SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
AssetWorks LLC | 877-809-0600 | info@assetworks.com
The Scene:
The 1999 comedy from Mike Judge stands as a cult classic for most office workers. It follows
three unhappy employees at a software company who decide to plant a computer virus that
can siphon funds from the company into a bank account they control. Of course, the plan has
some flaws, and it spirals toward a fiery ending.
…And Action:
In the case of “Office Space,” risk managers not only need to be concerned with cyber risk and
employee theft, but a fire that could lead to extensive property damage. Fire is a fear for
many risk managers. It’s up to them to take mitigation seriously and identify potential
hazards. What’s our level of exposure? Can the risk be reduced or eliminated? How do we
monitor the situation? These are questions a risk manager might ask. To deal with the threat
of fire, a risk manager can put safety measures in place, including fire doors, sprinkler
systems, accessible extinguishers, and enhanced employee training.www.imdb.com
The Scene:
The 2004 disaster film from Roland Emmerich is a collection of environmental catastrophes
wrapped up into one terrifying movie. Massive superstorms all brought on by the damaging
effects of climate change lead to mass destruction carried out by a mad Mother Nature.
…And Action:
Risk management meets its match with “The Day After Tomorrow.” In preparing for property
damage on that scale, there are many considerations. For one, in the event of a total loss,
risk managers want to be sure they can still access important documentation like property
data, building images, and insurable values. Storing this information in a cloud based
software solution allows the data to be accessible from anywhere with an internet
connection. This makes it a bit easier to file claims with insurance carriers or FEMA.
www.imdb.com
The Scene:
Based on a story by Stephen King, this claustrophobic horror movie from 2007 closes in on a
group of people inside a suburban grocery store. Outside the store, a weird mist has
unleashed a collection of giant killer insects intent on tearing apart the town and killing off all
of its residents.
…And Action:
Risk managers should weigh all potential hazards when establishing a plan, but where do
giant killer insects fit in? This black swan event can be classified as a catastrophe because it
carries financial, operational and human losses. To prepare for an event like this, risk
managers should consider FEMA’s National Planning Scenarios. These scenarios cover
everything from rare occurrences like biological or chemical attacks to severe natural
disasters. Creating and practicing plans to respond to various threats can help ensure risk
managers and their colleagues are prepared should a scenario ever need to be activated.www.imdb.com
The Scene:
A 2011 medical thriller from Steven Soderbergh, this pic follows a collection of different
people involved with a fatal pandemic that’s killed off millions of people around the globe.
A race to find a vaccine proves complicated for several scientists who are attempting to
beat the clock to save the world.
…And Action:
Global disease outbreak is an emerging concern for risk managers. Generally, outbreaks
are regional, affecting one area before spreading slowly. FEMA’s National Planning
Scenarios are a consideration here, as well. FEMA has outlined plans for biological
outbreaks or attacks. For risk managers, it’s important to understand what an interruption
in business could mean to the company and then establish potential plans to maintain
business continuity. Options like allowing employees to work remotely, moving the entire
office location, making testing available to all staff, etc. might be the answer.www.imdb.com
The Scene:
Jan de Bont directed this 1996 disaster film about a group of storm chasers tracking
tornadoes through Oklahoma, a state very familiar with these types of natural
catastrophes. The goal of the team is to launch an instrument allowing further research of
tornadoes. It won’t be easy to get close to the storm, though.
…And Action:
Any risk manager working in Oklahoma – where “Twister” is set – has the threat of
tornadoes high on their radar. After all, the state averages about 52 per year. Maintaining
up-to-date insurable values and Secondary COPE Data are critical for risk managers in
tornado alley. COPE Data is essential in identifying the possible risks a structure might face
in a tornado. An onsite insurance appraisal can help with the collection of this data and get
an organization well on its way to being properly insured.
www.imdb.com
Top-notch risk managers consider all the possibilities that come with
keeping their organization up and running. Sure, gargantuan storms and
giant killer insects are not everyday occurrences, but good risk managers
play through many scenarios. Having a plan and policy in place is
important. It can help reduce the impact of a risk occurrence and increase
the stability of your organization.
AssetWorks LLC | 877-809-0600 | info@assetworks.com

Contenu connexe

Tendances

ERM-Enterprise Risk Management
ERM-Enterprise Risk ManagementERM-Enterprise Risk Management
ERM-Enterprise Risk Management
Jorge Vaz Girão , CISA, PMP, PMDPro I, ERMCP
 
Occupational Safety and Health Act (OSHA)
Occupational Safety and Health Act (OSHA)Occupational Safety and Health Act (OSHA)
Occupational Safety and Health Act (OSHA)
Chuckle Chubb
 

Tendances (20)

ERM-Enterprise Risk Management
ERM-Enterprise Risk ManagementERM-Enterprise Risk Management
ERM-Enterprise Risk Management
 
