Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
1 - 25 of 1804 Matches Previous Page  |  Next Page
Busting Threat Intelligence Myths: A Guide for Security Pros
sponsored by Recorded Future
WHITE PAPER: There are many misconceptions about what threat intelligence is, leading many security pros to believe that threat intelligence doesn't have an advantage to bring into their particular role. Explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

Defend your Digital Business from Cyberattacks
sponsored by LogRhythm, Inc.
ANALYST REPORT: Download this Forrester Executive Overview to explore the Zero Trust Model, how it can accelerate digital business, and how you can start defending your customers.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

LogRhythm, Inc.

Defeating Threats Through User Data
sponsored by LogRhythm, Inc.
RESOURCE: Learn how to detect and respond to threats faster by focusing on user activity and behavior.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

LogRhythm, Inc.

9 Misconceptions About Third-Party Risk Management
sponsored by BitSight
WHITE PAPER: Download this resource for 9 dangerous misconceptions about third-party risk management that you need to know.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

BitSight

Protecting Against Third-Party Breaches Requires Continuous Monitoring
sponsored by BitSight
RESOURCE: With growing numbers of data breaches being traced to third parties with lax security processes, organizations are implementing "always-on" vendor risk management programs. Read on for insights on continuous monitoring and third-party risks.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

BitSight

Security Maturity: Mapping the Road to Resilience
sponsored by Dell SecureWorks
WHITE PAPER: Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Dell SecureWorks

PRA's 4 Key Principles of Model Risk Management
sponsored by SAS
WHITE PAPER: Done poorly, Model Risk Management (MRM) compliance can add on millions in direct and indirect costs for banks. Download this white paper for guidance on setting up an MRM operating model that is both compliant and low costing.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

SAS

Using Dynamic Data and Advanced Analytics to Secure Your Ecosystem
sponsored by CyberGRX
VIDEO: Download this webinar to learn about the insights and capabilities that can help you identify which third parties pose the greatest risk to your business.
Posted: 30 Oct 2018 | Premiered: 30 Oct 2018

CyberGRX

How to Reach Cybersecurity Maturity in 5 Critical Steps
sponsored by Dell SecureWorks
WHITE PAPER: Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

Dell SecureWorks

The Confidence Game: How to Build a People-centric Cybersecurity Strategy
sponsored by Proofpoint, Inc.
VIDEO: Learn how your organization can take a people-centric approach to security and find out how humans are increasingly becoming the #1 target for cyberattacks.
Posted: 30 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Secureworks Security Maturity Model
sponsored by Dell SecureWorks
WHITE PAPER: Learn how you can evaluate your organization's cybersecurity maturity based on its business operations and risk profile.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

Dell SecureWorks

Helping You Manage Digital Risk
sponsored by RSA
WEBCAST: In this video, find out why digital risk is the greatest risk most organizations now face due to global acceleration of digitization, and how a risk framework can help. 
Posted: 23 Oct 2018 | Premiered: Oct 19, 2018

RSA

2018 State of Privacy and Security Awareness Report
sponsored by MediaPRO
WHITE PAPER: Find out how over 1,000 U.S. employees were ranked on their cybersecurity and data privacy know-how in this 2018 State of Privacy and Security Awareness Report.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

MediaPRO

2018 User Risk Report
sponsored by Wombat Security Technologies
RESEARCH CONTENT: More than 6,000 working adults across the world were surveyed about their personal security habits. To find out what these employees really know about cybersecurity, download this report for some shocking results. Could some of these folks be working at your organization?
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Wombat Security Technologies

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Discover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

ServiceNow

Effectively Monitor, Prioritize, and Automate Response to Third-Party Risk
sponsored by ServiceNow
RESOURCE: Learn how your organization can adopt an advanced vendor risk management program that not only adheres to mandates and regulations, but also helps your organization gain a competitive advantage.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

ServiceNow

Reducing Cybersecurity Risk for SMBs: How Security Awareness Programs Deliver Big Returns
sponsored by MediaPRO
VIDEO: Tune into this webinar, where Derek Brink, Aberdeen vice president, and Tom Pendergast, MediaPRO's Chief Strategist, discuss how small- and mid-size businesses (SMBs) should consider employee security awareness programs to help address their growing cybersecurity risks.
Posted: 02 Oct 2018 | Premiered: 19 Sep 2018

MediaPRO

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Discover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.
Posted: 01 Oct 2018 | Published: 01 Oct 2018

ServiceNow

A Best Practices Guide for Comprehensive Employee Awareness Programs
sponsored by MediaPRO
RESOURCE: The 2018 Verizon Enterprises Data Breach Investigations Report found that one in five data breaches in 2017 involved human error. Properly training your employees on security is essential now more than ever. Download this guide to learn how your organization can build an effective employee security awareness program, today.
Posted: 25 Sep 2018 | Published: 25 Sep 2018

MediaPRO

To Buy or Build Awareness Training? 4 Things to Consider
sponsored by MediaPRO
RESOURCE: If you're considering building your security and privacy awareness training in-house, with only the staff you have, read on for 4 of the most important things to think about before taking next steps.
Posted: 25 Sep 2018 | Published: 25 Sep 2018

MediaPRO

How to Protect Against Security Threats and Human Risk Factors
sponsored by MediaPRO
EBOOK: 70% of employees lack the awareness needed to prevent common cyber incidents, according to MediaPRO's last Security Awareness Report. Do your employees fall into this statistic? Download this buyer's guide for everything you need to know about implementing an employee security awareness program.
Posted: 24 Sep 2018 | Published: 24 Sep 2018

MediaPRO

Magic Quadrant for Security Awareness Computer-Based Training
sponsored by MediaPRO
ANALYST REPORT: As the market for security awareness computer-based training (CBT) is evolving, vendors are seeking out ways to differentiate their products and services to attract security and risk managers. In this Gartner Magic Quadrant market trends report, determine which security awareness CBT vendor is best for your enterprise.
Posted: 20 Sep 2018 | Published: 24 Oct 2017

MediaPRO

Accelerating GDPR Compliance and Beyond with an Information Driven Approach
sponsored by Sinequa
WHITE PAPER: Discover how this cognitive search and analytics platform can help you gain a centralized view of your data within your IT ecosystem, today.
Posted: 20 Sep 2018 | Published: 21 Jun 2018

Sinequa

Reporting to the Board - A Toolkit for CISOs
sponsored by Dell SecureWorks
RESOURCE: Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell SecureWorks

2018 Global State of Privileged Access Management (PAM) Risk & Compliance
sponsored by Thycotic
RESOURCE: Uncover the major risk and compliance gaps in the ways organizations manage and secure their privileged accounts, and access sensitive systems, infrastructure and data.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

Thycotic
1 - 25 of 1804 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement