A few decades ago, faculty members at the University of Michigan were researching the major indicators of effective organizational performance. What came from this research was an incredibly useful model for organizing and understanding a wide array of organizational (and individual) topics. These include theories on Organizational Effectiveness, Corporate Culture, Leadership Competencies, Stages of Life Cycle Development, Financial Strategy, among others.
This model is the …Continue
Added by David Tang on February 25, 2016 at 10:12pm — No Comments
The Theory of Constraints (TOC) is a methodology for identifying the most important limiting factor—i.e. constraint—and systematically improving it. It was developed by Dr. Eliyahu Goldratt, introduced in 1984 book, The Goal.
TOC differs from traditional management views, in that traditional methods seek to make improvements throughout the…Continue
Added by David Tang on February 25, 2016 at 10:03pm — No Comments
Cybercriminals know that the best way to get their claws on the next victim is to appeal to their emotions, not logic.
There’s lots of scary things in life, and one is learning that your computer has been infected with a virus. If this happens, you’re now vulnerable to spending money on getting rid of the malware. The tactic of scaring users is called scareware.
Added by Robert Siciliano on February 25, 2016 at 3:21pm — No Comments
In challenging markets with stringent regulations, Customer-Driven Derivatives business goes on, someone somewhere has to earn bread. Practitioners including risk managers need to grasp the full picture, from models to products, from risk features to hedging, regulatory requirements to economic values.
Understanding and managing risks is a common denominator across…Continue
Added by Dong Qu on February 24, 2016 at 12:30am — No Comments
The world is undergoing a data revolution. We are in the midst of the Quantified Self and real time personal data and performance measurement.
With smart devices we can now track our movements, monitor food intake and measure changes in physical performance. With measurement comes insight (and a change in behaviour). We can better understand what drives us, modify our eating and sleeping patterns and enhance our performance in any…
Added by Will Marle on February 23, 2016 at 12:50pm — No Comments
Published on Jul 1, 2014…Continue
Added by Enrique Suarez on February 23, 2016 at 2:12am — No Comments
Most people have heard of storing information in “the cloud,” but do you know what this means, and if it is even safe?
A cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The cloud is made of millions of servers across the globe and most are owned by private or public corporations. Many of those corporations are diligent about security, and you are likely using…Continue
Added by Robert Siciliano on February 22, 2016 at 3:28pm — No Comments
This week I worked with Gemalto, as part of Gemalto’s #ChipAwayAtFraud campaign. I was tasked with using my “chip” card when making a bunch of every day purchases like getting coffee and shopping. Gemalto, one of the world’s leaders in digital security, wanted a real-world take on the EMV card experience, which includes the security benefits EMV cards presents. You know EMV; it’s the “chip” credit card that, by now, you should have.
Here’s what I learned:
Added by Robert Siciliano on February 20, 2016 at 3:16pm — No Comments
Evidence is mounting that it is no longer an option to ignore investments in this important organizational capability. Companies need a rigorous enterprise risk management framework to effectively compete in today's uncertain environment. To help companies understand why they need ERM, here's an excerpt from my take on how enterprise risk management enables the business…Continue
Added by Lou DiSerafino on February 19, 2016 at 7:58pm — No Comments
Added by Enrique Suarez on February 19, 2016 at 5:23am — No Comments
Enrique Suarez Presenting:…Continue
Added by Enrique Suarez on February 19, 2016 at 4:18am — No Comments
Often, hucksters prey on the consumer’s desperation, which is why it’s no surprise that the No. 1 rip-off (at least between 2011 and 2012)) was bogus products promising weight loss.
VICE (vice.com) interviewed psychologist Maria Konnikova about how cyber cons are so successful—even with the most ridiculous sounding bait (Nigerian prince, anyone?).
The bait becomes more attractive when the target is receiving an influx of cyber attention. Sad to say, this trips…Continue
Added by Robert Siciliano on February 18, 2016 at 4:24pm — No Comments
The Financial Industry Regulatory Authority (FINRA) releases an annual letter outlining its Regulatory and Examination Priorities for the upcoming year. In line with letters and rules from other regulatory bodies such as the SEC, NAIC, and FFIEC, the …Continue
Added by Steven Minsky on February 17, 2016 at 9:01pm — No Comments
I heard these questions on ABC Radio (that is the Australian Broadcasting Corporation) recently. How are these for three great questions you can ask to help you make a decision?
1. What are my options?
2. What is the chance this will benefit me?
3. What is the chance this will harm me?
These were attributed by Dr Norman Swan of the Health Report to some research his partner and others were doing. The research showed that these three questions to your doctor result in…Continue
Added by Bryan Whitefield on February 16, 2016 at 11:15pm — No Comments
Added by Enrique Suarez on February 16, 2016 at 7:30pm — No Comments
What are you doing to prevent tax identity theft? Do you even know what steps to take? You’d better, because this crime has tripled since 2010, says the FTC.
A report on foxbusiness.com describes tax identity theft as the act of stealing someone’s personal information, then the crook files a phony tax return in the victim’s name to get a refund. The victim will never see it in their mailbox. And that’s only the beginning of the victim’s…Continue
Added by Robert Siciliano on February 16, 2016 at 2:55pm — No Comments
Conservative estimates of GRC software implementations place the cost at either $200,000 or 50% of total licensing costs, whichever is greater. Even when initial costs are low, many vendors make up for apparent price reductions with professional services, or customizations, required to make the product work. Professional services are so ingrained in the software landscape…Continue
Added by Steven Minsky on February 15, 2016 at 5:30pm — No Comments
Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on.
What does it all mean? Companies must take extra precautions to…Continue
Added by Robert Siciliano on February 15, 2016 at 3:54pm — No Comments
Back in 2009, we blogged about the SEC’s decision to require board-level accountability for ERM. This decision was based on the conclusion that …Continue
Added by Steven Minsky on February 12, 2016 at 4:00pm — No Comments
Banks have a pivotal function in the economy, they are the main creators of the money supply. In granting or issuing so called 'loans' to their customers they create…Continue
Added by Enrique Suarez on February 10, 2016 at 8:19pm — No Comments