SlideShare a Scribd company logo
1 of 41
1CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
MITIGATING
HUMAN RESOURCES RISKS
2CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Human Assets Can Make
Your Business Fly – Or Sink
 The “human factor” is the common element in
most risk and crisis scenarios
 9 out of 10 risks or security problems are
caused by people inside your organisation
3CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Business Risks on the HR Side
 Fraud
 Distribution scams
 Legal disputes
 Industrial espionage
 Intellectual property
theft
 Workplace theft
 Harassment &
discrimination claims
 Corruption
 Backlash vs. workouts
 Sabotage
 Kidnapping
 Extortion
 Unsecure data &
communications
 Workplace violence
(including violence against
executives and facilities)
 Organised crime
 Confidentiality
breaches
 Accidents
 Mismanagement
 Service
deterioration
 Contractual risk
4CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Asian Labor Environment
 Asia is a growth area representing a major source of new
professionals…
 …Yet it is also a major center of labour ethics violations
 Unethical sources include: child labour, sweatshop labour,
forced labour, prison labour
 Cultural differences – “us vs. them” – make multinational
corporations vulnerable
5CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
HR-related Crime Scenarios
 Fraud, industrial espionage, intellectual property
theft and piracy, corruption, sabotage: staff are
often involved
 Data & communications are at risk from employees,
not just from external enemies
 Organised crime may recruit your staff, or plant
stooges
6CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
HR-related Crime Scenarios
 Workouts & downsizings can spark backlashes,
violence, asset stripping, hostage taking
 Product tampering extortionists are often
insiders
 Kidnappers rely on insider information
7CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Common Traits of Companies
That Get Into Trouble
 Frequently rotating managers
 Poor public and corporate records
 Migration of cliques – “tribal loyalty”
 Corporate culture not instilled
 Neglect of due diligence practices
 Internal controls not firmly enforced
 No corporate HQ connection with key staff
8CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Ongoing HR
Risk Mitigation
Employee Integrity Program (EIP)
9CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Employee Integrity Program
(EIP) – Why Have One?
 Your organisation needs:
 Honest employees
 Effective internal controls
 Strong & visible deterrents
10CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Employee Integrity Program
(EIP) — Why Have One?
 An effective EIP will help you:
 Reduce risks to your reputation
 Protect your resources
 Improve your bottom line
 Build your company’s value
11CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Employee Integrity Program
(EIP) — Why Have One?
 An effective EIP will also help minimise losses
relating to:
 Internal fraud & theft
 Negligent hiring
 Workplace violence
 Workers’ compensation
claims
 Non-performance of duties
 Non-compliance
12CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
What Goes Into An Employee
Integrity Program (EIP)
 Background checks on senior or sensitive employees
 Professional pre-employment screening
 Monitoring and surveillance
 Spot checks on ethics compliance
 Substance abuse testing (USA)
13CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
What Goes Into An Employee
Integrity Program (EIP)
 Risk analysis of your organisation
 Whistle-blowing & complaint mechanisms
 Structured exit interviews
 Strict standard operational procedures to maintain
control over your organisation
14CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Pre-Employment
Risk Mitigation
15CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
What is the most common
type of fraud in the world?
Answer:
Résumé fraud
16CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Pre-Employment Screening
 LEVEL 1: Light Screening
 LEVEL 2: Medium Screening
 LEVEL 3: Full Screening
All companies should conduct thorough background
checks before hiring. Three different levels of pre-
employment screening are available to fit your needs.
17CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Pre-Employment Screening
 When considering pre-employment screening,
consider the following:
 Find out not just where and when, but why the
candidate left the previous job.
 Explanations of employers and copies of resignation
letters should not be taken at face value
18CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Pre-Employment Screening
— Three Levels of Scrutiny
LEVEL 1: LIGHT SCREENING
Level 1 checks include:
 Criminality check
 Verification of ID number
(many forgeries)
 Verification of last job
 Verification of highest degree
obtained
 Verification of address
19CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Employment Screening —
Three Levels of Scrutiny
LEVEL 2: MEDIUM SCREENING
Level 2 checks include all of the checks in Level 1, plus:
 Verification of past 5 years employment
 Research into past financial behaviour
20CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Pre-Employment Screening
— Three Levels of Scrutiny
LEVEL 3: FULL SCREENING
Level 3 checks include all checks in Levels 1 & 2, plus:
 Verification of 10 years of employment
 Discreet in-depth reputational interviews
 Litigation checks
21CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Pre-Employment Screening
— Three Levels of Scrutiny
LEVEL 3: FULL SCREENING
 Firms owned, licences held, discipline actions
 Media research
 Property asset research
 Research into liens, bankruptcy records
22CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Mitigating HR Risks
in Downsizing Scenarios
23CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
“Getting Even”
Downsizing, restructuring, liquidation, exit time,
