Quantcast
Channel: Enterprise Risk Management – insBlogs

IMPACT 2018: Becoming a Risk Management Hero

$
0
0

On Nov. 29, the LogicManager community arrived at Hotel Commonwealth in the historic Fenway district of Boston for sold-out IMPACT 2018. Every year, LogicManager hosts a customer conference where users of the ERM software can learn, share, and grow their risk management program to full maturity.

 

 

Upon walking into the conference space, you could feel the partnership LogicManager strives to create between customer and employee. As a SaaS provider, most of our work is virtual. But at IMPACT, it was like old friends coming together as advisory analysts eagerly sought out the risk professionals they’ve developed relationships with over the years.

IMPACT 2018

Between sessions, attendees and analysts met to share their thoughts on the conference and brainstorm ways they could better leverage the tool. Customers also connected with fellow users to exchange ideas. These relationships are what make LogicManager more than a software, but rather a partner in achieving excellence.

Above all, what continues to be the most striking part of IMPACT is the willingness with which each customer presents on their successes, challenges, and future goals, while openly sharing the steps others can take to overcome existing obstacles or conquer new initiatives. IMPACT has and always will be a conference by practitioners, for practitioners.

A lot happened during the two-day event, so we broke IMPACT 2018 down into some recurring themes alongside the tips every governance, risk, and compliance professional can use to mature their ERM program.

Risk Management for a Better Tomorrow

The conference opened with a video about what it really means to be a risk manager. The video set the stage for the conference, which aimed to shatter the assumption that being a risk manager is just your typical day job. From our point of view, risk managers are the heroes of their organizations because they effect positive change both at their companies and throughout their communities.

Steven Minsky, CEO and Founder of LogicManager, continued this theme throughout his opening keynote session. He explored what it meant to build a better tomorrow through risk management. Namely, it’s to prevent distracting mishaps that threaten to derail a company’s mission, whether that be keeping satellites in the sky or making sure every customer’s transaction is safe and secure.

“Every hero has a Lex Luthor,” Steven said, as he dove into one obstacle risk managers face: the see-through economy. In the past 10 years, information sharing has changed drastically, to the point where PR no longer works, and prevention is the only way to keep corporate scandals out of the picture.

To this end, Steven outlined the steps every risk professional can take to adapt to the see-though economy:

Take a Risk-Based Approach – Integrate all governance areas and activities into one iterative process, including governance, identification, assessment, mitigation, monitoring, and events.

Engage the Business – Reach out to as many departments and levels as you can to collect relevant, accurate information to anticipate and address enterprise risk.

Put it all Together – For any initiative, look at what processes need to be carried out under each step of a risk-based approach and engage the appropriate personnel.

Consolidate Reporting – Turn brick-sized board reports into one-page dashboards by aggregating and filtering information by what your audience is interested in.

Engage the Business

Every presenter seemed to be on board with this integral step to taking a risk-based approach. As the name implies, enterprise risk management is a sprawling, company-wide process which should never be limited to one department. It takes a host of subject matter experts and front-line personnel to get an accurate picture of an organization’s risk profile.

So what are some tips the presenters shared on engagement?

Develop a Common Language – Departments talk about risk differently. One person’s “analysis” is another’s “assessment.” It’s important to speak the same risk language in order to engage people in a risk-based approach.

Grab a Cup of Coffee – During a panel on building an effective ERM program, three professionals shared their view on approaching other departments with a cup of coffee and genuine questions about which processes aren’t working. They stressed the importance of not imposing a new system or point of view, but sharing solutions to their individual challenges.

Create a Risk-Aware Culture – In a panel discussion, members of DigitalGlobe and Maxar Technologies discussed the effectiveness of regular, in-person training sessions. In these sessions, employees are encouraged to identify their own risks and have open dialogues about how to assess them.

Demonstrate Success – Regularly present on the success you’ve had with a risk-based approach. Even small wins entice others to join the journey and make improvements of their own with the same method.

Add Capacity to Add Value

Many presentations remarked how much capacity they were able to create with an online system. As the Risk-Based Approach Wheel demonstrates, there’s a lot that goes into a mature risk management process. Getting bogged down in manual processes takes a lot of time away from the value-adding initiatives a company could be pursuing.

Here are the top tips for creating more capacity:

Centralize Information – Create a centralized repository for all risk information. Almost every presentation cited Word documents and spreadsheet systems as prior pain points because of the amount of time they took to update and track down.

ERM Customer Conference

Automate Workflows – Shuffling tasks from person to person and manually following up with people takes time. Many of the presenters talked about how they leveraged incident forms and automated workflows to create more capacity for themselves.

Consider Dude’s Law – Christi Woods from Teacher Retirement System of Texas shared Dude’s Law, in which Value = Why / How. In other words, if the “why” of what you’re doing is greater than “how” you’re doing it, you’re adding value. Automated systems decrease the “how” and increase value.

Embrace Change

Every single presenter touched on change at their company. The changes they discussed came in many forms, from organic growth to mergers and acquisitions. This was a poignant theme to explore throughout the conference because ERM is about adapting to change and maintaining repeatable, yet flexible processes.

Stick to Your Guns – The folks from DigitalGlobe had a lot to say about change after being acquired by Maxar. They viewed the merger as an opportunity to speak up for the process they believed in and to be a champion for a risk-based approach across the new enterprise.

Standardize, Standardize, Standardize  In moments of change, everyone needs to be on the same page. Panelists from Cognition Financial, IHS Markit, and Reverse Mortgage Funding advised the audience to centralize information and methodologies. Having a point person to mediate the standardization process is a must.

Engage Early and Often – With innovation comes risk. When a new process is being created, you want people to automatically think what its risks are. Engaging as many people as you can, as often as you can, in the risk management process is the best way to keep them risk-aware.

What’s on the Horizon?

Each customer presentation ended with a look towards the future. What did they want to improve on? How were they going to get there?

LogicManager had a few goals of our own to share.

Say Hello to Horizon – The LogicManager team introduced LogicManager Horizon, the latest version of our software. Why Horizon? Because we believe risk managers are the harbingers of a better tomorrow, and we want to provide them a new line of sight to what’s possible.

IMPACT 2018

Keeping Engagement at the Forefront – LogicManager Horizon prioritizes solutions that will impact the most end-users. We’ve already deployed our newly designed incident webforms to increase engagement across organizations.

What’s Next – Redesigned home screen. Mobile accessibility. Improved infrastructure. This is just some of what LogicManager users can expect from LogicManager Horizon. What lies beyond Horizon? To close the event, CEO Steven Minsky discussed the role artificial intelligence will play in the risk management industry. We’re encouraging our customers to provide feedback on what kinds of technology will provide them more intelligent insights faster.

That’s a Wrap!

As always, the customers were the stars of IMPACT 2018. We loved seeing those who believe in LogicManager every year and how much they’ve grown their ERM programs. We can’t get enough of the customer-to-customer interactions as they share their success, learn from each other, and grow their skill sets.

We can’t wait to see everyone back at IMPACT 2019!

This article was originally published on LogicManager.com

The post IMPACT 2018: Becoming a Risk Management Hero appeared first on insBlogs.


Will Marriott be the First Major Brand to Get Fined for GDPR?

$
0
0

Last Friday, Marriott disclosed that the data of about 500 million guests had been exposed as a result of a hack that dates all the way back to 2014.

In 2014, hackers exploited the reservation system of Starwood Hotels and Resorts, which was acquired by Marriott in 2016. The breach exposed user data that not only included names, phone numbers, email addresses, passport numbers, and dates of birth, but even access to some encrypted credit card data.

As a result of this breach, Marriott may be one of the first organizations to feel the full force of the EU’s General Data Protection Regulation penalties. Implications of GDPR can lead to new unprecedented levels of financial penalties and liability for Marriott executives. Marriott acquired Starwood back in 2016, but did not find out about the 2014 breach until several months following the 2016 merger. Companies are required by GDPR to alert government authorities within 72 hours of a known breach. Given that Marriott did not disclose this breach until last week, Marriott could face fines of up to 4 percent of their global revenue. Given the shift of Starwood ownership, the investigation into the violation will take time, and may not be finalized until later in 2019.

Separately, the first of what is expected to be many class-action lawsuits against Marriott have already been filed on behalf of customers affected by the breach. On top of that, Marriott’s security is also facing probes from the New York Attorney General’s office.

 

A Risk-Based Approach to GDPR

The GDPR is risk-based, which means that failing to take sufficient measures to mitigate a risk can result in greater penalties for companies. To avoid penalties, companies can use enterprise risk management software to document what the company did, when it did it, and which employees were responsible for the planning and execution. The hotel industry is an interconnected web of business entities. From shops and restaurants to business centers and dry-cleaning services, each business has their own risks that need to be properly assessed and monitored. Proper operationalization of GDPR policies and controls with enterprise risk management would have likely enabled Marriott to avoid most, if not all, GDPR penalties.

Reputation risk is also a major factor for both customers and investors. For Marriott, the length of time it took to discover a series of breaches that date back to nearly 4 years ago, coupled with its post-breach reaction, is a considerable impediment to its efforts to regain user and investor trust after a series of privacy and security scandals.

 

Investors and Consumers have a Greater Voice in the See-Through Economy

Marriott is the latest failure in risk management that has been exposed by the See-Through Economy. Over the past several years, poor security and data breaches have become a recurring pattern affecting other huge companies. To put it into perspective, hackers stole nearly 143 million users’ data during the Equifax data breach in 2017, and Marriott suffered a breach nearly triple the size of that. Some believe that companies are opting for inadequate security because it is cheaper than the consequences of a data breach. However, as the See-Through Economy intensifies, it brings the much-needed transparency and accountability to all roles and industries.

When evaluating the cost of a data breach, calculating penalties that result from regulatory actions has become an outdated method. Now, the consequences of the See-Through Economy are being measured in a loss of revenue resulting from customer brand-switching, which result in investor investment sell-offs. In fact, studies have shown that 81% of consumers will switch brands based on a perceived lack of accountability and effectiveness in risk management.

In an incredibly fast-paced age of transparency, consumers and investors are empowered through interconnectivity and technology to impact a company’s reputation. The See-Through Economy dictates that customers will choose alternative hotels with safer data security and investors thus will withdraw, likely making even these increased penalties seem small in comparison.

 

How To Manage Risk In The See-Through Economy

Companies need to start to treat personal information with the same sensitivity they do with credit card numbers. This requires an ERM solution to identify what kind of data is stored by your company and identify where that data is stored and the security measures in place.

Companies face Payment Card Industry Data Security Standard (PCI DSS) for card numbers and SOC II-related compliance risks for their vendors. Other states have passed and are continuing to pass regulations for customer data similar to the European GDPR regulation such as California’s AB-375 Consumer Privacy Act of 2018 (CCPA) and New York’s DFS Cybersecurity Regulation (23 NYCRR 500) as well. The most important takeaway is the need to take a risk-based approach to data security and privacy. An  ERM solution provides a comprehensive framework approach that addresses all data security and privacy regulations. Not only will it protect a company from regulatory penalties, but also from the scandal of public scrutiny as a result of the See-Through Economy.

 

The Future of Risk Management

As stakes climb higher and the public becomes more aware of companies’ responses to failures in risk management, the need for effective risk management is even more apparent. This falls into the recurring pattern of scandals that huge companies have been facing. All of which are preventable through risk management. Over the course of 14 years of research I have found in the majority of cases that many employees on the front lines of their companies not only knew about key risks but had escalated these risks to higher management.

While the breach stemmed from the acquisition of Starwood hotels, that was not the major issue at play, as thousands of acquisitions occur every year. When managed effectively through an ERM program, acquisitions can bring about positive change. It is important for companies to consider that changes such as these are a key source of risk and require due diligence. When Marriott acquired Starwood, they were not only acquiring assets, employees and customers, but new risks as well. It is critical that risk assessments be conducted around areas of change. Having avendor management system in place helps manage changes in the supply chain and third party vendors during an acquisition to prevent this mistake as well.

An ERM system can not only identify and fill gaps in Marriott’s cybersecurity policies and procedures across the enterprise, but maintain and prove compliance with GDPR, among other regulations. Enterprise risk management could eliminate the silos that make up all Marriott’s interconnected business entities and seamlessly mitigate their risks.

Download our free eBook!

Download “7 ways to Build a Business Case for ERM Software” to get the tools you need to articulate what’s holding your organization back, and the actionable benefits that a risk-based ERM software solution can bring to your organization.

About the Author: 

Steven is a recognized thought leader in ERM, CEO of LogicManager, and author of the RIMS Risk Maturity Model. Follow him on Twitter at @SteveMinsky
This article was originally published on LogicManager.com

The post Will Marriott be the First Major Brand to Get Fined for GDPR? appeared first on insBlogs.

Top ERM Blog Posts of 2018

$
0
0

Scandals, predictions, and insights, oh my! We’ve covered a lot of ground this year in the risk management world. But what were the topics people were buzzing about most?

With over 50 blogs posted in 2018 alone, there was a lot to learn and even more you could have missed as the seasons whizzed by. So, we compiled the top ten blog posts of 2018 to help you refresh and catch up! In these ten ERM blogs, we covered everything from the best way to measure the effectiveness of your ERM program, all the way to the corporate mishaps readers keep coming back to.

We hope you enjoyed a plentiful year of reading and that next year brings even more learning! If you’re interested in one of these top ten ERM blogs, simply click on its title! If you’re interested in keeping up with us in 2019, subscribe to the LogicManager blog here!

Now let’s see what happened over the course of 2018.

1. Risk Management and Budget Planning: The Key to Good Forecasting

The most popular LogicManager blog of 2018 had everything to do with budgeting. This blog isn’t just about budgeting for risk management; it’s actually about risk assessing your budgets. Just like new processes, budgets are essentially change documents, and as we all know, change carries risk.

We gave five essential steps to connecting risk management to budget planning to get your forecasting within 5% accuracy, including:

  • Identify the major line items of your budget and the personnel who contributed to them
  • Ask key personnel to provide insight on major line items
  • Engage subject matter experts to adjust low confidence line items

2. The See-Through Economy: New Technology and Risk Management

We’re happy to see one of our favorite infographics from 2018 made the top ten. CEO Steven Minsky needed a way to sum up the effects social media and online news outlets were having on risk management. He landed on the See-Through Economy since new technology such as this is creating abundant transparency into the business world.

The message behind the See-Through Economy isn’t all doom and gloom, however. Yes, consumers have more power than ever to express their negative experiences with a brand, but they also have the same amount of power to spread positive messages about a company.

Those who can implement and sustain an effective ERM program are well-equipped to adapt to the See-Through Economy.

Click into our See-Through Economy infographic to learn more about this irreversible trend and the steps towards adapting to it!

3. Four Predictions for Risk Management in 2018

At the close of 2017, we looked back at all the lessons not learned in risk management (i.e. the abundance of corporate scandals) and wondered what 2018 would bring to ERM.

LogicManager CEO Steven Minsky coined the phrase the See-Through Economy to encapsulate the changes new technology like social media bring to the business world, and how risk management can help account for those changes. Many subsequent scandals have proven this trend true.

Another prediction Steven shared that became widespread was that while federal regulations dip, state regulations would spike. This prediction became especially poignant as consumers became visibly fed up with an onslaught of data breaches and called for increased regulations at the state level to protect their information and privacy.

Check out the other two major predictions Steven made that came true in 2018 and think about where you saw them manifest this year.

4. Do Insurance Companies Really Need Risk Management?

Insurance became a hot topic over 2018. Risk management has always had a curious relationship with the insurance business, since insurance is in and of itself a mitigation. We published this blog to say that risk management is an integral part of any business, regardless of industry.

Insurance industry frameworks like NAIC and A.M. Best place a lot of importance on a robust ERM program to manage underwriting, credit, market, operational, and liquidity risks, to name a few. This blog covers some of the ways risk management can benefit insurers.

5. Wells Fargo Failures in Risk Management Cost $1 Billion Settlement

Ah, Wells Fargo, when will you learn? Hopefully this $1 billion settlement shed some light on the ERM subject. What we see in this settlement is that all the Wells Fargo scandals over the years are intimately related, not one-off incidents.

For a long time, Steven Minsky has predicted a connection would be made, on a federal level, between Wells Fargo mishaps and ineffective risk management. This settlement was the proof pudding.

6. Meaningful Metrics: Measuring Enterprise Risk Management Performance

As enterprise risk management becomes more and more recognized as a performance asset to businesses, the pressure increases to prove the effectiveness of ERM programs. But how do you measure the effects of bad things NOT happening?

You need to collect the right metrics. They need to be quantitative, qualitative, comparable, and centralized. In this blog, we cover four key risk management metrics.

7. The Risk Management Landscape in 2018

At the start of 2018, we surveyed hundreds of governance, risk, and compliance professionals to understand their biggest challenges and their upcoming goals. We compiled what we found into this infographic.

A major theme that turned up in the survey was integrating governance areas. The results of the survey indicate that while the majority of participants have senior leadership that aims to connect risk management across silos within the next two years, less than half think their senior leadership actually understands this integration will prevent risk events.

Here’s some of what we found:

  • 87% of respondents aim to integrate 1 or more governance areas into their risk management program within the next year
  • 54% consider managing cross-functional information the most challenging aspect of integrating governance functions
  • 72% say cybersecurity is their most vulnerable area for their company

Look out for a new risk management landscape infographic in 2019!

8. 2018 GRC Market Report Emphasizes New Risk Trends: Reputation, Regulations, and Innovation

The Forrester Wave™: Governance, Risk, and Compliance Platforms, Q1 2018 named LogicManager a Leader in ERM platforms! But aside from this honor, we wanted to take a deeper dive into some of the insights presented in the report.

Forrester cited reputation, regulations, and innovation as three major trends emerging in the risk management industry. We took it a step further to say that these trends don’t exist independently. They’re actually all connected to the See-Through Economy, in which innovative technology has empowered consumers to impact a company’s reputation, which in turn encourages regulators to develop new stipulations.

9. Why Cybersecurity Risk Is a Top Priority: Facts and Figures

The first infographic we put out about the risk management landscape revealed 72% of ERM practitioners cited cybersecurity as their top concern. So we wanted to know more about that to learn what was driving this trend.

We found a combination of factors working together to place this concern at the top of almost everyone’s mind. Not only is more hacking technology available, but the mere prevalence of data breaches in the news seems to have people on edge. And of course, in the See-Through Economy, reputation and corporate scandals are closely linked.

Take a look at our cybersecurity infographic for more insight into the cyber breaches of the past year and what consumers and companies alike are saying they’ll do about it.

10. Hey, Chipotle, Can You Say Risk Management Rehab?

In 2018, we discovered a handful of companies who could benefit from some risk management rehab. These are the companies you’ve heard about in the news not once, but on multiple occasions.

Chipotle certainly fits this description. They’ve been struggling to recover from food-borne illness outbreaks since 2015, and it seems they still haven’t understood the root cause of it all. Ineffective risk management.

Curious about the trajectory the Mexican grille has taken since that fateful day in 2015? Read this blog for a succinct timeline of events.

Well, 2018, that’s a wrap! We hope our readers enjoyed learning with us and have learned some valuable lessons about the world of risk management. If you don’t already, subscribe to our blog and be the first to get expert insights into the latest scandals and greatest tips.

This article was originally published by the LogicManager Team on LogicManager.com

The post Top ERM Blog Posts of 2018 appeared first on insBlogs.

How the See-Through Economy Will Change Your Business by 2023

$
0
0

There’s an undeniable shift occurring in the business world right now. In fact, it’s been forming since 2007. I’ve coined the phrase the See-Through Economy to encapsulate the shift towards transparency and accountability brought on by new technology and social media.

Since the invention of the smartphone in 2007, consumers have started to exercise their sharing power. Pocket-sized computers alongside world-wide social websites have empowered the everyday customer to influence the integrity of a company’s brand. Within moments, the good, the bad, and the ugly are disseminated far and wide for all to see. This includes accelerating the visibility of available evidence of negligence so often resulting in class-action lawsuits and regulatory actions. The threat of liabilities and the benefits for good actors will multiply as the See-Through Economy strengthens.

The See-Through Economy, kind of like fire, is not inherently bad; it can be used for good, as well. Ultimately companies must adapt to the See-Through Economy. It’s a rapidly changing world, and organizations must be able to keep up with the changes, instead of running from them.

Enterprise risk management is the best way to adapt to such change. Foreseeing risk and preventing distracting mishaps is the only way to stay ahead of the curve as this trend continues to gain speed.

We saw how this trend affected businesses like PG&E, United Airlines, Wells Fargo, Uber, and countless others so far. But how will this trend continue to change the landscape your business operates in over the next five years?

Here are my predictions for how the See-Through Economy will affect your business by 2023.

 

Earned Reputation: The New Intangible Asset

What comprises your company’s worth? In searching for the answer, most people will turn to tangible assets – inventory, land, buildings, machinery. Here’s the thing. A study by Ocean Tomo revealed that the value of tangible and intangible assets has completely reversed over the last 40 years.

In 1975, tangible assets comprised 83% of the S&P 500 market value. Today, intangible assets account for 87% of the index’s market value.

Brand recognition and customer relationships are extremely important intangible assets which stand to either create or destroy the value of your company. And this is exactly where the See-Through Economy comes into play. When consumers share a negative experience with your brand, they post it online for everyone to see, and it starts to create a chain reaction in which others, who haven’t even had the same experience, will shy away from supporting your brand.

By 2023, earned reputation will certainly account for the same, if not greater, proportion of market value. Technology will only continue to advance at an even more rapid pace, and as a result, PR will be a thing of the past. You cannot rely on a PR team anymore to cover up corporate scandals. There are too many ways to share information to stop the flow of it, and in many instances the reality of poor risk management will overtake the perception of good risk management.

Enterprise risk management affords you the agility to not only prevent and avoid bad press, but to actually make decisions that will earn a reputation your consumers are on board with and are eager to support and recommend.

 

The Millennial Generation Will Strengthen The See-Through Economy

The See-Through Economy of course resonates most strongly with the millennial generation, as they are the ones most familiar with and adept at using smartphones and social media. A recent survey found that 81% of millennial consumers expect brands to practice business sustainably and ethically. If they find one brand does not, they will switch to another brand that does.

Investors are following customers, so when millennials switch brands, investors move their money accordingly, causing the stock dips we’ve seen at Facebook and so many others. This same trend will spread to all industries and geographies in the next five years at an exponentially accelerated pace.

In this way, the See-Through Economy will drive revenue gains and losses at your company. As millennials grow older, increase their spending power, and become a target customer for more businesses, they will have a larger and larger effect on a company’s bottom line.

While this may sound like a B2C concern, over time it will actually become a B2B concern as well, as millennials climb the workplace ladder and gain the power to effect change within their business. When it comes time for this generation to decide which software and services purchase, which companies to acquire and which partnerships to create, they will weigh an organization’s social, ethical, and environmental integrity more than any previous generation.

ERM not only helps businesses protect their tangible assets, but the intangible as well. With a centralized governance system in place, you can weigh the risk-reward tradeoff of every decision based on how it will impact your brand and consumer loyalty. It’s also the only way to prove your business is acting with integrity and therefore deserves the trust of generations to come.

