Operational Risk Appetite: How sensitive are your strategies and operations to the occurrence of future events?

Increasing cyber security risks which may include theft of assets, unauthorized access to sensitive information, or operational disruption, social media risk, losses incurred as a result of internal or external fraud, anti-money laundering, the accuracy and completeness of information provided to you concerning organizations and counterparties, the failure of third, Read more…

Vendor Risk Management: Who is the data controller for the personal information assets?

Many organizations have begun to manage data risks by improving data management, adopting advanced analytics techniques and leveraging cognitive technologies, data management is an administrative process that includes acquiring, validating, storing, protecting, and processing required data to ensure the accessibility, reliability, and timeliness of the data for its users. Along Read more…

alternative risk transfer: What motivates end-users to transfer gained knowledge from Enterprise Systems training?

As organizations collaborate and combine forces to compete as extended enterprises against other integrated supply chains, risk is linked to the interdependence among supply chain partners, risk retention groups, mutual insurance organizations and other mechanisms for funding risks, rather than buying insurance. Compared to, your organization rely on you to Read more…