Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
76 - 100 of 1136 Matches Previous Page  |  Next Page
MITRE ATT&CK: Security Evaluation Overview
sponsored by BlackBerry
VIDEO: MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.
Posted: 22 Jul 2020 | Premiered: 22 Jul 2020

BlackBerry

9 Steps to Success with Data Protection
sponsored by Forcepoint
RESOURCE: Effective data protection requires delicate balance between meeting the productivity needs for strategic imperatives and assuaging the security concerns of the risk averse. To help you get started, this infographic highlights 9 steps for implementing effective data protection controls that meet your needs. Read on to unlock the steps.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Forcepoint

MITRE ATT&CK: The Power of Prevention
sponsored by BlackBerry
VIDEO: In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

BlackBerry

Panelist Discussion with Q&A
sponsored by BlackBerry
VIDEO: In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

BlackBerry

CISO’s Guide to Reducing Risk with Responsible Disclosure
sponsored by HackerOne
WHITE PAPER: Data breaches have devastated organizations over recent years. However, countless breaches were prevented due to hackers disclosing known security vulnerabilities to the organization through what’s known as vulnerability disclosure polices (VDPs). In this white paper, discover how CISO’s can leverage VDPs to reduce risk in their environments.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

HackerOne

Security Leaders Handbook
sponsored by HackerOne
WHITE PAPER: Stepping into a new security leadership position can feel overwhelming: addressing the immediate security needs as well as setting the right foundation for long-term initiatives isn’t an easy task. To help you navigate the first 90 days of your role, and beyond, download this Security Leaders Handbook, which provides guidance and expertise.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

HackerOne

The CISO Speaks: Insights From the Frontlines, Part 2
sponsored by RSA Conference
WEBCAST: Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged 2019 Sydney presentation, see how upstream, midstream and downstream companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.
Posted: 17 Jul 2020 | Premiered: Oct 17, 2019

RSA Conference

Quantum Computing and Quantum-Safe Security
sponsored by Thales
WHITE PAPER: Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Is Your Front Door Open and Unlocked for Cyber Criminals?
sponsored by Verizon
RESOURCE: When it comes to cyber security, small businesses represent 43% of all data breaches because their false sense of security leads them to not put proper defenses in place. In this blog, learn why cyber criminals often target SMBs before going after larger organizations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Verizon

Mobile Security Index 2020
sponsored by Verizon
WHITE PAPER: Mobile technology and the cloud are enabling and medium-sized businesses to grow and compete with larger enterprises more effectively. But unless they take further steps to secure their mobile devices, SMBs could face significant damage to their reputations and bottom lines before the competition even begins.This infographic explains in detail.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Verizon

Analyst Report: Governance, Risk, And Compliance Platforms, Q1 2020
sponsored by ServiceNow
WHITE PAPER: In this most recent edition of The Forrester Wave: Governance, Risk and Compliance Platforms, industry experts at Forrester identify and evaluate 12 key GRC platform providers, how they compare to each other, and offers key insights into emerging market trends. Download this report to leverage Forrester’s GRC expertise.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

ServiceNow

5 Reasons your SMB workspace needs simple SSO
sponsored by Citrix
EBOOK: SSO should make life easier for both IT and employees. But when new apps require different SSO tools from different vendors, it can complicate your IT. Adopting simple, unified SSO for your workspace can ensure secure, anywhere access to all essential applications.This e-book gives five reasons why your organization needs simple, unified SSO.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Citrix

5 Things Better Connectivity Can Help You Achieve
sponsored by Verizon
RESOURCE: By 2025, the average connected person will interact with a connected device nearly 4,800 times per day—about once every 18 seconds. If your organization’s network is not amply prepared, you will be at risk of falling behind. Access this infographic for 5 business advantages of increasing connectivity and how they impact your bottom line.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Verizon

CW ANZ, July 2020: Expert Advice on Security
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

ComputerWeekly.com

Royal Holloway: Driverless vehicle security for military applications
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 09 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Securing the New Normal: A Virtual Happy Hour on Moving Forward
sponsored by RSA Conference
WEBCAST: In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.
Posted: 08 Jul 2020 | Premiered: Apr 7, 2020

RSA Conference

10-Step Executive Action Plan for Collective Defense
sponsored by IronNet
EBOOK: A collective approach may be beneficial to organizations searching for security advantages.Indeed, a heightened security posture often begins and ends with collaboration. In this e-book, read more about how a combination of organizational preparedness and advanced technology can aid in defending against threats.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

IronNet

How to Get the Most Value out of Your Penetration Test
sponsored by RSA Conference
WEBCAST: At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.
Posted: 07 Jul 2020 | Premiered: May 5, 2020

RSA Conference

The 5 Most Dangerous New Attack Techniques and How to Counter Them
sponsored by RSA Conference
VIDEO: What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.
Posted: 07 Jul 2020 | Premiered: 28 Feb 2020

RSA Conference

RSAC Resource Guide: U.S. Election Security 2020
sponsored by RSA Conference
EGUIDE: Many cybersecurity experts have expressed concerns about the security of the upcoming U.S. elections. This RSAC Resource Guide: U.S. Election Security 2020 compiles expertise from industry leaders to provide readers with the insight and information they need to understand this topic.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

RSA Conference

Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
sponsored by ComputerWeekly.com
RESOURCE: Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

ComputerWeekly.com

5 Must-Haves for Your Next Enterprise Backup Solution
sponsored by Cohesity
WHITE PAPER: Access this white paper to learn 5 must-haves when evaluating your next enterprise backup and recovery investment to overcome the operational challenges of disparate data and to simplify data management.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Cohesity

5 Questions Every CIO Must Answer in the Coronavirus Age
sponsored by Hitachi Vantara
WHITE PAPER: The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).
Posted: 25 Jun 2020 | Published: 23 Jun 2020

Hitachi Vantara

10 Benefits of Concur Expense
sponsored by Concur Technologies
DATA SHEET: SAP Concur is a leading provider of integrated travel, expense, and invoice management solutions driven by the pursuit of automating and simplifying these everyday processes. Access this data sheet to discover 10 benefits of Concur’s Expense solution.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

Concur Technologies

Cybersecurity Evolved: The Sophos Business Impact
sponsored by Sophos
CASE STUDY: Improvements to cybersecurity often rely on an increase in IT resources, which most organizations are unable to fulfill. This collection of 5 Sophos customer success stories illustrates how organizations may be able to strengthen threat protection and efficiency without adding headcount. Read on to discover how.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

Sophos
76 - 100 of 1136 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info