management (362)

All about Security-as-a-Service

Security as a Service (SECaaS) is a security management outsourcing model. Security as a Service typically involves applications, such as Internet-based anti-virus software, but it can also refer to the security management that an external organization manages in-house. Security as a service (SECaaS) is an Internet security service management cloud computing model. SECaaS is based on the Service Software model but is constrained to specialized information security

Read more…

 

8028292260?profile=original

Large accounts make up a significant portion of business for most B2B companies. Therefore, losing an important customer can have detrimental effects on the organization. The significance of key accounts is urging top B2B companies to revisit their key account management approaches. Additionally, the increasing level of sophistication of the purchase process being adopted—such as, centralized procurement, competitive bidding and auctions, and laborious negotiations—by large buyers is a crucial

Read more…

What is API Management?

Application Programming Interface (API) Management is a series of processes which allow a company to control and visibly connect applications and data to the APIs throughout the enterprise and clouds. API management solutions generally include: the Developer portal, an API gateway, lifecycle management of the API, analytical capabilities, and support to API monetization, to help businesses get the most out of their API programs. API management is delivered in the cloud as

Read more…

8028294856?profile=original

The Retail industry is under constant pressure by low margins and ever-increasing rivalry. Weak consumer spending; saturated markets; increased consumers demands for service and lower prices; and intense competition has put significant strain on retail bottom lines and growth avenues. Thus,Retail Strategy must evolve to accommodate these market changes.

Such low margins force the retailers to save costs across the operations, including IT, which is vital for the success of every strategic endeavo

Read more…

Security is the concern that comes across the management of every company and every year companies pay huge amount on their cyber security. As year time is passing by, technologies are getting bigger and better and so the threat to them. Since it’s the world of online technology and where everything is computerized or automated, there cyber security threats are also getting bigger and serious every day. So, the people are specializing is protecting their systems and organizations cyber risk or t

Read more…

8028291062?profile=original

A major reason for employees leaving their workplaces is conflict with their bosses. To succeed in today’s fiercely competitive market, organizations need to invest in developing their leadership, such that they further develop their teams by training them on the desired competencies and create a sense of engagement in them.

A big challenge for leaders is getting their employees to believe in the organizational vision. No two personalities have the same viewpoints and aspirations, thus conflict i

Read more…

0?e=1559779200&v=beta&t=Is9yj0dEPhdVQ8SbCoh8ELV1ZBdTPRbo5ACiC8E_p_4

Cost Optimization Programs are hard to manage, sustain, and often tend to fall short of delivering the promised value. The failure could be attributed to many reasons—including lack of clearly delineated objectives, failure to account for the operational difficulties, internal resistance to change, trying to cut corners from everywhere, not paying attention to planning optimal utilization of resources; lack of direction, accountability, and management agreement.

However, the tremendous pace of te

Read more…
8028290652?profile=original Even a $1 trillion company cannot hide in the See-Through Economy. After a fourteen-year-old boy discovered a serious bug in Apple’s group FaceTime feature, his mother e-mailed, faxed, and tweeted the report to Apple. However, it wasn’t until after her tweet went viral that the bug was disabled. How could Apple have responded more efficiently and avoided this reputational risk?
Most Apple users are familiar with FaceTime, Apple’s video chatting software. The feature had recently been upgraded, s
Read more…

Global Warehouse Management Systems Market

A warehouse management system is a software program and process that cause institutions to rule and accomplish warehouse methods from the moment items or else elements come into a warehouse until they venture out. Operations in a warehouse include things like inventory management, picking out techniques as well as auditing. Initially, warehouse inventory management mechanisms could primarily just grant simplistic features, chiefly just simply storage spot important information. These days, the b

Read more…

0?e=1550707200&v=beta&t=GyeaokoPxmkZsJq9GKz_OgrO38TCpW60-ngNt99GEuc

 

Almost every other day, startups emerge and disrupt established companies because of their innovative ideas and business models. This disruption is, primarily, due to the reluctance of big companies to implement a series of strategic and organizational practices required to organize and inspire creativity.

Large firms are, generally, better at implementation rather than innovation due to their long-established ways of doing business and other cultural elements. Their success is owing to optimiza

Read more…

8028280258?profile=original

Not many people have heard about the ADKAR MODEL!

 

Developed by Jeff Hiatt—the Founder of Prosci (a Change Management research and advisory)—the ADKAR Change Management Model is a potent tool for professionals and leaders responsible to manage and sustain successful change. ADKAR stands for 5 sequential building blocks that are essential to drive successful change at both the people as well as the business dimension:

  • Awareness: All employees must be aware of the business reasons for change.
  • Desire:
Read more…

Increase Risk Management effectiveness by learning to deal with two organisational realities

Experimenting with Networked Risk Management[1] over a period of five years has shown that the ability to deal with multiple organisational realities can help to improve risk management. In some case it can also reduce the effort to do so, making valuable and usually scarce resource available to contribute to an organisations success. One of our observations is that using only a traditional view based on

Read more…

Next Generation Compliance Management Technology

Compliance management has always been a complicated task, but technology has helped make it easier. We are finally seeing the rise of Fintech (financial technology) and Regtech (Regulatory technology). These technologies are designed specifically for the financial industry and for dealing with regulations respectively. Compliance management comes under Fintech and is quickly becoming an essential technology for companies that want to innovate and succeed in today’s harsh and dynamic business env

Read more…

Compliance management systems are becoming a common sight in the financial sector, not just because of how well they perform, but also because of the excellent ROI on them. If your organization is worried about the costs of implementing a compliance management solution, here are 3 reasons they shouldn’t be.

Compliance related fines and damages are reduced

The most obvious and the most direct effect is on compliance-related fines. When regulatory bodies find a compliance issue and determine that th

Read more…

Complimentary Financial Risk and Regulation Publication – Written by the Industry, for the Industry…

 

Risk Insights Magazine, Issue Eight (70+ pages of articles, interviews and video insights).

 

Issue Eight features insights on:

Technology Innovation | Regulatory challenges | Vendor & third-party risk | Operational risk | IFRS 17 | Liquidity risk.

 

With authors from the industry’s leading Financial Institutions, including:

Prudential | UBS | HSBC | Nordea | Barclays | National Fraud Intelligence Bure

Read more…

8028276469?profile=original

SIX REASONS FIRMS CAN’T INNOVATE

Enrique Suarez Note: I often receive executive education courses from MIT and I want to share this excellent article with all of you.

Source: MIT Management Executive Education

Written by Visiting Professor Bill Fisher

Recent studies show that when it comes to innovation, corporate strategists don’t walk the walk. They know that real change is required to succeed, but the vast majority of growth efforts are allocated to continuous innovation instead of disruptive ris

Read more…

8028274074?profile=original

Enrique Suarez Presenting:

OneBankAssure: Customer Intimacy Through Machine

Learning

By:

MIT CISR

Title Author(s) Type Topic(s) Comments Date
OneBankAssure: Customer Intimacy Through Machine Learning Beath, Cynthia M.
Tarafdar, Monideepa
Ross, Jeanne W.
Working Paper Data Management, Analytics, and Use
Enterprise Architecture
IT-based Business Transformation
0 2018-03-12

Abstract: OneBankAssure [a pseudonym] sought to delight its customers by delivering new digital value propositions that exploited new data scie

Read more…

Learning How to Test and Learn

8028274855?profile=original

Learning How to Test and Learn

By: MIT CISR

Author(s)

Ross, Jeanne W. and Fonstad, Nils O.

Type:

Research Briefing

Topics:

Digital Innovation

Business Agility

IT Governance

IT Investment and Portfolio Management

IT-based Business Transformation

2018-02-15

Abstract: To counter pervasive uncertainties in the business and technology environment and prioritize the most strategic innovation projects from myriad options, companies can take a test-and-learn approach to innovation investments. From our analysis of t

Read more…

Vendor-Data-Breached-1024x512.jpg

What’s worse than a vendor that suffers a data breach that exposes your sensitive customer information? The answer: A vendor that waits almost six months to tell you about it.

That’s the issue that both Sears and Delta Air Lines are facing after a malware attack on each of the company’s online chat services vendors. Hundreds of thousands of customers’ payment information was accessed, including payment card account numbers, expiration dates, names, and addresses, reports Gizmodo. Sears and Delta

Read more…

8028270679?profile=original


Does your institution need cybersecurity insurance? Is it required? If utilized, are there rules? Cybersecurity insurance can protect against financial loss in the event of a cyber incident, but there are many intricate details.

The Federal Financial Institutions Examination Council (FFIEC) members have provided a joint statement to help financial institutions understand how cyber insurance impacts risk management and what institutions need to do when considering purchasing cyber insurance. The

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead