Mary E. Galligan Director Deloitte & Touche LLP August 4, 2015
|
|
- Gavin Rice
- 8 years ago
- Views:
Transcription
1 A Crisis Response Framework: Strategies for Effective Leadership Mary E. Galligan Director Deloitte & Touche LLP August 4, 2015
2 Managing a crisis
3 A crisis is a major catastrophic event, or a series of escalating events, that threatens an organization s strategic objectives, reputation, or viability. Crises typically exceed existing mitigation techniques and risk management programs such as Business Continuity, Disaster Recovery, Health and Safety plans, or Emergency Response.
4 Crisis management in today s world. Papal Audience 2005 vs. 2013
5 Crisis response framework
6 Crisis Management Program coverage Important to include cyber risks and other non-traditional crisis risks Insider Threat Data privacy Agency data Breach Cyber risks are an important crisis risk to invest in covering Cyber attack Lost Laptops Loss of critical data Lack of Data Integrity Crisis Management Program Coverage Tornado Crime Ineffective Crisis Messaging Pandemic Earthquake Flood Fire Theft Terrorism Today s Crisis Management Program Labor Issues/ Strikes Ebola Important to have a big umbrella Active shooter Extended Government closure Inability to provide services Citizen Trust Important to expand crisis risk coverage beyond people, place and technology Sudden increase In costs Safeguarding citizens Citizen information leakage
7 Comprehensive crisis management program Eleven elements needed to establish and sustain a program Governance Organizational Structure Thresholds Roles & Responsibilities Leaders Management Plans Current Response Plans Crisis Leadership Skills Logistics Technology Training and development Using tools to support the organization s overall crisis management response
8 Operating principals during a crisis
9 Operating principles for managing a crisis. 4 5 Drive towards actionable intelligence 3 Be ready for the unexpected 2 Actively communicate 1 Continually frame the crisis Lead decisively
10 Leaders set the tone
11 1. Lead decisively Act taking no action is making a decision Always keep in mind your goals and objectives Focus on what you can control; accept what you cannot Avoid analysis paralysis you will never have all the information Establish a clear, ongoing decision-making process Prioritize decisions based on their crisis impact Manage incidents locally, and crises as enterprise-wide In a crisis, don't hide behind anything or anybody. They're going to find you anyway. - Paul Bear Bryant
12
13 2. Continually frame the crisis Quickly diagnose the crisis with the available information Think ahead anticipate how the crisis might progress Reassess everyday do not fall in love with the plan Do not let the incidents distract you from the crisis It's a crisis if everybody calls it a crisis. - Morgan Downey, Lasalle Global (quote from Credit Crisis of 2007)
14 Communicating in the age of social media Crash of Asiana Flight 214 at SFO 7/6/13 Timeline of Events 6 July 2013 The first tweet, posted within 30 seconds of impact am: Plane makes impact at SFO 11.28am: First photo from a Google employee boarding another flight hits Twitter (within 30 secs!) 11.30am: Emergency slides deployed 11.45am: First photo from a passenger posted on Path, Facebook and Twitter, re-tweeted by 32,603 users 11.56am: Norwegian journalists asks for permission to use photo from first tweets. Several media requests follow 1.20pm: Boeing issues statement via Twitter 2.04pm: SFO Fire Department speaks to the press for first time 3.00pm: NTSB holds press conference, and keeps updating Twitter with photos 3.39pm: Asiana Airlines first statement released 3.40pm: White House releases statement 8.43pm: First Asiana Press release (6.43am Korea time)
15 3. Actively communicate Own the story, don t let the media tell it for you Be candid communicate with honesty and personal commitment Convey consistent messages internally and externally Back your words with actions Control the narrative communicate on a regular cadence Choose wisely who speaks they will be the face of the organization We get far more credit than we deserve when things go right and too much blame when they don t. - Mel Karmizan, Former Viacom President
16
17 4. Be ready for the unexpected Know that individuals may act differently under extreme pressure Realize that normal organizational roles may not apply to a crisis Avoid relying on a single person for successful navigation in a crisis Anticipate when and how external parties may steer the crisis Recognize your limitations a crisis can test everyone s breaking point Prepare to work with limited (or no) technology / information If anything can go wrong, it will - Capt. Edward A. Murphy ( Murphy s Law )
18
19 5. Drive towards actionable intelligence Beware of confusing data and intelligence Focus on who needs to know what and by when Cast a wide net important information can come from anywhere Qualify your sources misinformation is as prevalent as information Recognize you will never have all the information Ramp up your ability to process data do not let it bury you Record what you knew at the time of the decision True genius resides in the capacity for evaluation of uncertain, hazardous, and conflicting information. - Winston Churchill
20 Chaos framework
21 Question and answer
22 Contact info Mary E. Galligan Director, Cyber Risk Services Deloitte & Touche LLP
23 This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation.
24 About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global ) does not provide services to clients. Please see for a detailed description of DTTL and its member firms. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. 36 USC Member of Deloitte Touche Tohmatsu Limited
Extending Security Analytics to support Operational Efficiency. John A. Greco Deloitte & Touche LLP Cyber Risk Services
Extending Security Analytics to support Operational Efficiency John A. Greco Deloitte & Touche LLP Cyber Risk Services Extending security analytics to support operational efficiency Key components of the
More informationInto the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
More informationAsset Management in the Cloud How to identify and manage Cloud based assets and services. September 19, 2014
Asset Management in the Cloud How to identify and manage Cloud based assets and services September 19, 2014 Contents Overview 4 Standard asset management process 6 Asset identification 9 Asset management
More informationRisk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
More informationDisaster Recovery Plan (DRP) / Business Continuity Plan (BCP)
Preface Computer systems are the core tool of today s business and are vital to every business from the smallest to giant organizations. Money transactions, customer service are just simple examples. Despite
More informationInformation Life Cycle Management (ILM)
Information Life Cycle Management (ILM) Finding business value in Information Life Cycle Management (ILM): Proactive information management through ILM can reduce cost and risk while creating tangible
More informationBlind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are
More informationStanding together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report November 23, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario
More informationService Organization Control (SOC) Reports
Service Organization Control (SOC) Reports Transitioning from SAS 70 to SSAE 16 Deloitte & Touche LLP Agenda Overview SAS 70/SSAE 16 Historical Perspective The New Framework Under SSAE 16 (SOC 1) Impact
More informationThe digital grapevine Social media and the role of Internal Audit
The digital grapevine Social media and the role of Internal Audit Preface Organizations today are embracing new digital technologies to leapfrog or keep pace with growing competition in the marketplace.
More informationManaging Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal
Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies
More informationThe PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
More informationTable of Contents... 1
... 1 Chapter 1 Introduction... 4 1.1 Executive Summary... 4 1.2 Goals and Objectives... 5 1.3 Senior Management and Board of Directors Responsibilities... 5 1.4 Business Continuity Planning Processes...
More informationU.S. CFO Program The Four Faces of the CFO. 2010 Deloitte Touche Tohmatsu
U.S. CFO Program The Four Faces of the CFO 2010 Deloitte Touche Tohmatsu CFOs Play Four Critical Roles in Companies Catalyze behaviors across the organization to execute strategic and financial objectives
More informationCybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
More informationERP Administrative Challenges Brian Jensen
ERP Administrative Challenges Brian Jensen Deloitte & Touche LLP February 2011 ERP Administrative Challenges Enterprise resource planning (ERP) implementations over the last two decades have generated
More informationCyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
More informationRevenue Cycle in Post- Acute Care Deloitte & Touche LLP Victor Shutack, Senior Manager June 2015
6/9/2015 Revenue Cycle in Post- Acute Care Deloitte & Touche LLP Victor Shutack, Senior Manager June 2015 Discussion topics Changing healthcare environment Understanding the home health care environment
More informationService Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard
Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,
More informationBig data The three-minute guide
Big data The three-minute guide Don t squint. Select the full-screen option to view at full size. Big Data The three-minute guide 1 2 What is big data? It s about insight Big data generally refers to datasets
More informationNational Association of State Comptrollers. Architecting a New State Operating Model for the Future. March 12, 2015
National Association of State Comptrollers Architecting a New State Operating Model for the Future March 12, 2015 The world around us is changing at a dizzying pace. 2 National Association of State Comptrollers
More informationAuto insurance telematics The three-minute guide
Auto insurance telematics The three-minute guide Auto insurance telematics The three-minute guide 1 Why it matters now Telematics is upending the auto insurance world After considerable industry buzz,
More informationRLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125. When Disaster Strikes Are You Prepared?
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125 When Disaster Strikes Are You Prepared? Copyright Materials This presentation is protected by US and International Copyright laws.
More informationCyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks
Cyber security: everybody s imperative A guide for the C-suite and boards on guarding against cyber risks Secure Enhance risk-prioritized controls to protect against known and emerging threats, and comply
More informationBladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture
BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance
More informationwww.pwc.com Business Resiliency Business Continuity Management - January 14, 2014
www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 Agenda Key Definitions Risks Business Continuity Management Program BCM Capability Assessment Process BCM Value Proposition
More informationTemple university. Auditing a business continuity management BCM. November, 2015
Temple university Auditing a business continuity management BCM November, 2015 Auditing BCM Agenda 1. Introduction 2. Definitions 3. Standards 4. BCM key elements IT Governance class - IT audit program
More informationCrisis Communications: Preparation & Response. Sara M. Antol, Esq. Robert E. Butter, APR
Crisis Communications: Preparation & Response Sara M. Antol, Esq. Robert E. Butter, APR Courts of Law & Public Opinion Today s Discussion One Painful Example of a Crisis and Response Phases of Crisis Management
More informationFraud Risk Management providing insight into fraud prevention, detection and response
Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are
More informationThreat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations
Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations September 2015 Copyright 2015 Deloitte Development LLC. All rights reserved. This presentation
More informationBusiness Continuity Planning for Risk Reduction
Business Continuity Planning for Risk Reduction Ion PLUMB ionplumb@yahoo.com Andreea ZAMFIR zamfir_andreea_ileana@yahoo.com Delia TUDOR tudordelia@yahoo.com Faculty of Management Academy of Economic Studies
More informationQuantum Dawn 2 A simulation to exercise cyber resilience and crisis management capabilities. October 21, 2013
Quantum Dawn 2 A simulation to exercise cyber resilience and crisis management capabilities October 21, 2013 Table of contents Background 2 Exercise objectives 3 QD2 cyber-attack scenario 4 QD2 yielded
More information1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
More informationPayroll Leakage What it is and how to fix it
Payroll Leakage What it is and how to fix it Payroll leakage is unintended or unexpected spending or lost revenue related to labor activity. The leakage can result from loose configuration of workforce
More informationSecurity Risk Management Strategy in a Mobile and Consumerised World
Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key
More informationDoes Providing Tax Services Impair Auditor Independence? Evidence from Assessing Tax Accrual Quality
Does Providing Tax Services Impair Auditor Independence? Evidence from Assessing Tax Accrual Quality By Choudhary, Koester, and Pawlewicz A Practitioner s Perspective Russ Hamilton Deloitte Tax LLP Agenda
More informationUsing Hedge Accounting to Better Reflect Risk Mitigation Strategies. Jeff Craft Jason Weaver Deloitte & Touche LLP
Using Hedge Accounting to Better Reflect Risk Mitigation Strategies Jeff Craft Jason Weaver Deloitte & Touche LLP Agenda Benefits / Requirements / Challenges of Hedge Accounting Risk Management / What
More informationFederal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK
Federal Financial Institutions Examination Council FFIEC Business Continuity Planning BCP FEBRUARY 2015 IT EXAMINATION H ANDBOOK Table of Contents Introduction 1 Board and Senior Management Responsibilities
More informationDeveloping Your Strategic Plan
Training Module: Developing Your Strategic Plan This training contains general information only and Deloitte is not, by means of this training session, rendering accounting, business, financial, investment,
More informationEmergency Preparedness for Design Firms. RLI Design Professionals Design Professionals Learning Event DPLE 244 September 16, 2015
Emergency Preparedness for Design Firms RLI Design Professionals Design Professionals Learning Event DPLE 244 September 16, 2015 RLI Design Professionals is a Registered Provider with The American Institute
More informationDeloitte Risk Services B.V. Cyber & Privacy Advisory. Deloitte Cyber & Privacy Risk Services Data Breach Management
Deloitte Risk Services B.V. Cyber & Privacy Advisory Deloitte Cyber & Privacy Risk Services Data Breach Management 2 Index Cover pages & Index 1-3 Data breach management 4 Challenges and opportunities
More informationSustainability Analytics The three-minute guide
Sustainability Analytics The three-minute guide Sustainability Analytics The three-minute guide 1 Why it matters now Sustainability isn t just good for your corporate image and conscience. It s good for
More informationFederal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION
Federal Financial Institutions Examination Council FFIEC Business Continuity Planning MARCH 2003 MARCH 2008 BCP IT EXAMINATION H ANDBOOK TABLE OF CONTENTS INTRODUCTION... 1 BOARD AND SENIOR MANAGEMENT
More informationStetson University College of Law Crisis Communications Plan
Introduction and Guiding Principles Stetson University College of Law Crisis Communications Plan Stetson University College of Law s Crisis Communications Plan summarizes the roles, responsibilities, and
More informationRunning head: CRISIS COMMUNICATION INCLUDING SOCIAL MEDIA 1
Running head: CRISIS COMMUNICATION INCLUDING SOCIAL MEDIA 1 Crisis Communications Plans Including Social Media: A Comparative Analysis of Joplin, Missouri s and Moore, Oklahoma s Tornado Crises from a
More informationSYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY. Symantec 2010 SMB Information Protection Survey. Global Data
SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY Symantec 2010 SMB Information Protection Survey Global Data June 2010 CONTENTS Executive Summary...3 Methodology...4 Finding 1: SMBs serious about information
More informationEmergency Preparedness Tips and Actions for the Workplace
Emergency Preparedness Tips and Actions for the Workplace Is Your Business Disaster Ready? Disaster and emergencies can happen anytime and anywhere in Minnesota. 52 Presidential Disaster Declarations between
More informationBridging the data gap in the insurance industry. Cyber crisis management: Readiness, response, and recovery
Bridging the data gap in the insurance industry Cyber crisis management: Readiness, response, and recovery Readiness, response, and recovery Hacked devices, crashed websites, breached networks, denials
More informationSecurity Risk Assessment Tool
Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of
More informationMinimizing the threat landscape through integration of Software Asset Management and Security
Minimizing the threat landscape through integration of Software Asset Management and Security The point of intersection As companies evolve and grow, the cost and complexity of their software assets increases
More informationManaging Information Resources and IT Security
Managing Information Resources and IT Security Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic
More informationCFO Insights Cybersecurity: Five essential truths
CFO Insights Cybersecurity: Five essential truths Cyber risks, it seems, are everywhere. Retailers breached. Intellectual property stolen. Data hacked almost on a daily basis. It s enough to rattle even
More informationEmergency Preparedness Mississippi Arts Commission 2011
Emergency Preparedness Mississippi Arts Commission 2011 Step One: Prepare for the Worst For personal safety, identify what storm shelter is available to you and prepare an evacuation plan. Choose two meeting
More informationCybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
More informationFraming the future of corporate governance Deloitte Governance Framework
Framing the future of corporate governance Deloitte Governance Framework For those interested in the topic of corporate governance, these are dynamic times. The events of the past decade have led to the
More informationCFOs and CIOs: How can you mitigate concerns when moving to the cloud?
CFOs and CIOs: How can you mitigate concerns when moving to the cloud? Contents Review: How do you know when to reach for the clouds? 3 Identify business objectives and use of technology to meet objectives
More informationLoyalty data security Are hospitality and travel companies managing the risks of their rewards programs?
Loyalty data security Are hospitality and travel companies managing the risks of their rewards programs? Companies that can persuade their customers to share personalized information about their interests,
More informationManaging the Public Face of the Bed Bug Crisis. Connecticut Library Consortium Dec. 5, 2012
Managing the Public Face of the Bed Bug Crisis Connecticut Library Consortium Dec. 5, 2012 Information breeds confidence. Silence brings fear. CJ, The West Wing CJ West Wing What is a Crisis? Any event
More informationExercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
More informationIntegrating Pandemic Readiness into Your Organization's Resiliency Model.
Integrating Pandemic Readiness into Your Organization's Resiliency Model. David M. Sarabacha Senior Manager MBCP, MBCI, CISSP, CISA, CISM Deloitte & Touche LLP Agenda TOPIC SCHEDULE Session Overview Introduction
More informationSocial Media and Disasters:
Social Media and Disasters: Best Practices and Lessons Learned Disaster Preparedness Summit, August 21, 2013 Presented by: Suzanne Bernier, CEM, CBCP, MBCI SB Crisis Consulting Toronto, Canada Outline
More informationBuilding a strong business continuity plan
Building a strong business continuity plan Protect your clients and firm with a well-planned business continuity plan A solid business continuity plan (BCP) is about more than simply staying in compliance.
