More Risk Management Articles

Technology

The Cyberthreat Within: As companies wake up to insider threats, C-suite executives are looking beyond IT for help

Two of the most insidious myths about cybersecurity are that most threats originate outside an organization – Russian hackers, for example – and that it is an IT problem. Amie Taal, a cybersecurity expert with Deutsche Bank, Jenny Le, who runs operations for e-discovery provider FRONTEO...

Read More

Cybersecurity

After the Data Deluge: “Keep it all, keep it forever” won’t do any longer. As paradigms shift, information governance, including defensible data remediation, takes center stage

Most experts agree that a sound information governance and data remediation program is vital to driving an organization’s business and reducing its risk profile. But how and why and when and with whom are all questions under active consideration. In this interview, Therese Craparo of Reed...

Read More

Investigations

Paths to Fraud: KPMG report shows more technology, more women, more collusion – and more havoc

KPMG International’s “Global Profiles of the Fraudster,” based on input from forensic professionals worldwide on 750 fraud investigations in 81 countries, is a fascinating – and chilling – read. Now in its third edition, it includes many eye-opening findings, including...

Read More