This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Some companies purchase a type of CBI coverage in which certain specified third-party properties that are essential to the insured’s business operations are expressly described on a schedule annexed to the insurance policy in a “dependent property” coverage endorsement. While not confirmed, Russia is the primary suspect.
Ever since the forced bankruptcy of the investment bank Lehman Brothers triggered the financial crisis 10 years ago, regulators, riskmanagers, and central bankers around the globe have focused on shoring up banks’ ability to withstand financial shocks. Peter Dazeley/Getty Images. How can we prevent such a scenario?
Their operations involve partnerships, specializations, and supply chains. Rather than thinking of a clandestine hacker working out of a basement, you will be better served to picture a sophisticated, professional operation working out of an office tower. Integrate email security into your organization’s riskmanagement program.
After all, most financial intermediaries themselves rely on a dizzying, complex, and costly array of intermediaries to run their own operations. This industry supports a number of intermediaries, such as investment bankers, exchange operators, auditors, lawyers, and crowd-funding platforms (such as Kickstarter and Indiegogo).
Forest Reinhardt and Michael Toffel, Harvard Business School professors, talk about how a giant, global enterprise that operates and owns assets at sea level is fighting climate change—and adapting to it. Reinhardt and Toffel are the authors of “ Managing Climate Change: Lessons from the U.S.
ESG is becoming integral to corporate strategy, shaping how companies operate, innovate, and compete. Regulatory compliance and riskmanagement HR is key in ensuring the company meets labor standards, diversity benchmarks, and ethical guidelines. Read more 13 ESG Metrics HR Leaders Should Use To Track Performance 5.
At the beginning of 2017 Experian predicted that the health care sector would be the most heavily targeted vertical industry. A March 2017 report from the Identity Theft Resource Center indicated that more than 25% of all data breaches were related to health care. Department of Health and Human Service’s Office for Civil Rights.
According to Forrester’s Global Business Technographics Workforce Recontact Survey 2017 , just 30% of global information workers at healthcare providers indicated they’ve received training on how to protect workplace data, and only 38% are even aware of their company’s security policies. What tone will work with the staff?
But Rogier thought it was the key to boosting engagement and performance, and he had hinted that he might use Contect’s 2017 annual all-employee meeting—his chance to announce new goals and celebrate the previous year’s accomplishments—to roll out the change. And here’s to an even better 2017!”
Last year was a record year for data breaches , and 2017, so far, has seen its fair share of high-profile cyberattacks. Executives today must operate under the assumption that they will experience a cyber incident that will require them to notify their customers, investors, and regulators. Tom Knight/Getty Images. Insight Center.
Companies are both operators and investors. Many established firms— a 2017 Deloitte survey suggested about 20% in the U.S.—are Companies in every industry can benefit from making more data and algorithm-based decisions in areas of internal operations and finance. 4 to $5 billion was invested by VCs in AI in 2016.
The good news is that natural disasters themselves, which Munich Re says caused $330 billion in economic losses globally in 2017, provide a template for how to mitigate the growing and catastrophic risk posed by AI. Yet few have formally quantified the size of their revenue at risk and potential liability.
Meanwhile, one of Well Fargo’s chief competitors, Bank of America, has been relatively scandal free, with impressive revenue and profit results for the first half of 2017. When it came to risk taking and other behaviors that could generate litigation, lawyer CEOs appeared to act differently from non-lawyer CEOs.
There is a crying need for companies to enlist their supply chain management departments in the fight against cyberattackers. firms in 2017 were launched through the IT systems of suppliers or other third parties such as contractors, up from less than one-quarter of attacks in 2010.
After being denounced for years for its dictatorship and destructive economic policies, Zimbabwe entered a new chapter in November 2017, following the military’s removal of president Robert Mugabe, who ruled the country for 37 years. ALEXANDER JOE/Getty Images. It is not yet clear which direction the new government will take.
Underneath it all, many business leaders have an implicit but unfounded belief that, while it is necessary to reduce workplace injury risk, there is a trade-off between profits and the expenditures necessary to keep workplaces safe. Improved operational performance will result in fewer injuries. One example of this sticks in my mind.
Operations & Technology. In 2017, policy-reform efforts crystalized with the entry into force of the landmark World Trade Organization Trade Facilitation Agreement (TFA), which contains provisions for expediting the movement, release and clearance of goods. Global Alliance for Trade Facilitation: Inclusive Economic Growth. The Impact.
At Frontier Strategy Group, we observed that in 2017, executives and boards paid the most attention to risks that dominated global headlines: Brexit, the Trump administration’s trade policy, cybersecurity, and, more recently, North Korea. Asia-Pacific: China Sea Flashpoints Could Obstruct the Global Supply Chain.
It includes full-fledged exits by corporations like Clorox , one of the first corporations to cease its operations in the market in 2014 (to later be seized by the Venezuelan government), and companies like Bridgestone and General Mills , which sold their Venezuela businesses to local industrial groups and private investors, respectively, in 2016.
In doing research on multinational operations in the Middle East and Africa, we’ve learned that companies are well aware of how President Trump’s foreign and trade policies could affect their businesses there. more competitive prices, more localized products) and improve their riskmanagement and operational efficiency.
Multinational companies operating in Mexico are facing a great deal of uncertainty. Many of the companies we work with that have operations in Mexico have taken up scenario planning to prepare for a range of potential economic and political changes in the country that could affect their businesses. YOY in 2017–2018.
We organize all of the trending information in your field so you don't have to. Join 29,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content