SlideShare ist ein Scribd-Unternehmen logo
1 von 39
IMPACT OF CHANGING WORLD POLITICSIMPACT OF CHANGING WORLD POLITICS
1. Personal unpredictability
2. Businessman, not politician
3. Almost revolutionary
4. End justifies the means
©VLG
TRUMPTRUMP Personality
1. Major reduction in Regulatory Authority
2. Increase in USA Military Strength
3. Return of USA to Space Exploration
4. Resumption of USA Commercial Leadership
5. Elimination of Political Correctness
6. Restoration of Judeo-Christian Values
©VLG
Likely TRUMPTRUMP Changes
©VLG
• Cancelled US regulations may increase risk of higher crime rates
• Increased US military strength could mean reordered budget as well as force employed
elsewhere
• Re-entry in space exploration will shift US competition internationally
• Trump resumption of abandoned US world leadership will affect import-export traffic
• Overthrown Political Correctness will enhance foreign trade
• US return to Judeo-Christian values will impact conduct of business
INTERNATIONAL ASPECT OF MANAGING RISKINTERNATIONAL ASPECT OF MANAGING RISK
•Interdependent global economy nature of risk
•Distribution of shared risk is unequal
•Existing world relationships may be upset by Trump
changes
•Current risk management techniques may prove
inadequate
•Universal understanding and agreement about risk will
be required
•Universal agreement on managing risk raises
questions
ESSENTIAL STEPS TO MANAGING RISKESSENTIAL STEPS TO MANAGING RISK
•Trump unpredictability drives the need for basicTrump unpredictability drives the need for basic
approach for practical management of riskapproach for practical management of risk ©VLG
©VLG
LOSSESLOSSES
Inevitable or Preventable?Preventable?
Random or Forseeable?Forseeable?
Uncontrollable or Managable?Managable?
©VLG
• Three important questions about LOSS
need to be answered
• There must be means or technique to
foresee, prevent, and manage losses
• Methodology that provides ability to
identify, evaluate, and rank loss potential
is essential to managing losses
©VLG
RISK DEFINITIONRISK DEFINITION
The potential MAGNITUDE of a
LOSSLOSS
combined with its LIKELIHOOD
©VLG
• Risk requires universalRisk requires universal definitiondefinition
• Managing risk meansManaging risk means focus on lossfocus on loss
©VLG
ONLY THREE OPTIONSONLY THREE OPTIONS
LOSS PreventAccept
Be Reimbursed
©VLG
CURRENT APPROACHES to RiskCURRENT APPROACHES to Risk
ManagementManagement
Our 2009 RISK MANAGEMENT REPORTS treatise,
“Enterprise Risk Management – Its Five Biggest
Weaknesses” outlines strategy for attaining a
universal approach to managing risk
All five weaknesses still exist and must be overcome!
(Visit www.omegainc.com for details)
©VLG
Risk Management SPECTRUMRisk Management SPECTRUM
UNACCEPTABLE LOSS
(Financing Unthinkable)
Loss Financing
ACCEPTABLE LOSS
(Control Impossible)
Loss Control
ROOTS
Insurance
Financial Management
Legal Counsel
ROOTS
Society & Security
National Prestige
Environmental Protection
Personal Health
©VLG
• There is a wide spectrum of risk management
activity – ranging from loss financing (insurance)
to loss control (specific loss countermeasures).
• Comprehending these opposing risk management
poles – loss financing v. loss control – and their
associated contrasting view of LOSS is essential to
surviving any and all Trump changes.
• The impact of specialties – known as “silos” – on
managing risk is a danger to be overcome. This is
even true for individual risk specialties themselves
HUMAN
RESOURCES
(discord)
RISKRISK SPECIALTIES
©VLG
LOSS
FINANCING
(insolvency)
OCCUPATIONAL
HEALTH
(disease)
PUBLIC
RELATIONS
(falsehood)
SAFETY
(hazard)
SECURITY
(threat)
QUALITY
ASSURANCE
(defect)
ENVIRONMENTAL
CONTROL
(toxicity)
LEGAL
COUNSEL
(liability)
RISK
• Diverse definitions of risk
• Unbalanced emphasis on perceived risk
• Disconnection from corporate risk strategy
• Failure to comprehend risk interdependence
• Counterproductive inefficiency of risk control
©VLG
FUNCTIONAL SPECIALTY INFLUENCEFUNCTIONAL SPECIALTY INFLUENCE
on Managing Risk
©VLG
•There are only three available options for identified
losses – prevent some, accept others, or obtain
reimbursement for the remainder.
•Insurance companies have never managed risk – they
only finance it.
•Contrast between insurer and insured has high
significance because it affirms that LOSS – rather
than RISK – must be the focus and concern of every risk
manager.
•Loss is not the only financial factor in managing risk –
countermeasure cost is a major expenditure.
•Four fundamental tasks must be executed by a risk
manager.
INVOLVINGINVOLVING YOURYOUR PERSONNELPERSONNEL
INSTEAD OFINSTEAD OF OUTSIDERSOUTSIDERS
Managing risk is anManaging risk is an ““insider jobinsider job”” –– performedperformed
by those most familiar with the values, needs,by those most familiar with the values, needs,
history, pressures, skills, and motivationshistory, pressures, skills, and motivations
possessed by everyone in the organization forpossessed by everyone in the organization for
which risk is being managed.which risk is being managed.
©VLG
©VLG
Foreseeing and Identifying RiskForeseeing and Identifying Risk
PriorPrior to Impactto Impact
SMARTTM
(Systems Methodology Applied to
Risk Termination) – which has
demonstrated wide success in business,
government, transportation, health care
as well as controlling terrorism at the
1984 Olympics — is employed as a
model.
(see www.omegainc.com)
1. Define KNOWN INPUTS and DESIRED OUTPUTS of “system”
2. Build FUNCTIONAL FLOW BLOCK DIAGRAM (FFBD) of “system”
3. Write RISK SCENARIOS for every block in FFBD
4. Prepare COUNTERMEASURES for every risk scenario
5. Determine full COST of every countermeasure
6. Set SCENARIO CRITERIA for severity, probability & countermeasure cost
7. Establish RISK JURY to evaluate each scenario against criteria
8. Assemble all judged scenarios into a RISK TOTEM POLE
9. Implement RISK CONTROLS for significant risks
10. Keep Risk Totem Pole UP-TO-DATE
SMART in 10 Steps
Systems Methodology Applied to Risk Termination
©VLG
TM
TM
TM
A COMPOSITE – at any level of complexity –
of operational and support equipment, personnel,
facilities and software which are used together
as an entity and capable of performing and/or
supporting an operational role that results in changing
KNOWN INPUTS into DESIRED OUTPUTS
©VLG
DEFINITION OF SYSTEMDEFINITION OF SYSTEM
©VLG
THE SYSTEMS APPROACHTHE SYSTEMS APPROACH
SYSTEM
as a
TRANSFORMER
KNOWN
INPUTS
“Transforming
KNOWN INPUTS into DESIRED OUTPUTS
by utilizing RESOURCES”
DESIRED
OUTPUTS
FEEDBACK LOOP
• Virtually anything can be a system – starting with a simple cup of
coffee which has known inputs and desired outputs.
• As a transformer of known inputs into desired outputs, a system
uses all types of resources – finances, facilities, time, personnel,
space, knowledge, and equipment.
• A feedback loop – from desired outputs to desired inputs – assures
that lessons learned are incorporated.
©VLG
• SMART’sTM
Ten Progressive Steps are required
to cost-effectively manage any and all
imaginable risks by using the systems
approach.
• Two steps (3 and 7) of this “womb-to-tomb”
approach that was essential to landing men
on the Moon will be described in detail.
(see www.omegainc.com)
©VLG
• SMARTTM
Step 3: Write Risk Scenarios discusses the risk
identification element of managing risk systematically.
• A scenario for an imaginary US corporation – Omega Widget
Industries – illustrates how all the required elements – man,
machine, media, and management – are integrated into a story
culminating in a hypothetical financial loss.
• Stimulation for writing a scenario can start by observing an actual
incident of loss but it also often involves imagination. Expert
insight as well as history of losses are additional scenario sources.
©VLG
• Brief description of combined CAUSATIVE FACTORS
that form an “anatomy of accidental loss”
•Interrelates ingredients of
MAN (behavior)
MACHINE (physical phenomena)
MANAGEMENT (situational decisions)
MEDIA (environmental milieus)
•Not literary entertainment – but HIGHLIGHTED and
INTEGRATED elements of loss
What is a RISK SCENARIO?What is a RISK SCENARIO?
©VLG
©VLG
THREE TIERS OF QUESTTHREE TIERS OF QUEST
For Risk ScenariosFor Risk Scenarios
IMAGINATION
EXPERT INSIGHT/ADVICE
HISTORY
During the final stage of Widget X production at Omega Widget Industries (OWI),
flywheel assemblies begin failing. Quality Control inspectors reject end product at much
higher levels than acceptable. Flywheels are imported, and the outsourced supplier has
made budget cuts to adjust to the Border Adjustment Tax implemented by the Trump
Administration.
Anticipating this possibility, OWI executives immediately engage a previously
qualified US supplier – Second Chance Incorporated – as backup. However, due in part to
Trump deregulated oversight and enforcement at OSHA and EPA, Second Chance is
experiencing a surge in criminal investigations and lawsuits from employees, local residents,
and customers. Social media effectively eliminate Second Chance as a fallback supplier.
Production at OWI is reduced to 20% of capacity for several months, as
shareholders begin calling for a management change. New media exploit the impact of the
shutdown on area employment and OWI’s previously stellar corporate reputation.
Estimated loss is $750 million.
©VLG
TYPICAL RISK SCENARIOTYPICAL RISK SCENARIO
RISK JURY MEMBERSRISK JURY MEMBERS
•Line Executive – Chair
•Three Line Expert Specialists
•One Risk Generalist
©VLG
• SMARTTM
Step 7: Risk Jury -- the second of ten SMARTTM
steps to be described – establishes
a RISK JURY to evaluate each scenario against numerous criteria.
• Generally, a Risk Jury consists of five members – all of whom have been selected by the
CEO in whose interest they judge.
• Only insiders – personnel who are daily involved in and responsible for the operation of the
organization – can be trusted to exercise the judgment necessary to evaluate and resolve
the true significance of every risk scenario.
©VLG
• Pursued within a Logical
“Eliminate-Automatic-Warning-Procedural” Framework
• Something not currently being done
• Total cost must be determinable
©VLG
MULTIPLE COUNTERMEASURESMULTIPLE COUNTERMEASURES
For Every Risk ScenarioFor Every Risk Scenario
• The Risk Jury – after determining each scenario’s
severity and likelihood as well as selecting among
proposed countermeasures how it will be
controlled, is able to establish all information
required to place it accurately in the Risk Totem
PoleTMTM
.
• Four options exist for controlling each scenario.
The Risk Jury decides which option is applied to
each scenario.
©VLG
• The crowning feature of SMARTTM
is its Risk Totem PoleTM
– a ranked mathematical ordering of all identified risks.
It is the product of collective Risk Jury decisions.
• There will always be limited corporate resources for
controlling risk losses. So every Risk Totem PoleTM
is
divided into two parts.
• To assure that vital risk control resources are most
cost-effectively invested, risk scenarios at the top of the
pole are the most severe, most probable, and requiring
the least expensive countermeasures to eliminate them.
• A cutoff of funding in the pole marks the full
expenditure of the loss prevention budget – thereby
necessitating acceptance of risks of lesser consequence.
• At the bottom of the Risk Totem PoleTM
are risk
scenarios that are least severe, least probable and
most expensive to eliminate.
©VLG
CUTOFFCUTOFF (subjective)(subjective)
SMART Risk Totem Pole
©VLG
TM TM
CONTROLLEDCONTROLLED RisksRisks
The Executive’s Gauge for Managing RiskThe Executive’s Gauge for Managing Risk
ACCEPTEDACCEPTED RisksRisks
TOWARDTOWARD Managed Risk!Managed Risk!
• Managing risk systematically with foresight – as
demonstrated by SMARTTM
– provides a stable framework
with a thorough array of foreseen risks that are ranked
for cost-effective control.
•It is time to be sensible, to organize, and to become
systematic! Managing risk is not mysterious. Avoid clever
clichés or bewitching buzzwords.
•Above all, be prepared to successfully manage any and
all potential risks that may emanate from Trump
Administration changes!
(Visit www.omegainc.com)
©VLG
ATTAININGATTAINING Managed Risk!Managed Risk!
•Managing risk will continue to be a challenge forManaging risk will continue to be a challenge for
management.management. Risk can never be ignoredRisk can never be ignored – even– even
when it is well controlled.when it is well controlled.
•What would be required toWhat would be required to justifyjustify the conclusionthe conclusion
that your organization had attained a state ofthat your organization had attained a state of
managedmanaged risk?risk?
• Uncertainty seems to drive or dominate so muchUncertainty seems to drive or dominate so much
business in the world today. Terrorism appears tobusiness in the world today. Terrorism appears to
have attained a permanent role throughout thehave attained a permanent role throughout the
world. And, yes,world. And, yes, Trump has begun to upsetTrump has begun to upset
previous expectancies of business and commerceprevious expectancies of business and commerce..
©VLG
©VLG
REFERENCE SOURCESREFERENCE SOURCES
Further background and
information on topics discussed
in this webinar are available at
www.omegainc.comwww.omegainc.com
ISO 31000 Training Courses
 ISO 31000 Introduction
1 Day Course
 ISO 31000 Foundation
2 Days Course
 ISO 31000 Risk Manager
3 Days Course
 ISO 31000 Lead Risk Manager
5 Days Course
Exam and certification fees are included in the training price.
www.pecb.com | https://pecb.com/events
?
703-490-0908
vgrose@omegainc.com http://www.omegainc.com/
https://www.linkedin.com/in/vern-grose-65a930b/
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Enterprise Risk Management ~ Inovastra
Enterprise Risk Management ~ InovastraEnterprise Risk Management ~ Inovastra
Enterprise Risk Management ~ InovastraNik Hasyudeen
 
Incorporating Risk Management into BCP
Incorporating Risk Management into BCPIncorporating Risk Management into BCP
Incorporating Risk Management into BCPRon Andrews
 
Enterprise Risk Management as a Core Management Process
Enterprise Risk Management as a Core Management ProcessEnterprise Risk Management as a Core Management Process
Enterprise Risk Management as a Core Management Processregio12
 
Building an Effective AML Program
Building an Effective AML ProgramBuilding an Effective AML Program
Building an Effective AML ProgramCorporater
 
Integrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: BenchmarkingIntegrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: BenchmarkingResolver Inc.
 
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...Resolver Inc.
 
Enterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityEnterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityJeff B
 
Operational Risk: Solvency II and Culture of Risk Analysis
Operational Risk: Solvency II and Culture of Risk AnalysisOperational Risk: Solvency II and Culture of Risk Analysis
Operational Risk: Solvency II and Culture of Risk AnalysisIgnacio Reclusa
 
Strategic risk management
Strategic risk managementStrategic risk management
Strategic risk managementKarim Farag
 
Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...
Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...
Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...Resolver Inc.
 
The Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementThe Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementCorporater
 
Overall Assessment Of Erm
Overall Assessment Of ErmOverall Assessment Of Erm
Overall Assessment Of ErmPWSHAW
 
The Intersection of Risk, Security, and Performance
The Intersection of Risk, Security, and PerformanceThe Intersection of Risk, Security, and Performance
The Intersection of Risk, Security, and PerformanceResolver Inc.
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Diane Christina
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability Resolver Inc.
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk ManagementResolver Inc.
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceResolver Inc.
 

Was ist angesagt? (20)

Enterprise Risk Management ~ Inovastra
Enterprise Risk Management ~ InovastraEnterprise Risk Management ~ Inovastra
Enterprise Risk Management ~ Inovastra
 
Incorporating Risk Management into BCP
Incorporating Risk Management into BCPIncorporating Risk Management into BCP
Incorporating Risk Management into BCP
 
Enterprise Risk Management as a Core Management Process
Enterprise Risk Management as a Core Management ProcessEnterprise Risk Management as a Core Management Process
Enterprise Risk Management as a Core Management Process
 
Risk Management Frameworks
Risk Management FrameworksRisk Management Frameworks
Risk Management Frameworks
 
Building an Effective AML Program
Building an Effective AML ProgramBuilding an Effective AML Program
Building an Effective AML Program
 
Integrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: BenchmarkingIntegrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: Benchmarking
 
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
 
Enterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityEnterprise Risk Management and Sustainability
Enterprise Risk Management and Sustainability
 
Operational Risk: Solvency II and Culture of Risk Analysis
Operational Risk: Solvency II and Culture of Risk AnalysisOperational Risk: Solvency II and Culture of Risk Analysis
Operational Risk: Solvency II and Culture of Risk Analysis
 
Strategic risk management
Strategic risk managementStrategic risk management
Strategic risk management
 
Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...
Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...
Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...
 
The Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementThe Purpose of Holistic Risk Management
The Purpose of Holistic Risk Management
 
Overall Assessment Of Erm
Overall Assessment Of ErmOverall Assessment Of Erm
Overall Assessment Of Erm
 
The Intersection of Risk, Security, and Performance
The Intersection of Risk, Security, and PerformanceThe Intersection of Risk, Security, and Performance
The Intersection of Risk, Security, and Performance
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
#corpriskforum2016 - Erike Young
#corpriskforum2016 - Erike Young#corpriskforum2016 - Erike Young
#corpriskforum2016 - Erike Young
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and Performance
 

Andere mochten auch

5 Top Tips for Implementing a Successful Safety Culture in Global Organizations
5 Top Tips for Implementing a Successful Safety Culture in Global Organizations5 Top Tips for Implementing a Successful Safety Culture in Global Organizations
5 Top Tips for Implementing a Successful Safety Culture in Global OrganizationsPECB
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 ImplementationPECB
 
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?PECB
 
How to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety ExcellenceHow to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety ExcellencePECB
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
PECB Webinar: ¿Por qué toda organización necesita un CISO?
PECB Webinar: ¿Por qué toda organización necesita un CISO?PECB Webinar: ¿Por qué toda organización necesita un CISO?
PECB Webinar: ¿Por qué toda organización necesita un CISO?PECB
 
Iso julio socarras 2
Iso julio socarras 2Iso julio socarras 2
Iso julio socarras 2INGSOCARRAS
 
Cyber Security testing in an agile environment
Cyber Security testing in an agile environmentCyber Security testing in an agile environment
Cyber Security testing in an agile environmentArthur Donkers
 
Presentatie Introductieavond Genealogie 23 10-2012
Presentatie Introductieavond Genealogie 23 10-2012Presentatie Introductieavond Genealogie 23 10-2012
Presentatie Introductieavond Genealogie 23 10-2012HSK De Acht Zaligheden
 
PECB Webinar: Corrective Action or Preventative Action - The new risk based m...
PECB Webinar: Corrective Action or Preventative Action - The new risk based m...PECB Webinar: Corrective Action or Preventative Action - The new risk based m...
PECB Webinar: Corrective Action or Preventative Action - The new risk based m...PECB
 
ISO 22301 Lead Implementer - Four Page Brochure
ISO 22301 Lead Implementer - Four Page BrochureISO 22301 Lead Implementer - Four Page Brochure
ISO 22301 Lead Implementer - Four Page BrochurePECB
 
Politics and journalism in crisis: from Edstone to Trump tweets 2017
Politics and journalism in crisis: from Edstone to Trump tweets 2017Politics and journalism in crisis: from Edstone to Trump tweets 2017
Politics and journalism in crisis: from Edstone to Trump tweets 2017POLIS LSE
 
Establishing BCMS and Certifying Against ISO 22301
Establishing BCMS and Certifying Against ISO 22301Establishing BCMS and Certifying Against ISO 22301
Establishing BCMS and Certifying Against ISO 22301Continuity and Resilience
 

Andere mochten auch (17)

5 Top Tips for Implementing a Successful Safety Culture in Global Organizations
5 Top Tips for Implementing a Successful Safety Culture in Global Organizations5 Top Tips for Implementing a Successful Safety Culture in Global Organizations
5 Top Tips for Implementing a Successful Safety Culture in Global Organizations
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
 
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
 
How to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety ExcellenceHow to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety Excellence
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Bios
BiosBios
Bios
 
IOSH Leading Safely Course is now in Dubai
IOSH Leading Safely Course is now in DubaiIOSH Leading Safely Course is now in Dubai
IOSH Leading Safely Course is now in Dubai
 
ISO 31000 RISK MANAGER - GERENTE DE RIESGOS ISO 31000
ISO 31000 RISK MANAGER - GERENTE DE RIESGOS ISO 31000ISO 31000 RISK MANAGER - GERENTE DE RIESGOS ISO 31000
ISO 31000 RISK MANAGER - GERENTE DE RIESGOS ISO 31000
 
PECB Webinar: ¿Por qué toda organización necesita un CISO?
PECB Webinar: ¿Por qué toda organización necesita un CISO?PECB Webinar: ¿Por qué toda organización necesita un CISO?
PECB Webinar: ¿Por qué toda organización necesita un CISO?
 
Iso julio socarras 2
Iso julio socarras 2Iso julio socarras 2
Iso julio socarras 2
 
Cyber Security testing in an agile environment
Cyber Security testing in an agile environmentCyber Security testing in an agile environment
Cyber Security testing in an agile environment
 
Presentatie Introductieavond Genealogie 23 10-2012
Presentatie Introductieavond Genealogie 23 10-2012Presentatie Introductieavond Genealogie 23 10-2012
Presentatie Introductieavond Genealogie 23 10-2012
 
Agile security
Agile securityAgile security
Agile security
 
PECB Webinar: Corrective Action or Preventative Action - The new risk based m...
PECB Webinar: Corrective Action or Preventative Action - The new risk based m...PECB Webinar: Corrective Action or Preventative Action - The new risk based m...
PECB Webinar: Corrective Action or Preventative Action - The new risk based m...
 
ISO 22301 Lead Implementer - Four Page Brochure
ISO 22301 Lead Implementer - Four Page BrochureISO 22301 Lead Implementer - Four Page Brochure
ISO 22301 Lead Implementer - Four Page Brochure
 
Politics and journalism in crisis: from Edstone to Trump tweets 2017
Politics and journalism in crisis: from Edstone to Trump tweets 2017Politics and journalism in crisis: from Edstone to Trump tweets 2017
Politics and journalism in crisis: from Edstone to Trump tweets 2017
 
Establishing BCMS and Certifying Against ISO 22301
Establishing BCMS and Certifying Against ISO 22301Establishing BCMS and Certifying Against ISO 22301
Establishing BCMS and Certifying Against ISO 22301
 

Ähnlich wie Impact of Changing World Politics in Managing Risk

Adr approaches to_sensing_and_responding_to_emerging_risk[1]
Adr approaches to_sensing_and_responding_to_emerging_risk[1]Adr approaches to_sensing_and_responding_to_emerging_risk[1]
Adr approaches to_sensing_and_responding_to_emerging_risk[1]Gaiani (CarnCorpAudit)
 
Chapter 9
Chapter 9Chapter 9
Chapter 9detjen
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnKloudLearn
 
Positioning project, programme and portfolio risk
Positioning project, programme and portfolio risk Positioning project, programme and portfolio risk
Positioning project, programme and portfolio risk Dr David Hancock
 
How AGCO implemented an Supply Chain Risk management solution to save millions
How AGCO implemented an Supply Chain Risk management solution to save millionsHow AGCO implemented an Supply Chain Risk management solution to save millions
How AGCO implemented an Supply Chain Risk management solution to save millionsHeiko Schwarz
 
Emerging horizons of management.sanjeev patel
Emerging horizons of management.sanjeev patelEmerging horizons of management.sanjeev patel
Emerging horizons of management.sanjeev patelSanjeev Patel
 
Supply chain, a risk management survey results and analysis
Supply chain, a risk management survey results and analysisSupply chain, a risk management survey results and analysis
Supply chain, a risk management survey results and analysisSimone Luca Giargia
 
White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014EMC
 
Compliance. The Importance Of Risk Culture
Compliance. The Importance Of Risk CultureCompliance. The Importance Of Risk Culture
Compliance. The Importance Of Risk Culturedtsiolis
 
ORM Operational Risks Management
ORM Operational Risks ManagementORM Operational Risks Management
ORM Operational Risks ManagementTariq minhas
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityAtlantic Training, LLC.
 
TR crisis management
TR crisis managementTR crisis management
TR crisis managementTurab Rzayev
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysisSKS
 

Ähnlich wie Impact of Changing World Politics in Managing Risk (20)

Adr approaches to_sensing_and_responding_to_emerging_risk[1]
Adr approaches to_sensing_and_responding_to_emerging_risk[1]Adr approaches to_sensing_and_responding_to_emerging_risk[1]
Adr approaches to_sensing_and_responding_to_emerging_risk[1]
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Managing Risks in Turbulent Times by Dr. Emmanuel Moore ABOLO
Managing Risks in Turbulent Times by Dr. Emmanuel Moore ABOLOManaging Risks in Turbulent Times by Dr. Emmanuel Moore ABOLO
Managing Risks in Turbulent Times by Dr. Emmanuel Moore ABOLO
 
DRIDeckFinalMar3
DRIDeckFinalMar3DRIDeckFinalMar3
DRIDeckFinalMar3
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - Kloudlearn
 
Risk types
Risk  typesRisk  types
Risk types
 
Positioning project, programme and portfolio risk
Positioning project, programme and portfolio risk Positioning project, programme and portfolio risk
Positioning project, programme and portfolio risk
 
How AGCO implemented an Supply Chain Risk management solution to save millions
How AGCO implemented an Supply Chain Risk management solution to save millionsHow AGCO implemented an Supply Chain Risk management solution to save millions
How AGCO implemented an Supply Chain Risk management solution to save millions
 
CHAPTER 2.pptx
CHAPTER 2.pptxCHAPTER 2.pptx
CHAPTER 2.pptx
 
Emerging horizons of management.sanjeev patel
Emerging horizons of management.sanjeev patelEmerging horizons of management.sanjeev patel
Emerging horizons of management.sanjeev patel
 
Managing Risk in the Global Supply Chain
Managing Risk in the Global Supply ChainManaging Risk in the Global Supply Chain
Managing Risk in the Global Supply Chain
 
Supply chain, a risk management survey results and analysis
Supply chain, a risk management survey results and analysisSupply chain, a risk management survey results and analysis
Supply chain, a risk management survey results and analysis
 
Modern operational risk
Modern operational riskModern operational risk
Modern operational risk
 
White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014
 
COSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORECOSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORE
 
Compliance. The Importance Of Risk Culture
Compliance. The Importance Of Risk CultureCompliance. The Importance Of Risk Culture
Compliance. The Importance Of Risk Culture
 
ORM Operational Risks Management
ORM Operational Risks ManagementORM Operational Risks Management
ORM Operational Risks Management
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State University
 
TR crisis management
TR crisis managementTR crisis management
TR crisis management
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysis
 

Mehr von PECB

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 

Mehr von PECB (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 

Kürzlich hochgeladen

Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 

Kürzlich hochgeladen (20)

Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 

Impact of Changing World Politics in Managing Risk

  • 1.
  • 2. IMPACT OF CHANGING WORLD POLITICSIMPACT OF CHANGING WORLD POLITICS
  • 3. 1. Personal unpredictability 2. Businessman, not politician 3. Almost revolutionary 4. End justifies the means ©VLG TRUMPTRUMP Personality
  • 4. 1. Major reduction in Regulatory Authority 2. Increase in USA Military Strength 3. Return of USA to Space Exploration 4. Resumption of USA Commercial Leadership 5. Elimination of Political Correctness 6. Restoration of Judeo-Christian Values ©VLG Likely TRUMPTRUMP Changes
  • 5. ©VLG • Cancelled US regulations may increase risk of higher crime rates • Increased US military strength could mean reordered budget as well as force employed elsewhere • Re-entry in space exploration will shift US competition internationally • Trump resumption of abandoned US world leadership will affect import-export traffic • Overthrown Political Correctness will enhance foreign trade • US return to Judeo-Christian values will impact conduct of business
  • 6. INTERNATIONAL ASPECT OF MANAGING RISKINTERNATIONAL ASPECT OF MANAGING RISK •Interdependent global economy nature of risk •Distribution of shared risk is unequal •Existing world relationships may be upset by Trump changes •Current risk management techniques may prove inadequate •Universal understanding and agreement about risk will be required •Universal agreement on managing risk raises questions ESSENTIAL STEPS TO MANAGING RISKESSENTIAL STEPS TO MANAGING RISK •Trump unpredictability drives the need for basicTrump unpredictability drives the need for basic approach for practical management of riskapproach for practical management of risk ©VLG
  • 7. ©VLG LOSSESLOSSES Inevitable or Preventable?Preventable? Random or Forseeable?Forseeable? Uncontrollable or Managable?Managable?
  • 8. ©VLG • Three important questions about LOSS need to be answered • There must be means or technique to foresee, prevent, and manage losses • Methodology that provides ability to identify, evaluate, and rank loss potential is essential to managing losses
  • 9. ©VLG RISK DEFINITIONRISK DEFINITION The potential MAGNITUDE of a LOSSLOSS combined with its LIKELIHOOD
  • 10. ©VLG • Risk requires universalRisk requires universal definitiondefinition • Managing risk meansManaging risk means focus on lossfocus on loss
  • 11. ©VLG ONLY THREE OPTIONSONLY THREE OPTIONS LOSS PreventAccept Be Reimbursed
  • 12. ©VLG CURRENT APPROACHES to RiskCURRENT APPROACHES to Risk ManagementManagement Our 2009 RISK MANAGEMENT REPORTS treatise, “Enterprise Risk Management – Its Five Biggest Weaknesses” outlines strategy for attaining a universal approach to managing risk All five weaknesses still exist and must be overcome! (Visit www.omegainc.com for details)
  • 13. ©VLG Risk Management SPECTRUMRisk Management SPECTRUM UNACCEPTABLE LOSS (Financing Unthinkable) Loss Financing ACCEPTABLE LOSS (Control Impossible) Loss Control ROOTS Insurance Financial Management Legal Counsel ROOTS Society & Security National Prestige Environmental Protection Personal Health
  • 14. ©VLG • There is a wide spectrum of risk management activity – ranging from loss financing (insurance) to loss control (specific loss countermeasures). • Comprehending these opposing risk management poles – loss financing v. loss control – and their associated contrasting view of LOSS is essential to surviving any and all Trump changes. • The impact of specialties – known as “silos” – on managing risk is a danger to be overcome. This is even true for individual risk specialties themselves
  • 16. • Diverse definitions of risk • Unbalanced emphasis on perceived risk • Disconnection from corporate risk strategy • Failure to comprehend risk interdependence • Counterproductive inefficiency of risk control ©VLG FUNCTIONAL SPECIALTY INFLUENCEFUNCTIONAL SPECIALTY INFLUENCE on Managing Risk
  • 17. ©VLG •There are only three available options for identified losses – prevent some, accept others, or obtain reimbursement for the remainder. •Insurance companies have never managed risk – they only finance it. •Contrast between insurer and insured has high significance because it affirms that LOSS – rather than RISK – must be the focus and concern of every risk manager. •Loss is not the only financial factor in managing risk – countermeasure cost is a major expenditure. •Four fundamental tasks must be executed by a risk manager.
  • 18. INVOLVINGINVOLVING YOURYOUR PERSONNELPERSONNEL INSTEAD OFINSTEAD OF OUTSIDERSOUTSIDERS Managing risk is anManaging risk is an ““insider jobinsider job”” –– performedperformed by those most familiar with the values, needs,by those most familiar with the values, needs, history, pressures, skills, and motivationshistory, pressures, skills, and motivations possessed by everyone in the organization forpossessed by everyone in the organization for which risk is being managed.which risk is being managed. ©VLG
  • 19. ©VLG Foreseeing and Identifying RiskForeseeing and Identifying Risk PriorPrior to Impactto Impact SMARTTM (Systems Methodology Applied to Risk Termination) – which has demonstrated wide success in business, government, transportation, health care as well as controlling terrorism at the 1984 Olympics — is employed as a model. (see www.omegainc.com)
  • 20. 1. Define KNOWN INPUTS and DESIRED OUTPUTS of “system” 2. Build FUNCTIONAL FLOW BLOCK DIAGRAM (FFBD) of “system” 3. Write RISK SCENARIOS for every block in FFBD 4. Prepare COUNTERMEASURES for every risk scenario 5. Determine full COST of every countermeasure 6. Set SCENARIO CRITERIA for severity, probability & countermeasure cost 7. Establish RISK JURY to evaluate each scenario against criteria 8. Assemble all judged scenarios into a RISK TOTEM POLE 9. Implement RISK CONTROLS for significant risks 10. Keep Risk Totem Pole UP-TO-DATE SMART in 10 Steps Systems Methodology Applied to Risk Termination ©VLG TM TM TM
  • 21. A COMPOSITE – at any level of complexity – of operational and support equipment, personnel, facilities and software which are used together as an entity and capable of performing and/or supporting an operational role that results in changing KNOWN INPUTS into DESIRED OUTPUTS ©VLG DEFINITION OF SYSTEMDEFINITION OF SYSTEM
  • 22. ©VLG THE SYSTEMS APPROACHTHE SYSTEMS APPROACH SYSTEM as a TRANSFORMER KNOWN INPUTS “Transforming KNOWN INPUTS into DESIRED OUTPUTS by utilizing RESOURCES” DESIRED OUTPUTS FEEDBACK LOOP
  • 23. • Virtually anything can be a system – starting with a simple cup of coffee which has known inputs and desired outputs. • As a transformer of known inputs into desired outputs, a system uses all types of resources – finances, facilities, time, personnel, space, knowledge, and equipment. • A feedback loop – from desired outputs to desired inputs – assures that lessons learned are incorporated. ©VLG
  • 24. • SMART’sTM Ten Progressive Steps are required to cost-effectively manage any and all imaginable risks by using the systems approach. • Two steps (3 and 7) of this “womb-to-tomb” approach that was essential to landing men on the Moon will be described in detail. (see www.omegainc.com) ©VLG
  • 25. • SMARTTM Step 3: Write Risk Scenarios discusses the risk identification element of managing risk systematically. • A scenario for an imaginary US corporation – Omega Widget Industries – illustrates how all the required elements – man, machine, media, and management – are integrated into a story culminating in a hypothetical financial loss. • Stimulation for writing a scenario can start by observing an actual incident of loss but it also often involves imagination. Expert insight as well as history of losses are additional scenario sources. ©VLG
  • 26. • Brief description of combined CAUSATIVE FACTORS that form an “anatomy of accidental loss” •Interrelates ingredients of MAN (behavior) MACHINE (physical phenomena) MANAGEMENT (situational decisions) MEDIA (environmental milieus) •Not literary entertainment – but HIGHLIGHTED and INTEGRATED elements of loss What is a RISK SCENARIO?What is a RISK SCENARIO? ©VLG
  • 27. ©VLG THREE TIERS OF QUESTTHREE TIERS OF QUEST For Risk ScenariosFor Risk Scenarios IMAGINATION EXPERT INSIGHT/ADVICE HISTORY
  • 28. During the final stage of Widget X production at Omega Widget Industries (OWI), flywheel assemblies begin failing. Quality Control inspectors reject end product at much higher levels than acceptable. Flywheels are imported, and the outsourced supplier has made budget cuts to adjust to the Border Adjustment Tax implemented by the Trump Administration. Anticipating this possibility, OWI executives immediately engage a previously qualified US supplier – Second Chance Incorporated – as backup. However, due in part to Trump deregulated oversight and enforcement at OSHA and EPA, Second Chance is experiencing a surge in criminal investigations and lawsuits from employees, local residents, and customers. Social media effectively eliminate Second Chance as a fallback supplier. Production at OWI is reduced to 20% of capacity for several months, as shareholders begin calling for a management change. New media exploit the impact of the shutdown on area employment and OWI’s previously stellar corporate reputation. Estimated loss is $750 million. ©VLG TYPICAL RISK SCENARIOTYPICAL RISK SCENARIO
  • 29. RISK JURY MEMBERSRISK JURY MEMBERS •Line Executive – Chair •Three Line Expert Specialists •One Risk Generalist ©VLG
  • 30. • SMARTTM Step 7: Risk Jury -- the second of ten SMARTTM steps to be described – establishes a RISK JURY to evaluate each scenario against numerous criteria. • Generally, a Risk Jury consists of five members – all of whom have been selected by the CEO in whose interest they judge. • Only insiders – personnel who are daily involved in and responsible for the operation of the organization – can be trusted to exercise the judgment necessary to evaluate and resolve the true significance of every risk scenario. ©VLG
  • 31. • Pursued within a Logical “Eliminate-Automatic-Warning-Procedural” Framework • Something not currently being done • Total cost must be determinable ©VLG MULTIPLE COUNTERMEASURESMULTIPLE COUNTERMEASURES For Every Risk ScenarioFor Every Risk Scenario
  • 32. • The Risk Jury – after determining each scenario’s severity and likelihood as well as selecting among proposed countermeasures how it will be controlled, is able to establish all information required to place it accurately in the Risk Totem PoleTMTM . • Four options exist for controlling each scenario. The Risk Jury decides which option is applied to each scenario. ©VLG
  • 33. • The crowning feature of SMARTTM is its Risk Totem PoleTM – a ranked mathematical ordering of all identified risks. It is the product of collective Risk Jury decisions. • There will always be limited corporate resources for controlling risk losses. So every Risk Totem PoleTM is divided into two parts. • To assure that vital risk control resources are most cost-effectively invested, risk scenarios at the top of the pole are the most severe, most probable, and requiring the least expensive countermeasures to eliminate them. • A cutoff of funding in the pole marks the full expenditure of the loss prevention budget – thereby necessitating acceptance of risks of lesser consequence. • At the bottom of the Risk Totem PoleTM are risk scenarios that are least severe, least probable and most expensive to eliminate. ©VLG
  • 34. CUTOFFCUTOFF (subjective)(subjective) SMART Risk Totem Pole ©VLG TM TM CONTROLLEDCONTROLLED RisksRisks The Executive’s Gauge for Managing RiskThe Executive’s Gauge for Managing Risk ACCEPTEDACCEPTED RisksRisks
  • 35. TOWARDTOWARD Managed Risk!Managed Risk! • Managing risk systematically with foresight – as demonstrated by SMARTTM – provides a stable framework with a thorough array of foreseen risks that are ranked for cost-effective control. •It is time to be sensible, to organize, and to become systematic! Managing risk is not mysterious. Avoid clever clichés or bewitching buzzwords. •Above all, be prepared to successfully manage any and all potential risks that may emanate from Trump Administration changes! (Visit www.omegainc.com) ©VLG
  • 36. ATTAININGATTAINING Managed Risk!Managed Risk! •Managing risk will continue to be a challenge forManaging risk will continue to be a challenge for management.management. Risk can never be ignoredRisk can never be ignored – even– even when it is well controlled.when it is well controlled. •What would be required toWhat would be required to justifyjustify the conclusionthe conclusion that your organization had attained a state ofthat your organization had attained a state of managedmanaged risk?risk? • Uncertainty seems to drive or dominate so muchUncertainty seems to drive or dominate so much business in the world today. Terrorism appears tobusiness in the world today. Terrorism appears to have attained a permanent role throughout thehave attained a permanent role throughout the world. And, yes,world. And, yes, Trump has begun to upsetTrump has begun to upset previous expectancies of business and commerceprevious expectancies of business and commerce.. ©VLG
  • 37. ©VLG REFERENCE SOURCESREFERENCE SOURCES Further background and information on topics discussed in this webinar are available at www.omegainc.comwww.omegainc.com
  • 38. ISO 31000 Training Courses  ISO 31000 Introduction 1 Day Course  ISO 31000 Foundation 2 Days Course  ISO 31000 Risk Manager 3 Days Course  ISO 31000 Lead Risk Manager 5 Days Course Exam and certification fees are included in the training price. www.pecb.com | https://pecb.com/events