Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
76 - 100 of 1695 Matches Previous Page  |  Next Page
Open Source Security and Compliance: Trends to Act on in 2018
sponsored by Flexera Software
WEBCAST: According to a Forrester report, 45% of firms say they suffered a breach as a result of an external attack, with software vulnerabilities and web applications as the top methods of attack. This webcast reveals the shift in open source security and compliance while outlining how to remain secure and compliant in the upcoming year.
Posted: 13 Mar 2018 | Premiered: Mar 13, 2018

Flexera Software

Equifax Exposed Two Massive Systemic Risks
sponsored by Flexera Software
RESEARCH CONTENT: In today's digital economy, companies use individuals' data without always properly protecting this sensitive information. Explore this report to gain insight into 2 issues that lead to the Equifax breach and uncover how to protect sensitive data.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Flexera Software

Open Source Risk – Fact or Fiction?
sponsored by Flexera Software
WHITE PAPER: Many new enterprise technologies are centered around open-source technology. This resource explores the risks involved with open-source software and how your enterprise can remain secure.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Flexera Software

Magic Quadrant for Intrusion Detection and Prevention Systems
sponsored by Alert Logic
RESEARCH CONTENT: Did you know by 2020, 70% of new stand-alone intrusion detection and prevention systems (IDPS) placements will be cloud-based? Inside this Gartner Magic Quadrant Report, uncover the pros and cons of IDPS providers like Hillstone Networks, Alert Logic, Cisco and more to help you choose the right network security solution to meet your business need.
Posted: 12 Mar 2018 | Published: 10 Jan 2018

Alert Logic

It's Time to Take a Proactive Approach to Threat Detection and Prevention
sponsored by IBM
WHITE PAPER: According to Ponemon, $3.62 million is the average total cost of a data breach. This resource offers a proactive approach to threat detection and prevention to avoid costly and damaging data breaches.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

IBM

What Security People Want: Making DevSecOps Happen with Containers
sponsored by Aqua Security
WEBCAST: Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Aqua Security

The Security Benefits of DLP
sponsored by InteliSecure
EGUIDE: Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
Posted: 09 Mar 2018 | Published: 07 Mar 2018

InteliSecure

Security Considerations and Best Practices for Securing Containers
sponsored by Tenable
RESOURCE: Security and risk management leaders must address container security issues around vulnerabilities, visibility, compromise and compliance. Take a look at this Gartner report to uncover security considerations and best practices for securing containers.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

Tenable

Magic Quadrant for SIEM
sponsored by IBM
RESEARCH CONTENT: Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's security information and event management (SIEM) products as well as a market overview.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

IBM

Wimbledon Increases Security to Focus on the Court, not the Cloud
sponsored by IBM
WEBCAST: The Wimbledon website sees a 300% increase in cyberattacks year after year. Take a look at this webcast case study to uncover how Wimbledon is fighting back against hackers by implementing a strategy that has significantly reduced the number of breaches.
Posted: 08 Mar 2018 | Premiered: Mar 8, 2018

IBM

Vendor Assessment: Print and Document Security
sponsored by HP
RESEARCH CONTENT: This IDC market report assesses HP as a print and document security services provider and their ability to prevent data and device-level security breaches.
Posted: 07 Mar 2018 | Published: 31 Oct 2017

HP

Trends in Hybrid Cloud Security: Minding the Gap
sponsored by Aqua Security
RESEARCH CONTENT: According to an ESG survey of security pros worldwide, 80% of organizations will use containers in their production environments by 2020. Explore this resource to learn about trends, challenges, and future plans of hybrid cloud and container security.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Aqua Security

SIEM Mid-Market Analysis
sponsored by AlienVault
RESOURCE: SIEM serves 3 important functions: proving compliant practices, formalizing data storage, and initiating breach investigation. Explore this Frost & Sullivan Mid-Market Analysis to uncover how vendors stack up with their SIEM strategies.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

AlienVault

Integrated Threat Management for Dummies
sponsored by IBM
EBOOK: Every industry sector has been hit hard by hackers and cybercriminal organizations. Explore this For Dummies e-book to uncover threat management tactics to enhance your security operations and response strategy to protect your enterprise in the era of constant attacks.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

IBM

Security for Containers – 5 Things DevOps Need to Do
sponsored by Aqua Security
WHITE PAPER: For security departments, adoption of containerization presents a multifaceted challenge. This resource reveals 5 things DevOps should know about securing containerized applications.
Posted: 06 Mar 2018 | Published: 06 Mar 2018

Aqua Security

Complete Guide to Enterprise Container Security
sponsored by Aqua Security
WHITE PAPER: There has been an explosive growth of containers. So, what are the primary threats to container environments? Explore this guide to uncover how to assemble an effective container security program to protect against the looming threats.
Posted: 06 Mar 2018 | Published: 06 Mar 2018

Aqua Security

Frequently Asked Questions: Spectre & Meltdown
sponsored by enSilo
RESOURCE: How is your enterprise protecting your servers, devices, and cloud against malware and vulnerabilities? Explore this Q&A resource to gain insight into the vulnerabilities of Meltdown and Spectre and how to defend against them.
Posted: 02 Mar 2018 | Published: 02 Mar 2018


Global Application and Network Security Report
sponsored by Radware
RESEARCH CONTENT: Inside Radware's 72-page Global Application and Network Security Report, security teams can use the findings and insights from this report when analyzing the threat landscape and design security strategies to protect their enterprises.
Posted: 01 Mar 2018 | Published: 01 Mar 2018

Radware

Cybersecurity in Financial Services: A Complex Threat Requiring a Comprehensive Strategy
sponsored by Wombat Security Technologies
WHITE PAPER: Cybersecurity problems are getting worse overtime, so strategies in place need to constantly be updated. This Osterman Research white paper offers a multi-dimensional view of the complex cybersecurity landscape that financial firms and professionals face.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Wombat Security Technologies

Case Study: Sports Industry Company Overcomes Cybersecurity Issues
sponsored by enSilo
CASE STUDY: Take a look at this case study to uncover how a company within the sports industry overcame the issue of falling victim to damaging cyberattacks causing downtime by implementing a security strategy with limited resources.
Posted: 28 Feb 2018 | Published: 28 Feb 2018


Food & Beverage Security Case Study
sponsored by enSilo
CASE STUDY: Companies are beginning to realize that the traditional AV is not enough to protect their data from the ever-changing threat landscape. Explore this case study to gain insight into how a beverage company was able to overcome their issue of preventing ransomware attacks.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


Ransomware Security Protection
sponsored by enSilo
WHITE PAPER: The constant modification of ransomware variants is causing a severe threat for financial institutions worldwide. Take a look at this resource to uncover a malware protection security strategy to ensure all endpoints are secure from harmful attacks.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


The Cost of Microsoft Office 365 Security and Compliance
sponsored by Proofpoint, Inc.
RESOURCE: From phishing to malware, email makes it easy for attackers to exploit the human factor and to steal credentials, data and more. Take a look at this resource to uncover an advanced email security strategy to improve security and compliance defenses within Microsoft Office 365.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Proofpoint, Inc.

The GDPR Playbook
sponsored by Proofpoint, Inc.
WHITE PAPER: Developing a plan to comply with the new rules of the EU GDPR is critical for all organizations. Leverage this guide to help you discover, plan and act on the upcoming GDPR.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Proofpoint, Inc.

State of Security Education: Healthcare
sponsored by Wombat Security Technologies
RESEARCH CONTENT: According to Ponemon Institute's Cost of Data Breach Study, the cost of a healthcare data breach is $380 per record. Utilize this research report to learn about security threats within the healthcare industry and how you can mitigate them.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Wombat Security Technologies
76 - 100 of 1695 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement