All Posts (6368)

Sort by

We invite you to hear from leading experts as they address CECL challenges faced by financial institutions.

With CECL posing a significant challenge for the banking industry, advance your preparation by joining two seasoned industry practitioners on our latest webinar on CECL implementation. Our webinar will address a beginning-to-end overview of CECL implementation, starting with a review of the standard, contrasting interpretations of the standard, and the associated challenges. The presenters

Read more…

Here’s a bit of a shock for you: about half of all adult Americans have a photograph stored in the FBI facial recognition database. What’s even more shocking, it is that these photos are being stored without the consent of the individuals. Approximately 80 percent of the photos the FBI has are of non-criminals, and might take the form of passport or driver’s license photos. Furthermore, there is a 15 percent rate of inaccuracy when matching photos to individuals, and black people are more likely

Read more…

Our complimentary Risk Insights Magazine, Issue Three, delves into the minds of senior risk professionals industry wide, containing 30+ articles, interviews and reports on industry trends, changes, challenges and solutions.

We pride ourselves on providing real-life experiences and advice, reports based on intensive industry research and thought-leadership from financial institutions such as: Bank of America Merrill Lynch, Mizuho International, HSBC, Credit Suisse, BNP Paribas, ING and many more

Ad

Read more…
Views: 137
Comments: 0

VEGetables underlie clear thinking

8028258100?profile=originalYou know the saying from your Mum, “You should eat your carrots. They’re good for your eyesight!”.

Carrots are a vegetable and the “VEG” in vegetable is a great acronym for understanding where your blind spots in your thinking come from.

Our blind spots8028258286?profile=original are psychological biases created at the intersection of our Values, our Environment and our Genes. Whenever we are thinking and looking to make a decision, our subconscious is grappling with what is genetically encoded in our brains by nature, what

Read more…
Views: 114
Comments: 0

Are you Directorship material?

What's your area of expertise?

 

Do you have a desire to support exciting new companies?

 

Are you an expert in your field or a professional in the legal, accounting, commercial or investment banking / venture capital industries?

 

Are you ready to elevate to the next level of professionalism?

 

We’ve been capitalizing start-up or early stage companies since 1998 and have many exciting opportunities you may want to consider. If you think you may qualify, please go to https://www.SprocketNetwork.com  and

Read more…

I’m writing to invite you to webinar titled “ Mastering Operational Risk. Theory and Practice in a single package” on June 27 at 10:00am EST / 15:00 BST

Join me and our guest, Calvin Lee, Operations Director at RISKID, for a lively discussion as we aim to dispel confusion surrounding many of the elements of the Operational Risk framework.

This webinar is designed for both current students of the “Mastering Operational Risk” online course and for other busy risk professionals who are interest

Read more…

Blind Spots are Black Spots

8028258898?profile=original

Last week I blogged about 4 wrong questions that I saw organisations trying to answer and wasting opportunity while doing so. Why did they do so? Why do we not always kick the goals we plan on kicking?

One very big answer is that we all have blind spots. They are inherent biases and research tells us that for complex decisions on a daily basis, our error rate is 15%. If we are talking decisions around “big” strategies, our error rate is 40 to 50%. Blind spots hurt us badly.

8028259287?profile=original

Let me tell you a story

Read more…
Views: 94
Comments: 0

Getting Owned or Pwned SUCKS!

A well done New York Times article recently re-introduced this topic to the masses. Being “owned” isn’t new, but the term is not becoming part of popular culture. If you use the internet or are often on social media, odds are good that you have been OWNED. Whether you are called out for a misspelling on your latest Facebook post, or you were proven wrong after sharing a “fact” or post from another site…you have probably been owned.

The word “owned” comes from the hacker world, and real “ownage” i

Read more…

4 Wrong Questions

8028257459?profile=original

Last week I blogged about a strategy being nothing but a hypothesis. It quickly became one of my most popular blogs. In it I stated that the biggest single failure of a strategy is because management is trying to answer the wrong question.

This week I thought I’d give you a sample of 4 wrong questions which I’ve come across in my role as workshop facilitator to prompt you to answer the right question: - 

  1. Medium-Size Office Equipment Supplier – This executive team had been trying to answer, “How do
Read more…
Views: 74
Comments: 0

Interview of Chuck Brooks, Judge of GSN Homeland Security Awards, on Key Homeland Security, Cybersecurity, and Technology Issues for 2017

Government Security News (GSN): Chuck, Thank you again for judging our most recent and very successful awards event.

It was my real pleasure. Each year I am more and more impressed with the capabilities of the company submissions for best solutions. They are all top notch and at the innovative edge of security technologies. It also reassuring to review many of t

Read more…

8028258874?profile=originalAt lunch recently, I opened my fortune cookie and found this message inside: “Any journey must begin with a single step, and you can be the one to take it.” That simple message inspired me to write this blog.

Events taking place after the Trump administration withdrew from the Paris climate agreement have demonstrated there is more than one way to get things done.

A few mayors throughout the country individually decided to take action. Now, the movement has blossomed, and more than 200 mayors, sev

Read more…

Even if you don’t realize it, your identity is all over the internet. Whether you posted to an internet forum in 1996 or you ever had a MySpace page, this information is still out there, and you have to protect it. Here are some simple and easy ways that you can protect your digital life:

  1. Change Passwords – The first thing you should do is make sure you are regularly changing passwords. Make your passwords difficult to guess, and a mixture of letters, numbers, and symbols. Also, make sure that yo
Read more…

SANS has recently published its annual security awareness report (click on the link for a copy). Key is the concept of ‘security awareness’, which when combined with their Security Awareness Maturity Model provides a pathway to improved cyber security by managing the organizations cyber security culture.

Sound familiar? It should as that has been my message for years and is integral to my approach and courses. All the cyber security technology is worthless if the organizations cyber security cult

Read more…

Here's Why Compliance Solutions Are Inadequate for Managing Regulatory Changes

Regulatory compliance is mandatory, but it’s not the end goal; it’s the minimum operating standard. For strong companies, compliance is a mere byproduct of performing well and managing uncertainty. Compliance solutions can also cause difficulties in the face of domestic political risk, which includes significant fluctuations in the regulatory environment.

The biggest differences between regulatory compliance and risk ma

Read more…

A strategy is but a hypothesis

8028260492?profile=original

I have facilitated countless workshops for executive teams. Sometimes we kick goals because the exec team have done their homework and really know their business and the challenges they face. They have done enough of the hard-smart work to know what they need to tackle and now they are working through the options and determining the best path forward.

Then there are the ones that have not done their homework. The formation of strategy appears based on hope or even wish rather than facts and consi

Read more…
Views: 76
Comments: 0

Hire an Ethical Hacker NOW!

You might think it’s crazy to actually hire a hacker, but if you don’t have an ethical hacker on your security team, you could be playing a dangerous game.

Ethical hackers are called “white hat hackers” and are legal hackers, that help businesses find security problems in their networks. Developer and security teams, who build out codes, should have a white hat hacker on their side. This way, they will know from the start if the code is vulnerable. This is also known as “application security”.

How

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead