Risk Management Software Solutions Encierro Solutions.

Slides:



Advertisements
Similar presentations
1 K P M G L L P A D V I S O R Y Changes in the IT Audit Profession Stephen G. Hasty, Jr. National Partner in Charge IT Advisory Savannah, GA January 4,
Advertisements

Regulatory Track FFIEC Central Data Repository: Adding Value to the Data Supply Chain Alan Deaton, Federal Deposit Insurance Corporation June 25, 2009.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
A Brief Overview of Emergency Management Office of Emergency Management April 2006 Prepared By: The Spartanburg County Office of Emergency Management.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
It’s Time to Talk About Risk and Control
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Security Controls – What Works
DELATUSH SYSTEMS, INC. Presents MB SECURE NETWORK MONITORING AND MANAGEMENT.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Viewpoint Consulting – Committed to your success.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
PwC Role of Internal Audit in Corporate Governance September 2010 Tumin Gültekin, Partner.
University of California New Business Architecture Project 2010 Jan00 meeting notes.doc April 15, 2004 Accelerating the New Business Architecture UC Employment.
NAIC Review of ERM & Internal Controls David Altmaier Florida Office of Insurance Regulation.
Risk Assessment Frameworks
CRM Ahmed Khadr February 14, 2002 OISM 470 W. Agenda The CRM hype! What is CRM? A Definitive Definition The Five Views of CRM A CRM Brainstorm Let’s Talk.
CORPORATE RISK MANAGEMENT & INSURANCE BY R P BLAH D.G.M. INCHARGE THE ORIENTAL INSURANCE COMPANY LIMITED REGIONAL OFFICE BHUBANESWAR.
Systemise your compliance management Peter Scott Consulting
“The Impact of Sarbanes Oxley, An Evolving Best Practice” Ellen C. Wolf Senior Vice President & Chief Financial Officer American Water National Association.
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
Introduction to SQF Certification (Use “Notes “ View in PowerPoint to see additional guidance) Use this presentation to introduce SQF Certification.
Vendor Risk: Effective Management is Essential
Information Technology Audit
Internal Auditing and Outsourcing
Sapient Insurance Partners. Overview & Services We have almost four decades of combined experience in the property & casualty insurance and reinsurance.
SecureAware Building an Information Security Management System.
Presenting The Broker-Dealer Certification Tool The Compliance Department Inc. Broker Dealer Compliance Consultants Compliance SCORE Powered by Keane BRMS.
Evolving IT Framework Standards (Compliance and IT)
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
HIPAA COMPLIANCE WITH DELL
1 Enterprise Risk Management (ERM) Program PNM Resources, Inc. March 29, 2007 Presentation to American Public Power Association March 2007 Austin, Texas.
Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating.
Colorado Springs Utilities Environmental Services Functional Assessment Presentation for the American Public Power Association’s 2001 Engineering & Operations.
1 Module: What Is Enviance? An Introduction to the Company, the System & this Training.
Business Intelligence Group 10 Beny. Erlien. Febrian. Billy.
Kay Higby Responsible Care Superintendent ISO Management Representative Akzo Nobel Functional Chemicals, LLC.
Risk Management & Legal Issues in Cloud Practice Christopher Dodorico Director, PricewaterhouseCoopers Wednesday, October 10, 2012.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Corporate Responsibility and Compliance A Resource for Health Care Boards of Directors By Debbie Troklus, CHC and Michael C. Hemsley, Esq.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
The views expressed in this presentation do not necessarily reflect those of the Federal Reserve Bank of New York or the Federal Reserve System Association.
STATE OF NEW YORK BANKING DEPARTMENT ONE STATE STREET NEW YORK, NY Date: July 16, 2007.
The Connection between Risk Management and Internal Control in Organizations Mag. Norbert Wagner Budapest,
© Dr. John T. Whiting All Rights Reserved Slide 1 Achieving Compliance with GBLA & Other Laws and Regulations Impacting.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Macroprudential Surveillance and Insurance Supervision Commissioner Susan Donegan November 19, 2014 Regional Training Seminar for Insurance Supervisors.
Balance Between Audit/Compliance and Risk Management- Best Practices FIRMA 21 st National Training Conference Julia Fredricks, U.S. Chief Compliance Officer.
©2000 Bank for International Settlements 1 F I N A N C I A L S T A B I L I T Y I N S T I T U T E BANK FOR INTERNATIONAL SETTLEMENTS On-site Examination.
“Integrating Property Management with Emergency Recovery” Ivonne Bachar, CPPM CF Director, Property Management Office Stanford University
Internal Controls Christina Urias Managing Director – International Regulatory Affairs NAIC.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Equipment Life Optimization Program (ELOP) Doug Hilleman February 10, 2011.
UNDERSTANDING INFORMATION MANAGEMENT (IM) WITHIN THE FEDERAL GOVERNMENT.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
CPA Gilberto Rivera, VP Compliance and Operational Risk
Risk Management Software Solutions
Transforming IT Management
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
Kay Higby Responsible Care Superintendent ISO Management Representative Akzo Nobel Functional Chemicals, LLC.
Presentation transcript:

Risk Management Software Solutions Encierro Solutions

2 Challenge  Bank operations pose the greatest risk to bank failure and is the subject of increasing regulation  The challenge to a bank is to provide comprehensive, integrated, easy to use tools to department managers to capture their knowledge and enlist their support for improving the safety and soundness of operations  Goal is to move an organization’s approach from compliance to operations risk management

3 Maturity Model  Where is your organization on the maturity spectrum?  Where do you want your organization to be?  How can IT lead the way, involve others, without bearing all the responsibility and cost?

4 Maturity Categories  Level 1: Ad-hoc process, disjointed, no management of data, task force oriented, done before regulators arrive, annually, only done to comply, no special software  Level 2: Ad-hoc process, defined roles, disparate electronic documents, reviewed by management, annually, only done to comply  Level 3: Process is understood, roles are defined, documentation is distributed across the organization, need to improve efficiency is recognized, still only done to comply  Level 4: Process is understood and efficiency is a central focus, data management is critical, roles are honed, management regularly reviews analysis and reports (at least quarterly), operations risk responsibilities are understood by each department manager  Level 5: Organization uses an integrated approach to managing the many regulations, capturing data once, analyzing once, leveraging multiple times, in a distributed use, centrally managed system. The system is a useful tool to each department manager. Management views risk management reports weekly. New regulations do not pose major burden.

5 FFIEC IT Handbooks   How do you plan to comply with all these guidelines? How can you leverage them for operational efficiency and soundness? How do you deal with so many overlapping topics? – –AuditAudit – –ManagementManagement – –Business Continuity PlanningBusiness Continuity Planning – –OperationsOperations – –Development and AcquisitionDevelopment and Acquisition – –Outsourcing Technology ServicesOutsourcing Technology Services – –E-BankingE-Banking – –Retail Payment SystemsRetail Payment Systems – –FedLineFedLine – –Supervision of Technology Service ProvidersSupervision of Technology Service Providers – –Information SecurityInformation Security – –Wholesale Payment SystemsWholesale Payment Systems

6Matador Third Parties Information Systems Business Processes / Functions Key Entities Management Integrity Confidentiaiity Availability Threats Controls Risk … Key Topics Bus Cont Planning Info Sec Risk Mgmt FFIEC Guidelines Supervision of Tech Serv Provider Operations ………

7 Topic: Availability Summary Most Detail Information Security RM Business Continuity Planning E-banking, Wholesale Payment Technology Service Providers Think it through once, document it once, use it many times

8 Topic: Controls Information Security RM Business Continuity Planning Human and Process Tasks 60% 20% Analysis and documentation effort

9 Matador’s Information System Information Systems – power Business Functions ( Criticality, Sensitivity, Risk, Mitigation ) ( Info Sec RM, Bus Cont Plan, Internal Controls, … ) Software Hardware Service Providers Physical Records Facilities Threats, Vulnerabilities, Controls, Probability, Impact, Risk, Mitigation

10 Matador Product Architecture Information Security Risk Management Third Party Risk Management Business Continuity Risk Management Internal Controls Risk Management

11 Focus by module Business Process Business Sub-Process(es) Business Function Business Sub-Function(s) Business Tasks Business Continuity Information Security Internal Controls

12 Matador  Matador helps banks achieve Level 5 efficiencies by focusing on three key entities –Information Systems –Business Process / Business Functions / Business Tasks –Third Parties  In the process of evaluating these, topics such as Information Security, Management, Operations, Fedline, etc. are considered, minimizing the effort, maximizing the results, moving the organization from compliance to operations risk management

13 Backup

14 Matador’s Business Process Hierarchy Business Processes – inter-departmental activities ( Bus Cont Plan, Internal Controls ) Business Function – intra-departmental activities ( Bus Cont Plan, Internal Controls, Info Sec Risk Mgmt ) Business Task – intra-departmental activities ( Internal Controls )

15 Who are We?  Encierro is an Operations Risk Management software company for banks  Encierro offers software modules for –Information Security Risk Management –Third Party Risk Management –Business Continuity Planning –Internal Controls Risk Management

16 What We Do  Encierro Solutions provides software and services appropriate for banks of various sizes –For small banks  Pre-scripted policies, procedures, and risk analysis for common bank assets  Cost effective approach  Easy to use –For mid-sized banks  Scalable, comprehensive, flexible system  Enterprise wide  Easy to use  Highly efficient and cost-effective

17 Our Software – The Matador System  A formal risk management system that enables banks to: –Create risk assessment and risk mitigation plans utilizing pre-scripted policy and Information Security analysis of commonly found bank entities  Information Systems  Software/Hardware  Facilities/Physical Records  Service Providers –Implement a risk management program that is integrated into a bank’s operations –Meet the demanding requirements of the regulators, management, and customers –Demonstrate a MERIT worthy risk management system

18 MERIT FIL February 4, 2004 MAXIMUM EFFICIENCY, RISK-FOCUSED, INSTITUTION TARGETED (MERIT) EXAMINATIONS TO: CHIEF EXECUTIVE OFFICER TO: CHIEF EXECUTIVE OFFICER SUBJECT: Expanded Use of FDIC's Streamlined Examination Program Called "MERIT" - Maximum Efficiency, Risk-Focused, Institution Targeted Examinations The Federal Deposit Insurance Corporation (FDIC) has expanded the use of its streamlined examination program begun in April The "MERIT" program - for Maximum Efficiency, Risk- Focused, Institution Targeted Examinations - applied to banks that met basic eligibility criteria, which included having total assets of $250 million or less and satisfactory regulatory ratings. Under the expanded MERIT program, well-rated banks with total assets of $1 billion or less will now be eligible. The Federal Deposit Insurance Corporation (FDIC) has expanded the use of its streamlined examination program begun in April The "MERIT" program - for Maximum Efficiency, Risk- Focused, Institution Targeted Examinations - applied to banks that met basic eligibility criteria, which included having total assets of $250 million or less and satisfactory regulatory ratings. Under the expanded MERIT program, well-rated banks with total assets of $1 billion or less will now be eligible. MERIT Examination Procedures During a MERIT examination, the examiners will use procedures that focus on determining the adequacy of an insured depository institution's internal control systems, and that focus on reviewing the internal and external audit programs. Examiners will devote significant attention to an overall assessment of the institution's risk-management processes. They will review an institution's lower-risk activities primarily through discussions with management and by monitoring the activities through various off-site analytical programs.

19 Why a Formal Risk Management System?  Regulators are placing a greater emphasis on a formal, comprehensive operations risk management program –The ability to manage and the ability to demonstrate easily how to manage ongoing operational risk is more important than annual risk assessment results –Regulations require program to be comprehensive, continuous, integrated, collaborative, involved, timely, historical, testable, and repeatable  Proof of a formal system assures those who are ultimately responsible, the Board and Senior Management, that a safe and sound system is operational in the bank  Proof of a formal system reduces a bank’s legal and compliance liability if a threat is successful

20 Why the Matador System?  It provides pre-scripted analysis of typical bank Information Assets that can be easily customized by department managers –Easy to use –Saves time –Cost effective  It is the only tool on the market that enables banks to implement a formal risk management program that is integrated into a bank’s operations  It is the only tool that addresses all Information Security areas: –IT, facilities, records, information systems, and third party service providers  It is has been discussed with banking regulatory agencies

21 Matador Meets the Regulatory Requirements of a Formal System  The Matador system is: –Comprehensive – covers the full spectrum of information security issues –Continuous – respond to new threats quickly –Integrated – part of the decision making process –Collaborative – involves all departments –Involved – requires critical thinking –Timely – responds effectively to events –Historical – shows trends, enables drilling –Testable – works in real world situations –Repeatable – procedure that can be followed by all  Matador system provides assurance –Provides confidence and knowledge that the bank is implementing best practices to protect bank and customer data and information systems

22  A web-based, relational database driven software system  Leads the bank through the risk management process –Step 1. Information Security Risk Management Program definition –Step 2. Information Asset / Entity definition –Step 3. Personnel Assignments –Step 4. Risk Assessment –Step 5. Risk Mitigation Planning –Step 6. Reporting  Is available with additional modules for –Third Party Risk Management –Business Continuity Features of the Matador System

23 Customer Comments: Enterprise Bank & Trust “Encierro’s Matador system for Information Security Risk Management has enabled us to implement a well-thought out approach in a formal way with a flexible software system that can grow and change as our bank grows. Providing us an end-to-end solution, covering the information security concerns from the development of an Information Security program, to the risk management of software, hardware, physical records, service providers, facilities and information systems, the Matador system enables us to get the departmental managers across the company involved in managing risk, while enabling us to meet the regulatory compliance needs of the bank. Having a system that is a true management tool, above and beyond a way to be compliant, is important for the bank to operate in a safe and sound manner.” Steve Irish, CIO and Executive VP for Enterprise Bank. EBTC is a community bank headquartered in Lowell, MA with approximately $800M in assets.

24 Contact Us For more information view:  Our corporate website at: –  Matador information at: – –  Information Security related documents at: –  Or us at: