Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
101 - 125 of 1004 Matches Previous Page  |  Next Page
CISSP Prep: 4 Steps to Achieve Your Certification
sponsored by TechTarget
RESOURCE: Are you ready for the CISSP exam? Your free CISSP prep guide awaits. Add your unique insights to our market research program to access your free PDF download and become one step closer to earning your certification!
Posted: 16 Jul 2019 | Published: 12 Jun 2019

TechTarget

Uniquely You: Why Biometric Verification is Key to Proving Digital Identity
sponsored by Onfido
WHITE PAPER: Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

Onfido

Infographic: 2019 IT Priorities - Middle East
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.
Posted: 09 Jul 2019 | Published: 09 Jul 2019

ComputerWeekly.com

Best Practices for Stopping Risk In Its Tracks
sponsored by Smarsh
EBOOK: How can firms improve their supervision workflows to better reveal risk? In this guide, examine some strategies for staying on top of the rapidly evolving communications landscape, and the new vectors for risk it offers.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Smarsh

Spear Phishing: Top Threats and Trends Vol. 1
sponsored by Barracuda
RESOURCE: This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 28 May 2019 | Published: 31 Mar 2019

Barracuda

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda

Enterprise Tokenization with SecurDPS
sponsored by Comforte AG
WHITE PAPER: Organizations are investing more than ever to protect their sensitive data, to meet compliance demands and to manage risk that is associated with cyberattacks. In this white paper, learn about comforte's data protection suite which is a scalable and fault-tolerant enterprise tokenization and encryption solution enabling successful data protection.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Leading Canadian Bank Achieves Compliance for Themselves and their Customers
sponsored by Comforte AG
CASE STUDY: To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Discover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

ServiceNow

Computer Weekly – 14 August 2018: Infrastructure under attack
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

ComputerWeekly.com

Network Security: Spotlight on Australia/New Zealand
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

ComputerWeekly.com

Data protection & compliance for ANZ businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the state of data breaches in Australia and what firms need to do to stay on the right side of new data breach notification regulations coming into force in Australia and globally.
Posted: 03 May 2018 | Published: 04 May 2018

ComputerWeekly.com

Who, What & How of HTTP Security Headers
sponsored by TechTarget
RESOURCE: In our exclusive expert guide, Who, What & How of HTTP Security Headers, Judith Myerson outlines how to defend your websites using strong HTTP security headers. To claim your free PDF download, we ask that you participate in our multiple-choice survey.
Posted: 03 Mar 2018 | Published: 12 Jun 2019

TechTarget

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

Facing up to emerging technology: Risks and benefits
sponsored by SearchCIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

SearchCIO

6 Ways to Prevent Ransomware in Health IT
sponsored by Cisco Umbrella
EGUIDE: With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

How to Make a SIEM System Comparison Before you Buy
sponsored by SearchSecurity.com
EBOOK: Considering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

SearchSecurity.com

ITSM strategy for an agile, secure digital transformation
sponsored by SearchCIO.com
EBOOK: As digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
Posted: 22 May 2018 | Published: 22 May 2018

SearchCIO.com

Automation in Cybersecurity
sponsored by Juniper Networks
EGUIDE: During his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Find out how automation in cybersecurity emphasizes the working relationship between AI and humans to prevent attacks.
Posted: 04 May 2018 | Published: 04 May 2018

Juniper Networks

The Security Benefits of DLP
sponsored by InteliSecure
EGUIDE: Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
Posted: 09 Mar 2018 | Published: 07 Mar 2018

InteliSecure

The Right Track to GDPR Compliance
sponsored by Lynx Technology Partners
EGUIDE: The GDPR is creating a pivotal change in how organizations process personal data, and it's clear there are a few areas of misunderstanding surrounding the regulation. Explore this expert e-guide to get a better understanding of the GDPR.
Posted: 27 Feb 2018 | Published: 21 Feb 2018

Lynx Technology Partners

The CIO's Guide to GDPR
sponsored by Lynx Technology Partners
EGUIDE: The key to GDPR is a sound approach to data protection across the organization. Access this e-guide to learn from security expert Ed Tucker about data protection preparedness in terms of the GDPR and other regulations.
Posted: 27 Feb 2018 | Published: 21 Feb 2018

Lynx Technology Partners

How Prepared are Businesses for GDPR?
sponsored by Lynx Technology Partners
EGUIDE: According to a recent poll of 900 business decision-makers, 31% believe their organization is GDPR compliant, however experts found that only 2% actually appeared compliant. Computer Weekly's security editor, Warwick Ashford dives into GDPR head first and reveals where businesses stand in their journey to GDPR compliance.
Posted: 27 Feb 2018 | Published: 20 Feb 2018

Lynx Technology Partners

User Behavior Analysis & SIEM
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.
101 - 125 of 1004 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences