Corporate risk management focuses on cash flows and liquidity; strength of the book of business; threats to brands, revenues, and reputations; natural and other disasters; system and security failures; and failures in the supply chain. These are the risk areas that corporate auditors and examiners look at and that the board expects regular updates on.
But missing from these criteria is risk planning for key corporate executives and contributors, a fact that was substantiated by a survey of more than 1,300 companies by executive recruitment firm Korn Ferry. The Korn Ferry survey revealed that that only 35% of 1,300 companies surveyed had a succ ...
Continue Reading With Our Free Trial
Already a member? Log in here
Upgrade now to get the whole story
More From Tech Pro Research
-
Downloads
Kubernetes: A guide for IT pros and business leaders
Kubernetes enables the deployment, scaling, and management of containerized applications. This ebook explains why the ecosystem matters, ways to take advantage of it, and how it may contribute to the ...
-
eBooks
Top cloud providers 2019: A leader’s guide to the major players
Competition in the cloud computing space is heating up this year. This ebook offers a look at the relative merits, advantages, and shortcomings of the most prominent contenders. From the ebook: ...
-
Tools & Templates
Telecommuting policy
As more and more employees request the opportunity to perform some or all of their work from a remote location, the need has grown for organizations to have clearly defined guidelines that govern empl...
-
Tools & Templates
Feature comparison: Data analytics software and services
Finding the best data analytics software, services, and tools for your business requires extended research and a systematic evaluation of features. This download includes an overview of factors to con...
-
eBooks
Spectre and Meltdown: An insider’s guide
Design flaws in modern chip design have emerged as a significant threat to the security of data on PCs and mobile devices. This comprehensive ebook delves into two prominent vulnerabilities—Spectre an...
-
Tools & Templates
Comparison chart: VPN service providers
Selecting the right VPN provider for your needs requires a fair bit of legwork because the choices are many and the offerings vary greatly. This quick-glance chart rounds up 15 of the top contenders a...
-
Downloads
5G Research Report 2019: The enterprise is eager to adopt, despite cost concerns and availability
5G: The next-generation wireless network is finally a reality, and businesses remain eager to embrace this new technology. 5G will be popularized via telecom carriers and the marketing of wire-cutting...
-
eBooks
IoT security: A guide for IT leaders
The Internet of Things is delivering data and helpful insights to organizations around the world--but it has also introduced new and potentially devastating vulnerabilities. This ebook offers a compre...
-
Tools & Templates
Resource and data recovery policy
Employees, data, and resources are three of the biggest assets in any organization. All employees should be familiar with the processes for recovering information if it becomes lost, inaccessible, or ...
-
Tools & Templates
Feature comparison: CRM software and services
Choosing a CRM solution requires strategy, thoughtful consideration, and more than a little research. These guidelines and comparison tool provide a customizable framework your business can use to fin...
-
Tools & Templates
CD and DVD Policy
Seemingly innocent, CDs and DVDs have recently appeared on the market containing Digital Rights Management (DRM) software, which includes a rootkit to hide them from your system. Hackers have begun ex...
-
Tools & Templates
Crash Course: Microsoft Word
This pre-packaged presentation contains everything you need to instruct end users about how to get the most out of Microsoft Word--even if you don't consider yourself a public speaker. It includes a P...
-
Tools & Templates
Wireless Communications Policy
Wireless networks are becoming more and more popular. They're also an easy way for hackers and competitors to hack your network if improperly configured or used. This policy's purpose is to help dete...
-
Tools & Templates
TechRepublic's Streaming Media Policy
Numerous reports confirm streaming media use is on the rise. From video streams to subscription music sites, use of streaming media is growing rapidly year-over-year. Streaming media applications and ...
-
eBooks
Deleting User Accounts Without Deleting Data Files
When you delete a user account on Windows XP, you can also lose the user's data if you're not careful. This FastAnswer show you how to keep from losing data when deleting a profile.
-
eBooks
Assigning Keywords To Files
XP's Search feature can help you find data files on a workstation quickly, but you can make it even faster. This FastAnswer shows how to add keywords to file to help Search find them faster.
-
eBooks
First Look: Microsoft Office 2007
This presentation is based on Microsoft Office 2007 Beta 2 applications, offering a visual tour of some of the most significant enhancements. It is not intended to teach audience members how to use th...
-
Tools & Templates
IT Hardware and Software Purchasing Policy
Your IT Budget is tight. You want to get the most bang for your IT buck. That's where the IT Hardware and Software Purchasing Policy can help. This policy's purpose is to help properly set the bounda...
-
eBooks
First Look: Microsoft Windows Vista
This presentation is based on Microsoft Vista Beta 2 offering a visual tour of some of the most significant enhancements. It is not intended to teach audience members how to use the product; instead, ...
-
Tools & Templates
Crash Course: HTML
This pre-packaged presentation contains everything you need to get end users up to speed about HTML --even if you don't consider yourself a public speaker. It includes a PowerPoint presentation and sp...
-
Tools & Templates
CD and DVD Policy
Seemingly innocent, CDs and DVDs have recently appeared on the market containing Digital Rights Management (DRM) software, which includes a rootkit to hide them from your system. Hackers have begun ex...
-
Tools & Templates
Crash Course: Microsoft Word
This pre-packaged presentation contains everything you need to instruct end users about how to get the most out of Microsoft Word--even if you don't consider yourself a public speaker. It includes a P...
-
Tools & Templates
Wireless Communications Policy
Wireless networks are becoming more and more popular. They're also an easy way for hackers and competitors to hack your network if improperly configured or used. This policy's purpose is to help dete...
-
Tools & Templates
TechRepublic's Streaming Media Policy
Numerous reports confirm streaming media use is on the rise. From video streams to subscription music sites, use of streaming media is growing rapidly year-over-year. Streaming media applications and ...
-
eBooks
Deleting User Accounts Without Deleting Data Files
When you delete a user account on Windows XP, you can also lose the user's data if you're not careful. This FastAnswer show you how to keep from losing data when deleting a profile.
-
eBooks
Assigning Keywords To Files
XP's Search feature can help you find data files on a workstation quickly, but you can make it even faster. This FastAnswer shows how to add keywords to file to help Search find them faster.
-
eBooks
First Look: Microsoft Office 2007
This presentation is based on Microsoft Office 2007 Beta 2 applications, offering a visual tour of some of the most significant enhancements. It is not intended to teach audience members how to use th...
-
Tools & Templates
IT Hardware and Software Purchasing Policy
Your IT Budget is tight. You want to get the most bang for your IT buck. That's where the IT Hardware and Software Purchasing Policy can help. This policy's purpose is to help properly set the bounda...
-
eBooks
First Look: Microsoft Windows Vista
This presentation is based on Microsoft Vista Beta 2 offering a visual tour of some of the most significant enhancements. It is not intended to teach audience members how to use the product; instead, ...
-
Tools & Templates
Crash Course: HTML
This pre-packaged presentation contains everything you need to get end users up to speed about HTML --even if you don't consider yourself a public speaker. It includes a PowerPoint presentation and sp...