What are the risks of machine learning and how can you adequately assess and manage them?
By ensuring you’ve built a comprehensive program that aligns with cybersecurity risk analysis best practices, you can generate buy-in throughout the organizat
A slow approach to digital transformation won’t cut it anymore.
It’s essential to take an active approach to cyber risk management. Compliance with industry regulations is a good starting point, but it’s no longer enough.
Third-party risk management is a big responsibility, with threats coming from all directions. But rather than fearing the unknowns, learn how to find them.
To assess your organization’s risk management maturity for a combined assurance program, you’ll need to answer five questions.
To properly assess and manage short- and long-term COVID-19 risks, higher education risk professionals must adjust their priorities and processes.
As leaders and boards grapple to identify COVID-19 related risks, and adjust to a new normal, here are four ways that internal audit can add real value.
Environmental, social, and governance (ESG) assurance is increasingly becoming a focus of global organizations—and audit teams need to be ready to respond.
The COVID-19 pandemic has fundamentally shifted not only global business and the economy, but our entire world as we know it.
From city governments to school districts, ransomware attacks are on the rise.
Just like you, we’re responding to a near-unpredictable event. This is our commitment to uninterrupted service, safety, and knowledge sharing.
Cybersecurity risk is growing and evolving globally, and conducting a cyber-risk assessment is one way that auditors can help to mitigate it.
Ensuring that your most critical organizational risks are addressed first is essential when designing internal controls.
From manufacturing companies to government agencies, every sector is at risk. We look at some ways to reduce your cybersecurity risks this holiday season.
An ERM program that properly evaluates, monitors, and helps foresee risks—along with an effective resolution program—is invaluable.
CISOs may have hundreds of metrics to manage, but only a few will be relevant to the board. Here’s how to select the right metrics for your organization.
Heading into 2020, the CISO is stepping out of the server room and into the boardroom. We look at six common challenges they face in this new role.
A successful TPRM program extends way beyond the onboarding process. Organizations need to be invested in the whole TPRM lifecycle to properly manage risk.
Businesses that don’t digitalize quickly are going to be left behind, but there are inherent risks in transforming your business to take advantage of digitaliza
Global security threats are increasing each year, but taking a risk-based approach to your threat and vulnerability management can help.
There are many different assurance providers, all working in silos, making a complete risk picture difficult to obtain—but combined assurance can help.
Risk management is evolving in the financial services industry. Traditionally, risk was managed by the risk management and compliance functions.
Auditors relying on word processing documents and spreadsheets can face a number of risks and administrative challenges.
Risk management for P2P processes is especially challenging for governments. We show you how data analytics and control monitoring can make all the difference.
ERP systems are meant to minimize risks, but they sometimes create risks of their own.
A major challenge for GRC is that it’s often implemented in silos.
Once you’ve put controls in place to manage risks, how do you know they’re working? Find out how data analytics can help give you peace of mind.
How do you make the right choice when purchasing ERM software? These 15 capabilities can make all the difference.
You might be hesitant to implement CCM given some myths about its practicality or affordability. We untangle three of these myths here.
Determining the likelihood and probability of risks can be quite subjective. Here’s how you can change that.
How do you know you’ve selected the right key risk indicators for your organization? Here’s what makes a good KRI.
Technology is a huge part of BCBS 239 compliance. Here are three ways purpose-built risk management software makes it easier to comply with this regulation.
Step by step, here’s a basic framework you can use to apply data analytics to risk assessments and controls within your organization.