All Posts (5984)

Sort by

The role of strategic advisors

Have you ever thought about the role strategic advisors such as accountants, lawyers, risk managers, auditors, HR managers, IT managers and many other back of house advisors play in the success of organisations? I mean really thought about it? You probably have.

If you are a strategic leader receiving the advice you have probably thought about the need for key expertise and advice that you can rely on. Key elements required to develop trust in the relationship.

If you are a strategic advisor you h

Read more…
Views: 63
Comments: 0

Your account passwords should be as unique as your fingerprint—to make them less hackable by crooks using password-guessing software that can run through millions of possible combinations in just minutes. And if you have an easy password, there may be a hit within 10 seconds.

Think this software can figure out your password of “password1” or “monkey”? These are among the most used passwords. Needless to say, so is “1password” and just “password.” And “login.” What are people thinking?

Every year,

Read more…

A few decades ago, faculty members at the University of Michigan were researching the major indicators of effective organizational performance.  What came from this research was an incredibly useful model for organizing and understanding a wide array of organizational (and individual) topics.  These include theories on Organizational Effectiveness, Corporate Culture, Leadership Competencies, Stages of Life Cycle Development, Financial Strategy, among others.

This model is the Competing Values Fra

Read more…
Views: 463
Comments: 0

The Theory of Constraints (TOC) is a methodology for identifying the most important limiting factor—i.e. constraint—and systematically improving it.  It was developed by Dr. Eliyahu Goldratt, introduced in 1984 book, The Goal.

TOC differs from traditional management views, in that traditional methods seek to make improvements throughout the organization.  They divide the organization into smaller, more manageable pieces.  The objective, thus, is to maximize the performance of each part, resulting

Read more…

Scareware Scam almost snags Victim

Cybercriminals know that the best way to get their claws on the next victim is to appeal to their emotions, not logic.

There’s lots of scary things in life, and one is learning that your computer has been infected with a virus. If this happens, you’re now vulnerable to spending money on getting rid of the malware. The tactic of scaring users is called scareware.

  • A pop up tells you “Warning! Your Computer Has Been Infected with Malware!”
  • The pop-up can be triggered by visiting an infected website or
Read more…

In challenging markets with stringent regulations, Customer-Driven Derivatives business goes on, someone somewhere has to earn bread. Practitioners including risk managers need to grasp the full picture, from models to products, from risk features to hedging, regulatory requirements to economic values.

Understanding and managing risks is a common denominator across trading, quantitative modelling and risk management. Financial institutions must optimise to stay competitive or alive.  My new book

Read more…

The world is undergoing a data revolution. We are in the midst of the Quantified Self and real time personal data and performance measurement.

With smart devices we can now track our movements, monitor food intake and measure changes in physical performance. With measurement comes insight (and a change in behaviour). We can better understand what drives us, modify our eating and sleeping patterns and enhance our performance in any given activity.

How can the banking industry apply the concept of Q

Read more…

You Have a Great Idea and Nobody Cares

8028243872?profile=original

Harvard i-lab | You Have a Great Idea and Nobody Cares

 

Published on Jul 1, 2014

You have a great idea and nobody cares: How to figure out who cares and how to get them to buy from you.

Join Richard Banfield for this workshop, which will give you the essential tools to identify who your customers are and what the various touch points will be along their journey with your product or service. These tools are the same tools used by leading design-driven companies like Apple, Google and Dyson to develo

Read more…

Can the cloud be trusted?

Most people have heard of storing information in “the cloud,” but do you know what this means, and if it is even safe?

A cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The cloud is made of millions of servers across the globe and most are owned by private or public corporations. Many of those corporations are diligent about security, and you are likely using the cloud whether you know it

Read more…

My EMV for a Week Challenge is DONE!

This week I worked with Gemalto, as part of Gemalto’s #ChipAwayAtFraud campaign. I was tasked with using my “chip” card when making a bunch of every day purchases like getting coffee and shopping. Gemalto, one of the world’s leaders in digital security, wanted a real-world take on the EMV card experience, which includes the security benefits EMV cards presents. You know EMV; it’s the “chip” credit card that, by now, you should have.

Here’s what I learned:

A significant portion of the retailers I f

Read more…

Evidence is mounting that it is no longer an option to ignore investments in this important organizational capability. Companies need a rigorous enterprise risk management framework to effectively compete in today's uncertain environment. To help companies understand why they need ERM, here's an excerpt from my take on how enterprise risk management enables the business to move faster and overcome disruption:

The wider adoption of strategic risk management cannot come fast enough to save everyone

Read more…

8028240691?profile=original

Enrique Suarez Presenting:

 

When Selling is the Worst Way to Win Customers

 

By:

David Skok

Customers hate being sold to. They don’t mind getting expert help when they want to buy something. But much of the time they are not ready to buy, and one of the most irritating things is to have a salesperson try to get them to buy when they aren’t ready. Unfortunately too many people in marketing and sales positions don’t seem to understand this, and proceed to irritate their potential customers. They don’t

Read more…

8028247267?profile=original

Do you know your Customer? Buying Cycle & Triggers

 

Enrique Suarez Presenting:

David Skok

Founder of For Entrepreneurs

This article written by David Skok looks at why customers expect different interactions with you depending on where they are in the buying cycle. It also examines how specific events trigger them into a buying mode. It then explains how you can use this information to make your marketing more effective.

The Customer Buying Cycle

A simple way to look at the buying cycle is to break int

Read more…

Why Are Cyber Hucksters so successful?

Often, hucksters prey on the consumer’s desperation, which is why it’s no surprise that the No. 1 rip-off (at least between 2011 and 2012)) was bogus products promising weight loss.

VICE (vice.com) interviewed psychologist Maria Konnikova about how cyber cons are so successful—even with the most ridiculous sounding bait (Nigerian prince, anyone?).

The bait becomes more attractive when the target is receiving an influx of cyber attention. Sad to say, this trips up a person’s rationale, making them

Read more…

FINRA’s Risk Management Priorities for 2016

8028239900?profile=originalThe Financial Industry Regulatory Authority (FINRA) releases an annual letter outlining its Regulatory and Examination Priorities for the upcoming year. In line with letters and rules from other regulatory bodies such as the SEC, NAIC, and FFIEC, the 2016 FINRA Priority Letter puts the spotlight on risk and control management. What, specifically, are the FINRA priorities of the year? Among other things, “FINRA will focus on the frameworks that firms use to develop, communicate and evaluate confo

Read more…

A Great Set of Three Questions to Ask

I heard these questions on ABC Radio (that is the Australian Broadcasting Corporation) recently. How are these for three great questions you can ask to help you make a decision?

1. What are my options?
2. What is the chance this will benefit me?
3. What is the chance this will harm me?

These were attributed by Dr Norman Swan of the Health Report to some research his partner and others were doing. The research showed that these three questions to your doctor result in much better outcomes. The theo

Read more…
Views: 89
Comments: 0

8028245697?profile=original

Learn the Most Advanced Business Strategy in the World

 

The Delta Model: Putting Customers before Products

 

Presented by:

Enrique Suarez

 

http://www.wix.com/suarezenrique/delta

For many years the ultimate goal of strategy has been to achieve a competitive advantage. Organizations have operated more or less as if they are at war with one another, vying only to offer the superior product. But with the interconnection made possible by the Internet and other new technologies, it is clear that this approa

Read more…

How to protect against Tax Identity Theft

What are you doing to prevent tax identity theft? Do you even know what steps to take? You’d better, because this crime has tripled since 2010, says the FTC.

A report on foxbusiness.com describes tax identity theft as the act of stealing someone’s personal information, then the crook files a phony tax return in the victim’s name to get a refund. The victim will never see it in their mailbox. And that’s only the beginning of the victim’s problems.

First, your complaint that you didn’t get your chec

Read more…

Conservative estimates of GRC software implementations place the cost at either $200,000 or 50% of total licensing costs, whichever is greater. Even when initial costs are low, many vendors make up for apparent price reductions with professional services, or customizations, required to make the product work. Professional services are so ingrained in the software landscape that many organizations now consider them a necessary evil if they are to reap the benefits of GRC.

But you shouldn’t be payin

Read more…

Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on.

What does it all mean? Companies must take extra precautions to ensure that sensitive data doesn’t get into the wrong hands.

Protecting your data

Fortunately, there are several steps that a business owner can take to protect the infor

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead