Risk Management White Papers

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 1 - 25 of 252Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 02, 2014

This two year research initiative in collaboration with IBM focuses on key trends, best practices, challenges, and priorities in enterprise risk management and covers topics as diverse as culture, organizational structure, data, systems, and processes.

Tags : ibm, risk management, best practices, erm, enterprise risk management, survey, collaboration
    
By: IBM     Published Date: Sep 02, 2014

To get timely and trusted insights from Risk Analytics while minimizing IT risk and improving time-to-value, IBM is delivering an Application Ready Solution for Algorithmics. This integrated offering, anchored on a validated scalable high-performance clustered reference architecture, delivers the timely risk insights firms need to lower Tier 1 capital.

Tags : ibm, risk management, risk analytics, data analytics, finance reports, business analytics, business activity monitoring, business management
    
By: IBM     Published Date: Sep 02, 2014

With tougher regulations and continuing market volatility, financial firms are moving to active risk management with a focus on counterparty risk. Join IBM Algorithmics and IBM Platform Computing to gain insights on this trend and on technologies for enabling active "real-time" risk management.

Tags : ibm, risk management, data management, grid computing, grid management, business analytics
    
By: IBM     Published Date: Jul 09, 2014

If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.

Tags : ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas
    
By: IBM     Published Date: Jul 09, 2014

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security
    
By: IBM     Published Date: Jun 17, 2014

The Risk Enabled Enterprise® is a two-year research initiative from Chartis, sponsored by IBM, that looks at the enablers of enterprise risk management (ERM).

Tags : ibm, risk, business analytics, risk enabled enterprise, enterprise risk management, erm, it management, risk management
    
By: IBM     Published Date: Jun 17, 2014

Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. As global mandates and compliance directives continue to snowball, organizations are faced with an imminent need to adopt a programmatic approach and tightly integrate risk management initiatives with ongoing business processes. Business intelligence and reporting also provide a powerful mechanism for gaining a deep understanding of key factors that impact corporate performance.

Tags : ibm, corporate governance, risk, compliance, grc, erm, risk management, business analytics
    
By: IBM     Published Date: Jun 17, 2014

Key findings from an industry roundtable on enterprise risk transformation in Canadian banking.

Tags : ibm, risk enabled enterprise, enterprise risk management, erm, big data, data aggregation, corporate governance, business analytics
    
By: Citrix     Published Date: May 08, 2014

A white paper on the increasing mobility of organisations and the technology available to facilitate and secure throughout this change.

Tags : enterprise, mobility, security mobility, citrix, netscaler, application security, internet security, network security appliance
    
By: IBM     Published Date: Apr 22, 2014

Researched and compiled independently by Chartis, the RiskTech100® evaluates and ranks the world’s most influential risk technology providers based on a range of criteria. IBM retains its top position in the 2014 RiskTech® 100 rankings with top scores for functionality, market presence and innovation. The Chartis report is acknowledged globally as one of the most comprehensive and prestigious studies of risk technology vendors. The report also tracks key trends and developments in the risk technology marketplace. Read the report to learn how IBM can support your risk and compliance efforts to drive business performance and better outcomes.

Tags : ibm, chartis, risktech100, risk technology, risk technology vendors, security, risk, compliance
    
By: IBM     Published Date: Apr 22, 2014

Is IT leaving your company exposed to reputational damage? Find out how your organization compares to companies with “excellent” reputations.

Tags : ibm, it management, risk management, risk, risk management strategy, reputational risk, security
    
By: EMC Corporation     Published Date: Mar 20, 2014

The top five questions to ask regarding Identity and Access Management.

Tags : emc, iam, strategic solutions, access reviews, access request, identity management, business intelligence, enterprise resource planning
    
By: EMC Corporation     Published Date: Mar 20, 2014

An infographic showcasing the differences in the lives of Managers with RSA's Averska IAM and without IAM.

Tags : emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business intelligence
    
By: EMC Corporation     Published Date: Mar 20, 2014

An infographic showing the benefits of an RSA Averska IAM Solution.

Tags : emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business integration
    
By: Kaspersky     Published Date: Feb 14, 2014

Are you guarding the cyber security gaps with patch management? Download Kaspersky Lab’s latest whitepaper, Your Data under Siege: Guard the Gaps with Patch Management, to learn about: how cybercriminals are utilizing weaknesses in trusted applications to distribute malware.

Tags : patch management, cybersecurity, firewalls, malware, hackers, virus, threats, network security
    
By: IBM     Published Date: Feb 12, 2014

Read about a four-step program for incorporating risk into your business forecasting and learn to spot traps that can snare the unwary.

Tags : ibm, business analytics, finance, forecasting, risk management, business forecasting, predictive analysis, forecasting lexicon
    
By: IBM     Published Date: Feb 12, 2014

Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).

Tags : ibm, closing, consolidation, reporting, ccr, close management, financial results, disclosure management
    
By: IBM     Published Date: Feb 12, 2014

Develop or restore forecasting health by adhering to the six principles presented in this paper.

Tags : ibm, business analytics, forecasting, budgeting, financial management, risk management, return on investment
    
By: IBM     Published Date: Jan 10, 2014

Independent research by Wintergreen Research, Inc. shows "Dramatic savings brought by IBM Rational automated test solutions".  Read this paper to see how you can see a positive ROI through the ability to minimize cost and time to identify errors and diminish subsequent impacts of defects using test automation and service virtualization.

Tags : ibm, wintergreen research, software testing, service virtualization, software development, testing, automation, quality assurance
    
By: IBM     Published Date: Jan 02, 2014

Business intelligence derived from sophisticated analytics has given large companies an edge for years. It helps them be more competitive, make information---based decisions faster and better, improves operational efficiencies, and boosts the bottom line. Midsize businesses are increasingly eager to reap similar benefits. Business intelligence derived from sophisticated analytics has given large companies an edge for years. It helps them be more competitive, make information---based decisions faster and better, improves operational efficiencies, and boosts the bottom line. Midsize businesses are increasingly eager to reap similar benefits.

Tags : ibm, business analytics, midsize businesses, geeknet, business intelligence, customer volatility, market volatility, variety of data
    
By: Citrix     Published Date: Nov 13, 2013

While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

Tags : mobile computing, wireless application software, wireless infrastructure, wireless security, risk management
    
By: Qualys     Published Date: Nov 05, 2013

Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.

Tags : qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
    
By: IBM     Published Date: Oct 30, 2013

Learn how leading companies are using performance management analytics to unlock business value.

Tags : ibm, disclosure management, financial disclosure, risk management, complex reporting, global statutory reporting, financial data, operational data
    
By: IBM     Published Date: Oct 30, 2013

Learn how you can extend the narrative reporting capabilities of your entire organization--while maintaining auditability and control.

Tags : ibm, cognos disclosure management, business intelligence, data collection, aggregation, data repository, executive management, decrease risks
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.

Tags : sungard, sungard availability services, disaster recovery, it recovery, data loss protection, disaster recovery program, managed recovery program, risk mitigation
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.