All Posts (5854)

Sort by

8028252456?profile=original

Three Key Ideas Shaping the Future of Innovation

Source:

Innovation@ Work Blog, MIT

Your company’s key innovators are, most likely, your consumers

The wave of technological innovation we are currently riding has brought us wearable computing and 3D printing, with products like Google Glass and Nike Fuelband becoming the stars of recent tech conferences, including May's All Things D. Continually fueled by the question “what’s next?,” product innovators leave no stone unturned in their quest to produc

Read more…

8028232695?profile=original

Source:

Ellen Brown

Web of Debt

16 September 2016

Several central banks, including the Bank of England, the People’s Bank of China, the Bank of Canada and the Federal Reserve, are exploring the concept of issuing their own digital currencies, using the blockchain technology developed for Bitcoin. Skeptical commentators suspect that their primary goal is to eliminate cash, setting us up for negative interest rates (we pay the bank to hold our deposits rather than the reverse).

But Ben Broadbent, Deput

Read more…

How to digitally detox on Vacation

Many years ago when you were on vacation, before Facebook, Instagram and Twitter were invented (assuming you were an adult then), you had a great time, right? You weren’t “connected,” because there was no social media to be connected with.

If today you can’t imagine being disconnected from social media while on vacation, ask yourself how this can be, if years ago, you never missed what had not yet been invented.

And what about constantly checking e-mail while on vacation? Or constantly perusing va

Read more…

Effects and Lessons from Wells Fargo

Wells Fargo, till recently, had earned itself a good reputation as a financial institution mainly due to the fact that it escaped from the Recession largely unscathed. That has come under huge scrutiny with the latest scandal that has hit the bank. It has been accused of creating 2 million fake account in the form of bank account and credit cards in the name of existing customers. This was mainly done to increase the commissions that the employees would earn for bringing in new accounts and meet

Read more…

3 OpEx Pillars for Insurance Firms

Ahead of the Operational Excellence for Insurance summit in Hartford, Connecticut, October 17 - 19, 2016, we’ve brought together three thought leaders to detail a key pillar OpEx best practice each to successful operational excellence and transformation.

Three thought leaders detail a key pillar of OpEx best practice each.

PILLAR 1: Creating the Right Operational Excellence Framework - John Martino (Aetna)

PILLAR 2: Communicate Change Management Enterprise-wide - Angie Kennard (Marsh)

PILLAR 3: Stri

Read more…

Predators use Emojis to target Kids

Who’d ever think those silly little yellow circular faces and other such cyber symbols would become such a worldwide smash? I’m talking about emoticons, also known as emojis. Five years ago Apple put an emoji keyboard on its mobile devices. Six billion of these doggone things are sent every day.

But a story at kdvr.com says this isn’t as innocent as it seems.

The story mentions Sheila Allison and her 12-year-old who regularly communicate via emojis. For instance, Allison’s job means she’s not home

Read more…

I remember my days running chemical plants for what was then ICI. I was a shift supervisor on the PA Plant at Rhodes. It is now a major shopping and residential apartment area. The world progresses and so have I. I hope you have too and you have become more a puller than a pusher.

When you run a continuous process chemical plant, the money is in keeping it online 24/7 and running as close to maximum production as you can. However, just like we need a holiday, the plant needs downtime. The annual

Read more…
Views: 148
Comments: 0

As customers demand more, the insurance industry has to listen or lose out. An effective voice of the customer programme (VoC) will not only create an environment for continuous improvement, but also provide a competitive advantage in an increasingly crowded market. With more insurance companies conducting their own customer research, PEX Network spoke to Lisa Schilling, Vice President, Health Care Performance Improvement, Kaiser Permanente, about bringing the voice of the customer into the hear

Read more…

Ahead of the 3rd Annual Operational Excellence in Insurance, the PEX Network caught up with key speaker Allstate's CI Methodology Lead, Howard Grunwell to get a snapshot into how the company is responding to customers' changing expectations and transforming the customer experience.

Download the full interview here

To uncover more tips, tactics and ideas about operational excellence and transformation, plus hear more from Howard and our expert speaker faculty, join us at the 3rd Annual Operational

Read more…

Who is attending OpEx Insurance 2016?

The response from the market to this timely meeting has been exceptional, with a number of the most senior Opex insurance professionals confirmed to attend.

If you’d like to see the full list of attendees please download here.

This is the only conference that takes a deep dive into the operational challenges facing the Insurance Industry. With new entrants and changing customer expectations on one side, and decreasing investment returns on the other, Insurers must make a choice: innovate or fall b

Read more…

Are You Ready for Digital Transformation?

Digital transformation means providing all our clients the possibility to interact with us via the channel they want, when they want. As a client experience leader, we will follow the client journey across all interaction channels”

You think you are ready for the digital transformation, but do you have the right foundation in place? Having a clear performance framework is the starting point for a successful digital transformation journey.

Ahead of the PEX Network’s 3rd Annual Operational Excellen

Read more…

What does Cyber Security Information look like?

  • New threats:
  • A Leading indicator of Risk...Threats are all around us, why count them?
    • What haven't we seen before -what we don't know can hurt us
    • Are new threats arriving faster?
    • Is the pattern normal?
  • Security backlog:
  • Identify - Protect - Detect - Respond - Recover...Repeat!
    • A workload measure - how much work is there for my security operations team?
    • Is the "haystack" of events becoming overwhelming?
    • How well is the capacity of my team being utilized?
  • Defen
Read more…
Views: 143
Comments: 0

Five key areas of risk in related to CLM:

  • Can you quickly search, locate and track your agreements or report on key data points?  (On average, companies use 5% of their revenue as costs of CLM)
    • Secure, central repository
    • Capture contract type centric data
    • Report on key data points
  • Key dates and obligatiions
    • Proactive email alerts.
    • Action item tracking.
    • Calendars and to do lists.
  • Business rules and compliance
    • Create business rules and workflows.
    • Analyze requirements and KPI's.
    • Uncover bottlenecks while impro
Read more…
Views: 89
Comments: 0

Internal Audit (IA) is uniquely positioned to use its cross functional / external perspective to provide strategic guidance to the business while balancing the need to perform its traditional work.

Align IA with the most significant business risks:

  • Lead the enterprise wide business risk assessment focused on business risk, not solely financial statement or auditable risks.
  • Keep the business risk assessment refreshed with emerging risks and business changes.
  • Set the audit plan to address highest pote
Read more…
Views: 107
Comments: 0

The Here and Now:

Cyber-attacks

Regulations

Around the Corner:

Talent avaialbity

Fiscal crises, sustainability demands and social instability

On the Horizon:

Climate change, water crises, large scale involuntary migrations.Emerging technologies

Strategy is about making choices.  Think about:

What creates Value in your organization?

How is value Captured?

How is Strategy set, communicated and executed?

What is the actual Attitude towards risk management?

Does the organization's Culture support a strategic ris

Read more…
Views: 103
Comments: 0

Another Successful Ransomware Attack

Ransomware thieves sure know how to pick their victims—institutions that store loads of highly critical data that they need on a daily basis, that without—even just 24 hours without—can have crippling effects. This form of cybercrime is growing by leaps and bounds.

Recently a ransomware attacker struck the network of the University of Calgary. An article at arstechnica.com says that the institution’s IT experts have made some headway in isolating the ransomware infection and making some restorati

Read more…

Technology / Cyber Threat Detection:

Solution:  Software that aids in detection that is sophisticated, bidirectional, real time and predictive.


How do we gauge the solution's efficacy?  Look at a number of solutions and triangulate among them; look at number of actual events versus false positives.  

Lessons learned:
Detection:  Data vs intelligence
Accuracy:  No or minimal false positives
Accountability
Actionable
Simple and Customizable Rules Management
Response time and SLA

Read more…
Views: 81
Comments: 0


Last year, we blogged about how to develop a successful ERM program. An important goal is fostering a risk-based company culture. This means everyone, not just the appointed risk managers, assimilates risk awareness and works it into their job description. That said, there are many factors that contribute to a healthy, risk-managing culture.

One of those factors is board support. We often stress that “front-line” employees (who oversee everyday activities) are a vital yet often overlooked resour

Read more…

If you have a strong password for your Amazon account, you may still want to consider beefing up the security with two-factor verification (or authentication), which will prevent a thief from accessing your account (which is possible if he gets ahold of your password and username somehow).

2D

  • Log onto your Amazon account.
  • Have your mobile phone with you.
  • Click “Your Account.”
  • Scroll down where it says “Settings—Password, Prime & E-mail.”
  • Click “Login & Security Settings.”
  • Go to “Change Account Settings”
Read more…

8028248460?profile=originalI recently authored a whitepaper for the Society of Actuaries 2016 Risk Symposium, exploring the strategic value of risk management.

Here is the Abstract:  

Many top-performing businesses aren’t just risk aware, but rather risk intelligent. Such a posture helps prepare companies for a major event and can demonstrate to a regulator or auditor that an appropriately strong control framework is in place.

Better still, companies gain real strategic value from a “risk adjusted” understanding not only of

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead