Category: Enterprise Risks

Ease of Doing Business in India

A perspective on the risks and challenges As most people are aware, India is a multi-cultural, multi-lingual society governed by a Federal system of governance – where the Central Government and several State Governments have their own jurisdiction and freedom in prescribing regulatory compliances. Shri K.V. Subramanian, Chief Economic Advisor to the Finance Ministry at…

Read the full article

Digital risks and Cyber risks -are they the same?

There are many definitions floating around digital risk management and cyber security risk management. The words “digital risks” and “cyber risks” are sometimes loosely used as synonyms by many. Here are my thoughts and perspectives on the understanding of these terms: Digital risks are those risks involved in adopting Digital initiatives or bringing in “digital…

Read the full article

Assessing Cyber security risks

Technology is permeating all aspects of business at an increasing rate. New ways of conducting business processes, – remote access, BYOD (bring your own device) and now WFH (work from home) – are bringing about an incredibly broad and diverse domain of cyber risks that are here to stay. An Enterprise Risk Management (ERM) program…

Read the full article

Assessing Business Resilience

Business resilience determines to a great extent whether a business can continue or not. The risk of failure to forecast and build business resilience to weather out a disaster is the most significant risk that could affect the continued existence of an organization. What is Business Continuity? Business continuity (BC) is defined as the capability…

Read the full article

Is your information really secure?

Cyber security risk management is no longer confined to solid firewalls and state of the art Virtual Private Networks. A video that recently caught my attention may make you re-think cyber security programs that you have (or intend to have). Have a look …. Video credit: CNA Insider. //spotyourrisks.com/admin/wp-content/uploads/2019/12/VID-20191223-WA0000.mp4 Here are factors that one should…

Read the full article

My take on IRM and GRC

The next buzzword after GRC (Governance, Risk and Compliance) is now IRM (Integrated Risk Management). (Not to be confused with another acronym “IRM” which denotes “Information Rights Management” which is a form of IT security technology for protecting access to sensitive documents and emails.) Why are we emphasizing so much on new acronyms and confuse…

Read the full article

A Primer on AI/ML/DL/NN etc.

Today, many of us non-technical people feel quite left out of conversations that are buzzing around in companies, social media, webinars, presentations, etc. Yes – I am talking about the most talked about acronyms – Artificial Intelligence (AI), Machine Learning (ML), Deep Learning (DL), Neural Networks (NN) and so on that also includes Big Data,…

Read the full article

Information Security

What is the best practice approach that can help create a solid framework for establishing Information Security policies, procedures and practices? One needs to recognize the various aspects of information security as enunciated in COBIT and other world-wide standards and understand the impact of data privacy laws on information security. Information security is the practice…

Read the full article