Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
1 - 25 of 1696 Matches Previous Page  |  Next Page
MalwareBytes Endpoint Protection: Advanced Threat Prevention
sponsored by Tech Data - MalwareBytes
RESOURCE: Access this resource to learn about MalwareBytes Endpoint Protection, a security tool that uses a layered approach with multiple detection techniques.
Posted: 24 Apr 2018 | Published: 24 Apr 2018

Tech Data - MalwareBytes

Enterprise Endpoint Protection Buyer's Guide
sponsored by Tech Data - MalwareBytes
WHITE PAPER: Cybercriminals have moved to a multi-vector attack approach, making it difficult to defend against attacks on the endpoint system. This guide offers core requirements to help navigate enterprise endpoint protection vendor analysis as well as a handy questionnaire to help with the process.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

Anatomy of a Cyber Attack
sponsored by Oracle Corporation
WHITE PAPER: Security is everyone's job today, from consumers, to system administrators, to executives. Explore this resource to gain insight into the anatomy of a cyberattack, the lifecycle of a security breach and how to augment your current approach to protect your sensitive data.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Oracle Corporation

Ransomware Protection: A Best Practices Approach to Securing Your Enterprise
sponsored by Tech Data - MalwareBytes
WHITE PAPER: The primary goal of all ransomware is to gain access and to encrypt the endpoint. Explore this resource to uncover a best practices approach to securing your enterprise against malware.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

Regulatory Change Made Simple Through GRC Software
sponsored by BWise B.V.
WHITE PAPER: The burden of compliance has forced organizations to invest heavily. Take a look at this resource to uncover a GRC software strategy that will ensure simplicity in your compliance journey.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

BWise B.V.

A Look Into the Global "Drive-by Cryptocurrency Mining" Phenomenon
sponsored by Tech Data - MalwareBytes
WHITE PAPER: Cryptocurrencies were bound to trigger the interest of criminals and it wasn't long before coin mining malware made an appearance. Explore this resource to gain insight into the phenomenon known as "drive-by cryptocurrency mining".
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

The Year of Internal Threats and Accidental Data Breaches
sponsored by Gemalto
RESEARCH CONTENT: According to the Breach Level Index report, there were 2,600,968,280 records breached in 2017 making it a record year for stolen data. Explore the report to gain insight into why 2017 is being referred to as the year of internal threats and accidental data breaches.
Posted: 20 Apr 2018 | Published: 18 Apr 2018

Gemalto

The 2018 Global Cloud Data Security Study
sponsored by Gemalto
RESEARCH CONTENT: According to a Ponemon Institute Study, 53% of respondents believe their organization does not have a proactive approach to managing compliance with privacy and data protection regulations in the cloud. Explore the report to gain insight into enterprises' cloud data security measures and how they plan to protect sensitive data within the cloud.
Posted: 20 Apr 2018 | Published: 18 Apr 2018

Gemalto

Zero Trust Identity and Access Management Webinar
sponsored by Centrify Corporation
WEBCAST: How does your enterprise plan to improve identity security? Tune into this on-demand webinar to uncover how a zero trust concepts can be applied to enhance IAM.
Posted: 18 Apr 2018 | Premiered: Apr 18, 2018

Centrify Corporation

Security's Privilege Crisis
sponsored by Centrify Corporation
WHITE PAPER: With compromised credentials as today's #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This ebook looks at what's behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink in your approach.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

CEO Disconnect Is Weakening Cybersecurity
sponsored by Centrify Corporation
RESEARCH CONTENT: As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. This resource offers insights into senior-level thinking on the issue of cybersecurity, including current security priorities and the perceived degree of alignment between threats and solutions.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

Operationalize Security To Secure Your Data Perimeter
sponsored by IBM
RESEARCH CONTENT: According to a Forrester report, 46% of organizations encrypt little to none of their data. Take a look at this report to gain insight into how organizations are attempting to operationalize security in order to protect their vast stores of data.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

IBM

Forrester Study: The Total Economic Impactâ„¢ of AlienVault USM
sponsored by AlienVault
WHITE PAPER: Based on a 2017 study conducted by the Ponemon Institute, the probability that an organization will experience a breach greater than 1,000 records is 14%. Take a look at this Forester report to gain insight into the impact of unified security management.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

AlienVault

Security Event Monitoring Report
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Organizations are facing increasing pressure to implement security event monitoring to improve threat detection capabilities and address regulatory compliance requirements. Inside this Gartner report uncover key challenges and recommendations for improving SIEM strategies.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

Arctic Wolf Networks, Inc.

Malware Quiz
sponsored by Cisco Umbrella
RESOURCE: Every good story needs a villain, and the world of network security has plenty. Explore this resource to test your malware IQ (and your knowledge of fairy tales) by taking our quick quiz on famous villains.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Cisco Umbrella

Tips and Tricks for Deploying Next-Generation Cybersecurity Using Micro-Segmentation
sponsored by VMware
WHITE PAPER: According to the Ponemon Institute, 89% of organizations have experienced a data breach. Take a look at this resource to uncover a strategy for rethinking your security strategy to meet next-generation security challenges by utilizing micro-segmentation.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

VMware

4 Opportunities to Create a Strategic Cybersecurity Advantage
sponsored by Nuix
WHITE PAPER: Cybersecurity breaches are a pandemic weakness exposing the whole world. Let's face it, they're going to happen. Take a look at this resource to uncover 4 opportunities to create a strategic cybersecurity advantage.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Nuix

Manufacturing Solution Brief
sponsored by enSilo
WHITE PAPER: According to enSilo, cyberattacks increased 24% globally, during the second quarter of 2017, compared to the first 3 months of the year. Take a look at this resource to uncover an endpoint protection platform that provides pre and post infection security and is able to uniquely meet operational needs of the manufacturing industry.
Posted: 12 Apr 2018 | Published: 12 Apr 2018


The Black Report 2018 - Decoding the Minds of Hackers
sponsored by Nuix
WHITE PAPER: According to the 2018 Black Report, 34% of respondents have been hacking for more than 10 years. Take a look at this report to learn more about the hackers targeting your enterprise.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Nuix

Driving Innovation with GDPR
sponsored by DXC
WHITE PAPER: GDPR is a compliance challenge. Given the digital, complex and fast-evolving nature of its subject, it's also inherently a technology challenge. Explore this resource to learn about driving innovation with GDPR.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

DXC

GDPR and the Future
sponsored by DXC
WHITE PAPER: GDPR will give businesses across sectors and geographies plenty to think about, but at heart it comes down to trust. Take a look at this resource to learn about how GDPR is impacting the future of organization's security strategies.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

DXC

How to Respond to the 2018 Threat Landscape
sponsored by VMware
WHITE PAPER: By 2020, 1/3 of successful attacks experienced by enterprises will be on data located in shadow IT resources, including shadow IoT. Explore this Gartner report to gain insight into responding to the 2018 threat landscape.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

VMware

Defining the Data Protection Officer
sponsored by DXC
WHITE PAPER: The International Association of Privacy Professionals estimates that GDPR will mean the advent of 75,000 new Data Protection Officers (DPOs). Explore this resource to gain insight into defining the DPO and their role.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

DXC

Breach Reporting – A Technology Challenge
sponsored by DXC
WHITE PAPER: There was more data lost or stolen in the first half of 2017 than the whole of 2016, according to Gemalto's Breach Level Index. Take a look at this resource to learn about the challenge of data breach reporting and how GDPR is going to impact this.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

DXC

Modern-Day Security Tales
sponsored by Cisco Umbrella
RESOURCE CENTER: How quickly is your organization able to combat security challenges? Explore this resource to uncover how to cut through your security challenges and implement effective protection in minutes, rather than months.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

Cisco Umbrella
1 - 25 of 1696 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement