Risk


Top Stories


Reflection of hacker coding working hackathon at laptop

In God We Trust, All The Others We Monitor!

18-May-2020 | Thomas Frénéhard | Risk

Monitoring data, not just the perimeter, helps companies better protect the information held in their systems against insider threats.

Golden statue of a dragon in a Chinese temple

Emerging Risk: Hic Sunt Dracones

6-Apr-2020 | Thomas Frénéhard | Risk

Threats never appear without warning; the trick is to be ready for them before they turn into risks.

woman sitting at desk accepting a delivery

How A Former FBI Agent Approaches Pre-Transaction Due Diligence

24-Mar-2020 | Olivia Berkman | Risk

From hacked vendors to corporate card fraud, there are surprises for merging companies around every corner. This former FBI special agent has seen them all.

Latest Stories

For FP&A, There’s Risk, Then There's Uncertainty
Learn More

Pan-European Public Procurement On-Line (PEPPOL) Offers New Compliance Automation Opportunities
Learn More

Who Owns What? Your Data Protection Responsibility In The Multi-Cloud World
Learn More

Five Ways To Become A Digital Insurance Company
Learn More

Building A Sound Supplier Risk Management Structure
Learn More

Launching A GRC Overhaul? Think Out Of The Box
Learn More

Should We Stop Just Talking About Risk Management?
Learn More

Supplier Risk Management In Financial Services: Overcoming The Dangers
Learn More

Load more stories
← Older posts
Newer posts →