Introduction Following a few recent accidents with aeromedical helicopters, I thought it is time to take a look at what makes a good landing site for a helicopter. I am going to focus on helicopters being used for aeromedical evacuation (in Europe called “Helicopter Emergency Medical Service – HEMS”) as that is the most likely […] The post 2D or not 2D – How much room do I need to land a helicopter? first appeared on Rotary Wing Geek.| Rotary Wing Geek
While most internal audit engagements are performed by the CAE’s staff, the CAE himself (I’ll go with ‘he’ to make this post easier to write) should be addressing many if not most of the top enterprise risks. In fact, much of the valuable assurance, advice, and insight provided by the internal audit function is by […]| Norman Marks on Governance, Risk Management, and Internal Audit
I am a huge believer in risk-based auditing and have been practicing it ever since I became an internal auditor many years ago. Some refer to risk-based auditing with an acronym of RBIA (making it …| Norman Marks on Governance, Risk Management, and Internal Audit
A study explored if stopping antidepressants during pregnancy affects the risk of PPHN, hospitalization, and congenital heart defects.| Pulmonary Hypertension News
The post The Right Mortgage hires Pearson as head of risk appeared first on Mortgage Solutions.| Mortgage Solutions
Jaguar Land Rover is restarting production at its U.K. factories after a cyberattack forced weeks of shutdowns across its global network. The recovery comes as the automaker races to support suppliers, repair digital systems, and restore momentum in the face of tariffs and transformation pressures. Critical Production Lines Come Back Online Engine and battery assembly […] The post JLR Resumes U.K. Production After Cyberattack Shutdown appeared first on Curated supply chain news and Insights...| Curated supply chain news and Insights | Supplychain360
How Thor Heyerdahl’s daring Kon-Tiki voyage reveals timeless lessons about risk, courage and conviction in public speaking.| Manner of speaking
Value and Momentum are among the most extensively documented and empirically validated factor strategies in the asset pricing literature. As demonstrated in the seminal work by Asness, Moskowitz, and Pedersen (2013) titled “Value and Momentum Everywhere”, these two factors have delivered robust performance across asset classes and geographies.| FactSet Insight
Crime scene investigators (CSIs) solve mysteries under pressure that would make most project managers sweat, yet their methods hold secrets that can transform how we lead projects. Their world of high-stakes evidence collection and unpredictable risks, all while suspects are on the run, provides a myriad of tips to project managers. By borrowing CSI techniques,... [Read More]| ProjectEngineer
Let me set the context for this post about the project charter: By now, the team knows what it has to accomplish because they have a product vision. The next question is: How will the team manage their risks to achieve those outcomes? That's where I recommend a team define its project driver, up to […] The post Project Charter Part 2: Clarify the Project Driver, Boundaries, and Constraints for This Project appeared first on Johanna Rothman.| Johanna Rothman
AI is helping people across the extended enterprise in many ways. It is bringing efficiency, improved insights, and the ability to enhance products and customer services. Every day I am hearing about new uses. But I still worry that it can bring serious harm if we are not careful. Practitioners need to know how it […]| Norman Marks on Governance, Risk Management, and Internal Audit
What makes an ideal risk officer? Here are my thoughts on the most significant attributes. I welcome your thoughts. Has a deep understanding of the business, including its: Business processes Produ…| Norman Marks on Governance, Risk Management, and Internal Audit
This session will guide participants through practical approaches to identifying, assessing, and reporting physical climate risks in alignment with leading frameworks and best practices. It will explore how risk assessments can inform decision-making, strengthen portfolio resilience, and lay the foundation for effective climate adaptation strategies.| United Nations Environment – Finance Initiative
SAS Innovate on Tour México fue simplemente extraordinario.| SAS Latin America
Creative writing pedagogy can enrich vocational teaching by emphasizing process over product, embracing failure, and prioritizing revision. This approach fosters courage, openness, and trust in students while encouraging them to take risks and learn from their mistakes. Ultimately, self-trust and experimentation lead to personal and professional growth.| vocation matters
Some project managers are in charge of projects where lives are at stake, and a single misstep could cost lives, not just dollars, or headaches. Military leaders, however, face this reality daily on the most basic level. Commanding campaigns with stakes far higher than missed deadlines or budget overruns, their battle-tested project management techniques—honed under... [Read More]| ProjectEngineer
Not a weighty meandering 300 page Zen dialogue on Motorcycle Maintenance. Merely a meandering blog post in which one contemplates /Quality/ of software products.| Hi, I'm Aditya Athalye. I make, learn, teach here.
We often see debates about whether or not volatility of returns is a good measure of risk. This debate is related to what I think is a bigger issue: the difference between perceived risk and actual risk. Perceived risk is influenced by observations and “dollar bias,” but actual risk comes from the full range of what might happen and its influence on buying power.| Michael James on Money
I admit it. This post is inspired by a post with a similar name by my good friend and occasional debate partner, Richard Chambers: 10 Red Flags Your Internal Audit Function May Be Losing Ground. Have a look if you haven’t already read it. He makes some very good points. Here are his ten red […]| Norman Marks on Governance, Risk Management, and Internal Audit
Before I explain the mantra in the title of this blog post, I want to review some basics. 1. Boards and the CEO measure success based on the achievement of objectives. Some say those objectives are…| Norman Marks on Governance, Risk Management, and Internal Audit
This webinar explores how firms can leverage sustainability disclosures and climate stress-testing methodologies to identify vulnerabilities, meet evolving regulatory expectations, and build resilience in their portfolios.| United Nations Environment – Finance Initiative
Apparently what Mike Tyson actually said in a 1987 interview was, "Everybody has plans until they get hit for the first time". In any case this is still a variant of the common theme of “No plan survives first contact with the enemy”, ascribed variously to von Moltke or von Clausewitz. What bugs me about the Tyson quote, is less about the quote which is undeniably correct in the spirit of the idea it’s meant to convey. But, rather there’s a tendency for people to misuse the quote as ...| Risk and Cyber
Shadow AI includes AI products and platforms used within your organization without department knowledge, posing risks.| Help Net Security
As the AI threat landscape evolves daily, certain LLM vulnerabilities pose significant risks to enterprise operations.| Help Net Security
[SAS 실시간 제재 스크리닝 도입사례 - Orange Bank] - Orange Bank, SAS의 고급 분석 및 실시간 제재 스크리닝 솔루션 도입 후 리스크 대응 민첩성 및 효율성 향상 - 오탐률 감소, 성능 개선, 운영 효율성 강화 디지털 금융의 선두주자 Orange Bank는 금융 범죄 및 테러 자금 조달(CFT)에 대한 대응 역량을 강화하고, 규제 변화에 민첩하게 대응하기 위해 SAS의 클라우드 기반 실시간 제재 스크...| SAS Korea Blog
ACEP Now offers real-time clinical news, news from the American College of Emergency Physicians, and news on practice trends and health care reform for the emergency medicine physician. ACEP Now is an official publication of the American College of Emergency Physicians.| ACEP Now
The endlessly complex and ever-changing impact of sanctions means that while enhanced due diligence may be a standard practice for| Corporate Compliance Insights
News of a string of talks and workshops in Perth, Melbourne, Adelaide, Canberra, Sydney and Brisbane in October 2023. Continue reading →| Rethinking Childhood
I would say that most IT auditors and CAEs are familiar with pre-implementation reviews. These are audit engagements designed to proactively work with management when there are system implementations. They provide assurance, advice, and insight on the effectiveness of the internal controls and security that will exist when the system is live. Pre-implementation reviews are […]| Norman Marks on Governance, Risk Management, and Internal Audit
My thanks and congratulations to Alexander Ruehle for his post this week on LinkedIn: Internal audit has just been audited by internal auditors. Why do I ask whether the profession and the IIA are at a crisis point? Consider that according to the IIA’s own Vision 2035 (and his post): 48% still view Internal Auditors […]| Norman Marks on Governance, Risk Management, and Internal Audit
Companies across the world are changing. Some are changing in response to changes in the economy, while others are changing in response to changes in technology. The point is that they are changing. That is not a surprise as we are hearing about layoffs and changes in direction all the time. For example: SAN FRANCISCO, […]| Norman Marks on Governance, Risk Management, and Internal Audit
I am going to look into my AI-enabled crystal ball and imagine the world of the future (the not-too-distant future) decision-maker. Then I will look again to see what the risk practitioner and the …| Norman Marks on Governance, Risk Management, and Internal Audit
Introduction I want to discuss how fragile optimization solutions to real world problems can be. And how to solve that. Small changes in modeling strategy, assumptions, data, estimates, constraints, or objective can lead to unstable and degenerate solutions. To warm up let’s discuss one of the most famous optimization examples: […]| Win Vector LLC
Utilizing ERM to manage disruption, empower decisions and optimize performance.| Directors & Boards
The rise of AI complicates the CISO role as industries begin to realize the full potential of GenAI and its impact on cybersecurity.| Help Net Security
I recently discovered how some people are projecting that AI will transform the work of corporate counsel. Yes, there are several on how it will transform the work of the law firms, but I am concer…| Norman Marks on Governance, Risk Management, and Internal Audit
Our family just returned from a 4,500 mile roadtrip to the American West and back. We visited four national parks, one national memorial, and one state park. So much beauty. So much fun. Along the …| Daniel Seabaugh
OBS Global Achieves Global PCI Forensic Investigator (PFI) Certification; Launches First Responder Retainer Service| Online Business Systems
Maintaining security posture demands AI, zero trust, automation, and collaboration to counter threats in hybrid, IoT, and cloud environments.| Help Net Security
What wins in the competition between urgency and caution as enterprises consider when and where to deploy AI? No single| Corporate Compliance Insights
Politicians in the US (at least on one side of the aisle) love to talk about “waste, fraud, and abuse”. How big is it? Google AI tells us: Estimates of the financial impact of waste, fraud, and abu…| Norman Marks on Governance, Risk Management, and Internal Audit
By Susanne C. Moser. When training transdisciplinarians, which leadership skills and practices is it helpful to encourage? The kind of leadership that someone brings to a transdisciplinary project…| Integration and Implementation Insights
Take a risk the next time you speak in public. It will be scary and you will be nervous. But it is the only way to grow as a speaker.| Manner of speaking
Risk matrices have become ubiquitous in the business world. Risk matrices are a go-to approach for evaluating and prioritizing risks from...| JulianTalbot.com
Governance, risk, and compliance (GRC) is a broad term that refers to the processes and systems an organization puts in place to ensure...| JulianTalbot.com
This mini-course provides an in-depth understanding of risk management frameworks and their importance in organizations. You will learn...| JulianTalbot.com
One of the more common patterns of security program success vs. failure is how much leadership is prepared to stick with the work over...| Risk and Cyber
I thought I’d try something different and share some thoughts on the Cyentia Institute’s latest report, the Information Risk Insights Study. It’s increasingly clear in cyber that we need to ask better questions rather than simply keep leaping to what we think the answers might be. This study delivers on that:”Are cyber events occurring at greater frequency? Is an organization more likely to have a breach now than 15 years ago? Which types of incidents have become more common over time...| Risk and Cyber
AI safety discussions predominantly focus on easy to conceptualise, highly salient risks including algorithm bias, hallucinations and disinformation. While these are crucial concerns, they overlook a fundamental truth we've learned from other high-stakes fields like aviation and healthcare: sometimes the most dangerous risks can hide in plain sight. Dr Moira Nicolson and Holly Marquez (Government Communications, Cabinet Office, UK Government) introduce a framework for anticipating and managin...| Behavioural Public Policy Blog
Cultural property encompasses both tangible artifacts and intangible heritage that shapes societies. Historian Matthias Rogg and international law expert Lando Kirchmair delve into the critical issue of protecting cultural property during armed conflicts. They discuss the multifaceted threats to cultural property, including destruction, seizure, misuse, and humiliation. Their conversation emphasizes the vital role of international law in safeguarding cultural treasures. They also highlight ho...| A Better Peace: The War Room Podcast
What IT & OT leaders must know about the NCIIPC Conformity Assessment Framework to safeguard India’s Critical Infrastructure. Prepare for CAF in 2025.| Payatu
There is a plethora of sample job descriptions for security leaders that are often strictly correct but can also be uninspiring or too detailed to capture the actual essence of the role. I developed this role description a while ago to try and address that. It's mainly designed for growing companies rather than more established organizations but the more I look at it the more I think it's applicable to all. It's not meant to be a long list of attributes or specific tasks but, rather, somethi...| Risk and Cyber
Leaders weigh in on a range of options for reliably incentivising the best behaviours that lead to a financially healthy, profitable, sustainable legal business The post Financial process improvement: solutions-focused or a people problem? appeared first on Briefing.| Briefing
Originally posted on March 8, 2015 @ 10:11 PMThere is no way I would do that! The impact of social arrangements on our decisions and judgments I had the privilege last week of meeting a new group of people as they commenced their adventure into the world of better understanding people and how we make […]| SafetyRisk.net
A Briefing roundtable of risk leaders discussed how strategic risk management that will inspire trust and appreciation cannot be a dry or static enterprise| Briefing
For many years I’ve observed the same pattern of failure in projects, programs, issue mitigation and indeed anything that requires more...| Risk and Cyber
I have a regular set of go to books both for myself and what I recommend to others at all stages in their career. Here they all are with what I think, at least for me, is the key take away. Of course, there are not many classic security books here. Most of the challenges of a security leader’s role is, well, leadership along with a healthy dose of program management, culture development, technical attention to detail, risk management and more. In fact, the accumulation of security knowledge...| Risk and Cyber
This blog post has moved to my website. You can find it here.| Dr Rachel Reed
Ch-ch-ch-ch-changes Turn and face the strange Ch-ch-changes Don’t want to be a richer man Ch-ch-ch-ch-changes Turn and face the strange Ch-ch-changes There’s gonna have to be a different man Time may change me But I can’t trace time — Changes, by David Bowie By Noah Solomon Special to Financial Independence Hub There is a basic […]| Financial Independence Hub
COVID19 presented an unprecedented challenge for modern science/medicine. Faced with a novel infectious disease, doctors, scientists, and health officials rose to the challenge in remarkable speed.…| The Logic of Science
Should I use the Smith Manoeuvre to expedite my financial independence retire early journey? I asked Robinson Smith many questions on the Smith Manoeuvre.| Tawcan
Operational resilience is a concept that has gained even further traction. It first came to prominence from financial regulators, in particular the Bank of England and then others. “Operational Resilience is the ability of firms and the financial system as a whole to absorb and adapt to shocks, rather than contribute to them”. This concept, very much applicable to all sectors, met with some eye-rolling with some people saying: “we already do this – it’s called business continuity...| Risk and Cyber
Richard Chambers and I go back many decades, first as colleagues and then as friends, and we have great mutual respect. While we often appear to disagree, that is more often than not in our choice …| Norman Marks on Governance, Risk Management, and Internal Audit
Risk is defined as: An uncertain event or condition that if it occurs, has a positive or negative effect on a Project's Objectives (PMBOK). The effect of uncertainty on objectives (ISO 31000). The possibility that something bad or unpleasant will happen (Miriam-Webster) Risk planning is the process of identifying, prioritizing, and managing risk. Every project... [Read More]| ProjectEngineer
A recent article by Carol Williams of Strategic Decision Solutions carried this title and had some wisdom to share. For example, she said: Enterprise risk assessment can be defined as: “the practic…| Norman Marks on Governance, Risk Management, and Internal Audit
Carpenters have hammers, plumbers have wrenches, and programmers have computers. But does a project manager have any tools which help them perform their work better, quicker, or cheaper? Absolutely! In fact, if you don't use these tools you will be at a serious disadvantage to other project managers. And if you do, your career will... [Read More]| ProjectEngineer
Discover the definition and 5 crucial steps for a complete risk assessment process. Learn how to identify potential risks and implement control measures.| Occupational Health and Safety Blog
Many of us have a bad habit of talking about and thinking about risk in entirely the wrong way. There's no perfectly safe way to go through life, and that's true with our money and true with everything else, too. There's rarely a safe option and a risky option, but instead different options with different risks. This is the story of something terrible that drove that point home for me and Mark this year.| Our Next Life by Tanja Hester, author of Work Optional and Wallet Activism
If you work for a large organization, especially public or otherwise regulated companies, then you may well have faced the prospect of developing a risk appetite statement. You might have been enthusiastic about this or possibly compelled by a Board member, a regulator or auditor to do it. This can end up being a "check the box” exercise to develop some abstract statement that no one really uses or values. But it doesn’t have to be this way. Risk appetite, or more specifically, definitio...| Risk and Cyber
As artificial intelligence reshapes the business landscape, the SEC is gearing up for a new era of oversight. With a| Corporate Compliance Insights
Explore how our solutions help extend internal teams' bandwidth by flagging merchants in your downstream merchant portfolios.| LegitScript
Traditional security deposits present many challenges for landlords. Depending on how long renters stay, security deposit alternatives can be hassle-free.| LeaseLock, Inc.
I wrote the original version of this post over 4 years ago. In revisiting this it is interesting to note that not much has actually advanced in the field. Yes, there have been more products and tools developed to apply FAIR or FAIR-like quantitative methods - some successful and some less so, usually indexed on the degree of effort it takes to set up the tooling to get more value out than you put in. As with other areas of risk there’s a Heisenberg-like quality to much of the approaches. Th...| Risk and Cyber
Security training is often considered a bit of a waste of time. Maybe this is unfair, but unsurprising in the face of the worst forms of training like flicking through the computer based training equivalent of a slide show or even the ritualized gotcha of the phishing test. But, training our employees, vendors and customers on important topics to help them protect themselves is important. Even the correct strategy of creating ambient controls so that people are intrinsically protected by the...| Risk and Cyber
Explore the causes, symptoms, and treatments of PTSD, and understand prevention and early intervention strategies.| Mental Health Center
As identity governance managers approach the second half of 2024, they must reevaluate their priorities to ensure their security posture paces with...| Identity Defined Security Alliance
Discover the new frontlines in the fight against financial crime. Understand the need for financial institutions to adapt quickly to changing conditions and implement effective compliance measures.| Trade Finance Global
One of the many paradoxes of security is that when you have invested appropriately (sometimes at significant expense) and you have less and less incidents, then some time later, someone somewhere might ask: “Why are we spending so much on security when we don’t have any issues?” If this becomes an accepted view then cuts happen, upgrades and maintenance don’t get incrementally funded, or investments to mitigate new risks are not made. You know what comes next, slowly but surely crack...| Risk and Cyber
The American presidential election has taken shocking twists and turns: One candidate was shot and the other — the sitting| Corporate Compliance Insights
Computer systems across the globe were still recovering this week from a massive meltdown Friday morning that spread rapidly, affecting| Corporate Compliance Insights
Increasing data volumes, types and sources are making data migration riskier than ever, but Oliver Silva of legal eDiscovery provider| Corporate Compliance Insights
As digital interactions and AI-driven processes advance more rapidly than regulatory frameworks, traditional legal approaches to privacy and identity are| Corporate Compliance Insights
Menos de la mitad de las aseguradoras en MX y LATAM han implementado IA 47% de las aseguradoras no han podido integrarse a la IA debido a la calidad de los datos que recaban En México y LATAM el 40% de las aseguradoras han iniciado la integración de herramientas de Inteligencia Artificial (IA), sobre todo en acciones relacionadas con la tarificación o pricing, recurso empleado para establecer precios de los diferentes productos de acuerdo con tendencias, estadísticas y riesgos, según est...| SAS Latin America
By Lylah Davies and Sophie Trémolet, OECD Environment Directorate Developed and developing economies alike are exposed to water risk. The numbers are staggering. 2.2 billion people, a quarter of th…| Environment Focus
“If you don’t know where you’re going, you’ll end up someplace else.” This statement by baseball legend and “philosopher” Yogi Berra pushes us to think about the future. But how do we know where to go if the future is unknown and volatile? How can some people navigate chaos and uncertainty with ease, while others […] The post How to Navigate the Unknown: My new TEDx talk appeared first on Lars Sudmann.| Lars Sudmann
A major success marker of great security leaders and their teams is one simple prioritization technique: the ability to know what needs to be done really well vs. what needs to be simply ok. In other words knowing when to go for an "A-grade" vs. when to simply "Pass", and making sure that the A-grade goals are dominated by what gives you the most leverage not just the things that are evidently critical. It has been over 4 years since I wrote the first version of this post. Since then, these...| Risk and Cyber
Here's the latest from Jami Gold, Paranormal Author : A story idea could be presented to readers countless different ways. How can we choose the best perspective for telling the tale? Original article: Point of View: What’s the Best Choice? ©2024 Jami Gold, Paranormal Author. All Rights Reserved. The post Point of View: What’s the Best Choice? appeared first on Jami Gold, Paranormal Author. Visit Jami Gold online to subscribe to these posts by email or to check out her award-winning fict...| Jami Gold, Paranormal Author
Here's the latest from Jami Gold, Paranormal Author : It's time for another post as a Resident Writing Coach over at Writers Helping Writers, where we're digging into foreshadowing and how to use it with our story. Original article: Foreshadowing vs. “Spoilers”: What’s the Difference? ©2024 Jami Gold, Paranormal Author. All Rights Reserved. The post Foreshadowing vs. “Spoilers”: What’s the Difference? appeared first on Jami Gold, Paranormal Author. Visit Jami Gold online to subsc...| Jami Gold, Paranormal Author
Every major technological change is heralded with claims of significant, even apocalyptic, risks. These almost never turn out to be immediately correct. What often turns out to be riskier are the 2nd order effects that are a result of what is done with the new technology. No matter what, we do have to care about AI risks. Many past technological warnings of disaster have been avoided precisely because we did care. But the bigger risks come with what comes after what comes next. This is inhe...| Risk and Cyber
As Europe moves closer to blanket rules regarding its use, CCI’s Jennifer L. Gaskin explores the evolving compliance and regulatory| Corporate Compliance Insights
If you pay attention online you might have heard of “The Current Thing.” What’s The Current Thing? The Current Thing is any concept that grabs hold of public attention, sometimes out of nowhere, and which demands an answer: are you for or against? I also like Marc Andreessen’s explanation. If not supporting it gets you … Continue reading "Engineering the Current Thing"| Unintended Consequences
Updated: July 2019 Amniotic sac and fluid play an important role in the labour process and usually remain intact until the end of labour. However, around 10% of women will …| Dr Rachel Reed
We’ve followed the Horizon Post Office scandal with empathy for everyone that it has impacted and is still affecting. It’s clear that the postmasters and their families were failed on many levels a…| Co-op Digital Blog
Presentation on the need to re-examine how we engineer systems (taking service providers as an example) and the implications on how we quantify cyber risk if we want to take this message into the board room (as given at BT’s SnoopCon 2019 and Cisco’s June 2019 Knowledge Network webinar for service providers). Having delivered security […] The post Security Engineering – A manifesto for defensive security appeared first on Portcullis Labs.| Portcullis Labs
A blog about markets, finance and all things money related.| aswathdamodaran.blogspot.com
How much financing is enough? Striking the right balance between securing adequate funding and avoiding excessive debt is crucial.| InvoiceInterchange AU