Vendor risk management leading practices Glenn Siriano KPMG LLP DRAFT

Size: px
Start display at page:

Download "Vendor risk management leading practices Glenn Siriano KPMG LLP DRAFT"

Transcription

1 Vendor risk management leading practices Glenn Siriano KPMG LLP

2 KPMG International is a Swiss cooperative that serves as a coordinating entity for a network of independent member firms. KPMG International provides no audit or other client services. Such services are provided solely by member firms in their respective geographic areas. KPMG International and its member firms are legally distinct and are separate entities. They are not, and nothing contained herein shall be construed to place these entities in the relationship of, parents, subsidiaries, agents, partners, or joint ventures. No member firm has any authority (actual, apparent, implied or otherwise) to obligate or bind KPMG International or any member firm in any manner whatsoever, or vice versa For the purpose of this document, all references to KPMG International, a Swiss cooperative that serves as a coordinating entity for a network of independent member firms operating under the KPMG name, will be referenced as KPMG International. Throughout this document, "KPMG" ["we," "our," and "us"] refers to the local, independent KPMG member firm or firms. Throughout this document client [ they, their and them ] refers to the local, independent member firm s client. KPMG International provides no client services.

3 VRM program and program objectives VRM is a risk-based approach to managing vendor relationships through: Risk identification and prioritization Vendor due diligence Vendor stratification Contract management Continuous risk and vendor monitoring Governance and compliance to VRM program structure Key objectives of an organization s VRM program could include the following: monitoring of key financial and operation information related to vendor relationships. Provide a comprehensive view of risks related to engagement with vendors/service providers/business partners Align vendor risk management activities with enterprise risk management programs Assure proper ongoing vendor due diligence Identify, manage and mitigate vendor risks Create central coordination and support for ongoing vendor risk management activities Develop risk expertise to help organizations consider risk issues in addition to cost and service capabilities in selecting business partners Fulfill regulatory/compliance requirements, including sustainability 2

4 Evolving scope of vendor-related risks Views of vendor risk have historically been limited to supplier quality, performance compliance, and overall viability of the supplier. More recently increased complexity, further integration, and extension of organizational supply chains have resulted in the expansion of these traditional components into myriad specific and ancillary risks, as demonstrated in the graphic below. The risk profiles of the organizations are changing as the organizations are moving to doing business as extended global enterprises. VRM Programs typically focus on: Enterprise-level risks inherent in vendor relationships (e.g., Business continuity) Emerging Risk Profile Vendors performing core business processes (e.g., outsourced functions) Vendor health and financial viability Relationship Specific Risks Risks associated with Client/Customer-facing activities (e.g., customer help desk, service execution) Data Security Geo Political Brand Reputation Supplier Quality Supplier Viability Legal Liability Supplier Performance /Compliance Contractor Employees Intellectual Property Rights Tier 2/ 3 Suppliers Green/ Sustainability Business Continuity 3

5 KPMG s perspectives KPMG s VRM approach provides a view for describing key touchpoints of the VRM framework. A key tenet of the KPMG approach to VRM is the integration of VRM activities throughout the SS&P life cycle as depicted below. KPMG s Strategic Sourcing and Procurement Representation Leading VRM practices include: VRM integrated throughout the entire strategic sourcing and procurement lifecycle. A significant portion of vendor risk identified and mitigated in the early stages of the strategic sourcing process. Contract management to monitoring and mitigating identified risks. Ongoing vendor risk management assessing changes to residual risks and performing mitigation activities in a structured way. 4

6 Sources of risk Decisions made in the process of executing sourcing activities as part of the Strategic Sourcing Cycle introduce specific vendor-related risks to the enterprise. Lack of rigor in onboarding and off-boarding processes and/or excessive vendor churn can expose the entity to Business Continuity, IT Security and Sustainability risks. Decisions about what specific goods or services are going to be purchased can lead to risks, such as Brand Reputation and IT Security Risks. (e.g., sharing information with a data services provider). Choosing to include low-cost countries as part of the commodity marketplace can introduce Brand Reputation, Geo-political, and Business Continuity risks. Reliance on a single source or market could expose a client to Business Continuity risks. New vendors could expose a client to risks such as Supplier Viability, Brand Reputation Risk, Physical Security and other risks. Inadequate contractual terms could expose the entity to Legal Liabilities, IT Security and Brand Reputation risks. Inadequate contractual management and monitoring could expose the entity to all risks. 5

7 Types of risk Risk Type Definitions Inherent Risk the possibility that events or circumstances will prevent the client from achieving its objectives prior to taking into account the effects of internal controls. Inherent risk is also known as gross risk. Internal Control controls help to reduce, transfer or avoid inherent risks throughout the vendor lifecycle via existing capabilities and agreed upon controls. Residual Risk the risk remaining after considering the effect of internal controls implemented throughout the vendor lifecycle. Residual Risk = Inherent Risk Internal Control 6

8 Vendor risk categories Risk Area Financial risk Operational risk Compliance Business continuity risk Technology/ Information security risk Description The risk that our client s involvement with a vendor/service provider may result in a negative financial impact on profitability or results The risk that our client s involvement with a vendor/service provider may result in a negative impact to the organization s processes, systems and people adversely affecting the ongoing business operations. (e.g., potential for service disruption, reputational harm, failure to perform etc.) The risk to the organization arising from violations of, or nonconformance with, laws, rules, regulations, prescribed practices, or ethical standards arising due to the organization s involvement with a vendor/service provider. Compliance risk includes: Regulatory compliance: Risks associated with a failure to comply with regulatory requirements when compliance is delegated to the vendor. Records management: Risks associated with the failure to retain required records, to protect those records, and to destroy them based on contractual and regulatory requirements. Data protection/privacy: Risks associated with the unauthorized access, use, or disclosure of client/employee personally identifiable or business secret/confidential information resulting from a lack of adequate administrative controls at the vendor s organization. Anti-money laundering/know your customer/counter terrorist (AML/KYC/CTF): Risks associated with a failure to comply with regulatory and internal policy requirements regarding AML/KYC/CTF when compliance is delegated to the vendor. Fraud, bribery, and corruption: Risks associated with a failure to comply with regulatory and internal policy requirements regarding Fraud, Bribery, and Corruption when compliance is delegated to the vendor. The risk of a significant impact to the timely resumption and delivery of essential services, business processes and operations resulting from the organization s involvement with a vendor/service provider. The risk to an organization resulting from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction of information and/or information systems. 7

9 VRM strategy, governance, oversight and compliance October 29-30, 2012 Hotel Pennsylvania Description For a Vendor Risk Management program to operate effectively, the overarching objectives, the scope, and policies have to be drafted, agreed upon, and operational. These require the sponsorship and promotion of executive management. This information needs to be documented, communicated across the organization, and available in readily accessible formats and delivery mechanisms. In addition, policies and procedures need to be revisited on a periodic basis to ensure their continued relevance. VRM program governance typically resides within Procurement. Some organizations have created a Supply Chain Finance function to manage and monitor the VRM function. This program governance should be integrated with overall ERM governance. There can be challenges to this governance framework when Procurement is relatively immature or less valued in the organization than other functions/departments. Additional challenges may arise when the GRC function is matrixed or dispersed across the organization. VRM is aligned with brand management/customer relationship management/corporate social responsibility functions in some organizations where there is a very strong brand and customer focus. Key VRM program components to consider: Existence of formalized and documented objectives, scope and policies and level of awareness of this information across the organization Availability of information on objectives and policies during the day-to- day operations of the VRM process How the relevance of this information is maintained and how changes to the information are developed and communicated Interaction with existing risk management processes such as GRC and ERM. Interaction with corporate social responsibility goals and programs Existence of identified responsible executives supporting the program Position and standing of program leadership Integration with ERM governance Ability to assess and manage compliance to program requirements. An established program should monitor enterprise-wide compliance with VRM program components. Clear definitions of program requirements, visibility into program activities, and a robust reporting process will help ensure program compliance. 8 8

10 VRM program strategy (objectives and scope) October 29-30, 2012 Hotel Pennsylvania Well-defined program objectives help to drive VRM program development and aid in building effective monitoring and compliance frameworks. Key diagnostics: Does a formal VRM strategy exist, and is it documented and communicated? Are there existing GRC and/or ERM strategies with documented risk profiles and tolerances? Is the VRM program integrated to ERM, and vice versa? How mature is the procurement function? What is the nature of the regulatory environment, and how is compliance currently managed? Are there unique/unusual third-party relationships that need to be incorporated into the program? Are there business areas that require special treatment (e.g., outsourced functions, joint ventures)? How transparent are the relationships with vendors, suppliers, and business partners? Are there sustainability standards in place for vendors? Are these standards clearly defined and understood by vendors? Sample objectives: Protect the organization from risks inherent in transacting business with and through third parties within established risk tolerances Evaluate, quantify, and address risk associated with third-party relationships Ensure fulfillment of regulatory requirements and expectations Drive continuous improvement in controls and reporting for managing third-party risk. Sample scope considerations: Centralization/decentralization Determine the degree of centralization or decentralization of procurement within the organization Third parties Determine which third-party relationships will be defined as vendors and managed within the program Geographical coverage Determine what regions should be required to be in compliance with VRM policies Business areas Determine which business areas or units should be required to be compliant with VRM policies Risk Areas Determine what risk areas the VRM program should evaluate, and manage and the key areas representing the most significant risks within the overall vendor population. 9 9

11 VRM program policy Policies provide the authority and responsibility to build a VRM program that can achieve the defined strategy and objectives. Key diagnostics: Do policies governing procurement activities exist? Are they enterprise-wide/disseminated from the executive level? Are they consistent with other enterprise policies? Do policies fully support, and enable the objectives of the VRM program? Have the policies been consistently adopted throughout the organization? How are policies communicated? Who is responsible for maintaining and updating policy? How are policies reviewed for continuing relevance to changes in the business? How frequently is the review performed? Is there a compliance program in place? Who manages it? How are metrics collected and managed? What are the consequences of noncompliance? Patti Editing for this correction 10 10

12 VRM governance and oversight VRM governance should be aligned with the overall ERM governance with cascading responsibilities. Key Diagnostics: Who owns responsibility for VRM performance? How are issues/risk events escalated in the organization? Sample governance structure Oversight Structure How is VRM information passed to/from the ERM/GRC monitoring process? What information is shared? Who manages performance metrics for the VRM program? Where does this data reside? What are the key metrics? What are the triggering events to be monitored? What are the elements of the business that make working with third parties carry increased risk? Are there any regulatory requirements? Compliance Management Accountable Execs Business Owners / Vendor Managers Audit Committee Corporate Risk Management Committee (CRMC) Vendor Risk Management Advisory Board Vendor Risk Team 11 11

13 VRM program compliance The client s VRM program compliance assists the client to ensure that all client stakeholders and process participants are following the defined program. Key Diagnostics: Is there executive support and sponsorship of compliance activities? What types of reporting is generated? Who are the recipients of reports? How are the reports used/reviewed by the recipients? How is noncompliance to program requirements addressed? Compliance Drivers Performance goals vendor managers for Tier 1 vendors should have performance goals directly tied to the management of the vendor to ensure that the relationship is being managed appropriately Training investing in policy and process training, including providing sufficient time and resources for training activities and skills enhancement Management evaluating program performance at regular intervals, and making necessary adjustments Reporting assessing and communicating compliance results to leadership Staffing applying sufficient resources and skill sets to VRM activities 12

14 VRM process, organization and enabling technology October 29-30, 2012 Hotel Pennsylvania Description The VRM process is a structured approach to assessing and managing vendor risk. The process includes application of risk assessment tools to segment vendors and segment-specific activities to be conducted. This risk-based approach assists clients in making resource and control decisions relative to high risk third-party relationships. The VRM Process should consider all vendor-related compliance programs including those designed to evaluate self-reported contractual elements from suppliers. The VRM organization, roles, and responsibilities will vary based on the level of maturity of the Procurement function and resource strategies employed by the organization. For example, depending on volume, specific risk exposures, and geographic distribution, risk expertise may be built into the VRM organization or it may be leveraged from other areas on an as-needed basis. Technology: A critical aspect of VRM is the effective management and analysis of information and data supporting the program. VRM is typically a highly data-intensive program Key components to consider: Vendor segmentation and associated models Risk filtering and associated tools Vendor due diligence Contract development, Contract Management tools Ongoing Vendor risk management Vendor off-boarding Vendor Master ownership and management Vendor information database structure and capabilities Integration with GRC/ERM processes and technology Integration with procurement technology. 13

15 VRM processes VRM includes a series of processes covering the SS&P lifecycle. The VRM process should be differentiated based on vendor segmentation to help optimize available resources and create a risk-focused approach. Periodic Ongoing Risk segmentation Risk filtering Due diligence Contracting Vendor monitoring Off-boarding Purpose: Purpose: Purpose: Purpose: Purpose: Purpose: Provide a consistent and efficient means to segment existing or potential 3 rd party provider relationships based on risk assessments Identify risks inherent to the good/service being purchased Evaluate effectiveness of vendor (or vendor candidates) to manage inherent risks prior to the vendor selection and contracting processes To help ensure that appropriate legal protections and assurances are incorporated into vendor contracts and are reviewed and approved by the necessary functions/responsibl e parties To help ensure that vendors are appropriately monitored, managed, and reported on throughout the vendor lifecycle To help ensure that there is a process in place to off-board vendors who are no longer providing services/products to the organization that takes into account: physical and virtual access, data ownership, and other contractual obligations 14

16 VRM processes risk segmentation and filtering October 29-30, 2012 Hotel Pennsylvania A segmentation model creates differentiation that allows for effective resource allocation across risk management activities such as varying the level of engagement and flexibility in conducting due diligence and ongoing vendor monitoring. Key diagnostics: Are vendors segmented based on risk? Is the segmentation model consistent with the risk profile and tolerances established by the ERM program? Data security requirements Vendor viability and business continuity validation Reputational considerations What are the components of the segmentation model? How often is the risk filtering process applied? How are potential new vendors filtered to identify inherent and residual risk? Does the segmentation model drive other components of the VRM program? The most common segmentation model includes three levels: Strategic Vendors Critical to business performance, tightly integrated with internal processes Multiple risk areas including business continuity risk Operational Vendors Some processes integrated Difficult to transition Poses a single risk exposure Commodity Vendors Easily transitioned Not integrated with internal processes Relationship solely driven by total cost and vendor performance 15

17 VRM processes due diligence The due diligence process allows for differentiated levels of effort based on vendor risk segment and is typically conducted initially to vet potential vendors and periodically to manage ongoing risk exposure. Key diagnostics: What due diligence activities are undertaken when evaluating vendors? Are they differentiated by segment? Who conducts due diligence? At what point in the solicitation/negotiation process is due diligence conducted? What activities are included in site visits? For example: IT security testing Procedure reviews BCM review Data management procedures HR considerations (e.g., turnover, background checks) Are findings from due diligence activities effectively communicated and addressed? Are Vendor sustainability issues considered in the due diligence process? How? 16

18 VRM processes contracting Key diagnostics: Contract development Are standard contract templates and terms used? How do they vary based on category and risk assessments? How are regulatory inputs captured in the contract development process? Is there an enterprise wide contract development process? Are sustainability considerations and standards included in the contract? If so, how? Contract management Who reviews and approves contracts? Are the right responsible parties engaged? How are amendments to contracts tracked and the relevant monitoring requirements updated? How is contract documentation managed and stored? Is there an enterprise wide contract management process/system? Are monitoring points set up when the contract is archived? Contract compliance management Who reviews contract compliance? What is done with the results of compliance management activities? Structure does not facilitate end-to-end view, multiplies hand-offs Limited clarity of roles and responsibilities Lack of credibility and trust in the process and between functions Clearly defined roles and responsibilities Challenges to an Effective Contract Management process No 1-to-N list of contracts Lack of standardized work processes Primarily focused on termination and renewal Organization Structure People & Culture Contract Lifecycle Management Contract Management Ownership Control & Governance Financial and Operational Systems Global Vendor Risk Management Lack of overall accountability and KPIs Inability to tie original business plan to contract performance Do not interface with ERP in realtime Not designed to handle complex agreements Lack of visibility or availability of data to support decisions Lack standard definitions of risk Rarely consider all socio-economic and cultural factors Contract monitoring disconnected to real-time changes 17

