All Posts (5855)

Sort by

Managing Risk in a Global Trade War

The announcement by U.S. President Donald Trump that his administration would be imposing tariffs on foreign imported steel and aluminum threatens to send the U.S. and its trading partners into a global trade war.

8028267887?profile=originalPrices of U.S. domestic steel are up approximately 20 percent since the beginning of 2018. This is due to expectations of “protectionist measures, which could prove a significant drag on steel consumers like the machinery, motor vehicle, and construction industries,” Capital Economics a

Read more…

There are many ways that you or a small business could get caught up in a social media disaster. Can you think of any off the top of your head? If you are like most of us, probably not. Here are 14 ways that you could be in danger:

  1. A Terrible Online Reputation – Do you keep a watchful eye on you or your business’ Facebook page? Are people posting to it? Are your staff? Even things that seem good-natured at first can be taken the wrong way by friends or potential customers.
  2. Racy Images or Text – If
Read more…

8028264098?profile=originalThis past weekend, companies started responding to consumer backlash for working with the National Rifle Association. Corporations like the First National Bank of Omaha, Delta, Hertz, and MetLife are ending discount programs with the NRA.

Before this pushback, NRA membership granted consumers access to a broad range of discounts, from special rates on auto insurance policies to cheaper flights when you booked through the NRA’s website.

But after the mass school shooting at a Parkland, Florida high

Read more…

If you are a business owner, you might be concerned about employee theft. If you aren’t concerned, perhaps you should be.

There are a number of ways that an employee can steal:

  • Embezzlement money, inventory or materials
  • Skimming – Diverting funds
  • Stealing business opportunities, data or trade secrets
  • Fraudulent disbursements like check tampering or billing schemes
  • Larceny – absolute theft

It might surprise you to find out that employees who steal are not usually new employees. Instead, they are those w

Read more…

Network for Real Impact

8028271891?profile=originalIn her blog Stop Looking in the Rear-view Mirror Janine Garner makes the point that our internal networking can have a much greater impact if we network in the right way. She writes:

"Think about it - are you connecting, sharing insight and creating opportunities to innovate and collaborate with these groups of people or are you simply swapping information to get the job done or the deal sealed?"

How do you manage your internal relationships? Are you mechanical and sticking to your technical role

Read more…
Views: 94
Comments: 0

Most ERM and GRC vendor offerings currently fail to enable the power and value of applying risk management principles to business decision making. If risk 8028271288?profile=originalmanagement is about making better decisions, then we need to reset the perspective of what qualifies as a risk management vendor resource.

The Challenge of Embedding Risk Management in Decision Processes

Updates to the COSO ERM and ISO 31000 standards emphasize the need to address risks in the context of organizational objectives and decisions.

Read more…
Views: 414
Comments: 4

MarketsandMarkets has published a new report that states that the global vendor risk management market is expected to grow to significantly by the year 2022. The report divides the market by component (solutions vs services), deployment type, organization size, industry segments and region to define the market growth opportunity. MarketsandMarkets is a B2B research firm that employees 850 full-time analysts to track high growth global markets, providing market sizing and strategic advice and for

Read more…
Views: 161
Comments: 0

Introduction

 

In a conventional security thinking, IT Security at most of the enterprises follow old ‘Industrial Security Model’ where its considered that assets are held within a perimeter and users must enter the perimeter physically or logically (LAN/VPN) to access the assets and the perimeter is guarded by a gatehouse / guard. In other words, this model is called perimeterised computer network where data and applications is attached to the network and is protected by firewalls with access lis

Read more…

The definition of criminal identity theft is a crime where the criminal impersonates the victim in order to protect their innocence. This can lead to victims getting fines or even getting arrested and charged for crimes they did not commit.

How Does This Happen?

There are a number of ways that a criminal can pull this off, and it generally occurs when the thief steals someone’s identity. This is true and pure identity theft, often involving a drivers license with the thieves picture and the victim

Read more…

C-suite Digital Disruption Risk Alerts: Building a bridge between your products and services and the digital transformation journey of your C-suite and your customers’ C-suite

SIMMETHOD new digital transformation algorithms and metrics found that your risk of being disrupted is proportional to your gap to the SIMMETHOD Best In Class and linking your products and services to the SIMMETHOD 7 Laws of Growth, Value Creation and Digital Transformation, Best In Class profiles and C-suite Risk Alerts pr

Read more…

Don’t be blinded by your technology defenses

I recently created a course on the Global Risk Academy outlining the requirements of GDPR (https://globalriskacademy.com/p/gdpr ). My objective was to guide organizations, other than those in the EU, to understand what they need to do to be GDPR compliant. Having immersed myself in the GDPR I came to realize it represents a quite different perspective on cyber security than currently embraced by many cyber security professionals in the US.

The GDPR explicitly places privacy security requirements

Read more…
Views: 105
Comments: 0

8028264683?profile=original

Hello, ladies and gentlemen! Welcome to our live discussion about crisis leadership. Today, we have our interview with Caroline Sapriel. Caroline is our member and managing partner at CS&A International, a leading global risk and crisis management firm. She is an experienced international crisis resilience professional with over 25 years of experience in risk, crisis and continuity management. Additionally, she has an extensive expertise in crisis communication. Caroline coaches senior executiv

Read more…

8028270070?profile=originalHere we are. February 2018. For many, February is a trying month. How well are those New Year’s resolutions holding up? Have the early-morning January gym visits started to fade? Are salads getting old? Personal goals aside, here’s one thing we hope won’t decline: the excitement over your freshly finished 2018 budget.

The new year tends to bring about an intense wave of optimism for what we can accomplish in the next 12 months. Too often, however, this optimism gets stomped on by the surprises of

Read more…

DISRUPTION – A shiny object

8028270487?profile=originalA great stat in this blog by Brent Hodgson – He can count five or maybe ten true “disrupter” start-ups over recent years out of 32,439 start-ups in AngelList’s directory. And we all know the overall success rates of start-ups. It just shows how fixated we are on shiny things. It’s why CEOs are way more likely to buy strategy or marketing advice than risk and compliance.

It’s also why, if you want to be able to influence the CEO, it is best to bring your message about a non-sexy topic in a sexed-u

Read more…
Views: 118
Comments: 0

The Ponemon Institute released a shocking statistic: about 80% of all corporate data leaks is due to human error. In other words, it only takes a single staff member to cause a huge issue. Here’s a scenario: Let’s say that you have an employee, Betty. Betty is lovely. We love Betty. But when Betty is checking her personal email during her lunch break and sees she has an offer that promises a 10-pound weight loss in only a week, she clicks the link. She wants to learn more about it, so she clicks

Read more…

How to Measure the Business Value and Success of Your Digital Transformation? Towards new crowd-sourced, holistic and industry-agnostic metrics of strategy execution to improve your 2018 predictions and the success of your digital transformation

The following is a selection of companies that recently consulted SIMMETHOD’s Strategy Execution C-suite and Boardroom Risk Alerts:

Massachusetts Institute of Technology, University of Western Ontario, Deutsche Telekom, Twitter, Apple, Emirates Telecommuni

Read more…

Not all viruses that find their way onto your computer dramatically crash your machine. Instead, there are viruses that can run in the background without you even realizing it. As they creep around, they make messes, steal, and much worse.

Malware today spies on your every move. It sees the websites you visit, and the usernames and passwords you type in. If you login to online banking, a criminal can watch what you do and after you log off and go to bed, he can log right back and start transferri

Read more…

marcus evans will host the 13th Annual Liquidity Risk Management Conference on May 2-3, 2018 in New York, NY. In its 13th year, this exclusive meeting will address key changes and new considerations for revolutionizing liquidity risk by building better models and understanding market impacts. By attending this event, delegates will explore the benefits of integrating oversight controls and frameworks for multiple regulations, reacting to market stress events, contingency planning, and much more!

Read more…

Good vs Bad Surprises

8028265854?profile=originalLast week I wrote about Reframing Risk to find opportunities where no one else is looking. A recent blog by a legend thinker Seth Godin (author of 18 books) put a different spin on this for me.

In his blog Surfing vs Coal Mining he reminds us that unexpected occurrences in surfing are a good thing. Whereas the unexpected in coal mining may mean tragedy. For me Godin’s message is about accepting that you need to take risks. To look optimistically at uncertainty. 

___________________________________

Read more…
Views: 97
Comments: 0

To contract a vendor is to initiate a relationship: when you don’t know who you’re really dealing with, you expose your enterprise to risks that can have enduring consequences.

Join ProcessUnity’s 45-minute webcast on Thursday, February 15, 2018 at 11:00 AM EST and see how forward-thinking organizations are modernizing their vendor onboarding process.

Our team of experts will discuss how to:

  • Eliminate time-intensive admin steps to create vendor information
  • Streamline onboarding processes by engaging
Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead