Managing risk – it’s good for business!

Slides:



Advertisements
Similar presentations
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Advertisements

BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Safeguarding Update for Schools Summer Term 2015 Jo Barclay Safeguarding Adviser to Schools Standards & Excellence Service.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
The SRA and small firms Our Support for Small Firms Robert Loughlin – Executive Director Patrick Reeve – Regulatory Consultant.
Protecting client money Carol Westrop, Head of Legal Policy Amanda Norton, Regulatory Manager Sean Hankin, Investigation Team Manager.
ETHICAL ISSUES IN HEALTH AND NURSING PRACTICE CODE OF ETHICS, STANDARDS OF CONDUCT, PERFORMANCE AND ETHICS FOR NURSES AND MIDWIVES.
Conflicts of interest – proposal for change Peter Williamson Chairman – SRA Board.
Lawyer Checker Regulation & Compliance. Chris Harris – Practical Vision Update: Recent Risk and Compliance Changes.
Designated Safeguarding Officer Group 12 th July 2016.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
The basic aim of a security guard is to give 100% protection to clients’ property, to take care of clients with complete attention.
Protecting Your Assets By Preventing Identity Theft
Cybersecurity as a Business Differentiator
Legal Ombudsman Darren Cox Ombudsman
BAE systems Research results October 2016
Technology and Business Continuity
Responsible Procurement:
Risk Outlook James Dipple-Johnstone Paul Hastings Dr Debra Malpass
Richard Collins (SRA Executive Director)
To Know what Cyber crime is
E&O Risk Management: Meeting the Challenge of Change
Small firms: developing your business Robert Loughlin Rachel Lewis
Data protection headaches: GDPR, brexit AND perimeter risk
A Project on CYBER SECURITY
Data Protection Session
Data Protection Act.
Risk Management Policy & Procedures
AQA GCSE BUSINESS STUDIES
Current ‘Hot Topics’ in Information Security Governance Auditing
A new approach to regulating small firms
GDPR Awareness and Training Workshop
Developing your membership in a thriving community club
Year 10 ICT ECDL/ICDL IT Security.
Chapter 3: IRS and FTC Data Security Rules
CSI Survey 2007 Tiffany Gorman
AJS 572 Possible Is Everything/snaptutorial.com
AJS 572 Education for Service-- snaptutorial.com.
AJS 572 Teaching Effectively-- snaptutorial.com
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Reporting personal data breaches to the ICO
Scams and Schemes.
GOOD DAY AT WORK: CONNECTING WELL BEING & THE BUSINESS AGENDA Ann Francke, CEO of CMI Ttle.
Cyber Issues Facing Medical Practice Managers
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Why ISO 27001? Subtitle or presenter
Cybersecurity compliance for attorneys
Everything old is new again
Federal Reserve Retail Payments Risk Forum
Cybercrime: protecting your firm
Juliet Oliver, General Counsel
Professional Indemnity
Keeping your data, money & reputation safe
Why ISO 27001? MARIANNE ENGELBRECHT
Cybercrime and Canadian Businesses
Business Compromise and Cyber Threat
Third-party risk management (TPRM)
Neopay Practical Guides #2 PSD2 (Should I be worried?)
LO1 - Know about aspects of cyber security
The Secure Contingency Plan
Handling Information Securely
Tackling money laundering
Reporting serious incidents to the Charity Commission
Thames Valley Chamber / Claire Logic
Privacy and Security Basics Training
School of Medicine Orientation Information Security Training
Presentation transcript:

Managing risk – it’s good for business! Tim Livesley, Risk analysis and research manager

are two sides of the same coin RISK Risk to the SRA’s regulatory objectives and risks to law firms RISK are two sides of the same coin RISK

Up for discussion today An outline of some of the key risks in this year’s Risk Outlook How managing these risks in your firm can protect your clients and improve your competitive edge

Risk Outlook 2014: Key risks Misuse of money and assets Money laundering Bogus firms Lack of diverse and representative profession Poor standard of service to vulnerable consumers Information security and cybercrime Lack of independence Improper or abusive litigation Can go through these quickly, and then say, now we’re going to look at some of the risks in more detail, and outline the benefits to your business of successfully managing them New Outlook was published in July 2014, followed by an autumn update this month We consulted with many different practitioners at events in London, Birmingham and Manchester Attendees at these events are worried about many of the same risks that we are trying to manage More information this year about how risks apply to different types of firms, particularly smaller practices

Key risk: bogus firms Reports to the SRA are rising – 548 in 2013, we expect the 2014 total to be higher Why managing this risk is good for your business Protect your reputation Protect clients Prevent business losses – e.g. bogus firm is on other side of transaction SRA action Red alert hotline Scam alerts on website and Twitter feed ‘In the shadows’ paper Guidance Police referrals Impact on confidence in use of legal services The majority involve identity theft Bogus firm could steal your identity, or you could unwittingly work with one 4th bullet point – you need to be aware a bogus firm could have stolen the identity of your firm or you personally, but also that you could come across one in your work, such as operating on the other side of a conveyancing transaction. Self search = google yourself and your firm to check for any rogue websites etc. You can also provide advice to your clients, such as what official email addresses from your company look like, or that only you or x alternative colleagues will ever call them. Suspicious incidents – could be that someone mentions a case they believe you are involved in, but you have not heard anything about it. Can cause serious harm to consumers: Loss of money Identity theft Failure to achieve justice Simple solutions Check firm details Regularly self-search Check scam alerts Be alert to suspicious incidents The SRA's Red Alert Line is 0845 850 0999, or email redalert@sra.org.uk

Key risk: lack of a diverse and representative profession A more diverse workforce benefits clients and the public There are some positive trends, but still some way to go Could say something along the lines of – we’re starting with this one as it’s often a controversial inclusion. However, there is clear business and client benefit to looking at the diversity of your team and any barriers to access or progression. The chart shows the difference in pay between different groups of solicitors. The pay disparity is present at many different levels of practice, and the male/female pay gap is larger, at 30%, in the legal profession than in the general population (10%).

Key risk: lack of a diverse and representative profession Why managing this risk is good for your business Recruit the best talent Attract a more diverse client base Diverse points of view lead to better decisions SRA action Collect and monitor data Diversity benchmarking toolkit Looking at improving access through Training for Tomorrow Monitoring our own workforce diversity

Key risk: information security and cybercrime Average annual cost to a small businesses is £4000 Federation of Small Businesses Why managing this risk is good for your business Information security is a key selling point… …and for many a requirement Simple steps – big impact SRA action Cybercrime and cloud computing reports Alerts Internal data security measures Specific guidance – e.g. Windows XP expiry Keeping confidential information secure is a key professional duty Growing problem for all businesses But there are other ways confidential information gets out The average large business faces an attempted cyber attack every few days 63% of small businesses were attacked by an unauthorised outsider in 2013 ‘But there are other ways confidential information gets out’ - e.g. overhearing a confidential phone call, failure to properly dispose of confidential waste. A local authority solicitor was recently fined by the information commissioner’s office for losing confidential child protection papers. Annual cost stat – source is the Federation of small businesses Unauthorised attack stat – source is PWC

Discussion points Your views on the key risks? How can we improve our resources to help firms manage risks more successfully and cost effectively? Spring upda, always consulting internally and externally to monitor risk etc.