Posts from Date: 2019-9
Why Technology Providers Now “Get IRM”
by John A. Wheeler | September 16, 2019
This past week, I enjoyed meeting with over 1,000 attendees at our annual Gartner Security and Risk Management Conference in London. At the event, the overwhelming feedback received is that integrated risk management (IRM) is needed now more than ever. Included in that feedback is the fact that technology providers see a rapid increase in […]
TRENDING TOPICS


Who's Blogging
- Vivek Swaminathan
- John Wheeler
- Craig Roth
- Simon Walker
- Bill Ray
- Avivah Litan
- Andrew White
- Mark Mcdonald
- Nicole Greene
- Tony Iams
- Jitendra Subramanyam
- Hank Barnes
- Scot Kim
- Mark Diodati
- Julian Poulter
- Jane Anne
- Rene Buest
- Rajesh Kandaswamy
- Samantha Searle
- Cassandra Nordlund
- Olive Huang
- Leah Reidy
- Dave Egloff
- Sally Witzky
- Anthony Bradley
- Steve Rietberg
- Marty Resnick
- Stephen White
- Kristina Laroccacerrone
- Ray Pun
- Jennifer Polk
- Emily Moquin
- Jason Mcnellis
- Jay Wilson
- Debbie Wilson
- Rick Franzosa
- Frances Russell
- Augusto Barros
- Jason Wong
- Marko Sillanpaa
- Augie Ray
- David Furlonger
- Christophe Uzureau
- Rick Lafond
- Danielle Henneberger
- Daniel Sanchezreina
- Eric Schmitt
- Chris Ross
- Frank Buytendijk
- Jim Hare
Show More
About
-
Recent Posts
Recent Comments
- John A. Wheeler on Gartner’s New IRM Magic Quadrant Signals End of GRC Era
- Guna Appalaraju on Gartner’s New IRM Magic Quadrant Signals End of GRC Era
- Nicole Williams on Digital GRC: The Dawn of a New Era
- Sharon on 10 Critical Elements of a Successful Risk Management Program
- Dakota Alexyn on Gartner’s New IRM Magic Quadrant Signals End of GRC Era
Archives
- December 2019
- October 2019
- September 2019
- August 2019
- July 2019
- May 2019
- March 2019
- February 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- June 2018
- April 2018
- March 2018
- January 2018
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- March 2017
- January 2017
- October 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- December 2015
- October 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- October 2014
- July 2014
- May 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
Categories
- Audit and Risk
- Audit Function Strategy and Management
- Audit management
- Audit Methodology and Engagement Execution
- Board and C-Suite Support
- Business Continuity Management
- Compliance management
- Cyber risk
- Cyber security
- Cyberinsurance
- Data and Analytics Strategies
- Digital Disruption and Innovation
- Digital risk
- Driving Digital Business Transformation for Industry Leadership
- Enterprise risk management
- Enterprise Risk Management Program Management
- GRC
- Information technology
- Innovation
- integrated risk management
- IRM
- IT risk management
- IT vendor risk management
- Leadership
- Legal and Compliance
- Legal risk
- Operational risk management
- Risk Assessment Process and Methodologies
- Risk Coverage
- Risk culture
- Risk Management
- Risk Management Process
- Risk Response Strategies
- Security
- Security and Risk Management Leaders
- Security of Applications and Data
- Social Media
- SOD Continuous Control Monitoring
- Strategic risk
- Technology and Emerging Trends
- Third-party risk management