Risk

Risk refers to threats an organization faces -- loss of earnings, loss of reputation, or harm of any kind.  These articles explore the challenges of preventing, identifying and mitigating risk. Risk can come in many forms, including financial issues, legal liabilities, strategic or leadership errors, or accidents and natural disasters. Today,  IT- and data-related risks are growing concerns. The following articles about risk look at the issue from many angles, especially from that of compliance officers and risk managers.

De-Risk Your Bets on AML Testing

De-Risk Your Bets on AML Testing

Rising global monetary transactions have facilitated increased movement of illicit funds, making efforts against money laundering a top priority. Compliance with recently established anti-money laundering policies is vital to financial institutions - Wipro Limited advises on how to get the most out of your AML products.

Supply Chain Risk Management

The Modern Slavery Act: Supply Chain Risk Management

Last year, the UK enacted an Act of Parliament intended to combat slavery and human trafficking in the UK and in the supply chain of all businesses operating therein. In order to ensure compliance with the Modern Slavery Act, corporations must make public either their efforts to stop the use of slave labor by their suppliers or their inaction to...

Asymmetry: A Revised Mental Model for Enterprise Risk

Asymmetry: A Revised Mental Model for Enterprise Risk

Asymmetric risks – risks for which the potential gains are far greater than the potential losses (or vice versa) – can be difficult to plan for, and the events associated with asymmetric risk tend to sneak up on us, regardless of how predictable they may seem. So what impact do these risks have on ERM? Perhaps a mental shift is...

Featured image for Question Everything eBook

Question Everything: Effective Due Diligence and Third-Party Risk Management

With almost every FCPA enforcement action involving third party misconduct in one form or another, shouldn’t companies devote more resources than ever to due diligence and third-party risk management systems? There’s no magic formula to implementing an effective system. It just takes two things: commitment and common sense. Every company knows how to do it. But not every company commits...

Are You Managing Your Risk?

Are You Managing Your Risk?

The BSA/AML risk assessment will allow you to have a better understanding of your overall risk. The risk assessment should be comprehensive and well-documented. When complete, an effective risk assessment should enable the MSB to establish policies, procedures and internal controls to develop the company’s BSA/AML compliance program.

5 Steps To Good Social Media Governance

5 Steps To Good Social Media Governance

Compliance with regulatory requirements can get complicated when companies in highly regulated industries take to social media. Subject matter expert Joanna Belbey offers five steps to ensure that when your company posts, they do so purposefully, knowledgeably and well within the bounds of the law.

Best of 2015: Defining the 5 Lines of Defense

Rather than segregating risk management responsibilities into their own silo, making them the purview of only a select few, companies would benefit greatly from an integrated approach in which every person in the organization is responsible to some extent in managing risk. Jim DeLoach presents a method involving five distinct lines of defense. Read on for details.

Investment Advisers and the Bank Secrecy Act: A Risk-Based Response to FinCEN’s Call to Arms

Investment Advisers and the Bank Secrecy Act: A Risk-Based Response to FinCEN’s Call to Arms

Earlier this month the New York State Department of Financial Services announced proposed anti-money laundering and terrorist financing regulations. If adopted, the proposed rules will subject investment advisers to Bank Secrecy Act requirements for financial entities. Regulatory and private scrutiny of compliance programs is expanding, as is the cost of compliance...

Security and Privacy: Head-on Collision or Blissful Matrimony?

Security and Privacy: Head-on Collision or Blissful Matrimony?

Data control risk is one of executives' top concerns, especially in light of the fact that the government's growing role in controlling data flows could lead to resistance among foreign partners and investors. The recent passage of the Cybersecurity Information Sharing Act only exacerbates this risk. So what can companies do to manage data control risk amid this rapid increase...

A Practical Approach to Supply Chain Risk

The importance of due diligence on third parties – vendors, suppliers, their vendors and suppliers, and so on – cannot be overstated. When news breaks of a vendor using child labor or doing business in countries well-known for their human rights violations, it won’t matter much to the public exactly how removed the connection is from the corporation itself. The...

Page 41 of 51 1 40 41 42 51