Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
1 - 25 of 1551 Matches Previous Page  |  Next Page
Application Security Testing Magic Quadrant
sponsored by Whitehat Securities
RESOURCE: Application security testing (AST) is growing faster than any other market. Gartner predicts that by 2019, 80% of application security testing vendors will include software composition analysis in their offerings. This Gartner report reveals strengths and cautions of different vendor's AST programs as well as a market overview.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Whitehat Securities

2017 Application Security Statistics Report
sponsored by Whitehat Securities
VIDEO: According to the Verizon DBIR, 30% of total breaches reported involved attacks on web applications. This webinar explores effective application security programs by using data from the WhiteHat Application Security Statistics Report.
Posted: 23 Jan 2018 | Premiered: 16 Jan 2018

Whitehat Securities

Getting the Most out of your AppSec Program
sponsored by Whitehat Securities
VIDEO: According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018

Whitehat Securities

State-Of-The-Art Data Protection for GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: According to the Center for Internet Security, most successful attacks exploit poor cyber hygiene. In order to comply with the GDPR and prevent cyberattacks, a data protection, advanced threat prevention and detection plan is necessary. This resource offers successful data breach prevention strategies to ensure GDPR regulation preparation.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Fortinet, Inc.

Just in Time Access
sponsored by Identity Automation
EBOOK: As the number of employees, vendors, contractors, and departments within an organization grows, the complexity associated with managing access to applications and systems does too. This e-book offers an IAM approach for managing user access within your organization.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

Identity Automation

How to Minimize the IAM Risks Associated with Third-Party Relationships
sponsored by Identity Automation
EBOOK: According to a Deloitte survey, 94.3% of companies are not confident in the tools used to manage third-party risk. Discovery a variety of ways to increase your IAM approach to mitigate the risks of third-party relationships.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

Identity Automation

Top 10 Keys to Successful Least Privilege Adoption
sponsored by Thycotic
WHITE PAPER: According to Thycotic, 85% of breaches involve compromised endpoints. Explore this resource to learn about endpoint attacks and strategies for enhanced endpoint and application security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Security Obligations for Enterprises Using Cloud Services
sponsored by Oracle Corporation
WHITE PAPER: The shared responsibility model is one of the most commonly overlooked parts of the cloud service provider's terms of service document. Explore this white paper to gain insight into the shared responsibility model, and learn why the concept is so important for cloud security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Oracle Corporation

What Keeps Me Up At Night?: Concerns of a CISO
sponsored by enSilo
WEBCAST: Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.
Posted: 19 Jan 2018 | Premiered: Jan 19, 2018


Security Research Shows AV & NGAV Can Be Evaded
sponsored by enSilo
WEBCAST: Process Doppelganging is a new evasion technique targeting Windows systems. Take a look at this webinar to uncover the history of evasion techniques as well as strategies for attack protection.
Posted: 19 Jan 2018 | Premiered: Jan 19, 2018


Assigning Risk Levels & Choosing Authentication Policies
sponsored by Identity Automation
EBOOK: Different types of employees carry different levels of risk. But how do you know the appropriate level of risk for any given employee? This resource reveals tactics for assigning appropriate risk levels and choosing authentication policies to ensure successful security within your enterprise.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Mitigate the Top 9 Cloud Threats with a Cloud Access Security Broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: According to Cloud Computing Trends: 2017 State of the Cloud Survey, today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Oracle Corporation

Enabling Healthcare with Trusted Access
sponsored by Duo Security
WEBCAST: Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry.
Posted: 18 Jan 2018 | Premiered: Jan 18, 2018

Duo Security

Financial Institution Security
sponsored by enSilo
RESOURCE: Reviewing and selecting endpoint products to protect a financial institution's servers and ATM's is an extensive process.This resource offers strategies for improving security and downtime within financial institutions.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


Security within the Financial Services Industry
sponsored by enSilo
RESOURCE: There has been an increase in "file-less malware" as it goes undetected in most organizations. Attackers' motivation is driven by financial gain, so targeting the banking industry with attacks is common. Take a look at this resource to uncover how to improve security within the financial industry to protect against dangerous malware variants.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


Market Guide for Endpoint Detection and Response Solutions
sponsored by enSilo
RESOURCE: The endpoint detection and response (EDR) market is rapidly growing as security and risk management leaders seek adaptive security architecture. Take a look at this Gartner Market Guide to uncover various endpoint detection and response strategies.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


4 Reasons Why IAM Should Be the Core of Your Security Program
sponsored by Identity Automation
EBOOK: As businesses embrace BYOD policies and more employees work remotely, companies need to change the way they view the threat landscape. Explore this e-book to uncover how to increase security in a perimeter-less global business environment by advancing IAM.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Always on GDPR - The Visibility to Act Like the Pros
sponsored by Nuix
WHITE PAPER: The GDPR is estimated to implement $5.3 billion in fines by 2021, according to Nuix. To avoid the strict fines imposed by the regulation, a successful compliance strategy is critical. This resource offers an approach to effectively securing personal data through a more advanced method than your average cybersecurity strategy.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Nuix

Contingent Workers
sponsored by Identity Automation
WHITE PAPER: By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

The Good Shepherd Model for Cybersecurity, Privacy, And Regulatory Compliance
sponsored by Nuix
WHITE PAPER: Data breaches are inevitable - If you can't prevent hackers or insiders from getting into your organization's network, it's vital to minimize the damage they can cause. This white paper reveals four rules for protecting private data to improve compliance with privacy regulations.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

Connected Intelligence: GDPR and Incident Response
sponsored by Nuix
WHITE PAPER: The GDPR will force organizations to reexamine how they handle consumers' personal information. Data breach investigations in just 72 hours —are you prepared? This white paper offers GDPR and incident response preparation strategies to ensure your enterprise is ready for the upcoming regulation.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

The Trouble with Phishing
sponsored by Duo Security
WHITE PAPER: Phishing is one of the most common threats hitting organizations and it is only getting worse. This guide offers insight into the problems around phishing, how it happens, and what your organization can do to defend against the damaging attacks.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

Automated Endpoint Security Realized
sponsored by enSilo
RESOURCE: Modern malware is evolving at a rapid rate and most traditional security defenses are failing to detect it in an efficient timeframe. Take a look at this resource to uncover how to leverage endpoint security to protect against damaging malware attacks targeting your enterprise.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


Broadcast Media Case Study
sponsored by enSilo
CASE STUDY: Explore this case study to gain insight into how companies within the broadcast media industry overcame the challenge of phishing campaigns targeting their enterprises.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


Securing the Modern Enterprise
sponsored by Duo Security
WHITE PAPER: The most difficult aspect of an enterprise to control is the human element. This white paper provides enterprises with strategic approaches for securing the enterprise and protecting against its weakest vulnerabilities.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security
1 - 25 of 1551 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement