Risk Management

Risk Management | News, how-tos, features, reviews, and videos

asia balance focus success cultivate harvest transform pixabay sasint
security risk thinkstock keyboard

blue skies vs. storm clouds - pros vs. cons - positives vs. negatives - risk assessment analysis

Weather data + business data = optimized risk analysis

Gone are the days of relying on weather data alone to increase your operational decision-making. Instead, the most successful companies are merging weather data with other information to innovate the way they analyze risk and reward. ...

co-workers using a laptop, having a discussion and gesturing

What management risks can cause software outsourcing to fail?

Looking at what risks management can pose to software development outsourcing.

europe data privacy rules primary

To manage GDPR data risk, pay attention to your service level agreements

Your technology suppliers provide a pipe, platform or other web-based application to enable their clients to do business over the Internet. Unless the client has stipulated their security requirements, the supplier is likely to only...

robot monitoringa  cog wheel system for maintenance [automation]

7 ways to balance RPA risk and opportunity

These seven steps, plus a slightly more formal approach, will ensure that you achieve your RPA objectives and will go a long way to reducing any risk the change might introduce to your processes.

billing software primary

What business risks can cause software outsourcing to fail

Looking at what business risks can be posed to software development outsourcing.

program dirty 2018.03.08 15.59.26.01 04 51 12.still001
video

CIO Leadership Live with Mojgan Lefebvre, CIO of Global Risk Services at Liberty Mutual | Ep 6

Host Maryfran Johnson talks with Mojgan Lefebvre, CIO for Liberty Mutual's Global Specialty business, about how the insurance firm is leveraging the cloud, creating business-specific data strategy and getting the best from its...

gambling chips

The risk-taker CIO paradox

Leadership requires taking risks. But technology must work reliably. How do IT leaders square these two realities?

risk complexity tightrope

Managing risk: 5 ways you can be liable in the cloud

Understand your liability risks when choosing your cloud provider.

puzzle tower / growth / achievement / risk / balance

Insights from the Gartner Security & Risk Summit

The Gartner Security & Risk Summit took place the week of June 12-15. Here are the key insights relevant to CIOs and other IT leaders.

cloud automation job skills

Balancing the benefits of automation with third party risks

Current market pressures are demanding organizations to strike a balance between the value automation can bring and risks associated with it.

The top 6 Governance, Risk and Compliance certifications

CEOs are always on the lookout for dependable folks who can identify potential exposures and quantify the impacts of risk on an organization while protecting the interests of employees, shareholders, other organizations and the...

dentist

Risk assessments for local governments and SMBs

Does your organization have a mature risk management program or are your just crossing your fingers and hoping for the best? Risk assessments are an essential part of your information and IT governance programs.

img 20170512 095943

'Perfect storm' of ransomware and network worm hits unprotected computers globally

Enterprises were clearly unprepared. The question is if they'll fare any better the next time around -- and there will likely be a next time.

internet web security risk

8 ways to manage an internet or security crisis

IT, communications and security experts share tips on what to do when your business is hit with an IT-related disaster, such as a cyberattack, an ecommerce site crash or a software failure.

dollar

With security awareness, money talks

One problem with what we tell employees about taking security precautions is that the precautions interfere with their jobs.

Threat detection automation won’t solve all your problems

To close the cybersecurity gap, look to incident response automation

3 sensitive data hacker phone

How can CSOs protect their CEO?

CEOs have a high level of visibility outside the organization and attackers can leverage the data they collect as a way to target them for cybersecurity attacks. Organizations can help protect your CEO from cybersecurity attacks by...

ransomware

Information governance for counties and municipalities

Most county and municipal governments don't have formal information governance programs, but adoption of IG would reduce risks, lower costs and vastly improve quality of services in these organizations.

Load More