For the last several years Allianz has published a concise and informative report on the top risks that businesses face globally. It is a great opportunity to think about how these risks could affect your business operations and what the impact would be. When thinking about risk, it is important to think about "materiality" and what "financial impact" would be material for your company to cause a disruption. Even through many of the risks on this year’s report are readily insurable, the "disruption factor" of having to manage through a loss is worth considering.
Protecting a Project’s assets is at the top of the list for most Developers and Lenders these days. Whether it be finances, property, or business, setting up some type of a security blanket for your project assets always adds additional comfort to the certainty of the project and desired outcomes. Most of the time these everyday risks can be covered through insurance; but what do you do when you are faced with protecting a growing (maturing) asset?
The construction industry is changing rapidly and more and more projects are relying on emerging technologies for management and completion. There are now major cyber related concerns regarding “smart” equipment such as cranes and drones and SAAS/IAAS systems used for project planning and management. ‘Connected’ systems utilized by third-parties (general contractors and subcontractors) to share and centralize sensitive data may also expose a project to cyber risks.
As the Hospitality industry continues to experience growing activity amidst a strong economy, there are, inherently, challenges that must be continuously addressed and improved on to ensure customers keep coming back. Identifying challenges and solutions to those challenges is one aspect of avoiding pitfalls, but an often overlooked perspective is the risk(s) to which those challenges could, ultimately, lead.
I came across an interesting case that illustrates how critical it is to properly notice a “downstream party” of a claim (or potential claim) and require proof that notice was filed with their insurer.
There are industries that entail managing insurance compliance among large numbers of vendors/contractors, which challenges even the most organized firm to manage the compliance properly. If done right, it’s a process which requires diligence and specialized knowledge:
Topics: COI Compliance
Situation & Issue
A NY-based organization (acting as tax syndicator) with over 350 properties engaged us to review and modify the lender requirements and to ensure insurance compliance with the requirements from the various parties involved in a deal
When most businesses think cyber crime, they imagine brute force threats from foreign agents or highly advanced hacker teams. Executives tend to think that external forces well beyond their control make up the vast majority of security loopholes.
In our previous posts on Enterprise Risk Management (ERM), we defined ERM and addressed how to set up the program and use it to assess and treat risks. We have come a long way! In this post, we evaluate the program.
ERM is not a static program. An effective approach to evaluating and enhancing the performance is a three-part one: measure, monitor and, most importantly, evolve.