All Posts (5947)

Sort by

 8332504866?profile=original

The problem solving approach to organizational design and management has a number of limitations. It focuses only on what’s wrong, identifying causes, brainstorming solutions, developing action plans, and not taking into account the areas that are working well. Problem solving focuses on the past and excludes possibilities for creativity. The approach is time consuming, costly; harnesses blame game, consistent firefighting, low morale, and discord between teams.

The Appreciative Inquiry (AI) app

Read more…
Views: 105
Comments: 0

Global Cloud Security Market Growth

Cloud security is a fast-growing service that offers a large number of the same exact functionalities as classical IT security. That includes securing most important information from theft, data leakage and deletion. Cloud security includes a set of policies and controls, which specialize in the security issues with the cloud by protecting applications, data, and infrastructure. The cloud computing market is liable to threats which include data breaches, data loss, and insecure application progr

Read more…

How to Protect You Frequent Flier Miles NOW

Social Security numbers and credit card numbers are not the only types of data that hackers are after. Now, they are looking at frequent flyer accounts, and they are stealing reward miles, and then selling them online.

How do Hackers Steal Frequent Flyer Miles?

As with other types of ID theft, hackers use info that they have illegally obtained to access frequent flyer accounts. With more data breaches happening than ever before, hundreds of millions of records are exposed, and thus, hackers have g

Read more…

8332503068?profile=original

At the pinnacle of the Industrial Revolution, not many organizations realized the complex subtleties of the Financial Capital. The organizations that were able to develop innovative methodologies to administer their financial capital outsmarted the rivals by achieving a competitive edge.

At the advent of the 20th century, two more forms of capital became known and gained prominence, in addition to the financial capital. These assets included: the Human Capital—the value acquired as a result of de

Read more…
Views: 112
Comments: 0

Can AI Make Insurance Claims More Human?

CHICAGO: Senior claims executives from leading insurance companies will participate in a live and free webinar hosted by Insurance Nexus, exploring whether AI can be the solution for efficient, hyper-personalized claims at scale.

 

As insurance’s ‘moment of truth’, the claims process is often regarded as the ‘face’ of insurance; the majority of customers’ interactions with their insurance carrier are when they are making a claim and so it is essential for carriers to make this process as easy, eff

Read more…

8028278861?profile=original

Expanding into new markets presents lucrative opportunities, as well as risks. Potential threats in new territories include corporate corruption, malpractices, and fraud, which most firms have to face. Corruption and fraud cover a wide array of situations, but it is the unobtrusive yet more prevalent forms of fraud and corruption that create the biggest risks for organizations.

Corporate corruption and fraud can be characterized into 4 distinct categories.  Understanding these 4 categories of cor

Read more…
Views: 142
Comments: 0

Recipes for Every Appetite

8028275456?profile=originalOne of the things I am seen as an expert in is the field of risk. One of the hotly debated topics in risk is the value of a risk appetite statement. There are many reasons their value is debated, however, the real reason is because there are different recipes to produce risk appetite statements to suit the board and management’s personal appetite for risk. And unless board and management take the hardest approach, they either do more harm than good or simply waste their time.

There are essentiall

Read more…
Views: 53
Comments: 0

Global Power over Ethernet Chipsets Market

The Power over Ethernet technology would undoubtedly experience quick growth due to the technological potential to transfer electrical power and networking through the use of one winch cable. The using of Power over Ethernet chipsets would essentially trim the wire connections used, that may swiftly result into lower costs, simple commercial infrastructure management, a lot easier repairs and maintenance, controlled downtime, versatile installation, and a tiny amount of power consumption. The te

Read more…

8028285485?profile=original

Executing strategy the right way is not everyone’s business. The reported failure rates for strategy execution stand at 60% to 90%. A study of large organizations in eight industrialized countries by Bain and Company revealed that seven out of eight companies failed to achieve profitable growth from 1988 to 1998, and very few achieved their strategic objectives and targets.

The reason for such astronomical failure rates for Strategy Execution are, primarily, fragmented and cumbersome strategy man

Read more…
Views: 213
Comments: 0

Investigators in Sacramento have arrested Joseph James DeAngelo for rape, but they only found him based on records from a genealogical website.

The effort wasn’t easy, but this guy is now off the streets. The process started with taking a look at DNA that was collected from the crime scene, which happened many years ago. Investigators didn’t have a match. However, recently, they started comparing DNA with genetic profiles that have been collected from ancestry sties. These are companies that coll

Read more…

How to Build On-demand Marketing Capabilities?

8028282066?profile=original

The Digital Era has brought on critical challenges for companies to meet new consumer demands for marketing. Digital Marketing is undergoing transformation at an astounding rate. There is a radical shift towards “on-demand” marketing, where marketing is becoming consistent, pertinent, and receptive to customers’ demands, delivering heightened experiences literally anywhere with ease of access along the consumer decision journey.

On-demand Marketing is being driven by the constant growth of techno

Read more…
Views: 157
Comments: 0

8028281867?profile=original

Digital natives are threatening the way traditional organizations do business. The dated authoritative structures and imposing mindsets of the executives of traditional companies are in stark contrast to today’s technology-savvy startups and digital-native companies.

Traditional firms are running out of time to revisit their strategies and promptly transform in accordance with the rapidly evolving markets and business environment. They need to focus their attention towards eliminating bureaucrati

Read more…
Views: 101
Comments: 0

Gartner Research recently published The 2018 Critical Capabilities for IT Vendor Risk Management, and we are extremely excited to share that ProcessUnity has received the highest product scores in both of its qualifying use cases. The report was written by Gartner Analyst Chris Ambrose and published in November 2018.

The Critical Capabilities report compares VRM platforms across a variety of use cases and categories to help prospective buyers determine which solution might meet their individual p

Read more…
Views: 268
Comments: 0

GRC Tools you can Start Using today

img-why-do-we-need-grc-technology.jpg
When people think of GRC they immediately picture a huge technology implementation that costs millions of dollars. The reality of GRC is very different from what people perceive it to be. GRC isn’t a type of software suite, it is a new way of managing 
governance, risk, and compliance in a synchronized manner. While there are many GRC solutions that need major implementations and cost millions, there are also a lot of small GRC tools which can be used quickly and without any major expenses. 

 

Ins

Read more…
Views: 117
Comments: 0

How Your Username Can Be used to Track You

You probably have a few usernames, or you might have just one that you use for every site. Either way, your user names can be used not just to identify you online, but it can also be used to track you and find out information about you. How do people track you based on your user name? They do the following:

They Start with a Google Search

The first thing people do to track your username is do a Google search. You will be amazed by all of the information that is out there. However, Google is not th

Read more…

Measure what Matters

8028280860?profile=originalAccording to Michael Henderson, Corporate Anthropologist on Oscar Trimboli’s Deep Listening Podcast, people in the western world like threes because we like balance.

We like Low, Medium and High. We like the Three Little Pigs and Goldilocks and the Three Bears.

We also like it when a salesperson stops at three when telling us about the wonders of their product. Trust and desire builds to three and starts to wane above three. As in, “Why does she need to keep listing stuff? Is there something not g

Read more…

Staying a Step Ahead of Third-Party Risk

A Message From Our Partner

Process-Unity-Logo-17-RGB-no-background-250x44.png

eBook Staying a Step Ahead of Third-Party Risk

Staying a Step Ahead of Third-Party Risk

Mitigating risk isn’t easy, especially in light of government oversight from the Department of Justice, Securities and Exchange Commission, and Internal Revenue Service amongst others. In this day and age, it’s important to ensure your risk and compliance program has exceptional processes and procedures in place to better prepare for the future.

Produced by Compliance Week and sponsored by ProcessUnity, the Staying a St

Read more…

8028280468?profile=original

Time Management is a critical capability for individuals as well as senior leaders. Leaders are often under pressure to allocate adequate time on strategic priorities.

There isn’t a one-size-fits-all formula designed for appropriate time management that works for all executives. However, research on the practices utilized by the leaders effectively managing their time reveals that that they assign a significant percentage of their time in meeting external and internal stakeholders. Specifically,

Read more…
Views: 148
Comments: 0

Introduction

The Food safety and standards authority of India (FSSAI) had issued a draft of amendments to Food Safety and Standards (FSS) Act and recommended a stringent punishment of life imprisonment and fine of Rs. 10 lakhs to the person nabbed in case of food adulteration. This act was passed in 2006 and notified in 2011. If any person found in the case of adding adulterant to food with the intention to cause his death or renders for human consumption shall be punishable by giving him 7 years

Read more…
Views: 47
Comments: 0

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead