article thumbnail

ESS Presentations at NFPA C&E Address a Wide Range of Issues, Including the Hazards They Present and Tactical Approaches for Mitigation

National Fire Protection Association

An NFPA Journal article, “ESS Prep,” by Angelo Verzoni highlights improved ESS training and regulation as keys to a safe coexistence with this evolving and complex hazard. This panel discussion offers perspectives from manufacturers, AHJs, FPEs/consultants, developer/installer/maintainers, and insurance and fire service.

Hazard 52
article thumbnail

Getting Started with Enterprise Risk Management

MHA Consulting

Enterprise Risk Management is the activity of identifying and mitigating the hazards that threaten an organization (definition from Strong Language: The MHA Glossary of Essential Business Continuity Terminology , available for free download with registration). ERM provides a framework for doing this in a systematic, results-oriented fashion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Best Practices for Effective Claims Reviews

Risk Management Monitor

With the cost of insurance for businesses rising across many types of coverage, staying on top of trends in the claims portfolio is more important than ever. For this reason, many insurers and TPAs promise to conduct claims reviews with their business customers on a regular basis, but the rigor can vary greatly.

article thumbnail

The road to EV safety requires a robust infrastructure

National Fire Protection Association

NFPA has been committed to addressing potential fire hazards posed by EVs for some time, offering in-person and online trainings that teach first responders how to safely and effectively mitigate EV incidents. To date, NFPA has helped educate more than 300,000 first responders on this emerging hazard.

article thumbnail

Strategies for Digital Risk Protection

Reciprocity

Any hazards associated with cloud architectural changes, the use of new platforms such as IoT devices, or new IT systems can lead to digital risk. This refers to all risks introduced by service providers and third parties working with your enterprise. This could include data breaches, intellectual property theft, and financial data theft.

article thumbnail

5 Steps to Implement Enterprise Risk Management (ERM)

Reciprocity

Passing or sharing the risk via insurance, joint venture, or another arrangement. Identified risks are analyzed to assess both their likelihood and hazard potential. The two fundamental components of ERM are (1) the evaluation of significant risks, followed by (2) application of adequate responses. Prevention or termination of a risk.

article thumbnail

5 Steps to Implement Enterprise Risk Management (ERM)

Reciprocity

The reactions to risk include: Acceptance or toleration of a risk; Prevention or termination of a risk; Passing or sharing the risk via insurance, joint venture, or another arrangement; Mitigating or reducing the risk by internal control procedures or other risk-prevention measures. Risk Assessment. Risk Response.