Introduction to Vendor Management
|
|
- Gervais Montgomery
- 8 years ago
- Views:
Transcription
1 Introduction to Vendor Management BOI October 15, 2013
2 Speaker Brad Smith President, Abound Resources More than 20 years experience helping community bank achieve their business goals with technology 500+ vendor evaluation projects in de novos to multibillion dollar institutions Lead negotiator representing community financial institutions on 200+ software, hardware and outsourcing contracts valued at $150+ million Develop Abound s vmrisk methodology Former Manager of Deloitte & Touche s Community Bank Technology Consulting Practice Technology advisor to several industry trade associations bsmith@aboundresources.com
3 Who We Are Management consulting firm for the community banking industry We empower community financial institutions to achieve their goals. Goals achieved. Guaranteed. Based in Austin, TX; clients in 40+ states Founded in 1997 by former bankers and Big 5 consultants 500+ software evaluations Vendor neutral Advisors average 20+ years in CFI management; lending, cash management, risk management, operations and IT Endorsed by IBAT, ICBM and CUNA
4 What We Do Goals achieved. Guaranteed. Vendor management practice (RightPath VM) Vendor Evaluations Vendor Utilization Improvement Contract Negotiations Conversion and Implementation Services Ongoing Vendor Management and Risk Monitoring
5 Agenda What is Vendor Management? Why is It Important? The Biggest Issues We See Characteristics of a Good Vendor Relationship Case Study Best Practices and How to Do It Tips to Save Time and Improve Risk Management Action Steps
6 What Is Vendor Management? Ensure each vendor: Meets your needs Fulfills their contracts Provides value to your bank Your goals: Manage the risks associated with the vendor relationship Improve vendor ROI, performance and accountability
7 What Vendor Management Is Not It is not about getting their financials and SAS 70s It is not about beating them up. No adversarial relationships. Lose-lose
8 Reliance on vendors brings risk. As such, it s a regulatory hot button that will only get hotter ROI, service levels and performance issues Why Is It Important?
9 Why It s Important Vendor Risks Vendor doesn t provide the expected service due to bankruptcy, business interruption, etc. Buying something that doesn t meet your needs or performs unsatisfactorily Vendor without proper security causing financial or reputational loss Ambiguous expectations delayed implementations, inefficient operations, extra costs, potential losses, customer impact Give up legal protections
10 Why It s Important Service Levels/Performance Issues IT is now the second largest non-interest expense in community banks Community banks typically use less than 50% of their paid for functionality Poor vendor management (both IT and non-it vendors) has a direct effect on bank s ROI Decreased efficiencies Inability to offer products and services Negative impact on customer service
11 Why It s Important Regulatory Issues Financial institutions should establish and maintain effective vendor and thirdparty management programs because of the increasing reliance on nonbank providers. Financial institutions must understand the complex nature of arrangements with outside parties and ensure adequate due diligence for the engagement of the relationships and ongoing monitoring. FFIEC
12 Why It s Important Regulatory Expectations General expectations Vendor management policy Vendor risk assessments at time of purchase and ongoing Vendor due diligence at time of purchase and ongoing Suggest Service Level Agreements (SLAs) Resources FFIEC FIL FIL Section 501(b) of GLBA Outsourcing Technology Services FDIC s Effective Practices for Selecting a Service Provider
13 The Biggest Issues We See Vendors Over promise and underdeliver No service level guarantees Finger pointing - integration and interface issues Sell and forget Don t provide due diligence info Weak selection process; (buying based solely on a demo, no consensus) Banks Over-reliance Not holding vendors accountable Not holding themselves accountable Buy and forget
14 Characteristics of a Good Vendor Relationship They Pro-actively contact you beyond error resolution and new sales Look for ways to increase utilization Annual utilization study Report of support calls Personalized updates of new enhancements They look for ways to reduce costs You Hold them accountable Hold yourselves accountable Include them occasionally in IT Steering Committee meetings Get their input into your strategic technology plan Are active in their users group Work together for BRP testing
15 Case Study Exercise Discuss TriView s Suppliers and Partners Identify Your Bank s Suppliers and Partners Simple Risk Assessment for TriView Simple Risk Assessment for Your Bank Discuss Your Bank s Due Diligence Requirements Discuss Your Bank s Contract Points
16 How to Do It Vendor management begins before the purchase Four Phases 1. Vendor Selection 2. Contract Negotiations 3. Implementation 4. Ongoing Optimization and Vendor Management Amount of Leverage You Have
17 Selecting the Right Vendor Every bank needs a good vendor selection methodology. Build it into your Purchasing Policies. For larger/complex purchases, consider a structured, objective process that puts you in charge: Needs analysis RFI/RFP Finalists Demos Due diligence Vendor selection
18 Contract Negotiations Define scope of services, products and responsibilities No gray areas! Regulatory guarantees, notification of security breaches, participation in BRP, SAS 70 and financial reports, etc. SLA specifications with incentives/disincentives Protect your interests; use outside counsel or consultant as on big purchases Orderly conversion Regular meetings
19 Contract Negotiations - SLAs An SLA is a formal negotiated agreement between the bank and their service provider. May also be a three party agreement to include multiple providers. It records the common understanding about: Services to be provided Priorities Responsibilities Performance guarantees The main purpose to agree on the level of service and the associated incentives/disincentives for meeting those responsibilities. SLA Exercise EFT Services and lost revenue
20 Implementation Poor implementation is nearly impossible to recover from Clear roles typically they install or convert, you implement For software, don t forget process redesign Project Management Best Practices Establish adequate system controls Segregated duties and dual controls
21 Ongoing Optimization and Vendor Management Put it on your IT Steering Committee Calendar Keep tabs on financial health of vendor Periodically review vendor performance Participate in user groups and band together Review invoices Identify vendor interdependencies/brp testing Review vendor s SAS70 annually Assign owners for each system
22 Highlights from Abound Resources 2010 Vendor Management Survey Generally satisfied but believe vendor management will rise in priority in next 24 months Time is the biggest challenge Inconsistent process Manual, labor intensive process Lack of executive and Board-level oversight Source: Abound Resources 2010 Vendor Management Survey
23 Time Saving Tip 1: Standardize vendor evaluation criteria Benefits Financial benefits Product functionality Technical considerations Service and support Vendor strengths Cost Total 5 year costs Capital costs Ongoing expenses Risk General Vendor risk Financial risk Contractual risk SAS 70 risk BCP risk Note: For illustration only
24 Tip 2: Agree on Evaluation Processes, When to Use Purchase Price Risk Rating Tier Evaluation Method High 1 Full RFP High 2 Full RFP High 3 or 4 Short RFP Med 1 Full RFP Med 2 Full or Short RFP Med 3 or 4 Short RFP Low 1 Short RFP Low 2 Short RFP or 2 Bid RFI Low 3 or 4 2 Bid RFI Note: For illustration only
25 Tip 3: Negotiate in compliance and time savings
26 Vendor Risk Management Conceptual Flow Vendor Risk Assessment Due Diligence Requirements Due Diligence Review Report of Adjusted Risk Note: For illustration only
27 Tip 4: Use a 4 Tiered Risk Rating Three-tiered Risk Rating Four-tiered Risk Assessment Approach Result? 107 fewer documents to request, gather, review and base recommendations from
28 Tip 5: Only Ask for Documents You re Going to Act On Note: For illustration only
29 Tip 6: Automate and/or outsource
30 Best Practices for Running Your Program Business decision, not just a compliance issue Less is more Don t get lost in the weeds Standards and checklists Simple, visually effective report
31 Action Steps 1. Inventory your vendors and contracts 2. Assign an internal owner for each vendor relationship 3. Start tracking vendor issues 4. Grade your vendors on performance 5. Update purchasing policy and adopt a selection methodology. 6. Build standard language for all contracts. 7. Set a date for presenting Vendor Management updates to IT steering Committee.
32 Conclusion Vendor management begins before the purchase Hold each other accountable it s really relationship management Regulatory scrutiny will increase but do it for business reasons
33 Questions
34 How We Might Be of Help Vendor management: Vendor management policies and programs Vendor due diligence gathering and evaluation Vendor evaluation/selection Vendor utilization improvement Vendor contract negotiations Vendor conversion and implementation assistance Risk Management and Compliance ERM Assessments and Plans Risk Management Best Practice Reviews IT Audits, Security Assessments BSA/AML Reviews, Programs Loan Review Credit Risk Management Best Practices Review Troubled bank assistance Please contact: Brad Smith President Ryan Esquell VP of Sales
8 Techniques to Improve Your Bank s Vendor Management Program. IBAT TechMecca
8 Techniques to Improve Your Bank s Vendor Management Program IBAT TechMecca February 4, 2014 Speaker 512-351-3700 bsmith@aboundresources.com Brad Smith President, Abound Resources 20+ years experience
More informationIT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
More informationVendor Management. Outsourcing Technology Services
Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring
More informationAnatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault
Anatomy of an IT Outsourcing Deal Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault 3656867 Agenda Key Considerations for IT Outsourcing Decision Anatomy of an Outsourcing
More informationTHIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s
MANAGING THIRD PARTY RISK T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s Experis -- a different kind of talent company. Experis Tuesday, January 08,
More informationHow To Build A Disaster Recovery Testing Program
Building a Disaster Recovery Testing Program Presented by Steve Carroll Email: scarroll@aboundresources.com Phone: 717-256-1865 About Our Speaker Steve Carroll is a Senior Consultant with Abound Resources.
More informationBoard Responsibility. A bank can outsource a task, but it cannot outsource the responsibility.
Third-Party Risk Board Responsibility The Board of Directors and senior management are ultimately responsible for managing activities conducted through third-party relationships as if the activity were
More informationOutsourcing Technology Services A Management Decision
Outsourcing Technology Services A Management Decision A Telephone Seminar for National Banks Tuesday, July 20, 2004 And again on Wednesday, July 21, 2004 Agenda Outsourcing activities and relationships
More information9/13/2013. 20/20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99
20/20 Vision for Vendor Management & Oversight 2013 WBA Technology Conference September 17, 2013 Ken M. Shaurette, CISSP, CISA, CISM, CRISC, IAM Director IT Services Disclaimer The views set forth are
More informationVendor Management Compliance Top 10 Things Regulators Expect
Vendor Management Compliance Top 10 Things Regulators Expect Paul M. Phillips, CFA Attorney, Adams and Reese Pamela T. Rodriguez, AAP, CIA, CISA EVP, Risk Management & Education, EastPay 2014 EastPay.
More informationCloud Computing Risks in Financial Services Companies: How Attorneys Can Best Help In An Increasingly SaaS-ified World
Cloud Computing Risks in Financial Services Companies: How Attorneys Can Best Help In An Increasingly SaaS-ified World July 30, 2015 Sutherland Webinar Michael Steinig 202.383.0804 Michael.Steinig@sutherland.com
More informationVENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
More informationOutsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP
Outsourced Third Party Relationship Management/ Vendor Management TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP 1 Risk Management Guidance 2 3 Appendix J: 4 - Key Elements Third Party Management
More informationT31: Before, During and After Outsourcing David Fong, BlackRock
T31: Before, During and After Outsourcing David Fong, BlackRock Before, During and After Outsourcing David Fong, CISA, CPA Objective o Explore reasons why some organizations choose to outsource o Understanding
More informationGrowing Vendor Management
V E N D O R M A N A G E M E N T P R O F I L E S E R I E S A Wh it e Pap e r by Ve n d or I NS I G HT an d C MPG, L L C Growing Vendor Management as a Sustainable Business Process with Automated Vendor
More informationCOMPLIANCE MANAGEMENT SYSTEM
COMPLIANCE MANAGEMENT SYSTEM Ensuring Your Bank Meets Regulatory Standards Overview of Compliance Exams Examination Purpose: Assess the quality of an institution s compliance management system (CMS) for
More informationInformation Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
More informationVendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.
Vendor Management: An Enterprise-wide Focus Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Why Focus on Vendor Management Increased financial regulatory scrutiny GLBA and Identity Theft Red
More informationBOARD OF DIRECTORS RESPONSIBILITIES FOR COMPLIANCE MANAGEMENT SYSTEMS
BOARD OF DIRECTORS RESPONSIBILITIES FOR COMPLIANCE MANAGEMENT SYSTEMS Shannon Phillips Jr. Independent Bankers Association of Texas 1700 Rio Grande Street Austin, Texas 78701 sphillips@ibat.org 512.275.2221
More informationSOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures?
SOLUTION BRIEF: CA IT ASSET MANAGER How can I reduce IT asset costs to address my organization s budget pressures? CA IT Asset Manager helps you optimize your IT investments and avoid overspending by enabling
More informationVendor Management by Banks Beyond Compliance
Managing the Business of IT Vendor Management by Banks Beyond Compliance Research conducted by: The FactPoint Group on behalf of: ITM Software Author: ITM Corporation All Rights Reserved 2008 ITM Corporation
More informationOC Chapter. Vendor Risk Management. Cover the basics of a good VRM program, standards, frameworks, pitfall and best outcomes.
OC Chapter Vendor Risk Management. Cover the basics of a good VRM program, standards, frameworks, pitfall and best outcomes. 2 Why Assess a Vendor? You don t want to be a Target for hackers via your vendors
More informationCyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s
Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices
More information2015 REGULATORY CHALLENGES FOR FINANCIAL INSTITUTIONS E L L IOT T DAVIS D E COSIMO R I S K MANAG E MENT
2015 REGULATORY CHALLENGES FOR FINANCIAL INSTITUTIONS E L L IOT T DAVIS D E COSIMO R I S K MANAG E MENT CONFERENCE COLUMBIA, SOUTH CAROLINA INTRODUCTIONS: DOWSE B. ("BRAD") RUSTIN IV is a partner with
More informationWhite Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.
More informationSoftware as a Service Decision Guide and Best Practices
Software as a Service Decision Guide and Best Practices Purpose of this document Software as a Service (SaaS) is software owned, delivered and managed remotely by one or more providers [Gartner, SaaS Hype
More informationVendor Management Compliance Top 10 Things Regulators Expect
Vendor Management Compliance Top 10 Things Regulators Expect Peter Davey, AAP VP & Director, Enterprise Payments, CapitalOne Pamela T. Rodriguez, AAP, CIA, CISA EVP, Risk Management & Education, EastPay
More informationFinTech Webinar Series: Vendor Management Principles
FinTech Webinar Series: Vendor Management Principles Evolving Best Practices of Bank Service Providers February 14, 2013 Speakers Russell Bruemmer Partner Eric Mogilnicki Partner Jeffrey Hydrick Special
More informationBank Selection & Relationship Management From RFPs to Scorecards
Bank Selection & Relationship Management From RFPs to Scorecards Mark K. Webster, CPA, CCM, Partner Daniel L. Blumen, CTP, Partner Treasury Alliance Group LLC Agenda Overview Bank Selection The RFP Process
More informationVendor Risk Management (VRM), How Much Is Enough?
Vendor Risk Management (VRM), How Much Is Enough? Purpose: This paper discusses which vendor relationships should be included in an institution s vendor oversight program and to what level they should
More informationRisk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
More informationBest-in-Class Vendor Management Office
Drive Your Business Strategy Brief IT Best-in-Class Vendor Management Office Vendor Management Should be a Core Competency of the IT Function With the role of key vendors evolving and with more vendors
More informationThird-Party Cybersecurity and Data Loss Prevention
Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management
More informationIdentifying Key Risk Indicator
PUERTO RICO PAYMENTS SYMPOSIUM Identifying Key Risk Indicator EPOCPR Services Agenda for Today Background History Regulators & Risk Management Let s have fun Regulators & Risk Assessment ACH Risks Categories
More informationAppendix J: Strengthening the Resilience of Outsourced Technology Services
Appendix J: Strengthening the Resilience of Outsourced Technology Services Background and Purpose Many financial institutions depend on third-party service providers to perform or support critical operations.
More informationBud Porter-Roth Porter-Roth Associates
How to Write an Effective RFP Bud Porter-Roth Porter-Roth Associates 1 Presentation Objectives Plan and organize the RFP effort Outline each RFP section Review requirements, including administration, technical,
More informationReclaiming Expected Savings Reinforcing Fiduciary Control
Inherent problems with outsourcing billing exist Over 80% of outsourcing bills have errors due to complexity of the contracts and volume of data Billing definitions negotiated by the provider s pursuit
More informationA Checklist for Software as a Service (SaaS) Vendors and Application Service Providers
A Checklist for Software as a Service (SaaS) Vendors and Application Service Providers This checklist is a longer version of a SaaS Checklist that appeared in the July 2009 issue of LAWPRO Magazine at
More informationSteve Bunde, HealthPartners Leanne Thyken, BCBS HCCA Upper Midwest Conference September 16, 2010
Steve Bunde, HealthPartners Leanne Thyken, BCBS HCCA Upper Midwest Conference September 16, 2010 Objectives of Vendor Oversight Strategies for Vendor Auditing Health Plan Strategies for Managing On-site
More informationThird-Party Risk Management: Busting Myths and Telling Truths
Third-Party Risk Management: Busting Myths and Telling Truths Richik Sarkar, Esq. McDonald Hopkins LLC 600 Superior Avenue, East, Suite 2100 Cleveland, OH 44114 (216) 430-2009 rsarkar@mcdonaldhopkins.com
More informationA Cautionary Tale Plus Cross-Channel Risk
Dan Tobin A Cautionary Tale Plus Cross-Channel Risk IT Examiner Supervision, Regulation & Credit Dan.tobin@bos.frb.org Agenda A Cautionary Tale Shames-Yeakel v. Citizens Financial Bank Cross-Channel Risk
More informationSupplier Relationship Management. ISM Philadelphia, Inc. September 12, 2013
Supplier Relationship ISM Philadelphia, Inc. September 12, 2013 Why does Supplier matter Increased outsourcing of strategic services More complex relationships Consolidation of suppliers to leverage spend
More informationIntroduction. Table of Contents
Introduction To stay competitive, you know how important it is to find new ways to streamline and save on your company s operations. Learning how leading companies handle commercial payments can give you
More informationGUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
More informationAre your business partners watching your back when you are watching your front?
Are your business partners watching your back when you are watching your front? Danny Shaw SE Practice Leader IT Risk Advisory Services Experis Thursday, October 4, 2012 1 Objectives: Organizations frequently
More informationRemote Deposit Capture Customer Due Diligence FFIEC Tier II Exam Considerations Plus Mobile Capture! March 5, 2014. Topics of Discussion
Remote Deposit Capture Customer Due Diligence FFIEC Tier II Exam Considerations Plus Mobile Capture! March 5, 2014 Carolyn C. Dowdy, Speaker Bank Project Solutions does not guaranty by implementing criteria
More informationJD Edwards EnterpriseOne CRM Foundation
JD Edwards EnterpriseOne CRM Foundation Common Customer Relationship Challenges CHALLENGES CAPABILITIES VALUE Unable to provide 24x7 customer service Lack of customer information impedes exceptional customer
More informationM A N A G I N G C O N U S U L T A N T
UNDERSTANDING MANAGED SERVICES RUSS HENDERSON M A N A G I N G C O N U S U L T A N T AGENDA Define Compare Implement DEFINE DEFINE Managed Services is the proactive management of an IT asset or object,
More informationagility made possible
SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate
More informationMANAGEMENT GUIDELINES IN PREPARATION FOR A STRIKE
MANAGEMENT GUIDELINES IN PREPARATION FOR A STRIKE The purpose of this publication is to provide contractors and general management personnel with suggested business guidelines in preparation for a possible
More informationVendor Management Best Practices
23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion
More informationBy: Tracy Hall. Community Bank Auditors Group Taking Your Business Continuity Plan To The Next Level. June 9, 2015
Community Bank Auditors Group Taking Your Business Continuity Plan To The Next Level June 9, 2015 By: Tracy Hall MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company,
More informationOvercoming the challenges to growth for broker-dealers
Overcoming the challenges to growth for broker-dealers The months ahead will be a challenging time for the financial services sector, and broker-dealers face significant uncertainty. A broad spectrum of
More information3 rd -party Security Risk Assessment
3 rd -party Security Risk Assessment Understanding Supplier Chain Risks. Presented by: Nasser Fattah CISSP, CISM, CISA, CGEIT Email: nasser.fattah@gmail.com Linkedin: www.linkedin.com/in/nasserfattah April
More informationCyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?
Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks? August 27, 2014 Presented by: Terry Ammons, Partner, Porter Keadle Moore Tim Davis, Senior,
More informationBlind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are
More information2015 CEO & Board University Taking Your Business Continuity Plan To The Next Level. Tracy L. Hall, MBCP
2015 CEO & Board University Taking Your Business Continuity Plan To The Next Level Tracy L. Hall, MBCP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C.
More informationENTERPRISE MANAGEMENT AND SUPPORT IN THE TELECOMMUNICATIONS INDUSTRY
ENTERPRISE MANAGEMENT AND SUPPORT IN THE TELECOMMUNICATIONS INDUSTRY The Telecommunications Industry Companies in the telecommunications industry face a number of challenges as market saturation, slow
More informationYou Can t Sue a Disaster. Assess your risk, plan for disruption, protect your firm
You Can t Sue a Disaster. Assess your risk, plan for disruption, protect your firm Speaker Bios Stacy Colvin Partner Hunton & Williams LLP Practicing law since 1993, Stacy advises on the development and
More informationMaximize Telecom Savings with TEM Business Process Outsourcing
Maximize Telecom Savings with TEM Business Process Outsourcing As telecom expense management (TEM) continues to provide significant savings to the enterprise, organizations are considering business process
More informationTechnology & Performance - esettlements - spro Vendor Performance
Technology & Performance - esettlements - spro Vendor Performance Harry Nowell Manager Corporate Procurement Technology and Performance Topic. Session 3: 10 a.m. 10 :40 a.m. Speaker Session 4: 10:50 a.m.
More informationUnderstanding Vendor Risk And Analyzing the SSAE No. 16
Understanding Vendor Risk And Analyzing the SSAE No. 16 Accelerate your Credit Union s Performance June 19, 2014 AUSTIN, TEXAS www.cuaccelerator.com Agenda Vendor Management Key Outsourcing Risk Areas
More informationMoving From a Vendor to a Partner Strategy. Chris McSwain Vice President, U.S. Benefits Walmart
Moving From a Vendor to a Partner Strategy Chris McSwain Vice President, U.S. Benefits Walmart Employer Challenges and Key Questions Employer Strategy and Use of Data Vendor / Supplier / Partner Differences
More informationNavigating Vendor Management Issues in Today s Regulatory Environment
Navigating Vendor Management Issues in Today s Regulatory Environment May 6, 2015 Elizabeth E. McGinn, Partner Moorari K. Shah, Counsel 1 Disclaimer The information contained herein is for informational
More informationREGULATORY COMPLIANCE REGULATORY COMPLIANCE SERVICES. Dynamic Solutions. Superior Results.
REGULATORY COMPLIANCE REGULATORY COMPLIANCE SERVICES Dynamic Solutions. Superior Results. PERSONALIZED HELP THAT RELIEVES THE BURDEN OF MANAGING COMPLIANCE The burden of managing risk and compliance is
More informationVENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
More informationWhite Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
More informationWHITE PAPER. Steps to select the right Outsourcing Vendor
WHITE PAPER Steps to select the right Outsourcing Vendor INTRODUCTION The process of selecting an outsourcing vendor implies a complex multistage process to evaluate not only what the provider can do,
More informationOUTSOURCING DUE DILIGENCE FORM
OUTSOURCING DUE DILIGENCE FORM SERVICE TO BE OUTSOURCED 1. Type of service to be outsourced: Accounting/Finance: Compliance Consulting: Legal Services: Administrative Functions: Information Technology:
More informationTechnology Outsourcing. Techniques for Managing Multiple Service Providers
Technology Outsourcing Techniques for Managing Multiple Service Providers Technology Outsourcing Techniques for Managing Multiple Service Providers Federal Deposit Insurance Corporation 550 17th Street
More informationBringing wisdom to ITSM with the Service Knowledge Management System
Processes 415 Bringing wisdom to ITSM with the Service Knowledge Management System 7.3 Bringing wisdom to ITSM with the Service Knowledge Management System nowledge is a process of piling up facts; wisdom
More informationHow to Choose a Cloud Backup Service Provider
How to Choose a Cloud Backup Service Provider Why Should You Protect Your Data? Sooner or later - by mischief, misfortune or mistake - Odds are you will experience a data loss. Hardware failure, accidental
More informationUC San Diego Commodity Strategy and Spend Analysis
UC San Diego Commodity Strategy and Spend Analysis October 6, 2008 Gayle Ta and Bob Neuhard Topics Commodity Strategy Commodity Analysis Strategy Development Key Performance Indicators and Metrics Executive
More informationVendor Management. Donald Cristan, VP ISO First United Bank Lubbock, TX
Vendor Management Donald Cristan, VP ISO First United Bank Lubbock, TX About Me Donald Cristan Broad Background - Experience Banking Industry since 2002 Information Technology since 1996 CISSP since 2007
More informationThought Leadership White Paper
Thought Leadership White Paper Introduction Contracts form the foundation of all businesses and every business relationship. They define every aspect of a business s activities procurement, sales, marketing,
More informationWhite paper: Nine Simple Steps to Vendor Management
White paper: Nine Simple Steps to Vendor Management March 2014 White Paper: Nine Simple Steps to Vendor Management Using a third-party vendor naturally subjects an institution to risks outside its control.
More informationSample Financial institution Risk Management Policy 2011
Sample Financial institution Risk Management Policy 2011 1 Contents Risk Management Program...2 Internal Control and Risk Management Diagram... 2 General Control Environment... 2 Specific Internal Control
More informationA new paradigm for EHS information systems: The business case for moving to a managed services solution
White Paper A new paradigm for EHS information systems: The business case for moving to a managed services solution Business solutions through information technology TM Entire contents 2005 by CGI Group
More informationVII 4.1. VII. Unfair and Deceptive Practices Third Party Risk. Third Party Risk. Introduction. Background
Third Party Risk Introduction The board of directors and senior management of an insured depository institution (institution) are ultimately responsible for managing activities conducted through third-party
More informationPayment Processor Relationships Revised Guidance
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Payment Processor Relationships Revised Guidance Financial Institution Letter FIL-3-2012 January 31, 2012 Summary:
More informationVendor Management by Banks Beyond Compliance. Research conducted by The FactPoint Group
Vendor Management by Banks Beyond Compliance Research conducted by The FactPoint Group best practices WHITE PAPER Table of Contents Introduction...1 Study Sample...2 Findings Highlights...2 Vendor Management
More informationCommunity Banking. Cross-collateralization: Handle with care. A D V I S O R Summer 2012. Managing outsourcing risks. How to carry a millionaire
Community Banking A D V I S O R Summer 2012 Managing outsourcing risks Wealth management programs How to carry a millionaire Bank Wire Cross-collateralization: Handle with care Cross-collateralization:
More informationTechnology Outsourcing. Effective Practices for Selecting a Service Provider
Technology Outsourcing Effective Practices for Selecting a Service Provider Technology Outsourcing Effective Practices for Selecting a Service Provider Federal Deposit Insurance Corporation 550 17th Street
More informationOCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
More informationThird Party Relationships
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 A B D INTRODUCTION AND PURPOSE Background Yes/No Comments 1. Does the credit union maintain a list of the third party
More informationTHIRD-PARTY RISK: HOW TO BETTER UTILIZE ENERGY VENDOR AUDITS 8/25/2015. August 27, 2015
8/25/2015 THIRD-PARTY RISK: HOW TO BETTER UTILIZE ENERGY VENDOR AUDITS August 27, 2015 Shane Torkelson, CPE, CISA, CIA Director Enterprise Risk Solutions storkelson@bkd.com 1 TO RECEIVE CPE CREDIT Participate
More informationPutting the Management Back in Vendor Management February 20, 2014
Putting the Management Back in Vendor Management February 20, 2014 Moderator: Brian O Reilly The Collingwood Group, LLC Panelists: Calvin Hagins, CFPB Ken Markison, MBA Jonathan McKernan, Wilmer Hale Dan
More informationStrategic Selection and Implementation of a Warehouse Management System (WMS)
Strategic Selection and Implementation of a Warehouse Management System (WMS) Presented By: Mike Rader June 30, 2011 AGENDA Introduction WMS Market Selecting a WMS Implementing a WMS 2 Mike Rader envista
More informationHow Your Accounts Payable Strategy Can Boost ROI ADP Procure-To-Pay Jeff White - Director of Implementations Session #1050
How Your Accounts Payable Strategy Can Boost ROI ADP Procure-To-Pay Jeff White - Director of Implementations Session #1050 2 Manual Process : Complex, Slow and Tactical Invoice Processing Price Validation
More informationBEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Communications Company One Company s Supply Chain Transformation Journey INTERVIEWS Senior Manager Supply Chain Operations Strategy Manager Procurement
More informationProcurement Outsourcing and. Shared Service Centers. SANFORD INTERNATIONAL I Global Sourcing I Supply Chain I Procurement I. www.sanfordint.com.
Procurement Outsourcing and Shared Service Centers 3rd Floor Jonsim Place 228 Queen's Road East Wan Chai Hong Kong Telephone: (852) 2861 2222 Fax: (852) 2861 2266 www.sanfordint.com.hk INTRODUCTION Procurement
More informationCredit Union Liability with Third-Party Processors
World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with
More informationMaking Automated Accounts Payable a Reality
Making Automated Accounts Payable a Reality www.merkur.com (800) 637-1704 Table of Contents Introduction...3 Executive Summary...4 Challenges in Accounts Payable...5 What is the problem?...5 How big is
More informationThe SME Engagement Handbook
The SME Engagement Handbook The purpose of this document is to help microbusinesses and small to medium enterprises ( SMEs ) interact more effectively when bidding to supply goods or services to larger
More informationOutsourcing Technology Services OT
Federal Financial Institutions Examination Council FFIEC Outsourcing Technology Services OT JUNE 2004 IT EXAMINATION H ANDBOOK TABLE OF CONTENTS INTRODUCTION... 1 BOARD AND MANAGEMENT RESPONSIBILITIES...
More informationYour Assets are Safeguarded. at Morgan Stanley
Your Assets are Safeguarded at Morgan Stanley Our valued wealth management clients have entrusted a total of more than $1.8 trillion in assets with Morgan Stanley as of September 30, 2013, making us one
More informationHow to Choose a Cloud Backup Service Provider
How to Choose a Cloud Backup Service Provider List Products Implemented in File- Properties Why Should You Protect Your Data? Sooner or later - by mischief, misfortune or mistake - Odds are you will experience
More informationTRANSFORM YOUR HOTEL PROGRAM USING LANYON
TRANSFORM YOUR HOTEL PROGRAM USING LANYON As a corporate travel manager, you face constant pressure to keep travel costs down. Yet inefficient hotel sourcing, inadequate negotiating leverage, and noncompliant
More informationContracts Administration Review Conducted by SC&H, LLC. May 2, 2013
Contracts Administration Review Conducted by SC&H, LLC May 2, 2013 Background NCTD initiated assessments and reviews: FTA compliance assessment: January July 2012 Development of compliance and oversight
More informationPart 1: A Comprehensive Approach to Operational Due Diligence
A Primer on Fund of Hedge Fund Risk Management* Part 1: A Comprehensive Approach to Operational Due Diligence Part 1: A Comprehensive Approach to Operational Due Diligence Introduction Since the launch
More information