by John Hurlock | Mar 30, 2017 | Uncategorized
A truism of cyber-risk is that most events occur because of actions a person takes, not because of the electronic safeguards in place. My favorite is the “Candy Drop”, where a USB drive is dropped in a parking lot outside of HQ and someone picks it up and...
by John Hurlock | Mar 9, 2017 | Uncategorized
That is the question. The (current) incurred loss methodology strongly encourages pooling loans. Most financial institutions only conduct an individual evaluation on impaired credits, although technically you can individually evaluate an unimpaired credit...
Recent Comments