SlideShare a Scribd company logo
1 of 11
Part -1
Chapter 35: ERM at Malaysia’s Media Company Astro: Quickly
Implementing ERM and Using It to Assess the Risk-Adjusted
Performance of a Portfolio of Acquired Foreign Companies.
1. Identify some reasons why risk management practices might
not take off and/or be embedded effectively in an investee
company.
2. Who should participate in the ERM process to ensure
successful implementation of this ongoing program?
3. What should the CEO’s role be for the successful
implementation and ongoing performance of an ERM process?
250 to 300 words
Part -2 Comments:- for 2 discussion below
RE: Chapter 35: ERM at Malaysia’s Media Company Astro
COLLAPSE
Top of Form
1. Identify some reasons why risk management practices might
not take off and/or be embedded effectively in an investee
company.
Organizations implements and embedded ERM at their firms
based on many factors such as risk analysis, goals and previous
issues faced. Many firms invest in other companies (investee
companies) to gain profits or advantages. When investing
companies implements or embedded same ERM in investee
companies it might not work because the investee company
requirements might be different even it might be from different
sector. The ERM implemented at investee companies also
depends on investee company previous history, decisions made,
investee company reputation in the market, risks which are not
fully identified by investing company or no full cooperation
from investee company people. Many incidents shows full its is
highly impossible to conduct full risk review on investee
company before acquisition which means the investing company
don’t know full risks involved with investee company and ERM
implemented without full risk analysis will lead to disasters.
2. Who should participate in the ERM process to ensure
successful implementation of this ongoing program?
The most important people while implementing ERM at ASTRO
are CEO, CFO, board of directors and its audit committee.
3. What should the CEO’s role be for the successful
implementation and ongoing performance of an ERM process?
At ASTRO the CEO and CFO are accountable to board of
directors for implementing strategies, procedures and policies
for designing effective ERM program.
The CEO should participate in meetings with vice president of
enterprise risk management (VPERM) explain current situations
and risks levels for monitoring risks management at high level
(Fraser, J. R. S., Narvaez, K., & Simkins, B. J., 2015).
Thank you
References
Fraser, J. R. S., Narvaez, K., & Simkins, B. J. (2015).
Implementing enterprise risk management: Case studies and
best practices. Hoboken, N.J: Wiley.
Bottom of Form
RE: Chapter 35: ERM at Malaysia’s Media Company Astro
COLLAPSE
Top of Form
1. Identify some reasons why risk management practices might
not take off and/or be embedded effectively in an investee
company.
Following are some the reason that can be considered.
· Risk management methodology approach and objectives
should be aligned with the parent organization.
· Hiring an effective Risk manager and identifying workstream
managers on their pain points and within a short time is
challenging
· Systems need to be in place to effectively manage and monitor
the risks and not identifying the key business decisions that may
involve risk will not be effective.
2. Who should participate in the ERM process to ensure
successful implementation of this ongoing program?
For successful implementation of the ERM process, involvement
of various stakeholders is necessary. This includes CEO, Board
of directors, IT team, Risk management team, Internal Audit,
Legal and compliance teams.
3. What should the CEO’s role be for the successful
implementation and ongoing performance of an ERM process?
CEO should be able to respond to each and every query made by
people who involved in ERM process, making sure everything is
communicated to all stakeholders without any transparency and
conduct training to internal employees about risk management
and strategic planning.
References
Fraser, J. R. S., Narvaez, K., & Simkins, B. J.
(2015). Implementing enterprise risk management: Case studies
and best practices. Hoboken, N.J: Wiley.
Bottom of Form
50 to 75 words for each comment.
PART -3
1) Tell me your final thoughts about the course and how it
helped.
Course: Emerging Threats & Countermeasures
250 words
Running Head: FIREWALL 1
FIREWALL 3
Firewall
Student’s Name
Professor’s Name
Date
In no less than 250 words, explain your topic for the project.
Explain how it is relevant to network security. Be as clear as
you can in explaining your topic by using examples, software,
hardware, etc
Network firewalls are considered as a security device which is
used to mitigate any form of unauthorized access to a private
network which has been connected to the internet more so via
an intranet. The only traffic which is allowed on this network is
the one which has been defined by the firewall policies, and any
other form of traffic which tries to pass via this network is
blocked (Syngress, 2003). Network firewalls are observed to be
in the frontline of a particular system where it acts as a
communication channel between the internal and external
devices.
It is possible to configure a network firewall so that it will be in
a position to control any form of data which is either entering or
exiting a particular network. It automatically rejects those form
of messages or traffic which does not meet the defined security
criteria (Syngress, 2002). One thing to note is that when a
firewall has been appropriately configured, the firewall will
allow a user to gain access to any resources while at the same
time keeping off unwanted users, worms and virus or any other
malicious program which might be trying to find its way into
the protected network.
Software vs. Hardware Firewalls
· Hardware firewalls: A standalone product usually releases
these form of firewalls, and they are often in-built components
or any other type of networking device. They are generally
considered as an essential aspect when it comes to the
traditional security system and network configuration
(Syngress, 2003).
· Software firewalls: These are programs which are installed
within a computer, or they are provided by Operating System of
the network device manufacturer. One thing to note about this
form of firewalls is that they can be customized depending on
the user (Syngress, 2002).
References
Syngress. (2002). Cisco Security Specialists Guide to PIX
Firewall. Elsevier.
Syngress. (2003). CheckPoint NG VPN 1/Firewall 1: Advanced
Configuration and Troubleshooting. Amsterdam, Netherlands:
Elsevier.
ITS 835
Chapters 35
Other Case Studies on ERM and Risk
ERM at Malaysia’s Media Company Astro
Enterprise Risk Management
Professor Miguel Buleje
Overview
• ERM at Malaysia's Media Company Astro: Quickly
Implementing ERM and Using It to Assess the Risk-
Adjusted Performance of a Portfolio of Acquired Foreign
Companies
• Intro
• Background
• ERM at ASTRO
• Evolution of ERM at AOL
• Role of ERM in the Acquisition Process
• Risk Profile: Risk Map & Action Plans
• Investment Performance Dashboard
Introduction
• Case focus on the implementation of ERM to screen
acquisition
investments
• Astro Overseas Limited (AOL) is introduced, as the entity
responsible for all international investments for Astro
• Describes how ERM is implemented in this set up by M&As
by Astro
• Explains how AOL is able to rationalize financial information
and the
risk profile presented in a dashboard to help the board make
better
decision around risk and the overall ROI
Background
• The Astro Group
• Established in 1996
• Leading integrated consumer media and entertainment group.
• Operations in 4 key groups: pay TV, radio, publications and
digital
media.
• Corporate Governance in Malaysia
• Introduced first Corporate Governance code in 2000, and it
was revised
in 2007.
• In 2011 its Security Commission established a Blueprint to
corporate
governance.
• Finally, in 2012 delivered and new Comply and Explain code.
Background
• Corporate Governance in Malaysia (Cont.)
• Provided a sound framework to manage risks as follows
• Sound framework of managed risks
• Understand principal risks of all aspects of the business
• Recognize business decisions involved taking of appropriate
risks
• Achieve balance between risks incurred and potential returns
to
shareholders
• Ensure systems that effectively monitor and manage risks
• Company risk tolerance and tie to key business risks to
safeguard
shareholders
• Annual report disclosure of main risk management framework
and internal control
ERM at Astro
• ERM framework within Astro
• Overseas Limited (AOL) responsible for all international
investments
• Adopted recommendations by the Malaysian Code on
Corporate
Governance 2012
• Board implemented a Group Risk Management (GRM)
framework as a
integral part for biz operations and projects.
• GRM framework consistent w/ Committee of Sponsoring
Organizations
(COSO) enterprise risk management framework.
• Finally, Astro adopted ISO 31000 International Standard for
risk
management and the COSO process.
Evolution of ERM at AOL
• Migration of the ERM from:
• Reactive: Disaster Recovery (What is something
happens?)
• Proactive: Business Continuity (When our biz is
disrupted?) , to
• Adaptive: Enterprise Risk Management (How can we
act for competitive gain?)
Role of ERM in the Acquisition Process
• ERM directly integrated into company acquisition processes
• Pre-acquisition – Gain preliminary acquisition process
• Monitor and Review phase – expands pre-acquisition
and coordination of strategic objectives
• Post acquisition – execution of ERM into new company
and set up of exit/divestment strategy
Risk Profile: Risk Map & Action Plans
• Risk Map Characterized
• Inherent / gross risk
• Residual risk
• Target risk
• Detailed of Risk Profile – Exhibit 35.11
• Risk identified: explanation/ consequences / owner
• Causes
• Controls
• Action Plan
• Detailed Action Plan – Exhibit 35.12
Investment Performance Dashboard
• Investment Performance Dashboard
• Investment Risk Analysis (Qualitative Assessment)
• Financial Risk Analysis (Quantitative Assessment)
• Total Investment Performance Score
• Help Board Make Investment Decision
• Investment Performance Dashboard Comparison: Exhibit
35.15
• Investment Performance Dashboard – Quarterly Movements:
Exhibit 35.16
• Assisting the Board in Making Key Decision: Exhibit 35.17

More Related Content

Similar to Part -1 Chapter 35 ERM at Malaysia’s Media Company Astro Qui.docx

Discussion1From time to time most organizations make improvement.docx
Discussion1From time to time most organizations make improvement.docxDiscussion1From time to time most organizations make improvement.docx
Discussion1From time to time most organizations make improvement.docxmadlynplamondon
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentBradley Susser
 
I need response to the discussion post in 200 words.docx
I need response to the discussion post in 200 words.docxI need response to the discussion post in 200 words.docx
I need response to the discussion post in 200 words.docxsdfghj21
 
I need response to the discussion post in 200 words.docx
I need response to the discussion post in 200 words.docxI need response to the discussion post in 200 words.docx
I need response to the discussion post in 200 words.docxwrite4
 
Implementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdfImplementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdfRobert Serena, FSA, CFA, CPCU
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
ERM-STANDARD PPT.pptx
ERM-STANDARD PPT.pptxERM-STANDARD PPT.pptx
ERM-STANDARD PPT.pptxChazzyfChazzy
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architectureiasaglobal
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_NewsletterSTRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_NewsletterDion K Hamilton
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Book 2_Bab 11_Information Technology and ERM.pdf
Book 2_Bab 11_Information Technology and ERM.pdfBook 2_Bab 11_Information Technology and ERM.pdf
Book 2_Bab 11_Information Technology and ERM.pdfnoygemma2
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1securityAnne Starr
 
Role of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfRole of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfBob Marcus
 
Centralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and ComplianceCentralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and CompliancePECB
 
Toward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from MicrosoftToward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from MicrosoftDavid J Rosenthal
 

Similar to Part -1 Chapter 35 ERM at Malaysia’s Media Company Astro Qui.docx (20)

Discussion1From time to time most organizations make improvement.docx
Discussion1From time to time most organizations make improvement.docxDiscussion1From time to time most organizations make improvement.docx
Discussion1From time to time most organizations make improvement.docx
 
Control Risks-ERM-whitepaper
Control Risks-ERM-whitepaperControl Risks-ERM-whitepaper
Control Risks-ERM-whitepaper
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
I need response to the discussion post in 200 words.docx
I need response to the discussion post in 200 words.docxI need response to the discussion post in 200 words.docx
I need response to the discussion post in 200 words.docx
 
I need response to the discussion post in 200 words.docx
I need response to the discussion post in 200 words.docxI need response to the discussion post in 200 words.docx
I need response to the discussion post in 200 words.docx
 
Implementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdfImplementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdf
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
ERM-STANDARD PPT.pptx
ERM-STANDARD PPT.pptxERM-STANDARD PPT.pptx
ERM-STANDARD PPT.pptx
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architecture
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_NewsletterSTRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
 
Erm talking points
Erm talking pointsErm talking points
Erm talking points
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Book 2_Bab 11_Information Technology and ERM.pdf
Book 2_Bab 11_Information Technology and ERM.pdfBook 2_Bab 11_Information Technology and ERM.pdf
Book 2_Bab 11_Information Technology and ERM.pdf
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
Role of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfRole of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdf
 
Centralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and ComplianceCentralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and Compliance
 
Toward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from MicrosoftToward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from Microsoft
 

More from karlhennesey

Resources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxResources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxkarlhennesey
 
Resource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxResource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxkarlhennesey
 
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxResource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxkarlhennesey
 
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxResource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxkarlhennesey
 
Resource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxResource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxkarlhennesey
 
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxResources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxkarlhennesey
 
Resources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxResources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxkarlhennesey
 
Resources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxResources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxkarlhennesey
 
Resource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxResource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxkarlhennesey
 
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxResource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxkarlhennesey
 
Resource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxResource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxkarlhennesey
 
Resource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxResource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxkarlhennesey
 
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxResource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxkarlhennesey
 
Resource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxResource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxkarlhennesey
 
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxResource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxkarlhennesey
 
Resource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxResource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxkarlhennesey
 
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxResource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxkarlhennesey
 
Resource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxResource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxkarlhennesey
 
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxResource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxkarlhennesey
 
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxResource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxkarlhennesey
 

More from karlhennesey (20)

Resources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxResources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docx
 
Resource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxResource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docx
 
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxResource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
 
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxResource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
 
Resource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxResource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docx
 
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxResources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
 
Resources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxResources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docx
 
Resources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxResources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docx
 
Resource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxResource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docx
 
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxResource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
 
Resource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxResource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docx
 
Resource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxResource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docx
 
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxResource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
 
Resource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxResource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docx
 
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxResource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
 
Resource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxResource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docx
 
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxResource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
 
Resource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxResource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docx
 
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxResource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
 
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxResource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Part -1 Chapter 35 ERM at Malaysia’s Media Company Astro Qui.docx

  • 1. Part -1 Chapter 35: ERM at Malaysia’s Media Company Astro: Quickly Implementing ERM and Using It to Assess the Risk-Adjusted Performance of a Portfolio of Acquired Foreign Companies. 1. Identify some reasons why risk management practices might not take off and/or be embedded effectively in an investee company. 2. Who should participate in the ERM process to ensure successful implementation of this ongoing program? 3. What should the CEO’s role be for the successful implementation and ongoing performance of an ERM process? 250 to 300 words Part -2 Comments:- for 2 discussion below RE: Chapter 35: ERM at Malaysia’s Media Company Astro COLLAPSE Top of Form 1. Identify some reasons why risk management practices might not take off and/or be embedded effectively in an investee company. Organizations implements and embedded ERM at their firms based on many factors such as risk analysis, goals and previous issues faced. Many firms invest in other companies (investee companies) to gain profits or advantages. When investing companies implements or embedded same ERM in investee companies it might not work because the investee company requirements might be different even it might be from different sector. The ERM implemented at investee companies also depends on investee company previous history, decisions made,
  • 2. investee company reputation in the market, risks which are not fully identified by investing company or no full cooperation from investee company people. Many incidents shows full its is highly impossible to conduct full risk review on investee company before acquisition which means the investing company don’t know full risks involved with investee company and ERM implemented without full risk analysis will lead to disasters. 2. Who should participate in the ERM process to ensure successful implementation of this ongoing program? The most important people while implementing ERM at ASTRO are CEO, CFO, board of directors and its audit committee. 3. What should the CEO’s role be for the successful implementation and ongoing performance of an ERM process? At ASTRO the CEO and CFO are accountable to board of directors for implementing strategies, procedures and policies for designing effective ERM program. The CEO should participate in meetings with vice president of enterprise risk management (VPERM) explain current situations and risks levels for monitoring risks management at high level (Fraser, J. R. S., Narvaez, K., & Simkins, B. J., 2015). Thank you References Fraser, J. R. S., Narvaez, K., & Simkins, B. J. (2015). Implementing enterprise risk management: Case studies and best practices. Hoboken, N.J: Wiley. Bottom of Form RE: Chapter 35: ERM at Malaysia’s Media Company Astro COLLAPSE Top of Form 1. Identify some reasons why risk management practices might not take off and/or be embedded effectively in an investee company. Following are some the reason that can be considered.
  • 3. · Risk management methodology approach and objectives should be aligned with the parent organization. · Hiring an effective Risk manager and identifying workstream managers on their pain points and within a short time is challenging · Systems need to be in place to effectively manage and monitor the risks and not identifying the key business decisions that may involve risk will not be effective. 2. Who should participate in the ERM process to ensure successful implementation of this ongoing program? For successful implementation of the ERM process, involvement of various stakeholders is necessary. This includes CEO, Board of directors, IT team, Risk management team, Internal Audit, Legal and compliance teams. 3. What should the CEO’s role be for the successful implementation and ongoing performance of an ERM process? CEO should be able to respond to each and every query made by people who involved in ERM process, making sure everything is communicated to all stakeholders without any transparency and conduct training to internal employees about risk management and strategic planning. References Fraser, J. R. S., Narvaez, K., & Simkins, B. J. (2015). Implementing enterprise risk management: Case studies and best practices. Hoboken, N.J: Wiley. Bottom of Form 50 to 75 words for each comment. PART -3
  • 4. 1) Tell me your final thoughts about the course and how it helped. Course: Emerging Threats & Countermeasures 250 words Running Head: FIREWALL 1 FIREWALL 3 Firewall Student’s Name Professor’s Name Date In no less than 250 words, explain your topic for the project. Explain how it is relevant to network security. Be as clear as
  • 5. you can in explaining your topic by using examples, software, hardware, etc Network firewalls are considered as a security device which is used to mitigate any form of unauthorized access to a private network which has been connected to the internet more so via an intranet. The only traffic which is allowed on this network is the one which has been defined by the firewall policies, and any other form of traffic which tries to pass via this network is blocked (Syngress, 2003). Network firewalls are observed to be in the frontline of a particular system where it acts as a communication channel between the internal and external devices. It is possible to configure a network firewall so that it will be in a position to control any form of data which is either entering or exiting a particular network. It automatically rejects those form of messages or traffic which does not meet the defined security criteria (Syngress, 2002). One thing to note is that when a firewall has been appropriately configured, the firewall will allow a user to gain access to any resources while at the same time keeping off unwanted users, worms and virus or any other malicious program which might be trying to find its way into the protected network. Software vs. Hardware Firewalls · Hardware firewalls: A standalone product usually releases these form of firewalls, and they are often in-built components or any other type of networking device. They are generally considered as an essential aspect when it comes to the traditional security system and network configuration (Syngress, 2003). · Software firewalls: These are programs which are installed within a computer, or they are provided by Operating System of the network device manufacturer. One thing to note about this form of firewalls is that they can be customized depending on the user (Syngress, 2002).
  • 6. References Syngress. (2002). Cisco Security Specialists Guide to PIX Firewall. Elsevier. Syngress. (2003). CheckPoint NG VPN 1/Firewall 1: Advanced Configuration and Troubleshooting. Amsterdam, Netherlands: Elsevier. ITS 835 Chapters 35 Other Case Studies on ERM and Risk ERM at Malaysia’s Media Company Astro Enterprise Risk Management Professor Miguel Buleje Overview
  • 7. • ERM at Malaysia's Media Company Astro: Quickly Implementing ERM and Using It to Assess the Risk- Adjusted Performance of a Portfolio of Acquired Foreign Companies • Intro • Background • ERM at ASTRO • Evolution of ERM at AOL • Role of ERM in the Acquisition Process • Risk Profile: Risk Map & Action Plans • Investment Performance Dashboard Introduction • Case focus on the implementation of ERM to screen acquisition investments • Astro Overseas Limited (AOL) is introduced, as the entity responsible for all international investments for Astro • Describes how ERM is implemented in this set up by M&As by Astro • Explains how AOL is able to rationalize financial information and the risk profile presented in a dashboard to help the board make better decision around risk and the overall ROI
  • 8. Background • The Astro Group • Established in 1996 • Leading integrated consumer media and entertainment group. • Operations in 4 key groups: pay TV, radio, publications and digital media. • Corporate Governance in Malaysia • Introduced first Corporate Governance code in 2000, and it was revised in 2007. • In 2011 its Security Commission established a Blueprint to corporate governance. • Finally, in 2012 delivered and new Comply and Explain code. Background • Corporate Governance in Malaysia (Cont.) • Provided a sound framework to manage risks as follows • Sound framework of managed risks • Understand principal risks of all aspects of the business • Recognize business decisions involved taking of appropriate risks • Achieve balance between risks incurred and potential returns to shareholders
  • 9. • Ensure systems that effectively monitor and manage risks • Company risk tolerance and tie to key business risks to safeguard shareholders • Annual report disclosure of main risk management framework and internal control ERM at Astro • ERM framework within Astro • Overseas Limited (AOL) responsible for all international investments • Adopted recommendations by the Malaysian Code on Corporate Governance 2012 • Board implemented a Group Risk Management (GRM) framework as a integral part for biz operations and projects. • GRM framework consistent w/ Committee of Sponsoring Organizations (COSO) enterprise risk management framework. • Finally, Astro adopted ISO 31000 International Standard for risk management and the COSO process. Evolution of ERM at AOL
  • 10. • Migration of the ERM from: • Reactive: Disaster Recovery (What is something happens?) • Proactive: Business Continuity (When our biz is disrupted?) , to • Adaptive: Enterprise Risk Management (How can we act for competitive gain?) Role of ERM in the Acquisition Process • ERM directly integrated into company acquisition processes • Pre-acquisition – Gain preliminary acquisition process • Monitor and Review phase – expands pre-acquisition and coordination of strategic objectives • Post acquisition – execution of ERM into new company and set up of exit/divestment strategy Risk Profile: Risk Map & Action Plans • Risk Map Characterized • Inherent / gross risk • Residual risk • Target risk • Detailed of Risk Profile – Exhibit 35.11 • Risk identified: explanation/ consequences / owner
  • 11. • Causes • Controls • Action Plan • Detailed Action Plan – Exhibit 35.12 Investment Performance Dashboard • Investment Performance Dashboard • Investment Risk Analysis (Qualitative Assessment) • Financial Risk Analysis (Quantitative Assessment) • Total Investment Performance Score • Help Board Make Investment Decision • Investment Performance Dashboard Comparison: Exhibit 35.15 • Investment Performance Dashboard – Quarterly Movements: Exhibit 35.16 • Assisting the Board in Making Key Decision: Exhibit 35.17