All Posts (5618)

Sort by

Challenges to the Not-for-Profit Organizations: Lessons from the Delta Model.

Singapore's Case-study

8028268273?profile=original

Click on the link below to see the entire PP presentations:

Part 1: The Delta Model as Applied to Not-for-Profit Organizations

DeltaModel_NonProfit_1.pdf

Part 2: Singapore Fundamentals and the Role of the Economic Development Board (EDB) in Making Singapore one of the most Advanced Economies in the world

Singapore_EDB_64.pdf

Upon request, I will send you the complete training program (electronic and non

Read more…

A little while ago, during the WEF 2018 event we were curious. We wanted to know what the WEF Global Risk Report would look like if it was displayed on the VirtueSpark GRC Platform. Since what they call risk interrelation is a fundamental design aspect of our platform, we had expected it to look similar. So we set up a blank instance, tweaked some style aspects, adjusted the impact and likelihood dimensions and filled it with the data of the 2018, 2017 and 2014 reports.

Next to that I am pleased

Read more…
Views: 67
Comments: 0

8028270681?profile=originalIt is certain that having the right experience is one thing, but getting the most of it is another. Especially when it comes to boards. Each board member needs to fulfil their fiduciary duties; however, reliance needs to be placed on individual board members with specific skill sets. And along the way, there are challenges that need to be overcome:

  • Politics – Light or heavy, there is always politics. People come with agendas. Knowing those agendas and appreciating the threats and opportunities th
Read more…
Views: 84
Comments: 0

Managing Risk in a Global Trade War

The announcement by U.S. President Donald Trump that his administration would be imposing tariffs on foreign imported steel and aluminum threatens to send the U.S. and its trading partners into a global trade war.

8028267887?profile=originalPrices of U.S. domestic steel are up approximately 20 percent since the beginning of 2018. This is due to expectations of “protectionist measures, which could prove a significant drag on steel consumers like the machinery, motor vehicle, and construction industries,” Capital Economics a

Read more…

There are many ways that you or a small business could get caught up in a social media disaster. Can you think of any off the top of your head? If you are like most of us, probably not. Here are 14 ways that you could be in danger:

  1. A Terrible Online Reputation – Do you keep a watchful eye on you or your business’ Facebook page? Are people posting to it? Are your staff? Even things that seem good-natured at first can be taken the wrong way by friends or potential customers.
  2. Racy Images or Text – If
Read more…

8028264098?profile=originalThis past weekend, companies started responding to consumer backlash for working with the National Rifle Association. Corporations like the First National Bank of Omaha, Delta, Hertz, and MetLife are ending discount programs with the NRA.

Before this pushback, NRA membership granted consumers access to a broad range of discounts, from special rates on auto insurance policies to cheaper flights when you booked through the NRA’s website.

But after the mass school shooting at a Parkland, Florida high

Read more…

If you are a business owner, you might be concerned about employee theft. If you aren’t concerned, perhaps you should be.

There are a number of ways that an employee can steal:

  • Embezzlement money, inventory or materials
  • Skimming – Diverting funds
  • Stealing business opportunities, data or trade secrets
  • Fraudulent disbursements like check tampering or billing schemes
  • Larceny – absolute theft

It might surprise you to find out that employees who steal are not usually new employees. Instead, they are those w

Read more…

Network for Real Impact

8028271891?profile=originalIn her blog Stop Looking in the Rear-view Mirror Janine Garner makes the point that our internal networking can have a much greater impact if we network in the right way. She writes:

"Think about it - are you connecting, sharing insight and creating opportunities to innovate and collaborate with these groups of people or are you simply swapping information to get the job done or the deal sealed?"

How do you manage your internal relationships? Are you mechanical and sticking to your technical role

Read more…
Views: 91
Comments: 0

Most ERM and GRC vendor offerings currently fail to enable the power and value of applying risk management principles to business decision making. If risk 8028271288?profile=originalmanagement is about making better decisions, then we need to reset the perspective of what qualifies as a risk management vendor resource.

The Challenge of Embedding Risk Management in Decision Processes

Updates to the COSO ERM and ISO 31000 standards emphasize the need to address risks in the context of organizational objectives and decisions.

Read more…
Views: 395
Comments: 4

MarketsandMarkets has published a new report that states that the global vendor risk management market is expected to grow to significantly by the year 2022. The report divides the market by component (solutions vs services), deployment type, organization size, industry segments and region to define the market growth opportunity. MarketsandMarkets is a B2B research firm that employees 850 full-time analysts to track high growth global markets, providing market sizing and strategic advice and for

Read more…
Views: 151
Comments: 0

Introduction

 

In a conventional security thinking, IT Security at most of the enterprises follow old ‘Industrial Security Model’ where its considered that assets are held within a perimeter and users must enter the perimeter physically or logically (LAN/VPN) to access the assets and the perimeter is guarded by a gatehouse / guard. In other words, this model is called perimeterised computer network where data and applications is attached to the network and is protected by firewalls with access lis

Read more…

The definition of criminal identity theft is a crime where the criminal impersonates the victim in order to protect their innocence. This can lead to victims getting fines or even getting arrested and charged for crimes they did not commit.

How Does This Happen?

There are a number of ways that a criminal can pull this off, and it generally occurs when the thief steals someone’s identity. This is true and pure identity theft, often involving a drivers license with the thieves picture and the victim

Read more…

C-suite Digital Disruption Risk Alerts: Building a bridge between your products and services and the digital transformation journey of your C-suite and your customers’ C-suite

SIMMETHOD new digital transformation algorithms and metrics found that your risk of being disrupted is proportional to your gap to the SIMMETHOD Best In Class and linking your products and services to the SIMMETHOD 7 Laws of Growth, Value Creation and Digital Transformation, Best In Class profiles and C-suite Risk Alerts pr

Read more…

Don’t be blinded by your technology defenses

I recently created a course on the Global Risk Academy outlining the requirements of GDPR (https://globalriskacademy.com/p/gdpr ). My objective was to guide organizations, other than those in the EU, to understand what they need to do to be GDPR compliant. Having immersed myself in the GDPR I came to realize it represents a quite different perspective on cyber security than currently embraced by many cyber security professionals in the US.

The GDPR explicitly places privacy security requirements

Read more…
Views: 100
Comments: 0

8028264683?profile=original

Hello, ladies and gentlemen! Welcome to our live discussion about crisis leadership. Today, we have our interview with Caroline Sapriel. Caroline is our member and managing partner at CS&A International, a leading global risk and crisis management firm. She is an experienced international crisis resilience professional with over 25 years of experience in risk, crisis and continuity management. Additionally, she has an extensive expertise in crisis communication. Caroline coaches senior executiv

Read more…

8028270070?profile=originalHere we are. February 2018. For many, February is a trying month. How well are those New Year’s resolutions holding up? Have the early-morning January gym visits started to fade? Are salads getting old? Personal goals aside, here’s one thing we hope won’t decline: the excitement over your freshly finished 2018 budget.

The new year tends to bring about an intense wave of optimism for what we can accomplish in the next 12 months. Too often, however, this optimism gets stomped on by the surprises of

Read more…

DISRUPTION – A shiny object

8028270487?profile=originalA great stat in this blog by Brent Hodgson – He can count five or maybe ten true “disrupter” start-ups over recent years out of 32,439 start-ups in AngelList’s directory. And we all know the overall success rates of start-ups. It just shows how fixated we are on shiny things. It’s why CEOs are way more likely to buy strategy or marketing advice than risk and compliance.

It’s also why, if you want to be able to influence the CEO, it is best to bring your message about a non-sexy topic in a sexed-u

Read more…
Views: 115
Comments: 0

The Ponemon Institute released a shocking statistic: about 80% of all corporate data leaks is due to human error. In other words, it only takes a single staff member to cause a huge issue. Here’s a scenario: Let’s say that you have an employee, Betty. Betty is lovely. We love Betty. But when Betty is checking her personal email during her lunch break and sees she has an offer that promises a 10-pound weight loss in only a week, she clicks the link. She wants to learn more about it, so she clicks

Read more…

How to Measure the Business Value and Success of Your Digital Transformation? Towards new crowd-sourced, holistic and industry-agnostic metrics of strategy execution to improve your 2018 predictions and the success of your digital transformation

The following is a selection of companies that recently consulted SIMMETHOD’s Strategy Execution C-suite and Boardroom Risk Alerts:

Massachusetts Institute of Technology, University of Western Ontario, Deutsche Telekom, Twitter, Apple, Emirates Telecommuni

Read more…

Not all viruses that find their way onto your computer dramatically crash your machine. Instead, there are viruses that can run in the background without you even realizing it. As they creep around, they make messes, steal, and much worse.

Malware today spies on your every move. It sees the websites you visit, and the usernames and passwords you type in. If you login to online banking, a criminal can watch what you do and after you log off and go to bed, he can log right back and start transferri

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead