All Posts (5631)

Sort by

Network for Real Impact

8028271891?profile=originalIn her blog Stop Looking in the Rear-view Mirror Janine Garner makes the point that our internal networking can have a much greater impact if we network in the right way. She writes:

"Think about it - are you connecting, sharing insight and creating opportunities to innovate and collaborate with these groups of people or are you simply swapping information to get the job done or the deal sealed?"

How do you manage your internal relationships? Are you mechanical and sticking to your technical role

Read more…
Views: 94
Comments: 0

Most ERM and GRC vendor offerings currently fail to enable the power and value of applying risk management principles to business decision making. If risk 8028271288?profile=originalmanagement is about making better decisions, then we need to reset the perspective of what qualifies as a risk management vendor resource.

The Challenge of Embedding Risk Management in Decision Processes

Updates to the COSO ERM and ISO 31000 standards emphasize the need to address risks in the context of organizational objectives and decisions.

Read more…
Views: 396
Comments: 4

MarketsandMarkets has published a new report that states that the global vendor risk management market is expected to grow to significantly by the year 2022. The report divides the market by component (solutions vs services), deployment type, organization size, industry segments and region to define the market growth opportunity. MarketsandMarkets is a B2B research firm that employees 850 full-time analysts to track high growth global markets, providing market sizing and strategic advice and for

Read more…
Views: 151
Comments: 0

Introduction

 

In a conventional security thinking, IT Security at most of the enterprises follow old ‘Industrial Security Model’ where its considered that assets are held within a perimeter and users must enter the perimeter physically or logically (LAN/VPN) to access the assets and the perimeter is guarded by a gatehouse / guard. In other words, this model is called perimeterised computer network where data and applications is attached to the network and is protected by firewalls with access lis

Read more…

The definition of criminal identity theft is a crime where the criminal impersonates the victim in order to protect their innocence. This can lead to victims getting fines or even getting arrested and charged for crimes they did not commit.

How Does This Happen?

There are a number of ways that a criminal can pull this off, and it generally occurs when the thief steals someone’s identity. This is true and pure identity theft, often involving a drivers license with the thieves picture and the victim

Read more…

C-suite Digital Disruption Risk Alerts: Building a bridge between your products and services and the digital transformation journey of your C-suite and your customers’ C-suite

SIMMETHOD new digital transformation algorithms and metrics found that your risk of being disrupted is proportional to your gap to the SIMMETHOD Best In Class and linking your products and services to the SIMMETHOD 7 Laws of Growth, Value Creation and Digital Transformation, Best In Class profiles and C-suite Risk Alerts pr

Read more…

Don’t be blinded by your technology defenses

I recently created a course on the Global Risk Academy outlining the requirements of GDPR (https://globalriskacademy.com/p/gdpr ). My objective was to guide organizations, other than those in the EU, to understand what they need to do to be GDPR compliant. Having immersed myself in the GDPR I came to realize it represents a quite different perspective on cyber security than currently embraced by many cyber security professionals in the US.

The GDPR explicitly places privacy security requirements

Read more…
Views: 101
Comments: 0

8028264683?profile=original

Hello, ladies and gentlemen! Welcome to our live discussion about crisis leadership. Today, we have our interview with Caroline Sapriel. Caroline is our member and managing partner at CS&A International, a leading global risk and crisis management firm. She is an experienced international crisis resilience professional with over 25 years of experience in risk, crisis and continuity management. Additionally, she has an extensive expertise in crisis communication. Caroline coaches senior executiv

Read more…

8028270070?profile=originalHere we are. February 2018. For many, February is a trying month. How well are those New Year’s resolutions holding up? Have the early-morning January gym visits started to fade? Are salads getting old? Personal goals aside, here’s one thing we hope won’t decline: the excitement over your freshly finished 2018 budget.

The new year tends to bring about an intense wave of optimism for what we can accomplish in the next 12 months. Too often, however, this optimism gets stomped on by the surprises of

Read more…

DISRUPTION – A shiny object

8028270487?profile=originalA great stat in this blog by Brent Hodgson – He can count five or maybe ten true “disrupter” start-ups over recent years out of 32,439 start-ups in AngelList’s directory. And we all know the overall success rates of start-ups. It just shows how fixated we are on shiny things. It’s why CEOs are way more likely to buy strategy or marketing advice than risk and compliance.

It’s also why, if you want to be able to influence the CEO, it is best to bring your message about a non-sexy topic in a sexed-u

Read more…
Views: 115
Comments: 0

The Ponemon Institute released a shocking statistic: about 80% of all corporate data leaks is due to human error. In other words, it only takes a single staff member to cause a huge issue. Here’s a scenario: Let’s say that you have an employee, Betty. Betty is lovely. We love Betty. But when Betty is checking her personal email during her lunch break and sees she has an offer that promises a 10-pound weight loss in only a week, she clicks the link. She wants to learn more about it, so she clicks

Read more…

How to Measure the Business Value and Success of Your Digital Transformation? Towards new crowd-sourced, holistic and industry-agnostic metrics of strategy execution to improve your 2018 predictions and the success of your digital transformation

The following is a selection of companies that recently consulted SIMMETHOD’s Strategy Execution C-suite and Boardroom Risk Alerts:

Massachusetts Institute of Technology, University of Western Ontario, Deutsche Telekom, Twitter, Apple, Emirates Telecommuni

Read more…

Not all viruses that find their way onto your computer dramatically crash your machine. Instead, there are viruses that can run in the background without you even realizing it. As they creep around, they make messes, steal, and much worse.

Malware today spies on your every move. It sees the websites you visit, and the usernames and passwords you type in. If you login to online banking, a criminal can watch what you do and after you log off and go to bed, he can log right back and start transferri

Read more…

marcus evans will host the 13th Annual Liquidity Risk Management Conference on May 2-3, 2018 in New York, NY. In its 13th year, this exclusive meeting will address key changes and new considerations for revolutionizing liquidity risk by building better models and understanding market impacts. By attending this event, delegates will explore the benefits of integrating oversight controls and frameworks for multiple regulations, reacting to market stress events, contingency planning, and much more!

Read more…

Good vs Bad Surprises

8028265854?profile=originalLast week I wrote about Reframing Risk to find opportunities where no one else is looking. A recent blog by a legend thinker Seth Godin (author of 18 books) put a different spin on this for me.

In his blog Surfing vs Coal Mining he reminds us that unexpected occurrences in surfing are a good thing. Whereas the unexpected in coal mining may mean tragedy. For me Godin’s message is about accepting that you need to take risks. To look optimistically at uncertainty. 

___________________________________

Read more…
Views: 97
Comments: 0

To contract a vendor is to initiate a relationship: when you don’t know who you’re really dealing with, you expose your enterprise to risks that can have enduring consequences.

Join ProcessUnity’s 45-minute webcast on Thursday, February 15, 2018 at 11:00 AM EST and see how forward-thinking organizations are modernizing their vendor onboarding process.

Our team of experts will discuss how to:

  • Eliminate time-intensive admin steps to create vendor information
  • Streamline onboarding processes by engaging
Read more…

An interesting post for anyone talking internally with their team on building a homegrown solution versus purchasing a solution to streamline Third-Party Risk Management. Of course, it's written from the perspective of a software vendor (that's what we do) but the benefits of having a voice in the discussion of what goes into the next generation of a product as a customer in a community of like-minded individuals or knowing that multiple times a year new features will be added can influence this

Read more…

Inspire, Enable, Engage, Empower Your Workforce as Never Before and take your Leadership Team toward Becoming Strategic Leadership

Dr. Ted Marra

Professor Dr. Emeritus, Strategic Leadership, Cotrugli Business School

Sr. Partner, Insights Paradigms

The author of the popular online course: Becoming the Strategic Leader in 6 weeks by Cultivating Your Strategic Thinking

Background

For some years now I have watched organisations around the world talking about how their employees are their greatest asset, y

Read more…

What is a credit freeze? It’s an action you take to lock down your credit report. A lender can’t see your score, which means your Social Security number and credit rating is useless to them. In other words, they can’t tell if you are risky or not.

When an identity thief can access your ID aka Social Security number, they can also create credit in your name. However, if your credit file is frozen, the bad guys can’t access it any longer. With a credit freeze, your credit file is inaccessible.

To ge

Read more…

8028266661?profile=original 

Security experts are observing a rising level of malware strains, which are trying out the Spectre and Meltdown vulnerabilities.

As reported by the researchers from Fortinet, AV-TEST, and Minerva, a number of crooks test the publicly available proof-of-concept (PoC) computer code for the Spectre (CVE-2017-5715, CVE-2017-5753) and Meltdown (CVE-2017-5754) vulnerabilities.

AV-TEST experts have identified 119 virus samples, which are linked to the above-mentioned chip vulnerabilities.

Virus samples d

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead