Remove Evaluation Remove Outsourcing Remove Risk Management
article thumbnail

Four steps to build a more transparent and resilient supply chain through risk management

IBM Business Resiliency

With leaner supply chain management techniques and approaches like outsourcing, offshoring, just-in-time inventory and vendor managed inventory, disruption has worldwide consequences. Teams with mature supply chain risk management strategies adapted to disruption and continued to delight customers.

article thumbnail

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC

LogisManager

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC By Steven Minsky | May 5, 2023 Silicon Valley Bank (SVB) was closed by regulators and reminded us of the recession associated with Lehman Brothers and Washington Mutual Bank in 2008. However, the evidence was inconclusive so their strategy continued unchanged.

Banking 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ongoing Monitoring with a Complaint Focus

Fusion Risk Management

In our previous blog “ The Importance of Ongoing Monitoring ,” we discussed what we often describe as the forgotten pillar of third-party risk management: ongoing monitoring. Tracking and managing complaints can be challenging. For example, let’s evaluate UniRush’s processor conversion. The Forgotten Pillar.

article thumbnail

Fostering Collaboration with Your Third Parties

Fusion Risk Management

In the case of the tanker, it showed perhaps there could have been better planning for alternatives; in the case of COVID, it showed that industries needed to rely on their third parties as they rapidly scrambled to a remote outsourced business model. Where warranted, convene meetings and take minutes to show real involvement and discussion.

article thumbnail

Cybersecurity Audit Checklist

Reciprocity

Your cybersecurity audit should identify existing vulnerabilities and risks, which you can then address with key stakeholders. Part of the audit process should include vulnerability assessments and an evaluation of your organization’s security posture. Evaluate current risk management processes.

Audit 52
article thumbnail

Should You Hire More Business Continuity Staff?

Castellan

Full-time employees are exempt or non-exempt permanent staff retained, managed, and compensated directly by your organization. Risks to Consider: Staff augmentation works best if you have resiliency skills in-house, but need to temporarily scale your team to achieve goals. Outsourcing or Managed Services.

article thumbnail

TSPs: Making the Case to Invest in Risk and Resiliency

Fusion Risk Management

Even if it is difficult to use that regulatory hammer to secure funding for budget to purchase technology, this should not stop a progressive organization from using effective risk management disciplines to run their programs and serve their customers. Or, as so well articulated by the great British writer C.