firings, non-payment of bonuses, and similar actions
often lead to:
 The “Getting Even” syndrome
 “Tribal loyalties” that outweigh corporate loyalty
 Hidden liabilities, pensions, redundancy pay, other
issues
24CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
“Getting Even”
Additional threats include:
 Asset stripping, sabotage, theft, embezzlement
 Poison letters, dirty tricks
 Theft of trade secrets, intellectual property theft
 Attacks on computer systems
 Pre-departure “gifts” – including computer viruses
 Physical violence, hostage taking
25CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Mitigating HR Risks
in Downsizing Scenarios
 Have effective business controls in place
 Control systems must be able to deter, detect &
respond to internal threats
 Have early warning systems to spot risks
 Carry out risk & threat assessments before
downsizings, firings or “bad news announcements”
26CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Mitigating HR Risks
in Downsizing Scenarios
Other tactics to mitigate risks:
 Enhance management-staff communications
 Enhance crisis management planning
 Have contingency plans to deal with hostile
employees or ex-employees
27CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Mitigating HR Risks
in Downsizing Scenarios
 Enhance security to protect people & premises
 Prevent unauthorised electronic access
 Protect & backup all operating, financial, and data
processing systems & crucial assets
28CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Mitigating HR Risks
in Downsizing Scenarios
 Monitor departing staff on the way out
 Who are the staff most likely to stir trouble?
 Check employee computers for hostile plans
 Check ex-employees’ computers for erased files
29CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
And Upsizing Scenarios —
They Also Pose HR Risks
 Growth requires reviews of security & HR risks
 The “feel good” environment of expansion & high
turnover growth can blind a company toward its
risks
 Businesses outgrow existing controls — that’s when
security gaps appear
30CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
And Upsizing Scenarios —
They Also Pose HR Risks
 Traditional organisational, financial & security
controls may be inadequate protection against
disaster
 Business processes can break down, and
organisational mismanagement ensues
31CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Case Studies
Background checks reveal alarming discrepancies.
The following are based on true cases.
32CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Case Studies
CASE 1: Forgeries and Fakes
 The applicant claimed to hold a university degree
 The university named by the candidate reported that the
applicant’s degree was ‘fake and forged’
 A reference letter, apparently signed by the university’s
Deputy Controller of Examination, was also ‘fake and forged’
 A second degree (BBA) claimed by the applicant was never
conferred, and the claim was false
33CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Case Studies
CASE 2: False Employment Record
 A post-employment verification is conducted on a current
employee
 One of the employee’s previous employment records is
revealed as fake — she had never been employed by the
company, as claimed
 For the rest of her employment details, there were
conflicts in claimed job titles, duties and salaries
34CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Case Studies
CASE 3: Fraud Alleged by Former Employer
 When contacted, an applicant’s previous employers
reported that the applicant had been terminated due to
cash embezzlement, harassment and workplace
violence
 A second employment verification revealed this
termination, and the fact that the employee caused a
financial loss to his employer
35CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Case Studies
CASE 4: Fake Reference Letter
 Applicant provided a reference letter from her previous
employer
 This employer was contacted and shown the reference
letter
 The organization revealed that the applicant had never
been employed by them, and the letter she had provided
was a fake
36CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Professional Trade Associations
Corporate Memberships/Alliances
37CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Contact Us
Corporate Head Office
917, Liberty House, DIFC
P.O. Box 111794
Dubai, U.A.E.
Tel: +971-50-9038184
Fax: +971-4-3589094
Toll Free: +971 800- CRI LLC (274-552)
Email: cridxb@CRIGroup.com
EMEA Head Office
37th Floor, One Canada Square
Canary Wharf, London E14 5AA
United Kingdom
Tel: +44 203 4782449
Tel: +44 207 712 1626
M: +44 7584 492963
Email: dabazi@CRIGroup.com –
Business Development
38CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Contact Us
Qatar
Office No. 130, 1st Floor
Al – Jaidah Square
63 Airport Road
P.O. Box 24369
Doha, Qatar
Tel: +974 4426 7339
M: +974 7406 6572
Email: doha@CRIGroup.com
Pakistan
Level 12, #1210,1211, 55-B
Islamabad Stock Exchange (ISE) Towers
Jinnah Avenue, Blue Area
Islamabad, Pakistan
Toll Free: +92 080000274
Tel: +92 (51) 111 888 400
Email: pakistan@CRIGroup.com
39CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Contact Us
Singapore
1 Raffles Place, #19-07, Tower 2
One Raffles Place
Singapore 048616
Tel: +65 6808 5636
Fax: +65 6808 5800
Email: singapore@CRIGroup.com
Malaysia
Lot 2-2, Level 2, Tower B
The Troika, 19 Persiaran KLCCM
50450 Kuala Lumpur, Malaysia
Email: malaysia@CRIGroup.com
40CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Contact Us
Hong Kong
Rooms 05-15, 13A/F, South Tower
World Finance Centre
Harbour City 17
Canton Road
Tsim Sha Tsui Kowloon
Hong Kong
Tel: 852-2208-6064
Email: cri.hongkong@CRIGroup.com
USA
600 Third Avenue, Suite 252
New York, NY 10016
United States
Tel: +1 (646) 571-2501
Email: newyork@CRIGroup.com
41CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc.
Contact Us
CRIGroup.com
FraudInsider.com
Twitter.com/CRIGroupNews
Facebook.com/CRIGroup
Questions?

More Related Content

What's hot

June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be Youseadeloitte
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015John Budriss
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015Scott Smith
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber RiskMark Gibson
 
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)Andres Baytelman
 
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)Andres Baytelman
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarFERMA
 
Four mistakes to avoid when hiring your next security chief (print version ...
Four mistakes to avoid when hiring your next security chief (print version   ...Four mistakes to avoid when hiring your next security chief (print version   ...
Four mistakes to avoid when hiring your next security chief (print version ...Niren Thanky
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000PECB
 
BIZGrowth Strategies Summer 2016
BIZGrowth Strategies Summer 2016BIZGrowth Strategies Summer 2016
BIZGrowth Strategies Summer 2016CBIZ, Inc.
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityShareDocView.com
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionThe Economist Media Businesses
 

What's hot (20)

June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
 
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
 
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk Webinar
 
Four mistakes to avoid when hiring your next security chief (print version ...
Four mistakes to avoid when hiring your next security chief (print version   ...Four mistakes to avoid when hiring your next security chief (print version   ...
Four mistakes to avoid when hiring your next security chief (print version ...
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000
 
BIZGrowth Strategies Summer 2016
BIZGrowth Strategies Summer 2016BIZGrowth Strategies Summer 2016
BIZGrowth Strategies Summer 2016
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
Holistic risk management
Holistic risk managementHolistic risk management
Holistic risk management
 

Viewers also liked

Manage Your Organization's Contract Risks Final
Manage Your Organization's Contract Risks FinalManage Your Organization's Contract Risks Final
Manage Your Organization's Contract Risks FinalFred Travis
 
ISO 20000 Implementation Presentation
ISO 20000 Implementation PresentationISO 20000 Implementation Presentation
ISO 20000 Implementation PresentationSriramITISConsultant
 
Why Quality is a Risky Business?
Why Quality is a Risky Business?Why Quality is a Risky Business?
Why Quality is a Risky Business?PECB
 
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyBest Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyPECB
 
Iso 20000 standard implementation
Iso 20000 standard implementationIso 20000 standard implementation
Iso 20000 standard implementationIITSW Company
 
ITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 FoundationITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 FoundationPrudentialSolutions
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataAlan McSweeney
 
What is ISO20000
What is ISO20000What is ISO20000
What is ISO20000Ben Kalland
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation OverviewAlan McSweeney
 

Viewers also liked (10)

Manage Your Organization's Contract Risks Final
Manage Your Organization's Contract Risks FinalManage Your Organization's Contract Risks Final
Manage Your Organization's Contract Risks Final
 
ISO 20000 Implementation Presentation
ISO 20000 Implementation PresentationISO 20000 Implementation Presentation
ISO 20000 Implementation Presentation
 
Why Quality is a Risky Business?
Why Quality is a Risky Business?Why Quality is a Risky Business?
Why Quality is a Risky Business?
 
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyBest Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
 
Iso 20000 standard implementation
Iso 20000 standard implementationIso 20000 standard implementation
Iso 20000 standard implementation
 
ITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 FoundationITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 Foundation
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart Data
 
What is ISO20000
What is ISO20000What is ISO20000
What is ISO20000
 
ITIL PPT
ITIL PPTITIL PPT
ITIL PPT
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation Overview
 

Similar to Mitigating Human Resources Risks

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium AuditLinda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium AuditThe Athletic Mindset
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Craig Taggart MBA
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...Craig Taggart MBA
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...Craig Taggart
 
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Capgemini
 
Improving and Implementing Internal Controls
Improving and Implementing Internal ControlsImproving and Implementing Internal Controls
Improving and Implementing Internal ControlsTommy Seah
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughFraudBusters
 
A Guide for Employers to Implementing a Continuous Screening Program
A Guide for Employers to Implementing a Continuous Screening ProgramA Guide for Employers to Implementing a Continuous Screening Program
A Guide for Employers to Implementing a Continuous Screening ProgramW. Barry Nixon, SPHR
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015CBIZ, Inc.
 
How to Protect Your Business from Fraudsters, Liars and Cheats with Backgroun...
How to Protect Your Business from Fraudsters, Liars and Cheats with Backgroun...How to Protect Your Business from Fraudsters, Liars and Cheats with Backgroun...
How to Protect Your Business from Fraudsters, Liars and Cheats with Backgroun...W. Barry Nixon, SPHR
 

Similar to Mitigating Human Resources Risks (20)

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Employment Verification
Employment VerificationEmployment Verification
Employment Verification
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium AuditLinda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
 
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
 
Improving and Implementing Internal Controls
Improving and Implementing Internal ControlsImproving and Implementing Internal Controls
Improving and Implementing Internal Controls
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
A Guide for Employers to Implementing a Continuous Screening Program
A Guide for Employers to Implementing a Continuous Screening ProgramA Guide for Employers to Implementing a Continuous Screening Program
A Guide for Employers to Implementing a Continuous Screening Program
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
 
How to Protect Your Business from Fraudsters, Liars and Cheats with Backgroun...
How to Protect Your Business from Fraudsters, Liars and Cheats with Backgroun...How to Protect Your Business from Fraudsters, Liars and Cheats with Backgroun...
How to Protect Your Business from Fraudsters, Liars and Cheats with Backgroun...
 

Recently uploaded

9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Servicenishacall1
 
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...rajbaburaj201
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Ifra Zohaib
 
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...deepak38245
 
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNUR
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNURKANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNUR
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNURSapna Call girl
 
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for FriendshipBudaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for FriendshipNitya salvi
 
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...Laiba Pari
 
ROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
ROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICEROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
ROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICESapna Call girl
 
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALAAMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALASapna Call girl
 
Call Now ☎8826158885|| Call Girls in Laxmi Nagar, Escort Service Delhi N.C.R....
Call Now ☎8826158885|| Call Girls in Laxmi Nagar, Escort Service Delhi N.C.R....Call Now ☎8826158885|| Call Girls in Laxmi Nagar, Escort Service Delhi N.C.R....
Call Now ☎8826158885|| Call Girls in Laxmi Nagar, Escort Service Delhi N.C.R....teencall080
 
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...Monika Rani
 
JAMSHEDPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE
JAMSHEDPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICEJAMSHEDPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE
JAMSHEDPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICESapna Call girl
 
Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In motihari ❤ Low ...
Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In motihari ❤ Low ...Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In motihari ❤ Low ...
Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In motihari ❤ Low ...Monika Rani
 
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Apsara Of India
 
Call Girls Guwahati Just Call WhatsApp 7870993772 Top Class Call Girl Service...
Call Girls Guwahati Just Call WhatsApp 7870993772 Top Class Call Girl Service...Call Girls Guwahati Just Call WhatsApp 7870993772 Top Class Call Girl Service...
Call Girls Guwahati Just Call WhatsApp 7870993772 Top Class Call Girl Service...Monika Rani
 
Ernakulam ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Ernakulam ESCORT SERVICE
Ernakulam ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Ernakulam ESCORT SERVICEErnakulam ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Ernakulam ESCORT SERVICE
Ernakulam ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Ernakulam ESCORT SERVICEshivam142808
 
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICEMORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICESapna Call girl
 
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...Monika Rani
 
Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...
Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...
Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...oyomaster143
 

Recently uploaded (20)

9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
 
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
 
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
 
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNUR
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNURKANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNUR
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNUR
 
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for FriendshipBudaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
 
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
 
ROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
ROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICEROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
ROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
 
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALAAMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
 
Call Now ☎8826158885|| Call Girls in Laxmi Nagar, Escort Service Delhi N.C.R....
Call Now ☎8826158885|| Call Girls in Laxmi Nagar, Escort Service Delhi N.C.R....Call Now ☎8826158885|| Call Girls in Laxmi Nagar, Escort Service Delhi N.C.R....
Call Now ☎8826158885|| Call Girls in Laxmi Nagar, Escort Service Delhi N.C.R....
 
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
 
JAMSHEDPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE
JAMSHEDPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICEJAMSHEDPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE
JAMSHEDPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE
 
Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In motihari ❤ Low ...
Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In motihari ❤ Low ...Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In motihari ❤ Low ...
Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In motihari ❤ Low ...
 
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
 
Goa Escorts Service 9540619990 Call Girls in Goa
Goa Escorts Service 9540619990 Call Girls in GoaGoa Escorts Service 9540619990 Call Girls in Goa
Goa Escorts Service 9540619990 Call Girls in Goa
 
Call Girls Guwahati Just Call WhatsApp 7870993772 Top Class Call Girl Service...
Call Girls Guwahati Just Call WhatsApp 7870993772 Top Class Call Girl Service...Call Girls Guwahati Just Call WhatsApp 7870993772 Top Class Call Girl Service...
Call Girls Guwahati Just Call WhatsApp 7870993772 Top Class Call Girl Service...
 
Ernakulam ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Ernakulam ESCORT SERVICE
Ernakulam ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Ernakulam ESCORT SERVICEErnakulam ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Ernakulam ESCORT SERVICE
Ernakulam ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Ernakulam ESCORT SERVICE
 
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICEMORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
 
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
 
Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...
Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...
Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...
 

Mitigating Human Resources Risks

  • 1. 1CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. MITIGATING HUMAN RESOURCES RISKS
  • 2. 2CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Human Assets Can Make Your Business Fly – Or Sink  The “human factor” is the common element in most risk and crisis scenarios  9 out of 10 risks or security problems are caused by people inside your organisation
  • 3. 3CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Business Risks on the HR Side  Fraud  Distribution scams  Legal disputes  Industrial espionage  Intellectual property theft  Workplace theft  Harassment & discrimination claims  Corruption  Backlash vs. workouts  Sabotage  Kidnapping  Extortion  Unsecure data & communications  Workplace violence (including violence against executives and facilities)  Organised crime  Confidentiality breaches  Accidents  Mismanagement  Service deterioration  Contractual risk
  • 4. 4CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Asian Labor Environment  Asia is a growth area representing a major source of new professionals…  …Yet it is also a major center of labour ethics violations  Unethical sources include: child labour, sweatshop labour, forced labour, prison labour  Cultural differences – “us vs. them” – make multinational corporations vulnerable
  • 5. 5CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. HR-related Crime Scenarios  Fraud, industrial espionage, intellectual property theft and piracy, corruption, sabotage: staff are often involved  Data & communications are at risk from employees, not just from external enemies  Organised crime may recruit your staff, or plant stooges
  • 6. 6CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. HR-related Crime Scenarios  Workouts & downsizings can spark backlashes, violence, asset stripping, hostage taking  Product tampering extortionists are often insiders  Kidnappers rely on insider information
  • 7. 7CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Common Traits of Companies That Get Into Trouble  Frequently rotating managers  Poor public and corporate records  Migration of cliques – “tribal loyalty”  Corporate culture not instilled  Neglect of due diligence practices  Internal controls not firmly enforced  No corporate HQ connection with key staff
  • 8. 8CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Ongoing HR Risk Mitigation Employee Integrity Program (EIP)
  • 9. 9CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Employee Integrity Program (EIP) – Why Have One?  Your organisation needs:  Honest employees  Effective internal controls  Strong & visible deterrents
  • 10. 10CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Employee Integrity Program (EIP) — Why Have One?  An effective EIP will help you:  Reduce risks to your reputation  Protect your resources  Improve your bottom line  Build your company’s value
  • 11. 11CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Employee Integrity Program (EIP) — Why Have One?  An effective EIP will also help minimise losses relating to:  Internal fraud & theft  Negligent hiring  Workplace violence  Workers’ compensation claims  Non-performance of duties  Non-compliance
  • 12. 12CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. What Goes Into An Employee Integrity Program (EIP)  Background checks on senior or sensitive employees  Professional pre-employment screening  Monitoring and surveillance  Spot checks on ethics compliance  Substance abuse testing (USA)
  • 13. 13CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. What Goes Into An Employee Integrity Program (EIP)  Risk analysis of your organisation  Whistle-blowing & complaint mechanisms  Structured exit interviews  Strict standard operational procedures to maintain control over your organisation
  • 14. 14CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Pre-Employment Risk Mitigation
  • 15. 15CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. What is the most common type of fraud in the world? Answer: Résumé fraud
  • 16. 16CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Pre-Employment Screening  LEVEL 1: Light Screening  LEVEL 2: Medium Screening  LEVEL 3: Full Screening All companies should conduct thorough background checks before hiring. Three different levels of pre- employment screening are available to fit your needs.
  • 17. 17CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Pre-Employment Screening  When considering pre-employment screening, consider the following:  Find out not just where and when, but why the candidate left the previous job.  Explanations of employers and copies of resignation letters should not be taken at face value
  • 18. 18CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Pre-Employment Screening — Three Levels of Scrutiny LEVEL 1: LIGHT SCREENING Level 1 checks include:  Criminality check  Verification of ID number (many forgeries)  Verification of last job  Verification of highest degree obtained  Verification of address
  • 19. 19CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Employment Screening — Three Levels of Scrutiny LEVEL 2: MEDIUM SCREENING Level 2 checks include all of the checks in Level 1, plus:  Verification of past 5 years employment  Research into past financial behaviour
  • 20. 20CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Pre-Employment Screening — Three Levels of Scrutiny LEVEL 3: FULL SCREENING Level 3 checks include all checks in Levels 1 & 2, plus:  Verification of 10 years of employment  Discreet in-depth reputational interviews  Litigation checks
  • 21. 21CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Pre-Employment Screening — Three Levels of Scrutiny LEVEL 3: FULL SCREENING  Firms owned, licences held, discipline actions  Media research  Property asset research  Research into liens, bankruptcy records
  • 22. 22CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Mitigating HR Risks in Downsizing Scenarios
  • 23. 23CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. “Getting Even” Downsizing, restructuring, liquidation, exit time, firings, non-payment of bonuses, and similar actions often lead to:  The “Getting Even” syndrome  “Tribal loyalties” that outweigh corporate loyalty  Hidden liabilities, pensions, redundancy pay, other issues
  • 24. 24CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. “Getting Even” Additional threats include:  Asset stripping, sabotage, theft, embezzlement  Poison letters, dirty tricks  Theft of trade secrets, intellectual property theft  Attacks on computer systems  Pre-departure “gifts” – including computer viruses  Physical violence, hostage taking
  • 25. 25CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Mitigating HR Risks in Downsizing Scenarios  Have effective business controls in place  Control systems must be able to deter, detect & respond to internal threats  Have early warning systems to spot risks  Carry out risk & threat assessments before downsizings, firings or “bad news announcements”
  • 26. 26CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Mitigating HR Risks in Downsizing Scenarios Other tactics to mitigate risks:  Enhance management-staff communications  Enhance crisis management planning  Have contingency plans to deal with hostile employees or ex-employees
  • 27. 27CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Mitigating HR Risks in Downsizing Scenarios  Enhance security to protect people & premises  Prevent unauthorised electronic access  Protect & backup all operating, financial, and data processing systems & crucial assets
  • 28. 28CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Mitigating HR Risks in Downsizing Scenarios  Monitor departing staff on the way out  Who are the staff most likely to stir trouble?  Check employee computers for hostile plans  Check ex-employees’ computers for erased files
  • 29. 29CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. And Upsizing Scenarios — They Also Pose HR Risks  Growth requires reviews of security & HR risks  The “feel good” environment of expansion & high turnover growth can blind a company toward its risks  Businesses outgrow existing controls — that’s when security gaps appear
  • 30. 30CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. And Upsizing Scenarios — They Also Pose HR Risks  Traditional organisational, financial & security controls may be inadequate protection against disaster  Business processes can break down, and organisational mismanagement ensues
  • 31. 31CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Case Studies Background checks reveal alarming discrepancies. The following are based on true cases.
  • 32. 32CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Case Studies CASE 1: Forgeries and Fakes  The applicant claimed to hold a university degree  The university named by the candidate reported that the applicant’s degree was ‘fake and forged’  A reference letter, apparently signed by the university’s Deputy Controller of Examination, was also ‘fake and forged’  A second degree (BBA) claimed by the applicant was never conferred, and the claim was false
  • 33. 33CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Case Studies CASE 2: False Employment Record  A post-employment verification is conducted on a current employee  One of the employee’s previous employment records is revealed as fake — she had never been employed by the company, as claimed  For the rest of her employment details, there were conflicts in claimed job titles, duties and salaries
  • 34. 34CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Case Studies CASE 3: Fraud Alleged by Former Employer  When contacted, an applicant’s previous employers reported that the applicant had been terminated due to cash embezzlement, harassment and workplace violence  A second employment verification revealed this termination, and the fact that the employee caused a financial loss to his employer
  • 35. 35CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Case Studies CASE 4: Fake Reference Letter  Applicant provided a reference letter from her previous employer  This employer was contacted and shown the reference letter  The organization revealed that the applicant had never been employed by them, and the letter she had provided was a fake
  • 36. 36CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Professional Trade Associations Corporate Memberships/Alliances
  • 37. 37CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Contact Us Corporate Head Office 917, Liberty House, DIFC P.O. Box 111794 Dubai, U.A.E. Tel: +971-50-9038184 Fax: +971-4-3589094 Toll Free: +971 800- CRI LLC (274-552) Email: cridxb@CRIGroup.com EMEA Head Office 37th Floor, One Canada Square Canary Wharf, London E14 5AA United Kingdom Tel: +44 203 4782449 Tel: +44 207 712 1626 M: +44 7584 492963 Email: dabazi@CRIGroup.com – Business Development
  • 38. 38CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Contact Us Qatar Office No. 130, 1st Floor Al – Jaidah Square 63 Airport Road P.O. Box 24369 Doha, Qatar Tel: +974 4426 7339 M: +974 7406 6572 Email: doha@CRIGroup.com Pakistan Level 12, #1210,1211, 55-B Islamabad Stock Exchange (ISE) Towers Jinnah Avenue, Blue Area Islamabad, Pakistan Toll Free: +92 080000274 Tel: +92 (51) 111 888 400 Email: pakistan@CRIGroup.com
  • 39. 39CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Contact Us Singapore 1 Raffles Place, #19-07, Tower 2 One Raffles Place Singapore 048616 Tel: +65 6808 5636 Fax: +65 6808 5800 Email: singapore@CRIGroup.com Malaysia Lot 2-2, Level 2, Tower B The Troika, 19 Persiaran KLCCM 50450 Kuala Lumpur, Malaysia Email: malaysia@CRIGroup.com
  • 40. 40CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Contact Us Hong Kong Rooms 05-15, 13A/F, South Tower World Finance Centre Harbour City 17 Canton Road Tsim Sha Tsui Kowloon Hong Kong Tel: 852-2208-6064 Email: cri.hongkong@CRIGroup.com USA 600 Third Avenue, Suite 252 New York, NY 10016 United States Tel: +1 (646) 571-2501 Email: newyork@CRIGroup.com
  • 41. 41CRIGroup.com | zanjum@CRIGroup.com | © 2015 CRI Group, Inc. Contact Us CRIGroup.com FraudInsider.com Twitter.com/CRIGroupNews Facebook.com/CRIGroup Questions?