You've requested...

Share this with your colleagues:

CRO Survey: Risk, Regulation and Return

If a new window did not open, click here to view this asset.

Download this next:

Manage the risks of AI, 5G, IoT and more

Enterprise risk management (ERM) structures have grown in number and maturity, but many of them do not account for emerging technologies such as AI, 5G and IoT, all of which have the potential to:

  • Increase organizational efficiency
  • Improve interactions with customers; and
  • Improve risk management capabilities

At this juncture, it’s important that board and C-suite members assume responsibility for these shifts, as these technologies are not far down the road.

Get ahead of the game by leveraging this SFG resource outlining ERM best practices for new tech.

These are also closely related to: "CRO Survey: Risk, Regulation and Return"

  • 7 steps to manage risk of new technologies

    Significant technology advances can fuel heightened productivity, important new product development and an overall enhanced ability to meet business objectives. Yet, along with these important benefits, technology often introduces new risks.

    An incomplete understanding of those risks, particularly when related to cybersecurity, can lead to material consequences.

    View this Shared Assessments’ Risk Committee briefing paper to get an understanding of these technological advances and risk management best practices. Technologies covered include:

    • AI
    • IoT
    • 5G
    • And more

  • ERM & GRC: Digital tools for oversight in the enterprise

    This Constellation Shortlist highlights 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of – ERM & GRC vendors highlighted in this report include:

    • RSA
    • ServiceNow
    • SureCloud
    • & more

    Read this report to learn more about how these vendors qualified for the Constellation Shortlist and the benefits they have to offer.

Find more content like what you just read:

  • Compare 22 GRC vendors

    Governance, risk and compliance (GRC) is hotter than it’s ever been – and vendors are taking advantage. But, these vendors vary by size, product capabilities, geography, vertical market focus and domain expertise. Get a clear view of the market – download this Forrester Now Tech report to compare 22 different GRC platforms.

    Download

  • Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications

    Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.

    Download

  • Creating a Network Endpoint Security Policy for Hostile Endpoints

    Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.

    Download

  • Adaptive risk management for complex supply chains

    This paper discusses supply chain risk and the increased demands that complex supply chains place on outsourcers and providers. It also provides strategies and tactics for building and applying complex adaptive solutions to your own Third-Party Risk Management (TPRM) program. Download your copy today.

    Download

  • A definitive guide to the IT GRC market

    IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.

    Download

  • Computer Weekly Buyer's Guide Cloud ERP

    In this 14-page buyer's guide, Computer Weekly looks at how enterprise applications have evolved, migrating ERP to the public cloud, and the shift from on-premise ERP to cloud-based systems.

    Download

  • Mitigating 3rd-party supply chain risks in insurance companies

    As insurance companies invest in new technologies to improve the customer experience and enable product offerings, they are facing an increasing number of third-party and extended supply chain risks. Download this white paper to explore some of the biggest risks, and the steps you can take to mitigate them.

    Download

  • 4 steps to operational resilience

    Operational resilience is defined as ‘the ability of an organization to continue to serve its customers, deliver products and services, and protect its workforce in the face of adverse operational events by anticipating, preventing, recovering from and adapting to such events.’ View this white paper to learn 4 steps to operational resilience.

    Download

  • Microsoft CEO on empathy in tech innovation

    In this week's Computer Weekly, Microsoft CEO Satya Nadella explains why he has made empathy a key part of technology innovation. We examine the latest news in the ongoing debate over the tax status of IT contractors in the public sector. And we ask if an emphasis on creativity will help attract more young people to work in IT. Read the issue now.

    Download

  • C-suite call to action: Third-party risk management

    When it comes to third parties, risk professionals, the C-suite and the board need to collectively determine how to shift their stance from reactive to proactive to handle uncharted circumstances. View this briefing paper to understand the malleable third-party risk landscape and how enterprises can become dynamically prepared.

    Download

  • Enforcing Endpoint Security: Creating a Network Security Policy

    As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them.

    Download

  • How Yelp leverages AppNeta to monitor the organization’s applications

    At Yelp the corporate engineering team leverages AppNeta Performance Manager to help track the performance milestones of their most business-critical connections and applications. In this case study, learn more about how Yelp is able to leverage AppNeta to monitor more than 30 apps across the entire organizations.

    Download

  • Evaluate IT risk management vendors

    By 2025, 50% of businesses will depend on risk management solutions. As such, security and risk management leaders are hunting for such solutions based on cybersecurity initiatives, board risk oversight and digital compliance obligations. Use this Gartner Magic Quadrant to evaluate the strengths and cautions of various players in the space.

    Download

  • Third party IoT risk management: A new roadmap

    The soaring number of IoT devices that can provide access to sensitive organizational data will make IoT risk management a convoluted undertaking. Professionals familiar with IoT are optimistic of its benefits but skeptical on security. Leverage this Ponemon report to get a grasp of organizational readiness for thir party IoT and its risks.

    Download

  • Third party risk management for mergers and acquisitions

    In mergers and acquisitions (M&A), managing risk has become a focal point. M&A firms are realizing that due diligence is needed to avoid value losses post-acquisition, and moreover, regulators are cracking down on M&A risk like never before. Dive into this white paper to learn how third party risk management best practices can help.

    Download

  • Financial markets regulatory outlook 2017

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

    Download

  • How to tackle risk taxonomy

    This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available.

    Download

  • Creating a Compliance Culture: Best Practices

    Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.

    Download

  • Clients tell-all in Linux simplification and innovation for enterprises

    In this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.

    Download

  • Transforming IT to improve children's lives

    In this week's Computer Weekly, we talk to global charity Save the Children to find out how technology is helping to transform its work. We go behind the scenes at the UK's most secretive court as it discusses bulk data surveillance. And we analyse the often contradictory experiences of firms implementing SAP's Hana platform. Read the issue now.

    Download

  • Mobile Security: A global perspective on emerging mobile security issues

    This in-depth expert guide examines the mobile security issues that arise as organizations seek to empower their workers and connect better with consumers through increased enterprise mobility.

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • How 11 third-party risk management platforms stack up

    As organizations continue to collaborate with third party vendors, they must realize their partial responsibility for any incidents or regulatory missteps that may occur. This is why third-party risk management (TPRM) vendors are innovating more than ever before. Download this Forrester Wave report to compare 11 of the top players in TPRM.

    Download

  • Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors

    In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.

    Download

  • Computer Weekly – 3 September 2019: From IT disaster to digital innovation at RBS

    In this week's Computer Weekly, we meet the man brought in to turn around the technology at RBS Group after its catastrophic IT outage. We examine the latest best practice in securing mobile devices in the enterprise. And we look at progress towards "passwordless" security. Read the issue now.

    Download

  • Explore the increased threat and security challenges for financial services

    Financial Services has been a targeted sector and cybercrime is becoming sophisticated on an industrial scale. A more strategic and wholesale approach needs to be adopted industry-wide to fend off the threat. In this white paper, learn how organizations can leverage technology to get a holistic view of their entire business.

    Download

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

    Download

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

    Download

  • Automating data security for financial multicloud applications

    Financial services firms must comply with a range of increasingly strict security and privacy standards. However, using joint solutions can take a DevSecComplianceOps approach to automate application building, testing, and deployment. View this white paper to learn more.

    Download

  • Governance, Risk & Compliance (GRC) Book of Knowledge

    Governance, risk, and compliance (GRC) is becoming a staple when it comes to risk management and meeting regulatory requirements. Read on to unlock the Governance, Risk, and Compliance Book of Knowledge and discover why organizations are opting for GRC tools and the benefits they’re realizing.

    Download

  • Steps to modernize your IBM OS for higher ROI

    This white paper explores the risks and pitfalls of failing to update your IBM OS to keep up with digital transformation, as well as some of the benefits you could realize by allowing a managed cloud partner help you modernize your OS.

    Download

  • What's the latest data strategy for GDPR?

    In this week's Computer Weekly, the head of IT at Dogs Trust discusses their use of cloud computing and data analytics. We also look at the societal challenges of AI and investigate how to get a good deal on Office 365. Plus our buyer's guide checks out DevOps tools. Read the issue now.

    Download

  • Securing OT in the face of IIoT and 5G

    Learn about the impact of IIoT and 5G on security for a modern OT environment as well as the architectural considerations for providing secure connectivity in the enterprise.

    Download

  • Computer Weekly – 6 November 2018: After 10 years, Post Office IT system goes on trial

    In this week's Computer Weekly, 10 years after we revealed concerns over the Post Office accounting system, affected subpostmasters finally get their day in court. We look at how businesses are turning to wearable tech to help employees. And we analyse the key players in the market for object storage. Read the issue now.

    Download

  • Market guide: Online fraud detection

    This Gartner e-guide offers a comprehensive and expert deep dive into the online fraud detection market, providing an overview of the market, an analysis of current and future trends, Gartner’s strategic recommendations, and more – read on to unlock the full e-guide.

    Download

  • Computer Weekly – 20 November 2018: How the Science Museum is moving to the digital age

    In this week's Computer Weekly, we find out how London's Science Museum is dealing with legacy IT to move into the age of digital and data. We examine Nationwide Building Society's move to cloud and DevOps. And we look at how technologies such as machine learning and blockchain are helping to automate global supply chains. Read the issue now.

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • Quantum computing in action

    In this e-guide, we look at Finland and how state investment is being used in a milestone project involving public and private sector organisations to understand the applications of the technology. And we hear how Spanish bank BBVA is examining the complex financial problems that could be solved by quantum computing.

    Download

  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.

    Download

  • Computer Weekly – 12 July 2016: Watson gets to work

    In this issue we explore the many ways Watson has evolved from the machine that bettered humans in Jeopardy! to providing deep analytical insights to solve real world crises. We also look at how Barclay's bank is using DevOps to remain competitive and reveal new research that illustrates why cloud computing is at the heart of business innovation.

    Download

  • Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition

    In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.

    Download

  • CW Benelux November 2019-January 2020: Dutch banks fight money laundering

    Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.

    Download

  • AI: Beyond the hype

    Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?

    Download

  • What are the business challenges of cognitive computing?

    This month's CW ANZ takes a look at how cognitive computing applications present new business challenges to enterprises.

    Download

  • CW Benelux May 2018

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

    Download

  • CW Nordics - November 2019: Robots help social workers in Sweden

    Software robots are being used by more than 20 local authorities in Sweden to carry out repetitive tasks previously done manually, such as document and data checks, freeing up social workers to make life-changing decisions for the needy.

    Download

  • The 2021 RiskTech research report: Top cybersecurity trends

    As organizational risk increases, risk management professionals must get an objective assessment of technology vendors in their market in order to make the best decisions. Download the RiskTech100 for 2021, a globally acknowledged, comprehensive independent study of the world’s major players in risk and compliance technology.

    Download