IT Risk Management Life Cycle and enabling it with GRC Technology
|
|
|
- Calvin Waters
- 10 years ago
- Views:
Transcription
1 IT Risk Management Life Cycle and enabling it with GRC Technology Debbie Lew Senior Manager, E&Y Steven Jones Senior Manager, E&Y
2 Overview 1. What is risk management? Common understanding 2. IT risk management life cycle 3. Key components of an IT risk management program 4. Resources and enablers for IT risk management 5. What does technology enablement mean? 6. Industry perspective 7. Business drivers 8. Trends and challenges 9. Risk process implementation 10. GRC technology implementation considerations 11. Value considerations
3 What is risk management? Is the identification, assessment, and prioritization of risks (as the effect of uncertainty on objectives, whether positive or negative) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities. As per Wikipedia
4 What are your challenges with IT risk ikmanagement in your organization?
5 Industry Perspective Risk management, regulatory, and compliance requirements are increasingly complex and intrusive (especially for financial services institutions) and have become a growing operational and financial burden. These requirements are not optional and must be addressed. Institutions have often approached the requirements in silos, leading to the creation of multiple risk governance processes, methods and infrastructure. Typical control functions are experiencing scope creep due to a combination of external and internal pressures. High expectations have blurred the lines of authority and responsibility among the control units. Cost reduction imperatives are limiting the ability of risk management functions to keep pace with business growth. Linesof businessareexperiencing experiencing risk management process fatigue. Significant amounts of time and money are spent complying with risk requirements, which can be further burdened by multiple requests and duplicative efforts. Boards of directors and senior management are demanding more comprehensive Boards of directors and senior management are demanding more comprehensive, consolidated, and actionable governance, risk and compliance information.
6 Risk management lifecycle
7 IT risk management program What is it? IT risk governance and strategy, and the supporting organization, resources and components used to establish an effective, operational and sustainable IT risk management program Components can include: Defined business drivers that align to Risk Strategy, Charter and Reporting on critical success factors Define regulatory requirements and industry standards for adherence Charter that reflects mandate for IT risk management program, risk principles and governance structure for operating the program IT risk management strategic plan that defines program objectives, business drivers alignment, critical success factors and measurements, risk governance structure, risk management processes, roles and responsibilities, risk appetite and tolerance guidance, strategic t and tactical ti linitiatives, iti timelines and work effort for design and implementations, interdependencies with other functional operations ERM/ORM, Security, BCM, Compliance, SOX, etc. Defined risk management policies and standards Defined and documented taxonomy Defined IT Risk & Control Framework Process/Risk/Control Model Rating, scoring and weighting model or quantification model Risk identification process internal and external data mining for trends, analysis and classification Risk profiling attributes and process
8 Business case and value of an IT Risk (GRC) Management Framework Effective, documented response to numerous regulatory/industry/audit/compliance requirements Lower cost Repeatable processes and risk based technology decisions produce 8 12% cost savings Average from various sources including Gartner, Forrester, and the Risk Management Association Reduce siloed and duplicative efforts Lines of business/functions experiencing assessment fatigue Consistent controls and consistent testing strategy focused just on higher risk areas deemed key for the organization Better allocation of technology spend and resources Defensible, risk based decisions to properly allocate technology spend to highest risk areas Manage unknown risk Quickly identify new risks and quantify cost of exposure through consistent processes (new systems, new technologies) Enable go to market for new ventures, emerging technologies, and business products System stability/performance Reduce system failures with risk based approach to system and architecture investments e.g., identification and categorization of failure trends and issues with systems allowing risk ranked remediation acrossthe enterprise
9 Resources & Enablers Risk IT Framework and Practitioner s Guide COBIT5 Framework and supporting products
10 ISACA s Risk IT Framework and Practitioner s Guide Risk IT is a framework based on a set of guiding principles and featuring business processes and management guidelines that confirm these principles. p Risk IT framework is to be used to help implement IT governance. Organisations that have adopted (or are planning to adopt) CobiT as their IT Governance framework can use Risk IT to enhance risk management.
11 Risk IT Framework
12 COBIT 5 The COBIT 5 governance or management practices are equivalent to the Risk IT processes. The COBIT 5 activities are equivalent to the Risk IT management practices. COBIT 5 follows the same goal and metric concepts as Risk IT, but these are renamed enterprise goals, IT related goals and process goals reflecting an enterprise level view. COBIT 5 provides RACI charts describing roles and responsibilities in a similar way to Risk IT. Future enabler includes COBIT 5 for Risk 12
13 Meeting Stakeholder Needs Principle 1. Meeting Stakeholder Needs Enterprises exist itto create value for their stakeholders. tkhld Source: COBIT 5, figure ISACA All rights reserved. 13
14 COBIT 5: Enabling Processes 14
15 Enabling Process APO12 Manage Risk
16 When you hear the term, GRC, what does it mean to you and your organization?
17 What does GRC technology enablement mean?
18 Technology enablement The development of business aligned requirements to drive the use of technology to design, enhance, implement and operationalize Governance, Riskand Complianceprocessesprocesses Organizations that use technology to enable their GRC processes have the potential to reduce the cost of risk management, enhance compliance and audit, streamline reporting, better manage risk, and deliver insight for better decision making. By enabling technology, companies can build an effective foundation that allows them to build efficiency, integrity and consistency into their processes: Data mapping to identify critical relationships between corporate objectives, risks and controls; Workflow to optimally coordinate activities across multiple layers of the organization; Decision support necessary for planning and reporting; Management of risks from identification, to assessment and treatment; Model multiple li l risk ikhierarchies and integrate risk ikintelligence with ihother asset and risk ik information systems; Understanding the holistic IT Process, Risk and Control environment in place within an organization; and Reporting, monitoring and dashboarding of risk (inherent risk, residual risk and key risk indicators) across the IT environment.
19 Governance, Risk & Compliance tool space
20 Business drivers for technology enablement
21 Business drivers Increasingly complex and updated risk management, regulatory and compliance requirements, and Board and shareholder expectations Pending Dodd Frank legislation An increased pressure to comply with NIST Regulatory updates across FFIEC and BITS PCI DSS v2.0 Duplication of risk governance processes, methods and infrastructure Too many siloed assessments across functional areas of technology Non aggregated reporting across multiple sources of risk intelligence Inconsistent risk taxonomies Control functions experiencing scope creep and high expectations have blurred lines of authority/responsibility amongst control units Duplication of controls across multiple IT units Multiple shared controls that could be condensed Driving i towards control convergence and automated t control monitoring i through hgrc technology Cost reduction imperatives are limiting the ability of risk management functions to keep pace with business growth IT risk management requirements have increased while pressure is faced across available budget and head count
22 Business drivers (cont.) Lines of business are experiencing risk management process fatigue due to the amount of time and money spent complying with risk requirements Repeat and overlapping assessments over functional areas of technology Time commitment required to follow organizational risk management processes is placing a burden on the first line of defense Non prioritized approach to risk mitigation leading to potential improper allocation of funds Management is demanding more comprehensive, consolidated, and actionable governance, risk and compliance information Reporting of risk management activity and outcomes across multiple hierarchies is a challenge for IT risk functions Organizations i are facing challenges hll when attempting to incorporate risk ikintelligence across the organization i Mergers & Acquisitions Multiple risk programs requiring consolidation and aggregation IT risks inherited from legacy environments
23 Current state vs. future state Most companies have taken a very siloed approach to risk and compliance management which creates multiple redundancies and extensive inconsistency in how risks are assessed and managed. External regulators, analysts, investors Board/senior management oversight Audit Risk Other committee committee committees Audit committee Board oversight Compensation committee Risk committees Executive management Other committee CEO CFO CRO General Counsel Int co ternal ontrol Internal audit Risk management Compliance Internal control Information technology Legal and regulatory External audit Internal audit External audit Aligned mandate and scope Coordinated infrastructure and people Consistent methods and practices Common information and technology Business unit Business unit Business unit Business unit Business unit Business unit Business unit Business unit
24 Trends and challenges
25 Key issues and trends facing GRC tools Lack of a GRC strategy, vision and holistic business and functional requirements can lead to incorrect tool selections, over budget implementations of GRC tools, or misuse of GRC technology. There is a continued evolution and broader use of technology for GRC across IT. There has been a recent entrance of software heavyweights into the GRC market. GRC tools are being leveraged for business process management and assessment rules engines along with continuous auditing, monitoring and control testing. GRC vendors are developing relationships with other application vendors (competitors and complementary products) to extend the range of the software. Others have been acquired to combine product offerings into larger, more comprehensive packages.
26 Key issues and trends facing GRC tools A lack of governance and accountability for GRC tools can limit the return on investment from a GRC solution. Ownership of GRC technology is crucial to driving consistency in methodology, reporting and presentation. Many organizations are designing a holistic GRC technology ecosystem to achieve holistic risk intelligence across the enterprise. There are multiple regulatory environments that can be covered by GRC tools, and not one GRC vendor provides content to cover all the environments. There is increased board liability as it pertains to IT risk. Organizations are looking at leveraging GRC technology to facilitate a central corporate policy management portal. There is outsourcing of compliance monitoring for the internal and external business environments. Consulting firms are either tool agnostic or they are not. Many firms have g g y y strategic relationships with GRC vendors that may skew their perspective.
27 Current state limitations Definition of GRC The definition of GRC differs from client to client and vendor to vendor, leading to an inability to standardize GRC requirements and guide future development. Isolation of financial risk management functionality from mainstream GRC solutions No single solution available All solutions perform well for certain aspects of GRC, but no one solution provides a complete holistic solution for all GRC requirements. Immature dashboarding and metrics Not all tools provide web enabled reporting and dashboards. Non financial RM tools do not provide advanced charting capabilities to address complex risk scenario analysis. Virtually nonexistent global regulatory content Inconsistent framework mapping and content Assessment methodology Only a select few tools allow for logic based assessments (questionnaires, surveys, etc.), which integrate business workflow and risk calculations driven by assessment results. Risk control library management is not integrated into assessments to drive risk convergence.
28 Key issues & trends facing GRC tools no silver bullet! Issues No silver bullet Non standard definition of GRC hampers ability to define future state and drive requirements Multiple regulatory environments Increased board liability Many of the systems currently in use were developed for a specific function or sector need. These vendors are challenged with finding alternative uses for their applications Immature dashboards and metrics Immature capabilities to gain real time data feeds Inconsistent framework mapping Configuration flexibility Assessment methodology and maturity Initiative should be a directive from executive management with agreement from all key stakeholders Market issues are driving product trends Trends Continued evolution and broader use of technology for GRC Entrance of software heavyweights into GRC market Architecting a holistic GRC technology ecosystem Integration of web services to enable risk and regulatory intelligence Implementation of a central corporate policy management portal Use of business process management and rules engines along with continuous auditing, monitoring and control testing Outsourcing of compliance monitoring for the internal and external business environments Acquisitions and alliances are forming to extend or enhance product offering
29 What are your challenges (anticipated) in selecting, configuring and implementing GRC technology?
30 GRC tool implementation challenges Functional requirements along with organizational and process convergence should be defined prior to tool selection by performing a feasibility study Organizations purchasing a solution, and then attempting to converge the risk organization andprocesses contains many challenges Maturity of vendor solutions is not where it needs to be to meet all GRC functional requirements A lack of understanding of how other business tools can integrate into GRC solutions and of future GRC state requirements still exist Many organizations will need to customize their selected GRC tool or change their current methodologies, business processes, and hierarchies to have a successful GRC tool implementation Content management decision if aligning to leading practices, frameworks, and regulations, a decision needs to be made to determine if you will rely on a vendor to provide and manage content going forward or will it be customized and managed by the client Timeframes for implementation is often under estimated most organizations take between months for successful implementation and for operational competencies to be realized GRC tool cost is often underestimated due to improper calculating of customization or functional and process modifications that will be needed by the firm Lack of experience and knowledgeable resources that are dedicated to GRC tool implementation Vendorsupportandexperience experience at business aligned deployments is limited
31 Customization vs. configuration A key consideration when analyzing GRC solutions is the concept of customization vs. configuration. These are two very distinct terms, and have significant impact on a GRC solutions ability to meet or exceed business and functional requirements. Configuration refers to the process of altering a GRC solution by making basic changes to the out of the box capability to meet business requirements. This process will not greatly enhance a GRC solutions functionality. Examples of configuration include: Changing colors Changing field properties (i.e., text, number, length, etc.) Adding fields Creating basic calculations Customization refers to the process of altering and enhancing a GRC solution by making advanced changes to the out of the box capability to meet business requirements. This process can greatly enhance a GRC solution s functionality. Examples of customization include: Building custom business workflow Using JavaScript or HTML to enhance the functionality of the GRC solution Using advanced calculations and logic Integrating data from multiple systems and sources
32 GRC solution cost balance Complexity Support Need to increase cost to achieve balance Customization Administration Complexity Support Customization Administration What s the right balance for your organization?
33 GRC tool functional coverage Governance Financial risk Risk management Metrics, presentation and reporting Policy management Scenario analysis Risk profiling Dashboards Standards Risk modeling Risk assessment Ad-hoc reporting Procedures Financial risk impact Risk identification Notifications PRC framework analysis Risk analysis User interface Asset and hierarchy KRIs Statistical analysis management Threat and vulnerability Historical trending Process accountability management Triggered calculations Data management Information security Audit tracking Awareness training BCP/DR Data export Project management Internal control management KRI/KPI management Vendor management Service delivery management Compliance Audit Issues management Incident management Regulatory content Management Leading practice content Management Compliance monitoring Compliance assessment Program management Scheduling Attestation Evidence capture SAS 70/SOC 2 Risk treatment Risk acceptance Policy exceptions Risk transference Event capture Loss capture
34 IT GRC tool vendor geographic Leader: RSA Archer, Thompson Reuters Presence: All others footprint Leader: Bwise Presence: RSA Archer, Thompson Reuters Leader: Bwise Presence: RSA Archer, Thompson Reuters Leader: RSA Archer Presence: Thompson Reuters Leader: Modulo Presence: RSA Archer, Thompson Reuters, Bwise Leader: None Presence: BWise Leader: None Presence: RSA Archer, Thompson Reuters
35 Risk process implementation
36 Core GRC solution components Populations / inventories / authority information Dt Determination ti of CMDB (Configuration Management tdtb Database) and asset management tool integration for applications and supporting infrastructure, databases, operating systems and data centers Identification of relevant industry regulations and best practices to align with Business hierarchy Considerations around functional, line of business (LOB) or entity hierarchy embedded within the GRC tool Determination of depth and breadth of hierarchy SSO integration Integration with LDAP (Lightweight g Directory Access Protocol) to simplify user authentication and user access administration Access control strategy Groups, roles and privileges assigned to users
37 Potential technology enablement coverage IT Risk Op Risk ERM Internal Audit Regulatory Risk Legal & Compliance Info Security PRC Framework Assessments Program Mgmt Issues Mgmt Case Mgmt KRI s Content Mgmt UI / Metrics / Dashboards Other
38 GRC technology implementation considerations
39 Key GRC functional requirements Policy, Standards and Procedures Mgmt. Content Management Risk Mgmt Processes (Assessments, KRI s, Event Capture, Risk Profiling, etc ) Vendor Management Risk Assessment and Risk Analysis Capabilities Risk Identification and Profiling Issues, Mitigation, Risk Acceptance Lifecycle Management Training and Awareness Risk Identification Methodology Frameworks & Hierarchy Structure (Org, Process, Risk, Control) Asset Management Capabilities Hierarchy Structure Organizational, Process, Risk, Control, Metrics and Reporting Best Practice Content Technology Controls/Information Security Regulatory Mapping Regulatory Mappings Regulatory Compliance Capabilities and Leading Practices Standards SOX, Basel II, GLBA & Data Protection Laws, PCI, FFIEC, BITS, COSO, ISO27002, CobiT, ITIL, etc. Compliance Monitoring Business Process Management Business Workflow Management Audit Processes Audit Processes and Workflow Attestation Capabilities Archival Control lautomation ti & Monitoring i Automated Control Testing Real Time Monitoring Notification Services Metrics, Measurements, and Reporting Quantity & quality of template reports Ad hoc Reporting Risk Simulation Capability Risk Weighting & Calculations Statistical Analysis Dashboards Financial Risk Management Financial Risk Modeling Financial Risk Impact Analysis Quantification Engine Event Loss/Capture Incident Management Financial Risk Content (i.e. ratings) Configuration Flexibility Interoperability/Application Interface/Open Standards Configuration Capabilities Customization Capabilities
40 Key GRC functional requirements Available Modules and descriptions Additional Functionality Management Assurance Ease of Use Auditing and Logging Vendor Qualifications Financials Client Base Market ratings and rankings Release Cycle Implementation Requirements Product Training Risk Based Services Maintenance & Support Enterprise Scalability End User Experience/Interface Teaming and Support from Vendor Industry Saturation/Customer loyalty (cont.) System Administration Backup & Recovery System Performance User Administration Documentation & Guidance Security Configuration Technical Architecture Infrastructure Requirements Application Requirements Integration Capabilities Data Ownership & Management Performance and Scalability Single Sign On Integration Data Integrity and Audit Future Product Roadmap Deployment & Migration Fees, Contracts and Software Arrangements Note: The provided GRC Function Requirements area sample only a full requirements gathering and weighting Note: The provided GRC Function Requirements are a sample only, a full requirements gathering and weighting exercise must be done to ensure proper tool selection.
41 Design considerations Convergence of risks, controls, processes, issues and themes Roadmap and strategic approach Solutionownership ownership andgovernance Reporting requirements and data considerations Process and workflow requirements Source of record vs. data feeds Implementation management Functional and technical requirement validation Support personnel
42 GRC technology enablement approach Suggested key milestones Suggested program deliverables Evaluation and approval of a GRC solution Development of technical specifications from business and functional requirements Detailed design of core foundational components Organizational hierarchy Process hierarchy Risk Hierarchy Control Hierarchy Hierarchy relationships and interdependencies Design and implementation of risk assessment methodology and assessments Design and implementation of Issues Management Design and implementation of additional risk management processes Design and implement reporting and dashboarding requirements Foundational components technical specifications Technical specifications for risk assessments, issues management, and reporting Core framework solution implementation Risk process solution implementation Reporting and dashboarding implementation UAT completion and a run book/design binder Training material and procedural guides
43 Value considerations
44 Value proposition Measurable and documented enterprise commitment to transparency and compliance Decreased exposure to fraud, catastrophic losses and the full compliment of operational risks Prepared to anticipate and respond to new and changing regulatory matters Greater insight and more effective decision support Better equipped to lower cost and improve performance More effective management and use of enterprise information
45 Questions? Thank you!
How To Improve Your Business
IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends
IT Governance: framework and case study. 22 September 2010
IT Governance: framework and case study Presenter Yaowaluk Chadbunchachai Advisory Services Ernst & Young Corporate Services Limited Presentation topics ERM and IT governance IT governance framework IT
Welcome to Modulo Risk Manager Next Generation. Solutions for GRC
Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS
Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization
Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Continuous Controls Monitoring. Virginia ISACA January Meeting 19 January 2010
Continuous Controls Monitoring Virginia ISACA January Meeting 19 January 2010 Today s Agenda What We Are Hearing About Risk Internal Controls Continuous Control Monitoring What is CCM? Framework EY Point
14 October 2015 ISACA Curaçao Conference By: Paul Helmich
Governance, Risk & Compliance A practical approach 14 October 2015 ISACA Curaçao Conference By: Paul Helmich Topics today What is GRC? How much of all the GRC literature, tools, etc. do I need to study
IT Governance, Risk and Compliance (GRC) : A Strategic Priority. Joerg Asma
IT Governance, Risk and Compliance (GRC) : A Strategic Priority Joerg Asma Agenda Introductions An Overview of IT Governance Risk & Compliance (IT-GRC) The Value Proposition Implementing an IT-GRC Program
Module 6 Essentials of Enterprise Architecture Tools
Process-Centric Service-Oriented Module 6 Essentials of Enterprise Architecture Tools Capability-Driven Understand the need and necessity for a EA Tool IASA Global - India Chapter Webinar by Vinu Jade
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
Moving Forward with IT Governance and COBIT
Moving Forward with IT Governance and COBIT Los Angeles ISACA COBIT User Group Tuesday 27, March 2007 IT GRC Questions from the CIO Today s discussion focuses on the typical challenges facing the CIO around
Metrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER
FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER As a board-level discussion topic at all financial institutions (FI) today, operational risk is real and public disclosure of significant
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
RSA Archer Risk Intelligence
RSA Archer Risk Intelligence Harnessing Risk to Exploit Opportunity June 4, 2014 Steve Schlarman GRC Strategist 1 Risk and Compliance Where is it today? 2 Governance, Risk, & Compliance Today 3 4 A New
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
building a business case for governance, risk and compliance
building a business case for governance, risk and compliance contents introduction...3 assurance: THe last major business function To be integrated...3 current state of grc: THe challenges... 4 building
Improving Financial Performance, Governance and Compliance
Enterprise Risk Management Improving Financial Performance, Governance and Compliance Through A Structured Approach Experis Finance By: Fred E. Lutzeier National ERM Director [email protected]
ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES
THOMSON REUTERS ACCELUS ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES PROACTIVE. CONNECTED. INFORMED. THOMSON REUTERS ACCELUS Compliance management Solutions Introduction The advent of new and pending
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
10 Best-Selling Modules For Home Information Technology Professionals
Integriertes Risk und Compliance Management als Elemente einer umfassenden IT-Governance Strategie Ing. Martin Pscheidl, MBA, MSc cert. IT Service Manager Manager, Technical Sales CA Software Österreich
ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS ACCELUS RISK MANAGEMENT SOLUTIONS
ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS Our solutions dynamically connect business transactions, strategy, and operations to
Preparing for the Convergence of Risk Management & Business Continuity
Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today
Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation
Tying It All Together: Practical ERM Integration Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation November 16, 2007 1 Agenda Basis for ERM Integration ERM Objectives ERM Focus
Enterprise Risk Management & Information Technology
Enterprise Risk Management & Information Technology Presented by Scott Perry and Gary Ross Slalom Consulting, San Francisco Agenda Introductions Session Objectives Overview of Enterprise Risk Management
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
igrc: Intelligent Governance, Risk, and Compliance White Paper
igrc: Intelligent Governance, Risk, and Compliance White Paper 2013 2013 Edgile, Inc. All Rights Reserved Executive Overview This whitepaper discusses the business needs addressed by Edgile s igrc solution,
Revised October 2013
Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA
Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
fs viewpoint www.pwc.com/fsi
fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a
Gobierno de TI Enfrentando al Reto. IT Governance Facing the Challenge. Everett C. Johnson, CPA International President ISACA and ITGI
Gobierno de TI Enfrentando al Reto IT Facing the Challenge Everett C. Johnson, CPA International President ISACA and ITGI 1 Add titles Agenda Agenda IT governance keys IT governance focus areas: theory
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma Governance, Risk, Compliance (GRC) Automation Siamak Razmazma [email protected] September 2009 Agenda Introduction to
Achieving Business Imperatives through IT Governance and Risk
IBM Global Technology Services Achieving Business Imperatives through IT Governance and Risk Peter Stremus Internet Security Systems, an IBM Company Introduction : Compliance Value Over the past 15 years
XBRL & GRC Future opportunities?
XBRL & GRC Future opportunities? Suzanne Janse Deloitte NL Paul Hulst Deloitte / Said Tabet EMC Presenters Suzanne Janse Deloitte Netherlands Director ERP (SAP, Oracle) Risk Management GRC software Paul
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps
Enhancing IT Governance, Risk and Compliance Management (IT GRC)
Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enabling Reliable eservices Tawfiq F. Alrushaid Saudi Aramco Agenda GRC Overview IT GRC Introduction IT Governance IT Risk Management IT
Chartis RiskTech Quadrant for Model Risk Management Systems 2014
Chartis RiskTech Quadrant for Model Risk Management Systems 2014 The RiskTech Quadrant is copyrighted June 2014 by Chartis Research Ltd. and is reused with permission. No part of the RiskTech Quadrant
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution 1. The Challenge Large enterprises are experiencing an ever increasing burden of regulation and legislation against which they
ENTERPRISE RISK MANAGEMENT FOR BANKS
ENTERPRISE RISK MANAGEMENT FOR BANKS Seshagiri Rao Vaidyula, Senior Manager, Governance, Risk and Compliance Jayaprakash Kavala, Consultant, Banking and Financial Services 1 www.wipro.com/industryresearch
Wilhelmenia Ravenell IT Manager Eli Lilly and Company
Wilhelmenia Ravenell IT Manager Eli Lilly and Company Agenda Introductions The Service Management Framework Keys of a successful Service management transformation Why transform? ROI and the customer experience
Identity & Access Management new complex so don t start?
IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Enabling Data Quality
Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &
Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting
Consulting and Professional Services Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting Designing an Operational Risk Program for
Whitepaper: 7 Steps to Developing a Cloud Security Plan
Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Using Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy. June 23, 2015
Using Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy June 23, 2015 What is egrc? A management system for compliance requirements, policies, risk
Case Study: ICICI BANK INTERNAL AUDIT DEPARTMENT PENTANA AUDIT WORK SYSTEM IMPLEMENTATION
Introduction Emerging trends in the banking sector due to globalisation, liberalisation, increasing environment complexity, regulatory requirements & accountability is driving banks in India to adopt &
How RSA has helped EMC to secure its Virtual Infrastructure
How RSA has helped EMC to secure its Virtual Infrastructure A new solution, the RSA solution for Cloud Security and Compliance, has been developed and is now available to all of our customers. Luciano
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview
IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE
1 IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE ANSWERS AND PRACTICAL TIPS FROM THE IT GOVERNANCE AUDIT PROFESSIONALS JOHAN LIDROS, PRESIDENT EMINERE GROUP KATE MULLIN, CISO, HEALTH
Making Compliance Work for You
white paper Making Compliance Work for You with application lifecycle management Rocket bluezone.rocketsoftware.com Making Compliance Work for You with Application Lifecycle Management A White Paper by
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Department of Technology Services
Department of Technology Services 2016-2019 Strategic Plan DTS Dept. of Technology Services Utah Code 63F- 1-203 explicitly requires the Chief Information Officer (CIO) to prepare an executive branch strategic
Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister
Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.
SIEM Implementation Approach Discussion. April 2012
SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
HP and netforensics Security Information Management solutions. Business blueprint
HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization
Quest InTrust. Change auditing and policy compliance for the secure enterprise. May 2008. Copyright 2006 Quest Software
Quest InTrust Change auditing and policy compliance for the secure enterprise May 2008 Copyright 2006 Quest Software Quest is the Thought Leader in Active Directory Named Microsoft Global ISV Partner of
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach
The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach by Philippe Courtot, Chairman and CEO, Qualys Inc. Information Age Security Conference - London - September 25
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Integrated Stress Testing
Risk & Compliance the way we see it Integrated Stress Testing A Practical Approach Contents 1 Introduction 3 2 Stress Testing Framework 4 3 Data Management 6 3.1 Data Quality 6 4 Governance 7 4.1 Scenarios,
EMA Service Catalog Assessment Service
MORE INFORMATION: To learn more about the EMA Service Catalog, please contact the EMA Business Development team at +1.303.543.9500 or [email protected] The IT Service Catalog Aligning
RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education
RSA Archer Training Governance, Risk and Compliance Managing enterprise-wide governance, risk and compliance through training and education www.emc.com/rsa-training 1 RSA Archer Training Table of Contents
TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR
TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR (BUY VS BUILD) APRIL 17, 2015 LEVERAGING TECHNOLOGY FOR AUDIT Utilizing Software to Administrate Audit Process 40% 35% 30% 37% Tools Leveraged 32% 36% Yes
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
EMA CMDB Assessment Service
The Promise of the CMDB The Configuration Management Database (CMDB) provides a common trusted source for all IT data used by the business and promises to improve IT operational efficiency and increase
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
IT Governance. What is it and how to audit it. 21 April 2009
What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures
Delivering Quality Service with IBM Service Management
Delivering Quality Service with IBM Service Milos Nikolic, Global Technology Services Manager Dragan Jeremic, Technical Sales Specialist for Tivoli December 10th 2008 Innovation is the Process, Success
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
How to Develop Successful Enterprise Risk and Vendor Management Programs
Project Management Institute New York City Chapter January 2014 Chapter Meeting How to Develop Successful Enterprise Risk and Vendor Management Programs Christina S. Kite Senior Vice President Corporate
Feature. Log Management: A Pragmatic Approach to PCI DSS
Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
www.pwc.com Governance, Risk and Compliance Update & Hot Topics Pittsburgh Chapter IIA December 3, 2012
www.pwc.com Governance, Risk and Compliance Update & Hot Topics Pittsburgh Chapter IIA December 3, 2012 Agenda Introduction Mark Gibbons 12:00 12:05 Governance, Risk and Compliance Overview Mark Gibbons
ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION
ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION KEY FEATURES AND BENEFITS Manage multiple GRC initiatives on a single consolidated platform Support unique areas of operation with
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
How to measure your business resiliency
How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic [email protected]
IT Compliance 24.09.2007. After Hours Seminar September 2007 Zurich. Improving IT Risk & Compliance Management (RCM)
IT Compliance 24.09. AHS After Hours Seminar Zurich Improving IT Risk & Compliance Management (RCM) Bruno J. Wiederkehr Member of the Board ISACA Switzerland Chapter Agenda 1. Understanding the RCM Requirements
Governance, Risk and Compliance (GRC) software Business needs and market trends
Governance, Risk and Compliance (GRC) software Business needs and market trends David Cau Director Business Risk Deloitte The importance of a holistic view of risk and compliance issues and the difficulty
GRC Program Best Practices & Lessons Learned
GRC Program Best Practices & Lessons Learned Steps to Establishing and Maturing a GRC program Carl Sawicki, American Express Kathleen Randall, RSA Archer 1 Abstract In today s world, few organization s
