Category: Enterprise Risks

Know the difference ………..

Many people have asked me whether internal controls monitoring is sufficient to unearth suspicious transactions, abuse of processes or frauds. Do you really need another fraud investigation exercise? Both exercises have different objectives and perspectives and answers different needs (e.g. do we need to prevent or detect, examine historical or current data, use predictive or…

Read the full article

Risks caused by frauds

I have wondered many a times what makes this topic interesting at once but dealt with in hush-hush tones when there is an anonymous whistle blown. Why do organizations and those in the higher echelons postpone / neglect or trivialize the need to look at this risk a little closer (even before an incident happens)?…

Read the full article

High level overview of IT risks

This is a huge and on going topic – fundamentally because of the rapid innovations that are happening in the technology space. The word “information technology” as we understand today (to name a few) encompasses hardware resources, networks, operating systems, virtualization, software engineering, business applications, artificial intelligence (AI), robotics, cloud computing, etc. New and innovative…

Read the full article

Risk “categorization”

Before you “spot your risks” in different areas of business areas or operations, you need to structure your thoughts so that you may identify different risk categories that are relevant, important and critical for your tracking. You might wonder why categorization? – Can I just not go about having a list of top 10 or…

Read the full article