RSS feed Get our RSS feed

News by Topic

risk management

Results 76 - 100 of 693Sort Results By: Published Date | Title | Company Name
By: FICO     Published Date: May 11, 2017
Agencies have long provided telecommunications companies with scalability for collections in a high-growth industry. Today, with markets and business models changing, your collections agencies have a growing impact — for good or ill — on your success.
Tags : customer experience, analytics, risk management
     FICO
By: SAS     Published Date: Jul 02, 2012
In this special Insights report, we highlight growing businesses that once thought the only analysis they could do was on a spreadsheet and that analytics was something for large companies.
Tags : small business, big data, risk management, sas
     SAS
By: NAVEX Global     Published Date: Dec 07, 2017
With the introduction of the Foreign Corrupt Practices Act (FCPA) and UK Bribery Act, organisations must take corruption in business seriously. Given the complexity of the activities addressed in an anti-bribery and corruption programme, however, the task can seem overwhelming. Our Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance programme using a protect, detect and correct methodology to manage core programme components such as: • Policies • Risk Assessment • Corrective Action • Training / Communication • Culture • Controls / Oversight • Business Partners Our checklist will enable you to design and implement an effective, global and consistent anti-bribery compliance programme.
Tags : foreign corrupt practices act (fcpa), uk bribery act, risk management, third – party risk
     NAVEX Global
By: IBM     Published Date: Oct 28, 2009
In the IBM white paper, "The Smarter Supply Chain of the Future: Global Chief Officer Supply Chain Study," you'll see how sensor technologies, new analytic capabilities and simulation techniques can predict, if not prevent, disruptions before they occur.
Tags : supply chain management, ibm, risk, management systems, connectivity, scm, network
     IBM
By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
     KPMG
By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how Secure Configuration Manager can help with compliance requirements in the IT controls areas of entitlement reporting & segregation of duties. Discover how to make your compliance program more sustainable & repeatable, while gaining visibility into sources of vulnerability & risk exposure.
Tags : compliance, netiq, net iq, policy management, configuration management, unix, risk management, change management
     NetIQ Corporation
By: Oracle Primavera     Published Date: Oct 09, 2015
Asset intensive organizations like Oil and Gas have their own industry specific challenges when it comes to managing their asset's lifecycles. One area that is often overlooked or pushed off until the last minute is the decommissioning phase of their assets. Leaders in the industry turn to three areas to transform their business-Risk and Financial Management, Operational Excellence, and Innovation
Tags : oracle, asset decommissioning, oil and gas, oil and gas industry, risk management, financial management, operational excellence, innovation
     Oracle Primavera
By: Fiserv     Published Date: Nov 07, 2017
"In today’s ever-evolving lending landscape where loan quality and risk management challenge profitability and the customer experience, technology may be the key to thriving – both now and in the future. Winning financial services institutions will be the ones that transform their business models to place loan quality and risk management at the center of their operations. To facilitate continuous life-of-loan management, inclusive of the requisite data transparency and audit trails that support loan quality and loss mitigation, these institutions will implement and automate a loan completion process. Such a process will manage data quality and access to loan data and documents throughout origination, servicing and sale on the secondary market."
Tags : mortgage data quality, loan quality, loan data quality, mortgage quality, loan compliance, lending compliance, mortgage compliance, trid
     Fiserv
By: Neustar     Published Date: Feb 27, 2013
This case study shows how On Demand Verification plays an important role in increasing business and improving efficiencies for Santander.
Tags : auto verification, loan verification, contact verification, consumer verification, real time verification, risk management, loan processing, loan optimization
     Neustar
By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paper‐based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
     Enhancement Software
By: GE Healthcare     Published Date: Aug 27, 2015
Healthcare organizations are facing uncertain times, which are putting enormous strains on their revenue cycle management (RCM). Automation is proven to improve RCM measures, and even small improvements can significantly impact the bottom line. This whitepaper details how providers can embrace automation to help drive financial performance.
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment
     GE Healthcare
By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability
     GFI
By: Quocirca     Published Date: Mar 13, 2008
The Average Inc. could do quite a lot to improve the ways it uses technology in order to reduce risk, ensuring business continuity, and to cut unnecessary cost. If Average Inc. needs to improve its use and management of its ICT infrastructure, then that means most real companies do as well.
Tags : ict, quocirca, communications, infrastructure, business continuity
     Quocirca
By: KeyedIn Solutions     Published Date: May 29, 2012
No project worth undertaking ever comes totally risk free. In this white paper you will find helpful guidance to learn how to recognize when your project is in danger of failing and the key steps to turning around a project successfully.
Tags : project risk keyedin, spreadsheets, data, decisions, system, learning, planning, security
     KeyedIn Solutions
By: Dun & Bradstreet     Published Date: Mar 03, 2017
Complexity, globalization and digitalization are just some of the elements at play in the risk landscape—and data is becoming a core part of understanding and navigating risk. How do modern finance leaders view, navigate and manage enterprise risk with data? Dun & Bradstreet surveyed global finance leaders across industries and business types. Here are the top trends that emerged from the study: 1. The Enterprise Risk & Strategy Disconnect—Finance leaders are using data and managing risk programs, but over 65% of finance leaders say there’s missing link between risk and strategy. 2. The Risks of the Use and Misuse of Data—Up to 50% of the data used to manage modern risk is disconnected. Only 15% of leaders are confident about the quality of their data. 3. Risky Relationships—Only 20% of finance leaders say the data they use to manage risk is fully integrated and shared. Download the study to learn how finance leaders are approaching data and enterprise risk management
Tags : 
     Dun & Bradstreet
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This whitepaper, written in collaboration with TAL Global (a leading security consulting and risk management firm), highlights five case studies to illustrate common legal and security issues associated with BYO.
Tags : citrix, security, mobile
     Citrix Systems, Inc.
By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection
     Kaseya
By: SAS     Published Date: Mar 20, 2012
The banking sector routinely manages massive amounts of data, ranging from financial transactions to customer, operational and regulatory data. All this data means big challenges - but also big opportunities - for the industry. Find out more now!
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
     SAS
By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : ibm, financial, quality, risk, management, cost, reduce costs, effiency
     IBM ILOG.
By: IBM     Published Date: Jul 14, 2016
Enterprise risk management (ERM) is moving to the top of corporate agendas, and evidence shows strategic risk is a key factor in a robust ERM framework. Check out this white paper from risk management pioneer James Lam. In it, Lam explains why every organization should be focusing on strategic risk. You'll learn how to integrate risks into the planning process, use economic capital and risk-adjusted return on capital to measure risk, and how to apply these results.
Tags : best practices, risk management, enterprise, technology, frontier
     IBM
By: SambaSaftey     Published Date: Mar 15, 2019
What you don't know could hurt your bottom line Let’s begin with a question: Do you know who is behind the wheel? The reality is that for many enterprises with employees who drive as part of their job, the answer is, “I think so,” or maybe, “no.” Driver risk management has recently become a top issue for many organizations since it directly affects budgets and the bottom line. The fact that there are more than 100 million people driving for work-related activities on U.S. roads and many of them have invalid, suspended or no driver’s license at all should be cause enough for concern. But combining this with the facts that: • most organizations’ budgets are at best flat • P&C insurance rates are rising 14% every 2 years • 90% of crashes are due to human error • there are fewer qualified drivers available today • the number of lawsuits around negligence are skyrocketing • and it becomes clear that understanding exposure to driver risk is imperative for every organization. So what do
Tags : 
     SambaSaftey
By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata
     IBM
By: Zebra Technologies     Published Date: Jul 06, 2017
Stay ahead of risks inherent in modern connectivity, mobile integration and securing thermal barcode printers. This paper helps you leverage your IT know-how, by evaluating common security risks and tightening control with remote device management systems.
Tags : printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy
     Zebra Technologies
By: Determine (Selectica)     Published Date: Oct 24, 2017
Organizations today and for the foreseeable future must have visibility into supplier and third-party operations in order to mitigate risks and achieve compliance.
Tags : 
     Determine (Selectica)
By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics