Insight through relevant research and measurement
LEARN MOREStrategy through cutting-edge consulting
LEARN MOREExecution through seamless implementation
LEARN MOREYour Challenges.
Our Solutions.
Realize the benefits of membership
LEARN MOREUnrivaled buy-side expertise
LEARN MOREOctober 7, 2015
CutterBenchmarking's Risk Management survey is now open for participation. By completing this study you will gain an understanding of what your firm is doing to effectively manage risk. The study will focus on the organization, various risk components, data, and technology required to ensure your risk management strategies are effective and appropriate. It is not our intent to explore specific risk models, metrics, or systems. Instead, we explore how well your models and metrics serve your firm, and how your policies, procedures, structures, and governance support your risk management efforts. The resulting report will tell you everything you need to know about your firm's risk management capabilities and overall effectiveness and will provide insights to help transform your risk management strategies.
The survey will cover:
To participate in the survey or for further details, please contact us.
CutterResearch content is the proprietary property of Cutter Associates and our members who have entered into confidentiality agreements. It contains information that is proprietary and confidential to Cutter as well as to the vendors discussed within the reports (the "Vendors"). Disclosure of the information contained in the reports could cause irreparable harm to Cutter and/or the Vendors.
By selecting "I Agree" below, you agree to safeguard this information with the same care as your firm affords its own confidential information. You will not provide access to this information to anyone who is not an employee of your firm and will not distribute this information outside your firm. Furthermore, you will not provide access to this information to any employee of any subsidiary, unit, department or division of your firm that is engaged in any aspect of the software business involving third parties, including, without limitation, selling or otherwise providing software to third parties, assisting third parties in the selection or implementation of software, or providing investment related software information to third parties (collectively, the "Prohibited Recipients").