A- A A+

CB Login

 
   
Forgot Login?   Sign up  
Go to Articles

Risk Management

Cohort Trainees:  You may submit new resources here.


Title:
Author:
NCSU and ERMI
Date:
2017
Published by:
Enterprise Risk Management Initiative
Summary:
The North Carolina State University’s Enterprise Risk Management Initiative Library and Data Base of risk aversion/management articles, resources, and research
Keywords:
Risk management, risk aversion, Enterprise Risk Management Initiative, NCSU


Title:
The Role of Leadership in Managing Risk
Author:
Carol Stephenson
Date:
December 2010
Published by:
Ivey Business Journal
Summary:
Author discusses how leadership cannot control people through policies, procedures and policing, but can only do it through a strong risk management culture and absolute integrity in all leaders.
Keywords:
Risk management, risk aversion, leadership, Ivey Business Journal


Title:
Leadership in Risk Management
Author:
Harvard Business Review
Date:
2017
Published by:
Harvard Business Review
Summary:
A Harvard Business Review Analytic Services Report on Leadership and Risk Management.
Keywords:
Risk management, risk aversion, leadership, Harvard Business Review


Title:
Role of Senior Leadership in Quality Risk Management
Author:
Lori Richter , Ghada Haddad
Date:
December 21, 2015
Published by:
Institute of Validation Technology
Summary:
Senior leadership has a significant role in ensuring the success of Quality Risk Management in the organization. Company leaders must invest in, and be accountable for, risk management programs. Their objective should be to proactively manage risk – prevent risk rather than only correcting risk situations. Senior leaders have distinct responsibilities in all areas of the QRM process.
Keywords:
Risk management, risk aversion, leadership, senior leadership, Institute of Validation Technology


Title:
The Right Way to Monitor & Measure Performance Targets
Author:
Dejan Madjoski
Date:
January 22, 2015
Published by:
linkedin.com
Summary:
"Monitoring and measurement of performance is the longest phase in the performance management cycle. During this phase the manager/evaluator is supposed to keep an eye on the performance related to the set targets and constantly monitor it in order to be able to keep it on the right track. In that direction the purpose of this phase is not only to measure and evaluate the end results but to control the overall performance throughout the whole period between target setting and evaluation."
Keywords:
Risk management, linkedin.com, KPI's, strategy, performance management, human resources


Title:
Risk Management Can Stimulate, Rather than Deter, Innovation
Author:
Steve Culp
Date:
January 7, 2013
Published by:
www.forbes.com
Summary:
"Innovation and risk management seemingly do not naturally go hand-in-hand in many peoples' minds - although we would argue that it should. Wouter Koetzier, who leads Accenture's Innovation and Product Development consulting group, and I have been exploring the benefits of better connecting the two functions and as a result, Wouter is contributing to this column."
Keywords:
Risk management, Forbes


Title:
Application Performance Management, Your Resource for APM, ALM and Performance Monitoring
Author:
applicationperformancemanagement.org
Date:
2017
Published by:
applicationperformancemanagement.org
Summary:
"Key Performance Indicators define factors the institution needs to benchmark and monitor. Assessment techniques provide the mechanism for measuring and evaluating the defined factors to evaluate progress or impact. KPIs specify what is measured and assessment techniques detail how and when it will be measured. KPI is a measure used to define and evaluate how successful an organization is. Typically is expressed in terms of making progress towards its long-term organizational goals. KPI incorporates information on the sources, calculations and definitions for each measure and sets out the timetable for submission of monthly data."
Keywords:
Risk management, KPI's, applicationperformancemanagement.org, performance monitoring, Balances Scorecard, performance management


Title:
Key Performance Indicators, Winning Tips and Common Challenges
Author:
Dr. Rachad Baroudi PhD, Director, Strategy Advisory, Services, EY, United Arab Emirates
Date:
May 2014
Published by:
performance.ey.com This article is an extract from Performance, Volume 6, Issue 2, May 2014. The full journal is available at ey.com/performance
Summary:
"Having an effective key performance indicator (KPI) selection and monitoring process is becoming increasingly critical in today's competitive and integrated business environment. Companies rely on managers and staff to choose and monitor the right KPIs. This requires the development of a robust performance measurement capability that is based on mature KPI-management expertise and supported by a collaborative performance culture. This article will help the reader to use KPIs to generate value in any organization."
Keywords:
Risk management, KPI's, http://performance.ey.com, performance management, performance monitoring


Title:
Managing Risks: A New Framework
Author:
Robert Kaplan and Anette Mikes
Date:
June 2012
Published by:
Harvard Business Review
Summary:
"Since this issue of HBR went to press, JP Morgan, whose risk management practices are highlighted in this article, revealed significant trading losses at one of its units. The authors provide their commentary on this turn of events in their contribution to HBR's Insight Center on Managing Risky Behavior."
Keywords:
Risk management, Harvard Business Review, strategic planning


Title:
Strategic Risk Management- A Primer for Directors
Author:
Posted by Matteo Tonello, The Conference Board
Date:
August 23, 2012
Published by:
Harvard Law School Forum on Corporate Governance and Financial Regulation
Summary:
"This article focuses on two key aspects of the relationship between risk and strategy: (1) understanding the organization's strategic risks and the related risk management processes, and (2) understanding how risk is considered and embedded in the organization's strategy setting and performance measurement processes. These two areas not only deserve the attention of boards, but also fit closely with one of the primary responsibilities of the board — risk oversight."
Keywords:
Boards of Directors, Management, Performance measures, Risk assessment, Risk management, The Conference Board


Title:
Department of Homeland Security Risk Management Fundamentals
Author:
US Department of Homeland Security
Date:
April 2011
Published by:
dhs.gov
Summary:
"This doctrine, Risk Management Fundamentals, serves as an authoritative statement regarding the principles and process of homeland security risk management and what they mean to homeland security planning and execution. It is intended as the capstone doctrine on risk management for the Department of Homeland Security (DHS). Furthermore, Risk Management Fundamentals serves as a foundational document supporting DHS risk management efforts in partnership with the homeland security enterprise."
Keywords:
Risk management, dhs.gov, risk assessment, strategic planning, monitoring and evaluation, key business practices, risk communications


Title:
Johnson and Johnson: Framework for Enterprise Risk Management
Author:
Johnson and Johnson
Date:
2013
Published by:
jnj.com
Summary:
"In order to deliver value to our consumers, patients, caregivers, employees, communities and shareholders, we at Johnson & Johnson (J&J) must understand and manage the risks faced across our entire organization. Risks are inherent in our business activities and can relate to strategic threats, operational issues, compliance with laws, and reporting obligations. This document provides an overview of our enterprise-wide approach to risk management (the "J&J Enterprise Risk Management Framework") and illustrates examples of how this approach is implemented within the organization."
Keywords:
Risk management, strategic planning, strategic framework, Enterprise risk management (ERM), governance and oversight, Johnson and Johnson, jnj.com


Title:
Concepts of Strategic Risk and Managing Strategic Risk, Presentation to the Strategic Planning Task Force
Author:
Joanne Curtis Taylor, Chief Audit Executive, VSU
Date:
January 13, 2012
Published by:
Virginia State University
Summary:
Virginia State University Presentation to the Strategic Planning Task Force discussing the Internal Audit, Enterprise Risk Management (ERM), and Strategic Risks (SRM) and objectives
Keywords:
Risk management, Virginia State University, strategic planning, strategic risk (SRM), Enterprise Risk Management (ERM)


Title:
What Is Strategic Risk Management?
Author:
Mark L. Frigo and Richard J. Anderson
Date:
April 2011
Published by:
markfrigo.org
Summary:
"Organizations know they must manage strategic risk to create and protect value. Here are some guiding principles that might help."
Keywords:
Risk management, strategic planning, strategic risk management (SRM), Enterprise Risk Management (ERM), risk assessment, markfrigo.org


Title:
Exploring Strategic Risk: 300 executives around the world say their view of strategic risk is changing
Author:
Forbes Insights and Deloitte
Date:
2013
Published by:
deloitte.com, for more information, visit www.deloitte.com/strategicrisksurvey
Summary:
"In the survey, Deloitte wanted to better understand how businesses can manage strategic risk more effectively – both now and in the future. The survey explored a wide range of issues and questions, including: To what extent are companies considering and addressing risks when developing and evaluating their business strategies? What new risks do their strategies create? Which strategic risks are critical to avoid – or essential to take? What is the strategic impact of new technologies, and which investments are essential to managing risks and exploiting new opportunities? Also, even if a company's strategy is executed flawlessly, what other risks could undermine the business? Focus areas of the survey included the alignment of strategy and risk, monitoring strategic investments, and emerging views of strategic risk management."
Keywords:
Risk management, Strategic risk management (SRM), risk assessment, strategic planning, Deloitte, Forbes Insights


Title:
Can Security Awareness Training Change Behavior and Reduce Risk
Author:
Tod Newcombe
Date:
October/November 2016
Published by:
Government Technology
Summary:
"CIOs and CISOs realize that human error is perhaps the biggest weakness in any information security program -- but proper training may condition employees not to click or open anything that looks remotely suspicious."
Keywords:
Risk management, security awareness, risk assessment, cyber threat, cyber security, govtech.com


Title:
The Best Cybersecurity Investment You Can Make Is Better Training
Author:
Dante Disparte and Chris Furlow
Date:
May 16, 2017
Published by:
Harvard Business Review
Summary:
"Spending millions on security technology can certainly make an executive feel safe. But the major sources of cyber-threats aren't technological. They're found in the human brain, in the form of curiosity, ignorance, apathy, and hubris. With any cyber threat, the first and last line of defense are prepared leaders and employees, whether they are inside an organization or part of an interconnected supply chain. To calibrate and improve employee risk training, firms must recognize and react to three uncomfortable truths: first, cyber risk evolves according to Moore's Law. That's a major reason that technology solutions alone can never keep pace with dynamic cyber-threats. Second, as with all threat management, defense is a much harder role to play than offense. The offensive players only need to win once to wreak incalculable havoc on an enterprise. Third, and worst yet, attackers have the power of patience and latency on their side. Firms can be lulled into a dangerous state of complacency by their defensive technologies, firewalls, and assurances of perfect cyber hygiene."
Keywords:
Risk management, cyber security, Harvard Business Review, cyber threat


Title:
Meet the Threat: States Confront the Cyber Challenge: Memo on State Cybersecurity Strategies
Author:
Inside Cybersecurity
Date:
March 14, 2017
Published by:
insidecybersecurity.com
Summary:
"This memo provides an overview of state cybersecurity strategies, as well as information technology and homeland security strategies with cybersecurity components. Possessing and implementing a cybersecurity strategy is critical for the state and assists in garnering more resources.1 Through this overview, NGA has identified a number of best practices for states considering developing a statewide cybersecurity strategy. 2 Among the 22 plans identified in 18 states, 14 are IT strategic plans, six are cybersecurity strategic plans, and two are homeland security strategic plans. The IT and homeland security agencies' strategic plans tend to limit their scope to primarily protecting the state's IT ecosystem and critical infrastructure, respectively. The statewide cybersecurity strategic plans, however, detail specific objectives to achieve a wide range of goals."
Keywords:
Risk management, cyber security, cyber threat, information technology, strategic planning, insidecybersecurity.com


Title:
STATE OF THE STATES ON CYBERSECURITY: CALIFORNIA | MARYLAND | MICHIGAN | NEW JERSEY
Author:
Francesca Spidalieri, Senior Fellow
Date:
November 2015
Published by:
Salve Regina University, PELL Center for International Relations and Public Policy
Summary:
"This report provides a general overview of the current level of "cyber readiness" across different states in the United States and explores some of the effective mechanisms and activities at the state-level to protect infrastructure, information, and operations in both the public and private sectors, and to promote cybersecurity workforce development and business opportunities."
Keywords:
Risk management, cyber security, cyber threat, information technology, strategic planning, Salve Regina University, PELL Center for International Relations and Public Policy


Title:
The Five Critical Attributes of Effective Cybersecurity Risk Management
Author:
Raj Chaudhary and Jared Hamilton
Date:
July 2015
Published by:
www.crowehorwath.com and scadahacker.com
Summary:
(White Paper) "The size, complexity, and ever evolving nature of cyber-attacks mean there's no one-size-fits-all way to respond. Whatever your organization's plan to mitigate the risk of data breaches, to be effective, the five attributes discussed here must be part of it."
Keywords:
Risk management, cyber security, cyber threat, information technology, strategic planning, Crowe Horwathe


Title:
Why risk management is critical in cybersecurity
Author:
Mark Rockwell
Date:
January 12, 2017
Published by:
fcw.com
Summary:
"The concept of cybersecurity as a risk management problem is taking root in corporate boardrooms as well as inside government agencies."
Keywords:
Risk management, cyber security, cyber threat, information technology, strategic planning, fcw.com


Title:
An Enhanced Data-Analytic Framework for Integrating Risk Management and Performance Management
Author:
Shital Thekdi and Terje Aven
Date:
July 14, 2016
Published by:
Elsevier
Summary:
"There is increasing interest for agencies and industries to develop risk management processes for a wide variety of applications. Traditional risk management processes are motivated by controlling risk and avoiding losses. In contrast, other organizational processes focus on managing performance and value generation. In this paper we argue that risk management also adds an important contribution to these processes. However, this requires "proper" risk management extending beyond narrow safety oriented perspectives built on quantitative risk analysis and tolerability/acceptance criteria. There is need for a broad risk-performance framework with uncertainty being a main component of risk ,and where knowledge and surprises are adequately reflected. In the paper we present and discuss such a frame-work. The frame–work is developed on the basis of an analysis of combinations of different risk management and performance management practices/policies. We show how the risk and performance management processes can be improved by proper risk conceptualization and a holistic thinking on how to develop and use goals in the organization, how to balance different concerns, and consider the need for agility – "sensitivity to operations", as well as how to give weight to vulnerabilities, resilience, and anti-fragility."
Keywords:
risk management, risk aversion, Elsevier, data-analytics, performance management


Title:
Coca-Cola's Unique Challenge: Turning 250 Datasets Into One
Author:
Sam Ransbotham
Date:
2015
Published by:
Massachusetts Institute of Technology
Summary:
"Mathew Chacko, Coca-Cola's director of enterprise architecture, and Remco Brouwer, the company’s director of business intelligence, spoke with Sam Ransbotham, an associate professor of information systems at the Carroll School of Management at Boston College and the MIT Sloan Management Review guest editor for the Data and Analytics Big Idea Initiative about the challenges of integrating so many data sets, the ways the company is moving toward a predictive analytics model, and the value of visualizations to convey complex information."
Keywords:
Risk Management, Risk Aversion, Coca-Cola, Remco Brouwer

AddToAny Buttons