Managing IIoT Product Defect Risks

This post first appeared on Risk Management Magazine. Read the original article. The industrial internet of things (IIoT) is reinventing manufacturing as a highly connected enterprise dependent on machine-produced data flowing from equipment on the factory floor and disparate locations over high-bandwidth wireless and wired networks to IT data centers and control systems in the (more…)

The 5 P’s of Creating a Crisis Management Plan

This post first appeared on Risk Management Magazine. Read the original article. In today’s dynamic business environment, one of the few certainties is that organizations of all types and sizes are likely to confront an enterprise-defining crisis at some point. Despite the high probability of this occurrence, such an incident will still come as a (more…)

Excellence in Risk Management India 2019

This post first appeared on Risk Management Magazine. Read the original article. In the latest edition of the Marsh and RIMS report Excellence in Risk Management India, a vast majority of respondents emphasized wanting to forge stronger ties between risk management and strategic planning. Indeed, about two-thirds said that integrating risk management into strategic planning (more…)

Bringing AI to Network Security

This post first appeared on Risk Management Magazine. Read the original article. It is no longer enough for companies to reactively address cybersecurity threats. Instead, it is increasingly important for businesses to be able to proactively identify and respond to any type of unusual activity taking place on their networks. To make matters more complicated, (more…)

Information Security: VA and Other Federal Agencies Need to Address Significant Challenges, Nov 14, 2019

This post first appeared on GAO Reports. Read the original article. What GAO Found Federal agencies, including the Department of Veterans Affairs (VA), continue to have deficient information security programs. For example, in fiscal year 2018, inspectors general (IGs) used a five-level maturity model to rate agency information security policies, procedures, and practices related to (more…)

About Face: The Risks and Challenges of Facial Recognition Technology

This post first appeared on Risk Management Magazine. Read the original article. While millions of people happily use facial recognition to log in to their smartphones, 2019 has seen a notable backlash against such biometric technology. Around the world, law enforcement agencies have been criticized for using facial recognition technology to identify potential criminals in (more…)

Data Ethics: Risk Management for the Algorithmic Age

This post first appeared on Risk Management Magazine. Read the original article. Many companies today use big data analytics—a term that encompasses machine learning and many forms of artificial intelligence—to provide value throughout the organization, including applications for everything from operations to marketing to human resources. Much of the discussion around big data analytics focuses (more…)

Redefining Technology Risk

This post first appeared on Risk Management Magazine. Read the original article. Companies across industries are navigating one of the most challenging business climates in recent memory. Economic growth continues to trend well below historical norms, creating pressure to reduce overhead and develop new revenue streams, while the divisive political climate spreads uncertainty across the (more…)

Aligning Sustainability and Risk Management

This post first appeared on Risk Management Magazine. Read the original article. In September 2019, the Business Roundtable, a nonprofit association made up of CEOs from major American companies, issued a statement that the primary focus of business is no longer to drive shareholder value, but to work in the interests of all stakeholders, including (more…)