Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting
|
|
|
- Avis Hensley
- 10 years ago
- Views:
Transcription
1 Consulting and Professional Services Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting
2 Designing an Operational Risk Program for a Community Bank Page 2 Table of Contents Is your institution as prepared as it needs to be?... 3 Defining operational risk... 4 Advancing your operational risk program - why do it?... 4 Mandated investment in risk management...4 Proactively investing in risk management...5 Investing in risk management to create value...5 Establishing your goals...5 Identifying program components Options for organizational structure Sharing risk management responsibilities...9 Business and support units...9 Operational risk management...9 Internal audit Leveraging risk and controls assessments...10 The time is now for an operational risk program For more information...11
3 Designing an Operational Risk Program for a Community Bank Page 3 Introduction We live in a time of enormous uncertainty, brought about by technological change, escalating threats, unstable political climates, and an increased blurring of international borders that demands we all play in the same economic sandbox. No financial institution, regardless of size or geography, is immune to the effects of industry risks and regulatory pressures. In fact, operational risk management has become a prerequisite for strong performance in today s community bank marketplace. So, more than ever before, community banks, from the board of directors through all levels of management, need to be in a well-informed, documented, and advanced position regarding how they manage their risk. Regulators are examining operational and compliance risks under the Bank Secrecy Act, USA Patriot Act, Gramm- Leach-Bliley Act, Basel II Accord, Sarbanes-Oxley, and FFIEC guidelines, and the outcome will affect your examination rating and, possibly, your continued viability. Is your institution as prepared as it needs to be? If you re hearing comments like those that follow, they should serve as a warning that your organization needs to develop a comprehensive operational risk management program: The board has directed us to formalize risk management functions. We re getting unfavorable comments from regulators on our inconsistent risk assessment management reporting. It seems like all we do is go through risk assessments by the examiners, external auditors, internal auditors, and consultants, and the overlapping work effort is burdensome and inefficient. I m not sure we re using the latest and greatest tools in information security to protect our customers data and privacy. We have too many number one priorities and we won t be able to recover all mission-critical business units and their systems to meet the needs of the business units. We ve had some recent teller fraud losses that could have been prevented. A community bank can manage these operational risks more strategically, efficiently, and effectively with a welldesigned risk management program.
4 Designing an Operational Risk Program for a Community Bank Page 4 Defining operational risk A recent and generally accepted definition of operational risk is the risk of loss resulting from inadequate or failed internal processes, people, and systems, or from external events. It also can include legal and compliance-related risks. Management of operations risk is not a new practice in banking it s always been essential to prevent fraud, maintain internal controls, and reduce errors in transaction processing. But in the past, banks relied upon internal controls within business lines, supplemented by the audit function, to manage operational risk. Operational risk management as a comprehensive discipline is now at the same level of importance as credit and market risks. Recent regulations, industry trends, new types of threats and exposures, and a growing number of highprofile operational losses are dictating that banks and examiners view operational risk management as a separate discipline. It is important that a bank s definition of an operational risk program includes a full range of operational risks, and captures the most significant causes of operational losses, such as: internal and external fraud; compliance with AML, BSA, SAR, and CTRs regulations; vandalism; customer information security and privacy; physical security; business disruption and system failures; process-level risk within wire transfers, ACH, deposit operations, and loan operations; and vendor management. Advancing your operational risk program why do it? There are three excellent reasons for a community bank to advance its operational risk program: regulators are going to require you to do so over time; taking a proactive stance means doing it on your own timelines and on your own terms; and your shareholders expect you to add value to your bank. Mandated investment in risk management There are a number of regulatory and legislative mandates for banks to create and/or enhance an operational risk management program. FDICIA and Sarbanes-Oxley Section 404 both require internal controls review across most departments, which are a subset of the bankwide risk assessment process. The Bank Secrecy Act and the USA Patriot Act require programs to be in place for anti-money-laundering, suspicious activity reporting, large cash transactions, customer identification, and more. The Gramm-Leach-Bliley Act requires safeguards for customer information, privacy, and information security. FFIEC IT Handbooks direct senior management and the board of directors to manage IT risks, including information security, business continuity, disaster recovery, and vendors. Boards of directors can be held criminally liable for failures to control risk
5 Designing an Operational Risk Program for a Community Bank Page 5 Proactively investing in risk management There are a number of reasons why taking a proactive approach to operational risk management is just good business. Beyond the expense of regulatory penalties and fines, the loss in business momentum and revenue growth after formal agreements, memoranda of understanding, and cease and desist orders could be considerable. Banks need to strengthen defenses to avoid losses from fraudsters, hackers, identify thieves, and natural disasters. Avoiding C1 risk the new street term for reputational risk which occurs when your bank appears on the front page of section C of The Wall Street Journal. Allocate capital based on business unit risk profile to encourage business unit ownership and management of their risks. Investing in risk management to create value Developing an operational risk management program ultimately will add value to your bank as it: Enables your bank to meet commitments to customers, employees, and shareholders Differentiates your bank favorably to the marketplace during uncertain times when security is a top concern of consumers and the business community Don t become a victim of Regulatory Duress, which will require you to invest quickly and heavily to remedy your program, Rather, start planning today and you will benefit by building sustainability into your operational risk management program, which leads to strengthening the operational resiliency of your bank. Establishing your goals As you begin to develop your operational risk program, you ll want to articulate the goals of that program. The overarching goal is to have a unified view of operational risks and controls across all business units and processes; to have three-pronged: a common risk assessment and measurement system; and to have sound policies governing the risk management process. Ultimately, an integrated operational risk management program with robust analytics will lead to more efficient use of capital and personnel.
6 Designing an Operational Risk Program for a Community Bank Page 6 Specifically, you will want to: Promote a risk culture throughout the bank that proactively manages risk. Move your future position on an operational risk management spectrum beyond basic requirements, to one that is more advanced. Undergo needed organizational change, while ensuring that the new operational risk management program fits within your existing structure, and does not disrupt activities that are functioning well. Leverage existing operational risk disciplines, processes, tools, systems, and resources that do not add to costs. Communicate and coordinate between the executive, operational risk, and business functions, while maintaining segregation of responsibilities, controls, and oversight. Conduct in-depth operational risk self-assessments in all business units. Have your internal audit serve as an independent reviewer of the operational risk management program. Give strategic feedback to the board and to senior management on the overall level, trends, and necessary allocation of resources. Consistently evaluate the risk/return of businesses through capital allocations.
7 Designing an Operational Risk Program for a Community Bank Page 7 Identifying program components Operational risk management can be modeled after credit risk management. Just as banks have been managing their lending activities, analyzing portfolios, monitoring allowance for loan losses, and varying loan concentrations, a similar structure should be wrapped around the various aspects of operations and technology. A community bank would not think of moving forward without a loan review or credit risk committee, established lending policies, or metrics to follow charge-offs. Operational risk is no different. In fact, with such a broad scope, one would think that coordination and consistency would be our industry standard, yet we all know that these disciplines are managed separately, and thus the risks are not aggregated. The eight program components identified in the graphic above are the key ingredients for a successful operational risk program. Three of these eight elements must be addressed first as you move forward, since they are typically what is lacking most in community banks: Establish formal organizational structure and governance, including an operational risk committee equipped with a charter, guiding principles, and operating mode. Redefine supporting roles for your technology, operations, internal audit, compliance, and business unit mangers. Provide for ongoing operational risk self-assessments and monitoring at the business unit level, and at the same time, leverage existing risk information from internal audit, compliance, business units, FDICIA, and Sarbanes-Oxley.
8 Designing an Operational Risk Program for a Community Bank Page 8 1. Options for organizational structure The first issue to address is how a community bank should organize its governance for an operational risk program. The chart below illustrates a suggested governance structure based on typical functions within community banks. The board audit committee should provide guidance on strategies, how much risk the bank is willing to take, ensure that risks are managed within tolerance, and approve all major changes to risk policies. The CEO and executive management team should review the governance of operational risk management activities, and delegate policy formulation and day-to-day oversight to committees and risk managers. Advantages of this functional alignment include: Stronger, coordinated roles for business unit leaders, compliance, and internal audit via a new operational risk committee An integrated approach to and consistent framework for managing operational, market, and credit risk Cultural and process changes can be driven from the top Regional risk management efforts can be linked into a corporate committee and risk office Builds upon, streamlines, and eliminates redundant risk management and compliance efforts
9 Designing an Operational Risk Program for a Community Bank Page 9 The operational risk officer should focus on building the risk assessment process across all departments, which is the most underdeveloped in community banks. In addition, this position should not disrupt existing reporting relationships of credit and market risk managers, should remain independent from production duties, and should coordinate with all other risk management and compliance activities. Underlying this functional alignment is an intersection between traditional compliance and this new concept of centralized risk management. A comprehensive risk management program must address laws and regulations with compliance implications. Conversely, managing compliance with consumer regulations is a critical component of a comprehensive risk management program. A solution is to join the compliance function with the risk management function. Some larger banks also join the internal audit function with the risk management function. 2. Sharing risk management responsibilities In support of the above governance structure, the following are the major functional roles for effective alignment of risk management responsibilities: BUSINESS AND SUPPORT UNITS Own operational risk Assign coordinator who links the business unit to risk management Conduct risk self-assessments using tools from risk manager Respond to changes in risk metrics Work with other units on cross-functional projects to prevent silos Implement corrective actions and new risk solutions (policies, technology, process change, personnel) OPERATIONAL RISK MANAGEMENT Define and manage the program Build awareness Partner with business and support units Provide tools and consultation Ensure consistency in risk assessment process Aggregate and evaluate data by risk category and department Maintain risk model and loss event database INTERNAL AUDIT Validate the program Leverage risk assessment information as input to audit plan Identify and report operational risk trends that require resolution Independent link to the board audit committee With these new roles in place, you should be able to reach your goals and successfully implement the program.
10 Designing an Operational Risk Program for a Community Bank Page Leveraging risk and controls assessments As operational risk management evolves into a unique discipline, advanced analytics and reporting are required to quantify risk levels with departments, and to focus mitigation efforts. As banks deal with FDICIA, Sarbanes-Oxley 404, and internal and external risk assessments, the need to organize and report risk data more efficiently becomes imperative. The purpose of a Risk and Control Model is to provide a new level of organization and presentation of risk assessment and internal control information. For each department included in your risk assessment, you should be able to record risk criteria, control objectives, findings, and recommendations in a model with assignment of risk type, inherent and residual risk scoring, evaluation of control effectiveness, direction of risk, final disposition, and key metrics. The quantification of risk should be based on inherent and residual risk scores, with residual risk being most important because it is the remaining risk in the department after the assessment of the effectiveness of controls and risk solutions. It is at this level that you should decide to accept a risk position within a department, or work towards a more effective control. Regarding additional leverage points, with the approval of your external auditors, you may want to convert your FDICIA or SOX 404 controls information into your model, and through cooperation with internal audit and compliance, add their assessments and corrective actions, as well. As an output, the risk model should produce heat maps by department that track the number and severity of inherent risks and residual risks after controls are applied, and allow for aggregation across departments. The same logic that brought the industry to a single book of record for the bank s financial statements (general ledger), and then to customer activity (CRM), now leads us to a similar position with risk; over time, your risk assessment model should evolve into the single book of record for your risk profile.
11 Designing an Operational Risk Program for a Community Bank Page 11 The time is now for an operational risk program Operational risks are present throughout the scope of your organization, either internally through people, processes, and systems, or through external events, like computer hackers, or even natural disasters. When not offset with a solid plan, these risks can be potentially devastating to your organization; however, with an ongoing operational risk program, your bank increases value to shareowners. For more information Metavante Corporation s team of risk management specialists comprises practitioners in financial services, operations, technology, compliance, and risk management. Our operational risk expertise is focused specifically on the areas of fraud prevention, compliance, information security, privacy, business continuity, IT recovery, physical security, and vendor management. We deliver measurable results that prepare your institution for the current competitive and regulatory environment. To learn more, call and talk to one of our consulting professionals, or visit us at metavante.com.
12 2005 Metavante Corporation. All rights reserved.
B o a r d of Governors of the Federal Reserve System. Supplemental Policy Statement on the. Internal Audit Function and Its Outsourcing
B o a r d of Governors of the Federal Reserve System Supplemental Policy Statement on the Internal Audit Function and Its Outsourcing January 23, 2013 P U R P O S E This policy statement is being issued
Validating Third Party Software Erica M. Torres, CRCM
Validating Third Party Software Erica M. Torres, CRCM Michigan Bankers Association Risk Management & Compliance Institute September 29, 2014 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT
The Role of the Board in Enterprise Risk Management
Enterprise Risk The Role of the Board in Enterprise Risk Management The board of directors plays an essential role in ensuring that an effective ERM program is in place. Governance, policy, and assurance
Successfully identifying, assessing and managing risks for stakeholders
Introduction Names like Enron, Worldcom, Barings Bank and Menu Foods are household names but unfortunately as examples of what can go wrong. With these recent high profile business failures, people have
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
Beyond risk identification Evolving provider ERM programs
Beyond risk identification Evolving provider ERM programs March 2016 At a glance PwC conducted research to assess the state of enterprise risk management (ERM) within healthcare providers and found many
Preparing for the Convergence of Risk Management & Business Continuity
Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today
fmswhitepaper Why community-based financial institutions should practice enterprise risk management.
fmswhitepaper Why community-based financial institutions should practice enterprise risk management. By Michael D. Cohn, CPA, CISA, CGEIT Director, WolfPAC Solutions Group Unique Insights Implementation
FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER
FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER As a board-level discussion topic at all financial institutions (FI) today, operational risk is real and public disclosure of significant
Best Practices for Managing Bank Transaction Risk Using a Continuous Data Analytics Approach
Best Practices for Managing Bank Transaction Risk Using a Continuous Data Analytics Approach Co-authored by: Focus Technology Group Contents Introduction The Approach Risk Assessment Risk Data Analytics
6/8/2016 OVERVIEW. Page 1 of 9
OVERVIEW Attachment Supervisory Guidance for Assessing Risk Management at Supervised Institutions with Total Consolidated Assets Less than $50 Billion [Fotnote1 6/8/2016 Managing risks is fundamental to
How to Develop Successful Enterprise Risk and Vendor Management Programs
Project Management Institute New York City Chapter January 2014 Chapter Meeting How to Develop Successful Enterprise Risk and Vendor Management Programs Christina S. Kite Senior Vice President Corporate
Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP
Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP Today's unpredictable business climate and challenging regulatory
Operational Risk Management Program Version 1.0 October 2013
Introduction This module applies to Fannie Mae and Freddie Mac (collectively, the Enterprises), the Federal Home Loan Banks (FHLBanks), and the Office of Finance, (which for purposes of this module are
An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions
An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose
Framework for Enterprise Risk Management
Framework for Enterprise Risk Management 2013 Johnson & Johnson Contents Introduction.... 4 J&J Strategic Framework... 5 What is Risk?.......................................................... 7 J&J Approach
CONTINUOUS CONTROLS MONITORING
Clarity. Certainty. Confidence. CONTINUOUS CONTROLS MONITORING Support Regulatory Compliance Improve Cost Management Drive Operational Performance Executives today are more challenged than ever to make
Policy 10.105: Enterprise Risk Management Policy
Name: Responsibility: Complements: Enterprise Risk Management Framework Coordinator, Enterprise Risk Management Policy 10.105: Enterprise Risk Management Policy Date: November 2006 Revision Date(s): January
Sample Financial institution Risk Management Policy 2011
Sample Financial institution Risk Management Policy 2011 1 Contents Risk Management Program...2 Internal Control and Risk Management Diagram... 2 General Control Environment... 2 Specific Internal Control
Guidance Note: Corporate Governance - Board of Directors. March 2015. Ce document est aussi disponible en français.
Guidance Note: Corporate Governance - Board of Directors March 2015 Ce document est aussi disponible en français. Applicability The Guidance Note: Corporate Governance - Board of Directors (the Guidance
fs viewpoint www.pwc.com/fsi
fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a
Risk management and the transition of projects to business as usual
Advisory Risk management and the transition of projects to business as usual Financial Services kpmg.com 2 Risk Management and the Transition of Projects to Business as Usual Introduction Today s banks,
Financial services regulatory compliance. Changing demands require the right perspective
Financial services regulatory compliance Changing demands require the right perspective The role of compliance is being elevated as regulatory demands increase. Compliance leaders are facing the greatest
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
Effective AML Model Risk Management for Financial Institutions: The Six Critical Components
August 2012 Effective AML Model Risk Management for Financial Institutions: The Six Critical Components A White Paper by John A. Epperson, Arjun Kalra, and Brookton N. Behm Audit Tax Advisory Risk Performance
STANDARDS OF SOUND BUSINESS AND FINANCIAL PRACTICES. ENTERPRISE RISK MANAGEMENT Framework
STANDARDS OF SOUND BUSINESS AND FINANCIAL PRACTICES ENTERPRISE RISK MANAGEMENT Framework September 2011 Notice This document is intended as a reference tool to assist Ontario credit unions to develop an
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
Operational Risk Management - The Next Frontier The Risk Management Association (RMA)
Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first
RISK MANAGEMENT REPORT (for the Financial Year Ended 31 March 2012)
RISK MANAGEMENT REPORT (for the Financial Year Ended 31 March 2012) Integrated Risk Management Framework The Group s Integrated Risk Management Framework (IRMF) sets the fundamental elements to manage
OPERATIONAL RISK RISK ASSESSMENT
OPERATIONAL RISK RISK ASSESSMENT 1 OVERVIEW Inherent Risk Risk Management Composite or Net Residual Risk Trend 2 INHERENT RISK Definition Sources Identification Quantification 3 Definition OPERATIONAL
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
RISK MANAGEMENT AND COMPLIANCE
RISK MANAGEMENT AND COMPLIANCE Contents 1. Risk management system... 2 1.1 Legislation... 2 1.2 Guidance... 3 1.3 Risk management policy... 4 1.4 Risk management process... 4 1.5 Risk register... 8 1.6
Effective risk management
Effective risk management Our holistic and disciplined risk management program is designed to mitigate risks at all levels of our business in order to protect our clients interests. 2 Vanguard > Effective
CORE Security and GLBA
CORE Security and GLBA Addressing the Graham-Leach-Bliley Act with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected] www.coresecurity.com
UNITED NATIONS OFFICE FOR PROJECT SERVICES. ORGANIZATIONAL DIRECTIVE No. 33. UNOPS Strategic Risk Management Planning Framework
UNOPS UNITED NATIONS OFFICE FOR PROJECT SERVICES Headquarters, Copenhagen O.D. No. 33 16 April 2010 ORGANIZATIONAL DIRECTIVE No. 33 UNOPS Strategic Risk Management Planning Framework 1. Introduction 1.1.
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
Enterprise Risk Management
Enterprise Management ERM provides a framework for risk management, which typically involves identifying particular events or circumstances relevant to the organization's objectives (risks and opportunities),
Get More Out of Your Risk Assessment. Austin Chapter of the IIA
Get More Out of Your Risk Assessment Austin Chapter of the IIA Speakers Alyssa G. Martin, CPA Dallas Executive Partner, Advisory Services 25 years of public accounting experience, with a practice emphasis
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation
Tying It All Together: Practical ERM Integration Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation November 16, 2007 1 Agenda Basis for ERM Integration ERM Objectives ERM Focus
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
APPLICATION OF THE KING III REPORT ON CORPORATE GOVERNANCE PRINCIPLES
APPLICATION OF THE KING III REPORT ON CORPORATE GOVERNANCE PRINCIPLES Ethical Leadership and Corporate Citizenship The board should provide effective leadership based on ethical foundation. that the company
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
APPLICATION OF KING III CORPORATE GOVERNANCE PRINCIPLES 2014
WOOLWORTHS HOLDINGS LIMITED CORPORATE GOVERNANCE PRINCIPLES 2014 CORPORATE GOVERNANCE PRINCIPLES 2014 CORPORATE GOVERNANCE PRINCIPLES 2014 This table is a useful reference to each of the King III principles
Cyber Security and the Board of Directors
Helping clients build operational capability in cyber security. A DELTA RISK VIEWPOINT Cyber Security and the Board of Directors An essential responsibility in financial services About Delta Risk is a
IT Security & Compliance Risk Assessment Capabilities
ATIBA Governance, Risk and Compliance ATIBA provides information security and risk management consulting services for the Banking, Financial Services, Insurance, Healthcare, Manufacturing, Government,
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the
Remarks by Carolyn G. DuChene Deputy Comptroller Operational Risk at the Bank Safety and Soundness Advisor Community Bank Enterprise Risk Management Seminar Washington, D.C. October 22, 2012 Good afternoon,
Bank Secrecy Act for Directors. Barb Boyd Content Manager CU Solutions Group
Bank Secrecy Act for Directors Barb Boyd Content Manager CU Solutions Group Agenda What is the Bank Secrecy Act? How to have a successful BSA Compliance Program OFAC responsibilities. Penalties for non-compliance.
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
How To Manage Risk
Fund Board Oversight of Risk Management September 2011 Nothing contained in this report is intended to serve as legal advice. Each investment company board should seek the advice of counsel for issues
Industry Sound Practices for Financial and Accounting Controls at Financial Institutions
Industry Sound Practices for Financial and Accounting Controls at Financial Institutions Federal Reserve Bank of New York January 2006 FINANCIAL AND ACCOUNTING CONTROLS: INDUSTRY SOUND PRACTICES FOR FINANCIAL
ENTERPRISE RISK MANAGEMENT POLICY
ENTERPRISE RISK MANAGEMENT POLICY TITLE OF POLICY POLICY OWNER POLICY CHAMPION DOCUMENT HISTORY: Policy Title Status Enterprise Risk Management Policy (current, revised, no change, redundant) Approving
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework
The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework Dorothy Gjerdrum, ARM-P, Chair of the ISO 31000 US TAG and Executive Director,
Enterprise Risk Management (ERM) & Compliance
Enterprise Risk Management (ERM) & Compliance Mid Atlantic Regional Meeting, May 1, 2015 Society of Corporate Compliance and Ethics Jason Lunday, consultant Compliance Opportunities in ERM Increase compliance
Data Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
October 2013. Avoiding the drift Optimizing and maintaining AML surveillance programs
October 2013 Avoiding the drift Optimizing and maintaining AML surveillance programs The heart of the matter Without regular updating, AML systems can drift into inadvertent noncompliance. Enacted in
AML Topics Using analytics to get the most from your transaction monitoring system
www.pwc.com AML Topics Using analytics to get the most from your transaction monitoring system March 2011 Contents Components of the AML Compliance Program... 1 Transaction Monitoring... 1 Transaction
Whitepaper: 7 Steps to Developing a Cloud Security Plan
Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for
White Paper March 2009. Seven risk dashboards every bank needs
White Paper March 2009 Seven risk dashboards every bank needs 2 Contents 3 Business problems 3 Business drivers 4 The solution Credit risk dashboards The loan origination dashboard The delinquencies dashboard
XBRL & GRC Future opportunities?
XBRL & GRC Future opportunities? Suzanne Janse Deloitte NL Paul Hulst Deloitte / Said Tabet EMC Presenters Suzanne Janse Deloitte Netherlands Director ERP (SAP, Oracle) Risk Management GRC software Paul
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
University of New England Compliance Management Framework and Procedures
University of New England Compliance Management Framework and Procedures Document data: Document type: Administering entity: Framework and Procedures Audit and Risk Directorate Records management system
GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.
GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
How To Transform It Risk Management
The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help
Insurance Industry Expertise
Insurance Industry Expertise Delivered With High-Level Attention and Service Audit Tax Advisory Risk Performance The Unique Alternative to the Big Four For more than 50 years, clients in all sectors of
Remote Deposit Capture Customer Due Diligence FFIEC Tier II Exam Considerations Plus Mobile Capture! March 5, 2014. Topics of Discussion
Remote Deposit Capture Customer Due Diligence FFIEC Tier II Exam Considerations Plus Mobile Capture! March 5, 2014 Carolyn C. Dowdy, Speaker Bank Project Solutions does not guaranty by implementing criteria
Information Governance 2.0 A DOCULABS WHITE PAPER
Information Governance 2.0 A DOCULABS WHITE PAPER Information governance is the control of an organization s information to meet its regulatory, litigation, and risk objectives. Effectively managing and
ENTERPRISE RISK MANAGEMENT POLICY
ENTERPRISE RISK MANAGEMENT Approved by the Audit Committee on 14 February 2003 and adopted by resolution of the Board on 28 March 2003 Revisions approved by the Audit and Risk Committee on 14 February
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview
Information Technology. A Current Perspective on Risk Management
Information Technology A Current Perspective on Risk Management Topics Covered Information Security Program Common Examination Findings Existing and Emerging Risks ACH/Wire Fraud and Corporate Account
Supervisory Guidance on Operational Risk Advanced Measurement Approaches for Regulatory Capital
Supervisory Guidance on Operational Risk Advanced Measurement Approaches for Regulatory Capital Draft Date: July 2, 2003 Table of Contents I. Purpose II. Background III. Definitions IV. Banking Activities
Risk Management Policy
Risk Management Policy June 2015 1 2 Contents 1. Policy Objectives and Background... 4 1.1. Policy Background... 4 1.2. Policy Objective... 4 1.3. Policy Sponsor and Maintenance... 4 2. Risk Types and
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...
Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation
Board of Directors and Senior Management 2. Audit Management 4. Internal IT Audit Staff 5. Operating Management 5. External Auditors 5.
Table of Contents Introduction 1 IT Audit Roles and Responsibilities 2 Board of Directors and Senior Management 2 Audit Management 4 Internal IT Audit Staff 5 Operating Management 5 External Auditors 5
The IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2011, Oracle and/or its affiliates. All rights Challenges in Implementing the Financial Action Task Force (FATF) recommendations on Risk Based Approach by R. Suresha CAMS 2 Copyright 2011,
Board of Directors Meeting 12/04/2010. Operational Risk Management Charter
Board of Directors Meeting 12/04/2010 Document approved Operational Risk Management Charter Table of contents A. INTRODUCTION...3 I. Background...3 II. Purpose and Scope...3 III. Definitions...3 B. GOVERNANCE...4
Managing Risk at Bank of America Corporation. Overview
Managing Risk at Bank of America Corporation Overview Risk is inherent in every material business activity that we undertake. Our business exposes us to strategic, credit, market, liquidity, compliance,
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND
Avoiding Buyer s Remorse with AML Monitoring Software. Implementing Effective and Efficient AML Transaction Monitoring Systems
Avoiding Buyer s Remorse with AML Monitoring Software Implementing Effective and Efficient AML Transaction Monitoring Systems Overview A well-designed transaction monitoring program is an important pillar
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
Self-Service SOX Auditing With S3 Control
Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with
Re: Comments on the Proposed Rules regarding the Regulation of the Conduct of Virtual Currency Businesses Addition to Part 200 to Title 23NYCRR
March 27, 2015 VIA EMAIL TO [email protected] Mr. Benjamin M. Lawsky Superintendent of Financial Services New York Department of Financial Services One State Street, New York, NY 10004 1511 Mr.
APPENDIX 50. Enterprise risk management - Risk management overview
APPENDIX 50 Enterprise risk management - Risk management overview Energex regulatory proposal October 2014 ENTERPRISE RISK MANAGEMENT Risk Management Overview (RMO) 06 11 2013 Table of Contents 1. INTRODUCTION...
Growing Vendor Management
V E N D O R M A N A G E M E N T P R O F I L E S E R I E S A Wh it e Pap e r by Ve n d or I NS I G HT an d C MPG, L L C Growing Vendor Management as a Sustainable Business Process with Automated Vendor
