Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
101 - 125 of 1694 Matches Previous Page  |  Next Page
The Right Track to GDPR Compliance
sponsored by Lynx Technology Partners
EGUIDE: The GDPR is creating a pivotal change in how organizations process personal data, and it's clear there are a few areas of misunderstanding surrounding the regulation. Explore this expert e-guide to get a better understanding of the GDPR.
Posted: 27 Feb 2018 | Published: 21 Feb 2018

Lynx Technology Partners

Industrial Networks Visibility & Control
sponsored by SecurityMatters
RESOURCE: To defend control networks, it is imperative to monitor network and process operations to detect dangerous messages. Leverage this resource to gain full visibility and control over industrial networks, while protecting from unauthorized access.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

SecurityMatters

The CIO's Guide to GDPR
sponsored by Lynx Technology Partners
EGUIDE: The key to GDPR is a sound approach to data protection across the organization. Access this e-guide to learn from security expert Ed Tucker about data protection preparedness in terms of the GDPR and other regulations.
Posted: 27 Feb 2018 | Published: 21 Feb 2018

Lynx Technology Partners

How Prepared are Businesses for GDPR?
sponsored by Lynx Technology Partners
EGUIDE: According to a recent poll of 900 business decision-makers, 31% believe their organization is GDPR compliant, however experts found that only 2% actually appeared compliant. Computer Weekly's security editor, Warwick Ashford dives into GDPR head first and reveals where businesses stand in their journey to GDPR compliance.
Posted: 27 Feb 2018 | Published: 20 Feb 2018

Lynx Technology Partners

Successful Phishing Attacks at a Northeastern US College Drop by 90%
sponsored by Wombat Security Technologies
CASE STUDY: According to the Verizon DBIR, 44% of breaches in the education sector involve social attacks, including email. Explore this case study to gain insight into how one public college revamped its cybersecurity approach after falling victim to a damaging email attack.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Wombat Security Technologies

Making GRC Understandable, Actionable, and Auditable for New Regulations
sponsored by ServiceNow
VIDEO: TBD
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018

ServiceNow

The Denial of Service Underground: DDoS Perpetrators and Attacks Exposed
sponsored by Imperva
WEBCAST: According to Imperva, there will be 75 billion connected devices by 2020. Take a look at this webcast to gain insight into the growing threat of DDoS attacks targeting devices, how they work and who is behind them.
Posted: 23 Feb 2018 | Premiered: Feb 23, 2018

Imperva

Does the GDPR Apply to You?
sponsored by Imperva
WHITE PAPER: Organizations which are not in compliance with the GDPR can expect very stiff financial penalties. This resource offers insight into which organizations the GDPR applies, key data security requirements of the regulation, non-compliance penalties and more.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

GDPR: The Penalties for Non-Compliance
sponsored by Imperva
WHITE PAPER: The GDPR gives data protection authorities more investigative and enforcement powers. This resource reveals the harsh penalties of not complying with the GDPR.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

Integrating Human and Technological Elements in your Security Strategy
sponsored by Kaspersky Lab
WHITE PAPER: Cybercrime damages are expected to cost the world $6 trillion by 2021, according to CSO. This resource offers strategies for protecting your business from the ever-changing threat landscape.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

The Mystery of the APT
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

5 Ways Modern Malware Defeats Your Defenses
sponsored by Radware
WHITE PAPER: According to the Verizon DBIR, 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. This resource reveals 5 common evasion techniques used by modern malware and how they conquer anti-malware defenses.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Get Going with your GDPR Plan
sponsored by Imperva
RESOURCE: How is your organization preparing for GDPR's May 2018 deadline? Take a look at this infographic to uncover a step-by-step plan for complying with the GDPR.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

A Quick History of IoT Botnets
sponsored by Radware
WHITE PAPER: Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Evolving Threat of Botnets, Web Scraping and IoT Zombies
sponsored by Radware
WHITE PAPER: By 2020, the number of IoT units installed could reach as many as 20 billion, according to Gartner. This resource examines the severity of dangerous bots, which exploit IoT devices as weapons of attack.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
RESOURCE: This infographic summarizes key findings of the 2017 Ponemon Juniper Report detailing why automation technologies are joining forces with current security strategies.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Juniper Networks

Cloud Security: Making Sense of the Shared Responsibility Model
sponsored by Oracle Corporation
WHITE PAPER: For enterprises using cloud services, there's a lot of confusion surrounding the shared responsibility model, particularly with what security measures the enterprise must provide. This resource explores the root cause behind this confusion and offers examples of how enterprises are successfully addressing and embracing the model.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Oracle Corporation

Web Application Security in a Digitally Connected World
sponsored by Radware
RESEARCH CONTENT: According to a recent Ponemon Institute study, 68% of organizations admit low confidence in their information security posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Radware

Cyber Threats: Is Your Team Up to the Challenge?
sponsored by Juniper Networks
WEBCAST: In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.
Posted: 19 Feb 2018 | Premiered: Aug 31, 2017

Juniper Networks

IoT and the New Security Challenge
sponsored by Juniper Networks
WEBCAST: According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.
Posted: 19 Feb 2018 | Premiered: Feb 19, 2018

Juniper Networks

Mitigate the top nine cloud threats with a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

Making the case for a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

Threat Intelligence: Cybersecurity's Best Kept Secret
sponsored by CrowdStrike
WHITE PAPER: Since threat intelligence comes in many shapes and forms, misunderstandings about what cyber threat intelligence (CTI) entails is common. This resource offers 4 use cases on CTI and explains different categories of CTI and how it can be optimized within security teams.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

CrowdStrike

User Behavior Analysis & SIEM
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.
101 - 125 of 1694 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement