World Leading Hi-Tech Research Defining World Leading Risk Management & Risk Analytics Practices
*Projects *Goldman Sachs *JP Morgan *Wall Street Hedge Funds *Princeton Quant Presentations *Model Risk Management *SR11-7 & OCC2011-12
*Research *Future of Finance *Bayesian vs. VaR *Markov Chain Monte Carlo Models *Cyber Finance *Future of Risk *Cyber Risk *Bitcoin Protocol

Current Research Projects at Below: Historical Archive of Prior Research, Intelligence, and, Analysis Tools.
IT Security and Information Assurance Glossary of 4,000 Terms: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z
IT Security, Information Assurance, Controls, and Compliance: Portals-Glossary on 4,000 Topics: C
"Best site for information technology and business information" - Computerworld

Research Analyst Wizard: Click on a term to create most-updated research microsite on that topic.

C2: Class C2 · CA · CA certificate · CA hierarchy · CA ACF2 · CA ACF2: Computer Associates Access Control Facility · CA: Certification Authority · cable modem · Cache · cache cramming · cache poisoning · Cadbury · Cain & Abel · CALEA: Communications Assistance for Law Enforcement Act · California Security Breach Information Act · Call Back · Call Data Record · Callback · caller ID spoofing · CAN SPAM: Controlling the Assault of Non Solicited Pornography and Marketing Act · Canister · Canonicalization error · CAP: Certification and Accreditation Professional · Capability · Capability Maturity Model (CMM) · Capacity Planning · Capacity Stress Testing · CAPI: Crypto API · CAPICOM · Capital Expenditure · Capital Expense · captive portal · capture · Card Swipes · carding · Carnivore · CARO (Computer Anti Virus Research Organization) · CAS: Code access security · Cascading · CAST · Category · Cathode Ray Tube (CRT) · CBAC: Context based Access Control · CBC · CBC: Cipher Block Chaining · CCA: Common Cryptographic Architecture · CCI Assembly · CCI Component · CCI Equipment · CCITS: Canadian Centre for Information Technology Security · CCM: Counter mode with Cipher block chaining Message authentication code · CCMP: Counter mode with Cipher block chaining Message authentication code Protcol · CCSP · CCTV · CD · CD ROM · cDc: Cult of the Dead Cow · CDMA Division Multiple Access · CDROM · Cell Global Identity · cell phone spam · Cellular Message Encryption Algorithm · Central Equipment Identity Register · Central Office Of Record · Central Processing Unit (CPU) · Centralized Data Processing · Centre for the Protection of National Infrastructure · CER: Crossover Error Rate · CERIAS: Center for Education and Research in Information Assurance and Security · CERT · CERT: Computer Emergency Response Team · Certificate · certificate authority · Certificate Authority (CA) · Certificate BLOB · Certificate Management · Certificate policy · Certificate request · Certificate Revocation List (CRL) · Certificate server · Certificate Service · Certificate store · Certificate store functions · Certificate template · Certificate Based Authentication · certification · Certification and Accreditation Process · Certification Authority · Certification Authority Workstation · Certification Package · Certification Practice Statement (CPS) · Certification Request Syntax Standard · Certification Test And Evaluation · Certified Information Systems Security Professional · Certifier · CET: Cisco Encryption Technology · CFB · CFB: Ciphertext Feedback · cgi bin · CGI: Common Gateway Interface · chaffing · chaffing and winnowing · Chain of Custody · Chaining mode · Challenge · Challenge And Reply Authentication · Challenge response authentication · Challenge Token · Challenge Response · challenge response authentication mechanism · Change Control · Change Management · Channel Service Unit/Digital Service Unit (CSU/DSU) · CHAP: Challenge Handshake Authentication Protocol · Chargeback · Chat Room · Check Digit · Check Digit Verification (Self checking Digit) · Check Word · Checklist · Checkpoint Restart Procedures · Checksum · Chernobyl virus · Chief Executive Officer (CEO) · Chief Financial Officer (CFO) · Chief Information Officer (CIO) · Chief Technology Officer (CTO) · Chinese Wall Model · Chip and PIN · Chosen Ciphertext Attack · Chosen Plaintext Attack · Chroot jail · CIAC: Computer Incident Advisory Capability · cipher · cipher block chaining · Cipher Feedback · Cipher Key Sequence Number · Cipher mode · Cipher Text · Cipher Text Auto Key · Ciphering Algorithm · Ciphering Key · Ciphering Key Generating Algorithm · ciphertext · ciphertext feedback · Ciphertext Only Attack · Ciphony · Circuit Level Firewall · Circuit Level Gateway · Circuit Switched Network · Circular Routing · CIS: Center for Internet Security · CISA: Certificate Information Systems Auditor · CISC · Cisco Certified Security Professional (CCSP) · Cisco Information Security Specialist (CISS) · CISO: Chief Information Security Officer · CISP PCI · CISP: Cardholder Information Security Program · CISSP: Certified Information System Security Professional · CITU: Central Information Technology Unit · Clark Wilson Model · Class C2 · Classic virus · Classified Information · Classified Information Spillage · Clear Desk Policy · Clear Screen Policy · Clearance · Clearing · Cleartext · Clerical Systems · CLI (Command Line Interface) · clickjacking · Client · Client certificate · Client server · Clipper · Clipper Chip · cloak of invisibility · Clogging attack · Closed Security Environment · Closed User Group · Cloud Cover · Cluster Controller · CMA · CMAC: Cipher based Message Authentication Code · CMYK · CNSSI 4009 Terms · Coaxial Cable · COBIT · COCO · cocooning · Code · Code Book · Code Group · Code of Connection (CoCo) · Code Red · Code signing · Code Vocabulary · Codeaccesspermissions · CODEC · Coevolving · Coherence · Cohesion · cold site · Cold Start · Collaborative Computing · Collision · Combined Code on Corporate Governance · Command Authority · command injection · Command line · Command Line Prompt · Command Prompt · Commercial COMSEC Evaluation Program · Commission · Common Criteria · Common Criteria & Methodology for Information Technology Security Evaluation · Common Fill Device · Common Gateway Interface CGI · Common Weakness Enumeration · Communication Processor · Communications Controller · Communications Cover · Communications Deception · Communications Equipment · Communications Line · Communications Network · Communications Profile · Communications Security · Community Risk · Community Strings · Companion virus · Comparison Program · Compartmentalization · Compartmented Mode · Compensating Control · Competencies · Competitive Intelligence · Compiler · Completely Connected (Mesh) Configuration · Completeness Check · Complex dictionary checking · Compliance Testing · Component · Compound threat · Comprehensive Audit · Compressed file · Compression · Compressors · Compromise · Compromised system · Compromising Emanations · Computationally Greedy · Computer Abuse · computer barnacle · Computer Cryptography · Computer Emergency Response Team (CERT) · Computer forensics · Computer Fraud · Computer Misuse Act 1990 · Computer Security · Computer Security Incident · Computer Security Subsystem · Computer Sequence Checking · Computer Server · Computer System · Computer virus · Computer Viruses · Computer worm · Computer Aided Software Engineering (CASE) · Computer Assisted Audit Technique (CAAT) · Computer based Discovery · Computing Environment · COMSEC Account · COMSEC Account Audit · COMSEC Aid · COMSEC Assembly · COMSEC Boundary · COMSEC Chip Set · COMSEC Control Program · COMSEC Custodian · COMSEC Demilitarization · COMSEC Element · COMSEC End Item · COMSEC Equipment · COMSEC Facility · COMSEC Incident · COMSEC Insecurity · COMSEC Manager · COMSEC Material · COMSEC Material Control System · COMSEC Modification · COMSEC Module · COMSEC Monitoring · COMSEC Profile · COMSEC Survey · COMSEC System Data · COMSEC Training · Concept Of Operations · Concurrency Control · Concurrent Access · Conficker · confidentiality · Confidentiality agreement · Confidentiality Integrity and Availability · Configuration Control · Configuration Item (CI) · Configuration Management · Confinement Channel · Connection Hijacking · Consensus baseline security settings · Console · Console Log · Consulted · Consumables · Consumer Data Privacy · consumer privacy · Contamination · Content Discovery · Content Filtering · Content of Communication · Content Protection for Removable Media · Content Security · Contention · Context · Contingency Arrangements · Contingency Key · Contingency Plan · Contingency Planning · Continuity · Continuity of Operations Plan · Continuous Auditing Approach · Continuous Availability · Continuous Improvement · Control Center · Control Framework · Control Group · Control Objective · Control Objectives for Enterprise Governance · Control Objectives for Information and Related Technology · Control Perimeter · Control Practice · Control Risk · Control Risk Self Assessment · Control Section · Control Total · Control Weakness · Controlled Access Area · Controlled Access Protection · Controlled Cryptographic Item · Controlled Interface · Controlled Space · Controlling Authority · Controls · Cookie · cookie poisoning · Cooperative Key Generation · Cooperative Remote Rekeying · COPPA: Children's Online Privacy Protection Act · Copy Protection · Copyright · corporate area network (CAN) · Corporate Exchange Rate · Corporate Governance · Corporate Security Officer (CSO) · Corrective Controls · Correctness Proof · Corrupt Data · Corruption · COSO · COTS Software · Countermeasure · Countersignature · Coupling · Coverage · Covert Channel · Covert Channel Analysis · Covert Channels · Covert Storage Channel · Covert Timing Channel · CPRM · CPRM: Content Protection for Removable Media · CPS: Certification Practice Statement · Crack · cracker · cracking · CRAM · CRAM: Challenge Response Authentication Mechanism · CRAMM: CCTA Risk Analysis and Management Method · Crash · Crawler · CRC: Cyclic Redundancy Check · Credentialed Analysis · Credentials · crimeware · Crippled · Crippleware · Criteria · Critical Functions · Critical Infrastructure · Critical Infrastructures · Critical Success Factors (CSFs) · Criticality Analysis · CRL · CRL: Certificate Revocation List · Cron · Cross Domain Solution · Cross Certification · Cross realm authentication · CRT · Cryptanalysis · CRYPTO · Crypto Alarm · Crypto Algorithm · Crypto Ancillary Equipment · Crypto Equipment · Crypto Ignition Key · Cryptographic · Cryptographic Algorithm · cryptographic checksum · Cryptographic Component · Cryptographic Coprocessor · Cryptographic hash function · Cryptographic Initialization · Cryptographic key · Cryptographic Logic · Cryptographic Message Syntax Standard · Cryptographic Token Interface Standard · cryptography · cryptology · Cryptonet · cryptoperiod · Cryptosecurity · Cryptosynchronization · Cryptosystem · Cryptosystem Analysis · Cryptosystem Evaluation · Cryptosystem Review · Cryptosystem Survey · Cryptosystem: Cryptographic System · CSD: Computer Security Division · CSI: Computer Security Institute · CSIRT: computer security incident response team · CSO · CSO: Chief Security Officer · CSP family · CSP name · CSP type · CSP: Cryptographic service provider · CSR: Certificate Signing Request · CSS spam · CSS: Content Scrambling System · CSS: Cross Site Scripting (or XSS cross site malicious content) · CTCI (Computer to computer interface) · CTCPEC: Canadian Trusted Computer Product Evaluation Criteria · CTL: Certificate trust list · Customer Care and Billing System · Customer Data Privacy · customer privacy · Customer Relationship Management (CRM) · Customise · Customized Application for Mobile Enhanced Logic · Cutover · CVE: Common Vulnerabilities and Exposures · CWE · Cyber Attack · Cyber Storm · Cybercops · Cybercrime · cyberextortion · cyberextortionist · Cybersitter · Cyberslacker · Cyberterrorism or Cyberwarfare · Cyberwar · Cyberwoozle · cyborg insect · Cybrarian · Cyclic Redundancy Check · Cypherpunk anonymous remailer

Research Portals and Glossary of 4,000 IT Security and Information Assurance Terms
A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z


FinTech Enterprise Risk-Model Risk Management meet Penetration Testing-Ethical Hacking

2015 National CSO-CxO Cybersecurity Conference

Cybersecurity & Cyber-Finance Risk Management: Strategies, Tactics, Operations, &, Intelligence: Enterprise Risk Management to Model Risk Management: Understanding Vulnerabilities, Threats, & Risk Mitigation

CSO-CxO Plenary Keynote, National Cybersecurity Summit, Altria Group Inc. Headquarters, VA, 2015

New York Cyber Security and Engineering Technology Association (NYSETA) Conference
A Framework for Pen Testing Network Protocols for Global Banking & Finance Call Centers: Bridging Networks, Systems, and, Controls Frameworks for Cybersecurity Curricula & Standards Development
(Innovative Design and Development Practices)

New York Cyber Security and Engineering Technology Association (NYSETA) Conference, 2015.

29 SSRN Top-10 Paper Rankings in FinTech Quant Risk Analytics-Model Risk Management
  1. SSRN's Top-10 Paper: CGN: Risk Management Practice: January 2016.
  2. SSRN's Top-10 Paper: CGN: Risk Management, Including Hedging & Derivatives: January 2016.
  3. SSRN's Top-10 Paper: Corporate Governance Practice Series eJournal: January 2016.
  4. SSRN's Top-10 Paper: IRPN: Innovation & Cyberlaw & Policy: January 2016.
  5. SSRN's Top-10 Paper: Econometrics: Mathematical Methods & Programming eJournal: May 2015.
  6. SSRN's Top-10 Paper: Computational Techniques: May 2015.
  7. SSRN's Top-10 Paper: Information Systems & Economics eJournal: May 2015.
  8. SSRN's Top-10 Paper: Econometrics: Mathematical Methods & Programming eJournal: April 2015.
  9. SSRN's Top-10 Paper: ERN: Computational Techniques (Topic): April 2015.
  10. SSRN's Top-10 Paper: Econometric Modeling: Risk Management eJournal: March 2015.
  11. SSRN's Top-10 Paper: Econometric Modeling: Capital Markets - Risk eJournal: March 2015.
  12. SSRN's Top-10 Paperr: Econometric Modeling: Capital Markets - Risk eJournal: March 2015.
  13. SSRN's Top-10 Paper: MRN Operations Research Network eJournal: March 2015.
  14. SSRN's Top-10 Paper: OPER Subject Matter eJournal: March 2015.
  15. SSRN's Top-10 Paper: Systemic Risk (Topic): March 2015.
  16. SSRN's Top-10 Paper: Econometrics: Mathematical Methods & Programming eJournal: March 2015.
  17. SSRN's Top-10 Paper: Econometric & Statistical Methods - Special Topics eJournal: February 2015.
  18. SSRN's Top-10 Paper: Microeconomics: Decision-Making under Risk & Uncertainty eJournal: February 2015.
  19. SSRN's Top-10 Paper: VaR Value-at-Risk (Topic): February 2015.
  20. SSRN's Top-10 Paper: ERN: Uncertainty & Risk Modeling (Topic): February 2015.
  21. SSRN's Top-10 Paper: ERN: Econometric & Statistical Methods (Topic): February 2015.
  22. SSRN's Top-10 Paper: Computational Techniques (Topic): February 2015.
  23. SSRN's Top-10 Paper: OPER: Analytical (Topic): February 2015.
  24. SSRN's Top-10 Paper: ERN: Mathematical Methods & Programming (Topic): February 2015.
  25. SSRN's Top-10 Paper: Stochastic Models eJournal: February 2015
  26. SSRN's Top-10 Paper: Econometric Modeling: Capital Markets - Risk eJournal: January 2015.
  27. SSRN's Top-10 Paper: Microeconomics: Decision-Making under Risk & Uncertainty eJournal: January 2015.
  28. SSRN's Top-10 Paper: Uncertainty & Risk Modeling (Topic): January 2015.
  29. SSRN's Top-10 Paper: VaR Value-at-Risk (Topic): January 2015.

Princeton University Invited FinTech Research Presentation on Model Risk Management
Pioneering the FinTech Future of Global Cyber Finance and Cyber Risk Insurance

'"It is this "true" uncertainty, and not risk, as has been argued, which forms the basis of a valid theory of profit and accounts for the divergence between actual and theoretical competition... It is a world of change in which we live, and a world of uncertainty...If we are to understand the workings of the economic system we must examine the meaning and significance of uncertainty; and to this end some inquiry into the nature and function of knowledge itself is necessary."
-- Frank H. Knight
Risk, Uncertainty, and Profit

(Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co), 1921.

Risk, Uncertainty, and Profit: Frank Knight
(Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co), 1921.

2015 Princeton Quant Trading Conference
'Knight Reconsidered':
Risk, Uncertainty, and, Profit for the Cyber Era: Model Risk Management of Cyber Insurance Models using Quantitative Finance and Advanced Analytics

(Global Risk Management Network, LLC, 2015).

Top Wall Street Banks' Model Risk Management Beyond VaR for Extreme Risks
FinTech Technical Expert to Top MDs Team for World's Largest Investment Bank

Cryptanalytic Algorithms and Quantum ComputingBeyond 'Bayesian vs. VaR' Dilemma to Empirical Model Risk Management: How to Manage Risk (After Risk Management Has Failed).
(Global Risk Management Network, LLC, 2012, 2014)

Cryptanalytic Algorithms and Quantum Computing

Measuring & Managing Financial Risks with Improved Alternatives Beyond Value-At-Risk (VaR)
(Global Risk Management Network, LLC, 2012).

FinTech Markov Chain Monte Carlo Models and Bitcoin Block Chain Encryption Protocols

Markov Chain Monte Carlo Models, Gibbs Sampling, and, Metropolis-Hastings Algorithms

Markov Chain Monte Carlo Models,
Gibbs Sampling, and, Metropolis-Hastings Algorithms

(Global Risk Management Network, LLC, 2013).
Complex Stochastics Hi-Dimensional Statistical Analysis

Bitcoin Protocol: Model of ‘Cryptographic Proof’ Based Global Crypto-Currency & Electronic Payments System
Bitcoin Protocol: Model of 'Cryptographic Proof' Based Global Crypto-Currency & Electronic Payments System
(Global Risk Management Network, LLC, 2013).
First Report on the Bitcoin Cryptographic-Proof-of-Work

FinTech Computational Quantitative Cryptanalytic Algorithms for Cyber-Quantum Era

Cryptanalytic Algorithms and Quantum ComputingFuture of Bitcoin & Statistical Probabilistic Quantitative Methods: Interview by Hong Kong Institute of Certified Public Accountants
(Global Risk Management Network, LLC, January 20, 2014.)

Cryptanalytic Algorithms and Quantum Computing
Cryptology beyond Shannon’s Information Theory: Preparing for when the ‘Enemy Knows the System’: Beyond NSF Cryptanalytic Algorithms
(Global Risk Management Network, LLC, 2013.)

AACSB Recognizes Real Impact among Nobel Laureates such as Black-Scholes
Pioneered Anticipatory Risk Analytics Frameworks Applied by Top Investment Banks 

“There are many examples illustrating that advances in basic research have had a substantial impact on practice. Exemplars of this phenomenon can be seen in finance through academic publications on the theories of portfolio selection (Markowitz, 1952), irrelevance of capital structure (Modigliani and Miller, 1958), capital asset pricing (Sharpe, 1964), efficient markets (Fama, 1965 and 1970), option pricing (Black and Scholes, 1973), and agency theory (Jensen and Meckling, 1976). All are well-known for their substantial impact on both theory and practice. In information systems, the research of Malhotra (Malhotra, 2004) has helped companies to understand why knowledge management systems fail...



Cryptanalytic Algorithms and Quantum Computing

“The new business model of the Information Age, however, is marked by fundamental, not incremental, change. Businesses can't plan long-term; instead, they must shift to a more flexible "anticipation-of-surprise" model.”
-- Yogesh Malhotra in CIO Magazine interview, Sep. 15, 1999.


Leading Global Enterprise Risk Management and Model Risk Management Practices

"The future is moving so quickly that you can’t anticipate it… We have put a tremendous emphasis on quick response instead of planning. We will continue to be surprised, but we won't be surprised that we are surprised. We will anticipate the surprise."
20-Years of the Model Risk Management Program
  “The new business model of the Information Age, however, is marked by fundamental, not incremental, change. Businesses can't plan long-term; instead, they must shift to a more flexible "anticipation-of-surprise" model.”
-- Yogesh Malhotra in CIO Magazine interview, Sep. 15, 1999.
[A Decade Later... Wall Street CEO, CFOs, & CROs know so... ]
Model Risk Management Program


Global-National Expert Panels of Computer Scientists & Quantitative Economists
Global-National Thought Leader for UN, NSF, US & World Governments & Parliaments

National Science Foundation  IBM

  USA Federal Government
US Dept. of Veteran Affairs

Government and Cabinet Of Mexico

United Nations

Government and Cabinet Of Netherlands

Nation of South Korea
Maeil Business TV

TiE Silicon Valley  Accenture
Intel  Philips
British Telecom  Institute for Supply Management
The Conference Board


Digital Transformation Research in Global Business & Technology Press

CIO Magazine
CIO Insight
Wall Street Journal

Digital Transformation Ventures in Global Business & Technology Press

Media Coverage Media Coverage

Digital Transformation Venture Clients, Patrons, & Subscribers

A sample of our corporate and organizational clients, patrons, and users is listed below:

FinTech Firms: Goldman Sachs, Google, HP, IBM, Intel, Microsoft, Ogilvy, Wells Fargo

Consulting Firms: Accenture, Ernst & Young, McKinsey, PricewaterhouseCoopers

World Governments: Australia, Canada, European Union, United Kingdom, United States

U.S. Defense: AFRL, Air Force, Army, CCRP, Comptroller, DISA, DoD, NASA, Navy, RAND

World Defense: Australia (Air Force), Canada (Defence R&D), UK (Ministry of Defence)

Business Schools: Harvard, MIT, Princeton, Stanford, UC Berkeley, Wharton


"Founder Yogesh Malhotra says his vision is to fill the gaps between business and technology, data and knowledge, and, theory and practice..."
Dr. Yogesh Malhotra in Fortune


Cyber Transformation Practices Guiding US DoD Commanders & CxOs
("Obsolete what you know before others obsolete it..."
- Dr. Yogesh Malhotra in Inc. Interview)

United States Army United States Navy United States Air Force United States Marine Corps AFRL
"If you spend some time at [the digital research lab] founded by Dr. Malhotra youwill be blessed by some of the world's most astute thinking on the nature of knowledge and its value." 
- U.S. Army Knowledge Symposium, Theme: "Knowledge Dominance: Transforming the Army...from Tooth to Tail", US Department of Defense, United States Army.

"There are many definitions of knowledge management. It has been described as "a systematic process for capturing and communicating knowledge people can use." Others have said it is "understanding what your knowledge assets are and how to profit from them." Or the flip side of that: "to obsolete what you know before others obsolete it." (Malhotra) "
- U.S. Department of Defense, Office of the Under Secretary of Defense (Comptroller)

"KM is obsoleting what you know before others obsolete it and profit by creating the challenges and opportunities others haven't even thought about -- Dr. Yogesh Malhotra, in Inc. Technology Interview"
- U.S. Defense Information Systems Agency Interoperability Directorate


Top-3 Most Influential Scholars-Practitioners
in Knowledge Management
(Ranked in Drexel University Global Survey of IS Practice)

Vision Korea Campaign Keynotes
Dr. Yogesh Malhotra among other 'Vision Korea' National Campaign Keynote Speakers in Vision Korea National Campaign (2000): Dr.Charles Lucier of Booz Allen Hamilton, Dr.David Snowden of IBM, Dr.Robert H. Buckman of Buckman Labs, Dr.Hubert Saint-Onge of Canadian Imperial Bank of Commerce, Professor Dr.Ikujiro Nonaka of Hitotsubashi University


Pioneered Knowledge Management Digital Transformation Practices
Led Global Virtual Team of 200-PhD Experts & CxOs to Publish Pioneering Research

Published in 2000
Published in 2001

Journal Articles & Reports 1993-Present

Published independent Study paper on computer graphics image compression standards for hypermedia computing technologies, the precursor of WWW, on MBA graduate research fellowship with B2B pioneer and full tuition scholarship in 1993.


Developed Top Digital Research Site, Search Engine, & Social Network

Top-Ranked Digital Research Site: Computerworld Best Web Site Award

Top-3 Search Engine: Carnegie Mellon University Industry.Net National Awards

Top-10 Social Network: Popular Rankings after LinkedIn

Led Global Virtual Community of Practice of 130,000+ to Pioneer Digital Transformation Practices
Millions of worldwide users included Global-2000 Corporations and G-20 World Governments.


Top-3 Search Engines Ranked in the Carnegie Mellon University: National Industry.Net Awards

Top of Page

Global Risk Management Network: 'Your Survival Network for The Brave New World Of Business'tm

Global RISK Management Network | Help & FAQs

Terms of Use | Privacy | © Copyrights 2012
Global Risk Management Network, LLC, Cornell Business and Technology Park, Ithaca, NY 14852-4892, U.S.A.