Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
1 - 25 of 1660 Matches Previous Page  |  Next Page
Does the GDPR Apply to You?
sponsored by Imperva
WHITE PAPER: Organizations which are not in compliance with the GDPR can expect very stiff financial penalties. This resource offers insight into which organizations the GDPR applies, key data security requirements of the regulation, non-compliance penalties and more.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

GDPR: The Penalties for Non-Compliance
sponsored by Imperva
WHITE PAPER: The GDPR gives data protection authorities more investigative and enforcement powers. This resource reveals the harsh penalties of not complying with the GDPR.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

Integrating Human and Technological Elements in your Security Strategy
sponsored by Kaspersky Lab
WHITE PAPER: Cybercrime damages are expected to cost the world $6 trillion by 2021, according to CSO. This resource offers strategies for protecting your business from the ever-changing threat landscape.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

The Mystery of the APT
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

5 Ways Modern Malware Defeats Your Defenses
sponsored by Radware
WHITE PAPER: According to the Verizon DBIR, 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. This resource reveals 5 common evasion techniques used by modern malware and how they conquer anti-malware defenses.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Get Going with your GDPR Plan
sponsored by Imperva
RESOURCE: How is your organization preparing for GDPR's May 2018 deadline? Take a look at this infographic to uncover a step-by-step plan for complying with the GDPR.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

A Quick History of IoT Botnets
sponsored by Radware
WHITE PAPER: Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Evolving Threat of Botnets, Web Scraping and IoT Zombies
sponsored by Radware
WHITE PAPER: By 2020, the number of IoT units installed could reach as many as 20 billion, according to Gartner. This resource examines the severity of dangerous bots, which exploit IoT devices as weapons of attack.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
RESOURCE: This infographic summarizes key findings of the 2017 Ponemon Juniper Report detailing why automation technologies are joining forces with current security strategies.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Juniper Networks

Cloud Security: Making Sense of the Shared Responsibility Model
sponsored by Oracle Corporation
WHITE PAPER: For enterprises using cloud services, there's a lot of confusion surrounding the shared responsibility model, particularly with what security measures the enterprise must provide. This resource explores the root cause behind this confusion and offers examples of how enterprises are successfully addressing and embracing the model.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Oracle Corporation

Web Application Security in a Digitally Connected World
sponsored by Radware
RESEARCH CONTENT: According to a recent Ponemon Institute study, 68% of organizations admit low confidence in their information security posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Radware

The Future of Privileged Management
sponsored by One Identity
VIDEO: The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn where privileged management is heading and uncover an approach to securing privileged accounts.
Posted: 19 Feb 2018 | Premiered: 14 Feb 2018

One Identity

Cyber Threats: Is Your Team Up to the Challenge?
sponsored by Juniper Networks
WEBCAST: In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.
Posted: 19 Feb 2018 | Premiered: Aug 31, 2017

Juniper Networks

IoT and the New Security Challenge
sponsored by Juniper Networks
WEBCAST: According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.
Posted: 19 Feb 2018 | Premiered: Feb 19, 2018

Juniper Networks

Regulating Privileged Access: When to Require Human Approval Workflows
sponsored by One Identity
VIDEO: Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity.
Posted: 19 Feb 2018 | Premiered: 14 Feb 2018

One Identity

Mitigate the top nine cloud threats with a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

Making the case for a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk
sponsored by One Identity
WEBCAST: In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights.
Posted: 19 Feb 2018 | Premiered: Feb 14, 2018

One Identity

Identity Analytics – A more Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 19 Feb 2018 | Premiered: 14 Feb 2018

One Identity

The 12 Essential Tasks of Active Directory Domain Services
sponsored by One Identity
WHITE PAPER: This resource outlines the 12 essential tasks of Active Directory (AD) Domain Services and how utilizing AD can help improve your security needs.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

One Identity

Active Directory Management and Security
sponsored by One Identity
WHITE PAPER: Many organizations expect powerful access controls from their networking operating systems. This resource offers optimized Windows security by implementing an effective IAM approach, including, access control, password management and more.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

One Identity

Employee & Device Monitoring: Dispelling the Myths
sponsored by Forcepoint
VIDEO: Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018

Forcepoint

Threat Intelligence: Cybersecurity's Best Kept Secret
sponsored by CrowdStrike
WHITE PAPER: Since threat intelligence comes in many shapes and forms, misunderstandings about what cyber threat intelligence (CTI) entails is common. This resource offers 4 use cases on CTI and explains different categories of CTI and how it can be optimized within security teams.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

CrowdStrike

Easily Extend Data Loss Prevention to the Cloud
sponsored by Symantec
RESOURCE: To avoid regulation penalties, companies need to know where sensitive and personal data resides. This resource offers a strategy for protecting sensitive data in many areas, including the cloud, endpoints, servers, network and email.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Symantec
1 - 25 of 1660 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement