All Risk Management articles – Page 129

  • Blog

    New IntelligenceBank GRC Tool Simplifies Risk, Compliance Management

    2014-12-10T10:30:00Z

    IntelligenceBank, an Australia-based privately-held business process management company, has announced the launch of IntelligenceBank GRC, a new customizable plug-and-play solution that enables risk managers to create their own registers for risk, incidents, conflicts of interests, manage internal controls within a single platform, and more. Details inside.

  • Blog

    Hearsay Social Launches New Social Media Compliance Capabilities

    2014-12-09T13:30:00Z

    Hearsay Social, a social business platform provider for the financial services industry, this week launched new capabilities for its Compliance Solution, providing improved efficiency and control for compliance teams and the financial professionals whom they supervise. Details inside.

  • Resource

    Five Steps to Enhance the Board’s Oversight of Cyber Risk

    2014-12-05T11:30:00Z Provided by

    The National Association of Corporate Directors (NACD), in collaboration with AIG and the Internet Security Alliance, has just released its latest issue from the Director's Handbook Series, Cyber-Risk Oversight. The handbook is organized around five key principles to help directors enhance their oversight of cybersecurity. It covers a wide range ...

  • Resource

    How to avoid common pitfalls in your ORSA process

    2014-12-04T09:15:00Z Provided by

    As with so many regulatory mandates, the development of an ORSA Summary Report is dependent upon much more than just data. Regulators are looking beyond the final numbers to determine if organizations are meeting the mandate, and the process used to get that final report is under equal scrutiny. While ...

  • Resource

    e-Book: Getting a Handle on Third-Party Relationships

    2014-12-01T09:30:00Z Provided by

    Companies have always relied on several third-party specialists and service providers to help carry out the work that they do. Vendors, suppliers, resellers, wholesalers, consultants, and many others have been part of the business equation for nearly as long as companies have existed. What is different now is how entwined ...

  • PartnerBreach
    Article

    Are Your Business Partners Letting the Hackers In?

    2014-11-25T15:00:00Z

    For Target, it was a heating and air conditioning company. At a large oil company it was a nearby Chinese restaurant. Hackers increasingly use third-party relationships to gain access to computer networks and steal data. The trend means that companies need to conduct even better due diligence on third-party relationships ...

  • Article

    HHS’s Plan to Target Data Security in 2015 Means More Audits

    2014-11-18T10:45:00Z

    The Department of Health and Human Services plans to raise the bar on data security in the healthcare industry in the year ahead. The renewed focus likely means more audits and enforcement actions for providers and insurers. On HHS’s checklist are required contingency plans that establish procedures for responding to ...

  • Blog

    SWIFT to Offer KYC Service for Banks

    2014-11-14T13:30:00Z

    Financial services firms will soon have at their fingertips a new report offered by SWIFT that provides a global overview of a banking institution’s correspondent banking activities. The new service will be available in January 2015 and forms part of SWIFT’s Know Your Customer (KYC) offering, which is designed to ...

  • Resource

    Auditor Evaluation Report: Peer Benchmarking, Auditor Profile and Risk Indicators for the Audit Committee

    2014-11-13T14:30:00Z Provided by

    There are two truths about corporate compliance: No universal solution exists for all businesses, and everyone wants to know what everyone else is doing. As part of our effort to better serve the compliance community, we are pleased to introduce Compliance Week Data & Research Division. With this report, we ...

  • Article

    The Real Data Breach Risks Are Right Under Your Nose

    2014-11-11T13:45:00Z

    While companies fret about shadowy hackers based in Russia and China hell bent on stealing customer information, employees—not cyber-criminals—pose the biggest threat to create data breaches and data loss, according to a recent study. Ungoverned and negligent file-sharing by employees is hitting epidemic proportions: More than half of respondents to ...

  • Blog

    TRACE Launches Business Bribery Risk Index

    2014-11-11T10:30:00Z

    Image: Title: WrageNov. 11—TRACE International has announced the launch of the TRACE Matrix, a business bribery risk index aimed at the compliance community. Developed in collaboration with research firm RAND, the TRACE Matrix focuses specifically on business activity, rather than broad corruption measures, providing companies with the ability to assess ...

  • Resource

    White Paper: Identifying Vendor Risk

    2014-11-10T15:00:00Z Provided by

    An effective vendor relationship management program starts with knowing what the risks are. You can’t manage what you don’t know; therefore, you need to create assessments that help you clearly identify the risks of doing business with third parties. This includes vendors, service providers, suppliers, contractors, and other people and ...

  • Resource

    Managing Cyber Risk: Are Companies Safeguarding Their Assets?

    2014-10-31T15:30:00Z Provided by

    To get a better grasp on how U.S. boards are handling cyber security roles and responsibilities, NYSE Governance Services, Corporate Board Member and RSA, in association with EY, surveyed more than 200 audit committee members this spring on a variety of issues regarding their cyber risk oversight program. This paper ...

  • Resource

    Risk Intelligence: Harnessing Risk, Exploiting Opportunity

    2014-10-31T15:00:00Z Provided by

    This RSA white paper explains how organizations can change discussion about risk from the “risk landscape” to the “opportunity landscape.” Organizations need to show how proactively managing risk becomes an enabler to explore opportunities, rather than simply avoiding landmines.

  • Blog

    ZL Technologies Partners With Hearsay Social

    2014-10-31T13:45:00Z

    ZL Technologies, an enterprise-class information governance provider, has formed a strategic partnership with Hearsay Social that pairs the strengths of ZL’s Unified Archive with Hearsay Social’s social media platform. Details inside.

  • Blog

    Litigation Risks Still High on Corporate Radar, Survey Shows

    2014-10-22T13:30:00Z

    Oct. 22—A new survey of European and U.S. corporate counsel and compliance officers showed that risks of litigation remain a major concern, with 88 percent reporting that the amount of legal disputes faced by their company in the past year has either stayed the same or increased. The annual survey, ...

  • Article

    Mapping Third-Party Risks

    2014-10-15T16:15:00Z