Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
1 - 25 of 1172 Matches Previous Page  |  Next Page
NTT Ltd. and Palo Alto Networks – Secure Access Ecosystem
sponsored by NTT
DATA SHEET: Today’s businesses have to address a rapid increase in mobile workers, the sudden need for additional branch offices, cloud adoption, data security needs and the growing enforcement of governance, risk and compliance laws. How can they handle all these challenges? View this data sheet to see how NTT and Palo Alto Networks may be able to help.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

NTT

How to Elevate Your Threat Intelligence Program
sponsored by DomainTools
WEBCAST: According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Evaluating and Measuring DDoS Risk During the COVID-19 Era
sponsored by Akamai Technologies
WEBCAST: Distributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

Akamai Technologies

How to Identify Threats Faster and Increase Productivity
sponsored by DomainTools
WEBCAST: With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

DomainTools

Success Patterns for Supply Chain Security
sponsored by Panorays
WHITE PAPER: Threats targeting supply chains are on the rise, impacting businesses across all 3 elements of the confidentiality, integrity and availability (CIA) triad. The following SANS whitepaper further explores these challenges and highlights the key components of an effective supply chain security program – read on to get started.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Panorays

NWN SecureX Online Workshop
sponsored by NWN Corporation
VIDEO: Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.
Posted: 24 Nov 2020 | Premiered: 24 Nov 2020

NWN Corporation

The Right IT Asset Disposition Partner For A Growing Health System
sponsored by Dynamic Lifestyle Innovations
CASE STUDY: A nonprofit, academic healthcare system's fast growth presented the challenge of information technology asset disposal, or, ITAD. In this case study, hear how this healthcare system was able to find an ITAD partner and how your organization can find the best partner for ITAD that matches your needs.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Dynamic Lifestyle Innovations

Technology Refreshed & Replaced: Now What?
sponsored by Dynamic Lifestyle Innovations
WHITE PAPER: Once an organization has completed an information technology refresh, what happens to all of the obsolete IT hardware? And has the organization considered the risks associated with the various options for ITAD? In this guide, get a clearer understanding of ITAD and the need for a compliant ITAD program.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Dynamic Lifestyle Innovations

Insider Risk Management
sponsored by Exabeam
EBOOK: Most security practitioners view the insider threat problem through a pure threat lens, yet others see it as a compliance exercise. Inside this e-book, learn about the benefits of viewing insider threats as a risk management problem and seeing them in the context of asset impacts, vulnerabilities, and threats.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Exabeam

Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees
sponsored by Dtex
EBOOK: As the modern enterprise acknowledges cyber risks as critical business risks, the nature of enterprise security discussions is quickly moving from the technical and operational to the strategic. This has created a new reality in which security decisions can turn a user into a trusted ally... or a liability. Read this guide to learn more.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

IT Risk Management: Comparing Top Vendors & Offerings
sponsored by ServiceNow
RESEARCH CONTENT: Gartner predicts that by 2025, 50% of global midmarket and large enterprises will depend on risk management tools to address risks in their organizations. This Magic Quadrant report highlights and evaluates the most prominent risk management vendors and offerings in today’s market – read on to unlock the full report.
Posted: 23 Nov 2020 | Published: 11 Aug 2020

ServiceNow

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 23 Nov 2020 | Published: 24 Nov 2020

ComputerWeekly.com

Rethinking Insider Risk in the Gig Economy
sponsored by Proofpoint
EBOOK: By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.
Posted: 18 Nov 2020 | Published: 30 Oct 2020

Proofpoint

How to Level Up Your Vendor Management
sponsored by Aptible
WHITE PAPER: Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Aptible

Integrated Risk Management on ServiceNow
sponsored by ServiceNow
WEBCAST: Deloitte, a leader in risk management consulting, has collaborated with ServiceNow, a leader in GRC platform technology, to develop accelerators which streamline and automate risk management. These solutions will provide you with the tools needed to better manage different types of risk, allowing you to focus on running your business.
Posted: 13 Nov 2020 | Premiered: Nov 13, 2020

ServiceNow

Business Continuity Management: Planning, Disaster Recovery & Crisis Response
sponsored by ServiceNow
PRODUCT OVERVIEW: Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

ServiceNow

Webinar 6 – MITRE ATT&CK as a Framework for Cloud Threat Investigation
sponsored by McAfee
WEBCAST: In the continuous hunt for elusive cyberthreats, the most vulnerable assets – in this case, the cloud – must be considered. As it stands, most organizations have a low number of experts dedicated to cloud threats, and so technology must pick up the slack. Watch this webcast to learn how the MITRE ATT&CK framework can help to mitigate cloud attacks.
Posted: 11 Nov 2020 | Premiered: Nov 11, 2020

McAfee

Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Beyond Digital Risk— Addressing Operational Risk
sponsored by ServiceNow
WHITE PAPER: Operational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER: Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Case Study: Medical Devices & Securing the Healthcare Industry
sponsored by Rezilion
CASE STUDY: The healthcare industry has been a prime target of cyberattacks for several years, however COVID-19 brought most of these issues into the public eye. This case study highlights where the vulnerabilities lie and provides an overview of how Rezilion is working with healthcare device companies to prioritize and mitigate these risks.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Rezilion

Vendor Risk Management by Deloitte
sponsored by ServiceNow
VIDEO: ServiceNow Vendor Risk Management supports enterprises with their Vendor Risk Management process and enables them to support the Vendor Risk Lifecycle with ease. It provides a centralized process for managing vendor portfolios, assessing vendor risks including the tiering process and completing a remediation lifecycle. Learn more here.
Posted: 11 Nov 2020 | Premiered: 11 Nov 2020

TOPICS:  Risk Management
ServiceNow

Market Guide For Crisis/Emergency Management Solutions
sponsored by ServiceNow
RESEARCH CONTENT: The 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.
Posted: 10 Nov 2020 | Published: 21 Aug 2020

ServiceNow

Refining risk resolution for the new normal
sponsored by ServiceNow
WEBCAST: If the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.
Posted: 05 Nov 2020 | Premiered: Nov 5, 2020

ServiceNow

Remote Work Best Practices Emphasize UC Collaboration Tools
sponsored by TATA Communications
EGUIDE: Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.
Posted: 06 Nov 2020 | Published: 04 Nov 2020

TATA Communications
1 - 25 of 1172 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info