"Plan the work, then work the plan." Nowhere does this mantra of project management apply more than when managing technology risks. That new Whiz-Bang 3000 may not perform up to specs, the cloud ...
This overview course introduces and examines the enterprise view of Information Technology - Risk Management. This course will have students consider real world risk scenarios while at the same time ...
The Covid-19 pandemic created a massive surge in the use of video conferencing technologies and the number of service offerings. The sudden expansion of these services and our reliance on them has ...
Plenty of ink has been spilled about systemic risks to the global financial system: public health, asset prices, and debt levels are just a few of the potentially destabilizing conditions that our ...
Bridging the gap between cyber security and enterprise risk management programmes is a key priority for risk professionals, according to Jayant Dave, Check Point’s chief information security officer ...
Complex, urgent, and an erosion of trust — these are words that make cyber-risk professionals uncomfortable. Yet earlier this year, the World Economic Forum (WEF) framed risk this way prior to its ...
With the growing demands of huge data sets, an everchanging regulatory landscape, and constantly evolving typologies, the challenge of assessing, documenting, and managing financial crime risk has ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results