Considering implementing enterprise risk management program

Assignment Help Basic Computer Science
Reference no: EM132390899

Unit 1 Assignment - ERM at Mars, Incorporated: ERM for Strategy and Operations

ABC Organization is considering implementing an Enterprise Risk Management program. Someone on the board became aware of Mars, Incorporated's Enterprise Risk Management (ERM) program case study.

As with any ERM program, Mars' program has continued to evolve since 2012.

Mars' ERM program began with the company's inception by Forrest Mars. Historically, the leadership at Mars had a serious commitment to risk management. ERM represented one natural evolution from these practices. In conjunction with the transition to nonfamily management in the early 2000s, the corporation established challenging growth, earnings, and cost targets. In order to achieve these objectives, the company undertook several key initiatives to ensure the achievement of these objectives. ERM became one of these. Most of the major improvements in the evolution of this program resulted from working with these individuals to address the needs of their business units. By identifying these players' involvement in the early stages of the program and their subsequent roles, the case study reader should gain an understanding of the importance of and the need to cultivate relationships with these early adopters.

As risk manager you are responsible for ensuring your organization minimizes its risks. Your board became aware of this case study and has asked you to create a presentation for the next board meeting where you will present information about this case study and the effects of implementing an ERM program at Mars.

Create a PowerPoint® narration (voice) report of at least 10 slides based on your findings about this case study along with the message that is delivered based upon this case (not including the cover page and reference page). If you do not own a copy of Microsoft PowerPoint use a comparable slide software or Google Slides (free and accessible from Google.com). If your tool does not offer the ability to put audio on the slides utilize another tool to record the audio portion, i.e., VLC Media or another tool that will allow you to record .mp3 file format that transitions with the slides.

In the presentation, address the following:

1. What represents the key success factors of the ERM program?

2. What improvements would you make?

3. Does this represent an effective risk management program? If not, what is missing? (Support your response with details from the case study and properly cited references.)

4. Would this program work for a publicly traded corporation of similar size?

5. How important do you view alignment and accountability among a management team?

Make sure to provide a reference slide that provides APA citations of any sources used in the

PowerPoint presentation. This slide does not require narration.

Oral Parameters/Expectations:

1. At least 10 slides in length, with each slide having a narration in Standard English explaining the key ideas in each slide.

2. The oral presentation should have a highly developed and sustained viewpoint and purpose.

3. The oral communication should be highly ordered, logical and unified.

4. The oral delivery technique, including word choice and oral expressiveness, displays exceptional content, organization, and style, while leading the audience to a dynamic and supported conclusion.

5. Free of grammatical errors.

6. No evidence of plagiarism.

7. Ensure that the narration provides clear enunciation, a professional tone, and is free of background noise.

8. The slide presentation must be professional and utilize a professional background and design.

9. All slides must have notes or a script for the verbal presentation given. The script will be entered into the plagiarism checker as well.

Written Requirements

Your PowerPoint narration presentation should be 10 or more slides in length. There should be a minimum of 5 references. Be sure to use appropriate APA format and cite your Reading or other sources that you used in your presentation. The presentation should contain enough information to adequately answer the questions and contain no spelling, grammar, or APA errors. Remember that the slides will contain summary information of what you provide in your narration. Points deducted from grade for each writing, spelling, or grammar error are at your instructor's discretion. Also review the university policy on plagiarism. If you have any questions, please contact your professor.

Reference no: EM132390899

Questions Cloud

Resources and reflect on the impact of clinical systems : Review the Resources and reflect on the impact of clinical systems on outcomes and efficiencies within the context of nursing practice and healthcare delivery.
Are the security needs of small businesses : Are the security needs of small businesses different than those of a larger corporation? Please support your answers.
Methods for enhancing group cohesion : Throughout this course, you have learned about teamwork and effective teams. Methods for enhancing group cohesion. Strategies for managing conflict.
Presentation adjustments affects how the data is displayed : Kirk (2016) tells us that data adjustments affects what data is displayed and presentation adjustments affects how the data is displayed.
Considering implementing enterprise risk management program : ABC Organization is considering implementing an Enterprise Risk Management program. Does this represent an effective risk management program?
Benefits of effective data governance program : What are the benefits of an effective data governance program to an organization?
Explain the fundamental security design principles : Describe the key security requirements of confidentiality, integrity, and availability. Explain the fundamental security design principles.
Important step in the threat modeling process : Seriously addressing and correcting STRIDE threat is an important step in the threat modeling process.
Discuss pros-cons of adopting SHA-3 or sticking with SHA-2 : Just prior to the announcement of the winner in the NIST SHA-3 competition, Discuss the pros and cons of adopting SHA-3 or sticking with SHA-2.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd