All Posts (5855)

Sort by

Boris: Hello ladies and gentlemen and welcome to our meeting. We are speaking today with Richard Moss who is a Product Manager at AxiomSL. As we move from VAR to expected shortfall regulation coupled with the focus on liquidity, I thought of sharing a perspective on one of the hottest regulations around the corner - the Fundamental Review of the Trading Book (FRTB).

____

You can watch a video recording of the interview here https://www.youtube.com/watch?v=BVcJleqmIbU&t=2s

____ 

This has resulted

Read more…

marcus evans will host the 4th Edition CECL Methodologies, Implementation & Reporting Conference on June 11-13, 2018 in New York. This conference will give financial institutions a critical insight into the best strategies to hone their CECL implementations methodologies. You will deepen your knowledge of the modeling challenges, improve your strategies for CECL scenario development and tailoring models for different asset classes. Delegates will have the opportunity to consider the challenges o

Read more…

With the General Data Protection Regulation, the EU is taking privacy very seriously. They expect the same from you – and your third parties. How are you preparing your Vendor Risk Management program to handle these sweeping changes?

Join ProcessUnity for a 45-minute webcast on Wednesday, April 18, 2018 at 11:00 AM EDT and see how forward-thinking organizations are incorporating GDPR best practices into Third-Party Risk processes. Our team of experts will:

  • Outline GDPR requirements as they pertain
Read more…

Influencing Boards with Big Shoes

8028265274?profile=originalI have been running with a series of blogs about the boardroom. My R is for CanceR blog last week suggested some boards are totally disconnected with the discussion on risk. Is it their fault or yours?

Whether it is about risk or any other topic, through my career I have concluded that the hardest thing to do in business is to communicate effectively. And when it comes to being an adviser to boards, that means to communicate influentially. I have become so enthralled with the challenge I am about

Read more…
Views: 98
Comments: 0

A Message From Our Partner:

Getting actionable insights and effectively responding to change are staples for any corporation, especially when looking to optimize potential outcomes. In order to do this, the heads of businesses must be able to visualize entity relationships and recognize patterns. By using entity relationship diagramming, you can deliver stories that are easily processed by the brain, rather than extensive data sheets that don’t provide any context. 

When data is organized as a v

Read more…

8028264484?profile=originalOn Sunday April 1, Retail group Hudson’s Bay disclosed that it was the victim of a security breach that compromised data on payment cards used at Saks Fifth Avenue and Lord & Taylor stores in North America.

As many as 5 million cards may have been compromised, which would make the breach one of the largest involving payment cards over the past year.

Customers, investors, and regulators learned of this breach not through any press release issued by the company itself, but through news of the data a

Read more…

Cyber Security Tip - IoT implementation

I have created my first cyber security video tip. The tip involves identifying IoT devices and determining if they are a potential cyber exposure for your organization. If you are interested there is a video page here:
https://mediaexplorers.lpages.co/cyber-security-tip-1-iot/

Hope you find it useful. 

Here is the text version:

Our first tip addresses the Internet of Things, or IoT. Iot cyber security is a complex topic because of its nature. IoT implementations are generally done without the overs

Read more…

If you are working for an IT security company, I have a message for you: the term “identity theft protection” is way overused and even abused as a marketing term. We know that this term is used to sell services and products, but does it really protect a user from being the victim of identity theft? No.

This is no different than labeling a food as “natural,” even though it is not actually “organic.” At best, this is incorrect information. At worst, it’s a total lie.

Every company with security solu

Read more…

8028264056?profile=original

Banks are on a quest to improve the customer experience. A new study of 80 North American bank operations leaders by Accenture found that 74 percent believe the customer experience is one of their banks’ greatest strategic priorities.

Number two on the list: Fraud and risk management (70 percent of respondents).

Why not do both at the same time? About half of survey participants predict bank operations’ “primary role in three years as achieving straight-through processing through digital technolog

Read more…

8028275279?profile=originalOrbitz said hackers may have accessed 880,000 credit card numbers and possibly the names, dates of birth, phone numbers, and addresses of consumers who booked through the site in 2016 and 2017.

The Orbitz data breach pales in comparison to the Equifax hack of 2017 and has been buried among headlines concerning Facebook. For many, this story barely counts as “news” because it’s just honestly not that “new.”

For me, the humdrum attitude of complacency is what makes the Orbitz data breach blogworthy.

Read more…

DIGITAL DISRUPTION AND TRANSFORMATION

You will be disrupted

Your only choice is to disrupt yourself in a measurable, controllable and predictable way or to let others to disrupt yourself in a painful and non-controllable way.

Partnering with SIMMETHOD's Digital Transformation Index And C-suite Risk Alerts will enable you to disrupt yourself in a measurable, controllable and predictable way because in Digital Transformation, "The Way You Measure Determines Your Results" SIMMETHOD.

8028272680?profile=original

__________

If you want to know more about the SIMMETHOD,

Read more…

Geolocation Data Risks and Protection

8028271872?profile=original

Many Internet users are wondering why so many applications and websites need to know our geolocation without special need. And, more importantly, what is being done with this information?

The question is: how to access popular websites, but at the same time block geo-tracking of your laptop or smartphone?

10 useful tips to protect your geolocation data

The below information gives you an idea of ​​what you can be done to make sure that your geolocation is not being tracked. Some methods in this list

Read more…

marcus evans will host the 12th Edition Model Risk Conference on June 25-27, 2018 in New York. This conference will provide firms with practical tools to enhance infrastructure capabilities and improve model lifecycle management, in order to foster faster responses to changing regulatory demands. Attendees will explore best practices for employing advanced analytics and improving quantitative capabilities to help further optimize model validation techniques. Finally attendees will evaluate the C

Read more…

On March 29, 2018, Under Armour announced that the data of over 150 million users of the MyFitnessPal diet and fitness app was exposed in February of this year.

User data included usernames, emails, and passwords. The company put a PR spin on the breach by disclosing that government-issued identifiers like Social Security and driver’s license numbers, as well as credit-card information, weren’t compromised. In an email to MyFitnessPal users, Under Armour emphasized the affected passwords were “ha

Read more…
Views: 123
Comments: 0

8028274087?profile=original

The Never-Ending Journey: In Search of Product-Market-Fit

By David Skok

For Entrepreneurs

Intro

Many potentially great companies fail each year because, while they have an incredible product, they don’t figure out how to get it to market fast enough. Figuring out how to reach customers and break through to Product-Market-Fit remains one of the hardest parts of building a successful startup.

This post introduces a four stage framework and checklist for founders to use when searching for Product-Market

Read more…

You know that reporting is essential to a successful Vendor Risk program... it helps you highlight problem areas and prioritize your time spend. It can also help you to assess more vendors, score questionnaires faster and better demonstrate to management and regulators the breadth and performance of your program. To learn which reports are essential for a successful program, download The 8 Reports You Need for Effective and Efficient Vendor Risk Management

Read more…
Views: 126
Comments: 0

A few years ago, insurers were busy trying to figure out what IoT was and what it could do. But spotlighting the technology, all too often led to products and services with little customer appeal.

The lesson was clear – put customers front and center and develop services that build an exceptional experience around a device. To put it simply, the value is not in the technology itself, but in the service proposition that the technology enables.

 

Making the most of today’s technology, today

There are

Read more…
Views: 118
Comments: 0
According to reports uncovered earlier this year, Volkswagen conducted diesel-emissions testing on humans and animals from 2013 to 2015.

This report is the latest development in a global scandal which revealed that VW diesel cars were emitting 40 times the legal standard of nitrogen oxide, causing smog and posing risks to public health. Volkswagen has already issued a guilty plea in response to federal charges of fraud and conspiracy in the United States and agreed to pay more than $26 billion in

Read more…

Triple A Oversight

8028272893?profile=originalMy last few blogs have been about the boardroom. The need to tap into the board’s experience, by asking them the right questions and the approach management should be taking in their relationship with the board. This blog is about ensuring the board’s oversight is first class, triple A if you like.

Management and the board are making decisions under uncertainty. Therefore, the board needs two things to help ensure appropriate oversight. One is a sound decision-making process to manage blind spots

Read more…
Views: 95
Comments: 0
Facebook’s market capitalization dropped as much as $60 billion after reports emerged that Cambridge Analytica, the data consulting firm used by the Trump Campaign, was given the data of around 50 million Facebook users without their consent.

The Cambridge Analytica scandal is the latest in a series of risk management failures that have plagued the social networking company, which has been grappling with its role in the dissemination of fake news propaganda during the 2016 U.S. presidential elect

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead