article thumbnail

Travel Risk Management for LGBTQ+ Employees

Risk Management Monitor

Corporate risk managers need to consider how to best protect employees in a way that doesn’t make them feel singled out, working with them to stay safe and respect local laws without compromising their own values. Social media can also put travelers at risk. Understand the Law.

Travel 75
article thumbnail

5 Steps to Implement Enterprise Risk Management (ERM)

Reciprocity

Enterprise risk management (ERM) is critical for success in the modern business landscape. Your ERM program should encompass all aspects of risk management and response in all business processes, including cybersecurity, finance, human resources, risk management audit , privacy, compliance, and natural disasters.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting Your Corporate Website as an Enterprise Risk Management Strategy

Reciprocity

Protecting your corporate website as an enterprise risk management strategy can keep your data, customers, sensitive information, and reputation safe. However, SQL injections are the most exploited web application security vulnerability. Get a Web Application Firewall. Apply for a web application firewall (WAF).

article thumbnail

What is Vendor Risk Management (VRM)? The Definitive Guide

Reciprocity

Vendor risk management (VRM), a part of vendor management, is the process of identifying, analyzing, monitoring, and mitigating the risks that third-party vendors might pose to your organization. Third-party risk management begins with due diligence before signing a contract, as with any risk management program.

article thumbnail

Developing a Reputation Risk Management Framework

Plan B Consulting

This week, I apply the PESTLE framework to business continuity, in response to finding other risk management frameworks too restricting. Over the last few weeks I have been thinking a lot about risk management frameworks for business continuity. Sustained or severe criticism in the media (or on social media) b.

article thumbnail

Developing a Reputation Risk Management Framework

Plan B Consulting

This week, I apply the PESTLE framework to business continuity, in response to finding other risk management frameworks too restricting. Over the last few weeks I have been thinking a lot about risk management frameworks for business continuity. Sustained or severe criticism in the media (or on social media) b.

article thumbnail

How Banks Benefit from the New Digital Operational Resilience Act

Pure Storage

Once companies are required to be in compliance with DORA in early 2025, banks’ responsibilities for operational risks will expand to include protection, detection, containment, recovery, and repair capabilities against information and communication technologies (ICT) incidents. The key metric of success was a low cost of ownership.

Banking 97