Enterprise risk management

Email Alerts

Register now to receive SearchCIO.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Rogue technology: What lies beneath

    Rogue technology can wreak havoc on legacy systems and expose companies to serious security threats. Yet business people often need quick, over-the-counter products to solve business problems, and CIOs and business executives must balance the need f... 

  • Extending the reach of enterprise security management

    In today's extended enterprise, cloud computing is redefining traditional supply chains, data is a currency as well as a risk point and the bring-your-own movement around applications, services and devices is muddying the dividing line between "home... 

  • Securing and mitigating risk in the cloud

    Cloud computing offers a number of upsides for IT organizations: flexibility, scalability and off-site infrastructure, to name only a few. Yet some enterprise CIOs are still hesitant to adopt cloud computing due to concerns about properly securing an... 

  • key risk indicator (KRI)

    A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be su... 

  • business continuity management (BCM)

    Business continuity management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats. 

  • vendor risk management (VRM)

    Vendor risk management (VRM) is a comprehensive plan for identifying and decreasing potential business uncertainties and legal liabilities regarding the hiring of 3rd party vendors for IT products and services. 

  • pretexting

    Pretexting is a form of social engineering in which one individual lies to obtain privileged data about another individual in order to engage in identity theft or corporate espionage. A pretext is a false motive. 

  • control framework

    A control framework is a data structure that organizes and categorizes an organization’s internal controls, which are practices and procedures established to create business value and minimize risk. 

  • sustainability risk management (SRM)

    Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies. 

  • GRC (governance, risk management and compliance) software

    GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation. (Continued...) 

About Enterprise risk management

An effective risk management plan includes ways in which an IT organization can minimize the effects of risk of an organization's assets and data. The CIO or chief risk officer (CRO) works closely with the business units to address risks such as accidental financial or strategic losses. Find the latest risk management information for CIOs, including news, tips and other resources, in this topic section.