information (17)

8028327897?profile=originalSupply Chain Management is getting more and more complex.  The pressure on the Supply Chain information to be made public is also increasing day by day.  With the popularity and widespread use of social media, it has become more and more difficult for organizations to hide information pertaining to supply chain practices, employees’ treatment, suppliers’ processes, or waste materials generated that could affect the environment.  Social media often publicizes negative reports on companies’ supply

Read more…

Security information and event management was initially designed to help organizations achieve compliance and keep their information compliant but has evolved over the years. Moving beyond its roots, software vendors now provide machine learning, advanced statistical analysis, and other analysis methods for your products for security information and event management (SIEM).

8028321266?profile=original

The SIEM and Threat Management evolution continues to build on a scalable open security platform that supports security and

Read more…

8028321065?profile=originalSupply Chain Management across industries has become way too complicated and globalized today.  Since the popularity and use of Social Media has grown, organizations are increasingly getting under pressure to disclose their information publicly.  This pressure on information transparency has reached a level where external stakeholders expect to know the details of an organization’s Supply Chain practices much more than what is typically required to disclose legally.

Executives are finding it hard

Read more…

As diets are richer and more complex, the high-value protein provided by the livestock sector enhances nutrition in the vast majority of the world. Livestock products not only include high-quality protein but are also valuable sources of a wide variety of vital micronutrients, in particular minerals like iron and zinc and vitamins such as vitamin A.

8028323254?profile=original

For the vast majority of people in the world, especially in developing countries, livestock products remain the food they want for nutritional value

Read more…

The term superfoods were formulated for marketing purposes to influence food trends and sell products. The superfood industry is providing the superfood label to nutrient-rich products with a supposed potential to have a beneficial impact on health. Although many foods can be described as super, it's important to understand that there is no single food that holds the key to the prevention of good health or disease.

8028318081?profile=original

There is more to achieving overall health through food and nutrition than concentr

Read more…

 

Business dashboards are important tools to measure key performance indicators and data pertaining to an organization or certain procedure.  Just as a vehicle dashboard is powerful performance management tool in summarizing a performance of a multitude of processes, a business dashboard summarizes the performance or impact of a host of functions, teams, and activities; and assists in strategic planning and decision making.

Business dashboards simplify sharing and analysis of large data, and hel

Read more…

Functional organizations are facing dramatic changes. Businesses are becoming more focused around capabilities and demand leaders ofStrategic-Functional-Organizations-300x210.jpg?profile=RESIZE_710x functions to play a more strategic role. With a less stable environment and more intense competition, a premium is put on agility and flexibility with an increased emphasis on performance results. In effect, functions are pressured to boost operation excellence while reducing costs.

But given the day-to-day transactional needs of business and the long-range in-depth

Read more…
Expert Chuck Brooks Offers A Cybersecurity “Cheat Sheet” For The C-Suite

Chuck Brooks: VP of Government Relations and Marketing, Sutherland Global Solutions

The Internet was invented in a government laboratory and later commercialized in the private sector. The hardware, software, and networks were originally designed for open communication. Cybersecurity initially was not a major consideration. That mindset has surely changed

Read more…

short course on cybersecurity risk

What's your biggest cybersecurity risk?  Chances are it's that you're using the wrong methods to assess that risk!

Douglas W. Hubbard, author of big sellers How to Measure Anything and The Failure of Risk Management, now has done a new book, How to Measure Anything in Cybersecurity Risk.  He and I are teaming up to offer a one-day short course on the subject at the Holiday Inn in Rosslyn (Arlington), Virginia, Thursday, October 6.  The course includes training in calibration of your risk assessme

Read more…

Chapter 9-Project Integration of my recently published book Risk-management in the World of Threats and Opportunities: A Project Controls Perspective discusses the challenges that many Project Managers are facing. One item that throws many to fits is project integration. It is a project requirement with varying level of complexities. Some have successfully toe the line but many just fail.

Integration happens throughout the project lifecycle using continuous collaboration. It becomes a big challen

Read more…

The ACME Corporation

It just seems the either no one is measuring realized risk exposure numbers for their firms, or mums the word on their findings.  The information that I collect is strongly covered by Non-Disclosure Agreements.  To help with this, I want to start publishing de-identified statistical abstracts.  

I included some of these statistical abstracts in the financial section of a paper published by ANSI.  I am a coauthor on, "The Financial Impact of Breach Health Information, A Business Case for Enhanced

Read more…

Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core - their databases. Many don't have a comprehensive database security strategy to defend against sophisticated attacks, track sensitive data, or even meet emerging regulatory requirements.

In addition, organizations tend to focus on detective controls rather than preventive measures when it comes to database security.

By contrast, Forrester finds that by implementing a c

Read more…

This white paper explores data loss from a contrarian point of view - exploring the top 7 shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.

===> http://bit.ly/LosingData

 

Read more…

In this challenging environment, board members and management executives are striving to maintain their tight grip on costs while maintaining a proper focus on enterprise-wide risk.

Jack S. Dybalski is Vice President and Chief Risk Officer at Xcel Energy. He will be a key speaker at the marcus evans 5th Annual Enterprise Risk Management Conference taking place in from March 19-21, 2012 in Chicago, IL.

Jack Dybalski is the Vice President and Chief Risk Officer of Xcel Energy based in Denver, Colora

Read more…

This book provides a practical set of detailed steps to implement an Information Governance program, as well as the associated automation.

IBM has assembled a comprehensive approach to Information Governance that delivers the industry's strongest portfolio of products, services, and best practices to address every organization's needs.

 

====> http://bit.ly/DataGovernanceEBook

 

Read more…

The Capital Markets Guide 2011 (163 pages)

Focusing on technological innovation, business strategy and geographical markets, this guide provides thought leadership on how capital markets firms can capitalize on real-time data and leverage new risk strategies for a trading advantage.  

When Bank of America’s assets reached $2.3 trillion—ten times more than Exxon Mobil— The Economist noted that managing such a huge portfolio may be “beyond the ken of mere mortals.” Capital markets firms should return to playing offense, focusing on innovat
Read more…

Call For Papers

Information & Security: An International Journal

Special issue on

Countering Maritime Piracy

Editor: Prof. Alexander Yankov
Judge, International Tribunal for the Law of the Sea

 

{Keywords: piracy, situational awareness, maritime sovereignty, maritime safety, security or maritime transport, emerging security challenges, transport infrastructure, harbor protection, risk analysis, terrorism, counterterrorism, threats, risks, vulnerability, risk assessment, risk mitigation, risk management, Critical Infr

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead