Crisis Management Consulting, LLC provides internet and social media monitoring, investigations, and threat mitigation services to identify risks and threats to companies, executives, and employees. They monitor for issues like disgruntled former employees damaging a company's brand or threats being made against executive staff. Their services include threat identification, risk management advice, monitoring social media and the internet to find vulnerabilities, and crisis management alert systems. They can provide baseline packages to monitor for personal information disclosure and executive social media audits, as well as translation services. The company understands business threats and can help manage risks through their experience in threat mitigation.
CFO Controller Conference | November 11, 2014CBIZ MHM, LLC
Our upcoming CFO & Controller Conference will feature various speakers and presentations on the topic of enterprise-wide risk management (ERM). Risk is an inevitable part of an operating environment. In today’s world, risk management can’t be seen as a simple matter of insurance protection.
Learning Objective: Learn and explore the benefits and opportunities in cyber security
Technology has changed our lives for the better. Yet due to the labor shortage in the cyber security field, the small number of women in this field translates to big opportunities for growth and advancement. The possibilities are endless. From social networking to homeland security, energy, and banking, the impact of technological advancements is massive, creating the need for cyber security professionals in every industry. Join us in this seminar where a panel of cyber security professionals will discuss the opportunities and advantages for women in this growing area.
At the end of this seminar, participants will learn:
a. About the impact women can have on cyber security in diverse industries.
b. What advantages women who work in cyber security enjoy.
c. What opportunities are available for women transitioning to new careers.
d. How to transition to a career in cyber security.
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
On October 16, Daniel Cherrin spoke at the Wall Street Journal PRO Cybersecurity Small Business Academy at the Monarch Beach Resort in Dana Park, California. You can find an excerpt from his remarks on Incident Response on a Budget at http://www.northcoaststrategies.com/blog/steps-you-can-take-now-to-prepare-for-the-next-data-breach-that-wont-cost-a-lot-of-money.
IOD Convention 2017_Governance, Ethics and Sustainability_Marc RonezMarc Ronez
To ensure organisational sustainability, the Board of Directors should shift focus from shareholder value creation to creating shared value for the relevant stakeholders of the organization. Nurturing a Risk aware culture grounded on sound ethical values is an essential part of the solution.
CFO Controller Conference | November 11, 2014CBIZ MHM, LLC
Our upcoming CFO & Controller Conference will feature various speakers and presentations on the topic of enterprise-wide risk management (ERM). Risk is an inevitable part of an operating environment. In today’s world, risk management can’t be seen as a simple matter of insurance protection.
Learning Objective: Learn and explore the benefits and opportunities in cyber security
Technology has changed our lives for the better. Yet due to the labor shortage in the cyber security field, the small number of women in this field translates to big opportunities for growth and advancement. The possibilities are endless. From social networking to homeland security, energy, and banking, the impact of technological advancements is massive, creating the need for cyber security professionals in every industry. Join us in this seminar where a panel of cyber security professionals will discuss the opportunities and advantages for women in this growing area.
At the end of this seminar, participants will learn:
a. About the impact women can have on cyber security in diverse industries.
b. What advantages women who work in cyber security enjoy.
c. What opportunities are available for women transitioning to new careers.
d. How to transition to a career in cyber security.
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
On October 16, Daniel Cherrin spoke at the Wall Street Journal PRO Cybersecurity Small Business Academy at the Monarch Beach Resort in Dana Park, California. You can find an excerpt from his remarks on Incident Response on a Budget at http://www.northcoaststrategies.com/blog/steps-you-can-take-now-to-prepare-for-the-next-data-breach-that-wont-cost-a-lot-of-money.
IOD Convention 2017_Governance, Ethics and Sustainability_Marc RonezMarc Ronez
To ensure organisational sustainability, the Board of Directors should shift focus from shareholder value creation to creating shared value for the relevant stakeholders of the organization. Nurturing a Risk aware culture grounded on sound ethical values is an essential part of the solution.
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
Significant opportunities remain for organizations to continue to strengthen their approaches to identifying and assessing key risks. This program will provide an overview of Enterprise Risk Management (ERM) best practices and current emerging risks that should be on your radar for 2018.
Watch the complete webinar here: https://aronsonllc.com/c-suites-guide-to-enterprise-risk-management-and-emerging-risks/?sf_data=all&_sft_insight-type=on-demand-webinar
Incident Response with LDM Global_ A Comprehensive Approach to Handling Crisi...LDM Global
In today's fast-paced and interconnected world, businesses and organizations face an ever-increasing number of security threats and risks. These incidents can range from data breaches, cyber-attacks, and natural disasters to operational failures and human errors. To mitigate the impact of such incidents, having an effective incident response plan in place is crucial. In this blog, we will discuss the importance of incident response and how LDM Global, a renowned crisis management firm in the USA, can assist in handling these situations.
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board MembersExpert Webcast
MAJOR TOPICS:
Cyber breach preventative strategies
Cyber written policies and procedures
Response during and after a cyber crisis
GDPR
Third-party vendor issues
Best practices for the middle market
Corporate and board best practices
Cyber Insurance
Transactional effects and deal due diligence
Notable legal precedent
Managing Online Reputation. How to Protect Your Company on Social MediaCharlie Pownall
Managing Online Reputation (Palgrave Macmillan, 2015) is a practical, common-sense guide to protecting and defending your company's name and image online.
Managed IT Services by CRI Advantage is your partner in achieving seamless, reliable, and efficient IT operations. Our expert team takes the burden of managing your IT infrastructure off your shoulders, providing proactive monitoring, maintenance, and rapid support. With our state-of-the-art technology and experienced professionals, your organization can focus on its core objectives while we ensure that your IT environment is secure and optimized. Trust us to be your IT ally, helping you drive productivity, reduce downtime, and navigate the complexities of the digital world.
https://criadvantage.com/service-now/it-service-management/
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docxketurahhazelhurst
CHAPTER 34
Turning Crisis into Opportunity
Building an ERM Program at General Motors
MARC S. ROBINSON
Assistant Director, Enterprise Risk Management, GM
LISA M. SMITH
Assistant Director, Enterprise Risk Management, GM
BRIAN D. THELEN
General Auditor, GM
This case study chronicles the ground-up implementation of enterprise riskmanagement (ERM) at General Motors Company (GM), starting in 2010through the first four years of implementation. Discussion topics include
lessons learned during implementation and some of the unique approaches, tools,
and techniques that GM has employed. Examples of senior management reporting
are also included.
I think risk management is an element of all good executive management teams
and boards. It will ensure viability in downturns and high-risk periods. I think if
that is done not only within the automotive industry, but on a global and specif-
ically on a national scale, economies will be in better shape because it is additive.
If everybody is doing their job in assessing and understanding risk, the ultimate
outcome will be much more positive for our national economy and society, and it
is incumbent that corporate leadership understands that responsibility.
—Daniel F. Akerson, Chairman and Chief Executive Officer,
General Motors, October 2012
BACKGROUND AND IMPLEMENTATION
The enterprise risk management (ERM) program at General Motors was founded
in late 2010 at the direction of GM’s then newly appointed chief executive officer
(CEO), Daniel F. Akerson, who sought to leverage the program as another means to
achieve a competitive advantage in the industry. Having gone through bankruptcy
in 2009 as a new board member, Akerson felt that a more robust risk management
program would help guide the organization around the drivers of killer risks1
going forward. His goal was to help the company ensure that it was prepared,
607
www.it-ebooks.info
608 Implementing Enterprise Risk Management
agile, and fast to respond in an ever-changing world. Perhaps most importantly,
Akerson wanted an ERM program that would focus not only on risks but on oppor-
tunities as well.
A chief risk officer (CRO) was selected and appointed from within, and the
Finance and Risk Policy Committee of the board of directors was chartered to over-
see risk management as well as financial strategies and policies. In support of the
program, a senior manager and director joined the team. Risk officers were also
identified and aligned to all direct reports of the CEO; this helped to ensure that
all aspects of the business were covered. The CEO is the ultimate chief risk officer,
and his direct reports are the ultimate risk owners. Members of the risk officer team
were carefully selected by senior leadership based on their strong business expe-
rience, financial acumen, and most of all their ability to lead in the identification
and discussion of risk in an objective and transparent manner. These representa-
tives were expected to actively p ...
More Related Content
Similar to Internet and Social Media Monitoring and Investigations with Bios
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
Significant opportunities remain for organizations to continue to strengthen their approaches to identifying and assessing key risks. This program will provide an overview of Enterprise Risk Management (ERM) best practices and current emerging risks that should be on your radar for 2018.
Watch the complete webinar here: https://aronsonllc.com/c-suites-guide-to-enterprise-risk-management-and-emerging-risks/?sf_data=all&_sft_insight-type=on-demand-webinar
Incident Response with LDM Global_ A Comprehensive Approach to Handling Crisi...LDM Global
In today's fast-paced and interconnected world, businesses and organizations face an ever-increasing number of security threats and risks. These incidents can range from data breaches, cyber-attacks, and natural disasters to operational failures and human errors. To mitigate the impact of such incidents, having an effective incident response plan in place is crucial. In this blog, we will discuss the importance of incident response and how LDM Global, a renowned crisis management firm in the USA, can assist in handling these situations.
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board MembersExpert Webcast
MAJOR TOPICS:
Cyber breach preventative strategies
Cyber written policies and procedures
Response during and after a cyber crisis
GDPR
Third-party vendor issues
Best practices for the middle market
Corporate and board best practices
Cyber Insurance
Transactional effects and deal due diligence
Notable legal precedent
Managing Online Reputation. How to Protect Your Company on Social MediaCharlie Pownall
Managing Online Reputation (Palgrave Macmillan, 2015) is a practical, common-sense guide to protecting and defending your company's name and image online.
Managed IT Services by CRI Advantage is your partner in achieving seamless, reliable, and efficient IT operations. Our expert team takes the burden of managing your IT infrastructure off your shoulders, providing proactive monitoring, maintenance, and rapid support. With our state-of-the-art technology and experienced professionals, your organization can focus on its core objectives while we ensure that your IT environment is secure and optimized. Trust us to be your IT ally, helping you drive productivity, reduce downtime, and navigate the complexities of the digital world.
https://criadvantage.com/service-now/it-service-management/
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docxketurahhazelhurst
CHAPTER 34
Turning Crisis into Opportunity
Building an ERM Program at General Motors
MARC S. ROBINSON
Assistant Director, Enterprise Risk Management, GM
LISA M. SMITH
Assistant Director, Enterprise Risk Management, GM
BRIAN D. THELEN
General Auditor, GM
This case study chronicles the ground-up implementation of enterprise riskmanagement (ERM) at General Motors Company (GM), starting in 2010through the first four years of implementation. Discussion topics include
lessons learned during implementation and some of the unique approaches, tools,
and techniques that GM has employed. Examples of senior management reporting
are also included.
I think risk management is an element of all good executive management teams
and boards. It will ensure viability in downturns and high-risk periods. I think if
that is done not only within the automotive industry, but on a global and specif-
ically on a national scale, economies will be in better shape because it is additive.
If everybody is doing their job in assessing and understanding risk, the ultimate
outcome will be much more positive for our national economy and society, and it
is incumbent that corporate leadership understands that responsibility.
—Daniel F. Akerson, Chairman and Chief Executive Officer,
General Motors, October 2012
BACKGROUND AND IMPLEMENTATION
The enterprise risk management (ERM) program at General Motors was founded
in late 2010 at the direction of GM’s then newly appointed chief executive officer
(CEO), Daniel F. Akerson, who sought to leverage the program as another means to
achieve a competitive advantage in the industry. Having gone through bankruptcy
in 2009 as a new board member, Akerson felt that a more robust risk management
program would help guide the organization around the drivers of killer risks1
going forward. His goal was to help the company ensure that it was prepared,
607
www.it-ebooks.info
608 Implementing Enterprise Risk Management
agile, and fast to respond in an ever-changing world. Perhaps most importantly,
Akerson wanted an ERM program that would focus not only on risks but on oppor-
tunities as well.
A chief risk officer (CRO) was selected and appointed from within, and the
Finance and Risk Policy Committee of the board of directors was chartered to over-
see risk management as well as financial strategies and policies. In support of the
program, a senior manager and director joined the team. Risk officers were also
identified and aligned to all direct reports of the CEO; this helped to ensure that
all aspects of the business were covered. The CEO is the ultimate chief risk officer,
and his direct reports are the ultimate risk owners. Members of the risk officer team
were carefully selected by senior leadership based on their strong business expe-
rience, financial acumen, and most of all their ability to lead in the identification
and discussion of risk in an objective and transparent manner. These representa-
tives were expected to actively p ...
Similar to Internet and Social Media Monitoring and Investigations with Bios (20)
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
Internet and Social Media Monitoring and Investigations with Bios
1. Crisis Management Consulting, LLC
313.671.6123
Internet and Social Media Monitoring, Investigations & Threat Mitigation
Who’s monitoring your brand? When and how do you learn when a former or disgruntled employee is
tarnishing your brand or threatening your company’s employees? Many times a company’s social media
and internet monitoring is the responsibility of its marketing department, with understandably, little or
no experience identifying threats to company executive staff and employees or risks to the enterprise.
Crisis Management Consulting, LLC (CMC) takes a unique approach with experience in Executive
Protection, Threat Identification and Operational Risk.
With over 15 years providing intelligence to leading executive personnel CMC specializes in:
Threat identification
Provision of advice which enables threat mitigation
Enterprise wide holistic Risk Management
Identification of vulnerabilities using social media and internet
Crisis Management & Early Warning alert mechanisms
Collection of open source intelligence using government recognized methodology
Consulting with leading companies developing security operation center’s intelligence
capabilities
Athletes, Celebrities & High Net Worth Individuals (HNWI) privacy measures
Counter-Measures providing security to HNWI to mitigate risks
As a Director of Security the last thing you want to have is your company’s operations disrupted by a
protest or demonstration you had no knowledge of in advance. CMC provides threat awareness and early
warning products when pre-established event or risk thresholds are exceeded.
Advance vulnerability surveys complement your existing Executive Threat Assessments
The use of social media is an adversary’s way to build momentum around grievances, be they legitimate
or otherwise. CMC does advance adversarial identification prior to company events such as shareholder
meetings, executive travel, site selection, product, new market entry, and other important revenue
generating or governance activities. Alerts and risk reports are then generated so your crisis management
team can lead an inter-agencies response to disrupt planned protests and other threats to the enterprise.
If your company has been, or is likely to be targeted by activists – or if employees, competitors or other
groups have been attempting to tarnish your image and reputation there are a wide range of options
available to you including;
Baseline packages include vulnerability identification to identify personal information disclosure
Monitoring package to include early warning notification
Pre-employment social media investigation
Executive and family member internet exposure and social media auditing
Language Translation Search Services
Contact Crisis Management Consulting to discuss your existing exposures and learn how we can mitigate
risks to your executives and enterprise.
2. Crisis Management Consulting, LLC
313.671.6123
About Crisis Management Consulting
Our team understands your business and the threats it faces in a dynamic and unsteady world. With
decades of experience in public and private sector threat mitigation, Crisis Management Consulting can
help you manage those risks.
Andrew Dailey, CPP
Andrew Dailey CPP, is the President of Crisis Management Consulting, LLC. He specializes in
Security & Risk Mitigation Services delivering Executive Protection, Business Continuity, Crisis
Management, Travel Risk and Supply Chain Management solutions to the security industry
and Fortune 1000 companies. Dailey was the lead security consultant on Rock Ventures
Security Operations Center including the physical design, hiring and development of team
members to service Quicken Loans and Rock Ventures Family of Companies. Additionally, he
provides risk assessment services and intelligence based products to Rock Ventures. He was
formerly with Electronic Data Systems in the roles of Regional Operational Risk Manager -
Americas and Regional Security Manager. Prior to joining EDS, Dailey was the Manager of
Security Information at General Motors Crisis Center. While managing GM’s Crisis Center, Dailey was responsible for
traveler security, crisis management and the identification of threats and risk-based events against GM's global
operations and supply chain. Dailey developed numerous intelligence briefs for GM’s executive staff, including the
Global Information Snapshot distributed by the DHS and FBI under the United States Public Private Partnership
Program. He also served as an Advisor to the GM Global Crisis Management team. He is a Certified Protection
Professional by the American Society for Industrial Security, with more than 25 years in the Security Industry. Dailey
has written several articles related to terrorism analysis, including Terrorism Foreseeability: No longer a crystal ball
and Foreign Fighter Networks: Implication for Multinational Corporations published by the United Kingdom’s
Continuity Central. In addition, Dailey has written on risk mitigation tools in Geographic Information Systems as a
Supply Chain Risk Management Tool as published Directions Magazine & Supply & Demand Chain Executive.
Chris Rawley, Counter-terrorism Expert
Chris Rawley is CMC’s lead terrorism subject matter expert and has over twenty years of
military and corporate security experience. As a Captain in the U.S. Navy, he deployed to Iraq,
Afghanistan, Africa, and the Persian Gulf for force protection and counter-terrorism
operations. During the onset of Operation Iraqi Freedom, he led riverine and port security
patrols in Southern Iraq protecting mine sweeping forces and humanitarian shipping. Later,
served tours with the nation’s elite Joint Special Operations Command (JSOC) and as a planner
at Special Operations Command’s (SOCOM) Interagency Task Force. While at SOCOM he
worked closely with the Federal Bureau of Investigation, Joint Terrorism Task Forces, and
numerous other national, state, and local agencies to pursue high value terrorist targets. Most
recently deployed as the Deputy Commander for Special Operations Command Forward-East Africa, where he led
Navy and Army special operations forces in combating Islamic terrorism in the Horn of Africa. There his team
pioneered the military’s use of social media threat monitoring.
Mr. Rawley has also held a number of civilian management roles including the Director of Global Security Operations
for a Fortune 100 corporation. He has experience across a range of industries, including air transportation,
information technology, and commercial real estate. He has an MBA from George Washington University, and is a
graduate of Texas A&M University and the Naval War College. Mr. Rawley is the author of Unconventional Warfare
2.0 and numerous articles on terrorism online and in professional military journals.