A Business Case Framework for Risk Management
This paper introduces a framework to create a business case for corporate risk management decisions – connecting risk management strategies with shareholder value.
This paper introduces a framework to create a business case for corporate risk management decisions – connecting risk management strategies with shareholder value.
This presentation provides an overview of cyber forensics – what is forensics? what is cyber forensics? who uses cyber forensics? what are the skills needed for cyber forensics?
A very good discussion the definition, benefits and implementation considerations of enterprise risk management (ERM).
Gain insights into enhancing assurance processes for high-risk government projects, focusing on independent assessments, system integration, and lessons learned.
This whitepaper uses the DuPont Model for risk analysis because this model connects incidents with their potential impact on profitability. To use this model, the reader needs knowledge on accounting and financial reporting, experience with risk scenarios, and how IT is affected.
This presentation paints a picture of the emerging threats to the worldwide payment processing systems and discusses how a major payment processor – Visa – works to keep its payment network secure from increasingly sophisticated attacks.
This presentation discusses information security and compliance risk management – what is it? why do it? – and introduces a framework to implement it in the healthcare industry.
This presentation discusses change management – definition, significance, types – change management controls, the impact of weak change management controls and best practices in change management along the software development life cycle (SDLC).
This paper provides a good overview of IT risk management – what is risk? why is it important to manage risk? how is risk assessed? how is risk managed? what are some common risk management frameworks?
This paper provides an overview of computer audit – what are the main activities in conducting a computer audit and what is the role of the computer auditor?