All Posts (6457)

Sort by

Interview with Marsha Hopwood, Director, Operational Risk Management and Risk Governance, Allianz Life

 

New rules and regulations have proliferated across the financial sector, with no end seemingly in sight. Along with fast-paced technology, stirring more competitive pressures than ever; it is essential for banks and financial institutions to instill sound management to properly oversee and control heightened risks.

 

Marsha Hopwood, Director, Operational Risk Management and Risk Governance at All

Read more…
Views: 200
Comments: 0

Interview with Erin Straits, Senior Vice President, Director, Vendor Risk Management, Fifth Third Bank

 

Third party risk management continues to grow as an area of increasing concern for institutions, as the increased digital environment and several high profile incidents highlight the importance of strong third party risk practices.  Despite strong advances in this area, institutions still need to further enhance their third party programs to ensure they add value to the business. Financial inst

Read more…
Views: 146
Comments: 0

Facebook CEO Password dadada hacked

If you’ve heard this once, you need to hear it again—and again: Never use the same password and username for more than one account!

If this got Mark Zuckerberg’s (Facebook’s chief executive). Twitter account hacked, it can get just about anybody hacked.

A report at nytimes.com says that the OurMine hacking group takes credit for busting into Zuckerberg’s accounts including LinkedIn and Pinterest. It’s possible that this breach was cultivated by a repeated password of Zuckerberg’s.

According to OurM

Read more…

An impostor posed as Lorrie Cranor at a mobile phone store (in Ohio, nowhere near Cranor’s home) and obtained her number. She is the Federal Trade Commission’s chief technologist. Her impostor’s con netted two new iPhones (the priciest models—and the charges went to Cranor) with her number.

In a blog post, Cranor writes: “My phones immediately stopped receiving calls.” She was stiffed with “a large bill and the anxiety and fear of financial injury.”

Cranor was a victim of identity theft. She conta

Read more…

Cybersecurity Is Still A Boy’s Club

Cyberweapons are a constant and evolving threat to society. They have the potential to shut down entire electric power grids and bring companies to their knees. Securing networks against the threat is possibly the most pressing priority, and the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020 as a result.

One of most pressing priorities for companies in ensuring cybersecurity is what seems to amount to a massive talent shortfall. Current estimates place t

Read more…

I recently had one of the most cathartic conversations of my career. It was with a senior internal advisor who is now in audit but has held all kinds of roles in the organisation so he gets what support functions do, why they do it and, much to his chagrin, how they do it.

The organisation in question is doing something that many organisations do, changing from A to B after they changed from B to A say five years ago after changing five years before from A to B, you get the picture. In this case

Read more…
Views: 433
Comments: 7

Viruses as Cyberweapons for sale

It’s all about code—the building blocks of the Internet. Software code is full of unintentional defects. Governments are paying heavy prices to skilled hackers who can unearth these vulnerabilities, says an article at nytimes.com.

In fact, the FBI director, James B. Comey, recommended that the FBI pay hackers a whopping $1.3 million to figure out how to circumvent Apple’s iPhone security.

So driven is this “bug-and-exploit trade market,” that a bug-and-exploit hacking company, Hacking Team, ended

Read more…

Get an account with TeamViewer, and you will have a software package that enables remote control, online meetings, desktop sharing and other functions between computers.

But recently, customers of TeamViewer have reported remote takedowns of their computers that resulted in different forms of monetary theft, such as bank accounts being cleaned out.

The cyber thieves controlled the victims’ computers via their TeamViewer accounts. Customers would witness their mouse arrow suddenly moving beyond the

Read more…

8028248473?profile=original

Building for Success

 

Microservices Essentials for Executives: The Key to High Velocity Software Development

 

Source:

Richard Li

forENTREPRENEURS

“Software is eating the world” – Marc Andreesen

Companies thriving in the new world order have technology as a core competency. They build complex cloud applications. They constantly bring new capabilities and features to the market. And despite the constant iteration and updates to their cloud application, their software is rock-solid reliable. How do they

Read more…

RCA and Risk

Root cause analysis (RCA) is the process of finding the event or condition that leads straight to an occurrence (another event). It is a systematic procedure used to identify the principal possible cause of risk. In risk-based management, root cause analysis (RCA) is more useful in predicting future events.

RCA is no longer a hindsight technique of investigation but a forward-looking one. It still relies on previous experience, statistics, and more heavily on data correlation. We are

Read more…

8028247896?profile=original

Do You Know Who you Are? Key Questions to Answer

By:

Enrique Suarez

"Empty handed I came to this world, empty handed  I leave this world"

Alexander the Great

Please answer the following questions to see if you know who you are:

 

1. Who are you?

If you answer that you are Peter, John, Patricia or whatever, my answer is, no this is your name. Again who are you?

If you answer by saying you are a journalist, a teacher, a doctor or whatever, my answer is no, this is your profession. Again who are you?

If you

Read more…

Identity Theft getting even worse

In 2015, depending on the kind and type of identity theft we are talking about, identity thieves impacted 1.5 million people or more, says the Javelin Strategy & Research report. That’s more than double than for 2014.

The move from stripe cards to chip cards has motivated crooks to fasten their seatbelts and really take off with an accelerated mode of operation. For them, your Social Security Number is the pot of gold at the end of the rainbow. Thieves will use it to set up new accounts in the vi

Read more…

8028245480?profile=original

Post-Brexit: Imagine a New European Community and a New World

 

"Imagine a new European community and eventually planetary community will develop, replacing the centralized power systems with an alliance of interconnected autonomous communities setting the foundations for a new epoch based on solidarity among people and cooperation with the powers of nature. Imagine this growing planetary movement would share an essential ethical code and would replace the drive for personal profit with the drive

Read more…

Carders cashing out on Magstrip Cards

Two thousand credit card payment terminals stand to become infected with malware called Trinity point of sales.

Ten million credit cards were stolen by hackers, called Fin6, who may end up scoring $400 million. The cards were stolen from retail and hospitality businesses. If each card sells for $21 on secret carder shops, you can see how the hackers will rake in hundreds of millions of dollars.

As you may know, the U.S. is gradually switching over to chip cards. But it will be a while—a very long

Read more…

As a risk professional, you're under a lot of pressure to write documents. Maybe it's a methodology manual, validation report, or other document you’re expected to write for your regulator; a status report for the board; or even that very important email. Whatever it is, some of the following worries probably sound very familiar to you:

"I've got to write a report and I don't know where to start - what's the best way to do it?"

"It's taking me ages to edit this Word document - aren't there some cl

Read more…

This blog was inspired by a blog by sales specialist Anthony Iannarino called “Win More by Serving Your Buyers Where They Are”.  In my experience, not enough of us consider the need to “sell” our advice when we are influencing or advising inside our organisation.

The person or group you are influencing or advising will generally be in one of three phases.

Problem Compelled – They recognise the problem and they are compelled to do something about it.

Problem Uncompelled – They recognise the problem,

Read more…
Views: 74
Comments: 0

8028249059?profile=original

Research Shows the Power Your Thoughts Have on Health and Longevity

 

Source:

April McCarthy

Walking Times

March 1, 2016

Advances in health, education, disease prevention and treatments are high on the list of things that have allowed people to extend their lives, especially since chronic medical conditions and engaging in unhealthy behaviors are known risk factors for early death, however findings from a longitudinal study of over 6,000 adults suggests that certain psychological factors may be the st

Read more…

8028248280?profile=original

We Don't Need Leaders, We Need Good Ideas

 

Enrique Suarez Presenting:

Mondragon: A Company Without Owners

The Basic Principles of the MONDRAGON Co-operative Experience were approved at our first Co-operative Congress held in October 1987. They include a set of ideas forged over more than 30 years of operation as a co-operative, and are set out below in a condensed version:

Open admission
The MONDRAGON co-operative experience is open to all men and women who accept these Basic Principles without any

Read more…

Hacking Humans is Painfully Easy

Hackers can take over someone’s life in a matter of hours. Just ask Patsy Walsh.

Though she is not a tech savvy person, the grandmother of six did have a Facebook account, and that was all the hackers needed to take over her life. By using methods such as click baiting, the act of convincing someone to click on a fake link, and then gathering information, the hackers were able to use this info to get into other accounts, and eventually hacked things such as her power of attorney form, Social Secu

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead