croupier behind casino table

Battling AML Risk in the Casino and Card Club Industry

Posted by - January 3, 2019
The Bank Secrecy Act and Enhanced Compliance Programs Increased regulatory scrutiny, historically high fines and now-legalized sports betting are leading casinos to focus on improving their Bank Secrecy Act/anti-money laundering (AML) compliance programs. Deloitte’s Matt Lappas and Jeb Breese discuss four key areas casino compliance officers should focus on in…
Read More
man on laptop at cafe

A Persistent Threat in Financial Services

Posted by - January 2, 2019
Key Controls on Web Use to Avoid Regulatory Scrutiny For regulated investment firms, the SEC has prioritized cybersecurity, governance and data loss prevention. While firms cover the gamut in their compliance manuals and policies, their practice reveals alarming gaps when team members access the web. John Klassen of Authentic8 discusses…
Read More
rising arrow on staircase

10 Ways to Improve Your Risk Assessment Process

Posted by - December 21, 2018
Guidance for Executive Management and the Board Protiviti’s Jim DeLoach discusses strategies to enhance the risk assessment process, from ensuring the proper stakeholders are involved to accounting for disruptive change and moving beyond “enterprise list management.” An effective risk assessment is fundamental to risk management and the board’s risk oversight…
Read More

The 2019 TRACE Bribery Risk Matrix Rankings for Asia-Pacific

Posted by - December 21, 2018
New Data is Key to Anti-Bribery, Anti-Corruption Efforts TRACE International published an updated Bribery Risk Matrix earlier this month, and the rankings will be hugely informative in corporations’ business dealings across the globe. Clifford Chance’s Wendy Wysong and Nick Turner discuss. with co-author Nick Turner Gut instincts can be good…
Read More
smartphone with linkedin app

Should THAT Be in a Personal Online Profile?

Posted by - December 20, 2018
Mitigating a Multitude of Social Media Risks Employees using business-oriented social media sites could be inadvertently exposing the company to a host of risks, whether by disclosing proprietary information, using a photo that captures details potentially helpful to competitors or just communicating an off-brand message. Michael Schmidt and Art Samansky…
Read More
data breach words on blue background

What Makes a Cyber Data Breach Expensive?

Posted by - December 18, 2018
The Real Costs to Companies People get emotional over cyber data breaches, and the media loves to report on the latest hack attack that exposed millions of users’ information. Other than reputational damage (which is quickly forgotten, given the 24/7 news cycle), why should risk managers, executives and business owners…
Read More
black and white arrows merging into one

Integrated Risk Management: The Intersection of GRC and RMIS

Posted by - December 6, 2018
3 Arguments for Integrating RMIS and GRC Processes Gartner suggests that integrated risk management (IRM) is the next evolution of risk management practices. This piece from Riskonnect’s Dawn Ward explores IRM practices and what they mean specifically for GRC and enterprise risk. As risk controls and appetites evolve, managers continue…
Read More
woman mentally sorting information and forming an idea

Incorporating the OODA Loop

Posted by - November 29, 2018
Stopping Problems Before They Start As third-party IT security/cyber risks become more prevalent, IT security professionals continue to look for more efficient and agile approaches to third-party risk management (TPRM) that can help organizations stay compliant with ever-evolving requirements. One of those requirements is the integration of continuous monitoring into TPRM programs.…
Read More
ERP program on tablet

Enterprises Left Exposed Through GRC “Shelfware”

Posted by - November 27, 2018
The Underlying Issue with Many GRC Solutions GRC software is especially critical in organizations that rely on enterprise resource planning (ERP) software – such as SAP or Oracle – to essentially run all aspects of their business, from the supply chain to finance. However, the GRC software that comes with…
Read More
world map with cracks across glass surface

Addressing Geopolitical and Regulatory Shifts

Posted by - November 26, 2018
Managing Risk Amid Uncertainty We live in an uncertain world, and it seems to grow more so every day. Jim DeLoach discusses how to handle risks associated with escalating geopolitical tensions and legislative changes, and he poses questions leaders should consider as they look to mitigate risks inherent in the…
Read More

Beware What Lurks in the Dark

Posted by - November 5, 2018
12 Steps to Reveal and Reduce Cyber-Breach Risk One hundred percent of businesses are or will be victims of a cybersecurity breach, disruption or attack — either directly or indirectly. No one is immune. That’s why this article is not just for the Fortune 500 CISO or the fortunate few…
Read More
gold key fob reading ERM on keychain

Does ERM Really Matter in Your Organization?

Posted by - October 31, 2018
Maturing Risk Management in Light of COSO Updates Recent updates to the COSO framework serve to clarify the significance of the connection between risk, strategy and performance. Protiviti’s Jim DeLoach discusses how organizations can get the most out of their ERM programs and three keys to advancing ERM. In 2017,…
Read More