You've requested...

Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk

If a new window did not open, click here to view this asset.

Download this next:

12 top enterprise risk management trends in 2023

Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change.

Executives recognize that stronger ERM programs are required to remain competitive in this new era. One aspect of the current risk landscape that companies must contend with is the connectivity of risks.

Businesses are increasingly more interconnected to partners, vendors and suppliers across global markets. As a result, the impact, for example, of a local natural disaster, the ongoing war in the Ukraine or high interest rates can cascade across an entire global supply chain.

Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

These are also closely related to: "Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk"

  • Top 10 CI/CD security risks you can't ignore

    Continuous integration and continuous delivery (CI/CD) practices speed up software development, but also introduce security risks if not properly addressed.

    This 42-page eBook examines the top 10 CI/CD security risks, including lack of secrets management, weak access controls, and unprotected build artifacts, and provides recommendations to mitigate each risk.

    Implementing these best practices can help organizations balance the need for rapid releases with strong security. Read the full report to learn how to build security into your CI/CD processes.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Cyber insurance is one of the fastest growing areas of risk cover in the insurance industry as businesses increasingly turn to specialist insurance in an attempt to cover a portion of their enterprise risk.

     Cyber risk is notoriously difficult to quantify and businesses face an arduous choice in deciding which risks to manage themselves and which risks to transfer to the insurance market.

     This article dips a toe into this emerging risk area and outlines some steps businesses can take to make better informed risk mitigation decisions.

Find more content like what you just read:

  • Infographic: Top 12 risk management skills

    Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.

    Download

  • Information Security Threats: Building Risk Resilience

    Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.

    Download

  • Managing Cloud Computing Risk

    Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.

    Download

  • Traditional vs. enterprise risk management: How do they differ?

    Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • Top IT security priorities: Addressing risk management and compliance

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

    Download

  • Reducing the Risks of Social Media

    Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.

    Download

  • Top Monitoring Tools to Help Meet Regulatory Compliance Standards

    In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.

    Download

  • Keys to Robust Credit Risk Modeling and Decisioning for Better Customer Experience

    Check out this white paper for the 4 pillars of modern credit risk modeling and decision, and how implementing automation and machine learning at the base of these pillars supports more effective decisions about credit for individuals, products, or portfolios.

    Download

  • E-Guide: VM in the Cloud

    Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.

    Download

  • CW ANZ, July 2020: Expert Advice on Security

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

    Download

  • How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction

    Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.

    Download

  • What's next for banks on their Credit Risk Transformation quests?

    To shed light on the state of CRTs and all of the associated challenges that banks are facing, access this analyst report for insights from 300 top credit risk executives.

    Download

  • Risk management is the beating heart of your cyber strategy

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

    Download

  • Banking in 2035: Global Banking Survey Report

    For an inside look at what banking leaders predict will be the greatest risks in the financial sector in upcoming years, download this analyst report to explore key insights from Economist Impact's Banking in 2035 survey.

    Download

  • Your guide to intercompany financial management

    As organizations continue to work to better manage their transactions within their corporation, it can be tricky to maximize staff efficiency and accounting accuracy while optimizing tax exposure. That’s where intercompany financial management comes in. Dig into this report to learn more.

    Download

  • Risks that machine identities pose to financial services

    As machine identities proliferate in the financial sector, financial services organizations are challenged with certain security risks. To break down those risks, Venafi sponsored a study of 1,000 CIOs. Review the findings in this white paper.

    Download

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

    Download

  • A Computer Weekly buyer's guide to managing paper processes

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

    Download

  • What a leading cybersecurity program looks like

    In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.

    Download

  • How TI can help defend against top business risks in 2023

    Cyber incidents and business interruption exist as the top business risks worldwide, according to the Allianz Risk Barometer 2023. Threat intelligence is essential, this e-book argues, to defending against these risks. Keep reading to unlock a 15-page guide to threat intelligence.

    Download

  • Today’s tech that’s changing the financial audit foundation

    For many, organizations will support finance transformation efforts by leveraging technology and AI to significantly reduce labor costs while improving the speed, accuracy, and action-ability of spend audit processes. However, while this strategy is effective, it isn’t always that simple. Browse this white paper to learn more.

    Download

  • A Roadmap to Resilience: How Banks Can Preempt the Next Wave of Disruption

    With the current tech landscape rife with cyber crime and disruptions around every corner, operational resiliency is a high priorty for the banking industry. Read on to discover how leading financial institutions are using digital tools and solutions to achieve cross-functional coordination of risk management, and protect their customers.

    Download

  • The secrets to a successful anti-money laundering hybrid approach

    Check out this e-book to learn how AML helps financial institutions take a modern approach to fighting financial crimes by reducing risk and improving overall operational efficiency, and discover 6 tips to help you succeed as you shift to next-gen AML.

    Download

  • The Future of Financial Crime Compliance: What's Next?

    In this e-book, discover how global trends in AML and financial crimes compliance have been evolving due to AI and other emerging technologies in anti-fraud defenses.

    Download

  • Learn to spot the red flags of screen scraping

    For many years, screen scraping has been used to exchange data between parties. However, with all of the dangers that come with that approach, it is a risky way to do business. This is especially true in the financial sector. However, with an open banking approach with API data exchanges, you can change everything. Read on to learn more about it.

    Download

  • Cloud Management: Overcoming today’s Top Risks

    Under a cloud paradigm, as services become more concentrated, risks follow suit, so it is important to understand and account for these changes and adjust security programs accordingly. View this e-guide to explore the top security risks in cloud computing today and how to overcome them.

    Download

  • Mobile device protection: tackling mobile device security risks

    The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.

    Download

  • Emerging PaaS security tactics

    Like all other cloud deployments, PaaS introduces some security concerns because of underlying security features that are beyond the customer’s control. This e-guide explores these challenges and lists security areas that can affect the risk profile of deployed applications, as well as offers key advice for mitigating risk.

    Download

  • Accelerate Your Enterprise Data Initiatives with a Smart Data Fabric

    To deliver better value to customers, reduce the risk of your data, and increase business agility, you need to create easy access to a single view of accurate, trusted data in real time. Read on to learn how smart data fabrics are allowing organizations to meet these goals even with the challenge of complex, disparate data architectures.

    Download

  • 5 building blocks for strengthening your IT security program

    Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.

    Download

  • Modernizing Asset Liability Management

    Discover in this e-book how financial service industry leaders are tackling an evolving business environment by integrating risk processes, strengthening scenario-based analytics, and modernising their ALM technology.

    Download

  • 2023 research paper: How to secure OT environments

    Though they present great opportunity, Industrial Internet of Things (IIoT) initiatives present great security risk as well as financial risk, because of the costly nature of shutting down operations. So, how can you secure your business’s OT environment and mitigate such risks? Tap into this 2023 VDC Research paper for insights.

    Download

  • Total Business Value of ServiceNow's Integrated Risk Products

    Much of today’s risk management is outdated, with organizations relying on approaches that don’t accurately reflect the complex reality of risk. This white paper attempts to evaluate the business outcomes of ServiceNow’s integrated risk management products, by citing cases studies from a range of high-profile clients. Read on to learn more.

    Download

  • Anticipate, Prevent, and Minimize the Impact of Business Disruptions

    Read this guide to discover how you can enable confident risk-based decisions across business and IT by building a proactive, comprehensive and competitive resilience strategy—especially in times of uncertainty and disruption. Start building a resilience programme that can give you a competitive edge, with ServiceNow.

    Download

  • Improve risk management by connecting business & IT

    Organisations that invest in resilience during times of uncertainty are better able to seize opportunity when it arises. In this eBook, discover how you can optimise operations, reduce costs and risk and boost resilience by connecting business and IT on a single platform. Learn more about Integrated Risk Management from ServiceNow in this ebook.

    Download

  • Improve risk management by connecting business & IT

    Organisations that invest in resilience during times of uncertainty are better able to seize opportunity when it arises. In this eBook, discover how you can optimise operations, reduce costs and risk and boost resilience by connecting business and IT on a single platform. Learn more about Integrated Risk Management from ServiceNow in this ebook.

    Download

  • Get smarter about data and technology risks

    With more products, relationships, and revenues depending on more digital capabilities, risk isn’t something just for IT or the compliance person. We are all on the frontline, and we can all help our companies avoid mistakes and problems. Check out this e-book to make wise, risk-aware decisions that can help your business safely transform.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • Risk management: 5 stages to compliance

    Maturing your risk management program is vital for meeting enterprise-wide objectives. Get insights on how you can raise the maturity level of enterprise risk management. You’ll discover how your teams can make better decisions that lead to greater outcomes, by connecting business and IT with a common language on a single platform.

    Download

  • The state of cybersecurity risk

    Unsurprisingly, with all the complexities of modern risk, many organizations have found themselves in need of external support for their risk management. This blog explores the state of cybersecurity risk, looking at the most influential trends, and how partnering with an MSP can help organizations better manage their risk. Read on to learn more.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • The State of AI

    Despite increased AI adoption, many are ignoring the risks. That’s why organizations that focus on security and risk mitigation may have a competitive edge in 2023. Read on to learn about the top 5 risks organizations are facing during AI adoption and how you can enable data science teams to build AI faster, more collaboratively, and more securely.

    Download

  • The key to a proactive approach to fraud protection

    When every payment contains some type of risk to a company’s bottom line, it’s critical to take a proactive and effective approach to fraud protection. Browse this case study to discover more.

    Download

  • CISSP Exam Guide Chapter 1 sample download

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

    Download

  • How CPM Software Points to Future Financial Risks and Opportunities

    This expert e-guide from SearchFinancialApplications.com discusses why corporate performance management (CPM) software has become a financial planning necessity.

    Download

  • Building the case for third-party Oracle support

    Today, many IT teams are struggling to mitigate risks, especially when it comes to trying to manage budgets that can enable resources to better focus on strategic initiatives that drive critical business priorities. Browse this white paper to learn more.

    Download