Logo

Risk Management

What are the key steps in the ISO 31000 risk management process?

The ISO 31000 risk management process includes five essential steps for identifying, assessing, and managing risks. First, identify risks faced by your organization. Second, analyze the likelihood and possible impact of each risk. Third, evaluate and prioritize risks based on business objectives. Fourth, treat or respond to risk conditions through appropriate actions. Fifth, monitor the results of risk controls and adjust as necessary. This framework helps organizations establish a systematic approach to risk management by determining their risk appetite and implementing effective controls. While straightforward in concept, the process requires a solid understanding of organizational operations and includes upfront methods to establish scope, business context, and risk criteria to effectively manage threats and opportunities.

Watch clip answer (07:29m)
Thumbnail

Eye on Tech

01:44 - 09:14

What is Security Compliance?

Security compliance refers to following regulations, standards and guidelines set to protect sensitive information and data. It ensures that organizations implement necessary measures to safeguard data from unauthorized access or breaches, and is crucial in various industries to maintain data integrity and confidentiality. The process involves regular audits and assessments to ensure adherence to legal requirements and industry best practices. Non-compliance can result in severe consequences, including financial penalties and damage to an organization's reputation. By implementing proper security compliance measures, organizations demonstrate their commitment to protecting data security and privacy.

Watch clip answer (00:42m)
Thumbnail

County Office Law

00:09 - 00:52

What role should government play in managing AI safety and mitigating risks from advanced artificial intelligence?

According to the discussion, governments should play a critical role when public safety is at risk from advanced AI, particularly digital superintelligence. Rishi Sunak emphasized that governments should develop capabilities to test AI models before they're released, with his Safety Institute working to protect the public from potential risks. Elon Musk agreed that while most software poses no public safety risk, advanced AI is different and requires government intervention to safeguard public interests. Both leaders highlighted the importance of external safety testing of AI models, with governments taking responsibility for managing potential dangers associated with superintelligent systems.

Watch clip answer (01:24m)
Thumbnail

Rishi Sunak

03:08 - 04:32

What are the key best practices for managing quality in construction projects?

Contractors should establish robust quality standards and controls that exist throughout the entire project lifecycle, from inception through completion and into the warranty period. These standards should prioritize client satisfaction alongside financial considerations. While making money is critical, maintaining quality must be done in a manner that fosters positive client relationships for long-term business success. Effective quality management includes thorough communication within the firm and conducting post-project evaluations to capture lessons learned. Construction firms benefit from implementing internal peer reviews where team members from other projects can provide fresh perspectives on quality issues. This sharing of expertise and best practices helps prevent repeated mistakes and strengthens quality standards across the organization.

Watch clip answer (02:58m)
Thumbnail

AIA Contract Documents

47:29 - 50:28

What happens when organizations fail to implement cybersecurity recommendations after a breach?

As illustrated by Lee Kim's client example, organizations that experience a breach but fail to improve their cybersecurity measures often face repeated attacks. This particular client suffered a second breach just two weeks after the initial incident because they neglected to conduct a postmortem analysis, implement tabletop exercises to test defenses, or deploy necessary security tools. In healthcare especially, the stakes are exceptionally high since compromised patient data, unlike financial information, cannot be replaced or restored once exposed. Breached healthcare data, particularly sensitive information like genomic sequences, remains permanently vulnerable once compromised.

Watch clip answer (00:55m)
Thumbnail

Talking HealthTech

05:38 - 06:34

What are the key changes shaping procurement as we head into 2025?

As procurement approaches 2025, three significant changes are transforming the field: AI integration, workforce demographics, and evolving focus. AI will revolutionize operations but requires careful management of privacy concerns and skill gaps. Meanwhile, the workforce is shifting as experienced professionals retire while younger talent remains hesitant to enter procurement, forcing teams to rethink talent strategies. Procurement's focus is also evolving from traditional cost-cutting to value creation, risk management, and sustainability. By embracing these trends as opportunities rather than challenges, professionals can achieve better outcomes for their teams and organizations in this changing landscape.

Watch clip answer (00:44m)
Thumbnail

Procurement Tactics

11:09 - 11:53

of9