360 of Vendor Management

Size: px
Start display at page:

Download "360 of Vendor Management"

Transcription

1 360 of Vendor Management Jay Brietz, CPA and CIA Shareholder Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC

2 Disclaimer This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record of the discussion. This presentation is for informational purposes and does not contain or convey specific advice. It should not be used or relied upon in regard to any particular situation or circumstances without first consulting the appropriate advisor. No part of the presentation may be circulated, quoted, or reproduced for distribution without prior written approval from Elliott Davis Decosimo. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 2

3 Agenda Overview of Vendor Management Vendor Management Steps SOC Report Reviews Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 3

4 Overview of Vendor Management Who are third party vendors: FDIC s definition is the most simple All entities that have entered into a business relationship with a financial institution. OCC s definition provides more examples of third parties that provide outsourced products and services, independent consultants, networking arrangements, merchant payment processing services so forth. The FRB and CFPB also have their own definitions. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 4

5 Overview of Vendor Management Outsourcing dates back to the 1800 s 1970 s and 1980 s - Advancement of IT environments - Move from payroll outsourcing to IT outsourcing 1990 s and 2000 s - Y2K scare and the boom of IT consulting - Speed of change (broadband, storage, internet, and security) - Education and training Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 5

6 Overview of Vendor Management Think back to your bank in the 1980 s (maybe even in the 1990 s): - Core processing system was home grown (probably on a computer the size of a tank) - Payroll was one of the first processes outsourced - Most other functions were performed in-house Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 6

7 Overview of Vendor Management Common processes at banks that are outsourced today: - Core processing system and related bank products - Payroll processing - Investments safekeeping and recordkeeping - Benefit plan processing - Others Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 7

8 Overview of Vendor Management THOUGHT OF THE DAY: You can outsource the process but you still need to manage risks associated with the process. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 8

9 Overview of Vendor Management Vendor Management is an important aspect of the bank s overall risk management program According to the FDIC: An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships, and identifying and controlling risks arising from such relationships, to the same extent as if the activity were handled within the institution. (FIL , Guidance on Managing Third Party Risk ) Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 9

10 Overview of Vendor Management What are typical risks associated with the use of third parties? Strategic Risks Compliance Risks Credit Risks Operational Risks Transactional Risks Reputational Risks Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 10

11 Overview of Vendor Management Identifying Risk Responses Avoidance Exiting the activities giving rise to the risk Reduction Action taken to reduce the risk likelihood or impact or both Management s response to risk Sharing Reducing the likelihood or impact by transferring or sharing a portion of the risk Acceptance No action is taken to affect risk likelihood or impact Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 11

12 Overview of Vendor Management Use of third parties means you have Accepted the risk! Avoidance Exiting the activities giving rise to the risk Reduction Action taken to reduce the risk likelihood or impact or both Management s response to risk Sharing Reducing the likelihood or impact by transferring or sharing a portion of the risk Acceptance No action is taken to affect risk likelihood or impact Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 12

13 Overview of Vendor Management THOUGHT OF THE DAY: You can outsource the process but you still need to manage risks associated with the process. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 13

14 Vendor Management Steps Risk Assessment Due Diligence Contracting Monitoring Effective vendor management programs typically contain four key steps: - Risk Assessment - Due Diligence - Contracting - Monitoring Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 14

15 Vendor Management Steps Risk Assessment Some key considerations in assessing vendor risk (always thinking WCGW what could go wrong): - Longevity of the relationship and/or service/product - Materiality of the contract to the Bank s financials - Significance of the process/services outsourced - How easily can service/product be moved or brought in-house - Where is critical/sensitive information housed and how quickly can it be recovered - Will third party have access to and/or transmit sensitive data - What are reputational risks if the services are not performed correctly - Compliance risks associated to outsourced services - Experience of internal personnel managing the relationship Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 15

16 Vendor Management Steps Risk Assessment Classifying Risks: High Moderate Critical Vendors - cannot be easily replaced if services are interrupted or terminated, which in turn may cause significant operational and/or financial impact Other High Risk Vendors - has unsupervised access to sensitive data, critical applications, technology infrastructure or related control systems, then they should be deemed as high risk. Low Moderate and Low Risk Vendors risks do not meet the criteria of a high risk category, and due diligence is typically performed less frequently. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 16

17 Vendor Management Steps Due Diligence Items typically obtained and reviewed: Audited financial statements Insurance coverage and exclusions Experience of principals and business reputation External reports: - SOC reports - Compliance and regulatory reports - Peer reviews Hiring policies and use of background checks Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 17

18 Vendor Management Steps Due Diligence Items typically obtained and reviewed (continued): IT Security Policy, including: - Protection of confidential information - Business continuity and disaster recovery plans - Data removal and destruction policies and procedures Strategic plans for upgrades and changes to hardware and/or software Pending lawsuits Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 18

19 Vendor Management Steps Contracting Contracting considerations: Ensure scope and key terms are clearly defined Incorporate performance measures, such as SLAs and project plans Legal language, such as indemnification provisions and limits of liability Right to audit clause or requirements for SOC reports Use of subcontractors (prior notice/approval) Data privacy confidentiality and security Business continuity and disaster recovery plans Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 19

20 Vendor Management Steps Monitoring Monitoring Considerations: Who person with the requisite knowledge and skills to critically review all aspects of the relationship What established performance benchmarks such as financial condition, performance against stated terms or project plans, reputation, and external reviews/soc reports When frequency determined by risk classification How typical monitoring procedures include separate evaluations and ongoing monitoring efforts Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 20

21 Vendor Management Steps THOUGHT OF THE DAY: You can outsource the process but you still need to manage risks associated with the process. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 21

22 SOC Report Reviews SOC reports are important part of the vendor management program, so it is important to know how to leverage these reports In this final section, we will cover: - An overview of SOC reports - Key aspects of these reports to leverage - Bank s responsibilities related to SOC report reviews and User Control Considerations (UCCs) Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 22

23 SOC Report Reviews Why do companies get a SOC report? In an audit of a user organization's financial statements, the user auditor obtains an understanding of the entity's internal control sufficient to plan the audit as required by AU-C Section 315, Understanding the Entity and its Environment and Assessing the Risks of Material Misstatement. User Organizations' Auditors If a service organization provides transaction processing or other data processing services to the user organization, the user auditor may be required to gain an understanding of the controls at the service organization. Independent Accounting or Auditing Firm (Service Auditor) User Organizations Services Subservice Organizations Service Organizations The service organization will engage the independent accounting firm to perform a SOC examination and issue a report on the organization's internal controls Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 23

24 SOC Report Reviews Let s compare the three SOC reports SOC 1 Who Why What User entity management and user auditors Audit Controls relevant to user entities internal controls over financial Reporting SOC 2 User entity departments other than accounting Governance Risk and Compliance programs Oversight Due diligence Controls relevant to security, availability, processing integrity, confidentiality, or privacy SOC 3 Any users with need for confidence in service organization s controls Marketing confidence without the detail Seal and easy to read report on controls Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 24

25 SOC Report Reviews There are two Types of reports for both SOC 1 and SOC 2 Type 1 Type 2 Type 1 Type 2 Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 25

26 SOC Report Reviews Difference between a Type 1 and Type 2 Type 1 A report on management s description of the service organization s system and the suitability of the design of the controls to achieve the related control objectives included in the description as of a specified date. Type 2 A report on management s description of the service organization s system and the suitability of the design and operating effectiveness of the controls to achieve the related control objectives included in the description throughout a specified period. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 26

27 SOC Report Reviews What reports are required to be reviewed? - Key processes that are outsourced Investment recordkeepers and pricing services Payroll service providers Core processing package - Other processes that may need reviewing Benefit plan and claims processors Certain add-on modules from the core processor Data centers Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 27

28 SOC Report Reviews Scope We have examined Example Co., Inc. s ( Example or the Company ) description of its Payroll Processing Services system and related controls for processing user entities transactions (the Description ) throughout the period July 1, 2014 to June 30, 2015 ( Specified Period ) and the suitability of the design and operating effectiveness of controls to achieve the related control objectives stated in the Description. The Description indicates that certain control objectives specified in the Description can be achieved only if complementary user entity controls contemplated in the design of the Company s controls are suitably designed and operating effectively, along with related controls at the service organization. We have not evaluated the suitability of the design or operating effectiveness of such complementary user entity controls. Processes or functions covered by this report Audit period covered Type I vs. Type II User entity controls are a key part of the internal control system. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 28

29 SOC Report Reviews Scope (continued) The Company uses various subservice organizations for certain functions of its Payroll Processing Services system and related controls, as described in Section Three. The Company s control objectives and related controls, which are listed in Section Four of this report, include only the control objectives and related controls of the Company and exclude the control objectives and related controls of the subservice organizations. Our examination did not extend to the controls of the subservice organizations. This paragraph describes the subservice organizations that are carved-out or excluded from the scope of this report. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 29

30 SOC Report Reviews Scope (continued) The information presented in Section Five titled Other Information Provided by the Service Organization describes additional processes performed by the Company. It is presented by the management of the Company to provide additional information and is not a part of the Company s Description. Information presented in Section Five has not been subjected to the procedures applied in the examination of the Description and the suitability of the design and operating effectiveness of controls to meet the related criteria stated in the Description and accordingly, we express no opinion on it. This paragraph describes other information presented by the Company not included in the scope of the opinion Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 30

31 SOC Report Reviews Basis for Qualification The Company states in it Description that it has controls in place to review the accuracy of fee schedule codes applied to new account setups or maintenance to existing accounts. However, as noted on page 117 of the description of tests of controls and results thereof, these controls were not operating effectively throughout the Specified Period. As a result, controls were not operating effectively to achieve the control objective, Controls provide reasonable assurance that trust fees are accurately calculated and recorded throughout the Specified Period. This paragraph describes the reason for the Qualified Opinion is provided just before the opinion paragraph Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 31

32 SOC Report Reviews Opinion Opinion 1: Description was fairly stated. In our opinion, except for the matter in the preceding paragraph, in all material respects, based on the criteria described in the Company s assertion in Section Two of this report: The Description fairly presents the Payroll Processing Services system and related controls that were designed and implemented throughout the Specified Period. The controls related to the control objectives stated in the Description were suitably designed to provide reasonable assurance that the control objectives would be achieved if the controls operated effectively throughout the Specified Period and user entities applied the complementary user entity controls contemplated in the design of the Company s controls throughout the Specified Period. The controls tested, which, together with the complementary user entity controls referred to in the scope paragraph of this report, if operating effectively, were those necessary to provide reasonable assurance that the control objectives stated in the Description were achieved, operated effectively throughout the Specified Period. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 32

33 SOC Report Reviews Opinion Opinion 2: Controls were suitably designed. In our opinion, except for the matter in the preceding paragraph, in all material respects, based on the criteria described in the Company s assertion in Section Two of this report: The Description fairly presents the Payroll Processing Services system and related controls that were designed and implemented throughout the Specified Period. The controls related to the control objectives stated in the Description were suitably designed to provide reasonable assurance that the control objectives would be achieved if the controls operated effectively throughout the Specified Period and user entities applied the complementary user entity controls contemplated in the design of the Company s controls throughout the Specified Period. The controls tested, which, together with the complementary user entity controls referred to in the scope paragraph of this report, if operating effectively, were those necessary to provide reasonable assurance that the control objectives stated in the Description were achieved, operated effectively throughout the Specified Period. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 33

34 SOC Report Reviews Opinion Opinion 3: Controls were operating effectively. In our opinion, except for the matter in the preceding paragraph, in all material respects, based on the criteria described in the Company s assertion in Section Two of this report: The Description fairly presents the Payroll Processing Services system and related controls that were designed and implemented throughout the Specified Period. The controls related to the control objectives stated in the Description were suitably designed to provide reasonable assurance that the control objectives would be achieved if the controls operated effectively throughout the Specified Period and user entities applied the complementary user entity controls contemplated in the design of the Company s controls throughout the Specified Period. The controls tested, which, together with the complementary user entity controls referred to in the scope paragraph of this report, if operating effectively, were those necessary to provide reasonable assurance that the control objectives stated in the Description were achieved, operated effectively throughout the Specified Period. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 34

35 SOC Report Reviews This is an excerpt of the User Entity Controls (also referred to as User Control Considerations (UCCs)) Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 35

36 SOC Report Reviews Evaluating UCCs Create a matrix of all UCCs that are applicable to your Bank, including: - Service organization - User entity control (listed in the SOC report) - Applicable to the bank (Yes or No) - Control at the bank to address the UCC - Test procedure and results of testing Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 36

37 SOC Report Reviews Example UCC Documentation and Testing Matrix Service Organization XYZ Payroll Service XYZ Payroll Service UCC Description The user organization is responsible for notifying the service organization of changes in the authorized contacts list. The user organization is responsible for ensuring that only authorized and properly trained personnel are allowed logical access to service organization s systems, fax input worksheets and coversheets. Control Activity at Company Jane Doe is the only individual at the Company who is currently on the authorized contacts list. Authorized Company personnel would notify the service organization immediately of any changes to be made to the list. The Company has procedures in place for ensuring that only authorized and properly trained personnel are allowed logical access to the service organization s systems, fax input worksheets and coversheets. Design Applicable to the Bank? Designed Properly? Remediation Needed? Yes/No Yes/No <1> N/A or Description of required remediation Yes/No Yes/No <1> N/A or Description of required remediation Implementation & Operation Implemented & Operating Remediation Effectively? Needed? Yes/No <2> N/A or Description of required remediation Yes/No <2> N/A or Description of required remediation Reliance on UCC Appropriate? Yes/No Yes/No <1> Should retain documentation of what factors considered (i.e. specific control objectives addressed, relevant assertions, etc., as appropriate). <2> Should retain documentation of what procedures performed to evaluate implementation & operation effectiveness. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 37

38 SOC Report Reviews SOC Report Review and Vendor Management Summary Key Aspects of the Opinion: - Processes/functions covered by the report - Audit period covered and Type I versus Type II - Subservice providers carved out you may need to request their SOC report separately - Other information included but not covered by the opinion (usually in Section Five of the report) - Any qualification(s) or emphasis of a matter Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 38

39 SOC Report Reviews SOC Report Review and Vendor Management Summary (continued) Other Key Aspects of the SOC Report: - Complementary User Entity Controls/UCCs - Exceptions in the testing procedures and management s response to those exceptions - Bridge letters not necessarily a key part of vendor management but can be important when using the SOC report for Sarbanes-Oxley and financial reporting Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 39

40 SOC Report Reviews THOUGHT OF THE DAY: You can outsource the process but you still need to manage risks associated with the process. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 40

41 Questions? Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 41

42 Jay Brietz, CPA, CIA Phone: Mobile: Website: Elliott Davis Decosimo ranks among the top 30 CPA firms in the U.S. With seventeen offices across seven states, the firm provides clients across a wide range of industries with smart, customized solutions. Elliott Davis Decosimo is an independent firm associated with Moore Stephens International Limited, one of the world's largest CPA firm associations with resources in every major market around the globe. For more information, please visit elliottdavis.com. Elliott Davis Decosimo, LLC Elliott Davis Decosimo, PLLC 42

SECTION I INDEPENDENT SERVICE AUDITOR S REPORT

SECTION I INDEPENDENT SERVICE AUDITOR S REPORT SOC2 Security Report on Controls Supporting DriveSavers Services Independent Service Auditor s Report on Design of Controls Placed in Operation and Tests of Operational Effectiveness Relevant to Security

More information

Documentation of Use of a Type 2 Service Auditor s Report In an Audit of an Employee Benefit Plan s Financial Statements

Documentation of Use of a Type 2 Service Auditor s Report In an Audit of an Employee Benefit Plan s Financial Statements Documentation of Use of a Type 2 Service Auditor s Report In an Audit of an Employee Benefit Plan s Financial Statements PLAN NAME: PLAN YEAR END: CLIENT NUMBER: SCOPE OF PLAN AUDIT: LIMITED FULL Note:

More information

Goodbye, SAS 70! Hello, SSAE 16!

Goodbye, SAS 70! Hello, SSAE 16! Goodbye, SAS 70! Hello, SSAE 16! A Session to Provide Insight on the New Standard and What Service Providers and End-Users Need to Know January 3, 2012 Agenda Introduction Background on what was SAS 70

More information

Vendor Management Compliance Top 10 Things Regulators Expect

Vendor Management Compliance Top 10 Things Regulators Expect Vendor Management Compliance Top 10 Things Regulators Expect Peter Davey, AAP VP & Director, Enterprise Payments, CapitalOne Pamela T. Rodriguez, AAP, CIA, CISA EVP, Risk Management & Education, EastPay

More information

Vendor Management Compliance Top 10 Things Regulators Expect

Vendor Management Compliance Top 10 Things Regulators Expect Vendor Management Compliance Top 10 Things Regulators Expect Paul M. Phillips, CFA Attorney, Adams and Reese Pamela T. Rodriguez, AAP, CIA, CISA EVP, Risk Management & Education, EastPay 2014 EastPay.

More information

T31: Before, During and After Outsourcing David Fong, BlackRock

T31: Before, During and After Outsourcing David Fong, BlackRock T31: Before, During and After Outsourcing David Fong, BlackRock Before, During and After Outsourcing David Fong, CISA, CPA Objective o Explore reasons why some organizations choose to outsource o Understanding

More information

Developing an Effective Enterprise Risk Management Program

Developing an Effective Enterprise Risk Management Program Developing an Effective Enterprise Risk Management Program Jay Brietz, CPA and CIA Senior Manager This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

How To Improve Your Cyber Security

How To Improve Your Cyber Security Cybersecurity and Data Security Richard Cook Director IT Audit & Security May 2015 Elliott Davis Decosimo, PLLC Cybersecurity and Data Security This material was used by Elliott Davis Decosimo during an

More information

Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions

Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions Plan Advisory The AICPA EBPAQC is a firm-based, volunteer membership center created with the goal of promoting quality employee

More information

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch SSAE 16 for Transportation & Logistics Companies Chris Kradjan Kim Koch 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind,

More information

Third-Party Risk Management: Busting Myths and Telling Truths

Third-Party Risk Management: Busting Myths and Telling Truths Third-Party Risk Management: Busting Myths and Telling Truths Richik Sarkar, Esq. McDonald Hopkins LLC 600 Superior Avenue, East, Suite 2100 Cleveland, OH 44114 (216) 430-2009 rsarkar@mcdonaldhopkins.com

More information

9/13/2013. 20/20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99

9/13/2013. 20/20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99 20/20 Vision for Vendor Management & Oversight 2013 WBA Technology Conference September 17, 2013 Ken M. Shaurette, CISSP, CISA, CISM, CRISC, IAM Director IT Services Disclaimer The views set forth are

More information

3 rd Party Vendor Risk Management

3 rd Party Vendor Risk Management 3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced

More information

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,

More information

To: Our Clients and Friends March 25, 2014

To: Our Clients and Friends March 25, 2014 Financial Services Group To: Our Clients and Friends March 25, 2014 A Significant Change Is Occurring Regarding Regulatory Oversight of Banks and Their Third Party Relationships. Both Banks and their Vendors

More information

Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP

Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP Outsourced Third Party Relationship Management/ Vendor Management TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP 1 Risk Management Guidance 2 3 Appendix J: 4 - Key Elements Third Party Management

More information

SAS No. 70, Service Organizations

SAS No. 70, Service Organizations SAS No. 70, Service Organizations A standard for reporting on a service organization s controls affecting user entities' financial statements. Only for use by service organization management, existing

More information

Information for Management of a Service Organization

Information for Management of a Service Organization Information for Management of a Service Organization Copyright 2011 American Institute of Certified Public Accountants, Inc. New York, NY 10036-8775 All rights reserved. For information about the procedure

More information

Credit Union Liability with Third-Party Processors

Credit Union Liability with Third-Party Processors World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with

More information

FinTech Webinar Series: Vendor Management Principles

FinTech Webinar Series: Vendor Management Principles FinTech Webinar Series: Vendor Management Principles Evolving Best Practices of Bank Service Providers February 14, 2013 Speakers Russell Bruemmer Partner Eric Mogilnicki Partner Jeffrey Hydrick Special

More information

Service Organization Control (SOC) Reports

Service Organization Control (SOC) Reports Service Organization Control (SOC) Reports Transitioning from SAS 70 to SSAE 16 Deloitte & Touche LLP Agenda Overview SAS 70/SSAE 16 Historical Perspective The New Framework Under SSAE 16 (SOC 1) Impact

More information

Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016

Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016 Understanding SOC Reports for Effective Vendor Management Jason T. Clinton January 26, 2016 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2012 Wolf & Company, P.C. Before we

More information

Vendor Management Best Practices

Vendor Management Best Practices 23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion

More information

Outsourcing Technology Services A Management Decision

Outsourcing Technology Services A Management Decision Outsourcing Technology Services A Management Decision A Telephone Seminar for National Banks Tuesday, July 20, 2004 And again on Wednesday, July 21, 2004 Agenda Outsourcing activities and relationships

More information

SECURITY AND EXTERNAL SERVICE PROVIDERS

SECURITY AND EXTERNAL SERVICE PROVIDERS SECURITY AND EXTERNAL SERVICE PROVIDERS How to ensure regulatory compliance and manage risks with Service Organization Control (SOC) Reports Jorge Rey, CISA, CISM, CGEIT Director, Information Security

More information

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI). Overview Certified in Data Protection (CDP) is a comprehensive global training and certification program which leverages international security standards and privacy laws to teach candidates on how to

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

Service Organization Control Reports

Service Organization Control Reports SAS 70 ENDS EXIT TO SSAE 16 Service Organization Control Reports What Did We Learn from Year One? Agenda Definitions Service Organization Reports What are they? Year One Experiences SSAE 16 Year One Experiences

More information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

Service Organization Control (SOC) reports What are they?

Service Organization Control (SOC) reports What are they? Service Organization Control (SOC) reports What are they? Jeff Cook, CPA, CITP, CIPT, CISA June 2015 Introduction Service Organization Control (SOC) reports are on the rise in the IT assurance and compliance

More information

Vendor Management. Outsourcing Technology Services

Vendor Management. Outsourcing Technology Services Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring

More information

Shared Service System Audits: What User Management and Auditors Need to Know

Shared Service System Audits: What User Management and Auditors Need to Know Shared Service System Audits: What User Management and Auditors Need to Know JFMIP May 2014 Presented by: Robert Dacey GAO Session Objectives Properly using SSAE 16 service organization audit reports Revisions

More information

TIS Section 9520, SSAE No. 16, Reporting on Controls at a Service Organization

TIS Section 9520, SSAE No. 16, Reporting on Controls at a Service Organization November 2011 AICPA Technical Practice Aids TIS Section 9520, SSAE No. 16, Reporting on Controls at a Service Organization.01 New Standards for Service Auditors and User Auditors Inquiry Did the issuance

More information

There are a number of reasons why more and more organizations

There are a number of reasons why more and more organizations Christopher G. Nickell and Charles Denyer Statement on Auditing Standard No. 70 (SAS 70) is an internationally recognized auditing standard developed by the American Institute of Certified Public Accountants

More information

Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions

Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions PLAN ADVISORY Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions PLAN ADVISORY Table of Contents Introduction 3 Selecting and Monitoring Third-Party Service Providers 4 Quality

More information

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,

More information

SSAE 16 SOC 1 Type 2

SSAE 16 SOC 1 Type 2 SSAE 16 SOC 1 Type 2 Independent Service Auditor s Report on Management s Description of a Service Organization s System and the Suitability of the Design and Operating Effectiveness of Controls September

More information

CFPB Readiness Series: Compliant Vendor Management Overview

CFPB Readiness Series: Compliant Vendor Management Overview CFPB Readiness Series: Compliant Vendor Management Overview Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must be tailored to the

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS (ISAE) 3402 ASSURANCE REPORTS ON CONTROLS AT A SERVICE ORGANIZATION

INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS (ISAE) 3402 ASSURANCE REPORTS ON CONTROLS AT A SERVICE ORGANIZATION INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS (ISAE) 3402 ASSURANCE REPORTS ON CONTROLS AT A SERVICE ORGANIZATION (Effective for service auditors assurance reports covering periods ending on or after

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Vendor Management: An Enterprise-wide Focus Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Why Focus on Vendor Management Increased financial regulatory scrutiny GLBA and Identity Theft Red

More information

Managing Sub-Servicing Partnerships

Managing Sub-Servicing Partnerships Managing Sub-Servicing Partnerships 2 Managing Sub-Servicing Partnerships WHY IT IS IMPORTANT TO GINNIE MAE: Ginnie Mae recognizes that there are entities that specialize in the servicing and are better

More information

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased

More information

2012 Winston & Strawn LLP

2012 Winston & Strawn LLP 2012 Winston & Strawn LLP Top 5 Negotiation Points for Software, SaaS, and Outsourcing Agreements Brought to you by Winston & Strawn s Advertising, Marketing, and Entertainment Law Group 2012 Winston &

More information

3.B METHODOLOGY SERVICE PROVIDER

3.B METHODOLOGY SERVICE PROVIDER 3.B METHODOLOGY SERVICE PROVIDER Approximately four years ago, the American Institute of Certified Public Accountants (AICPA) issued Statement on Standards for Attestation Engagements (SSAE) No. 16, Reporting

More information

Management. assessing & managing THIRD PARTY RISKS

Management. assessing & managing THIRD PARTY RISKS ?Vendor Management assessing & managing THIRD PARTY RISKS Client Focused. Solution Driven. Between the evolving regulatory landscape and the fast-paced, technologically-driven nature of today s business

More information

Third Party Relationships

Third Party Relationships 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 A B D INTRODUCTION AND PURPOSE Background Yes/No Comments 1. Does the credit union maintain a list of the third party

More information

Vendor Management: Your Questions Answered

Vendor Management: Your Questions Answered Vendor Management: Your Questions Answered June 16, 2015 Elizabeth E. McGinn Partner Moorari K. Shah Counsel 1 Disclaimer The information contained herein is for informational purposes only; does not constitute

More information

Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004

Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004 Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004 1. INTRODUCTION Financial institutions outsource business activities, functions and processes

More information

Vendor Compliance Management Series: Performing an Effective Risk Assessment

Vendor Compliance Management Series: Performing an Effective Risk Assessment Vendor Compliance Management Series: Performing an Effective Risk Assessment Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must

More information

Managing Outsourcing Arrangements

Managing Outsourcing Arrangements Guidance Note GGN 221.1 Managing Outsourcing Arrangements 1. This Guidance Note provides further detail on the requirements for managing material outsourcing arrangements (refer Prudential Standard GPS

More information

Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding SOC 3

Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding SOC 3 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding SOC 3 Agenda 1) A brief perspective on where SOC 3 originated

More information

SERVICE ORGANIZATION CONTROL REPORTS SM. Formerly SAS 70 Reports

SERVICE ORGANIZATION CONTROL REPORTS SM. Formerly SAS 70 Reports SERVICE ORGANIZATION CONTROL REPORTS SM Formerly SAS 70 Reports SAS No. 70, Service Organizations Standard for reporting on a service organization s controls affecting user entities financial statements

More information

Anatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault

Anatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault Anatomy of an IT Outsourcing Deal Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault 3656867 Agenda Key Considerations for IT Outsourcing Decision Anatomy of an Outsourcing

More information

Statement of Guidance: Outsourcing All Regulated Entities

Statement of Guidance: Outsourcing All Regulated Entities Statement of Guidance: Outsourcing All Regulated Entities 1. STATEMENT OF OBJECTIVES 1.1. 1.2. 1.3. 1.4. This Statement of Guidance ( Guidance ) is intended to provide guidance to regulated entities on

More information

Navigating Vendor Management Issues in Today s Regulatory Environment

Navigating Vendor Management Issues in Today s Regulatory Environment Navigating Vendor Management Issues in Today s Regulatory Environment May 6, 2015 Elizabeth E. McGinn, Partner Moorari K. Shah, Counsel 1 Disclaimer The information contained herein is for informational

More information

Instructions for Completing the Information Technology Officer s Questionnaire

Instructions for Completing the Information Technology Officer s Questionnaire Instructions for Completing the The (Questionnaire) contains questions covering significant areas of a bank s information technology (IT) function. Your responses to these questions will help determine

More information

Connecting the dots: IT to Business

Connecting the dots: IT to Business Connecting the dots: IT to Business Jason Wood, CPA, CISA, CIA, CITP, CFF April 2015 1 Speaker Bio Jason Wood Over 18 years of international business experience in planning, conducting, and quality reviewing

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

Reports on Service Organizations Where we ve been?

Reports on Service Organizations Where we ve been? Reports on Service Organizations Where we ve been? What s changing? How does this impact Internal Audit? Eric Wright Shareholder Frank Dezort Senior Manager Schneider Downs & Co., Inc. May 2, 2011 Overview

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

New York State Department of Financial Services. Update on Cyber Security in the Banking Sector: Third Party Service Providers

New York State Department of Financial Services. Update on Cyber Security in the Banking Sector: Third Party Service Providers New York State Department of Financial Services Update on Cyber Security in the Banking Sector: Third Party Service Providers April 2015 Update on Cyber Security in Banking Sector: Third-Party Service

More information

Client Alert. Global Information Technology & Communications Privacy, Data Protection and Information Management

Client Alert. Global Information Technology & Communications Privacy, Data Protection and Information Management Global Information Technology & Communications Privacy, Data Protection and Information Management Client Alert Umbrellas for Clouds: Risk Mitigation Strategies for SaaS Transactions www.bakermckenzie.com

More information

Risk Management Advisory Services, LLC Capital markets audit and control

Risk Management Advisory Services, LLC Capital markets audit and control Risk Management Advisory Services, LLC Capital markets audit and control November 14, 2003 Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, N.W. Washington, D.C., 20006-2803

More information

Paychex Accounting Online Terms of Use

Paychex Accounting Online Terms of Use Paychex Accounting Online Terms of Use Paychex recommends that Client read the Terms of Use prior to using the Paychex Accounting Online Software ( Software ). If Client does not accept and agree with

More information

Data Privacy, Security, and Risk Management in the Cloud

Data Privacy, Security, and Risk Management in the Cloud Data Privacy, Security, and Risk Management in the Cloud Diana S. Hare, Associate General Counsel and Chief Privacy Counsel, Drexel University David W. Opderbeck, Counsel, Gibbons P.C. Robin Rosenberg,

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Planning/Administrative. Management & Organization. Application Level Accuracy and Completeness. EDI Systems Audit Program

Planning/Administrative. Management & Organization. Application Level Accuracy and Completeness. EDI Systems Audit Program EDI Systems Audit Program A Planning/Administrative 1 Review the Letter of Understanding and create the APM (Audit Planning Memorandum) accordingly. A-1 DB 02/03 2 Gain a high-level understanding of Auditee

More information

INFORMATION TECHNOLOGY OFFICER S QUESTIONNAIRE. Instructions for Completing the Information Technology Examination Officer s Questionnaire

INFORMATION TECHNOLOGY OFFICER S QUESTIONNAIRE. Instructions for Completing the Information Technology Examination Officer s Questionnaire Institution Charter Date of Exam Prepared By INFORMATION TECHLOGY OFFICER S QUESTIONNAIRE Instructions for Completing the Information Technology Examination Officer s Questionnaire The Information Technology

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine

More information

G24 - SAS 70 Practices and Developments Todd Bishop

G24 - SAS 70 Practices and Developments Todd Bishop G24 - SAS 70 Practices and Developments Todd Bishop SAS No. 70 Practices & Developments Todd Bishop Senior Manager, PricewaterhouseCoopers LLP Agenda SAS 70 Background Information and Overview Common SAS

More information

Ayla Networks, Inc. SOC 3 SysTrust 2015

Ayla Networks, Inc. SOC 3 SysTrust 2015 Ayla Networks, Inc. SOC 3 SysTrust 2015 SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT July 1, 2015 To December 31, 2015 Table of Contents SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT... 2 SECTION 2

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Vendor Risk Management in the New Regulatory Environment. kpmg.com

Vendor Risk Management in the New Regulatory Environment. kpmg.com Vendor Risk Management in the New Regulatory Environment kpmg.com Vendor Risk Management in the New Regulatory Environment 2 Vendor Risk Management in the New Regulatory Environment Background Regulators

More information

Understanding Vendor Risk And Analyzing the SSAE No. 16

Understanding Vendor Risk And Analyzing the SSAE No. 16 Understanding Vendor Risk And Analyzing the SSAE No. 16 Accelerate your Credit Union s Performance June 19, 2014 AUSTIN, TEXAS www.cuaccelerator.com Agenda Vendor Management Key Outsourcing Risk Areas

More information

Private Fund Advisers: Compliance Oversight of Third-Party Administrators

Private Fund Advisers: Compliance Oversight of Third-Party Administrators Citi OpenInvestor SM Private Fund Advisers: Compliance Oversight of Third-Party Administrators By: Regulatory Administration and Compliance Support Services, Citi Introduction Private equity and hedge

More information

Significant Revisions to OMB Circular A-127. Section Revision to A-127 Purpose of Revision Section 1. Purpose

Significant Revisions to OMB Circular A-127. Section Revision to A-127 Purpose of Revision Section 1. Purpose Significant Revisions to OMB Circular A-127 Section Revision to A-127 Purpose of Revision Section 1. Purpose Section 5. Definitions Section 6. Policy Section 7. Service Provider Requirements Section 8.

More information

Any business relationship between a bank and another entity, by contract or otherwise

Any business relationship between a bank and another entity, by contract or otherwise An Overview for Bank Directors Managing the Third Party Relationship Patrick Neuman Boardman & Clark LLP Madison, Wisconsin Any business relationship between a bank and another entity, by contract or otherwise

More information

www.pwc.com Third Party Risk Management 12 April 2012

www.pwc.com Third Party Risk Management 12 April 2012 www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.

More information

WELCOME TO SECURE360 2013

WELCOME TO SECURE360 2013 WELCOME TO SECURE360 2013 Don t forget to pick up your Certificate of Attendance at the end of each day. Please complete the Session Survey front and back, and leave it on your seat. Are you tweeting?

More information

SUPERVISORY AND REGULATORY GUIDELINES: PU48-0809 GUIDELINES ON MINIMUM STANDARDS FOR THE OUTSOURCING OF MATERIAL FUNCTIONS

SUPERVISORY AND REGULATORY GUIDELINES: PU48-0809 GUIDELINES ON MINIMUM STANDARDS FOR THE OUTSOURCING OF MATERIAL FUNCTIONS SUPERVISORY AND REGULATORY GUIDELINES: PU48-0809 ISSUED: 4 th May 2004 REVISED: 27 th August 2009 GUIDELINES ON MINIMUM STANDARDS FOR THE OUTSOURCING OF MATERIAL FUNCTIONS I. INTRODUCTION The Central Bank

More information

The Elephant in the Room: What s the Buzz Around Cloud Computing?

The Elephant in the Room: What s the Buzz Around Cloud Computing? The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton

More information

Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq.

Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq. Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity Amy Mushahwar, Esq. What s New? Not That Much. Some have their heads in the cloud we prefer to stay down in the weeds and know

More information

2014 Financial Services Industry Compliance Benchmark Study

2014 Financial Services Industry Compliance Benchmark Study 2014 Financial Services Industry Compliance Benchmark Study Presented By: and Executive Summary Beginning in early December 2013, SAI Global Compliance conducted a survey among compliance professionals

More information

Healthcare Payment Processing: Managing Data Security and Privacy Risks

Healthcare Payment Processing: Managing Data Security and Privacy Risks Moderator: Linda A. Malek Chair, Healthcare Moses & Singer LLP Healthcare Payment Processing: Managing Data Security and Privacy Risks Thursday, September 13, 2012 Panelists: Beth L. Rubin Senior Counsel

More information

OUTSOURCING DUE DILIGENCE FORM

OUTSOURCING DUE DILIGENCE FORM OUTSOURCING DUE DILIGENCE FORM SERVICE TO BE OUTSOURCED 1. Type of service to be outsourced: Accounting/Finance: Compliance Consulting: Legal Services: Administrative Functions: Information Technology:

More information

IT Insights. Managing Third Party Technology Risk

IT Insights. Managing Third Party Technology Risk IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate

More information

SANTANDER CONSUMER USA HOLDINGS INC. CORPORATE GOVERNANCE GUIDELINES

SANTANDER CONSUMER USA HOLDINGS INC. CORPORATE GOVERNANCE GUIDELINES SANTANDER CONSUMER USA HOLDINGS INC. CORPORATE GOVERNANCE GUIDELINES Good governance, ethical conduct, accountability and transparency are essential to the success of a public company. The Board of Directors

More information

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should

More information

Vendor Management Challenge Doing More with Less

Vendor Management Challenge Doing More with Less Vendor Management Challenge Doing More with Less Megan Hertzler Assistant General Counsel Director of Data Privacy Xcel Energy Boris Segalis Partner InfoLawGroup LLP Session ID: GRC-402 Insert presenter

More information

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015 Cyber Security Auditing for Credit Unions ACUIA Fall Meeting October 7-9, 2015 Topics Introduction Cyber Security Auditing Program Discuss an effective and compliant Cyber Security Auditing Program from

More information

Proposed Principles to be addressed in APES GN 20 Outsourced Accounting Services

Proposed Principles to be addressed in APES GN 20 Outsourced Accounting Services Proposed Principles to be addressed in APES GN 20 Outsourced Accounting Services Roles and Responsibilities The proposed Guidance Note 20 Outsourced Accounting Services (GN 20) will set out the various

More information

Fundamentals Level Skills Module, F8 (IRL)

Fundamentals Level Skills Module, F8 (IRL) Answers Fundamentals Level Skills Module, F8 (IRL) Audit and Assurance (Irish) June 2008 Answers 1 (a) Prior year internal control questionnaires Obtain the audit file from last year s audit. Ensure that

More information

Who s Your Vendor? Secondary Market Compliance and Title Agent Vendor Management

Who s Your Vendor? Secondary Market Compliance and Title Agent Vendor Management Who s Your Vendor? Secondary Market Compliance and Title Agent Vendor Management 2015 LBA Bank Counsel Conference Marx Sterbcow, Managing Attorney, Sterbcow Law Group The Bureau s Scrutiny of Vendor Management

More information

ARDMORE SHIPPING CORPORATION AUDIT COMMITTEE CHARTER

ARDMORE SHIPPING CORPORATION AUDIT COMMITTEE CHARTER ARDMORE SHIPPING CORPORATION AUDIT COMMITTEE CHARTER This Audit Committee Charter ("Charter") has been adopted by the Board of Directors (the "Board") of Ardmore Shipping Corporation (the "Company"). The

More information

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies

More information

INDEPENDENT CONTRACTOR SUPPLIER AGREEMENT. and include your affiliates. We, us, our, and ours refer to ConSol Partners, LLC. Client refers to.

INDEPENDENT CONTRACTOR SUPPLIER AGREEMENT. and include your affiliates. We, us, our, and ours refer to ConSol Partners, LLC. Client refers to. Parties You, your, and yours refer to INDEPENDENT CONTRACTOR SUPPLIER AGREEMENT and include your affiliates. We, us, our, and ours refer to ConSol Partners, LLC. Client refers to. Services Provided We

More information