The need for transparency is gaining steam in many industries, including Corporate America, Government Agencies and Higher Education. More and more hands are trying to get involved in the analyses of compliance and risk information to influence the top-level decision-making process. This used to be looked at in a negative light but recent events in our industries have impacted this initiative.
Succession planning isn’t just the act of naming a replacement for a position or as simple as placing a title behind somebody’s name. That’s referred to as replacement planning. Many organizations lack a true formal succession plan. For those that have one, it’s often outdated. Unfortunately, most organizations do not look at succession planning unless it’s during times of crisis as part of their crisis management process.
Currently, "big data" is still being used as a coin-phrase in marketing sectors to generate sales. However, the growing understanding that "big data" is a well-defined concept is also taking place. Fundamentally, big data encompasses the entire amount of data and information created by universities and organizations. The concept also includes processes of how data is scrutinized, analyzed, and synthesized into conclusions that executives find beneficial and useful.
Cloud computing is a booming industry in both the for-profit and non-profit sectors. Clouds have many benefits, including: reduced costs, scalability, remote access, and customization. But as the trend continues to grow, decision-makers need to remain cautious and conduct a thorough business analysis to identify all risks involved. “When you engage a third-party cloud service operator, you ultimately are going to be expanding or changing your risk universe,” says Warren Chan, co-author of the paper and a principal at Crowe Horwath.
With the upward trend of HIPAA breaches being reported to the Office for Civil Rights (OCR) from all across America, multiple HIPAA advisors have brainstormed to identify the key components in establishing an effective program that aims to reduce an organization’s risk for a breach.