Third-party risk management: Avoid the dangers of weak controls
If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. The post Third-party risk management: Avoid the dangers...
View ArticleGet involved in implementing IT risk management policy – Five technology...
Although there are plenty of technology issues that require CFOs’ attention just within the finance department, they should turn their focus outward as well. “The action item for CFOs in 2014 is if you...
View Articlesupply chain risk management (SCRM)
Supply chain risks include cost volatility, material shortages, supplier financial issues and disasters. SCRM is a discipline designed to help an organization identify potential threats and avoid or...
View ArticleCISSP training video: The AIC triad, ISMS, ISO 27000 series
In this CISSP Essentials Security School presentation, expert Shon Harris discusses three key components of the CISSP Information Security Governance and Risk Management domain: the AIC triad, ISMS and...
View ArticleCISSP quiz: Information security governance and risk management
Test your knowledge of the Information Security Governance and Risk Management domain of the CISSP exam by taking this practice quiz. The post CISSP quiz: Information security governance and risk...
View ArticleCISSP online training: Information security governance, risk management
Spotlight article: Shon Harris offers an in-depth look at the topics covered in the CISSP domain on infosec governance and risk management. The post CISSP online training: Information security...
View ArticleManaging IT in 60 seconds: Nick Folkes, MD responsible for global IT, MSCI Barra
Nick Folkes is a managing director with responsibility for global IT at MSCI Barra, a provider of risk management and portfolio analysis tools to fund managers for managing equity, fixed-income and...
View ArticleMobile risk management falls short in Global 2000
The majority of companies lack mobile policies around access and storage of corporate data, according to one study. Is your organization one of them? The post Mobile risk management falls short in...
View ArticleDigital risk management strategies for the data-centric business
To offset threats from constantly expanding information volumes, business leaders must rethink how they integrate digital risk management tactics throughout their companies. The post Digital risk...
View ArticleHow does your company perform risk management for machine learning?
The post How does your company perform risk management for machine learning? appeared first on Discussions.
View ArticleRisk management and agile principles in cloud computing
To maintain regulatory compliance in adopting cloud computing, apply risk management and agile development principles. The post Risk management and agile principles in cloud computing appeared first on...
View ArticleHow compliance with ISO 31000 supports risk management initiatives
ISO 31000 is becoming an important development tool for shaping existing and new risk management programs. Learn if your programs are in compliance with this standard. The post How compliance with ISO...
View ArticleArchitect preventative compliance controls for best risk management
Controls are a key part of your compliance and risk management strategy, but which controls are the right ones for your organization? The post Architect preventative compliance controls for best risk...
View ArticleCIO tip: Learn how to present a risk-management plan to the board
CIO tip: Companies are getting serious about risk management plans — and leaning on CIOs to help them. The post CIO tip: Learn how to present a risk-management plan to the board appeared first on...
View ArticleDo you have a practical, presentable risk-management plan ready for your board?
The post Do you have a practical, presentable risk-management plan ready for your board? appeared first on Discussions.
View ArticleHow to use the free Microsoft Security Risk Management Guide
Every organisation needs to perform risk assessments, but not all have the resources to do so. Learn how the free Microsoft Security Risk Management Guide can help. The post How to use the free...
View ArticleManage cyber risk for business benefit, says industry expert
Cyber risk management can add business benefit while improving security, says Digital Policy Alliance advisory panel member Philip Virgo The post Manage cyber risk for business benefit, says industry...
View Articlesupplier risk management
Supplier risk management is the process of identifying, assessing and controlling threats to an organization’s capital and earnings that are caused by the organization’s supply chain. The post supplier...
View ArticleBank outsources risk management to CWB
Deutsche Bank AG London and CWB Systems Services have signed a £10m outsourcing contract. The three-year deal will see 25 Deutsche staff transfer to CWB as the services group takes over management of...
View ArticleDigital risk management strategies for the data-centric business
To offset threats from constantly expanding information volumes, business leaders must rethink how they integrate digital risk management tactics throughout their companies. The post Digital risk...
View Article