Reputational risk and crisis management

Size: px
Start display at page:

Download "Reputational risk and crisis management"

Transcription

1 Reputational risk and crisis management

2 Reputational risk and crisis management The nightmare scenario for a CEO might be a tainted product, a deadly accident or a humiliating scandal. Within days, or perhaps even within a few short hours, a carefully cultivated brand is threatened and a sparkling corporate reputation is at risk of being ruined. Bad things happen to even very good organizations, but it isn t necessarily the bad things themselves that destroy reputations. Bad things happen to even very good organizations, but it isn t necessarily the bad things themselves that destroy reputations. Often the deciding factor is how a company responds when something goes wrong. If the crisis is managed badly, the company may never recover. If handled well, the company may even enhance its reputation. Companies with superior reputations have been shown to have sustainable competitive advantages and enjoy materially higher average annual stock price increases. In some industries, reputation can be a company s single most valuable asset. But reputations also can be fragile. Thanks to the Internet and the 24/7 news cycle, bad news, including rumors, misinformation and libelous attacks, can spread across the globe in an instant. Adversaries such as activists, disgruntled customers and angry former employees can launch potentially damaging attacks through blogs, message boards and dedicated websites. Companies with strong reputations may simply deflect many reputational challenges. Additionally, threats often can be nipped in the bud through proactive reputation management. But some extreme events can overwhelm a company s defenses and deeply damage or even irreparably destroy its reputation. In a full-blown crisis, a range of high-intensity crisis management procedures must immediately be implemented. Companies that are best prepared to deal with a potentially ruinous situation are those that have developed and rehearsed a comprehensive crisis management plan. Reputational risk and reputational risk management Reputation is not an attribute of an organization; reputation exists solely in the minds of others. A company may possess a good reputation, but what it actually owns is the benefit of a positive consensus about its conduct. Many companies seek to actively manage their reputations by instilling and reinforcing positive associations in the minds of those who are important to the success of the company, especially customers and investors. Managing a reputation also requires monitoring external perceptions and responding quickly and effectively to threats. The possibility that events may undermine trust in a company is called reputational risk. Reputational risk arises from a wide array of actions, including failure to comply with regulatory or legal obligations, failure to deliver expected standards of service and product, unethical practices, failure to hit financial performance targets, labor unrest and environmental breaches. Reputational risk also arises from external factors such as the actions of a competitor that cast a cloud over an entire sector. Activities that can help prevent reputational damage, or help mitigate the consequences of a damaging event, collectively are called reputational risk 1

3 management. At the heart of reputational risk management is overall good corporate governance companies that are managed well might typically avoid activities that undermine trust, and they have a reservoir of good will to help cushion occasional bad news. Many senior executives, however, are not content to rely exclusively on good corporate governance as a defense against a damaged reputation, and insist on proactive steps to manage reputational risk. Specific activities can include: collecting and analyzing customer feedback; monitoring the media, including Internet blogs and message boards; managing the company s relationship with the media; investor relationship management; diligence in regulatory compliance and managing relationships with regulators; tracking business, economic, social and regulatory trends that may spawn new risks; and managing relationships with potentially adversarial special interest groups. These highly unlikely, but extremely powerful, events present enormous potential reputational damage and can often redefine the career of the leader in charge at the time. Reputational risk management activities typically are distributed among a number of departments and individuals, making it challenging to develop and execute a cohesive strategy. While the optimal means of coordinating reputational risk management may vary by industry, company size, structure and corporate culture, companies should consider embedding reputational risk management within an enterprise risk management (ERM) program that addresses all aspects of an organization s risk profile. In addition to providing a platform for managing reputational risk across the organization, ERM helps companies avoid strategic surprises that can threaten reputations, and aids in identifying emerging risks, according to Calvin E. Beyer, head of the Manufacturing segment of the Middle Market Commercial Group of Zurich North America. ERM also helps pinpoint interdependencies and contingent risks situations that can produce the chain reactions that are the precursors of catastrophic losses. Crisis management Companies face frequent challenges to their reputations, and well-regarded organizations that engage in reputational risk management activities usually fend them off without lasting damage. But occasionally exceptional events overwhelm companies usual reputational risk defenses. These highly unlikely, but extremely powerful, events present enormous potential reputational damage and can often redefine the career of the leader in charge at the time, according to Mr. Beyer. The types of disasters that can destroy a company s reputation vary by industry. A financial services firm may be the victim of a data breach that compromises sensitive customer information. An airline may be grounded for safety violations. A chemical company may expose a community to toxic substances. A manufacturing company may need to recall a dangerously defective product. Some types of disasters transcend industry groups. Any company could be the victim of financial fraud. 2

4 When disaster strikes, the companies that fare best are those prepared to quickly execute a thorough and well-rehearsed crisis response plan. Crisis response plan Most organizations are not well-prepared to respond quickly in a crisis. A 2005 survey of senior risk managers by the Economist Intelligence Unit found that less than half of respondents said their firms are good at crisis management while 11 percent rated their firms as poor. Large firms are more likely than smaller ones to have a well developed crisis management plan. For many companies, crisis management is a reactive process scrambling to seize control of the situation after a crisis occurs rather than a proactive discipline. Making crisis management a proactive discipline means developing and rehearsing a crisis response plan. Such a plan necessarily involves many levels of an organization, from the CEO down, and may include outside experts. It should take in consideration all important stakeholders, including customers, investors, employees and regulators. Important elements of a plan include: The core crisis management team has been identified and each member knows his or her role; The most threatening vulnerabilities have been identified and timeline scenarios addressing each have been developed; Key stakeholders/audiences have been identified, along with their likely concerns related to the most threatening vulnerabilities; The most effective communication channels for each category of stakeholder have been identified and plans are in place to quickly access each channel; A company spokesperson has been appointed and trained; The plan has been rehearsed; The plan is periodically reviewed and updated. Large companies often use outside consultants to help develop crisis management plans and to assist in the event of a crisis. Smaller companies are far less likely to call on consultants, though companies of every size can benefit from expert advice. Some types of insurance policies, such as cyber liability policies, make crisis management services available for certain types of events, enabling a broader spectrum of companies to benefit from crisis management expertise. What should happen when a crisis occurs? Two things must happen right away when a crisis erupts: the problem must be fixed, and communication with stakeholders must be quickly established. Fixing the problem. According to nearly three-quarters of global business leaders surveyed by public relations firm Weber Shandwick and KRC Research, a key step in the reputation recovery process is announcing specific actions the company is taking to fix the problem. 3

5 Only rarely can a serious problem be fixed immediately. A dangerously defective product can be recalled, but injuries may continue to mount. A financial fraud may be identified and the perpetrators arrested, but it may take years for the company to return to pre-fraud financial health. But even if there is no quick fix, management must be seen as moving decisively to remedy the problem. Actions seen as superficial or ineffectual are likely to be more damaging than helpful. Communicating with stakeholders. Rarely does it pay to try to cover up or minimize a serious event. Companies fare best when they acknowledge the seriousness of the situation, display regret and concern for consequences of the event, assert commitment to make things right, and demonstrate that senior management is in control of the situation. Quickly and effectively communicating with the full range of stakeholders is vitally important to help mitigating damage. Companies must stay on top of communications about the event, otherwise the media and other organizations will take control of the story. Quick and forceful communication helps companies define the agenda and reinforces the impression that management is in control of the situation. It also can help generate good will with stakeholders. Companies must stay on top of communications about the event, otherwise the media and other organizations will take control of the story. If not the very first, one of the first categories of stakeholder to be notified after an event is the company s employees. Communicating quickly and openly with employees reassures them that the situation is under control, enables management to sympathize with their concerns, imparts important information to help bring the rumor mill to a halt, and permits management to lay down rules as to what can and cannot be communicated to outsiders, and who is authorized to speak for the company. Depending on the nature of the event and the size of the company, communications outside the company can take the form of press releases, press briefings, face-toface meetings with regulators or other key stakeholders, updates posted on the company s website, television or newspaper advertising, or s. Some companies have leveraged the enormous popularity of social networking websites such as Facebook and Twitter to get their messages out. A vitally important communication network is the company s sales force, which should be recruited to deliver scripted messages individually to important customers and prospects. While a company should designate a spokesperson to handle most routine communications with the media, the CEO almost always should be highly visible throughout the process. The CEO is the public face of an organization, and is expected by all stakeholders to demonstrate leadership at a time of crisis. Subsequent actions. Repairing a reputation can take years, and companies may be judged on their activities relative to a crisis long after the event triggering the crisis has passed. Depending on the nature of the crisis and the type of company involved, ongoing activities may be required for months or even years after the initial crisis has passed. For example, an environmental mishap may require regular testing of contaminated property or health check-ups for people exposed to toxic chemicals. Similarly a data breach may necessitate credit monitoring for victims for a period of time. 4

6 Transforming a crisis into a reputation win. Most often, companies consider themselves fortunate to survive a crisis with their reputations intact or only slightly battered. Companies that are highly prepared to respond effectively to a crisis, however, occasionally emerge with newfound respect from stakeholders. Companies that turn a disaster into a net gain in reputation almost always are those that respond quickly and decisively, taking full responsibility for mistakes and executing an action plan that remedies the problem and makes whole or at least as whole as possible those damaged in the incident. Conclusions Nearly two-thirds of executives participating in a reputational risk survey by Weber Shandwick and KRC Research said they believe it is harder to recover from reputation failure than it is to build and maintain a reputation. These same executives estimated it takes, on average, between three and four years for a company to recover from serious reputational damage. Some companies never recover. Senior executives widely acknowledge the importance of reputational risk management, but comparatively few effectively plan for a crisis. As a result, when a crisis occurs, companies typically scramble to take control of the situation, and often make serious missteps. A well-conceived crisis management plan, and an organization rehearsed in executing the plan, can not only help avoid a crisis becoming a reputational disaster, it may be the foundation to turn a very bad situation into a net gain in respect from customers and investors. 5

7 Zurich 1400 American Lane, Schaumburg, Illinois A A (09/10) The information in this publication was compiled from sources believed to be reliable for informational purposes only. All sample policies and procedures herein should serve as a guideline, which you can use to create your own policies and procedures. We trust that you will customize these samples to reflect your own operations and believe that these samples may serve as a helpful platform for this endeavor. Any and all information contained herein is not intended to constitute legal advice and accordingly, you should consult with your own attorneys when developing programs and policies. We do not guarantee the accuracy of this information or any results and further assume no liability in connection with this publication and sample policies and procedures, including any information, methods or safety suggestions contained herein. Moreover, Zurich reminds you that this cannot be assumed to contain every acceptable safety and compliance procedure or that additional procedures might not be appropriate under the circumstances. The subject matter of this publication is not tied to any specific insurance product nor will adopting these policies and procedures ensure coverage under any insurance policy Zurich American Insurance Company

Business Continuity Management

Business Continuity Management Business Continuity Management Factsheet To prepare for change, change the way you prepare In an intensely competitive environment, a permanent market presence is essential in order to satisfy customers

More information

Social Media in Business: Friend or Foe?

Social Media in Business: Friend or Foe? Social Media in Business: Friend or Foe? Susan Morton Marsh Risk Consulting Reputational Risk & Crisis Management Leadership, Knowledge, Solutions Worldwide. Agenda Social Media Defined What is it, who

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management Care Providers Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Care providers are there to help those in need. But who helps the care

More information

A winning strategy for workers compensation management

A winning strategy for workers compensation management A winning strategy for workers compensation management Introduction Unfortunately, workers compensation too often becomes a battleground between employees and employers. This article uses an analogy of

More information

ALERT PRESERVING YOUR REPUTATION FINANCIAL SERVICES. Glass, china, and reputation are easily cracked, and never well mended.

ALERT PRESERVING YOUR REPUTATION FINANCIAL SERVICES. Glass, china, and reputation are easily cracked, and never well mended. FINANCIAL SERVICES ALERT January 2011 Issue 17 PRESERVING YOUR REPUTATION Maintaining a reputation is hard. Failure to do so can be catastrophic. The insurance industry is proficient at helping clients

More information

Power plant safety: a wise business move

Power plant safety: a wise business move Power plant safety: a wise business move Power plant safety: a wise business move Going to work in a controlled and safe environment is not an unreasonable expectation for any worker. In many occupations,

More information

Managing Your REPUTATION. Before Someone Else Does it for You

Managing Your REPUTATION. Before Someone Else Does it for You Managing Your REPUTATION Before Someone Else Does it for You PRESENTATION OVERVIEW Definition and Strategic overview Pitfalls and Examples Do s and Do Not s and Tools to Use Q&A Opportunity FINANCIAL INSTITUTIONS

More information

The 8 Hour MBA. There are four recommended threads in The 8 Hour MBA: Adding Value Business Strategy Leadership Strategy 1 Leadership Strategy 2

The 8 Hour MBA. There are four recommended threads in The 8 Hour MBA: Adding Value Business Strategy Leadership Strategy 1 Leadership Strategy 2 The 8 Hour MBA If you don t have the time to complete an MBA degree but still want to understand the key concepts then this course is for you. As well discuss concepts that you don t see in an MBA program

More information

Virtual world, real risks. When social media becomes a liability

Virtual world, real risks. When social media becomes a liability Virtual world, real risks When social media becomes a liability When social media becomes a liability Since setting up its Facebook fan page, Starbucks has amassed a captive audience of 25 million fans

More information

Managing Social Media During a Consumer Product Recall

Managing Social Media During a Consumer Product Recall Managing Social Media During a Consumer Product Recall Thanks to the advent of social media, companies and consumers now have a direct line to each other to exchange information and voice opinions, whether

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT) INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

risk management & crisis response Building a Proactive Risk Management Program

risk management & crisis response Building a Proactive Risk Management Program October 2014 risk management & crisis response Building a Proactive Risk Management Program Increasingly, businesses face a myriad of issues that expose them and their officers and directors to litigation,

More information

Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised

Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised ACE USA Podcast Released February 3, 2010 Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior

More information

THE CCO. Fortune Global 500 CCO

THE CCO. Fortune Global 500 CCO THE RISING CCO Corporations act, brands don t. Reputation matters. Corporations need to have a voice and presence in times of crisis in order to maintain client confidence, trust, and good reputation.

More information

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations

More information

Why Crisis Response and Business Continuity Plans Fail

Why Crisis Response and Business Continuity Plans Fail Why Crisis Response and Business Continuity Plans Fail 10 Lessons Learned from Real-World Experience Many organizations invest considerable time, money and effort in developing Crisis Response and Business

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

8 Ways To Build Your Brand Using Social Media

8 Ways To Build Your Brand Using Social Media 8 Ways To Build Your Brand Using Social Media 1 introduction 8 Ways to Build Your Brand Using Social Media Social media has changed the way our entire world works. Everyone has an equal voice and immediate

More information

Social Media and Risk Communications

Social Media and Risk Communications Social Media and Risk Communications William Lachowsky wlachows@uoguelph.ca Department of Food Science University of Guelph Guelph, Ontario Remember when? Media The storage and transmission channels

More information

Navigating the complexities and risks of doing business abroad

Navigating the complexities and risks of doing business abroad Navigating the complexities and risks of doing business abroad Navigating the complexities and risks of doing business abroad International commerce has become increasingly accessible in recent years,

More information

Things To Do After You ve Been Hacked

Things To Do After You ve Been Hacked Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise

More information

Managing social media risks to reputation risk A hot topic on the board agenda

Managing social media risks to reputation risk A hot topic on the board agenda Managing social media risks to reputation risk A hot topic on the board agenda Henry Ristuccia Global Governance, Regulatory & Risk Strategies leader Deloitte Touche Tohmatsu Limited Michael Rossen Director

More information

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company

More information

Crisis Communication @ Nestlé

Crisis Communication @ Nestlé Crisis Communication @ Nestlé Geneva, 29 June 2012 Marc Schaedeli Group Risk Management 29/06/2012 Joint OECD / IRGC Expert Workshop Agenda Introduction Policy & Guidelines Application @ Nestlé 2 Nestlé

More information

SMALL BUSINESS REPUTATION & THE CYBER RISK

SMALL BUSINESS REPUTATION & THE CYBER RISK SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to

More information

The promise and pitfalls of cyber insurance January 2016

The promise and pitfalls of cyber insurance January 2016 www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped

More information

Working with the Federal Government on Cybersecurity

Working with the Federal Government on Cybersecurity O B S I D I A N C Y B E R S E C U R I T Y O C C A S I O N A L P A P E R Working with the Federal Government on Cybersecurity Preparation is Key to Success December 5, 2013 Table of Contents CONSIDER THIS...

More information

Crisis Management Guide

Crisis Management Guide Crisis Management Guide The Crisis Management Guide has been designed to help your company effectively respond to a crisis situation. Crises, large and small can be minimized if a thorough Crisis Management

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Negligent hiring: How to reduce your chances of hiring a claim

Negligent hiring: How to reduce your chances of hiring a claim Negligent hiring: How to reduce your chances of hiring a claim An employee fired for stealing from his employer comes into work the next day with a gun and kills eight people. A trucker with a history

More information

Executive Suite Series An Akamai White Paper

Executive Suite Series An Akamai White Paper An Akamai White Paper Plan vs. Panic: Making a DDoS Mitigation Playbook Part of Your Incident Response Plan Introduction When a huge Distributed Denial-of-Service (DDoS) attack took down the Website of

More information

Effectively Managing Environmental Compliance

Effectively Managing Environmental Compliance Effectively Managing Environmental Compliance Many organizations today are faced with increasingly complex tasks related to managing regulatory compliance. Effectively meeting the challenges of compliance

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Reputational and Regulatory Risk Management in Life Insurance

Reputational and Regulatory Risk Management in Life Insurance Reputational and Regulatory Risk Management in Life Insurance By Bhudolia, Manoj & Pahwa, Khushwant Abstract Traditionally, the role of actuaries working in life insurance companies have been more or less

More information

the company behind the brand: in reputation we trust

the company behind the brand: in reputation we trust the company behind the brand: in reputation we trust At the close of 2011, Weber Shandwick and KRC Research conducted The Company behind the Brand: In Reputation We Trust, a survey that investigated the

More information

THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED

THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED THE CYBER SECURITY PLAYBOOK 2 03 Introduction 04 Changing Roles, Changing Threat

More information

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world

More information

Kea Influencer Relations and Marketing for High-Tech & Technology Providers

Kea Influencer Relations and Marketing for High-Tech & Technology Providers Kea Analyst Relations Industry analysts play a key role in defining markets and educating buyers. We work with clients to identify and track the most influential and relevant industry analysts, and advise

More information

Data Breach Readiness

Data Breach Readiness Data Breach Readiness 877.983.9850 Partner@Intersections.com www.intersections.com Introduction Few events can damage a company s reputation more than losing the personal confidential information entrusted

More information

It ain t slander if it s true.

It ain t slander if it s true. It ain t slander if it s true. Reputation management in a social networking society Reputation Management in a Social Networking Society 1 dna13.com white paper The evolution of communication technologies

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Constructing a successful business continuity plan

Constructing a successful business continuity plan Constructing a successful business continuity plan By Alan Berman Alan Berman Being prepared is the cornerstone of having a business continuity plan regardless of the size of a company. Ultimately, getting

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

HIGH ON THE RISK RADAR REPUTATION RISK

HIGH ON THE RISK RADAR REPUTATION RISK BUSINESS MANAGEMENT HIGH ON THE RISK RADAR REPUTATION RISK Reputation risk is top of mind for executive management, so here s how to manage it effectively. Words by Liz Brown Reputation risk it s not new,

More information

Charities & Not for Profit Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management

Charities & Not for Profit Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management Charities & Not for Profit Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Charities are there to help those in need. But who helps

More information

Business Resilience Communications. Planning and executing communication flows that support business continuity and operational effectiveness

Business Resilience Communications. Planning and executing communication flows that support business continuity and operational effectiveness Business Resilience Communications Planning and executing communication flows that support business continuity and operational effectiveness Introduction Whispir have spent the last 14 years helping organisations

More information

Advice for Digital Reputation Management: Own It. A FiveBlocks Whitepaper

Advice for Digital Reputation Management: Own It. A FiveBlocks Whitepaper Advice for Digital Reputation Management: Own It. A FiveBlocks Whitepaper Introduction There are several elements that comprise a company s online presence. The most obvious is the company s own website,

More information

Risk Management How to manage your brand & build business resilience to improve your bottom line

Risk Management How to manage your brand & build business resilience to improve your bottom line 2010 RMIA Members Forum Primary focus for RMIA in 2011 Risk Management How to manage your brand & build business resilience to improve your bottom line Grant Whitehorn RMIA Chief Executive Officer CPA

More information

How to better manage the insurance-buying process for your Independent Auto Dealership

How to better manage the insurance-buying process for your Independent Auto Dealership How to better manage the insurance-buying process for your Independent Auto Dealership About this guide The process of purchasing insurance may not be one of your favorite things to do while managing your

More information

Branding and Managing Reputational Risk

Branding and Managing Reputational Risk Research Note Branding and Managing Reputational Risk By Emily Oxenford Copyright 2011, ASA Institute for Risk & Innovation Keywords: reputation risk, risk management, brand strategy, organizational brand,

More information

WRITTEN TESTIMONY BY DAVID SNELL FEDERAL BENEFITS SERVICE DIRECTOR NATIONAL ACTIVE AND RETIRED FEDERAL EMPLOYEES ASSOCIATION

WRITTEN TESTIMONY BY DAVID SNELL FEDERAL BENEFITS SERVICE DIRECTOR NATIONAL ACTIVE AND RETIRED FEDERAL EMPLOYEES ASSOCIATION WRITTEN TESTIMONY BY DAVID SNELL FEDERAL BENEFITS SERVICE DIRECTOR NATIONAL ACTIVE AND RETIRED FEDERAL EMPLOYEES ASSOCIATION BEFORE UNITED STATES HOUSE OF REPRESENTATIVES COMMITTEE ON SCIENCE, SPACE, AND

More information

Social Media s Role in Crisis Management: A Call for Greater Legal Vigilance

Social Media s Role in Crisis Management: A Call for Greater Legal Vigilance Social Media s Role in Crisis Management: A Call for Greater Legal Vigilance INTRODUCTION From a viral video purporting to show poor treatment of banking customers, to a UK retailer s rogue employee live-tweeting

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION

Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION 1 Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION Background 2 Technology has become the central component of business operations Businesses have become more vulnerable to risks associated

More information

CRISIS MANAGEMENT, REPUTATION RISK AND SOCIAL MEDIA

CRISIS MANAGEMENT, REPUTATION RISK AND SOCIAL MEDIA CRISIS MANAGEMENT, REPUTATION RISK AND SOCIAL MEDIA Simon Taylor The Redcote Consultancy 1 www.redcote.org Reputation the most precious asset It takes 20 years to build a reputation and five minutes to

More information

Integrity Continuity: Avoiding and Surviving (Un)Ethical Disasters. Robert C. Chandler, Ph.D., Pepperdine University Malibu, California USA

Integrity Continuity: Avoiding and Surviving (Un)Ethical Disasters. Robert C. Chandler, Ph.D., Pepperdine University Malibu, California USA Integrity Continuity: Avoiding and Surviving (Un)Ethical Disasters Robert C. Chandler, Ph.D., Pepperdine University Malibu, California USA Changing our Minds It couldn t happen to us a false sense of security,

More information

Insurance protection for employees abroad

Insurance protection for employees abroad Insurance protection for employees abroad Insurance protection for employees abroad The recent political upheaval in the Middle East and the unprecedented catastrophe in Japan highlight the issues companies

More information

Restaurants & Hospitality

Restaurants & Hospitality TRADE NAME RESTORATION (TNR ) Business Interruption Coverage For Food Borne Illness Restaurants & Hospitality These Industries May Need More Than Just Traditional Coverages Policy Property General Liability

More information

How To Manage Social Media Risk

How To Manage Social Media Risk www.pwc.co.uk/riskassurance Social media governance Harnessing your social media opportunity June 2014 Social media allows organisations to engage with people directly, express their corporate personality

More information

Enterprise Risk Management

Enterprise Risk Management 2013 Government Accounting and Auditing Update Enterprise Risk Management Understanding and Implementing an ERM Framework Mike Sargent, Director- CliftonLarsonAllen May 2013 cliftonlarsonallen.com Discussion

More information

Blending Corporate Governance with. Information Security

Blending Corporate Governance with. Information Security Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

Assessment of natural hazards, man made hazards, technical and societal related risks and associated impact.

Assessment of natural hazards, man made hazards, technical and societal related risks and associated impact. Aon Business Continuity Planning The Aon Business Continuity Planning practice provides consulting services that allow Aon clients to measure and manage their strategic and tactical risks through Crisis

More information

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Internet Reputation Management Guidelines Building a Roadmap for Continued Success Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.

More information

Discover How a 360-Degree View of the Customer Boosts Productivity and Profits. eguide

Discover How a 360-Degree View of the Customer Boosts Productivity and Profits. eguide Discover How a 360-Degree View of the Customer Boosts Productivity and Profits eguide eguide Discover How a 360-Degree View of the Customer Boosts Productivity and Profits A guide on the benefits of using

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

GUIDE Wealth Management. 9 Social Media Guidelines for Wealth Management Firms

GUIDE Wealth Management. 9 Social Media Guidelines for Wealth Management Firms GUIDE Wealth Management 9 Social Media Guidelines for Wealth Management Firms Wealth Management 9 Social Media Guidelines for Wealth Management Firms Wealth management firms that embrace social media can

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX How to create a thriving business through email trust FORWARD Today the role of the CISO is evolving rapidly. Gone are the days of the CISO as primarily

More information

Cyber-Security Risk Management Framework (CSRM)

Cyber-Security Risk Management Framework (CSRM) ABSTRACT The Security-Centric, Cyber-Security Risk Management (CSRM) framework expands on both the Internal Control Framework as well as Enterprise Risk Management Framework and proposes an effective Integrated

More information

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

Preparing for and coping with a crisis online. White Paper 2 Crisis management in a digital world

Preparing for and coping with a crisis online. White Paper 2 Crisis management in a digital world Contents 3 6 11 16 19 Introduction Preparing for a crisis During a crisis After the crisis About The Partners Group 2 In the new world of social media and mobile technology, communication is instantaneous,

More information

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 It s a pleasure to be with you back home in Boston. I was here just six weeks ago

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Exercising Your Enterprise Cyber Response Crisis Management Capabilities Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.

More information

Information Retention and ediscovery Survey GLOBAL FINDINGS

Information Retention and ediscovery Survey GLOBAL FINDINGS 2011 Information Retention and ediscovery Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: There is more to ediscovery than email... 8 Finding 2: Wide variations in information

More information

The Do s and Don ts of Outsourcing Your Call Center William D. Puso, Vice President & Managing Partner, The INSIGHT Group

The Do s and Don ts of Outsourcing Your Call Center William D. Puso, Vice President & Managing Partner, The INSIGHT Group The Do s and Don ts of Outsourcing Your Call Center William D. Puso, Vice President & Managing Partner, The INSIGHT Group Making the Decision Thinking about outsourcing your Call Center? This isn t a small

More information

How To Understand The Risks And Opportunities Of Insurance In Canada

How To Understand The Risks And Opportunities Of Insurance In Canada Canadian Insurance Industry Risks & Opportunities Survey May 2014 kpmg.ca 2 Canadian Insurance Industry Risks & Opportunities Survey May 2014 We are pleased to release the results of our first annual Canadian

More information

Protecting Your Reputation During a Crisis WHITE paper Risk Management Series

Protecting Your Reputation During a Crisis WHITE paper Risk Management Series Protecting Your Reputation During a Crisis WHITE paper Risk Management Series WHITE paper Risk Management Series Contents Protecting Your Reputation During a Crisis...2 Yes, It Can Happen...2 Preemptive

More information

INTO SMART CRISIS PREVENTION

INTO SMART CRISIS PREVENTION TIP SHEET TURN SOCIAL INTELLIGENCE INTO SMART CRISIS PREVENTION Crisis management has completely changed in less than a decade. In 2003, a crisis happened when the press got wind of something that hurt

More information

Risks and uncertainties

Risks and uncertainties Risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal risks that

More information

Rogers Insurance Client Presentation

Rogers Insurance Client Presentation Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com

More information

Risk Management Policy and Framework

Risk Management Policy and Framework Risk Management Policy and Framework December 2014 phone 1300 360 605 08 89589500 email info@centraldesert.nt.gov.au location 1Bagot Street Alice Springs NT 0870 post PO Box 2257 Alice Springs NT 0871

More information

Burson-Marsteller Website Benchmarking

Burson-Marsteller Website Benchmarking Burson-Marsteller Website Benchmarking How well does your website serve your stakeholders? Every organisation has a broad spectrum of stakeholders ranging from customers or clients, suppliers and employees

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

THE CCO. IMPROVING COMPANY REPUTATION: THE CCO s MANDATE

THE CCO. IMPROVING COMPANY REPUTATION: THE CCO s MANDATE THE RISING With a majority of global companies having weathered a reputational crisis within the past two years, it s not surprising that improving corporate reputation tops senior management s expectations

More information

The Value of Email DLP

The Value of Email DLP The Value of Email DLP Identifying and Minimizing Your Organization s Greatest Risk By ZixCorp www.zixcorp.com Zix Email Data Loss Prevention Page 1 CLICKING SEND IS ALMOST TOO EASY. We ve all had those

More information

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.

More information

BUSINESS CONTINUITY PLAN

BUSINESS CONTINUITY PLAN How to Develop a BUSINESS CONTINUITY PLAN To print to A4, print at 75%. TABLE OF CONTENTS SUMMARY SUMMARY WHAT IS A BUSINESS CONTINUITY PLAN? CHAPTER PREPARING TO WRITE YOUR BUSINESS CONTINUITY PLAN CHAPTER

More information

Zurich s Workers Compensation Claims Kit

Zurich s Workers Compensation Claims Kit Zurich s Workers Compensation Claims Kit A guide from a leader you can count on. With 50 state-specific workers compensation laws, a multitude of federal workers compensation laws and the provisions of

More information

Small business contracts and surety. Risks and opportunities affecting small and large businesses

Small business contracts and surety. Risks and opportunities affecting small and large businesses Small business contracts and surety Risks and opportunities affecting small and large businesses Many surety customers are looking closely at small business contracts as a potential area of growth. This

More information

Manage the unexpected

Manage the unexpected Manage the unexpected Navigate risks and thrive Today s business world is threatened by a multitude of online security risks. But many organizations simply do not have the resources or expertise to combat

More information