2015 Vendor Risk Management Benchmark Study. The Shared Assessments Program and Protiviti Examine the Maturity of Vendor Risk Management

Size: px
Start display at page:

Download "2015 Vendor Risk Management Benchmark Study. The Shared Assessments Program and Protiviti Examine the Maturity of Vendor Risk Management"

Transcription

1 2015 Vendor Risk Management Benchmark Study The Shared Assessments Program and Protiviti Examine the Maturity of Vendor Risk Management

2 INTRODUCTION/EXECUTIVE SUMMARY MANY ORGANIZATIONS ARE NOT PREPARED TO MANAGE THEIR OWN INCIDENTS AND CYBERATTACKS LET ALONE PLAN FOR THIRD-PARTY INCIDENTS AND ATTACKS. THE SAME DUE DILIGENCE THAT ORGANIZATIONS APPLY TO THEIR OWN INCIDENT RESPONSE PLANS MUST BE APPLIED IN THIS CRITICAL AREA OF MANAGING SENSITIVE DATA OUTSOURCED TO THIRD PARTIES, INCLUDING DEMONSTRATING HOW THEY ARE PROTECTING THE DATA, MAINTAINING A MATURE INCIDENT RESPONSE PLAN, TESTING THE PLAN, AND PROVIDING STRONG CONTRACTUAL SERVICE LEVEL AGREEMENTS TO REPORT COMPROMISES BACK TO THE ORGANIZATION. ROCCO GRILLO, MANAGING DIRECTOR, PROTIVITI The results of this year s Vendor Risk Management Benchmark Study can be viewed as cause for optimism or concern, depending on one s view of the world. This marks the second year that the Shared Assessments Program and Protiviti have partnered on this research, which is based on the comprehensive Vendor Risk Management Maturity Model (VRMMM) developed by the Shared Assessments Program, a collaborative consortium of financial institutions, Big Four accounting firms, and third-party risk management leaders in insurance, brokerage, healthcare, retail and telecommunications dedicated to assisting organizations understand, manage and monitor vendor risk effectively and efficiently. From a glass-is-half-empty perspective, it appears that third-party risk management programs may be stagnating. This year s survey respondents rated their overall maturity in most of our vendor risk management categories to be virtually identical to levels reported in our 2014 results for the same areas (see table on page 3, Vendor Risk Management Overall Maturity by Area ). For those who favor the glass-is-half-full point-of-view, these changes may reflect increased knowledge among survey respondents who have gained a greater understanding of vendor risk over the past year. This could be due to a number of high-profile data breaches involving vendors, as well as the release of new regulatory guidance over the past two years, including the NIST Cybersecurity Framework. In addition, while organizations are striving to make improvements, they also are more accurately assessing the maturity and capabilities of their vendor risk management programs. The prevailing mindset for this view is that organizations have a better understanding of the nature of vendor risks and what is required to avoid and mitigate these threats, and thus are rating their vendor risk management capabilities accordingly. Furthermore, there is greater momentum for building stronger vendor risk management programs, as these issues are increasingly becoming a part of the agenda for boards of directors, especially as it relates to loss or exposure of sensitive data through cyberattacks and other compromises. Boards are seeking assurances from management that vendor risk is being assessed, managed and monitored appropriately. A recent article from Fortune.com referenced a survey that revealed boards are holding CEOs and the C-suite accountable for data breaches. 1 As noted in the article, Boardrooms are increasingly assigning fault to chief executive officers, according to a survey of 200 corporate directors conducted 1 Here s who boardrooms are blaming for data breaches, Fortune Magazine, May 29, 2015, boardroom-data-breach-blame/. 1

3 by the New York Stock Exchange in partnership with the Burlington, Mass.-based security company Veracode... In terms of accountability, the directors point their fingers like so: First at the CEO, then at the chief information officer, next at the full C-suite, and fourthly at the chief information security officer, whose job is to keep a company s data and technology protected. 2 Regardless of one s perspective, the 2015 survey findings are crystal clear on a crucial point: There is still a lot of vendor risk management work to be done. The increasing frequency and disconcerting magnitude of cyberattacks (one of the most troubling vendor risks) over the past 12 months, along with a spate of recent and forthcoming regulatory actions, require vendor risk management programs to take a significant leap forward. This change, as a number of regulatory bodies insist, involves fundamental alterations to strategies, processes, organizational cultures and individual mindsets. Iterative improvements something many organizations may view to be adequate steps may no longer be sufficient. On this count, our most notable findings are instructive because they point to the types and magnitude of changes that are needed. Vendor risk management programs require more substantive advances The overall maturity rating for program governance in this year s survey (2.8 on a 5-point scale) should serve as a warning sign of the need for deeper changes that reach into organizational culture and behavior. This mandate is evident in recent regulatory pronouncements. Regulatory agencies in the financial services industry, most notably the U.S. Office of the Comptroller of the Currency, have asserted that average risk management no longer suffices; instead, financial institutions must enact the mind shifts, organizational culture work and behavioral changes needed to satisfy the Getting to Strong regulatory mantra. 3 Cybersecurity threats are a prominent challenge Cybersecurity threats are clearly on the minds of risk managers, IT functions and regulators. High-profile data breaches, often involving millions of customer records and personally identifiable information, are being reported with greater frequency. The Federal Financial Institutions Examination Council recently issued a cybersecurity self-assessment tool. 4 Strengthening cybersecurity is a top priority among CIOs within companies of all sizes, 5 and also is judged by board members and C-suite executives to be among the top risks organizations are facing this year. 6 A critical element to fortifying cybersecurity defenses is addressing third-party risk with regard to data and other IT and business processes that vendors are managing. Vendor risk management programs within financial services organizations are more mature compared to companies in insurance, healthcare and other industries The financial services industry (FSI), which was the first to establish a Coordinating Council for Critical Infrastructure Protection and Homeland Security in response to Presidential Decision Directive 63, remains ahead of other industries with regard to their vendor risk management programs. 7 The insurance and healthcare industries each of which operate under their own high-powered regulatory microscopes continue to lag behind financial services organizations in fortifying their vendor risk management capabilities. 2 Ibid. 3 Getting to Strong: What Banking Organizations Need to Know, Protiviti, 2013: Industries/Getting-to-Strong-What-Banking-Organizations-Need-to-Know-Protiviti.pdf. 4 OCC Bulletin , FFIEC Cybersecurity Assessment Tool, June 30, 2015, bulletin html. 5 Today s Enterprise Cyberthreats Lurk Amid Major Transformation: Assessing the Results of Protiviti s 2015 IT Priorities Survey, 6 Executive Perspectives on Top Risks for 2015, North Carolina State University s ERM Initiative and Protiviti, TopRisks

4 Vendor Risk Management Overall Maturity by Area Category 2015 Index 2014 Index YOY Change Program Governance Policies, Standards, Procedures Contracts Vendor Risk Identification and Analysis Skills and Expertise Communication and Information Sharing Tools, Measurement and Analysis Monitoring and Review Assessing Results by Respondent Role We also tabulated the 2015 and 2014 survey results by respondent role to identify notable trends in the data. Interestingly, there is a consistent trend in both years showing that, in general, the higher the level of respondent in the organization, the lower the assessed score is for a vendor risk component or category. It is likely that C-suite executives have a greater understanding of their vendor risk management and remediation processes across their enterprise, as well as a clearer view of how the external thirdparty risk and regulatory environments are changing. Thus, this group not only may have the best view of the current state of vendor risk management, but likely also sets a higher bar for vendor risk management maturity. C-Suite executives rated their firm s maturity slightly higher this year, albeit from a lower base. C-Level VP/Director Level Manager Level Category Program Governance Policies, Standards, Procedures Contracts Vendor Risk Identification and Analysis Skills and Expertise Communication and Information Sharing Tools, Measurement and Analysis Monitoring and Review Average Management Level C-Level VP/Director Manager Score 3

5 There is one final noteworthy insight that also affects how third-party risk is viewed and managed. The number and intensity of vendor risks and cybersecurity threats, in particular are increasing. From 2009 to 2014, the number of cybersecurity incidents increased at an average annual rate of 66 percent. 8 In other words, whether you perceive the glass to be half-empty or half-full, the glass is growing at an accelerated rate. Even the more optimistic assessments of the current state of vendor risk management indicate that significant improvements may be needed. The time for progress and improvements in vendor risk management capabilities is now, particularly when considering that cyberattacks and other security incidents are very likely to continue increasing. CYBERATTACKS REINFORCE THE URGENCY TO IMPLEMENT STRONGER THIRD-PARTY RISK MANAGEMENT PROGRAMS. THE FINDINGS OF THIS STUDY INDICATE ORGANIZATIONS THAT OUTSOURCE CRITICAL SERVICES HAVE VARYING LEVELS OF MATURITY CROSS-INDUSTRY AND VENDORS ARE NOT IN ALIGNMENT WITH DATA SAFEGUARDS AND SECURITY POLICIES AND PROCEDURES. EVEN THOSE VERTICALS WITH MORE MATURE PROGRAMS, SUCH AS FINANCIAL SERVICES, NEED TO IMPROVE VENDOR RISK MANAGEMENT PROGRAMS THROUGH STANDARDIZATION OF ASSESSMENT METHODOLOGIES AND PEER COLLABORATION. CATHERINE ALLEN, CHAIRMAN AND CEO, THE SANTA FE GROUP 8 A PwC Research figure cited in the Verizon 2015 PCI Compliance Report: 4

6 METHODOLOGY The Vendor Risk Management Benchmark Study was conducted online by the Shared Assessments Program and Protiviti in the fourth quarter of 2014 and first quarter of More than 460 executives and managers (n=468) participated in the study. Using governance as the foundational element, the survey is designed to review the components of a comprehensive vendor risk management program. Respondents were presented with different components of vendor risk under eight categories related to vendor risk management: Program Governance Policies, Standards, Procedures Contracts Vendor Risk Identification and Analysis Skills and Expertise Communication and Information Sharing Tools, Measurement and Analysis Monitoring and Review For each component, respondents were asked to rate its maturity level as it applies to their organization, based on the following scale: 5 = Continuous improvement benchmarking, moving to best practices 4 = Fully implemented and operational 3 = Fully defined and established 2 = Determine roadmap to achieve goals 1 = Initial visioning 0 = Do not perform 5

7 PROGRAM GOVERNANCE OVERALL LEVEL OF MATURITY: 2.8 Key Observations Overall, the results are generally consistent with our prior year s findings, with organizations indicating they have a higher level of maturity in articulating vendor management goals and objectives, and ensuring vendor management projects are aligned with those goals in terms of risk management, security, privacy and company policies, among other areas. The alignment of specific vendor management objectives with strategic organizational objectives and the allocation of sufficient resources for vendor risk management activities mark the two lowest-rated areas of Program Governance. There is a somewhat lower level of maturity with regard to vendor risk management programs operating independently of other business lines (a new Program Governance component added to this year s survey). For every component, financial services organizations show a higher level of maturity relative to other industries those in the $10 billion to $20 billion asset range have the highest level of maturity in their vendor risk management programs. Program Governance Overall Results Vendor Risk Component YOY Change We articulate the goals and objectives of our organization We define organizational structures that establish responsibility and accountability for overseeing our vendor relationships We define vendor management policies that include risk management, security, privacy and other areas that are in alignment with our existing organizational policies and objectives We revise corporate vendor risk policy as needed to achieve strategic objectives We determine the business value expected from our outsourced business relationships, we understand the acceptable range of business risks our organization is willing to assume in pursuing these benefits, and we determine that risks are in alignment with our vendor risk policy We evaluate key risk and performance indicators provided in management and board reporting We define risk monitoring practices and establish an escalation process for exception conditions We communicate to our organization the requirements for risk-based vendor management The organizational structure of our vendor risk management program operates independently of our business lines We align specific vendor management objectives with our strategic organizational objectives NA NA We allocate sufficient resources for vendor risk management activities Category Average

8 Commentary Governance is one of the most important foundational elements of vendor risk management programs. Effective governance requires the right processes as well as the right mindset and behaviors. Regulatory agencies whose purview covers third-party risk have clearly expressed their desire for compliance and risk management programs that exhibit a genuine need to move beyond a checklist mentality. Program governance is a key enabler of meeting this objective. While all these drivers exist, a recent survey of 40 banks by the New York Department of Financial Services found that nearly one in three do not require third-party vendors to alert them about information security breaches or other cybersecurity intrusions. 9 THIRD-PARTY RISK IS NOT CREATED EQUALLY. DEFINE CRITERIA TO CLASSIFY YOUR SERVICE PROVIDERS BY RISK OR CRITICALITY, AND FOCUS OVERSIGHT EFFORTS. MAKE SURE YOU DEFINE AND DRIVE YOUR THIRD-PARTY PROGRAM, LEVERAGING TOOLS TO SUPPORT YOUR OBJECTIVES VERSUS LETTING A TOOL DRIVE YOUR THIRD-PARTY RISK STRATEGY. LINNEA SOLEM, CHIEF PRIVACY OFFICER AND VICE PRESIDENT-RISK/COMPLIANCE, DELUXE CORPORATION 9 Banks face new cyber security rules for vendors, USA Today, April 9, 2015, 7

9 Program Governance Industry Results Financial Services Insurance Healthcare All Others a b c d e f g h i j k We define organizational structures that establish responsibility and accountability for overseeing our vendor a relationships b The organizational structure of our vendor risk management program operates independently of our business lines c We articulate the goals and objectives of our organization d We align specific vendor management objectives with our strategic organizational objectives We define vendor management policies that include risk management, security, privacy and other areas that are in e alignment with our existing organizational policies and objectives f We allocate sufficient resources for vendor risk management activities g We communicate to our organization the requirements for risk-based vendor management We determine the business value expected from our outsourced business relationships, we understand the h acceptable range of business risks our organization is willing to assume in pursuing these benefits, and we determine that risks are in alignment with our vendor risk policy i We define risk monitoring practices and establish an escalation process for exception conditions j We evaluate key risk and performance indicators provided in management and board reporting k We revise corporate vendor risk policy as needed to achieve strategic objectives 8

10 Program Governance Focus on the Financial Services Industry Vendor Risk Component We define organizational structures that establish responsibility and accountability for overseeing our vendor relationships The organizational structure of our vendor risk management program operates independently of our business lines We articulate the goals and objectives of our organization We align specific vendor management objectives with our strategic organizational objectives We define vendor management policies that include risk management, security, privacy and other areas that are in alignment with our existing organizational policies and objectives We allocate sufficient resources for vendor risk management activities We communicate to our organization the requirements for risk-based vendor management We determine the business value expected from our outsourced business relationships, we understand the acceptable range of business risks our organization is willing to assume in pursuing these benefits, and we determine that risks are in alignment with our vendor risk policy We define risk monitoring practices and establish an escalation process for exception conditions We evaluate key risk and performance indicators provided in management and board reporting We revise corporate vendor risk policy as needed to achieve strategic objectives $500M to $1B $1B to $5B $5B to $10B $10B to $20B More than $20B

11 POLICIES, STANDARDS, PROCEDURES OVERALL LEVEL OF MATURITY: 2.9 Key Observations The results suggest that, compared to most other categories in the study, organizations have a higher level of vendor risk management program maturity with their policies, standards and procedures. This is positive news, given that policies, standards and procedures represent another key foundational element of effective vendor risk management programs. While financial services organizations stand out as having higher levels of maturity in this category, healthcare and insurance organizations are aligned with most other companies, despite the more stringent regulatory requirements in these two industries. Policies, Standards, Procedures Overall Results Vendor Risk Component YOY Change We have established standards for vendor selection and due diligence We have identified key positions involved in the contract management process We have created a vendor selection process We have identified key stakeholders involved in each contract process We have created a process for managing contracts We have defined a vendor risk management policy We research and review all applicable regulatory updates and/ or industry standards to ensure the overall program is meeting guidelines applicable to our organization 3.0 NA NA We have obtained senior management approval of policy and risk tiers We have defined a vendor classification structure We have identified existing company policies that may affect the contract process We have defined vendor risk tier assignments We have defined risk categories for each classification in our vendor classification structure We have established criteria and a process for vendor exit strategies Category Average Commentary Program governance is executed through policies, standards and procedures, which are key building blocks of vendor risk management programs. Policies and standards for vendor risk classifications and categories should apply equally to vendor selection and ongoing vendor management. These standards allow a company to manage vendor risk uniformly across the enterprise. 10

12 Policies, Standards, Procedures Industry Results Financial Services Healthcare Insurance All Others a b c d e f g h i j k l m a b c d e f g h i j k l m We have defined a vendor risk management policy We have defined vendor risk tier assignments We research and review all applicable regulatory updates and/or industry standards to ensure the overall program is meeting guidelines applicable to our organization We have obtained senior management approval of policy and risk tiers We have established standards for vendor selection and due diligence We have created a vendor selection process We have defined a vendor classification structure We have defined risk categories for each classification in our vendor classification structure We have identified existing company policies that may affect the contract process We have identified key stakeholders involved in each contract process We have created a process for managing contracts We have identified key positions involved in the contract management process We have established criteria and a process for vendor exit strategies 11

13 Policies, Standards, Procedures Focus on the Financial Services Industry Vendor Risk Component We have defined a vendor risk management policy We have defined vendor risk tier assignments We research and review all applicable regulatory updates and/ or industry standards to ensure the overall program is meeting guidelines applicable to our organization We have obtained senior management approval of policy and risk tiers We have established standards for vendor selection and due diligence We have created a vendor selection process We have defined a vendor classification structure We have defined risk categories for each classification in our vendor classification structure. We have identified existing company policies that may affect the contract process We have identified key stakeholders involved in each contract process We have created a process for managing contracts We have identified key positions involved in the contract management process We have established criteria and a process for vendor exit strategies $500M to $1B $1B to $5B $5B to $10B $10B to $20B More than $20B

14 CONTRACTS OVERALL LEVEL OF MATURITY: 2.9 Key Observations There is a slightly higher level of maturity in establishing regulatory-required standards for mandatory contract language and provisions. Several components of contracts are in particular need of attention and improvement, including the establishment of a process to ensure there are contract provisions consistent with each vendor risk classification and rating. Surprisingly, a component that received a relatively low maturity rating is mandatory IT/security-required standards in contracts and the numbers are especially low for healthcare organizations. Contracts Overall Results Vendor Risk Component YOY Change We have regulatory-required standards for mandatory contract language/provisions We have corporate-required standards for mandatory contract language/provisions We have defined an organizational structure for vendor contract drafting, negotiation and approval We have IT/security-required standards for mandatory contract language/provisions We have established procedures for contract exception review and approval We have a procedure to review existing contracts for compliance with current contract standards We have a process to ensure inclusion of appropriate performancebased contract provisions (SLAs, KPIs, KRIs, etc.) We have a remediation process to correct contract deficiencies We have established criteria for the contract review cycle consistent with each vendor risk classification/rating We have a process to ensure inclusion of contract provisions consistent with each vendor risk classification/rating Category Average Commentary Contracts lay out the obligations and responsibilities for all aspects of specific vendor relationships. As such, these documents should be clear, comprehensive, aligned with internal standards, and subject to a consistent and rigorous internal review process. Organizations appear more advanced relative to those aspects of contracts. The findings show that organizations struggle more with the review of contracts and with troubleshooting, when such a need arises. (This challenge also is evident in the Communication and Information Sharing findings in our study see page 24.) 13

15 Contracts Industry Results Financial Services Healthcare Insurance All Others a b c d e f g h i j a b c d e f g h i j We have defined an organizational structure for vendor contract drafting, negotiation and approval We have established procedures for contract exception review and approval We have corporate-required standards for mandatory contract language/provisions We have regulatory-required standards for mandatory contract language/provisions We have IT/security-required standards for mandatory contract language/provisions We have a procedure to review existing contracts for compliance with current contract standards We have a remediation process to correct contract deficiencies We have a process to ensure inclusion of appropriate performance-based contract provisions (SLAs, KPIs, KRIs, etc.) We have a process to ensure inclusion of contract provisions consistent with each vendor risk classification/rating We have established criteria for the contract review cycle consistent with each vendor risk classification/rating 14

16 Contracts Focus on the Financial Services Industry Vendor Risk Component We have defined an organizational structure for vendor contract drafting, negotiation and approval We have established procedures for contract exception review and approval We have corporate-required standards for mandatory contract language/provisions We have regulatory-required standards for mandatory contract language/provisions We have IT/security-required standards for mandatory contract language/provisions We have a procedure to review existing contracts for compliance with current contract standards We have a remediation process to correct contract deficiencies We have a process to ensure inclusion of appropriate performance-based contract provisions (SLAs, KPIs, KRIs, etc.) We have a process to ensure inclusion of contract provisions consistent with each vendor risk classification/rating We have established criteria for the contract review cycle consistent with each vendor risk classification/rating $500M to $1B $1B to $5B $5B to $10B $10B to $20B More than $20B

17 VENDOR RISK IDENTIFICATION AND ANALYSIS OVERALL LEVEL OF MATURITY: 2.7 Key Observations While the overall maturity level in this category is comparable to last year s results, there are a number of changes in specific components for example, assessing compliance with vendor contracts shows a notable decrease. There also is a notable year-over-year decrease in the maturity level tied to crossfunctional review of vendor requirements with colleagues in other departments/roles (Business, IT, Legal, Purchasing, etc.). As is the case in other areas, there is significant separation between financial services firms, which have a higher level of maturity, and other types of organizations. Healthcare firms, in particular, are not doing a good enough job reporting on vendor assessments internally. One in three do not develop vendor assessment reports, nor do they calculate and distribute vendor assessment metrics. Vendor Risk Identification and Analysis Overall Results Vendor Risk Component YOY Change We review vendor requirements with our Business, IT, Legal and Purchasing colleagues We maintain a database of current vendor information We identify findings and formulate recommendations We consistently follow our process to collect and update vendor information We determine vendor assessments to be performed based on risk, tiering and resources available We assess compliance with vendor contracts We execute scheduling and coordinate assessment activities with vendors We send our vendors our self-assessment questionnaire and document request list We execute vendor risk tiering processes We conduct a risk assessment for outsourcing the business function We perform remediation plan follow-up discussions with the vendor We develop vendor assessment reports We have reviewed the defined business requirements for outsourcing We discuss results of vendor assessments and metrics with management We establish/revise tiering of our vendors We establish a vendor remediation plan or termination/exit strategy (as appropriate), validating this plan with our management and the vendor We consolidate the results of vendor assessments We calculate and distribute vendor assessment metrics Category Average

18 Commentary Vendor risk identification and analysis encompasses all of the components of the vendor lifecycle, from establishing the requirements for determining whether outsourcing is appropriate, to the vendor selection process, and to ongoing vendor assessment reporting and remediation. Neglecting to address any of the activities within this identification and analysis lifecycle can cause major vendor risks to arise and grow without detection. One of the best ways to get started on strengthening vendor risk identification and analysis is by communicating with partners in procurement and business management. Ongoing discussions about vendor risk can help ensure that these programs keep pace with the ever-changing landscape of thirdparty risk and regulations. 10 WITH A RAPIDLY CHANGING CYBERSECURITY THREAT LANDSCAPE, IT IS IMPORTANT TO INFLUENCE YOUR VENDOR COMMUNITY TO ACTIVELY PARTICIPATE IN INFORMATION SHARING AND ANALYSIS CENTERS (ISAC) TO CONTINUALLY DETECT AND SHARE INFORMATION ABOUT CYBER THREATS. THE MORE INFORMATION ORGANIZATIONS SHARE, THE MORE RESILIENT ALL OF OUR IT SECURITY PROGRAMS WILL BE. BRENDA WARD, DIRECTOR, GLOBAL INFORMATION SECURITY, AETNA 10 Garrubba, Tom. In 2015, Don t Just Make New Year Resolutions Regarding Third Party Risk, Keep Them! Shared Assessments post, January 29, 2015: 17

19 Vendor Risk Identification and Analysis Industry Results Financial Services Healthcare Insurance All Others a b c d e f g h i j k l m n o p q r a b c d e f g h i j k l m n o p q r We have reviewed the defined business requirements for outsourcing We conduct a risk assessment for outsourcing the business function We consistently follow our process to collect and update vendor information We maintain a database of current vendor information We execute vendor risk tiering processes We determine vendor assessments to be performed based on risk, tiering and resources available We review vendor requirements with our Business, IT, Legal and Purchasing colleagues We send our vendors our self-assessment questionnaire and document request list We execute scheduling and coordinate assessment activities with vendor We assess compliance with vendor contracts We identify findings and formulate recommendations We develop vendor assessment reports We establish a vendor remediation plan or termination/exit strategy (as appropriate), validating this plan with our management and the vendor We establish/revise tiering of our vendors We perform remediation plan follow-up discussions with the vendor We consolidate the results of vendor assessments We calculate and distribute vendor assessment metrics We discuss results of vendor assessments and metrics with management 18

20 Vendor Risk Identification and Analysis Focus on the Financial Services Industry Vendor Risk Component We have reviewed the defined business requirements for outsourcing We conduct a risk assessment for outsourcing the business function We consistently follow our process to collect and update vendor information We maintain a database of current vendor information $500M to $1B $1B to $5B $5B to $10B $10B to $20B More than $20B We execute vendor risk tiering processes We determine vendor assessments to be performed based on risk, tiering and resources available We review vendor requirements with our Business, IT, Legal and Purchasing colleagues We send our vendors our self-assessment questionnaire and document request list We execute scheduling and coordinate assessment activities with vendor We assess compliance with vendor contracts We identify findings and formulate recommendations We develop vendor assessment reports We establish a vendor remediation plan or termination/exit strategy (as appropriate), validating this plan with our management and the vendor We establish/revise tiering of our vendors We perform remediation plan follow-up discussions with the vendor We consolidate the results of vendor assessments We calculate and distribute vendor assessment metrics We discuss results of vendor assessments and metrics with management

21 SKILLS AND EXPERTISE OVERALL LEVEL OF MATURITY: 2.3 Key Observations Lower levels of vendor risk management maturity are reported in this category, which overall has the lowest maturity index in our benchmarking study. Of particular note, relatively few organizations appear to offer training on vendor risk management policies and procedures, or measure employee understanding of vendor risk management accountabilities. Skills and Expertise Overall Results Vendor Risk Component YOY Change We have assigned vendor risk management accountability to an individual in our organization Roles and responsibilities (e.g., risk, sourcing, procurement, contracts) are defined clearly within our job descriptions We have defined and communicated vendor risk management policies to our key stakeholders We have sufficient qualified staff to meet all vendor risk management objectives We have sufficient staff to manage vendor risk management activities effectively We periodically communicate our vendor risk management policies and procedures to all personnel We have allocated budget for vendor risk management functions, including basic travel, subscriptions, training and small projects We provide training for assigned vendor risk management resources to maintain appropriate certifications We have defined training and education for our vendor risk personnel to enable them to define, execute and manage our program At least annually, we provide training on vendor risk management policies and procedures to appropriate employee groups based on role We have structures in place to define and measure the staffing levels required to meet vendor risk program objectives We have integrated vendor risk management functions and tools sufficiently into our business lines so that overall costs and budget for dedicated risk management budgets are reduced We routinely measure or benchmark our vendor risk management budget with management reporting to demonstrate ROI We have implemented metrics and reporting for compliance to required training and awareness of our vendor risk policies On an annual basis, we measure employee understanding of vendor risk management accountabilities and report results to management Category Average

22 Commentary Skills and expertise are the lowest rated components of vendor risk management throughout all of the survey findings. Companies across all industries should seek to improve the human capital management facets of vendor risk management, including creating specific roles and positions responsible for the hiring, managing and continuous training of these individuals. 21

23 Skills and Expertise Industry Results Financial Services Healthcare Insurance All Others a b c d e f g h i j k l m n o a b c d e f g h i j k l m n o We have assigned vendor risk management accountability to an individual in our organization Roles and responsibilities (e.g., risk, sourcing, procurement, contracts) are defined clearly within our job descriptions We provide training for assigned vendor risk management resources to maintain appropriate certifications We have sufficient staff to manage vendor risk management activities effectively We have structures in place to define and measure the staffing levels required to meet vendor risk program objectives We have sufficient qualified staff to meet all vendor risk management objectives We have defined and communicated vendor risk management policies to our key stakeholders We periodically communicate our vendor risk management policies and procedures to all personnel At least annually, we provide training on vendor risk management policies and procedures to appropriate employee groups based on role We have defined training and education for our vendor risk personnel to enable them to define, execute and manage our program On an annual basis, we measure employee understanding of vendor risk management accountabilities and report results to management We have implemented metrics and reporting for compliance to required training and awareness of our vendor risk policies We have allocated budget for vendor risk management functions, including basic travel, subscriptions, training and small projects We routinely measure or benchmark our vendor risk management budget with management reporting to demonstrate ROI We have integrated vendor risk management functions and tools sufficiently into our business lines so that overall costs and budget for dedicated risk management budgets are reduced 22

24 Skills and Expertise Focus on the Financial Services Industry Vendor Risk Component We have assigned vendor risk management accountability to an individual in our organization Roles and responsibilities (e.g., risk, sourcing, procurement, contracts) are defined clearly within our job descriptions We provide training for assigned vendor risk management resources to maintain appropriate certifications We have sufficient staff to manage vendor risk management activities effectively We have structures in place to define and measure the staffing levels required to meet vendor risk program objectives We have sufficient qualified staff to meet all vendor risk management objectives We have defined and communicated vendor risk management policies to our key stakeholders We periodically communicate our vendor risk management policies and procedures to all personnel At least annually, we provide training on vendor risk management policies and procedures to appropriate employee groups based on role We have defined training and education for our vendor risk personnel to enable them to define, execute and manage our program On an annual basis, we measure employee understanding of vendor risk management accountabilities and report results to management We have implemented metrics and reporting for compliance to required training and awareness of our vendor risk policies We have allocated budget for vendor risk management functions, including basic travel, subscriptions, training and small projects We routinely measure or benchmark our vendor risk management budget with management reporting to demonstrate ROI We have integrated vendor risk management functions and tools sufficiently into our business lines so that overall costs and budget for dedicated risk management budgets are reduced $500M to $1B $1B to $5B $5B to $10B $10B to $20B More than $20B

25 COMMUNICATION AND INFORMATION SHARING OVERALL LEVEL OF MATURITY: 2.5 Key Observations Overall maturity levels in this category trend lower compared to other categories in the study. In particular, relatively few organizations have an ongoing education program for vendor management policies, procedures and updates. Managing vendor inventory and evaluating internal compliance with vendor onboarding, assessment and off-boarding are two areas that require significant attention. Financial services organizations show higher levels of maturity in nearly every vendor risk component in this category. Communication and Information Sharing Overall Results Vendor Risk Component YOY Change We have a process in place to escalate and communicate incidents and issues We have a process in place to track and communicate incidents We have a formal process in place for adoption of the program by executive management and adoption of the program as a standard practice (sourcing, procurement, contracts) We have a process in place to report status of vendor assessments We have a process in place to provide board and executive management response to vendor assessment results We have a process in place to periodically evaluate vendor service delivery We have a process in place to evaluate compliance with vendor management processes and procedures We have a process in place to periodically assess vendor value (for example, service delivery, vendor security, control environment, operations, etc.) We have a process in place to manage vendor inventory We have a process in place to evaluate internal compliance with vendor management onboarding, periodic assessment and off-boarding We have in place an ongoing education program for vendor management policies, procedures and updates Category Average

26 Commentary A framework should be in place to establish how results of vendor risk assessments are shared with the board, senior management and key risk committees. Too many responding organizations appear not to have such a framework in place or are unhappy with their existing approaches. Respondents also gave low marks for their ability to track and communicate risk-related incidents (which includes escalating this information when it meets predetermined criteria). Keeping the board informed of third-party risk is absolutely essential. Some boards address this topic through risk or audit committees; other boards maintain committees (or at least standing agenda items) devoted to third-party risk updates. 11 Regardless of the precise manner in which boards address third-party risks, executives and managers responsible for vendor risk management should ensure the board remains informed. 11 For more on this topic, see The Board s Role in Managing Third-Party Relationships video interview with Catherine A. Allen, Chairman and CEO of The Santa Fe Group: 25

27 Communication and Information Sharing Industry Results Financial Services Insurance Healthcare All Others a b c d e f g h i j k a b c d e f g h i j k We have a formal process in place for adoption of the program by executive management and adoption of the program as a standard practice (sourcing, procurement, contracts) We have in place an ongoing education program for vendor management policies, procedures and updates We have a process in place to periodically assess vendor value (for example, service delivery, vendor security, control environment, operations, etc.) We have a process in place to evaluate internal compliance with vendor management onboarding, periodic assessment and off-boarding We have a process in place to manage vendor inventory We have a process in place to report status of vendor assessments We have a process in place to evaluate compliance with vendor management processes and procedures We have a process in place to periodically evaluate vendor service delivery We have a process in place to track and communicate incidents We have a process in place to escalate and communicate incidents and issues We have a process in place to provide board and executive management response to vendor assessment results 26

28 Communication and Information Sharing Focus on the Financial Services Industry Vendor Risk Component We have a formal process in place for adoption of the program by executive management and adoption of the program as a standard practice (sourcing, procurement, contracts) We have in place an ongoing education program for vendor management policies, procedures and updates We have a process in place to periodically assess vendor value (for example, service delivery, vendor security, control environment, operations, etc.) We have a process in place to evaluate internal compliance with vendor management onboarding, periodic assessment and off-boarding $500M to $1B $1B to $5B $5B to $10B $10B to $20B More than $20B We have a process in place to manage vendor inventory We have a process in place to report status of vendor assessments We have a process in place to evaluate compliance with vendor management processes and procedures We have a process in place to periodically evaluate vendor service delivery We have a process in place to track and communicate incidents We have a process in place to escalate and communicate incidents and issues We have a process in place to provide board and executive management response to vendor assessment results

29 TOOLS, MEASUREMENT AND ANALYSIS OVERALL LEVEL OF MATURITY: 2.4 Key Observations There is little to no year-over-year movement in the maturity level for most vendor risk components in this category. Healthcare organizations have a low level of maturity in establishing relevant financial measures and benchmarks. Tools, Measurement and Analysis Overall Results Vendor Risk Component YOY Change We determine the financial viability of key vendors We engage finance and procurement partners We assign resources to accomplish reviews as scheduled We establish vendor review schedules for all vendor assessments (on-site, remote, etc.) We report risk scoring results to relevant stakeholders We report financial results from our vendors to relevant stakeholders We establish relevant financial measures and benchmarks We process information obtained during the vendor selection or review process into a risk scoring tool based on our risk scoring methodology We provide periodic reporting on review monitoring We capture and report on vendor review costs, budget to actual, etc We monitor variances between scheduled reviews and actual reviews performed Category Average Commentary One of the best ways to achieve improvements in this area, which relates to the process necessary to develop and maintain an effective workflow for conducting vendor assessments, including vendor risk scoring and financial viability analysis, is to perform an onsite assessment of a vendor. This assessment should be performed when a third-party service provider is deemed critical or valuable to an organization s key processes and strategy. 12 Developing mature components in this area is crucial to producing assessment reports in an effective, timely and cost-efficient manner. 12 Garrubba, Tom. In 2015, Don t Just Make New Year Resolutions Regarding Third Party Risk, Keep Them! Shared Assessments post, Jan. 29, 2015: 28

2014 Vendor Risk Management Benchmark Study

2014 Vendor Risk Management Benchmark Study 2014 Vendor Risk Management Benchmark Study Introduction/Executive Summary You can have all the security in the world inside your company s four walls, but all it takes is a compromise at one third-party

More information

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework View the online version at http://us.practicallaw.com/5-599-6825 The NIST Cybersecurity Framework RICHARD RAYSMAN, HOLLAND & KNIGHT LLP AND JOHN ROGERS, BOOZ ALLEN HAMILTON A Practice Note discussing the

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

The Battle Continues Working to Bridge the Data Security Chasm. Assessing the Results of Protiviti s 2015 IT Security and Privacy Survey

The Battle Continues Working to Bridge the Data Security Chasm. Assessing the Results of Protiviti s 2015 IT Security and Privacy Survey The Battle Continues Working to Bridge the Data Security Chasm Assessing the Results of Protiviti s 2015 IT Security and Privacy Survey EXECUTIVE SUMMARY Cyber concerns and discussions abound in companies

More information

Building Best Practices for Effective Monitoring of a Third Party s Incident Event Management Program. A Shared Assessments Briefing Paper

Building Best Practices for Effective Monitoring of a Third Party s Incident Event Management Program. A Shared Assessments Briefing Paper Building Best Practices for Effective Monitoring of a Third Party s Incident Event Management Program A Shared Assessments Briefing Paper Abstract Just 43% of incident management professionals report their

More information

Third-Party Cybersecurity and Data Loss Prevention

Third-Party Cybersecurity and Data Loss Prevention Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management

More information

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:

More information

IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 eric.vyverberg@protiviti.com Managing

More information

Today s Financial Services IT Organization Delivering Security, Value and Performance Amid Major Transformation

Today s Financial Services IT Organization Delivering Security, Value and Performance Amid Major Transformation Today s Financial Services IT Organization Delivering Security, Value and Performance Amid Major Transformation Assessing the Financial Services Industry Results from Protiviti s 2014 IT Priorities and

More information

Audit of NRC s Network Security Operations Center

Audit of NRC s Network Security Operations Center Audit of NRC s Network Security Operations Center OIG-16-A-07 January 11, 2016 All publicly available OIG reports (including this report) are accessible through NRC s Web site at http://www.nrc.gov/reading-rm/doc-collections/insp-gen

More information

Beyond risk identification Evolving provider ERM programs

Beyond risk identification Evolving provider ERM programs Beyond risk identification Evolving provider ERM programs March 2016 At a glance PwC conducted research to assess the state of enterprise risk management (ERM) within healthcare providers and found many

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

Healthcare Internal Audit: In a Time of Transition

Healthcare Internal Audit: In a Time of Transition The 2015 State of the Internal Audit Profession Study Healthcare Internal Audit: In a Time of Transition The healthcare industry in the United States is facing many challenges with the enactment of legislation

More information

fs viewpoint www.pwc.com/fsi

fs viewpoint www.pwc.com/fsi fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

Third Annual Study: Is Your Company Ready for a Big Data Breach?

Third Annual Study: Is Your Company Ready for a Big Data Breach? Third Annual Study: Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute

More information

WHITE PAPER THIRD PARTY MANAGEMENT: FUNDAMENTALS

WHITE PAPER THIRD PARTY MANAGEMENT: FUNDAMENTALS THIRD PARTY MANAGEMENT: FUNDAMENTALS by Linda Tuck Chapman Sponsored by Third Party Management Fundamentals Third Party Management isn t new, but its importance is growing in every industry and the financial

More information

Today s Enterprise - Cyberthreats Lurk Amid Major Transformation. Assessing the Results of Protiviti s 2015 IT Priorities Survey

Today s Enterprise - Cyberthreats Lurk Amid Major Transformation. Assessing the Results of Protiviti s 2015 IT Priorities Survey Today s Enterprise - Cyberthreats Lurk Amid Major Transformation Assessing the Results of Protiviti s 2015 IT Priorities Survey INTRODUCTION The very technologies that empower us to do great good can

More information

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP 2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf

More information

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Strengthening Cybersecurity Defenders #ISC2Congress Healthcare and Security "Information Security is simply a personal

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

The FDIC s Supervisory Approach to Cyberattack Risks

The FDIC s Supervisory Approach to Cyberattack Risks Why We Did The Evaluation Executive Summary Information is one of a financial institution s (FI) most important assets. Protection of information is critical to establishing and maintaining trust between

More information

From Cybersecurity to Collaboration: Assessing the Top Priorities for Internal Audit Functions. 2015 Internal Audit Capabilities and Needs Survey

From Cybersecurity to Collaboration: Assessing the Top Priorities for Internal Audit Functions. 2015 Internal Audit Capabilities and Needs Survey From Cybersecurity to Collaboration: Assessing the Top Priorities for Internal Audit Functions 2015 Internal Audit Capabilities and Needs Survey SECURITY IS, I WOULD SAY, OUR TOP PRIORITY BECAUSE FOR ALL

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Ed McMurray, CISA, CISSP, CTGA CoNetrix Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats

More information

2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security

2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security 2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security Commissioned by ID Experts November 2009 INTRODUCTION Healthcare breaches are on the rise; according to the 2009

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

istockphoto/ljupco 36 June 2015 practicallaw.com 2015 Thomson Reuters. All rights reserved.

istockphoto/ljupco 36 June 2015 practicallaw.com 2015 Thomson Reuters. All rights reserved. istockphoto/ljupco 36 June 2015 practicallaw.com The NIST Cybersecurity Framework Data breaches in organizations have rapidly increased in recent years. In 2014, the National Institute of Standards and

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

PROTIVITI FLASH REPORT

PROTIVITI FLASH REPORT PROTIVITI FLASH REPORT Cybersecurity Framework: Where Do We Go From Here? February 25, 2014 Just over a year ago, President Barack Obama signed an Executive Order (EO) calling for increased cybersecurity

More information

PACB One-Day Cybersecurity Workshop

PACB One-Day Cybersecurity Workshop PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance

More information

Practical Vendor Management to Minimize Compliance Risks November 12, 2015

Practical Vendor Management to Minimize Compliance Risks November 12, 2015 Practical Vendor Management to Minimize Compliance Risks November 12, 2015 v 1 Today s Speakers Ray Everett Principal Consultant & Director Product Management TRUSTe Charlie Miller SVP Shared Assessments

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL FY 2015 INDEPENDENT EVALUATION OF THE EFFECTIVENESS OF NCUA S INFORMATION SECURITY PROGRAM UNDER THE FEDERAL INFORMATION SECURITY MODERNIZATION

More information

THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED

THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED THE CYBER SECURITY PLAYBOOK 2 03 Introduction 04 Changing Roles, Changing Threat

More information

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the retail sector of the Fortune 1000.

More information

Click to edit Master title style

Click to edit Master title style EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity

More information

Shared Assessments Program Case Study

Shared Assessments Program Case Study Shared Assessments Program Case Study A Collaborative Approach to Onsite Assessments Using the Shared Assessments AUP, the Standardized Testing Procedures for Onsite Assessments April 2015 Background About

More information

How To Write A Cybersecurity Framework

How To Write A Cybersecurity Framework NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order

More information

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 It s a pleasure to be with you back home in Boston. I was here just six weeks ago

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group

the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group 54 Banking PersPective Quarter 2, 2014 Responsibility for the oversight of information security and

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Cyberprivacy and Cybersecurity for Health Data

Cyberprivacy and Cybersecurity for Health Data Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies

More information

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness

More information

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.

More information

CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on

More information

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA ARCHER OPERATIONAL RISK MANAGEMENT RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume

More information

Healthcare Information Security Today

Healthcare Information Security Today Healthcare Information Security Today 2015 Survey Analysis: Evolving Threats and Health Info Security Efforts WHITE PAPER SURVEY BACKGROUND The Information Security Media Group conducts an annual Healthcare

More information

Is Your Company Ready for a Big Data Breach?

Is Your Company Ready for a Big Data Breach? Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication

More information

Compliance Risk Management Survey A Point of View

Compliance Risk Management Survey A Point of View FINANCIAL SERVICES Compliance Risk Management Survey A Point of View July 2014 kpmg.com Compliance Risk Management Survey A Point of View 3 Introduction As the financial crisis unfolded, regulators looked

More information

Managing cyber risks with insurance

Managing cyber risks with insurance www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive

More information

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system

More information

Outsourcing Technology Services A Management Decision

Outsourcing Technology Services A Management Decision Outsourcing Technology Services A Management Decision A Telephone Seminar for National Banks Tuesday, July 20, 2004 And again on Wednesday, July 21, 2004 Agenda Outsourcing activities and relationships

More information

OCIE CYBERSECURITY INITIATIVE

OCIE CYBERSECURITY INITIATIVE Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.

More information

www.sharedassessments.org 2015 The Shared Assessments Program - All Rights Reserved 2

www.sharedassessments.org 2015 The Shared Assessments Program - All Rights Reserved 2 The Significance of Information Security and Privacy Controls on Law Firms as Third Party Service Providers and Collaborative Opportunities for Resolution April 2015 Abstract As regulators increase pressure

More information

Vendor Risk Management in the New Regulatory Environment. kpmg.com

Vendor Risk Management in the New Regulatory Environment. kpmg.com Vendor Risk Management in the New Regulatory Environment kpmg.com Vendor Risk Management in the New Regulatory Environment 2 Vendor Risk Management in the New Regulatory Environment Background Regulators

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Addressing FISMA Assessment Requirements

Addressing FISMA Assessment Requirements SOLUTION BRIEF Heeding FISMA s Call for Security Metrics and Continuous Network Monitoring Addressing FISMA Assessment Requirements Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom

More information

Cyber Security and the Board of Directors

Cyber Security and the Board of Directors Helping clients build operational capability in cyber security. A DELTA RISK VIEWPOINT Cyber Security and the Board of Directors An essential responsibility in financial services About Delta Risk is a

More information

Guidance Note: Corporate Governance - Board of Directors. March 2015. Ce document est aussi disponible en français.

Guidance Note: Corporate Governance - Board of Directors. March 2015. Ce document est aussi disponible en français. Guidance Note: Corporate Governance - Board of Directors March 2015 Ce document est aussi disponible en français. Applicability The Guidance Note: Corporate Governance - Board of Directors (the Guidance

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential

More information

How to Protect Sensitive Corporate Data against Security Vulnerabilities of Your Vendors

How to Protect Sensitive Corporate Data against Security Vulnerabilities of Your Vendors How to Protect Sensitive Corporate Data against Security Vulnerabilities of Your Vendors July 2014 Executive Summary Data breaches cost organizations millions and sometimes even billions of dollars in

More information

FPO. 2013 IT Priorities Survey. Mobile Commerce, Social Media, Data Management and Business Continuity Dominate the Agendas of IT Departments

FPO. 2013 IT Priorities Survey. Mobile Commerce, Social Media, Data Management and Business Continuity Dominate the Agendas of IT Departments FPO Mobile Commerce, Social Media, Data Management and Business Continuity Dominate the Agendas of IT Departments 1 Introduction A cursory glance at nearly any information technology (IT) article, survey

More information

CYBERSECURITY EXAMINATION SWEEP SUMMARY

CYBERSECURITY EXAMINATION SWEEP SUMMARY This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,

More information

PwC Viewpoint on Third Party Risk Management

PwC Viewpoint on Third Party Risk Management www.pwc.com PwC Viewpoint on Third Party Risk Management November 2013 Significant others: How companies can effectively manage the risks of vendor relationships Are vendors more trouble than they re worth?

More information

FINRA Publishes its 2015 Report on Cybersecurity Practices

FINRA Publishes its 2015 Report on Cybersecurity Practices Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)

More information

Identifying and Managing Third Party Data Security Risk

Identifying and Managing Third Party Data Security Risk Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:

More information

Cybersecurity: What CFO s Need to Know

Cybersecurity: What CFO s Need to Know Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction

More information

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before a Meeting of CES Government Washington, DC April 16, 2014 Good afternoon. It s a pleasure to finally be here with you. I had very much hoped

More information

Vendor Management. Outsourcing Technology Services

Vendor Management. Outsourcing Technology Services Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring

More information

How To Transform It Risk Management

How To Transform It Risk Management The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

building and sustaining productive working relationships p u b l i c r e l a t i o n s a n d p r o c u r e m e n t

building and sustaining productive working relationships p u b l i c r e l a t i o n s a n d p r o c u r e m e n t building and sustaining productive working relationships p u b l i c r e l a t i o n s a n d p r o c u r e m e n t INTRODUCTION 1 1 THE GROWING INFLUENCE OF PROCUREMENT PROFESSIONALS 2 2 GUIDELINES FOR

More information

Cybersecurity. Considerations for the audit committee

Cybersecurity. Considerations for the audit committee Cybersecurity Considerations for the audit committee Insights on November 2012 governance, risk and compliance Fighting to close the gap Ernst & Young s 2012 Global Information Security Survey 2012 Global

More information

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both

More information

Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations. WMACCA September 16, 2014

Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations. WMACCA September 16, 2014 Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations WMACCA September 16, 2014 Panel Moderator: Mary Ellen Callahan of Jenner & Block; (Former Chief

More information

2015 Report on the Current State of Enterprise Risk Oversight:

2015 Report on the Current State of Enterprise Risk Oversight: 2015 Report on the Current State of Enterprise Risk Oversight: Update on Trends and Opportunities 6 th Edition February 2015 Mark Beasley Deloitte Professor of ERM Director, ERM Initiative Bruce Branson

More information

Accenture Risk Management. Industry Report. Life Sciences

Accenture Risk Management. Industry Report. Life Sciences Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive

More information

Developing and Maintaining a World-Class Third Party Risk Assessment Program

Developing and Maintaining a World-Class Third Party Risk Assessment Program Developing and Maintaining a World-Class Third Party Risk Assessment Program Presented by: Tom Garrubba, Senior Director, The Santa Fe Group/Shared Assessments Program Monday, September 15, 2014 - IIA

More information

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst TRACESECURITY WHITE PAPER GRC Simplified... Finally. A Guide to Successfully Implementing the NIST Cybersecurity Framework Jerry Beasley CISM and TraceSecurity Information Security Analyst TRACESECURITY

More information

Amid Ongoing Transformation and Compliance Challenges, Cybersecurity Represents Top IT Concern in Financial Services Industry

Amid Ongoing Transformation and Compliance Challenges, Cybersecurity Represents Top IT Concern in Financial Services Industry Amid Ongoing Transformation and Compliance Challenges, Cybersecurity Represents Top IT Concern in Financial Services Industry IT leaders are battening down the hatches, according to Protiviti s latest

More information

ENTERPRISE RISK MANAGEMENT FRAMEWORK

ENTERPRISE RISK MANAGEMENT FRAMEWORK ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...

More information

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,

More information

Data Breach Response Planning: Laying the Right Foundation

Data Breach Response Planning: Laying the Right Foundation Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA

More information

Part 3: Business Case and Readiness

Part 3: Business Case and Readiness The Fundamentals of Managed Service Provider (MSP) Programs Part 3 of 3 Part 3: Business Case and Readiness By Jennifer Spicher contents This is the final of a three-part series designed to outline key

More information

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of

More information

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business

More information

NIST Cybersecurity Framework & A Tale of Two Criticalities

NIST Cybersecurity Framework & A Tale of Two Criticalities NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager john.rogers@sagedatasecurity.com Presented

More information

Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP

Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP Today's unpredictable business climate and challenging regulatory

More information

GEARS Cyber-Security Services

GEARS Cyber-Security Services Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments

More information

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)

More information

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the For Release Upon Delivery 10:00 a.m., December 10, 2014 TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY Before the COMMITTEE ON BANKING, HOUSING,

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information