Risks change over time. Companies developing C&E plans for 2013 may wish to conduct a refresher risk assessment if they have not done so recently…
Effective C&E may mean requiring the JV to have its own due diligence measures for using third parties…
Corruption is like a bus. You can stay inside the bus and be part of it. You can sit beside the bus, close your eyes, ignore that corruption exists, and not say anything. Or you can stand in front of the bus. But, in a place like Brazil…
Risk assessment and program assessment are, of course, two different animals. But inside most every risk assessment there is a program assessment struggling to be heard, and the converse is true of every program assessment. Making the most of these connections can be essential to optimizing both functions. There are several ways to do this, and Jeff Kaplan focuses on one that is untested seems to hold a fair bit of promise.
Steve Priest reviews the lessons from the NFL referee fiasco and how it relates to the tragic flaw underlying most of our corporations, the relentless drive to improve profitability. This can be good, but sometimes, usually when arrogance overcomes prudence, people and companies do stupid things in the name of profitability.
As the number of jurisdictions enacting antitrust laws surpasses 100, extraterritoriality (the ability of those outside a jurisdiction to be held liable within the jurisdiction) becomes a significant risk management issue for multi-national companies. Clifford Chance’s Timothy Cornell recommends 10 practical steps that a company can undertake to mitigate its risk and reduce its exposure.
In light of National Cyber Security Awareness Month, which is coming up in October, Experian’s Michael Bruemmer reviews some of the common pitfalls to avoid if your company or organization plans to purchase cyber insurance.
Perhaps akin to a summer re-run, here are six points about conducting C&E risks assessments, based on past articles from this column, that bear repeating.
Matteson Ellis presents a list of five common corruption risks in Mexico pulled from cases, survey data, and his own experiences there.
When entrusting third-party service providers, organizations must take appropriate measures not only to protect their information assets, but also to ensure compliance with a changing landscape of security and privacy regulations, many of which differ by industry, state and country. Grant Thornton’s Warren Stippich reviews special considerations when hiring a third party.