Managing Regulatory Changes and Political Risk with Enterprise Risk Management (Part 2)

Read part 1 of this series, “Domestic Political Risk: Operating in the Uncertainty of a New Era.”   Here’s Why Compliance Solutions Are Inadequate for Managing Regulatory Changes Regulatory compliance is mandatory, but it’s not the end goal; it’s the minimum operating standard. For strong companies, compliance is a mere byproduct of performing well and…

Details
good governance is made possible by ERM

What Is Good Governance, and Why Do We Care?

Governance is defined by the organizational processes used to make and implement decisions. Good governance is not necessarily making only the “correct” decisions. It’s using the best possible risk management process to inform decision-making, which has the potential to impact employees, customers, other stakeholders, and the community at large. Optimizing organizational governance is not just recommended,…

Details
incident prevention preserves your company's reputation.

Incident Prevention, Not Incident Recovery: How to Preserve Your Company’s Reputation

For companies that care about their reputation, incident prevention is a must.  Said best by Warren Buffet, “It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.” Building and preserving that reputation through proactive incident prevention must be a top priority. Post-scandal…

Details
adapt to political risk using enterprise risk management

Domestic Political Risk: Operating in the Uncertainty of a New Era (Part 1)

What Is Domestic Political Risk? Political risk refers to conditions and events that affect organizations and result from governmental decisions. It can have major effects on the profitability/expected value of economic action. Political risks impact individual investors, public and private companies of all sizes, and governments. Starting in 2016, political risk seemed closer to home…

Details
cybersecurity vulnerabilities

How to Eliminate 63% of Your Cybersecurity Vulnerabilities in 90 Days

Cybersecurity vulnerabilities are a concern for every company in every industry. In 2016, 4.2 billion records were stolen during 4,149 reported data breaches. This doesn’t take into account breaches not noted in the public record. According to a Ponemon Institute survey, while security incidents have expensive consequences, costs associated with reputational damage are even greater. That explains…

Details
IMPACT 2016

5 Takeaways from LogicManager’s IMPACT 2016 Conference

IMPACT 2016 has come and gone, and risk practitioners from across North America and Europe were thrilled with the results. IMPACT 2016 was differentiated by the passion behind real customer stories, all shared with actionable takeaways. Topics included third-party risk management, performance integration, cybersecurity, and reporting to the board. LogicManager’s annual ERM community conference was…

Details