VENDOR MANAGEMENT Presented By:
|
|
|
- Marian Norton
- 9 years ago
- Views:
Transcription
1 VENDOR MANAGEMENT EXAMINER EXPECTATIONS FOR ASSESSING & MANAGING 3RD PARTY RISK Presented By: Tom Hinkel, VP of Compliance Services Safe Systems, Inc.
2 Agenda Blurred Lines: Defini/on of vendor Recent regulatory expecta/ons for vendor management Due diligence (pre- contract) Contracts 6 vendor management steps to take NOW
3 Tradi/onal defini/on: Vendor vs. Service Provider Vendor anyone with whom you have a contractual rela/onship Service Provider Vendor that provides a bank- related service (BSCA). check and deposit sor/ng and pos/ng, computa/on and pos/ng of interest and other credits and charges, prepara/on and mailing of checks, statements, no/ces, and similar items, or any other clerical, bookkeeping, accoun/ng, sta/s/cal, or similar func/ons performed for a depository ins/tu/on.
4 Current defini/on: Vendor vs. Service Provider Term "service providers" is broadly defined to include all en//es* that have entered into a contractual rela/onship with a financial ins/tu/on to provide business func/ons or ac/vi/es. Federal Reserve * En//es may be a bank or nonbank, affiliated or non- affiliated, regulated or non- regulated, or domes/c or foreign. A third- party rela/onship is any business arrangement between a bank and another en/ty, by contract or otherwise.* - OCC * Third- party rela/onships include ac/vi/es that involve outsourced products and services, use of independent consultants Third- party rela/onships generally do not include customer rela/onships.
5 FFIEC Financial ins/tu/ons increasingly rely on service providers, soxware vendors, and other third par/es. Financial ins/tu/ons are responsible for risks associated with the ac/vi/es of third- party service providers with which they contract. An effec/ve outsourcing oversight program should provide the framework for management to understand, monitor, measure, and control the risks associated with outsourcing.
6 Vendor Management What s New? Increased vendor selec/on & pre- contract due diligence Strategic goals (decision to outsource) Concentra/on risk Cri/cality of service (highly cri/cal vendors may need to be assigned to a senior officer for oversight - OCC) Vendor use of sub- contractors BCP review (opera/onal risk) Expanded Risk Assessments (not just NPI) Cri/cality Complexity Reputa/onal risk
7 Vendor Management What s New? (cont.) Increased on- going oversight Contracts Third- party report (audits) - SAS- 70 vs. SOC 1, 2, 3 Regulatory examina/on reports BOD repor/ng Assess ALL vendors
8 Due Diligence 1. During the product selec/on process, prior to contrac/ng for the product or service Reputa/on, strategic fit, etc. 2. AXer the vendor has been selected, and prior to implementa/on RFP s vs. contracts 3. Post implementa/on, and ongoing as long as the rela/onship exists Tradi/onal vendor management program
9 Due Diligence Pre- Contract Product / Service is in alignment with strategic plan? Outsourcing is best op/on? RFP/RFI U/lized? Product / Service Cloud Based? Vendor Business Con/nuity RTO's Reviewed?
10 Due Diligence Checklist
11 Due Diligence Checklist
12 Due Diligence Checklist
13 Controls Controls Trust but Verify Financial Statements Contracts & Service Level Agreements (SLA s) Incident Response Plans (include actual incidents) DR/BCP Plans (RTO s aligned?) Regulatory Examina/on Reports Third- party audit reviews (SAS 70 phased out)
14 Controls According to the FFIEC Handbook on Outsourcing Technology Services The is the single most important control in the outsourcing process. A. Ini/al due diligence process B. Review of third- party audit reports C. Contract D. Risk Assessment E. Vendor s financial stability
15 Controls The contract is the legally binding document that defines all aspects of the servicing rela/onship. A wrijen contract should be present in all servicing rela/onships. This includes instances where the service provider is affiliated with the ins/tu/on. The contract is the single most important control in the outsourcing process.
16 Contracts
17 Contracts
18 Contracts
19 Contracts
20 Regulatory Examination Reports The Agencies conduct IT- related examina/ons of financial ins/tu/ons and their TSPs based on the guidelines contained in the IT Handbooks. Uses URSIT (Uniform Ra/ng System for Informa/on Technology) ra/ngs Each TSP examined for IT is assigned a summary or composite ra/ng based on the overall results of the evalua/on.
21 Regulatory Examination Reports The financial ins/tu/on must inquire from their primary federal regulator (PFR) whether or not they have completed an examina/on of the vendor (or TSP). If the PFR indicates they have, the ins/tu/on may request a summary of the exam (called a Report of Examina/on, or ROE), which will not contain the actual score. Instead the ROE contains an Open Sec/on, which contains all significant examina/on findings and conclusions. The excep/on to this is if the TSP scores a 4 or lower (i.e. 4 or 5), in which case the regulator will proac/vely provide a summary of the exam to each ins/tu/on serviced by the TSP.
22 Next Steps? 6 Changes to Make to your Vendor Management Program Now ü Remove references to SAS 70, replace with Third- party Review ü Rank Vendors Use Tiered Approach (H, M, L, or Tier I, Tier II, Tier III) ü Add Vendor Management responsibili/es to IT Steering Commijee (or equivalent). High risk vendors may require senior management sponsor. ü Manage contract expira/on dates and auto- renewal clauses ü Review SOC reports ü Request examina/on reports
23 Questions? Tom Hinkel CISA, CRISC, CCSA, CRMA VP of Compliance Services Safe Systems, Inc. The Compliance and Technology Partner for Financial Ins8tu8ons
Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP
Outsourced Third Party Relationship Management/ Vendor Management TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP 1 Risk Management Guidance 2 3 Appendix J: 4 - Key Elements Third Party Management
So#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
9/13/2013. 20/20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99
20/20 Vision for Vendor Management & Oversight 2013 WBA Technology Conference September 17, 2013 Ken M. Shaurette, CISSP, CISA, CISM, CRISC, IAM Director IT Services Disclaimer The views set forth are
Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.
Vendor Management: An Enterprise-wide Focus Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Why Focus on Vendor Management Increased financial regulatory scrutiny GLBA and Identity Theft Red
Vendor Management Compliance Top 10 Things Regulators Expect
Vendor Management Compliance Top 10 Things Regulators Expect Peter Davey, AAP VP & Director, Enterprise Payments, CapitalOne Pamela T. Rodriguez, AAP, CIA, CISA EVP, Risk Management & Education, EastPay
Let s Get Nerdy: Inside Tips on Florida s Workers Compensa:on with a Dose of PEOs. Meet Your Presenter. Going Beyond the Basics.
Let s Get Nerdy: Inside Tips on Florida s Workers Compensa:on with a Dose of PEOs Going Beyond the Basics Meet Your Presenter Frank Pennachio Co-founder Partner Oceanus Partners Author, Speaker and Sales
Vendor Management Compliance Top 10 Things Regulators Expect
Vendor Management Compliance Top 10 Things Regulators Expect Paul M. Phillips, CFA Attorney, Adams and Reese Pamela T. Rodriguez, AAP, CIA, CISA EVP, Risk Management & Education, EastPay 2014 EastPay.
Payments Cards and Mobile Consul3ng Overview 2013
Payments Cards and Mobile Consul3ng Overview 2013 Our Services A digital publishing and marke3ng pla4orm for the future of payments Publishing Research Consul0ng Public Rela0ons Marke0ng/Branding Corporate
Legacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed
Panorama Consulting Group. PERFECT Fit ERP Selection Framework
Panorama Consulting Group PERFECT Fit ERP Selection Framework 1 Goals of the meeting Meeting Goals and Agenda Help Panorama better understand the Client Address questions about Panorama s ERP selection
Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv.
UNIVERSITY OF PAVIA Performance Management Ch. 9 The Performance Measurement Mechanism Chiara Demar8ni [email protected] Master in Interna+onal Business and Economics Defini8on Performance
Outsourcing Technology Services A Management Decision
Outsourcing Technology Services A Management Decision A Telephone Seminar for National Banks Tuesday, July 20, 2004 And again on Wednesday, July 21, 2004 Agenda Outsourcing activities and relationships
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant
THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda
Data Governance Framework: Bank of Canada
Data Governance Framework: Bank of Canada The views and opinions expressed herein are those of the author and do not necessarily reflect the official policy or posi8on of the Bank of Canada or any agency
About the Board. Minnesota Board of Behavioral Health and Therapy 10/24/12. Minnesota Board of Behavioral Health and Therapy
Minnesota Board of Behavioral Health and Therapy Kari Rechtzigel, Executive Director Samantha Strehlo, LADC Licensing Coordinator Judi Gordon, LADC, RN, Board Chair Minnesota Board of Behavioral Health
IT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
Introduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
Innovation Quality Flexibility
What a Lead Programmer Does for effective project management of programming activities under various outsourced models Innovation Quality Flexibility Agenda Understanding the Operating Model Impact Defining
Phone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
Overview of Informa.on Technology Procurement. www.its.ms.gov
Overview of Informa.on Technology Procurement www.its.ms.gov ITS Law: Responsibili7es and Authority www.sos.ms.gov: Educa7on & Publica7ons: MS Code of 1972 (Unannotated: via LexisNexis) ITS Statute: Title
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke
Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke Agenda Key components essential to a FFIEC compliant Business Continuity Plan Recovery Time Objectives & Recovery Point
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November
Vendor Management Best Practices
Vendor Management Best Practices Presented by: Raji Sathappan, MBA, CRCM, CISA, CAMS FMS East Coast Regional Conference September 2015 Certified Public Accountants Consultants Wealth Management Technology
Managing Student Impairment in Counselor Education Programs. Dr. Wendy Greenidge Dr. Belinda Lopez Dr. Michelle Mitcham
Managing Student Impairment in Counselor Education Programs Dr. Wendy Greenidge Dr. Belinda Lopez Dr. Michelle Mitcham Learning Objectives Par:cipants will learn to iden:fy and evaluate students of concern.
Identifying Key Risk Indicator
PUERTO RICO PAYMENTS SYMPOSIUM Identifying Key Risk Indicator EPOCPR Services Agenda for Today Background History Regulators & Risk Management Let s have fun Regulators & Risk Assessment ACH Risks Categories
WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons
WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment
Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1
Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll
Capitalize on your carbon management solu4on investment
Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 [email protected] www.cdproject.net
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
SECURITY AND EXTERNAL SERVICE PROVIDERS
SECURITY AND EXTERNAL SERVICE PROVIDERS How to ensure regulatory compliance and manage risks with Service Organization Control (SOC) Reports Jorge Rey, CISA, CISM, CGEIT Director, Information Security
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
Supplier Relationship Management. ISM Philadelphia, Inc. September 12, 2013
Supplier Relationship ISM Philadelphia, Inc. September 12, 2013 Why does Supplier matter Increased outsourcing of strategic services More complex relationships Consolidation of suppliers to leverage spend
Splunk for Networking and SDN
Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking
How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook
How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply
Architec;ng Splunk for High Availability and Disaster Recovery
Copyright 2014 Splunk Inc. Architec;ng Splunk for High Availability and Disaster Recovery Dritan Bi;ncka BD Solu;on Architecture Disclaimer During the course of this presenta;on, we may make forward- looking
Introduction to Vendor Management
Introduction to Vendor Management BOI October 15, 2013 Speaker Brad Smith President, Abound Resources More than 20 years experience helping community bank achieve their business goals with technology 500+
Understanding the Fundamentals of Credit Union Third-Party Vendor Due Diligence
Understanding the Fundamentals of Credit Union Third-Party Vendor Due Diligence November 20, 2014 2 p.m. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. Sponsored by Affinion Benefits Group E. Andrew Keeney,
FULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE
FULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE BENEFITS OF ENTERPRISE RISK MANAGEMENT (ERM) More effec$ve strategic and opera/onal planning: Alignment of objec/ves and risks
Interac(ve Broker (UK) Limited Webinar: Proprietary Trading Groups
Interac(ve Broker (UK) Limited Webinar: Proprietary Trading Groups Presenter Gerald Perez Managing Director London, United Kingdom E- mail: gperez@interac=vebrokers.com Important Informa=on: The risk of
Pharma CloudAdoption. and Qualification Trends
Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for
Don Stewart, MBCP, MBCI, CCP
Moving production and disaster recovery securely into the cloud. Don Stewart, MBCP, MBCI, CCP TOPIC OUTLINE What are the opportunities? Why do we care? How can we embrace best practices? Who should participate?
CiviCRM Implementa/on Case Study
CiviCRM Implementa/on Case Study Leukaemia and Lymphoma Research www.leukaemialymphomaresearch.org.uk Parvez Saleh About the LLR Having gone through the socware/supplier selec/on process, the LLR decided
Vendor Compliance Management Series: Performing an Effective Risk Assessment
Vendor Compliance Management Series: Performing an Effective Risk Assessment Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must
Privileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management
Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates
Service Organizations and the Internal Audit function. 2015 conference Institute of Internal Auditors in Israel
Service Organizations and the Internal Audit function 2015 conference Institute of Internal Auditors in Israel Proprietary This work product/document is intended solely for the information and use of the
Identity and Access Positioning of Paradgimo
1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values
Connec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
Update on the Financial Condi0on of Hofstra University March, 2013
Update on the Financial Condi0on of Hofstra University March, 2013 Howard Bunsis PhD, MBA, J.D., B.S., CPA Professor of Accoun0ng Eastern Michigan University Chair, AAUP Collec0ve Bargaining Congress 1
Project Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
elearning: present and future
elearning: present and future Defini2on E- learning can be defined as the use of computer and Internet technologies to deliver a broad array of solu2ons to enable learning and improve performance. (FAO)
8 Techniques to Improve Your Bank s Vendor Management Program. IBAT TechMecca
8 Techniques to Improve Your Bank s Vendor Management Program IBAT TechMecca February 4, 2014 Speaker 512-351-3700 [email protected] Brad Smith President, Abound Resources 20+ years experience
Office of Inspector General
Audit Report OIG-14-034 Not Sufficiently Documented April 21, 2014 Office of Inspector General Department of the Treasury Contents Audit Report Background... 2 Results of Audit... 4 OCC Has Updated Guidance
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor [email protected]
Cloud Security & Risk Adam Cravedi, CISA Senior IT Auditor [email protected] Agenda About Compass Overcast - Cloud Overview Thunderheads - Risks in the Cloud The Silver Lining - Security Approaches
DTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
