Does Your Snow Removal Provider Have Proper Insurance Coverage?

Posted by Albert Sica on Feb 14, 2017 12:06:01 PM

 

Liability claims related to improper removal of snow and ice are frequent, and in many cases, severe. Many of the claims originate from elderly people sustaining injuries from slips and falls from which they never fully recover. In other words … BIG CLAIMS!

Read More

Topics: Property Risk, Risk management, Risk Management Blog, Snow Removal

ERM | Risk Assessment Phase One: Risk Identification

Posted by Andrew Masini on Feb 10, 2017 8:59:56 AM

Risk Identification is the first of three phases that make up a Risk Assessment.

Read More

Topics: Enterprise Risk Management (ERM), Enterprise Risk Management, Enterprise Risk Management, ERM, Risk Identification, Risk management, Risk Management Assessment, Risk Management Blog

Four Ways to Protect Your Employees’ W-2 Information from Cyber Thieves

Posted by Jon Edwards on Feb 7, 2017 4:17:25 PM

Most companies today opt to distribute their employees’ W-2 tax forms electronically; either through email or some type of download service. Because these forms contain a good deal of Personally Identifiable Information (“PII”), such as name, address, social security number and salary information – cyber thieves are using several simple, yet, tried-and-true methods to fraudulently obtain them.

 

Read More

Topics: Breach of Security, Cyber Breach, Cyber Insurance, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Ransomware, Risk management, Risk Management Blog

ERM | Risk Appetite and Risk Tolerance: The Path to Informed Decision Making

Posted by Andrew Masini on Feb 1, 2017 12:08:27 PM

In our previous posts in this series, we introduced Enterprise Risk Management (ERM) as a “portfolio view” of risk and discussed various aspects of implementing ERM: roles, culture, a framework and preparing your organization. Now, we’ll begin looking at the “big picture” viewpoint of risk, starting with identifying and prioritizing risks. In the ERM process, management (1) determines acceptable levels of risk, (2) identifies and measures risks throughout the entire organization and aggregates the results, and (3) determines if the aggregated results exceed the acceptable levels. Risk Appetite and Risk Tolerance are the expressions of the “acceptable levels” of risk.

Read More

Topics: Enterprise Risk Management (ERM), Enterprise Risk Management, Enterprise Risk Management, ERM, Risk Appetite, Risk Capacity, Risk management, Risk Management Blog, Risk Tolerance

Implementing ERM | Preparing Your Organization

Posted by Andrew Masini on Jan 20, 2017 1:30:29 PM

 

In our previous blog posts, we introduced Enterprise Risk Management (ERM) as a strategic discipline that affords a “portfolio view” of risk; outlined how to establish roles and context for ERM implementation; and how to establish a risk-aware culture and develop an ERM framework

Read More

Topics: Enterprise Risk Management (ERM), Enterprise Risk Management, Enterprise Risk Management, ERM, Risk management, Risk Management Blog

But, the Data was Encrypted... | California Data Breach Notification Law Amendment

Posted by Jon Edwards on Nov 22, 2016 2:52:03 PM

Back in May 2016 I posted a blog (Be Prepared – Data Breach Notification Laws are Changing), which covered how data breach notification laws were evolving.  At that time the state of Tennessee amended its law, becoming the first state in the nation to require notification of any data breach, whether the information is encrypted or not.  I also predicted that state laws would most likely become stricter in the not too distant future…

Read More

Topics: Breach of Security, California Data Breach Notification Law; Data Brea, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Personally Identifiable Information, PII, Protection Bill AB2828, Risk management, Risk Management Blog

Presidential Election Cyber Vulnerabilities | What Can We Learn?

Posted by Jon Edwards on Nov 1, 2016 3:54:15 PM

With the Presidential Election only days away, the question remains: Will the election be hacked? In this case, a cyber breach can lead to two major issues. The first is stolen data of registered voters; the second issue and perhaps the more frightening one – manipulation of the election results.

Read More

Topics: Breach of Security, Cyber Breach, Cyber Insurance, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Political Risk, Risk management, Risk Management Blog

What’s Behind the Counter? Enterprise Risk Management Can Be a Retailer’s Edge

Posted by Andrew Masini on Oct 19, 2016 7:06:42 PM

Enterprise Risk Management (ERM) concepts can help retailers create a competitive advantage out of the business of managing risk. ERM’s “portfolio view” collects all risk and mitigation activity into a single Risk Register. This enables management to coordinate mitigation efforts across functions, rather than leaving risk to be managed in a patchwork fashion among various pockets in the organization. These are the critical areas for retail organizations where embracing an ERM approach adds value and opportunities that would likely otherwise be “missed:”

Read More

Topics: Cyber Breach, Cyber Risk, Data Breach, Enterprise Risk Management (ERM), Enterprise Risk Management, Enterprise Risk Management, ERM, Reputational Risk, Retail Risk Management, Risk management, Risk Management Assessment, Risk Management Blog, Risk Register, Social Media Risk

Choosing the Right Broker – Have You Considered A Broker RFP?

Posted by Purnima Rangarajan on Sep 22, 2016 2:35:12 PM

There may be a number of times that you’ve considered evaluating your company’s insurance broker for various reasons, including:

Read More

Topics: Broker RFP, Insurance, Insurance Broker Purchase Strategies, Insurance Broker Selection, Insurance Coverage Purchase Strategies, Insurance Coverage Selection, Request for Proposal, RFP, Risk management, Risk Management Blog

Conforming D&O Coverage for FCPA Protection – Navigating Limits and Opportunities

Posted by Andrew Masini on Sep 14, 2016 5:58:19 PM

When looking for coverage for Foreign Corrupt Practices Act (FCPA) costs, the Directors and Officers (D&O) Policy is often the first stop. It appears to be the policy most applicable, because it defends against complaints of wrongdoing. However, to get significant protection from FCPA costs a D&O policy has to be significantly modified.

Read More

Topics: D&O, FCPA, Risk management, Risk Management Blog

The ALS Group

Risk Management Blog

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to Email Updates

Posts by Topic

see all