RISK. Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines



Similar documents
Programme in Management of Foreign Exchange Business

MANAGING CREATIVITY AND INNOVATION

Information Technology

IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR

Advanced Management Programme

Institution of Occupational Safety & Health Managing Safely Course

Program on Human Resource Management for Line Managers. (February 01-05, 2016) ADMINISTRATIVE STAFF COLLEGE OF INDIA

Service Level Agreement. Definitions

Senior Manager Information Technology (India) Duration of job

ISACA Tools Help Develop Cybersecurity Expertise

Vendor Risk Management Financial Organizations

INFORMATION BROCHURE

Appendix A-2 Generic Job Titles for respective categories

Cloud Computing: Legal Risks and Best Practices

Big Data: Impact, Benefits, Risk and Governance

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

Corporate Governor. New COSO Framework links IT and business process

ESKITP Manage IT service delivery performance metrics

Information Technology Engineers Examination

Property Management Officer / Lettings Assistant Recruitment Pack.

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

INCLUDES THE REQUIREMENTS OF THE NEW ISO 14001:2015 STANDARD

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

THE RBI GUIDELINES. A Brief Summary of the RBI Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds

MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries

Programme on Strategic Human Resource Management

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

Vendor. Management. For sponsorship or to become our partner, contact:

Calendar of Training Programmes: at a Glance (Month-wise)

Dashboards as an Effective Tool for HIPAA Security and Privacy Compliance

ACS Residential Care Management Induction Program

Functions and Activities of National Statistical Systems Training academy

WHAT IS GEO-FENCING? (415) I I info@brownpelicangroup.com

Critical Systems Guidelines

The Bellevue Center for Obesity & Weight Management. Program Director: Manish Parikh, MD WEIGHT LOSS SURGERY INFORMATION SEMINAR

WEIGHT LOSS SURGERY INFORMATION SEMINAR

Hostel Administration Committee National Institute of Technology, Tiruchirappalli-15, Tamil Nadu INVITATION FOR EXPRESSION OF INTEREST

Third party assurance services

FAQs BBA France- Admissions

National Cyber Security Policy -2013

Strategic Supply Chain Management Programme

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG

3 rd Party Vendor Risk Management

FINANCE FOR NON FINANCE EXECUTIVES

IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES

Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for

The Information Security and Privacy Tradeshow. CIS 8080 Security/Privacy of Information Richard Baskerville

Dr. Harsh Sharma May 22, 2015 Program Director. Program on NEGOTIATION SKILLS. (August 24-26, 2015)

CASE STUDY. IDC & Managed Hosting

Outsourcing and Information Security

GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

List of content. Chapter 1: Introduction 1. Chapter 2: Literature review 7

CYBER SECURITY, A GROWING CIO PRIORITY

Overview of ATM Payment systems and Audit functions

18-22, 2016) ADMINISTRATIVE STAFF COLLEGE OF INDIA

Masters Degree in Human Resource Planning and Development An Executive Programme. (Starts on 1st February and concludes on 31st January every year)

Incident Based Support Model

GMP Pharma BV. Netherlands

ASSE On-Site Seminar Course Selections


A GOOD PRACTICE GUIDE FOR EMPLOYERS

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

What is Business Continuity Planning (BCP) / Disaster Recovery Plan(DRP)?

AUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE

The process of. The Software-as-a- Cloud-Based Software Model. Service Model

ICT. Information and Communication Technologies for Business Management. Initial Vocational Training Initiative

2: HRMS REFERENCE NUMBER:

INFORMATION SYSTEMS. Revised: August 2013

for the Indian Banking Sector

NSW Government Digital Information Security Policy

Health and Safety Policy

SUMMARY OF POSITION ROLE/RESPONSIBILITIES:

ESKITP Authorise strategy, policies and standards relating to IT service delivery performance metrics management

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

WHITE PAPER. Mitigate BPO Security Issues

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

ESKISP Conduct security testing, under supervision

Emerging Trends in the Network Security Market in India, CY 2013

Chapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING

Transcription:

August 31 September 2, 2015 Programme on Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines Coordinator Prof Sunil Bakshi RISK National Institute of Bank Management Pune, India

Programme on Outsourcing Risk Management With Focus on Controlling and Managing IT Vendors as per RBI Guidelines Background Use of information technology has enabled Indian banks in improving their service delivery by creating technology based alternate delivery channels like ATM, Internet banking, Mobile Banking and Apps, BC Agents. Most banking operations today heavily depend on technology. However, due to complexity of IT and ensuring that banks get appropriate expertise banks have adopted outsourcing model for information technology. The Reserve Bank of India has issued guidelines on implementing and governing the use of technology by Indian banks, that contain specific guidelines on Outsourcing Management in relation with technology. As part of compliance most banks have implemented processes that has enabled them to ensure compliance with guidelines, however still there is a need for stronger controls on outsourcing management due to increasing compliance requirements (Privacy legislation), changing threat scenario and increasing attacks on vendors which is impacting the banks. Bank management being focused on core business functions, sometimes find it complex to manage the outsourced function beyond certain point. Objective The programme is aimed at helping banks in understanding the underlying dependencies of outsourcing of technology and how banks can ensure proactive management of outsourced services by defining precise measurement metrics

Contents 1. Outsourcing Management and difference between technology outsourcing and other allied services. 2. Direct and Indirect Compliance requirements associated with Outsourcing Management RBI Guidelines, Customer Service levels, Data loss incidents and privacy related compliance etc. 3. Practices related to different types of technology outsourcing ATM, Software Acquisition and Development, Infrastructure Management, Security Outsourcing, Network Management, etc. 4. Operational Monitoring requirements for outsourced services - Change Management, Project Management, adopting new technology, Compliance, Incident Management and Business Continuity. 5. Contracting, SLA and developing and implementing SLA measurement metrics for outsourced services. 6. Case studies and group discussions on different situations. Methodology The programme is designed to be highly interactive with case studies and experience sharing. It will be mix of presentations, group discussions and real life like case studies. Target Group The programme is designed for senior managers and top executives responsible for IT and Business Operations, Continuity Management, Security Officers and Internal Auditors In particular the programme is meant for bank officials working in the areas of: s Enterprise Risk Management, Strategic Planning, IT Operations, IT Steering Committee, Business Operations, Inspection and Audit, Control Supervision and Vigilance Departments and IT department who are associated (or are likely to get associated) with Computer Systems Audit activities. s Trainers in Staff Training Colleges of banks and FIs.

Dates August 31 September 2, 2015 The Programme will commence at 9.00 am on Monday August 31, and will conclude by 5.00 pm on Wednesday September 2, 2015. Venue NIBM Campus, Kondhwe Khurd, Pune, India Hostel Accommodation The Programme is fully residential. Participants will be provided well furnished single room AC accommodation in the Institute's hostel complex on the Campus. However, they will not be permitted to bring their family members to stay on the campus. In case any Officer/Executive with physical/medical disability is being nominated, kindly inform us in advance with particulars of disability to facilitate necessary arrangements. The Institute has facilities for outdoor and indoor games and a large walking/jogging trail for physical fitness besides a yoga centre. Participants are, therefore, encouraged to bring the appropriate clothes/gears. Last Date for Receiving Nominations: August 21, 2015 Last Date for Availing Early Bird Incentive: August 14, 2015 (See Fee Structure on home page of the website) Nominations and Enquiries Please address your enquiries and nominations along with the fees to: Prof Sunil Bakshi Programme Coordinator Telephone : 0091-20-26716000 (EPABX), 267164347 (Direct) Fax : 0091-20-26834478 E-mail : bakshi@nibmindia.org Website : www.nibmindia.org