Skip Ribbon Commands
Skip to main content


Risk Knowledge Risk Knowledge

Risk Knowledge

Risk Knowledge is a searchable library of relevant information for today's risk professionals. Available materials include RIMS Executive Reports, survey findings, contributed articles, industry research, benchmarking data and more.



Search By:

Showing 1-25 of 188 items    Sort by:
Active Risk and Opportunity Planning Worksheet
The purpose of the Active Risk & Opportunity Planning (AROP) process is to ensure that uncertainties in terms of risks and opportunities are being adequately addressed in due time.
Author:  RIMS
Date: May 15, 2017
Risk Management Value Creation at Australia Post
Susie Jones of Australia Post describes how risk managers create value at her organization, and how those efforts are rewarded.
Author:  Susie Jones
Date: May 8, 2017
Fighting Bribery and Corruption
A plurality of risk and compliance professionals believe the top risk to their anti-bribery and corruption program will come from third parties.
Author:  Hilary Tuttle
Date: May 1, 2017
Risk Management Priorities
With increasing ERM adoption and risk management visibility, what are the top risk management priorities for 2017?
Author:  Hilary Tuttle
Date: May 1, 2017
Risk-Based Approaches to Cybersecurity
Existing frameworks can help guide companies to improve cybersecurity practices.
Author:  Marc Woolward
Date: May 1, 2017
The Infrastructure Investment Gap
The United States spends only 2.5% of its GDP on infrastructure.
Author:  Caroline McDonald
Date: May 1, 2017
RIMS Business Interruption Survey 2017
The 2017 report takes a look at the challenges that can lead to business interruption, as well as strategies to prevent and manage the impact of such occurrences.
Author:  RIMS Business Interruption Working Group
Date: April 25, 2017
MARSH RIMS Excellence in Risk Management XIV
The 14th annual report explores risk management and disruptive technologies including telematics, sensors, the Internet of Things, smart buildings and robotics.
Author:  MARSH, RIMS
Date: April 24, 2017
Transitioning to Enterprise Risk Management
The report, authored by members of RIMS ERM Committee, explores common characteristics of risk management programs and provides practitioners with five fundamental steps to help them successfully transition to a broader enterprise risk management approach.
Author:  RIMS
Date: April 19, 2017
Elevating Data Risk Management to the Board Level
For many, data risk management and cybersecurity is something like climate change—the facts are widely accepted, but the solution is much more elusive.
Author:  Patrick Dennis
Date: April 12, 2017
RIMS Professional Growth Model
The model provides a guideline for risk management professionals – and the organizations that employ them – about the professional knowledge, skills and abilities that support risk management career development and growth.
Author:  RIMS ERM Committee, RIMS Rising Risk Professionals Group
Date: April 6, 2017
RIMS Risk Management Professional Core Competency Model
Used in conjunction with the RIMS Professional Growth Model, this model highlights expected proficiencies in seven areas: core competencies, attributes, organizational knowledge, business knowledge, risk management knowledge, technical skills and management knowledge.
Author:  RIMS ERM Committee
Date: April 6, 2017
BYOD Risk Meets IoT Reality
Enterprises struggle to understand just how vulnerable they are to the risks introduced by connected devices in the workplace.
Author:  Hilary Tuttle
Date: April 3, 2017
Q&A: Bridging the Gaps at PayPal
PayPal’s Laura Langone discusses cyber insurance and the role of education in the buying process.
Author:  Hilary Tuttle
Date: April 3, 2017
Five Critical Security Considerations for Working with Third-Party IT Vendors
To help ensure that the proper safeguards are in place to have a secure and productive relationship with its third-party IT vendors, companies should consider a five-point checklist.
Author:  Isaac Kohen
Date: March 27, 2017
How to Create a Cyber-Savvy Corporate Culture
When it comes to cybersecurity, the conversation normally focuses on technology, policies and processes. But too often these discussions overlook a critical component: people.
Author:  Steve Martino
Date: March 20, 2017