All Posts (5984)

Sort by

Ever wonder just what happens to the data in a data breach incident? Does it go into some kind of wormhole in cyberspace, out through the other end? Well, the answer is pretty much so, when you consider that hacked data makes its rounds on a global scale, taking only 14 days to land in 22 countries spanning five continents—according to an experiment by Bitglass.

Bitglass, a cloud access security broker, did some research, generating over 1,500 fake names, credit card numbers, SSNs and other data

Read more…

Tips to being anonymous Online

One of mankind’s greatest inventions (besides the wheel) is the Internet.

Unfortunately, with this marvelous invention comes the drawback of privacy—or shall we say, lack of.

The Internet is a wonderful tool, but users must fight to remain as anonymous as possible, because getting too much of yourself “out there” could lead to trouble. In fact, it’s a big business all in itself: tracking users’ data and selling it to advertisers. Now this may sound rather benign, because no matter how much or how

Read more…

A different spin on capability

I follow Nassim Taleb’s (author of The Black Swan: The Impact of the Highly Improbable) lead which is to not pay too much attention to business news otherwise you might start to believe you really do know what is going on in the market.  He says, don’t read it every day, it’s better to absorb, like osmosis. Every now and then, something really worth getting into pops up.

Last Friday I picked up a Financial Review for a plane trip perusal and  found an article about NAB CEO, Andrew Thorburn, in th

Read more…
Views: 81
Comments: 0

Morgan Keane made headlines in 2014 at the RIMS Enterprise Risk Management Conference in Miami, Florida, and has done so again in a profile now posted to PropertyCasualty360.com.

Keane highlights her work in reaching out to and educating over 7,000 employees at the Port Authority of New York & New Jersey, and her role with the RIMS Risk Management Society.

We commend Morgan on her fine work! For more information about how you can engage stakeholders and mature your ERM program, request a LogicMana

Read more…

Top 12 Scams Happening NOW

Scamerama is here to stay! Scams are as old as time, and evolve as inventions and technology evolve. Top scams, according to a report on FraudAvengers.com, are as follows:

  1. Scammer “accidentally” overpays you for an item you sold online; you cash the crook’s phony check and wire back the difference. You’re out cold.
  2. You order something online and it’s not delivered or version arrives that’s nothing like in the advertisement.
  3. You prequalify for a credit line or loan that seems too good to be true. It
Read more…
 
8028235068?profile=original
1. Could you please introduce yourself, describe your career path and your main goals?
 
I have worked for the Islamic Finance Council based in the UK,  where I was part of teams which - gave the Islamic finance governance frameworks for the Nigerian Central Bank’s insurance and pension commissions,  have provided Islamic finance capacity building and training to Bill and Malinda Gates Foundation backed African financial inclusion entity Efina,  have worked with one of UK’s largest credit uni
Read more…

How to plan for Digital Disasters

In this day and age, we should never hear someone proclaim, “Oh my God, my computer crashed! I lost everything!” You can’t lose something that’s been properly backed up.

So many people, including ones with businesses that rely upon cyber communication, continue to avoid backing up their digital data.

Nobody is exempt from the No. 1 rule of backing up your data. Anything could happen:

  • Hard drive crash
  • Accidental deletion
  • Water damage
  • Fire
  • Theft (offline)
  • Ransomware

The planning for digital disasters begin

Read more…

8028233483?profile=original

Enrique Suarez Presenting:

These Two Women Are Rattling Wall Street With Common Sense Values

Source:

Pam Martens and Russ Martens:

May 27, 2015

Senator Elizabeth Warren from Massachusetts is a household name in America. Kara Stein is not. But both of these women are having a seismic impact on entrenched Wall Street group-think in Washington.

Stein is one of the five Commissioners of the Securities and Exchange Commission (SEC), appointed by President Obama and sworn in just 22 months ago. Stein brough

Read more…

What is a Cache?

Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should you do it? A cache is a folder of recently visited webpages, which is stored on your computer’s hard drive, and maintained by your Internet browser.

The purpose of a cache is to speed up the loading of webpages. Your computer’s hard drive collects data from websites that you visit, so that when you visit them again, certain aspects of the previously visited pages (such as graphics) don’t have

Read more…

According to a new Intel Security study, more than 2,000 American parents and kids ages 8-16 were surveyed to unveil some interesting things.

