E-Commerce at Wells Fargo. SF IIA/ISACA Presentation



Similar documents
Evaluate the Usability of Security Audits in Electronic Commerce

Security Issues in Cloud Computing

Chapter. Developing Business / IT Strategies. Copyright 2008, The McGraw-Hill Companies, Inc. All rights reserved.

Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation

IT Governance and Outsourcing

The Digital Performance Benchmark. What distinguishes world class digital from the rest of the pack?

Module 6. e-business and e- Commerce

OCC 98-3 OCC BULLETIN

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Considerations for Internal Audit

Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

Enterprise Risk Management & Information Technology

APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

1.Because e-commerce is ubiquitous it reduces A. marketspace. B. transaction costs. C. dynamic pricing. D. price discrimination.

Domain 1 The Process of Auditing Information Systems

Forensic Services. Third Party Risks. March 2013

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

The Need is Now: Incorrect or insufficient data about any product means it s instantly out of the running.

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

Developing National Frameworks & Engaging the Private Sector

Fundamentals of Information Systems, Fifth Edition. Chapter 1 An Introduction to Information Systems in Organizations

Case Study: Hiring a licensed Security Provider

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Proof of Concept service. Professional and Managed Services. Installation services. First Looks

Introduction to E-Commerce

Third Party Risk Management 12 April 2012

Cyber security Building confidence in your digital future

Community Development and Training Centre Semester IT 245 Management Information Systems

Vendor Management. Outsourcing Technology Services

Groupon s Business Model: Social and Local

E-Business, E-Commerce

The Information Assurance Process: Charting a Path Towards Compliance

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

THE PROGRAMME PROGRAMME STRUCTURE ADMISSION REQUIREMENTS LANGUAGE MEDIUM

Blackblot PMTK Marketing Review. <Comment: Replace the Blackblot logo with your company logo.>

IT6304 e-business Applications (Optional)

the better way to pay

Certified Information Systems Auditor (CISA)

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

IT Governance and IT Operations Bizdirect, Mainroad, WeDo, Saphety Lisbon, Portugal October

Multichannel Customer Care

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Syllabus E-Business and E-commerce

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

The PNC Financial Services Group, Inc. Business Continuity Program

Using Business Scenarios in the Software Development Process

Security Controls What Works. Southside Virginia Community College: Security Awareness

MODULE 1. Understanding your customer and digital marketing

Automating Control Frameworks: A Tool for Managing Compliance and Risk in Government Services

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Information security controls. Briefing for clients on Experian information security controls

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Sytorus Information Security Assessment Overview

Global e-commerce Logistics 2016

E-Commerce and E-Business

COMPANY PROFILE ALIGNING IT WITH BUSINESS CORE SERVICES. Web Development. Mobile App Development. Website Maintenance. Marketing/Events Management

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

Business Plan Strategy. John Debrincat

Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations.

2015 Third-Party Logistics Study

Five keys to a more secure data environment

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Faster provision of products and services to the marketplace

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY

Alibaba s Practice on IPR protection as ISP

CHANGES IN THE PROFESSIONAL SERVICES MARKETING MIX: Traditional vs. Online Marketing

Cisco Unified Communications Predeployment, Deployment, and Postdeployment Service Bundle

Modernizing ERP for B2B E-Commerce Success. The Challenges with Legacy ERP/E-Commerce Platforms and How to Solve Them

Managing IT Security with Penetration Testing

Coverity White Paper. Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing

BOOST REVENUE AND CUSTOMER SATISFACTION WITH EFFECTIVE FRAUD PREVENTION

The Kroger Company: Transforming the Product Data Management Landscape

Part A OVERVIEW Introduction Applicability Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Electronic Commerce Management for Business Activities and Global Enterprises:

Electronic Commerce. Chapter Overview

The Future of Payments 2015: Financial Institutions. The Payments Value Chain is Driven by Customers

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

Squaring the Circle in Payment Processing

Position Paper e-payments

Kea Influencer Relations and Marketing for High-Tech & Technology Providers

Fortune 500 Medical Devices Company Addresses Unique Device Identification

E-Commerce Business Models and Concepts

Transcription:

E-Commerce at Wells Fargo SF IIA/ISACA Presentation By Wells Fargo Audit Services October 17, 2000

2 Discussion Topics E-Commerce at Wells Fargo - Our Story E-Commerce Risks General Conclusions Q&A Afternoon Session

3 Background - Where We Started 9/99 Discussion With Wells Fargo s CTO Wake Up Call! Call To Arms!

4 Background - Where We Started E-Commerce Activities At Wells Fargo Recognized as a Leader for Growth and Innovation 1.7 Million Online Customers (1999) - more than double since 1998 wellsfargo.com New Products and Services (Internet) Decentralized Responsibility for EC Initiatives

Background - Where We Started E-Commerce is Changing the Competitive Landscape COMPETITORS: Non-Traditional Financial Institutions Portals Non-bank companies Dot-Com s TECHNOLOGY: Rapid changes New channels Evolving standards Increasing ubiquity New dominators CUSTOMERS: Mobile Diverse geographies Price sensitive Anytime, anywhere One-stop shopping THREATS: Intrusions Disruptions Regulations Fraud Aggregation 5

6 Background - Where We Started Moving At Internet Speed EC Activity Is Growing At A Rapid Pace Business And Technology Risk Profiles Are Changing

7 Background - Where We Started Audit s Reaction/Response Do We Have Answers To These Basic Questions? What is E-Commerce? How is it Defined? What E-Commerce Activities are Occurring Within Wells Fargo, and Where? What Risks are Associated With These Activities?

8 Background - Where We Started Do We Have Adequate Audit Coverage and Are We Doing Enough? Project Basis Auditing Some Recurring Operational Audits Silo Approach What Is The Best Approach To Audit These Activities?

9 What We Did - Where We Are Launched An Enterprise Wide E-Commerce Project Project Objectives Provide Executive Management with an enterprise level assessment of the processes in place to allow E-Commerce objectives to be met Assist the organization in evolving its controls as the E-Commerce business model changes and E- Commerce needs evolve Provide comparison to good industry practices Develop an approach for auditing E-Commerce activities within Wells Fargo

Project Team What We Did - Where We Are E-Commerce Project Business and Technology Auditors A Team Players Experienced Understands the Business Partnership with KPMG Fully Dedicated Resources Project Approach 3 Phases 10

What We Did - Where We Are Phase I - Planning & Strategic Analysis Gather Wells Fargo Specific Information Pertaining To: Business Objectives and Strategy E-Commerce Strategic Management E-Commerce Initiatives Organization and Responsibilities for Program Management Application Management Technical Infrastructure Supporting Processes 11

What We Did - Where We Are Phase I - Outcome E-Commerce is the use of enabling technologies that extend the core business activities of the enterprise into a virtual electronic community that is shared with customers, prospects, suppliers, business partners and employees. (Audit definition) Understanding of E-Commerce activities and initiatives Focus on Internet transactions (B2B, B2C, and C2C) Accumulation of data for Phase II risk assessment 12

What We Did - Where We Are Phase II - Enterprise Level Business Risk Assessment Identify important control objectives Assess the processes across the enterprise for meeting the control objectives Prioritize risks and compare processes to internal and external Best Practices Make recommendations for strategic and tactical remediation efforts 13

What We Did - Where We Are Phase II - Outcome Over 80 formal interviews conducted with all key lines of business Formal risk assessments completed at enterprise level Complete understanding of E-Commerce activities, initiatives, and risks Helped educate Executive Management and A&E Committee E-Commerce infrastructure within Wells Fargo Helped take the Mystique out of E-Commerce and the Internet Risks associated with E-Commerce 14

What We Did - Where We Are Phase II - Outcome Reputation / Brand Risk Control Objectives Strategic Management Program Management Technical Infrastructure Application and Functionality Architecture Supporting Processes Strategic: Credit: Transaction: Compliance: Effectiveness of planning process [Time to Market] Linkage with other strategic and business plans Adequacy of expertise and resources [Intellectual Property] New demographics New geographies Changing customer relations Transitory customer New network of alliances Instant Credit Decisioning Non-credit risk Transaction integrity Customer authentication [Digital Certificates] System capacity & availability Monitoring and audit Backup and recovery Banking regulations Consumer and banking legislation Contracts with suppliers, outsourcers and customers Privacy [Aggregation] Legal Fraud risk 15

16 What We Did - Where We Are Phase II - Outcome Additional new risks include: Missing non-traditional changes in the competitive landscape Keeping pace with the number and/or size of identified changes Assuming more risk than planned in attempting to respond quickly Tarnishing reputation/brand due to missteps in the marketplace

What We Did - Where We Are Phase II - Outcome Results formally presented to Executive Management and A&E Committee Forward thinking recommendations - looking out the front window Obtain Management Buy-In What s Working and What s Not Value Added 17

What We Did - Where We Are Phase II - Outcome EC Life Cycle Informational Transactional New products Value Chains Next Evolution (traditional products) and services Challenges and opportunities - areas to focus on Strategic Management Risk Management Balance between speed to market and effective controls Technology and security Communication regarding E-Commerce roles and responsibilities Due Diligence Process Contract/Vendor Management Intranet Processes 18

19 What We Did - Where We Are Phase III - Implementation Objectives Assist management in evolving controls related to E-Commerce technology and business processes Determine appropriate tools and approach for maintaining on-going value-added review of E-Commerce activities by Audit

What We Did - Where We Are Phase III - Outcome Established an E-Business Audit Team Full Time Focus to Proactively identify emerging E-Commerce risks Establish controls to minimize exposure and potential impacts Interface with lines of business Provide proactive value added services Business and Technology Auditors Project team members ( A team, experienced) Think Outside the Box - Non-traditional audit approach 20

21 Conclusion - Where We Are Going Project Results - Enterprise Level Well received by management - proactive and value added Forward thinking - next level of strategic and risk management processes Assist Wells Fargo in maintaining its leadership role in developing, deploying and delivering secure and reliable E-Commerce products and services

Conclusion - Where We Are Going Project Results - Audit Level New E-Business Audit Group well received Need to deliver on our mission Consultative versus traditional audit approach Proactive and Integrated Fully dedicated to E-Commerce risks at enterprise level Partnership with Management E-Commerce Resource Center of Excellence Knowledge Risk Management Enterprise Level View 22

23 Closing Remarks If your organization is actively involved with E-Commerce and you don t know or fully understand the associated risks You Are Behind the 8-Ball! It Isn t Going to Slow Down! Need to Address These Risks Now! If you are on top of these risks Congratulations E-Commerce is as much about business risks as technology risks

Questions?? RANDY MELBY (Phoenix) (602) 378-3677 melbyrr@wellsfargo.com TIM STAPLETON (San Francisco) (415) 396-1245 stapleti@wellsfargo.com CHARLES HUGHES (Minneapolis) (612) 667-0390 Charles.T.Hughes@wellsfargo.com 24