Skip Ribbon Commands
Skip to main content
symbol

RIMS

Risk Knowledge Risk Knowledge

Risk Knowledge

Risk Knowledge is a searchable library of relevant information for today's risk professionals. Available materials include RIMS Executive Reports, survey findings, contributed articles, industry research, benchmarking data and more.

Categories









Type









Search By:

 
Showing 1-25 of 795 items    Sort by:
RIMS EXECUTIVE REPORT: Decoding Political Risk Management
The report provides a guide for risk professionals assessing their organizations’ political risk. It defines political risk and explores top concerns for organizations as they expand globally, the characteristics of these risks, mitigation strategies and the insurance market.
Author:  Brandon Righi
Date: August 3, 2016
Files:
Cyberattacks and the Risk to Infrastructure
Alarm bells should be ringing about the risks posed by cyberattackers who are penetrating physical infrastructure with greater frequency.
Author:  Daniel Wagner
Date: August 3, 2016
Category: Cyber Risk, Emerging Risks
Keywords: Hacking, cyber risk, infrastructure
Type: Article
Members Only? No
The Subjective Nature of Country Risk
Determining if a partner is high risk requires more than just an assessment of location.
Author:  Scott Lane
Date: August 1, 2016
Data Deluge: What the Panama Papers Mean for Business
The widespread corruption and third-party data security vulnerabilities revealed in the Panama Papers scandal demand attention now.
Author:  Hilary Tuttle
Date: August 1, 2016
The Benefits and Risks of Telemedicine
Advances in remote health care can save time and money, but new liability issues have emerged.
Author:  Benjamin Zhang
Date: August 1, 2016
Uncertainty Abounds After Brexit Vote
The U.K.’s decision to leave the European Union will have a lasting effect on the global economy.
Author:  Neil Hodge
Date: August 1, 2016
Captive Creativity
Many innovative companies are developing new strategic uses for their captives.
Author:  Caroline McDonald
Date: August 1, 2016
What Can a Captive Do for You?
Understanding the business advantages of setting up a captive will help risk managers add real business value to their companies.
Author:  Robert M. Horkovich, Andrew Walsh, Phillip England and Marshall Gilinsky
Date: August 1, 2016
Category: Captives, Insurance
Keywords: insurance, Captives, Captives
Type: Article
Members Only? No
Our New Pokemon Overlords
Pokemon Go takes over the world.
Author:  Morgan O'Rourke
Date: August 1, 2016
Constant Hacking
Nine out of 10 businesses experienced at least one hacking incident in the past year, yet risk managers may be doing less on some critical measures.
Author:  Hilary Tuttle
Date: August 1, 2016
Category: Cyber Risk, Research
Keywords: Hacking, Hartford Steam Boiler, cyber risk
Type: Article
Members Only? No
Human Rights and Corporate Wrongs
Companies are being held accountable for abusive practices in their supply chains.
Author:  Neil Hodge
Date: August 1, 2016
Category: Global, Risk Management (General)
Keywords: Corruption, Human Rights, Supply Chain, Slavery
Type: Article
Members Only? No
Social Engineering Fraud: A Case Study
A software company CEO shares a firsthand account of his company’s fight against scammers.
Author:  Tom Kemp
Date: August 1, 2016
Integrating Organizational Risk
While risk management is becoming increasingly prominent, companies are still trying to find a more integrated approach.
Author:  Caroline McDonald
Date: August 1, 2016
Three Easy Ways to Communicate Risk
Proper communication and training are critical to improve employee risk awareness.
Author:  Matthew Shinkman and Peter Young
Date: August 1, 2016
Mitigating Evolving Water Threats
As climate change takes its toll, businesses must act to address flood and drought risks.
Author:  Louis Gritzo
Date: August 1, 2016
Emerging Risks for the Insurance Industry
Swiss Re’s annual SONAR report points to the three risks likely to have the greatest potential impact on the insurance industry in the coming years.
Author:  Morgan O'Rourke
Date: August 1, 2016
IoT Complexity
As the internet of things expands, the risks and liability questions become more complicated.
Author:  Russ Banham
Date: August 1, 2016
Global Data Breach Guide
Provides the essential information every organization needs to know when facing a data breach in one or more countries.
Author:  World Law Group
Date: July 19, 2016
Turning Workplace Safety Into a Competitive Opportunity
Paying attention to workplace safety is inexpensive, clearly measurable and, when correctly applied, moves the strategy-impact needle like no other key metric.
Author:  Ward Ching, Dave Brickell and Sue Antonoplos
Date: July 6, 2016
The Risky Side of Specialty Drugs
Expensive specialty drugs can have a significant financial impact on a company’s self-funded health plan.
Author:  Bruce Roffé
Date: June 21, 2016
How Your CGL Policy May Help with Trademark Infringement Litigation
Recent case law signals that businesses may want to take another look at their CGL policies for coverage in intellectual property cases.
Author:  Syed S. Ahmad and Jennifer White
Date: June 14, 2016
Risk Taker vs. Risk Manager
The report explores goals, responsibilities and the value of collaboration between those charged with pursuing new opportunities and risk professionals. Best practices from leading organizations offer strategies for risk pros to develop relationships with both strategic and operational stakeholders.
Author:  Jessica Wasserman
Date: June 6, 2016
Files:
Soaking Wet Safety: How Water Parks Can Avoid Customer Injuries and Liability
While water parks can be fun, there are many risks for owners and operators who must keep customers safe and avoid liability.
Author:  David M. Kupfer
Date: June 1, 2016
Political Statements Send a Costly Message
What happens when artists cancel shows in protest against North Carolina’s “bathroom law?”
Author:  Caroline McDonald
Date: June 1, 2016
Downloading Danger: The Growing Threat of Mobile Malware
Hackers are increasingly using applications that contain mobile malware to target vulnerable employee smartphones.
Author:  Katherine Heires
Date: June 1, 2016
Next>|