PwC Viewpoint on Third Party Risk Management
|
|
|
- Austin Simon
- 10 years ago
- Views:
Transcription
1 PwC Viewpoint on Third Party Risk Management November 2013 Significant others: How companies can effectively manage the risks of vendor relationships
2 Are vendors more trouble than they re worth? For companies, that s a multibilliondollar question. Data breaches at vendors and other third parties are costlier than inhouse breaches, and the number of incidents is rising. Data breaches at vendors and other third-parties continue to have a high profile in the news. A customer service software provider recently suffered a data breach when hackers gained access to information stored on its system by three prominent social media sites. The hackers downloaded s from users who had contacted the social media sites support departments. This and other recent hacks point to a larger problem with infrastructure cybersecurity. 1 In today's environment, it would be nearly impossible to find a company that doesn't contract with a vendor. But the convenience and flexibility of outsourcing to third parties comes with significant risks, including the potential for regulatory penalties related to vendor incidents penalties that have soared in recent years, costing institutions billions of dollars. Preventing risk events at third party service providers has always been a challenge, but now the stakes are far higher. Over the past three years, the number of security incidents at companies attributed to partners and vendors has risen increasing from 20% in 2010 to 28% in 2012 (see Figure 1). ² The most recent PwC Global State of Information Security Survey shed some light on the problem. Although 71% of companies expressed confidence that their security activities are effective, only 32% require third parties to comply with their policies. Over the past 36 months, the number of security incidents attributed to customers, partners, vendors, and other third parties has escalated. Figure 1: Number of security incidents attributed to vendors³ Partner or vendor 20% 27% 28% 0% 5% 10% 15% 20% 25% 30% Bank security weaknesses led to cyber looting of $45M from ATMs, CSO Online, March 10, 2013 ² PwC 2013 Global State of Information Security Survey. ³ PwC Analysis based on PwC 2013, 2012, and 2011 Global State of Information Security Surveys. (Not all factors shown. Totals do not add up to 100%.) PwC 2
3 Customers are voting with their feet. Research shows that companies experience customer turnover following a security breach. Looking beyond just the significant financial penalties, institutions that suffer security breaches open the door to other serious consequences: The resulting reputational damage can nibble away at an institution s customer base and, eventually, take a bite out of its bottom line Additional consequences can include increased vulnerability to litigation, depressed market value and share price, and the possibility of regulatory enforcement actions When reputations are tarnished after a security event, customers tend to bolt. They don t really care whether the breach originates within the institution itself or within a vendor organization. Financial and reputational damage ensues regardless of the source. As customer attrition grows, revenue shrinks, and the pinch is felt at the bottom line. As shown in Figure 2, certain industries are more susceptible to customer churn, causing their data breach costs to be higher than the average. Figure 2: Customer churn following a breach by industry 1 Financial Healthcare Pharmaceutical Services Transportation Consumer Industrial Technology Hospitality Media Communications Retail Public 0.3% 1.3% 1.5% 2.0% 2.7% 2.6% 2.5% 2.9% 3.3% 3.8% 4.2% 4.5% 4.5% PwC 1 Symantec and Ponemon Institute, 2013 Cost of Data Breach Study United States, May
4 Drivers for Third Party Risk Management Market drivers Regulatory drivers Substantial reliance on third parties Vendor sourcing decisions that often overlook key risks Oct 13 Incomplete populations of vendors or vendors with sensitive data Mar 13 OCC Third Party Relationships Inconsistent risk assessment and review practices across Mar 12 Omnibus HIPAA Rule organizations Jan 11 CFPB Bulletin Complexities in managing third party risk, such as: July 10 PCI-DSS v2.0 Payment Card - Identifying what risks really matter Mar 10 Industry Data Security Standard - Selecting which third parties to review Jan 10 Wash. H.B (2010 WA Data Security Law) - Taking effective action when an issue is found 201 Mass. Code Regs. 17 MA Data Security Law Nov 09 NRS 603A NV Data Security Law May 07 HITECH Act Health Information Technology for Economic and Clinical Health Act Aug 03 H.F MN Plastic Card Security Act May 02 California Privacy Bill SB 1386 Nov 01 OCC Bulletin (Foreign-Based Third-Party Service Providers) July 01 OCC Bulletin (Oversight and Management of Third-Party Relationships) 1996 GLBA Gramm-Leach Bliley Act HIPAA Health Insurance Portability and Accountability Act PwC 4
5 Although the industry is making strides to strengthen TPRM, we have observed that most organizations have not yet adopted stratification a leading practice in managing vendor risk. Adding to the challenge of effectively managing vendorrelated risk, we see today s companies also struggling with: Implementing formal enterprise-wide TPRM governance (Compliance and Enterprise risk management, etc.) Maintaining an accurate and complete inventory of vendors Incorporating other third party relationships into their TPRM programs (e.g., business partners, joint ventures, distribution channels, attorneys, utilities, etc.) Establishing standard operational risk methodologies and policies Identifying/using TPRM key risk indicators Types of data that typically need to be protected: Intellectual Property (IP) Personally Identifiable Information (PII) Payment Card Industry (PCI) Protected Health Information (PHI) Implementing and using technology to adequately support the TPRM program, taking some of the burden from the business Staying ahead of, and effectively complying with, changing regulatory requirements Our observations are underscored by the results of PwC s Global State of Information Security Survey 2013: 69% of the surveyed companies lack an accurate inventory of locations or jurisdictions where data is stored 1 74% of companies do not have a complete inventory of all third parties that handle personal data of its employees and customers 1 73% of companies lack incident response processes to report and manage breaches to third parties that handle data 1 1 PwC 2013 Global State of Information Security Survey. PwC 5
6 An effective and efficient TPRM program can benefit all facets of the enterprise. Here are some of the comments our clients have shared with us regarding their TPRM challenges. With careful planning, each can be overcome. We don't have a program to continuously evaluate and re-classify vendors based on assessment results. We have no pre-contract TPRM process in place. I have operational staff focused on TPRM and they aren't risk and controls specialists. We have inadequate resources to assess our high risk population on an ongoing basis. We don't centrally manage our TPRM. My vendors have vendors. How do we address the risks associated with those Fourth party vendors? We were told by our vendor that their SSAE16 is enough. Is that sufficient? PwC 6
7 Program execution Vendor stratification All too often, companies fail to adopt vendor stratification. We observe many organizations applying the same level of risk analysis to all of their vendors, rather than identifying those vendor services deemed to carry the greatest risk and then prioritizing their focus accordingly. The first step in the stratification process is to understand which vendors and services are in scope from an active risk management perspective. Once this subset of vendors has been identified and prioritized, due diligence assessments are performed for the vendors, depending on the level of internal versus vendor-owned controls. The results of these assessments help establish the appropriate monitoring and control requirements that should be maintained for each vendor. This stratification approach focuses resources on the vendor relationships that matter most, limiting unnecessary work for lower-risk relationships. Illustrative risk factors included in a vendor stratification program Vendor stratification prioritizes higher-risk services and vendors Level of due diligence and active risk monitoring Service risks: Volume of financial transactions processed Concentration associated with service Sensitivity risk of the data to which the vendor could potentially have access Compliance and regulatory risks related to the service Customer and financial impact Vendor risks: Location of the vendor (subject to multinational laws, regulations, Safe Harbor, etc.) Previous data or security breaches Extent of outsourcing performed by the vendor Performance history Total third party # Remove categories that don t pose risk Stratify third parties into risk categories Prioritize high risk vendors for review Higher risk: on-site reviews Moderate risk: desktop reviews Lower risk: vendor self assessments PwC 7
8 An effective and efficient TPRM program can benefit all facets of the enterprise. An effective and efficient TPRM program may provide benefits to various facets of the enterprise. Cost Reduced cost of managing vendor risk through stratification, process simplification, and use of technology Greater transparency into the costs of Third Party Risk Management Quality Higher quality Third Party Risk Management throughout the vendor lifecycle Tighter controls over vendors that pose significant risk Consistent approach to assessing vendors and risks they present Standardization Improved quality, efficiency, timeliness and accuracy of TPRM stemming from automated workflows and reporting tools Streamlined and standardized processes for supplier on-boarding, risk profiling, and ongoing monitoring and oversight Greater benefits realized from scorecards and dashboards through use of standardized key performance indicators (KPIs) and key risk indicators (KRIs) Risk More effective monitoring of due diligence activities and their frequency, as now driven by both inherent and residual risks Greater agility in responding to changing regulatory requirements and other TPRM challenges as they arise Flexibility and efficiency Tighter focus on specific controls associated with those relationships found to pose the greatest risk, now made possible through vendor stratification Limited resources now able to be refocused based on identified organizational priorities Enhanced ability to quickly undertake new initiatives when opportunities arise such as launching new services Ability to locate vendor replacements more rapidly as needed Shareholder value Improved compliance with Federal laws and regulations, thereby reducing or eliminating altogether any fines and penalties that could prohibit services and impact the bottom line Less intense scrutiny by the regulatory community Appropriately trained and placed resources PwC 8
9 PwC offers a range of services with various entry points through the TPRM lifecycle, helping clients assess their current state programs and develop a roadmap for designing, building, and improving their current programs. Program Diagnostic Perform a high level assessment of the current TPRM function, identifying gaps against needs and leading practices. Program Management Office Outsource or co-source the TPRM program, including project planning, execution, and reporting. Vendor Assessments Using PwC's global network of firms and service delivery centers, perform the following for specified vendors: on-site or remote reviews or development of selfassessments to be used by vendors. Sustain Assess Vendor Stratification Perform a risk assessment and determine a risk score for all outsourced services and vendors. Help develop the client's strategy to respond to that risk. Transform Transformational Roadmap Execute a comprehensive program review resulting in an end-state blueprint and roadmap to desired state, including anticipated level of effort and costs. Function Build/Rebuild Assist in building and implementing a new TPRM office, including the operating model, governance and structure, policies & procedures, processes and controls, and reporting framework. Technology Enablement Integrate processes into new or existing technology platforms. PwC 9
10 To have a deeper conversation, please contact: Shawn Panson (973) [email protected] TR Kane (216) [email protected] Dan Morrison (415) [email protected] Garit Gemeinhardt (704) [email protected] Nehal Sheth (415) [email protected] Dean Spitzer (917) [email protected] Rob Stouder (317) [email protected] PwC 10
11 2013 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved. PwC refers to the US member firm, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details. This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors.
PwC Health Industries Viewpoint on Third Party Risk Management
www.pwc.com November 2013 PwC Health Industries Viewpoint on Third Party Risk Management Significant others: How companies can effectively manage the risks of third party relationships Are vendors more
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Risk Management: IT Vendor Management and Outsourcing
www.pwc.com Risk Management: IT Vendor Management and Outsourcing Definitions Third Party is any entity not under direct business control of a given organization. Many people equate third parties with
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.
Managing data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are
Developing and Maintaining a World-Class Third Party Risk Assessment Program
Developing and Maintaining a World-Class Third Party Risk Assessment Program Presented by: Tom Garrubba, Senior Director, The Santa Fe Group/Shared Assessments Program Monday, September 15, 2014 - IIA
2014 Vendor Risk Management Benchmark Study
2014 Vendor Risk Management Benchmark Study Introduction/Executive Summary You can have all the security in the world inside your company s four walls, but all it takes is a compromise at one third-party
fs viewpoint www.pwc.com/fsi
fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
Identifying and Managing Third Party Data Security Risk
Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Strengthening Cybersecurity Defenders #ISC2Congress Healthcare and Security "Information Security is simply a personal
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape
January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both
Vendor Risk Management in the New Regulatory Environment. kpmg.com
Vendor Risk Management in the New Regulatory Environment kpmg.com Vendor Risk Management in the New Regulatory Environment 2 Vendor Risk Management in the New Regulatory Environment Background Regulators
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Third-Party Cybersecurity and Data Loss Prevention
Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Managing the Shadow Cloud
Managing the Shadow Cloud Integrating cloud governance into your existing compliance program August 2014 Shadow IT is not a new concept and organizations are well aware of the risks associated with unauthorized
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.
Vendor Management: An Enterprise-wide Focus Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Why Focus on Vendor Management Increased financial regulatory scrutiny GLBA and Identity Theft Red
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
Metrics by design A practical approach to measuring internal audit performance
Metrics by design A practical approach to measuring internal audit performance September 2014 At a glance Expectations of Internal Audit are rising. Regulatory pressure is increasing. Budgets are tightening.
Identity Theft Regulation: Are you under the SEC/CFTC microscope?
Regulatory September 2013 brief A publication of PwC s financial services regulatory practice Identity Theft Regulation: Are you under the SEC/CFTC microscope? Overview Easy access to information has made
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
Your world runs on applications. Secure them with Veracode.
Application Risk Management Solutions Your world runs on applications. Secure them with Veracode. Software Security Simplified Application security risk is inherent in every organization that relies on
Vendor Security Risk Management
ISACA San Francisco Fall Conference 2007 Vendor Security Risk Management Dan Morrison September 17, 2007 Topics of Discussion Context-Information, operations &
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group 54 Banking PersPective Quarter 2, 2014 Responsibility for the oversight of information security and
IDENTIFYING VENDOR RISK THE CRITICAL FIRST STEP IN CREATING AN EFFECTIVE VENDOR RISK MANAGEMENT PROGRAM
IDENTIFYING VENDOR RISK THE CRITICAL FIRST STEP IN CREATING AN EFFECTIVE VENDOR RISK MANAGEMENT PROGRAM HEADQUARTERS 33 Bradford Street Concord, MA 01742 PHONE: 978-451-7655 THE CRITICAL FIRST STEP IN
REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI
REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI Healthcare Organizations Can Adopt Enterprise-Wide Disclosure Management Systems To Standardize Disclosure Processes,
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
RISK MANAGEMENT PROGRAM THAT WORKS FOUR KEYS TO CREATING A VENDOR. HEADQUARTERS 33 Bradford Street Concord, MA 01742 PHONE: 978-451-7655
FOUR KEYS TO CREATING A VENDOR RISK MANAGEMENT PROGRAM THAT WORKS HEADQUARTERS 33 Bradford Street Concord, MA 01742 PHONE: 978-451-7655 FOUR KEYS TO CREATING A VENDOR RISK MANAGEMENT PROGRAM THAT WORKS
Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity
Uncheck Yourself Build a Security-First Approach to Avoid Checkbox Compliance by Karen Scarfone Principal Consultant Scarfone Cybersecurity Sponsored by www.firehost.com (US) +1 844 682 2859 (UK) +44 800
THE STATE OF DATA SHARING FOR HEALTHCARE ANALYTICS 2015-2016: CHANGE, CHALLENGES AND CHOICE
THE STATE OF DATA SHARING FOR HEALTHCARE ANALYTICS 2015-2016: CHANGE, CHALLENGES AND CHOICE As demand for data sharing grows, healthcare organizations must move beyond data agreements and masking to achieve
Guided HIPAA Compliance
Guided HIPAA Compliance HIPAA Solutions for Office Managers and Practitioners SecurityMetrics We protect business Since its founding in 2000, privately-held SecurityMetrics has grown from a small security
Auditing Security: Lessons Learned From Healthcare Security Breaches
Auditing Security: Lessons Learned From Healthcare Security Breaches Adam H. Greene, J.D., M.P.H. Davis Wright Tremaine LLP Washington, D.C. Michael Mac McMillan CynergisTek, Inc. Austin, Texas DISCLAIMER:
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
How To Protect Visa Account Information
Account Information Security Merchant Guide At Visa, protecting our cardholders is at the core of everything we do. One of the many reasons people trust our brand is that we make buying and selling safer
Compliance Risk Management Survey A Point of View
FINANCIAL SERVICES Compliance Risk Management Survey A Point of View July 2014 kpmg.com Compliance Risk Management Survey A Point of View 3 Introduction As the financial crisis unfolded, regulators looked
FINRA Publishes its 2015 Report on Cybersecurity Practices
Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February
HIPAA and HITRUST - FAQ
