All Posts (5613)

Sort by

A Banker’s Guide to create a process based operating model and an insight into methods that would reduce transaction costs, increase productivity and minimise operational risks.

Key Features

  • Banking Processes Management 
  • Analysis of Case studies of Operational Risk Incidents.
  • Usage of tools for improving Operational Efficiency, with Case Studies.
  • Collection of relevant wholesome operational data at the granular level is explained by analysing Risk Incidents and providing Risk & Control Monitoring exa
Read more…
Views: 103
Comments: 0

According to QuickBase CEO, Allison Mnookin, “The low-code market has finally arrived.” Citizen development is helping enterprises slash IT backlogs and is empowering business users to build self-service solutions, particularly in the governance, risk, and compliance space.

When it comes to customizing and developing applications, it is often a catch-22. It can be difficult to get feedback without a prototype, yet you don’t want to develop a mockup until you understand exactly what the requiremen

Read more…

If your computer password contains the name of your dog, your favorite vacation spot, and an easy-to-remember numerical sequence, then you are breaking some basic rules of password safety. Even though “BusterBermuda789” might seem impenetrable to you, this is a password security experts say is vulnerable.

Here are five things to know about passwords:

  • A long, strong password goes a long way in helping prevent hacking.
  • Every account should have a different password.
  • A hacker’s password-cracking softwa
Read more…

  • The book examines the issues of Money Laundering and Financing of Terrorism.
  • It analyses 155 money laundering case studies, examines the impact of money laundering in 10 countries and elaborates on the three well known financial crises.
  • It looks at the risk holistically by examining the risks within each sector of the eco-system (for example: the election system, bank, hawala, real-estate) and also at the National level.
  • The applicable United Nation resolutions and FATF recommendations are explaine
Read more…

Set Privacy on these Social Media Apps

Just like older generations never thought that the dial phone in the kitchen could be dangerous (think phone scams), today’s kids don’t have a clue how hazardous smartphone apps can really be. They are a godsend to pedophiles, scammers and hackers. And let’s not forget other kids who just want to be cruel bullies.

Parents should have informative discussions with their kids about the various apps out there. And it’s okay to forbid particular apps you aren’t comfortable with. Like Musicly, search “

Read more…

The nature of risk has evolved in recent years, driven by advances in technology and an increasingly fraught geopolitic climate. In an age of globalization, companies must be aware of all major incidents across the world, as there are very few that will not have at least some kind of impact on larger companies.

Ownership of risk management is, however, often difficult to determine, and people seem unclear who is responsible. The role of the CFO has changed in recent years, and they have become es

Read more…

Cane

  • If you use a cane, take “cane-fu” classes if possible. Yes, it’s a thing.
  • A sturdy cane with a strong handle works best.
  • Do not assume you can fight with a cane just because you need one to walk.
  • Avoid a cane with a hidden knife or sword unless you specifically train to fight with a blade.
  • A person’s first instinct with a cane-like device for self-defense is to wield it in a horizontal path as though swinging a baseball bat. This is wrong, as it can easily be seen in progress by the person you’r
Read more…

First, let’s define Value Proposition.  Here’s what Wikipedia has to say:

A value proposition is a promise of value to be delivered and acknowledged.  Creating a value proposition is a part of business strategy. Kaplan and Norton say “Strategy is based on a differentiated customer value proposition. Satisfying customers is the source of sustainable value creation.”

Why is having a clear and compelling Value Proposition so important?

  • It solves a customer problem or satisfies a customer need.
  • It is th
Read more…

Risks while determining Pre-hire Talent Assessments as Part of a Predictive Talent Acquisition Strategy

Greta Roberts, CEO

Talent Analytics, Corp.

16-July-16

Over the past 30+ years, businesses have spent billions on talent assessments. Many of these are now being used to understand job candidates.  Increasingly, businesses are asking how (or if) a predictive talent acquisition strategy can include the use of pre-hire assessments?  As costs of failed new hires continue to rise, recruiters and hiring

Read more…
Views: 47
Comments: 0

The words “data breach” are often met by a clamor whenever they make headlines. Home Depot, Target, Ashley Madison, Heartland, Citibank, the list goes on and on. These breaches spent time in the limelight because of their magnitude; they affected hundreds of thousands – in some cases millions – of cardholders.

powerful-ERM-software-500x350.png?width=250But the reality is data breaches are far more common than large headline events like these would have us believe. According to a report published by the Identity Theft Resource Center, ther

Read more…

Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail.

How a hacker circumvents two-factor authentication:

  • First collects enough information on the victim to pull off the scam, such as obtaining information from their LinkedIn profile.
  • Or sends a preliminary phishing e-mail tricking the recipient into revealing login credentials for an account, such as a bank account.
  • The next phase is to send out
Read more…

Don’t just be a colour-ineror

When I was a wee kid working on a group project, we would always ask “Who is going to be the colour-ineror?  Well just last week a friend of mine reminded me of the term when I was listing support functions that sometimes struggle to make a difference to the business. 

I was listing finance, HR, IT, risk, compliance, audit and then said, “Even people in sexier functions like in marketing.” …  BANG, she pounced.  “You mean the colouring-in department!”  In her experience working on both sides of t

Read more…
Views: 91
Comments: 0

Looks like there’s some worms in Apple.

Not too long ago, dozens and dozens of iPhones were stolen from two Apple stores. How could this happen, what with Apple’s security? Simple: The thieves wore clothes similar to Apple store employees and obviously knew the innards of the stores.

They sauntered over to the drawers that held the new phones, acting nonchalant to avoid attracting attention. In fact, a new face in Apple attire at one of the stung locations wouldn’t raise eyebrows since new employe

Read more…

A ransomware attack is when your computer gets locked down or your files become inaccessible, and you are informed that in order to regain use of your computer or to receive a cyber key to unlock your files, you must pay a ransom. Typically, cybercriminals request you pay them in bitcoins.

The attack begins when you’re lured, by a cybercriminal, into clicking a malicious link that downloads malware, such as CDT-Locker. Hackers are skilled at getting potential victims to click on these links, such

Read more…

The Dark Web, according to LeakedSource, got ahold of 33 million Twitter account details and put them up for sale. Twitter thus locked the accounts for millions of users.

Twitter, however, doesn’t believe its servers were directly attacked. So what happened? The bad guys may have created a composite of data from other breached sources. Or, they could have used malware to steal passwords off of devices.

Nevertheless, the end result meant that for many Twitter accounts, there was password exposure—l

Read more…

Interview with Marsha Hopwood, Director, Operational Risk Management and Risk Governance, Allianz Life

 

New rules and regulations have proliferated across the financial sector, with no end seemingly in sight. Along with fast-paced technology, stirring more competitive pressures than ever; it is essential for banks and financial institutions to instill sound management to properly oversee and control heightened risks.

 

Marsha Hopwood, Director, Operational Risk Management and Risk Governance at All

Read more…
Views: 153
Comments: 0

Interview with Erin Straits, Senior Vice President, Director, Vendor Risk Management, Fifth Third Bank

 

Third party risk management continues to grow as an area of increasing concern for institutions, as the increased digital environment and several high profile incidents highlight the importance of strong third party risk practices.  Despite strong advances in this area, institutions still need to further enhance their third party programs to ensure they add value to the business. Financial inst

Read more…
Views: 122
Comments: 0

Facebook CEO Password dadada hacked

If you’ve heard this once, you need to hear it again—and again: Never use the same password and username for more than one account!

If this got Mark Zuckerberg’s (Facebook’s chief executive). Twitter account hacked, it can get just about anybody hacked.

A report at nytimes.com says that the OurMine hacking group takes credit for busting into Zuckerberg’s accounts including LinkedIn and Pinterest. It’s possible that this breach was cultivated by a repeated password of Zuckerberg’s.

According to OurM

Read more…

An impostor posed as Lorrie Cranor at a mobile phone store (in Ohio, nowhere near Cranor’s home) and obtained her number. She is the Federal Trade Commission’s chief technologist. Her impostor’s con netted two new iPhones (the priciest models—and the charges went to Cranor) with her number.

In a blog post, Cranor writes: “My phones immediately stopped receiving calls.” She was stiffed with “a large bill and the anxiety and fear of financial injury.”

Cranor was a victim of identity theft. She conta

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead