Strategic Risk

The following 270 items are listed by Content Data.
Blog

How to Mitigate Risks Using Effective Business Continuity Planning

Thorough business continuity plans help organizations minimize the risks of a disaster and restore vital b...
Blog

Important Roles You Need to Be Aware of During Enterprise Risk Management

The chief audit executive (CAE) and internal audit can play one or more of the following roles in conjuncti...
Blog

Self Assessment: Launching Here and Soaring Beyond

First Step: Use Self-Assessment Within the Internal Audit Department The first and simplest way to use t...
Blog

Process Alignment Risk Key Performance Indicators Guide

What Is Process Alignment Risk? This is the risk that the business processes within a company may not be a...
Blog

How to Efficiently Create Agile Risk Management Solutions

Many organizations have failed to keep pace with changing trends in risk and compliance. Resource allocatio...
Blog

Second Line of Defense: What Needs to Be Present

What is the Second Line of Defense? Essential to effective risk management, the lines-of-defense model is ...
Blog

How To Minimize Customer Fraud Risk

Fraud is the intentional perversion of truth in order to induce another to part with something of value or ...
Blog

Is Your Strategy Focused on Digital Transformation?

The digital revolution currently taking place is transforming our world. Over the next few years, many orga...
Blog

Five Keys to Managing Relations With The Board of Directors

For directors to make meaningful contributions in their oversight of management, they need to understand th...
Newsletters

Board Perspectives: Risk Oversight Newsletters

Board Perspectives: Risk Oversight is a periodic newsletter that offers ongoing commentary about the risk management ove...
Blog

Five Essential Lines of Defense You Need to Know for Managing Risk

Organizations have learned many lessons over the years from specific financial crises. For example, if a...
Blog

Guide to Records Management

Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving ...