Insight Search

Sort by:
  • Podcast

    April 28, 2022
    The current and future state of risk analytics is bedrock to empowering the compliance function’s forward-looking agenda. With the evolution of enterprise risks, advancements in analytics, and the ever-morphing regulatory landscape, compliance can be transformed by being further data driven, and monetise the deployment of advanced analytics in empowering intelligent decision-making and risk…
  • Podcast

    November 17, 2021
    Guest host Lucy Pearman talks with Donna Timlen, CCO of OneMain Financial – America’s largest installment lender, about their compliance transformation: talent, technology, strategy and a root cause focus. Donna Timlen has been Chief Compliance Officer (CCO), based out of Baltimore, MD, of OneMain Financial since November 2015 and reports to the OneMain General Counsel. Donna has served as…
  • Blogs

    July 17, 2023
    What’s behind the best data and analytics strategies? Simply stated, it’s the capabilities that allow companies to generate forward-looking insights to proactively drive critical business decisions and propel the business forward to meet strategic goals. Many organisations rely on data scientists who apply their algorithmic magic behind the scenes and ascertain insights from large…
  • Blogs

    July 14, 2023
    This blog post was authored by Rob Woltering - Associate Director, Security and Privacy on the technology insights blog. As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many organisations. To this end, organisations are continuously…
  • Blogs

    July 31, 2023
    The most important use of any risk assessment tool is that it must contribute to better decision making on how to manage individual risks. Whether that is treating and reducing risk, or accepting that risk exists, risk management activities must ultimately help management make better decisions. Executives and risk management leaders, though, are increasingly faced with risk decisions they have…
  • In Focus

    October 17, 2024
    As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Programme. The new rule, published Oct. 15, marks a significant step towards enhancing cybersecurity across the Defense Industrial Base (DIB).
  • Newsletter

    February 14, 2021
    Our global survey of C-level executives and directors about macroeconomic, strategic and operational risks highlights the influence of the COVID-19 pandemic, the economy, digital technology, talent and organisational resiliency on the risk landscape over the near term.[1] Our survey captures insights from 1,081 C-level executives and directors, 39% of whom represent companies based in North…
  • Whitepaper

    April 17, 2024
    Environmental, social and governance (ESG) guidance, stakeholder demands and regulatory mandates are evolving and becoming more specific, and the time of taking a “soft approach” to sustainability reporting has passed. As the need to provide, or prepare to provide, limited and/or reasonable assurance in sustainability reporting grows, internal audit’s role in the reporting process becomes obvious…
  • Podcast

    July 14, 2023
    In the wake of a world-changing pandemic and amid current uncertainties in the global economy, organisations have made, and are making, some significant adjustments in their operations. For most, the procurement function is at or near the top of the list. These changes are critical for procurement leaders to navigate and manage as global supply challenges become more complex and organisations…
  • Blogs

    May 19, 2023
    Access to artificial intelligence (AI) and the drive for adoption by organisations is more prevalent now than it’s ever been, yet many companies are struggling with how to manage data and the overall process. As companies open this “pandora’s box” of new capabilities, they must be prepared to manage data inputs and outputs in secure ways or risk allowing their private data to be consumed in…
Loading...