Rethinking School Shooter Response and Prevention

This post first appeared on Risk Management Magazine. Read the original article. According to Education Week, there were 14 school shootings that resulted in injuries or deaths in the first six months of 2018. these shootings left 32 people dead—26 of whom were students—and 67 injured. Advocacy group Everytown for Gun Safety reports that there (more…)

404 Error: How to Prevent Tech Project Failures

This post first appeared on Risk Management Magazine. Read the original article. Technology improvements are vital for meeting evolving business needs, but poor project management can lead to unmet expectations and significant excess costs. Adopting new technology products, overhauling existing IT systems, or pursuing new internet services are not easy. In fact, if there is (more…)

Managing Energy Sector Risks

This post first appeared on Risk Management Magazine. Read the original article. In the energy industry, one of the most fundamental issues is pricing. According to a Thomson Reuters study, Risk Management in the Energy Sector, as prices for oil and gas fluctuate, companies can have difficulty determining if their selling prices will cover exploration (more…)

Jacksonville Murders Force Reassessment of Active Shooter Risks

This post first appeared on Risk Management Monitor. Read the original article. A mass shooting at a video game tournament in Jacksonville, Florida on Sunday has once again shined a spotlight on the growing risks businesses face even as they conduct normal operations. A lone shooter, 24-year-old David Katz, opened fire on football video gamers (more…)

Follow-Through Needed for Effective Safety Culture

This post first appeared on Risk Management Monitor. Read the original article. The concept of a culture of safety can be stalled by employers that say they want to be safer, but do little to implement real change. For example, a company hoping to understand the causes of fatigue, but won’t adjust its schedules, can (more…)

Developing a Formal Cyber Incident Response Plan

This post first appeared on Risk Management Magazine. Read the original article. Among the many topics that battle for risk managers’ attention, cybersecurity incident response planning is one that repeatedly surfaces each year with escalating frequency. Yet surprisingly, according to a 2018 Ponemon Institute study, only 24% of companies have a cybersecurity incident response plan (IRP) (more…)

Body Scanners tested for Mass Transit, Installed in L.A.

This post first appeared on Risk Management Monitor. Read the original article. Security scanners that screen passengers entering stations and terminals are being tested around the country and have been installed in subway stations in Los Angeles. The Associated Press reported that the machines scan for both metallic and non-metallic objects. They can detect suspicious (more…)

Cyber Insurance Strategies Explored: RIMS Report

This post first appeared on Risk Management Monitor. Read the original article. High-profile data breaches have been making headlines recently, and their damage can transcend industries, which is why cybersecurity is often a top priority for risk managers. With many traditional insurance policies no longer responding to or outright excluding cyber events, risk professionals must understand their (more…)

New RIMS Report: Establishing and Communicating ERM Info

This post first appeared on Risk Management Monitor. Read the original article. Recent trends indicate that management is being conferred more than ever by executives and boards who are looking for information that can aid in decision making. This has moved the value of enterprise risk management (ERM) to the forefront, to give the board (more…)

Cyber’s Human Side

This post first appeared on Risk Management Monitor. Read the original article. People are often tired, distracted and overworked. They are bound to make mistakes, inadvertently overlook policies and procedures and have quick lapses in judgement—forgetting hours and hours of training. Human error is a significant problem when it comes to managing cyber exposures. Most (more…)