Screening activities Mike E. Farrell James E. Bartlett and Ghislaine C.Y. Gillessen Munich, 21-22 January 2014.

Slides:



Advertisements
Similar presentations
Audit Considerations for your 11i implementation Richard Byrom Oracle Applications Consultant UKOUG November 2004.
Advertisements

EMS Checklist (ISO model)
Program Management Office (PMO) Design
Data Warehouse External Data Loads Initiation Certification April 22, 2009 Project Certification Committee April 22,
Data Warehouse External Data Loads Implementation Certification May 27, 2009 Project Certification Committee May 27,
Internal Control–Integrated Framework
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Course: e-Governance Project Lifecycle Day 1
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
IT Governance Infocom India Presentation December 6, 2006.
Dr. Julian Lo Consulting Director ITIL v3 Expert
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Security Controls – What Works
Audit considerations for your 11i implementation Richard Byrom Oracle Applications Consultant EOUG October 2003.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Business Transformation Health Check
Global Business Transformation Master (GBTM) Certification
ITIL: Why Your IT Organization Should Care Service Support
Session 3 – Information Security Policies
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Know More. Do More. Spend Less. January 24, 2006 Monica Loomis, Senior Sales Consultant Oracle Contract Management.
Control environment and control activities. Day II Session III and IV.
Session No. 3 ICAO Safety Management Standards ICAO SMS Framework
Compliance System Validation - An Audit Based Approach December 2012 Uday Gulvadi, CPA, CIA, CISA, CAMS Director - Internal Audit, Risk and Compliance.
SecureAware Building an Information Security Management System.
The Evergreen, Background, Methodology and IT Service Management Model
An Overview of Environmental Management Systems (EMS)
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Dan Parish Program Manager Microsoft Session Code: OFC 304.
COBIT - IT Governance.
What is Oracle Hyperion Planning  Centralized, web- based Budgeting and Planning application  Combines Operational and Financial measures to improve.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Roles and Responsibilities
Master Data Impact, Data Standards, and Management Process and Tools.
Module N° 8 – SSP implementation plan. SSP – A structured approach Module 2 Basic safety management concepts Module 2 Basic safety management concepts.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Environmental Management System Definitions
@2002 Copyright, Itreya Technologies CMMI kick off July 2005.
Engineering Essential Characteristics Security Engineering Process Overview.
GREG CAPPS [ ASUG INSTALLATION MEMBER MEMBER SINCE:1998 ISRAEL OLIVKOVICH [ SAP EMPLOYEE MEMBER SINCE: 2004 GRETCHEN LINDQUIST [ ASUG INSTALLATION MEMBER.
HARRIET Hazard, Assessment, Risk Review Identification and Evaluation Tool.
Safety Management System Implementation Michael Niels Thorsen Moscow 15 September 2005.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
Authorized economic operator Minimizing risks, optimizing flows.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Oracle’s EPM System and Strategy
Info-Tech Research Group1 Manage IT Budgets & Cost World Class Operations - Impact Workshop.
GRC: Aligning Policy, Risk and Compliance
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Conducting an Internal Compliance Audit Mike E. Farrell and Ghislaine C.Y. Gillessen Munich, January 2014.
AEO COMPLIANCE PROGRAM Authorized Economic Operator Requirements.
International Safety Rating System
Kick starting your due diligence programme
Introduction to the Federal Defense Acquisition Regulation
Hyper-V Cloud Proof of Concept Kickoff Meeting <Customer Name>
INTRODUCTION TO ISO 9001:2015 FOR IMPLEMENTATION Varinder Kumar CISA, ISO27001 LA, ISO 9001 LA, ITIL, CEH, MEPGP IT, Certificate course in PII & Privacy.
Establishing Strategic Process Roadmaps
Microsoft SAM Managed Service Program
I have many checklists: how do I get started with cyber security?
The Process Owner is the Secret Agent!
ITIL: Why Your IT Organization Should Care Service Support
ITIL: Why Your IT Organization Should Care Service Support
Safety Management System Implementation
Microsoft SAM Managed Service Program
ITIL: Why Your IT Organization Should Care Service Support
Presentation transcript:

Screening activities Mike E. Farrell James E. Bartlett and Ghislaine C.Y. Gillessen Munich, January 2014

Agenda The challenge of timely screening Needs analysis Technology is part of the solution From tools to behavior Export Controls Maturity levels Business Partner on boarding Jan 2014Full Circle Compliance2

Introduction Increased regulation and regulatory scrutiny Specific challenges include high volume and time-constraint Current screening solution meet needs? A new tool and related selection procedure? Jan 2014Full Circle Compliance3

The challenge of timely screening In the following slides some considerations are given with regard to the initial needs analysis phase Next some thoughts are given with regard to embedding the solution as part of the overall ICP Jan 2014Full Circle Compliance4 Needs analysis Selection criteria Long list Request for Information Response evaluation Short list

Needs analysis (1) Define specific requirements for the screening solution, including amongst other on the following aspects: Screening capabilities, such as on e.g. end-user, involved parties, related parties, final destination, end-use and product, including relative level of importance (H/M/L). Overview of lists to be scanned against (denied persons list, unverified list etc) including related importance rating, in line with global and local requirements. Also assess supplier’s related updating capabilities requirements. Level of accuracy (good practice >95%) and upper limit for false positive percentages (good practice<1%). Availability level (>99,9%), support structure (24x7), helpdesk capabilities, response time, performance and other service level requirements Jan 2014Full Circle Compliance5

Needs analysis (2) Real-time integration capabilities with relevant software Language capabilities (German, English and local) Architecture, platform flexibility and language support, such as unicode or c++ depending on ICT situation Normalization, intelligent adjustable matching algorithms Integrated workflow, notification and escalation model based on configurable threshold Ability to reflect organizational model Pricing and fee structure Implementation and operational burden calculated Jan 2014Full Circle Compliance6

Needs analysis (3) Single sign-on capability, security, roles and responsibilities Audit trail, documentation generation, data security and record retention Ability to deal with “good guys” list User friendliness Ease of deployment, including organizational load and tuning set-up time Functional and technical specifications, development methodology Track record and client endorsements SAS 70 certification or similar Jan 2014Full Circle Compliance7

Technology is part of the solution Needs have to be defined and aligned with overall ICP The needs analysis is the first step of the selection process Complex needs require a combination of technical and procedural solutions Technical solution to be assessed in conjunction with procedural impact Jan 2014Full Circle Compliance8 Analyse as-is process Target operating model Gap analysis Transformation plan and implement Training Roll-out and monitor RequirementsTechnology selectionDesignBuildTestSupport Procedural aspects Technological aspects

From tools to behavior Jan 2014Full Circle Compliance9 2. Risk Assessment and Gap Analysis Carry out detailed risk assessment to identify areas of highest risk and perform gap analysis 4. Design & Development of Framework Development of export controls compliance framework to address risks and gaps 6. Sustainable Compliance Framework Reporting and Monitoring Continuous improvement Embed values & behaviours 3. Detailed Review of Risk Detailed risk- based review of existing export controls framework Leadership commitment and “tone from the top” 5. Remediation and Implementation Design and build controls Implement and Test Values and Behaviours Driven Approach 1. Regulatory requirements Analysis Analyze regulatory requirements

From tools to behaviour Jan 2014Full Circle Compliance10 Confidential reporting arrangements Compliance organization PreventDetectRespond Policies & guidelines 1 Risk assessment & mitigating controls 2 Training & communications Business partner due diligence 3 5 Finance organization 7 Human Resources organization 8 Internal Audit organization Continuous improvement

ICP Jan 2014Full Circle Compliance11 The path to get ‘Best Value’ ECMS maturity levels “Best Value” NET COST Integrated internal controls with real time monitoring by management and continuous improvement. Phase 5 Optimized Standardized controls with periodic testing for effective design and operation with reporting to management. Phase 4 Monitored Phase 3 Standardized Control activities are designed, in place, adequately documented and communicated to employees. Control activities are designed and in place, but are not adequately documented. There are no formal training or communication of control activities. Unpredictable environment where control activities are not designed or in place. Phase 2 Informal Phase1 Initial / ad hoc

Business Partner on boarding Jan 2014Full Circle Compliance12 Business Partner Data ERP systemsVendor master Approvals & Contracting / Contract amendments Identify, Consolidate, and De-Duplicate Business Partners Risk Assessment Risk Analysis & Rating Business Partner Risk Classification Segmented into Low, Medium & High Risk CRM systems Perform Due Diligence Incident response and remediation Auditing Continuous Reassessment Reporting / Monitoring Control environment and tone at the top Governance, executive sponsorship, compliance enforcement Training, polices and change management Technology, tools and information management Standardize or systematize using third party databases, industry specific factors, questionnaires, etc. Screening is part of the overall business partner on boarding process

Prevent, Detect and Remediate Jan 2014Full Circle Compliance13 Not for further distribution without the permission of Full Circle Compliance Contact Details Michael E. Farrell Ghislaine C.Y. Gillessen James.E. Bartlett III