While homes, vehicles, and other personal assets can be insured, the sensitive data collected by insurance companies cannot. Indeed, insurers collect many different types of personal data when determining how much a customer should pay in premiums. From social security numbers to … [Read more...]
Risk Tolerance versus Risk Appetite
Even though risk tolerance and risk appetite are used interchangeably in most cases, they are different from one another by a certain degree. With many standards and regulations focusing on the process of risk management, only a few of them define clearly the distinctions between … [Read more...]
Enterprise Risk Management for Credit Unions
Enterprise Risk Management Critical to Ensuring the Success of Credit Unions and Other Businesses All businesses, including credit unions, face risks to achieving their overall objectives. Few spend enough time identifying these risks and developing plans to preempt or … [Read more...]
3rd Party Vendor Audit Program Management
Business operators increasingly need to partner with service providers to enhance their overall strategic operations. Regardless of whether you are a retailer in need of a vendor or a healthcare provider in search of electronic health records 3rd party vendor, you will need to … [Read more...]
How Vendor Risk Management Can Impact Your GDPR Compliance
Irrespective of a company’s size, risk exposure is downright indiscriminate. With the General Data Protection Regulation (GDPR) now in full effect, companies or organizations ought to engage themselves in operations that show compliance. Such activities include the implementation … [Read more...]
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- Next Page »