Expert Risk Articles

For knowledge sharing worldwide, features on a variety of risk topics in both the AGCS in-house media and external publications.

Editor’s pick
Fast-changing Arctic and North Atlantic conditions bring route risks
18 July 2018

Climate change is impacting ice hazards for shipping, freeing up new trade routes in some areas, while increasing the risk of ice in others.

  • /assets/Thumbnails/Non-People%20Thumbnails/Insights/Expert%20Risk%20Articles/Drones-Regulations_106x70.jpg
    UAS - Regulatory Differences and Challenges
    13 September 2016

    Compared with manned aviation, global regulation of UAS is in its infancy with about 800 working groups trying to harmonize the process.

  • /assets/Thumbnails/Non-People%20Thumbnails/Insights/Expert%20Risk%20Articles/UAS-Liability-Risks_106x70.jpg
    UAS The Risk Landscape
    13 September 2016

    UAS have the potential to solve problems across numerous industries, improve the safety of thousands of workers every year and significantly reduce costs in the future. However, the technology also raises safety concerns.

  • /assets/Thumbnails/Non-People%20Thumbnails/Brochures%20and%20Publications/AGCS-Rise-of-the-drones-report_WhatIsAUAS_106x70.jpg
    The landscape - uses and benefits of UAS
    18 October 2016

    Piloted remotely on the ground via control stations, UAS are increasingly used for menial or dangerous tasks, potentially solving problems and overcoming challenges across numerous countries and industries.

  • /assets/Thumbnails/Non-People%20Thumbnails/Insights/Expert%20Risk%20Articles/Industry4.0-Factory_106x70.jpg
    Industry 4.0: A new definition of manufacturing?
    01 June 2016

    The “post-information” age of augmented reality, big data, “clouds” and other technologies is upon us, but it necessitates refining existing and developing new risk services offered for manufacturing risks.

  • /assets/Thumbnails/Non-People%20Thumbnails/Insights/Expert%20Risk%20Articles/PowerMeltdown_106x70.jpg
    Cyber-attacks on critical infrastructure
    20 July 2016

    Critical infrastructure systems are interconnected to form the energy “grid”. Although beneficial to the public this grid is vulnerable to cyber-attack by hacktivists or terrorists. How can these perils be mitigated?

Page: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20