risk management plan

Results 1 - 19 of 19Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial process safety management has evolved beyond simple functional safety. Some companies are at risk because management and business process aspects are not integrated into the overall safety plan. Such gaps can impact both operational integrity and profitable performance. Explore the change drivers affecting plant process safety management and learn how operators can find, measure, and manage gaps to maintain safe conditions and improve profitability. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric
Published By: Vena Solutions     Published Date: Oct 29, 2018
Based on in-depth research and customer interviews, the annual Nucleus Research Value Matrix map out the corporate performance management (CPM) market landscape, evaluating vendors on a matrix contrasting usability and ease-of-use versus features and depth of functionality. Read or download the 2018 edition to uncover the most up-to-date CPM landscape, to find the best finance software solution for your needs, and to see why Vena led the pack in usability to land in the Leader quadrant for the third straight year.
Tags : 
nucleus research, cpm matrix, cpm technology value, cpm technology matrix 2018, excel replacement, financial planning, budgeting, forecasting, financial modeling, business modeling, finance what-if scenarios, financial close and consolidation, risk and audit management, erp data integration systems, adaptive insights, hyperion, anaplan, prophix, vena solutions
    
Vena Solutions
Published By: IBM     Published Date: Jun 26, 2013
An Economist Intelligence Unit research program commissioned by IBM.
Tags : 
holistic, risk management, business continuity planner
    
IBM
Published By: IBM     Published Date: Oct 26, 2016
In this paper, you’ll explore how business analytics can form the foundation for a proactive threat management strategy. - See examples of how different types of organizations are applying analytics. - Learn practical steps you can take to combat threat and fraud in your own organization.
Tags : 
ibm, analytics, predictive analytics, risk management
    
IBM
Published By: VMware     Published Date: Jun 21, 2019
Prime your business for growth with a software-defined approach. The current business-enterprise climate demands robust connectivity and delivery in services. As IT executives continue to invest in integrated infrastructure, companies that remain committed to hardware-centric infrastructure are being left behind and subsequently are exposing their enterprises to risk and loss. Liabilities include time wastage and financial costs in the management and maintenance of legacy infrastructure, creating a deficit in executives’ energy when it comes to innovation and future planning. VMware’s Hyperconverged Infrastructure (HCI) is a malleable, sophisticated solution which facilitates the vital transition from physical to virtualized storage solutions. HCI is the foundation for the Software-Defined Data Center (SDDC) destined for leading enterprise operations.
Tags : 
    
VMware
Published By: IBM     Published Date: Jan 27, 2016
This paper describes how predictive analytics can play a critical role in your threat and risk strategy.
Tags : 
ibm, threat, risk, management, security, analytics, fraud
    
IBM
Published By: IBM     Published Date: Jul 13, 2012
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. But this has introduced new challenges and opportunities. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Tags : 
ibm, technology, risk management, professionals, business, security management, emerging threats
    
IBM
Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv
Published By: Host Analytics     Published Date: Mar 01, 2018
While Oracle Hyperion remains a market leader in EPM software, that role comes with a hefty price tag and poses some hidden risks that have companies that use it re-evaluating their planning, budgeting, and consolidation needs. Whether used individually or together as an EPM suite, Hyperion Financial Management (HFM) and Hyperion Planning burden finance departments with a high cost of ownership, from server costs and consultants to dealing with the complex integration between products and the different interfaces. As Oracle Hyperion users start to evaluate the cloud, they need to be aware of how benefits of the cloud-based EPM solution compare to on-premises software. We’ve compiled this information to a) help you better understand the full costs and potential risks associated with Oracle Hyperion and b) offer guidance as you evaluate cloud-based options.
Tags : 
    
Host Analytics
Published By: NAVEX Global     Published Date: Dec 07, 2017
The Definitive Guide to Third-Party Risk Management is a comprehensive resource full of insight, advice and examples to help organisations identify and address their third-party risk. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with third party business partners. It will also protect your organisation from the risks that third parties can present. This guide is divided into three main sections: PLAN, IMPLEMENT and MEASURE. In these sections you’ll find the information and tools you need to develop a risk-based strategy, define third-party risk and a standard due diligence process, implement continuous monitoring of third parties and identify areas in which you need to improve your programme’s effectiveness.
Tags : 
risk management, third – party risk, navex, safeguard, risk – based strategy
    
NAVEX Global
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy, risk, management
    
Flexera
Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
    
IBM Software
Published By: IBM Software     Published Date: Oct 24, 2011
This paper describes how to build a proactive threat and risk strategy based on predictive analytics and provides real life examples of the benefits.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software
Published By: IBM     Published Date: Jan 09, 2015
Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation with a proactive, business-centric approach to BCM that highlights critical practices.
Tags : 
business continuity management, risk management, bcm plan, business solutions
    
IBM
Published By: IBM     Published Date: May 07, 2015
Learn how to build a proactive threat and fraud strategy based on business analytics. You’ll see extensive examples of how organizations worldwide apply IBM Business Analytics solutions to minimize the negative impact of risk and maximize positive results.
Tags : 
business analytics, risk management, threat management, fraud, proactive threat, analytics solutions, reduce exposure, reduce threats
    
IBM
Published By: IBM Business Analytics     Published Date: Jun 23, 2011
David Axson, author of The Management Mythbuster, explains how insightful analytics and a systematic approach to risk management can drive dramatic improvements in the quality and value that finance organizations deliver.
Tags : 
ibm business analytics, david axson, enterprise risk management, erp, enterprise resource planning, insightful analytics, finance function
    
IBM Business Analytics
Published By: AtTask     Published Date: Feb 11, 2012
To protect their investment in a project, an organization needs to engage in a three step process to put a reasonable and viable risk management plan in place. This free guide walks you through the process.
Tags : 
project risk management, risk management tools, it project risk management, enterprise risk management, risk management plan, business risk management
    
AtTask
Published By: IBM     Published Date: Jul 14, 2016
Enterprise risk management (ERM) is moving to the top of corporate agendas, and evidence shows strategic risk is a key factor in a robust ERM framework. Check out this white paper from risk management pioneer James Lam. In it, Lam explains why every organization should be focusing on strategic risk. You'll learn how to integrate risks into the planning process, use economic capital and risk-adjusted return on capital to measure risk, and how to apply these results.
Tags : 
best practices, risk management, enterprise, technology, frontier
    
IBM
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.