
- 220 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Enhanced Enterprise Risk Management
About this book
The performance and survival of a business in a global economy depends on understanding and managing the risks–external and those embedded within its operations.
It is vital to identify and prioritize significant risks and detect the weakest points. Adding other elements to an essential ERM program, such as PESTEL and Porter's 5 forces, treatment plans, scorecards, the three lines of defense (3LoD) components, and process improvements (six sigma, 8D, etc.) significantly increases the ERM success rate.
The authors outline a comprehensive strategy to designing and implementing a robust and successful ERM program – and not just successful in implementation but also yielding enormous returns for the organizations that implemented this enhanced ERM program.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half-Title Page
- Title Page
- Copyright
- Description
- Contents
- Testimonials
- Foreword
- Acknowledgments
- Chapter 1 Introduction
- Chapter 2 What Is ERM?
- Chapter 3 COSO Evolution ERM Frameworks
- Chapter 4 ERM Structure
- Chapter 5 ERM Framework
- Chapter 6 Reporting ERM Results and Status
- Chapter 7 Structure and Responsibilities
- Chapter 8 Emerging and Unknown Risks
- Chapter 9 Competitor and Industry Public Information
- Chapter 10 Monitoring Risk Events to Stock Price Changes
- Chapter 11 PESTLE Analysis Method
- Chapter 12 Porter’s Five Force Analysis
- Chapter 13 The Three Lines of Defense (3LoD)
- Chapter 14 Creating and Implementing an ERM Program
- Chapter 15 Case Study
- Chapter 16 Conclusion
- About the Authors
- Index
- Backcover