All Posts (5614)

Sort by

How Hackers use LinkedIn to Scam

Hackers love LinkedIn because it links them in—straight through the portal of the targeted company. Geez, how much easier could this be, what with all the publically-exposed e-mail addresses of key players (and also worker bees) in big companies that someone wants to hack.

An article on blog.sungardas.com was written by a white-hatter (his job is to try to hack his clients’ systems so that they know how to make them more impenetrable to the bad guys). The author says he’d make a beeline to Linked

Read more…

Chief Compliance Officers & Heads of NERC/FERC Compliance from Utilities professionals will join together to share fine-tuning concepts and complexities to build understanding for upcoming audits

 

Washington, DC– May 12, 2015 marcus evans, the world’s largest event management group, will host the Risk Based Compliance and Reliability Assurance for Utilities Conference on August 25-27, 2015 in Washington, DC. This premiere meeting will provide Industry leaders with insight into the recent launch

Read more…
Views: 94
Comments: 0

How Employers or Parents Spy

Disgruntled employees act out in lots of ways. A guy I knew who hated his boss “played” on his work computer all day. The computer was strictly for constructing company graphics. But he installed all kinds of games and wasted lots of time. His boss never knew he blew off half the day.

Company computers are obviously company owned, making it legally possible for your boss to spy on you. Employers can also figure out whom you’re speaking to on your company owned or sanctioned phone and for how long

Read more…

8028230674?profile=originalEnrique Suarez Presenting:

Pratap Chatterjee

Global Research, May 12, 2015

CorpWatch 27 April 2015 

Deutsche Bank has agreed to pay out a record $2.5 billion fine to settle U.K. and U.S. government investigations into allegations of fixing global interest rates, just months after six other banks paid out $4.3 billion on similar charges. Activists say that the banks should have faced criminal charges.

“The question remains: does the punishment fit the crime?” writes Angela McClellan of Transparency In

Read more…

Liquidity and Treasury Professionals from the Banking Industry will come together to share practical solutions for optimizing liquidity management and improve business as usual

 

New York, NY–May 2015 GFMI, a leader in knowledge sharing for capital markets, will host the 2nd Annual Liquidity and Funding Risk Management Conference on October 5-7th, 2015 in New York, NY. Building on the success of the previous edition, this year’s meeting will demonstrate how by optimizing liquidity management bank

Read more…

Fraud Prevention & Financial professionals will join together to share cutting edge strategies and techniques to manage the growing area of fraud risk

 

New York, NY– April 29, 2015 marcus evans, the world’s largest event management group, will host the Fraud Prevention for Financial Institutions Conference on August 12-13, 2015 in New York, NY. This premiere forum will provide a dynamic environment for senior practitioners to: leverage intelligence and analytics to better understand behavioral

Read more…

The Group Treasurers Exchange has conducted research with more than 80 Heads of Treasury. They have summarised the focus areas, challenges and what solutions Group Treasurers  are looking for under 12 topic sub-headers, all of which will be addressed at the Exchange in September. Read on to discover where group treasurers are focusing their attention and their resources in 2015 to 2016 to help you work out where your services or solutions can help.

Financial Risk Management

Management of FX exposu

Read more…

8028232268?profile=originalPresented by Enrique Suarez

Source: Eric Zuesse

Global Research, May 09, 2015

Oxfam’s recent report, “WEALTH: HAVING IT ALL AND WANTING MORE” contains shocking figures that the press haven’t sufficiently publicized; so, the findings and the reliability of their sources will be discussed here. The results will then be related to the central political debate now going on in the U.S. Presidential contests for 2016, which is about equality and inequality.

First, the findings:

1. The richest 80 individual

Read more…

Although there’s an unlimited number of ways to structure a deal, there are a limited number of acceptable ways to valuate a company. Wall Street valuates publicly traded companies’ common stock primarily based on “Price Earnings” or PE ratios. Then the company value is arrived at by multiplying the number of total outstanding shares by the price per share, less total liabilities (debt). It would seem impossible to use this method to valuate a privately held start-up or early stage company, sinc

Read more…

8028231276?profile=originalThe Risk and Insurance Management Society (RIMS) has released two executive reports, “Why a Mature ERM Effort is Worth the Investment” and “Testing Value Creation through ERM Maturity.” Together, these reports look at recent findings that detail the benefits of investing in enterprise risk management.

Despite evidence that mature ERM programs add significant value, manyorganizations remain hesitant when it comes to adopting a software and streamlining their ERM processes.

Below, we have outlined t

Read more…
Views: 95
Comments: 0

How Will You Measure Your Life?

8028231664?profile=original

Enrique Suarez Presenting:

How Will You Measure Your Life?

 

By:

Clayton M. Christensen

Before I published The Innovator’s Dilemma, I got a call from Andrew Grove, then the chairman of Intel. He had read one of my early papers about disruptive technology, and he asked if I could talk to his direct reports and explain my research and what it implied for Intel. Excited, I flew to Silicon Valley and showed up at the appointed time, only to have Grove say, “Look, stuff has happened. We have only 10 minut

Read more…

It’s hard to believe that, according to a recent poll from the Pew Research Center, most Americans aren’t too upset that the government can track their e-mails and phone calls. There’s too much of a blasé attitude, it seems, with people thinking, “I don’t care if I’m monitored; I have nothing to hide.”

This blows it for those of us who actually DO mind that the government is snooping around in our communications, even if we’re as innocent as a butterfly.

Privacy experts believe that governmental m

Read more…

Vaccines and National Security

8028229498?profile=originalEnrique Suarez Presenting:

Ulson Gunnar
Global Research, May 05, 2015

One can easily see in the emerging information and cyber war that a nation having its own IT infrastructure, its own hardware, and its own versions of social media platforms is quickly becoming a matter of national security. Without control over these assets, a nation must depend on foreign suppliers for their computers, peripheries and software. Already, this dependence has opened nations up to now evident threats including malw

Read more…

Beware every time the Phone rings

Don’t assume you’ll never be targeted by phone scammers just because you don’t have a cell phone; they continue to feast on landline users, especially those over 50.

“This is the IRS…”

  • Drill this into your head: The IRS never calls to collect back taxes. NEVER.
  • A common ploy is to threaten that the listener will go to prison if they don’t pay up immediately.
  • If you really do owe taxes, the IRS will contact you alright—but via snail mail, not a phone call, text or e-mail.
  • Scam calls may also sound pro
Read more…

8028231501?profile=originalEnrique Suarez Introducing:

Washington's Blog
Global Research, May 04, 2015

We Can’t Rein In the Banks If We Can’t Pull Our Money Out of Them

Martin Armstrong summarizes the headway being made to ban cash,  and argues that the goal of those pushing a cashless society is to prevent bank runs … and increase their control. What do you think?

The central banks are … planning drastic restrictions on cash itself. They see moving to electronic money will first eliminate the underground economy, but secondly

Read more…

Enterprise Risk Management (ERM) Software, unfortunately, is a poorly defined (and often poorly executed) concept, but by structuring your vendor selection around the core concepts of Enterprise Risk Management, Risk Managers can mitigate the inherent risks that accompany a software implementation.

Common Pitfalls of ERM Programs

The common maturity process of an ERM programs looks something like this: define our purpose with an ERM charter, define our process, and then seek automation to support

Read more…

So just how are hackers able to penetrate all these huge businesses? Look no further than employee behavior—not an inside job, but innocent employees being tricked by the hacker.

recent survey commissioned by Intel Security reveals that five of the top seven reasons that a company gets hacked are due to employee actions.

One of the things that make it easy to trick employees into giving up critical information is the information employees share on social media about their company.

People just fre

Read more…

10 years ago, many of us were hearing about social media for the first time. Now, social media plays a giant role in our lives, allowing us to share pictures, connect with family and friends, and get updated news. Through social media, we can express ourselves to our inner circle and the world.

So how devastating would it be if someone got a hold of your social media accounts?

They could really wreak some havoc, like sending dirty links to all of your followers on Twitter. Or worse, take personal

Read more…

8028234853?profile=original

Enrique Suarez Introducing to:

Matthias Chang

The original article appeared on Global Research on July 08, 2013

Excess Reserves at the Federal Reserve. One of The Biggest Financial Scams In History: A Whopping US$1.794 Trillion

Banks’ excess reserves at FED is one of the biggest scam by the FED and there is a conspiracy of silence as to its actual implications. Economists and financial analysts spewing nonsense to mislead and divert attention to non-issues so that the public is kept in the dark.

The

Read more…

What is Spam?

Everyone’s heard of spam as it pertains to emails. Spam isn’t necessarily a malicious message designed to trick you into revealing your credit card number or PayPal login information.

But spam is an unsolicited message, sometimes referred to as junk mail. Spam can be very annoying and relentless in nature, often attempting to convince you to buy something. Sometimes these messages are untruthful, such as those advertising human growth hormone pills (when they actually contain nothing of the sort)

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead