Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
1 - 25 of 1139 Matches Previous Page  |  Next Page
Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient
sponsored by ThreatQuotient
CASE STUDY: How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

ThreatQuotient

Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

The State of Ransomware 2020
sponsored by Sophos
WHITE PAPER: Ransomware regularly dominates headlines as one of the most notorious threats facing organizations – but do the successful attacks tell the full story? In this research report, discover what happens when ransomware hits, the impacts of paying the ransom, the emergence of cybersecurity insurance, and more.
Posted: 11 Sep 2020 | Published: 31 May 2020

Sophos

How is the Role and World of the CISO Changing?
sponsored by Kaspersky Lab
RESOURCE: As cybersecurity risks increase, the role of the CISO becomes more dynamic. 70% of current CISOs report that risk management is now a key part of their role. For more CISO trends, take a look at this survey conducted by 451 Research. Use it to understand what the role of today’s CISOs looks like as well as the top 5 skills to succeed in the role.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Kaspersky Lab

The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

The CIO’s Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Charting a Course For Enterprise Risk Management
sponsored by riskconnect
RESOURCE: This e-book will explain what ERM is, why it's worthwhile, and how to begin managing risks and opportunities holistically.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

TOPICS:  Risk Management

Measuring the ROI of an Incident Response Platform
sponsored by Palo Alto Networks
WHITE PAPER: A Forrester survey found that 80% of businesses had been attacked last year, and only 50% felt they had the right resources to proactively hunt for threats. Organizations tend to place incident response on the backburner, but it’s clear they wish they’d been better prepared for ‘what ifs’. In this guide, learn how to stay ahead of threats.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

Palo Alto Networks

5 Steps to Determine Residual Risk During the Assessment Process
sponsored by Coalfire
RESOURCE: Governance, risk and compliance-related residual risks are risk factors left over after an organization applies security controls to ensure compliance with laws and regulations. Data management gaps create this risk, but spotting it isn’t impossible. Open this article for 5 steps to identifying and offsetting residual risk during an assessment.
Posted: 03 Sep 2020 | Published: 28 May 2020

Coalfire

Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)
sponsored by IBM
WHITE PAPER: Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

IBM

Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)
sponsored by IBM
WHITE PAPER: Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

IBM

Transforming Compliance
sponsored by riskconnect
RESOURCE: This e-book will help you transform compliance from a check-the-box function to a well-oiled machine that seamlessly integrates people, processes, and technology with data-driven visibility to champion the organization's future.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

TOPICS:  Risk Management

Life After Lockdown: A Playbook for Crisis Recovery, Resiliency and Restarting Right
sponsored by riskconnect
RESOURCE: This e-book presents a simple, organized way to recover stronger, build resilience, and restart right to withstand whatever comes next.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

TOPICS:  Risk Management

Risk Management Information Systems: The Buyer's Guide
sponsored by riskconnect
RESOURCE: This e-book will help you decide if a RMIS is right for you – whether you are considering purchasing a RMIS for the first time, replacing a homegrown system, or upgrading an outdated one.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

TOPICS:  Risk Management

Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium

92% Of The World’s Top Websites Expose Customer Data To Attackers
sponsored by Tala Security
ANALYST REPORT: It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security

Securing Branch Offices and Retail Stores in the Digital Age
sponsored by Palo Alto Networks
WHITE PAPER: The advancement of the branch office is matched only by the evolution of network threats. With networking solutions such as SD-WAN now on the market, organizations must rethink their branch office security. Read this white paper outline the challenges of branch security and view typical use cases.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

Penetration Testing Vendor Selection Checklist
sponsored by Synack
RESOURCE: In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Synack

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

7 SIEM Trends to Watch in 2020
sponsored by Splunk
WHITE PAPER: In the last year alone, demand for SIEM technology has remained strong, with threat management as the primary driver, and general monitoring and compliance secondary. In this white paper, learn about 7 SIEM trends to watch for in 2020.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Splunk

Cyber Resilient Organization Report 2020
sponsored by IBM
ANALYST REPORT: The volume of cybersecurity incidents has risen, causing disruption to IT and business processes. In fact, 51% of organizations reported a significant business disruption during the past two years due to a cybersecurity incident. What did they report regarding cyber resiliency? How are they planning for the future? Read this report to find out.
Posted: 27 Aug 2020 | Published: 31 Jul 2020

IBM

SCCM Upgrade Checklist | Automate Patch Management in the Cloud
sponsored by Automox
RESOURCE: The digital landscape is constantly evolving, and traditional legacy tools are being replaced by cloud-based SaaS alternatives – and patch management is no exception. However, there are some key factors to consider prior to making the switch. Read this article to make sure you’re ready for cloud-based patch management.
Posted: 25 Aug 2020 | Published: 17 Aug 2020


Paradise Lost: Exploiting the New Distributed Workforce Economy
sponsored by Tanium
WHITE PAPER: Organizations have noted the widened gaps in IT visibility since remote work became the norm - now it’s time to react. View this white paper to learn how unified endpoint security (UES)/unified endpoint management (UEM) can help detect and prevent these pandemic-related threats.
Posted: 24 Aug 2020 | Published: 02 Jun 2020

Tanium

Data Protection Compliance in the UK
sponsored by Zivver
EBOOK: GDPR has ushered in a new era of data protection for European organizations – but what does data protection and compliance look like for the UK amid their decision to leave the EU? The following e-book highlights the evolution of data protection in the UK and offers a comprehensive checklist for ensuring GDPR-readiness.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Zivver

TCO Study of WSUs and SCCM
sponsored by Automox
WHITE PAPER: Patch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

1 - 25 of 1139 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info