RSM Global

Risk advisory

Protect yourself against business threats.

We specialise in managing risk. To enhance the value that you deliver to your stakeholders, we can assist you in protecting your business and its success.

We understand the threats that your business may face. From the global banking crisis to the rise of cybercrime, recent history demonstrates the importance of identifying threats, and the appropriate response, at an early stage.

As a result, we are active, not reactive, and provide support and guidance as your systems and processes develop. Our expertise and knowledge ensure we remain at the forefront of implementing new approaches to managing risk.

 

RSM's Global Capabilities - Finding opportunity in change

From new trade rules to talent migration, from big data to cyber threats, the world is changing at an unprecedented pace. But upheaval also means opportunity, if you’re prepared.

GDPR: The game-changer businesses don’t know about

The new EU General Data Protection Regulation (GDPR) is set to be the biggest shake-up to data privacy legislation in a generation. The regulation comes into force in May 2018 and will affect businesses across the globe. Steven Snaith, Partner, RSM UK and Nicola Colleran, Technology Consulting Director, RSM Ireland comment.

Is your business GDPR ready?

The General Data Protection Regulation (GDPR) will come into force in the UK on 25 May 2018 after four years of negotiations and unprecedented levels of lobbying by businesses.  These new rules will cause significant disruption to how organisations store, manage and process personal data, with significant penalties for those who don’t comply.

When it comes to cyber, 'underinsured' means 'underprepared'

A blog by Michael Shatter, Director of Risk Assurance Services, RSM Australia. Throughout the evolution of cyber insurance one thing has become clear; defence barriers can never be fully impenetrable and therefore, you are never fully protected. This is what makes insurance the back bone of cyber protection. Organisations of all sizes need to invest in security procedures and tools to make the business as resilient as possible. 'Underinsured' means 'underprepared'. 

5 key considerations for effective business interruption coverage

Most key business processes are now automated and built on technology. Consequently, disruptions from a cyberattack can lead to significant lost sales and productivity, recovery costs and reputational harm. Accounting for business interruption costs is almost as important as mitigating the breach itself, especially as exposure is only expected to increase in the future.

Changing cyber security regulation: How does it impact middle market businesses?

Cyber risk is an ever evolving threat for 21st century business and as such, is a top of mind issue for today’s business leaders. A cyber security breach can have huge legal and financial ramifications for any business. High profile cyber-attacks are on the rise and governments are increasingly cracking down on cyber criminals. 

A meaty internal audit client utilises RSM talent

RSM, through an integrated and coordinated approach with its member firms, developed detailed audit programmes for meat manufacturer  in accordance with industry “leading practices” that are designed to assess internal control effectiveness in a harmonised fashion for the US domestic and international locations selected for internal audits.

Quick thinking saves technology company after external audit

An external audit firm noted that as a result of the failure they would be required to expand their scope of their work to perform a full SOD assessment for all areas addressed in the financial controls at all locations that are significant. The additional cost to RSM's client would have been estimated to be $400,000 if not resolved.

RSM optimise internal audit function

RSM was engaged by a transport and logistics company to develop Internal Audit function, to evaluate the existing Internal Control System (ICS) and the Risk Management System (RMS) in order to optimise and integrate existing systems for establishing a comprehensive Compliance Management System (CMS).

Pages