19 VRM processes ongoing vendor monitoring October 29-30, 2012 Hotel Pennsylvania Effective ongoing vendor activities should be differentiated based on the vendor segmentation model. Key diagnostics: What activities are included in ongoing monitoring? How do they vary based on segment? How frequently are monitoring activities conducted? How are they reporting? Are sufficient resources dedicated to ongoing vendor monitoring activities based on the segmentation and monitoring requirements? Is third-party support used for ongoing monitoring or due diligence? If sustainability activities are included, are data boundaries defined? How is the data managed (for example through an EMS)? Is there a framework to measure/monitor accuracy? Is the data verified? Recommended Activities: Performance monitoring (Ongoing, KPIs dependent on service/good provided) Refresh basic due diligence (Previously conducted due diligence augmented with new information. Example: credit report, Insurance certificates, financial analysis, vendor self-certification that minimum requirements are met, etc.) Risk incident management (Vendor Risk Team, Risk SMEs, and Legal engaged as needed) Vendor performance reporting 2 (e.g., Risk events, performance to KPIs and SLA s, assessment of process controls) Assessment of Risk Area Controls (e.g., IT Security, Data Privacy) Conducted by: Risk Segment Tier 1 Tier 2 Tier 3 Business Area Sourcing/ Procurement Annually Annually Biannually Business Area Business Area Quarterly Quarterly Annually Business Area (Risk SME support) Annually Annually Contractual Reviews Business Area Annually Bi- Annually Every 3 years 18

20 VRM processes off-boarding Off-boarding procedures extend from the contract management cycle and help ensure that proprietary information shared with vendors is reclaimed and security credentials revoked after the completion of agreed upon services. Key diagnostics: Are there documented procedures for off-boarding vendors? Who is responsible for executing these procedures? Are these procedures differentiated according to risk segment and type of relationship? How does the client know when a vendor needs to be off-boarded? Are contract expiration dates monitored to provide sufficient lead time for off-boarding procedures? What are the procedures for reclaiming proprietary data? What mechanisms are in place to ensure that the vendor has not copied sensitive information? Are there time-sensitive expirations on security/access credentials and passwords? Are public notices sent out to notify termination of supplier when relevant? Are sustainability obligations identified during the off-boarding process (for example requirements to restore property to specified condition, removal of equipment or land reclamation etc.)? Is the completion of off-boarding Sustainability obligations monitored through completion? If so, how? 19

21 VRM organizational structure The Vendor Risk Management organizations will vary in their use of dedicated versus leveraged risk experts and geographic coverage. Key diagnostics: Are roles and responsibilities clearly defined? Are there sufficient resources to achieve program objectives? Are roles characterized by functional expertise (e.g., contract specialist, data analyst)? Are there matrix reporting relationships? How do they impact the ability of the organization to execute? How are resources distributed geographically? Is there sufficient training to develop capabilities? Is there adequate leadership representation and from related groups (e.g., legal)? 20

22 Enabling technology Technology supporting a VRM program may include a robust database to manage vendor information and support reporting requirements as well as enabling tools and work flow. Key diagnostics: What is the overall IT environment (e.g., ERP)? Is there a contract management tool and what are the capabilities? What are the vendor monitoring tool capabilities? What are the ERM/ GRC tool capabilities? What is the technology roadmap for supporting tools/capabilities? Do the available tools sufficiently support strategy, policy, and process? Is sustainability data managed through supporting IT systems integrated with existing ERP infrastructure? Tool Characteristics: Provide quantitative, auditable means for measuring risk, assigning segmentation, and identifying specific risk areas Manage risk filtering activities Manage contract development, storage, compliance, audit and renewal Tools Segmentation Model Risk Filter Reporting Capability Characteristics: Aggregate and individual Vendor information Query capability Ability to integrate / extract from CMS and AP Reports Database Workflow Workflow Characteristics: Manage review and approval activities for vendor selection, contracting, and ongoing vendor management Support cross-functional collaboration (e.g., due diligence) Database Characteristics: Provide repository for Vendor information Retain segmentation information Record and manage due diligence activities Record and manage ongoing vendor management information Support reporting requirements Role-based interface and access to accommodate all process participants (e.g., SVM, VR Team, Vendor Managers, Business Areas) 21

23 VRM program effectiveness Description The purpose of this diagnostic component is to assess our client s current VRM capabilities and the effectiveness of those capabilities. This component focuses on identifying evidence of potential VRM process failings and determining the related impact on VRM. Contract compliance is a transactional monitoring element of VRM contract management that measures the performance of vendors against the transparent terms and conditions of contracts such as pricing, rebates, and discounts. Contract compliance seeks to enhance the transparency of contractual relationships by exploring compliance with service level agreements, most favored pricing clauses, and other self-reported elements. Scorecards are developed for strategic vendors on a quarterly basis to review various aspect of vendor performance including review of risk areas. Risk reviews are conducted for key vendors on an annual basis as a component of vendor monitoring. KPMG services/methodologies to leverage Contract Compliance IT Security Vendor Relationship Management Key components/diagnostics to consider: VRM program compliance Does the organization monitor compliance with VRM policies? If so: Is there evidence of this compliance monitoring? Have compliance incidents been identified, and how were these addressed? What practices are in place to encourage continuous improvement? Vendor risk segmentation Evaluate the results of the segmentation model. Were the criteria accurately captured? Were vendors accurately categorized based on the criteria? Where did the segmentation model produce incorrect results? Identify realized risk issues Is there evidence of vendor risks that have materialized (e.g., reputation issue, vendor financial failures etc.)? Is there a mechanism to track this? Specifically identify: Number and types of risk incidents How were these risk incidents indentified? What does this tell us about the VRM process? Evidence of inaccurate/incomplete reporting or documentation Contract compliance monitoring Is there a contract compliance program in place, and have contract reviews taken place? If so: Were self-reporting differences identified? Were SLA issues identified? What does this tell us about the proactive contract monitoring process? Does the organization utilize KPIs and scorecards to monitor vendor? If so, have issues been proactively identified? 22

24 Business continuity management (BCM) overview October 29-30, 2012 Hotel Pennsylvania Overview of BCM KPMG s BCM services take a broad view taking into account changes across people, business process, infrastructure, and enabling technologies. Our services include: Contingency and business resumption planning Emergency response and crisis management planning Business continuity planning Disaster recovery planning High/Continuous availability assessment Application interdependency analysis Business risk analysis IT risk analysis Enterprise resource planning (ERP) systems change planning IT management processes How BCM can assist in VRM BCM professionals and their support toolkit can assist VRM engagements from two perspectives: 1. For critical vendors, BCM professionals can be deployed to review the vendor s business continuity management capabilities. The focus of the review will be on the vendor. 2. For highly integrated supply chains and strategic business partners, BCM services help to evaluate and reduce client risk exposure-due to integration of vendors into the clients processes and operations. The scope of the review may include elements such as how the client has addressed the business continuity risks attributable to the manner in which they have integrated the vendors into the supply chain; and review of third-party business continuity programs and effectiveness of testing approach. BCM VRM-related activities Business impact analysis identifying the interactions, processes and systems most critical to the continuation of the vendor or client operations. Business continuity planning reviews reviewing how well business continuity plans address the business resumption needs of the vendor or a client with a highly integrated supply chain. Disaster recovery planning reviews determining the adequacy of the vendor or client s plans to address potential disasters. Identifying how BCM considerations impact the client s business risk portfolio Assessing the impact of changes to enterprise systems on third-party relationships Evaluating how well IT management processes incorporate third-party relationship considerations When to include BCM in VRM Where the client s business resilience is dependent on the third party s BCM capability or when disruptions at the third party would significantly impact the client. 23

25 2012 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. NDPPS The KPMG name, logo and cutting through complexity are registered trademarks or trademarks of KPMG International.

Vendor Risk Management in the New Regulatory Environment. kpmg.com

Vendor Risk Management in the New Regulatory Environment. kpmg.com Vendor Risk Management in the New Regulatory Environment kpmg.com Vendor Risk Management in the New Regulatory Environment 2 Vendor Risk Management in the New Regulatory Environment Background Regulators

More information

Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com

Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency kpmg.com Leveraging data analytics and continuous auditing processes 1 Executive

More information

How To Transform It Risk Management

How To Transform It Risk Management The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis

More information

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are

More information

Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation

Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation Tying It All Together: Practical ERM Integration Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation November 16, 2007 1 Agenda Basis for ERM Integration ERM Objectives ERM Focus

More information

www.pwc.com Third Party Risk Management 12 April 2012

www.pwc.com Third Party Risk Management 12 April 2012 www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

OBLIGATION MANAGEMENT

OBLIGATION MANAGEMENT OBLIGATION MANAGEMENT TRACK & TRACE: CONTRACTUAL OBLIGATIONS Better Visibility. Better Outcomes RAMESH SOMASUNDARAM DIRECTOR, IT VENDOR MANAGEMENT SERVICES MARCH 2012 E N E R G I C A Governance Matter

More information

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Communications Company One Company s Supply Chain Transformation Journey INTERVIEWS Senior Manager Supply Chain Operations Strategy Manager Procurement

More information

Credit Union Liability with Third-Party Processors

Credit Union Liability with Third-Party Processors World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with

More information

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012 GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental

More information

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT John Deere Supply Chain Risk Management INTERVIEWS Glen Schwab Director of Supply Management Robert Smola Manager, Supply Chain Risk The Next New Things

More information

The New Third-Party Oversight Framework: Trust but Verify kpmg.com

The New Third-Party Oversight Framework: Trust but Verify kpmg.com Financial Services Regulatory Point of View The New Third-Party Oversight Framework: Trust but Verify kpmg.com The New Third-Party Oversight Framework: Trust but Verify 1 Financial services regulatory

More information

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 Agenda Key Definitions Risks Business Continuity Management Program BCM Capability Assessment Process BCM Value Proposition

More information

IT Insights. Managing Third Party Technology Risk

IT Insights. Managing Third Party Technology Risk IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate

More information

DOUBLECHECK VENDOR MANAGEMENT

DOUBLECHECK VENDOR MANAGEMENT August 2014 DOUBLECHECK VENDOR MANAGEMENT Managing Risk & Compliance Across 3rd Party Relationships SOLUTION VIEWPOINT Governance, Risk Management & Compliance Insight 2014 GRC 20/20 Research, LLC. All

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

Managing Risk at Bank of America Corporation. Overview

Managing Risk at Bank of America Corporation. Overview Managing Risk at Bank of America Corporation Overview Risk is inherent in every material business activity that we undertake. Our business exposes us to strategic, credit, market, liquidity, compliance,

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance

More information

IT Governance. What is it and how to audit it. 21 April 2009

IT Governance. What is it and how to audit it. 21 April 2009 What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures

More information

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s MANAGING THIRD PARTY RISK T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s Experis -- a different kind of talent company. Experis Tuesday, January 08,

More information

Risk management and the transition of projects to business as usual

Risk management and the transition of projects to business as usual Advisory Risk management and the transition of projects to business as usual Financial Services kpmg.com 2 Risk Management and the Transition of Projects to Business as Usual Introduction Today s banks,

More information

Financial Services Guidance Note Outsourcing

Financial Services Guidance Note Outsourcing Financial Services Guidance Note Issued: April 2005 Revised: August 2007 Table of Contents 1. Introduction... 3 1.1 Background... 3 1.2 Definitions... 3 2. Guiding Principles... 5 3. Key Risks of... 14

More information

Compliance Risk Assessment and 3 rd Party Due Diligence & Monitoring

Compliance Risk Assessment and 3 rd Party Due Diligence & Monitoring Advisory Services May, 2011 Compliance Risk Assessment and 3 rd Party Due Diligence & Monitoring Compliance Risk Strategy 3 rd Party Due Diligence 3rd Party Auditing The differing ways in which a company

More information

FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER

FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER As a board-level discussion topic at all financial institutions (FI) today, operational risk is real and public disclosure of significant

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page

More information

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased

More information

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 Debbie Lew Agenda Review what is IT governance Review what is IT risk management A discussion of key IT risks to be aware of Page 2

More information

Auditing Software as a Service (SaaS): Balancing Security with Performance

Auditing Software as a Service (SaaS): Balancing Security with Performance Auditing Software as a Service (SaaS): Balancing Security with Performance Goals for Today Defining SaaS (Software as a Service) and its importance Identify your company's process for managing SaaS solutions

More information

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/Continuous Monitoring INTRODUCTION New demands from the board, senior organizational

More information

WHITE PAPER Third-Party Risk Management Lifecycle Guide

WHITE PAPER Third-Party Risk Management Lifecycle Guide WHITE PAPER Third-Party Risk Management Lifecycle Guide Develop and maintain compliant third-party relationships by following these foundational components of a best-practice assessment program. Third

More information

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA ARCHER OPERATIONAL RISK MANAGEMENT RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume

More information

GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK

GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK This Guideline does not purport to be a definitive guide, but is instead a non-exhaustive

More information

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical

More information

3 rd Party Vendor Risk Management

3 rd Party Vendor Risk Management 3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced

More information

IT Governance Overview

IT Governance Overview IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope

More information

Morgan Stanley. Policy for the Management of Third Party Residential Mortgage Servicing Providers

Morgan Stanley. Policy for the Management of Third Party Residential Mortgage Servicing Providers Morgan Stanley Policy for the Management of Third Party Residential Mortgage Servicing Providers Title Policy for the Management of Third Party Residential Mortgage Servicing Providers Effective Date Owner

More information

Risk Management Framework

Risk Management Framework Risk Management Framework Mandate and commitment Design of framework for managing risks Continual improvement of the framework Implementing risk management Monitoring and review of the framework Source:

More information

Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance

Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance Arm Stakeholders with Critical Information to Assess 3rd Party Relationships and Comply with the Foreign Corrupt Practices Act

More information

GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK

GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK SUPERVISORY AND REGULATORY GUIDELINES: PU-0412 Operational Risk 25 th November, 2013 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK 1. INTRODUCTION 1.1. The Central Bank of The Bahamas ( the Central

More information

The Seven Elements of a Vendor Oversight Program

The Seven Elements of a Vendor Oversight Program The Seven Elements of a Oversight Program DST Health Solutions September 2014 The Seven Elements of a Oversight Program The Seven Elements of a Oversight Program Medicare Advantage plans must gain efficiencies

More information

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes

More information

Information Security Managing The Risk

Information Security Managing The Risk Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

The Business Continuity Maturity Continuum

The Business Continuity Maturity Continuum The Business Continuity Maturity Continuum Nick Benvenuto & Brian Zawada Protiviti Inc. 2004 Protiviti Inc. EOE Agenda Terminology Risk Management Infrastructure Discussion A Proposed Continuity Maturity

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14 www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the

More information

2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents

2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents 2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)

More information

APPENDIX 50. Enterprise risk management - Risk management overview

APPENDIX 50. Enterprise risk management - Risk management overview APPENDIX 50 Enterprise risk management - Risk management overview Energex regulatory proposal October 2014 ENTERPRISE RISK MANAGEMENT Risk Management Overview (RMO) 06 11 2013 Table of Contents 1. INTRODUCTION...

More information

ERP Controls Integration

ERP Controls Integration ERP Controls Integration Sustaining Compliance While Implementing Change ADVISORY Contents Introduction 1 The Current Environment 3 The Opportunity: ERP Controls Integration 5 An Approach: Integrating

More information

An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com

An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com An example ITIL -based model for effective Service Integration and Management Kevin Holland AXELOS.com White Paper April 2015 Contents Introduction to Service Integration and Management 4 An example SIAM

More information

Vendor Management Program Office Onshore or offshore?

Vendor Management Program Office Onshore or offshore? Vendor Management Program Office Onshore or offshore? Deloitte s previous article 1 discusses the five most common challenges which have prohibited clients from optimizing their Vendor Management (VM)

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

Best Practices in Contract Migration

Best Practices in Contract Migration ebook Best Practices in Contract Migration Why You Should & How to Do It Introducing Contract Migration Organizations have as many as 10,000-200,000 contracts, perhaps more, yet very few organizations

More information

Software as a Service: Guiding Principles

Software as a Service: Guiding Principles Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially

More information

The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012

The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012 The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only Agenda Introduction Basic program components Recent trends in higher education risk management Why

More information

Treasure Trove The Rising Role of Treasury in Accounts Payable

Treasure Trove The Rising Role of Treasury in Accounts Payable Treasury and Trade Solutions North America July 30, 2015 Treasure Trove The Rising Role of Treasury in Accounts Payable 2015 Citibank, N.A. All rights reserved Today s Speakers Andrew Bartolini Chief Research

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee

More information

GUIDANCE NOTE ON OUTSOURCING

GUIDANCE NOTE ON OUTSOURCING GN 14 GUIDANCE NOTE ON OUTSOURCING Office of the Commissioner of Insurance Contents Page I. Introduction.. 1 II. Application...... 1 III. Interpretation.... 2 IV. Legal and Regulatory Obligations... 3

More information

2014 Vendor Risk Management Benchmark Study

2014 Vendor Risk Management Benchmark Study 2014 Vendor Risk Management Benchmark Study Introduction/Executive Summary You can have all the security in the world inside your company s four walls, but all it takes is a compromise at one third-party

More information

KPMG Internal Audit: Top 10 considerations in 2015 for technology companies. kpmg.com

KPMG Internal Audit: Top 10 considerations in 2015 for technology companies. kpmg.com KPMG Internal Audit: Top 10 considerations in 2015 for technology companies kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Our annual compilation of Internal Audit considerations for technology

More information

Enterprise risk management: A pragmatic, four-phase implementation plan

Enterprise risk management: A pragmatic, four-phase implementation plan Enterprise risk management: A pragmatic, four-phase implementation plan Prepared by: John Brackett, Managing Director, Risk Advisory Services, RSM McGladrey, Inc. 704.442.3820, john.brackett@mcgladrey.com

More information

Managing the Shadow Cloud

Managing the Shadow Cloud Managing the Shadow Cloud Integrating cloud governance into your existing compliance program August 2014 Shadow IT is not a new concept and organizations are well aware of the risks associated with unauthorized

More information

Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004

Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004 Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004 1. INTRODUCTION Financial institutions outsource business activities, functions and processes

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

Draft Guidelines on Outsourcing of activities by Insurance Companies

Draft Guidelines on Outsourcing of activities by Insurance Companies November 8, 2010 To All Insurers Draft Guidelines on Outsourcing of activities by Insurance Companies Reference: 1. INV/CIR/031/2004-05 dated 27 th July, 2004 2. INV/CIR/058/2004-05 dated 28 th December,

More information

Sound Practices for the Management of Operational Risk

Sound Practices for the Management of Operational Risk 1 Sound Practices for the Management of Operational Risk Authority 1.1 Section 316 (4) of the International Business Corporations Act (IBC Act) requires the Commission to take any necessary action required

More information

1 Deloitte s From Bangalore to Boston: The trend of bringing IT back in-house 2013

1 Deloitte s From Bangalore to Boston: The trend of bringing IT back in-house 2013 The Vendor Management Program Office (VMPO): Five Deadly Sins of Vendor Management Are hurdles blocking you from getting the most out of your third party relationships? As used in this document, Deloitte

More information

How to Develop Successful Enterprise Risk and Vendor Management Programs

How to Develop Successful Enterprise Risk and Vendor Management Programs Project Management Institute New York City Chapter January 2014 Chapter Meeting How to Develop Successful Enterprise Risk and Vendor Management Programs Christina S. Kite Senior Vice President Corporate

More information

ENTERPRISE RISK MANAGEMENT FRAMEWORK

ENTERPRISE RISK MANAGEMENT FRAMEWORK ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...

More information

KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com

KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com KPMG Internal Audit 2015: Top 10 considerations for private equity firms kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Historically, private equity has been less regulated than other parts of

More information

Driving performance and value through strategic vendor management

Driving performance and value through strategic vendor management Banking and Capital Markets Driving performance and value through strategic vendor management As companies face increasing pressure to reduce costs and improve productivity and efficiency, many are looking

More information

Vendor Relationship Management

Vendor Relationship Management Vendor Relationship Management Getting What You Paid For (and More) Stephen Guth VP, Vendor Management Thursday, February 26 th, 2015, 8:00 9:00 a.m. Topics Case Study Company Intro Begin with the End

More information

Operations. Group Standard. Business Operations process forms the core of all our business activities

Operations. Group Standard. Business Operations process forms the core of all our business activities Standard Operations Business Operations process forms the core of all our business activities SMS-GS-O1 Operations December 2014 v1.1 Serco Public Document Details Document Details erence SMS GS-O1: Operations

More information

Getting Smart About Revenue Recognition and Lease Accounting

Getting Smart About Revenue Recognition and Lease Accounting SAP Thought Leadership Paper Revenue Recognition and Lease Accounting Getting Smart About Revenue Recognition and Lease Accounting What the Rule Changes Mean for Your Business Table of Contents 4 New Rules

More information

IT Governance Regulatory. P.K.Patel AGM, MoF

IT Governance Regulatory. P.K.Patel AGM, MoF IT Governance Regulatory Perspective P.K.Patel AGM, MoF Agenda What is IT Governance? Aspects of IT Governance What banks should consider before implementing these aspects? What banks should do for implementation

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System

More information

Managing General Agents (MGAs) Guideline

Managing General Agents (MGAs) Guideline Managing General Agents (MGAs) Guideline JUNE 2013 DRAFT FOR COMMENT BC AUTHORIZED LIFE INSURERS www.fic.gov.bc.ca PURPOSE This draft guideline outlines best practices that the Financial Institutions Commission

More information

Growing Vendor Management

Growing Vendor Management V E N D O R M A N A G E M E N T P R O F I L E S E R I E S A Wh it e Pap e r by Ve n d or I NS I G HT an d C MPG, L L C Growing Vendor Management as a Sustainable Business Process with Automated Vendor

More information

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company

More information

Compliance. Group Standard

Compliance. Group Standard Group Standard Compliance Serco is committed to good governance practices and the management of risks supported by a robust business compliance process SMS-GS-G2 Compliance July 2014 v1.0 Serco Public

More information

Moving Forward with IT Governance and COBIT

Moving Forward with IT Governance and COBIT Moving Forward with IT Governance and COBIT Los Angeles ISACA COBIT User Group Tuesday 27, March 2007 IT GRC Questions from the CIO Today s discussion focuses on the typical challenges facing the CIO around

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

P3M3 Portfolio Management Self-Assessment

P3M3 Portfolio Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction

More information

Vendor Management Best Practices

Vendor Management Best Practices 23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion

More information

LANDesk Service Desk Certified in All 15 ITIL. v3 Suitability Requirements. LANDesk demonstrates capabilities for all PinkVERIFY 3.

LANDesk Service Desk Certified in All 15 ITIL. v3 Suitability Requirements. LANDesk demonstrates capabilities for all PinkVERIFY 3. LANDesk Service Desk LANDesk Service Desk Certified in All 15 ITIL v3 Suitability Requirements PinkVERIFY is an objective software tool assessment service that validates toolsets that meet a set of functional

More information

building a business case for governance, risk and compliance

building a business case for governance, risk and compliance building a business case for governance, risk and compliance contents introduction...3 assurance: THe last major business function To be integrated...3 current state of grc: THe challenges... 4 building

More information

Operational Risk Management Program Version 1.0 October 2013

Operational Risk Management Program Version 1.0 October 2013 Introduction This module applies to Fannie Mae and Freddie Mac (collectively, the Enterprises), the Federal Home Loan Banks (FHLBanks), and the Office of Finance, (which for purposes of this module are

More information

Driving Excellence in Implementation and Beyond The Underlying Quality Principles

Driving Excellence in Implementation and Beyond The Underlying Quality Principles SAP Thought Leadership Paper SAP Active Quality Management Driving Excellence in Implementation and Beyond The Underlying Quality Principles 2014 SAP AG or an SAP affiliate company. All rights reserved.

More information

Stakeholder management and. communication PROJECT ADVISORY. Leadership Series 3

Stakeholder management and. communication PROJECT ADVISORY. Leadership Series 3 /01 PROJECT ADVISORY Stakeholder management and communication Leadership Series 3 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital programmes,

More information

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision

More information

Quick Guide: Meeting ISO 55001 Requirements for Asset Management

Quick Guide: Meeting ISO 55001 Requirements for Asset Management Supplement to the IIMM 2011 Quick Guide: Meeting ISO 55001 Requirements for Asset Management Using the International Infrastructure Management Manual (IIMM) ISO 55001: What is required IIMM: How to get

More information

6/8/2016 OVERVIEW. Page 1 of 9

6/8/2016 OVERVIEW. Page 1 of 9 OVERVIEW Attachment Supervisory Guidance for Assessing Risk Management at Supervised Institutions with Total Consolidated Assets Less than $50 Billion [Fotnote1 6/8/2016 Managing risks is fundamental to

More information

THE UH OH MOMENT. Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk

THE UH OH MOMENT. Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk THE UH OH MOMENT Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk By Lois Coatney, Chuck Walker and Joseph Yacura, ISG Directors www.isg-one.com INTRODUCTION A top

More information

ENTERPRISE RISK MANAGEMENT POLICY

ENTERPRISE RISK MANAGEMENT POLICY ENTERPRISE RISK MANAGEMENT POLICY TITLE OF POLICY POLICY OWNER POLICY CHAMPION DOCUMENT HISTORY: Policy Title Status Enterprise Risk Management Policy (current, revised, no change, redundant) Approving

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information