Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
IP data can be used for a lot more than traditional patent searching. In this white paper we look at how the insights from IP can be used to identify and mitigate risks. And we used virtual reality as our guide.
Fraud can happen in any organization—big or small— even in yours. Read this e-book to learn how to identify risks in your organization. It details how and why fraud happens in many organizations, four steps to prevent and detect fraud through internal controls, and why properly designing controls is a crucial step.
As the focus on internal controls moves into its second decade, it'd be easy to assume that most organizations have mastered their processes. However, with the adoption of the 2013 COSO Framework, increased requirements from the PCAOB, and board focus on risk and compliance processes, many internal control programs are undergoing major modifications in numerous areas. Read this e-book to find out how and why companies have made the move to different platforms, including why companies need to focus on utilizing the most productive tools, several technology approaches used by organizations, and the merits of taking a fresh approach to technology to manage internal control processes.
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance.
This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Enterprise risk management (ERM) is moving to the top of corporate agendas, and evidence shows strategic risk is a key factor in a robust ERM framework.
Check out this white paper from risk management pioneer James Lam. In it, Lam explains why every organization should be focusing on strategic risk. You'll learn how to integrate risks into the planning process, use economic capital and risk-adjusted return on capital to measure risk, and how to apply these results.
The future value of an organization greatly depends on how effective management is at foreseeing future events with a high degree of confidence. However, no matter how confident a management team may be in a given growth strategy or current operation, the future is not something that can be predicted. As boards place greater scrutiny on the discipline of risk management and as investors demand greater disclosure of firm information, the connected disciplines of risk management and financial disclosure will likely become further intertwined.
Join Mike Rost, Vice President of Vertical Solution Strategy at Workiva, as he discusses how the discipline of risk management is connected to the requirements of financial disclosure, directional changes, and how to mature your process with evidenced-based risk management.
The Internet of Things is not technical—it’s transformative. Billions of devices and objects (“things”) are being embedded with sensors and chips. As these “things” gain the ability to communicate using the Internet, the resulting information networks deliver an exponential increase in insight about customer behavior.
IT departments are faced with new challenges, with increased competition, lower customer loyalty and globalisation. It all requires faster development while dealing with shadow IT, legacy systems and requirements for highly skilled teams, with expertise in new, disruptive technologies.
Cyber crime is one of the most innovative businesses in existence today – and make no mistake, it is a business. This guide looks at how cyber crime has evolved and continues to evolve - and the necessity now of taking a user-focused approach to network security. If you’re in the business of helping your customers businesses stay secure – or if you’re thinking about it
Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related issues. In this whitepaper we highlight the reasons why an effective cyberdefense strategy should involve multiple layers of technology and detail why customer disruption is a revenue killer in world of the managed service provider (MSP).
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
This white paper will describe the main problems merchants face when it comes to customer conversions and payment acceptance, and suggest solutions that will enable you to increase your conversion rate.
While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.
This whitepaper, written in collaboration with TAL Global (a leading security consulting and risk management firm), highlights five case studies to illustrate common legal and security issues associated with BYO.