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More informationNonprofit Organizations Committee Legal Quick Hit:
Nonprofit Organizations Committee Legal Quick Hit: Privacy and Data Security for Your Nonprofit: Understanding Your Client s Legal Obligations and Minimizing Legal Risk MODERATOR: JEFFREY S. TENENBAUM,
More informationAssessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
More informationCRISIS MANAGEMENT PLAN
CRISIS MANAGEMENT PLAN Table of Contents Introduction... 3 Purpose... 3 Objectives... 3 Types & Levels of a Crisis... 4 Plan Activation... 6 Crisis Management Team (CMT) Structure... 6 CMT Responsibilities...
More informationConducting due diligence and managing cybersecurity in medical technology investments
Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries
More informationEvergreen Solutions Lowering the cost of EHR ownership
Evergreen Solutions Lowering the cost of EHR ownership As used in this document, Deloitte means Deloitte LLP and its subsidiaries. Please see www.deloitte.com/us/about for a detailed description of the
More informationTax analytics The three-minute guide
Tax analytics The three-minute guide Tax analytics The three-minute guide 1 Why it matters now The data revolution in tax is underway Think for a moment about the vast amount of data being generated by
More informationCyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
More informationKey Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
More informationBusiness Continuity and Disaster Recovery Planning
Business Continuity and Disaster Recovery Planning Jennifer Brandt, CISA A p r i l 16, 2015 HISTORY OF STINNETT & ASSOCIATES Stinnett & Associates (Stinnett) is a professional advisory firm offering services
More informationAnalytics for Shared Services The three-minute guide
Analytics for Shared Services The three-minute guide Don t squint. Select the full-screen option to view at full size. Analytics for Shared Services The three-minute guide 1 2 Why it matters now You may
More informationCybersecurity Issues for Community Banks
Eastern Massachusetts Compliance Network Cybersecurity Issues for Community Banks Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney sean.mahoney@klgates.com K&L Gates LLP State Street
More informationSocial Media Assessment. Khalid Wasti Deloitte & Touche LLP December 11, 2012
Social Media Assessment Khalid Wasti Deloitte & Touche LLP December 11, 2012 http://www.youtube.com/watch?v=0euel3n7fds Contents Overview of social media Social media opportunities Social media risks Regulatory
More informationSTAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES WHISTLEBLOWING AFTER DODD-FRANK: A NEW WORLD
STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES WHISTLEBLOWING AFTER DODD-FRANK: A NEW WORLD The Dodd-Frank Wall Street Reform and Consumer Protection Act created incentives for whistleblowers to report
More informationNIMS ICS 100.HCb. Instructions
NIMS ICS 100.HCb Instructions This packet contains the NIMS 100 Study Guide and the Test Questions for the NIMS 100 final exam. Please review the Study Guide. Next, take the paper test - record your answers
More informationHow To Buy Insurance Online From An Insurer
Casualty Actuarial Society Annual Meeting Brace Yourselves For Direct Sales To Small-Business Insurance Consumers! Sam Friedman, Insurance Research Leader, Deloitte Center for Financial Services Donna
More informationRemarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the
Remarks by Carolyn G. DuChene Deputy Comptroller Operational Risk at the Bank Safety and Soundness Advisor Community Bank Enterprise Risk Management Seminar Washington, D.C. October 22, 2012 Good afternoon,
More informationMobility Trends. Deloitte Tax Management Consulting. December 2014. Todd Dannenfelser. Niketu Bhatt. Deloitte Tax LLP
Mobility Trends Deloitte Tax Management Consulting December 2014 Todd Dannenfelser Niketu Bhatt Deloitte Tax LLP Agenda Introduction Workforce Mobility Trends Responsive UI Portals, Tools & Apps Connected
More informationDesktop Scenario Self Assessment Exercise Page 1
Page 1 Neil Jarvis Head of IT Security & IT Risk DHL Page 2 From reputation to data loss - how important is business continuity? Neil Jarvis Head of IT Security (EMEA) DHL Logistics IT Security Taking
More informationRisk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION
1 Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION Background 2 Technology has become the central component of business operations Businesses have become more vulnerable to risks associated
More informationSHS Annual Information Security Training
SHS Annual Information Security Training Information Security: What is It? The mission of the SHS Information Security Program is to Protect Valuable SHS Resources Information Security is Everyone s Responsibility
More informationTurning information into insight
Turning information into insight Maureen Errity, Director, Center for Corporate Governance, Deloitte LLP John Lucker, Principal, Deloitte Consulting LLP NACD Power Breakfast October 15, 2013 Did you know?
More informationThis presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses.
1. An Introduction This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. This presentation was prepared by the South Central Economic
More informationM&A analytics The three-minute guide
M&A analytics The three-minute guide M&A analytics The three-minute guide 1 Why it matters now Smarter decisions An M&A deal can be one of the biggest decisions a company makes, so it pays to do it right.
More informationWhy Crisis Response and Business Continuity Plans Fail
Why Crisis Response and Business Continuity Plans Fail 10 Lessons Learned from Real-World Experience Many organizations invest considerable time, money and effort in developing Crisis Response and Business
More informationPricing Analytics The three-minute guide
Pricing Analytics The three-minute guide Pricing Analytics The three-minute guide 1 What is pricing analytics? Where it all comes together Advanced analytics aimed at customer and business outcomes are
More informationBest Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
More informationEGUIDE STAYING ALIVE: THE DEFINITIVE GUIDE TO BUSINESS CONTINUITY & DISASTER RECOVERY FOR SMALL BUSINESSES
Created for Jamie Stewart Staying Alive: The Definitive Guide to Business Continuity and Disaster Recovery for Small Businesses Introduction As a small business owner, you owe it to yourself, your employees,
More informationThe best practice guide for businesses and human resources
Emergency response and business continuity plan: The best practice guide for businesses and human resources How to develop and implement an emergency response and business continuity plan to deal with
More informationVirtual world, real risks. When social media becomes a liability
Virtual world, real risks When social media becomes a liability When social media becomes a liability Since setting up its Facebook fan page, Starbucks has amassed a captive audience of 25 million fans
More informationDFW International Airport Social Media Strategy Executive Overview
DFW International Airport Social Media Strategy Executive Overview Corporate Communications Updated April 7, 2015 What is Social Media? A conversation Engagement with audiences Information sharing Crisis/emergency
More informationIntel Business Continuity Practices
Intel Business Continuity Practices As a global corporation with locations and suppliers all over the world, Intel requires every designated Intel organization to embed business continuity as a core business
More informationWhat is an Exercise? Agenda. Types of Exercises. Tabletop Exercises for Executives. Defining the Tabletop Exercise. Types of Tabletop Exercises
Tabletop Exercises for Executives Kathy Lee Patterson, CBCP, PMP Independence Blue Cross Defining the Tabletop Exercise Types of Tabletop Exercises Advantages to conducting Exercises Agenda 12 Step Approach
More informationCrisis Management Guide
Crisis Management Guide The Crisis Management Guide has been designed to help your company effectively respond to a crisis situation. Crises, large and small can be minimized if a thorough Crisis Management
More informationPrepared by Rod Davis, ABCP, MCSA November, 2011
Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,
More informationTHE DELOITTE CFO SURVEY 2015 Q1 RESULTS GETTING BACK TO NORMAL
THE DELOITTE CFO SURVEY 2015 Q1 RESULTS GETTING BACK TO NORMAL 2 Contents Key points from the 2015 Q1 Survey 4 General economic environment 5 Market conditions and the economy 6 Cash flow and risk 9 M&A
More informationConstructing a successful business continuity plan
Constructing a successful business continuity plan By Alan Berman Alan Berman Being prepared is the cornerstone of having a business continuity plan regardless of the size of a company. Ultimately, getting
More informationINCIDENT RESPONSE REPUTATION MANAGEMENT CRISIS COMMUNICATIONS
INCIDENT RESPONSE REPUTATION MANAGEMENT CRISIS COMMUNICATIONS MANAGING CRISIS AND SUSTAINING THE BRAND An introduction Professor Rebecca L. Cooney, MSC CRISIS PLANNING Process of an organization communication
More information