Managing Business Risk

Size: px
Start display at page:

Download "Managing Business Risk"

Transcription

1 Managing Business Risk A practical guide to protecting your business Consultant editor: Jonathan Reuvid KoganPage

2 CONTENTS Foreword, by Steve Fowler, Chief Executive, Institute of Risk Management xiii Contributors' notes xv Introduction 1 Jonathan Reuvid PART ONE Boardroom focus on risk issues Risk recognition in the boardroom and its management 5 Chris Hodge, Financial Reporting Council Introduction 5 The role of the board 6 The changing nature of risk Risk appetite: cut through the hype 11 Allan Gifford, DNV KEMA Introduction 11 The challenges 11 Designing a risk appetite 17 Expressing risk appetite 18 Using risk appetite as the basis for risk control 20 References Capital project risk management: foundations to mastery 25 Ben Cattaneo, Accenture Risk Management Capital project risk management and its benefits 27 Mastery - capital project risk management to drive capital effectiveness 31 Copyright and disclaimer 32 Notes 33 Sources and references 33

3 ^^ Contents 1.4 Asset integrity risk management 35 Allan Gifford, DNV KEMA Introduction 35 Overall approach to asset integrity management 35 Resources 42 The link and alignment of asset risk management with ISO Note 53 Reference Piercing the corporate veil: liability of parent companies for the actions of their subsidiaries 55 Paul Eccles, Rachel Reeves and Jocelyn Kirkwood, Shoosmiths The principles of the corporate veil 55 When a claim might be made against a parent company instead of its subsidiary 56 Parental responsibility 57 Practical steps to protect or reduce a parent company's liability to its subsidiary - the corporate angle 59 Practical steps to protect or reduce a parent company's liability to its subsidiary - the insurance angle 60 Summary A new dawn for board oversight 63 Amanda Morrison, KPMG LLP Corporate governance developments 63 Has it all gone horribly wrong? 64 What are we trying to achieve? 64 Do we understand who is doing what? 65 Has risk management been properly embedded into our business processes? 65 Have we considered our risk appetite? 66 Do we view risks in isolation? 66 Have we factored scenario planning into our risk management processes? 67

4 Contents 1.7 Positive risk: the upside issues 69 Simon King, DNV KEMA Introduction 69 Organizational challenges 70 How do we see positive risk? 70 Positive risk terminology 72 Reinforcing the paradigm of downside risk 74 Think like an entrepreneur? 74 What we can do in practice 74 Notes 75 References 75 PART TWO Approaches to operational risk management Risk-based security 79 Dr Morten Bremer Maerli, DNV KEMA Characteristics of security risks 80 Components of security risks 81 Reduction of security risk 83 Conclusion 84 Notes 85 References Preparing for uncertainty: using scenarios 87 Hans Laess0e, The LEGO Group Introduction 87 The first approach 87 Defining 'scenarios version 2' 89 Preparing for the scenario process 89 Preparing for the future: the process 91 Preparing for the future: the value 94

5 jm Contents 2.3 Operational risk in finance: lessons learned from safety-critical industries 95 Gunnar Hauland and Sverre Danielsen, DNV The evolution of a systems perspective on safety 95 What is human error? 96 Controls as barriers 97 Learning from incident registration and investigation 98 Learning from risk analyses 98 Organizational culture 99 Conclusion Managing risks in the supply chain: reaching new standards 103 Eric E Lehmann, Accenture Introduction 103 Improving the management of risks in the supply chain 106 Taking risk management live Software and Cloud escrow: an effective tool for managing risk and new business opportunities in Stephan Peters, Deposix Software Escrow GmbH Introduction 111 What can go wrong: negative examples and risky situations 112 What can go right - positive examples and opportunities gained 113 Escrow explained 114 Risk and opportunity management with software escrow 118 Conclusion 121 Notes 122 Reference Frugal enterprise risk management and ISO Steven Shackleford, Peter Maggs and Irvine Lauder, WMSNT Limited Introduction 125 The context for frugal risk management in the present decade 125 The application of ISO to the charity 126 The benefits of frugal risk management 133 References 134

6 Contents PART THREE Risk management applications Understanding cyber security risk 137 Martin Sutherland, BAE Systems Detica The new threats 137 Businesses are at risk 139 Managing the risk 140 Developing a strategy Managing business risk in the life sciences industry 143 Mukadder Erdonmez, XL Group Introduction and overview of the life sciences sector 143 Risks and challenges associated with innovation Independent assessment and certification: good for food safety - good for business 149 Cor Groenveld, Lloyd's Register Quality Assurance (LRQA) How it all began - the emergence of food safety 149, The drive to harmonization 151 Where we are today 152 The role of independent third-party certification 153 Key components of a robust assessment process 154 Summary Opportunities and pitfalls of distance learning 157 Eric Lynn, mylifeqs Attractions of distance learning 159 Ideal vs less suitable contexts for distance learning 159 Organization-specific learning programmes 160 Risks of distance learning programmes 161 Overcoming the challenges Current risk issues in employment 165 Kevin McCavish, Shoosmiths When an employee resigns without notice, what is the effective date of dismissal? 165 TUPE service provision changes: how to spot an 'activity' 167

7 ^0 Contents PART FOUR Risk assessments of high-growth emerging markets Managing business risks in Brazil 173 Geert Aalbers and Thomaz Favaro, Control Risks Introduction 173 The changing face of risk management in the BRICs 174 Business risks in Brazil 175 Closing remarks China: balancing opportunity and threat 181 Jonathan Reuvid, Hethe Management Services Political risk 182 Economic risk 184 Business environment risk 186 Summary 187 References Russia: business risk in Carlo Gallo Political risk 190 Operational risk 192 Security risk 194 Conclusion 196 Acknowledgement India: the risk environment 197 Chietigj Bajpaee, Vivekananda International Foundation Reform agenda on the back burner 198 Corruption reborn 199 Political pressures take precedence 202 Notes 203 References 204

8 Contents 4.5 Thailand: manageable business risk 205 Eric Lynn, mylifeqs Background 205 Business regulations for investors 207 Buildings 208 Political risk 208 People and everyday life 209 Summing up South-East Asia: managing risk regionally through delegation 213 Stephen Gill, Stephen Gill Associates Geography and population 213 South-East Asia's economics 214 Political landscape 214 Social, cultural and spiritual diversity 215 Business approach and risk 215 Authority, responsibility and accountability 216 Delegation of authority 216 Effective delegation of authority implementation 217 Corruption risk and managing corruption risk 217 A final word of caution 219 Appendix: Contributors' contact list 221 Index 225 Index of advertisers 231

Foreword, by Steve Fowler, Chief Executive, The Institute of Risk Management (IRM) Contributors notes. Introduction 1

Foreword, by Steve Fowler, Chief Executive, The Institute of Risk Management (IRM) Contributors notes. Introduction 1 xiii Contents Foreword, by Steve Fowler, Chief Executive, The Institute of Risk Management (IRM) Contributors notes xxix xxxiii Introduction 1 Part 1: Elements of Risk Management 3 1.1 An appetite for

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Take the right steps 9 principles for building the Risk Intelligent Enterprise

Take the right steps 9 principles for building the Risk Intelligent Enterprise Take the right steps 9 principles for building the Risk Intelligent Enterprise Contents 9 principles for building a Risk Intelligent Enterprise 2 The Risk Intelligent Framework 4 1. Is risk a threat or

More information

Figure 1: Global Aggregates: Industrial Production (% MoM Ann., 3M moving average)

Figure 1: Global Aggregates: Industrial Production (% MoM Ann., 3M moving average) Figure 1: Global Aggregates: Industrial Production (% MoM Ann., 3M moving average) World Advanced Economies Emerging Market Economies Notes: Nowcasts are in red. World is the PPP-weighted average of US,

More information

Accenture Risk Management. Industry Report. Life Sciences

Accenture Risk Management. Industry Report. Life Sciences Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive

More information

Linking Risk Management to Business Strategy, Processes, Operations and Reporting

Linking Risk Management to Business Strategy, Processes, Operations and Reporting Linking Risk Management to Business Strategy, Processes, Operations and Reporting Financial Management Institute of Canada February 17 th, 2010 KPMG LLP Agenda 1. Leading Practice Risk Management Principles

More information

The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework

The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework Dorothy Gjerdrum, ARM-P, Chair of the ISO 31000 US TAG and Executive Director,

More information

RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer

RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer RISK MANAGEMENT FRAMEWORK 1 SUMMARY The Risk Management Framework consists of the following: Risk Management policy Risk Management strategy Risk Management accountability Risk Management framework structure.

More information

Corporate Portfolio Management

Corporate Portfolio Management Corporate Risk Corporate Portfolio Management Capital allocation from a risk-return perspective Premise Aligning the right information with the right people to make effective corporate decisions is one

More information

Introduction to Business Continuity Planning

Introduction to Business Continuity Planning Introduction to Business Continuity Planning Business Continuity and Disaster Resilience Forum May 10, 2012 Rizal Ballroom A, Makati Shangri-la Manila, Philippines Dr Goh Moh Heng President BCM Institute

More information

This is a sample chapter from A Manager's Guide to Service Management. To read more and buy, visit http://shop.bsigroup.com/bip0005 BSI British

This is a sample chapter from A Manager's Guide to Service Management. To read more and buy, visit http://shop.bsigroup.com/bip0005 BSI British A Manager s Guide to Service Management A Manager s Guide to Service Management Jenny Dugmore Shirley Lacy First published in the UK in 1995 by BSI, 389 Chiswick High Road, London W4 4AL Second edition

More information

IT Governance Charter

IT Governance Charter Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za [email protected] 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms

More information

IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS

IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS 1 Module 1: Principles of Risk and Risk Management Module aims The aim of this module is to provide an introduction to the principles and concepts of risk and

More information

Aegon Global Compliance

Aegon Global Compliance Aegon Global Compliance GLOBAL Charter COMPLIANCE CHARTER aegon.com The Hague, June 1, 2013 Information sheet Target audience: All employees and management of Aegon companies Issued by: Aegon N.V. Group

More information

Commonwealth Risk Management Policy

Commonwealth Risk Management Policy Commonwealth Risk Management Policy 1 July 2014 Department of Finance Business, Procurement and Asset Management 978-1-922096-51-7 (Print) 978-1-922096-50-0 (Online) Copyright Notice Content This work

More information

International Diploma in Risk Management Syllabus

International Diploma in Risk Management Syllabus International Diploma in Risk Management Syllabus Module 1: Principles of Risk and Risk Management The aim of this module is to provide an introduction to the principles and concepts of risk and risk management.

More information

KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com

KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com KPMG Internal Audit 2015: Top 10 considerations for private equity firms kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Historically, private equity has been less regulated than other parts of

More information

DATA PROTECTION OFFICER PROGRAMME

DATA PROTECTION OFFICER PROGRAMME EXECUTIVE EDUCATION DATA PROTECTION OFFICER PROGRAMME BE EXCEPTIONAL. THE HENLEY WAY. www.henley.ac.uk/dpo DATA PROTECTION OFFICER PROGRAMME The biggest European-wide reform of data protection and privacy

More information

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

Business Continuity Planning and Management for Law Firms

Business Continuity Planning and Management for Law Firms Business Continuity Planning and Management for Law Firms Nick Brook and Caroline Poynton Published by In association with Business Continuity Planning and Management for Law Firms is published by Ark

More information

Agenda. The world out there it matters. Insurance realities managing the business. Risk.oh no. Measuring things. We need to invest? And Eat.

Agenda. The world out there it matters. Insurance realities managing the business. Risk.oh no. Measuring things. We need to invest? And Eat. Dynamic Asset Liability Management in Today s Complex Economic Development Peter Ryan-Kane, Managing Director, Head of Portfolio Advisory, Asia Pacific Keith Walter, South East Asia Market Leader & Director

More information

9:00-9:05 Welcoming Remarks: Conference Organizer

9:00-9:05 Welcoming Remarks: Conference Organizer 2nd Annual Asia Offshore Association Summit 18:00-19:00 June 2, 2015 Welcome Cocktail: Baan Noi, The Mandarin Oriental Bangkok June 3-4, 2015 Level 2, the Royal Ballroom, The Mandarin Oriental Bangkok

More information

IFAD Policy on Enterprise Risk Management

IFAD Policy on Enterprise Risk Management Document: EB 2008/94/R.4 Agenda: 5 Date: 6 August 2008 Distribution: Public Original: English E IFAD Policy on Enterprise Risk Management Executive Board Ninety-fourth Session Rome, 10-11 September 2008

More information

E-commerce and Development Key Trends and Issues

E-commerce and Development Key Trends and Issues E-commerce and Development Key Trends and Issues Torbjörn Fredriksson Chief, ICT Analysis Section UNCTAD, Division on Technology and Logistics ([email protected]) Workshop on E-Commerce,

More information

Cyber Risk & Insurance

Cyber Risk & Insurance Cyber Risk & Insurance The Risk Managers Forum Thursday 27 November 2014 One-day conference Grange City Hotel, 8-14 Cooper s Row, London EC3N 2QB Event sponsor Headline sponsor Cyber Risk & Insurance The

More information

Safer food supply chains why assessments are great news for your business

Safer food supply chains why assessments are great news for your business Safer food supply chains why assessments are great news for your business Article By Vel Pillay, a food safety expert for LRQA America; and Cor Groenveld, Global Food Product Manager of LRQA and chairman

More information

Enterprise Risk Management

Enterprise Risk Management Enterprise Risk Management Topic Gateway Series No. 49 1 Prepared by Jasmin Harvey and Technical Information Service July 2008 About Topic Gateways Topic Gateways are intended as a refresher or introduction

More information

2015 Global venture capital confidence survey results How confident are investors? September 15, 2015

2015 Global venture capital confidence survey results How confident are investors? September 15, 2015 2015 Global venture capital confidence survey results How confident are investors? September 15, 2015 Contents Survey methodology, demographics and key findings Economic trends Regional and country investing

More information

Enterprise-Wide Risk Assessment

Enterprise-Wide Risk Assessment Enterprise-Wide Risk Assessment Agenda 1. Definition of risk. 2. Risk drivers in higher education today. 3. Implementing an enterprise-wide risk management (ERM) program to effectively assess, manage,

More information

State of the Art: Risk Management. Jeff M. Spivey, CPP President Security Risk Management

State of the Art: Risk Management. Jeff M. Spivey, CPP President Security Risk Management State of the Art: Risk Management Jeff M. Spivey, CPP President Security Risk Management Risk Management Jeff Spivey, CPP President Security Risk Management, Inc. Challenge the traditional assumptions

More information

Overview of Asian Insurance Markets

Overview of Asian Insurance Markets Overview of Asian Insurance Markets Simon Walpole Session Number: TPS2 Joint IACA, IAAHS and PBSS Colloquium in Hong Kong www.actuaries.org/hongkong2012/ Market Ranking in Asia Notes: 1. Colored boxes

More information

Digital Transformation In The Age Of The Customer: A Spotlight On B2C

Digital Transformation In The Age Of The Customer: A Spotlight On B2C A Custom Thought Leadership Spotlight Commissioned By Accenture Interactive October 2015 Digital Transformation In The Age Of The Customer: A Spotlight On B2C RESULTS FOCUSING ON B2C FROM THE THOUGHT LEADERSHIP

More information

Placing a Value on Enterprise Risk Management ADVISORY

Placing a Value on Enterprise Risk Management ADVISORY Placing a Value on Enterprise Risk Management ADVISORY Placing a Value on Enterprise Risk Management 1 In turbulent economic times, the case for investing in an enterprise risk management (ERM) program

More information

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should

More information

MBA Dissertation Summary

MBA Dissertation Summary MBA Dissertation Summary Barriers and Enablers to Environmental Sustainability Implementation in UK Business The purpose of the dissertation was to answer the following research question: What are the

More information

ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR

ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR Knowledge RECOGNITION Skills retention Further excellence behaviour Ability COMPETENCE QUALIFICATION ISO 9001 Training services SGS ACADEMY www.sgs.com sgs academy transforming people and businesses As

More information

Internal Audit Landscape 2014

Internal Audit Landscape 2014 Internal Audit Landscape 2014 Agenda Examining the evolution of risk in today s digital world and the impact on traditional audit, security, risk, and compliance functions Emerging internal audit methodologies

More information

Cyber Security Risks for Banking Institutions.

Cyber Security Risks for Banking Institutions. Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions

More information

CYBER SECURITY FOUNDATION - OUTLINE

CYBER SECURITY FOUNDATION - OUTLINE CYBER SECURITY FOUNDATION - OUTLINE Cyber security - Foundation - Outline Document Administration Copyright: QT&C Group Ltd, 2014 Document version: 0.2 Author: N R Landman (MD and Principal Consultant)

More information

UBIQUITY, INC. FORM 8-K. (Current report filing) Filed 08/12/14 for the Period Ending 07/18/14

UBIQUITY, INC. FORM 8-K. (Current report filing) Filed 08/12/14 for the Period Ending 07/18/14 UBIQUITY, INC. FORM 8-K (Current report filing) Filed 08/12/14 for the Period Ending 07/18/14 Address 9801 RESEARCH DRIVE IRVINE,, CA 92618 Telephone 7029970504 CIK 0001538329 Symbol UBIQ SIC Code 7374

More information

NIST Cybersecurity Framework & A Tale of Two Criticalities

NIST Cybersecurity Framework & A Tale of Two Criticalities NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented

More information

Accreditation Application Forms

Accreditation Application Forms The Institute of Risk Management The Institute of Risk Management Accreditation Application Forms Universities and Professional Associations The Institute of Risk Management Accreditation Application Forms

More information

PROTIVITI FLASH REPORT

PROTIVITI FLASH REPORT PROTIVITI FLASH REPORT Even Retailers and Consumer Products Manufacturers Must Manage Compliance with the U.S. Foreign Corrupt Practices Act and Other Anti-Bribery Laws May 3, 2012 Recent reports of alleged

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

DISCLOSEABLE TRANSACTION STRATEGIC DIVESTMENT OF ASIA CONSUMER AND HEALTHCARE DISTRIBUTION BUSINESS

DISCLOSEABLE TRANSACTION STRATEGIC DIVESTMENT OF ASIA CONSUMER AND HEALTHCARE DISTRIBUTION BUSINESS Hong Kong Exchanges and Clearing Limited and The Stock Exchange of Hong Kong Limited take no responsibility for the contents of this announcement, make no representation as to its accuracy or completeness

More information

TAX MANAGEMENT CONSULTING. How can you be more efficient at managing tax?

TAX MANAGEMENT CONSULTING. How can you be more efficient at managing tax? TAX MANAGEMENT CONSULTING How can you be more efficient at managing tax? NEW HEAD OF TAX/CFO TAX TRANSPARENCY Business Case Dispute Resolution Finance Transformation Authority Interaction Compliance Delivery

More information

Board oversight of risk: Defining risk appetite in plain English

Board oversight of risk: Defining risk appetite in plain English www.pwc.com/us/centerforboardgovernance Board oversight of risk: Defining risk appetite in plain English May 2014 Defining risk appetite in plain English Risk oversight continues to be top-of-mind for

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

for the Entire Organization

for the Entire Organization Enterprise Risk Management A Common Framework for the Entire Organization Philip E. J. Green ELSEVIER AMSTERDAM. BOSTON. HEIDELBERG. LONDON NEW YORK OXFORD. PARIS. SAN DIEGO SAN FRANCISCO. SINGAPORE. SYDNEY.

More information

Chief Risk Officers in the Mutual Fund Industry: Who Are They and What Is Their Role Within the Organization?

Chief Risk Officers in the Mutual Fund Industry: Who Are They and What Is Their Role Within the Organization? Chief Risk Officers in the Mutual Fund Industry: Who Are They and What Is Their Role Within the Organization? Background Everyone within an organization has some responsibility for managing risk. In the

More information

This is a licensed product of Ken Research and should not be copied

This is a licensed product of Ken Research and should not be copied 1 TABLE OF CONTENTS 1. Asia-Pacific Insurance Industry 1.1. Industry Introduction 1.2. Asia-Pacific Insurance Market Size by Direct Written Premium, 2005-2012P 1.3. Asia-Pacific Insurance Market Segmentation

More information

Global Security Program Overview

Global Security Program Overview STATE STREET GLOBAL SECURITY Global Security Program Overview ASIS International Kansas City Chapter March 5, 2015 Stephen D Baker CPP Vice President & Deputy Chief Security Officer About State Street

More information

Smart Grid America: Securing your network and customer data. Michael Assante Vice President and Chief Security Officer March 9, 2010

Smart Grid America: Securing your network and customer data. Michael Assante Vice President and Chief Security Officer March 9, 2010 Smart Grid America: Securing your network and customer data Michael Assante Vice President and Chief Security Officer March 9, 2010 About NERC The electric industry s self-regulatory organization for reliability

More information

Report of the Audit and Risk Committee

Report of the Audit and Risk Committee 10 December 2014 Council 7 To consider Report of the Audit and Risk Committee Issue 1 Twice a year the Audit and Risk Committee prepares a report for Council which details the work it has undertaken since

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

Risk Management Framework

Risk Management Framework Risk Management Framework Mandate and commitment Design of framework for managing risks Continual improvement of the framework Implementing risk management Monitoring and review of the framework Source:

More information

Building trust in the cloud. Alastair McAulay PA Consulting Group

Building trust in the cloud. Alastair McAulay PA Consulting Group Building trust in the cloud overcoming the inhibitors Alastair McAulay PA Consulting Group PA Knowledge Limited 2011. 2 Introduction Introduction to Alastair McAulay 25 year s experience in the IT Services

More information

Infrastructure Asset Management Report

Infrastructure Asset Management Report Infrastructure Asset Management Report From Inspiration to Practical Application Achieving Holistic Asset Management 16th- 18th March 2015, London Supported by Table of contents Introduction Executive

More information

PRIORITIZING CYBERSECURITY

PRIORITIZING CYBERSECURITY April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies

More information

Partnering Against Corruption Initiative (PACI) Heat Maps as Collective Action Tools

Partnering Against Corruption Initiative (PACI) Heat Maps as Collective Action Tools Partnering Against Corruption Initiative (PACI) Heat Maps as Collective Action Tools Gretchen Jonker, Associate Director PACI 26 June, 2014 Harnessing the strength of global business leaders to collectively

More information

Outsourcing: driving efficiency and growth. Grant Thornton International Business Report 2014

Outsourcing: driving efficiency and growth. Grant Thornton International Business Report 2014 Outsourcing: driving efficiency and growth Grant Thornton International Business Report 2014 Outsourcing trends Contents Introduction Outsourcing today Drivers Obstacles Encouraging outsourcing This report

More information

Management in an Uncertain. David A.J. Axson

Management in an Uncertain. David A.J. Axson Globalizing Performance Management in an Uncertain World David A.J. Axson Its been a crazy few years Global Financial Crisis US Debt Eurozone meltdown Volcanic ash Oil prices Terrorism Commodity prices

More information

UNITED NATIONS OFFICE FOR PROJECT SERVICES. ORGANIZATIONAL DIRECTIVE No. 33. UNOPS Strategic Risk Management Planning Framework

UNITED NATIONS OFFICE FOR PROJECT SERVICES. ORGANIZATIONAL DIRECTIVE No. 33. UNOPS Strategic Risk Management Planning Framework UNOPS UNITED NATIONS OFFICE FOR PROJECT SERVICES Headquarters, Copenhagen O.D. No. 33 16 April 2010 ORGANIZATIONAL DIRECTIVE No. 33 UNOPS Strategic Risk Management Planning Framework 1. Introduction 1.1.

More information

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed

More information

Secure Your Cloud and Outsourced Business with Privileged Identity Management

Secure Your Cloud and Outsourced Business with Privileged Identity Management Secure Your Cloud and Outsourced Business with Privileged Identity Management Table of Contents Executive Summary... 3 Understanding Privilege... 3 Do All Service Providers Get It?... 5 Managing Privilege

More information

ELECTRONIC GOVERNMENT MANAGEMENT (EGM) TRAINING SERIES

ELECTRONIC GOVERNMENT MANAGEMENT (EGM) TRAINING SERIES ELECTRONIC GOVERNMENT MANAGEMENT (EGM) TRAINING SERIES KDi Asia Pte Ltd 205 Henderson Road #02 01 Singapore 159549 Telephone: +65 62712723 E mail: [email protected] Website: www.kdiasia.com Electronic (e

More information

Operational security for online services overview

Operational security for online services overview Operational security for online services overview Microsoft Trustworthy Computing October 21, 2013 Trustworthy Computing Operational security for online services overview Legal disclaimer This document

More information

Business Architecture

Business Architecture Business Architecture A Practical Guide JONATHAN WHELAN and GRAHAM MEADEN GOWER Contents List of Figures List of Tables About the Authors Foreword Preface Acknowledgemen ts Abbreviations IX xi xiii xv

More information

The Global Cyber Security Market 2015-2025

The Global Cyber Security Market 2015-2025 Brochure More information from http://www.researchandmarkets.com/reports/3502775/ The Global Cyber Security Market 2015-2025 Description: Summary During the forecast period the demand for cyber security

More information

How To Understand And Implement Pas 55

How To Understand And Implement Pas 55 White Paper June 2009 Enabling the benefits of PAS 55: The new standard for asset management in the industry Page 2 Contents 2 Introduction 2 The PAS 55 asset management standard 4 The scope of PAS 55

More information

Digital Transformation In The Age Of The Customer: A Spotlight On B2B

Digital Transformation In The Age Of The Customer: A Spotlight On B2B A Custom Thought Leadership Spotlight Commissioned By Accenture Interactive October 2015 Digital Transformation In The Age Of The Customer: A Spotlight On B2B RESULTS FOCUSING ON B2B FROM THE THOUGHT LEADERSHIP

More information

Optimizing Global Engineering Efficiency With a Holistic Project Approach

Optimizing Global Engineering Efficiency With a Holistic Project Approach Optimizing Global Engineering Efficiency With a Holistic Project Approach When executing global projects, engineering companies have to meet challenging requirements from their customers to implement projects

More information

2nd Edition Board Effectiveness What Works Best

2nd Edition Board Effectiveness What Works Best R E S E A R C H 2nd Edition Board Effectiveness What Works Best Executive Summary x Board Effectiveness What Works Best The economic crisis that began in 2008 increased the focus on both the role of the

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Il nuovo standard ISO 22301 sulla Business Continuity Scenari ed opportunità

Il nuovo standard ISO 22301 sulla Business Continuity Scenari ed opportunità Il nuovo standard ISO 22301 sulla Business Continuity Scenari ed opportunità Massimo Cacciotti Business Services Manager BSI Group Italia Agenda BSI: Introduction 1. Why we need BCM? 2. Benefits of BCM

More information

Model Risk, A company perspective Peter K. Reilly, FSA Valuation Actuary & Head of Actuarial Strategic Initiatives Aetna, Inc

Model Risk, A company perspective Peter K. Reilly, FSA Valuation Actuary & Head of Actuarial Strategic Initiatives Aetna, Inc Model Risk, A company perspective Peter K. Reilly, FSA Valuation Actuary & Head of Actuarial Strategic Initiatives Aetna, Inc 1 Agenda Thoughts/Observations on Model Risk Practical Considerations Aetna

More information

Matthew E. Breecher Breecher & Company PC November 12, 2008

Matthew E. Breecher Breecher & Company PC November 12, 2008 Applying COSO s Enterprise Risk Management Integrated Framework Matthew E. Breecher Breecher & Company PC November 12, 2008 The basic outline for this presentation was provided by: Objectives for the session:

More information

Target Date Funds: Debating To Versus Through

Target Date Funds: Debating To Versus Through Target Date Funds: Debating To Versus Through Glenn Dial, Sr. VP, Head of Retirement Product Business Development, Allianz Global Investors Distributors LLC Scott Brooks, Head of US Retail Client Relations

More information

Q1 REVENUES. Paris April 27th, 2015

Q1 REVENUES. Paris April 27th, 2015 2015 Q1 REVENUES Paris April 27th, 2015 Disclaimer This presentation does not contain or constitute an offer of securities for sale or an invitation or inducement to invest in securities in France, the

More information

2014 Audit of the Board s Information Security Program

2014 Audit of the Board s Information Security Program O FFICE OF I NSPECTOR GENERAL Audit Report 2014-IT-B-019 2014 Audit of the Board s Information Security Program November 14, 2014 B OARD OF G OVERNORS OF THE F EDERAL R ESERVE S YSTEM C ONSUMER FINANCIAL

More information

Supply Chain Talent: The Missing Link?

Supply Chain Talent: The Missing Link? Supply Chain Talent: The Missing Link? 11/8/2012 By Lora Cecere Founder and CEO Supply Chain Insights LLC Contents Research... 2 Research Methodology and Overview... 2 Executive Overview... 3 The State

More information