<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TPRM - DoubleCheck Software</title>
	<atom:link href="https://www.doublechecksoftware.com/category/tprm/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.doublechecksoftware.com</link>
	<description>Engage Your Enterprise</description>
	<lastBuildDate>Wed, 03 Jan 2024 20:29:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.5</generator>

<image>
	<url>https://www.doublechecksoftware.com/wp-content/uploads/2018/09/cropped-doublecheck-icon--32x32.png</url>
	<title>TPRM - DoubleCheck Software</title>
	<link>https://www.doublechecksoftware.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Four “Be Brave” Resolutions for GRC and ERM Programs in 2024</title>
		<link>https://www.doublechecksoftware.com/four-be-brave-resolutions-for-grc-and-erm-programs-in-2024/</link>
					<comments>https://www.doublechecksoftware.com/four-be-brave-resolutions-for-grc-and-erm-programs-in-2024/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 03 Jan 2024 20:29:07 +0000</pubDate>
				<category><![CDATA[Cyber Security Risk Management]]></category>
		<category><![CDATA[Enterprise Risk Management]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ERM]]></category>
		<category><![CDATA[erm software]]></category>
		<category><![CDATA[risk register]]></category>
		<category><![CDATA[TPRM Software]]></category>
		<guid isPermaLink="false">https://www.doublechecksoftware.com/?p=3728</guid>

					<description><![CDATA[<p>“Be Brave” Resolution #1 – Critique and Hone Your Risk Rating Scales All risk rating scales are not created equal. The new year is a good time to consider critiquing yours&#8230;and honing them, as advisable. Here are some thoughts for severity and likelihood rating scales: 1) Mere adjectival identifiers (e.g. high, rate etc.) are worthless,<a href="https://www.doublechecksoftware.com/four-be-brave-resolutions-for-grc-and-erm-programs-in-2024/">[...]</a></p>
<p>The post <a href="https://www.doublechecksoftware.com/four-be-brave-resolutions-for-grc-and-erm-programs-in-2024/">Four “Be Brave” Resolutions for GRC and ERM Programs in 2024</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong>“Be Brave” Resolution #1 – Critique and Hone Your Risk Rating Scales</strong></p>
<p>All risk rating scales are not created equal. The new year is a good time to consider critiquing yours&#8230;and honing them, as advisable.</p>
<p>Here are some thoughts for severity and likelihood rating scales:</p>
<p>1) Mere adjectival identifiers (e.g. high, rate etc.) are worthless, open to a multitude of individual interpretations. Instead, be brutally specific.</p>
<p>2) Consider allowing severity to be predicated on a variety of different indicators (e.g. financial impact, brand/reputation, regulatory, strategic etc.). Whatever column particularly lends itself to the risk in question &#8211; and best resonates with the risk owner &#8211; that&#8217;s how potential severity for that risk should be viewed.</p>
<p>3) Likelihood rating scales should not measure the chance of incurring any risk event (why worry about fender benders?) but, rather, the likelihood of a &#8220;significant&#8221; event (rated 3 or above), based upon the severity table that you formulate.</p>
<p>4) Customize your likelihood scales with absolute clarity. For instance an &#8220;almost certain&#8221; rating might expect a significant event once every year and, on the other end of the spectrum, a &#8220;rare&#8221; rating might project a significant event only once every 50 years. Focus on the likelihood a significant event and establish explicit temporal measures.</p>
<p>5) Rating scales can be equally applied to risks both before controls (inherent) and with controls in place (residual).</p>
<p>6) Risk results &#8211; the multiplicative product of severity and likelihood &#8211; is an eminently justifiable and understandable approach that melds together severity and likelihood, in order to put the combined ratings of all risks in your universe on an even playing field.</p>
<p><em>In summary: Break down your rating scales. Don&#8217;t be afraid to modify them. Don&#8217;t let &#8220;good enough&#8221; be good enough.</em></p>
<p> </p>
<p><strong>“Be Brave” Resolution #2 – Critically Evaluate Your Risk Register Reality</strong></p>
<p>Immediately investigate the possibility of implementing an automated risk register solution that is customized, straightforward, intuitive and pragmatic.</p>
<p><br />Consider leaving behind your current use-case, whether it consists of merely performing ERM by hand (e.g. excel spreadsheets) or trying to make-do by utilizing someone else&#8217;s application (e.g. audit, insurance company, claims handler) that is inflexible and ineffective.</p>
<p><br />Double-down on emphasizing the importance of the risk register to your ERM program by establishing one risk owner for every exposure in our universe and identifying and monitoring controls for each risk, by line of defense. With this ERM governance structure in place, roles and responsibilities will be defined, accountability expected and ERM risk culture will benefit.&#8221;</p>
<p>One possibility worth consideration: <a href="https://www.doublechecksoftware.com/products/risk/enterprise-risk-management-erm-one/">ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a> is a viable alternative for those: a) without an automated tool or b) saddled with someone else’s application.</p>
<p> </p>
<p><strong>“Be Brave” Resolution #3 &#8211; Think in Terms of 60-Second Blocks of Time</strong></p>
<p>Why 60 seconds? What are some actual tangible examples of why this strategy might work?</p>
<p>1) Develop ERM elevator speech #1 – a succinct one-minute summary of the strategic importance of ERM, an explanation that ties together the company’s key objectives to the iterative, tactical execution of risk management. You never know when you will need this. You are well served to be ready. Clear and simple, with conviction and passion.</p>
<p>2) Construct ERM elevator speech #2, of the same duration, encapsulating the key strategic ERM initiative of the moment (e.g. cyber risk, ESG etc.). There’s always a hot topic for ERM – that’s the beauty of the profession. Let your voice show the excitement. Revel in describing it.</p>
<p>3) On every single piece of written correspondence, force yourself to lead with a Summary or a Summary Recommendation paragraph that the reader can digest in one minute. No more than 225 words. Straight to the point. Make your best case. Don’t bury your key points at the end of a meandering e-mail. Captivate the audience up-front.</p>
<p>4) Use the entreaty “can I have one minute of your time on the phone?” via e-mail or text. If you have built a reasonable reputation, the person being beseeched will have a tough time refusing this request…do so judiciously and respectfully. Stick precisely to a minute – be uber-prepared as to what you are looking for.</p>
<p>Think 60 seconds.</p>
<p> </p>
<p><strong>Be Brave Resolution #4 – Focus on “Words Matter” and Actions Count” to Achieve GRC/ERM Excellence</strong></p>
<p><br />Two (2) maxims for ERM/GRC excellence &#8211; 1. <strong>&#8220;Words Matter&#8221;</strong> and 2. <strong>&#8220;Actions Count&#8221;</strong>. Hand-in-hand, this pair of principles drives ERM/GRC performance.</p>
<p><br />Here&#8217;s the reasoning:</p>
<p><strong>&#8221; Words Matter&#8221;</strong> &#8211; The disciplines of ERM and GRC demand precision. There is no room for inaccurate, nebulous, or empty wording. Ditto for jargon or obscure acronyms. Less is more. Get and give everything in writing. Record the chronology. Be explicit and date-specific in expectations. Hold to your deadlines. When in doubt, ask questions. Don&#8217;t assume anything. This world (of ERM/GRC) is far too important to merely guess. There is no place for the esoteric, academic or hypothetical. Total clarity is the byword, whether in establishing ERM/GRC context, laying down its foundational elements such as governance or culture or explicitly detailing the steps in tactical execution. Rating scales must have exact and rigorous definitions so there is no confusion. Language should be energetic and convincing. There&#8217;s a whole lot at stake, each and every single day.</p>
<p><strong>&#8220;Actions Count&#8221;</strong> &#8211; Thrive on the adjective &#8220;actionable&#8221; and the noun &#8220;deliverable&#8221;. How are you converting context, philosophy and strategy into tangible and decisive action? Does your ERM/GRC program stop at the ivory-tower, risk appetite level (e.g. high, medium, low) or does it drill down and manage to explicit tolerances, through the establishment of key risk indicators (KRIs)? What is the escalation provision associated with every exceedance of risk tolerance? Is the three lines of defense a conceptual diagram or an embedded, day-in-and-day-out demonstration of risk culture? Are risk ratings from deputized risk owners appropriately critiqued and challenged in order to ensure the validity of risk priority rankings?</p>
<p>Two ideas worth remembering on ERM/GRC &#8211; <em><strong>&#8220;Words Matter&#8221;</strong></em> and <em><strong>&#8220;Actions Count&#8221;</strong></em>.</p>
<p>About the Author:<br />Michael Cawley is a risk management executive with a 35-year record of broad and diversified accomplishment in the strategic and tactical elements of corporate enterprise risk management (ERM). He performed day-to-day development and execution of a risk management program that covered all elements in the identification, assessment, mitigation and monitoring of all exposures within the corporate risk universe. Specific experience involved being a corporate risk manager for a service-related conglomerate (15 years) and then a biopharmaceutical manufacturer (10 years) before assuming an ERM governance and disclosure leadership role (10 years, through 2021) for a major worldwide financial entity. Currently, Mike serves as a Subject Matter Expert (SME) in an advisory role for ERM Best Practices for the advancement of DoubleCheck’s new ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> application.</p>


<div class="wpforms-container wpforms-container-full" id="wpforms-116"><form id="wpforms-form-116" class="wpforms-validate wpforms-form" data-formid="116" method="post" enctype="multipart/form-data" action="/category/tprm/feed/" data-token="2ca617504c4b33862063030849e92e58" data-token-time="1777068081"><div class="wpforms-head-container"><div class="wpforms-title">Newsletter Signup</div><div class="wpforms-description">Interested in being informed when a new blog post is released?</div></div><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-field-container"><div id="wpforms-116-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><label class="wpforms-field-label" for="wpforms-116-field_0">Name <span class="wpforms-required-label">*</span></label><div class="wpforms-field-row wpforms-field-medium"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-116-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" required><label for="wpforms-116-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-116-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" required><label for="wpforms-116-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></div><div id="wpforms-116-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-116-field_1">Email <span class="wpforms-required-label">*</span></label><input type="email" id="wpforms-116-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" required></div>		<div id="wpforms-116-field_4-container"
			class="wpforms-field wpforms-field-text"
			data-field-type="text"
			data-field-id="4"
			>
			<label class="wpforms-field-label" for="wpforms-116-field_4" >Email Name Title</label>
			<input type="text" id="wpforms-116-field_4" class="wpforms-field-medium" name="wpforms[fields][4]" >
		</div>
		<div id="wpforms-116-field_2-container" class="wpforms-field wpforms-field-text" data-field-id="2"><label class="wpforms-field-label" for="wpforms-116-field_2">Company</label><input type="text" id="wpforms-116-field_2" class="wpforms-field-medium" name="wpforms[fields][2]" ></div><div id="wpforms-116-field_3-container" class="wpforms-field wpforms-field-text" data-field-id="3"><label class="wpforms-field-label" for="wpforms-116-field_3">Title</label><input type="text" id="wpforms-116-field_3" class="wpforms-field-medium" name="wpforms[fields][3]" ></div><script>
				( function() {
					const style = document.createElement( 'style' );

					style.appendChild( document.createTextNode( '#wpforms-116-field_4-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-116-field_4-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-116-field_4-container label { counter-increment: none; }' ) );
					document.head.appendChild( style );
					document.currentScript?.remove();
				} )();
			</script></div><!-- .wpforms-field-container --><div class="wpforms-field wpforms-field-hp"><label for="wpforms-116-field-hp" class="wpforms-field-label">Website</label><input type="text" name="wpforms[hp]" id="wpforms-116-field-hp" class="wpforms-field-medium"></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="116"><input type="hidden" name="page_title" value="TPRM"><input type="hidden" name="page_url" value="https://www.doublechecksoftware.com/category/tprm/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-116" class="wpforms-submit" data-alt-text="Sending..." data-submit-text="Keep Me Informed" aria-live="assertive" value="wpforms-submit">Keep Me Informed</button></div></form></div>  <!-- .wpforms-container --><p>The post <a href="https://www.doublechecksoftware.com/four-be-brave-resolutions-for-grc-and-erm-programs-in-2024/">Four “Be Brave” Resolutions for GRC and ERM Programs in 2024</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.doublechecksoftware.com/four-be-brave-resolutions-for-grc-and-erm-programs-in-2024/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3728</post-id>	</item>
		<item>
		<title>Why Settle For Less? Twenty (20) Elements in a World-Class ERM or GRC Program</title>
		<link>https://www.doublechecksoftware.com/why-settle-for-less-twenty-20-elements-in-a-world-class-erm-or-grc-program/</link>
					<comments>https://www.doublechecksoftware.com/why-settle-for-less-twenty-20-elements-in-a-world-class-erm-or-grc-program/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 13 Oct 2023 19:44:51 +0000</pubDate>
				<category><![CDATA[Audit Management]]></category>
		<category><![CDATA[Cyber Security Risk Management]]></category>
		<category><![CDATA[Enterprise Risk Management]]></category>
		<category><![CDATA[GRC Implementation Success]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ERM]]></category>
		<category><![CDATA[erm software]]></category>
		<category><![CDATA[GRC reports]]></category>
		<category><![CDATA[risk register]]></category>
		<category><![CDATA[Third Party Risk Management]]></category>
		<category><![CDATA[TPRM Software]]></category>
		<guid isPermaLink="false">https://www.doublechecksoftware.com/?p=3699</guid>

					<description><![CDATA[<p>A World-Class Enterprise Risk Management (ERM) or Governance, Risk and Compliance (GRC) program offers numerous benefits to organizations of all sizes and across various industries. Here are 20 key elements needed for the creation of an efficient, effective, and successful program: 1. Mission Statement Purposeful connection of strategy and tactics 2. Framework – Part A<a href="https://www.doublechecksoftware.com/why-settle-for-less-twenty-20-elements-in-a-world-class-erm-or-grc-program/">[...]</a></p>
<p>The post <a href="https://www.doublechecksoftware.com/why-settle-for-less-twenty-20-elements-in-a-world-class-erm-or-grc-program/">Why Settle For Less? Twenty (20) Elements in a World-Class ERM or GRC Program</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>A World-Class Enterprise Risk Management (ERM) or Governance, Risk and Compliance (GRC) program offers numerous benefits to organizations of all sizes and across various industries. Here are 20 key elements needed for the creation of an efficient, effective, and successful program:</p>
<p>1. Mission Statement</p>
<ul>
<li>Purposeful connection of strategy and tactics</li>
</ul>
<p>2. Framework – Part A</p>
<ul>
<li>Strategic context (“Who are you and what are you trying to achieve?”)</li>
<li>Without this, there is no reason for ERM or GRC</li>
</ul>
<p>3. Framework – Part B</p>
<ul>
<li>Foundational underpinning (Culture and Governance)</li>
<li>Connective tissue existing between strategy and tactics</li>
<li>Underlying essence; these foundations are in place at all times</li>
</ul>
<p>4. Framework – Part C</p>
<ul>
<li>Tactical Execution (4-Step iterative process: identify, assess, mitigate and monitor)</li>
</ul>
<p>5. Governance Structure</p>
<ul>
<li>Clear-cut roles and responsibilities</li>
<li>Best portrayal: Three lines of defense</li>
</ul>
<p>6. Universe</p>
<ul>
<li>4 categories – 3 common (&#8220;Finance&#8221;, &#8220;Operational&#8221; and &#8220;Strategic&#8221;) and 1 unique (“Core Business”)</li>
<li>Dynamic; encompasses emerging risks</li>
<li>Aligns with always-changing nature of risks themselves</li>
</ul>
<p>7. Rating Scales</p>
<ul>
<li>Understandable</li>
<li>Severity, likelihood, direction and velocity</li>
<li>Inherent and residual</li>
</ul>
<p>8. Policies</p>
<ul>
<li>Major risks (dozen or so)</li>
<li>Each comprised of: definition; goal; roles and responsibilities (1st/2nd/3rd lines); appetite; tolerances</li>
</ul>
<p>9. Language</p>
<ul>
<li>Succinct; simpler is better</li>
<li>Don’t throw in unnecessary phrases (“I was able to…”)</li>
<li>Precise; exact</li>
<li>Iterative; over and over</li>
<li>Powerful</li>
<li>One shot; on the mark; needs to resonate</li>
<li>Use present tense whenever possible (alive, here and now)</li>
<li>Pragmatic (understands dynamics, keeps big picture in mind)</li>
<li>Embedded and actionable</li>
<li>Positive (figure out a way, convince)</li>
<li>Purposeful and insistent</li>
<li>Rigorous and disciplined</li>
<li>Not merely esoteric, hypothetical or academic</li>
<li>Put away the pom-poms; self-praise is no praise</li>
</ul>
<p>10. Reporting</p>
<ul>
<li>Risk arrow heat map</li>
<li>Risk owner report</li>
</ul>
<p>11. Overall Cultural Model</p>
<ul>
<li>Code of ethics</li>
<li>What do your people do when no one is watching?</li>
<li>Behaviors you expect and tolerate</li>
</ul>
<p>12. Risk Culture</p>
<ul>
<li>Shared understanding towards risk</li>
</ul>
<p>13. Deputized Risk Owners</p>
<ul>
<li>Subject matter experts</li>
<li>Hold them accountable</li>
<li>Don’t be afraid to critique or challenge</li>
<li>Ensure that people are not just going through the motions (e.g. no changes year-to-year)</li>
<li>Educate them; understand this is not their day job</li>
<li>Depend upon them, and their perceptions, heavily</li>
<li>You are only as good as what they provide</li>
<li>Be respectful of their time</li>
</ul>
<p>14. Risk Owner Surveys</p>
<ul>
<li>Take the opportunity to ask special, “hot-button” questions each year</li>
<li>Don’t overdo it</li>
</ul>
<p>15. Risk Appetite</p>
<ul>
<li>High, medium, low</li>
<li>Tolerances – exact point at which appetite exceeded</li>
</ul>
<p>16. Configurability</p>
<ul>
<li>Collaborate with a vendor having a matching mindset</li>
</ul>
<p>17. The Fuel of Passion Fuel</p>
<ul>
<li>Get excited and stay excited</li>
<li>How many people have this opportunity?</li>
<li>Keep turning insights into actions</li>
<li>Don’t be dragged down by leanness of resources, staggering workload, sometimes-mundane nature of work or undervalued role by others</li>
</ul>
<p>18. The Importance of Pride</p>
<ul>
<li>No slouching</li>
<li>Do not accept a back seat</li>
<li>No sloppiness or mistakes should be tolerated; prompts the question &#8211; what else is wrong? How can I have confidence in anything?</li>
<li>It’s a huge job; don’t ever forget that</li>
<li>Keep the mission statement in mind</li>
<li>Cognizant of the overall framework that melds together strategic context and tactical execution</li>
</ul>
<p>19. Transferability to Other Risk-Related Areas</p>
<ul>
<li>Every single risk-related area could benefit by adhering to these 20 elements</li>
</ul>
<p>20. Risk Register</p>
<ul>
<li>Organizational (&#8220;tree&#8221;) view as well as workbench view</li>
<li>workbench for risk owners</li>
<li>doesn’t need to be exorbitant $</li>
<li>seemingly fashionable these days to downplay or disparage importance of the risk register</li>
<li><strong><a href="https://www.doublechecksoftware.com/products/risk/enterprise-risk-management-erm-one/">ERM One</a></strong> – a viable alternative to:
<ul>
<li>doing without an automated tool or</li>
<li>tolerating someone else’s system</li>
</ul>
</li>
</ul>
<p>Closing Thoughts:</p>
<ul>
<li>Get ready for the elevator speech</li>
<li>Trapped in the elevator with CEO and asked to give him/her your impressions of GRC/ERM priorities in 30 seconds</li>
<li>No excuses – take the time to do the dirty work beforehand</li>
<li>Connect the dots, dot by dot</li>
<li>Build the program, brick by brick</li>
<li>Bold, presumptuous goal (“World-Class”)?</li>
<li>Shoot for the moon; even if you miss, you’ll land among the stars</li>
<li>Common denominators</li>
<li>Better every day; better than yesterday</li>
<li>Incremental improvements</li>
<li>Keep attacking</li>
<li>Heed the children book classic &#8211; “Little Engine That Could”</li>
<li>Mission: reach the boys and girls on the other side of the mountain</li>
<li>When it found itself in trouble in trouble, neither a shiny new passenger engine, with all sorts of compartments, or a big strong engine was necessary</li>
<li>All that was needed was a little blue engine who “tugged and pulled”, “pulled and tugged”</li>
<li>“I think I can” was converted into “I thought I could”</li>
</ul>
<p>About the Author:<br />Michael Cawley is a risk management executive with a 35-year record of broad and diversified accomplishment in the strategic and tactical elements of corporate enterprise risk management (ERM). He performed day-to-day development and execution of a risk management program that covered all elements in the identification, assessment, mitigation and monitoring of all exposures within the corporate risk universe. Specific experience involved being a corporate risk manager for a service-related conglomerate (15 years) and then a biopharmaceutical manufacturer (10 years) before assuming an ERM governance and disclosure leadership role (10 years, through 2021) for a major worldwide financial entity. Currently, Mike serves as a Subject Matter Expert (SME) in an advisory role for ERM Best Practices for the advancement of DoubleCheck’s new ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> application.</p>


<div class="wpforms-container wpforms-container-full" id="wpforms-116"><form id="wpforms-form-116" class="wpforms-validate wpforms-form" data-formid="116" method="post" enctype="multipart/form-data" action="/category/tprm/feed/" data-token="2ca617504c4b33862063030849e92e58" data-token-time="1777068082"><div class="wpforms-head-container"><div class="wpforms-title">Newsletter Signup</div><div class="wpforms-description">Interested in being informed when a new blog post is released?</div></div><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-field-container"><div id="wpforms-116-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><label class="wpforms-field-label" for="wpforms-116-field_0">Name <span class="wpforms-required-label">*</span></label><div class="wpforms-field-row wpforms-field-medium"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-116-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" required><label for="wpforms-116-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-116-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" required><label for="wpforms-116-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></div><div id="wpforms-116-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-116-field_1">Email <span class="wpforms-required-label">*</span></label><input type="email" id="wpforms-116-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" required></div><div id="wpforms-116-field_2-container" class="wpforms-field wpforms-field-text" data-field-id="2"><label class="wpforms-field-label" for="wpforms-116-field_2">Company</label><input type="text" id="wpforms-116-field_2" class="wpforms-field-medium" name="wpforms[fields][2]" ></div>		<div id="wpforms-116-field_4-container"
			class="wpforms-field wpforms-field-text"
			data-field-type="text"
			data-field-id="4"
			>
			<label class="wpforms-field-label" for="wpforms-116-field_4" >Email Company Name</label>
			<input type="text" id="wpforms-116-field_4" class="wpforms-field-medium" name="wpforms[fields][4]" >
		</div>
		<div id="wpforms-116-field_3-container" class="wpforms-field wpforms-field-text" data-field-id="3"><label class="wpforms-field-label" for="wpforms-116-field_3">Title</label><input type="text" id="wpforms-116-field_3" class="wpforms-field-medium" name="wpforms[fields][3]" ></div><script>
				( function() {
					const style = document.createElement( 'style' );

					style.appendChild( document.createTextNode( '#wpforms-116-field_4-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-116-field_4-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-116-field_4-container label { counter-increment: none; }' ) );
					document.head.appendChild( style );
					document.currentScript?.remove();
				} )();
			</script></div><!-- .wpforms-field-container --><div class="wpforms-field wpforms-field-hp"><label for="wpforms-116-field-hp" class="wpforms-field-label">Name</label><input type="text" name="wpforms[hp]" id="wpforms-116-field-hp" class="wpforms-field-medium"></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="116"><input type="hidden" name="page_title" value="TPRM"><input type="hidden" name="page_url" value="https://www.doublechecksoftware.com/category/tprm/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-116" class="wpforms-submit" data-alt-text="Sending..." data-submit-text="Keep Me Informed" aria-live="assertive" value="wpforms-submit">Keep Me Informed</button></div></form></div>  <!-- .wpforms-container --><p>The post <a href="https://www.doublechecksoftware.com/why-settle-for-less-twenty-20-elements-in-a-world-class-erm-or-grc-program/">Why Settle For Less? Twenty (20) Elements in a World-Class ERM or GRC Program</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.doublechecksoftware.com/why-settle-for-less-twenty-20-elements-in-a-world-class-erm-or-grc-program/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3699</post-id>	</item>
		<item>
		<title>De-Mystifying (and Explaining the Connection Between) Risk-Related Acronyms and Phrases</title>
		<link>https://www.doublechecksoftware.com/de-mystifying-and-explaining-the-connection-between-risk-related-acronyms-and-phrases/</link>
					<comments>https://www.doublechecksoftware.com/de-mystifying-and-explaining-the-connection-between-risk-related-acronyms-and-phrases/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 13:07:25 +0000</pubDate>
				<category><![CDATA[Audit Management]]></category>
		<category><![CDATA[Cyber Security Risk Management]]></category>
		<category><![CDATA[Enterprise Risk Management]]></category>
		<category><![CDATA[GRC Implementation Success]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity software]]></category>
		<category><![CDATA[ERM]]></category>
		<category><![CDATA[erm software]]></category>
		<category><![CDATA[risk register]]></category>
		<category><![CDATA[Third Party Risk Management]]></category>
		<category><![CDATA[TPRM Software]]></category>
		<guid isPermaLink="false">https://www.doublechecksoftware.com/?p=3671</guid>

					<description><![CDATA[<p>One acronym after another. An ice cream headache, for sure, trying to understand the similarities, differences and connectivity between all these terms. You need to do it, however. Simplify, simplify, simplify. Break it down and truly comprehend everything. Get ready for the proverbial elevator speech, if the need for one materializes. Toward that goal, here<a href="https://www.doublechecksoftware.com/de-mystifying-and-explaining-the-connection-between-risk-related-acronyms-and-phrases/">[...]</a></p>
<p>The post <a href="https://www.doublechecksoftware.com/de-mystifying-and-explaining-the-connection-between-risk-related-acronyms-and-phrases/">De-Mystifying (and Explaining the Connection Between) Risk-Related Acronyms and Phrases</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>One acronym after another.</p>
<p>An ice cream headache, for sure, trying to understand the similarities, differences and connectivity between all these terms.</p>
<p>You need to do it, however.</p>
<p>Simplify, simplify, simplify.</p>
<p>Break it down and truly comprehend everything.</p>
<p>Get ready for the proverbial elevator speech, if the need for one materializes.</p>
<p>Toward that goal, here are several recommendations:</p>
<ol>
<li><strong>Establish Enterprise Risk Management (ERM) as Your North Star</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul>
<li>This is not meant to diminish or disparage other acronyms but merely to state an undeniable fact that needs to be accepted.</li>
<li>ERM is the granddaddy of them all.</li>
<li>Every component of all other risk-related acronyms or topics emanates from ERM or the framework established around ERM (Risk Management Framework).</li>
<li>In other words, the world revolves around ERM.</li>
<li>If you don’t like that fact, get over it.</li>
<li>Get on with the business of managing risk.</li>
</ul>
</li>
</ul>
<ol start="2">
<li><strong>Don’t: Quibble, Be Smarter by Half, or Get Hypothetical, Esoteric or Academic with your Language</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul>
<li><span style="color: initial;">Every word matters.</span></li>
<li>Take no chances.</li>
<li>Leave nothing up in the air.</li>
<li>Use precision in all matters in such an important discipline.</li>
<li>Several useless debates, for example:</li>
</ul>
</li>
</ul>
<ol>
<li style="list-style-type: none;">
<ol>
<li style="list-style-type: none;">
<ol>
<li>Three Lines of Defense vs Three Lines of Responsibility. Use the former.</li>
<li>ERM vs Integrated Risk Management (IRM). Use the former.</li>
<li>ERM vs Strategic Risk Management. Use the former.</li>
</ol>
</li>
</ol>
</li>
</ol>
<ol start="3">
<li><strong>It’s All About the Risks, Stupid</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul>
<li>I say this with affection, and as a reminder to myself, as much as to others.</li>
<li>Easy to lose sight of.</li>
<li>Treat risks as if you are bare-naked; do not rely on the safety blanket of insurance.</li>
<li>Remember: in the long-term, you will pay all your losses.</li>
<li>Another way of saying this: if a company had the financial wherewithal, it could (and should) self-insure all risks. No insurers, no brokers – just risk managers.</li>
<li>Imagine that.</li>
<li>GULP!<strong style="font-size: revert; color: initial;"> </strong></li>
</ul>
</li>
</ul>
<ol start="4">
<li><strong>The Risk Register</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul>
<li>It can also be termed a Risk Universe; that’s OK</li>
<li>It’s not, however, a Risk Taxonomy (ouch, that sounds painful) or a Risk Catalog (when did we end up in the library?)</li>
<li>Call it Severity, not Impact, so that everyone in the organization is on the same page.</li>
<li>Define Severity in multiple ways, Using a 1-5 Rating Scale (e.g. Financial (% of Capital), Brand/Reputation, Regulatory Intervention, Strategic)</li>
<li>For the same reason, call it Likelihood, not Frequency.</li>
<li>Define Likelihood in a temporal manner, using a 1-5 Rating Scale (e.g. significant event happening every one, 5, 10, 25 and 50 years)</li>
<li>Bottom line: the fewer terms you use and the more rock solid certain those terms and definitions are, the better</li>
</ul>
</li>
</ul>
<ol start="5">
<li><strong>ERM vs GRC</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul>
<li>GRC is a well-accepted, more bite-sized, subset of ERM, plain and simple.</li>
<li>The R (Risk) in both acronyms is identical – refers to ERM</li>
<li>The C in GRC is Compliance, an operational risk in the ERM risk register as well as one of the foundational components (Culture and Ethics) of ERM</li>
<li>Finally, G refers to both Corporate Governance, an ERM Operational risk, as well as to another ERM Foundational component, namely Governance. There, the various roles and responsibilities in the ERM equation are definitively laid out (e.g. Three Lines of Defense)</li>
</ul>
</li>
</ul>
<ol start="6">
<li><strong>ERM vs Compliance</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul>
<li><span style="color: initial;">As stated above, the C refers to Compliance, an operational risk in the ERM risk register</span></li>
<li>There is nothing to prevent the Compliance function from deciding to further break down that exposure into sub-risks, in order to better delineate and manage on a more granular basis. (The last company I worked for broke down Compliance into 62 such sub-risks)</li>
</ul>
</li>
</ul>
<ol start="7">
<li><strong>ERM vs Internal Audit</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul>
<li><span style="color: initial;">Internal Audit plays a vital 3</span><sup style="color: initial;">rd</sup><span style="color: initial;"> Line of Defense role in all risk matters</span></li>
<li>Audit Planning should align with risk priorities</li>
<li>Certain risks on the ERM risk register are more logically tied to Audit (e.g. Fraud); Head of Internal Audit could, in fact, be risk owner for those exposures</li>
</ul>
</li>
</ul>
<ol start="8">
<li><strong>ERM vs ESG</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul>
<li><span style="color: initial;">The G (Governance) in ESG has already been covered, within ERM.</span></li>
<li>The S (Social) in ESG can be tracked to the ERM foundational component of Culture (Overall Cultural Model, Ethics and Compliance).</li>
<li>E, for Environmental, will align with the Climate Risk particulars enumerated on the ERM risk register.</li>
</ul>
</li>
</ul>
<ol start="9">
<li><strong>ERM vs DEI</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul>
<li>There is not a more important risk related acronym on the horizon today than DEI (Diversity, Equity and Inclusiveness)</li>
<li>Start before you are ready on this – just get going.</li>
<li>If it needs improving, do so tomorrow from the base of today.</li>
<li>All of these items (DEI) need to be embedded in your Cultural Model, a vital ERM foundational component.</li>
<li>A crucial ERM risk like Human Resources – Management Development needs to be appropriately expanded and honed to yield the type of organization you want. How do you develop diverse talent, then grow and mentor them?</li>
<li>You need to operationalize DEI throughout the culture of the organization.</li>
<li>Set up key risk indicators (KRIs) in your ERM risk register to allow you to monitor – and constantly improve – your controls.</li>
<li>Like ERM, DEI is an iterative, evergreen process.</li>
</ul>
</li>
</ul>
<p>About the Author:<br />Michael Cawley is a risk management executive with a 35-year record of broad and diversified accomplishment in the strategic and tactical elements of corporate enterprise risk management (ERM). He performed day-to-day development and execution of a risk management program that covered all elements in the identification, assessment, mitigation and monitoring of all exposures within the corporate risk universe. Specific experience involved being a corporate risk manager for a service-related conglomerate (15 years) and then a biopharmaceutical manufacturer (10 years) before assuming an ERM governance and disclosure leadership role (10 years, through 2021) for a major worldwide financial entity. Currently, Mike serves as a Subject Matter Expert (SME) in an advisory role for ERM Best Practices for the advancement of DoubleCheck’s new ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> application.</p>
<p> </p>


<div class="wpforms-container wpforms-container-full" id="wpforms-116"><form id="wpforms-form-116" class="wpforms-validate wpforms-form" data-formid="116" method="post" enctype="multipart/form-data" action="/category/tprm/feed/" data-token="2ca617504c4b33862063030849e92e58" data-token-time="1777068082"><div class="wpforms-head-container"><div class="wpforms-title">Newsletter Signup</div><div class="wpforms-description">Interested in being informed when a new blog post is released?</div></div><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-field-container"><div id="wpforms-116-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><label class="wpforms-field-label" for="wpforms-116-field_0">Name <span class="wpforms-required-label">*</span></label><div class="wpforms-field-row wpforms-field-medium"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-116-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" required><label for="wpforms-116-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-116-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" required><label for="wpforms-116-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></div><div id="wpforms-116-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-116-field_1">Email <span class="wpforms-required-label">*</span></label><input type="email" id="wpforms-116-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" required></div><div id="wpforms-116-field_2-container" class="wpforms-field wpforms-field-text" data-field-id="2"><label class="wpforms-field-label" for="wpforms-116-field_2">Company</label><input type="text" id="wpforms-116-field_2" class="wpforms-field-medium" name="wpforms[fields][2]" ></div>		<div id="wpforms-116-field_4-container"
			class="wpforms-field wpforms-field-text"
			data-field-type="text"
			data-field-id="4"
			>
			<label class="wpforms-field-label" for="wpforms-116-field_4" >Name Company Email</label>
			<input type="text" id="wpforms-116-field_4" class="wpforms-field-medium" name="wpforms[fields][4]" >
		</div>
		<div id="wpforms-116-field_3-container" class="wpforms-field wpforms-field-text" data-field-id="3"><label class="wpforms-field-label" for="wpforms-116-field_3">Title</label><input type="text" id="wpforms-116-field_3" class="wpforms-field-medium" name="wpforms[fields][3]" ></div><script>
				( function() {
					const style = document.createElement( 'style' );

					style.appendChild( document.createTextNode( '#wpforms-116-field_4-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-116-field_4-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-116-field_4-container label { counter-increment: none; }' ) );
					document.head.appendChild( style );
					document.currentScript?.remove();
				} )();
			</script></div><!-- .wpforms-field-container --><div class="wpforms-field wpforms-field-hp"><label for="wpforms-116-field-hp" class="wpforms-field-label">Message</label><input type="text" name="wpforms[hp]" id="wpforms-116-field-hp" class="wpforms-field-medium"></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="116"><input type="hidden" name="page_title" value="TPRM"><input type="hidden" name="page_url" value="https://www.doublechecksoftware.com/category/tprm/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-116" class="wpforms-submit" data-alt-text="Sending..." data-submit-text="Keep Me Informed" aria-live="assertive" value="wpforms-submit">Keep Me Informed</button></div></form></div>  <!-- .wpforms-container -->



<p></p><p>The post <a href="https://www.doublechecksoftware.com/de-mystifying-and-explaining-the-connection-between-risk-related-acronyms-and-phrases/">De-Mystifying (and Explaining the Connection Between) Risk-Related Acronyms and Phrases</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.doublechecksoftware.com/de-mystifying-and-explaining-the-connection-between-risk-related-acronyms-and-phrases/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3671</post-id>	</item>
		<item>
		<title>Governance, Risk and Compliance (GRC) &#8211; Pursuing the “Ideal” Frame of Reference</title>
		<link>https://www.doublechecksoftware.com/governance-risk-and-compliance-grc-pursuing-the-ideal-frame-of-reference/</link>
					<comments>https://www.doublechecksoftware.com/governance-risk-and-compliance-grc-pursuing-the-ideal-frame-of-reference/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 31 Jul 2023 18:21:16 +0000</pubDate>
				<category><![CDATA[Audit Management]]></category>
		<category><![CDATA[Enterprise Risk Management]]></category>
		<category><![CDATA[GRC Implementation Success]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[ERM]]></category>
		<category><![CDATA[erm software]]></category>
		<category><![CDATA[GRC reports]]></category>
		<guid isPermaLink="false">https://www.doublechecksoftware.com/?p=3634</guid>

					<description><![CDATA[<p>When it comes to any discussion involving the acronym GRC (Governance, Risk and Compliance), understanding the speaker’s frame of reference is paramount. From a vendor’s perspective, GRC refers to an automated suite of capabilities designed to address a broad range of challenges associated with critical disciplines managed by the client (e.g. compliance, risk management, audit,<a href="https://www.doublechecksoftware.com/governance-risk-and-compliance-grc-pursuing-the-ideal-frame-of-reference/">[...]</a></p>
<p>The post <a href="https://www.doublechecksoftware.com/governance-risk-and-compliance-grc-pursuing-the-ideal-frame-of-reference/">Governance, Risk and Compliance (GRC) – Pursuing the “Ideal” Frame of Reference</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>When it comes to any discussion involving the acronym GRC (Governance, Risk and Compliance), understanding the speaker’s frame of reference is paramount.</p>
<p>From a vendor’s perspective, GRC refers to an automated suite of capabilities designed to address a broad range of challenges associated with critical disciplines managed by the client (e.g. compliance, risk management, audit, corporate governance etc.), allowing that same company to reduce uncertainty, achieve the entity’s key strategic objectives and meet its stakeholder obligations.</p>
<p>Again, that perspective on GRC, which sounds straightforward enough, is being viewed through the eyes of the vendor.</p>
<p>Probably the same for every vendor, right?</p>
<p>Not so fast.</p>
<p>More holistically, would it be identical to how the client defines GRC?</p>
<p>Another no.</p>
<p>Let’s look at the delineating factors.</p>
<p>From a vendor perspective, what comprises each individual GRC system is totally dependent upon each vendor.</p>
<p>Simply put, not all systems are created with identical features.</p>
<p>The rationale is straightforward and understandable.</p>
<p>Look no further than the broad construct of the GRC umbrella – consisting of risk, compliance and a final element of governance that, drilling down to more specific risks, can be incredibly broad and wide-ranging (e.g. audit, corporate governance oversight, policy management, fraud, model, ESG, AI etc.).</p>
<p>It’s not hard to understand how the inevitable differences in system emphasis and packaging could (and do) result.</p>
<p>As a consequence, the GRC marketplace has found itself flooded with competing vendor-centric solutions, each seemingly in search of the next, new GRC challenge.</p>
<p>A skeptic could argue that each successive GRC solution becomes more inflexible, costly, complex and/or esoteric than the prior one.</p>
<p>With all these drivers, the “ask” of the GRC client often becomes to:</p>
<ul>
<li>Accept a system that is unwieldy and inflexible</li>
<li>Tolerate system features that you don’t need</li>
<li>Sacrifice other elements that you (or your Board of Directors) really want</li>
<li>Endure a bevy of reports, scorecards etc. that are neither pertinent nor understandable</li>
<li>Tolerate service standards that seem average, at best</li>
</ul>
<p>Needless to say, this is not really music to the client’s ears.</p>
<p>From a client’s perspective, therefore, the pursuit of a GRC solution all too often narrows to a choice that is best termed as “one-size-fits-all” or “take-it-or-leave-it”.</p>
<p>That’s not the way it’s supposed to be, if you roll back the tape and try to comprehend what GRC means, at the 40,000 foot level.  Maybe it’s time to take all this in and perform a sanity check of your GRC system.<br />After all, system capabilities and design should be all about the client.</p>
<p>With that in mind, how does a client think about GRC and, as a result, how should the vendor “ideally” design the system to meet those client needs?</p>
<p style="font-weight: 400;">First, the basic governing premise for GRC needs to be established, as follows:</p>
<p style="font-weight: 400;"><strong><em>The profound, pervasive and vitally important challenges that drive GRC emanate from the company, not from the vendor.</em></strong></p>
<p style="font-weight: 400;">This principle, which always has been, and always will be, true, cannot be overstated.</p>
<p>It’s not about forcing the client to perform contortions – and sacrifice functionality – to align with an inflexible, rigid tool.</p>
<p><em>As a 35-year real-life practitioner in the GRC space (25 years as a corporate risk manager and 10 years in the ERM Governance and Disclosure world), <strong>I know whereof I speak</strong>.</em></p>
<p>While the concept of GRC is said to have been created over 20 years ago (2002), the underlying challenges actually constituting those GRC exposures <strong>have been around forever</strong>.</p>
<p>They were certainly there in front of me on my first day as a risk manager in 1985, well before that “umbrella” concept of GRC was “created” and/or the first automated tool was developed.</p>
<p>Having said that, and mindful that there is no one “best” prescribed system or solution, it can be stated with certainty that a GRC automated tool should possess the following attributes:</p>
<ul>
<li>Capable of evolving and growing over time</li>
<li>Potential upgrades should be straightforward</li>
<li>Solution must be dynamic, nimble and agile</li>
<li>As such, it should be configurable</li>
<li>Can be either modular or holistic</li>
<li>Data must be able to be shared across modules</li>
<li>There needs to be cross-functional coordination</li>
<li>The system must be unified and linkable</li>
<li>There should be rich, robust functionality</li>
<li>The system needs to understand the business context of the company (what it does) as well as its culture and stakeholders</li>
<li>GRC strategy must be aligned with the overall business objectives</li>
<li>The tactical execution for each of the constituent parts of the GRC automated application must be part of the tool</li>
<li>Monitoring of GRC system performance must involve a robust, fully-embedded business intelligence platform</li>
</ul>
<p>With all these features in hand, a unified approach to GRC capabilities within the overall solution should allow a company to leverage GRC information across the enterprise.</p>
<p>By linking key elements across risk, compliance, audit and corporate governance (as well as related disciplines), the solution should be able to streamline processes and maximize utilization of information dashboard and analytics that cross boundaries.</p>
<p>Similarly, linked solutions reduce overlap, share overall insight, reuse work and tackle siloed GRC responses while securing what’s private.</p>
<p>A representative listing of GRC system activities might be, as follows:</p>
<p>Compliance</p>
<ul>
<li>Document controls, assess performance, manage exceptions</li>
<li>Tools to manage regulatory change and document compliance framework</li>
<li>Test or assess performance, manage remediation and share status results with stakeholders</li>
<li>Financial (SOX, PCI); Industry (NERC, HIPAA); Departmental (HR, IT)</li>
<li>Approvals, Attestations, and Certifications</li>
</ul>
<p>Risk</p>
<ul>
<li>Systematic approach to identify, assess, mitigate and monitor risks</li>
<li>Centers on risk register</li>
<li>Empower Risk Owners to manage and assess their own topic risk set</li>
<li>Goal is to collaborate with risk owners and other internal and external associates in a clear and transparent manner</li>
<li>Board-level reports and scorecards should be available to be generated in order to assess performance and establish risk priorities</li>
</ul>
<p>Audit</p>
<ul>
<li>Program definition based on client-specific reporting</li>
<li>Management insight into audit execution and planning</li>
<li>Management review, overrides to final plan</li>
<li>Engagement planning</li>
<li>Electronic workpaper management</li>
<li>Issue and remediation management</li>
</ul>
<p>Governance</p>
<ul>
<li>Policy definition</li>
<li>Policy review and renewal</li>
<li>Demonstrable performance</li>
</ul>
<p>Other GRC-Related Activities</p>
<ul>
<li>Model risk surveys, including reliance on Artificial Intelligence (AI)</li>
<li>Fraud-risk studies</li>
<li>Cyber risk (information security)</li>
</ul>
<p>Summary</p>
<p>An “ideal” GRC solution revolves around specific customer needs. Enterprise GRC software that supports Compliance, Risk, Audit or Governance needs should be highly configurable solutions that can be tailored to a company’s users, data and processes. Embedded Business intelligence features should generate dashboards and reports that are needed for internal and external purposes. GRC Solutions should support business processes, not the other way around. Each of the components of GRC are integrally linked to the achievement of a company’s corporate objectives.</p>
<p>About the Author:<br />Michael Cawley is a risk management executive with a 35-year record of broad and diversified accomplishment in the strategic and tactical elements of corporate enterprise risk management (ERM). He performed day-to-day development and execution of a risk management program that covered all elements in the identification, assessment, mitigation and monitoring of all exposures within the corporate risk universe. Specific experience involved being a corporate risk manager for a service-related conglomerate (15 years) and then a biopharmaceutical manufacturer (10 years) before assuming an ERM governance and disclosure leadership role (10 years, through 2021) for a major worldwide financial entity. Currently, Mike serves as a Subject Matter Expert (SME) in an advisory role for ERM Best Practices for the advancement of DoubleCheck’s new ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> application.</p>


<div class="wpforms-container wpforms-container-full" id="wpforms-116"><form id="wpforms-form-116" class="wpforms-validate wpforms-form" data-formid="116" method="post" enctype="multipart/form-data" action="/category/tprm/feed/" data-token="2ca617504c4b33862063030849e92e58" data-token-time="1777068082"><div class="wpforms-head-container"><div class="wpforms-title">Newsletter Signup</div><div class="wpforms-description">Interested in being informed when a new blog post is released?</div></div><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-field-container"><div id="wpforms-116-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><label class="wpforms-field-label" for="wpforms-116-field_0">Name <span class="wpforms-required-label">*</span></label><div class="wpforms-field-row wpforms-field-medium"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-116-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" required><label for="wpforms-116-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-116-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" required><label for="wpforms-116-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></div><div id="wpforms-116-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-116-field_1">Email <span class="wpforms-required-label">*</span></label><input type="email" id="wpforms-116-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" required></div>		<div id="wpforms-116-field_4-container"
			class="wpforms-field wpforms-field-text"
			data-field-type="text"
			data-field-id="4"
			>
			<label class="wpforms-field-label" for="wpforms-116-field_4" >Name Company Email</label>
			<input type="text" id="wpforms-116-field_4" class="wpforms-field-medium" name="wpforms[fields][4]" >
		</div>
		<div id="wpforms-116-field_2-container" class="wpforms-field wpforms-field-text" data-field-id="2"><label class="wpforms-field-label" for="wpforms-116-field_2">Company</label><input type="text" id="wpforms-116-field_2" class="wpforms-field-medium" name="wpforms[fields][2]" ></div><div id="wpforms-116-field_3-container" class="wpforms-field wpforms-field-text" data-field-id="3"><label class="wpforms-field-label" for="wpforms-116-field_3">Title</label><input type="text" id="wpforms-116-field_3" class="wpforms-field-medium" name="wpforms[fields][3]" ></div><script>
				( function() {
					const style = document.createElement( 'style' );

					style.appendChild( document.createTextNode( '#wpforms-116-field_4-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-116-field_4-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-116-field_4-container label { counter-increment: none; }' ) );
					document.head.appendChild( style );
					document.currentScript?.remove();
				} )();
			</script></div><!-- .wpforms-field-container --><div class="wpforms-field wpforms-field-hp"><label for="wpforms-116-field-hp" class="wpforms-field-label">Comment</label><input type="text" name="wpforms[hp]" id="wpforms-116-field-hp" class="wpforms-field-medium"></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="116"><input type="hidden" name="page_title" value="TPRM"><input type="hidden" name="page_url" value="https://www.doublechecksoftware.com/category/tprm/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-116" class="wpforms-submit" data-alt-text="Sending..." data-submit-text="Keep Me Informed" aria-live="assertive" value="wpforms-submit">Keep Me Informed</button></div></form></div>  <!-- .wpforms-container --><p>The post <a href="https://www.doublechecksoftware.com/governance-risk-and-compliance-grc-pursuing-the-ideal-frame-of-reference/">Governance, Risk and Compliance (GRC) – Pursuing the “Ideal” Frame of Reference</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.doublechecksoftware.com/governance-risk-and-compliance-grc-pursuing-the-ideal-frame-of-reference/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3634</post-id>	</item>
		<item>
		<title>The Compelling Case for an ERM Mission Statement</title>
		<link>https://www.doublechecksoftware.com/the-compelling-case-for-an-erm-mission-statement/</link>
					<comments>https://www.doublechecksoftware.com/the-compelling-case-for-an-erm-mission-statement/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 10 Mar 2023 14:52:43 +0000</pubDate>
				<category><![CDATA[Cyber Security Risk Management]]></category>
		<category><![CDATA[Enterprise Risk Management]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[ERM]]></category>
		<category><![CDATA[erm software]]></category>
		<category><![CDATA[mission statement]]></category>
		<category><![CDATA[risk register]]></category>
		<guid isPermaLink="false">https://www.doublechecksoftware.com/?p=3475</guid>

					<description><![CDATA[<p>Risk is best defined as the “effect of uncertainty on the achievement of objectives.” The successful management of risk, therefore, is integrally connected to the achievement of the company’s strategic objectives. Enterprise Risk Management (ERM) is an essential discipline that all companies need to install, embed, and inculcate into the organization, in order to: Set<a href="https://www.doublechecksoftware.com/the-compelling-case-for-an-erm-mission-statement/">[...]</a></p>
<p>The post <a href="https://www.doublechecksoftware.com/the-compelling-case-for-an-erm-mission-statement/">The Compelling Case for an ERM Mission Statement</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong>Risk is best defined as the “effect of uncertainty on the achievement of objectives.” </strong></p>
<p>The successful management of risk, therefore, is integrally connected to the achievement of the company’s strategic objectives.</p>
<p>Enterprise Risk Management (ERM) is an essential discipline that all companies need to install, embed, and inculcate into the organization, in order to:</p>
<ul>
<li>Set risk priorities and actionable resource allocation.</li>
<li>Uncover organizational weaknesses.</li>
<li>Expose hidden, value-add opportunities to exploit.</li>
<li>Assure the active and continuous process surrounding the management of risks, since the universe of company risks doesn’t manage itself.</li>
<li>Enable the timely flow of risk information to all company stakeholders</li>
<li>Gain support from organizational leadership (people with a true and holistic view of company) since those individuals are the key decision-makers who establish budgets and allocate resources.</li>
</ul>
<p>As a vital first step towards the establishment of a robust and meaningful ERM program, all companies should develop and agree upon a <strong>mission statement</strong> for that critically-important discipline of ERM, one that:</p>
<ul>
<li>Explains the here-and-now (not aspirational) purpose of ERM</li>
<li>Centers on actionability, not empty buzzwords or jargon</li>
<li>Is succinctly expressed, intent upon inspiring understanding, consensus and transparency</li>
<li>Combines ERM strategy with its tactical execution</li>
</ul>
<p>To address all those points, how about considering adoption of this concise mission statement, one that ties together the “what” with the “why” of ERM?</p>
<p><strong>“Enterprise Risk Management (<em>ERM) is the process to identify, assess, mitigate and monitor all enterprise-wide risks that might impair the company’s ability to achieve its strategic business objectives.”</em></strong></p>
<p>Every word matters in this ERM mission statement. It is boiled-down, simpler-is-better, with eyes always on the ERM “reason-for-being”.</p>
<p>Specially, the ultimate goals of the ERM mission statement are to:</p>
<ul>
<li>ensure ERM is given its full importance within the organization, not perceived as an adjunct to other corporate functions, like Compliance or Internal Audit</li>
<li>establish ERM as a pragmatic and usable regimen, not some stand-alone, academic hypothesis, to realize its maximum impact</li>
<li>pinpoint the risk register – covering the universe of all enterprise-wide risks &#8211; as the centerpiece and starting point of all ERM activity</li>
<li>underline the iterative, four-step tactical execution process (identification, assessment, mitigation and monitoring) associated with ERM and that company risk register universe</li>
<li>meld together the ultimate strategic importance of ERM in ensuring that the attainment of key high-level company objectives (e.g. earnings performance, capital adequacy, liquidity, reputation) are best promoted</li>
</ul>
<p><strong>Quite simply, the engine that drives a powerful ERM mission statement is the risk register.</strong></p>
<p>Toward that end, <a href="https://bit.ly/3Jorpsn">ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a> is a revolutionary, yet straightforward, risk register application the DoubleCheck LLC has, over time, been privileged to learn from its clients.&nbsp; <a href="https://bit.ly/3Jorpsn">ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a> is out-of-the-box tool that delivers an integrated ERM process together with a comprehensive, high-level categorization of exposures (Financial, Core Business, Operational and Strategic), fully loaded with over 60 pre-populated risks to be used as a starting point for the risk register.</p>
<p>In short, <a href="https://bit.ly/3Jorpsn">ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a> incorporates into one, intuitive turn-key risk register product the best-practices tools and content to help optimize ERM and thereby put your firm on a path to achieving its strategic business objectives.</p>
<p>About the Author:</p>
<p>Michael Cawley is a risk management executive with a 35 year record of broad and diversified accomplishment in the strategic and tactical elements of corporate enterprise risk management (ERM). He performed day-to-day development and execution of a risk management program that covered all elements in the identification, assessment, mitigation and monitoring of all exposures within the corporate risk universe. Specific experience involved being a corporate risk manager for a service-related conglomerate (15 years) and then a biopharmaceutical manufacturer (10 years) before assuming an ERM governance and disclosure leadership role (10 years, through 2021) for a major worldwide financial entity. Currently, Mike serves as a Subject Matter Expert (SME) in an advisory role for ERM Best Practices for the advancement of DoubleCheck’s new ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> application.</p>


<div class="wpforms-container wpforms-container-full" id="wpforms-116"><form id="wpforms-form-116" class="wpforms-validate wpforms-form" data-formid="116" method="post" enctype="multipart/form-data" action="/category/tprm/feed/" data-token="2ca617504c4b33862063030849e92e58" data-token-time="1777068082"><div class="wpforms-head-container"><div class="wpforms-title">Newsletter Signup</div><div class="wpforms-description">Interested in being informed when a new blog post is released?</div></div><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-field-container"><div id="wpforms-116-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><label class="wpforms-field-label" for="wpforms-116-field_0">Name <span class="wpforms-required-label">*</span></label><div class="wpforms-field-row wpforms-field-medium"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-116-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" required><label for="wpforms-116-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-116-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" required><label for="wpforms-116-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></div><div id="wpforms-116-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-116-field_1">Email <span class="wpforms-required-label">*</span></label><input type="email" id="wpforms-116-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" required></div>		<div id="wpforms-116-field_4-container"
			class="wpforms-field wpforms-field-text"
			data-field-type="text"
			data-field-id="4"
			>
			<label class="wpforms-field-label" for="wpforms-116-field_4" >Email Title Company</label>
			<input type="text" id="wpforms-116-field_4" class="wpforms-field-medium" name="wpforms[fields][4]" >
		</div>
		<div id="wpforms-116-field_2-container" class="wpforms-field wpforms-field-text" data-field-id="2"><label class="wpforms-field-label" for="wpforms-116-field_2">Company</label><input type="text" id="wpforms-116-field_2" class="wpforms-field-medium" name="wpforms[fields][2]" ></div><div id="wpforms-116-field_3-container" class="wpforms-field wpforms-field-text" data-field-id="3"><label class="wpforms-field-label" for="wpforms-116-field_3">Title</label><input type="text" id="wpforms-116-field_3" class="wpforms-field-medium" name="wpforms[fields][3]" ></div><script>
				( function() {
					const style = document.createElement( 'style' );

					style.appendChild( document.createTextNode( '#wpforms-116-field_4-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-116-field_4-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-116-field_4-container label { counter-increment: none; }' ) );
					document.head.appendChild( style );
					document.currentScript?.remove();
				} )();
			</script></div><!-- .wpforms-field-container --><div class="wpforms-field wpforms-field-hp"><label for="wpforms-116-field-hp" class="wpforms-field-label">Name</label><input type="text" name="wpforms[hp]" id="wpforms-116-field-hp" class="wpforms-field-medium"></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="116"><input type="hidden" name="page_title" value="TPRM"><input type="hidden" name="page_url" value="https://www.doublechecksoftware.com/category/tprm/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-116" class="wpforms-submit" data-alt-text="Sending..." data-submit-text="Keep Me Informed" aria-live="assertive" value="wpforms-submit">Keep Me Informed</button></div></form></div>  <!-- .wpforms-container -->



<p></p><p>The post <a href="https://www.doublechecksoftware.com/the-compelling-case-for-an-erm-mission-statement/">The Compelling Case for an ERM Mission Statement</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.doublechecksoftware.com/the-compelling-case-for-an-erm-mission-statement/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3475</post-id>	</item>
		<item>
		<title>Risk Management In A Down Economy</title>
		<link>https://www.doublechecksoftware.com/risk-management-in-a-down-economy/</link>
					<comments>https://www.doublechecksoftware.com/risk-management-in-a-down-economy/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 02 Feb 2023 21:29:38 +0000</pubDate>
				<category><![CDATA[Cyber Security Risk Management]]></category>
		<category><![CDATA[Enterprise Risk Management]]></category>
		<category><![CDATA[TPRM]]></category>
		<guid isPermaLink="false">https://www.doublechecksoftware.com/?p=3437</guid>

					<description><![CDATA[<p>One of the biggest challenges to risk management programs, including cyber risk, arises from imposed belt tightening when economic downturns constrict funding and other resources. We’ve all been there from one time or another. All your efforts to re-evaluate risk management program needs, gaps, and improvements to further your maturity and completeness are derailed when<a href="https://www.doublechecksoftware.com/risk-management-in-a-down-economy/">[...]</a></p>
<p>The post <a href="https://www.doublechecksoftware.com/risk-management-in-a-down-economy/">Risk Management In A Down Economy</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>One of the biggest challenges to risk management programs, including cyber risk, arises from imposed belt tightening when economic downturns constrict funding and other resources. We’ve all been there from one time or another. All your efforts to re-evaluate risk management program needs, gaps, and improvements to further your maturity and completeness are derailed when funding and other resource allocation priorities leave you with far less to work with than hoped for or planned. However, this isn’t an “all-or-none” situation. When economic conditions require companies to constrict spending, it&#8217;s an opportunity to adjust risk management’s focus, and sharpen some processes and practices nearer to home. There’s great value to be gained through this approach, as it leaves little room for waste or excess in its execution. Let’s take a look at some best practices to follow.</p>



<p><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color"><strong>Turn Your Focus Inward</strong></mark><br>Many researchers and cyber experts point out that internal risks are often found to be the root cause for serious breaches and cyber incidents. This is also the case for many operational incidents and events. Frankly, such concerns also fall well within your risk program’s ability to manage and mitigate. Also, they often fall within the realm of matters where operating controls you can influence will address such risk opportunities. The scope of internal focus is broader than you might perceive at first consideration. Included in this category are staff, of course, but also processes, policies, internal audit findings and recommendations, operating metrics, tools, education, and communication. This is not an exhaustive list and depending upon your line of business there may be even more. Moreover, fine tuning or upgrading controls addressing these business processes and practices are often economical to determine and execute—relying upon current resources and staff and as a result, not necessarily as seriously impacted by corporate belt tightening that may have deferred staff expansions, or other resource costs.</p>



<p><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color"><strong>Revisit Insider Risks</strong></mark><br>How often have incident investigations lead to determinations of internal root causes, specifically through the actions of insiders? Insiders may be staff, or contractors performing services within your organization. The recent FAA “event” that shut down domestic air travel nationwide is a current example of a reported error by an internal contractor. Insider risks need to consider how you detect and address actions that are intentional and accidental. Do your critical processes have steps to catch malicious or accentual errors that would result in serious loss of services? I recall often asking software development groups if they had a staging server setup that always mirrored current production. Making changes to that environment, loading new products, etc., was a great step to prove an apparently well tested and documented change would, in fact, flow into the production environment without causing disruption. Many groups resisted this as unnecessary, until, upon detailed review, it was often disclosed that there were “helper” or supporting bits of code or other resource configuration adjustments, not in production, that were needed to accompany any live implementation. The extra step of implementing into a staging server prevented a lot of downtime and lost confidence in products, as well as lost revenue, by this seemingly “over-cautious” change in practice.</p>



<p>The incidental or accidental risks associated with insider threats are often addressed through training and communication. These programs are likely already in place, but often left out of consideration for regular attention and upgrade. Is the content of your staff training really current to your technology, processes and policies? How often is it reviewed? What did your most recent risk assessment tell you about the strength and validity of your training efforts? Likewise, how do you promote and communicate policy and process changes? Are they well documented? Can users easily identify and source current versions? What controls are in place to assure critical staff are kept current? These are often not expensive matters to monitor and control, nor to fine tune and update where needed. And this is a great time to refocus attention looking inward at them to do so.</p>


<div class="wp-block-image">
<figure class="alignright"><img fetchpriority="high" decoding="async" width="277" height="300" src="https://www.doublechecksoftware.com/wp-content/uploads/2023/02/Feb-COBox1.png-1-277x300.jpg" alt="" class="wp-image-3446" srcset="https://www.doublechecksoftware.com/wp-content/uploads/2023/02/Feb-COBox1.png-1-277x300.jpg 277w, https://www.doublechecksoftware.com/wp-content/uploads/2023/02/Feb-COBox1.png-1-139x150.jpg 139w, https://www.doublechecksoftware.com/wp-content/uploads/2023/02/Feb-COBox1.png-1.jpg 683w" sizes="(max-width: 277px) 100vw, 277px" /></figure></div>


<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Sharpen Your Tools</mark></strong><br>Great cooks and chefs alike know that sharp tools are safer than dull ones. This practice generalizes well to many business practices, including risk management. Take a good, hard look at your risk management systems and supporting tools. Are they current? Have you maintained control set updates, standards, reporting software, policy repositories, linkages to related systems for internal audit, distributing assessments, and whatever else you may use to assess, detect, mitigate and monitor risk? Are you using old software on older hardware that might gain efficiencies or performance upgrades by a modest upgrade in either, or both? Have you outgrown the old systems, found maintenance fees excessive and might you gain efficiencies and functionality through something new offered through an “as-a-service” arrangement? How about the reports you produce? Do they answer critical business questions? How well do they keep your leadership informed about risk? Do they help executives examine and re-assess their risk appetite as business conditions change? What key information might you provide to do this better, and, will your current tools produce the data you need in a form you can utilize in your reporting?</p>



<p>Looking back at the analogy to cooking tools, do you have more knives than you need, and equally important, do you have the right ones? Risk management systems built by cobbling together many pieces intended for other applications, but offered over to help “make due” don’t offer economic operating solutions. And keeping big, overly complex solutions that don’t serve the needs of today are like trying to use a cleaver when you need a paring knife to do detail work. The result is clumsy, inefficient, ineffective, and often prone to waste and error. Sometimes, the acquisition of something new, incorporated with the retirement of something already in place, can yield financial and operating economies. Such opportunities, where they may be present, offer rich gains to your program and the overall management of risk across your enterprise. Examine the tools, but also the processes they require to make them work, and any additional steps, supporting practices and materials needed to perform risk assessments, detect risks, events, and anomalies, and to analyze findings that you can report and discuss in meaningful business context. For example, can you distribute access to risk assessment content, gather results, aggregate findings, and produce reports all within one platform’s framework of services, or do you have to string together a number of separate services, and manage those connections manually, to make the whole system work? Factor in the staff resources needed to do that, because they could be assigned to other duties yielding more meaningful and valuable outcomes if not otherwise occupied with keeping a series of plates spinning.</p>



<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Outsource Services</mark></strong><br>Many executives firmly believe outsourced services are economical compared to internal operations. And, in many cases, this may be a valid approach to working through times in a down turning economy. Risk management, and cyber risk in particular are important functions for any company, but rarely are the core competencies or services offered to their clients and customers. For example, banks and other financial services institutions all promote security as core aspects of their services, but at their root, offer money, investments, insurance, or other financial products to their customers. Their core competency lies with those financial services, with security, (and risk management by inference) as value adds to their product and service features. Security may be a discriminating feature or a particular promotional benefit, but mortgages often sell on their interest rates and fee structures, not security, which is often presumed to be in place. If you are relying upon a burdensome, aging, and difficult to operate enterprise risk management (ERM) platform, that consumes a lot of resources just to perform the basics, you may be positioned to reap economies of service, staff resources, and even finances by outsourcing your tools to an as-a-service platform provider. Today it is common to outsource aspects of security and risk management technologies where significant expertise is needed to configure and maintain them, such as data loss prevention (DLP), network, and other monitoring and data analysis services. It’s also now possible to operate your ERM platform as a cloud based service hosted by a third party. This reduces your dependence upon centralized IT resources, and any need to duplicate them locally in your operation. Technical training burdens, upgrade management, maintenance and support costs are all off loaded to an expense for a third party vendor.</p>



<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Strengthen Third Party Management</mark></strong><br>There is some low hanging fruit to be harvested from careful, thoughtful third party risk management (TPRM). Much of it pertains to linking risk assessment to your third parties, and even more from careful monitoring of contract terms and conditions. Incorporating key suppliers into your risk assessments makes your assessment more complete, and reflective of your true risk footprint. Keep in mind that loss of a key supplier without adequate backup options, or using one whose security provisions don’t match your company, industry, regulatory, or contractual obligations, is a very risky, and potentially expensive move. A good ERM platform should be able to assist your monitoring and performance of both. Factor that into your plans for risk management. Also, make sure you are tracking when payments are due, opportunities for discounts, obligations to provide material or services in support of the supplier’s services, and other contract terms. Keep in mind that TPRM is an internal process, often tied closely to procurement. But it also has lines into finance, audit, compliance, and fulfillment that can lead to many dollars expensed or saved depending on how well it’s managed.</p>



<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Opportunity Is Always There</mark></strong><br>An economic downturn is a challenge. It’s also an opportunity to look inward and refine what works, and address what doesn’t. You can use it to take stock of what is done well and what improvements, within the scope of services and processes that “really need to be done” can be made with the resources at hand, or new ones that can economically upgrade or replace them. It would be wise to focus upon essentials. By identifying those, you can also see where some process, activity, or service pruning may be possible, without sacrificing the quality and scope of your risk program. Risk does not recognize a down economy; rather it takes advantage of one and feeds off the convenient moves managers make without consideration for their consequences. Your risk program can help draw a map pointing out the obstacles and dangers in the waters, offering guidance to executives to help them navigate a down economy safely with a sound enterprise equipped to address whatever comes its way.</p>



<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">How can ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> help?</mark></strong><br>ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> is a DoubleCheck offering uniquely positioned to help address the challenges of risk management in a down economy. It incorporates into one intuitive, turnkey application the best-practices tools and content to help optimize the crucial discipline of Enterprise Risk Management (ERM) and thereby put your firm on a path to achieving its strategic business objectives. DoubleCheck fully understands and supports the merits of ERM and the benefits of its adoption by all companies.</p>



<p>ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> centers on the successful implementation of that ERM mission statement.<br>Although ERM does enjoys general theoretical support as an important business discipline, it has become undeniably evident to DoubleCheck that there are shortcomings in ERM acceptance and program structure. Challenges range from no ERM platform in place all the way to a complex and inflexible infrastructure in effect but one that is not delivering as effectively and efficiently as needed. DoubleCheck has concluded that the time has come for a responsive, alternative solution. With the design and rollout of ERM One, DoubleCheck is stepping in to fill these voids in a unique, get-it-done manner.</p>



<p>ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> adheres to ERM best practices and, very importantly, presents a risk register system that has been preconfigured and prepopulated in a manner not before seen in the GRC marketplace. DoubleCheck has structured the tool in a modular manner, with options available to add incremental GRC functions or advanced business intelligence (BI) capabilities to extend functionality. Further, services and features are highly integrated into one package. Reporting is embedded rather than independently aligned to content and processes, making the risk management practice a seamless effort rather than a disjointed one.</p>



<p>About the Author:<br>Simon Goldstein is an accomplished senior executive blending both technology and business expertise to formulate, impact, and achieve corporate strategies. A retired senior manager of Accenture’s IT Security and Risk Management practice, he has achieved results through the creation of customer value, business growth, and collaboration. An experienced change agent with primary experience in financial, technology, and retail industries, he’s led efforts to achieve ISO2700x certification and HIPAA compliance, as well as held credentials of CRISC, CISM, CISA.</p>



<div class="wpforms-container wpforms-container-full" id="wpforms-116"><form id="wpforms-form-116" class="wpforms-validate wpforms-form" data-formid="116" method="post" enctype="multipart/form-data" action="/category/tprm/feed/" data-token="2ca617504c4b33862063030849e92e58" data-token-time="1777068082"><div class="wpforms-head-container"><div class="wpforms-title">Newsletter Signup</div><div class="wpforms-description">Interested in being informed when a new blog post is released?</div></div><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-field-container"><div id="wpforms-116-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><label class="wpforms-field-label" for="wpforms-116-field_0">Name <span class="wpforms-required-label">*</span></label><div class="wpforms-field-row wpforms-field-medium"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-116-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" required><label for="wpforms-116-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-116-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" required><label for="wpforms-116-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></div><div id="wpforms-116-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-116-field_1">Email <span class="wpforms-required-label">*</span></label><input type="email" id="wpforms-116-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" required></div>		<div id="wpforms-116-field_4-container"
			class="wpforms-field wpforms-field-text"
			data-field-type="text"
			data-field-id="4"
			>
			<label class="wpforms-field-label" for="wpforms-116-field_4" >Company Title Name</label>
			<input type="text" id="wpforms-116-field_4" class="wpforms-field-medium" name="wpforms[fields][4]" >
		</div>
		<div id="wpforms-116-field_2-container" class="wpforms-field wpforms-field-text" data-field-id="2"><label class="wpforms-field-label" for="wpforms-116-field_2">Company</label><input type="text" id="wpforms-116-field_2" class="wpforms-field-medium" name="wpforms[fields][2]" ></div><div id="wpforms-116-field_3-container" class="wpforms-field wpforms-field-text" data-field-id="3"><label class="wpforms-field-label" for="wpforms-116-field_3">Title</label><input type="text" id="wpforms-116-field_3" class="wpforms-field-medium" name="wpforms[fields][3]" ></div><script>
				( function() {
					const style = document.createElement( 'style' );

					style.appendChild( document.createTextNode( '#wpforms-116-field_4-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-116-field_4-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-116-field_4-container label { counter-increment: none; }' ) );
					document.head.appendChild( style );
					document.currentScript?.remove();
				} )();
			</script></div><!-- .wpforms-field-container --><div class="wpforms-field wpforms-field-hp"><label for="wpforms-116-field-hp" class="wpforms-field-label">Email</label><input type="text" name="wpforms[hp]" id="wpforms-116-field-hp" class="wpforms-field-medium"></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="116"><input type="hidden" name="page_title" value="TPRM"><input type="hidden" name="page_url" value="https://www.doublechecksoftware.com/category/tprm/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-116" class="wpforms-submit" data-alt-text="Sending..." data-submit-text="Keep Me Informed" aria-live="assertive" value="wpforms-submit">Keep Me Informed</button></div></form></div>  <!-- .wpforms-container --><p>The post <a href="https://www.doublechecksoftware.com/risk-management-in-a-down-economy/">Risk Management In A Down Economy</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.doublechecksoftware.com/risk-management-in-a-down-economy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3437</post-id>	</item>
		<item>
		<title>Annual Tune-Up Time For Your Risk Management Program</title>
		<link>https://www.doublechecksoftware.com/annual-tune-up-time-for-your-risk-management-program/</link>
					<comments>https://www.doublechecksoftware.com/annual-tune-up-time-for-your-risk-management-program/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 03 Jan 2023 17:47:25 +0000</pubDate>
				<category><![CDATA[Cyber Security Risk Management]]></category>
		<category><![CDATA[Enterprise Risk Management]]></category>
		<category><![CDATA[GRC Implementation Success]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[ERM]]></category>
		<category><![CDATA[risk register]]></category>
		<guid isPermaLink="false">https://www.doublechecksoftware.com/?p=3273</guid>

					<description><![CDATA[<p>Like cars, whose investment and value we protect and preserve with regular annual maintenance at the least, your GRC and risk management processes and tools require careful regular service to preserve and extend their value and utility. Business environments are fluid.  Change is a reliable variable from one year to another. Your business may have<a href="https://www.doublechecksoftware.com/annual-tune-up-time-for-your-risk-management-program/">[...]</a></p>
<p>The post <a href="https://www.doublechecksoftware.com/annual-tune-up-time-for-your-risk-management-program/">Annual Tune-Up Time For Your Risk Management Program</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Like cars, whose investment and value we protect and preserve with regular annual maintenance at the least, your GRC and risk management processes and tools require careful regular service to preserve and extend their value and utility. Business environments are fluid.  Change is a reliable variable from one year to another. Your business may have expanded, or contracted.  You may be offering new products or services, or have engaged new partnerships, suppliers, or service providers.  Your contract portfolio may have new obligations, performance requirements, or deadlines.  Regulations may have changed, or perhaps your business has, and so now falls within scope of some regulatory oversight you were not obliged to address in the past.  There may be other differences between your last fiscal year and the present. So, how do you go about performing a tune-up for your risk management practices?  Let’s explore that in more detail.</p>
<p><strong>Start With The Risk Register</strong></p>
<p>Your risk register is at the foundational core of your program. It’s the compass and map of your program. If it’s no longer complete, nor aligned to your business, your ability to effectively manage risk across your lines of business will falter.  Examine its detail.  <img decoding="async" class=" wp-image-3272 alignright" src="https://www.doublechecksoftware.com/wp-content/uploads/2023/01/CO1-Jan-1-300x207.png" alt="" width="268" height="185" srcset="https://www.doublechecksoftware.com/wp-content/uploads/2023/01/CO1-Jan-1-300x207.png 300w, https://www.doublechecksoftware.com/wp-content/uploads/2023/01/CO1-Jan-1-1024x705.png 1024w, https://www.doublechecksoftware.com/wp-content/uploads/2023/01/CO1-Jan-1-150x103.png 150w, https://www.doublechecksoftware.com/wp-content/uploads/2023/01/CO1-Jan-1-768x529.png 768w, https://www.doublechecksoftware.com/wp-content/uploads/2023/01/CO1-Jan-1.png 1120w" sizes="(max-width: 268px) 100vw, 268px" />Does it still account for all the operations, services, practices, commitments and obligations the business has in place or plans to enact in the year approaching? Were there audit or regulator reviews that pointed out issues you can monitor by adjusting details in your risk register?  Have you expanded the number of third parties you rely upon to deliver services and products to your customers?  Have other stakeholders requested information you haven’t collected and evaluated because there’s a gap related in your register?  Look back at the process you went through to create your register initially.  Repeat that effort to ascertain the risk register detail is as complete as needed for your business as it stands now.  Then examine your business goals for 2023.  Are there any further changes needed?  Keeping your risk register in top condition, and well-polished is a vital first step.</p>
<p><strong>Policies and Procedures</strong></p>
<p>A dynamic business and risk program needs current policies and procedures to govern its efforts. Policies take the most work to adjust, given the lengthy approval process many businesses employ.  Procedures need to reflect the “how” of work to be done.  Often, policies grow out of new requirements, new business obligations, or changes in laws or regulations. Procedures need to align with policy. They must also describe methods and practices crafted to deliver outcomes to achieve useful work, within the proscribed policy guidance. Too often, resistance to change, performing tasks one way because “that’s the way it’s always been done” can cause procedures to fall out of alignment with policy.  Worse, that process inertia can cause issues with regulatory and contractual compliance obligations, which are likely to be more fluid and dynamic over time. Process inertia’s opposite twin, process acceleration, occurs where changes are made on the fly to address an exceptional event, and then become instantiated going forward.  In these cases, they distort what the business needs and how it needs to operate.  Both situations create risks.  There may be metrics you normally use to measure process effectiveness.  It’s useful to have threshold values associated with such metrics.   Below threshold outcomes may be indicative of process inertia, while excessively high values might indicate acceleration.  Look back to your risk register again.  How is it incorporating process related risks into its content?  It’s important to assure your register doesn’t ignore process risk opportunity.</p>
<p><strong>Workflows And Risk Assessment</strong></p>
<p>When you tune something, it’s important to examine your tools to make sure they are also operating correctly.  This helps you prevent introducing anomalies as an outcome of their detection and correction.  Examine your workflow schemes, whether manual or automated.  Has your organization, reporting structure, or assigned subject matter experts changed since your last assessment?  Did your escalation practices, where present, trigger in efficient timeframes to the right levels of leadership? Did you experience bottlenecks that can now be remedied by adjusting workflow configurations, timing, direction?</p>
<p>Also, look at your recent risk assessment and any post mortem notes you might have on process feedback. Are there refinements to participant training that you may make? Are your risk scoring methods clear to participants and providing useful information to analytics? Were communications to stakeholders specific, clear, and timed to inform the process and keep it moving effectively forward? What problems occurred along the way and what might you do to address them in your next cycle?</p>
<p><strong>Gap Analyses</strong></p>
<p>Gap analyses seem to be a practice analogous to a skeleton key.  No matter the situation, there’s always room to evaluate where you are, compared to some target state, i.e., where you want to be. They’ve been around under many names and presented as part of many processes.  Simply put they are about measuring how far away from some planned for or worked toward state your current situation may be.  If you’ve developed metrics along the way to measure your risk management process effectiveness this may be a really simple and quantitative process.  If you haven’t such metrics, you’ll need to be a bit more qualitative. Don’t leave your desired target state out of your review.  Is it still realistic or not aggressive enough?  How does it align with your company’s risk appetite, stance regarding compliance, and regulatory performance? Are there new metrics that would help you measure and monitor “gap performance” in the future?  Does your current process produce the data you’ll need to calculate those metrics?  So many questions to consider.</p>
<p><strong>Integration With Audit, Compliance, Operations And More…</strong></p>
<p>Quality risk management programs do not exist in a vacuum! As part of your tune-up, take a look at how well your risk program incorporates data from other processes, while delivering information to inform the efforts of other disciplines throughout your company.  Meeting contractual compliance and regulatory obligations can have a financial, operational, and reputational impact.  Does your risk program contribute to understanding and measuring these risks?  Have internal and external audit findings been used as a data validation for your risk scores where findings and remediation were reported?  You’re your risk program inform audit processes of areas for scrutiny? From a leadership perspective have your program leaders from risk management met with peers in audit, legal, operations, and regulatory compliance to discuss what can be done to leverage your combined efforts to the greatest value for your company, while working to reduce overlapping or redundant efforts that pose unnecessary demands upon participants and other stakeholders? While it’s useful to have such meetings on a regular basis, at least quarterly reviews should pay a dividend in efficiency while maximizing data value and process refinements.</p>
<p><strong>Reporting</strong></p>
<p>Good reports answer specific questions with clarity.  Great ones also do so, while inspiring additional questions whose answers provide useful, actionable direction and deeper understanding for executive leadership. Do you have good reports?  What would make them great?  What questions have your leaders asked that current reports do not answer?  What answers do you provide now to questions nobody asks?  Too much reporting is not good reporting.  When someone tells you they need to “know everything” it’s a sign of poor leadership.  They do not understand the key drivers of their business, and mask that by asking for “everything” in the hopes such volumes of reporting will provide answers to any question or circumstance that may occur. It’s inefficient, wasteful of resources, and ineffective.  One of the great values a risk management program can offer is guidance on what matters, and what does not.  Pointing out key metrics, and demonstrating why they are important to monitor, within a proscribed range of values, can help leadership learn to use risk management data effectively.  Doing so can cascade over to other management practices and lead to more efficient data gathering and reporting practices companywide.</p>
<p><strong>Tuning While Operating</strong></p>
<p>This is a great time of year to begin the process of performing your tune-up.  Business is focused upon a new calendar year, new goals, new initiatives, and eyes and minds are focused upon the horizon ahead. Factor the tune-up tasks into your risk management calendar.  Take advantage of low hanging fruit, tasks easily accomplished quickly and with minimal resources.  Identify ones you can do on the fly as you prep for an assessment or other activity.  These will be less disruptive than other larger ones.  And finally, plan for changes that are larger, require more resources, and commitments from others outside your own domain of control. By planning and distributing your tune-up tasks across your program calendar, you make the changes easier for participants to adapt and make the appearance of the volume of change seem lighter and simpler than if they were all gathered together into a single mass to be absorbed and understood by all affected.  This approach may also make the cooperation of other areas easier to gain, both for simple requests and ones requiring larger commitments of resources if and when necessary.</p>
<p><strong>When Your Tune-Up Efforts Say It’s Time For Something New</strong></p>
<p>Many years ago, I worked with another manager who performed a study about maintaining corporate vehicle fleets.  The task was to understand when it was optimal to stop repairing vehicles as they aged, and simply replace them instead.  His exploration was exhaustive, and the results, at first glance, surprising.  From a purely financial viewpoint the answer was “never.”  It was always cheaper to fix than replace. But his analysis did not stop there.  When downtime, repair frequency, process, and transportation disruptions, among other features were taken into consideration, a very different answer, a more definitive duration, became clear.  This study is now over 30 years old, and the result then was, as my dimming long term memory recalls it, about 8 years.  But that’s not the point.  Taken wholistically, there comes a time when things, processes, machines, and such, no matter how well maintained, are better replaced than continuing to band-aid them together for “one more round.”  Once you’ve done noting all the things needed for your tune-up of your risk management process, it’s also time to take an objective look at how much work it needs to continue to provide the services and value expected from risk management.  Change is more than time and materials for a discreet few doing the work. It may also incorporate re-education, work arounds to accomplish tasks that cannot be supported directly.  Deferring very useful processes or steps because your current system can’t support them, or requiring participants in assessments or other stakeholders to do more manually, or worse, just “do without” because of limitations in your tools or technology is not an effective risk management strategy.</p>
<p>If your tune-up needs are becoming more of an overhaul than refinement, you may be reaching that place where something new is the more effective, efficient, and over time more cost effective approach to extensive repair and shouldering increasingly complex burdens to keep the old systems functional.  Looking back to that fleet replacement study, you may find yourself in a place where continued extensive repair may no longer be the best approach for your business or your risk management program.  Taking that long hard look is an important aspect of the tune-up process.  As your new year begins, look well upon the vehicles you’ll ride into the year, and choose wisely!</p>
<p>About the Author:<br />Simon Goldstein is an accomplished senior executive blending both technology and business expertise to formulate, impact, and achieve corporate strategies. A retired senior manager of Accenture’s IT Security and Risk Management practice, he has achieved results through the creation of customer value, business growth, and collaboration. An experienced change agent with primary experience in financial, technology, and retail industries, he’s led efforts to achieve ISO2700x certification and HIPAA compliance, as well as held credentials of CRISC, CISM, CISA.</p>


<div class="wpforms-container wpforms-container-full" id="wpforms-116"><form id="wpforms-form-116" class="wpforms-validate wpforms-form" data-formid="116" method="post" enctype="multipart/form-data" action="/category/tprm/feed/" data-token="2ca617504c4b33862063030849e92e58" data-token-time="1777068082"><div class="wpforms-head-container"><div class="wpforms-title">Newsletter Signup</div><div class="wpforms-description">Interested in being informed when a new blog post is released?</div></div><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-field-container"><div id="wpforms-116-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><label class="wpforms-field-label" for="wpforms-116-field_0">Name <span class="wpforms-required-label">*</span></label><div class="wpforms-field-row wpforms-field-medium"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-116-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" required><label for="wpforms-116-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-116-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" required><label for="wpforms-116-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></div><div id="wpforms-116-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-116-field_1">Email <span class="wpforms-required-label">*</span></label><input type="email" id="wpforms-116-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" required></div>		<div id="wpforms-116-field_4-container"
			class="wpforms-field wpforms-field-text"
			data-field-type="text"
			data-field-id="4"
			>
			<label class="wpforms-field-label" for="wpforms-116-field_4" >Company Email Title</label>
			<input type="text" id="wpforms-116-field_4" class="wpforms-field-medium" name="wpforms[fields][4]" >
		</div>
		<div id="wpforms-116-field_2-container" class="wpforms-field wpforms-field-text" data-field-id="2"><label class="wpforms-field-label" for="wpforms-116-field_2">Company</label><input type="text" id="wpforms-116-field_2" class="wpforms-field-medium" name="wpforms[fields][2]" ></div><div id="wpforms-116-field_3-container" class="wpforms-field wpforms-field-text" data-field-id="3"><label class="wpforms-field-label" for="wpforms-116-field_3">Title</label><input type="text" id="wpforms-116-field_3" class="wpforms-field-medium" name="wpforms[fields][3]" ></div><script>
				( function() {
					const style = document.createElement( 'style' );

					style.appendChild( document.createTextNode( '#wpforms-116-field_4-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-116-field_4-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-116-field_4-container label { counter-increment: none; }' ) );
					document.head.appendChild( style );
					document.currentScript?.remove();
				} )();
			</script></div><!-- .wpforms-field-container --><div class="wpforms-field wpforms-field-hp"><label for="wpforms-116-field-hp" class="wpforms-field-label">Message</label><input type="text" name="wpforms[hp]" id="wpforms-116-field-hp" class="wpforms-field-medium"></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="116"><input type="hidden" name="page_title" value="TPRM"><input type="hidden" name="page_url" value="https://www.doublechecksoftware.com/category/tprm/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-116" class="wpforms-submit" data-alt-text="Sending..." data-submit-text="Keep Me Informed" aria-live="assertive" value="wpforms-submit">Keep Me Informed</button></div></form></div>  <!-- .wpforms-container --><p>The post <a href="https://www.doublechecksoftware.com/annual-tune-up-time-for-your-risk-management-program/">Annual Tune-Up Time For Your Risk Management Program</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.doublechecksoftware.com/annual-tune-up-time-for-your-risk-management-program/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3273</post-id>	</item>
		<item>
		<title>Your Embedded ERM Infrastructure May Have Become A Risk Enabler…What You Can Do About It</title>
		<link>https://www.doublechecksoftware.com/your-embedded-erm-infrastructure-may-have-become-a-risk-enablerwhat-you-can-do-about-it/</link>
					<comments>https://www.doublechecksoftware.com/your-embedded-erm-infrastructure-may-have-become-a-risk-enablerwhat-you-can-do-about-it/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 02 Dec 2022 15:22:53 +0000</pubDate>
				<category><![CDATA[Cyber Security Risk Management]]></category>
		<category><![CDATA[Enterprise Risk Management]]></category>
		<category><![CDATA[TPRM]]></category>
		<guid isPermaLink="false">https://www.doublechecksoftware.com/?p=3221</guid>

					<description><![CDATA[<p>Enterprise software has a reputation for strength, resilience, and robust capabilities that enable it to fulfill all the expectations of management and lead to solid justification for the expense of staff resources, time, and treasure needed to establish its presence. Or so the story goes. This is the sales pitch, and candidly, it’s sometimes what<a href="https://www.doublechecksoftware.com/your-embedded-erm-infrastructure-may-have-become-a-risk-enablerwhat-you-can-do-about-it/">[...]</a></p>
<p>The post <a href="https://www.doublechecksoftware.com/your-embedded-erm-infrastructure-may-have-become-a-risk-enablerwhat-you-can-do-about-it/">Your Embedded ERM Infrastructure May Have Become A Risk Enabler…What You Can Do About It</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Enterprise software has a reputation for strength, resilience, and robust capabilities that enable it to fulfill all the expectations of management and lead to solid justification for the expense of staff resources, time, and treasure needed to establish its presence. Or so the story goes. This is the sales pitch, and candidly, it’s sometimes what does happen. Whether it’s an enterprise resource planning (ERP) system, a Customer Relationship Management (CRM) offering, an enterprise risk management (ERM) system or any one of a number of other categories of enterprise-in-scope integrated software solutions, there is much more to delivering the promise than making a purchase, installing the software and marveling at the delivered wonders. And the problems often begin with the buyers and the “process” they use to make purchase decisions.</p>
<p><strong><span style="color: #3366ff;">It Begins With Problems, Issues, Needs, and Requirements</span></strong><br />No one just decides to invest in enterprise software. There must be an identified issue or problem, which is expressed as a need. That need leads to a question: “what must we do to satisfy the need?” The answers create a set of requirements, and they become the criteria for “shopping” for a solution. This must seem pretty straightforward, and it may be. However, sometimes cloudy thinking, brought on by participants who may have another agenda, or lack a deep understanding of your current business, its operations, and the issue or obligation that started the whole process, may alter this effort in unknown ways. Of course, different departments may insert requirements reflecting the “how” of any solution. Finance may be concerned with the costs. IT may have standards for platform technologies that favor some offerings over others. There may be existing relationships with some solutions providers that may incent purchasing and procurement managers to favor their offerings. You can see how this process could build quite the divers set of “requirements to satisfy the original business issue”. But the final, aggregate requirements list eventually becomes the evaluative tool for selecting a solution.</p>
<p><strong><span style="color: #3366ff;">Shopping For Value vs Political Safety</span></strong><br />There is no single process or means to this end. But there are some interesting factors that can come into play originating from sources extraneous to operating requirements determined in the process just outlined above. One is “political” risk related—the perceived risk of making an error in selection. Another is over-compensating. The first often leads to screening out all solution providers who don’t have an existing relationship with your firm. It can also lead to limiting consideration of only solutions with a significant brand reputation built by years of catering to Fortune 100 enterprises and providing solutions whose scope and power have been touted by many analysts, pundits, press, and business groups who follow industry leaders as determined by characteristics like revenue, employee population, number of installations, offices, and partners, to name a few metrics. These are valid considerations in some instances, where requirements merit. But in many cases, this can lead to only exploring battleship-scale solutions when a sailboat would suffice admirably. Once upon a time when considering computer hardware, company procurement managers were cautioned that “nobody ever got fired for buying IBM,” even when their product features were not the best match against identified needs. The second risk, of over-compensating, attempts to address all possible needs identified now while foreseeing any others that might occur tomorrow. It’s an aggressive approach that mistakes complexity and feature diversity with capability and fit to the specific situations and requirements of your own organization. This is analogous to the scenario where one person purchases a major home appliance based on all the bells, whistles, lights, and buttons, while the primary user’s need for some key, and simple features is completely overshadowed by the sparkling promise of a device that can “do everything”.</p>
<p>Either course of action leads down a path to encounter several problems for risk managers who need actionable solutions at appropriate scale that can deliver timely results and useful information to guide executive decision making that enables effective risk management:</p>
<ul>
<li>Complex, rigid enterprise solutions set in place as the institutional “standard”</li>
<li>A user environment that’s not streamlined for ERM processes</li>
<li>Dependence upon IT for ERM requirements and configurations&#8230; e.g. reports, workflows, etc.</li>
<li>A GRC system focused on managing process related risks instead of enterprise risks, prioritizing the “how” over the “what.”</li>
</ul>
<p>Let’s look at each of these in a bit more detail.</p>
<p><strong><span style="color: #3366ff;">Complex Enterprise Solutions</span></strong><br />The needs of specific divisions, subsidiaries, or other organizational parts of a business, however they are determined, may require more flexibility and adaptability than an enterprise solution may offer if it was installed and customized or configured to always address the enterprise as a whole. Such an implementation leads to standards-based rules and procedures binding its processes into a rigid framework that cannot easily flex for one area alone. Also, the process of making change is often bound to a management decision and approval hierarchy that’s slow to adapt.</p>
<p><strong><span style="color: #3366ff;">A User Environment Not Streamlined For ERM Processes</span></strong><br />Some systems are designed around a set of user standards and information management rules that can lead to panel designs, process steps, roadmaps and data groupings optimized to those standards rather than the key practices and requirements for ERM processes. Some enterprise systems began life focused upon one discipline or topical area, and “evolved” into enterprise ERM solutions over time, while retaining the user attributes best suited to their origins. This can make training users who otherwise understand ERM processes harder to achieve, take longer to complete, and may require much more supporting documentation that would otherwise be needed, adding time, resources, and cost to risk management processes.</p>
<p><strong><span style="color: #3366ff;">Dependence Upon IT</span></strong><br />This may be the most frustrating concern of all. Seeing the need for change, knowing what it needs to change from to adjust a process, trying to produce a report to communicate effectively with key stakeholders and executive management, or trying to respond to new configurations of workflows, organizational groupings, or compliance rules and needing to reach out to a centralized IT function with its own priorities and resource schedules can be deeply frustrating. Also, there may be inadequate training for this centralized support service so requests may lead to referrals back to the vendor, then to IT and finally, back to requesting units. This all consumes valuable time, and deteriorates the responsiveness and ability of the risk management unit to effectively perform in a responsive manner to the business and to its operating environment, and its regulatory and compliance obligations.</p>
<p><strong><span style="color: #3366ff;">A GRC System Focused On The “How” Over The “What.”</span></strong><br />Such a system really pays most attention to managing process related risks instead of enterprise risks, prioritizing the “how” over the “what.” It delivers rigid, difficult-to-change methods for performing ERM processes, to ensure consistency and reliable repetition. Such centrally controlled IT schedule and resource priorities may not match your business’ risk management obligations. Regardless, when you need specific reports, modifications to workflow parameters or escalations, email routing, or any other automated provisions of this ERM system, a request into a centralized IT department is necessary. And not all the changes you request may be granted. You may be focused upon the delivery of a risk assessment, seeking flexible response and input options to facilitate dynamic situations, or a simplified review workflow to speed findings delivery, while such an enterprise ERM may be managed to assure standardized process methods are followed without exception to address data integrity, management approval hierarchies or other internal process standards and practices.</p>
<p><strong><span style="color: #3366ff;">Navigating Change In A Structured World Of Standardization</span></strong><br />There is no single path to successfully garnering the use of alternatives to deeply embedded, standardized ERM implementations. There are some options that may provide leverage and lead to success:</p>
<ul>
<li>Find a solution that does fit your needs now, with means to extend in scope and function if or when needed. Show how using that solution would help you better align risk management with current business needs and foster achievement of company goals now. This can include noting that resilience to sustain and recover from incidents of all dimensions greatly improves with responsive, nimble, and informative risk management processes.</li>
<li>Compare your local requirements to the enterprise ERM in place, highlighting opportunities to gain efficiencies, accuracy and responsiveness by employing a more responsive ERM solution, to demonstrate how this favorably impacts risk management and program value.</li>
<li>Offer your situation as a trial test of a new solution’s ability to deliver more, with less support, while preserving quality, increasing alignment to your current state, and improving timeliness; all effectively increasing and returning value for investment while strengthening operating resilience. These are brand and bottom line contributions you can measure.</li>
</ul>
<p>Demonstrating that your risk management program returns value to the business requires careful alignment of program objectives and operating business goals. You would have implicitly done some of that through your effort to determine requirements for your ERM solution. It also makes sense to examine the design of your organization to see how to best model it’s nature and culture in the ERM processes of your solution offering. Being able to demonstrate that alone can make a solution very appealing to management. And if a small scale solution can be extended in features and scope by building upon an initial implementation, rather than discarding and re-deploying a solution under a different configuration, that’s a real win for you, for Finance, and will be very attractive to your IT organization, particularly if they participate in those efforts. Lastly, being able to respond directly to management requests for reports, charts and other analytical information, without filing into an IT processing queue, will be a bonus for all.</p>
<p><strong><span style="color: #3366ff;">Identifying Alternatives</span></strong><br />There’s already an enterprise solution in place. And for any number of reasons, it’s not enabling your risk management program efforts, but adding to its burdens and obstacles. Evaluating ERM solutions in the marketplace that meet the requirements you’ve documented may seem at once daunting yet unavoidable. There are approaches that may reduce the task in size and duration. You know your requirements—don’t compromise. That will narrow your field quickly and dramatically. Seek providers who will offer a hosted solution, reducing reliance upon any IT resources, and time to deploy. See if there’s a sandbox or field test option to try and take the software for a spin on a trial basis. If not there may be other options offered by your vendor. Remember, you’re really seeking a nimble but fully functional ERM platform that will do what you need now, and give you control and operating autonomy. <img decoding="async" class="size-medium wp-image-3235 alignright" src="https://www.doublechecksoftware.com/wp-content/uploads/2022/12/Dec-CA-box1-1-300x194.jpg" alt="" width="300" height="194" srcset="https://www.doublechecksoftware.com/wp-content/uploads/2022/12/Dec-CA-box1-1-300x194.jpg 300w, https://www.doublechecksoftware.com/wp-content/uploads/2022/12/Dec-CA-box1-1-150x97.jpg 150w, https://www.doublechecksoftware.com/wp-content/uploads/2022/12/Dec-CA-box1-1-768x496.jpg 768w, https://www.doublechecksoftware.com/wp-content/uploads/2022/12/Dec-CA-box1-1.jpg 860w" sizes="(max-width: 300px) 100vw, 300px" />The best offerings will support your expansion in features to other areas or to manage larger organizations by growing your base install, not retooling everything from scratch. Include reporting and data analysis features that are simple to use in your search. A big part of the value you’ll enable will be timely reporting and risk guidance to leadership. It&#8217;s an area where tangible demonstration of why you are deferring use of the 10,000-pound instantiated ERM solution can be made. Also, your ability to operate without dramatic resource drain, relying upon a configuration approach to tailor workflow, naming, automated process features and output management will go far in showing gains in timely responsiveness to change. These are always areas of weakness for oversized, overdeveloped enterprise implementations.</p>
<p>From this vantage point, you should have clear artifacts to support your initiative to bring responsive, comprehensive, value-generating ERM services to your business in a clear, cost effective and efficient manner, demonstrating a model for operation and growth that’s compelling for today and tomorrow.</p>
<p><strong><span style="color: #3366ff;">Enter DoubleCheck ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /></span></strong><br />ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> is a revolutionary, yet straightforward, application that builds upon the lessons in Enterprise Risk Management (ERM) that DoubleCheck, over time, has been privileged to learn from its clients. In short, ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> incorporates into one intuitive, turnkey application the best-practices tools and content to help optimize the crucial discipline of Enterprise Risk Management (ERM) and thereby put your firm on a path to achieving its strategic business objectives. DoubleCheck fully understands and supports the merits of ERM and the benefits of its adoption by all companies.</p>
<p>ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> follows the Best Practices of Risk Management. It is predicated on the understanding that there are three attributes of an effective ERM Solution (Product, Process and Content). These attributes, in combination, deliver the critical services, tools and capabilities that companies require to tactically execute upon the four elements of day-to-day risk management (Identify, Assess, Mitigate and Monitor) with efficiency and effectiveness.</p>
<p>DoubleCheck has structured the tool in a modular manner, with options available to add incremental GRC functions or advanced business intelligence (BI) capabilities to extend functionality. Further, services and features are highly integrated into one package. Reporting is embedded rather than independently aligned to content and processes, making the risk management practice a seamless effort rather than a disjointed one. It is delivered as an immediately-operational ERM platform, through a unified combination of its:</p>
<ul>
<li>Product – automated workflows; embedded business intelligence; project management; automated notifications; system generated heat maps, comprehensive risk reports, navigation through visualization; assessments; documentation management</li>
<li>Process – risk identification, quantification, mitigation documentation, reporting and review</li>
<li>Content – pre-populated (“running start”) risk universe, risk categorization, rating scales, individual controls by line of defense</li>
</ul>
<p>Want to trial ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />? Here’s what do you’ll get:</p>
<p><strong>Key Features:</strong></p>
<p>DoubleCheck ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> trial includes all components of our innovative, turnkey ERM solution:</p>
<ul>
<li>risk structure pre-configuration</li>
<li>risk content pre-population</li>
<li>risk process integration</li>
<li>modular construction, capable of significant functional enhancement</li>
<li>embedded reporting and robust business intelligence (BI)s</li>
<li>navigation through visualization</li>
<li>alignment to ERM standards and best practices</li>
</ul>
<p>Here are ten (10) top reasons to try ERM One<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> at your firm:</p>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-3228" src="https://www.doublechecksoftware.com/wp-content/uploads/2022/12/Top-10-for-Trial-300x143.jpg" alt="" width="600" height="286" /></p>
<p>About the Author:<br />Simon Goldstein is an accomplished senior executive blending both technology and business expertise to formulate, impact, and achieve corporate strategies. A retired senior manager of Accenture’s IT Security and Risk Management practice, he has achieved results through the creation of customer value, business growth, and collaboration. An experienced change agent with primary experience in financial, technology, and retail industries, he’s led efforts to achieve ISO2700x certification and HIPAA compliance, as well as held credentials of CRISC, CISM, CISA.</p>


<div class="wpforms-container wpforms-container-full" id="wpforms-116"><form id="wpforms-form-116" class="wpforms-validate wpforms-form" data-formid="116" method="post" enctype="multipart/form-data" action="/category/tprm/feed/" data-token="2ca617504c4b33862063030849e92e58" data-token-time="1777068082"><div class="wpforms-head-container"><div class="wpforms-title">Newsletter Signup</div><div class="wpforms-description">Interested in being informed when a new blog post is released?</div></div><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-field-container"><div id="wpforms-116-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><label class="wpforms-field-label" for="wpforms-116-field_0">Name <span class="wpforms-required-label">*</span></label><div class="wpforms-field-row wpforms-field-medium"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-116-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" required><label for="wpforms-116-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-116-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" required><label for="wpforms-116-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></div><div id="wpforms-116-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-116-field_1">Email <span class="wpforms-required-label">*</span></label><input type="email" id="wpforms-116-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" required></div><div id="wpforms-116-field_2-container" class="wpforms-field wpforms-field-text" data-field-id="2"><label class="wpforms-field-label" for="wpforms-116-field_2">Company</label><input type="text" id="wpforms-116-field_2" class="wpforms-field-medium" name="wpforms[fields][2]" ></div>		<div id="wpforms-116-field_4-container"
			class="wpforms-field wpforms-field-text"
			data-field-type="text"
			data-field-id="4"
			>
			<label class="wpforms-field-label" for="wpforms-116-field_4" >Title Company Name</label>
			<input type="text" id="wpforms-116-field_4" class="wpforms-field-medium" name="wpforms[fields][4]" >
		</div>
		<div id="wpforms-116-field_3-container" class="wpforms-field wpforms-field-text" data-field-id="3"><label class="wpforms-field-label" for="wpforms-116-field_3">Title</label><input type="text" id="wpforms-116-field_3" class="wpforms-field-medium" name="wpforms[fields][3]" ></div><script>
				( function() {
					const style = document.createElement( 'style' );

					style.appendChild( document.createTextNode( '#wpforms-116-field_4-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-116-field_4-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-116-field_4-container label { counter-increment: none; }' ) );
					document.head.appendChild( style );
					document.currentScript?.remove();
				} )();
			</script></div><!-- .wpforms-field-container --><div class="wpforms-field wpforms-field-hp"><label for="wpforms-116-field-hp" class="wpforms-field-label">Message</label><input type="text" name="wpforms[hp]" id="wpforms-116-field-hp" class="wpforms-field-medium"></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="116"><input type="hidden" name="page_title" value="TPRM"><input type="hidden" name="page_url" value="https://www.doublechecksoftware.com/category/tprm/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-116" class="wpforms-submit" data-alt-text="Sending..." data-submit-text="Keep Me Informed" aria-live="assertive" value="wpforms-submit">Keep Me Informed</button></div></form></div>  <!-- .wpforms-container -->



<p></p><p>The post <a href="https://www.doublechecksoftware.com/your-embedded-erm-infrastructure-may-have-become-a-risk-enablerwhat-you-can-do-about-it/">Your Embedded ERM Infrastructure May Have Become A Risk Enabler…What You Can Do About It</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.doublechecksoftware.com/your-embedded-erm-infrastructure-may-have-become-a-risk-enablerwhat-you-can-do-about-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3221</post-id>	</item>
		<item>
		<title>Building A Risk Management Program—The Risk Register</title>
		<link>https://www.doublechecksoftware.com/building-a-risk-management-program-the-risk-register/</link>
					<comments>https://www.doublechecksoftware.com/building-a-risk-management-program-the-risk-register/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 01 Aug 2022 21:47:05 +0000</pubDate>
				<category><![CDATA[Enterprise Risk Management]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[White Paper Blogs]]></category>
		<category><![CDATA[risk register]]></category>
		<guid isPermaLink="false">https://www.doublechecksoftware.com/?p=2917</guid>

					<description><![CDATA[<p>Subconsciously, we all manage risk throughout our daily lives. We pack an umbrella in case it rains, (unless we live in the Pacific Northwest where that’s considered unnecessary). We check our car tire pressure and fluid levels before a long road trip. We bring along water for a summer hike, and so on. You can<a href="https://www.doublechecksoftware.com/building-a-risk-management-program-the-risk-register/">[...]</a></p>
<p>The post <a href="https://www.doublechecksoftware.com/building-a-risk-management-program-the-risk-register/">Building A Risk Management Program—The Risk Register</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Subconsciously, we all manage risk throughout our daily lives. We pack an umbrella in case it rains, (unless we live in the Pacific Northwest where that’s considered unnecessary). We check our car tire pressure and fluid levels before a long road trip. We bring along water for a summer hike, and so on. You can think of many more. But when it comes to our business lives, we sometime find ourselves staring into a blank screen when it comes to taking the first step in structuring a risk management program. So, here’s a suggestion: begin by crafting a Risk Register. An easy statement to make, so let’s continue on and examine just how to go about making, refining, and maintaining one, and then how to use it as a building tool to get tangible value from your risk program.</p>
<p><span style="color: #3366ff;"><strong>Establish A Business Context</strong></span><br />Often overlooked, this is a vital beginning step to assure business relevance and promote meaningful dialogue with company leadership. Examine the business basics of your company, specifically who you are and what you do. Answering the following types of questions can help you document those business basics:</p>
<ul>
<li>What are your core products and services?</li>
<li>What are your key strategic objectives (i.e., capital accumulation, liquidity, reputational excellence, service leadership, etc.)?</li>
<li>How does leadership and other stakeholders measure value (i.e., revenue, earnings, stock appreciation, sales volume leadership, brand recognition, to name a few)?</li>
<li>How is this value created?</li>
<li>What places strategic objectives, operating performance, and resulting value at risk?</li>
<li>What is the scope of your risk program (enterprise, organizational unit, business segment, other)?</li>
</ul>
<p>Once you’ve done this evaluation, examine the content. Pay particular attention to the terminology and language that works best to communicate these answers clearly. Take some time to vet your responses with others to assure they are clear, concise, and accurately reflect your company and its business. These should be terms you continually reference when describing, reporting, and discussing risk in all your communications. Words matter. Everyone needs to be on the same page with regard to risk.</p>
<p><span style="color: #3366ff;"><strong>Define Risk</strong></span><br />There is art and craft to effectively doing this. If defined at too granular a level of specificity, it become unmanageable; and conversely, if done too broadly, the definition evaporates into meaningless messaging. This is where your business context becomes a helpful tool. One solid definition could be the “effect of uncertainty on the achievement of objectives.” You may also find it useful to look at each core objective and ask, “what events or situations might hinder or thwart the achievement of this objective?” You may think of other questions to help you explore risks. For instance, consider value chains. These are situations where one operational event or outcome may lead to a series of others that result in a negative impact upon a seemingly unrelated area. An example would be:</p>
<p>Scheduled maintenance updates to patch a group of data servers fall behind plan, leading to a short term outage in scheduling software and requiring manual operation. This, in turn, results in delayed and missed product deliveries contributing to a decline in product revenue for the period.</p>
<p>Generally, server maintenance isn’t viewed as an item that is clearly linked to revenue. But such linkage can occur and the circumstance cited is actually a reflection of one company’s past experience. Having stakeholders with a deep knowledge of your operations and their process integration can help reveal some of these risk situations. Understanding and identifying such relationships in value chains can also assist in the development of mitigation plans to help address either likelihood and/or severity (in this case, by completing patch updates to servers). In some disciplines, this kind of thinking is referred to as “systems thinking”.</p>
<p>Expressing risks in terms of their impact upon operational achievement of objectives is a way of establishing clear relevance to senior leadership, those individuals who are responsible for allocating resources to your program to help mitigate and manage identified risks, and sponsor remediation efforts to manage them. They are the key decision-makers who establish budgets and allocate resources.</p>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-2923 alignleft" src="https://www.doublechecksoftware.com/wp-content/uploads/2022/08/IAMM-PPC-Aug2022-300x298.png" alt="" width="237" height="235" srcset="https://www.doublechecksoftware.com/wp-content/uploads/2022/08/IAMM-PPC-Aug2022-300x298.png 300w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/IAMM-PPC-Aug2022-150x150.png 150w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/IAMM-PPC-Aug2022-73x73.png 73w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/IAMM-PPC-Aug2022-174x174.png 174w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/IAMM-PPC-Aug2022.png 335w" sizes="(max-width: 237px) 100vw, 237px" />Once you’ve built your preliminary set of risks to objectives, you will then be in a position to enlist operational stakeholders as actual risk owners, individuals who are subject matter experts (SMEs) and who can add detail and specificity with respect to core disciplines. These should include, but not specifically be limited to, IT, Finance, Audit, Operations, Product Development, Support Services, Procurement, Third Party Management, Regulatory Compliance, and Facilities. Their input, aligned to your business practices and culture, will form the basics of your Risk Register. A crucial part of the risk survey process will be to ask what’s actually in place now to mitigate these risks. Keep those answers for consideration of controls, which you may map against regulatory or contractual obligations.</p>
<p><strong><span style="color: #3366ff;">Process &#8211; Integrate The Register From the Bottom Upward</span></strong><br />Make no mistake &#8211; your risk register is the foundational pillar for establishing an Enterprise Risk Management (ERM) program. It needs to be installed, embedded and thoroughly integrated throughout an organization in order to:</p>
<ul>
<li>Assure the active management of risks as a process</li>
<li>Set priorities and actionable resource allocation to address risk</li>
<li>Uncover and oversee the mitigation of the universe of risks</li>
<li>Expose any hidden, value-adding opportunities</li>
<li>Demonstrate itself as a usable, independent but integral regimen (not as a stand-alone, ivory-tower hypothesis), in order to maximize its contribution to the company’s mission</li>
</ul>
<p>Very simply, consistent with the establishment of the risk register, the mission statement for an ERM program can be stated as</p>
<p>“…the process to identify, assess, mitigate and monitor all enterprise-wide risks that might impair the company’s ability to achieve its strategic business objectives.”<br />We’ve talked about the functions, processes and features of an ERM solution in many of our other blogs. A vital point: your ERM solution should clearly be understood as stand-alone and not a mere adjunct to other corporate functions, like compliance or internal audit. It is a discipline of its own and needs to be strategically designed and tactically executed, on an iterative (day-in-and-day-out) basis, using a risk register vehicle that is:</p>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-2932" src="https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Circular-Aug2022-300x200.png" alt="" width="503" height="335" srcset="https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Circular-Aug2022-300x200.png 300w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Circular-Aug2022-1024x684.png 1024w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Circular-Aug2022-150x100.png 150w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Circular-Aug2022-768x513.png 768w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Circular-Aug2022-1536x1026.png 1536w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Circular-Aug2022-2048x1368.png 2048w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Circular-Aug2022-750x500.png 750w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Circular-Aug2022-272x182.png 272w" sizes="(max-width: 503px) 100vw, 503px" /></p>
<p>Going one step further, this Risk Register is not just a “nice to have” choice but rather a corporate initiative that is:</p>
<ul>
<li>Urgent – tomorrow is not soon enough</li>
<li>Mandatory – avoids potential catastrophe and/or dereliction of duty</li>
<li>Foundational – risk register “buckets” (causes, consequences, controls and key risk indicators) and metrics (severity, likelihood, and velocity) inform the components of ERM actionability – identification, assessment, mitigation and monitoring</li>
<li>Collaborative – content provides operating managers and staff with a consistent framework and language to structure risk related actions and report accomplishments, issues, and recommendations.</li>
<li>Connected – to the success of strategic objectives</li>
<li>Value-oriented – satisfying myriad needs across a wide spectrum of stakeholders, such as:</li>
</ul>
<p><img loading="lazy" decoding="async" class="wp-image-2936 aligncenter" src="https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Table-Aug2022-300x81.png" alt="" width="489" height="132" srcset="https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Table-Aug2022-300x81.png 300w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Table-Aug2022-150x40.png 150w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Table-Aug2022-768x207.png 768w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/Table-Aug2022.png 864w" sizes="(max-width: 489px) 100vw, 489px" /></p>
<p><strong><span style="color: #3366ff;">Content &#8211; Applying Controls and Frameworks</span></strong></p>
<p>Examining the all the attributes of the risks you’ve identified in your register allows you to accomplish two important tasks. First, you can readily see the reliance on, or the impact of, mitigation, for each risk. The sum total of mitigation serves to reduce inherent likelihood and severity to its current residual level. Secondly, you can use a framework to see if there are any significant gaps in your register you might want to address.</p>
<p><strong><span style="color: #3366ff;">Process and Product &#8211; Enter The Risk Assessment</span></strong><br />If there is only one activity to be used most often to define the core of ERM, the one aspect that is most readily identifiable and recognized, it’s the risk assessment! This is the action step that drives mitigation and helps prioritize monitoring. This is where your risk “health” is determined. If your risk register is a thermometer, this is where you take your company’s temperature. The register can critically evaluate which of the risks in your universe are appropriately addressed and where additional mitigation is most urgently needed. The findings of the assessment define your current state in the context of your business’ needs and goals, and drive your program’s response. The features of the tools you use to do this, through your GRC platform or whatever else you might use, are all focused upon a review of the content of the register, a determination of risk to your business by designated risk owners, with stated accountability. The information needs to be intentionally focused on a select few attributes (likelihood, severity, direction and velocity) and metrics need to be straightforward and clearly understood. Very importantly, you also need reporting tools to organize, analyze, and present the data into meaningful messages.</p>
<p><strong><span style="color: #3366ff;">Product &#8211; Reporting</span></strong><br />You’ve built your register, supplemented content, assessed your risk, and now you need to share what you’ve learned with decision makers and stakeholders. If you are working with a GRC tool where reporting is embedded within, where standard reporting, such as the generation of heat maps, counts and lists of most critical risks and such is generated right from your assessment data, that’s a strong beginning. If not, you want to generate visual and narrative statements of findings that answer some basic questions:</p>
<ul>
<li>What are our most significant risks?</li>
<li>Which are most likely to have significant events occur?</li>
<li>Where are they located?</li>
<li>How are they prioritized, using enterprise-wide rating scales</li>
<li>What is the current residual state (after controls) for each risk?</li>
<li>What will it take, in terms of additional resources, to further mitigate them?</li>
</ul>
<p>There are countless, additional questions that can be asked, based on the fulsome risk surveys received from subject matter experts. These further inquiries are healthy and will drive further conversation. Visualization is important to helping non-technical executives understand your assessment findings in business terms. It’s exactly why you built your register in the context of the business’ goals and mission. Further, you need a means of securing, publishing, and distributing this important information to key stakeholders, within control, in a secure manner. Risk assessment findings reports often contain highly confidential information, and you need the capability to manage publication and distribution carefully. Your Board of Directors, as well as your Executive Committee, are accountable for addressing and managing risk to their shareholders, regulators, customers, and other stakeholders. ERM is the discipline, and the risk register is the most valuable tool, that provides all of these varied stakeholders with the information and guidance to make quality decisions to manage and mitigate risk effectively</p>
<p><strong><span style="color: #3366ff;">Product—Process—Content: The DoubleCheck Standard</span></strong><br />While this, and many other blogs here, offer guidance on many risk management issues, they all point towards the benefit of utilizing a quality GRC tool to support execution. DoubleCheck understands that these three attributes of a GRC (Process, Product, and Content) are essential to delivering the critical services, tools, and capabilities companies require to tactically execute upon the four elements of day-to-day risk management <strong>(Identify</strong>, <strong>Assess</strong>, <strong>Mitigate</strong>, and <strong>Monitor)</strong> with efficiency and effectiveness. Further, services and features are highly integrated into one package. Reporting is embedded to rather than independently aligned to content and processes, making the risk management practice a seamless effort rather than a disjointed one. Whether out-of-the-box core functionality, or serving as a streamlined front-end to a larger enterprise (ERP) offering, or to an expansive, dedicated, tailored through configuration, custom fit to your company’s needs, DoubleCheck offers product, processes, and content designed to support all your enterprise risk management needs.</p>
<p>The next blog will expand upon the various use cases that can greatly benefit from a pre-populated, fully integrated ERM solution.</p>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-2944" src="https://www.doublechecksoftware.com/wp-content/uploads/2022/08/UCsAug2022-300x164.png" alt="" width="580" height="317" srcset="https://www.doublechecksoftware.com/wp-content/uploads/2022/08/UCsAug2022-300x164.png 300w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/UCsAug2022-150x82.png 150w, https://www.doublechecksoftware.com/wp-content/uploads/2022/08/UCsAug2022.png 530w" sizes="(max-width: 580px) 100vw, 580px" /></p>
<p> </p>
<p>About the Author:<br />Simon Goldstein is an accomplished senior executive blending both technology and business expertise to formulate, impact, and achieve corporate strategies. A retired senior manager of Accenture’s IT Security and Risk Management practice, he has achieved results through the creation of customer value, business growth, and collaboration. An experienced change agent with primary experience in financial, technology, and retail industries, he’s led efforts to achieve ISO2700x certification and HIPAA compliance, as well as held credentials of CRISC, CISM, CISA.</p>


<div class="wpforms-container wpforms-container-full" id="wpforms-116"><form id="wpforms-form-116" class="wpforms-validate wpforms-form" data-formid="116" method="post" enctype="multipart/form-data" action="/category/tprm/feed/" data-token="2ca617504c4b33862063030849e92e58" data-token-time="1777068082"><div class="wpforms-head-container"><div class="wpforms-title">Newsletter Signup</div><div class="wpforms-description">Interested in being informed when a new blog post is released?</div></div><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-field-container"><div id="wpforms-116-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><label class="wpforms-field-label" for="wpforms-116-field_0">Name <span class="wpforms-required-label">*</span></label><div class="wpforms-field-row wpforms-field-medium"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-116-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" required><label for="wpforms-116-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-116-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" required><label for="wpforms-116-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></div>		<div id="wpforms-116-field_4-container"
			class="wpforms-field wpforms-field-text"
			data-field-type="text"
			data-field-id="4"
			>
			<label class="wpforms-field-label" for="wpforms-116-field_4" >Company Name Email</label>
			<input type="text" id="wpforms-116-field_4" class="wpforms-field-medium" name="wpforms[fields][4]" >
		</div>
		<div id="wpforms-116-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-116-field_1">Email <span class="wpforms-required-label">*</span></label><input type="email" id="wpforms-116-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" required></div><div id="wpforms-116-field_2-container" class="wpforms-field wpforms-field-text" data-field-id="2"><label class="wpforms-field-label" for="wpforms-116-field_2">Company</label><input type="text" id="wpforms-116-field_2" class="wpforms-field-medium" name="wpforms[fields][2]" ></div><div id="wpforms-116-field_3-container" class="wpforms-field wpforms-field-text" data-field-id="3"><label class="wpforms-field-label" for="wpforms-116-field_3">Title</label><input type="text" id="wpforms-116-field_3" class="wpforms-field-medium" name="wpforms[fields][3]" ></div><script>
				( function() {
					const style = document.createElement( 'style' );

					style.appendChild( document.createTextNode( '#wpforms-116-field_4-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-116-field_4-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-116-field_4-container label { counter-increment: none; }' ) );
					document.head.appendChild( style );
					document.currentScript?.remove();
				} )();
			</script></div><!-- .wpforms-field-container --><div class="wpforms-field wpforms-field-hp"><label for="wpforms-116-field-hp" class="wpforms-field-label">Email</label><input type="text" name="wpforms[hp]" id="wpforms-116-field-hp" class="wpforms-field-medium"></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="116"><input type="hidden" name="page_title" value="TPRM"><input type="hidden" name="page_url" value="https://www.doublechecksoftware.com/category/tprm/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-116" class="wpforms-submit" data-alt-text="Sending..." data-submit-text="Keep Me Informed" aria-live="assertive" value="wpforms-submit">Keep Me Informed</button></div></form></div>  <!-- .wpforms-container --><p>The post <a href="https://www.doublechecksoftware.com/building-a-risk-management-program-the-risk-register/">Building A Risk Management Program—The Risk Register</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.doublechecksoftware.com/building-a-risk-management-program-the-risk-register/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2917</post-id>	</item>
		<item>
		<title>Cyber Security and Risk Management—Who’s Responsible</title>
		<link>https://www.doublechecksoftware.com/cyber-security-and-risk-management-whos-responsible/</link>
					<comments>https://www.doublechecksoftware.com/cyber-security-and-risk-management-whos-responsible/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 15 Jul 2022 14:07:44 +0000</pubDate>
				<category><![CDATA[Cyber Security Risk Management]]></category>
		<category><![CDATA[Enterprise Risk Management]]></category>
		<category><![CDATA[GRC Implementation Success]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[#erm]]></category>
		<category><![CDATA[#tprm]]></category>
		<category><![CDATA[ERM]]></category>
		<category><![CDATA[erm software]]></category>
		<category><![CDATA[risk register]]></category>
		<category><![CDATA[TPRM Software]]></category>
		<guid isPermaLink="false">https://www.doublechecksoftware.com/?p=2904</guid>

					<description><![CDATA[<p>There’s a lingering belief that these are IT management concerns. That lingering belief is founded upon a “perceived reality” of a business operating in an environment where IT was little more than a contributing discipline to complete tasks and deliver efficiency. It made some narrow sense in a world free of cyber anything, pre-internet, where<a href="https://www.doublechecksoftware.com/cyber-security-and-risk-management-whos-responsible/">[...]</a></p>
<p>The post <a href="https://www.doublechecksoftware.com/cyber-security-and-risk-management-whos-responsible/">Cyber Security and Risk Management—Who’s Responsible</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>There’s a lingering belief that these are IT management concerns. That lingering belief is founded upon a “perceived reality” of a business operating in an environment where IT was little more than a contributing discipline to complete tasks and deliver efficiency. It made some narrow sense in a world free of cyber anything, pre-internet, where digital transformation, mobile devices, bots, mobile devices, malicious actors, malware, ransomware, and threats from hostile government actors were relegated to science fiction thrillers. None of us live in that world today. And burying our collective heads in a beach will not change that. Nor will glasses tinted any shade of rose. Cybersecurity, and its related risk management activities are a management concern. They are part of comprehensive oversight, governance, guidance, and strategic leadership. So, how well does your company’s culture and organizational structure reflect that contemporary reality?</p>
<p><span style="color: #3366ff;"><strong>Where Do Your CIO and CISO Sit?</strong></span><br>Snarky responses aside, access to the rest of your company’s executive team is an important aspect and attribute of your cyber risk management and security program. If your organization’s structure assigns them to report to other “C” level roles you’ve established a potential barrier to clarity, transparency, and responsiveness. This is not in any way a slight to any other C-level roles, but a simple statement of operational, procedural, and behavior fact. It also sends a clear message to the rest of the organization that the importance of security and risk management is a secondary concern. That may create an additional hurdle for risk and security initiatives as middle managers place more resources and attention on the requests from those “higher level” executives, relegating ones from your CISO and CIO according to their organizational pecking order. Giving your CIO and CISO a seat at the executive table makes a number of high value contributions to your company:</p>
<ul>
<li>Enables them to establish and validate their roles as important strategic components to your company’s success</li>
<li>Communicates the importance of security, cyber risk, and technology to the entire firm</li>
<li>Gives your CIO and CISO firsthand exposure to these other disciplines, issues, and management concerns so they can participate in developing strategy and measuring achievement of business goals and success</li>
<li>Affords open discussion between all C-level executives of how cyber risk and security, as well as technology contribute to and add value to the company’s business achievement.</li>
<li>Reinforces and encourages representation of technical, security, and risk matters in terms of business impact rather than esoteric tech-eze.</li>
<li>Affords direct communication and responsiveness to address and respond to incidents and issues with greater timeliness and efficiency, strengthening overall business resiliency during unforeseen events and incidents.</li>
</ul>
<p><span style="color: #3366ff;"><strong>Leadership By Enablement</strong></span><br>Often, when we think about goals, achievement, and leadership, it’s from a fairly internal perspective, answering the question “what do I want to do?”. Let me offer an alternative perspective. Consider the answer to the question “What do we need to be successful?” The answer is often fairly broad. But drilling into those generalized answers quite often will yield presumptions of reliability, persistence, accuracy, validity, and resilience, to name some attributes. These may depend upon processes, tools, technologies, people, partners, and even regulators or providers of basic infrastructure such as transportation, energy, or communications. Many of those attributes, often just assumed to always be reliably present, can and often are the victims of cyber attacks, weak security, and lax attention to practices that would otherwise thwart or at least minimize the risk of their compromise. Information technology and security leaders are well attuned to the vulnerabilities, threats, and presumed reliable presence other leaders count upon to manage and deliver their own contributions to business goals and achievement. By placing them into the discussions where plans and direction are being developed at a senior executive level, businesses enrich and empower planning with a fuller view of issues, opportunities, and a more complete understanding of the resources necessary to maximize the opportunity to achieve outcomes.</p>
<p><strong><span style="color: #3366ff;">Who Manages Your GRC?</span></strong><br>The CISO and CIO roles are not the do-all end points of everything related to cyber risk and security. A governance, risk and compliance (GRC) manager is more than someone responsible for administering a software tool, conducting risk assessments and reporting findings. Often this can be a leadership role supporting those C-level executives and others, one that is responsible for the design, development, staffing and operation of enterprise-wide delivery of many security and risk related services and processes. Often, this role will take a lead in delivery of security awareness training—content and delivery. Incumbents will also participate with other compliance managers and management to assure current and upcoming products and services meet established obligations. This may include interactions with external auditors, regulators, and third parties. Your GRC manager is at the focal point of your compliance, risk, and governance processes. Often s/he will be the primary author of your governance practices, compliance efforts, manage risk assessments, and serve as a valued participant in the implementation, delivery, and monitoring of data protection, authentication, recovery and resiliency programs.</p>
<p><strong><span style="color: #3366ff;">Extended Boundaries</span></strong><br>There are two more questions, whose answers help define the extended scope of your risk, security, compliance and governance roles:</p>
<ul>
<li>Who is responsible for third party risk management (TPRM)?</li>
<li>Who is responsible for risk, governance, and compliance oversight when acquisitions are under consideration?</li>
</ul>
<p>The ideal answers should be your GRC manager, under the executive guidance of a CIO or CISO who is part of the executive team, and has visibility to the Board of Directors. But is this the case in your firm? There are many moving parts to TPRM. Certainly, your procurement practices are key components. On and off boarding procedures necessarily entail information exchanges to assure proper vetting of third party candidates. This goes well beyond fiscal health, service and product quality, timeliness, and contract negotiation. How well integrated and informed are these practices by your risk, information security, and compliance expertise within your company? Is reliance upon critical partners a foundation of your resiliency, recovery, and incident management strategies? How do these processes and programs integrate to assure your leadership that your third party engagements preserve, and maybe even enhance presumptions of reliability, persistence, accuracy, validity, and resilience where these third party relationships integrate with your operations? Your procurement professionals, no matter how experienced, would gain value and support from the integration and engagement with risk, security, regulation and compliance expertise offered through GRC leadership.</p>
<p><strong><span style="color: #3366ff;">And Then There’s The GRC Platform</span></strong><br>A GRC platform is a critical technology tool that enables and strengthens these business and operational practices. For many who have followed these blogs this assertion will seem obvious, as will notations that GRC platforms facilitate data integration, validation, and reporting. There are some other, equally important but less recognized opportunities utilizing a GRC platform makes easier. A GRC is well suited to store, maintain, and serve as a consolidation point for compliance, risk and related process and remediation project data. Feeds from incident management, audits, compliance reviews, remediation projects, risk assessments, and more can all reside logically within its data stores. Using a GRC as a single point authoritative source for such data also simplifies data security, validity, distribution, and resiliency practices. Whether the system relies upon cloud storage, or more traditional means, there are tools and services available to assure data management and integrity. Much of the content of a GRC system is likely sensitive and would be considered highly confidential. Having this consolidation makes implementation and utilization of technologies such as data loss prevention (DLP), tighter multifactor authentication and access management, and backup and restoration services more economical to implement and operate.</p>
<p>Analysis, data mining, and reporting are facilitated by consolidating related GRC data streams onto the stores of your GRC platform. Data analysis tools can easily relate, and also identify discrepancies between alternative data views of specific operating practices or organizations. You can also explore specific controls or risks to see where recommended practices are consistently ignored. Doing so points out potential problems with control design, implementation, or understanding which afford focused and positive remediation strategies. Control management is an important aspect of risk management, one that’s often overlooked in binary pass/fail scoring. That’s why risk registers are an important design element of your risk and security programs.</p>
<p><strong><span style="color: #3366ff;">Don’t Forget The Risk Register</span></strong><br>Remember that your risk program needs to identify, assess, mitigate, and monitor risk to demonstrate “management”. Having a list of risks, whether identified through statements, measurements of control adherence, findings of audits or compliance reviews, or more, offers a scaffold upon which to design and construct your risk program. It’s a tool that presents context, direction, and definition, while also useful to manage scope and measure maturity. Risk registers aren’t static. They need to be elastic and flexible to reflect the changing nature of your business and the threat environment you operate within.</p>
<p>The risk register’s content is something your own senior risk and security leadership must work to explain to other senior business leadership and gain consensus to its alignment with your company’s goals and mission. This discussion needs to be an ongoing dialogue, and the exchange of ideals, opinions, priorities, and concerns is one reason why senior information technology, risk, and security professionals need a seat at executive leadership meetings. These experts need to understand the perspectives of the business from the views of operations, finance, marketing, compliance, product and brand management, and more. Likewise, those business leaders need to understand the integration of their own processes with those of their technology risk and security peers.</p>
<p>Without question, alignment of business goals with your risk register is a key foundational step to building, developing, and managing a comprehensive risk program that’s relevant and effective. But more on that in an article to come.</p>
<p>About the Author:<br>Simon Goldstein is an accomplished senior executive blending both technology and business expertise to formulate, impact, and achieve corporate strategies. A retired senior manager of Accenture’s IT Security and Risk Management practice, he has achieved results through the creation of customer value, business growth, and collaboration. An experienced change agent with primary experience in financial, technology, and retail industries, he’s led efforts to achieve ISO2700x certification and HIPAA compliance, as well as held credentials of CRISC, CISM, CISA.</p>


<div class="wpforms-container wpforms-container-full" id="wpforms-116"><form id="wpforms-form-116" class="wpforms-validate wpforms-form" data-formid="116" method="post" enctype="multipart/form-data" action="/category/tprm/feed/" data-token="2ca617504c4b33862063030849e92e58" data-token-time="1777068082"><div class="wpforms-head-container"><div class="wpforms-title">Newsletter Signup</div><div class="wpforms-description">Interested in being informed when a new blog post is released?</div></div><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-field-container"><div id="wpforms-116-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><label class="wpforms-field-label" for="wpforms-116-field_0">Name <span class="wpforms-required-label">*</span></label><div class="wpforms-field-row wpforms-field-medium"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-116-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" required><label for="wpforms-116-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-116-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" required><label for="wpforms-116-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></div><div id="wpforms-116-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-116-field_1">Email <span class="wpforms-required-label">*</span></label><input type="email" id="wpforms-116-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" required></div><div id="wpforms-116-field_2-container" class="wpforms-field wpforms-field-text" data-field-id="2"><label class="wpforms-field-label" for="wpforms-116-field_2">Company</label><input type="text" id="wpforms-116-field_2" class="wpforms-field-medium" name="wpforms[fields][2]" ></div>		<div id="wpforms-116-field_4-container"
			class="wpforms-field wpforms-field-text"
			data-field-type="text"
			data-field-id="4"
			>
			<label class="wpforms-field-label" for="wpforms-116-field_4" >Title Email Company</label>
			<input type="text" id="wpforms-116-field_4" class="wpforms-field-medium" name="wpforms[fields][4]" >
		</div>
		<div id="wpforms-116-field_3-container" class="wpforms-field wpforms-field-text" data-field-id="3"><label class="wpforms-field-label" for="wpforms-116-field_3">Title</label><input type="text" id="wpforms-116-field_3" class="wpforms-field-medium" name="wpforms[fields][3]" ></div><script>
				( function() {
					const style = document.createElement( 'style' );

					style.appendChild( document.createTextNode( '#wpforms-116-field_4-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-116-field_4-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-116-field_4-container label { counter-increment: none; }' ) );
					document.head.appendChild( style );
					document.currentScript?.remove();
				} )();
			</script></div><!-- .wpforms-field-container --><div class="wpforms-field wpforms-field-hp"><label for="wpforms-116-field-hp" class="wpforms-field-label">Name</label><input type="text" name="wpforms[hp]" id="wpforms-116-field-hp" class="wpforms-field-medium"></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="116"><input type="hidden" name="page_title" value="TPRM"><input type="hidden" name="page_url" value="https://www.doublechecksoftware.com/category/tprm/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-116" class="wpforms-submit" data-alt-text="Sending..." data-submit-text="Keep Me Informed" aria-live="assertive" value="wpforms-submit">Keep Me Informed</button></div></form></div>  <!-- .wpforms-container --><p>The post <a href="https://www.doublechecksoftware.com/cyber-security-and-risk-management-whos-responsible/">Cyber Security and Risk Management—Who’s Responsible</a> first appeared on <a href="https://www.doublechecksoftware.com">DoubleCheck Software</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.doublechecksoftware.com/cyber-security-and-risk-management-whos-responsible/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2904</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Content Delivery Network via N/A
Lazy Loading (feed)
Minified using Disk
Database Caching 6/96 queries in 0.071 seconds using Disk (Request-wide modification query)

Served from: www.doublechecksoftware.com @ 2026-04-24 18:01:22 by W3 Total Cache
-->