Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Multimedia (View All Report Types)
1 - 25 of 124 Matches Previous Page  |  Next Page
Zero Trust Identity and Access Management Webinar
sponsored by Centrify Corporation
WEBCAST: How does your enterprise plan to improve identity security? Tune into this on-demand webinar to uncover how a zero trust concepts can be applied to enhance IAM.
Posted: 18 Apr 2018 | Premiered: Apr 18, 2018

Centrify Corporation

It's Not Just Your IT: Why People & Process Matter for PCI DSS Compliance for Contact Centers
sponsored by Semafone
WEBCAST: With the vast amounts of sensitive customer data in contact centers, they are prime targets for fraudsters and hackers. Explore this webcast to gain insight into protecting data and becoming PCI DSS compliant within contact centers.
Posted: 09 Apr 2018 | Premiered: Apr 9, 2018

Semafone

Eliminating Cybersecurity Obscurity Through Continuous Security Validation (Webcast)
sponsored by NSS Labs
WEBCAST: How is your organization defending against security risks? Explore this webcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Eliminating Cybersecurity Obscurity Through Continuous Security Validation
sponsored by NSS Labs
PODCAST: How is your organization defending against security risks? Explore this podcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

The GDPR: A Rule to Rule Them All
sponsored by RSA Conference
WEBCAST: Breach regulation as we know it will change with the arrival of the EU's GDPR.This webcast explores the new requirements for data breach notifications with the GDPR and what your organization should be doing to comply.
Posted: 20 Mar 2018 | Premiered: Mar 20, 2018

RSA Conference

DevSecOps: Mastering security's group effort
sponsored by RSA Conference
WEBCAST: DevSecOps can be costly and time consuming, making it a challenging undertaking. Tune into this webcast to hear security experts discuss the hurdles of DevSecOps and how to foster a successful approach.
Posted: 19 Mar 2018 | Premiered: Mar 19, 2018

RSA Conference

Open Source Security and Compliance: Trends to Act on in 2018
sponsored by Flexera Software
WEBCAST: According to a Forrester report, 45% of firms say they suffered a breach as a result of an external attack, with software vulnerabilities and web applications as the top methods of attack. This webcast reveals the shift in open source security and compliance while outlining how to remain secure and compliant in the upcoming year.
Posted: 13 Mar 2018 | Premiered: Mar 13, 2018

Flexera Software

What Security People Want: Making DevSecOps Happen with Containers
sponsored by Aqua Security
WEBCAST: Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Aqua Security

Wimbledon Increases Security to Focus on the Court, not the Cloud
sponsored by IBM
WEBCAST: The Wimbledon website sees a 300% increase in cyberattacks year after year. Take a look at this webcast case study to uncover how Wimbledon is fighting back against hackers by implementing a strategy that has significantly reduced the number of breaches.
Posted: 08 Mar 2018 | Premiered: Mar 8, 2018

IBM

Making GRC Understandable, Actionable, and Auditable for New Regulations
sponsored by ServiceNow
VIDEO: TBD
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018

ServiceNow

The Denial of Service Underground: DDoS Perpetrators and Attacks Exposed
sponsored by Imperva
WEBCAST: According to Imperva, there will be 75 billion connected devices by 2020. Take a look at this webcast to gain insight into the growing threat of DDoS attacks targeting devices, how they work and who is behind them.
Posted: 23 Feb 2018 | Premiered: Feb 23, 2018

Imperva

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

Cyber Threats: Is Your Team Up to the Challenge?
sponsored by Juniper Networks
WEBCAST: In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.
Posted: 19 Feb 2018 | Premiered: Aug 31, 2017

Juniper Networks

IoT and the New Security Challenge
sponsored by Juniper Networks
WEBCAST: According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.
Posted: 19 Feb 2018 | Premiered: Feb 19, 2018

Juniper Networks

Five Milestones to GDPR Success
sponsored by Proofpoint, Inc.
VIDEO: The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant.
Posted: 06 Feb 2018 | Premiered: 06 Feb 2018

Proofpoint, Inc.

Integrated Security Operations - The Difference between Knowing and Guessing
sponsored by ServiceNow
WEBCAST: Cyberattacks are getting more sophisticated and in turn, harder to defend and protect against. Access this webinar to gain insight into integrated security operations strategies.
Posted: 02 Feb 2018 | Premiered: Feb 2, 2018

ServiceNow

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
VIDEO: Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

2017 Application Security Statistics Report
sponsored by WhiteHat Security
VIDEO: According to the Verizon DBIR, 30% of total breaches reported involved attacks on web applications. This webinar explores effective application security programs by using data from the WhiteHat Application Security Statistics Report.
Posted: 23 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Getting the Most out of your AppSec Program
sponsored by WhiteHat Security
VIDEO: According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018

WhiteHat Security

What Keeps Me Up At Night?: Concerns of a CISO
sponsored by enSilo
WEBCAST: Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.
Posted: 19 Jan 2018 | Premiered: Jan 19, 2018


Security Research Shows AV & NGAV Can Be Evaded
sponsored by enSilo
WEBCAST: Process Doppelganging is a new evasion technique targeting Windows systems. Take a look at this webinar to uncover the history of evasion techniques as well as strategies for attack protection.
Posted: 19 Jan 2018 | Premiered: Jan 19, 2018


Enabling Healthcare with Trusted Access
sponsored by Duo Security
WEBCAST: Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry.
Posted: 18 Jan 2018 | Premiered: Jan 18, 2018

Duo Security

Why Device Risk is an Essential Element for Your MFA Strategy
sponsored by iovation, Inc.
WEBCAST: Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.
Posted: 13 Dec 2017 | Premiered: Oct 31, 2017

iovation, Inc.

Orchestration of App-Driven Security Policies
sponsored by Silver Peak
WEBCAST: Take a look at this webcast to discover how to orchestrate security policies within applications.
Posted: 11 Dec 2017 | Premiered: Dec 11, 2017

Silver Peak

IoT: Take Control of the Edge
sponsored by VMware Pulse
VIDEO: With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud.
Posted: 14 Feb 2018 | Premiered: 05 Feb 2018

VMware Pulse
1 - 25 of 124 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement