Remove Outsourcing Remove Security Remove Telecommunications
article thumbnail

Understanding DORA Secondary Providers

Fusion Risk Management

DORA secondary providers come from diverse backgrounds and industries, but they share a common trait: their services are integral to the operation and security of DORA-regulated entities. Who Qualifies as a DORA Secondary Provider? The Importance of DORA Secondary Providers The significance of DORA secondary providers cannot be overstated.

article thumbnail

Operational Risk Management

MHA Consulting

They include: Process and procedural robustness and integrity People, skills and training Insurance and self-insurance The supply chain, outsourcing, and inherited risk Infrastructure, systems and telecommunications Physical and information security Operational risk is recognized as being distinct from market risk and credit or trade risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Operational Risk Management

MHA Consulting

They include: Process and procedural robustness and integrity People, skills and training Insurance and self-insurance The supply chain, outsourcing, and inherited risk Infrastructure, systems and telecommunications Physical and information security Operational risk is recognized as being distinct from market risk and credit or trade risks.

article thumbnail

Risk Management as a Career: A Guide for BCM Professionals

MHA Consulting

They include process and procedural robustness and integrity; people, skills, and training; insurance and self-insurance; the supply chain, outsourcing, and inherent risk; infrastructure, systems, and telecommunications; and physical and information security.

article thumbnail

Capita Hack: A Case Study of What Not To Do …

Plan B Consulting

About Capita Capita is a large outsourcing company based in the United Kingdom. The company specialises in providing business process outsourcing, professional support services, and technology-enabled solutions, to both public and private sector organisations. It might also deter organisations from using their cyber services.

article thumbnail

33 Data Privacy Week Comments from Industry Experts in 2023

Solutions Review

As part of Data Privacy Week (January 22-28) we called for the industry’s best and brightest to share their Identity Management , Endpoint Security , and Information Security comments. On top of that, these suppliers themselves outsource their material to second-tier suppliers.

Backup 116