The Risk Management Framework: Building a Secure and Regulatory Compliant Trading Architecture
|
|
|
- Rosamund Morton
- 10 years ago
- Views:
Transcription
1 The Risk Management Framework: Building a Secure and Regulatory Compliant Trading Architecture Introduction Enterprise architectures in financial institutions are traditionally built around functional and operational requirements. Security and regulatory compliance needs are typically addressed by individual business and technology groups, which often results in overlapping solutions, functional gaps, or both. As security and regulatory compliance activities have evolved into vital business elements with cross-functional data requirements, these architectural inefficiencies have become business liabilities. The lack of ready access to a consistent, enterprise-wide plan adds costs, delays services, and complicates management as businesses work to implement new compliance requirements. Cisco has created an integrated architecture framework that fuses today s functionally capable and operationally reliable trading floor architectures with the components required for security and compliance. It supports comprehensive, enterprise-wide solutions that reduce unnecessary overlap, and provides a foundation for addressing new regulations as they arise. This paper defines our Functionally Capable, Operationally Reliable, Regulatory-Compliant, Secure (FORS) framework, and describes how Cisco and partner solutions for the financial industry work within that framework to meet the demanding requirements of today s trading environment. Risk Management Demands Architecture Update It s possible that the FUD (fear, uncertainty, and doubt) factor has never been such an apt characterization of the financial industry. Sub-prime write-downs have resulted in highly volatile and unpredictable market conditions. Exchanges and market venues around the world are consolidating to remain competitive. Financial markets are globalizing at a rapid pace. According to a 2006 Securities Industry and Financial Markets Association (SIFMA) report, the U.S. share of the global market capitalization fell from 56 percent to 36 percent between 1982 and 2006, while the emerging market capitalization rose from 37 percent to 57 percent during the same time period. Adding to the challenges of this uncertain and changing environment are mounting incidents of security breach and attempted fraud. The growing security threat has sparked a dramatic increase in the number of regulations and the importance of regulatory compliance. The Gramm-Leach- Bliley Act for retail banking and Regulation NMS (Reg NMS) and Markets in Financial Instruments Directive (MiFID) for financial markets are just a few examples of regulations that government agencies have enacted in response to various security incidents and to keep markets fair to investors. The consequences of failure to comply with government regulations are dire. Noncompliance threatens not only competitive success, but also the very existence of a financial firm. Today s financial firms depend on technology to address the risks inherent in changing business, security, and regulatory landscapes. Virtually any trading floor architecture can support technology implementations such as improving data capacity and bandwidth, implementing a real-time platform, and developing tools for liquidity discovery. However, two critical technology priorities for 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 12
2 reducing risk must be addressed at the architectural level: building an integrated global risk model, and establishing and implementing an IT governance model. The traditional approach of separate core and compliance functions is not well suited to implementing risk management at the enterprise level. Business and technology architecture organizations must update and expand enterprise architectures to mitigate risk as they address regulatory and security needs. A Comprehensive, Integrated Architecture Approach Today s risk environment for the financial markets industry spans operational, credit, market, security, and regulatory compliance issues. Firms are realizing that they need to build an integrated, modern service management environment that addresses all aspects of business and technology. The most effective way to accomplish that goal is through a comprehensive, integrated enterprise architecture approach. Most successful financial firms have the advantage of starting this process with strong and mature architecture mechanisms for managing functional and operational needs. Functional systems meet the business needs required to compete successfully, and operational systems meet the day-today requirements for availability, reliability, and recoverability. Going forward, firms must integrate their functional and operational architecture development process with the security and regulatory compliance initiatives that traditionally existed within multiple individual organizations throughout the enterprise. The regulatory compliance element will address the industry rules and regulations of different countries, and the security element will provide a safe environment for employees and business partners to conduct business transactions. These elements must be integrated into the core architecture without detracting from the existing functional and operational architectural strengths, so firms remain competitive. Combining all of these dimensions into a strong and cohesive architecture will: Help mitigate risks (market, credit, operational, reputation) Facilitate compliance with government regulatory requirements Provide the functional capabilities needed to compete in a regulated marketplace Support secure trading transactions and interactions within the enterprise, with customers, and with business partners Protect the firm s critical assets (customer information, corporate information, intellectual property, and infrastructure) Provide efficient security and compliance monitoring, operation, management, and reporting to regulatory bodies Cisco s Vision: The FORS Model The FORS model is a framework for creating trading floor architecture with four critical domains: functional, operational, regulatory, and security (Figure 1). The framework focuses on the interdependencies among these architecture domains, and uses a holistic, Enterprise Architecture approach to reduce overlaps and minimize capability gaps across the whole enterprise. Using the FORS framework can help ensure that the architecture community addresses regulatory and compliance needs every time the functional and operational architectures are updated, and also addresses functional and operational needs during security and compliance updates Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 12
3 Figure 1. The FORS Model Interdependency among the Architecture Domains The functional, operational, regulatory, and security domains of financial enterprise architectures are interrelated (Figure 2). Architecture developers need to understand and address the functional and operational interdependencies as they expand the traditional core focus to encompass security and regulatory compliance. Assuring compliance and mitigating risk involves all four domains. Figure 2. Interdependency among Architecture Domains 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 12
4 Regulatory Interrelationships: Regulatory compliance requirements may impact any or all of the functional, operational, and security architecture domains. However, the impact on these domains may differ from regulation to regulation. For example, Reg NMS has a significant impact on the functional and operational domains. It requires firms to have low-latency systems for best execution, which affects the operational domain, and to handle a large amount of market data from multiple sources, which affects the functional domain. In contrast, the multi-factor authentication requirements of the Gramm-Leach-Bliley Act and the role-based identification and access management requirements of the Sarbanes-Oxley Act have more impact on the security domain. Security Interrelationships: The security domain has a bidirectional relationship with the regulatory compliance, functional, and operational domains. Security needs may impact these domains or may be impacted due to changes in these domains. For example, in the case of wireless and mobility solutions, security issues have slowed the adoption of wireless while security architectures have been enhanced to support wireless deployment. Holistic Approach The second major component of the FORS framework is a holistic Enterprise Architecture approach based on The Open Group Architecture Framework (TOGAF), an industry standard that includes all business and technology aspects of an enterprise. A high-level, top-down approach is vital when assessing the end-to-end enterprise impact of any change in business needs and modifying and aligning the relevant architectures. Different regulatory concerns may impact business and technology systems in similar manners, resulting in overlapping requirements for different regulations. Without a holistic view, similar or duplicate solutions could be deployed for different regulations, or some of the required capabilities might be overlooked. Figure 3 shows how the Enterprise Architecture approach helps to create an end-to-end view of a typical trading environment. This view has several benefits, which include: Providing a complete functional and architectural picture of the trading environment Helping align business needs with applications and infrastructure Providing a baseline view that can be used to assess the impact of functional and architectural changes between front, middle, and back offices 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 12
5 Figure 3. Enterprise Architecture View of a Trading Environment Applying the FORS Model The balance of this paper will focus on using the FORS model to identify the impact of current financial market regulations and security needs, and developing a corresponding architecture and solution set. Understanding how the FORS model is applied also helps to illustrate the value of using an integrated framework today and how that framework can be applied to future regulatory and security needs. Regulatory Compliance Many regulations affect the financial services industry. This paper examines four major regulations that have a significant impact on the trading environment: Reg NMS, MiFID, Sarbanes-Oxley, and the Basel II Accord. Applying the FORS model to these four regulations clearly shows their affect on various business processes, application systems, and infrastructure in the front, middle, and back office areas of the trading floor (Figure 4). Examining regulations end-to-end impact is extremely important because regulations tend to affect almost all areas of business and technology, and multiple regulations may have similar requirements. An end-to-end examination can present opportunities to reduce costs and increase operational efficiency by using solutions for multiple purposes instead of duplicating investments Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 12
6 Figure 4. The Impact of Regulations on the Trading Environment Mapping the impact of each regulation to the trading environment helps in identifying the various controls required for compliance. The controls can include people, process, and technology, and can differ subtly between regulations. For example, ensuring best execution for Reg NMS requires only a best price guarantee, while ensuring best execution for MiFID may include all the costs associated with that trade. Figure 5 shows the controls that are required for compliance to the four major regulations. Figure 5. Controls for Regulatory Compliance To understand the impact of a particular regulation on the enterprise infrastructure and the corresponding need for controls, let s look at Reg NMS. Reg NMS impacts the way that firms can execute orders because it requires that firms execute a particular order at the best market price Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 12
7 In the front office, Reg NMS primarily impacts the order management and execution functions. Order execution rules may need to be modified to help ensure that no trade through occurs for limit orders. The market data and access rules may need to be modified to help ensure fair and nondiscriminatory access to quotations. Firms must modify these rules to implement best execution. At the infrastructure level, the market data systems must operate with minimum latency so they can obtain the most recent pricing information from the market. Also, to obtain all the market pricing for particular instruments, the market systems need expanded access to market venues and must be able to handle more data. The need for written policies and procedures regarding the best execution of rules poses yet another new requirement. Firms not only need to comply with Reg NMS, but to document their compliance. The middle-office requirements include added risk management capabilities. For example, firms must address a new type of operational risk called execution risk, which addresses the failure to execute an order at the best price. In the back office, procedures must be modified to not only ensure best execution, but to prove that trades were executed at the best prices. If asked, firms must provide at least a 7-day pricing history, which requires reliable archiving of trade executions. Back-office requirements also include compliance monitoring. From the operations perspective, the risk management groups in all organizations must modify their compliance monitoring tools and processes to include the various requirements for Reg NMS. Figure 6 shows the incremental requirements that trading floor architectures must incorporate to address the impact of regulations, based on the controls detailed in Figure 5. This figure shows that these regulations impact the functional, operational, and security domains of the framework providing additional evidence that an integrated approach such as the FORS framework is necessary for a comprehensive architecture. Figure 6. Architectural Impact of Regulations Security This section will discuss applying the FORS model to the specific security needs of the trading environment Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 12
8 The increased use of networking and online tools, combined with the growing volume of trading activity, has made the trading floor environment more vulnerable and difficult to protect. Financial firms not only have more data at risk, but also suffer greater consequences if that data is lost or compromised. Attacks such as spyware, viruses, and identity theft can be devastating impacting clients financial health and potentially damaging a firm s reputation beyond repair. The trading floor architecture must protect users from a wide and growing variety of security threats, and that protection is most effective when it is ingrained in the enterprise architecture. The FORS model can be readily applied to the four major drivers that define the security architecture of an enterprise. Business needs: As business models evolve, driven by technology, information security becomes critical. Emerging threats: New and increasingly sophisticated threats need to be addressed. Corporate risk policies: Corporate policies drive the definition of risk profiles of critical assets. Regulatory requirements: Many regulatory requirements impact security requirements. Once security threats are understood, the appropriate controls can be implemented. Figure 7 maps the security controls required to mitigate various security threats and again validates the importance of using an integrated approach such as the FORS framework. Figure 7. Security Controls for Threat Mitigation and Regulatory Compliance The security controls and architecture requirements for the financial services industry have been described in detail in another Cisco white paper titled, Unified Security Architecture for Financial Services. The security services and controls discussed in this paper are also fully applicable to the trading environment. Figure 8 shows how each of the security services contribute to securing all the business and technology areas of a financial services firm. Most of the security services are architected at the infrastructure layer as shared services that protect other layers of the enterprise. Security services architected at the infrastructure layer must be able to meet the varying security needs of enterprise-wide applications Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 12
9 Figure 8. Security Risk Controls Enterprise Architecture View Incremental Architecture Updates Figure 9 shows the incremental capabilities required to make an enterprise trading floor architecture regulatory-compliant and secure. Regulatory compliance may require changes in the functional, operational, and security dimensions of the Enterprise Architecture. From improving the process of reporting trades and data warehouse systems for client classification, to supporting increased storage requirements for data and trades, to enhancing application systems with resources such as real-time, complex risk engines and smart order routing, to better risk modeling and security, the entire end-to-end architecture must be revisited and updated. These incremental steps become more effective and easier to architect and administer within a consolidated architectural framework Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 12
10 Figure 9. Incremental Architecture Capabilities Required for Security and Regulatory Compliance Cisco and Partner Solutions Cisco and its partners offer a wide range of infrastructure and application system solutions that can help financial firms create a secure and compliant architecture (Figure10). Figure 10. Cisco and Partner Solutions In addition to offering traditional network and security products, Cisco has invested in technology and partnerships to develop the next-generation trading infrastructure, resulting in a modular set of offerings that comprise the Cisco High-Performance Trading (HPT) solution portfolio. This portfolio can help firms build a highly available, modular, scalable, and low-latency infrastructure to handle 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 12
11 the exponentially increasing volumes of market data and trades. Three solutions are especially relevant to compliance challenges: The Algo Speed solution supports low-latency trading for the automated front office, which helps firms fulfill the best-execution requirement. The main features of this solution are submillisecond (ms) application latency, and microsecond fabric recovery and failover around link failures. Another important feature is latency monitoring with microsecond granularity, which facilitates best-execution tracking. The Back-Office Optimization Risk Management solution focuses on improving the response time of risk management applications to facilitate better risk assessment without delaying the flow of trades. The Latency Management solution provides latency analytics at the microburst level across the entire trading cycle to help firms track and record the latency for various execution venues, which is critical for best-execution requirements. For additional information about specific solutions and products, please visit A Secure and Regulatory Compliant Trading Architecture Risk management is critical for any financial firm. As security and regulatory compliance are central to managing risk, integrating security and compliance capabilities into the enterprise architecture should be a significant part of a firm s technology priorities. Despite the massive use of technology in business processes, the need to develop technology architectures that cope with regulatory requirements and security breaches has not been recognized in a systematic way. To protect their own and their clients assets, financial firms and particularly those firms in the trading industry must integrate security and compliance capabilities into the core trading floor architecture. The integrated FORS framework can help firms expand an existing architecture to address security and compliance requirements, and implement solutions from Cisco and its partners that are aligned across the infrastructure, application systems, and business functions. Using this structured, endto-end approach can help firms create a strong foundation that addresses the current and future regulatory and security needs of the trading floor environment. References The following is a partial list of references used in researching and writing this paper: Unified Security Strategy and Architecture for Financial Services, By CH Hariharan, Anuj Kumar Trading Floor Architecture Cisco white paper Design Best Practices for Latency Optimization Cisco white paper Cisco products and technologies white papers Cisco SONA framework 2008 Trends to Watch Financial Markets, a Datamonitor report Top Priorities in Security and Investment Industry, 2008, TowerGroup Reg NMS Impact on Market Data, Reuters white paper Regulation NMS Be Careful what you wish for, TabbGroup 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 12
12 MiFID Impact on US Operations, Capco MiFID the Challenges Ahead, Bearing Point MiFID The Client Management Opportunity, Deloitte Market Data Strategies in response to Reg NMS and MiFID, Datamonitor Overall Impact of MiFID, Financial Services Authority (FSA) white paper Joint Implementation Plan for MiFID, FSA BASEL II Sarbanes-Oxley Act California Security Breach Senate Bill About the Authors Anuj Kumar, Enterprise Architect in the Financial Services Advisory group Contributors: Mihaela Risca, Global Solution Manager for Financial Markets Peter Robin, Director IBSG Parm Sangha, Sales business Development Manager Printed in USA C / Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 12 of 12
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
2015 GLOBAL ASSET MANAGEMENT SURVEY
2015 GLOBAL ASSET MANAGEMENT SURVEY It's not what happens to you, but how you react to it that matters." -Epictetus A survey carried out globally by Linedata. INTRODUCTION It's not what happens to you,
Actionable Security Intelligence: Preparing for the Next Threat with a Proactive Strategy
www.netforensics.com NETFORENSICS WHITE PAPER Actionable Security Intelligence: Preparing for the Next Threat with a Proactive Strategy Contents Executive Summary The Information Security Landscape Security
fmswhitepaper Why community-based financial institutions should practice enterprise risk management.
fmswhitepaper Why community-based financial institutions should practice enterprise risk management. By Michael D. Cohn, CPA, CISA, CGEIT Director, WolfPAC Solutions Group Unique Insights Implementation
Cisco SAFE: A Security Reference Architecture
Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed
HP and netforensics Security Information Management solutions. Business blueprint
HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization
Alcatel-Lucent Services
SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or
TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA. Colruyt ensures data privacy with Identity & Access Management.
TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA Colruyt ensures data privacy with Identity & Access Management. Table of Contents Executive Summary SECTION 1: CHALLENGE 2
Business resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified.
Asset management Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified. Data is about more than numbers. It tells
High performance security for low-latency networks
High performance security for low-latency networks Fortinet solutions for the financial services sector Financial Services Fortinet solutions protect your network and proprietary data without compromising
Data Center Network Evolution: Increase the Value of IT in Your Organization
White Paper Data Center Network Evolution: Increase the Value of IT in Your Organization What You Will Learn New operating demands and technology trends are changing the role of IT and introducing new
Top 5 reasons to choose HP Information Archiving
Technical white paper Top 5 reasons to choose HP Information Archiving Intelligent, scalable, and proven archiving solutions Table of Contents The value of intelligent archiving... 2 Top 5 reasons to choose
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
Three significant risks of FTP use and how to overcome them
Three significant risks of FTP use and how to overcome them Management, security and automation Contents: 1 Make sure your file transfer infrastructure keeps pace with your business strategy 1 The nature
Accenture Risk Management. Industry Report. Life Sciences
Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive
Successful Outsourcing of Data Warehouse Support
Experience the commitment viewpoint Successful Outsourcing of Data Warehouse Support Focus IT management on the big picture, improve business value and reduce the cost of data Data warehouses can help
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
AD Management Survey: Reveals Security as Key Challenge
Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active
Cisco Remote Management Services for Financial Services
Cisco Remote Management Services for Financial Services The global financial services industry continues to evolve to adjust to a shifting market landscape and increased customer expectations. With demand
IT Governance Overview
IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency
WHITE PAPER SERVICES Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency Brocade monitoring service delivers business intelligence to help IT organizations meet SLAs,
DYNAMIC INFRASTRUCTURE Helping build a smarter planet
John Sheehy Systems Architect 18 Feb 2009 Building a smarter planet with a dynamic infrastructure DYNAMIC INFRASTRUCTURE Helping build a smarter planet 1 2009 IBM Corporation The world is smaller and flatter.
Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
The Evolution of Manufacturing Software Platforms: Past, Present, and Future
The Evolution of Manufacturing Software Platforms: Past, Present, and With reliance on the global supplier network, pressures on operating margins, and the increasing complexity of products and processes
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Top 5 reasons to choose HP Information Archiving
Technical white paper Top 5 reasons to choose HP Information Archiving Proven, market-leading archiving solutions The value of intelligent archiving The requirements around managing information are becoming
Risk mitigation for business resilience White paper. A comprehensive, best-practices approach to business resilience and risk mitigation.
Risk mitigation for business resilience White paper A comprehensive, best-practices approach to business resilience and risk mitigation. September 2007 2 Contents 2 Overview: Why traditional risk mitigation
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
ENTERPRISE RISK MANAGEMENT FOR BANKS
ENTERPRISE RISK MANAGEMENT FOR BANKS Seshagiri Rao Vaidyula, Senior Manager, Governance, Risk and Compliance Jayaprakash Kavala, Consultant, Banking and Financial Services 1 www.wipro.com/industryresearch
Smart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
Industry models for financial markets. The IBM Financial Markets Industry Models: Greater insight for greater value
Industry models for financial markets The IBM Financial Markets Industry Models: Greater insight for greater value Executive summary Changes in market mechanisms have led to a rapid increase in the number
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
IBM Software A Journey to Adaptive MDM
IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive
Data Center Solutions
Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing, deploying
Information Governance 2.0 A DOCULABS WHITE PAPER
Information Governance 2.0 A DOCULABS WHITE PAPER Information governance is the control of an organization s information to meet its regulatory, litigation, and risk objectives. Effectively managing and
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking
IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking IBM and ACI offer unparalleled expertise in designing and optimizing payment systems As leading
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Intelligent Data Center Solutions
Intelligent Data Center Solutions Panduit s Unified Physical Infrastructure (UPI): a Guiding Vision A unified approach to physical and logical systems architecture is imperative for solutions to fully
Remote Management Services Portfolio Overview
Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On
Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:
Beyond Sarbanes-Oxley: Using compliance requirements to boost business performance The business regulatory environment in the United States has changed. Public companies have new obligations to report
Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers
Whitepaper: Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers Whitepaper: Managing Cloud Services in the Enterprise 2 The cloud has revolutionized the way businesses operate
White Paper: Application and network performance alignment to IT best practices
Unpublished White Paper: Application and network performance alignment to IT best practices This white paper briefly describes best practices; highlights IT best practices; and discusses in detail IT business
The Eight Dimensions of Customer Experience for Financial Services
WHITE PAPER: FINANCIAL SERVICES The Eight Dimensions of Customer Experience for Financial Services OCTOBER 2007 Table of Contents Executive Summary SECTION 1 2 Financial Institutions Shift Their Focus
next generation privilege identity management
next generation privilege identity management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep up pace with
Readiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s
W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai
Agile enterprise content management and the IBM Information Agenda.
Transforming your content into a trusted, strategic asset Agile enterprise content management and the IBM Information Agenda. Delivering a common information framework for uncommon business agility Highlights
COMMODITIES MANAGEMENT SOFTWARE
COMMODITIES MANAGEMENT SOFTWARE Measuring and managing risk from mine to market TIME FOR A CHANGE The global commodities markets are becoming increasingly volatile and complex. Rapid price and exchange
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
High-Performance Automated Trading Network Architectures
High-Performance Automated Trading Network Architectures Performance Without Loss Performance When It Counts Introduction Firms in the automated trading business recognize that having a low-latency infrastructure
Next-Generation Supply Management
Cisco Internet Business Solutions Group (IBSG) Cisco IBSG 2012 Cisco and/or its affiliates. All rights reserved. Next-Generation Supply Management Authors Ram Muthukrishnan Kevin Sullivan May 2012 Cisco
Helping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights
I D C E X E C U T I V E I N S I G H T S Helping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights May 2009 By Albert Pang, Research Director, Enterprise Applications
Business Intelligence of the Future. kpmg.com
Business Intelligence of the Future kpmg.com 1 Business Intelligence (BI) of the Future An Intelligent Enterprise What will Business Intelligence (BI) look like by year 2020? BI will become an innovation
Cisco Network Optimization Service
Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings
Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
Solving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
Managing business risk
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
Cisco Nexus Planning and Design Service
Cisco Nexus Planning and Design Service Efficiently migrate to a 10GbE environment. Create a more scalable, efficient, and resilient data center architecture with Cisco Nexus Planning and Design Service.
How to bridge the gap between business, IT and networks
ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can
Product Life Cycle Management in Life Sciences Industry
Life Cycle Management in Life Sciences Industry Evolving from siloed to cross-functional management Audit. Tax. Consulting. Corporate Finance. A need for Lifecycle Management Life Sciences companies are
Next Generation Business Performance Management Solution
Next Generation Business Performance Management Solution Why Existing Business Intelligence (BI) Products are Inadequate Changing Business Environment In the face of increased competition, complex customer
AL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
High Value Audits: An Update on Information Technology Auditing. Robert B. Hirth Jr., Managing Director
High Value Audits: An Update on Information Technology Auditing Robert B. Hirth Jr., Managing Director The technology landscape and its impact on internal audit Technology is playing an ever-growing role
SWOT Assessment: FireMon Security Manager Suite v7.0
SWOT Assessment: FireMon Security Manager Suite v7.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT017-004174 Publication Date: 12 Aug 2013 Author: Andrew Kellett SUMMARY
5 Steps to Achieve Business Value from Your Next ERP Platform
5 Steps to Achieve Business Value from Your Next ERP Platform An agile, business aligned approach for successful ERP deployments that are on-time, on-budget, and embraced by users. Introduction There is
Transforming IT Processes and Culture to Assure Service Quality and Improve IT Operational Efficiency
EXECUTIVE BRIEF Service Operations Management November 2011 Transforming IT Processes and Culture to Assure Service Quality and Improve IT Operational Efficiency agility made possible David Hayward Sr.
White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA
White Paper Achieving HIPAA Compliance through Security Information Management White Paper / HIPAA Contents Executive Summary... 1 Introduction: Brief Overview of HIPAA... 1 The HIPAA Challenge: Protecting
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
Cisco Data Center Optimization Services
Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization
Industry models for insurance. The IBM Insurance Application Architecture: A blueprint for success
Industry models for insurance The IBM Insurance Application Architecture: A blueprint for success Executive summary An ongoing transfer of financial responsibility to end customers has created a whole
Can you afford another day without Managed File Transfer (MFT)?
IPSWITCH FILE TRANSFER WHITE PAPER Can you afford another day without Managed File Transfer (MFT)? www.ipswitchft.com Introduction It s easy to understand why many organizations are confused about the
Transforming Your Core Banking and Lending Platform
Transforming Your Core Banking and Lending Platform Dramatically improve your bank s core systems to increase operating agility, lower time to market, reduce costs and better manage risk and regulatory
How To Improve Your Business
IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends
A guide to HP enterprise mobility solutions. Expanding the potential of your business with advanced mobility services
A guide to HP enterprise mobility solutions Expanding the potential of your business with advanced mobility services Going mobile, staying ahead These days, hardworking enterprise IT and technology managers
Compliance Management, made easy
Compliance Management, made easy LOGPOINT SECURING BUSINESS ASSETS SECURING BUSINESS ASSETS LogPoint 5.1: Protecting your data, intellectual property and your company Log and Compliance Management in one
BUSINESS INTELLIGENCE ANALYTICS
SOLUTION BRIEF > > CONNECTIVITY BUSINESS SOLUTIONS FOR INTELLIGENCE FINANCIAL SERVICES ANALYTICS 1 INTRODUCTION It s no secret that the banking and financial services institutions of today are driven by
