All Posts (5618)

Sort by

marcus evans will host the 13th Annual Liquidity Risk Management Conference on May 2-3, 2018 in New York, NY. In its 13th year, this exclusive meeting will address key changes and new considerations for revolutionizing liquidity risk by building better models and understanding market impacts. By attending this event, delegates will explore the benefits of integrating oversight controls and frameworks for multiple regulations, reacting to market stress events, contingency planning, and much more!

Read more…

Good vs Bad Surprises

8028265854?profile=originalLast week I wrote about Reframing Risk to find opportunities where no one else is looking. A recent blog by a legend thinker Seth Godin (author of 18 books) put a different spin on this for me.

In his blog Surfing vs Coal Mining he reminds us that unexpected occurrences in surfing are a good thing. Whereas the unexpected in coal mining may mean tragedy. For me Godin’s message is about accepting that you need to take risks. To look optimistically at uncertainty. 

___________________________________

Read more…
Views: 97
Comments: 0

To contract a vendor is to initiate a relationship: when you don’t know who you’re really dealing with, you expose your enterprise to risks that can have enduring consequences.

Join ProcessUnity’s 45-minute webcast on Thursday, February 15, 2018 at 11:00 AM EST and see how forward-thinking organizations are modernizing their vendor onboarding process.

Our team of experts will discuss how to:

  • Eliminate time-intensive admin steps to create vendor information
  • Streamline onboarding processes by engaging
Read more…

An interesting post for anyone talking internally with their team on building a homegrown solution versus purchasing a solution to streamline Third-Party Risk Management. Of course, it's written from the perspective of a software vendor (that's what we do) but the benefits of having a voice in the discussion of what goes into the next generation of a product as a customer in a community of like-minded individuals or knowing that multiple times a year new features will be added can influence this

Read more…

Inspire, Enable, Engage, Empower Your Workforce as Never Before and take your Leadership Team toward Becoming Strategic Leadership

Dr. Ted Marra

Professor Dr. Emeritus, Strategic Leadership, Cotrugli Business School

Sr. Partner, Insights Paradigms

The author of the popular online course: Becoming the Strategic Leader in 6 weeks by Cultivating Your Strategic Thinking

Background

For some years now I have watched organisations around the world talking about how their employees are their greatest asset, y

Read more…

What is a credit freeze? It’s an action you take to lock down your credit report. A lender can’t see your score, which means your Social Security number and credit rating is useless to them. In other words, they can’t tell if you are risky or not.

When an identity thief can access your ID aka Social Security number, they can also create credit in your name. However, if your credit file is frozen, the bad guys can’t access it any longer. With a credit freeze, your credit file is inaccessible.

To ge

Read more…

8028266661?profile=original 

Security experts are observing a rising level of malware strains, which are trying out the Spectre and Meltdown vulnerabilities.

As reported by the researchers from Fortinet, AV-TEST, and Minerva, a number of crooks test the publicly available proof-of-concept (PoC) computer code for the Spectre (CVE-2017-5715, CVE-2017-5753) and Meltdown (CVE-2017-5754) vulnerabilities.

AV-TEST experts have identified 119 virus samples, which are linked to the above-mentioned chip vulnerabilities.

Virus samples d

Read more…

By Daniel Nunes-Vaz, Senior Research Executive, Center for Financial Professionals. 

 

In recent years operational risk has grown as a discipline and is now viewed as an integral aspect of any risk management department. This is predominantly a consequence of the most recent major financial crisis where the management of operational risk was partly blamed as a significant contributory factor in the collapse of global markets. Since then, the risk management and operational risk landscape has chang

Read more…

Did you know that according to research every year 2 million individuals enter leadership positions and 60% fail?

According to Dr. Ted Marra, most often the root cause is a failure to think strategically.

Research says most executive development is disconnected from the real needs of the organization and those who must lead it. 

Learn what it takes to transform yourself to become a Strategic Leader.

8028268471?profile=original

1. What are the certain actions performed by Level 5 leaders which separate them from the rest o

Read more…

Certified ethical hacker training is commonly denoted as the course that teaches you to break through your own or your company’s computer/s in a legitimate and official manner to find out the existent vulnerabilities and to assess the safety bearing of the target system. Certified ethical hackers use the same tools and knowledge that malicious attackers exploit and execute the indicated defensive, counteractive and protective actions to protect the system from any breach in future.

The ethical ha

Read more…

Reframing Risk

8028263471?profile=originalLast week I read an article by The Boston Consulting Group called Business of Business is No Longer Just Business. In it they describe the heightened levels of uncertainty facing business leaders using examples of political, economic and technology upheavals. They went on to describe five things leaders should embrace to manage complexity:

  1. Build multilevel scenario analysis skills
  2. Become more resilient
  3. Shape the system
  4. Recreate the narrative
  5. Reframe leadership

In my mind they are asking leaders in org

Read more…
Views: 121
Comments: 0

8028270057?profile=original

Northwestern Mutual’s Digital Transformation: Redesigning IT

Source:

MIT-CISR

Author(s): Sebastian, Ina, Beath, Cynthia M., Ross, Jeanne W.

Type: Working Paper

Topics: Design/Management of the IT Unit, IT-based Business Transformation

Date: 2017-10-26

Abstract: While in 2017 Northwestern Mutual had been in business for 160 years, management believed that success in the digital economy would require delivering digital products and services to extend the value that customers were receiving from the compa

Read more…

Digitized ≠ Digital

8028268270?profile=original

Digitized ≠ Digital

By:

Ross, Jeanne W.
Beath, Cynthia M.
Sebastian, Ina

MIT CIRS

Abstract: To succeed in the digital economy, companies need to be both digitized and digital. Despite the similarity of the words, there is a big difference. Digitization is an operational necessity and involves standardizing business processes. To become digital, leaders must articulate a visionary digital value proposition for customers and deliver it in the form of digital offerings. This briefing clarifies what is in

Read more…

Milestones Schmilestones

8028268694?profile=originalRecently I was listening to an interview with retired Australian cricket captain Michael Clarke. He was asked how he felt when he scored his first century (100 runs) for Australia. He described incredibly strong emotions. The interviewer then commented how funny it was that a score of 98 had no comparison. Clarke agreed wholeheartedly.

It reminded me of a section in my book DECIDE How to Manage the Risk in Your Decision Making, titled Beware of Milestones. In it I tell stories about three elite s

Read more…
Views: 70
Comments: 0

8028267281?profile=originalAs you likely know, GDPR (the EU’s new General Data Protection Regulation) takes effect in May 2018. Are you ready? If your organization stores or processes EU citizen or resident personal information – any information that can be used to directly or indirectly identify someone – you need to know about GDPR.

But did you also know you that you are responsible for the personal data managed by your third-party vendors? Enterprises are responsible for the EU personal data managed by their own third p

Read more…

IT has become an integral part of many organizations, both small and large. While some companies have an in-house IT and software team, others prefer to outsource. In some instances, even the former at some point may need to outsource the services of an IT solution company. There are numerous IT companies in the market. As a result, it can be confusing to choose a suitable one. Below are some important things to consider when choosing an IT solution company.

  1. Company’s previous work

Consider whethe

Read more…

How To Measure The Business Value Of Your Digital Transformation: Can Industrial Era Metrics Mislead You Into The Wrong Decisions And Failed Digital Transformations?

Towards new holistic strategy execution measure of risk and performance for digital transformations

Over 50% of the “2000-Fortune 500” does not longer exist and according to Cisco’s John Chambers, “probably 40% of today’s businesses will fail in the next 10 to 15 years; 70% will attempt to transform themselves digitally, but only 30%

Read more…

Think about how great this would be: Imagine that all of your company data is safe from hackers. Your hardware is totally safe and secure. You have IT specialists at your disposal at all times and have a constant flow of cash to pay them.

Unfortunately, this is a fantasy for most of us. No matter how secure we think our network is or how much we pay our IT people, there is always a chance for a data breach. Does this mean we should stop the fight, though? No way.

Instead of throwing in the towel,

Read more…

8028263262?profile=originalChipotle needs risk management rehab. In less than two years, the Mexican grill has changed CEOs twice in an effort to regain their once-held reputation as a beloved fast-food chain. A new CEO, however, isn’t the solution. Multiple cases of food-borne illness before, during, and since executive switch-ups have proven the restaurant needs to adopt a stronger enterprise risk management process.

Let’s consider a timeline of events:

  • 2015 – coli outbreaks linked to Chipotle restaurants were detected by
Read more…

The December 2017 Verizon Data Breach Digest focused on the use of cloud services and is worth a read. The Digest identified key issues that you should be aware of:

  • Location of Systems and Data – If you need to access your cloud assets do you know where it is? Know that there are different rules governing cyber facilities in different jurisdictions which may, or may not, be a concern.
  • Physical Access – If you need access to your data and services will it be allowed and facilitated?
  • Forensic access
Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead