{"id":14025,"date":"2017-06-12T14:00:34","date_gmt":"2017-06-12T17:00:34","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=14025"},"modified":"2017-06-12T12:49:52","modified_gmt":"2017-06-12T15:49:52","slug":"risk-maturity-models","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/risk-maturity-models\/","title":{"rendered":"Risk Maturity Models"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-14026\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2017\/06\/Risk-Maturity-Models.jpg\" alt=\"Risk Maturity Models\" width=\"145\" height=\"217\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2017\/06\/Risk-Maturity-Models.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2017\/06\/Risk-Maturity-Models-100x150.jpg 100w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Domenic Antonucci<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Maison d&#8217;\u00e9dition Kogan Page<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Risk management maturity measures how effectively an organization can identify and tackle the risks it faces.\u00a0 Without measuring or tracking this maturity, board members\/leaders do not have the confidence that the risk management processes they are overseeing can deliver adequate protection from risk.\u00a0 Author Domenic Antonucci argues that the best way to keep track of risk management maturity is through Risk Maturity Models (RMMs).\u00a0 RMMs outline key capabilities that govern how effectively organizations manage risk and allow risk functions to benchmark current performance and identify areas for improvement.<\/p>\n<p>This book explains the benefits of RMMs, the principles behind their construction and use, and offers a chart of sixty of the leading RMMs available (both free and paid for) along with recommendations for which circumstances these models are best suited for.\u00a0 After introducing the theory and practice of RMMs, the second part of the book offers tailored advice in the form of practitioner scenarios on how risk professionals, internal auditors, and board members can use these models in different contexts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Domenic Antonucci Maison d&#8217;\u00e9dition Kogan Page R\u00e9sum\u00e9: Risk management maturity measures how effectively an organization can identify and tackle the risks it faces.\u00a0 Without measuring or tracking this maturity, board members\/leaders do not have the confidence that the risk management processes they are overseeing can deliver adequate protection from risk.\u00a0 Author Domenic Antonucci argues that the best way to keep track of risk management maturity is through Risk Maturity Models&hellip; <\/p>\n","protected":false},"author":3,"featured_media":14026,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,19],"tags":[],"class_list":["post-14025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-risco-e-perdas"],"views":282,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/14025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=14025"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/14025\/revisions"}],"predecessor-version":[{"id":14027,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/14025\/revisions\/14027"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/14026"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=14025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=14025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=14025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}