×

Article See All

The Most Uncomfortable Vulnerabilities for Boards Today Publish Date·5/16/2024 7:52:44 PM

The Most Uncomfortable Vulnerabilities for Boards Today

<p id="ember970" class="ember-view reader-content-blocks__paragraph"><span style="font-size: medium;"><strong><br /></strong></span></p> <p class="ember-view reader-content-blocks__paragraph"><span style="font-size: medium;"><strong>The Most Uncomfortable Vulnerabilities, the Least (or Incorrectly) Managed Risks &amp; Recommendations for Today's Board of Directors</strong></span></p> <p class="ember-view reader-content-blocks__paragraph"><span style="font-size: medium;"><strong><br /></strong></span></p> <p id="ember971" class="ember-view reader-content-blocks__paragraph"><img src="/images/Pictures/e9a0ffd7-2da3-4d89-af52-f82e2d18d75f.jpg" width="960" height="540" /></p> <p id="ember972" class="ember-view reader-content-blocks__paragraph"><span><br /></span></p> <p class="ember-view reader-content-blocks__paragraph"><span><!-- pagebreak --></span></p> <p class="ember-view reader-content-blocks__paragraph"><strong>Introduction</strong></p> <p id="ember973" class="ember-view reader-content-blocks__paragraph">Vulnerability. Threat. Risk.</p> <p id="ember974" class="ember-view reader-content-blocks__paragraph">In risk management, management and boards of directors talk a lot about, well, the risks &ndash;<span class="white-space-pre"> </span><span>the probability of negative events and the scale of impact</span>. But what about the vulnerabilities &ndash;<span class="white-space-pre"> </span><span>the weaknesses, flaws and deficient designs and processes</span>?[1] Post-mortems and root-cause analysis tend to be the driving forces behind vulnerabilities getting due attention.</p> <p id="ember975" class="ember-view reader-content-blocks__paragraph">That&rsquo;s too late.<span class="white-space-pre"> </span></p> <p id="ember976" class="ember-view reader-content-blocks__paragraph">If boards understood<span class="white-space-pre"> </span><span>better</span><span class="white-space-pre"> </span>and management identified<span class="white-space-pre"> </span><span>earlier</span><span class="white-space-pre"> </span>certain vulnerabilities, companies would notch more "wins" in the<span class="white-space-pre"> </span><span>preventative</span><span class="white-space-pre"> </span>risk management column. They would<span class="white-space-pre"> </span><span>avoid</span><span class="white-space-pre"> </span>the risk altogether, rather than<span class="white-space-pre"> </span><span>reducing</span>,<span class="white-space-pre"> </span><span>sharing</span>,<span class="white-space-pre"> </span><span>accepting</span><span class="white-space-pre"> </span>or, worse,<span class="white-space-pre"> </span><span>responding</span><span class="white-space-pre"> </span>to the risk. That last one bears another name.</p> <p id="ember977" class="ember-view reader-content-blocks__paragraph"><span>Crisis</span><span class="white-space-pre"> </span>management.</p> <p id="ember978" class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p id="ember979" class="ember-view reader-content-blocks__paragraph"><strong>Overview: The Most Uncomfortable Vulnerabilities</strong></p> <p id="ember980" class="ember-view reader-content-blocks__paragraph">The following explains the most uncomfortable vulnerabilities existing for boards of directors today. It aligns with risks that are not being managed - either they are not getting the attention they deserve, or the efforts are off base.</p> <p id="ember981" class="ember-view reader-content-blocks__paragraph">This assessment is qualitative.</p> <p id="ember982" class="ember-view reader-content-blocks__paragraph">It is<span class="white-space-pre"> </span><span>based</span><span class="white-space-pre"> </span>on years in regulated financial services, risk management and board rooms. This includes enterprise risk, financial crimes, consumer protection and cybersecurity. It<span class="white-space-pre"> </span><span>benefits</span><span class="white-space-pre"> </span>from every shape and size of federal, state and foreign regulatory examination, discussions with peers and a deep appreciation of<span class="white-space-pre"> </span><span>applicable</span><span class="white-space-pre"> </span>and effective risk management versus the<span class="white-space-pre"> </span><span>theoretical</span><span class="white-space-pre"> </span>(think: regulation) and, many times, ineffective counterpart.</p> <p id="ember983" class="ember-view reader-content-blocks__paragraph">It<span class="white-space-pre"> </span><span>acknowledges</span><span class="white-space-pre"> </span>risks that tend to garner the most attention at the management and board level, be they<span class="white-space-pre"> </span><span>de rigueur<span class="white-space-pre"> </span></span>or just darn sexy (credit, interest rate, liquidity, financial crimes, cyber, data protection and, of late, geopolitical). But, the<span class="white-space-pre"> </span><span>focus</span><span class="white-space-pre"> </span>here is rooted in both the academic and operational desire to improve for boards of directors the full enterprise of risk management.</p> <p class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p id="ember984" class="ember-view reader-content-blocks__paragraph"><strong>Intended Impact</strong></p> <p id="ember985" class="ember-view reader-content-blocks__paragraph">Overseeing and managing these most<span class="white-space-pre"> </span><span>uncomfortable</span><span class="white-space-pre"> </span>vulnerabilities will materially contribute to an ongoing:<span class="white-space-pre"> </span></p> <p id="ember986" class="ember-view reader-content-blocks__paragraph"></p> <ol> <li>Board of directors, fit for purpose, as well as...</li> <li>Effective board engagement;</li> <li>Dependable key-person succession plans and...</li> <li>Talent risk management;</li> <li>Heightened remote-work &amp; in-office cultures &amp; standards, including&hellip;</li> <li>Post-covid controls commensurate with the increasing conflicts of interests, workplace bullying and extreme climate events;</li> <li>Credible path toward Web 3.0 and self-sovereign identification (and PII protection);</li> <li>Board &amp; Management tech literacy;</li> <li>Back-office budget management literacy; and</li> <li>Global dynamics risk management.</li> </ol> <p></p> <p></p> <p></p> <p id="ember987" class="ember-view reader-content-blocks__paragraph"><em><strong>How to Read It</strong></em></p> <p id="ember988" class="ember-view reader-content-blocks__paragraph"><span>This article breaks down the vulnerabilities across six areas: Board of Directors, Executive (or Senior) Management, Employees, Customers, Technology and Operations. It then details the vulnerabilities before offering recommendations and considerations for the board and management that are practical, in a few instances audacious, but all realistic as to their material ROI. Lastly, it categorizes the vulnerabilities in their proper areas of Enterprise Risk Management.</span></p> <p id="ember989" class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p id="ember990" class="ember-view reader-content-blocks__paragraph"><strong>I.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Board of Directors</strong></p> <p id="ember991" class="ember-view reader-content-blocks__paragraph"><span>The Uncomfortable Vulnerabilities:</span></p> <p id="ember992" class="ember-view reader-content-blocks__paragraph"></p> <ul> <li>Lack of commensurate subject matter expertise</li> <li>Deficient engagement with management</li> </ul> <p></p> <p id="ember993" class="ember-view reader-content-blocks__paragraph"><span>Details:<span class="white-space-pre"> </span></span>A board of directors is<span class="white-space-pre"> </span><span>not</span><span class="white-space-pre"> </span>the place for founders and chief executives to install friends, personal or even professional. A<span class="white-space-pre"> </span><span>challenge</span><span class="white-space-pre"> </span>corporate boards face is ensuring its makeup, its breadth of expertise, is commensurate with the company&rsquo;s complexities, opportunities and risks. A<span class="white-space-pre"> </span><span>recent example</span><span class="white-space-pre"> </span>is cybersecurity. A<span class="white-space-pre"> </span><span>more pressing example</span><span class="white-space-pre"> </span>is models, AI and LLMs. Another challenge, the<span class="white-space-pre"> </span><span>Achilles Heel</span><span class="white-space-pre"> </span>with boards, is efficient reporting by management that properly harnesses the time, attention and guidance from board members.</p> <p id="ember994" class="ember-view reader-content-blocks__paragraph"><span>How to address it:<span class="white-space-pre"> </span></span>Hiring a proven board Chair is<span class="white-space-pre"> </span><span>priority one</span>. The Chair and chief executive (if they are separate roles) must<span class="white-space-pre"> </span><span>undertake<span class="white-space-pre"> </span></span>an objective assessment of the company&rsquo;s makeup, utilizing its strategic plan and risk assessment, to ensure members are hired for the skills they bring and agnostic of their personal or professional affiliations with the company, founders, executives.<span class="white-space-pre"> </span><span>Two</span>, the Chair, at a minimum, must work with management to ensure reporting is board appropriate, concise, timely and complete as to performance, risks and opportunities.[2]<span class="white-space-pre"> </span><span>Three</span>, the Chair, from time to time, must insist on an independent assessment of board performance and composition as strategic plans and risk assessments evolve.</p> <p id="ember995" class="ember-view reader-content-blocks__paragraph"><span>Risk Management Areas Addressed:<span class="white-space-pre"> </span></span>Governance, Business Continuity</p> <p id="ember996" class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p id="ember997" class="ember-view reader-content-blocks__paragraph"><strong>II.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Executive Management</strong></p> <p id="ember998" class="ember-view reader-content-blocks__paragraph"><span>The Uncomfortable Vulnerabilities:</span></p> <p id="ember999" class="ember-view reader-content-blocks__paragraph"></p> <ul> <li>Lack of succession planning</li> <li>Deficient talent management</li> </ul> <p></p> <p id="ember1000" class="ember-view reader-content-blocks__paragraph"><span>Details:</span><span class="white-space-pre"> </span>Executives are<span class="white-space-pre"> </span><span>not</span><span class="white-space-pre"> </span>pre-wired to plan for their successors. A<span class="white-space-pre"> </span><span>challenge</span><span class="white-space-pre"> </span>for highly- or even well- functioning management is making time for and following through with key corporate roles succession. While a<span class="white-space-pre"> </span><span>recent example</span><span class="white-space-pre"> </span>is the eponymous HBO Max series,<span class="white-space-pre"> </span><span>more pressing examples</span><span class="white-space-pre"> </span>abound across small businesses. None compares to that at<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.cnbc.com/2023/09/06/disney-succession-mess-iger-chapek.html" data-test-app-aware-link="">Disney</a>, however.<span><span class="white-space-pre"> </span></span>Another challenge, the<span class="white-space-pre"> </span><span>Achilles Heel</span><span class="white-space-pre"> </span>of management, is the presumption that mere elevation of employee to manager begets an innate ability to manage others effectively.</p> <p id="ember1001" class="ember-view reader-content-blocks__paragraph"><span>How to address it:</span><span class="white-space-pre"> </span>Akin to the board Chair&rsquo;s importance, empowering a proven Human Resource Executive is<span class="white-space-pre"> </span><span>priority one</span>. The HR Executive must<span class="white-space-pre"> </span><span>undertake<span class="white-space-pre"> </span></span>the responsibility of guiding the process, working with executives and management to identify the company&rsquo;s key persons in financial and operational impact, starting with the CEO.<span class="white-space-pre"> </span><span>Two</span>, within this process, the HR Executive must ensure talent development plans, cross-training initiatives and contingencies are in place should the departure of the key person materialize.<span class="white-space-pre"> </span><span>Three</span>, the board must hold the CEO and HR Executive to account, for periodic updates as to these key persons, the risks their departures pose and the readiness of their successors and contingencies.</p> <p id="ember1002" class="ember-view reader-content-blocks__paragraph"><span>Risk Management Areas Addressed:<span class="white-space-pre"> </span></span>Business Continuity, Talent Risk</p> <p id="ember1003" class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p id="ember1004" class="ember-view reader-content-blocks__paragraph"><strong>III.&nbsp;&nbsp;&nbsp; Employees</strong></p> <p id="ember1005" class="ember-view reader-content-blocks__paragraph"><span>The Uncomfortable Vulnerabilities:</span></p> <p id="ember1006" class="ember-view reader-content-blocks__paragraph"></p> <ul> <li>Lack of post-covid remote working standards</li> <li>Deficient deployment of business continuity mechanisms</li> </ul> <p></p> <p id="ember1007" class="ember-view reader-content-blocks__paragraph"><span>Details:</span><span class="white-space-pre"> </span>Boards are fully aware that remote working standards are<span class="white-space-pre"> </span><span>nowhere near</span><span class="white-space-pre"> </span>where they need to be. They may not be aware that working hours and locations are fungible, dress codes inconsistent and meetings poorly attended (in mind and body), over-subscribed and woefully inefficient. This has chipped away from in-office decorum, standards, productivity, and health and safety.</p> <p id="ember1008" class="ember-view reader-content-blocks__paragraph">A<span class="white-space-pre"> </span><span>challenge</span><span class="white-space-pre"> </span>management faces is four-fold:</p> <p id="ember1009" class="ember-view reader-content-blocks__paragraph"></p> <ol> <li>establishing a commensurate remote culture four years after the WFH genie left the bottle,</li> <li>reestablishing in-office standards, particularly on lightly attended days,</li> <li>maintaining credibility when holding employees accountable, wherever they work, and</li> <li>demonstrating greater confidence in deploying long standing tools invaluable to workplace safety.</li> </ol> <p></p> <p id="ember1010" class="ember-view reader-content-blocks__paragraph">A<span class="white-space-pre"> </span><span>recent example</span><span class="white-space-pre"> </span>is the rise of the<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.forbes.com/sites/melissahouston/2023/12/10/unlocking-the-secret-to-a-successful-side-hustle-in-2024/?sh=3d9b67745c95" data-test-app-aware-link="">side-hustle</a>.<span class="white-space-pre"> </span><span>More pressing examples</span><span class="white-space-pre"> </span>are workplace bullying and antiquated business continuity measures. The<span class="white-space-pre"> </span><span>Achilles Heel</span><span class="white-space-pre"> </span>is a post-covid malaise that continues to stymy coordination and resetting this critical dynamic.<span class="white-space-pre"> </span></p> <p id="ember1011" class="ember-view reader-content-blocks__paragraph"><span>How to address it:</span><span class="white-space-pre"> </span>Board of director-level urgency is<span class="white-space-pre"> </span><span>priority one</span>. The Chair and chief executive must<span class="white-space-pre"> </span><span>undertake<span class="white-space-pre"> </span></span>the immediate and absolute reset of office culture, on site and remote.<span class="white-space-pre"> </span><span>Two</span>, they must commission a singularly focused Chief Conduct Risk Czar, named for the temporary but zeitgeist intended, empowered with her own immediate and absolute authority to communicate, educate, embed, champion and enforce heightened behaviors. While dress codes and meeting hygiene rank high, proper conduct involving conflicts of interests, employee trading (where applicable) and workplace harassment deserve primary focus.<span class="white-space-pre"> </span><span>Three</span>, two preexisting tools &ndash; anonymous reporting hotlines and, unironically, remote working &ndash; deserve renewed attention given their tangible values. Hotlines must be destigmatized and made readily accessible, and employee-wide remote-work plans must be activated sooner in the face of increasing extreme weather-related events.</p> <p id="ember1012" class="ember-view reader-content-blocks__paragraph"><span>Risk Management Areas Addressed:<span class="white-space-pre"> </span></span>Conflicts of Interest, Health &amp; Safety</p> <p id="ember1013" class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p id="ember1014" class="ember-view reader-content-blocks__paragraph"><strong>IV.&nbsp;&nbsp; Customers</strong></p> <p id="ember1015" class="ember-view reader-content-blocks__paragraph"><span>The Uncomfortable Vulnerabilities:</span></p> <p id="ember1016" class="ember-view reader-content-blocks__paragraph"></p> <ul> <li>The lack of credible PII controls &amp; plan</li> </ul> <p></p> <p id="ember1017" class="ember-view reader-content-blocks__paragraph"><span>Details:</span><span class="white-space-pre"> </span>While boards may think that consumer data protection is getting an appropriate level of attention across industries, it is<span class="white-space-pre"> </span><span>not</span><span class="white-space-pre"> </span>receiving the right or bold enough focus. The<span class="white-space-pre"> </span><span>challenge</span><span class="white-space-pre"> </span>and current<span class="white-space-pre"> </span><span>Achilles Heel</span><span class="white-space-pre"> </span>is strategy, given the proliferation of and varied federal, state and foreign regulatory requirements, the sheer size of PII that companies possess and the multitude of locations (i.e., systems) where these variable pieces of data reside.<span class="white-space-pre"> </span><span>Recent examples<span class="white-space-pre"> </span></span>are the billions of dollars in fines levied globally against the likes of<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">Meta</a>,<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">TikTok</a>,<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">WhatsApp</a>,<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">Amazon</a>,<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">Google</a>,<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">DiDi</a>,<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">T-Mobile</a>,<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">Instagram</a>,<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">Capital One</a><span class="white-space-pre"> </span>and<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">Morgan Stanley</a>.<span><span class="white-space-pre"> </span></span>The current model is unworkable and, for the largest corporations and their shareholders, it should become an immediate, unacceptable cost of doing business. Boards of any size company should agree.</p> <p id="ember1018" class="ember-view reader-content-blocks__paragraph"><span>How to address it:</span><span class="white-space-pre"> </span>A course correction, industry- and market-wide, is<span class="white-space-pre"> </span><span>priority one</span>. Higher than the importance of the board Chair and HR Executive outlined here, the (Chief) Data Protection Officer or equivalent must<span class="white-space-pre"> </span><span>undertake</span><span class="white-space-pre"> </span>a call to arms and be given the resources to beat a data protection path to the inevitable future of Web 3.0 and<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.1kosmos.com/identity-management/self-sovereign-identity/" data-test-app-aware-link="">self sovereign identity</a><span class="white-space-pre"> </span>(SSI).<span class="white-space-pre"> </span><span>Two</span>, this means a longer game, but one the DPO must bring to the board and chief executive&rsquo;s attention and includes the interplay between blockchain technology,<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://web3illy.medium.com/fully-homomorphic-encryption-and-zero-knowledge-data-security-secrets-70d760c4de3d#:~:text=Comparison%20of%20FHE%20and%20ZK&amp;text=Both%20FHE%20and%20ZK%20are,of%20information%20without%20revealing%20it" data-test-app-aware-link="">homomorphic encryption</a><span class="white-space-pre"> </span>and zero knowledge, current industry players (there are many, but include<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">Microsoft</a>,<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">Wipro</a><span class="white-space-pre"> </span>and<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">1Kosmos</a>), platforms such as<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.linkedin.com/article/edit/7191972792370647040/" data-test-app-aware-link="">Sovrin Foundation</a>, use cases such as India&rsquo;s Aadhaar program and compelling value proposition when it comes to anti- fraud, money laundering and identity theft measures that have long eluded global financial crimes risk management.<span class="white-space-pre"> </span><span>Three</span>, as opened, industries, not companies, and governments need to start banding together as Web 3.0 comes online.</p> <p id="ember1019" class="ember-view reader-content-blocks__paragraph"><span>Risk Management Areas Addressed:<span class="white-space-pre"> </span></span>Privacy, Information Security, Operational Risk</p> <p id="ember1020" class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p id="ember1021" class="ember-view reader-content-blocks__paragraph"><strong>V.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Technology</strong></p> <p id="ember1022" class="ember-view reader-content-blocks__paragraph"><span>The Uncomfortable Vulnerabilities:</span></p> <p id="ember1023" class="ember-view reader-content-blocks__paragraph"></p> <ul> <li>Deficient baseline understanding of models amongst board and non-IT staff</li> <li>Lack of coordination between technology and risk at model implementation / adoption</li> </ul> <p></p> <p id="ember1024" class="ember-view reader-content-blocks__paragraph"><span>Details:</span><span class="white-space-pre"> </span>It is<span class="white-space-pre"> </span><span>no longer</span><span class="white-space-pre"> </span>acceptable for non-IT staff, especially management and boards of directors, to yield general and even moderate IT literacy to the Help Desk. A significant<span class="white-space-pre"> </span><span>challenge</span><span class="white-space-pre"> </span>these groups face is that stakes have risen: more advanced technologies are coming online, an emerging workforce is quickly adopting them, and not only are the uninitiated falling behind, but these new stalwarts also don&rsquo;t know what they don&rsquo;t know when it comes to model risk.</p> <p id="ember1025" class="ember-view reader-content-blocks__paragraph">A<span class="white-space-pre"> </span><span>recent example</span><span class="white-space-pre"> </span>is AI and hallucinations, though such initial outputs are well-understood by model developers and risk managers. A<span class="white-space-pre"> </span><span>more tangible example</span><span class="white-space-pre"> </span>is an unsuspecting driver, blind faith in a navigation app and a<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.businessinsider.com/tourists-hawaii-gps-drove-car-into-water-2023-5" data-test-app-aware-link="">submerged vehicle.</a><span class="white-space-pre"> </span>The<span class="white-space-pre"> </span><span>Achilles Heel</span><span class="white-space-pre"> </span>for corporate competitiveness is allowing this trend to continue, and should real disaster strike, boards of directors and chief executives will be exposed. Were they demonstrating the proper oversight?</p> <p id="ember1026" class="ember-view reader-content-blocks__paragraph"><span>How to address it:</span><span class="white-space-pre"> </span>Changing the engagement model for the lay employee and board is<span class="white-space-pre"> </span><span>priority one</span>. The company&rsquo;s technology lead, chief or otherwise, must<span class="white-space-pre"> </span><span>undertake<span class="white-space-pre"> </span></span>the responsibility of model evangelization on par with<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.knowbe4.com/" data-test-app-aware-link="">KnowBe4</a><span class="white-space-pre"> </span>and its revolutionization of information security risk training.<span class="white-space-pre"> </span><span>Think:</span><span class="white-space-pre"> </span>gamification, simplification, ubiquity and empowerment, starting with management and the board of directors.<span class="white-space-pre"> </span><span>Two</span>, agile (model) risk management must become the de facto, non-negotiable M.O. when building, adopting and implementing models that bear any material risk to financials or operations.<span class="white-space-pre"> </span><span>Three</span>, today&rsquo;s boards of directors and chief executives must demand a frequent state of the IT union and bring to this elevated culture their own heightened level of understanding and credible challenge.</p> <p id="ember1027" class="ember-view reader-content-blocks__paragraph"><span>Risk Management Areas Addressed:<span class="white-space-pre"> </span></span>Model Risk, Systemic Risk</p> <p id="ember1028" class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <p id="ember1029" class="ember-view reader-content-blocks__paragraph"><strong>VI.&nbsp;&nbsp; Operations</strong></p> <p id="ember1030" class="ember-view reader-content-blocks__paragraph"><span>The Uncomfortable Vulnerabilities:</span></p> <p id="ember1031" class="ember-view reader-content-blocks__paragraph"></p> <ul> <li>Deficient supply chain &amp; operational contingencies</li> <li>Lack of back-office budget literacy / coordination<span class="white-space-pre"> </span></li> </ul> <p></p> <p id="ember1032" class="ember-view reader-content-blocks__paragraph"><span>Details:</span><span class="white-space-pre"> </span>The front office is<span class="white-space-pre"> </span><span>not</span><span class="white-space-pre"> </span>the only place for budget focus and fluency when before the board. A<span class="white-space-pre"> </span><span>challenge</span><span class="white-space-pre"> </span>companies face is ensuring budgets within the back office account for the corporate rather than their individual functional objectives. A<span class="white-space-pre"> </span><span>common example<span class="white-space-pre"> </span></span>is technology procurement and unintended redundancies, inefficiencies and failed adoption. Another challenge and post-covid<span class="white-space-pre"> </span><span>Achilles Heel</span><span class="white-space-pre"> </span>is fluency with global dynamics, which has, of late, led to companies scrambling to de-risk exposure to China and Ukraine, be it supply chains or business operations.</p> <p id="ember1033" class="ember-view reader-content-blocks__paragraph"><span>How to address it:</span><span class="white-space-pre"> </span>Annual work plans is<span class="white-space-pre"> </span><span>priority one</span>. The Chief Financial and Operating Officers must<span class="white-space-pre"> </span><span>establish<span class="white-space-pre"> </span></span>a back office template and process for these individual functions to demonstrate how each will support the company&rsquo;s strategic plan and mitigate its material risks.<span class="white-space-pre"> </span><span>Two</span>, a designated CFO or COO office must work with back office executives to ensure resource, technology, risk management and operational expenses are refined and then articulated up, holistically, to the board.<span class="white-space-pre"> </span><span>Three</span>, Risk Management must elevate geopolitical risk to its Enterprise Risk Management program, incorporate business continuity alternatives to higher risk locations and, as with<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://open.spotify.com/episode/3oRGrtGO144IQV3h1enjOu?si=XHPOnZbNRRm816bn01sgpg" data-test-app-aware-link="">Executive Management Cyber Resilience</a>, practice incident agnostic resiliency.<span class="white-space-pre"> </span></p> <p id="ember1034" class="ember-view reader-content-blocks__paragraph"><span>Risk Management Areas Addressed:<span class="white-space-pre"> </span></span>Geopolitical Risk, 3rd &amp; 4th Party Risk, Financial Risk.</p> <p class="ember-view reader-content-blocks__paragraph"></p> <p class="ember-view reader-content-blocks__paragraph"></p> <hr /> <p class="ember-view reader-content-blocks__paragraph"><strong>Conclusion</strong></p> <p id="ember1037" class="ember-view reader-content-blocks__paragraph">Managing risk effectively at the board, executive and functional levels requires a myriad of skills beyond the technical. Should any of the above vulnerabilities be exploited - by an action or inaction - any root-cause analysis will zero in on<span class="white-space-pre"> </span><span>design</span><span class="white-space-pre"> </span>and<span class="white-space-pre"> </span><span>process</span>. But make no mistake,<span class="white-space-pre"> </span><span>performance</span>, too, will receive its fair scrutiny. Accordingly:</p> <p id="ember1038" class="ember-view reader-content-blocks__paragraph"></p> <ul> <li><span>Practice the soft skills or EQ:</span><span class="white-space-pre"> </span>humility, objectivity and empathy.</li> <li><span>Demonstrate baseline technical skills:</span><span class="white-space-pre"> </span>Lay persons and the executive entrusted with leading them: pull your weight when it comes to basic financial literacies and emerging technologies.</li> <li><span><span>Embrace entrepreneurial skills:<span class="white-space-pre"> </span></span></span>champion urgency &amp; demand, trust &amp; empowerment, collaboration &amp; agility, adaptation &amp; re-focus as the company travels along its strategic plan.</li> </ul> <p></p> <p id="ember1039" class="ember-view reader-content-blocks__paragraph">Boards and chief executives that open their apertures and call for more attention to these vulnerabilities will yield tangible benefits:</p> <p id="ember1040" class="ember-view reader-content-blocks__paragraph"></p> <ol> <li><span>A well-suited and engaged board of directors;</span></li> <li><span>Supercharged executives in Human Resources, Data Protection, Conduct Risk and Technology;</span></li> <li><span>Reliable key-person succession plans;</span></li> <li><span>Improved line management;</span></li> <li><span>Better remote-work and in-office cultures;</span></li> <li><span>Decreased risk of employee self-dealing;</span></li> <li><span>Resiliency in the face of health &amp; safety events;</span></li> <li><span>Early transition to the inevitable Web 3.0 and SSI / PII protection;</span></li> <li><span>Increased tech literacy among leadership &amp; budget stewardship across non-revenue generating offices; and</span></li> <li><span>Strengthened global operations and third party management.</span></li> </ol> <p></p> <p id="ember1041" class="ember-view reader-content-blocks__paragraph">Don't wait. Manage the uncomfortable.</p> <p id="ember1042" class="ember-view reader-content-blocks__paragraph"></p> <hr class="reader-content-blocks__horizontal-rule" /> <p id="ember1043" class="ember-view reader-content-blocks__paragraph">[1] This is a nice<span class="white-space-pre"> </span><a class="app-aware-link " target="_self" href="https://www.splunk.com/en_us/blog/learn/vulnerability-vs-threat-vs-risk.html" data-test-app-aware-link="">explanation</a><span class="white-space-pre"> </span>by Splunk of vulnerabilities, threats and risks in cybersecurity.</p> <p id="ember1044" class="ember-view reader-content-blocks__paragraph">[2] A designated PMO to achieve this milestone might be worth his or her salt.</p>

Mastering Conference Networking in Some Easy Steps Publish Date·4/10/2024 4:05:54 PM

Mastering Conference Networking in Some Easy Steps

<p></p> <p>In the legal realm, conferences are invaluable for broadening your professional network. This is precisely why ABL convenes twice a year, providing this enriching experience to its members. Let's delve into the reasons behind their significance and how you can maximize their potential:</p> <p><b>Benefits:</b></p> <ul> <li>Expertise Hub: Conferences gather specialists from various legal niches, offering unique insights and opportunities for collaboration.</li> <li>Connections: They're ideal for firms seeking new international clients or strengthening existing relationships through trust-building and feedback.</li> <li>Learning Opportunities: Workshops and panels keep you updated on legal trends and best practices, boosting your expertise.</li> <li>Boost Brand Visibility: Active participation and speaking gigs help elevate your firm's reputation.</li> <li>Peer Learning: Conferences facilitate knowledge exchange.</li> </ul> <p>&nbsp;</p> <p><b>Strategies:</b></p> <ul> <li>Prepare: Research speakers and attendees, set clear networking goals.</li> <li>Engage: Actively participate, ask questions, and exchange contacts.</li> <li>Use Social Media: Amplify your presence with event hashtags and engage with peers online.</li> <li>Offer Value: Share insights and solutions, showcasing your expertise.</li> <li>Follow Up: Personalize follow-ups, referencing conference discussions, and schedule further interactions.</li> </ul> <p></p> <p>In summary, conferences are powerful tools for legal professionals. With strategic planning and active engagement, you can leverage these events to expand your network and propel your career forward.</p> <p>Prepare to do so in Malta &mdash; our 46<sup>th</sup> is coming, gather for some memorable event from 22<sup>nd</sup> to 25<sup>th</sup> of May. See you there.</p>

Global Trends and Challenges for the Legal Landscape in 2024 Publish Date·2/8/2024 10:35:38 PM

Global Trends and Challenges for the Legal Landscape in 2024

<p></p> <p>This new year, the legal profession finds itself at the start of dynamic changes, shaped by evolving societal, technological, and geopolitical landscapes. The year 2024 promises to be a pivotal one for lawyers worldwide with emerging trends that demand adaptability and foresight.</p> <p>&nbsp;</p> <p><b>Technology Reshaping Legal Practice</b></p> <p>AI, AI, AI. Artificial Intelligence is everywhere. The next years will be of profound transformation due to rapid advancements in technology. Artificial intelligence, automation, and blockchain are becoming integral tools in legal research, document analysis, and contract review.</p> <p>LegalTech is a growing industry: in November, in the Web Summit 2023, Inspira won the Pitch Competition. Inspira works with generative artificial intelligence and uses technology to democratizing legal information to make it more accessible for everyone.</p> <p>Lawyers must stay abreast of these technological developments to enhance efficiency and offer clients innovative solutions. However, the rise of technology also brings forth ethical considerations and challenges related to privacy and data security, necessitating a careful balance between innovation and ethical responsibility.</p> <p>&nbsp;</p> <p><b>Remote Work and Virtual Courts:</b></p> <p>The global shift towards remote work, accelerated by the COVID-19 pandemic, continues to influence the legal sector. Law firms are embracing flexible work arrangements, and virtual court proceedings are becoming more prevalent. Lawyers need to adapt to this new normal, mastering virtual communication tools, and navigating the nuances of online hearings.</p> <p>&nbsp;</p> <p><b>Emergence of Environmental, Social and Governance and Climate-Related Legal Actions:</b></p> <p>ESG concerns have garnered significant attention, placing a growing emphasis on corporate accountability for environmental impact. A study from the Harvard Law School Forum on Corporate Governance reveals a notable increase in ESG-related shareholder proposals at Fortune 250 companies, more than doubling over the past five years. Investors and stakeholders are likely to pursue legal avenues to ensure the enforcement of sustainability commitments and to hold corporations accountable for their environmental footprint.</p> <p><b><br /></b></p> <p><b>Cybersecurity and Data Protection:</b></p> <p>With the rising frequency and sophistication of cyber threats, cybersecurity and data protection have become dominant concerns for lawyers. The legal profession is tasked with preserving sensitive client information and guaranteeing compliance with evolving data protection laws. As cyber threats evolve, lawyers and law firms must stay vigilant, adopting robust cybersecurity measures and staying informed about the latest developments in data protection regulations.</p> <p><b><br /></b></p> <p><b>Diversity, Equity, and Inclusion:</b></p> <p>The legal profession is experiencing a heightened focus on diversity, equity, and inclusion. Clients and organizations are prioritizing partnerships with law firms that demonstrate a commitment to these values. Lawyers are challenged to foster inclusive work environments, address unconscious biases, and actively promote diversity within their organizations.</p> <p></p> <p>&nbsp;</p> <p>Sources:</p> <p>Legal Trends for 2024: Here's What You Need to Know!, Arpit Pahwa, in <a href="https://www.linkedin.com/pulse/legal-trends-2024-heres-what-you-need-know-arpit-pahwa-ggd8f/">https://www.linkedin.com/pulse/legal-trends-2024-heres-what-you-need-know-arpit-pahwa-ggd8f/</a>;</p> <p>Five legal trends that will dominate 2024, Dylan Brown, in <a href="https://www.lexisnexis.co.uk/blog/future-of-law/five-legal-trends-that-will-dominate-2024">https://www.lexisnexis.co.uk/blog/future-of-law/five-legal-trends-that-will-dominate-2024</a></p> <p>Brazilian legaltech wins PITCH competition at WebSummit, Sergio Ramos in <a href="https://www.novobrief.com/a-legaltech-company-the-winner-of-pitch-competition-at-web-summit/10786/">https://www.novobrief.com/a-legaltech-company-the-winner-of-pitch-competition-at-web-summit/10786/</a></p>

Events See All

News See All

© 2023 Alliance of Business Lawyers. All rights reserved.

Terms of Use | Privacy Policy