1 Meycor Solution for Basel II Operational Risk Management.

Slides:



Advertisements
Similar presentations
INTERNAL CONTROL BASED ON THE COSO REPORT
Advertisements

COSO I COSO II. Meycor COSO, a Comprehensive Solution for Enterprise Risk Management (ERM)
The Benefits and Challenges of Implementation of Basel II in Europe José María Roldán | 27 Sept 2005.
Control and Accounting Information Systems
Off shoring From the perspective of a Financial Regulator Jean Moorhouse Financial Services Authority.
Monitoring Compliance with the Basel II Accord Charles H. Le Grand Reliability of Global Financial Infrastructures, Information, and Reporting Accountability.
1 The critical challenge facing banks and regulators under Basel II: improving risk management through implementation of Pillar 2 Simon Topping Hong Kong.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Presented by Muhamad Abrar Bahaman W. Fatimatul Akmar Md. Hassan
BASLE II : KEY ISSUES Basle II : key issues 2 1.What’s new with Basle II 2.Implementation plan whithin Société Générale group 3.Key issues.
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Security Controls – What Works
Operational risk management Margaret Guerquin, FSA, FCIA Canadian Institute of Actuaries 2006 General Meeting Chicago Confidential © 2006 Swiss Re All.
Unit 2 University of Sunderland CSEM04 ROSCO Unit 2: Systems Change (causes and cases) CSEM04: Risk and Opportunities of Systems Change in Organisations.
Office of Inspector General (OIG) Internal Audit
First Practice - Information Security Management System Implementation and ISO Certification.
Training.
B RITISH B ANKERS' A SSOCIATION Operational Risk & the Regulatory Environment Simon Hills Director - Prudential Capital team.
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
Leveraging XBRL for Basel II Daniel D’Amico, IBM Business Consulting Services, UK.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Basel III Zozulya Viktoria.
SEC835 Database and Web application security Information Security Architecture.
Analysis and Management of Risk: A Regulator’s Perspective Michael Ainley Head of Wholesale Banks Department UK Financial Services Authority.
Overview of Credit Risk Management practices in banksMarketing Report 1 st Half 2009 Overview of Credit Risk Management practices – The banking perspective.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
From Findings over KRIs to Process Control
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Systems and Software Consortium | 2214 Rock Hill Road, Herndon, VA Phone: (703) | FAX: (703) Best.
Best Practices: Financial Resource Management February 2011.
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
While preparing for Basel II implementation...
Put your company logo here Confidential Data Upgrade from 8.x to 9.0.
CIA Annual Meeting LOOKING BACK…focused on the future.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Future of Credit Risk Management: Supervisory Approach to Basel II CIA Annual Meeting Session 4405 Ben Gully Director, Basel Implementation Division Office.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Where Do We Go From Here: Risk Management after the Financial Meltdown Kevin McCabe Wells Fargo Audit Services EVP & Chief Auditor FIRMA 24 th National.
IFRS and Basel 2 Ian Michael Accounting and Auditing Policy Department
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
STANFORD UNIVERSITY RESEARCH COMPUTING Are we outliers? Institutional minimum security requirements RUTH MARINSHAW OCTOBER 14, 2015.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Operational Risk Policy. Risk Management Policy Planning of operational risk management. Identification of business lines. Mapping of business lines.
1  The objective of operational risk management is the same as for credit, market and liquidity risks that is to find out the extent of the financial.
Operational Risk Management & Compliance Officers
PSD2 and W3C Impact for account and payment processing.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
DARSHANA RAGHU MANAGEMENT. Risk Management Risk management is the identification, assessment, and prioritization of risks followed by coordinated and.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Management of Operational Risk. Regulatory Capital Perspective Credit Risk – Basel I (1987) Market Risk – (Amendment 1998) Credit Risk – Basel II (2005)
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 Vereniging van Compliance Officers The Compliance Function in Banks Amsterdam, 10 June 2004 Marc Pickeur CBFA CBFA.
Washington State Auditor’s Office Third Party Receipting Presented to Washington Public Ports Association June 2016 Peg Bodin, CISA.
Copyright The Asian Banker All rights reserved 1 The Asian Banker This paper “Fraud is the key issue in operational risk among Asian banks”
RISK MANAGEMENT SYSTEM
An Overview on Risk Management
Governance, Risk, and Compliance Bill Greene Senior Industry Director
LATIHAN MID SEMINAR AUDIT hiday.
Domino Group – Recovery Plan Assessment
IS4680 Security Auditing for Compliance
External Invoicing & FAST AR
Radar Watchkeeping: Have you monitored your Communication department’s radar to avoid collisions with the new Regulation? 43rd EDPS-DPO meeting, 31 May.
COSO I COSO II. Meycor COSO, a Comprehensive Solution for Enterprise Risk Management (ERM)
TRINITY UNIVERSITY HOSPITAL
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Operational Risk Management
Audit.
Presentation transcript:

1 Meycor Solution for Basel II Operational Risk Management

2  First Pillar: Minimum capital requirement (Meycor COSO AG, Meycor KP, Meycor Delphos)  Second Pillar: Regulation process  Third Pillar: Market discipline (Meycor COSO AG, Meycor KP) The Pillars of Basel II

3 MEYCOR Proposal - Stage 1: Document the reality of the organization Identify operational threats Classify them according to their likelihood and impact Manage improvement measures for the controls. Audit review of the controls

MEYCOR Proposal - Stage 2: Define proposals to improve the controls Design the Action Plans Manage Projects 4

5 MEYCOR Proposal - Stage 3 Meycor KP Events - Allows you to record loss events, defining a knowledge database. Meycor Delphos - Allows you to manage Key Risk Indicators (KPI) and to issue the corresponding alerts.

6 Threats and Assessments Examples

7 Risk Assessment by Area Identified RiskConsequence (1) Likelihood (2) Controls identified for each risk Control Self-assessment (3) Responsibility Area/Process: (Non-financial sector credits) Credit Request 1 - Objective1. Authorize credits according to the defined standards. Risks: a) The information submitted by the customers to request a credit is not authentic. b)… c)… d)… USD 100 to 200 Once a yearThe customer's information is verified by the Manager at the time of granting the credit. Acceptable

8 Risk Assessmentby Area Risk Assessment by Area Identified RiskConsequence (1) Likelihood (2) Controls identified for each risk Control Self-assessment (3) Responsibility Area/Process: (Systems Management) Systems Security 1 - Objective1. Ensure Availability, Integrity and Confidentiality Risks: a) External Security Breaches b)… c)… d)… USD 1.000Once a monthFirewall. Annual intrusion tests Needs improvement. Install an intruder- detection software.

9 Current Accounts Mortgages Banking Credit Cards General Map with Controls Risk Maps

10 Registration Transfers Collection Withdrawals Customer Service UAIR IT Legal Generate the documents necessary to report to Senior Management, Operational Risk Committee, and any areas involved. OS for Operational Risk Management Record Loss Events Meycor KP - Events Measure Assess SR KRI Meycor Delphos

11 Click here to see the Meycor Solution

12 Customized Solution Proposals We develop Risk Management methodologies, procedure manuals, role definitions and more. Contact us at Patria CP Montevideo - Uruguay Phone: (+598 2) / Fax: (+598 2)