Click here to close now.


@BigDataExpo Authors: Kevin Benedict, Elizabeth White, John Basso, Flint Brenton, Liz McMillan

Blog Feed Post

2013 Corporate Risk Hotspots

Leading corporate risk prevention consultancy Riskskill (, a division of UKFraud, has opened the New Year with a list of what they believe are the 8 biggest corporate risk hotpots faced by management in 2013. The hotspots are:

1. Fraud. With fraud set to reach increasingly high levels as a reflection of economic conditions, corporations face their own battle with those who are determined to defraud them. In 2013, supply chain fraud will be a major growth area, as squeezed suppliers face temptation to cheat, often using IT systems to cover their tracks. This type of fraud can range from simple 'weights and measures' issues through to credit based fraud and professionally planned attacks. As a result, procurement fraud is also set to reach record levels this year, where those charged with purchasing, face a range of temptations, including bribes from suppliers. More generally, internal fraud too is running at its highest level.

The UK government's National Fraud Authority (NFA) has produced an annual survey of fraud. For the last 3 years it has reported estimated fraud losses that are, in general terms, doubling each year. The fraud prevention market is braced for a repetition of this trend with an increase in the estimate of fraud losses expected again.

2. Cyber Crime Attacks. Such intrusions will remain an on-going concern in 2013. Already, the daily number of automated attacks on bank and retailer systems runs into the millions. Corporations are especially vulnerable where they have ventured into online trading, as the customers are faceless and there is comparatively little time to check the efficacy of the client's details. Controls over 'apps', such as payments through mobile and NFC (Near Field Communication) devices are also on-going risks that are growing as these solutions evolve. Technically skilled fraudsters and self-styled cyber-warriors' love such conditions and it is a constant race for 'switched on' payment processors to find the 'security holes' before such people actually cause havoc.

In addition, with so much high quality customer data reaching criminal hands and seemingly frequent high-profile data-security breaches through cyber-crime, it is harder than ever to tell the good and bad guys apart. 2013 will therefore see an increasingly greater emphasis placed upon PCI DSS and other data-security and integrity issues. There will also be continuing government interest in talking about this subject.

3. Social and Other Media Related Risks. The huge rise in different types of mobile device platforms along with the corresponding growth of social media sites now poses a huge reputational challenge for corporations. Within minutes, organisations can be the victim of blistering customer backlashes which might or might not be justified. Many corporations are making a start by attempting to formally control how their own employees release company or workplace information through social media. The number of reported dismissals and legal cases for acting irresponsibly through social media is soaring. However, beyond this there are increasingly huge risks posed by being seen to 'get it wrong' at the 'social-communications' front line. 2013 could well see a significant rise in the ownership of social media policy by corporate communications management.

4. Silo Mentality. Borne out of the desire to conduct business correctly, increasingly complicated silo structures have grown up in the corporate world, with the corporate tsars of compliance vying for power with those running policy, risk and traditional management functions such as IT and finance. It is possible that key decisions such as fraud policy, for example, will fall between these silos so that one either finds managers that are only partially responsible for an issue or a whole gaggle of managers who all feel that something is 'their bag'. The only solution is to have cross-function internal teams working closely with non-execs to allocate and refine roles and responsibilities.

5. Big Data Risks. As a result of corporate compliance and customer contact drives, organisations now hold increasingly huge volumes of data such as customer files. This development does pose its own data breach risks. However, the evolution of the 'big data' culture will also deliver huge benefits in 2013. Recent improvements in business intelligence and data analytics technology have delivered significant benefits for those working to manage big data projects along with those focussed on the risk and compliance issues raised.

Companies can now monitor hundreds of millions of transactions continuously for patterns of potential fraud, cyber-attacks or money laundering. Often this is happening at speeds many times faster than even a year ago. It also allows marketing professionals to make more incisive assessments of customer behavior and therein to tailor and fine tune campaigns accordingly.

6. Credit Risk Losses v Profitable Lending. Banks and other organisations, such as retailers, are under pressure from shareholders, the media and wider stakeholders to avoid bad-debts on one hand, whilst increasing profitable business lending on the other.

There is a potential risk of a lose, lose situation developing where once again such pressure leads to bad financial products and the risks of mis-selling and bad debts from over-stretched customers.

To take retail as an example, store-finance schemes and other 'loyalty' lending products face mounting credit exposures and losses through debt defaults, and write-offs.

7. Legal Claims. Whenever there is a downturn in the economy, people seek-out legal redress from anywhere that they can find it. The insurance industry and local authorities are tired of the 'slips and trips' type scenarios and is fighting the continual rise in these cases. However, many organisations seriously underestimate how big the potential legal risks can be. They are likely to face even greater pressure on this front though in 2013, as the TV ad style accident and PPI lawyers start to look for the next big thing.

8. Environmental, CSR and Sustainability Risks
Often the investment in 'environmentally friendly' and wider 'social responsibility' issues and other 'sustainability initiatives' will be finely calculated parts of a wider 'corporate score-card'. In more difficult economic times, these broader social and 'green' initiatives can suffer; the financial commitment made in the good times can also damage the longer-term investment, security and stability of businesses when things are tighter. So there is a longer term balancing of the risks required - i.e. the corporate social responsibility commitments flagged on the company's website need to be measured against the real-life, long-term trading conditions. As reputation 'can be all', corporates need to make sure that long-term CSR commitments aren't ultimately suspended or frozen with the risk of damaging their hard won reputations.

"From our research and experience of many businesses, we can see that most organisations are needlessly at risk in a number of areas," says Bill Trueman CEO of Riskskill. "Often the potential and consequential losses will be a major threat to businesses performance. To put them right and protect our businesses, we need to make sure that our processes, procedures and systems are clear, tight, ordered and well managed. Whilst the risks can usually be identified quickly and effective plans drawn up, it usually takes a little help and some wider corporate consensus to get things done. External risk management specialists, free of internal politics and silo rivalries, can help organisations appreciate quickly the level of risk they are running and plan accordingly. Strong internal risk management teams can also help combat the risks. However, the first step necessary for many corporations in 2013 is to recognise the risks they run and the need for change itself. Until they do, our role is to highlight the risks most likely to be faced."


About Riskskill (
Part of the acclaimed UKFraud operation, Riskskill delivers 'total risk' assessments for major corporations, solving problems and engineering bespoke risk reduction solutions in organisational, management, financial control and IT.

The assessments analyse all areas where organisations are at risk including: fraud, credit risks, counterparty or partner risks, cyber crime breaches, bad debt management, and the oversight and control of other write-offs along with compliance penalties and legal-case losses. Having identified specific areas of risk, Riskskill drafts detailed business and IT system change plans. The plans are then backed up by comprehensive coaching, training and mentoring programmes, which target the engineering of ground-up (but also top-down) solutions throughout the client's organisation, people, processes, management and systems.

For Further Information please contact:

Bill Trueman
+44 20 8133 7575
[email protected]


Leigh Richards
The Right Image
+44 844 561 7586
+44 7758 372527
[email protected]

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@BigDataExpo Stories
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
SYS-CON Events announced today that Catchpoint, a global leader in monitoring, and testing the performance of online applications, has been named "Silver Sponsor" of DevOps Summit New York, which will take place on June 7-9, 2016 at the Javits Center in New York City. Catchpoint radically transforms the way businesses manage, monitor, and test the performance of online applications. Truly understand and improve user experience with clear visibility into complex, distributed online systems.Founde...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
Most of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipelining software with the clear notion of supporting immutability. In his session at @ThingsExpo, Shashank Jain, a development architect for SAP Labs, discussed the objective, which is to automate the IoT deployment proces...
Countless business models have spawned from the IaaS industry – resell Web hosting, blogs, public cloud, and on and on. With the overwhelming amount of tools available to us, it's sometimes easy to overlook that many of them are just new skins of resources we've had for a long time. In his general session at 17th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, an IBM Company, broke down what we have to work with, discussed the benefits and pitfalls and how we can best use them ...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningf...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, presented how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He also demonstrated how easy it is to search and restore cloud application data using Cloudfinder.
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, exploreed the current state of IoT connectivity and review key trends and t...
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, explored the IoT cloud-based platform technologies driving t...