Enterprise-wide Risk Assessment Presentation, dated 03-08-11
Enterprise-wide Risk Assessment Presentation, dated  03-08-11Enterprise-wide Risk Assessment Presentation, dated  03-08-11
Enterprise-wide Risk Assessment Presentation, dated 03-08-11
 
Occupational Safety and Health Act (OSHA)
Occupational Safety and Health Act (OSHA)Occupational Safety and Health Act (OSHA)
Occupational Safety and Health Act (OSHA)
 
Risk governance framework
Risk governance frameworkRisk governance framework
Risk governance framework
 
A Board Perspective on Enterprise Risk Management
A Board Perspective on Enterprise Risk ManagementA Board Perspective on Enterprise Risk Management
A Board Perspective on Enterprise Risk Management
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 
The History of Risk Management
The History of Risk ManagementThe History of Risk Management
The History of Risk Management
 
The M&A Playbook for IT
The M&A Playbook for ITThe M&A Playbook for IT
The M&A Playbook for IT
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
 
Risk register
Risk registerRisk register
Risk register
 
Why risk management services are vital to the oil and gas industry
Why risk management services are vital to the oil and gas industryWhy risk management services are vital to the oil and gas industry
Why risk management services are vital to the oil and gas industry
 
Risk Management Procedure And Guidelines PowerPoint Presentation Slides
Risk Management Procedure And Guidelines PowerPoint Presentation Slides Risk Management Procedure And Guidelines PowerPoint Presentation Slides
Risk Management Procedure And Guidelines PowerPoint Presentation Slides
 
2019 security training matrix competency
2019 security training matrix competency2019 security training matrix competency
2019 security training matrix competency
 
Managemet commitment and safety the slide
Managemet commitment and safety the slideManagemet commitment and safety the slide
Managemet commitment and safety the slide
 
Evolution of risk management Jim Joy
Evolution of risk management Jim JoyEvolution of risk management Jim Joy
Evolution of risk management Jim Joy
 
Internal Audit - Leading as the Trusted Advisor
Internal Audit - Leading as the Trusted AdvisorInternal Audit - Leading as the Trusted Advisor
Internal Audit - Leading as the Trusted Advisor
 
Enterprise risk management summary approach guide
Enterprise risk management summary approach guideEnterprise risk management summary approach guide
Enterprise risk management summary approach guide
 
Risk Mgt Training Slides (1).pptx
Risk Mgt Training Slides (1).pptxRisk Mgt Training Slides (1).pptx
Risk Mgt Training Slides (1).pptx
 
Implementing a Business Continuity Management System in Telecoms
Implementing a Business Continuity Management System in TelecomsImplementing a Business Continuity Management System in Telecoms
Implementing a Business Continuity Management System in Telecoms
 
Implementing a Risk Management System based on the ISO 31000
Implementing a Risk Management System based on the ISO 31000Implementing a Risk Management System based on the ISO 31000
Implementing a Risk Management System based on the ISO 31000
 

Similaire à Risk management in the movies

PROMPT. Describe a potential unanticipated risk that an organization .pdf
 PROMPT. Describe a potential unanticipated risk that an organization .pdf PROMPT. Describe a potential unanticipated risk that an organization .pdf
PROMPT. Describe a potential unanticipated risk that an organization .pdf
altajhaji20
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business Continuity
ReadWrite
 
Kpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_GuideKpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_Guide
APEX Global
 
1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx
jackiewalcutt
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docx
alinainglis
 
Disaster Management
Disaster ManagementDisaster Management
Disaster Management
rashs
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
iban3x
 
Security Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustrySecurity Precautions for the Hospitality Industry
Security Precautions for the Hospitality Industry
Lawrence Nagazina
 
Risk optimisation
Risk optimisationRisk optimisation
Risk optimisation
Petra Smith
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -en
Rolf Häsänen
 
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docxCHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
tiffanyd4
 

Similaire à Risk management in the movies (20)

PROMPT. Describe a potential unanticipated risk that an organization .pdf
 PROMPT. Describe a potential unanticipated risk that an organization .pdf PROMPT. Describe a potential unanticipated risk that an organization .pdf
PROMPT. Describe a potential unanticipated risk that an organization .pdf
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business Continuity
 
Kpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_GuideKpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_Guide
 
Exact Catastrophe Exposure Management - Whitepaper
Exact Catastrophe Exposure Management - WhitepaperExact Catastrophe Exposure Management - Whitepaper
Exact Catastrophe Exposure Management - Whitepaper
 
READY FOR DISASTER
READY FOR DISASTERREADY FOR DISASTER
READY FOR DISASTER
 
1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docx
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
Disaster Management
Disaster ManagementDisaster Management
Disaster Management
 
Emp.Defense.Council.Li.2011.10.27
Emp.Defense.Council.Li.2011.10.27Emp.Defense.Council.Li.2011.10.27
Emp.Defense.Council.Li.2011.10.27
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
Security Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustrySecurity Precautions for the Hospitality Industry
Security Precautions for the Hospitality Industry
 
Cloud Computing Disaster Readiness Report
Cloud Computing Disaster Readiness ReportCloud Computing Disaster Readiness Report
Cloud Computing Disaster Readiness Report
 
Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report
 
Microsoft Risk Management
Microsoft Risk ManagementMicrosoft Risk Management
Microsoft Risk Management
 
Risk optimisation
Risk optimisationRisk optimisation
Risk optimisation
 
Modern operational risk
Modern operational riskModern operational risk
Modern operational risk
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -en
 
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-RoundtableTMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
 
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docxCHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
 

Dernier

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Dernier (20)

8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 

Risk management in the movies

  • 1. AssetWorks LLC | 877-809-0600 | info@assetworks.com
  • 2.
  • 3. The Scene: The 1999 comedy from Mike Judge stands as a cult classic for most office workers. It follows three unhappy employees at a software company who decide to plant a computer virus that can siphon funds from the company into a bank account they control. Of course, the plan has some flaws, and it spirals toward a fiery ending. …And Action: In the case of “Office Space,” risk managers not only need to be concerned with cyber risk and employee theft, but a fire that could lead to extensive property damage. Fire is a fear for many risk managers. It’s up to them to take mitigation seriously and identify potential hazards. What’s our level of exposure? Can the risk be reduced or eliminated? How do we monitor the situation? These are questions a risk manager might ask. To deal with the threat of fire, a risk manager can put safety measures in place, including fire doors, sprinkler systems, accessible extinguishers, and enhanced employee training.www.imdb.com
  • 4. The Scene: The 2004 disaster film from Roland Emmerich is a collection of environmental catastrophes wrapped up into one terrifying movie. Massive superstorms all brought on by the damaging effects of climate change lead to mass destruction carried out by a mad Mother Nature. …And Action: Risk management meets its match with “The Day After Tomorrow.” In preparing for property damage on that scale, there are many considerations. For one, in the event of a total loss, risk managers want to be sure they can still access important documentation like property data, building images, and insurable values. Storing this information in a cloud based software solution allows the data to be accessible from anywhere with an internet connection. This makes it a bit easier to file claims with insurance carriers or FEMA. www.imdb.com
  • 5. The Scene: Based on a story by Stephen King, this claustrophobic horror movie from 2007 closes in on a group of people inside a suburban grocery store. Outside the store, a weird mist has unleashed a collection of giant killer insects intent on tearing apart the town and killing off all of its residents. …And Action: Risk managers should weigh all potential hazards when establishing a plan, but where do giant killer insects fit in? This black swan event can be classified as a catastrophe because it carries financial, operational and human losses. To prepare for an event like this, risk managers should consider FEMA’s National Planning Scenarios. These scenarios cover everything from rare occurrences like biological or chemical attacks to severe natural disasters. Creating and practicing plans to respond to various threats can help ensure risk managers and their colleagues are prepared should a scenario ever need to be activated.www.imdb.com
  • 6. The Scene: A 2011 medical thriller from Steven Soderbergh, this pic follows a collection of different people involved with a fatal pandemic that’s killed off millions of people around the globe. A race to find a vaccine proves complicated for several scientists who are attempting to beat the clock to save the world. …And Action: Global disease outbreak is an emerging concern for risk managers. Generally, outbreaks are regional, affecting one area before spreading slowly. FEMA’s National Planning Scenarios are a consideration here, as well. FEMA has outlined plans for biological outbreaks or attacks. For risk managers, it’s important to understand what an interruption in business could mean to the company and then establish potential plans to maintain business continuity. Options like allowing employees to work remotely, moving the entire office location, making testing available to all staff, etc. might be the answer.www.imdb.com
  • 7. The Scene: Jan de Bont directed this 1996 disaster film about a group of storm chasers tracking tornadoes through Oklahoma, a state very familiar with these types of natural catastrophes. The goal of the team is to launch an instrument allowing further research of tornadoes. It won’t be easy to get close to the storm, though. …And Action: Any risk manager working in Oklahoma – where “Twister” is set – has the threat of tornadoes high on their radar. After all, the state averages about 52 per year. Maintaining up-to-date insurable values and Secondary COPE Data are critical for risk managers in tornado alley. COPE Data is essential in identifying the possible risks a structure might face in a tornado. An onsite insurance appraisal can help with the collection of this data and get an organization well on its way to being properly insured. www.imdb.com
  • 8. Top-notch risk managers consider all the possibilities that come with keeping their organization up and running. Sure, gargantuan storms and giant killer insects are not everyday occurrences, but good risk managers play through many scenarios. Having a plan and policy in place is important. It can help reduce the impact of a risk occurrence and increase the stability of your organization. AssetWorks LLC | 877-809-0600 | info@assetworks.com