Does this represent effective risk management program

Assignment Help Basic Computer Science
Reference no: EM132393582

Presentation Assignment - ERM at Mars, Incorporated: ERM for Strategy and Operations

ABC Organization is considering implementing an Enterprise Risk Management program. Someone on the board became aware of Mars, Incorporated's Enterprise Risk Management (ERM) program case study. As with any ERM program, Mars' program has continued to evolve since 2012.

Mars' ERM program began with the company's inception by Forrest Mars. Historically, the leadership at Mars had a serious commitment to risk management. ERM represented one natural evolution from these practices. In conjunction with the transition to nonfamily management in the early 2000s, the corporation established challenging growth, earnings, and cost targets. In order to achieve these objectives, the company undertook several key initiatives to ensure the achievement of these objectives. ERM became one of these. Most of the major improvements in the evolution of this program resulted from working with these individuals to address the needs of their business units. By identifying these players' involvement in the early stages of the program and their subsequent roles, the case study reader should gain an understanding of the importance of and the need to cultivate relationships with these early adopters.

As risk manager, you are responsible for ensuring your organization minimizes its risks. Your board became aware of this case study and has asked you to create a presentation for the next board meeting where you will present information about this case study and the effects of implementing an ERM program at Mars.

Create a PowerPoint® narration (voice) report of at least 10 slides based on your findings about this case study along with the message that is delivered based upon this case (not including the cover page and reference page). If you do not own a copy of Microsoft PowerPoint use a comparable slide software or Google Slides (free and accessible from Google.com). If your tool does not offer the ability to put audio on the slides utilize another tool to record the audio portion, i.e., VLC Media or another tool that will allow you to record .mp3 file format that transitions with the slides. In the presentation, address the following:

· What represents the key success factors of the ERM program?

· What improvements would you make?

· Does this represent an effective risk management program? If not, what is missing? (Support your response with details from the case study and properly cited references.)

· Would this program work for a publicly traded corporation of similar size?

· How important do you view alignment and accountability among a management team?

Make sure to provide a reference slide that provides APA citations of any sources used in the PowerPoint presentation. This slide does not require narration. Oral Parameters/Expectations:

· At least 10 slides in length, with each slide having a narration in Standard English explaining the key ideas in each slide.

· The oral presentation should have a highly developed and sustained viewpoint and purpose.

· The oral communication should be highly ordered, logical and unified.

· The oral delivery technique, including word choice and oral expressiveness, displays exceptional content, organization, and style, while leading the audience to a dynamic and supported conclusion.

· Free of grammatical errors.

· No evidence of plagiarism.

· Ensure that the narration provides clear enunciation, a professional tone, and is free of background noise.

· The slide presentation must be professional and utilize a professional background and design.

Written Requirements

Your PowerPoint narration presentation will be a minimum 10 or more slides in length. There will be a minimum of 5 references. Be sure to use appropriate APA format and cite your Reading or other sources that you used in your presentation. Use the notes page to script your presentation. The presentation will contain enough information to adequately answer the questions and contain no spelling, grammar, or APA errors. Remember that the slides will contain summary information of what you provide in your narration. Points deducted from grade for each writing, spelling, or grammar error are at your instructor's discretion. Also review the university policy on plagiarism. If you have any questions, please contact your professor. Post your presentation to this assessment area.

Reference no: EM132393582

Questions Cloud

Explain certain features of visualization : According to Kirk (2016), viewers need some assistance consuming visualizations. Annotations can be used to help explain certain features of a visualization
What risks do such assumptions pose : What risks do such assumptions pose? Moreover, what other risks might we speculate there are in the organization?
Characteristics of a successful ig program : Chapter 3 starts with the identification and the introduction of the Principles, and the characteristics of a successful IG program.
Explain how you would reduce potential vulnerabilities : Explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
Does this represent effective risk management program : What represents the key success factors of the ERM program? Does this represent an effective risk management program?
Developing intimacy with your data : This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest,
Business impact on the capacity management : How do the overall objectives of the business impact on the capacity management of the various parts of the farm?
Explain how erm adoption and implementation : Explain how ERM adoption and implementation. Cite specific examples from this week's readings.
Securing windows networks requires recognizing potential : Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control to address that vulnerability.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Structure necessary for computer lab environment

Internet search to find information, and then find a policy and processes document to provide the structure necessary for your computer lab environment.

  Access local resources and remote resources

Is there a significant difference between the ways you access local resources and remote resources?

  Write a program that reads two coordinates

Write a program that reads two coordinates (x1, y1) and (x2, y2), and prints the slope of the line passing through these two points.

  How might mercy benefit from an enterprise data model

Mercy's Big Data Project Aims to Boost Operations Making the most of the data it collects is a challenge for any organization, and those in the healthcare.

  Which types of spending might have a longer-term impact

Why is it possible that the stimulus package might not generate long-term benefits? Which types of spending might have a longer-term impact?

  What is the liner’s function in reverse extrusion

Describe the purpose of a container liner in direct extrusion, as show n in Fig. 15.1. W h at is the liner's function in reverse extrusion?

  Examples of data that cannot be stored within java

Provide five specific examples of data that cannot be storedwithin Java's eight primitive data types.

  Write a multimedia-based version of the game

Write a multimedia-based version of the game of 15. There is a 4-by-4 board for a total of 16 slots. One of the slots is empty.

  Program that adds the elements in the odd indices

Write an assembly program that adds the elements in the odd indices of the following array. Use LOOP. What is the final value in the register? array1 DWORD 10, 20, 30, 40, 50, 60, 70, 80, 90, 100

  Describe the process for network address translation

Describe the process for Network Address translation. Why was this concept created and what are the main uses?

  The purpose of cryptography and take a position

Explain, in your own words, the purpose of cryptography and take a position on whether or not you believe encryption is sufficiently utilized in organizations today. Provide a rationale with your response. Describe the differences between symmetric a..

  Information communication echnology in research

Explain the roles of Information Communication echnology in research

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd