Vendor. Management. For sponsorship or to become our partner, contact:

Size: px
Start display at page:

Download "Vendor. Management. For sponsorship or to become our partner, contact: marketing@achromicpoint.com"

Transcription

1 Knowledge Partner Presents 27th May Bengaluru 5th June New Delhi 24th June Mumbai Vendor Risk Management For sponsorship or to become our partner, contact: marketing@achromicpoint.com

2 About the seminar Outsourcing has become a standard worldwide business practice and management imperative to stay competitive, stay focused on organizations core businesses, deliver value to clients and leverage strength of niche organizations to drive market. With the increase in outsourcing, newer risks and challenges are on a rise continually. The major factors impacting are the growing complexity of service providers, their geographical spread, technologies, and engagement models. This is further laden with escalating expectations, integration issues, governance requirements, and external oversight. In 2014 alone multiple data breaches has materialized across the globe including India due to vendor negligence. These breaches impacted some of the industry leaders known for their security and compliance initiative. All these breaches were possible due to vulnerability in vendor s environment and / or nonexistence of optimal Vendor Risk Management program. In these scenario s, organizations are not only able to achieve the business objectives they intended but also are faced with lot of adverse risk leading to reputational, financial and customer relationship losses. Regulators are increasingly scrutinizing organizations on supplier risk and third-party compliance requirements, as a standard practice. Around the globe regulators including European Data Protection Board (EDPB), US Federal Reserve Board (FRB), Office of the Comptroller of the Currency (OCC) have issued specific guidelines to ensure enterprise wide Vendor Risk Management for outsourced services. In India, all the major regulators including RBI, SEBI, IRDA and TRAI have also issued similar guidelines to ensure compliance in such services. This seminar will focus on different aspects of vendor risk Management. In this interactive seminar; you will learn about: Typical risks resulting from third party relationships, Regulatory and compliance requirements for vendor risk management, The best practices required to build and manage a compliant program. How to prepare for regulatory reviews and audits in your organization. How to work with Vendor to set the appropriate tone for intended ethics & compliance. How to drive measurable Security and Compliance KPI s to implement a robust and seamless Vendor Risk Management Program. All discussions in this seminar will be based on real-world situations. The program, will cover the hot topics surrounding Vendor Risk Management. You will leave this seminar with a snapshot of what an effective and robust Vendor Risk Management framework will look like in a typical organization. Benefits of attending Best practices in Vendor Risk Management by the most qualified key leaders & practitioners Hear directly from key Market & thought leaders Interact directly with panel during Q&A Provide you with insight that can be immediately applied at work Who should attend Chief Procurement Officers Chief Risk Officers and Chief Ethics Officers Chief Compliance Officers Chief Audit Executives Audit Directors and Managers Vendor Relation Manager / Director Head of Legal & Compliance Internal and External Auditors Anyone newly charged with Vendor Management responsibilities

3 Seminar Topics / Agenda Topic Vendor Management: The Evolution from Mundane to Mission Critical Third-Party Risk Management in Today s Regulated Environment Mainstreaming Vendor Risk Management: Approach For Robust Framework Key Points Focus on Risks : Type of Risks Involved with vendors Different drivers for Vendor Risk Management Typical risks resulting from third party relationships Going beyond Company-Level Vendor Risk Assessments What Vendor Risk Management looks like On A Day-To-Day Basis Current scenario What Regulators say. Common deficiencies of vendor management practices used during the life of the relationship Moving from a reactive to a proactive vendor management process Real world examples to illustrate the key points and recommendations The Key Components of a Vendor Risk Management framework The Vendor Risk Management framework and model Strategic view for internal audit: how VRM integrates into Enterprise risk management (ERM) and other risk management activities of your organisations Panel Discussion Discussion Topic Best Practices for 3rd Party Risk Management Agenda 3rd parties, regulators, stakeholders: advice from the practitioners How to demonstrate effective risk management across your entire supplier base Insights into regulator expectations Key attributes of a successful Vendor Management Organization Role of Vendor Management How to satisfy your regulatory Preparing for a regulatory examination Monitoring and measuring the performance of your third parties Real world experiences - what works and what doesn t Tool on Vendor Risk Management Tool Features / Modules Tool for Vendor Management Vendor On-Boarding Relationship Management Vendor Risk Assessment Vendor Performance

4 Speakers Maninder Bhardwaj - Senior Director, Deloitte Maninder Bharadwaj is a Senior Director with ERS, Deloitte. He is national leader for Vendor Risk Management. He has successfully led and advised many organizations on vendor risk management initiatives. Maninder has a track record of proven success in performing risk assessments, establishing global compliance programs, managing audits and compliance against regulatory, standards, leading practices and establishing control environments. He has consulted and provided solutions in the areas of enterprise business, technology strategy, business process optimization / re-engineering, enterprise infrastructure design & optimization, establishing and managing global business and technology operations and change management. Maninder Bharadwaj is a certified CRISC professional. Praveen Sasidharan - Senior Manager, Deloitte Praveen Sasidharan is a Senior Manager with Deloitte ERS. He has led several advisory projects advising clients in identifying the requirements, developing VRM frameworks and implementing Vendor Risk Management initiatives in large organizations both for Indian and global companies. He has advised many senior executives in world s leading institutions on both small strategic engagements as well as large-scale delivery projects. Praveen has worked with clients across a range of industries, including financial services, consumer products, high-technology, manufacturing, IT & ITeS. Praveen Sasidharan is a certified CISM, CRISC, ITIL, ISO 27001, BS and COBIT professional. *More speakers to join in IN-HOUSE SEMINARS/TRAININGS This seminar can also be arranged for In-house Training. For more information about bringing this or other seminars to your organization, please write to us at enterprisesolutions@achromicpoint.com

5 Registration Form Vendor Risk Management Hurry up!!! Early Bird Ends 01/05/15 Registration Fees:- INR 11,500 9, % service tax Please register me for Bengaluru 27th May 2015 New Delhi 5th June 2015 Mumbai 24th June 2015 Conference fees include documentation, luncheon and refreshments. Delegates who attend all sessions will receive a Certificate of Attendance. Delegate Details: Delegate 1...Job Title... Mobile Delegate 2...Job Title... Mobile Delegate 3...Job Title... Mobile Company... Tel...Fax... Address: Cancellation and Refund Policy You must notify us by at least 48 hours in advance if you wish to send a substitute participant. Delegates may not share a pass between multiple attendees without prior authorization. If you are unable to find a substitute, please notify Achromic Point Consulting (APC) in writing up to 10 days prior to the conference date and a credit voucher valid for 1 year will be issued to you for the full amount paid, redeemable against any other APC conference. No credits or refunds will be given for cancellations received after 10 days prior to the conference date. APC reserves the right to cancel any conference it deems necessary and will not be responsible for airfare hotel or other costs incurred by registrants. No liability is assumed by APC for changes in program date content speakers or venue. Terms & Conditions:- Achromic Point holds all the rights to circulate and distribute the information discussed, shared and presented at the seminar.

The rise of third party relationships means rise in risk and regulation. Non-compliance is risky business for financial institutions

The rise of third party relationships means rise in risk and regulation. Non-compliance is risky business for financial institutions The rise of third party relationships means rise in risk and regulation Non-compliance is risky business for financial institutions Increasing dependency on third parties by banks has resulted in mandatory

More information

Mini MBA for Procurement Professionals

Mini MBA for Procurement Professionals ISO 9001:2008 Certified ISO 29990:2010 Certified ISO 29990 Mini MBA for Procurement Professionals 18-22 July 2016, London 05 09 December 2016, London Tel: +971 4 4250700 Fax: +971 4 4250701 Email: info@glomacs.ae

More information

COBIT 5 Implementation Certifi cate. Training Course & Exam

COBIT 5 Implementation Certifi cate. Training Course & Exam COBIT 5 Implementation Certifi cate Training Course & Exam Introduction The COBIT 5 Implementation Certifi cate is a Practitioner Level Training Course that focuses on how to apply COBIT 5 (The Framework

More information

WHITE PAPER THIRD PARTY MANAGEMENT: FUNDAMENTALS

WHITE PAPER THIRD PARTY MANAGEMENT: FUNDAMENTALS THIRD PARTY MANAGEMENT: FUNDAMENTALS by Linda Tuck Chapman Sponsored by Third Party Management Fundamentals Third Party Management isn t new, but its importance is growing in every industry and the financial

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could not only maintain, but update and upgrade

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

Business Process Management. How to Thrive During the Economic Downturn. 27-29 November 2016, Doha - Qatar ISO 29990

Business Process Management. How to Thrive During the Economic Downturn. 27-29 November 2016, Doha - Qatar ISO 29990 ISO 9001:2008 Certified ISO 29990:2010 Certified (Certificate No:1007049195) ISO 29990 (Certificate No: 1078694951) Business Process Management 27-29 November 2016, Doha - Qatar 05Jun16 The PMI Registered

More information

Third-Party Cybersecurity and Data Loss Prevention

Third-Party Cybersecurity and Data Loss Prevention Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management

More information

Our Services. Unlocking IT Value - Transforming IT Enabled Investments into Business Value

Our Services. Unlocking IT Value - Transforming IT Enabled Investments into Business Value Our Services Unlocking IT Value - Transforming IT Enabled Investments into Business Value Our core services IT Auditing IT Governance Consulting IT Projects Advisory Training Enterprise Risk Management

More information

Moving Forward with IT Governance and COBIT

Moving Forward with IT Governance and COBIT Moving Forward with IT Governance and COBIT Los Angeles ISACA COBIT User Group Tuesday 27, March 2007 IT GRC Questions from the CIO Today s discussion focuses on the typical challenges facing the CIO around

More information

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Vendor Management: An Enterprise-wide Focus Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Why Focus on Vendor Management Increased financial regulatory scrutiny GLBA and Identity Theft Red

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are

More information

Electronic GMP Systems

Electronic GMP Systems Electronic GMP Systems Specification - Implementation Validation 18 20 March 2015, Prague, Czech Republic SPEAKERS: Kai Kiefer fme AG, Germany Dr Bob McDowall McDowall Consulting, UK LEARNING OBJECTIVES:

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

Board of Directors Meeting 12/04/2010. Operational Risk Management Charter

Board of Directors Meeting 12/04/2010. Operational Risk Management Charter Board of Directors Meeting 12/04/2010 Document approved Operational Risk Management Charter Table of contents A. INTRODUCTION...3 I. Background...3 II. Purpose and Scope...3 III. Definitions...3 B. GOVERNANCE...4

More information

THE UH OH MOMENT. Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk

THE UH OH MOMENT. Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk THE UH OH MOMENT Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk By Lois Coatney, Chuck Walker and Joseph Yacura, ISG Directors www.isg-one.com INTRODUCTION A top

More information

KPMG in India s transparency report

KPMG in India s transparency report KPMG in India s transparency report For the year to 31 March 2016 June 2016 KPMG.com/in Table of contents Message from the Deputy Chief Executive Officer 1 1 Who we are 2 1.1 Our business 2 1.2 Our strategy

More information

Enterprise Risk Management & Information Technology

Enterprise Risk Management & Information Technology Enterprise Risk Management & Information Technology Presented by Scott Perry and Gary Ross Slalom Consulting, San Francisco Agenda Introductions Session Objectives Overview of Enterprise Risk Management

More information

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003 The Certified Information Security Manager (CISM) certification is a unique management-focused certification that has been earned by more than 16,000 professionals since its introduction in 2003. Unlike

More information

Project Management Professional (PMP) Examination Preparatory Course

Project Management Professional (PMP) Examination Preparatory Course Project Management Professional (PMP) 05-09 September 2016 Vietnam 14-SEP-15 This course is Designed, Developed, and will be Delivered under ISO 29990:2010 Standards Project Management Professional (PMP)

More information

GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in

GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in GOVERNANCE, RISK AND COMPLIANCE Internal Audit Assessing Fraud Vulnerabilities kpmg.com/in 1 Internal Audit Assessing Fraud Vulnerabilities Introduction Globalization has increased the scale and complexity

More information

Qualification in Internal Audit Leadership (QIAL ) Exam Syllabus

Qualification in Internal Audit Leadership (QIAL ) Exam Syllabus QIAL SYLLABUS MARCH 2015 Qualification in Internal Audit Leadership (QIAL ) Exam Syllabus The QIAL assessment comprises five sections: Case study 1*: Internal Audit Leadership (3 hours and 45 minutes)

More information

Risk Management Solution for NPO

Risk Management Solution for NPO Risk Management Solution for NPO Achieving Mission with Best in Governance Disclaimer While utmost care has been taken to ensure content accuracy at the time of writing, no person should rely on the contents

More information

South East Water Corporation Finance Assurance and Risk Management Committee Charter

South East Water Corporation Finance Assurance and Risk Management Committee Charter South East Water Corporation Finance Assurance and Risk Management Committee Charter Created: October 2012 Document number: BS 2359 Last reviewed: May 2015 1. Purpose The South East Water Corporation Board's

More information

Sample risk committee charter

Sample risk committee charter Sample risk committee charter 1 Next This sample risk committee charter is based on leading practices observed by Deloitte in the analysis of a variety of materials. It is important to note that the Risk

More information

TRAINING BROCHURE 2015

TRAINING BROCHURE 2015 CHAMBER CERTIFICATION ASSESSMENT SERVICES LIMITED TRAINING BROCHURE 2015 For the last 20 years, Chamber Certification Assessment Services Limited has been providing highly professional, quality training

More information

Computerised Systems in Analytical Laboratories

Computerised Systems in Analytical Laboratories ECA Certified Computer Validation Manager Course* New EU Annex 11 and Chapter 4 Requirements will be covered Computerised Systems in Analytical Laboratories Foto: DRK The Electronic Analytical GMP : Integrating

More information

GIO Workers Compensation Training Calendar. Tasmania July 2010 to June 2011

GIO Workers Compensation Training Calendar. Tasmania July 2010 to June 2011 GIO Workers Compensation Training Calendar Tasmania July 2010 to June 2011 Tasmania Training Calendar July 2010 June 2011 Course Time July Aug Sept Oct Nov Dec Feb Mar Apr May Jun Hobart (GIO Offices Level

More information

How To Write A Pca Dss Compliance Solution For Gameplan Group Ltd

How To Write A Pca Dss Compliance Solution For Gameplan Group Ltd PCI Compliance reporting solution This document describes GamePlan s PCI DSS compliance solution and its ability to assist organisations to be compliant with the regulatory requirements of the Payment

More information

IT Risk Management: Guide to Software Risk Assessments and Audits

IT Risk Management: Guide to Software Risk Assessments and Audits IT Risk Management: Guide to Software Risk Assessments and Audits Contents Overview... 3 Executive Summary... 3 Software: Today s Biggest Security Risk... 4 How Software Risk Enters the Enterprise... 5

More information

3 rd -party Security Risk Assessment

3 rd -party Security Risk Assessment 3 rd -party Security Risk Assessment Understanding Supplier Chain Risks. Presented by: Nasser Fattah CISSP, CISM, CISA, CGEIT Email: nasser.fattah@gmail.com Linkedin: www.linkedin.com/in/nasserfattah April

More information

Contents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface.

Contents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface. iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface Acknowledgements v vii viii 1 Introduction 1 1.1 Overview 4 1.2 Context 4 1.3 Purpose 8 1.4 Usage 8 2 Management

More information

HP Operational ITSM Service. For continual service improvement

HP Operational ITSM Service. For continual service improvement HP Operational ITSM Service For continual service improvement Overview Enhance service levels by applying best practices and standards Improve productivity and reduce costs Deliver true business value

More information

IFAD Policy on Enterprise Risk Management

IFAD Policy on Enterprise Risk Management Document: EB 2008/94/R.4 Agenda: 5 Date: 6 August 2008 Distribution: Public Original: English E IFAD Policy on Enterprise Risk Management Executive Board Ninety-fourth Session Rome, 10-11 September 2008

More information

There are a number of reasons why more and more organizations

There are a number of reasons why more and more organizations Christopher G. Nickell and Charles Denyer Statement on Auditing Standard No. 70 (SAS 70) is an internationally recognized auditing standard developed by the American Institute of Certified Public Accountants

More information

Raising Finance in the Bond Market

Raising Finance in the Bond Market Raising Finance in the Bond Market 18 19 September 2014, London A debt primary markets workshop Academy Who we are The educational model of the Academy is that of a "Corporate University" where the traditional

More information

IT Governance: framework and case study. 22 September 2010

IT Governance: framework and case study. 22 September 2010 IT Governance: framework and case study Presenter Yaowaluk Chadbunchachai Advisory Services Ernst & Young Corporate Services Limited Presentation topics ERM and IT governance IT governance framework IT

More information

Database Security and Auditing

Database Security and Auditing Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit

More information

[Translation] East Japan Railway Company. Corporate Governance Guidelines. Section 1 General Provisions

[Translation] East Japan Railway Company. Corporate Governance Guidelines. Section 1 General Provisions [Translation] East Japan Railway Company Corporate Governance Guidelines Section 1 General Provisions Established on November 25, 2015 Article 1 Objectives 1.1 The Company sets forth in these Guidelines,

More information

Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com www.bluefire-uk.com

Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com www.bluefire-uk.com Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com www.bluefire-uk.com 1 1. Service Description Blue Fire is a Digital and IT Practice focused on supplying individuals and

More information

www.pwc.com Third Party Risk Management 12 April 2012

www.pwc.com Third Party Risk Management 12 April 2012 www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.

More information

BITS GUIDE TO CONCENTRATION RISK

BITS GUIDE TO CONCENTRATION RISK BITS GUIDE TO CONCENTRATION RISK IN OUTSOURCING RELATIONSHIPS BITS A DIVISION OF THE FINANCIAL SERVICES ROUNDTABLE 1001 PENNSYLVANIA AVENUE, NW SUITE 500 SOUTH WASHINGTON, DC 20004 202-289-4322 WWW.BITS.ORG

More information

Driving performance and value through strategic vendor management

Driving performance and value through strategic vendor management Banking and Capital Markets Driving performance and value through strategic vendor management As companies face increasing pressure to reduce costs and improve productivity and efficiency, many are looking

More information

A Best Practice Guide

A Best Practice Guide A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals

More information

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s MANAGING THIRD PARTY RISK T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s Experis -- a different kind of talent company. Experis Tuesday, January 08,

More information

Risk health check When is yours?

Risk health check When is yours? Risk health check When is yours? 2 This page has been left blank intentionally Rethinking enterprise risk management (ERM) Today s business leaders understand the importance of risk management but they

More information

CLASSIFICATION SPECIFICATION FORM

CLASSIFICATION SPECIFICATION FORM www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information

More information

HP Cyber Security Control Cyber Insight & Defence

HP Cyber Security Control Cyber Insight & Defence HP Cyber Security Control Cyber Insight & Defence Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost

More information

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES:

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: AN ACCOUNTING COURSE ON DERIVATIVE INSTRUMENTS, HEDGING ACTIVITIES, AND FAIR VALUE Hyatt Regency Miami COURSE is authorized by IACET to offer 1.0

More information

Understanding corporate statements

Understanding corporate statements Understanding corporate statements 3 March 2015, London Analysing corporate performance Academy Who we are The educational model of the Academy is that of a "Corporate University" where the traditional

More information

South East Water Corporation Finance Audit and Risk Management Committee Charter. October 2012

South East Water Corporation Finance Audit and Risk Management Committee Charter. October 2012 South East Water Corporation Finance Audit and Risk Management Committee Charter October 2012 Version: 1.0 Page 1 of 6 DOCUMENT NUMBER BS 2359 1. Purpose The South East Water Corporation Board's Finance

More information

2014 Financial Services Industry Compliance Benchmark Study

2014 Financial Services Industry Compliance Benchmark Study 2014 Financial Services Industry Compliance Benchmark Study Presented By: and Executive Summary Beginning in early December 2013, SAI Global Compliance conducted a survey among compliance professionals

More information

Image Area. View Point. Transforming your Metrics Program with the right set of Silver Bullets. www.infosys.com

Image Area. View Point. Transforming your Metrics Program with the right set of Silver Bullets. www.infosys.com Image Area View Point Transforming your Metrics Program with the right set of Silver Bullets www.infosys.com Introduction Today s organizations are competing in a fast-paced marketplace driven by new technologies,

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Capital Requirements Directive Pillar 3 Disclosure. December 2015

Capital Requirements Directive Pillar 3 Disclosure. December 2015 Capital Requirements Directive Pillar 3 Disclosure December 2015 1. Background The purpose of this document is to outline the Pillar 3 disclosures for BlueBay Asset Management LLP ( BlueBay ). BlueBay

More information

20-21 May 2015, Lisbon, Portugal. Highlights. Speakers:

20-21 May 2015, Lisbon, Portugal. Highlights. Speakers: Speakers: Dr Afshin Hosseiny Chair of the ECA Expert Working Group on GDP, Tabriz Consulting Comply with the new EU GDP Guideline Dr Martin Egger Pharmaserv Dr Daniel Müller GMP/GDP Inspector All participants

More information

Qualification details

Qualification details Qualification details Title New Zealand Diploma in Organisational Risk and Compliance (Level 6) Version 1 Qualification type Diploma Level 6 Credits 120 NZSCED 080317 Quality Management DAS classification

More information

PTS Service Definition Document. G-Cloud 7. IT Service Continuity Management

PTS Service Definition Document. G-Cloud 7. IT Service Continuity Management PTS Service Definition Document G-Cloud 7 IT Service Continuity Management PTS Consulting Partners LLP 2015 The contents of this document must not be reproduced (wholly or in part) used or disclosed without

More information

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC Business Improvement in Universities Realigning services to drive efficiency 15th & 16th June 2016, CQ Functions Melbourne Key Speakers Benefits of attending Paul Duldig Head of University Services THE

More information

INCLUDES THE REQUIREMENTS OF THE NEW ISO 14001:2015 STANDARD

INCLUDES THE REQUIREMENTS OF THE NEW ISO 14001:2015 STANDARD INCLUDES THE REQUIREMENTS OF THE NEW ISO 14001:2015 STANDARD -Course Summary- The one day International Certifications Environmental Management Training course will introduce the attendees to organisational

More information

Introduction to Resource Management. Resource Management Seminar: Second Session Rome, 27 January 2015

Introduction to Resource Management. Resource Management Seminar: Second Session Rome, 27 January 2015 Introduction to Resource Management Resource Management Seminar: Second Session Rome, 27 January 2015 Resource Management Department 1 1 Agenda Second Session WFP s Financial Resource Management Planning

More information

When should becomes shall

When should becomes shall Deloitte Center for Regulatory Strategies When should becomes shall Rethinking compliance management for banks Contents Introduction 3 Find your baseline: Strategic self-assessment 4 Make the map: Strategic

More information

Auditing Outsourcing Arrangements

Auditing Outsourcing Arrangements Auditing Outsourcing Arrangements Eileen Healy Enterprise Risk Services Director 16 April 2015 Contact Details: - Email: - ehealy@deloitte.ie Mobile: - 086 164 3082 Session Objectives To provide an understanding

More information

ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor

ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor Cavendish Scott, Inc. 984 S. Vine St. Denver, CO. 80209 Tel. 303 480 0111 www.cavendishscott.com training@cavendishscott.com Course

More information

Past vs. Present: Third Party Risk

Past vs. Present: Third Party Risk Past vs. Present: Third Party Risk Kevin O Sullivan and Hicham Chahine 3 rd Party Risk, Crowe Horwath LLP April 30th, 2015 Agenda Drivers pushing Third Party Risk Past vs. Present Events and Trends Vendor

More information

RISK MANAGEMENt AND INtERNAL CONtROL

RISK MANAGEMENt AND INtERNAL CONtROL RISK MANAGEMENt AND INtERNAL CONtROL Overview 02-09 Internal control the Board meets regularly throughout the year and has adopted a schedule of matters which are required to be brought to it for decision.

More information

Outsourcing the HR Function Possibilities and Pitfalls

Outsourcing the HR Function Possibilities and Pitfalls Outsourcing the HR Function Possibilities and Pitfalls Corporate Research Forum 1 Executive summary A primary concern of the HR outsourcing (HRO) market has been the lack of independent and objective data

More information

Software Testing Market India

Software Testing Market India Software Testing Market India July 2014 Executive Summary Market Software Testing market in India was valued at ~ INR xx bn in 20-- and is projected to grow at a CAGR of ~ x1% between 20--- and 20-- Over

More information

ADVANCED INVESTMENT ADVISORY AGREEMENT DRAFTING BE AN EXPERT! CPD 7 hours

ADVANCED INVESTMENT ADVISORY AGREEMENT DRAFTING BE AN EXPERT! CPD 7 hours ADVANCED INVESTMENT ADVISORY AGREEMENT DRAFTING BE AN EXPERT! CPD 7 hours A BOUTIQUE COURSE FOR SMALL* INTERACTIVE GROUPS *The capacity of this course is limited to a maximum of 10 delegates Invesco Perpetual

More information

Office of the Chief Information Officer

Office of the Chief Information Officer Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business

More information

OUTSOURCING AND SERVICE AUDITOR S REPORTS

OUTSOURCING AND SERVICE AUDITOR S REPORTS OUTSOURCING AND SERVICE AUDITOR S REPORTS FREEDOM TO DO BUSINESS Outsourcing and service Auditor s Reports 3 OUTSOURCING AND SERVICE AUDITOR S REPORTS SERVICE AUDITOR S REPORTS ARE GROWING IN IMPORTANCE,

More information

Risk Management Framework

Risk Management Framework Risk Management Framework Category or Type Originally approved by, and date Administration and Management Vice Chancellor at VCAG on December 2008 Last approved revision October 2011 Sponsor Chief Operating

More information

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit 2020. Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit 2020. Abstract from Nordic ISACA Conference 2014, Oslo, Norway. Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation

More information

Client Alert. Global Information Technology & Communications Privacy, Data Protection and Information Management

Client Alert. Global Information Technology & Communications Privacy, Data Protection and Information Management Global Information Technology & Communications Privacy, Data Protection and Information Management Client Alert Umbrellas for Clouds: Risk Mitigation Strategies for SaaS Transactions www.bakermckenzie.com

More information

Terms of Reference for an IT Audit of

Terms of Reference for an IT Audit of National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor

More information

Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013

Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013 Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013 Chitra Gopalakrishnan Director KPMG LLP Agenda Introduction Business Continuity / Disaster

More information

Request For Proposal

Request For Proposal Request For Proposal Company Profile 1. Please provide your company details, including company name, address and phone number. 2. Please provide a company overview. 3. Please describe your company s history

More information

Guidelines for Independent Third Party Audit and Performance Monitoring Of SWAN. Draft for discussion

Guidelines for Independent Third Party Audit and Performance Monitoring Of SWAN. Draft for discussion Guidelines for Independent Third Party Audit and Performance Monitoring Of SWAN Draft for discussion April 2007 Department of Information Technology (DIT) Government of India, New Delhi 1. Introduction

More information

ISO 22301 Lead Auditor Training

ISO 22301 Lead Auditor Training ISO 22301 Lead Auditor Training ICOR - BCM 5000 Offered by TÜV Rheinland in partnership with the ICOR & BCI as part of the Business Continuity Management and Auditing Professional Development Programs

More information

Revised October 2013

Revised October 2013 Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience

More information

Security Control Standard

Security Control Standard Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the

More information

APPLICATION OF KING III CORPORATE GOVERNANCE PRINCIPLES 2014

APPLICATION OF KING III CORPORATE GOVERNANCE PRINCIPLES 2014 WOOLWORTHS HOLDINGS LIMITED CORPORATE GOVERNANCE PRINCIPLES 2014 CORPORATE GOVERNANCE PRINCIPLES 2014 CORPORATE GOVERNANCE PRINCIPLES 2014 This table is a useful reference to each of the King III principles

More information

Outsourcing Technology Services A Management Decision

Outsourcing Technology Services A Management Decision Outsourcing Technology Services A Management Decision A Telephone Seminar for National Banks Tuesday, July 20, 2004 And again on Wednesday, July 21, 2004 Agenda Outsourcing activities and relationships

More information

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell. COBIT 5 for Risk CS 3-7: Monday, July 6 4:00-5:00 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.net Disclaimer of Use and Association Note: It is understood that

More information

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):

More information

POV on Draft Guidelines on Managing Risks and Code of Conduct in Outsourcing of Financial Services by NBFCs

POV on Draft Guidelines on Managing Risks and Code of Conduct in Outsourcing of Financial Services by NBFCs POV on Draft Guidelines on Managing Risks and Code of Conduct in Outsourcing of Financial Services by NBFCs April 2015 For private circulation only Draft Guidelines on Managing Risks and Code of Conduct

More information

Our Commitment to Information Security

Our Commitment to Information Security Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as

More information

Credit Union Liability with Third-Party Processors

Credit Union Liability with Third-Party Processors World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with

More information

Blending Corporate Governance with. Information Security

Blending Corporate Governance with. Information Security Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

ROLE PROFILE INFORMATION SECURITY ANALYST

ROLE PROFILE INFORMATION SECURITY ANALYST ROLE PROFILE INFORMATION SECURITY ANALYST COMPANY OVERVIEW Informa is one of the world s leading knowledge providers. We create and deliver highly specialised information through publishing, events, training,

More information

OCCUPATIONAL GROUP: Facilities Support. CLASS FAMILY: Facility Management CLASS FAMILY DESCRIPTION:

OCCUPATIONAL GROUP: Facilities Support. CLASS FAMILY: Facility Management CLASS FAMILY DESCRIPTION: OCCUPATIONAL GROUP: Facilities Support CLASS FAMILY: Facility Management CLASS FAMILY DESCRIPTION: This family of positions includes those whose purpose is to oversee the operations of or the construction

More information

Practical and ethical considerations on the use of cloud computing in accounting

Practical and ethical considerations on the use of cloud computing in accounting Practical and ethical considerations on the use of cloud computing in accounting ABSTRACT Katherine Kinkela Iona College Cloud Computing promises cost cutting efficiencies to businesses and specifically

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

Project Quality Management

Project Quality Management Project Quality Management 22-24 May 2016 Qatar 19-OCT-15 This course is Designed, Developed, and will be Delivered under ISO 29990:2010 Standards Project Quality Management Why Choose this Course? What

More information