Reputational risk and crisis management
|
|
- Joan Richards
- 8 years ago
- Views:
Transcription
1 Reputational risk and crisis management
2 Reputational risk and crisis management The nightmare scenario for a CEO might be a tainted product, a deadly accident or a humiliating scandal. Within days, or perhaps even within a few short hours, a carefully cultivated brand is threatened and a sparkling corporate reputation is at risk of being ruined. Bad things happen to even very good organizations, but it isn t necessarily the bad things themselves that destroy reputations. Bad things happen to even very good organizations, but it isn t necessarily the bad things themselves that destroy reputations. Often the deciding factor is how a company responds when something goes wrong. If the crisis is managed badly, the company may never recover. If handled well, the company may even enhance its reputation. Companies with superior reputations have been shown to have sustainable competitive advantages and enjoy materially higher average annual stock price increases. In some industries, reputation can be a company s single most valuable asset. But reputations also can be fragile. Thanks to the Internet and the 24/7 news cycle, bad news, including rumors, misinformation and libelous attacks, can spread across the globe in an instant. Adversaries such as activists, disgruntled customers and angry former employees can launch potentially damaging attacks through blogs, message boards and dedicated websites. Companies with strong reputations may simply deflect many reputational challenges. Additionally, threats often can be nipped in the bud through proactive reputation management. But some extreme events can overwhelm a company s defenses and deeply damage or even irreparably destroy its reputation. In a full-blown crisis, a range of high-intensity crisis management procedures must immediately be implemented. Companies that are best prepared to deal with a potentially ruinous situation are those that have developed and rehearsed a comprehensive crisis management plan. Reputational risk and reputational risk management Reputation is not an attribute of an organization; reputation exists solely in the minds of others. A company may possess a good reputation, but what it actually owns is the benefit of a positive consensus about its conduct. Many companies seek to actively manage their reputations by instilling and reinforcing positive associations in the minds of those who are important to the success of the company, especially customers and investors. Managing a reputation also requires monitoring external perceptions and responding quickly and effectively to threats. The possibility that events may undermine trust in a company is called reputational risk. Reputational risk arises from a wide array of actions, including failure to comply with regulatory or legal obligations, failure to deliver expected standards of service and product, unethical practices, failure to hit financial performance targets, labor unrest and environmental breaches. Reputational risk also arises from external factors such as the actions of a competitor that cast a cloud over an entire sector. Activities that can help prevent reputational damage, or help mitigate the consequences of a damaging event, collectively are called reputational risk 1
3 management. At the heart of reputational risk management is overall good corporate governance companies that are managed well might typically avoid activities that undermine trust, and they have a reservoir of good will to help cushion occasional bad news. Many senior executives, however, are not content to rely exclusively on good corporate governance as a defense against a damaged reputation, and insist on proactive steps to manage reputational risk. Specific activities can include: collecting and analyzing customer feedback; monitoring the media, including Internet blogs and message boards; managing the company s relationship with the media; investor relationship management; diligence in regulatory compliance and managing relationships with regulators; tracking business, economic, social and regulatory trends that may spawn new risks; and managing relationships with potentially adversarial special interest groups. These highly unlikely, but extremely powerful, events present enormous potential reputational damage and can often redefine the career of the leader in charge at the time. Reputational risk management activities typically are distributed among a number of departments and individuals, making it challenging to develop and execute a cohesive strategy. While the optimal means of coordinating reputational risk management may vary by industry, company size, structure and corporate culture, companies should consider embedding reputational risk management within an enterprise risk management (ERM) program that addresses all aspects of an organization s risk profile. In addition to providing a platform for managing reputational risk across the organization, ERM helps companies avoid strategic surprises that can threaten reputations, and aids in identifying emerging risks, according to Calvin E. Beyer, head of the Manufacturing segment of the Middle Market Commercial Group of Zurich North America. ERM also helps pinpoint interdependencies and contingent risks situations that can produce the chain reactions that are the precursors of catastrophic losses. Crisis management Companies face frequent challenges to their reputations, and well-regarded organizations that engage in reputational risk management activities usually fend them off without lasting damage. But occasionally exceptional events overwhelm companies usual reputational risk defenses. These highly unlikely, but extremely powerful, events present enormous potential reputational damage and can often redefine the career of the leader in charge at the time, according to Mr. Beyer. The types of disasters that can destroy a company s reputation vary by industry. A financial services firm may be the victim of a data breach that compromises sensitive customer information. An airline may be grounded for safety violations. A chemical company may expose a community to toxic substances. A manufacturing company may need to recall a dangerously defective product. Some types of disasters transcend industry groups. Any company could be the victim of financial fraud. 2
4 When disaster strikes, the companies that fare best are those prepared to quickly execute a thorough and well-rehearsed crisis response plan. Crisis response plan Most organizations are not well-prepared to respond quickly in a crisis. A 2005 survey of senior risk managers by the Economist Intelligence Unit found that less than half of respondents said their firms are good at crisis management while 11 percent rated their firms as poor. Large firms are more likely than smaller ones to have a well developed crisis management plan. For many companies, crisis management is a reactive process scrambling to seize control of the situation after a crisis occurs rather than a proactive discipline. Making crisis management a proactive discipline means developing and rehearsing a crisis response plan. Such a plan necessarily involves many levels of an organization, from the CEO down, and may include outside experts. It should take in consideration all important stakeholders, including customers, investors, employees and regulators. Important elements of a plan include: The core crisis management team has been identified and each member knows his or her role; The most threatening vulnerabilities have been identified and timeline scenarios addressing each have been developed; Key stakeholders/audiences have been identified, along with their likely concerns related to the most threatening vulnerabilities; The most effective communication channels for each category of stakeholder have been identified and plans are in place to quickly access each channel; A company spokesperson has been appointed and trained; The plan has been rehearsed; The plan is periodically reviewed and updated. Large companies often use outside consultants to help develop crisis management plans and to assist in the event of a crisis. Smaller companies are far less likely to call on consultants, though companies of every size can benefit from expert advice. Some types of insurance policies, such as cyber liability policies, make crisis management services available for certain types of events, enabling a broader spectrum of companies to benefit from crisis management expertise. What should happen when a crisis occurs? Two things must happen right away when a crisis erupts: the problem must be fixed, and communication with stakeholders must be quickly established. Fixing the problem. According to nearly three-quarters of global business leaders surveyed by public relations firm Weber Shandwick and KRC Research, a key step in the reputation recovery process is announcing specific actions the company is taking to fix the problem. 3
5 Only rarely can a serious problem be fixed immediately. A dangerously defective product can be recalled, but injuries may continue to mount. A financial fraud may be identified and the perpetrators arrested, but it may take years for the company to return to pre-fraud financial health. But even if there is no quick fix, management must be seen as moving decisively to remedy the problem. Actions seen as superficial or ineffectual are likely to be more damaging than helpful. Communicating with stakeholders. Rarely does it pay to try to cover up or minimize a serious event. Companies fare best when they acknowledge the seriousness of the situation, display regret and concern for consequences of the event, assert commitment to make things right, and demonstrate that senior management is in control of the situation. Quickly and effectively communicating with the full range of stakeholders is vitally important to help mitigating damage. Companies must stay on top of communications about the event, otherwise the media and other organizations will take control of the story. Quick and forceful communication helps companies define the agenda and reinforces the impression that management is in control of the situation. It also can help generate good will with stakeholders. Companies must stay on top of communications about the event, otherwise the media and other organizations will take control of the story. If not the very first, one of the first categories of stakeholder to be notified after an event is the company s employees. Communicating quickly and openly with employees reassures them that the situation is under control, enables management to sympathize with their concerns, imparts important information to help bring the rumor mill to a halt, and permits management to lay down rules as to what can and cannot be communicated to outsiders, and who is authorized to speak for the company. Depending on the nature of the event and the size of the company, communications outside the company can take the form of press releases, press briefings, face-toface meetings with regulators or other key stakeholders, updates posted on the company s website, television or newspaper advertising, or s. Some companies have leveraged the enormous popularity of social networking websites such as Facebook and Twitter to get their messages out. A vitally important communication network is the company s sales force, which should be recruited to deliver scripted messages individually to important customers and prospects. While a company should designate a spokesperson to handle most routine communications with the media, the CEO almost always should be highly visible throughout the process. The CEO is the public face of an organization, and is expected by all stakeholders to demonstrate leadership at a time of crisis. Subsequent actions. Repairing a reputation can take years, and companies may be judged on their activities relative to a crisis long after the event triggering the crisis has passed. Depending on the nature of the crisis and the type of company involved, ongoing activities may be required for months or even years after the initial crisis has passed. For example, an environmental mishap may require regular testing of contaminated property or health check-ups for people exposed to toxic chemicals. Similarly a data breach may necessitate credit monitoring for victims for a period of time. 4
6 Transforming a crisis into a reputation win. Most often, companies consider themselves fortunate to survive a crisis with their reputations intact or only slightly battered. Companies that are highly prepared to respond effectively to a crisis, however, occasionally emerge with newfound respect from stakeholders. Companies that turn a disaster into a net gain in reputation almost always are those that respond quickly and decisively, taking full responsibility for mistakes and executing an action plan that remedies the problem and makes whole or at least as whole as possible those damaged in the incident. Conclusions Nearly two-thirds of executives participating in a reputational risk survey by Weber Shandwick and KRC Research said they believe it is harder to recover from reputation failure than it is to build and maintain a reputation. These same executives estimated it takes, on average, between three and four years for a company to recover from serious reputational damage. Some companies never recover. Senior executives widely acknowledge the importance of reputational risk management, but comparatively few effectively plan for a crisis. As a result, when a crisis occurs, companies typically scramble to take control of the situation, and often make serious missteps. A well-conceived crisis management plan, and an organization rehearsed in executing the plan, can not only help avoid a crisis becoming a reputational disaster, it may be the foundation to turn a very bad situation into a net gain in respect from customers and investors. 5
7 Zurich 1400 American Lane, Schaumburg, Illinois A A (09/10) The information in this publication was compiled from sources believed to be reliable for informational purposes only. All sample policies and procedures herein should serve as a guideline, which you can use to create your own policies and procedures. We trust that you will customize these samples to reflect your own operations and believe that these samples may serve as a helpful platform for this endeavor. Any and all information contained herein is not intended to constitute legal advice and accordingly, you should consult with your own attorneys when developing programs and policies. We do not guarantee the accuracy of this information or any results and further assume no liability in connection with this publication and sample policies and procedures, including any information, methods or safety suggestions contained herein. Moreover, Zurich reminds you that this cannot be assumed to contain every acceptable safety and compliance procedure or that additional procedures might not be appropriate under the circumstances. The subject matter of this publication is not tied to any specific insurance product nor will adopting these policies and procedures ensure coverage under any insurance policy Zurich American Insurance Company
Business Continuity Management
Business Continuity Management Factsheet To prepare for change, change the way you prepare In an intensely competitive environment, a permanent market presence is essential in order to satisfy customers
More informationSocial Media in Business: Friend or Foe?
Social Media in Business: Friend or Foe? Susan Morton Marsh Risk Consulting Reputational Risk & Crisis Management Leadership, Knowledge, Solutions Worldwide. Agenda Social Media Defined What is it, who
More informationTHE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
More informationCare Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management
Care Providers Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Care providers are there to help those in need. But who helps the care
More informationA winning strategy for workers compensation management
A winning strategy for workers compensation management Introduction Unfortunately, workers compensation too often becomes a battleground between employees and employers. This article uses an analogy of
More informationALERT PRESERVING YOUR REPUTATION FINANCIAL SERVICES. Glass, china, and reputation are easily cracked, and never well mended.
FINANCIAL SERVICES ALERT January 2011 Issue 17 PRESERVING YOUR REPUTATION Maintaining a reputation is hard. Failure to do so can be catastrophic. The insurance industry is proficient at helping clients
More informationPower plant safety: a wise business move
Power plant safety: a wise business move Power plant safety: a wise business move Going to work in a controlled and safe environment is not an unreasonable expectation for any worker. In many occupations,
More informationManaging Your REPUTATION. Before Someone Else Does it for You
Managing Your REPUTATION Before Someone Else Does it for You PRESENTATION OVERVIEW Definition and Strategic overview Pitfalls and Examples Do s and Do Not s and Tools to Use Q&A Opportunity FINANCIAL INSTITUTIONS
More informationThe 8 Hour MBA. There are four recommended threads in The 8 Hour MBA: Adding Value Business Strategy Leadership Strategy 1 Leadership Strategy 2
The 8 Hour MBA If you don t have the time to complete an MBA degree but still want to understand the key concepts then this course is for you. As well discuss concepts that you don t see in an MBA program
More informationVirtual world, real risks. When social media becomes a liability
Virtual world, real risks When social media becomes a liability When social media becomes a liability Since setting up its Facebook fan page, Starbucks has amassed a captive audience of 25 million fans
More informationManaging Social Media During a Consumer Product Recall
Managing Social Media During a Consumer Product Recall Thanks to the advent of social media, companies and consumers now have a direct line to each other to exchange information and voice opinions, whether
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More informationData Security Breaches: Learn more about two new regulations and how to help reduce your risks
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
More informationSOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)
INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015
More informationrisk management & crisis response Building a Proactive Risk Management Program
October 2014 risk management & crisis response Building a Proactive Risk Management Program Increasingly, businesses face a myriad of issues that expose them and their officers and directors to litigation,
More informationPreparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised
ACE USA Podcast Released February 3, 2010 Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior
More informationTHE CCO. Fortune Global 500 CCO
THE RISING CCO Corporations act, brands don t. Reputation matters. Corporations need to have a voice and presence in times of crisis in order to maintain client confidence, trust, and good reputation.
More informationHit ratios are still very low for Security & Privacy coverage: What are companies waiting for?
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations
More informationWhy Crisis Response and Business Continuity Plans Fail
Why Crisis Response and Business Continuity Plans Fail 10 Lessons Learned from Real-World Experience Many organizations invest considerable time, money and effort in developing Crisis Response and Business
More informationData Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
More information8 Ways To Build Your Brand Using Social Media
8 Ways To Build Your Brand Using Social Media 1 introduction 8 Ways to Build Your Brand Using Social Media Social media has changed the way our entire world works. Everyone has an equal voice and immediate
More informationSocial Media and Risk Communications
Social Media and Risk Communications William Lachowsky wlachows@uoguelph.ca Department of Food Science University of Guelph Guelph, Ontario Remember when? Media The storage and transmission channels
More informationNavigating the complexities and risks of doing business abroad
Navigating the complexities and risks of doing business abroad Navigating the complexities and risks of doing business abroad International commerce has become increasingly accessible in recent years,
More informationThings To Do After You ve Been Hacked
Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise
More informationManaging social media risks to reputation risk A hot topic on the board agenda
Managing social media risks to reputation risk A hot topic on the board agenda Henry Ristuccia Global Governance, Regulatory & Risk Strategies leader Deloitte Touche Tohmatsu Limited Michael Rossen Director
More informationInternet Reputation Management Guide. Building a Roadmap for Continued Success
Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company
More informationCrisis Communication @ Nestlé
Crisis Communication @ Nestlé Geneva, 29 June 2012 Marc Schaedeli Group Risk Management 29/06/2012 Joint OECD / IRGC Expert Workshop Agenda Introduction Policy & Guidelines Application @ Nestlé 2 Nestlé
More informationSMALL BUSINESS REPUTATION & THE CYBER RISK
SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to
More informationThe promise and pitfalls of cyber insurance January 2016
www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped
More informationWorking with the Federal Government on Cybersecurity
O B S I D I A N C Y B E R S E C U R I T Y O C C A S I O N A L P A P E R Working with the Federal Government on Cybersecurity Preparation is Key to Success December 5, 2013 Table of Contents CONSIDER THIS...
More informationCrisis Management Guide
Crisis Management Guide The Crisis Management Guide has been designed to help your company effectively respond to a crisis situation. Crises, large and small can be minimized if a thorough Crisis Management
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationNegligent hiring: How to reduce your chances of hiring a claim
Negligent hiring: How to reduce your chances of hiring a claim An employee fired for stealing from his employer comes into work the next day with a gun and kills eight people. A trucker with a history
More informationExecutive Suite Series An Akamai White Paper
An Akamai White Paper Plan vs. Panic: Making a DDoS Mitigation Playbook Part of Your Incident Response Plan Introduction When a huge Distributed Denial-of-Service (DDoS) attack took down the Website of
More informationEffectively Managing Environmental Compliance
Effectively Managing Environmental Compliance Many organizations today are faced with increasingly complex tasks related to managing regulatory compliance. Effectively meeting the challenges of compliance
More informationCYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
More informationReputational and Regulatory Risk Management in Life Insurance
Reputational and Regulatory Risk Management in Life Insurance By Bhudolia, Manoj & Pahwa, Khushwant Abstract Traditionally, the role of actuaries working in life insurance companies have been more or less
More informationthe company behind the brand: in reputation we trust
the company behind the brand: in reputation we trust At the close of 2011, Weber Shandwick and KRC Research conducted The Company behind the Brand: In Reputation We Trust, a survey that investigated the
More informationTHE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED
THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED THE CYBER SECURITY PLAYBOOK 2 03 Introduction 04 Changing Roles, Changing Threat
More informationFINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world
More informationKea Influencer Relations and Marketing for High-Tech & Technology Providers
Kea Analyst Relations Industry analysts play a key role in defining markets and educating buyers. We work with clients to identify and track the most influential and relevant industry analysts, and advise
More informationData Breach Readiness
Data Breach Readiness 877.983.9850 Partner@Intersections.com www.intersections.com Introduction Few events can damage a company s reputation more than losing the personal confidential information entrusted
More informationIt ain t slander if it s true.
It ain t slander if it s true. Reputation management in a social networking society Reputation Management in a Social Networking Society 1 dna13.com white paper The evolution of communication technologies
More informationwww.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
More informationConstructing a successful business continuity plan
Constructing a successful business continuity plan By Alan Berman Alan Berman Being prepared is the cornerstone of having a business continuity plan regardless of the size of a company. Ultimately, getting
More informationVENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
More informationHIGH ON THE RISK RADAR REPUTATION RISK
BUSINESS MANAGEMENT HIGH ON THE RISK RADAR REPUTATION RISK Reputation risk is top of mind for executive management, so here s how to manage it effectively. Words by Liz Brown Reputation risk it s not new,
More informationCharities & Not for Profit Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management
Charities & Not for Profit Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Charities are there to help those in need. But who helps
More informationBusiness Resilience Communications. Planning and executing communication flows that support business continuity and operational effectiveness
Business Resilience Communications Planning and executing communication flows that support business continuity and operational effectiveness Introduction Whispir have spent the last 14 years helping organisations
More informationAdvice for Digital Reputation Management: Own It. A FiveBlocks Whitepaper
Advice for Digital Reputation Management: Own It. A FiveBlocks Whitepaper Introduction There are several elements that comprise a company s online presence. The most obvious is the company s own website,
More informationRisk Management How to manage your brand & build business resilience to improve your bottom line
2010 RMIA Members Forum Primary focus for RMIA in 2011 Risk Management How to manage your brand & build business resilience to improve your bottom line Grant Whitehorn RMIA Chief Executive Officer CPA
More informationHow to better manage the insurance-buying process for your Independent Auto Dealership
How to better manage the insurance-buying process for your Independent Auto Dealership About this guide The process of purchasing insurance may not be one of your favorite things to do while managing your
More informationBranding and Managing Reputational Risk
Research Note Branding and Managing Reputational Risk By Emily Oxenford Copyright 2011, ASA Institute for Risk & Innovation Keywords: reputation risk, risk management, brand strategy, organizational brand,
More informationWRITTEN TESTIMONY BY DAVID SNELL FEDERAL BENEFITS SERVICE DIRECTOR NATIONAL ACTIVE AND RETIRED FEDERAL EMPLOYEES ASSOCIATION
WRITTEN TESTIMONY BY DAVID SNELL FEDERAL BENEFITS SERVICE DIRECTOR NATIONAL ACTIVE AND RETIRED FEDERAL EMPLOYEES ASSOCIATION BEFORE UNITED STATES HOUSE OF REPRESENTATIVES COMMITTEE ON SCIENCE, SPACE, AND
More informationSocial Media s Role in Crisis Management: A Call for Greater Legal Vigilance
Social Media s Role in Crisis Management: A Call for Greater Legal Vigilance INTRODUCTION From a viral video purporting to show poor treatment of banking customers, to a UK retailer s rogue employee live-tweeting
More informationASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationCyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
More informationRisk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION
1 Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION Background 2 Technology has become the central component of business operations Businesses have become more vulnerable to risks associated
More informationCRISIS MANAGEMENT, REPUTATION RISK AND SOCIAL MEDIA
CRISIS MANAGEMENT, REPUTATION RISK AND SOCIAL MEDIA Simon Taylor The Redcote Consultancy 1 www.redcote.org Reputation the most precious asset It takes 20 years to build a reputation and five minutes to
More informationIntegrity Continuity: Avoiding and Surviving (Un)Ethical Disasters. Robert C. Chandler, Ph.D., Pepperdine University Malibu, California USA
Integrity Continuity: Avoiding and Surviving (Un)Ethical Disasters Robert C. Chandler, Ph.D., Pepperdine University Malibu, California USA Changing our Minds It couldn t happen to us a false sense of security,
More informationInsurance protection for employees abroad
Insurance protection for employees abroad Insurance protection for employees abroad The recent political upheaval in the Middle East and the unprecedented catastrophe in Japan highlight the issues companies
More informationRestaurants & Hospitality
TRADE NAME RESTORATION (TNR ) Business Interruption Coverage For Food Borne Illness Restaurants & Hospitality These Industries May Need More Than Just Traditional Coverages Policy Property General Liability
More informationHow To Manage Social Media Risk
www.pwc.co.uk/riskassurance Social media governance Harnessing your social media opportunity June 2014 Social media allows organisations to engage with people directly, express their corporate personality
More informationEnterprise Risk Management
2013 Government Accounting and Auditing Update Enterprise Risk Management Understanding and Implementing an ERM Framework Mike Sargent, Director- CliftonLarsonAllen May 2013 cliftonlarsonallen.com Discussion
More informationBlending Corporate Governance with. Information Security
Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power
More informationAssessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
More informationAssessment of natural hazards, man made hazards, technical and societal related risks and associated impact.
Aon Business Continuity Planning The Aon Business Continuity Planning practice provides consulting services that allow Aon clients to measure and manage their strategic and tactical risks through Crisis
More informationInternet Reputation Management Guidelines Building a Roadmap for Continued Success
Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.
More informationDiscover How a 360-Degree View of the Customer Boosts Productivity and Profits. eguide
Discover How a 360-Degree View of the Customer Boosts Productivity and Profits eguide eguide Discover How a 360-Degree View of the Customer Boosts Productivity and Profits A guide on the benefits of using
More informationApplication Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
More informationGUIDE Wealth Management. 9 Social Media Guidelines for Wealth Management Firms
GUIDE Wealth Management 9 Social Media Guidelines for Wealth Management Firms Wealth Management 9 Social Media Guidelines for Wealth Management Firms Wealth management firms that embrace social media can
More informationA NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
More informationTHE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust
THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX How to create a thriving business through email trust FORWARD Today the role of the CISO is evolving rapidly. Gone are the days of the CISO as primarily
More informationCyber-Security Risk Management Framework (CSRM)
ABSTRACT The Security-Centric, Cyber-Security Risk Management (CSRM) framework expands on both the Internal Control Framework as well as Enterprise Risk Management Framework and proposes an effective Integrated
More informationCyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack
More informationManaging business risk
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
More informationPreparing for and coping with a crisis online. White Paper 2 Crisis management in a digital world
Contents 3 6 11 16 19 Introduction Preparing for a crisis During a crisis After the crisis About The Partners Group 2 In the new world of social media and mobile technology, communication is instantaneous,
More informationRemarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 It s a pleasure to be with you back home in Boston. I was here just six weeks ago
More informationCYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
More informationCYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
More informationExercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
More informationInformation Retention and ediscovery Survey GLOBAL FINDINGS
2011 Information Retention and ediscovery Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: There is more to ediscovery than email... 8 Finding 2: Wide variations in information
More informationThe Do s and Don ts of Outsourcing Your Call Center William D. Puso, Vice President & Managing Partner, The INSIGHT Group
The Do s and Don ts of Outsourcing Your Call Center William D. Puso, Vice President & Managing Partner, The INSIGHT Group Making the Decision Thinking about outsourcing your Call Center? This isn t a small
More informationHow To Understand The Risks And Opportunities Of Insurance In Canada
Canadian Insurance Industry Risks & Opportunities Survey May 2014 kpmg.ca 2 Canadian Insurance Industry Risks & Opportunities Survey May 2014 We are pleased to release the results of our first annual Canadian
More informationProtecting Your Reputation During a Crisis WHITE paper Risk Management Series
Protecting Your Reputation During a Crisis WHITE paper Risk Management Series WHITE paper Risk Management Series Contents Protecting Your Reputation During a Crisis...2 Yes, It Can Happen...2 Preemptive
More informationINTO SMART CRISIS PREVENTION
TIP SHEET TURN SOCIAL INTELLIGENCE INTO SMART CRISIS PREVENTION Crisis management has completely changed in less than a decade. In 2003, a crisis happened when the press got wind of something that hurt
More informationRisks and uncertainties
Risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal risks that
More informationRogers Insurance Client Presentation
Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com
More informationRisk Management Policy and Framework
Risk Management Policy and Framework December 2014 phone 1300 360 605 08 89589500 email info@centraldesert.nt.gov.au location 1Bagot Street Alice Springs NT 0870 post PO Box 2257 Alice Springs NT 0871
More informationBurson-Marsteller Website Benchmarking
Burson-Marsteller Website Benchmarking How well does your website serve your stakeholders? Every organisation has a broad spectrum of stakeholders ranging from customers or clients, suppliers and employees
More informationWho s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
More informationTHE CCO. IMPROVING COMPANY REPUTATION: THE CCO s MANDATE
THE RISING With a majority of global companies having weathered a reputational crisis within the past two years, it s not surprising that improving corporate reputation tops senior management s expectations
More informationThe Value of Email DLP
The Value of Email DLP Identifying and Minimizing Your Organization s Greatest Risk By ZixCorp www.zixcorp.com Zix Email Data Loss Prevention Page 1 CLICKING SEND IS ALMOST TOO EASY. We ve all had those
More informationFOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand
FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.
More informationBUSINESS CONTINUITY PLAN
How to Develop a BUSINESS CONTINUITY PLAN To print to A4, print at 75%. TABLE OF CONTENTS SUMMARY SUMMARY WHAT IS A BUSINESS CONTINUITY PLAN? CHAPTER PREPARING TO WRITE YOUR BUSINESS CONTINUITY PLAN CHAPTER
More informationZurich s Workers Compensation Claims Kit
Zurich s Workers Compensation Claims Kit A guide from a leader you can count on. With 50 state-specific workers compensation laws, a multitude of federal workers compensation laws and the provisions of
More informationSmall business contracts and surety. Risks and opportunities affecting small and large businesses
Small business contracts and surety Risks and opportunities affecting small and large businesses Many surety customers are looking closely at small business contracts as a potential area of growth. This
More informationManage the unexpected
Manage the unexpected Navigate risks and thrive Today s business world is threatened by a multitude of online security risks. But many organizations simply do not have the resources or expertise to combat
More information