Remove Acceptable Risk Remove Business Continuity Remove Event Remove Insurance
article thumbnail

How to Offload Your Risk to a Third Party

MHA Consulting

Incorporates a combination of the strategies of risk avoidance and risk acceptance. Risk transfer: Passing risk on to another organization, such as by hiring a third-party vendor to perform the associated function. You still need to have a program to ensure the continuity of your business.

article thumbnail

At Risk of Distraction: The Seductive Appeal of RMIS Software

MHA Consulting

An emerging hot topic in business continuity and risk management is the software known as a risk management information system (RMIS). An RMIS can help an organization identify, assess, monitor, and mitigate risks, but often they merely seduce and distract companies that are not in a position to make proper use of them.

BCM 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Ultimate Guide to Residual Risk  

MHA Consulting

Reducing risk is at the heart of everything we do as business continuity professionals. This week’s blog post will spell out the key concepts relating to this all-important goal; call it “The Ultimate Guide to Residual Risk.” Inherent risk is the danger intrinsic to any business activity or operation.

article thumbnail

Important KPIs for Successful Vendor Management

Reciprocity

Before outsourcing your business processes or striking some other deal with vendors, you do need to assess the risks they pose. The six risks listed below are a good place to start. Begin by determining your organization’s tolerance for cybersecurity risk. Business Continuity. Cybersecurity.

article thumbnail

Risk Management as a Career: A Guide for BCM Professionals

MHA Consulting

They include process and procedural robustness and integrity; people, skills, and training; insurance and self-insurance; the supply chain, outsourcing, and inherent risk; infrastructure, systems, and telecommunications; and physical and information security. Reducing risk. Transferring risk. Accepting risk.

article thumbnail

The Difference Between Strategic and Operational Risk

Reciprocity

Operational risks stem from inadequate or failed internal procedures, employee errors, cybersecurity events, or external events such as a weather disaster. A comprehensive operational risk management (ORM) plan is critical to identify these risks and implement practical steps to manage them. What Is Strategic Risk?