Generation Z is poised to comprise nearly a quarter of the global workforce – and they’ll shortly become the first line of defense for most organizations. MetricStream COO Gaurav Kapoor discusses some unique attributes, expectations and risks associated with Gen Z. As Generation Z starts to enter the workforce, it will shortly make up almost a quarter of the global...
G4S’ Rachelle Loyear points to several risk data points from ISACA’s recent State of Enterprise Risk Management survey, offers tactics to improve risk mitigation efforts and shares tips for learning from past industry trends. If you keep tabs on trends in cybersecurity, you’ll have noticed a lot of stories in the last year or two focusing on the Industry 4.0...
If you think retooling your website to be fully accessible is cost prohibitive, consider the cost of noncompliance. Deque Systems CEO Preety Kumar explores what a lack of accessibility can cost an organization. Legal action taken against companies for having websites, mobile apps and docs that aren’t accessible to those who are visually, hearing or cognitively impaired and more has...
How should you plan your post-acquisition merger strategy? Jay Rosen continues his series on monitoring in an M&A context with this exploration of how to strategize the merger following an acquisition. To plan your post-acquisition merger strategy, first you should start with the Department of Justice (DOJ) and the information contained in various resolution documents on the DOJ’s website. These...
The court of public opinion often moves faster and perhaps more harshly than most courts of law. That's why The Red Flag Group surveyed business decision makers against 20 compelling questions to determine the importance of protecting reputation. The results? Interesting trends emerged here, as did the best practices that today's successful organizations are using to protect themselves from internal...
Gartner’s Matt Shinkman discusses a sound strategy to increase executive urgency to address exposure to emerging risks, including building agreement on risk impact and presenting leadership with solution options. Gartner research suggests that 90 percent of risk leaders believe their companies need to act faster to get ahead of emerging risks. “Emerging risk” is defined as “a risk that does...
Cognitive governance is the first of five pillars making up the cognitive risk framework; the second is intentional control design. James Bone discusses chief considerations around intentional design. The five pillars of a cognitive risk framework are designed to provide a three-dimensional view of enterprise risks. In the last installment, cognitive governance (CogGov) was introduced as the first pillar. Its...
Social media communication is a rarely implemented risk management tool, but it should get more play. Michael Toebe makes the case for why engaging, authentic use of social media is a real asset for corporate leaders and organizations. Increased development of social media communication can result in greater effectiveness of risk management, both internal to the organization and external. This...
The Shared Assessments Program, the member-driven leader in third-party risk assurance, recently released a new set of findings and recommendations developed with C-level executives and risk experts from a dozen organizations. The briefing paper provides boards of directors and C-level executives with new findings on the role of and increasingly crucial importance of board oversight, specific high-profile case study examples of...
Remember when email was the only way we shared information? Modern communication methods have evolved -- and risk has grown along with it. But you know that already, right? If you’re on this page, you might already have concerns relating to communication. With official conversations taking place on social media, on collaboration platforms like Slack and Microsoft Teams -- or...
The Shared Assessments member-led consortium for third-party risk management has introduced an assessment and monitoring module, the latest addition to the Third-Party Risk Management (TPRM) Framework trusted by cybersecurity, risk management, threat intelligence and compliance professionals worldwide. Instant Download: Read it Now Can’t see the download form? Disable your ad blocker.
Acquisition of Expolink and addition of new managing director are moves to support the region as new regulations proliferate LONDON (October 9, 2019) – In response to rapidly growing marketplace demand for its products, leading risk and compliance software and services company NAVEX Global® is expanding its presence in the U.K. and across the EU to serve a wider range of...
Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2024 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |