Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
1 - 25 of 1793 Matches Previous Page  |  Next Page
Assessing the Cyberthreat Landscape: Today's Reality, Tomorrow's Risks
sponsored by Neustar
RESEARCH CONTENT: The ever-changing cyberthreat landscape, requires constant assessment. IT leaders must not only prioritize the many cyberthreats they face, but also use those insights to formulate and implement an appropriate mitigation strategy. Download this report sponsored by IDG to learn more about the cyberthreat landscape.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

Neustar

The Changing Face of Cyber Attacks
sponsored by Neustar
WHITE PAPER: The question is not whether you will be attacked. It's when, by what, and how badly your company's reputation or finances will be damaged. In the world of cybersecurity the wrong time to consider defense is after the attack has occurred. In this white paper, learn about different attack methods and how to protect your company.
Posted: 17 Jan 2019 | Published: 07 Jan 2019

Neustar

Monitor Electronic Communications
sponsored by Micro Focus
BROCHURE: For organizations under regulatory authority, programs to monitor employee communications and behavior are the norm. However, deploying a program to perform automatic supervision monitoring and surveillance has its challenges. Download this whitepaper for the answers to these employee surveillance issues.
Posted: 16 Jan 2019 | Published: 31 May 2018

Micro Focus

GDPR is Live, Now What
sponsored by IBM
WEBCAST: The GDPR deadline of May 25th 2018 has passed so what can we expect to see now? In this webcast, experts John Bowman, Virginia Chinda and Jessica Douglas discuss how organizations can use GDPR as an opportunity to accelerate their analytics journey. They also discuss important GDPR topics and what to expect in the future.
Posted: 14 Jan 2019 | Premiered: Jun 19, 2018

IBM

SANS 2018 Threat Hunting Survey Results
sponsored by DomainTools
WHITE PAPER: Threat hunting is a focused and iterative approach to searching out, identifying and understanding adversaries who have entered the defender's networks. Threat hunting is a hypothesis-driven approach to validating the collection, detection and analysis of data ahead of an incident. In this white paper, learn about all things threat hunting.
Posted: 11 Jan 2019 | Published: 30 Sep 2018

DomainTools

2019: No Oscars for Bad Threat Actors
sponsored by DomainTools
WEBCAST: There has been a massive increase in the number and types of cybersecurity threats over the years. In this webcast, experts from DomainTools discuss some cyber forecasts and predictions for the coming years including IoT devices, automation, breaches and more.
Posted: 10 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

The Beginner's Guide to Mitigating Phishing Attacks
sponsored by DomainTools
WEBCAST: Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

Reduce Risks and Increase Donor Trust with Better Nonprofit Compliance
sponsored by Cornerstone OnDemand
WHITE PAPER: Meeting business, HR, and data regulations is a fact of life for every organization, yet not every organization has the same resources to invest in or manage compliance efficiently. Download this white paper to learn why ensuring compliance is not only crucial to a nonprofits ability to fulfill its mission, but necessary in sustaining it.
Posted: 07 Jan 2019 | Published: 07 Jan 2019

Cornerstone OnDemand

Closing the IT Security Gap with Automation & AI in the Era of IoT: EMEA
sponsored by Aruba Networks
RESOURCE: The purpose of this research by Ponemon Institute is to understand the gaps in IT security programs and strategies that diminish companies' ability to identify, detect, contain and resolve data breaches and other security incidents. In this report, Ponemon Institute presents the findings from a survey completed by IT and IT security practitioners.
Posted: 21 Dec 2018 | Published: 30 Sep 2018

Aruba Networks

Security Orchestration, Automation and Response (SOAR) Buyer's Guide
sponsored by Swimlane
WHITE PAPER: In today's complex computing environments, it can be hard to determine what actual security coverage is in place. Finding skilled security analysts is an increasingly difficult task. Each year as threats grow, CISOs must do more with less. A SOAR solution can help simplify, automate and document the incident response process.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Swimlane

Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

CEO Insights - Cybersecurity Predictions for 2019
sponsored by Arctic Wolf
VIDEO: Cybercriminals have hacked into many name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down. In this webcast, Brian NeSmith walks through cybersecurity predictions and what organizations can do to best prepare for them.
Posted: 06 Dec 2018 | Premiered: 31 Dec 2018

Arctic Wolf

Critical Watch Report: The State of Threat Detection 2018
sponsored by Alert Logic
RESEARCH CONTENT: High-profile data breaches continue to make headlines, but the real news is the dramatic increase in volume and the intensity of cyberattacks it now affecting organizations of all sizes and types. Learn how your organization can keep up with the fast-moving threat landscape with 5 key security insights.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Alert Logic

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

9 Misconceptions About Third-Party Risk Management
sponsored by BitSight
WHITE PAPER: Download this resource for 9 dangerous misconceptions about third-party risk management that you need to know.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

BitSight

Protecting Against Third-Party Breaches Requires Continuous Monitoring
sponsored by BitSight
RESOURCE: With growing numbers of data breaches being traced to third parties with lax security processes, organizations are implementing "always-on" vendor risk management programs. Read on for insights on continuous monitoring and third-party risks.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

BitSight

Security Maturity: Mapping the Road to Resilience
sponsored by Dell SecureWorks
WHITE PAPER: Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Dell SecureWorks

Protecting your Execs and Offices: Executive and Location Threat Monitoring
sponsored by Proofpoint, Inc.
EBOOK: Now more than ever, it is crucial to safeguard your executives and office locations from unhappy customers, activist groups, cybercriminals and even disgruntled employees. Why? Download this e-book to learn about the significant risks these groups pose to your organization.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

Proofpoint, Inc.

How to Build a SOC with Limited Resources: Your Guide to Detecting and Responding to Threats Fast
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how you can integrate a threat lifecycle management platform to successfully build a SOC, even with limited resources.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

How You Can Use the Dark Web for Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Deciphering the terminology around what the dark web is or isn't can be confusing. Learn how to better understand the dark web, the potential benefits of information gathered from these anonymous communities, and how it can be used to produce valuable threat intelligence.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Recorded Future

The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence
sponsored by Recorded Future
EBOOK: It's easy to find descriptions of what threat intelligence is. But it's harder to learn how to use it to truly make your organization safe from cybercriminals. Continue reading to learn how threat intelligence can help everyone in cybersecurity anticipate problems, respond faster to attacks, and make better decisions on how to reduce risk.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Recorded Future

Busting Threat Intelligence Myths: A Guide for Security Pros
sponsored by Recorded Future
WHITE PAPER: There are many misconceptions about what threat intelligence is, leading many security pros to believe that threat intelligence doesn't have an advantage to bring into their particular role. Explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

Defend your Digital Business from Cyberattacks
sponsored by LogRhythm, Inc.
ANALYST REPORT: Download this Forrester Executive Overview to explore the Zero Trust Model, how it can accelerate digital business, and how you can start defending your customers.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

LogRhythm, Inc.

LogRhythm Defeating Threats Through User Data UEBA Whitepaper 2018
sponsored by LogRhythm, Inc.
RESOURCE: Learn how to detect and respond to threats faster by focusing on user activity and behavior.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

LogRhythm, Inc.

PRA's 4 Key Principles of Model Risk Management
sponsored by SAS
WHITE PAPER: Done poorly, Model Risk Management (MRM) compliance can add on millions in direct and indirect costs for banks. Download this white paper for guidance on setting up an MRM operating model that is both compliant and low costing.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

SAS
1 - 25 of 1793 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement