Risk Management. Risk Categories Strategic Credit Market Liquidity Operational Compliance/legal/regulatory Reputation.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Mobile Technology & Cyber Threats Promoting E-Commerce in Ghana Ruby Saakor Tetteh Ministry of Trade & Industry, Ghana Sixth Annual African Dialogue Consumer.
9 - 1 Computer-Based Information Systems Control.
The Islamic University of Gaza
Security Controls – What Works
Information Security Policies and Standards
Comptroller of the Currency Administrator of National Banks Electronic Banking: Industry Developments, Risks and OCC Regulatory Activities Prepared for.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
“Electronic Payment System”
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Comptroller of the Currency Administrator of National Banks Wireless Banking April 1, 2003 Clifford A. Wilke Director of Bank Technology Office of the.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Information Systems
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
HIPAA PRIVACY AND SECURITY AWARENESS.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Auditing Information Systems (AIS)
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Chapter Four Establishing New Banks, Branches, ATMs, Telephone Services, and Web.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 1: Information Security Fundamentals Security+ Guide to Network Security Fundamentals Second Edition.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Unit 6 – Chapter 5.  Describe the Sarbanes-Oxley Act of 2002 and its impact on internal controls and financial reporting.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Welcome to the ICT Department Unit 3_5 Security Policies.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
Operational Risk.
Mr. Roeshink – Financial Operations
Information Security based on International Standard ISO 27001
Chapter 4 E-commerce Security and Payment.
Depository Institution Essentials
Computer-Based Processing: Developing an Audit Assessment Approach
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Depository Institution Essentials
INFORMATION SYSTEMS SECURITY and CONTROL
Depository Institution Essentials
Sarbanes-Oxley, Internal Control, and Cash
Chapter 1: Information Security Fundamentals
Module 4 System and Application Security
Presentation transcript:

Risk Management

Risk Categories Strategic Credit Market Liquidity Operational Compliance/legal/regulatory Reputation

Operational Risk Inadequate Information Systems Breaches in internal controls Fraud Unforeseen catastrophes The risk of direct of indirect loss resulting from inadequate or failed internal processes, people and systems or from external events.

Inadequate Information Systems General Risks Physical access to the hardware Logical access to the IT systems Capacity management - prevents bottlenecks in all relevant systems component Emergency management Insufficient backup recovery measures-mitigate the consequences of system failures

Inadequate Information Systems Application-oriented risks 1.Data not correctly recorded due to system errors 2.Data not correctly stored during period of validity 3.Relevant data are not correctly included 4.Calculations which are basis for information are not correct 5.Due to systems failures the information processed by the application is not available in time.

Fraud Management Categories 1.Check Fraud 2.Debit card Fraud 3.Electronic Payment Fraud 4.ATM Deposit Fraud 5.Account Take-over/Identity Theft

From:

Fraud Management Systems JAM (Java Agents for Meta Learning)

Obstacles in detecting Fraud Financial or Human resource shortage High volumes of claims, transactions or other information to be analyzed Cookie-cutter detection methods that miss new or unusual instances Lack of in-house expertise or training

Risk Management in E- Banking

Technology Developments Advances in communications provide networked global access to information and delivery of products/services Internet has reached critical mass (60% of U.S. households) Some banks have 25 percent of customers banking online Increased competition from other industries and abroad Greater reliance on third party providers Advances in technology make the component functions of banking more easily divisible

Growth in Number of National Banks that Have Transactional Websites Source: Office of the Comptroller of the Currency. “Transactional web sites” are defined as bank web sites that allow customers to transact business. This may include accessing accounts, transferring funds, applying for a loan, establishing an account, or performing more advanced activities.

Technology-based Banking Products & Services Balance inquiry Transaction information Funds transfer Cash Management Bill payment Bill presentment Loan applications Stored Value-application: Stored-value cards are a substitute for cash, gift certificates and check payments. Monetary value is added to the stored-value account before the card is used, with the value either being funded by the cardholder directly, or by the card program operator in commercial applications

Technology-based Banking Products & Services Aggregation Electronic Finder Automated clearinghouse (ACH) Transactions Internet Payments Wireless Banking Certification Authority Data Storage-Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.

Key Technology Risks Vendor Risk Issues Security, Data Integrity, and Confidentiality Authentication, Identity Verification, and Authorization Strategic and Business Risks Business Continuity Planning Permissibility, Compliance, Legal Issues, and Computer Crimes Cross Border and International Banking

Security and Privacy Increases in security events and vulnerabilities According to 2001 FBI/CSI survey, 70% reported that the Internet is the point of cyber attacks, up from 59% in 2000 Gramm-Leach-Bliley Act of 1999 requires banks to establish administrative, technical & physical safeguards to protect the privacy of customers’ nonpublic customer records and information

Key Elements of Security Program Reviewing physical and logical security: Review intrusion detection and response capabilities to ensure that intrusions will be detected and controlled Seek necessary expertise and training, as needed, to protect physical locations and networks from unauthorized access Maintain knowledge of current threats facing the bank and the vulnerabilities to systems Assess firewalls and intrusion detection programs at both primary and back-up sites to make sure they are maintained at current industry best practice levels

Key Elements of Security Program Reviewing physical and logical security (cont’d): Verify the identity of new employees, contractors, or third parties accessing your systems or facilities. If warranted, perform background checks. Evaluate whether physical access to all facilities is adequate. Work with service provider(s) and other relevant customers to ensure effective logical and physical security controls.

Authentication Reliable customer authentication is imperative for E- banking Effective authentication can help banks reduce fraud, reputation risk, disclosure of customer information, and promote the legal enforceability of their electronic agreements Methods to authenticate customers: Passwords & PINS Digital certificates & PKI (Public Key Infrastructure) Physical devices such as tokens Biometric identifiers

OCC Technology Risks Supervision Program The Office of the Comptroller of the Currency charters, regulates, and supervises national banks to ensure a safe, sound, and competitive banking system that supports the citizens, communities, and economy of the United States. Guidance -- Focus on risk analysis, measurement, controls, and monitoring Risk-based examinations of banks and third party service providers (as authorized by the Bank Service Company Act of 1962) Training and Technology Integration Project External outreach and co-ordination Licensing process for Internet-primary banks and novel activities

References Gerrit Jan van den Brink (2002), Operational Risk: The challenge for banks.