A New Method for Measuring Captive Performance

This post first appeared on Risk Management Magazine. Read the original article. In order to drive operational effectiveness and capital deployment efficiency, leaders of captive insurance companies are increasingly in need of improved methods for performance evaluation and tools that go beyond simple financial ratio analysis or industry benchmarking comparisons. This need includes validation of (more…)

Practical Lessons for Managing Cyberrisks

This post first appeared on Risk Management Magazine. Read the original article. Of all the dangers that consume risk managers’ thoughts, cybersecurity is arguably the most intangible. It is difficult to truly “see” the many factors that can cause breaches or attacks, which often leaves cyberrisk confined to the realm of hypothetical and worst-case scenarios. (more…)

Improving Vendor Risk Management

This post first appeared on Risk Management Magazine. Read the original article. Evolving and increasing regulatory requirements. Growing vendor inventories. Heightened internal pressures to perform risk management functions. Shifting responsibility and accountability for the actions of vendors. These are only a handful of the challenges and considerations companies face when managing third-party risks. In light (more…)

Exploring Liability for Exploding E-Cigarettes

This post first appeared on Risk Management Magazine. Read the original article. Electronic nicotine and non-nicotine delivery systems, more commonly known as e-cigarettes, represent a global market worth almost $10 billion. In the United States alone, e-cigarette sales reached about $4.1 billion in 2016. But as the market continues to grow, reports of exploding e-cigarettes (more…)

Defense Cybersecurity: DOD’s Monitoring of Progress in Implementing Cyber Strategies Can Be Strengthened, Aug 01, 2017

This post first appeared on GAO Reports. Read the original article. What GAO Found Officials from Department of Defense (DOD) components identified advantages and disadvantages of the “dual-hat” leadership of the National Security Agency (NSA)/Central Security Service (CSS) and Cyber Command (CYBERCOM) (see table). Also, DOD and congressional committees have identified actions that could mitigate (more…)

Refugees: State and Its Partners Have Implemented Several Antifraud Measures but Could Further Reduce Staff Fraud Risks, Jul 31, 2017

This post first appeared on GAO Reports. Read the original article. What GAO Found The Department of State (State) and the United Nations High Commissioner for Refugees (UNHCR) have worked together on several measures designed to ensure integrity in the resettlement referral process. State and UNHCR have established a Framework for Cooperation to guide their (more…)

Companies Must Evolve to Keep Up With Hackers

This post first appeared on Risk Management Monitor. Read the original article. If you ask a CFO if their company’s current cybersecurity strategy is working, it’s very likely that they do not know. While at first they may think it is, because the company’s bank accounts are untouched, an adversary could be lurking in their (more…)

Weekly Roundup: July 17 – 21, 2017

This post first appeared on IBM Business of Government. Read the original article. The IBM Center’s Weekly Roundup highlights articles and insights that we found interesting for the week ending July 21, 2017. Michael J. Keegan White House pushes TBM for IT savings and smarter spending.  Chris Liddell, the president’s director of strategic initiatives, thinks (more…)

Corporate Culture and Risk Management

This post first appeared on Risk Management Monitor. Read the original article. According to an April New York Times article, “Uber’s core company values included making bold bets, being “obsessed” with the customer, and to “always be hustling.” The company emphasized meritocracy, setting employees up as rivals and overlooking transgressions of its high performers. At (more…)