  • 79% of the juvenile respondents learned online safety from their parents.
  • 35% of them said they’ve been a cyberbully.
  • 27% of them said they have met, or would meet, a person in real life who they initially met online.

Technology is often blamed for all of this. But what drives these behaviors is the same force that drives the schoolyard bully to trip the bookw

Read more…

8028232695?profile=original

Enrique Suarez Presenting:

Fast-Tracking TiSA: Stealth Block to Monetary Reform. The Banking Game Exposed

Source:

Ellen Brown

Global Research, June 12, 2015
The Web of Debt Blog

It is well enough that the people of the nation do not understand our banking and monetary system, for if they did, I believe there would be a revolution before tomorrow morning— Attributed to Henry Ford

In March 2014, the Bank of England let the cat out of the bag: money is just an IOU, and the banks are rolling in it. So wr

Read more…

Interview with marcus evans speaker, John D. Rhea, Compliance Officer and Attorney, OGE Energy Corporation8028234058?profile=original

With the emergence of NERC’s new Risk Based Compliance Program come many unanswered questions and hesitations on how to move forward within a company’s structure. This recent launch has worried companies in utilities with security and workload concerns. Although the cons may weigh heavily, the Risk Based Compliance benefits companies with promoting a customizable audit.

 

John Rhea, Compliance

Read more…

With all the increased news coverage of kids running off with adults they met online, and kids dying by suicide supposedly due to online bullying, many parents are wondering if their worries about their kids being online are justified.

We hardly hear about how social media has benefited kids. There’s nothing inherent about electronic communications or electronic media that makes it bad for kids. There will always be bad people out there—online and offline.

An article on commonsensemedia.org lists

Read more…

8028233678?profile=original

Enrique Suarez Presenting:

Pillage and Class Polarization: The Rise of “Criminal Capitalism”

Source:

Prof. James Petras

Global Research, June 11, 2015

About 75% of US employees work 40 hours or longer, the second longest among all OECD countries, exceeded only by Poland and tied with South Korea.  In contrast, only 10% of Danish workers, 15% of Norwegian, 30% of French, 43% of UK and 50% of German workers work 40 or more hours.  With the longest work day, US workers score lower on the ‘living well’ s

Read more…

Manage operational risk as a separate entity while budgeting for increased operational risk demands

 

New York City, NY– May 6, 2015 marcus evans, the world’s largest event management group, will host the Operational Risk Management Conference on September 16-17, 2015 in New York City, NY. This conference will bring together risk leaders to examine the exposures brought on by operational risk and how these must be accounted for in the business model, as well as focusing on techniques for demonst

Read more…

Understanding Cyber Exposure

8028232672?profile=originalThere is a weakness in cyber risk to focus on the technical issues. They are necessary but not sufficient if you want to understand and manage all your cyber exposures, which I define as the vulnerabilities that arise as a result of activity using computers and the Internet. There is a great range of these vulnerabilities that are not being addressed.

An example would be the exposures that arise through the use of Social Media if not managed and controlled. For example posts that reveal sensitive

Read more…

How to keep a Clean Online Presence

At any given time, someone, somewhere, is probably googling you. This could be a former classmate, a neighbor, someone you’re trying to do business with, a relative, who knows?

Are you confident that whatever they find will be information that’s truly representative of you? Maybe if you have a really common name, it may be lost in cyber muddle, but the more unusual your name is (or how the first name is spelled), the easier it will be to find you. If you want a clean online presence, there are th

Read more…

Communicating Policy Online

8028231484?profile=original

Enrique Suarez Presenting:

Communicating Policy Online

Source:

 Jonathan STOCKWELL

European Commission, EU Digital

14 April 2015

What does a policy look like? What are its component parts? These are questions we need to answer if we want to explain our policies consistently – so that people can easily recognise a policy when they see one, and reliably predict where to find specific bits of policy-related information.

We’ve talked to colleagues who work on Commission policies; we’ve looked at how govern

Read more…

8028233075?profile=original

Enrique Suarez Presenting:

Why the United States Has Targeted FIFA: The Russian Connection

May 27th the United States Department of Justice issued a 47-count indictment against nine International Federation of Association Football (FIFA) officials and five executives of FIFA-affiliated sports management firms.

The charges the United States pressed included racketeering, wire fraud, and money laundering amounting to $150-million over a 24-year period

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead