Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by, powered by an online computer dictionary
Risk Management Reports
1 - 25 of 1776 Matches Previous Page  |  Next Page
Magic Quadrant for Security Awareness Computer-Based Training
sponsored by MediaPRO
ANALYST REPORT: As the market for security awareness computer-based training (CBT) is evolving, vendors are seeking out ways to differentiate their products and services to attract security and risk managers. In this Gartner Magic Quadrant market trends report, determine which security awareness CBT vendor is best for your enterprise.
Posted: 20 Sep 2018 | Published: 24 Oct 2017


Accelerating GDPR Compliance and Beyond with an Information Driven Approach
sponsored by Sinequa
WHITE PAPER: Discover how this cognitive search and analytics platform can help you gain a centralized view of your data within your IT ecosystem, today.
Posted: 20 Sep 2018 | Published: 21 Jun 2018


Reporting to the Board - A Toolkit for CISOs
sponsored by Dell SecureWorks
RESOURCE: Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell SecureWorks

How Centrify Enforces Compliance and Security Best Practices on AWS with Dome9
sponsored by Amazon Web Services
VIDEO: Download this webinar to learn how you can use the native security controls in AWS and the capabilities of Dome9 Arc to help your business remain secure and compliant on AWS.
Posted: 12 Sep 2018 | Premiered: 12 Sep 2018

Amazon Web Services

A Risk-Adaptive Approach
sponsored by Forcepoint
ANALYST REPORT: Download this report to learn how applying a Continuous Adaptive Risk and Trust Assessment approach to your organization will allow you to meet the latest evolving adaptive security challenges.
Posted: 07 Sep 2018 | Published: 31 Dec 2017


Keeping Your Application Fleet Flying Risk Free
sponsored by Flexera Software
WHITE PAPER: Just like sending an airplane out for take-off without any preemptive maintenance checks, deploying applications without vulnerability scans poses a major risk for your organization. Download this whitepaper to learn how your organization can mitigate application risks and stay secure.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Flexera Software

Vulnerability Review 2018: Global Trends
sponsored by Flexera Software
RESEARCH CONTENT: Download this report for key figures and facts on vulnerabilities from a global information security perspective.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Flexera Software

Optimize Information Management for Improved Information Security, Governance and Compliance
sponsored by Hyland
WHITE PAPER: Smart information management starts with common-sense practices and tools your organization may already own. Download this white paper to learn how your organization can reduce risk, protect information, and follow industry best practices to attain and maintain regulatory compliance.
Posted: 31 Aug 2018 | Published: 31 Aug 2018


School Network and Information Security
sponsored by Cisco Umbrella
WHITE PAPER: Distributed network environments like schools and universities are being asked to support more and more devices – from laptops in classrooms to cellphones roaming the halls – all while maintaining a robust security posture. Find out how you can protect your network and – by extension – use the network to protect your students.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Cisco Umbrella

Mitigate Business and Security Risk with Splunk
sponsored by Splunk
WHITE PAPER: Learn how your organization can better understand the gaps and vulnerabilities in your environment in order to reduce risk to your business through risk mitigation.
Posted: 22 Aug 2018 | Published: 22 Aug 2018


Analytics: The Key to Identifying and Mitigating Third-Party Risk
sponsored by CyberGRX
WHITE PAPER: Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.
Posted: 21 Aug 2018 | Published: 21 Aug 2018


Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal
sponsored by Tenable
WHITE PAPER: Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale
Posted: 20 Aug 2018 | Published: 08 Aug 2018


Solving the Cybersecurity Skills Shortage
sponsored by Arctic Wolf
WEBCAST: 22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.
Posted: 10 Aug 2018 | Premiered: Aug 10, 2018

Arctic Wolf

Computer Weekly – 14 August 2018: Infrastructure under attack
sponsored by
EZINE: In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
sponsored by Tenable
WEBCAST: Tune into this webinar as 5 different CISOs and executives give their point of view on how to minimize your attack surface, expand visibility of assets beyond the perimeter, and enhance your security practices.
Posted: 10 Aug 2018 | Premiered: Mar 15, 2018


Embracing Cross-Border eCommerce
sponsored by Riskified
RESOURCE: North America is lagging behind in global eCommerce growth due to the fear of fraud. This resource shares best practices for effective fraud management when operating in new territories around the world so that you don't miss the opportunity to expand your business worldwide.
Posted: 09 Aug 2018 | Published: 31 Jan 2018


Managing User Risk: A Review of LogRhythm Cloud AI for User and Entity Behavior Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: SANS analyst and cybersecurity professional, Dave Shackleford, takes an in-depth look at user and entity behavior (UEBA) solutions that take advantage of machine learning intelligence capabilities.
Posted: 09 Aug 2018 | Published: 28 Feb 2018

LogRhythm, Inc.

How Visibility of the Attack Surface Minimizes Risk
sponsored by Skybox Security
RESOURCE: Attackers are being stealthy when they steal data, often targeting areas where visibility lacks. In this SANS resource discover the importance of visibility for minimizing security risk and enhancing security management.
Posted: 09 Aug 2018 | Published: 31 Jul 2018

Skybox Security

Aiming for a Flawless Approach to Fraud
sponsored by Riskified
RESEARCH CONTENT: Take a look inside this report to learn more about insights into cosmetics shopping patterns and fraud trends, and best practices for effectively handling transactions without compromising users' shopping experience and safety.
Posted: 09 Aug 2018 | Published: 09 Aug 2018


Checklist for Managed Detection and Response
sponsored by Arctic Wolf
RESOURCE: Are your certain your company hasn't been breached recently? Download this checklist to make sure you are properly assessing risk and monitoring and detecting threats.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Arctic Wolf

Executing on NIST SP 800-190
sponsored by Twistlock, Inc.
WHITE PAPER: When apps scale out, the old method of manually creating and maintaining security rules becomes impractical. Together The National Institutue of Standards and Technology (NIST) and Twistlock secure container environments at scale and enforce policies to secure container workloads across the environment.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

3 Secrets to Becoming a Mobile Security Superhero
sponsored by Symantec
WHITE PAPER: Organizations are advised develop a consensus about adopting modern, advanced security technologies to protect mobile devices. Download to reveal 3 secrets that'll help you convince business leaders to buy-into mobile cybersecurity.
Posted: 08 Aug 2018 | Published: 31 Dec 2017


Report: Financial Services Threat Landscape
sponsored by IntSights
WHITE PAPER: Prepare your organization for the future of cyberthreats. This white paper covers 5 cybersecurity predictions for 2019, global trends in cybersecurity, and much more.
Posted: 07 Aug 2018 | Published: 31 Jul 2018


Data Science Operationalization
sponsored by Dataiku
RESOURCE: There needs to be a common ground between data science and IT teams so that they can work together on data and analytics projects. Download this resource to explore strategies and procedures designed to bridge the gap between development and operationalization of data analytics projects within your organization.
Posted: 14 Aug 2018 | Published: 14 Aug 2018


Extreme Protection That Eliminates Data Loss for All of Your Oracle Databases
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Get an in-depth look at the key advantages and organizational benefits of Oracle's Zero Data Loss Recovery Appliance to avoid loss of sensitive data, today.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Oracle Corporation UK Ltd
1 - 25 of 1776 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement