www.pwc.com Governance, Risk and Compliance Update & Hot Topics Pittsburgh Chapter IIA December 3, 2012



Similar documents
Governance, Risk, and Compliance (GRC) White Paper

Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June

Third Party Risk Management 12 April 2012

Risk Considerations for Internal Audit

fs viewpoint

Cybersecurity The role of Internal Audit

eet Business continuity and disaster recovery Enhancing enterprise resiliency for the power and utilities industry Power and Utilities Fact Sheet

The Role of Internal Audit In Business Continuity Planning

Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

How To Improve Your Business

XBRL & GRC Future opportunities?

building a business case for governance, risk and compliance

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

IT Governance, Risk and Compliance (GRC) : A Strategic Priority. Joerg Asma

Enterprise Risk Management & Information Technology

Business Resiliency Business Continuity Management - January 14, 2014

IT Risk Management Life Cycle and enabling it with GRC Technology

ERM006 ERM and Business Continuity Management: Together at Last RIMS Annual Conference April 13, 2016

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER

How To Ensure Financial Compliance

MHA Consulting. Business Continuity Management 101

Enterprise Risk Management

Operational Risk Management - The Next Frontier The Risk Management Association (RMA)

Metrics that Matter Security Risk Analytics

Business Continuity Management 101. Patrick Potter, CBCP MHA Consulting ISACA November 19, 2009

Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP

How To Manage Risk

This article will provide background on the Sarbanes-Oxley Act of 2002, prior to discussing the implications for business continuity practitioners.

Enterprise risk management and business continuity management Together at last

Moving Forward with IT Governance and COBIT

Vendor Risk Management Financial Organizations

Preparing for the Convergence of Risk Management & Business Continuity

IDENTIFYING VENDOR RISK THE CRITICAL FIRST STEP IN CREATING AN EFFECTIVE VENDOR RISK MANAGEMENT PROGRAM

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

Information Security Management System for Microsoft s Cloud Infrastructure

4th Annual ISACA Kettle Moraine Spring Symposium

Business Continuity Trends, Requirements and Expectations in Brian Zawada (MBCP) Director of Consulting Services Avalution Consulting

RSA Archer Risk Intelligence

Internal audit value optimization for insurance organizations

Business Continuity in Healthcare

Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting

Business Continuity for the New Professional. Britt Corra Enterprise BCM Erika Voss Senior BCM

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

Forensic Services. Third Party Risks. March 2013

The Business Continuity Maturity Continuum

Module 6 Essentials of Enterprise Architecture Tools

Why you should adopt the NIST Cybersecurity Framework

Get More Out of Your Risk Assessment. Austin Chapter of the IIA

Beyond risk identification Evolving provider ERM programs

Commodity Price Risk Management (CPRM) - Trends and Challenges for Corporates

OC Chapter. Vendor Risk Management. Cover the basics of a good VRM program, standards, frameworks, pitfall and best outcomes.

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity

How to measure your business resiliency

NIST Cybersecurity Framework & A Tale of Two Criticalities

Guide to Business Continuity Management

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief

Impact of New Internal Control Frameworks

Fraud Risk Management

The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

Achieving Business Imperatives through IT Governance and Risk

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Evaluating and Improving Your Business Continuity Plan

Managing cyber risks with insurance

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Business Continuity Management Systems. Protecting for tomorrow by building resilience today

14 October 2015 ISACA Curaçao Conference By: Paul Helmich

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

Information Technology Auditing for Non-IT Specialist

Directory of. Advertising Supplement

IT Insights. Managing Third Party Technology Risk

Improving Financial Performance, Governance and Compliance

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Measuring Continuity Planning Program. Performance

Cyber Risks in the Boardroom

FFIEC Cybersecurity Assessment Tool

Business Continuity and Disaster Recovery Planning

Anti-Fraud Management Example In Accounts Payable. Michael Heckner October 12, 2012

IT Security & Compliance Risk Assessment Capabilities

VENDOR MANAGEMENT. General Overview

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Microsoft s Compliance Framework for Online Services

KPMG Internal Audit: Top 10 considerations in 2015 for technology companies. kpmg.com

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Cyber Security From The Front Lines

Compliance & Internal Audit Collaboration

Italy. EY s Global Information Security Survey 2013

Vendor risk management leading practices Glenn Siriano KPMG LLP DRAFT

Transcription:

www.pwc.com Governance, Risk and Compliance Update & Hot Topics Pittsburgh Chapter IIA December 3, 2012

Agenda Introduction Mark Gibbons 12:00 12:05 Governance, Risk and Compliance Overview Mark Gibbons 12:05 12:10 Enterprise Risk Management Jason Plummer 12:10 12:40 Business Continuity Management Ron Brown 12:40 01:10 Integrated Compliance Mark Gibbons 01:10 01:20 Conflict Minerals Molly Tarin 01:20 01:35 GRC Technologies Brian Behan 01:35 01:50 Questions & Answers Team 01:50 02:00 2

Governance, Risk & Compliance overview Learning Objectives Provide high level overview of several key areas of Governance, Risk and Compliance Provide an update on trends and hot topics Discuss the role of Internal Audit related to these areas Suggest ideas on how to audit Share examples 3

Governance, Risk & Compliance (GRC) Overview Definition GRC is the term covering an organization's approach across these three areas: Risk Management Ability to identify, measure, prioritize, and mitigate areas of risk (financial, operational, IT, brand or reputation related risk) in the business through proactive risk management process Functionalities: Risk Analysis, Risk Assessments, ERM Dashboards Risk Management Compliance Corporate Governance Compliance Ability to manage compliance at a lower cost through a streamlined process to make it repeatable and sustainable Functionalities: Process and Risk Documentation, Control Management, Effectiveness of Control Analysis, Disclosure and Certification, Loss & Incident Database Corporate Governance Ability to define and communicate corporate control, key policies, enterprise risk management, regulatory and compliance management, and oversight, and evaluate business performance through balanced scorecards, risk scorecards and operational dashboards Functionalities: Internal Audit, Policy & Procedure Management, Board & Entity Management, Reporting 4

Governance, Risk & Compliance Overview Role of Internal Audit in Governance, Risk and Compliance Definition of Internal Auditing Internal auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization s operations. It helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes. 5

Governance, Risk & Compliance Overview Role of Internal Audit in Governance, Risk and Compliance Expectation that Internal Audit understands respective areas and are competent to evaluate them Provide insight to leading trends and practices and provide value added advice and comments Observation: IIA Standards expect that Audit Groups either develop competencies or use external resources (1210 - Proficiency, also 1210.A1 and 1210.C1) Many organizations don t have or can t afford to develop internal competencies/resources in some diverse areas of risk Look to Subject Matter Specialist to assist in the evaluation Many companies continue to engage third parties such as accounting firms to assist with their internal audit functions in specialty areas 6

Governance, Risk & Compliance GRC Governance Risk Compliance ERM BCM Ethics and Compliance Dealing with Regulation How We Look at GRC Integrated Compliance Pre-IPO Compliance Other Compliance Services (ie Sustainability, Conflict Minerals) GRC Technology 7

Enterprise risk management 8

Discussion items Typical Challenges to Overcome with ERM Three Lines of Defense Internal Audit s Role Assessing Risk Management Capabilities 9

Typical challenges to overcome with ERM The Board s role in ERM becomes increasingly challenging as expectations for their engagement increase Leadership doesn t buy in to a formal ERM process because enterprise risk is handled by management as part of their day-to-day responsibilities When implemented, ERM tends to be bureaucratic and an annual event that is not well integrated with existing strategic planning and other business processes Enterprise risk assessments are often superficial and don t highlight the real risks and their interconnections Risks are identified and managed inconsistently within silos organizational interdependencies are not fully understood To overcome these challenges: Align ERM with existing business activities Provide periodic reporting that is tailored and brings value to the audience 10

3 Lines of defense An example organizations implement three distinct lines of defense into their Combined Assurance programs.. Clarity of Roles and Responsibilities Structured into Three Lines of Defense Senior Management Board / Audit Committee 1 st Line of Defense 2 nd Line of Defense 3 rd Line of Defense Management Controls Internal Control Measures Financial Control Security Risk Management Quality Inspection Compliance Internal Audit External Auditor Regulator 11

Internal audit s role Roles internal audit may not be in the best position to undertake Assuming responsibility for risk management Making decisions on risk responses Setting the risk appetite Potential internal audit roles Championing establishment of ERM Facilitating the identification & evaluation of risks Coordinating ERM activities Core internal audit roles in regard to ERM Evaluating risk management processes Reviewing the management of key risks Providing a point of view on key risks and risk management 12

Assessing risk management capabilities An approach on how IA can effectively assess ERM One way IA can effectively assess the Organization s ERM capabilities is by utilizing a five stage maturity model framework Initial, Repeatable, Defined, Managed, and Optimized and provide a current state assessment of its ERM foundation and attributes. ERM Foundational Elements Governance and Culture Process and People ERM Attributes Organization and Governance Structure Value and Incentives Risk Management Process Risk Analytics, Infrastructure and Resources Tools and Technology 13

ERM Objectives Start by ensuring that key stakeholders are aligned to objectives Operational Governance Enhance communication to Senior Management and the BOD Existing threats require assessment and attention Reputation Protect the brand & shareholder value Integrated assessment activities Emerging risk discussion Sustainability and risk culture considered Strategic Improve the balance between growth, risk & return Optimize risk management, return on investments and business growth Intelligent strategic decisions account for risk Align the company s risk appetite with business activities Opportunistic and seeking measurable benefit Risk monitoring may provide an early warning system on real time basis Technology Technology Supports objectives, creating process efficiency and more effective data management and reporting. 14

Is ERM considered during strategic planning Assess enterprise risk Assess enterprise risk Perform Analysis Deliver valuable, comprehensive risk reporting Deliver valued risk reporting Report Formulate Strategies Evaluate risk appetite Evaluate risk appetite Monitor Develop Develop Strategic Strategic Plan Plan Continuously assess & refine risks Continuously assess & refine risks Implement Execute Plan Initiatives Assign risk ownership Assign risk ownership 15

Reporting Consider whether reporting provides value to the business AND addresses risk management needs Department Organizational Unit Executive 16

Questions Contact: Jason D Plummer Director, Enterprise Risk Management Office: 410-659-3406 Email: Jason.D.Plummer@us.pwc.com 17

Business continuity management 18

Business interruption risks are increasing Threats have accelerated and are trending to increase: Natural disasters (Sandy, Japan Tsunami, Mid-West Tornadoes, Man-made disruptions (Cyber, Crime, Poor Economies, Technology Dependence, Environmental damages) Biological / geo-political events (Food/Water Contamination, Civil unrest, poverty) 19

Vulnerabilities are more exposed due to change Business continuity management functions should consider: Increased business process automation Financial distress Workforce reductions Business combinations and divestitures, Level of reliance on outsourcing Highly efficient and vulnerable supply chains Increased regulation General risk management awareness that links continuity planning to operational resiliency 20

Definitions Business Continuity Management (BCM) A risk-based approach and process to indentify, prepare for, plan, respond to, and recover from a major disruption where acceptable levels of risk have been exceeded Business Resilience (BR) Managing enough risk to sustain operations at an acceptable level in the event of business interruptions Disaster Recovery (DR) the processes and steps needed to recover from a major disruption (mainly technology services) BR BCM Assets Threats Inherent Operational RISK Controls Residual RISK Vulnerabilities 21

BCM is a core risk management capability BCM is one of the ways an organization can respond to risk Ratings and compliance agencies (e.g., S&P) consider a company s business continuity program as part of the risk management culture BCM objectives focus on the protection of business critical products and services Business Continuity Integrated Program Prepare Respond Enterprise Risk Management (ERM) Business Continuity Management (BCM) Crisis Management (CM) Disaster Recovery Planning (DRP) Business Continuity (BC) 22

Why Audit BCM BCM has been moving up the corporate risk agenda, often cited as a top risk. Audits of BCM can help determine whether: Public disclosures and contractual / regulatory compliance related to the organization s business continuity risk management are accurate The company has identified their business interruption risks and quantified the potential impact The company has developed resiliency and recovery strategies to address business interruptions Business continuity plans have been developed for critical business functions to reduce the impact of business disruptions IT s disaster recovery efforts are aligned with the business need for recovery and resiliency Sourcing interruption risk has been reduced Crisis management, business continuity and IT disaster recovery programs are tested and adjusted as the organization changes 23

Audit BCM assessment value Providing insight to leadership about whether: The organization effectively addresses relevant business interruption risks The organization uses business continuity planning effectively as part of its overall enterprise risk management approach Opportunities exist to become more competitive using business continuity and service resilience 24

BCM regulatory drivers and standards Sarbanes-Oxley FFIEC SEC, NASD British Standards FDA, OSHA Graham Leach Bliley FERC, NERC Private Sector Preparedness Act (PS- Prep) HIPAA / HITECH NIST ASIS Standard ISO Standards G30 BASEL Accord State Insurance Dept., NAIC Dodd-Frank 25

Providing Audit with Insight into the Characteristics of a leading BCM Program Oversight and Ownership Planning and Deployment Business Continuity Management Exercise / Testing Training and Awareness 26

BCM assessment guidance There are no specific detailed audit standards for business continuity outside of the financial services industry. However, there are a variety of business continuity standards and guidance that can be incorporated into an Internal Audit business continuity management assessment. These include: - PS-Prep standards (NFPA 1600, ASIS SPC.1-2009, BS 25999:2-2007) - IIA s Global Technology Guidance on Business Continuity Management (GTAG 10) - ISO 22301 utilizes an assessment approach that tailors this guidance into a tailored audit program. We perform the assessment using business continuity consultants who are part of our larger Governance, Risk and Compliance practice. 27

Questions Contact: Ron Brown Director Business Continuity Management Office: 703-918-3249 Mobile: 703-930-4634 Email: ron.brown@us.pwc.com 28

Integrated compliance overview 29

Complex and evolving compliance landscape Regulatory Agencies SEC OSHA FERC FDA NERC Regulatory Requirements PCI HIPAA FISMA FCPA SOX GLBA Leading Practices and Frameworks ISO COBIT COSO NIST Organizational Requirements Strategic Initiatives Customer Vendor Operational Objectives SSAE 16 30

Integrated compliance Risk Management GRC Compliance Services ERM BCM Ethics Sector Regs Integ. Com. Integrated Compliance helps companies consolidate divergent compliance requirements, eliminate duplicative controls and reduce compliance effort and risk by combining similar controls from disparate requirements into one consolidated view. This approach increases the efficiency and effectiveness of compliance functions by creating a centrally managed, consolidated controls framework which can be sustainably monitored, measured, and adapted to the changing control environment. 31

Integrated compliance Risk Management GRC Compliance Services ERM BCM Ethics Sector Regs Integ. Com. Example Approach: Assess the company s existing compliance landscape (e.g., SOX, PCI, HIPAA, HISNA, ISO, etc; and sector specific regulations). Rationalize compliance controls across all the compliance requirements. Develop/Implement a streamlined and consolidated controls framework. Establish a monitoring program to test controls and an assessment mechanism to ensure framework is up to date 32

Integrated compliance Risk Management GRC Compliance Services ERM BCM Ethics Sector Regs Integ. Com. Potential Benefits: Reduction of duplicative controls Reduced management monitoring effort as a result of compliance integration Reduced management time devoted to assisting the auditors and more time for value adding activities Improved awareness of the control environment and expectations with regard to compliance Accelerated audit preparation and design evaluation phases Reduced audit effort to monitor/test compliance in turn freeing up time for operational audits 33

Integrated compliance Risk Management GRC Compliance Services ERM BCM Ethics Sector Regs Integ. Com. Potential Triggers: New highly regulated or complex compliance environment Repetitive compliance failures Sense of being over audited Decentralized compliance function and roles Mergers, acquisitions and divestitures Service provider organizations with multiple clients 34

Questions Contact: Mark Gibbons Director Office: 412-355-7719 Mobile: 724-612-6198 Email: mark.d.gibbons@us.pwc.com 35

Conflict Minerals (Dodd-Frank Section 1502) Understanding the final rules 36

Dodd-Frank Section 1502 requires companies to determine whether their minerals are conflict free What are conflict minerals? Conflict minerals, as determined by the U.S. Secretary of State, may finance conflict in the Democratic Republic of the Congo (DRC) or adjoining countries. The 3TG metals are: - Tantalum - Tin - Tungsten - Gold Who is in scope of Section 1502? What is required of companies? Examine products to determine whether and to what extent Section 1502 applies Develop and conduct reasonable country of origin inquiry (RCOI) and due diligence Acquire independent audit (if needed) Any company that files periodic reports under Sections 13(a) or 15(d) of the Exchange Act who: - Manufactures or contracts to manufacture products, and - Conflict minerals are necessary* to the functionality or production of those products *No de minimis exception associated with necessary Comply with disclosure requirements When does compliance begin? First filings are due May 31, 2014 for calendar year 2013. 37

Who is impacted The SEC estimates approximately 6,000 issuers and 275,000 suppliers will be impacted SEC issuers directly subject to Section 1502 May experience indirect exposure to final rules Scoped out of final rules Examples Any company that either manufactures or has influence on the specifications of products that include these metals, e.g.: - High-tech - Autos and auto components - Aerospace and defense - Industrials - Medical devices (electronic components) - Pharmaceuticals (packaging) - Jewelry - Food products (packaging) - Consumer products Suppliers responding to customer requests Mining companies to support implementation of on-the-ground certification mechanisms Retailers who have no significant level of influence over product specification Mining companies who have only extraction activities and no manufacturing activities Scrap or recycled materials Metals used (e.g., catalyst, tools) that are not contained in the final product 38

Key tasks Step Managing compliance requires thoughtful preparation to create a sustainable process Example of what companies should consider doing: Establish strong management systems Assess risk in the supply chain Implement response to identified risks Report Adopt a company policy Establish project governance Identify impacted products and components Develop RCOI and due diligence strategy Implement tools to assist in information gathering Identify suppliers Map the supply chain Conduct RCOI Review responses to identify and assess risks in the supply chain Conduct additional due diligence if needed Design and implement controls around vendor management and procurement procedures Test and monitor effectiveness of controls Address new risks or changing circumstances as needed Engage independent third-party audit if needed Meet reporting requirements per the final rules Respond to information requests from customers Program/project/change management Technology and data management 39

What are some of the key challenges to compliance Determine how Section 1502 applies to the company Understand and manage the complexity of the supply chain Develop and conduct an RCOI and, if needed, due diligence process that will meet industry standards and audit requirements Understand how to leverage the OECD guidance to implement an effective control framework to prevent and detect conflict minerals Manage responding to customer information requests 40

How can help Offering Rapid Conflict Minerals Assessment to assess the readiness of a company to conduct the RCOI/due diligence process and meet compliance requirements Assessment of a company s current conflict minerals program against the OECD framework and audit requirements Assistance with design, implementation or operation of the conflict minerals program Supplier Audit /Vendor Assessment - third party audits for suppliers /other supply chain players to provide to their customers, including readiness reviews Third Party Audit of Conflict Minerals Report, including readiness reviews Companies that might benefit Those companies who have done little to prepare Those companies who have already begun to implement the OECD framework and/or begun to conduct due diligence on their supply chain Immature or mature companies Those who may have insufficient resources to manage the RCOI and due diligence process Non-OEMs Those with a significant customer base Those companies who believe they will require an audit to be conducted in accordance with the standards. A readiness assessment can be conducted to prepare for the audit requirements for the 2013 reporting year. 41

Questions resources and contacts: Visit our website (external): www.pwc.com/us/conflictminerals Contacts: - conflict.minerals@us.pwc.com - Molly Tarin molly.tarin@us.pwc.com (Risk Assurance, Lake Erie Market Conflict Minerals Champion) - Daniel Webster - daniel.webster@us.pwc.com (Industrial Products, Conflict Minerals Champion) 42

GRC Technologies - Building a business case 43

GRC Integrating multiple technologies into an enterprise GRC platform is a transformation opportunity. Internal Audit Controls Security Risk Mgmt Compliance Process Assurance SOX Anti- Fraud Privacy AML Credit FCPA BCP Info Sec. Op Risk FSG TeamMate GATE/Ace Sharepoint Spreadsheets Point Solution Others Companies have responded to increasing stakeholder and regulatory pressures by forming multiple governance, risk & compliance (GRC) oversight functions, processes and information systems across the organization 44

GRC Technology overview Use of a technology to document, consolidate and centralize the company's overall Internal Control Framework. GRC Control Repository Technology Strategic Level GRC Enterprise Risk Management Technology Use of a technology to identify, assess and monitor, on a continuous basis, the company s overall Enterprise Risk Management processes. GRC Technology Landscape Use of a technology to define, manage and monitor, on a continuous basis, the company s overall Compliance & Business processes. GRC Continuous Control Monitoring Technology GRC Segregation of Duty Technology Use of a technology to define, manage and monitor, on a continuous basis, the company s overall Security Environment. Tactical Level 45

GRC Technology magic quadrant by Gartner 46

The Forrester wave: Enterprise governance, risk, and compliance platforms 47

GRC Business case common foundations Compliance Internal Audit Internal Controls Automation Reporting Control Effectiveness Centralization & Shared services Protect investment Visibility 48

Questions Contact: Brian Behan Manager - Risk Assurance Office: 412-355-7581 Mobile: 814-440-8209 Email: brian.behan@us.pwc.com pwc.com 2012 PricewaterhouseCoopers LLP. All rights reserved. refers to the United States member firm, and may sometimes refer to the network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details. This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors.