Risk ModelingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Modeling returned the following results.
RSS What is RSS?
Related Categories

 •   Treasury / Cash / Risk Management
 •   Data Security
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Information Integration/ Metadata Management
 •   Security Monitoring
 •   Data Quality
 •   Managed Security Services
 •   Security Policies

Related Searches
 •   B2C Risk Modeling
 •   Formats Risk
 •   Integration Risk Modeling
 •   Issues On Risk Modeling
 •   Planning Risk Modeling
 •   Risk Accounting
 •   Risk Graphics
 •   Risk Modeling History
 •   Risk Modeling Statement
 •   Statistics Risk Modeling
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Six Best Practices to Prevent Enterprise Data Loss by RSA, The Security Division of EMC

February 05, 2009 - (Free Research)
Join Tom Corn, Vice President of Data Security Products at RSA, The Security Division of EMC as he discusses six best practices for preventing enterprise data loss. Hear how these best practices enable you to protect your critical data throughout its lifecycle -- no matter where it moves, who accesses it or how it is used. 
(VIDEO) READ ABSTRACT |

Presentation Transcript: Cloud Service Delivery Models - Security Risks and Recommendations by SecureWorks

August 23, 2011 - (Free Research)
This presentation transcript examines how different levels of isolation and multi-tenancy in cloud models introduce different risks to organizations leveraging cloud services. We also discuss what organizations can do to address these risks and we recommend ways to deliver an improved security posture to organizations utilizing cloud services. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Critical Technologies for Compliance & Risk Management for Medical Device Companies by Siperian, Inc.

February 20, 2009 - (Free Research)
Building the foundation for a sound master data management program is critical to the success of any compliance effort. The ten requirements in this paper will enable you to identify a suitable technology platform - a prerequisite when managing your organization's master data assets & critical to establishing a consistent master data foundation. 
(WHITE PAPER) READ ABSTRACT |

Business Process Management: Banking by IBM

January 15, 2010 - (Free Research)
Banks can address operational challenges and differentiate themselves through business model innovation and business process optimization. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Critical Technologies for Compliance and Risk Management by Siperian, Inc.

February 20, 2009 - (Free Research)
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines. 
(WHITE PAPER) READ ABSTRACT |

Securing Embedded Software with Threat Modeling by Klocwork

September 02, 2011 - (Free Research)
This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Critical Technologies for Compliance and Risk Management by Siperian, Inc.

September 16, 2009 - (Free Research)
Smart decision-makers are seeking technology investments -- such as Master Data Management -- to help establish good governance models that will help with regulatory compliance and lower their operational risk. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth by ESET

December 03, 2009 - (Free Research)
The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk by Lumension

August 2008 - (Free Research)
This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown. 
(WHITE PAPER) READ ABSTRACT |

Transitioning to LTE: Business and Technical Considerations by Alcatel-Lucent

November 2010 - (Free Research)
LTE evolution is more than a move to a new technology. It encompasses a shift in the service provider’s business model to a more sustainable and profitable one. Read this presentation transcript to learn more!Trackback URL 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: Risk Management and Compliance Enforcement for the Financial Industry by IBM

March 2011 - (Free Research)
This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models. 
(EGUIDE) READ ABSTRACT |

ESG White Paper: Citrix Desktop Transformation Model by Citrix

November 2011 - (Free Research)
While the value of desktop virtualization is understood, many IT managers are wondering where and how to start.  This paper details how to navigate the “how” questions, map the right desktop virtualization technology to different types of users and scale the deployment with confidence. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Data Management by SAS

March 2008 - (Free Research)
The key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM. 
(WHITE PAPER) READ ABSTRACT |

Enable Project-Centric Manufacturing with Business Software by IFS

June 2008 - (Free Research)
Project-centric manufacturing business models that involve outsourcing and short product lifecycles expose manufacturers to a number of risks they were not vulnerable to previously. 
(WHITE PAPER) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

Oracle Full-Stack Integration:Maximize the Value of IT Investments From Applications to Disk by Oracle Corporation

April 2012 - (Free Research)
Oracle presents an entirely new opportunity for unprecedented levels of integration that contributes directly to the top-line benefits of IT technology can bring to the business, as well as bottom-line efficiencies and cost savings. 
(WHITE PAPER) READ ABSTRACT |

The Benefits of Data Modeling in Business Intelligence by CA ERwin from CA Technologies

October 2009 - (Free Research)
Through data modeling of BI systems, we can meet many of today’s data challenges. Through logical and physical modeling of business intelligence systems, we can enable the delivery of the correct business information to business users. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Security Fears & Cloud Computing: Buidling Trust in New Data Delivery Models by AVG Technologies USA, Inc.

November 2010 - (Free Research)
Cloud computing has been widely heralded as the "next big thing" in technology circles. At the same time it has arguably been overcomplicated in terms of the way it has been described. Check out this white paper to learn more about the security issues of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Profitable Innovation:  Medical Device Business Model for Growth by Sage North America

December 2010 - (Free Research)
This Sage ERP Accpac white paper focuses on innovations in the medical device field and how these innovative solutions affect the bottom line. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Maximizing Value from SAP with Supply Chain Collaboration in Software as a Service Model by E2open

May 2007 - (Free Research)
This white paper highlights some of the risks and challenges associated with establishing collaborative, shared supply chain processes across all trading partners. 
(WHITE PAPER) READ ABSTRACT |

All clouds are NOT created equal: How to prioritize cloud models by IBM

February 2012 - (Free Research)
You've decided to make the leapt to the cloud, but with so many different configurations offered by multiple providers representing different degrees of benefit and risk, how do you even begin to determine the approach that will best suit your organization's unique needs? Read this white paper to find guidance to help you make sense of the cloud. 
(WHITE PAPER) READ ABSTRACT |

Mom, Apple Pie, and the Office of Comptroller of the Currency by Iron Mountain

February 2014 - (Free Research)
Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes. 
(WHITE PAPER) READ ABSTRACT |

Separate But Equal: Mitigating Risk of Web-Borne Malware Infections Through Separation by Thawte Inc.

January 2014 - (Free Research)
In this expert e-guide, Pete Lindstrom shares insight on Web-browser security methods that reduce or eliminate user involvement to more effectively prevent malware infections. 
(EGUIDE) READ ABSTRACT |

UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by RSA, The Security Division of EMC

March 2012 - (Free Research)
Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more. 
(CASE STUDY) READ ABSTRACT |

Presentation Transcript: Taming the Data Demons: Leveraging Information in the Age of Risk by IBM

January 2011 - (Free Research)
Check out this presentation transcript from IBM as it discusses the advantages of implementing a holistic approach to data risk management, and provides both the “why” and “how” to begin putting a holistic data risk management program to work in businesses of all sizes. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts