HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Risk Management News & Analysis

What Continuous Compliance Success Looks Like

2014-17-July-King-World.jpgThere is no specific, prescriptive path to guarantee your business will be covered for every eventuality and incident it may encounter. But by following three steps, you can get you -- and your organization -- in a proactive compliance and security mindset.

Communication Is Key to Continuous Compliance

Compliance is no longer a monthly, or even weekly, task -- it’s something that needs constant evaluation and adjustment. Sources change and applicability of control over data should be under consistent review -- that’s the age of continuous compliance we live in today. One requirement of continuous compliance is ongoing, effective and intelligent communication. There are some ways to help improve communication and ensure your compliance and security teams get the best, most relevant and timely information to keep you secure and compliant -- and remain that way.

Why Selectica Bolstered Contract Management With Iasta

2014-9-June-blaine_mathieu.jpg

Selectica CEO Blaine Mathieu told us in April the latest version of his company's contract management solution is like CMS “on steroids.”

With the provider’s acquisition of Iasta this month, Selectica could be banned from Major League Baseball for steroid use.

Iasta, a Gartner leader in its 2013 Magic Quadrant for Strategic Sourcing Application Suites, brings to Selectica its suite for upstream procurement solutions. Selectica’s wants Iasta to complement its own contract management solution.

“We started as a strategic partnership, but it became apparent that we could be much more powerful together than apart,” CEO Mathieu said. 

Do You Know When Your System Is Breached?

Information security professionals are always chasing to catch up with the bad guys.

Traditional information security (or cybersecurity) is focused on preventing unauthorized access to your network, systems, applications, infrastructure and data.

But, as we all know only too well, the people trying to get in are exposing and exploiting vulnerabilities faster than we can plug the holes. 

Surveys of security professionals around the globe report that more than 80 percent of companies know they have been hacked. The roughly 15 percent who did not report being hacked probably don’t know -- they just haven’t detected it yet.

Missing the Boat on IT and Technology

2014-29-April-Ship-Launch.jpgWhen you look at surveys of CEOs, such as the one by PwC in 2014, McKinsey in 2013 and IBM in 2012, they reflect what we should all know: that the innovative use of technology is one of, if not the primary, enabler of business innovation these days.

Whether it’s connecting with the customer (as referenced by IBM), obtaining market insights (through analytics including big data analytics -- see this discussion of a McKinsey report), or simply finding new ways to deliver products and services to customers, technology is a critical driver of business success.

The Holes in the Enterprise Cloud's Silver Lining

2014-25-April-Pop-Quiz.jpgPop quiz time.

Take out your #2 pencil and select the best answer that completes the following sentence.

Cloud services will revolutionize ______________.

  • A. the way software gets delivered.
  • B. the way software is licensed, by becoming a "pay as you go" option.
  • C. the way workers access services.
  • D. IT implementation, support and infrastructure costs.
  • E. the way business gets done, by letting mobile workers access information anytime, anywhere.
  • F. All of the above.

Unless you have been hiding out in a fallout shelter for the last five years, you probably picked “F. All of the above.” And if you did, you would be correct.

Be Pragmatic to Succeed in Information Governance

If I had to encapsulate in one phrase everything I’ve learned about doing information governance (IG) and related disciplines over the last 20 odd years, it’s that you should be pragmatic. Being pragmatic does not mean being shoddy, either by solving the problem at hand in a way that hinders other initiatives or the “big picture,” or by neglecting compliance obligations, or by accepting too much risk. Being pragmatic means being creative and rigorous in how you develop and assess your options to achieve your IG objectives.

Selectica CEO Boasts 'We're Like a CMS on Steroids'

Blaine.jpgSelectica CEO Blaine Mathieu said the latest version of his company's contract management solution makes it easier for corporate executives and their teams to control risk, create opportunities and deliver business value.

The company's Contract Lifecycle Management (CLM) version 6 release includes a host of additional features, including advanced integrations with DocuSign and Salesforce, added support for Microsoft Office and new contract packages that enable users to create and version multiple contracts with a variety of templates as well as check-out, check-in and compare documents simultaneously.

It also offers a variety of customer experience enhancements, including improved search, faster navigation and an improved user interface.

5 Questions Boards Should Ask About Risk Management

Risk management exists in a dynamic world and should have the agility required to address the changing demands of business. The insightful article "Five Questions Directors Should be Asking in 2014" gets to the point quickly and its few questions serve as a good guidepost.

Can Security and Compliance Coexist?

Both security and compliance are all about establishing (and implementing) standards that ensure an environment where company assets and data is accessed and utilized properly. So if you were asked, “Do you think security and compliance really coexist?” you’d most likely think it a dumb question and say, “Of course.”

But what if we challenge that notion a bit -- not so much to explore if they can coexist, but whether they do.

What's Riskier: Ignoring or Implementing Big Data?

Information security practitioners, risk professionals and executives might be blinded by the potential risks of implementing big data and thereby miss out on the value it can provide an organization. ISACA recently released a paper on Big Data which weighs the two sides and makes a clear decision which is the bigger risk.

The 'Dark Data' Dilemma: Finding the Elephants in the Room

darkdata.jpgEveryone is talking about big data. And, if you have ever watched Discovery Channel you probably know a little about dark matter and dark energy. But dark data? Is this just some new marketing buzzword, or is it a real problem?

Reflections on Strategic Risks: What's in a Name?

risk.jpgSurveys say people are paying more attention to so-called “strategic risk.” 

Reflections on IT Risk, Technology, Risk Management, Internal Audit

All the studies show an increasing pace of change in and around technology. It’s not just that we run the back-office with enterprise software, it is also invading the front office and the products and services offered by organizations around the world.

Accenture Reports Good News for Risk Management but Misses a Key Point

Accenture’s 2013 Global Risk Management Study starts with a great subtitle: “Risk management for an era of greater uncertainty.” I love this play on words: we live in uncertain times, and risk management is all about addressing the uncertainty between us and our objectives (as the esteemed Felix Kloman says, risk management helps us “pierce the fog of uncertainty”). 

Displaying 1-15 of 99 results

< Previous 1 2 3 4 5 6 7 Next >