Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
76 - 100 of 1014 Matches Previous Page  |  Next Page
Royal Holloway: Driverless vehicle security for military applications
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 09 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

eBook Executive Action Plan
sponsored by IronNet
EBOOK: A collective approach may be beneficial to organizations searching for security advantages.Indeed, a heightened security posture often begins and ends with collaboration. In this e-book, read more about how a combination of organizational preparedness and advanced technology can aid in defending against threats.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

IronNet

Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
sponsored by ComputerWeekly.com
RESOURCE: Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

ComputerWeekly.com

5 Must-Haves for Your Next Enterprise Backup Solution
sponsored by Cohesity
WHITE PAPER: Access this white paper to learn 5 must-haves when evaluating your next enterprise backup and recovery investment to overcome the operational challenges of disparate data and to simplify data management.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Cohesity

5 Questions Every CIO Must Answer in the Coronavirus Age
sponsored by Hitachi ID
WHITE PAPER: The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).
Posted: 25 Jun 2020 | Published: 23 Jun 2020

Hitachi ID

False cents of security: The price of being compromised
sponsored by ComputerWeekly.com
EGUIDE: Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Posted: 02 Jun 2020 | Published: 03 Jun 2020

ComputerWeekly.com

Vulnerability Management 2020
sponsored by TechTarget
WHITE PAPER: Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.
Posted: 20 May 2020 | Published: 31 Dec 2019

TechTarget

Justify Your Vulnerability Management Program
sponsored by TechTarget
WHITE PAPER: In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.
Posted: 15 May 2020 | Published: 15 May 2020

TechTarget

California Consumer Privacy Act (CCPA) 2020 Guidebook
sponsored by TechTarget
RESOURCE: The deadline for CCPA is rapidly approaching. With just a few months left to finalize your consumer data protection strategy, it's critical to take a step back and ensure your approach doesn't have any gaps. Our CCPA guidebook equips you with knowledge to better understand the legislation. Complete our survey to reserve your free copy.
Posted: 23 Apr 2020 | Published: 28 Mar 2020

TOPICS:  Risk Management
TechTarget

Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

Leveraging Crisis Communication for Cyber Security Responsee
sponsored by BlackBerry
RESOURCE: "IT and cyber operations needed to leverage all possible organizational communications modes to get the word out to the entire enterprise to ignore the incoming email and delete it, direct specific action potentially warn our partners about the situation.
Posted: 15 Apr 2020 | Published: 15 Apr 2020

BlackBerry

The Senior Leader's Guidebook to Emergency Management and Business Continuity
sponsored by BlackBerry
RESOURCE: Threat hazard identification and risk assement begins with an in-depth exploration of the threats an organization might face. Understanding this risk environment is essential forbuilding a practical, affordable, and effective risk mitigation plan. Take our brief survey and gain access to our guide for senior leaders.
Posted: 15 Apr 2020 | Published: 15 Apr 2020

BlackBerry

California Consumer Privacy Act (CCPA) 2020 Guidebook
sponsored by TechTarget
RESOURCE: The deadline for CCPA is rapidly approaching. With just a few months left to finalize your consumer data protection strategy, it's critical to take a step back and ensure your approach doesn't have any gaps. Our CCPA guidebook equips you with knowledge to better understand the legislation. Complete our survey to reserve your free copy.
Posted: 10 Apr 2020 | Published: 10 Apr 2020

TOPICS:  Risk Management
TechTarget

Rapid Response: 3 Immediate Actions You Can Take to Mitigate Supply Risks and Disruptions
sponsored by GEP
WHITE PAPER: Disruptions to supply chains—like the current COVID-19 crisis and previous recessions—are not new, and yet, it can feel impossible to be fully prepared. Download this white paper to explore 3 actions you can take right now to help mitigate supply risks and disruptions.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

GEP

COVID-19 in APAC:Tech industry lessons & innovations
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

ComputerWeekly.com

Guide to business continuity planning during COVID-19
sponsored by ComputerWeekly.com
EGUIDE: As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.
Posted: 24 Mar 2020 | Published: 25 Mar 2020

ComputerWeekly.com

IT Priorities 2020: APAC
sponsored by ComputerWeekly.com
EGUIDE: The Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

ComputerWeekly.com

CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by ComputerWeekly.com
EZINE: In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 12 Mar 2020 | Published: 19 Mar 2020

ComputerWeekly.com

4 Ways SailPoint Predictive Identity™ Puts You in Control
sponsored by SailPoint Technologies
WHITE PAPER: As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

Digital Transformation and Risk for Dummies, ServiceNow Special Edition
sponsored by ServiceNow
EBOOK: In this For Dummies e-book, you’ll learn everything you need to know about digital risk management 101. Inside, find out how you can understand the different types of risks, establish policies, controls, and monitoring best practices, and apply 5 tips for secure digital transformation success.
Posted: 06 Mar 2020 | Published: 06 Mar 2020

ServiceNow

ESG The Pressing Need for Comprehensive Cyber Risk Management
sponsored by ServiceNow
ANALYST REPORT: There is a growing requirement to be able to assess and mitigate cybersecurity risks associated with IT environments. To get more insight into this trend, ESG surveyed IT and cybersecurity professionals involved in planning, implementing, and enforcing IT risk management. Download this research report to explore key findings.
Posted: 06 Mar 2020 | Published: 31 Dec 2019

ServiceNow

Data Analytics in Healthcare: Opportunities & Challenges
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.
Posted: 24 Feb 2020 | Published: 25 Feb 2020

ComputerWeekly.com

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell Technologies
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella
76 - 100 of 1014 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences