Lýsing:
A practical, real-world guide for implementing enterprise risk management (ERM) programs into your organization Enterprise risk management (ERM) is a complex yet critical issue that all companies must deal with in the twenty-first century. Failure to properly manage risk continues to plague corporations around the world. ERM empowers risk professionals to balance risks with rewards and balance people with processes.
But to master the numerous aspects of enterprise risk management, you must integrate it into the culture and operations of the business. No one knows this better than risk management expert James Lam, and now, with Implementing Enterprise Risk Management: From Methods to Applications , he distills more than thirty years' worth of experience in the field to give risk professionals a clear understanding of how to implement an enterprise risk management program for every business.
Offers valuable insights on solving real-world business problems using ERM Effectively addresses how to develop specific ERM tools Contains a significant number of case studies to help with practical implementation of an ERM program While Enterprise Risk Management: From Incentives to Controls, Second Edition focuses on the "what" of ERM, Implementing Enterprise Risk Management: From Methods to Applications will help you focus on the "how.
Annað
- Höfundur: James Lam
- Útgáfa:1
- Útgáfudagur: 2017-03-13
- Hægt að prenta út 10 bls.
- Hægt að afrita 2 bls.
- Format:ePub
- ISBN 13: 9781118235362
- Print ISBN: 9780471745198
- ISBN 10: 1118235363
Efnisyfirlit
- Cover
- Title Page
- Copyright
- Dedication
- Preface
- Overview of the Book
- Suggested Chapters by Audience
- Acknowledgments
- Part One: ERM in Context
- Chapter 1: Fundamental Concepts and Current State
- Introduction
- What Is Risk?
- What Does Risk Look Like?
- Enterprise Risk Management (ERM)
- The Case for ERM
- Where ERM Is Now
- Where ERM Is Headed
- Notes
- Chapter 2: Key Trends and Developments
- Introduction
- Lessons Learned from the Financial Crisis
- The Wheel of Misfortune Revisited
- Global Adoption
- Notes
- Chapter 3: Performance-Based Continuous ERM
- Introduction
- Phase Three: Creating Shareholder Value
- Performance-Based Continuous ERM
- Case Study: Legacy Technology
- Notes
- Chapter 4: Stakeholder Requirements
- Introduction
- Stakeholders Defined
- Managing Stakeholder Value with ERM
- Implementing a Stakeholder Management Program
- Appendix A: Reputational Risk Policy
- Notes
- Chapter 1: Fundamental Concepts and Current State
- Chapter 5: The ERM Project
- Introduction
- Barriers to Change
- Establish the Vision
- Obtain Buy-In from Internal Stakeholders
- Assess Current Capabilities Against Best Practices
- Develop a Roadmap
- Appendix A: ERM Maturity Model
- Appendix B: Practical Plan for ERM Program Implementation
- Chapter 6: Risk Culture
- Introduction
- Risk Culture Success Factors
- Best Practice: Risk Escalation
- Conclusion
- Notes
- Chapter 7: The ERM Framework
- Introduction
- The Need for an ERM Framework
- ERM Framework Criteria
- Current ERM Frameworks
- An Update: The Continuous ERM Model
- Developing a Framework
- Conclusion
- Notes
- Chapter 8: The Three Lines of Defense
- Introduction
- COSO's Three Lines of Defense
- Problems with This Structure
- The Three Lines of Defense Revisited
- Bringing It All Together: How the Three Lines Work in Concert
- Conclusion
- Notes
- Chapter 9: Role of the Board
- Introduction
- Regulatory Requirements
- Current Board Practices
- Case Study: Satyam
- Three Levers for ERM Oversight
- Conclusion
- Notes
- Chapter 10: The View from the Risk Chair
- Introduction
- Turnaround Story
- The GPA Model in Action
- Top Priorities for the Risk Oversight Committee
- Conclusion
- Notes
- Chapter 11: Rise of the CRO
- Introduction
- History and Rise of the CRO
- A CRO's Career Path
- The CRO's Role
- Hiring a CRO
- A CRO's Progress
- Chief Risk Officer Profiles
- Notes
- Chapter 12: Risk Appetite Statement
- Introduction
- Requirements of a Risk Appetite Statement
- Developing a Risk Appetite Statement
- Roles and Responsibilities
- Monitoring and Reporting
- Examples of Risk Appetite Statements and Metrics
- Notes
- Chapter 13: Risk Control Self-Assessments
- Introduction
- Risk Assessment: An Overview
- RCSA Methodology
- Phase 1: Setting the Foundation
- Phase 2: Risk Identification, Assessment, and Prioritization
- Phase 3: Deep Dives, Risk Quantification, and Management
- Phase 4: Business and ERM Integration
- ERM and Internal Audit Collaboration
- Notes
- Chapter 14: Risk Quantification Models
- Introduction
- Market Risk Models
- Credit Risk Models
- Operational Risk Models
- Model Risk Management
- The Loss/Event Database
- Early Warning Indicators
- Model Risk Case Study: AIG
- Notes
- Chapter 15: Strategic Risk Management
- Introduction
- The Importance of Strategic Risk
- Measuring Strategic Risk
- Managing Strategic Risk
- Appendix A: Strategic Risk Models
- Notes
- Chapter 16: Risk-Based Performance Management
- Introduction
- Performance Management and Risk
- Performance Management and Capital
- Performance Management and Value Creation
- Summary
- Notes
- Chapter 17: Integration of KPIs and KRIs
- Introduction
- What Is an Indicator?
- Using Key Performance Indicators
- Building Key Risk Indicators
- KPI and KRI Program Implementation
- Best Practices
- Conclusion
- Notes
- Chapter 18: ERM Dashboard Reporting
- Introduction
- Traditional Risk Reporting vs. ERM Dashboard Reporting
- General Dashboard Requirements
- Implementing ERM Dashboards
- Avoid Common Mistakes
- Best Practices
- Notes
- Chapter 19: Feedback Loops
- Introduction
- What Is a Feedback Loop?
- Examples of Feedback Loops
- ERM Performance Feedback Loop
- Measuring Success with the ERM Scorecard
- Notes
- Chapter 20: Additional ERM Templates and Outlines
- Introduction
- Strategic Risk Assessment
- CRO Report to the Risk Committee
- Cybersecurity Risk Appetite and Metrics
- Model Risk Policy
- Risk Escalation Policy
- Notes
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 11780
- Útgáfuár : 2017
- Leyfi : 379