On the horizon 2016 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint
|
|
|
- Imogene Harmon
- 9 years ago
- Views:
Transcription
1 On the horizon 2016 Hot topics for IT internal audit in financial services An Internal Audit viewpoint
2 Introduction Welcome to our fifth annual review of the information technology hot topics for internal audit in financial services. Executive management and Internal Audit departments in financial services continue to operate within an evolving environment of new regulatory requirements (e.g. MiFID II; payments), emerging risks (e.g. new technologies; mobile and digital) and expanding stakeholder expectations (drive for innovation). This environment is further challenged by the arrival of new entrants into the world of financial services that are likely to disrupt and transform the industry, such as challenger banks, the UK peer-to-peer foreign exchange start-ups or peer-to-peer insurance. There are a number of core control areas which feature in the 2016 hot topics, such as traditional high-profile items, which form the backbone of IT internal audit plans. For example, cyber security unsurprisingly features as the highest priority topic for a second year running. What is interesting to note is that even organisations with a relatively mature control environment continue to see this as a key area of audit focus as they try to align their approach with the growing regulatory expectations on how to assure such a mutating global threat. Strategic or large-scale change was another key theme which reflects the regulatory focus and growing expectations by Boards on managing strategic initiatives and providing appropriate oversight over the associated execution risk across the organisation. We had 22 organisations from across financial services participate in this survey; in comparing and contrasting the key areas of focus of IT Internal Audit departments in each of the sub-sectors, it is not surprising to see that the core areas of cyber, strategic change and third-party risk management feature consistently in the top 5 of organisations in all sub-sectors (table 2). Survey participants from the Retail Banking, Insurance and Investment sectors underlined the challenges in auditing legacy infrastructure and systems, with Retail Banking particularly highlighting the recent changes in payment models. The latter is a new topic for the year, and reflects the anticipated impact from the second Payment Services Directive (PSD2) as well as recent developments on the traditional payment models from both a regulatory and technology perspective. The Retail Banking sub-sector is facing challenges and emerging competition from new providers who are heavily investing in payments systems, while at the same time it grapples with high profile payment outages which threaten the availability of existing payments services.
3 Capital Markets respondents, on the other hand, highlight a focus on electronic trading, referencing the concern over high-frequency and automated trading practices, which increase their susceptibility to losses due to technology issues. The more mature Internal Audit departments have started using a combination of trading, audit analytics and technology specialists to understand the risks comprehensively and review those areas, including the way trading methodologies have been developed, tested and implemented in the trading platforms. This publication has been well received, both in the financial services sector and beyond, by Heads of IT Internal Audit and Heads of Audit as well as by IT Directors and IT Risk functions. We have obtained useful feedback over the years, and we will continue to both produce and enhance the publication. I truly hope that for another year this proves to be a useful resource, which can help you benchmark your own IT Audit plans for Mike Sobers Partner
4 IT Internal Audit Hot Topics: The table compares the top 10 IT Internal Audit hot topics over the past five years as identified through our annual survey of Internal Audit departments in the financial services industry. It highlights some interesting trends over time. The table also reflects the core, high-profile items that have appeared consistently in the top-10 (which are marked in bold). Rank Cyber Security Cyber Security Large Scale Change Third-Party Cyber Threat 2 Strategic Change Disaster Recovery and Resilience IT Governance and IT Risk Identity and Access Complex Financial Modelling 3 Third-Party Large Scale Change Identity & Access and Data Security Data Governance and Quality Data Leakage 4 IT Disaster Recovery and Resilience Enterprise Technology Architecture Data Governance and Quality Large Scale Change Data Governance and Data Quality 5 Data and Data Governance Third-Party Third-Party Cyber Security Rogue Trader and Access Segregation 6 Information Security Information Security Cyber Security Resilience Regulatory Programmes 7 Digital Risk Digital and Mobile Risk Digital Risk Cloud Computing Financial Crime 8 IT Governance and IT Risk Data and Governance Service Mobile Devices Third-Party 9 Enterprise Technology Architecture IT Governance and IT Risk Disaster Recovery and Resilience Complex Financial Modelling Social Media 10 Payment Systems Service Cloud Computing Social Media Mobile Devices Topics which appear in more than two years have been colour-coded to help illustrate their movement in the top 10 over time. 1
5 2016 IT Internal Audit Hot Topics: An analysis by sub-sector Top 10 Financial services Retail Banking Capital Markets Insurance/Investment 1 Cyber Security Cyber Security Cyber Security Cyber Security 2 Strategic Change Strategic Change Strategic Change Third-Party 3 Third-Party Third-Party IT Governance and IT Risk Strategic Change 4 IT Disaster Recovery and Resilience IT Disaster Recovery and Resilience Electronic Trading Mergers/Integration of systems 5 Data and Data Governance Payment Systems Data and Data Governance Information Security 6 Information Security Digital Risk New Technologies Data and Data Governance 7 Digital Risk Enterprise Technology Architecture IT Disaster Recovery and Resilience IT Governance and IT Risk 8 IT Governance and IT Risk 9 Enterprise Technology Architecture Information Security Third-Party Obsolescence of Infrastructure Data Leakage Digital Risk IT Disaster Recovery and Resilience 10 Payment Systems Legacy Infrastructure/ Obsolescence Complex Financial Models Enterprise Technology Architecture On the horizon 2016 Hot topics for IT internal audit in financial services 2
6 2016 IT Internal Audit Hot Topics 1. Cyber Security (=1) It is no surprise that cyber appears as the top concern for IT internal audit professionals in the industry for another year. Indeed it has been an increasingly regular feature in the media over the past 18 months, with multiple significant attacks and data breaches impacting all industry sectors, including some high-profile incidents for financial services firms. Cyber security is not simply about fixing the vulnerability that was exploited, but wider crisis management skills, including public, media and customer relations (refer also to topics 4, 6 and 10). With the increase in breach impact and complexity in 2015, incident response has seen a shift from point-based fix-it type approach towards more robust internal controls around incident response and has also driven a need for businesses to understand cyber risk at Board level. Internal Audit departments have an opportunity to demonstrate that they can understand and provide assurance over all the above. They can help to promote more organisational collaboration in cyber audits, both internally (across functions) and externally, as this will be a key area of focus for the sector over coming months. This should enable a more transparent view of emerging risks and threats, and in turn drive more effective risk management practices whilst allowing Internal Audit to remain agile to the changing nature of cyber threats. For the organisations with a less mature cyber control environment, Heads of IT Audit understandably see cyber as a topic of focus and concern in light of their organisation s legacy control weaknesses; however, even the more mature organisations are still concerned about keeping up with growing regulatory expectations on what good looks like and how to provide commensurate levels of assurance over cyber. 2. Strategic Change ( 3) As with the previous three years, there is a significant amount of change in support of organisational strategy across the organisations we surveyed. Whether this has been investment in new channels such as mobile, new products or business lines, acquisition or divestment or to reduce operational risks and keep the lights on, technology is often at the heart of enabling these strategic changes. Internal Audit departments are continuing to immerse themselves in the change portfolios and increase the resources allocated to assuring the strategic change programmes which the organisation is trying to deliver. It is becoming more typical for Internal Audit departments to include dedicated change audit teams and resources, with experience of technology development, change and testing as well as business change and project and programme delivery, in some cases focusing up to 40% of the total audit plan effort on change programme assurance. Note. The number in brackets indicates the ranking of the topics in our 2015 survey and the relative movement this year 3
7 The challenge is how to deploy these resources effectively across the organisations change portfolio and ensure that audit interventions are timely and provide a high impact on the control environment, but without hindering the programme resources trying to deliver. In our experience, Internal Audit departments are continuing to attend regulatory programme boards for Solvency II, IFRS 9, MIFID II and the enormous change driven by Structural Reform in the Banking sector, providing assurance that these programmes are on track and are delivering their intended outcomes. 3. Third-Party ( 5) For the fourth year running, respondents to our survey highlighted that management of third-parties remains a key priority. Global third-party ecosystems of organisations, also known as the extended enterprise, are becoming stronger sources of strategic advantage and the scale on which this is now taking place in financial services has increased. Businesses are also facing new risks, such as the threat of high profile business failure, accountability for illegal third-party action or regulatory enforcement action with punitive fines, all leading to reputational damage and erosion of shareholder wealth. The financial services sector has dominated industryspecific regulation impacting the use of third-parties; and this is expected to get even more severe. Deloitte estimates that the failure by large multinational businesses to identify and manage third-parties appropriately, aside from the significant reputational damage, can lead to fines, direct compensation costs or other revenue losses in the range of US$ 2-50 million, while action under global legislation can be far higher, touching US$ billion 1. Internal Audit s focus on third-party risk has traditionally been reactive and this decentralised approach to risk has led to micro-focus on risk areas aligned to certain parts of a business or functional areas for example, operational performance from an extended enterprise perspective or information security from a corporate security perspective. Internal Audit functions should start to consider operational risk factors (e.g. performance, quality standards, delivery times, KPI/SLA measurement) with reputational and financial risk factors (e.g. an understanding of financial health, appropriate charging mechanisms and adherence to these) and legal and regulatory risks (e.g. compliance with anti-bribery regulations and awareness of global industry standards as they apply to third-parties). 1 Third-Party Governance and Risk : Turning risk into opportunity; Deloitte Touche Tohmatsu Limited, 2015 On the horizon 2016 Hot topics for IT internal audit in financial services 4
8 4. IT Disaster Recovery and Resilience ( 2) IT system failures are front page news, leading to public coverage and reputational damage for a number of financial institutions. In 2015 instances of failures continued to emerge despite Dear Chairman letters and remediation programmes. Outages impacting ATM networks, digital services (refer to topic 7), payments systems (refer to topic 10) including the recent 2014 Bank of England outage and ultimately customer access to services continue to drive the attention of regulators and organisations to the stability of their systems. As a result, IT disaster recovery and resilience remains a key area of focus for Heads of IT Internal Audit. Many progressive institutions are moving their focus from a traditional IT disaster recovery and resilience plan to understanding better the risks to services inherent in their IT environments, both in-house and outsourced services, and the controls to mitigate them. IT failures rarely result in a full invocation of the disaster recovery and resilience plan for IT as they are more often a result of a management process issue or human error rather than a big ticket data centre outage. With this is mind, it is imperative that Internal Audit departments broaden their focus to determine the adequacy of processes in place to avoid, respond and recover from planned and unplanned outages. Whilst technology is at the heart of the disaster recovery, resilience, in line with regulatory expectations, should be broader, encompassing areas such as operations, information and corporate security, communications, public relations and crisis management. 5. Data and Data Governance ( 8) The volume of enterprise data is increasing exponentially, with more than 90% of the world s data estimated to have been created in the last two years alone 2. Data governance brings benefits such as greater efficiency, visibility and cost savings, whilst in many cases helping to drive improvements in areas like data quality, or give greater confidence over data security. There has been a growing regulatory pressure to improve data governance, particularly in support of initiatives such as MiFID II, Solvency II, Basel III. In our experience, the most advanced organisations have addressed data governance at a senior level, with defined structures, policies and standards implemented across the entire organisation. This usually also involves the appointment of a Chief Data Officer (CDO). 2 SINTEF. Big Data, for better or worse: 90% of world s data generated over last two years. ScienceDaily 5
9 Unfortunately, data governance implementations can be prone to becoming a leviathan of red tape and onerous controls that do little to add value. Internal Audit departments will naturally have assessed aspects of data control in previous audit plans, however as businesses increase their focus on the customer, digital channels and explicit requirements in regulations, the need to audit data governance practices more thematically is pressing. They will need to determine the scope of the governance activities to audit, and the depth of that assessment. Plans may need to extend over a timeline of several years, with a prioritised approach to address more business critical areas first. For a large number of functions, auditing data governance requires expertise and toolsets which may not have traditionally been contained within the function and therefore a level of upskilling may be required. Leading Internal Audit departments in financial services, however, far from continuing a perennial deferral of their data governance review, have taken the initiative to leverage analytics capabilities which allow the use of sophisticated data quality and profiling tools to assess data quality comprehensively, helping to make sense of their data and unlock its value. 6. Information Security ( = 6) For some organisations, the topic of cyber is considered to include aspects of business continuity, crisis management, financial crime and fraud as well as traditional information security. For others, information security remains a topic of importance in its own right, which warrants its own place in the Internal Audit plan. Either way, the emergence of cyber in the past few years has shone a spotlight on the need to fix the basics in order to minimise exposure to cyber threats. In many cases in financial services, fixing the basics is about assuring the appropriateness of access to information and focusing on identity and access management initiatives. High-profile data loss incidents continue to make headlines, irk regulators and generate considerable workload across the three lines of defence to ensure that access is managed effectively. Given the scale of many financial services organisations, along with the size of their IT estates, this is a vast and continual challenge. We note in particular several banks with extensive Privileged Access programmes aiming to minimise the volume of accounts with privileged access to systems along with similar programmes to sever direct access to systems by third-party organisations. Internal Audit departments are providing assurance over the effectiveness of these programmes, conducting re-performance or verification exercises to confirm that access is appropriate once the remediation programmes have concluded. On the horizon 2016 Hot topics for IT internal audit in financial services 6
10 7. Digital Risk ( = 7) Digital channels such as mobile, cloud and social media are interacting and converging. While this convergence holds the promise of new opportunities for organisations, digital also introduces new risks that may not be effectively managed by the organisations existing governance, oversight and internal controls frameworks. A number of these risks were noted in the Financial Conduct Authority s (FCA) thematic review on mobile banking 3, where financial institutions are using mobile banking as a catalyst for enhancing existing frameworks and future proofing their digital risk landscape by having a better understanding of their digital footprint. Mobile banking is also growing in popularity. As the British Bankers Association (BBA) confirmed, a revolution in mobile banking use is under way in the UK, with app use for customers at the five major UK high street banking groups almost doubling over the past year. Customers now make 5.7 million transactions a day using smartphones and other mobile devices. It is predicted that the take up of mobile banking will continue to rise. Identifying, mapping and truly understanding the organisation s digital footprint will help Internal Audit departments to have a more targeted and risk focused view of the firm s digital landscape, which in turn can lead to a structured and robust plan for effective auditing of digital and unearthing the associated residual risk. The role of Internal Audit in this era of fast-moving digital innovation and transformation cannot be underestimated in providing genuine input, oversight and challenge to the digital parts of the business. 8. IT Governance and IT Risk ( 9) We have seen a significant uptake of IT governance and risk audits in the past 18 months and an increased emphasis on providing a view on whether the information technology governance of the organisation supports the organisation s strategies and objectives in line with the Institute of Internal Auditors (IIA) code. Many IT governance assessments are structured in line with COBIT 5 and the recently revised ISO/IEC 38500:2015 framework. Internal Audit departments are being challenged by their Boards and regulators to form an opinion regarding the transparency of decision making and effectiveness of governance practices in their technology teams, including the alignment of technology with business strategy, the appropriateness of risk reporting to executive management and the Board, as well as the efficiency of mechanisms to measure performance. 3 FCA Thematic Review: TR14/15 Mobile Banking and Payments (September 2014) 7
11 A key component of this landscape is IT risk management, which covers technology functions compliance with enterprise wide risk management requirements but also their approach towards identifying and managing technology risk proactively. It is becoming increasingly common for Internal Audit departments to include such aspects in their IT governance and risk assessments. We have also noted a shift to auditing risk culture on a more granular level, through audits of technology risk culture for instance. Such assessments are becoming an established measure for assessing the quality and embedding of an organisation s strategic plan, risk appetite, governance structure and its risk management frameworks. To meet the above challenges, Internal Audit departments should continue to ensure that they upskill their teams with subject matter expertise and experience in order to meet the expectation of their Boards and regulators. 9. Enterprise Technology Architecture ( 4) This year, we have seen a divergence in trend between the sub-sectors with respect to focus on the Technology Architecture. In Retail Banking, where there typically remains a heavy reliance on legacy estates and there are often large architectural transformation programmes to address the legacy issue, Internal Audit departments are continuing to devote time to reviewing these programmes as well as the capability, functionality, resilience and security of the legacy systems, themselves. Respondents in the Insurance sub-sector were devoting less time to the issue, reflecting the Insurance market s comparative underinvestment in upgrading existing systems or FinTech which is not necessarily revenue generating. By contrast, in the Capital Markets sub-sector, which is characterised by organisations with a drive towards high-frequency, low latency transactions, where speed is a competitive advantage, the Enterprise Technology Architecture topic did not feature at all. This reflects the fact that for many respondents from the sub-sector, Internal Audit effort is being directed elsewhere. Irrespective of sector, the challenge for Internal Audit departments at the one end of the spectrum will be to retain the skills needed to test legacy platform controls, whilst at the other to challenge the newer FinTech developments which are emerging and in some cases are replacing the legacy estate. On the horizon 2016 Hot topics for IT internal audit in financial services 8
12 $ 10. Payment Systems (NEW) Recent developments from both a regulatory and technology perspective are causing a significant shift in traditional payment models, resulting in major changes in the market. This is providing a difficult set of challenges across the financial services sector as banks face disruption from FinTech providers who are heavily investing in payments. Cash is becoming increasingly replaced by contactless and mobile transactions as Apple Pay and other offerings start to take a significant foothold in the market. Requirements for opening up access to the payments market to competition from non-bank players is coming in the form of the second Payment Services Directive (PSD2). This will, amongst other areas, allow direct access to banks customer account information by licensed third-parties and enforce key payment security standards. High-profile payment outages are still all too common as institutions grapple with these future challenges whilst trying to ensure the 24/7 availability of existing payments services, often supported by legacy applications and infrastructure (refer also to topic 3 and 9). Internal Audit departments need to upskill quickly and become more involved as organisations value their independent assurance on whether they are reacting appropriately to the risks related to the major regulatory and technological advances and that existing systems are scalable with expected market changes. This includes regulatory risk assessments, security assessments, review of key payment projects and assessment of existing payment services to ensure appropriate current and future operability. 9
13 Key contacts Financial Services IT Internal Audit Mike Sobers Partner Dan McDonough Director Yannis Petras Senior Manager On the horizon 2016 Hot topics for IT internal audit in financial services 10
14 Notes 11
15
16 Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited ( DTTL ), a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see for a detailed description of the legal structure of DTTL and its member firms. Deloitte LLP is the United Kingdom member firm of DTTL. This publication has been written in general terms and therefore cannot be relied on to cover specific situations; application of the principles set out will depend upon the particular circumstances involved and we recommend that you obtain professional advice before acting or refraining from acting on any of the contents of this publication. Deloitte LLP would be pleased to advise readers on how to apply the principles set out in this publication to their specific circumstances. Deloitte LLP accepts no duty of care or liability for any loss occasioned to any person acting or refraining from action as a result of any material in this publication Deloitte LLP. All rights reserved. Deloitte LLP is a limited liability partnership registered in England and Wales with registered number OC and its registered office at 2 New Street Square, London EC4A 3BZ, United Kingdom. Tel: +44 (0) Fax: +44 (0) Designed and produced by The Creative Studio at Deloitte, London. J2277
Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit
Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit 2014 Welcome to our third annual review of the IT hot topics facing Internal Audit functions within
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
Enhanced Portfolio Management in uncertain times
Enhanced Portfolio Management in uncertain times How businesses can generate and protect value through enhanced, risk return techniques improving portfolio and capital allocation decisions Contents Executive
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
The Internal Audit fraud challenge Prevention, protection, detection
The Internal Audit fraud challenge Prevention, protection, detection Contents Introduction to survey 1 Key findings 2 What are the views of senior management? 3 Adequately resourced? 6 Current trends and
ISO27032 Guidelines for Cyber Security
ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance
Charity Audit Committee performance evaluation Self assessment checklist. October 2014
Charity Audit Committee performance evaluation Self assessment checklist October 2014 With increasing responsibilities and complexities, being a member of the Audit Committee has never been more challenging
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Operational continuity in recovery and resolution planning Exploring the Service Company structure
Operational continuity in recovery and resolution planning Exploring the Service Company structure Contents The requirement for operational continuity 1 in recovery and resolution planning Operational
Global Mobility for Professional Practices Managing a mobile workforce
Global Mobility for Professional Practices Managing a mobile workforce Overview Global Mobility has become a prominent theme as Professional Practice Firms have expanded internationally. Their global strategies,
Developmental assignments Enablers not solutions
Developmental assignments Enablers not solutions In this article we will look at the roots of this phenomenon, and outline some strategic principles followed by organisations which successfully optimise
MiFID II/MiFIR. Implications for Fund Managers. May 2014. 2014 Deloitte LLP. All rights reserved.
/MiFIR Implications for Fund Managers May 2014 Webinar participants Manmeet Rana Senior Manager Audit Deloitte UK [email protected] +44 20 7303 8624 Manmeet Rana is a Senior Manager within Deloitte
January 2015. Senior Insurance Managers Regime Strengthening accountability in insurance
January 2015 Senior Insurance Managers Regime Strengthening accountability in insurance Contents Introduction 1 Key points 2 Implementing Solvency II 3 Implications for Non Executive Directors 4 Practical
Extract of article published in International HR Adviser magazine 2013. The role of HR in global mobility
Extract of article published in International HR Adviser magazine 2013 The role of HR in global mobility Increasingly the regional HR director for Asia Pacific for many large multinationals will be based
CIIA South West Analytics in Internal Audit - Tackling Fraud
CIIA South West Analytics in Internal Audit - Tackling Fraud 10 December 2014 Agenda Intro to Analytics When to use analytics and how to get started Risk Monitoring and Control Automation Common Pitfalls
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
Need to know Financial Reporting Council issues FRS 103 Insurance Contracts
ukgaap: Beyond the detail Need to know Financial Reporting Council issues FRS 103 Insurance Contracts In a nutshell The Financial Reporting Council (FRC) has issued FRS 103 Insurance Contracts. The standard
Consultative report. Committee on Payment and Settlement Systems. Board of the International Organization of Securities Commissions
Committee on Payment and Settlement Systems Board of the International Organization of Securities Commissions Consultative report Principles for financial market infrastructures: Assessment methodology
How To Assess A Critical Service Provider
Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions Principles for financial market infrastructures: Assessment methodology for the oversight
Managing Complex Transformations Achieving excellence
Managing Complex Transformations Achieving excellence A summary of our transformation management and programme leadership capability in the mining industry February 2009 Contents Introduction 1 Our approach
IFRS industry insights
IFRS Global Office Issue 1, April 2012 IFRS industry insights IASB issues a revised exposure draft on revenue recognition insights for the financial services industry The revised ED is the next step in
Capital Requirements Directive Pillar 3 Disclosure. December 2015
Capital Requirements Directive Pillar 3 Disclosure December 2015 1. Background The purpose of this document is to outline the Pillar 3 disclosures for BlueBay Asset Management LLP ( BlueBay ). BlueBay
IFRS industry insights
IFRS Global Office April 2012 IFRS industry insights IASB issues revised exposure draft on revenue recognition insights for the insurance industry The revised ED is the next step in developing an entirely
Internal Audit Landscape 2014
Internal Audit Landscape 2014 Agenda Examining the evolution of risk in today s digital world and the impact on traditional audit, security, risk, and compliance functions Emerging internal audit methodologies
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Internal Audit at the University of Cambridge.
Internal Audit at the University of Cambridge. Contents Introduction to Deloitte 1 Our team 2 What is Internal Audit? 4 Our approach to Internal Audit 5 Authority and reporting lines 7 Planning 8 Ad Hoc
Finance Transformed. Changing the focus Finance Business Partnering
Finance Transformed Changing the focus Finance Business Partnering Contents Out of the shadows of the back office 1 Striking the right balance in finance 2 Finance finds multiple barriers to becoming a
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Governance in brief BIS and the FRC consult on options for UK implementation of the EU Audit Directive & Regulation
January 2015 Governance in brief BIS and the FRC consult on options for UK implementation of the EU Audit Directive & Regulation Headlines The UK will take the option to extend the mandatory auditor rotation
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
Financial Planning & Analysis The Next Frontier of Business Process Outsourcing?
Financial Planning & Analysis The Next Frontier of Business Process Outsourcing? Financial Planning & Analysis (FP&A) outsourcing is increasingly being used by leading global firms to provide a competitive
Risks and uncertainties
Risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal risks that
Transforming customer management in the water sector How to become a leader in customer service
Transforming customer management in the water sector How to become a leader in customer service management strategies have always been important to water companies, with a focus on resolving issues first
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
Annual Shared Services and BPO Conference 2013 Shared services from feasibility through to implementation. Tibor Nagy & Jeppe Larsen
Annual Shared Services and BPO Conference 2013 Shared services from feasibility through to implementation Tibor Nagy & Jeppe Larsen Key considerations Will the corporate vision and goals be reached by
Current issues and trends in the Aerospace supply chain
Current issues and trends in the Aerospace supply chain Iain Subtitle Kirwan runs here 1 line max Director Supply Chain Consulting Global A&D insights and trends Overall global A&D industry expected to
Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks
Cyber security: everybody s imperative A guide for the C-suite and boards on guarding against cyber risks Secure Enhance risk-prioritized controls to protect against known and emerging threats, and comply
G Cloud III Framework Lot 4 (SCS) Project Management
G Cloud III Framework Lot 4 (SCS) Project Management Contents Executive Summary 3 Project Management 4 Why Deloitte? 6 SFIA Rate Card 7 Contact 8 Service Definition (a) to (p) 9 Executive Summary PROJECT
REPORT. Next steps in cyber security
REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15
D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV
D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Treasury Advisory Services Stability through effective financial risk and liquidity management. Audit. Tax. Consulting. Financial Advisory.
Treasury Advisory Services Stability through effective financial risk and liquidity management Audit. Tax. Consulting. Financial Advisory. Treasury Health Check Identify gaps and benchmark to make informed
The robots are coming. A Deloitte Insight report
The robots are coming A Deloitte Insight report Definitions For the purpose of this report robotic process automation is defined as the software (commonly known as a robot ) used to capture and interpret
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
IT Insights. Managing Third Party Technology Risk
IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
ESM Management Comments on Board of Auditors Annual Report to the Board of Governors for the period ended 31 December 2014
ESM Management Comments on Board of Auditors Annual Report to the Board of Governors for the period ended 31 December 2014 Dear Chairperson, I would like to thank you for the opportunity to provide management
Effective Internal Audit in the Financial Services Sector
Effective Internal Audit in the Financial Services Sector Recommendations from the Committee on Internal Audit Guidance for Financial Services: How They Relate to the Global Institute of Internal Auditors
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
2015 GLOBAL ASSET MANAGEMENT SURVEY
2015 GLOBAL ASSET MANAGEMENT SURVEY It's not what happens to you, but how you react to it that matters." -Epictetus A survey carried out globally by Linedata. INTRODUCTION It's not what happens to you,
Confident in our Future, Risk Management Policy Statement and Strategy
Confident in our Future, Risk Management Policy Statement and Strategy Risk Management Policy Statement Introduction Risk management aims to maximise opportunities and minimise exposure to ensure the residents
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Preparing for the Convergence of Risk Management & Business Continuity
Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today
Exponential change 2016 planning priorities for internal audit in financial services. An Internal Audit viewpoint
Exponential change 2016 planning priorities for internal audit in financial services An Internal Audit viewpoint Introduction This is our 2016 publication on Internal Audit planning priorities. Financial
Appendix 6c. Final Internal Audit Report Disaster Recovery Planning. June 2007. Report 6c Page 1 of 15
Appendix 6c Final Internal Audit Report Disaster Recovery Planning June 2007 Report 6c Page 1 of 15 Contents Page Executive Summary 3 Observations and Recommendations 8 Appendix 1 - Audit Framework 13
Effective risk management
Effective risk management Our holistic and disciplined risk management program is designed to mitigate risks at all levels of our business in order to protect our clients interests. 2 Vanguard > Effective
Finance Business Partnering Less than the sum of the parts. Organisational perception of Finance, percentage of respondents agreeing with statements
Finance Business Partnering Less than the sum of the parts Key points Deloitte s research into Finance Business Partnering has analysed the responses of 75 senior Finance executives from UK headquartered
Internal Audit - progress report 2015-16 and 2016-17 plan
Audit Committee, 16 March 2016 Internal Audit - progress report 2015-16 and 2016-17 plan Executive summary and recommendations Introduction Grant Thornton have prepared the attached report which sets out
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Dacorum Borough Council Final Internal Audit Report. IT Business Continuity and Disaster Recovery
Dacorum Borough Council Final Internal Audit Report IT Business Continuity and Disaster Recovery Distribution list: Chris Gordon Group Manager Performance, Policy and Projects John Worts ICT Team Leader
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence
Deloitte Service Code: D-G6-L4-543 December 2014
Managed Cyber Security Cyber Intelligence Centre Deloitte LLP Service Deloitte Service Code: D-G6-L4-543 December 2014 Contents 1 Service Overview 1 2 Detailed Service Definition 2 3 Pricing 6 4 Ordering
Technology and Cyber Resilience Benchmarking Report 2012. December 2013
Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities
Wealth Advisory Services Winning with clients
Wealth Advisory Services Winning with clients About Us Deloitte, with more than 550 professionals operating out of offices in all major cities is one of the largest and fastest-growing professional services
Cyber Security: from threat to opportunity
IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32
Audit Capabilities: Beyond the Checklist Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32 Agenda Beyond the Checklist Visa Overview Visa Internal Audit Overview
Deloitte Shared Services, GBS & BPO Conference Shared Services Design Through to Implementation
Deloitte Shared Services, GBS & BPO Conference Shared Services Design Through to Implementation Jo Hart & Charlotte Allen, Deloitte 22 23 September 2015 Berlin, Germany Agenda Shared Services Approach
Banking and Financial Services Internal Audit Group
Banking and Financial Services Internal Audit Group Hot topics for 2014 Audit Planning Lunch Time Seminar Alana Thorne, Director [email protected] +44 20 7007 8479 Chit Ghee Yeoh, Associate Director
D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV
D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 4 3 Commercials 8 4 Our
Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting
Consulting and Professional Services Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting Designing an Operational Risk Program for
Please contact me on 0207 213 4378 or [email protected] if you would like to discuss this further.
House of Commons Public Bill Committee, Scrutiny Unit, 7 Millbank, London, SW1P 3JA. 8 September 2014 Dear Sirs, Modern Slavery Bill call for written evidence We appreciate the opportunity to respond to
Bridgend County Borough Council. Corporate Risk Management Policy
Bridgend County Borough Council Corporate Risk Management Policy December 2014 Index Section Page No Introduction 3 Definition of risk 3 Aims and objectives 4 Strategy 4 Accountabilities and roles 5 Risk
Actuarial services that enhance performance. Insurance PRECISE. PROVEN. PERFORMANCE.
Actuarial services that enhance performance Insurance PRECISE. PROVEN. PERFORMANCE. Today s challenges, tomorrow s opportunities In today s ever changing insurance market, companies face more stringent
Security in the Cloud: Visibility & Control of your Cloud Service Providers
Whitepaper: Security in the Cloud Security in the Cloud: Visibility & Control of your Cloud Service Providers Date: 11 Apr 2012 Doc Ref: SOS-WP-CSP-0412A Author: Pierre Tagle Ph.D., Prashant Haldankar,
Chairman s Statement. Contents & Introduction. Introduction
Business Plan 2016 Contents Chairman s & Introduction Statement Introduction Chairman s Statement About the Commission Our major priorities for 2016 Facilitating market access & other benefits to industry
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
London Business Interruption Association Technology new risks and opportunities for the Insurance industry
London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in
Wealth Advisory Services Winning with clients
Wealth Advisory Services Winning with clients About Us Deloitte, with more than 500 professionals operating out of offices in all major cities is one of the largest and fastest-growing professional services
Growth by acquisition.
Forward thinking Growth by acquisition. A practical guide for owner-managed businesses Acquisitions can be an excellent means of enhancing shareholder value in a privately owned business. However, selecting
Capital Policy and Safeguards Statement for Merchant Acquirer Limited Purpose Banks
Capital Policy and Safeguards Statement for Merchant Acquirer Limited Purpose Banks Capital Each of the minimum capital requirements is designed to stand alone, and each of the capital requirements must,
Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015
Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud
