SlideShare a Scribd company logo
Dermawan
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean
massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam
felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim.
Enterprise Risk Management for the Digital
Transformation Age
Session: 2447
Jem Pagán - Presenter
Participants will exit this Seminar with the following
knowledge:
1. The market growth and opportunities in enterprise risk
management
2. The skills necessary to take advantage of risk management
career opportunities
3. The applicable areas for enterprise risk management
4. The importance of addressing enterprise risk management in all
digital transformation initiatives
5. New innovations in enterprise risk management that will provide
new career opportunities for STEM professionals
Seminar Title: Enterprise Risk
Management for the Digital
Transformation Age
How would you define risk?
How is risk managed in your organization?
Have you ever experienced a risk incident?
How important in MTTR (mean-time-to-recovery)?
Let’s Level Set on Risk
TITLE
Seminar Title: Enterprise Risk Management for the Digital
Transformation Age
Seminar participants will collaborate and explore the emerging new use
cases for enterprise risk management that addresses the need to better
understand how to leverage critical data to predict and understand how
data analytics can support risk management and mitigation in an
increasingly data-dependent workforce environment.
Enterprise risk management has become a vital component to cyber
security, logistics management, asset management and supply chain
management. As organizations continue to rely on data to drive
workforce automation, Industrial IoT and process automation, it is
becoming necessary to analyze data to discover risk before it occurs and
implement effective remediation practices and processes.
Enterprise Risk Management
Goals and Drivers
RiskManagement Defined
Enterprise Risk Management Terms and definitions
Risk management is the process of identifying, quantifying,
and managing the risks that an organization faces. As the
outcomes of business activities are uncertain, they are said
to have some element of risk.
A cost-based assessment to operational and cyber risk was provided by
the Ponemon Institute, (the tech industry’s gold-standard benchmark
research), to gain an accurate perspective of the level of risk in terms of
cost and operational deficiencies.
The 2018 ‘13th Annual Cost of a Data Breach’ independent study,
conducted by the Ponemon Institute, reports the global average cost of a
data breach is up 6.4 percent over the previous year to $3.86 million.
The average cost for each lost or stolen record containing sensitive and
confidential information also increased by 4.8 percent year over year to
$148.
The Cost of Risk
July 2018 “Cost of a Data Breach Study: Impact of 22 factors on the per capita cost of data breach” - Ponemon Institute
Extending The Skills Of The Risk Professional Is The Next Big Challenge In Risk
Management
Ref: Skill Set Challenges in Risk Management- Forbes
1. Global Risk Management Study that risk managers worldwide have gained a
respected voice of influence and a “seat at the table” with their boards and top
management;
2. that they have made progress in the integration of the risk management
function, not only with finance, but with their firms’ lines of business;
3. and that innovative technologies such as artificial intelligence (AI), robotic process
automation (RPA), big data and analytics, machine learning and blockchain are
increasingly becoming part of the solution set to both help cut costs and importantly
manage vastly larger and more diverse data volumes.
4. The lack of needed skills, which has always been an issue in risk management, continues to
be a challenge – but with a different twist. There are seasoned people with risk
management expertise, as well as people in large scale financial institutions with technical
savvy in areas ranging from data science to AI.
5. However, finding and/or developing people who combine those skills in one package is
extremely difficult. Firms are trying to strike the right balance between risk experience and
disciplines on the one hand, and a deep understanding of current digital, data and
technology tools on the other. This is not easy.
Most Common Risk Management Disciplines
IT Risk Management is the application of risk management methods to information
technology in order to manage IT risk, i.e.: The business risk associated with the use,
ownership, operation, involvement, influence and adoption of IT within an enterprise or
organization.
Business Continuity Management (BCM) is a framework for identifying an
organization's risk of exposure to internal and external threats. ... BCM includes disaster
recovery, business recovery, crisis management, incident management,
emergency management and contingency planning.
Vendor Risk Management (VRM) is a process that deals with the management and
planning of third-party products and services. This ensures that the use of third-party
products, IT suppliers and service providers does not result in a potential business
disruption or in any negative impact on business performance.
Event Log Management. The collection, storage, and reporting of log data from
firewalls, routers, servers, applications, operating systems and devices in near real-time
for compliance and risk mitigation.
Legal Risk Management. By definition, the CCO is responsible for identifying,
prioritizing, and mitigating sources of legal and regulatory risk through effective internal
controls and business processes. ... Here again, CLOs may consider these functions
and risk areas to be part of their scope of responsibilities.
The term Operational Risk Management (ORM) is defined as a continual cyclic
process which includes risk assessment, risk decision making, and
implementation of risk controls, which results in acceptance, mitigation, or
avoidance of risk. ORM is the oversight of operational risk, including the risk of
loss resulting from inadequate or failed internal processes and systems; human
factors; or external events. Unlike other type of risks (market risk, credit risk,
etc.) operational risk had rarely been considered strategically significant by
senior management
Market Drivers for Integrated Risk and Cyber Solutions
The World Economic Forum (WEF) identifies technological risks, in the
form of data fraud and cyber attacks, among the top 10 risks in terms of
likelihood, while critical information infrastructure breakdown is among its
top ten risks in terms of impact.
These identified risks are not mutually exclusive. The primary driver for
global enterprises in terms of risk management is to transition from a post-
mortem remediation process to a proactive risk mitigation and management
state, to reduce or mitigate brand exposure, clean-up costs and business
disruption.
Enterprises of all sizes realize that cooperation within its key business units
is an essential starting point to mitigate cyber attacks or data breaches.
These coordinated efforts must be platform driven, to provide a ‘single
source of truth’ for preemptive and coordinated responses (in-the-moment)
to enterprise-wide risks.
Opportunities in Integrated Risk
Management
• Smart technologies such as RPA (Robotic Process Automation)
• Machine learning, big data and analytics and AI is leading to greater
efficiency and productivity in the risk function.
• Adopting these technologies can lower costs, and provide greater
accuracy and control, increased agility, and improved risk analysis
and insights.
• At this stage, only a minority of respondents say they are highly
proficient at incorporating these technologies into the risk
management functions, and they are impeded by obstacles such as
legacy technologies within the risk function (cited by 69% of
respondents) and the increased velocity, variety and volume of data
(named by 73%).
Ref: Skill Set Challenges in Risk Management- Forbes
The Digital Transformation Challenge?
Ref: Gartner - Risk Management Programs
1. Risks are derived from business goals and objectives
2. A risk framework guides a common approach across the
enterprise
3. Risks are communicated in terms of their impact on the business
4. There is operational support for risk management and
accountable ownership of risks
5. There is a business process approach to risk management
technology
(5) Characteristics of a Foundational
Risk Management Program
1. Risk managers must have an appetite for knowledge and should continually
ask questions about all aspects of the company.
2. Risk managers should seize every opportunity to learn, but at the same time
must be generalists due to the volume of their responsibilities.
3. Meeting and working with employees is an excellent way to learn. Risk
managers should be willing to roll up their sleeves and hit the trenches.
4. Risk managers must be willing to learn about the challenges employees
encounter to increase their understanding of what really makes a business
work.
5. Risk managers benefit from direct experience. This is often more valuable
than being taught.
6. A successful risk management career stems from understanding the value of
colleagues and learning from their knowledge.
Ref: Risk Manager Skill Set Development
Developing Risk Management Skills
Thank You
Jem Pagán, President
BluSky Consulting

More Related Content

What's hot

ERM overview
ERM overviewERM overview
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martin
David X Martin
 
Advanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management ConsultantsAdvanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management Consultants
EMAC Consulting Group
 
Risck intelligence in the energy and resources industry
Risck intelligence in the energy and resources industry Risck intelligence in the energy and resources industry
Risck intelligence in the energy and resources industry
Franco Ferrario
 
Enterprise Risk Management Erm
Enterprise Risk Management ErmEnterprise Risk Management Erm
Enterprise Risk Management Erm
Nexus Aid
 
Erm indian-higher-education
Erm indian-higher-educationErm indian-higher-education
Erm indian-higher-education
IRM India Affiliate
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentationalygale
 
UCI Exec. MBA & Forum for Corp. Directors July 2009 - Board Governance: E...
UCI Exec. MBA & Forum for Corp. Directors July 2009 - Board Governance: E...UCI Exec. MBA & Forum for Corp. Directors July 2009 - Board Governance: E...
UCI Exec. MBA & Forum for Corp. Directors July 2009 - Board Governance: E...prosenzw69
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
Aronson LLC
 
Enterprise Risk Management ~ Inovastra
Enterprise Risk Management ~ InovastraEnterprise Risk Management ~ Inovastra
Enterprise Risk Management ~ Inovastra
Nik Hasyudeen
 
Risk - IT Services
Risk - IT ServicesRisk - IT Services
Risk - IT Services
Nema Chhaya Buch
 
Enterprise Risk Management as a Core Management Process
Enterprise Risk Management as a Core Management ProcessEnterprise Risk Management as a Core Management Process
Enterprise Risk Management as a Core Management Processregio12
 
Strategic risk management
Strategic risk managementStrategic risk management
Strategic risk managementrejoysirvel
 
18 zain ul abideen final paper258--267
18 zain ul abideen final paper258--26718 zain ul abideen final paper258--267
18 zain ul abideen final paper258--267
Alexander Decker
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
Andre Knipe
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
H Contrex
 
Common failures of risk management
Common failures of risk management   Common failures of risk management
Common failures of risk management Surajit Datta
 
Strategic Planning Society Webinar- Integrating Strategy and Risk Management
Strategic Planning Society Webinar- Integrating Strategy and Risk ManagementStrategic Planning Society Webinar- Integrating Strategy and Risk Management
Strategic Planning Society Webinar- Integrating Strategy and Risk Management
Andrew Smart
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
Continuity and Resilience
 

What's hot (20)

ERM overview
ERM overviewERM overview
ERM overview
 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martin
 
Advanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management ConsultantsAdvanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management Consultants
 
Risck intelligence in the energy and resources industry
Risck intelligence in the energy and resources industry Risck intelligence in the energy and resources industry
Risck intelligence in the energy and resources industry
 
Enterprise Risk Management Erm
Enterprise Risk Management ErmEnterprise Risk Management Erm
Enterprise Risk Management Erm
 
Erm indian-higher-education
Erm indian-higher-educationErm indian-higher-education
Erm indian-higher-education
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentation
 
UCI Exec. MBA & Forum for Corp. Directors July 2009 - Board Governance: E...
UCI Exec. MBA & Forum for Corp. Directors July 2009 - Board Governance: E...UCI Exec. MBA & Forum for Corp. Directors July 2009 - Board Governance: E...
UCI Exec. MBA & Forum for Corp. Directors July 2009 - Board Governance: E...
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Enterprise Risk Management ~ Inovastra
Enterprise Risk Management ~ InovastraEnterprise Risk Management ~ Inovastra
Enterprise Risk Management ~ Inovastra
 
Risk - IT Services
Risk - IT ServicesRisk - IT Services
Risk - IT Services
 
Enterprise Risk Management as a Core Management Process
Enterprise Risk Management as a Core Management ProcessEnterprise Risk Management as a Core Management Process
Enterprise Risk Management as a Core Management Process
 
grc-today-oct-2015
grc-today-oct-2015grc-today-oct-2015
grc-today-oct-2015
 
Strategic risk management
Strategic risk managementStrategic risk management
Strategic risk management
 
18 zain ul abideen final paper258--267
18 zain ul abideen final paper258--26718 zain ul abideen final paper258--267
18 zain ul abideen final paper258--267
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
Common failures of risk management
Common failures of risk management   Common failures of risk management
Common failures of risk management
 
Strategic Planning Society Webinar- Integrating Strategy and Risk Management
Strategic Planning Society Webinar- Integrating Strategy and Risk ManagementStrategic Planning Society Webinar- Integrating Strategy and Risk Management
Strategic Planning Society Webinar- Integrating Strategy and Risk Management
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 

Similar to Enterprise Risk Management for the Digital Transformation Age

Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk ManagementAnu Damodaran
 
Implementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdfImplementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdf
Robert Serena, FSA, CFA, CPCU
 
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_NewsletterSTRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_NewsletterDion K Hamilton
 
Risk Management in Business
Risk Management in BusinessRisk Management in Business
Risk Management in Business
paperpublications3
 
StateOfSecOps - Final - Published
StateOfSecOps - Final - PublishedStateOfSecOps - Final - Published
StateOfSecOps - Final - PublishedJames Blake
 
Risk Monitoring and Management Trends In Commodities
Risk Monitoring and Management Trends In CommoditiesRisk Monitoring and Management Trends In Commodities
Risk Monitoring and Management Trends In Commodities
CTRM Center
 
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportAccenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportTomas Imrich
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
2015 global capital markets risk management study
2015 global capital markets risk management study2015 global capital markets risk management study
2015 global capital markets risk management study
Lapman Lee ✔
 
Hp arc sight_state of security ops_whitepaper
Hp arc sight_state of security ops_whitepaperHp arc sight_state of security ops_whitepaper
Hp arc sight_state of security ops_whitepaper
rickkaun
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
Kim Jensen
 
Deloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-surveyDeloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-surveyBluemap Consulting Group
 
Building an invisible framework for risk management
Building an invisible framework for risk managementBuilding an invisible framework for risk management
Building an invisible framework for risk management
hallowedblasphe76
 
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
FERMA
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
SymEx 2015 - Turning Risks Into Results, A Wider Perspective to Understand P...
SymEx 2015 - Turning Risks Into Results, A Wider Perspective  to Understand P...SymEx 2015 - Turning Risks Into Results, A Wider Perspective  to Understand P...
SymEx 2015 - Turning Risks Into Results, A Wider Perspective to Understand P...
PMI Indonesia Chapter
 
Deloitte survey reveals how global business executives understanding of strat...
Deloitte survey reveals how global business executives understanding of strat...Deloitte survey reveals how global business executives understanding of strat...
Deloitte survey reveals how global business executives understanding of strat...
David Graham
 
Risk Mgmt - Define_And_Articulate
Risk Mgmt - Define_And_ArticulateRisk Mgmt - Define_And_Articulate
Risk Mgmt - Define_And_ArticulateAnthony Chiusano
 

Similar to Enterprise Risk Management for the Digital Transformation Age (20)

Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Implementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdfImplementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdf
 
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_NewsletterSTRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
 
Risk_Technology
Risk_TechnologyRisk_Technology
Risk_Technology
 
Risk Management in Business
Risk Management in BusinessRisk Management in Business
Risk Management in Business
 
StateOfSecOps - Final - Published
StateOfSecOps - Final - PublishedStateOfSecOps - Final - Published
StateOfSecOps - Final - Published
 
Risk Monitoring and Management Trends In Commodities
Risk Monitoring and Management Trends In CommoditiesRisk Monitoring and Management Trends In Commodities
Risk Monitoring and Management Trends In Commodities
 
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportAccenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
2015 global capital markets risk management study
2015 global capital markets risk management study2015 global capital markets risk management study
2015 global capital markets risk management study
 
Hp arc sight_state of security ops_whitepaper
Hp arc sight_state of security ops_whitepaperHp arc sight_state of security ops_whitepaper
Hp arc sight_state of security ops_whitepaper
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
Deloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-surveyDeloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-survey
 
Building an invisible framework for risk management
Building an invisible framework for risk managementBuilding an invisible framework for risk management
Building an invisible framework for risk management
 
Deloitte_Risk Sensing
Deloitte_Risk SensingDeloitte_Risk Sensing
Deloitte_Risk Sensing
 
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
SymEx 2015 - Turning Risks Into Results, A Wider Perspective to Understand P...
SymEx 2015 - Turning Risks Into Results, A Wider Perspective  to Understand P...SymEx 2015 - Turning Risks Into Results, A Wider Perspective  to Understand P...
SymEx 2015 - Turning Risks Into Results, A Wider Perspective to Understand P...
 
Deloitte survey reveals how global business executives understanding of strat...
Deloitte survey reveals how global business executives understanding of strat...Deloitte survey reveals how global business executives understanding of strat...
Deloitte survey reveals how global business executives understanding of strat...
 
Risk Mgmt - Define_And_Articulate
Risk Mgmt - Define_And_ArticulateRisk Mgmt - Define_And_Articulate
Risk Mgmt - Define_And_Articulate
 

More from Career Communications Group

Technology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should KnowTechnology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should Know
Career Communications Group
 
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Career Communications Group
 
Power Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-ManagersPower Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-Managers
Career Communications Group
 
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Career Communications Group
 
The Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding HappinessThe Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding Happiness
Career Communications Group
 
Women in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation SkillsWomen in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Career Communications Group
 
Mental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and InclusionMental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and Inclusion
Career Communications Group
 
Improvising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under PressureImprovising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under Pressure
Career Communications Group
 
Authenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a LeaderAuthenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a Leader
Career Communications Group
 
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent PoolEmbracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Career Communications Group
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
X-treme Resumes: Constructing a Stellar Resume
X-treme Resumes: Constructing a Stellar ResumeX-treme Resumes: Constructing a Stellar Resume
X-treme Resumes: Constructing a Stellar Resume
Career Communications Group
 
DEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a RealityDEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a Reality
Career Communications Group
 
Speak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the WorkplaceSpeak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Career Communications Group
 
Introverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership SuccessIntroverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership Success
Career Communications Group
 
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Career Communications Group
 
Communication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive PeopleCommunication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive People
Career Communications Group
 
How Chat GPT and AI Will Impact the Workplace
How Chat GPT and AI Will Impact the WorkplaceHow Chat GPT and AI Will Impact the Workplace
How Chat GPT and AI Will Impact the Workplace
Career Communications Group
 
Building Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting PerformanceBuilding Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting Performance
Career Communications Group
 
Interview Skill That Get you Hired
Interview Skill That Get you HiredInterview Skill That Get you Hired
Interview Skill That Get you Hired
Career Communications Group
 

More from Career Communications Group (20)

Technology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should KnowTechnology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should Know
 
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
 
Power Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-ManagersPower Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-Managers
 
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
 
The Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding HappinessThe Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding Happiness
 
Women in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation SkillsWomen in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
 
Mental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and InclusionMental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and Inclusion
 
Improvising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under PressureImprovising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under Pressure
 
Authenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a LeaderAuthenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a Leader
 
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent PoolEmbracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
X-treme Resumes: Constructing a Stellar Resume
X-treme Resumes: Constructing a Stellar ResumeX-treme Resumes: Constructing a Stellar Resume
X-treme Resumes: Constructing a Stellar Resume
 
DEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a RealityDEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a Reality
 
Speak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the WorkplaceSpeak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the Workplace
 
Introverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership SuccessIntroverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership Success
 
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
 
Communication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive PeopleCommunication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive People
 
How Chat GPT and AI Will Impact the Workplace
How Chat GPT and AI Will Impact the WorkplaceHow Chat GPT and AI Will Impact the Workplace
How Chat GPT and AI Will Impact the Workplace
 
Building Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting PerformanceBuilding Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting Performance
 
Interview Skill That Get you Hired
Interview Skill That Get you HiredInterview Skill That Get you Hired
Interview Skill That Get you Hired
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Enterprise Risk Management for the Digital Transformation Age

  • 1. Dermawan Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim. Enterprise Risk Management for the Digital Transformation Age Session: 2447 Jem Pagán - Presenter
  • 2. Participants will exit this Seminar with the following knowledge: 1. The market growth and opportunities in enterprise risk management 2. The skills necessary to take advantage of risk management career opportunities 3. The applicable areas for enterprise risk management 4. The importance of addressing enterprise risk management in all digital transformation initiatives 5. New innovations in enterprise risk management that will provide new career opportunities for STEM professionals Seminar Title: Enterprise Risk Management for the Digital Transformation Age
  • 3. How would you define risk? How is risk managed in your organization? Have you ever experienced a risk incident? How important in MTTR (mean-time-to-recovery)? Let’s Level Set on Risk
  • 4. TITLE Seminar Title: Enterprise Risk Management for the Digital Transformation Age Seminar participants will collaborate and explore the emerging new use cases for enterprise risk management that addresses the need to better understand how to leverage critical data to predict and understand how data analytics can support risk management and mitigation in an increasingly data-dependent workforce environment. Enterprise risk management has become a vital component to cyber security, logistics management, asset management and supply chain management. As organizations continue to rely on data to drive workforce automation, Industrial IoT and process automation, it is becoming necessary to analyze data to discover risk before it occurs and implement effective remediation practices and processes.
  • 6. RiskManagement Defined Enterprise Risk Management Terms and definitions Risk management is the process of identifying, quantifying, and managing the risks that an organization faces. As the outcomes of business activities are uncertain, they are said to have some element of risk.
  • 7. A cost-based assessment to operational and cyber risk was provided by the Ponemon Institute, (the tech industry’s gold-standard benchmark research), to gain an accurate perspective of the level of risk in terms of cost and operational deficiencies. The 2018 ‘13th Annual Cost of a Data Breach’ independent study, conducted by the Ponemon Institute, reports the global average cost of a data breach is up 6.4 percent over the previous year to $3.86 million. The average cost for each lost or stolen record containing sensitive and confidential information also increased by 4.8 percent year over year to $148. The Cost of Risk
  • 8. July 2018 “Cost of a Data Breach Study: Impact of 22 factors on the per capita cost of data breach” - Ponemon Institute
  • 9. Extending The Skills Of The Risk Professional Is The Next Big Challenge In Risk Management Ref: Skill Set Challenges in Risk Management- Forbes 1. Global Risk Management Study that risk managers worldwide have gained a respected voice of influence and a “seat at the table” with their boards and top management; 2. that they have made progress in the integration of the risk management function, not only with finance, but with their firms’ lines of business; 3. and that innovative technologies such as artificial intelligence (AI), robotic process automation (RPA), big data and analytics, machine learning and blockchain are increasingly becoming part of the solution set to both help cut costs and importantly manage vastly larger and more diverse data volumes. 4. The lack of needed skills, which has always been an issue in risk management, continues to be a challenge – but with a different twist. There are seasoned people with risk management expertise, as well as people in large scale financial institutions with technical savvy in areas ranging from data science to AI. 5. However, finding and/or developing people who combine those skills in one package is extremely difficult. Firms are trying to strike the right balance between risk experience and disciplines on the one hand, and a deep understanding of current digital, data and technology tools on the other. This is not easy.
  • 10. Most Common Risk Management Disciplines IT Risk Management is the application of risk management methods to information technology in order to manage IT risk, i.e.: The business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise or organization. Business Continuity Management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats. ... BCM includes disaster recovery, business recovery, crisis management, incident management, emergency management and contingency planning. Vendor Risk Management (VRM) is a process that deals with the management and planning of third-party products and services. This ensures that the use of third-party products, IT suppliers and service providers does not result in a potential business disruption or in any negative impact on business performance. Event Log Management. The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation. Legal Risk Management. By definition, the CCO is responsible for identifying, prioritizing, and mitigating sources of legal and regulatory risk through effective internal controls and business processes. ... Here again, CLOs may consider these functions and risk areas to be part of their scope of responsibilities. The term Operational Risk Management (ORM) is defined as a continual cyclic process which includes risk assessment, risk decision making, and implementation of risk controls, which results in acceptance, mitigation, or avoidance of risk. ORM is the oversight of operational risk, including the risk of loss resulting from inadequate or failed internal processes and systems; human factors; or external events. Unlike other type of risks (market risk, credit risk, etc.) operational risk had rarely been considered strategically significant by senior management
  • 11. Market Drivers for Integrated Risk and Cyber Solutions The World Economic Forum (WEF) identifies technological risks, in the form of data fraud and cyber attacks, among the top 10 risks in terms of likelihood, while critical information infrastructure breakdown is among its top ten risks in terms of impact. These identified risks are not mutually exclusive. The primary driver for global enterprises in terms of risk management is to transition from a post- mortem remediation process to a proactive risk mitigation and management state, to reduce or mitigate brand exposure, clean-up costs and business disruption. Enterprises of all sizes realize that cooperation within its key business units is an essential starting point to mitigate cyber attacks or data breaches. These coordinated efforts must be platform driven, to provide a ‘single source of truth’ for preemptive and coordinated responses (in-the-moment) to enterprise-wide risks. Opportunities in Integrated Risk Management
  • 12. • Smart technologies such as RPA (Robotic Process Automation) • Machine learning, big data and analytics and AI is leading to greater efficiency and productivity in the risk function. • Adopting these technologies can lower costs, and provide greater accuracy and control, increased agility, and improved risk analysis and insights. • At this stage, only a minority of respondents say they are highly proficient at incorporating these technologies into the risk management functions, and they are impeded by obstacles such as legacy technologies within the risk function (cited by 69% of respondents) and the increased velocity, variety and volume of data (named by 73%). Ref: Skill Set Challenges in Risk Management- Forbes The Digital Transformation Challenge?
  • 13. Ref: Gartner - Risk Management Programs 1. Risks are derived from business goals and objectives 2. A risk framework guides a common approach across the enterprise 3. Risks are communicated in terms of their impact on the business 4. There is operational support for risk management and accountable ownership of risks 5. There is a business process approach to risk management technology (5) Characteristics of a Foundational Risk Management Program
  • 14. 1. Risk managers must have an appetite for knowledge and should continually ask questions about all aspects of the company. 2. Risk managers should seize every opportunity to learn, but at the same time must be generalists due to the volume of their responsibilities. 3. Meeting and working with employees is an excellent way to learn. Risk managers should be willing to roll up their sleeves and hit the trenches. 4. Risk managers must be willing to learn about the challenges employees encounter to increase their understanding of what really makes a business work. 5. Risk managers benefit from direct experience. This is often more valuable than being taught. 6. A successful risk management career stems from understanding the value of colleagues and learning from their knowledge. Ref: Risk Manager Skill Set Development Developing Risk Management Skills
  • 15. Thank You Jem Pagán, President BluSky Consulting