OPERATIONAL RISK MANAGEMENT IN FINANCIAL INSTITUTIONS: PROCESS ASSESSMENT IN CONCORDANCE WITH BASEL II
|
|
|
- Kevin Higgins
- 10 years ago
- Views:
Transcription
1 OPERATIONAL RISK MANAGEMENT IN FINANCIAL INSTITUTIONS: PROCESS ASSESSMENT IN CONCORDANCE WITH BASEL II B. Di Renzo, M. Hillairet, M. Picard, A. Rifaut Centre de Recherche Public Henri Tudor (Luxembourg) {bernard.direnzo, magali.hillairet, michel.picard, C. Bernard, D. Hagen, P.Maar, D. Reinard Commission de Surveillance du Secteur Financier (Luxembourg) Abstract The improvement of banks operational risk management frameworks concerns new requirements addressed in the Basel II Framework, a new capital adequacy regulation proposed by the Basel Committee on Banking Supervision (BCBS). Basel II will apply to internationally active banks and to all banks and investment firms in the EU via transposition of a new Directive into national regulations. By doing so, the national financial supervisory authority (CSSF )in Luxembourg, and a public research center (CRPHT) have engaged in a joint research project that investigates solutions conformant to ISO/IEC for assessing operational risk management frameworks implemented in banks. The ISO/IEC requirements can meet the CSSF s expectation on consistent, transparent and sound risk assessments, as well as the expectation on promoting enhancements in institutions risk management practices without dictating the form or operational detail of their policies and practices. Moreover, although the domain is largely outside the scope of software and systems engineering, the ISO/IEC process assessment standard provides for an adequate solution to the so-called supervisory review process. This adequacy is validated through the structure of Basel II and financial domain requirements. Last but not least, we will show that ISO/IEC provides an adequate approach to assessing institutions in two sub-domains, namely the domain of credit operational risk management and the domain of IT risk management (including IT security risks management). 1. Introduction The reviewed focus of ISO/IEC on process assessment in domains other than software and system engineering provides for interesting innovation perspectives for both research and markets within a large spectrum of business areas. Our research lies within this extended scope of process assessment including non-it domains in an epistemological approach by investigating the
2 application of IT-related methods and techniques inside financial institutions. It provides for a generic building block approach for financial sector supervisors 1 to assess the appropriateness of institutions operational risk management and measurement systems as an integral part of the socalled supervisory review process. Indeed the international banking sector and supervisors alike now face new challenges with the requirements spelled out in the Revised Framework for International Convergence of Capital Measurement and Capital Standards (often referred to as the Basel II Framework ) proposed by the Basel Committee on Banking Supervision 2 [2]. Besides financial risks such as credit and market risks, Basel II highlights the link between risk exposures and operational risk capital charges and proposes in particular three approaches for calculating the operational risk minimum capital charges in a continuum of increasing sophistication and risk sensitivity. Banks are encouraged to move along the spectrum of available approaches. In this context, an emerging question for the financial institutions is: how to move along the spectrum of available techniques by developing more sophisticated operational risk measurement systems and practices? And for supervisors: how to assess and review banks operational risk management practices and systems as well as their compliance with the qualifying criteria of one of the three approaches for calculating minimum capital requirements? To investigate both these questions and to provide for new methods allowing banks and financial supervisors to address these challenging tasks are the purpose of the joint research project between the Commission de Surveillance du Secteur Financier 3 (CSSF) and the CRP Henri Tudor. 4 After an initial modeling of IT risk management, our research has lead us to broaden our scope by investigating the use of ISO/IEC [9] as a federative approach to assess and improve operational risk management in the financial institutions and thereby warranting a coherent risk control method to be implemented by those institutions. This paper draws our first answers to how an operational risk management process reference model (PRM) and associated process assessment model (PAM) built on the new regulatory requirements or expectations can be of tremendous usefulness for the financial institutions and supervisors. The Basel II Framework is presented in the next section with a focus on operational risks. The proposed solution, mainly a PRM and PAM, is described in section 3, and its validation is explained in section 4. Future work, presented in section 5, concerns further validation and also integration with two complementary approaches. Conclusions are found in section Operational risk management in financial institutions During the past decade financial institutions have been modifying both their products and internal processes at a rapid pace leading to an increased exposure to operational risk. Consequently supervisors of financial institutions have expressed increased concerns on institutions potential 1 Bank supervisors are some national entities having the power to control compliance to national banking laws and to terminate unsafe and unsound banking practices in their country. 2 The Basel Committee consists of senior representatives of bank supervisory authorities and central banks from Belgium, Canada, France, Germany, Italy, Japan, Luxembourg, the Netherlands, Spain, Sweden, Switzerland, the United Kingdom, and the United States. 3 CSSF is the national supervisory authority of the financial sector in Luxembourg and represents Luxembourg at the Basel Committee. 4 CRP Henri Tudor is a public research centre based in Luxembourg.
3 exposures to operational risk and institutions will be required to enhance their risk management capabilities with respect to their operational processes. Although well-defined tools and techniques are used for the assessment and modeling of financial risks inherent in financial products, comparable approaches are still in a developing stage on the operational risk side. Up to now, no international agreement has been reached on how to actually implement or assess compliance with those requirements. This research aims at showing that a solution for the assessment of operational risk management compliant with ISO/IEC standards may form a sound basis to meeting those future regulatory requirements The Basel II framework One of the aims of the new capital framework is to strengthen the stability of the international banking system. This stability objective is expected to be achieved by improving the soundness of the international banks, in particular through a closer alignment of capital to actual risks ( risksensitive capital requirements ) and the improvement of risk management practices currently in use in those institutions. The framework is decomposed into three pillars. The first pillar sets out the calculation of minimum capital requirements. The second pillar addresses the supervisory review processes aiming at ensuring the appropriateness of the capital level chosen by each bank as well as encouraging better risk management practices. The third pillar addresses market discipline through disclosure requirements on banks risk exposures and measurement systems. New requirements addressing the improvement of operational risk management inside the banks are found in each of these three pillars. Moreover, within the first pillar, the framework proposes three different approaches for the calculation of minimum capital requirements with regard to operational risk in an increasing order of risk-sensitivity and sophistication: the Basic Indicator Approach, the Standardized Approach and the Advanced Measurement Approach. The Basic Indicator Approach uses a single risk indicator as a proxy for a bank s overall exposure to operational risk, whereas the Advanced Measurement Approach relies on comprehensive analysis of internal and external loss data, scenario analysis and aspects of the business and internal controls. This latter approach requires the definition of operational risk categories and the mapping of historical loss data into the risk categories. Thus this approach calls for a more detailed operational risk model Operational risk management It has become more than a recognized fact over the last decade that large observed bank losses originated from vulnerabilities in the operational processes and appearances of threats which together cause operational loss events. One striking example is the collapse of Barings Bank in 1996 where misuses of accounts ( assets ) by a rogue trader ( threat ), lack of accounting control and audit as well as inappropriate segregation of duties ( vulnerabilities ) were at the source of fraudulent transactions. As can be seen in this example, although IT risk has to be considered and constitutes one of the four operational risk causes, the main concern is about non-it operational risks, such as for instance risks related to inappropriate processes and procedures of a bank s trading activities.
4 As a result of this, the definition of operational risk used in this work is the one stated in the Basel II framework, which is based on the four identified causes of operational risk at financial institutions: Operational risk is defined as the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events. This definition includes legal risk, but excludes strategic and reputational risk [2, 644]. 3. Operational risk management assessment conformant to ISO/IEC The Basel II framework does not constraint banks on how to implement the framework, but just sets the goals that must be fulfilled by each bank. This can be considered as a strong requirement: the assessment method cannot impose any constraint on the actual implementation of the framework. Moreover, because the operational risk management has a high level of consistency (i.e. [It] is conceptually sound and is implemented with integrity. 5 [2] ), this imposes a high expected level of consitency (repeatability, reliability, ) on the assessment process. The ISO/IEC standard is compatible with both constraints. The focus on business operational level leads to an innovating use of the standard for non-it processes with the expectation to preserve the intrinsic characteristics. Moreover the standard does not only offer the flexibility of encompassing current good or best industry practices, but also the emergence of new bank practices within an innovation perspective. This section describes a solution based on ISO/IEC and designed to assess processes not belonging to the IT domain. Although the proposed solution is compliant with ISO/IEC requirements, the focus of this paper is about the compliance with financial domain requirements. The term requirement will refer to financial domain requirements except when ISO/IEC requirements are explicitly stated. In this section, an adequate structuring of requirements about the Basel II Framework is presented, before explaining how this is used during the design of the solution Basel II requirements analysis A good requirements analysis, as a key input into the project, leads to build a knowledge base structuring all the requirements the solution must satisfy. This was important in this work due to the use of very different kinds of sources of information. The main sources are the publications of the Basel Committee: mainly, the description of the Basel II Framework [2], and the Sound Practices for the Management and Supervision of Operational Risk [3]. Another important source were the workshops organized by the CSSF where supervisors described their expectations on banks operational risk management framework and the assessments organizational constraints. Then, descriptions of risk management methods and good practices were used (e.g. EBIOS [6]). Finally, information gathered from banks and finance experts via personal communications, conference proceedings and technical reports was exploited. Although the requirements acquisition resulted in a significant number of statements (more than 400), their analysis allowed building a structure based on taxonomies. Some examples are given 5 In the rest of the paper, the requirements extracted from [1] can be found on pages 137 to 149.
5 hereafter for the specific Basel II domain, the risk management domain and the responsibilities aspects Requirements structure based on the three Basel II approaches. As mentioned in section 2.1, three approaches are proposed in the Basel II Framework for the calculation of minimum capital requirements for operational risk. So, the requirements were structured along those three approaches. For instance, the requirement that As part of the bank s internal risk assessment system, the bank must systematically track relevant operational risk data including material losses by business lines [2] is essential to the Standardized Approach. Moreover, these approaches are ranked in increasing order of sophistication. Generally the more advanced approach encompasses the requirements of the less sophisticated approaches. This structure has been adopted for the definition of the categories of requirements. For instance, if a bank adopts an Advanced Measurement Approach, it will have to meet the following requirement: Any internal risk measurement system must be consistent with [...] the loss event types [...] [2] in addition to the requirement given above for the Standardized Approach Requirements structure based on risk management activities. The structure of the risk management activities can also be gathered from the requirements. For instance, the requirement The operational risk management function is responsible for developing strategies to 1. identify 2. assess 3. monitor 4. control/mitigate operational risk. [2] indicates activities composing the management of risks. In this example the following activities are identified: Risk identification, Risk assessment, Risk monitoring and Risk mitigation/control Requirements structure based on responsibilities. Some requirements refer to a clear assignment of responsibilities and authorities, such as the requirement that the bank must have techniques for creating incentives to improve the management of operational risk throughout the firm. [2]. This example shows that financial and managerial incentives must be used in order to ensure that each bank employee contributes to the improvement of the operational risk management framework. Another example is contained in the requirement: The operational risk management function is responsible for developing strategies to 1. identify 2. assess 3. monitor 4. control/mitigate operational risk. [2]. The categories based on the approaches were taken into account as follows: for each activity, each responsibility, the requirements corresponding to an approach were gathered. This resulted in an easy access to the requirements that a financial institution must satisfy: they can easily be found in the requirements collection in line with the selected approach and any other indicators. To conclude, the requirements have been given a rich structure that helps to find the right solution to implement them, as can be seen in the next section.
6 3.2. Operational risk management PRM and PAM The structure of requirements has been used to develop an ISO/IEC compliant PRM and PAM for operational risk management assessment. First, the activities have been reflected into the structure of the PRM. Yet, the PRM is further structured in two main categories, namely: "Primary" and "Support" (see Figure 1). In the Primary category, two subgroups form the core of operational risk management: the first one addresses operational risk analysis including identification and assessment of operational risks; and the second one addresses the operational side of operational risks management including operational risk control and monitoring (see process exemplar in Table 1). Operational Risk Mgt PRM PRIMARY Basic Operational Risk Analysis (BORA) BORA.1 Operational Risk Identification BORA.2 Operational Risk Assessment Basic Operational Risk Operation (BORO) BORO.1 Operational Risk Control BORO.2 Operational Risk Monitoring Business Continuity Mgt (BCM) Outsourcing Risk Management (ORM) Extract from ISO/IEC Amd 1 ORGANIZATIONAL Management (MAN) MAN.1 Organizational Alignment MAN.2 Organizational Management Process Improvement Mgt (PIM) PIM.1 Process Establishment PIM.2 Process Assessment PIM.3 Process Improvement SUPPORTING Configuration Management (CONF) Internal Review (REV) Historical Loss Data Management (HLDM) HLDM.1 Historical Loss Data Collection HLDM.2 Measurement Operational Risk Management PAM Figure 1. List of PRM processes
7 Two additional processes are added to this category, business continuity and outsourcing risk management, because the nature of risks is very specific and asks for separate activities to be translated into distinguished base practices. Table 1. Operational Risk Control Description Name Operational Risk Control (BORO.1) Purpose The purpose of the Operat ional Risk Control process is to mitigate the analyzed risks and control risk that is under way. Outcome An operational risk mitigation and control strategy is developed and periodically reviewed; Outcome A security policy is developed, reviewed and communicated to all people involved in bank s operational activities; Outcome Changes in bank s organization and activities to mitigate risks are identified and implemented in accordance with bank s risk profile; and Outcome Appropriate action is taken to correct or avoid the impact of risks, and this action is tracked until risks are mitigated. In the Support category, we have a significant process group concerning the management of data about uncontrolled risk realization and related losses. These last two processes differentiate the Standardized Approach and the Advanced Measurement Approach. Broadly, in the first approach internal data is only collected, and in the second one, additional data must be collected to develop a relevant measurement system and to establish scenarios for estimating expected and unexpected losses. The last two processes of this category relate to the role of the internal review process and function of configuration management. The latter processes ensure the accuracy of all the information needed to obtain an effective and efficient operational risk management. For instance, detailed document job descriptions is mandatory, in particular, on the respective responsibilities assigned, on the accompanying incentives, as well as on all the controls put in place to detect deviations from the assigned responsibilities and tasks. That represents an original part of our work, and crosses current risk management and service management methods (e.g. EBIOS [6], ITIL [1] [4] ) with the Basel II requirements. Next to this new PRM, there is another subset of requirements directly modeled by existing processes belonging to ISO/IEC Amd 1 [8] that are grouped in an organizational category. To cover all requirements some of them are implemented in base practices of the Operational Risk Management PAM, others are better implemented by integrating them in indicators of capability level attributes. This is illustrated below, in Figure 3, illustrating requirements traceability. The PRM and PAM embrace the three approaches defined in the Basel II Framework for calculating minimum capital requirements about operational risk. Furthermore a subset of processes and a target capability profile are defined for each approach according to the Basel II Framework. Figure 2 illustrates this approach-driven process selection. In the most advanced approach, all processes are selected and associated with the highest capability target compared to the other two
8 approaches. Hence, if a bank has opted for a given approach, assessors will be aware of processes to assess as well as the capability profile that should reach to meet all requirements of this approach. Basic Indicator Approach Standardised Approach Operational Risk Mgt PRM PRIMARY Basic Operational Risk Analysis (BORA) BORA.1 Operational Risk Identification BORA.2 Operational Risk Assessment Basic Operational Risk Operation (BORO) BORO.1 Operational Risk Control BORO.2 Operational Risk Monitoring Business Continuity Mgt (BCM) Outsourcing Risk Management (ORM) Extract from ISO/IEC Amd 1 ORGANIZATIONAL Management (MAN) MAN.1 Organizational Alignment MAN.2Organizational Management Process Improvement Mgt (PIM) PIM.1 Process Establishment PIM.2 Process Assessment PIM.3 Process Improvement Operational Risk Mgt PRM PRIMARY Basic Operational Risk Analysis (BORA) BORA.1 Operational Risk Identification BORA.2 Operational Risk Assessment Basic Operational Risk Operation (BORO) BORO.1 Operational Risk Control BORO.2 Operational Risk Monitoring Busniess Continuity Mgt (BCM) Outsourcing Risk Management (ORM) Extract from ISO/IEC Amd 1 ORGANIZATIONAL Management (MAN) MAN.1 Organizational Alignment MAN.2 Organizational Management Process Improvement Mgt (PIM) PIM.1 Process Establishment PIM.2 Process Assessment PIM.3 Process Improvement SUPPORTING SUPPORTING Configuration Management (CONF) Configuration Management (CONF) Internal Review (REV) Internal Review (REV) Historical Loss Data Management (HLDM) HLDM.1 Historical Loss Data Collection HLDM.2 Measurement Historical Loss Data Management (HLDM) HLDM.1 Historical Loss Data Collection HLDM.2 Measurement Advanced Measurement Approach Operational Risk Mgt PRM PRIMARY Basic Operational Risk Analysis (BORA) BORA.1 Operational Risk Identification BORA.2 Operational Risk Assessment Basic Operational Risk Operation (BORO) BORO.1 Operational Risk Control BORO.2 Operational Risk Monitoring Busniess Continuity Mgt (BCM) Outsourcing Risk Management (ORM) Extract from ISO/IEC Amd 1 ORGANIZATIONAL Management (MAN) MAN.1 Organizational Alignment MAN.2 Organizational Management Process Improvement Mgt (PIM) PIM.1 Process Establishment PIM.2 Process Assessment PIM.3 Process Improvement SUPPORTING Configuration Management (CONF) Internal Review (REV) Historical Loss Data Management (HLDM) HLDM.1 Historical Loss Data Collection HLDM.2 Measurement Figure 2. PAM compliance with Basel Approaches For example, in a bank having chosen the basic indicator approach, assessors will assess only the primary category processes against a target capability profile set at level 1 for all these processes, without care about the support and organizational categories processes. 4. Validation of the solution Due to the complex nature of this work, different validations are performed to illustrate the appropriateness of the proposed solutions. 6 A first validation, based on the requirements, ensures the match between the requirements and the PAM. 6 A future validation is explained in section 5.
9 Then, the operational risk management model is checked against two examples of risk management of operational aspects found in financial institutions: the operational aspects of credit management and the aspects of IT management Fulfillment of the requirements A systematic design can greatly help to fulfill the requirements. The requirements are decomposed in the following taxonomy: activities ( risk control ), goals ( [...] creating incentives to improve the management of operational risk throughout the firm [...] [2]), responsibilities ( [...] the operational risk management function [...] [2]). All taxonomy elements are mapped to ISO/IEC concepts: activities are described using base practices, goals are mapped onto purposes, responsibilities corresponds to generic practices among the attributes of the capability levels, etc. This mapping is at the basis of our design rationales. Completeness is essential to be sure that the whole requirements are comprehensively introduced into the PRM and the PAM. Traceability allows finding the requirements that motivate each element occurring in the implementation of the requirements. For each requirement, its origin and its uses are specified. First, each requirement is linked to the source of information it pertains. Then, a traceability link is recorded between the requirement and its implementation in the PRM or the PAM (see Figure 3). In order to determine quickly if a requirement is implemented in the PRM or in the PAM, the requirements are tagged with the name of the process together with the attribute or the level of capability used to implement the requirement. For example, the following requirement [...] developing strategies to control operational risk [...] [2] is linked to the objective of the Risk Control Process: the purpose of the Operational Risk Control process is to mitigate the analyzed risks and control risk that is under way. BASEL II REQUIREMENT COLLECTION RISK MANAGEMENT FUNCTION Mgtfunc11 The operational risk management function is responsible for developping strategies to identify operational risk. International Convergence of Capital Measurement and Capital Standards- BIS Mgtfunc12 The operational risk management function is responsible for developping strategies to assess operational risk. International Convergence of Capital Measurement and Capital Standards- BIS RISK ASSESSMENT Level 0 Level 1 Level 2 Level 3 Level 4 Level 5 BORA1 - Operational risk identification BORA2 - Operational risk assessment Figure 3: Completeness of the requirements: example Moreover, traceability links can be used to review our design against the design rationales. For instance, in Figure 3, one can verify that all requirements concerning responsibilities are mapped into capability level 3 indicators. Deviations from this design rationale should carefully be analyzed. The opposite direction of traceability links (retro-engineering) can also be used: in the case of Figure 3, if an empty cell is found at the crossing between a responsibility requirement row and the
10 level 3 column, then the requirement set should be analyzed carefully to motivate the missing responsibility requirement Validation on credit operational risk management and IT risk management The main difficulty of our work is to successfully develop a PRM and a PAM, in accordance with ISO/IEC 15504, to a domain where core activities are related to financial products (and not IT artifacts). Therefore, it is essential to validate our PRM and PAM, to clarify the meaning of each component of the PRM and PAM in different banks operational contexts. In this case, two examples are meaningful: one within the context of banks IT management and another outside this context. This latter will be the credit operational risk management. Table 2 shows the PRM covering the credit operational as well as the IT risks management processes. For each identified outcome of the PRM, an example is given in the credit operational risk management domain and the IT risk management domain. This example has been extended to other process elements and indicators of capability level attributes. Table 2. Application of operational risk control process to IT and credit Name Purpose Outcome 1 Outcome 2 Outcome 3 Outcome 4 Operational Risk Control (BORO.1) The purpose of the Operational Risk Control process is to mitigate the analyzed risks and control risk that is under way. An operational risk mitigation and control strategy is developed and periodically reviewed; A security policy is developed, reviewed and communicated to all people involved in bank s operational activities; Changes in bank s organization and activities to mitigate risks are identified and implemented in accordance with bank s risk profile; Appropriate action is taken to correct or avoid the impact of risks, and this action is tracked until risks are mitigated. IT The strategy aims to target vulnerabilities in IT infrastructure of a bank like extranet, hardware and software access control, A security policy is developed for people involved in IT operation of a bank. For example, each employee has to renew its password each other month. (Other examples can be found in [10]) Firewall deployment plans reducing intrusion risks are defined and executed, and login monitoring are planned and implemented. When monitoring system detect a intrusion in the firm network, all significant information is cut off from this network and intruder is isolate or sent off. CREDIT The strategy aims to target vulnerabilities in credit operational procedures like credit granting and settlement watching. A security policy is developed for people involved in credit operation. For example, employee are asked to carefully verify and authenticate the input data given to credit analysis procedures. Add a quality system for new credit request to ensure traceability and truthfulness of all information used to grant a credit. When a lack of settlement is identified, a reminder is sent to customer, his others credits are closely watched and no more credit will be granted to him before straightening out of his existing credits. 5. Discussion Recent surveys give insights about how banks and financial institutions will implement the Basel II Framework. 7 This section will focus on the financial institution view of the Basel II Framework. 7 For instance, Ernst & Young has announced the results of their worldwide survey [7]: nearly 80% of respondents were almost confident in the implementation of the framework, and 50% of institutions consider that they will increase their competitive advantage. Moreover, this study indicates that for over 30% of the respondents Basel II implementation will be the main driver of investments envisaging the enhancement of the risk management systems in place.
11 5.1. Competitive opportunities The implementation of the Basel II framework has numerous advantages for bank shareholders, such as a capital alleviating effect when using more advanced approaches, the lowering of costs associated with losses, a better reputation for mastering risks... Moreover, the Basel II framework provides an opportunity for banks to improve their risk management capabilities, because the efforts spent for improvements are financially motivated in the Basel II framework. Note that Basel II will apply to a large share of the global banking system and it will be implemented in the member countries as well as in the EU ISO/IEC advantages ISO/IEC standard is appropriate for the assessment of operational aspects. Most of the operational procedures are documented in banks due to the current regulation. This documentation and the assessments will be a good basis for improvement, which can be done at the best pace for each institution, as advocated in the Basel II Framework. The assessment model is very precise, although it does not impose any constraint on the specific definition of actual processes found in each organization. These facts increase our expectations in the usefulness and good acceptation of ISO/IEC for the implementation of the Basel II proposal Validation in banks In order to see the adequacy of our proposal and its acceptance in supervised institutions, validation of our work through experimental on-site visits at banks in Luxembourg will be needed. In particular, the assessments results should be also useful for supervisors to assess the global improvement of the market place Integration with complementary approaches To address the Basel II Framework, most of the consultants propose tools and techniques in the field of operational risk measurement bases on quantitative models (see, e.g. [11], [5]). Another direction concerns IT risk management methods (including IT security risks). Some of them were used to build the set of requirements (see Section 3.1). The models they introduce can be the basis of an operational risk management method compatible with our assessment method. Our future work will also concern the integration of those two complementary directions with the assessment method. 6. Conclusions The highlight of operational risk management by Basel II Framework into the banking industry and its supervisors offers promising innovation perspective for process assessment in the financial sector. Indeed banks need for operational risk management improvement combined with the need of banking supervisors to spell out operational risk management review and assessment
12 methodologies were at source of a joint research project between the CSSF and the CRP Henri Tudor with a PRM and a PAM as main outputs. The adaptations of the PRM and the PAM by an expert team of bank supervisory from Luxembourg (CSSF), testify the appropriateness to the review of operational risk management framework in the banking industry. The intrinsic characteristics and the dual purposes (process improvement and capability determination) of ISO/IEC allow addressing operational risk management for all financial institutions regardless of their sizes. ISO/IEC appears to be especially well suitable for assessing financial institutions operational risk management and measurement systems as it addresses the three pillars of the Basel II Framework i.e. banks needs as well as supervisors ones. Depending on these outcomes, the CSSF would be willing to broaden the approach and seek cooperation with other national banking supervisors in the spirit of contributing to the international convergence of supervisory practices. 7. References [1] BARTLETT John, HINLEY David, JOHNSON Brian, et al., ITIL Service Delivery; The stationery Office; London, Great Britain, 2001 [2] Basel Committee on Banking Supervision, International Convergence of Capital Measurement and Capital Standards; Bank for International Settlements Press & communication; Basel, Switzerland, June [3] Basel Committee on Banking Supervision, Sound Practices for the Management and Supervision of Operational Risk; Bank for International Settlements Press & communication; Basel, Switzerland, February [4] BERKHOUT Michiel, HARROW Roy, JOHNSON Brian, et al., ITIL Service Support; The Stationery Office; London, Great Britain, 2000 [5] CHOFARAS Dimitris N., Operational Risk Control with Basel II, Elsevier Finance, Oxford, [6] Direction centrale de la sécurité des systèmes d'information, Expression des Besoins et Identification des objectifs de Sécurité (EBIOS); Paris, France, February [7] Ernst & Young, Ernst & Young global risk survey on current views on Basel II Accord, News Release, ( _February_2004_(Eng)/$file/E&Y global risk survey on Basel II (en)@19feb04.pdf), Feb. 19, [8] ISO/IEC 12207:1995/FDAM 1:2002(E), Information technology Software life cycle processes; ISO; Geneva, Switzerland, [9] ISO/IEC Information Technology Process Assessment: part1 - Part5; ISO; Geneva, Switzerland, 2003 [10] ISO/IEC Code of Practice for Information Security Management: Editor's Draft. Berlin, Germany, June [11] KING Jack L., Operational Risk; Wiley Finance, Series, New York, 2001.
An Overview of ISO/IEC 27000 family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
On the Setting of the Standards and Practice Standards for. Management Assessment and Audit concerning Internal
(Provisional translation) On the Setting of the Standards and Practice Standards for Management Assessment and Audit concerning Internal Control Over Financial Reporting (Council Opinions) Released on
Positioning the internal audit function within the Solvency II framework Key challenges. Ludovic Bardon Senior Manager Audit Deloitte Luxembourg
Positioning the internal audit function within the Solvency II framework Key challenges Jérôme Sosnowski Director Governance, Risk & Compliance Deloitte Luxembourg Ludovic Bardon Senior Manager Audit Deloitte
Basel Committee on Banking Supervision. Working Paper No. 17
Basel Committee on Banking Supervision Working Paper No. 17 Vendor models for credit risk measurement and management Observations from a review of selected models February 2010 The Working Papers of the
INTERAGENCY GUIDANCE ON THE ADVANCED MEASUREMENT APPROACHES FOR OPERATIONAL RISK. Date: June 3, 2011
Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation Office of the Comptroller of the Currency Office of Thrift Supervision INTERAGENCY GUIDANCE ON THE ADVANCED MEASUREMENT
BEYOND AMA PUTTING OPERATIONAL RISK MODELS TO GOOD USE POINT OF VIEW
POINT OF VIEW BEYOND AMA PUTTING OPERATIONAL RISK MODELS TO GOOD USE AUTHORS Ramy Farha, Principal Tom Ivell, Partner Thomas Jaeggi, Principal Evan Sekeris, Partner A long history of incidents, ranging
Regulated Outsourcing
Regulated Outsourcing Contents 3 The Luxembourg financial centre 4 Outsourcing in the financial industry 5 The statute of Support PSF 7 Services 9 Benefits of working with a Support PSF The Luxembourg
GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK
SUPERVISORY AND REGULATORY GUIDELINES: PU-0412 Operational Risk 25 th November, 2013 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK 1. INTRODUCTION 1.1. The Central Bank of The Bahamas ( the Central
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, [email protected] Abstract: The term of scenario is used
Basel Committee on Banking Supervision. Consultative Document. Standards. Capital floors: the design of a framework based on standardised approaches
Basel Committee on Banking Supervision Consultative Document Standards Capital floors: the design of a framework based on standardised approaches Issued for comment by 27 March 2015 December 2014 This
Security metrics to improve information security management
Security metrics to improve information security management Igli TASHI, Solange GHERNAOUTIHÉLIE HEC Business School University of Lausanne Switzerland Abstract The concept of security metrics is a very
Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management
Advisory Guidelines of the Financial Supervisory Authority Requirements regarding the arrangement of operational risk management These Advisory Guidelines have established by resolution no. 63 of the Management
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
Implementing COBIT based Process Assessment Model for Evaluating IT Controls
Implementing COBIT based Process Assessment Model for Evaluating IT Controls By János Ivanyos, Memolux Ltd. (H) Introduction New generations of governance models referring to either IT or Internal Control
Underwriting put to the test: Process risks for life insurers in the context of qualitative Solvency II requirements
Underwriting put to the test: Process risks for life insurers in the context of qualitative Solvency II requirements Authors Lars Moormann Dr. Thomas Schaffrath-Chanson Contact [email protected]
Capital Adequacy: Advanced Measurement Approaches to Operational Risk
Prudential Standard APS 115 Capital Adequacy: Advanced Measurement Approaches to Operational Risk Objective and key requirements of this Prudential Standard This Prudential Standard sets out the requirements
PRINCIPLES FOR EVALUATION OF DEVELOPMENT ASSISTANCE
PRINCIPLES FOR EVALUATION OF DEVELOPMENT ASSISTANCE DEVELOPMENT ASSISTANCE COMMITTEE PARIS, 1991 DAC Principles for Evaluation of Development Assistance Development Assistance Committee Abstract: The following
Integrated Information Management Systems
Integrated Information Management Systems Ludk Novák [email protected] ANECT a.s. Brno, Czech Republic Abstract The article tries to find consensus in these tree different types of the systems the
ISO 19600: The development
1 Baltzer Science Publishers ISO 19600: The development of a global standard on compliance management By Sylvie Bleker and Dick Hortensius* It has been a traditional complaint of the global compliance
Ref: B15.01 Eumedion response draft revised OECD principles on corporate governance
Organisation for Economic Co-operation and Development (OECD) Corporate Governance Committee 2, rue André Pascal 75775 Paris Cedex 16 France The Hague, 2 January 2015 Ref: B15.01 Subject: Eumedion response
University of St. Gallen Law School Law and Economics Research Paper Series. Working Paper No. 2008-19 June 2007
University of St. Gallen Law School Law and Economics Research Paper Series Working Paper No. 2008-19 June 2007 Enterprise Risk Management A View from the Insurance Industry Wolfgang Errath and Andreas
ISO/IEC 20000 IT Service Management - Benefits and Requirements for Service Providers and Customers
ISO/IEC 20000 IT Service Management - Benefits and Requirements for Service Providers and Customers Authors Ralf Buchsein, Manager, KESS DV-Beratung GmbH Klaus Dettmer, Product Manager, iet Solutions GmbH
16) QUALITY MANAGEMENT SYSTEMS
INTRODUCTION 16) QUALITY MANAGEMENT SYSTEMS The aim of this paper is to give a brief introduction to the idea of a quality management system and specifically in ISO 9001:2000: Quality Management System.
How To Manage A Financial Institution
BUSINESS CONTINUITY MANAGEMENT GUIDELINE April 2010 Table of Contents Preamble...3 Introduction...4 Scope...5 Coming into effect and updating...6 1. Continuity and resumption of business...7 2. Sound and
COMPLIANCE GUIDELINE April 2009
COMPLIANCE GUIDELINE April 2009 Table of Contents Preamble...3 Introduction...4 Scope...5 Coming into effect and updating...6 1. Compliance management framework...7 2. Compliance monitoring function...8
The Influence of Software Vulnerabilities on Business Risks 1
The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal
Basel Committee on Banking Supervision. A framework for dealing with domestic systemically important banks
Basel Committee on Banking Supervision A framework for dealing with domestic systemically important banks October 2012 This publication is available on the BIS website (www.bis.org). Bank for International
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
EASY FOREX TRADING LTD DISCLOSURE AND MARKET DISCIPLINE IN ACCORDANCE WITH CAPITAL ADEQUACY AND THE REQUIREMENTS ON RISK MANAGEMENT
EASY FOREX TRADING LTD DISCLOSURE AND MARKET DISCIPLINE IN ACCORDANCE WITH CAPITAL ADEQUACY AND THE REQUIREMENTS ON RISK MANAGEMENT 31 st December 2012 Introduction For the purposes of Directive DI144-2007-05
Arnout H. E. M. Wellink. President, De Nederlandsche Bank Chairman, Basel Committee on Banking Supervision
President, De Nederlandsche Bank Chairman, Basel Committee on Banking Supervision 118 27. Mai 2008 Banking Supervision in Europe: Developments and Challenges 1. The banking system has gone through major
MODEL FOR IT GOVERNANCE ASSESSMENT IN BANKS BASED ON INTEGRATION OF CONTROL FUNCTIONS
MODEL FOR IT GOVERNANCE ASSESSMENT IN BANKS BASED ON INTEGRATION OF CONTROL FUNCTIONS Ivana Dvorski Lacković PBZ stambena štedionica d.d., Croatia [email protected] Abstract: Nowadays banks
EIB Group Risk Management Charter
EIB Group Risk Management Charter 16 th July 2015 EIB Group Risk Management Charter A. Definitions Core definitions are outlined in this section. These definitions shall establish a common language for
14 December 2006 GUIDELINES ON OUTSOURCING
14 December 2006 GUIDELINES ON OUTSOURCING CEBS presents its Guidelines on Outsourcing. The proposed guidelines are based on current practices and also take into account international, such as the Joint
Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement
Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.
Guidelines on the Application of the Supervisory Review Process under Pillar 2 (CP03 revised)
25 January 2006 Guidelines on the Application of the Supervisory Review Process under Pillar 2 (CP03 revised) Table of contents Executive Summary...2 Chapter 1: Introduction...4 Chapter 2. Guidance for
Software and IT Asset Management Standards: Benefits for Organizations and Individuals
Note: This article first appeared in ITAK, the journal of the International Association of IT Asset Managers see www.iaitam.org. The author is David Bicket, Convener of ISO/IEC JTC1 SC7 WG21. The views
An Overview of Basel II s Pillar 2
An Overview of Basel II s Pillar 2 Seminar for Senior Bank Supervisors from Emerging Economies Washington, DC 23 October 2008 Elizabeth Roberts Director, FSI Topics to be covered Why does Pillar 2 exist?
Integrated Operational Risk Management Beyond Basel II
Integrated Operational Risk Management Beyond Basel II Navin Shankar Patel and Godwin George An integrated approach towards Operational Risk Management (ORM) initiatives is required for a bank to be risk
Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.
Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security
Outsourcing Risk Guidance Note for Banks
Outsourcing Risk Guidance Note for Banks Part 1: Definitions Guideline 1 For the purposes of these guidelines, the following is meant by: a) outsourcing: an authorised entity s use of a third party (the
CONSULTATION PAPER ON HIGH LEVEL PRINCIPLES ON OUTSOURCING COVER NOTE
CEBS CP 02 April 2004 COMMITTEE OF EUROPEAN BANKING SUPERVISORS CONSULTATION PAPER ON HIGH LEVEL PRINCIPLES ON OUTSOURCING COVER NOTE Introduction 1. European banking supervisors began work in 2002 on
Information security risk management using ISO/IEC 27005:2008
Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor [email protected] [email protected] March, 29 th 2011 1
IIA Position Paper: THE THREE LINES OF DEFENSE IN EFFECTIVE RISK MANAGEMENT AND CONTROL
IIA Position Paper: THE THREE LINES OF DEFENSE IN EFFECTIVE RISK MANAGEMENT AND CONTROL JANUARY 2013 TABLE OF CONTENTS Introduction... 1 Before the Three Lines: Risk Management Oversight and Strategy-Setting...
ISO/IEC 15504 Part 2 provides the following copyright release:
Copyright Notice This document reproduces relevant material from ISO/IEC 15504:2003 Information Technology Process Assessment Part 2: Performing an assessment and ISO/IEC FCD 15504:2005 Information Technology
ISO/IEC 20000 Part 1 the next edition. Lynda Cooper project editor for ISO20000 part 1
ISO/IEC 20000 Part 1 the next edition Lynda Cooper project editor for ISO20000 part 1 Agenda The ISO20000 series Why has it changed Changes ITIL3 impact New requirements Changed requirements How to prepare
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
Public Interest Entities
Public Interest Entities Background This agenda paper sets out the Task Force s views as to: whether additional auditor independence requirements currently applied to listed entities should also be applied
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries
IOSCO/MR/54/2015 Madrid, 22 December 2015 IOSCO reports on business continuity plans for trading venues and intermediaries The Board of the (IOSCO) today published two reports that seek to enhance the
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
Ensuring Cloud Security Using Cloud Control Matrix
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring
SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT
SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT Through CGIAR Financial Guideline No 3 Auditing Guidelines Manual the CGIAR has adopted the IIA Definition of internal auditing
Basel Committee on Banking Supervision
Basel Committee on Banking Supervision Reducing excessive variability in banks regulatory capital ratios A report to the G20 November 2014 This publication is available on the BIS website (www.bis.org).
ISO/IEC 90003:2004 covers all aspects
Huge potential user base for ISO/IEC 90003 the state of the art for improving quality in software engineering ISO/IEC 90003:2004, Software engineering Guidelines for the application of ISO 9001: 2000 to
IOPS GOOD PRACTICES IN RISK MANAGEMENT OF ALTERNATIVE INVESTMENTS BY PENSION FUNDS
. IOPS GOOD PRACTICES IN RISK MANAGEMENT OF ALTERNATIVE INVESTMENTS BY PENSION FUNDS June 2010 1 GOOD PRACTICES IN RISK MANAGEMENT OF ALTERNATIVE INVESTMENTS BY PENSION FUNDS 1 Introduction 1. The objective
Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Frequently Asked Questions
Guide to the Sarbanes-Oxley Act: IT Risks and Controls Frequently Asked Questions Table of Contents Page No. Introduction.......................................................................1 Overall
Blending Corporate Governance with. Information Security
Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power
Information technology Security techniques Information security management systems Overview and vocabulary
INTERNATIONAL STANDARD ISO/IEC 27000 Third edition 2014-01-15 Information technology Security techniques Information security management systems Overview and vocabulary Technologies de l information Techniques
The Asset Management Landscape
The Asset Management Landscape ISBN 978-0-9871799-1-3 Issued November 2011 www.gfmam.org The Asset Management Landscape www.gfmam.org ISBN 978-0-9871799-1-3 Published November 2011 This version replaces
Basel Committee on Banking Supervision. Peer review of supervisory authorities implementation of stress testing principles
Basel Committee on Banking Supervision Peer review of supervisory authorities implementation of stress testing principles April 2012 Copies of publications are available from: Bank for International Settlements
Data quality and metadata
Chapter IX. Data quality and metadata This draft is based on the text adopted by the UN Statistical Commission for purposes of international recommendations for industrial and distributive trade statistics.
Basel Committee on Banking Supervision. Consolidated KYC Risk Management
Basel Committee on Banking Supervision Consolidated KYC Risk Management October 2004 Table of contents Introduction...4 Global process for managing KYC risks...5 Risk management...5 Customer acceptance
RESERVE BANK OF VANUATU OPERATIONAL RISK MANAGEMENT
RESERVE BANK OF VANUATU DOMESTIC BANK PRUDENTIAL GUIDELINE NO 12 OPERATIONAL RISK MANAGEMENT 1. This Guideline outlines a set of principles that provide a framework for the effective management of operational
Common Criteria Evaluations for the Biometrics Industry
Common Criteria Evaluations for the Biometrics Industry Kathy Malnick Senior Manager Criterian Independent Labs An initiative of the WVHTC Foundation Presentation outline Common Criteria defined Common
Mapping of outsourcing requirements
Mapping of outsourcing requirements Following comments received during the first round of consultation, CEBS and the Committee of European Securities Regulators (CESR) have worked closely together to ensure
International Workshop Agreement 2 Quality Management Systems Guidelines for the application of ISO 9001:2000 on education.
ISO 2002 All rights reserved ISO / IWA 2 / WD1 N5 Date: 2002-10-25 Secretariat: SEP-MÉXICO International Workshop Agreement 2 Quality Management Systems Guidelines for the application of ISO 9001:2000
MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION
MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION (MIPIE) An exploration of challenges and opportunities for developing indicators
IT Governance. What is it and how to audit it. 21 April 2009
What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures
Audit of the Test of Design of Entity-Level Controls
Audit of the Test of Design of Entity-Level Controls Canadian Grain Commission Audit & Evaluation Services Final Report March 2012 Canadian Grain Commission 0 Entity Level Controls 2011 Table of Contents
Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini
Personal data and cloud computing, the cloud now has a standard by Luca Bolognini Lawyer, President of the Italian Institute for Privacy and Data Valorization, founding partner ICT Legal Consulting Last
EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS
WWW.WIPRO.COM EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS Using tactical workforce intelligence to optimize talent and set the cornerstone to manage workforce competency risks. Suvrat Mathur,
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
Solvency II and key considerations for asset managers
120 Solvency II and key considerations for asset managers Thierry Flamand Partner Insurance Leader Deloitte Luxembourg Xavier Zaegel Partner Financial Risks Leader Deloitte Luxembourg Sylvain Crepin Director
ISO/IEC 20000 Part 1 the next edition
ISO/IEC 20000 Part 1 the next edition Lynda Cooper Independent Consultant UK representative to ISO and project editor for ISO20000 part 1 Synopsis ISO/IEC 20000 part 1 was published in 2005. Since then,
ISO 9001. What to do. for Small Businesses. Advice from ISO/TC 176
ISO 9001 for Small Businesses What to do Advice from ISO/TC 176 ISO 9001 for Small Businesses What to do Advice from ISO/TC 176 ISO Central Secretariat 1, chemin de la Voie-Creuse Case postale 56 CH -
Practice guide. quality assurance and IMProVeMeNt PrograM
Practice guide quality assurance and IMProVeMeNt PrograM MarCh 2012 Table of Contents Executive Summary... 1 Introduction... 2 What is Quality?... 2 Quality in Internal Audit... 2 Conformance or Compliance?...
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
Central Bank of The Bahamas Consultation Paper PU42-0408 Draft Guidelines for the Management of Interest Rate Risk
Central Bank of The Bahamas Consultation Paper PU42-0408 Draft Guidelines for the Management of Interest Rate Risk Policy Unit Bank Supervision Department April16 th 2008 Consultation Paper Draft Guidelines
Constructing Trusted Code Base XIV
Constructing Trusted Code Base XIV Certification Aleksy Schubert & Jacek Chrząszcz Today s news (on tvn24bis.pl) (June 6th on BBC) security vulnerability CVE-2014-0224 was discovered by Masashi Kikuchi
PensionsEurope position paper on personal pension products
March 2014 PensionsEurope position paper on personal pension products About PensionsEurope PensionsEurope represents national associations of pension funds and similar institutions for workplace pensions.
EA IAF/ILAC Guidance. on the Application of ISO/IEC 17020:1998
Publication Reference EA IAF/ILAC-A4: 2004 EA IAF/ILAC Guidance on the Application of ISO/IEC 17020:1998 PURPOSE This guidance document is for ISO/IEC 17020: General Criteria for the operation of various
Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS
MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33
GAM. Out management company services
GAM Out management company services Enjoy the following advantages by partnering with GAM We provide management company substance and services in Luxembourg We offer high-quality services combined with
Basel II. Tamer Bakiciol Nicolas Cojocaru-Durand Dongxu Lu
Basel II Tamer Bakiciol Nicolas Cojocaru-Durand Dongxu Lu Roadmap Background of Banking Regulation and Basel Accord Basel II: features and problems The Future of Banking regulations Background of Banking
CEIOPS Advice for Level 2 Implementing Measures on Solvency II: Articles 120 to 126. Tests and Standards for Internal Model Approval
CEIOPS-DOC-48/09 CEIOPS Advice for Level 2 Implementing Measures on Solvency II: Articles 120 to 126 Tests and Standards for Internal Model Approval (former Consultation Paper 56) October 2009 CEIOPS e.v.
Basel Committee on Banking Supervision. Results from the 2008 Loss Data Collection Exercise for Operational Risk
Basel Committee on Banking Supervision Results from the 2008 Loss Data Collection Exercise for Operational Risk July 2009 Requests for copies of publications, or for additions/changes to the mailing list,
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire
IT Security Standards and Legal Metrology Transfer and Validation
EPJ Web of Conferences 77, 00001 ( 2014) DOI: 10.1051/ epjconf/ 20147700001 C Owned by the authors, published by EDP Sciences, 2014 IT Security Standards and Legal Metrology Transfer and Validation F.
1. promoting an efficient and effective financial system that adequately finances economic growth, and
Remarks by Ms. Phillips at the Asset/Liability and Treasury Management Conference of the Bank Administration Institute Remarks by Ms. Susan M. Phillips, a member of the Board of Governors of the US Federal
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) Revised: October 2012 i Table of contents Attribute Standards... 3 1000 Purpose, Authority, and Responsibility...
