Authorities on Risk Assurance

The Shared Assessments Blog

Viewing Category: Operational Risk

Heightened Expectations, Cybersecurity, and the Board’s Role in Risk Management

Published on April 30, 2014 By | Posted in: Board's, Cyber Risk, Cybersecurity, Operational Risk, Risk Management

The first quarter of 2014 has been marked by an increasing focus on the board’s role in risk management, not just in the financial services industry (where in January the OCC issued proposed rules detailing how a board of directors should oversee risk1 ) but more widely in other vertical sectors. As The Conference Board […]

Adapting Your Vendor Compliance Program For Operational Risk

Published on January 6, 2014 By | Posted in: Compliance, Operational Risk

Broadened Regulatory Guidance Recent regulatory guidance from multiple agencies is creating a focus on the need for broader risk management practices in the areas of operational risk of third-party service providers. Information Technology or Security controls provide a more black and white approach to compliance, while operational risk can feel more in the grey zone […]

Manage the Risk; Not the Line Item Details

Published on December 17, 2013 By | Posted in: News, Operational Risk, Risk Management

Operational risk management and compliance management today require levels of management and board reporting. Traditional risk management annual reporting was constructed of key status of compliance programs, including approvals of policies and action plans. Today, risk management and compliance teams need to provide more nimble and flexible responses to complaint management, compliance issues, and emerging […]

Smart Devices and Risk in the Workplace

Published on December 2, 2013 By | Posted in: Mobile Devices, Operational Risk, Risk Management, Third Party Risk

Despite Blackberry’s somewhat disappointing news recently, that it would take a capital infusion rather than a buyout from Fairfax, both Blackberry and Microsoft’s Office product are well-known and recognized tools of the workplace. Blackberry maintains a good portion of its government and corporate business by using a “symmetric key encryption algorithm that is designed to […]

Viewpoint Logo
MetricStream logo
Shared Assessments Logo radian
Shared Assessments Licensee Power Advocate
Shared Assessments Logo pwc
Shared Assessments Logo dtcc
Shared Assessments Logo first data
Shared Assessments Licensee ZS logo
Shared Assessments Licensee Rsam
Shared Assessments Licensee Bank of the West
Shared Assessments Licensee Pivot Point Security
Shared Assessments Licensee Lockpath
Shared Assessments Licensee ControlCase
Shared Assessments Logo Iron Mountain
Shared Assessments Program licensee Churchill & Harriman logo
Shared Assessments Logo Bank Of New York Mellon
Shared Assessments Licensee TD Ameritrade
intralinks-logo
Shared Assessments Logo usbank
Shared Assessments Logo sei
Shared Assessments Logo Ernst & Young
Shared Assessments Logo Deluxe Corp
Shared Assessments Licensee Protiviti
Shared Assessments Logo Deloitte