It can be all to easy to get caught in the trap of cyber wack-a-mole, where as soon as you need with one cyber threat several more appear. The link that follows will take you to a short (2 minute) video that outlines the the situation most of us find ourselves in.
Take a look. I appreciate your feedback.
Added by Douglas Nagan on October 29, 2016 at 3:16pm — No Comments
A message from our partner:
Added by Boris Agranovich on October 27, 2016 at 9:00am — No Comments
So, you have a robust product roadmap. It's got all the product features you need, from the most basic to the most innovative. Now, how did you prioritize these features?
And, are you sure you prioritized things correctly?
With limited resources, all organizations strive to prioritize those activities that drive the most value. This is particularly true in product development. Focusing on the right or wrong set of features can make or break your product (or even…Continue
Added by David Tang on October 24, 2016 at 4:59pm — No Comments
I am reminded time and again, in organisation after organisation, of the tendency to take a basic product or service and over complicate it until it’s “broken”. And if you want examples, look no further than support functions in organisations. Whether they be finance, procurement, risk or records management. Unless you have pro-actively resisted the temptation, every end user will tell you, “the system is over complicated”.
If your system is over complicated, your challenge to…Continue
Added by Bryan Whitefield on October 21, 2016 at 12:31am — No Comments
Much effort is being expended, rightly so, in addressing cyber risks. However, it is a frustrating exercise since new risks and threat vectors are arising daily, even hourly. If you would like to stop playing cyber wack-a-mole and get on the offensive watch this video. It only takes 5 minutes and will explain why understanding and managing your cyber exposures provides a way to take the offensive.
Hope you enjoy and gain something from it.…Continue
Added by Douglas Nagan on October 13, 2016 at 8:11pm — No Comments
By now, the Wells Fargo scandal is already beginning to become a memory. While the public may forget their costly mistake in time, theirs is a lesson you should definitely commit to memory. Wells Fargo’s failure could easily be your own without taking proper steps to avoid…Continue
Added by Cassie Phillips on October 13, 2016 at 7:58pm — No Comments
Ruben Cohen is an operational risk consultant. He has been working in the financial industry for over 17 years, with most of the last 10 in operational risk analytics at Citi.
Prior to that, Ruben spent 10 years on the faculty of Mechanical Engineering & Materials Science at Rice University in Houston, specializing in Fluid Mechanics and…
Added by Yiota Andreou on October 12, 2016 at 12:30am — No Comments
Operational risk management is currently on the end of a major shakeup. Ever since the announcement of Basel III banks have been working within a paradigm that pushes towards either TSA or AMA approaches (standardised and advanced approaches respectively). At the end of 2015, however, the Basel…Continue
Added by Yiota Andreou on October 7, 2016 at 9:30am — No Comments
Heavy reliance on systems and technology exposes firms to higher levels of risk and threats in this area due to these threats constantly changing. Hence, it is important for organizations to equip themselves with up to date with IT and cyber threats, along with ensuring a strong fraud management program in place, managing outsourcing and third party risk and keeping up with the regulatory expectations.
Representatives from established financial institutions and associations are…Continue
Added by Ellyna on October 6, 2016 at 10:06am — No Comments
Phil was telling me about a meeting he had with someone from audit that came asking for his help. He soon realised that they were not clear on why they were meeting with him and he decided to help…Continue
Added by Bryan Whitefield on October 6, 2016 at 3:00am — No Comments
Governments are facing an unprecedented level of cyber attacks and threats with the…
Added by Boris Agranovich on October 5, 2016 at 10:00am — No Comments
Added by Enrique Suarez on October 2, 2016 at 11:21pm — No Comments