black and white arrows merging into one

Integrated Risk Management: The Intersection of GRC and RMIS

Posted by - December 6, 2018
3 Arguments for Integrating RMIS and GRC Processes Gartner suggests that integrated risk management (IRM) is the next evolution of risk management practices. This piece from Riskonnect’s Dawn Ward explores IRM practices and what they mean specifically for GRC and enterprise risk. As risk controls and appetites evolve, managers continue…
Read More
woman mentally sorting information and forming an idea

Incorporating the OODA Loop

Posted by - November 29, 2018
Stopping Problems Before They Start As third-party IT security/cyber risks become more prevalent, IT security professionals continue to look for more efficient and agile approaches to third-party risk management (TPRM) that can help organizations stay compliant with ever-evolving requirements. One of those requirements is the integration of continuous monitoring into TPRM programs.…
Read More
ERP program on tablet

Enterprises Left Exposed Through GRC “Shelfware”

Posted by - November 27, 2018
The Underlying Issue with Many GRC Solutions GRC software is especially critical in organizations that rely on enterprise resource planning (ERP) software – such as SAP or Oracle – to essentially run all aspects of their business, from the supply chain to finance. However, the GRC software that comes with…
Read More
world map with cracks across glass surface

Addressing Geopolitical and Regulatory Shifts

Posted by - November 26, 2018
Managing Risk Amid Uncertainty We live in an uncertain world, and it seems to grow more so every day. Jim DeLoach discusses how to handle risks associated with escalating geopolitical tensions and legislative changes, and he poses questions leaders should consider as they look to mitigate risks inherent in the…
Read More

Beware What Lurks in the Dark

Posted by - November 5, 2018
12 Steps to Reveal and Reduce Cyber-Breach Risk One hundred percent of businesses are or will be victims of a cybersecurity breach, disruption or attack — either directly or indirectly. No one is immune. That’s why this article is not just for the Fortune 500 CISO or the fortunate few…
Read More
gold key fob reading ERM on keychain

Does ERM Really Matter in Your Organization?

Posted by - October 31, 2018
Maturing Risk Management in Light of COSO Updates Recent updates to the COSO framework serve to clarify the significance of the connection between risk, strategy and performance. Protiviti’s Jim DeLoach discusses how organizations can get the most out of their ERM programs and three keys to advancing ERM. In 2017,…
Read More
closeup of excel spreadsheet

Proceed with Caution When Using Artificial Intelligence

Posted by - October 19, 2018
Challenges with Insights in Excel Artificial intelligence can be a very good thing, but organizations must not jump in blindly. Incisive CEO Diane Robinette discusses potential risks associated with the new artificial intelligence capabilities in Excel. Artificial Intelligence (AI) is a hot topic. It’s the shiny new thing that people…
Read More
red road sign reading "crisis ahead"

Is Your Company Prepared for the Worst?

Posted by - October 16, 2018
Why Business Continuity Must Be Part of Your Strategy Carrying insurance, having a plan, limiting liability… these are all important steps to minimize risk associated with a disruptive event. But without a dynamic business continuity management program, brand equity could suffer significantly. David Nolan, CEO and founder of Fusion Risk…
Read More

Scaling Cyber Supply Chain Risk Management with Dark Web Monitoring

Posted by - October 2, 2018
Implementing Protections Against Cyberattacks Many recent cyberattacks have come through exposures in third-party systems. There is an evident need to monitor the cybersecurity of third parties, and this puts the spotlight on cyber supply chain risk management (C-SCRM). Experts from Kroll outline what companies can do to protect their systems…
Read More
businessman holding wall clock

Managing the Effects of Short-Termism on Risk Management

Posted by - September 28, 2018
6 Recommendations to Maintain Effective Risk Oversight As the financial crisis thoroughly demonstrated, an acute focus on short-term gains can be disastrous when risk proper oversight isn’t there. Protiviti’s Jim DeLoach provides six key considerations your organization can bear in mind in moving beyond myopic “short-termism” to a more broadly…
Read More

Preparing for Cyber Risk

Posted by - September 13, 2018
Q&A with Steve Durbin, Managing Director of ISF Maurice discusses with Information Security Forum’s Managing Director, Steve Durbin, some of the key challenges businesses face today in terms of cybersecurity, as well as how ISF helps its clients manage those risks. Maurice Gilbert: What are the most significant risks that…
Read More
cybersecurity concept padlocks on binary code

8 Realities in Managing Cyber Risk

Posted by - August 29, 2018
Thoughts on Increasing Cyber Resiliency Companies’ adoption of new technologies is outpacing their ability to protect against evolving cybersecurity threats. It used to be said that it’s not a question of IF an organization will be breached, but WHEN. Jim DeLoach suggests that companies either know they’ve been breached or…
Read More