Risk Management ( Page 14 )

  • Home
  • Risk Management
  •  ( Page 14 )

Technology, Media and Telecommunications Risk Index 2016

50 risks, split into five megatrends, ranked by 350 senior executives The TMT Risk Index analyses the severity of impact and ease of management of the top 50 risks facing the TMT industry. Grouped into five megatrends, we examine how these are impacting the sector currently and how this will change in the future. The ...
Read more

Beneath the Surface of a Cyberattack

Do leaders accurately gauge the impact a cyberattack can have on their organization? Do common assumptions about the costs and recovery process associated with data breaches paint a clear picture? This paper considers—in financial terms—the broad and extended business impact of cyberattacks, including both direct and intangible costs. Assumptions can be misleadingCommon perceptions about the ...
Read more

The TSA Debacle Can Be Solved, But Cooperation is Required

Airlines, Operating Authorities and Passengers Need to Help Out The Transporation Security Administration (TSA) is once again under fire. This time, it is not for potentially dangerous security lapses or employee misconduct. It is taking the blame for tortuous airport security lines, some of which extend out to sidewalks in front of terminals, causing many ...
Read more

The inside threat: Why employee behavior and opinions impact cyber risk

by Adeola Adele, Patrick Kulesa The human element as a risk factor in data security breaches is as enduring as it is troubling. Compromised laptops and phishing email scams continue to appeal to hackers as avenues to damage corporate servers and the confidential, sensitive information they maintain. Effective risk management strategy must therefore acknowledge and ...
Read more

Major Changes In Attitudes and Approaches to Workplace Violence Prevention

We just completed the second of two Fisher Phillips webinars including panelists and contributors who were active and former Department of Homeland Security, Secret Service, and other law enforcement professionals.  We solicited questions and concerns from employers and used the panel discussions and preparation to develop more effective practices to prevent and respond to workplace ...
Read more

Combating cybercrime in the hospitality business

Technology has changed our lives for the better, but like every other development it has its downside. Data breaches have become common news, and the latest victim is the hospitality industry. The 2016 Trustwave Global Security Report has found the hospitality industry to be the second-most vulnerable to security breaches behind the retail industry. The ...
Read more

Where Liability Falls When Guest Safety is Compromised

by: Casey Gale It almost sounds like the beginning of a low-budget horror movie. According to his claims, in 2008 Michael David Barrett gained access to a back-of-the-house phone in the Nashville Marriott at Vanderbilt University to learn sportscaster Erin Andrews’s room number. Without using Andrews’s name, he requested to be placed in the neighboring ...
Read more

Hospitality & Gaming Risk Management

Cyber Risk Management In the realm of hospitality and gaming risk management, “securing data against unauthorized and unintentional disclosure continues to be elusive” and consistently presents itself as a problem. It is important to emphasize the need for a “strategy that includes careful contracting, quality insurance coverage, and cyber security due diligence” to fight against ...
Read more

Personal Protective Measures for Today’s Global Citizens

Personal protective tips are a necessity for business travelers. From the Post Vietnam War era of kidnapping and ransom scenarios throughout South America to terror attacks against western cultures in Europe and the US, the number and types of threats faced by travelers continues to increase. Unfortunately, what we have yet to see is same ...
Read more

Cyber and Privacy Risk Advisory

Hospitality Industry Spotlight by Gamelah Palagonia Senior Vice President, Finex Hoteliers have long been major hacking targets – a trend that is likely to continue given the volume of credit and debit card transactions the industry processes. While all business should assess and implement comprehensive privacy and data security policies to ensure adequate protection of ...
Read more