Board Oversight and Insight

Posted on May 30, 2014

I see the board providing two broad areas of value to an organization and its owners: oversight of management, providing assurance to the owners and other stakeholders that management is running the organization effectively and in the interests of those stakeholders; and, insight – helping the management team with the selection of strategies and their execution that create value.

continue reading...

The Risk of Judgment Errors in Financial Reporting

Posted on May 24, 2014

Our friends at Deloitte have shared their insights on a “framework” for ensuring that organizations minimize the risk of exercising poor judgment where called for in accounting and financial reporting.

continue reading...

Talking Sense about COSO 2013 and SOX

Posted on May 16, 2014

Congratulations to Financial Executives International (FEI, one of the sponsoring organizations behind COSO) and its Accounting Policy Analysis and Communications Director, Edith Orenstein. 

continue reading...

Excellence in Risk Management Is More Dream Than Reality

Posted on May 11, 2014

Marsh is one of the leading insurance brokers and risk management consulting organizations. In partnership with the Risk Management Society (RIMS), they have published a Special Report: Excellence in Risk Management XI – Risk Management and Organizational Alignment: A Strategic Focus (registration required). 

continue reading...

The CIO as Builder of the Business

Posted on May 3, 2014

I am encouraged to see that leading CIOs, according to a recent report from Deloitte University Press, now “describe their roles in terms such as ‘imagination,’ ‘chief innovation officer,’ and ‘revenue-generator CIO.’”

continue reading...

Do You Know Who Has Broken Into Your System?

Posted on May 3, 2014

Traditional information security (or cyber security) is focused on preventing unauthorized access to your network, systems, applications, infrastructure, and data. But, as we all know only too well, the people trying to get in are exposing and exploiting vulnerabilities faster than we can plug the holes. 

continue reading...