RISK. Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines

Size: px
Start display at page:

Download "RISK. Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines"

Transcription

1 August 31 September 2, 2015 Programme on Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines Coordinator Prof Sunil Bakshi RISK National Institute of Bank Management Pune, India

2 Programme on Outsourcing Risk Management With Focus on Controlling and Managing IT Vendors as per RBI Guidelines Background Use of information technology has enabled Indian banks in improving their service delivery by creating technology based alternate delivery channels like ATM, Internet banking, Mobile Banking and Apps, BC Agents. Most banking operations today heavily depend on technology. However, due to complexity of IT and ensuring that banks get appropriate expertise banks have adopted outsourcing model for information technology. The Reserve Bank of India has issued guidelines on implementing and governing the use of technology by Indian banks, that contain specific guidelines on Outsourcing Management in relation with technology. As part of compliance most banks have implemented processes that has enabled them to ensure compliance with guidelines, however still there is a need for stronger controls on outsourcing management due to increasing compliance requirements (Privacy legislation), changing threat scenario and increasing attacks on vendors which is impacting the banks. Bank management being focused on core business functions, sometimes find it complex to manage the outsourced function beyond certain point. Objective The programme is aimed at helping banks in understanding the underlying dependencies of outsourcing of technology and how banks can ensure proactive management of outsourced services by defining precise measurement metrics

3 Contents 1. Outsourcing Management and difference between technology outsourcing and other allied services. 2. Direct and Indirect Compliance requirements associated with Outsourcing Management RBI Guidelines, Customer Service levels, Data loss incidents and privacy related compliance etc. 3. Practices related to different types of technology outsourcing ATM, Software Acquisition and Development, Infrastructure Management, Security Outsourcing, Network Management, etc. 4. Operational Monitoring requirements for outsourced services - Change Management, Project Management, adopting new technology, Compliance, Incident Management and Business Continuity. 5. Contracting, SLA and developing and implementing SLA measurement metrics for outsourced services. 6. Case studies and group discussions on different situations. Methodology The programme is designed to be highly interactive with case studies and experience sharing. It will be mix of presentations, group discussions and real life like case studies. Target Group The programme is designed for senior managers and top executives responsible for IT and Business Operations, Continuity Management, Security Officers and Internal Auditors In particular the programme is meant for bank officials working in the areas of: s Enterprise Risk Management, Strategic Planning, IT Operations, IT Steering Committee, Business Operations, Inspection and Audit, Control Supervision and Vigilance Departments and IT department who are associated (or are likely to get associated) with Computer Systems Audit activities. s Trainers in Staff Training Colleges of banks and FIs.

4 Dates August 31 September 2, 2015 The Programme will commence at 9.00 am on Monday August 31, and will conclude by 5.00 pm on Wednesday September 2, Venue NIBM Campus, Kondhwe Khurd, Pune, India Hostel Accommodation The Programme is fully residential. Participants will be provided well furnished single room AC accommodation in the Institute's hostel complex on the Campus. However, they will not be permitted to bring their family members to stay on the campus. In case any Officer/Executive with physical/medical disability is being nominated, kindly inform us in advance with particulars of disability to facilitate necessary arrangements. The Institute has facilities for outdoor and indoor games and a large walking/jogging trail for physical fitness besides a yoga centre. Participants are, therefore, encouraged to bring the appropriate clothes/gears. Last Date for Receiving Nominations: August 21, 2015 Last Date for Availing Early Bird Incentive: August 14, 2015 (See Fee Structure on home page of the website) Nominations and Enquiries Please address your enquiries and nominations along with the fees to: Prof Sunil Bakshi Programme Coordinator Telephone : (EPABX), (Direct) Fax : [email protected] Website :

5

Programme in Management of Foreign Exchange Business

Programme in Management of Foreign Exchange Business Programme in Management of Foreign Exchange Business Foreign exchange business and financing international trade offer significant prospects for banks in the context of the rising importance of India in

More information

MANAGING CREATIVITY AND INNOVATION

MANAGING CREATIVITY AND INNOVATION Program on MANAGING CREATIVITY AND INNOVATION (February 15-17, 2016) ADMINISTRATIVE STAFF COLLEGE OF INDIA THE PROGRAM OVERVIEW In the present day scenario, creating a competitive advantage on the basis

More information

Information Technology

Information Technology Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level

More information

IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR

IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR PwC April 4, 2013 Agenda The challenge IT Governance defined IT Governance components Next steps Questions THE CHALLENGE The

More information

Advanced Management Programme

Advanced Management Programme Part-time Distance Education through two-way live web-casting on every Saturdays. Program Duration: October 2012 May 2013 Course Starting: October 20, 2012 Last date to apply: September 13, 2012 Advanced

More information

Institution of Occupational Safety & Health Managing Safely Course

Institution of Occupational Safety & Health Managing Safely Course Institution of Occupational Safety & Health Managing Safely Course Duration of Course: 4 Days Registration Fee: 10,000 Total Course Fee: 40,000 Course Date: May 26-29, 2014 Venue: Islamabad Embassy Road

More information

Program on Human Resource Management for Line Managers. (February 01-05, 2016) ADMINISTRATIVE STAFF COLLEGE OF INDIA

Program on Human Resource Management for Line Managers. (February 01-05, 2016) ADMINISTRATIVE STAFF COLLEGE OF INDIA Program on Human Resource Management for Line Managers (February 01-05, 2016) ADMINISTRATIVE STAFF COLLEGE OF INDIA CONTEXT Human Resource Management function, per se, is largely performed by line functionaries,

More information

Service Level Agreement. Definitions

Service Level Agreement. Definitions Service Level Agreement Definitions RanceLab Rance Computer Pvt. Ltd. a company incorporated under the Companies Act, 1956 and having its registered office at 131, C.R. Avenue, Kolkata 700073, India. Unless

More information

Senior Manager Information Technology (India) Duration of job

Senior Manager Information Technology (India) Duration of job Role Profile Job Title Senior Manager Information Technology (India) Directorate or Region South Asia Department/Country Business Support Services, India Location of post Gurgaon Pay Band 6 / Grade G Reports

More information

ISACA Tools Help Develop Cybersecurity Expertise

ISACA Tools Help Develop Cybersecurity Expertise Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

INFORMATION BROCHURE

INFORMATION BROCHURE INFORMATION BROCHURE ENTRANCE EXAM -2010 INSTITUTE OF BUSINESS MANAGEMENT ACADEMIC PROGRAMMES B.B.A (BACHELOR OF BUSINESS ADMINISTRATION ) M.B.A (PART TIME) CHHATRAPATI SHAHU JI MAHARAJ UNIVERSITY, KANPUR-208024

More information

Appendix A-2 Generic Job Titles for respective categories

Appendix A-2 Generic Job Titles for respective categories Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

Big Data: Impact, Benefits, Risk and Governance

Big Data: Impact, Benefits, Risk and Governance Big Data: Impact, Benefits, Risk and Governance Urs Fischer, CPA (Swiss), CRISC, CISA, CIA Fischer IT GRC Consulting & Training Urs Fischer Agenda 1. Introduction 2. Impact on the Enterprise 3. Business

More information

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document

More information

Corporate Governor. New COSO Framework links IT and business process

Corporate Governor. New COSO Framework links IT and business process Corporate Governor Providing vision and advice for management, boards of directors and audit committees Summer 2014 New COSO Framework links IT and business process Michael Rose, Partner, Business Advisory

More information

ESKITP7145.01 Manage IT service delivery performance metrics

ESKITP7145.01 Manage IT service delivery performance metrics Overview This sub-discipline covers the competencies required to manage the monitoring, analysis and communication of IT service delivery performance metrics. Monitoring service level performance is a

More information

Information Technology Engineers Examination

Information Technology Engineers Examination Information Technology Engineers Examination Outline of ITEE Ver 2.1 November 30, 2015 The company and products names in this report are trademarks or registered trademarks of the respective companies.

More information

Property Management Officer / Lettings Assistant Recruitment Pack. www.demontfortstudents/jobs

Property Management Officer / Lettings Assistant Recruitment Pack. www.demontfortstudents/jobs Property Management Officer / Lettings Assistant Recruitment Pack www.demontfortstudents/jobs Re : Property Management Officer / Lettings Assistant Thank you for your interest in the role of Property Management

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

INCLUDES THE REQUIREMENTS OF THE NEW ISO 14001:2015 STANDARD

INCLUDES THE REQUIREMENTS OF THE NEW ISO 14001:2015 STANDARD INCLUDES THE REQUIREMENTS OF THE NEW ISO 14001:2015 STANDARD -Course Summary- The one day International Certifications Environmental Management Training course will introduce the attendees to organisational

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

THE RBI GUIDELINES. A Brief Summary of the RBI Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds

THE RBI GUIDELINES. A Brief Summary of the RBI Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds THE RBI GUIDELINES A Brief Summary of the RBI Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds Contact us to know more about how our consultants can help

More information

MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries

MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries IOSCO/MR/54/2015 Madrid, 22 December 2015 IOSCO reports on business continuity plans for trading venues and intermediaries The Board of the (IOSCO) today published two reports that seek to enhance the

More information

Programme on Strategic Human Resource Management

Programme on Strategic Human Resource Management Management Development Programme Programme on Strategic Human Resource Management in Dubai from Mar 2012 Jul 2012 Strategic Human Resource Management Programme (A 12 days intensive programme spread over

More information

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA 1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand

More information

Vendor. Management. For sponsorship or to become our partner, contact: [email protected]

Vendor. Management. For sponsorship or to become our partner, contact: marketing@achromicpoint.com Knowledge Partner Presents 27th May 2015 - Bengaluru 5th June 2015 - New Delhi 24th June 2015 - Mumbai Vendor Risk Management For sponsorship or to become our partner, contact: [email protected]

More information

Calendar of Training Programmes: 2015 16 at a Glance (Month-wise)

Calendar of Training Programmes: 2015 16 at a Glance (Month-wise) Calendar of Training Programmes: 2015 16 at a Glance (Month-wise) No. Title Duration Dates Target Group APRIL 001 Programme on Strengthening Information Systems Audit by 4 days Apr 20-23, 2015 Internal

More information

Dashboards as an Effective Tool for HIPAA Security and Privacy Compliance

Dashboards as an Effective Tool for HIPAA Security and Privacy Compliance Dashboards as an Effective Tool for HIPAA Security and Privacy Compliance Bikram Bakshi President & CEO 1 Objectives The problem Key causes for data breaches Comparing these causes with CMS findings on

More information

ACS Residential Care Management Induction Program

ACS Residential Care Management Induction Program Day 1 Day 2 Day 3 Day 4 PROGRAM Wednesday 22 April 9.30 am 4.30 pm Core Aged Care Management & Business Skills (Greg Adey) Australian Quality Agency - Accreditation Overview (Philomena Mitolo) Thursday

More information

Functions and Activities of National Statistical Systems Training academy

Functions and Activities of National Statistical Systems Training academy Functions and Activities of National Statistical Systems Training academy 1 Training: Need/Importance Human Resource Development: Backbone/thrust area. Skilled Personnel: Efficiency, Growth, improved quality

More information

WHAT IS GEO-FENCING? (415) 580-7936 I www.brownpelicangroup.com I [email protected]

WHAT IS GEO-FENCING? (415) 580-7936 I www.brownpelicangroup.com I info@brownpelicangroup.com WHAT IS GEO-FENCING? Brown Pelican Group, a leading event Wi-Fi and technology company, in partnership with Experi-Tech, experts in cutting edge interactive tech for events, tradeshows, mobile tours, and

More information

Critical Systems Guidelines

Critical Systems Guidelines Architecture, Standards and Planning Branch Office of the CIO Province of BC Document Version 1.0 April 2015 Table of Contents 1.0 Document Control... 3 2.0 Introduction... 4 3.0 Roles and Responsibilities...

More information

The Bellevue Center for Obesity & Weight Management. Program Director: Manish Parikh, MD WEIGHT LOSS SURGERY INFORMATION SEMINAR

The Bellevue Center for Obesity & Weight Management. Program Director: Manish Parikh, MD WEIGHT LOSS SURGERY INFORMATION SEMINAR Wednesday, January 7, 2015 Wednesday, February 4, 2015 Wednesday, March 4, 2015 Wednesday, April 1, 2015 Wednesday, May 13, 2015 Wednesday, June 3, 2015 Wednesday, July 1, 2015 Wednesday, August 5, 2015

More information

WEIGHT LOSS SURGERY INFORMATION SEMINAR

WEIGHT LOSS SURGERY INFORMATION SEMINAR Wednesday, January 6, 2016 Wednesday, February 3, 2016 Wednesday, March 2, 2016 Wednesday, April 6, 2016 Wednesday, May 4, 2016 Wednesday, June 1, 2016 Wednesday, July 6, 2016 Wednesday, August 3, 2016

More information

Hostel Administration Committee National Institute of Technology, Tiruchirappalli-15, Tamil Nadu INVITATION FOR EXPRESSION OF INTEREST

Hostel Administration Committee National Institute of Technology, Tiruchirappalli-15, Tamil Nadu INVITATION FOR EXPRESSION OF INTEREST Hostel Administration Committee National Institute of Technology, Tiruchirappalli-15, Tamil Nadu INVITATION FOR EXPRESSION OF INTEREST 1 7 th April 2014 National Institute of Technology, Tiruchirappalli

More information

Third party assurance services

Third party assurance services TECHNOLOGY RISK SERVICES Third party assurance services Delivering assurance over your service providers The current third party service provider environment Corporate UK has been transformed in recent

More information

FAQs BBA France- Admissions

FAQs BBA France- Admissions FAQs BBA France- Admissions 1. Who can apply for the Loyola - IÉSEG Twinning Programme? Students who have secured a minimum 60% overall grade in their +2 board exams. Students who have completed their

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Strategic Supply Chain Management Programme

Strategic Supply Chain Management Programme Strategic Supply Chain Management Programme February - May, 2013 (A 12 days intensive programme spread over 4 months delivered in Dubai) (Last Date to submit your application is January 17, 2013) Strategic

More information

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG 11:30 am -12:15 pm Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG Agenda Introduction 20 Questions you should

More information

3 rd Party Vendor Risk Management

3 rd Party Vendor Risk Management 3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced

More information

FINANCE FOR NON FINANCE EXECUTIVES

FINANCE FOR NON FINANCE EXECUTIVES MANAGEMENT DEVELOPMENT PROGRAMME FINANCE FOR NON FINANCE EXECUTIVES (JULY 23-25, 2015) Programme Directors Prof. K. K. Ray Prof. Vinay Goyal INTRODUCTION The program on Finance for Non-Finance can be instrumental

More information

IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES

IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES OBJECTIVES This course is specifically designed to improve your skills as an information security manager. Using O-ISM3 as a framework,

More information

Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for

Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for Division of Gaming Customer Due Diligence Guidelines for Interactive Gaming & Interactive Wagering Companies November 2005 Customer Due Diligence for Interactive Gaming & Interactive Wagering Companies

More information

The Information Security and Privacy Tradeshow. CIS 8080 Security/Privacy of Information Richard Baskerville

The Information Security and Privacy Tradeshow. CIS 8080 Security/Privacy of Information Richard Baskerville The Information Security and Privacy Tradeshow CIS 8080 Security/Privacy of Information Richard Baskerville This activity simulates a market in which participants aim to offer the best information security

More information

Dr. Harsh Sharma May 22, 2015 Program Director. Program on NEGOTIATION SKILLS. (August 24-26, 2015)

Dr. Harsh Sharma May 22, 2015 Program Director. Program on NEGOTIATION SKILLS. (August 24-26, 2015) Leadership through Learning ADMINISTRATIVE STAFF COLLEGE OF INDIA Bella Vista, Raj Bhavan Road, Hyderabad - 500 082 India Ph:0091-40-66533000 13 Lines, 66534238 (D) Telefax:(Programs Office) 0091-40-23324365

More information

CASE STUDY. IDC & Managed Hosting

CASE STUDY. IDC & Managed Hosting Netmagic Helps Pharmaceutical and CPG Company with Reliable, Robust Infrastructure and Adhere to Compliance with Audit Services Life Sciences companies have been making headway in the global scene for

More information

Outsourcing and Information Security

Outsourcing and Information Security IBM Global Technology Services Outsourcing and Information Security Preparation is the Key However ultimately accountability cannot be outsourced February 2009 page 2 1. Introduction 3 1.1 Reason for outsourcing

More information

GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in

GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in GOVERNANCE, RISK AND COMPLIANCE Internal Audit Assessing Fraud Vulnerabilities kpmg.com/in 1 Internal Audit Assessing Fraud Vulnerabilities Introduction Globalization has increased the scale and complexity

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee

More information

List of content. Chapter 1: Introduction 1. Chapter 2: Literature review 7

List of content. Chapter 1: Introduction 1. Chapter 2: Literature review 7 Title List of content Page Chapter 1: Introduction 1 1. Introduction 2 2. Purpose of the research 3 3. Objectives of the research 4. Questions and Hypotheses of the research 4 5. Methodology of study 4

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

Overview of ATM Payment systems and Audit functions

Overview of ATM Payment systems and Audit functions Overview of ATM Payment systems and Audit functions Mr.Babu.V Nodal officer- Cashtree /BANCS shared ATM groups- ( ex-dgm, Information Technology,Bank of India) ATM Machines: Physical and environment control

More information

18-22, 2016) ADMINISTRATIVE STAFF COLLEGE OF INDIA

18-22, 2016) ADMINISTRATIVE STAFF COLLEGE OF INDIA management development Program for Women Executives (January 18-22, 2016) ADMINISTRATIVE STAFF COLLEGE OF INDIA BACKGROUND Organizations globally have acknowledged e significance of gender diversity at

More information

Masters Degree in Human Resource Planning and Development An Executive Programme. (Starts on 1st February and concludes on 31st January every year)

Masters Degree in Human Resource Planning and Development An Executive Programme. (Starts on 1st February and concludes on 31st January every year) Masters Degree in Human Resource Planning and Development An Executive Programme (Starts on 1st February and concludes on 31st January every year) The Masters Degree Programme of the National Institute

More information

Incident Based Support Model

Incident Based Support Model Incident Based Support Model Incident-Based Support Model Manage IT Applications Budget Using Incident Based Support Model Presenters William Belich - Project Manager, ObjectWin Technology, Inc. Email:

More information

GMP Pharma BV. Netherlands

GMP Pharma BV. Netherlands GMP Pharma BV Netherlands Connecting the European & Indian Pharmaceutical, Biotechnology and Biopharmaceutical Industry for parallel growth and solicitation. About Us: GMP Pharma BV is a multisource organization

More information

ASSE On-Site Seminar Course Selections

ASSE On-Site Seminar Course Selections ASSE On-Site Seminar Course Selections - SAFETY & HEALTH MANAGEMENT - Safety Management Part I: Fundamental Concepts An excellent basic seminar. This seminar suggests fundamental elements that form an

More information

Note: This App is under development and available for testing on request. Note: This App is under development and available for testing on request. Note: This App is under development and available for

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

What is Business Continuity Planning (BCP) / Disaster Recovery Plan(DRP)?

What is Business Continuity Planning (BCP) / Disaster Recovery Plan(DRP)? Workshop on System Audit of Banks BCP Workshop on System Audit of Banks What is Business Continuity Planning (BCP) / Disaster Recovery Plan(DRP)? - Preparedness of an organisation to ensure continuity,

More information

AUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE

AUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE AUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE Ref: Chapter 3.1 GOVERNANCE FRAMEWORK Information Technology Steering Committee

More information

The process of. The Software-as-a- Cloud-Based Software Model. Service Model

The process of. The Software-as-a- Cloud-Based Software Model. Service Model In recent years, financial institutions (FIs) have become accustomed to the idea of outsourcing aspects of their operations through cloud computing partnerships in order to increase efficiency, reduce

More information

ICT. Information and Communication Technologies for Business Management. Initial Vocational Training Initiative

ICT. Information and Communication Technologies for Business Management. Initial Vocational Training Initiative ICT Information and Communication Technologies for Business Management Initial Vocational Training Initiative OBJECTIVES OF THE INITIATIVE The objectives of the ICT for Business Management Initial Vocational

More information

2: HRMS REFERENCE NUMBER:

2: HRMS REFERENCE NUMBER: JOB DESCRIPTION 1. JOB TITLE: Helpdesk Supervisor 2: HRMS REFERENCE NUMBER: HRMS/HRMS13310 3. ROLE CODE: FINDACO 4. DEPARTMENT: Facilities Management 5. ORGANISATION CHART: Post will report to the Head

More information

INFORMATION SYSTEMS. Revised: August 2013

INFORMATION SYSTEMS. Revised: August 2013 Revised: August 2013 INFORMATION SYSTEMS In November 2011, The University of North Carolina Information Technology Security Council [ITSC] recommended the adoption of ISO/IEC 27002 Information technology

More information

for the Indian Banking Sector

for the Indian Banking Sector IT Governance Series Sub-Group on Institute for Development and Research in Banking Technology (Established by Reserve Bank of India) Hyderabad - 57. www.idrbt.ac.in IDRBT Sub-Group on Mentors Shri B.

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

Health and Safety Policy

Health and Safety Policy Health & Safety Policy 1.Introduction Health and safety is the concern of everyone within Escape Community Arts (Escape). This policy is intended to provide a practical framework for the implementation

More information

SUMMARY OF POSITION ROLE/RESPONSIBILITIES:

SUMMARY OF POSITION ROLE/RESPONSIBILITIES: SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant

More information

ESKITP714601 Authorise strategy, policies and standards relating to IT service delivery performance metrics management

ESKITP714601 Authorise strategy, policies and standards relating to IT service delivery performance metrics management service delivery performance metrics Overview This sub-discipline covers the competencies required to direct the monitoring, analysis and communication of IT service delivery performance metrics. Monitoring

More information

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA ViS!T - Verwaltung integriert sichere Informationstechnologie, Wien, 29.10.2014 European Union Agency

More information

WHITE PAPER. Mitigate BPO Security Issues

WHITE PAPER. Mitigate BPO Security Issues WHITE PAPER Mitigate BPO Security Issues INTRODUCTION Business Process Outsourcing (BPO) is a common practice these days: from front office to back office, HR to accounting, offshore to near shore. However,

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Emerging Trends in the Network Security Market in India, CY 2013

Emerging Trends in the Network Security Market in India, CY 2013 Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive

More information

Chapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING

Chapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING Chapter 1 THE ROLE OF PURCHASING IN THE VALUE CHAIN The role and importance of the purchasing and supply function in the value chain. The difference between concepts such as ordering, buying, purchasing,

More information