Posts From Ken Lynch

Using Data to Assess Risk

Following a data-driven approach is the best way of running a successful business. Data collection and analysis applies to many different areas- from understanding customer trends to reducing operational costs. But data also applies to risk management. By using analytics

Read More

Vendor Risk Management: What is it?

In today’s business world, companies rely on third-party vendors for many different services. Such vendors may provide cloud-based software, infrastructure, and operational support daily. Third party vendors enable your company to save on costs, increase efficiency, and achieve growth. However,

Read More

Data Analytics Strategy for Internal Audits

Are you an evolver, a follower, or an observer? Well, the influential audit firm, Price-Waterhouse Cooper (PWC), shed some light on the difference between the three in its 2018 “State of the Internal Audit Profession Study”. Let’s look at the

Read More

Securing the Cloud

The adoption of cloud storage has become all the rage among enterprises around the world due to its accessibility, scalability, and decreased IT overhead. However, cloud storage security has now become a top concern for organizations despite its convenience and

Read More

Important Facts You Need To Know About Enterprise Risk Management

Enterprise Risk Management (ERM) is a system that seeks to find out potential risks for businesses. The idea is to find risks and establish a way to prevent or minimize them. Despite coming off as being similar to the traditional

Read More

How Are COBIT and Risk Management Related?

What’s Risk Management? Risk management is simply a way of identifying risk as it relates to enterprises and companies. When it comes to enterprise risk management (ERM), the process goes beyond just identifying risk: you have to take another step

Read More

How Connected Data is Transforming Risk Management

Connected devices are a cause of cybersecurity concerns for small, medium, and large businesses across all sectors. Any attempt at securing data environments requires the establishment of impenetrable cyber security frameworks for IoT devices. The National Institute of Standards and

Read More