New & Notable
Enterprise risk management News
December 12, 2014
The Sony data breach marks a new and scary frontier in corporate cyberwarfare. Also in Searchlight: Apple and IBM alliance bears fruit; the downfall of Pirate Bay.
December 10, 2014
In IT, offensive security can involve methods other than 'hacking back.' In this #GRCChat recap, participants offer examples of active defense tactics, as well as advice on when to go on the offensive.
September 05, 2014
Apple's much-hyped iCloud leak of celebrity photos is a golden opportunity for CIOs to sell security culture to employees, says a customer experience expert. Also in Searchlight: Home Depot suffers a breach; Samsung unveils a two-screen Galaxy Note.
August 01, 2014
A new report shows that hackers can get past even the most up-to-date security tools. Could CIO insecurity be partly to blame? Plus, download Facebook's Messenger app or bust, and glasses might soon become moot -- all in this week's Searchlight.
Enterprise risk management Get Started
Bring yourself up to speed with our introductory content
An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, risks are broadly categorized as either internal or ... Continue Reading
Unsystemic risk (also known as unsystematic risk) is a type of investment risk that is specific to an industry or organization. Continue Reading
A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be ... Continue Reading
Evaluate Enterprise risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Video: Randy Trzeciak of Carnegie Mellon University suggests preventing insider threats may require more spending because they pose a greater risk than most external threats. Continue Reading
Congressman Joe Kennedy looks at the threat of cyberwar and decides to muster a Massachusetts defense. Continue Reading
Emerging security technology channels basic logging tools and ancient cultures as IT execs turn to old-school tech to protect precious data. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Valuable Features: <ul> <li>Correlation Engine simpleness</li> <li>Visual agent deployment</li> <li>Stream...Continue Reading
Support can retrieve salient logging data from massive distributed systems in seconds but deployment is not easy.Powered by IT Central Station
I've been using Splunk for over 3 years now. The most valuable feature for me is alerting. Using Splunk, production support teams can retrieve...Continue Reading
I've evaluated Splunk and IBM Q1 but LogLogic is the best choice for log management. SIEM funcionailty needs improvementPowered by IT Central Station
Valuable Features: You can collect almost any type of log from almost any platform or source. Documentation is extensive with excellent...Continue Reading
Manage Enterprise risk management
Learn to apply best practices and optimize your operations.
Cloud technology expert Stephen Braat of IT service provider CDW shared his views on cloud computing risk management with CIOs at SIMposium 2014. Continue Reading
An email arrives from on high ordering IT to complete a project ASAP. The CIO marshals the troops. When it comes to disaster recovery, however, it's the CIO's duty to just say, 'No.' Continue Reading
In this video excerpt, Markley Group CTO Patrick Gilmore talks about why today's ideal security engineer is someone who is paranoid, aggressive and really liked to hack stuff as a teenager. Continue Reading
Problem Solve Enterprise risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A hybrid security defense begins by ranking potential risks by likelihood and impact, then hiring experts to shore up defenses. Continue Reading
Identify, monitor and vanquish threats to the business with this Essential Guide for CIOs on enterprise risk management strategy and planning. Continue Reading
Is your organization equipped to handle an emerging host of privacy threats? Take our risk management planning quiz to find out. Continue Reading