A COALFIRE WHITE PAPER HIPAA and HITRUST - FAQ by Andrew Hicks, MBA, CISA, CCM, CRISC, HITRUST CSF Practitioner Director, Healthcare Practice Lead Coalfire February 2013 Introduction Organizations are
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for an automated penetration testing product and demonstrate
Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com
Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for
Data Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
State of Compliance 2014 Healthcare provider industry brief
Delve into the full analysis of the 2014 State of Compliance Survey at: pwc.com/us/ stateofcompliance State of Compliance 2014 Healthcare provider industry brief Introduction The healthcare provider industry
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
Auditing your institution's cybersecurity incident/breach response plan. Baker Tilly Virchow Krause, LLP
Auditing your institution's cybersecurity incident/breach response plan Objectives > Provide an overview of incident/breach response plans and their intended benefits > Describe regulatory/legal requirements
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
AML Topics Using analytics to get the most from your transaction monitoring system
www.pwc.com AML Topics Using analytics to get the most from your transaction monitoring system March 2011 Contents Components of the AML Compliance Program... 1 Transaction Monitoring... 1 Transaction
Healthcare Internal Audit: In a Time of Transition
The 2015 State of the Internal Audit Profession Study Healthcare Internal Audit: In a Time of Transition The healthcare industry in the United States is facing many challenges with the enactment of legislation
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance
Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance Arm Stakeholders with Critical Information to Assess 3rd Party Relationships and Comply with the Foreign Corrupt Practices Act
Get More Out of Your Risk Assessment. Austin Chapter of the IIA
Get More Out of Your Risk Assessment Austin Chapter of the IIA Speakers Alyssa G. Martin, CPA Dallas Executive Partner, Advisory Services 25 years of public accounting experience, with a practice emphasis
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER
FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER As a board-level discussion topic at all financial institutions (FI) today, operational risk is real and public disclosure of significant
Empower loss prevention with strategic data analytics
www.pwc.com/us/lossprevention January 2015 Empower loss prevention with strategic data analytics Empower loss prevention with strategic data analytics Amid heightened levels of business competition and
2012 HIPAA Privacy and Security Audits
Office of the Secretary Office for Civil Rights (OCR) 2012 HIPAA Privacy and Security Audits Linda Sanches OCR Senior Advisor, Health Information Privacy Lead, HIPAA Compliance Audits OCR 1 Agenda Background
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
Make information work to your advantage. Help reduce operating costs, respond to competitive pressures, and improve collaboration.
Make information work to your advantage. Help reduce operating costs, respond to competitive pressures, and improve collaboration. May 2011 Advisory Consulting Table of contents Transform data from a hindrance
Data Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
Vendor Management Compliance Top 10 Things Regulators Expect
Vendor Management Compliance Top 10 Things Regulators Expect Paul M. Phillips, CFA Attorney, Adams and Reese Pamela T. Rodriguez, AAP, CIA, CISA EVP, Risk Management & Education, EastPay 2014 EastPay.
Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:
Beyond Sarbanes-Oxley: Using compliance requirements to boost business performance The business regulatory environment in the United States has changed. Public companies have new obligations to report
Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the
Remarks by Carolyn G. DuChene Deputy Comptroller Operational Risk at the Bank Safety and Soundness Advisor Community Bank Enterprise Risk Management Seminar Washington, D.C. October 22, 2012 Good afternoon,
IT Insights. Managing Third Party Technology Risk
IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate
