Features

Year in Risk 2014

Year in Risk 2014

A host of events, including natural and man-made disasters, episodes of corporate malfeasance, and new tech challenges, helped define the risk management landscape in 2014.

 
The Challenges of Third-Party Data Protection

The Challenges of Third-Party Data Protection

Companies must take steps to safeguard data stored by third-party vendors.

 
The EU-US Data Privacy Bridge Takes Shape

The EU-US Data Privacy Bridge Takes Shape

In the midst of trans-Atlantic controversies about data protection, a group of privacy experts is attempting to iron out the differences between data protection standards in the United States and the European Union.

 
How Companies Should Respond to Whistleblower Complaints

How Companies Should Respond to Whistleblower Complaints

With whistleblower lawsuits and recoveries on the rise, organizations need to be prepared.

 
Removing the Barriers to Sound ERM

Removing the Barriers to Sound ERM

Although the business world is fraught with risks that have the potential to upend strategy, many organizations are ill-prepared.

 
ERM Diplomacy

ERM Diplomacy

The key to a successful enterprise risk management program may lie in cultivating the right leadership traits in order to break through entrenched corporate silos.

 
Obesity’s Impact on Workers Compensation

Obesity’s Impact on Workers Compensation

As waistlines expand, so will risks, requiring employers to focus on wellness initiatives.

 
Reinventing Business Models Through Risk Management

Reinventing Business Models Through Risk Management

By looking at risks in a new way, innovative companies turn threats into opportunities.

 
New Ransomware and Cyberextortion Schemes Hold Businesses Hostage

New Ransomware and Cyberextortion Schemes Hold Businesses Hostage

CryptoLocker is only one of many new cyberextortion schemes.

 
Combating the Evolving Malware Threat

Combating the Evolving Malware Threat

Today’s advanced malware is increasingly rendering traditional protective measures ineffective.

 
Hacking the Hackers

Hacking the Hackers

Companies are adopting more aggressive legal and technological strategies to fight hackers.

 
What to Consider When Buying Cyberinsurance

What to Consider When Buying Cyberinsurance

Understanding insurance coverage details is an important element of any cybersecurity program.

 
The Overlooked Threat of Vehicle-Into-Building Accidents

The Overlooked Threat of Vehicle-Into-Building Accidents

Vehicle-into-building crashes are a surprisingly common risk for commercial building owners.

 
The Graduate’s Perspective

The Graduate’s Perspective

Risk management professionals discuss how their educational experience shaped their career.

 
Trends in Higher Education: Real World Lessons

Trends in Higher Education: Real World Lessons

By maximizing program relevance, schools are drawing in more students for a new class of risk managers.