 

Innovation will Require Risk Management to Succeed

Innovation is a beautiful and required thing. It’s how new technology is born, world-changing ideas take wind, and progress is made. However, it’s also how risk crops up.

We’ve seen innovation gone wrong time and time again. Chipotle tried to innovate with fresh, locally sourced food, and ended up poisoning hundreds of customers. Uber was one of the first ride-sharing companies, and is now embattled by sexual harassment lawsuits and other misdeeds while its competitor Lyft has materially benefited from Uber’s stumbles.

There are of course many companies who have caught on to this trend and have successfully integrated risk management into their innovation processes. But we have a long way to go before risk management and innovation are inextricably linked. I believe by 2023, those who innovate without involving subject matter experts in risk assessments will be the minority, and businesses will come to understand the importance and the benefits of risk management in regard to innovation.

 

The Right to Privacy: A New Business Model

One reason why innovation requires risk management to succeed is because companies are innovating faster than state and federal governments can regulate change. That’s the thing about the See-Through Economy, though. Consumers don’t care whether or not you’ve violated some law they’ve never heard of. They care about being treated fairly.

So it goes with data privacy. For so long, selling customer data was not strictly regulated. So when Facebook sold our data to Cambridge Analytica, it wasn’t so much a matter of what laws they broke, but the consumer trust they broke.

Nevertheless, law makers and regulators have a part to play in the See-Through Economy. They hear consumers loud and clear thanks to social media. As a result, they’ve moved as fast as they can to protect citizens’ privacy. For instance, even if there hasn’t been major privacy regulation changes on the federal level, there sure have been on the state level.

Take the upcoming California Consumer Privacy Act (CCPA). This regulation actually calls out Cambridge Analytica in its preface! This is historic: a state regulation specifically citing a corporate scandal as the catalyst for a new law to protect its citizens’ rights to privacy.

I believe these regulations will only multiply, and that those who fail to comply with CCPA, GDPR, NYCRR 500, and others will fall far behind the competitive curve.

Furthermore, I believe that by 2023, business models that include selling customer data will become obsolete as executives start to realize the steeply unbalanced risk-reward tradeoff such a model presents.

 

Crowdsourcing Will Necessitate Risk Management Across Departments

One result of the See-Through Economy is more frequent crowdsourcing. Information we used to seek from established committees and regulatory bodies can now be sought from everyday professionals.

Social media empowers practitioners and consumers alike to share their insights, and therefore encourage companies to crowdsource the data they’re looking for. For instance, NIST and ISO are some of the leading frameworks companies turn to for cybersecurity compliance. However, the Cloud Security Alliance (CSA) is a crowdsourced committee of nearly 100,000 cybersecurity practitioners and volunteer moderators dedicated to sharing best practices across industries via platforms like LinkedIn.

In this example, the See-Through Economy has fueled the crowdsourcing of practical information aimed at improving business performance, security, and success. Additionally, there are examples of crowdsourcing designed to give organizations feedback on how they’re performing in consumers’ eyes, like TrustPilot and Glassdoor.

Ultimately, the See-Through Economy has applied the concept of crowdsourcing to more than just Google searches out of curiosity, and has applied to the business world.

So how will increased crowdsourcing affect your business by 2023? I believe “crowdsourcing” is just another way of saying risk-based approach, in which governance, risk, and compliance teams reach out to subject matter experts to get the most accurate risk portfolio they can. Using a risk-based approach across departments to seek subject matter expertise is the trajectory I envisioned for risk management since 2005. It began with collecting information from front-line employees, then moved to organization’s third parties, and will soon expand to parties outside of the organization like customers and industry groups.

As crowdsourcing subject matter expertise becomes more commonplace in the business world, departments other than the risk team will understand the value of a risk-based approach. For instance, marketing and HR teams will need to depend on crowdsourced data to understand their external brand perception, as well as work cross-functionally with security teams to get GDPR and CCPA compliant, and so forth.

The See-Through Economy has already dealt some incredible changes to risk management and businesses across industries. Over the next five years, I believe we’ll see this trend continue to unfold, and accelerate the role risk management will play in helping organizations succeed or blunder in adapting to the See-Through Economy.

 

This article was originally published on LogicManager.com

The post How the See-Through Economy Will Change Your Business by 2023 appeared first on insBlogs.

How to Prepare for Recession Risk with ERM

$
0
0

Today the economy is strong and your business is doing well. But are you prepared for when this strength turns to weakness? Enterprise risk management has been proven to help companies survive a recession.

While there is much debate over whether a recession is looming or not, the fact is, you need to be prepared. Whether in 2019, 2020, or 2021, it’s not a question of “if,” it’s a question of “when” a recession will occur, as history has proven that fluctuations in the economy are both inevitable and normal.

What I would like to help organizations understand is that preparing for a recession has everything to do with enterprise risk management. Any good business prepares for changes within and outside of their environment. A recession is just like any other change, and the consequences of not having a recession strategy in place could be grave.

I will outline some of the ways in which having an effective ERM program in place can help you survive a recession and even gain a competitive edge.

 

Can ERM Really Help My Business Prepare for a Recession?

To start, I’d like to share a success story with you. When I started LogicManager in 2005, everything was going up economy-wise, and it was an incredibly difficult time to get people to realize they needed risk management when business was booming.

Our first customers were early adopters of ERM and understood that only risk management provided a mechanism to adapt to market changes, implement strategic initiatives, and gain internal operational efficiencies. All of those customers not only survived the great recession but thrived in their business, a feat which they attributed to ERM and the use of LogicManager.

For instance, a small, regional corporate credit union used LogicManager’s ERM platform to assess third-party risk. Prior to adopting LogicManager, they considered their riskiest vendors to be the ones they spent the most money on. With LogicManager, they risk assessed each vendor based on their business impact using multiple criteria.

As a financial institution, their assessment revealed that investment advisory services like Standard & Poors were the highest risk vendors because their advice determined where the credit union invested most of their capital. Realizing the connection between bad advice and bad investments, they set up a framework to risk assess investment recommendations.

With a new system for identifying risk in place, they were able to take a closer look at subprime mortgages and mortgage-backed securities. Ultimately, their risk-based due diligence showed that, contrary to S&P guidance of AAA ratings, these securities did not have a sufficient risk-reward tradeoff. Thus, the credit union stopped investing in them all together.

This was a particularly difficult decision to make since all their peer institutions were investing heavily in these financial instruments. They needed evidence to present to their committees and board why they should not be doing the same. ERM provided them this evidence.

ERM helped this credit union make good decisions in this case, identify new opportunities and guide their execution, and survive the recession. As a result, they rose from a regional company, to one of the largest corporate credit unions in the United States.

 

What Kind of Risks Do I Need to Prepare For?

There’s a misconception that core business priorities, shifted by the recession, will bounce back after the recession is over. In fact, these priorities typically shift permanently as a result.

Before a recession, when everything is going up, companies tend to go on autopilot and focus less on how they’re providing their core service or product. But then, when the economy is on the downturn, organizational priorities shift to value and efficiency, and suddenly, businesses have to scramble to refocus their attention on creating business processes that deliver their product or service efficiently and cost-effectively while making difficult personnel, product, policy, process, and service decisions.

Another common misconception is a recession only carries financial risk. But if you look at performance management, and this concept of a balanced scorecard, a recession actually poses many threats to your business.

The four legs of performance are customer value and satisfaction, efficient use of capital resources, process efficiency and quality, and the capacity for learning and growth. As you can see, financials are only one-fourth of good business performance. And what’s more, because these four legs are so interconnected, if one falters, stability in all four areas will suffer.

For instance, if your core business is providing software to customers, you may have been on autopilot for a little while and forgotten to think about where your resources are best allocated to provide a fast, reliable, and affordable product. Since the economy has been good, your customers have also been a little more lax on where their money is going. But when a recession hits, customer priorities will quickly shift and they will look for a product that better suits their new needs.

Let’s look at a hospital as a different example. The same number of patients are likely to fall ill, but their insurance status may change with their employment status. As a result, patients may shift from preventative medicine to emergency room visits, and with fewer insured, where will funds come from to treat these patients? Will staffing levels be prepared for the shift? How will an increase in complaints and incidents be handled?

No matter what your core business is – providing software to customers, banking, or healthcare, etc. – identifying ways to create more value and efficiency before a recession will be crucial to surviving it.

 

How Can ERM Help Me Prepare for a Recession?

Enterprise risk management by nature is proactive and engaging, two essential characteristics that will help you survive a recession.

First, being proactive will give you much needed stability in a fluctuating market. To prevent the scrambling refocus on value and efficiency described above, organizations need a way to risk assess their offerings and identify which aspects of them provide or hinder value and efficiency.

An ERM platform not only helps you risk assess your offerings and processes, it also helps you engage subject matter experts from the front lines up to the right level. It aggregates information from multiple sources and identifies the interdependencies that cannot be seen from a single silo viewpoint and gather information to make smarter decisions. Ultimately, it enables a comprehensive action plan to be presented all the way up to the board as needed.

Personnel at the front lines are subject matter experts and know the risks if asked, but they lack an ability to escalate these insights up levels and across silos to the decision makers who can act in a timely manner. Cross-department managers who have identified and prioritized risk issues can then determine where to focus their time, money, and energy. Maybe it’s a streamlined sales process, or maybe it’s time to switch vendors. The key is to make these changes before the recession hits so that you have time to meet your customers’ expectations before they shift away from what you can provide them.

Here are some of the key questions you should consider:

What preventable mishaps may occur due to a recession? Are our priorities aligned with safeguarding against these mishaps?

Will we need to adjust our hiring plans? Which key personnel would we need to retain? Are there skills missing from our organization or areas of inefficiency that will make us slow to respond? Which processes are poorly defined, making changes difficult?

How do we identify our vulnerable key customers? Will their needs change and are we prepared to meet them? If some of our key customers are going to disappear, who will replace them?

How do we evaluate vulnerabilities in our supply chain? Are there contractual changes we need to make? Will the advisors, vendors, or partners we rely on be affected?

Could our privacy and security policies and mitigations be affected by a recession? Will third-parties holding sensitive company information have the right resources in place to protect it? If layoffs need to occur, will former employees’ access to sensitive information be properly revoked?

Only ERM crosses business silos and levels to answer these questions and determine how the waves of creative destruction due to economic change will impact your organization’s strategy.

Housing all of this information in one centralized platform with reporting capabilities will also be key as the heroic risk manager leaps into action and approaches the board with a plan of action: “Here’s what could happen, here’s what we need, here’s where I need your help.” Getting buy-in will be key, and ERM reporting is the way to do it.

Ultimately, ERM helps identify decision controls in a fast-moving environment, to make sure the right people with the right knowledge are making key risk-reward account decisions. With a proactive and engaging ERM strategy in place, you’ll be able to ward off recession risk before it irreparably damages your business. ERM will provide your business with superior execution and better planning to out-perform your competitors.

This article was originally posted on LogicManager.com

The post How to Prepare for Recession Risk with ERM appeared first on insBlogs.

What Can Banks and All Companies Learn from Apple’s Latest Glitch?

$
0
0

Even a $1 trillion company cannot hide in the See-Through Economy. After a fourteen-year-old boy discovered a serious bug in Apple’s group FaceTime feature, his mother e-mailed, faxed, and tweeted the report to Apple. However, it wasn’t until after her tweet went viral that the bug was disabled. How could Apple have responded more efficiently and avoided this reputational risk?

Most Apple users are familiar with FaceTime, Apple’s video chatting software. The feature had recently been upgraded, so that users could loop multiple people into a group FaceTime. However, the feature has been disabled as a result of a major glitch discovered a few weeks ago by fourteen-year-old Grant Thompson. The serious privacy flaw could force a user’s device to pick-up an incoming group FaceTime even if they declined the call. The bug even enabled access to the recipient’s camera if they interacted with their device’s hardware.

Upon discovering the significant security and privacy flaw, Thompson’s mother immediately e-mailed a bug report and video to Apple on their support site. She also called and tweeted at CEO Tim Cook and even faxed a letter using her law firm’s letterhead. Despite her efforts, after several weeks the incident report had still not been processed. Thompson didn’t hear back from Apple until after national media outlets broke the news about the FaceTime glitch and traced the report back to her original tweets. Ms. Thompson’s tweet on the other hand, was escalated to the public, instantly. This is an example of the See-Through Economy at work, which encapsulates the shift towards transparency and accountability brought on by social media and technology. Before Apple could formally acknowledge the issue, the public had been made well-aware that their privacy was at risk.

Reputational Risk in a See-Through Economy

When there is not a clear path of communication to the company, consumers are empowered by social media to voice their issues. Because an enterprise-wide risk management process was not in place, Apple could not respond and resolve the issue before Ms. Thompson’s tweet went viral on twitter. As a result, the glitch not only exposed Apple to major privacy violation risks, but also to reputational risk.

Companies can no longer effectively manage reputational risk after the fact, so they must take a proactive risk-based approach to ensure the risk does not occur in the first place. Customer-facing incident management software is essential to handling corporate mishaps. With connected incident management tools, organizations can immediately resolve issues through an efficient workflow that directs the incident to the appropriate parties.

Difficulties  in the reporting process prevented the issue from being resolved sooner. Although the tech giant has a bug reporting channel, it is available only to designated specialists in the tech or security field. Given there was no public-facing channel for users to report security and privacy issues, Ms. Thompson used traditional methods including calling their support line, faxing, and tweeting. Unfortunately, the support line she reached was for traditional product support, which was not prepared for escalating security and privacy issues. Once her tweet went viral, Apple’s social media team was able to escalate the issue to the appropriate people; however, the bug publicly demonstrated Apple’s slow response and lack of escalation process.

Businesses Need to Revamp Customer-Facing Incident Management

Without enterprise risk management, reporting, responding, and remediating issues is often ineffective and time-consuming. As I previously mentioned, Apple’s reporting process left no options available for Ms. Thompson, who stated “It’s exhausting and exasperating. It’s very poorly set up especially for the average citizen. I feel like I went above and beyond.”

Apple is not the only corporation who has struggled with implementing customer-facing incident management. As a result of the change in “Know Your Customer” laws, it has been a challenge for financial institutions to execute anti-money laundering regulations properly. Citibank recently rolled out a compliance program designed to protect customers and the company from illegal financial activity. However, what was initially designed as a program intended to catch terrorists has left multiple innocent customers with frozen bank accounts and zero notice. Without a customer-facing website to escalate issues, the remediation process is time-consuming with significant barriers to reach the appropriate employees.

Citibank is not unlike other banks, financial institutions, and most companies. While many have internal whistle-blower hotlines to report misdeeds, very few companies have reporting channels accessible to customers. Surprisingly, many financial institutions even require physical mail as a part of their complaint reporting process. These channels primarily serve as a means for customers to feel “their voices have been heard”. Often times, financial institutions do not have the management processes to identify and filter risk, fraud and misdeed reported from outside the organization. As a result, the resolution process is ineffective and complaints are typically aggregated over time serving no real purpose over than for process improvement.

With effective enterprise risk management in place, customer responses for a variety of issues can follow a clear and cost-effective path to resolution. Customer-facing incident management offers customers easily-accessible channels to escalate their incident reports. In the See-Through economy, risk transcends every industry. Regardless of what the incident is, be it a major software bug or innocent customers’ bank accounts being inadvertently frozen, incident management and reporting are essential components of effective risk management.

Take the Steps to Improve Your Incident Management Program:

Without effective incident management tools, incident reporting can be a large source of liability. Having a disconnected reporting process is not only a disservice to the customers, but can negatively impact the company as well with exposure for negligence.

With the help of an enterprise risk management system, you can stay ahead of the curve in the event of an incident. With incident reporting software, you can give customers an outlet to easily submit issues that are immediately forwarded through a remediation workflow. While social media will still be at customers’ finger tips, you can ensure they are satisfied with a seamless and efficient resolution process. Incident management software will also give you a better understanding of why, when, and where incidents are happening, so you can prevent them from recurring in the future. Implementing the following pointers will help to improve your incident management program, so you can avoid ending up like the aforementioned companies.

  • Front-line reporting: Empower customers and employees to submit incidents in customized forms that collect all the information your organization will need to engage the appropriate business units  in the resolution process.
  • Automate Workflows: Design a workflow for each incident to get it routed to the right people across business silos to resolve it efficiently and cost-effectively.
  • Centralize Incidents: With all departments in one system, they can easily communicate with one another about issues that arise and work towards a solution.
  • Generate Reports: With all of your incident information in one place, you’ll be able to uncover trends within your data. Then, implement controls to prevent future incidents.

Download our Incident Management eBook

Check out our complimentary eBook, “How to Take a Risk-Based Approach to Incident Management,” for more information on how to resolve issues and engage the right people in the right amount of time.

About the Author: Steven Minsky

Steven is a recognized thought leader in ERM, CEO of LogicManager, and co-author of the RIMS Risk Maturity Model. Follow him on Twitter at @SteveMinsky

This article was originally published on LogicManager.com

The post What Can Banks and All Companies Learn from Apple’s Latest Glitch? appeared first on insBlogs.

How to Tackle The Top Three Risks in the Energy Industry

$
0
0

For the first time, reputation risk, organizational culture, and cybersecurity have all landed among the top five risks in the energy industry. How can energy companies tackle all of these risks without wasting time and money on additional resources?

This year at my IRMI Energy Risk and Insurance Conference session, I showed attendees how they could tackle all three of these top-priority risks with enterprise risk management.

The key is adopting a truly integrated approach to risk management. The truth is, energy companies already collect much of the information they need to build a mature risk management program. More often than not, however, organizations fail to engage all departments and levels of the organization to share this information cross-functionally and to the right levels to make decisions.

During my session at 2019 IRMI ERIC, I walked attendees through, step-by-step, how their organizations can implement a risk-based approach to build a risk culture and cybersecurity program that mitigates reputational risks before they occur.

Whether you made it to this year’s conference or not, I wanted to share some of my takeaways from the session, as well as some tools I presented to facilitated a risk-based approach.

Emerging Risks in the Energy Industry

According to the report “Executive Perspectives on Top Risks 2019”, energy and utility companies rated organizational risk to have a ‘significant impact’ on operations in response to the following statement: “Our organization’s culture may not sufficiently encourage the timely identification and escalation of risk issues that have the potential to significantly affect our core operations and achievement of strategic objectives.”

Interestingly enough, when asked about reputational risk such as social media, energy and utility companies responded with a ‘potential impact’ rating. What every company must realize is that in a See-Through Economy, social media is directly tied to reputational risk, which is in turn tied to the achievement of strategic objectives, and often related to cyber risk.

Deepwater Horizon Drilling Unit on Fire, Wikipedia

To drive home the importance of these emerging risks, I revisited some of the biggest scandals in the energy industry, such as the Merrimack Valley Gas Explosion, the PG&E electric fires, and of course, the Plains All American Pipeline Spill. Each of these mishaps carried immense reputational risk, and more importantly, were 100% preventable because they stemmed from severe negligence.

Mitigate Energy Risks with the Right Tools

So how can you prevent negligence and corporate mishaps in the energy industry?

It all starts with having the right tools. At IRMI ERIC, I presented two physical tools attendees could use every day to facilitate a risk-based approach.

First, I showed them LogicManager’s Risk-Based Approach Wheel, which gives great visual insight into the activities performed during an end-to-end, iterative ERM process. You can download the Wheel here.

I also introduced them to another one of my favorite tools – the Risk-Based Translator. Often times, organizations have a lot of trouble communicating about risk because each department has their own secret lingo of sorts. Download the Translator here to see how you can create a common language across departments.

One question I got from an attendee was how to actually engage people. I answered with one of my favorite approaches: get someone in the C-suite in your corner. Try giving a heads up to a risk-minded C-suite executive that you’ll be sending out a risk assessment to key departments. Ask him or her to send out an email to everyone involved, directly thanking those who completed the assessment and expressing how important it is for the company. Then, more people will follow suit and complete the assessment!

Tackling Cyber Risk in the Energy Industry

The best way to get a risk-based approach up and running is to take it one initiative at a time. In my presentation, I focused on one of the top risks in the energy industry: cybersecurity. This was a great example to use, not only because of its prevalence in the industry, but because it is deeply connected to reputational and organizational risk, as you can imagine.

Just recently, in fact, the North American Electric Reliability Corporation (NERC) fined an energy company $10 million for over 100 physical and cyber security violations to the regulatory authority’s Critical Infrastructure Protection (CIP) standards. It’s the biggest fine NERC has ever levied for CIP violations.

Complying with a standard such as CIP is a huge, cross-functional effort in and of itself. When you come to terms with the fact that compliance is the minimum operating standard, protecting your organization from cyber risk becomes an even larger task.

At IRMI ERIC 2019, I advised my audience to take the following steps:

  1. Break down a standard like NERC CIP into actionable, bite-sized line items and determine which departments they impact
  2. Pick one of these line items, such as required access controls and identify where your organization is excelling and where there are gaps by administering standardized risk assessments to impacted departments
  3. Once this information is collected, start filling in the gaps with new mitigation activities like dual authentication procedures, password vaults, entitlement policies, etc.
  4. Implement ongoing monitoring activities like privileged user access reviews; consider automating these processes with regularly recurring reminders and notifications
  5. Make sure there is a standardized method for reporting incidents like security and non-performance events

As always, I would also recommend doing a health check of your ERM program and processes. The best way to do this is by taking the RIMS Risk Maturity Model, which has been recommended by the American Petroleum Institute. You can take the free Risk Maturity Model assessment here to see how your program stacks up against industry standards.

The energy industry, like many others, is coming to terms with the fact that risks are interdependent. If risks are intertwined, then it can only follow that departments must also be intertwined, and must work together to protect their organization and prevent risks from blooming into disaster through an integrated approach.

This article was originally posted on LogicManager.com

The post How to Tackle The Top Three Risks in the Energy Industry appeared first on insBlogs.

Eliminate 81% of Your Cybersecurity Vulnerabilities in 90 Days

$
0
0

Cybersecurity vulnerabilities are an increasing concern for every company in every industry. Year over year, data breaches increase by 75%. Why are they becoming more prevalent, and how can you protect your business?

Before you can protect your company from a data breach, you have to understand why they’re occurring. So let’s look at some statistics:

  • 81% of hacking-related breaches leveraged either stolen and/or weak passwords
  • 70% of employees reuse passwords at work
  • Ransomware is the top variety of malicious software, found in 39% of cases where malware was identified
  • 59% of companies experienced a data breach caused by a third party

These stats start to give us an idea of the true root cause of cybersecurity risk. Yes, there are bad actors involved, but data breaches also have everything to do with governance.

Realizing the connection between good governance and cybersecurity is in itself a huge benefit to an organization. Not only do data breaches hold financial and intellectual property concerns, they also have the potential to impact a company’s reputation.

Because of the See-Through Economy, consumers are more aware of data breaches than ever before, they’ve cried out for better protection, and regulators have taken steps towards providing it for them. More opportunities to be hit with regulatory lawsuits mean more chances for a company’s brand to suffer.

The good news is, the leading causes of cyber breaches – weak passwords, ransomware, and third parties – can be entirely mitigated with good governance.

 

Cybersecurity Risks Are a Governance Problem

There a few common misconceptions about cybersecurity. For one, many people believe breaches occur because of insufficient technology, but extensive spending on specific cybersecurity solutions has created more gaps than it’s closed. In reality, most cybersecurity issues are governance problems.

For another, many organizations react by conducting employee training. Training increases awareness but is proven ineffective at changing behavior.

Reducing the risk of a cyber attack is no different from reducing any risk; it begins with identification. Specifically, root-cause risk identification, as we’ve started to do with the bullets above.

If 81% of hacking-related data breaches leveraged weak passwords, then expensive point-of-sale solutions or artificial intelligence won’t work.

Additionally, trained employees rarely make an effort to change weak/reused passwords, and the problem lingers. In fact, a survey by LastPass of LogMeIn, a password management tool, found that although 91% of the employees claim to understand the risks of using the same passwords across multiple accounts, 59% said they did so anyway.

Moreover, if over half of data breaches that occur stem from third-parties, what good will more training with employees or more expensive point solutions do?

Chances are, you already have many solid security policies and advanced technology in place. The next step is to implement good governance over them to make sure they’re actually protecting your company.

So how is good governance achieved?

 

Improve Cybersecurity with Good Governance

Good governance doesn’t happen overnight. It takes a village. A huge misperception people have is that cybersecurity is the IT department’s responsibility. But actually, every department plays a key role. The first step to good governance, then, is realizing what piece of the puzzle each department holds. Consider the following:

  • IT Security – Does not have the complete asset list, meaning it cannot identify all login practices or monitor password quality or access rights
  • Finance – Knows assets and process owner allocation, but has no method/system for sharing that information with the right parties
  • Third-Party Management – Has no system for managing authorized assets or sharing information or enforcement of controls
  • Legal – Has authority, but lacks any control implementation or monitoring
  • HR – Has no way of notifying application administrators of user entitlement changes
  • Audit – Has access to an entitlement policy, but doesn’t have a user access list mapped to specific assets

The problems detailed above persist as long as departments are unable to communicate effectively. The information they need does exist; it’s a simple matter of finding out how to access and coordinate that information.

A written password, asset, or access policy will not lead to realized benefits unless these limitations can be overcome. It’s not the existence of the policy itself that improves security; it’s the implementation, or operationalization, of that policy. This is why preventing breaches starts with governance, not technology. The crucial success factor is engaging each business area.

 

Actively Engage Different Departments in Cybersecurity

Step 1: Compose and Approve the Policy Itself

This step is already performed by the vast majority of organizations. The board or executive leadership decides to mitigate the threat posed by employees’ weak passwords, access rights, and asset lists. It enlists the help of the security department to validate the implementation of these policies.

Step 2: Grant the Security Department the Visibility it Needs

Here is where most organizations falter. They have a policy, but they can’t implement it or are unsure if all vulnerabilities are covered. The failure to operationalize is therefore a governance problem — an inability to coordinate activities and responsibilities across business silos. Senior leadership leaves it to security to ensure the company is adhering to the new policy because, after all, security has the most subject-matter expertise, right?

In reality, security can only handle certain parts of the policy. A current LogicManager customer reported its prior inability to implement such a policy. They told us, “We’ve been in deadlock for three years. We have a policy drafted, but security has said it only has actionable control over certain parts, and so nothing moves forward.”

LogicManager was able to help for a very simple reason: governance platforms provide a centralized information hub, plus the ability to:

  1. Break up roles and responsibilities
  2. Assign those roles to appropriate stakeholders
  3. Create automated tasks to monitor the activity and ensure password/access policies are adhered to by all stakeholders

Step 3. Carry Good Governance Out to Third Parties

Since 59% of data breaches stem from a company’s third parties, it’s not enough to shore up internal security, password, and access rights policies. You need to make sure your vendors are taking as many precautions with your data as you are.

How many applications does your company rely on? How many third parties have access to sensitive information? Which employees have access to which? How much access does each employee need to get their job done?

Enterprise risk management platforms can help answer these questions, as the best of them can help you govern your software asset management and user access reviews.

Again, IT isn’t solely responsible for keeping track of these vendors. Every organization’s finance department maintains a “master asset list” of all applications, since they approve the budgets and execute purchase orders for every application.

Think about your payment systems, payroll system, customer relationship management, vendor management, and other third-party software applications. Once finance provides the list of assets and which departments own them, security simply reaches out to each process owner to operationalize the policy.

Step 4: Hold Each Party Accountable for its Piece

When security is isolated, they cannot operationalize the policy, and it’s paralyzed. But after security has access to information about which managers use which applications, it’s a simple matter of using the ERM system to push out tasks/notifications and track the results.

Each process owner receives an automatic task within the platform, which includes background on the policy as well as what is required of the individual manager. Since it’s functional managers, not the security department, that know which employees should have access rights, it’s easiest to get this information by pushing the requirements and questions down to the front lines.

After process owners handle their own pieces of the policy, they send their information back to the security department, where it can be monitored. The same process can then occur with vendor management; which vendors have access to password-protected applications, and how should their contracts be updated to reflect proper enforcement of the policy? Enforcement is then managed through contract terms and audit capabilities (based on risk assessment priorities).

So consider how achieving good governance can help you eliminate the vast majority of your cybersecurity risk by operationalizing the policies you already have in place across departments and out to third parties.

With the right governance solution, you should be able to operationalize any one of your policies within 90 days. If you operationalize your password policy across the enterprise, you’ve eliminated 81% of your cybersecurity risk.

This article was originally posted on LogicManager.com

The post Eliminate 81% of Your Cybersecurity Vulnerabilities in 90 Days appeared first on insBlogs.


P&C Brokerage Industry – Let’s talk Management Buy-ins

$
0
0

Let me start by saying that some of the best managed and most profitable brokerages in Canada are employee-owned. We believe that every succession planning process should, at the very least, consider this option.

Management Buy-ins

When talking about management buy-ins, a good place to start is to understand the reasons why we don’t see more of them. Keep in mind, some of these reasons are sometimes more perception than reality. Here are a few examples:

  • Lack of Bench Strength – your organization does not have the talented young people who have the drive and ability to run your business
  • Finances – employees don’t have the financial strength to commit capital to do the deal
  • Financing – the organization does not generate enough cash flow to support the debt servicing costs given current valuations
  • Too Complicated – it is easier to continue to operate and then monetize through a full divestiture
  • Control – while you own the business, you want full control

Of course, all these issues are real and, in many cases, good reasons for not under-taking a management buy-in. Having said that, I think management buy-ins make sense in certain situations and they are often overlooked because the brokerage owner either doesn’t know this might be a viable option or, they don’t know how to proceed.

Let’s look at some fundamentals of a good plan. First, there must be a process from which to evaluate what is best for you, your family, the organization and then the potential investors. While each situation is different, we typically suggest the following:

  • With the help of family, and or a trusted advisor, come up with some specific financial outcome goals. It might be as simple as I think my brokerage is worth $5 million. I would like to monetize $2 million now with the balance greater than $5 million in seven years;
  • Complete a deep dive of the business. The resulting document describes the composition of the business from an underlying book and financial perspective, lays out the possible market valuation, cash flow available for debt service and areas of possible value enhancement. This will be needed for both investors and potential financing sources.
  • The deep dive help focus on the type of investor that is best suited for you and your brokerage. It might be current employees, outside producers, an insurance company or even an executive that is currently working at an insurance company.
  • Prepare a detailed step-by-step plan of all the structural issues that must be addressed, including income tax, legal structure, governance and potential financial structure.
  • Execute the plan.

Proper planning and preparation are the key to success. There is little point in inviting employees or outside investors in the process unless they are going to add value. It is a far better approach to advertise for exactly who you’re looking for. There will be a lot of interest if they see a possible return.

The same goes for governance. You need to protect your investment and exercise ultimate control. At the same time, the investment must be meaningful to your new partners. A strong governance model supported by a well-crafted shareholder agreement is critical. The agreement needs to address those issues that require unanimous shareholder consent, under what conditions shareholders can obtain more or divest in shares and how they will be valued. There are a number of great lawyers who both understand the P&C sector and know how do craft effective agreements.

There are two issues that generally take some finesse. In the case of employee investors, it is getting them to commit some personal capital. For younger people, they generally don’t have any capital. But if they do, then it is paramount that they have at least something at risk. While you can work around this, I struggle to justify why a Brokerage Owner should commit to a plan to transfer ownership without some immediate commitment by the investor.

The second issue is financing the transaction. The financing approach depends on the circumstances. Banks, insurance companies and private investors each have unique advantages and potential challenges. Your chosen plan will play an important role in what type of financing you look for.

Management buy-ins should be part of an overall plan that leads to the eventual transition of ownership. Yes, there are complicated financial and emotional considerations. But, with a well-designed tax and financial strategy you can protect your family’s financial future, reduce the organizations dependence on you and ultimately increase the overall valuation of the business.

If you have any questions or comments, please send them to Mike Berris at mberris@smythecpa.com.

The post P&C Brokerage Industry – Let’s talk Management Buy-ins appeared first on insBlogs.

Flexible Risk Assessments and Effective Reporting in the Banking Industry

$
0
0

The banking industry is perceived as the most advanced in their understanding and implementation of risk management. Although banks have indeed made huge progress in risk management, two areas all banks can improve is the structure used in conducting their assessments to enable actionable and insightful strategic reporting.

I’ve found that the understanding and implementation of risk management is driven not by industry or size of institution, but rather by its people: boards, executives, their teams and front-line managers keeping their organizations on track to achieve their goals and preventing missteps and scandals in the fast-paced age of the See-Through Economy.

In an effort to give these two groups some insight into how they can accomplish this, I presented at two conferences for risk managers in the financial industry on new best practices and emerging trends. At the American Banking Association’s 2019 Risk Management Conference in Austin, TX, I presented on how attendees could get more out of cross-functional risk assessments. A short day later, I dove into effective board reporting at the Risk Management Association’s GCOR XIII Conference in Cambridge, MA.

In this blog, I’ll recap some of the highlights of these two important, intimately related topics. I’ll also pass along the tools I showed to each session’s attendees to give you a head start on implementing these tips for risk management in the banking industry.

Goals and Challenges in the Banking Industry

Attendees of ABA and GCOR alike have similar goals and challenges in the financial industry. So first, what are these goals? Protect your bank by identifying, mitigating, and monitoring risks before they manifest and identify new opportunities and capital efficiency.

What’s the challenge? Today, there’s a lot to protect your bank from – data breaches, reputational damage, non-compliance, a recession, and so much more. So the challenge, in a word, is complexity.

To paint a small picture of this complexity, think about the main regulatory body your bank has to align with and how many different risk categories they define. What I’ve seen time and time again is banks trying to put together different risk assessments to match up with all these different categories – the FFIEC’s 6 risk categories, the OCC’s 9 risk categories, etc.

The problem with this approach is if you take one of these categories, say Reputation Risk, and try to ask someone in IT to fill out a risk assessment on this category, they won’t know where to begin. They can only speak to what they know, and most IT professionals haven’t made the connection between what they know and reputation risk.

A better approach is to attract as many as you can with honey. The honey in this case is cross-functional risk assessments.

Get More out of Cross-Functional Risk Assessments

With cross-functional risk assessments, you’ll be able to gather, re-aggregate, and report on all the information you need to protect your business from a myriad of risks.

First, my presentation is summarized in our eBook “5 Steps for Better Risk Assessments: A Special Edition for the Financial Industry,” so feel free to download a free copy for an in-depth recap.

For the purposes of this blog, however, I’d like to reiterate three things:

1) The key to cross-functional risk assessments is taking a multi-disciplinary approach. Risk management is in every employee’s job title, whether they know it not. Having their engagement in the risk assessment process is crucial to achieving an attract-with-honey effect. Download the Risk-Based Approach Wheel I showed ABA attendees here. Use it to connect with other professionals in your organization like Audit or Compliance by starting with their priorities and working your way around the risk management cycle from their most preferred starting point!

2) Rethink your risk assessment categories. Instead of creating risk assessments with categories that align specifically with FFIEC or OCC categories, use standards in scoring, naming conventions, and risk libraries to organize them by key departments, key products and services, and key regulations. This way, you’re talking to people about what they know best and getting the most accurate information with the accountability for those risks attached.

3) Re-aggregate risk assessment information to align with big regulator risk categories and more. With a taxonomy in place, and by using the standards from #2 above, you can categorize one risk in multiple ways. Let’s say the Marketing Manager identifies someone hacking into the website as a risk. This would be simultaneously categorized as a marketing risk, an external risk, and a reputation risk (one of the OCC’s main categories).

The Why, How, and What of Effective Board Reports

Item number three above has everything to do with developing a flexible reporting structure. With such a structure, you can take any piece of information you’ve gathered from across the enterprise and dig into it in a multitude of ways. This requires an interrelated and standardized structured approach called a “taxonomy”.

Above we talked about how aligning with the main regulatory bodies adds complexity to managing risk in the financial industry. Another faction of this complexity is aligning with strategic goals set by the board. So, not only are risk managers juggling hundreds of regulations, they also have the board and others calling on them for evidence that their ERM program is effectively supporting the goals they set for the company.

Risk managers may not at first realize the massive amounts of information already on hand throughout their bank covering all areas of the organization down to the front lines. Without standards and taxonomy to link and relate all the connections across that information, it can be very challenging to portray how operational activities also align with the business’s greater strategic goals. Historically, boards of directors and senior leadership have struggled to engage with risk managers because information is typically not collected and distilled in the most effective way. The boards want to see the bottom line: how risk management is supporting their strategic objectives.

I’d like to give you a few tips on how you can overcome this challenge and paint the big picture for the board, while distilling this information into a digestible yet insightful format.

First, the taxonomy I describe above is a great tool for aggregating risk in many different ways. With a flexible categorization structure in place, you can pull reports on risks tied to different departments, products, regulations, or even strategic goals. The board wants concise deliverables providing evidence that the appropriate risk management controls are in place and that they are effective over the risks they are designed to mitigate. They also want to know that these risks are monitored, so that they won’t be the next name in the headlines.

Another tip to keep in mind, is to collect information in a way that enables your reports to be flexible. Compiling enterprise-wide risk into strategic dashboardsgives the board a comprehensive look at the “why” of an aggregated view of risk and its implications, and also provides the flexibility to drill into individual risks all the way out to the front-business lines where the risks are known. They are strategic in that the information in the dashboard can be dynamic but the presentation framework remains the same so that board members can quickly zoom in on the insights they need without needing to interpret the structure of how the data was gathered or changing the presentation style that is being used. The board doesn’t need to be overwhelmed with all of the risks at the business activity level, but it is best to have the option to dig deeper and re-aggregate information within the report.

Once the board has a clear view of their organization’s risk, they can rest assured that your risk management program has their strategic organizational goals in mind. As a result, the board will continue to provide the necessary support for your program.

It was an honor presenting at the ABA and RMA GCOR XIII Conferences, where I got to share and learn from risk professionals in one of the most advanced industries in the risk management fields. I hope attendees, and new readers, found these tips and tools useful!

This article was originally published on LogicManager.com

The post Flexible Risk Assessments and Effective Reporting in the Banking Industry appeared first on insBlogs.





Latest Images