Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
1 - 25 of 1701 Matches Previous Page  |  Next Page
Cybersecurity: A Veracode Case Study
sponsored by BitSight
CASE STUDY: Find out why CIO of Veracode, Bill Brown, presents the cybersecurity data from BitSight to his Board of Directors and how your risk management team can benefit from continuous security monitoring too.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

BitSight

How Continuous Monitoring is Revolutionizing Risk Management
sponsored by BitSight
WHITE PAPER: Organizations with continuous monitoring tools put themselves in a position to make more informed decisions that help their businesses succeed. Learn more about how you can help your enterprise continuously monitor vendor, reputational, and strategic risks.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

BitSight

Incident Responder's Field Guide
sponsored by Digital Guardian
RESOURCE: You've been breached. Now what? Get access to these easy-to-follow steps for creating an incident response plan in the event of a cybersecurity attack.
Posted: 18 Jul 2018 | Published: 31 Dec 2016

Digital Guardian

Protect your Digital Enterprise
sponsored by Hewlett Packard Enterprise
BROCHURE: Learn how your enterprise can stay protected against the latest cyberthreats and IT trends.
Posted: 17 Jul 2018 | Published: 31 Mar 2017

Hewlett Packard Enterprise

The Secret to Creating a Cyber Risk-Aware Organization
sponsored by BitSight
WHITE PAPER: Cybersecurity within an organization is no longer just the security pro's responsibility. It's everyone's. Find out why your business could benefit from a security awareness training and become a cyber risk-aware organization.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

BitSight

Secure On- and Off- Premises IT Service Delivery Platforms
sponsored by Hewlett Packard Enterprise
EBOOK: Learn how to protect your most organizationally critical digital assets and their interactions, regardless of location or device. Download this eBook so you can adhere to these security checklists.
Posted: 16 Jul 2018 | Published: 31 Oct 2017

Hewlett Packard Enterprise

Forrester Wave for Endpoint Detection & Response, Q3 2018
sponsored by Digital Guardian
RESEARCH CONTENT: Evaluate endpoint security providers to identify the best fit for your enterprise in Forrester's Q3 2018 evaluation of 12 leading EDR vendors.
Posted: 16 Jul 2018 | Published: 05 Jul 2018

Digital Guardian

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

The Top 3 Cyberthreats Overheard in the C-suite
sponsored by RSA Conference
RESOURCE: Take a closer look at security challenges affecting the C-suite and what CSOs remain up against.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

RSA Conference

6 Ways to Prevent Ransomware in Health IT
sponsored by Cisco Umbrella
EGUIDE: With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

Facing Third Party Risk Realities
sponsored by RiskRecon
VIDEO: Learn how you can help manage and control third-party security risks within your enterprise.
Posted: 11 Jul 2018 | Premiered: 25 Jan 2017

RiskRecon

Third-Party Cyber Risk: 8 Key Considerations
sponsored by RiskRecon
WHITE PAPER: Learn how to incorporate continuous monitoring into your third-party risk program, why security risk matters, and how to prioritize those risks.
Posted: 11 Jul 2018 | Published: 11 Jul 2018

RiskRecon

Five Ways Privileged Access Management Prevents Insider Threats
sponsored by HelpSystems
WHITE PAPER: Over a quarter of attacks are perpetrated by insiders, according to The Verizon Data Breach Report (2018) and threats coming from the inside are notoriously tough to spot. Find out how you can determine a potential threat without preventing employees from accessing the data they need to do their jobs.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

HelpSystems

Worldwide Cloud Security Gateways Vendor Assessment
sponsored by McAfee, Inc.
RESEARCH CONTENT: As enterprises lose control over the different architectural components of the cloud, more uncertainty is introduced into the environment, and organizations must rethink their security programs. Learn about the key characteristics for a cloud security platform, from this IDC vendor assessment.
Posted: 02 Jul 2018 | Published: 29 Dec 2017

McAfee, Inc.

Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs
sponsored by InteliSecure
WHITE PAPER: In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

InteliSecure

2018 Cyberthreat Defense Report
sponsored by Gigamon
RESEARCH CONTENT: 77% of organizations have been victimized by at least 1 successful cyberattack, according to a survey of over 1,200 IT security pros conducted by CyberEdge Group.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Gigamon

The 5 Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
RESOURCE: When IT and business leaders lack visibility into their organization's true level of risk vulnerability, they could be getting exploited at this moment – and not even know about it. Uncover how a modern SOC can improve your security posture with threat intelligence and analytics.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Splunk

A Short Primer of GDPR Essentials
sponsored by Splunk
RESOURCE: Don't allow new GDPR regulations to spring fines on your business. Download this resource to access a primer of information regarding GDPR, including financial implications, key focus areas, and more.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Splunk

Stop Losing Sleep (or Money) Over a Potential Breach
sponsored by Fortinet, Inc.
WEBCAST: What's keeping you up at night? For 46% of organizations, a talent shortage to fight cybersecurity is at the top of the list. Join this webinar to understand breach technology and the shift that is occurring beyond just detection, so your organization can get the sleep it needs.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Fortinet, Inc.

A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER: Even for enterprises, fraud is a real burden and risk, which Verizon's DBIR says is costing you. Download this white paper to uncover 6 real-world scenarios that show the benefits of using machine learning to stay ahead of fraud.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Splunk

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Third-Party Security Risk Management Playbook
sponsored by RiskRecon
RESOURCE: This playbook is the definitive study of third-party security risk management practices. Inside, explore real-world capabilities and practices used to manage third-party cyber risk, based on in-depth interviews of risk executives. Take a closer look at capabilities and practices unique and interesting to third-party management.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

RiskRecon

Ransomware 101: Three Key Ways to Start Combating Ransomware
sponsored by Splunk
WHITE PAPER: You may ask yourself "how do I defend myself or my organization against ransomware?" and "where do I start?" There are 3 key ways you can combat the rising issue of ransomware. Find out how.
Posted: 27 Jun 2018 | Published: 27 Jun 2018

Splunk

Get Ahead of the Compliance Curve
sponsored by DigiCert
RESOURCE: Disclosed data resulting from lost or stolen records can incur an average cost of $14.1m per 100,000 records, according to a 2017 Data Breach study. Find out how your business can avoid fines like this, ensure security within the organization, and remain compliant.
Posted: 27 Jun 2018 | Published: 27 Jun 2018

DigiCert

Beyond FTP: Securing and Managing File Transfers
sponsored by HelpSystems
WHITE PAPER: This white paper examines how IT security teams can bring the implementations of file transfer protocol (FTP) into a more modern, secure framework to increase user productivity and enhance the manageability of file transfers.
Posted: 26 Jun 2018 | Published: 26 Jun 2018

HelpSystems
1 - 25 of 1701 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement