Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management White Papers (View All Report Types)
26 - 50 of 945 Matches Previous Page  |  Next Page
5 Steps to Mitigate the Risks of Privileged Accounts
sponsored by One Identity
WHITE PAPER: Granting privileged access increases the risk of a security breach, no matter what industry your organization represents. This resource provides strategies for preventing security breaches and offers 5 steps to mitigate the risks of privileged accounts
Posted: 09 Feb 2018 | Published: 09 Feb 2018

One Identity

Preparing for Compliance with the GDPR
sponsored by Skybox Security
WHITE PAPER: The GDPR came about to help organizations prevent harmful data breaches. This whitepaper offers an overview of the GDPR and provides recommendations for technical compliance with 11 tangible steps.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Skybox Security

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

Why Externalize?
sponsored by Axiomatics
WHITE PAPER: This resource provides insight into the attribute based access control (ABAC) model, explores how it impacts authentication and application security, and reveals 4 common misconceptions.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Axiomatics

It's Time for a Smarter Approach: Threat-centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 08 Feb 2018 | Published: 31 Dec 2017

Skybox Security

5 Fast Facts for API Access Control
sponsored by Axiomatics
WHITE PAPER: With user access oftentimes being instantaneous, it is difficult for administrators to control sensitive data. This resource outlines 5 key API access control facts as well as insight into how to address the challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Axiomatics

Third-Party Risk Management for Financial Services
sponsored by BitSight
WHITE PAPER: Financial institutions are facing new, sophisticated, and highly dangerous threats from cybercriminals, including ransomware, DDoS attacks, fraud, and identity theft. This resource reveals helpful strategies for third-party risk management to help you protect sensitive data.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

BitSight

Making Risk Management More Effective With Security Ratings
sponsored by BitSight
WHITE PAPER: With the growth and sophistication of cyber threats and daily reports of security breaches, cyber risk is high on the list of most significant risks that organizations face. This resource offers 3 risk management approaches organizations have taken to effectively improve their security.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

BitSight

Building a Secure Foundation to Reduce Cyber Risk
sponsored by Tenable, Inc.
WHITE PAPER: According to the Dimensional Research survey "Trends in Cybersecurity Frameworks and Foundational Controls", 52% of respondents said their cybersecurity program has major gaps or weaknesses, or many minor ones. This resource offers a strategy for building a secure foundation to reduce cyber risks within your organization.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

3 Reasons: Why DevOps is a Game-Changer for Security
sponsored by Tenable, Inc.
WHITE PAPER: Oftentimes, security teams have struggled with keeping pace with DevOps. This resource explores the intersection of DevOps and InfoSec and offers 3 reasons why security organizations will benefit by combining these 2 practices.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

13 Essential Steps to Meeting the Security Challenges of the EU GDPR
sponsored by Tenable, Inc.
WHITE PAPER: This resource offers assistance to information security professionals in prioritizing changes and additions to their information security programs in preparation for GDPR.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

Attack Your Attack Surface: How to Reduce Your Exposure to Cyberattacks
sponsored by Skybox Security
WHITE PAPER: The average enterprise today must defend against exploitation of an attack surface composed of tens of thousands of potentially exploitable attack vectors on its networks and system. This resource offers insight into reducing exposure to cyberattacks with an attack surface visualization strategy.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Skybox Security

Mobile Fintech Fraud
sponsored by Simility
WHITE PAPER: The world is becoming increasingly mobile centric and financial services are no exception. This resource addresses fraud challenges faced by mobile financial services, which can impact profit, reputation and customer loyalty.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Simility

Using Threat Analytics to Protect Privileged Access and Prevent Breaches
sponsored by CA Technologies
WHITE PAPER: The rise in cyberattacks points to one trend: Static access controls are not enough. Read this white paper to learn 4 steps to using analytics to protect your enterprise from threats both inside and outside your organization.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

CA Technologies

Establish Your Blueprint For Centralized SSL Certificate Lifecycle Management
sponsored by Entrust, Inc.
WHITE PAPER: Whether due to security events, industry changes, or compliance requirements, the need to identify and manage SSL certificates is critical. This resource offers security and business challenges and reveals a 4 step process for moving to an SSL certificate services platform.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Entrust, Inc.

Economics of Insecurity
sponsored by Cylance
WHITE PAPER: Traditional AV companies don't want to help you prevent attacks. They want to help you react to breaches - so they can sell you more solutions with every intrusion. It's all part of the "Economics of Insecurity". Tired of the status quo and investing in more of the same old technology? Learn why it's time to think beyond the stack.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Cylance

The Urgent Concerns Facing Customers with SSL Certificates
sponsored by Entrust, Inc.
WHITE PAPER: How much security is your SSL providing? This Frost & Sullivan paper offers strategies for dealing with disruptions of SSL certificates. In addition, uncover questions to consider during your risk management planning.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Entrust, Inc.

Taming the GDPR
sponsored by Citrix
WHITE PAPER: Preparing for the GDPR requires organizations to understand the regulation, develop best practices for success and avoid common pitfalls. Leverage this resource to help you fully understand the GDPR and uncover strategies for tackling the regulation head-first.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Citrix

Why Leading CISOs are Adopting a Strategy-First Approach to IAM
sponsored by Edgile
WHITE PAPER: How should a CISO prioritize which problem to attack first? With security breaches dominating the headlines, CISOs must decide where to begin when defending security incidents. This resource explains the benefits of a strategy-first approach to IAM.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Edgile

Rethinking Data Security
sponsored by Forcepoint
WHITE PAPER: Read this white paper to find out what new security concerns are driving the need for risk adaptive protection. Then learn about a data protection method that focuses on people for visibility into the data they create and the applications they use.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Forcepoint

How The Cloud Might Actually Shrink Your Exposure To Cyber Risk
sponsored by Edgile
WHITE PAPER: While it might seem counterintuitive, the emergence of public networks, like the cloud, might help shrink, not expand, the enterprise's perimeter. Access this resource to explore how the cloud might help shrink your exposure to cyber risks and reduce the threat perimeter of your organization.
Posted: 25 Jan 2018 | Published: 10 Oct 2017

Edgile

The Cybersecurity Blueprint
sponsored by Solarwinds MSP
WHITE PAPER: As cybersecurity attacks grow in variety, taking a broad layer approach with clients is crucial. Explore this resource to uncover the 4 pillars of a comprehensive, layered security approach and learn how to provide strong layered security.
Posted: 25 Jan 2018 | Published: 31 Dec 2017

Solarwinds MSP

End the Struggle with InfoSec Policies and Standards through Risk & Compliance Integration
sponsored by Edgile
WHITE PAPER: Information security policies and standards can oftentimes cause confusion and even liability within an organization. This resource details 4 pitfalls of a compliance-only approach and offers a secure method to complying with policies and standards through a risk-integrated approach.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Edgile

Cybersecurity in Business Operations
sponsored by Virginia Tech Online
WHITE PAPER: Recent security breaches have made clear the fact that guarding the infrastructure is not only the responsibility of the IT desk. All users, from entry-level personnel to the C-suite, must help protect the integrity of their data assets.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

Virginia Tech Online

The 3 Keys to Effective Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Lax cybersecurity practices on the part of one vendor could endanger all companies within an ecosystem. Access this resource to learn how you can stay ahead of cybersecurity threats posed by vendors.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

BitSight
26 - 50 of 945 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement