MarketsandMarkets has published a new report that states that the global vendor risk management market is expected to grow to significantly by the year 2022. The report divides the market by component (solutions vs services), deployment type, organization size, industry segments and region to define the market growth opportunity. MarketsandMarkets is a B2B research firm that employees 850 full-time analysts to track high growth global markets, providing market sizing and strategic advice and for
All Posts (6269)
Introduction
In a conventional security thinking, IT Security at most of the enterprises follow old ‘Industrial Security Model’ where its considered that assets are held within a perimeter and users must enter the perimeter physically or logically (LAN/VPN) to access the assets and the perimeter is guarded by a gatehouse / guard. In other words, this model is called perimeterised computer network where data and applications is attached to the network and is protected by firewalls with access lis
The definition of criminal identity theft is a crime where the criminal impersonates the victim in order to protect their innocence. This can lead to victims getting fines or even getting arrested and charged for crimes they did not commit.
How Does This Happen?

There are a number of ways that a criminal can pull this off, and it generally occurs when the thief steals someone’s identity. This is true and pure identity theft, often involving a drivers license with the thieves picture and the victim
C-suite Digital Disruption Risk Alerts: Building a bridge between your products and services and the digital transformation journey of your C-suite and your customers’ C-suite
SIMMETHOD new digital transformation algorithms and metrics found that your risk of being disrupted is proportional to your gap to the SIMMETHOD Best In Class and linking your products and services to the SIMMETHOD 7 Laws of Growth, Value Creation and Digital Transformation, Best In Class profiles and C-suite Risk Alerts pr
I recently created a course on the Global Risk Academy outlining the requirements of GDPR (https://globalriskacademy.com/p/gdpr ). My objective was to guide organizations, other than those in the EU, to understand what they need to do to be GDPR compliant. Having immersed myself in the GDPR I came to realize it represents a quite different perspective on cyber security than currently embraced by many cyber security professionals in the US.
The GDPR explicitly places privacy security requirements
Hello, ladies and gentlemen! Welcome to our live discussion about crisis leadership. Today, we have our interview with Caroline Sapriel. Caroline is our member and managing partner at CS&A International, a leading global risk and crisis management firm. She is an experienced international crisis resilience professional with over 25 years of experience in risk, crisis and continuity management. Additionally, she has an extensive expertise in crisis communication. Caroline coaches senior executiv
Here we are. February 2018. For many, February is a trying month. How well are those New Year’s resolutions holding up? Have the early-morning January gym visits started to fade? Are salads getting old? Personal goals aside, here’s one thing we hope won’t decline: the excitement over your freshly finished 2018 budget.
The new year tends to bring about an intense wave of optimism for what we can accomplish in the next 12 months. Too often, however, this optimism gets stomped on by the surprises of
A great stat in this blog by Brent Hodgson – He can count five or maybe ten true “disrupter” start-ups over recent years out of 32,439 start-ups in AngelList’s directory. And we all know the overall success rates of start-ups. It just shows how fixated we are on shiny things. It’s why CEOs are way more likely to buy strategy or marketing advice than risk and compliance.
It’s also why, if you want to be able to influence the CEO, it is best to bring your message about a non-sexy topic in a sexed-u
The Ponemon Institute released a shocking statistic: about 80% of all corporate data leaks is due to human error. In other words, it only takes a single staff member to cause a huge issue. Here’s a scenario: Let’s say that you have an employee, Betty. Betty is lovely. We love Betty. But when Betty is checking her personal email during her lunch break and sees she has an offer that promises a 10-pound weight loss in only a week, she clicks the link. She wants to learn more about it, so she clicks
How to Measure the Business Value and Success of Your Digital Transformation? Towards new crowd-sourced, holistic and industry-agnostic metrics of strategy execution to improve your 2018 predictions and the success of your digital transformation
The following is a selection of companies that recently consulted SIMMETHOD’s Strategy Execution C-suite and Boardroom Risk Alerts:
Massachusetts Institute of Technology, University of Western Ontario, Deutsche Telekom, Twitter, Apple, Emirates Telecommuni
Not all viruses that find their way onto your computer dramatically crash your machine. Instead, there are viruses that can run in the background without you even realizing it. As they creep around, they make messes, steal, and much worse.

Malware today spies on your every move. It sees the websites you visit, and the usernames and passwords you type in. If you login to online banking, a criminal can watch what you do and after you log off and go to bed, he can log right back and start transferri
marcus evans will host the 13th Annual Liquidity Risk Management Conference on May 2-3, 2018 in New York, NY. In its 13th year, this exclusive meeting will address key changes and new considerations for revolutionizing liquidity risk by building better models and understanding market impacts. By attending this event, delegates will explore the benefits of integrating oversight controls and frameworks for multiple regulations, reacting to market stress events, contingency planning, and much more!
Last week I wrote about Reframing Risk to find opportunities where no one else is looking. A recent blog by a legend thinker Seth Godin (author of 18 books) put a different spin on this for me.
In his blog Surfing vs Coal Mining he reminds us that unexpected occurrences in surfing are a good thing. Whereas the unexpected in coal mining may mean tragedy. For me Godin’s message is about accepting that you need to take risks. To look optimistically at uncertainty.
___________________________________
To contract a vendor is to initiate a relationship: when you don’t know who you’re really dealing with, you expose your enterprise to risks that can have enduring consequences.
Join ProcessUnity’s 45-minute webcast on Thursday, February 15, 2018 at 11:00 AM EST and see how forward-thinking organizations are modernizing their vendor onboarding process.
Our team of experts will discuss how to:
- Eliminate time-intensive admin steps to create vendor information
- Streamline onboarding processes by engaging
An interesting post for anyone talking internally with their team on building a homegrown solution versus purchasing a solution to streamline Third-Party Risk Management. Of course, it's written from the perspective of a software vendor (that's what we do) but the benefits of having a voice in the discussion of what goes into the next generation of a product as a customer in a community of like-minded individuals or knowing that multiple times a year new features will be added can influence this
Inspire, Enable, Engage, Empower Your Workforce as Never Before and take your Leadership Team toward Becoming Strategic Leadership
Dr. Ted Marra
Professor Dr. Emeritus, Strategic Leadership, Cotrugli Business School
Sr. Partner, Insights Paradigms
The author of the popular online course: Becoming the Strategic Leader in 6 weeks by Cultivating Your Strategic Thinking
Background
For some years now I have watched organisations around the world talking about how their employees are their greatest asset, y
What is a credit freeze? It’s an action you take to lock down your credit report. A lender can’t see your score, which means your Social Security number and credit rating is useless to them. In other words, they can’t tell if you are risky or not.

When an identity thief can access your ID aka Social Security number, they can also create credit in your name. However, if your credit file is frozen, the bad guys can’t access it any longer. With a credit freeze, your credit file is inaccessible.
To ge
Security experts are observing a rising level of malware strains, which are trying out the Spectre and Meltdown vulnerabilities.
As reported by the researchers from Fortinet, AV-TEST, and Minerva, a number of crooks test the publicly available proof-of-concept (PoC) computer code for the Spectre (CVE-2017-5715, CVE-2017-5753) and Meltdown (CVE-2017-5754) vulnerabilities.
AV-TEST experts have identified 119 virus samples, which are linked to the above-mentioned chip vulnerabilities.
Virus samples d
By Daniel Nunes-Vaz, Senior Research Executive, Center for Financial Professionals.
In recent years operational risk has grown as a discipline and is now viewed as an integral aspect of any risk management department. This is predominantly a consequence of the most recent major financial crisis where the management of operational risk was partly blamed as a significant contributory factor in the collapse of global markets. Since then, the risk management and operational risk landscape has chang
Did you know that according to research every year 2 million individuals enter leadership positions and 60% fail?
According to Dr. Ted Marra, most often the root cause is a failure to think strategically.
Research says most executive development is disconnected from the real needs of the organization and those who must lead it.
Learn what it takes to transform yourself to become a Strategic Leader.
1. What are the certain actions performed by Level 5 leaders which separate them from the rest o