Do I Qualify?
Jim Wetekamp's avatarPerson

Jim Wetekamp

CEORiskonnect

Atlanta, GA

Member Since January 2021

Skills

Strategy
Business Intelligence
Product Management

About

Jim is the CEO of Riskonnect. He has more than 20 years of product and leadership experience, most recently serving as CEO of BravoSolution, a Chicago-based cloud procurement solutions company. He joined BravoSolution in 2008 following its acquisition of VerticalNet, his former employer. As that company’s CEO, Jim successfully navigated its sale to an Accel-KKR portfolio company, following years of rapid growth.

Published content

Mistakes To Avoid Before And After A Ransomware Attack

expert panel

With recent high-profile attacks targeting organizations ranging from healthcare systems to retailers to government services—even IT companies—business leaders and the public alike are learning that ransomware is a threat no one is fully safe from. The breadth of the problem and the rapid tactical changes made by hackers make both preparing for and responding to a ransomware attack a significant challenge, but it’s one every entity with a digital footprint must take up. Misunderstandings and mistakes, whether before or after a ransomware attack, can leave an organization and those it serves in a difficult, even devastating, position. Below, members of Forbes Technology Council share common mistakes leaders make when preparing for or responding to a ransomware attack. Read on to ensure your team is doing everything possible to be ready for whatever comes.

20 Questions To Assess Cybersecurity Risks Within An Organization

expert panel

Conducting internal cybersecurity risk assessments is crucial for all businesses to safeguard their digital infrastructure against potential threats. To ensure the most comprehensive protection, it’s important to start by asking the right questions. By addressing critical queries up front, businesses can effectively evaluate potential vulnerabilities and threats within the company’s internal systems to foster a more resilient and secure digital environment.  Below, Forbes Technology Council members discuss some key questions for business leaders to consider and factors to explore when conducting internal cybersecurity risk assessments. Understanding these elements—from the vulnerabilities within systems to the effectiveness of current threat detection and mitigation protocols—can help an organization significantly bolster its cybersecurity defenses and maintain the integrity of its digital infrastructure and systems.

Are You Prepared To Report On Scope 3 Emissions?

article

Despite its importance, reporting on Scope 3 is often poor or nonexistent.

expert panel

By now, most companies have realized the multiple benefits of digital transformation, from cost savings and productivity boosts to enhanced security. For many businesses, though, a major roadblock to achieving truly game-changing digital transformation is the decades’ worth of legacy tech systems that are still being used to run their operations.  If businesses are to realize the full benefits of digital transformation, legacy tech systems must be replaced by better, leading-edge solutions. But the process can prove difficult for many reasons—employees may resist changes to their processes, leadership may question the accompanying costs and disruptions to work must be avoided. So how can tech leaders overcome the common challenges of modernizing their organizations’ legacy tech? Below, 16 members of Forbes Technology Council share their advice.

article

As businesses get back on track, resilience has become the rallying cry.

article

The risk management function of tomorrow will not just help you respond well to something that already happened, but it will give you the foresight to see what's on the horizon and the agility to change course.

Company details

Riskonnect

Company bio

Riskonnect is the leading integrated risk management software, solution provider. Our technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic and operational risks across the extended enterprise. More than 900 customers across six continents use our unique risk-correlation technology to gain previously unattainable insights that deliver better business outcomes. Riskonnect has more than 500 risk management experts in the Americas, Europe, and Asia. To learn more, visit www.riskonnect.com

Industry

Computer Software

Area of focus

Risk Management
SaaS
Enterprise Software

Company size

501 - 1,000