and how you can protect your organization with the best protection strategy for your needs.
Posted: 29 Nov 2017 | Premiered: Nov 29, 2017

BT

Secure Communications for a Safer World
sponsored by BT
CASE STUDY: This case study provides a concrete example of how network security within UK government departments was enhanced with a secure communications strategy. Discover how this approach made processes more agile and efficient, while meeting the most stringent security requirements.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

BT

DDoS Trends Report
sponsored by Corero Network Security
RESEARCH CONTENT: In Q3 of 2017, Corero customers experienced an average of 237 DDoS attacks per month, which is an increase of 35% compared to Q2. This DDoS Attack Trends Report offers DDoS statistics, patterns, attack types, and key insights in order to help you protect your enterprise against these sophisticated attacks.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Corero Network Security

Turning DDOS from a Cost Center to a Revenue Generator
sponsored by Corero Network Security
EBOOK: According to IDC, worldwide spending on DDoS protection will reach over $1 billion by 2019. In this e-book, learn how to protect your organization from DDoS attacks, in addition to understanding how to gain a revenue opportunity.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Corero Network Security

Check Point and Silver Peak Securing the Internet for SD-WAN
sponsored by Silver Peak
WHITE PAPER: Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.
Posted: 28 Nov 2017 | Published: 31 Dec 2016

Silver Peak

Smart Prevention: Expect the Unexpected
sponsored by BT
WHITE PAPER: As attackers become increasingly creative, reaching corporate resources with ever-more complex attacks, enterprises are drowning in detected and undetected issues. This white paper provides insight into preventing security threats proactively, rather than reacting once you have already been attacked.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

BT

Achieve Security and Compliance in the Cloud Without Breaking the Bank
sponsored by Alert Logic
RESOURCE: Take a closer look at this infographic to uncover how IT professionals from 4 large sized companies implemented a security-as-a-service approach without breaking the bank.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Alert Logic

How to Handle a Ransom Driven DDoS Attack
sponsored by Corero Network Security
WHITE PAPER: Corero found that in the first quarter of 2017, their customers experienced an average of 4 DDoS attacks attempts per day. This step-by-step guide offers strategies to protecting against DDoS attacks and the rising ransom-driven DDoS attacks.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Corero Network Security

Compliance: Unlocking the Data that Matters
sponsored by BT
WHITE PAPER: Improving the safety and resilience of the financial markets, along with fighting financial crime, has risen to the top of companies' agendas. In this white paper, uncover compliance challenges for risk teams in the financial sector as well as ways to gain compliance while maintaining the safety of clients' information.
Posted: 22 Nov 2017 | Published: 22 Nov 2017

BT

Data + Security = A Most Unvirtuous Relationship
sponsored by Delphix
RESOURCE: Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

Delphix

The Evolving Risk Landscape
sponsored by F5 Networks
WHITE PAPER: There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

ROI Analysis: IBM BigFix Patch And BigFix Compliance
sponsored by IBM
WHITE PAPER: This Forrester report examines the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

IBM

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity
76 - 100 of 1551 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement