What are the top benefits of being a member of this community?
Advance your career by joining an exclusive group of experts, interacting and building relations with risk professionals and service providers through a range of multimedia tools. Read our members' testimonials.
Increase your knowledge and solve your business challenges by learning and preparing for exams in Global Risk Academy and our e-learning facility covering 750 courses, asking questions, responding to discussions on the forum and receiving answers from members
Form new business relationships and enhance opportunities.
Become a leader in the field. Members have a full page to promote themselves, their personal blog or website, and (if you have one) your book.
When I started handling Risk Management, I first took on its Disaster Recovery and Info Security aspects as an MIS manager. Later, I branched out into Business Continuity Planning as well. With my…Continue
Tags: Risk Management training
Dear New Member,We're super excited to have you as part of our community. Feel free to invite new people, participate in discussions, activities and share knowledge. Please check out this post and…Continue
In a conventional security thinking, IT Security at most of the enterprises follow old ‘Industrial Security Model’ where its considered that assets are held within a perimeter and users must enter the perimeter physically or logically (LAN/VPN) to access the assets and the perimeter is guarded by a gatehouse / guard. In other words, this model is called perimeterised computer network where data and applications is attached to the network and is…Continue
The definition of criminal identity theft is a crime where the criminal impersonates the victim in order to protect their innocence. This can lead to victims getting fines or even getting arrested and charged for crimes they did not commit.
How Does This Happen?
There are a number of ways that a criminal can pull this off, and it generally occurs when the thief steals someone’s identity. This is true and pure identity theft, often involving a…Continue
C-suite Digital Disruption Risk Alerts: Building a bridge between your products and services and the digital transformation journey of your C-suite and your customers’ C-suite
SIMMETHOD new digital transformation algorithms and metrics found that your risk of being disrupted is proportional to your gap to the SIMMETHOD Best In Class and linking your products…Continue
I recently created a course on the Global Risk Academy outlining the requirements of GDPR (https://globalriskacademy.com/p/gdpr ). My objective was to guide organizations, other than those in the EU, to understand what they need to do to be GDPR compliant. Having immersed myself in the GDPR I came to realize it represents a quite different perspective on cyber security than currently embraced by many cyber security professionals in the…Continue