KnowledgeLeader Blog

Guide to Records Management

Posted by Protiviti KnowledgeLeader on Thu, Jun 28, 2018 @ 01:24 PM

Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving records. From creation to disposition, records in electronic recordkeeping systems may now utilize a variety of media. An example of an electronic recordkeeping system is one in which a personal computer generates the original records, which are subsequently stored on a secondary electronic resource. While paper copies of the electronic records may be printed for distribution, the original records are transferred electronically.

Read More

Topics: Fraud, Risk Assessment, IT Risk, Strategic Risk, Document Retention, Performance Management/Measurement

How Does Opportunity Risk Apply to Financial Business Processes?

Posted by Protiviti KnowledgeLeader on Thu, May 03, 2018 @ 10:08 AM

Opportunity risk occurs whenever there’s a possibility that a better opportunity may become available after having committed to an irreversible decision.

We all experience opportunity risk at its most basic level several times a week. For example, imagine you have enough cash on you for lunch in a new town and you’re trying to decide between two restaurants you’ve never tried. What if you spend your time and money on the first option and it’s terrible? Or even maybe it’s not terrible, but the second option is just so much better?

Read More

Topics: Risk Assessment, Strategic Risk, Performance Management/Measurement, Budgeting, Cost Management

How Can Human Resource Risk Be Managed?

Posted by Protiviti KnowledgeLeader on Thu, Apr 05, 2018 @ 10:01 AM

“All of the blame and none of the praise”

This was how one Human Resource professional described their job in a forum on tech recruiting recently. Human Resources (HR) can be a bit of a mine field full of potential hazards and risks while searching for that perfect candidate to fill a company’s needs. 

Read More

Topics: Laws & Regulations, Human Resources, Risk Assessment, Strategic Risk, Performance Management/Measurement

How To Minimize Customer Fraud Risk

Posted by Protiviti KnowledgeLeader on Thu, Mar 22, 2018 @ 04:41 PM

Fraud is the intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right. In the business community, the ultimate goal of fraud is to gain money. There are numerous frauds within the business world.

Read More

Topics: Fraud, Ethics, Risk Assessment, Strategic Risk, Performance Management/Measurement, Customer Satisfaction

What is Organizational Alignment Risk?

Posted by Protiviti KnowledgeLeader on Thu, Feb 22, 2018 @ 11:33 AM

What is Organizational Alignment Risk?

Organizational alignment is defined as a conscious and systematic coordination and alignment of three powerful and interrelated driving forces: organizational strategy, organizational culture and organizational infrastructure. Organizational alignment is to be mutually supportive and contribute as efficiently and effectively as possible to meet organizational goals and objectives.

Read More

Topics: Enterprise Risk Management, Risk Assessment, Audit Committee & Board, Strategic Risk, Performance Management/Measurement

Process Alignment Risk Key Performance Indicators Guide

Posted by Protiviti KnowledgeLeader on Fri, Jan 05, 2018 @ 08:38 AM

What Is Process Alignment Risk?

This is the risk that the business processes within a company may not be appropriately aligned with its corporate strategy, resulting in the inability of the organization to meet the demands of its customers efficiently and effectively. Process alignment can be defined as the synchronization of business process objectives and performance measures with organizational objectives and strategies, with a view to avoiding conflicting, uncoordinated activities.

Read More

Topics: Risk Assessment, Strategic Risk, Knowledge Management

Risk Assessment Maps and Prioritizing Business Processes

Posted by Protiviti KnowledgeLeader on Fri, Nov 17, 2017 @ 08:39 AM

Risk assessment helps identify and document critical business processes and the internal controls within each process. Combined with facilitated management meetings, this approach can help gain company-wide consensus by including key process owners in risk and controls analysis.

Read More

Topics: Enterprise Risk Management, Risk Assessment, Governance, Risk & Compliance

Guide to Risk and Risk Reporting

Posted by Protiviti KnowledgeLeader on Fri, Sep 01, 2017 @ 08:22 AM

Business risk is the level of exposure to uncertainties that the enterprise must understand and effectively manage as it achieves its objectives and creates value. It is not just about threats; there is an upside as well as a downside. Risk is not about a single point estimate—time frame is an important factor when evaluating risk, and exposure and uncertainty are important factors.

Read More

Topics: Risk Assessment, Governance, Risk & Compliance, Strategic Risk

Close-the-Books Guide: Reduce Financial Close Risk

Posted by Protiviti KnowledgeLeader on Fri, Aug 04, 2017 @ 07:30 AM

A fast, close-the-books process provides multiple benefits for the finance function and for the company. First, a fast close process creates more time for finance professionals to focus on strategic activities for the company, such as identifying warnings in financial data and providing the corporation's financial direction. It also reduces the cost of the finance function, since fewer hours are needed to close the books. And it demonstrates that the company's controls and systems are well organized; the company sends the message to its competitors and to the investment community that it is expert at performing business processes.

Read More

Topics: Risk Assessment, Accounting/Finance, Financial Reporting, Close the Books

What Is Internal Audit’s Role in Cyber Security?

Posted by Katrina Opgenorth on Fri, Jun 09, 2017 @ 08:57 AM

Corporations today are thinking about how to protect assets. A few of the white collar crime problems include hacking/intrusions (cyber vulnerability), insider/outsider trading (convergence of cyber and financial crimes), the Foreign Corrupt Practices Act (FCPA), spear fishing (email compromise) and economic espionage. They must consider the possibility of internal corruption or external corruption, and environmental factors such as culture and competition contributing to these crimes. As protection, organizations can use cyber security, pen testing and data loss prevention tactics.

Read More

Topics: Enterprise Risk Management, Internal Audit, Internal Controls, Risk Assessment, Cybersecurity, IT Controls

Add a Comment:

Subscribe to Our Blog

About KnowledgeLeader

KnowledgeLeader, provided by Protiviti, is the premier resource for internal audit and risk management professionals.

With over 1,400 customizable tools and 1,300 articles by industry experts, we offer the most comprehensive service on the market.

For more information:

 Tour the Site

Recent Posts

Posts by Topic

see all