How To Transform It Risk Management
|
|
|
- Roy Norton
- 5 years ago
- Views:
Transcription
1 The transformation of IT Risk Management kpmg.com
2 The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help Case studies
3 Redefining the role of IT Risk Management in a changing world Organizations are facing increasing demand to realign their IT Risk Management (ITRM) framework to meet constantly changing regulatory standards. An effective ITRM framework poses many challenges, including maintaining a cost-effective process design and meeting the efficiency demands of company management, while balancing the need to intervene and enabling innovation and the flow of business. This is forcing leading organizations to redefine and transform their traditional ITRM model. Although cost factors are a challenge for organizations in deriving value from an ITRM function, integrated ITRM operating models can significantly help to improve business decision making and accountability for IT risk. An effective ITRM function can also assist in establishing a risk-aware culture and methods of working and collaborating to take appropriate action, strengthening the first line of defense within the organization.
4 1 The transformation of IT Risk Management The role of IT Risk Management The role of IT in an organization has transformed over recent years and is no longer seen as just supporting the business. IT also allows organizations to differentiate themselves and provides many organizations a competitive advantage. This results in IT being a strategic enabler instead of a cost center. As a result, the view on managing IT risk within an organization has also evolved. Because IT risk covers many aspects of the organization, it is assumed that the functions of internal audit, business operations, and/or technology operations will be able to identify, monitor, and address these risks. However, that is not the case, and often, if these functions are performing an element of IT risk management, the efforts are not coordinated, consistent, or consolidated for an enterprise view. The ITRM function within an organization operates as a distinct, but integrated, function within IT. It supports the enterprise as a whole addressing the strategic objectives, mission, and business model of the organization. An ITRM function manages the firm s risk posture and appetite for IT risk and security by determining the key IT threats that an organization faces and leading a proactive response to combat these threats. An effective ITRM function ensures a robust and effective engagement with regulatory bodies to determine compliance priorities for each jurisdiction. Furthermore, as an enterprise business issue, ITRM requires an organization to build capabilities that must be embedded and managed across a matrixed organization through a sustainable process to provide transparency and accountability. A holistic view and discussion on ITRM helps management to identify, manage and optimize risks not just mitigate their risks turning IT risks into advantages and aligning management s risk appetite with a desired return. ITRM should define a comprehensive view of IT risks; continuously refresh the inventory of IT risks; help create strategies to prevent, mitigate, or accept these risks; and monitor risks against defined tolerances. Through fit-for-purpose design, skills, and competencies, and automation platforms, the ITRM function provides management an opportunity to proactively manage risk and transform its ITRM needs into a capability that plays to the broader enterprise strategy and the critical issues that organizations face. Aligning the ITRM function with the other risk oversight functions such as internal audit, enterprise risk management, and compliance, as well as with regulatory mandates, is an important element in more effectively ensuring that risks are optimized.
5 The transformation of IT Risk Management 2 Scope of IT Risk Management Understanding the complexity of the business environment and changes from within the organization are some of the key drivers in understanding key areas of risk in an organization. These factors are in turn being driven by numerous forces, whether external such as regulatory, geopolitical, or market-driven, or internal such as new products, acquisitions, or IT implementations. ITRM FRAMEWORK Entity Level & Governance People Standards & Policies Procedures Monitoring ISACA defines IT risk as The business risk associated with the use, ownership, operation, involvement, influence, and adoption of IT within an enterprise. IDENTIFY RISK MANAGE RISK What are the possible IT-related risks? Identifying applicable IT risks based on enterprise-wide risk posture and appetite Managing IT risks through implementing processes and controls How are we protecting ourselves from these risks? OPTIMIZE RISK MITIGATE RISK How can we turn risks into returns? Converting IT risks into returns and opportunities Treatment of IT-related issues and deficiencies How effective is our response to these risks? A coordinated approach to ITRM enables information flow and a clear understanding of the risk domains within IT. Organizations need to assess for risk and develop risk optimization strategies by defining and delivering broad risk optimization programs. They also need to establish a measurement program to report holistically on the IT risk posture. But this is not just about measuring and reporting; it is about optimizing the resources dedicated to ITRM on a business impact-prioritized basis, leveraging a defined process, using lessons from history, and applying as appropriate across the landscape of enterprise IT risks.
6 3 The transformation of IT Risk Management Examples of IT risk areas of focus Alignment of IT risk control framework with business strategy IT portfolio prioritization Risk posture and key program updates Risk assessment rationalization and enterprise alignment More rigorous regulations Regulatory uncertainty Rising costs for compliance Security risks and brand protection New marketing and business models Data leakage and intellectual property protection Managing remote access and communications Managing diverse Bring Your Own Device (BYOD) environments Strategic and Governance Risk Social Media and Mobile Computing IT Risk Regulatory Compliance Data Protection Scale (big data) Growth of unstructured data Security breaches Business continuity and disaster recovery Cloud Privacy and data security Tax and regulatory issues for virtualized business New models for data storage, software as a service (SaaS), business continuity, and disaster recovery
7 The transformation of IT Risk Management 4 How KPMG can help Less mature More mature IDENTIFY RISK Identify enterprise-wide IT risk universe by systems and underlying infrastructure Develop ITRM strategic direction and framework based on the enterprise s objective capacity for IT-related loss Map business strategy to IT risk strategy to define appropriate IT risk appetite and tolerance Assess ITRM resource capabilities and requirements Integrate existing ERM framework to include new IT risks (internal and external) Align IT risk policy based on internal and external risks Review and assess current ITRM strategy and alignment with regulatory and market events Develop Key Risk Indicators (KRIs) and Key Performance Indicators (KPIs) Develop communication, training, and awareness Enhance the existing ITRM framework to align with new regulatory standards Develop risk reporting capabilities Enhance KRIs and KPIs Develop resource models to include skills/capacity Quantify IT risk and perform peer analysis of IT risk MANAGE RISK Inventory IT controls by risks and control objectives Establish the context in which the risk assessment framework is applied to help ensure appropriate outcomes Update existing controls inventory and evaluate test of design Implement controls and monitor operational alignment with risk tolerance thresholds Evaluate operating effectiveness of controls (testing and monitoring of controls) Measure KRIs and KPIs Enhance ITRM reporting and provide drill down functionality MITIGATE RISK Develop mitigation strategies Implement mitigation strategies through collaboration with the business Develop and maintain a risk response process designed to ensure that cost-effective controls mitigate exposure to risks on a continuing basis Work with the board to define the enterprise s appetite for IT risk, and obtain reasonable assurance that IT risk management practices are appropriate to help ensure that the actual IT risk does not exceed the board s risk appetite Embed risk management responsibilities into the organization, helping to ensure that the business and IT regularly assess and report IT-related risks and their impact and that the enterprise s IT risk position is transparent to all stakeholders Continue maintaining a risk response process designed to ensure that cost-effective controls mitigate exposure to risks on a continuing basis OPTIMIZE RISK Develop and implement tools to assist in monitoring effectiveness of IT controls Develop cost benefit strategies to reduce IT cost of compliance through outsourcing/smartsourcing Execute resource strategies to develop more cost-effective capabilities (e.g., offshoring) Enhance existing measurement and monitoring tools KPMG member firms assist organizations in transforming their ITRM across the entire continuum. Whether working with organizations that want to establish an ITRM function or organizations that are looking to enhance their current risk management function, our services help organizations transform ITRM by proactively building integrated capabilities to identify and manage strategic, regulatory, and emerging technology risks and helping design methods to reduce the associated operational costs through sustainable, repeatable, and insightful processes. For either mature or early-stage ITRM functions, we consider monitoring to be essential in terms of compliance and operations. Organizations need to consider implementing capabilities to monitor the ITRM function s effectiveness by defining KRIs for managing risks such as number of risks within each risk area, and number of risks mitigated, number of risks by ongoing mitigation effectiveness; determining appropriate collection and reporting methods; and developing tools for reporting on essential measurements for managing risks. KPMG can help design and launch an ITRM function, recommend and implement ITRM function improvements, and support the monitoring of ongoing ITRM performance through health check exercises. Our professionals and methods can help transform how companies view and manage IT risk through wide-ranging ITRM design and improvement based upon industry-wide practices and trends.
8 5 The transformation of IT Risk Management Case studies CASE STUDY 1 Large brokerage firm looking to build its ITRM function Client challenge KPMG response Benefits to client The client needed assistance in implementing a formal ITRM framework and strategy that would align with its corporate risk management framework. More specifically, the client needed assistance in addressing the corporate risk management requirements, supporting regulatory and other compliance concerns, strengthening and reviewing their current ITRM processes, and improving IT risk reports to management. KPMG assisted the client with the following: Performed an analysis of the current ITRM strategy and developed an ITRM strategy that aligned with the corporate risk management framework Developed an overall ITRM program that included ITRM processes and procedures. The program was based on a formal methodology for identifying, assessing and responding to identified IT risks all in alignment with the corporate risk management framework. Conducted a pilot to validate that ITRM processes and procedures were being implemented. Training for client personnel was provided to help ensure ongoing and sustainable risk management activities. A methodology that has resulted in cost savings for the client while also maintaining a high level of quality Support from an onshore KPMG team with local industry and subject-matter knowledge A holistic process for assessing the client s controls and aligning the ITRM function with the client s overall risk management framework CASE STUDY 2 Global multinational company looking for a cost-effective solution Client challenge KPMG response Benefits to client The client needed a solution that would reduce the cost associated with monitoring compliance and assessing the effectiveness of its IT controls without compromising the quality of the controls. KPMG developed an onshore/offshore delivery model for monitoring compliance and assessing the effectiveness of the client s IT controls. Local KPMG staff provided an onshore presence, working with the client to understand the controls and the client s requirements and needs. Offshore resources were provided by KPMG s Global Services team. Together, the two KPMG teams were able to deliver a cost-effective methodology without compromising the quality of the client s IT controls. A solution that has resulted in cost savings for the client, while also maintaining a high level of quality Support from an onshore KPMG team with local industry and subject-matter knowledge A tested process for assessing the client s controls and providing reporting to the client
9 The transformation of IT Risk Management 6 CASE STUDY 3 Global multinational oil and gas company looking to identify and manage business critical infrastructure Client challenge KPMG response Benefits to client The client needed to define, and maintain a process that would identify and categorize risks related to business critical infrastructure components. KPMG developed a wide-ranging process for identifying, defining, and maintaining business critical infrastructure services. Local KPMG staff then provided a single point of contact to communicate and train the client in understanding the risks associated with business critical services, business critical attributes/definitions, and controls specific to each. In addition, business impact assessments were performed as part of the ongoing management of these assets on an annual basis. A methodology that has resulted in proper risk identification of business critical services Support from an onshore KPMG team with local industry and subject-matter knowledge A robust process for assessing the client s business critical assets and the proper maintenance and management of these assets CASE STUDY 4 Large regional bank reengineering its controls framework Client challenge KPMG response Benefits to client The client had developed an ITRM strategy. However, assistance was needed in developing an IT risk and controls framework that could be implemented as part of the corporate ITRM framework. Additionally, the client needed help in capturing and defining IT risks and controls while also monitoring and reporting compliance to management. KPMG assisted the client by developing a risk and controls framework that could capture and monitor IT risks. The focus of the engagement was to develop the framework of IT controls and IT risks including the key activities that should be in place to attest to the effectiveness of the IT controls in place. This also included developing metrics (KRIs) that could be used to monitor the effectiveness of the implemented IT controls within the applications at the client, as well as be used for reporting to management. An ITRM framework that is aligned to the client s ITRM strategy and industry practice The identification of IT risks and the development of IT controls that align with standard practices, as well as used for other assessments with the potential for future cost savings KPMG professionals who have industry experience and provide insight into how ITRM frameworks and controls have been implemented and monitored at similar organizations
10 7 The transformation of IT Risk Management Case studies (continued) CASE STUDY 5 Global oil and gas company looking for control focused input into process design Client challenge KPMG response Benefits to client The client needed to ensure control designs were being validated and to allow control best practices to be built into the design of its new configuration management and asset management processes. KPMG participated directly in the project design workshops and provided industry leading control recommendations to the client in the integration of its configuration and asset management systems. KPMG also included a risk-based objective review of the overall project governance, with an assessment on key project risks and recommended actions. Client was able to evaluate its control design for its configuration and asset management process areas Identified areas of improvement during the design phase around control procedures which were easier to change before the implementation phase Support from an onshore KPMG team with local industry and subject-matter knowledge CASE STUDY 6 Global bank looking for assistance to help address regulatory requirements Client challenge KPMG response Benefits to client The client had recently redeveloped its ITRM function so it could be adopted by all regions globally. The client needed assistance in rolling out and performing the IT risk assessments. However, upcoming compliance requirements in one of the local regions meant that risks for a significant number of applications distributed globally needed to be analyzed and addressed in a very short period of time. KPMG assisted with IT risk assessments across applications that were subject to local regulatory requirements. Upon completion of the assessments, KPMG helped the client to better understand the IT risks that were identified and determine whether sufficient controls were in place to mitigate these risks. Objective evaluation of IT risk assessments for the identified applications A KPMG team, including member firms of KPMG International advised on a global approach toward the assessment and provided regional/local regulatory knowledge along with experience with financial services
11 The transformation of IT Risk Management 8
12 Contact us To learn more about ITRM, contact one of the following KPMG professionals: David DiCristofaro Partner Phillip J. Lageschulte Partner Vivek Mehta Director Joshua Galvan Managing Director kpmg.com The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particular situation. firms firms affiliated affiliated with KPMG with KPMG International International Cooperative Cooperative ( KPMG ( KPMG International ), a Swiss a Swiss entity. entity. All rights All rights reserved. reserved. The KPMG Printed name, in the logo U.S.A. and The cutting KPMG through name, complexity logo and cutting are registered through complexity trademarks or are trademarks registered of trademarks KPMG International. or trademarks NDPPS of KPMG International. NDPPS
Transforming risk management into a competitive advantage kpmg.com
INSURANCE RISK MANAGEMENT ADVISORY SOLUTIONS Transforming risk management into a competitive advantage kpmg.com 2 Transforming risk management into a competitive advantage Assessing risk. Building value.
ENTERPRISE RISK MANAGEMENT POLICY
ENTERPRISE RISK MANAGEMENT Approved by the Audit Committee on 14 February 2003 and adopted by resolution of the Board on 28 March 2003 Revisions approved by the Audit and Risk Committee on 14 February
The New Third-Party Oversight Framework: Trust but Verify kpmg.com
Financial Services Regulatory Point of View The New Third-Party Oversight Framework: Trust but Verify kpmg.com The New Third-Party Oversight Framework: Trust but Verify 1 Financial services regulatory
KPMG s Financial Management Practice. kpmg.com
KPMG s Financial Management Practice kpmg.com 1 KPMG s Financial Management Practice KPMG s Financial Management (FM) practice, within Advisory Management Consulting, supports the growing agenda and increased
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
Cyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security
IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS
ADVISORY SERVICES. Risk management in an evolving world. Making the case for social media governance. kpmg.com
ADVISORY SERVICES Risk management in an evolving world Making the case for social media governance kpmg.com Risk management in an evolving world 3 Why good governance should be the foundation of your social
Compliance Risk Management Survey A Point of View
FINANCIAL SERVICES Compliance Risk Management Survey A Point of View July 2014 kpmg.com Compliance Risk Management Survey A Point of View 3 Introduction As the financial crisis unfolded, regulators looked
IT Transformation. Moving Beyond Service Management to a Strategic Business Role. August 2013. kpmg.com
IT Transformation Moving Beyond Service Management to a Strategic Business Role August 2013 kpmg.com KPMG surveyed over 275 attendees at ServiceNow s Knowledge13 conference, here is what we learned. Key
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
Applying Risk Assessment to Your Audit Plan Break-out Session T3, Tuesday, October 26 2:00-2:50pm
Applying Risk Assessment to Your Audit Plan Break-out Session T3, Tuesday, October 26 2:00-2:50pm Mike Brown Senior Vice President, Corporate Audit State Street Corporation Rich Reynolds Partner PricewaterhouseCoopers
Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com
Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency kpmg.com Leveraging data analytics and continuous auditing processes 1 Executive
Driving Business Value. A closer look at ERP consolidations and upgrades
IT advisory SERVICES Driving Business Value A closer look at ERP consolidations and upgrades KPMG LLP Meaningful business decisions that help accomplish business goals and growth objectives may call for
Investment Management: Rising to the Risk and Compliance Challenge kpmg.com
KPMG Regulatory Risk and Compliance Practice Investment Management: Rising to the Risk and Compliance Challenge kpmg.com CONTENTS New Regulatory Frontiers: Forging Ahead in a Changing Landscape 1 A Proactive
Beyond risk identification Evolving provider ERM programs
Beyond risk identification Evolving provider ERM programs March 2016 At a glance PwC conducted research to assess the state of enterprise risk management (ERM) within healthcare providers and found many
KPMG Internal Audit: Top 10 considerations in 2015 for technology companies. kpmg.com
KPMG Internal Audit: Top 10 considerations in 2015 for technology companies kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Our annual compilation of Internal Audit considerations for technology
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes
Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation
Tying It All Together: Practical ERM Integration Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation November 16, 2007 1 Agenda Basis for ERM Integration ERM Objectives ERM Focus
Supporting information technology risk management
IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management
ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION
ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION KEY FEATURES AND BENEFITS Manage multiple GRC initiatives on a single consolidated platform Support unique areas of operation with
How to stay competitive in a converging healthcare system kpmg.com
Managing risk in a transforming healthcare organization How to stay competitive in a converging healthcare system kpmg.com 2 Healthcare Risk Management Managing the risk of healthcare transformation Healthcare
IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP
IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/Continuous Monitoring INTRODUCTION New demands from the board, senior organizational
Title here. Successful Business Model Transformation. in the Financial Services Industry. KPMG s Evolving World of Risk Management SECTORS AND THEMES
SECTORS AND THEMES Successful Business Model Transformation Title here in the Financial Services Industry Additional information in Univers 45 Light 12pt on 16pt leading KPMG s Evolving World of Risk Management
Sustainability reporting What you should know kpmg.com
SUSTAINABILITY Sustainability reporting What you should know kpmg.com b Sustainability reporting What you should know KPMG LLP (KPMG) defines corporate sustainability as adopting business strategies that
Company size matters: Perspectives on IT Governance
www.pwc.com/ca/technology-consulting Company size matters: Perspectives on IT Governance versus large Canadian organizations and IT Governance PwC conducted research for the 4th edition of the IT Governance
IT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
Vital Risk Insights kpmg.com
Vital Risk Insights kpmg.com KPMG INTERNATIONAL business Using intelligence software to monitor indicators of governance, risk and compliance Success in today s global marketplace demands that leading
Understanding Enterprise Risk Management. Presented by Dorothy Gjerdrum Arthur J Gallagher
Understanding Enterprise Risk Management Presented by Dorothy Gjerdrum Arthur J Gallagher Learning Objectives Understand the components of a wellrun ERM program Review scope and process Explore the role
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
Enterprise Risk Management & Information Technology
Enterprise Risk Management & Information Technology Presented by Scott Perry and Gary Ross Slalom Consulting, San Francisco Agenda Introductions Session Objectives Overview of Enterprise Risk Management
IT Insights. Managing Third Party Technology Risk
IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate
Cyber security: it s not just about technology
Cyber security: it s not just about technology The five most common mistakes kpmg.com b Cyber security: it s not just about technology Contents Preface 1 01 Understanding the cyber risk 3 02 The five most
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT
OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT ERM as the foundation for regulatory compliance and strategic business decision making CONTENTS Introduction... 3 Steps to developing an
fs viewpoint www.pwc.com/fsi
fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a
Effective risk management
Effective risk management Our holistic and disciplined risk management program is designed to mitigate risks at all levels of our business in order to protect our clients interests. 2 Vanguard > Effective
Confident in our Future, Risk Management Policy Statement and Strategy
Confident in our Future, Risk Management Policy Statement and Strategy Risk Management Policy Statement Introduction Risk management aims to maximise opportunities and minimise exposure to ensure the residents
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Placing a Value on Enterprise Risk Management ADVISORY
Placing a Value on Enterprise Risk Management ADVISORY Placing a Value on Enterprise Risk Management 1 In turbulent economic times, the case for investing in an enterprise risk management (ERM) program
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of
Cyber Security and the Board of Directors
Helping clients build operational capability in cyber security. A DELTA RISK VIEWPOINT Cyber Security and the Board of Directors An essential responsibility in financial services About Delta Risk is a
Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity
Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Developing a Free Credit Score Program. kpmg.com
Developing a Free Credit Score Program kpmg.com Developing a Free Credit Score Program 1 Introduction U.S. regulators, including the Consumer Financial Protection Bureau (CFPB), have begun urging lenders
Business resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
Oracle Financial Services Broker Compliance
Oracle Financial Services Broker Compliance Financial institutions with retail, wealth management, and private banking businesses recognize the direct relationship between rigorous compliance processes
Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations
Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................
Risk management and the transition of projects to business as usual
Advisory Risk management and the transition of projects to business as usual Financial Services kpmg.com 2 Risk Management and the Transition of Projects to Business as Usual Introduction Today s banks,
How To Use Risk It
Risk IT A set of guiding principles and the first framework to help enterprises identify, govern and effectively manage IT risk. In business today, risk plays a critical role. Almost every business decision
Proactive Risk Management with SAP BusinessObjects
Proactive Risk Management with SAP BusinessObjects Leveraging Technology to Gain Enterprise Transparency and Rapid Insight into Changing Business Conditions INTRODUCTION What is the totality of our enterprise
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK ACCOUNTABLE SIGNATURE AUTHORISED for implementation SIGNATURE On behalf of Chief Executive Officer SAHRA Council Date Date
Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013
Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices April 10, 2013 Today's Agenda: Key Topics Defining IT Governance IT Governance Elements & Responsibilities
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
KPMG LLP Credit Risk Management Practices 2014 Survey on Credit Bureau Reporting
KPMG LLP Credit Risk Management Practices 2014 Survey on Credit Bureau Reporting July 2014 kpmg.com Introduction Dear Colleagues: Credit reports play an important role in the lives of consumers. As the
Applying IBM Security solutions to the NIST Cybersecurity Framework
IBM Software Thought Leadership White Paper August 2014 Applying IBM Security solutions to the NIST Cybersecurity Framework Help avoid gaps in security and compliance coverage as threats and business requirements
Linking Risk Management to Business Strategy, Processes, Operations and Reporting
Linking Risk Management to Business Strategy, Processes, Operations and Reporting Financial Management Institute of Canada February 17 th, 2010 KPMG LLP Agenda 1. Leading Practice Risk Management Principles
Analytics Strategy Information Architecture Data Management Analytics Value and Governance Realization
1/22 As a part of Qlik Consulting, works with Customers to assist in shaping strategic elements related to analytics to ensure adoption and success throughout their analytics journey. Qlik Advisory 2/22
Optimizing the Data Center for Today s Federal Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,
ENTERPRISE RISK MANAGEMENT FRAMEWORK
ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...
Policy 10.105: Enterprise Risk Management Policy
Name: Responsibility: Complements: Enterprise Risk Management Framework Coordinator, Enterprise Risk Management Policy 10.105: Enterprise Risk Management Policy Date: November 2006 Revision Date(s): January
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
Balancing supplier risk versus reward. kpmg.com
Business Effectiveness Balancing supplier risk versus reward kpmg.com 1 / Balancing supplier risk versus reward In the wake of constant demand and supply market changes driven by recent economic crises,
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
An Effective Approach to Transition from Risk Assessment to Enterprise Risk Management
Bridgework: An Effective Approach to Transition from Risk Assessment to Enterprise Risk Management @Copyright Cura Software. All rights reserved. No part of this document may be transmitted or copied without
RISK MANAGEMENT OVERVIEW 2011 RISK CONFERENCE SPONSORED BY THE FEDERAL RESERVE BANK OF CHICAGO AND DEPAUL UNIVERSITY
RISK MANAGEMENT OVERVIEW 2011 RISK CONFERENCE SPONSORED BY THE FEDERAL RESERVE BANK OF CHICAGO AND DEPAUL UNIVERSITY PRESENTED BY: LEN WIATR, CHIEF RISK OFFICER Len s Risk Management Philosophy Build a
Understanding and articulating risk appetite
Understanding and articulating risk appetite advisory Understanding and articulating risk appetite Understanding and articulating risk appetite When risk appetite is properly understood and clearly defined,
Cyber Security: from threat to opportunity
IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known
Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,
Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, streamline compliance reporting, and reduce the overall
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013
IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 Debbie Lew Agenda Review what is IT governance Review what is IT risk management A discussion of key IT risks to be aware of Page 2
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Cyber Governance Preparing for the Inevitable Perimeter Breach
SAP Brief SAP Extensions SAP Regulation Management by Greenlight, Cyber Governance Edition Objectives Cyber Governance Preparing for the Inevitable Perimeter Breach Augment your preventive cybersecurity
Masterminding Data Governance
Why Data Governance Matters The Five Critical Steps for Data Governance Data Governance and BackOffice Associates Masterminding Data Governance 1 of 11 A 5-step strategic roadmap to sustainable data quality
Agency for State Technology
Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief
#KPMG Ignite. Join the conversation
#KPMG Ignite Join the conversation Increasing value in supply chain and procurement Mary Hemmingsen Mark Woods Welcome Mary Hemmingsen Partner, Energy Advisory Leader and Global LNG Leader Mark Woods Partner,
IT Cost Reduction. Doing More with Less. Anita Ballaney, Vishwanath Shenoy, Michael Gavigan. Strategic IT cost reduction - Doing More with Less
IT Cost Reduction Doing More with Less Anita Ballaney, Vishwanath Shenoy, Michael Gavigan Strategic IT cost reduction - Doing More with Less The current economic climate will force all businesses to thoroughly
Deloitte and SuccessFactors Workforce Analytics & Planning for Federal Government
Deloitte and SuccessFactors Workforce Analytics & Planning for Federal Government Introduction Introduction In today s Federal market, the effectiveness of human capital management directly impacts agencies
Whitepaper: 7 Steps to Developing a Cloud Security Plan
Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for
An Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime
An Oracle White Paper November 2011 Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime Disclaimer The following is intended to outline our general product direction.
Fundamentals of Information Governance:
Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different
Transforming Internal Audit Through Critical Thinking. kpmg.com
Transforming Internal Audit Through Critical Thinking kpmg.com In an uncertain and challenging economy, organizations are seeking an approach to internal audit that goes beyond reviewing past activities.
KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com
KPMG Internal Audit 2015: Top 10 considerations for private equity firms kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Historically, private equity has been less regulated than other parts of
Root Cause Analysis Concepts and Best Practices for IT Problem Managers
Root Cause Analysis Concepts and Best Practices for IT Problem Managers By Mark Hall, Apollo RCA Instructor & Investigator A version of this article was featured in the April 2010 issue of Industrial Engineer
HR Function Optimization
HR Function Optimization People & Change Advisory Services kpmg.com/in Unlocking the value of human capital Human Resources function is now recognized as a strategic enabler, aimed at delivering sustainable
Managing Risk at Bank of America Corporation. Overview
Managing Risk at Bank of America Corporation Overview Risk is inherent in every material business activity that we undertake. Our business exposes us to strategic, credit, market, liquidity, compliance,
Risk & Audit Committee California Public Employees Retirement System
California Public Employees Retirement System Consent Agenda Item 4d ITEM NAME: Enterprise Risk Management Division Status Report PROGRAM: Risk Management ITEM TYPE: Consent Information EXECUTIVE SUMMARY
Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012
Monitoring in a Risk Management Framework US Census Bureau Oct 2012 Agenda Drivers for Monitoring What is Monitoring Monitoring in a Risk Management Framework (RMF) RMF Cost Efficiencies RMF Lessons Learned
Driving business performance with enterprise risk management
Driving business performance with enterprise risk management Empowering business managers to make smarter decisions that maximize value, reduce costs and balance risk with returns Contents: 1 Executive
Cisco Data Center Optimization Services
Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization
Tax Dispute Resolution Services kpmg.com
TAX Tax Dispute Resolution Services kpmg.com 1 Tax Dispute Resolution Services Are you prepared for a federal, state, or local income tax examination? Facing potential double taxation from an adjustment
ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES
THOMSON REUTERS ACCELUS ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES PROACTIVE. CONNECTED. INFORMED. THOMSON REUTERS ACCELUS Compliance management Solutions Introduction The advent of new and pending
Integrated Risk Management. Balancing Risk and Budget
Integrated Risk Management The Current Risk Landscape Organizations which depend upon information systems are challenged by serious threats that can exploit both known and unknown vulnerabilities in systems.
