Client-Specific, Operational Risk Management, Solution- Building Workshops The following pages show a list of workshops that may be provided individually.

Slides:



Advertisements
Similar presentations
Module N° 7 – SSP training programme
Advertisements

Session No. 4 Implementing the State’s Safety Programme Implementing Service Providers SMS
Rob Kella - Chief Risk Officer
1 Auditing in the Public Interest Records Management in the Victorian Public Sector Audit objective Audit had two objectives : The first objective was.
Introduction to Enterprise Risk Management (ERM)
Security and Personnel
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
REPRESENTING EMPLOYER ORGANIZATIONS THROUGHOUT THE WORLD HOW THE EMPLOYERS ORGANISATIONS CAN INFLUENCE THE PRIORITIES AND OUTCOMES OF DWCPS Presentation.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Dr. Julian Lo Consulting Director ITIL v3 Expert
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Security Controls – What Works
Information Security Policies and Standards
Interoperability. Martin Sykes Information architecture programs suffer from EA's worst problem: They have a strategic and enterprisewide focus that.
IS Audit Function Knowledge
Enterprise Risk Management in DHHS
1 Risk management and Investigation Peter Roberts
Board responsibility for internal control and risk management by Kiattisak Jelatianranat Chairman, The Institute of Internal Auditors of Thailand Director,
Fasset Management Consultant Learnership Project Results of Gap Analysis 29 October 2002.
Preparing Scotland’s first Records Management Plan Ava Wieclawska Records Manager.
Gulf of Mexico Challenges with Contractor Verification - Skills and Knowledge.
Control environment and control activities. Day II Session III and IV.
Session No. 3 ICAO Safety Management Standards ICAO SMS Framework
Project Human Resource Management
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
1 Jon Whitfield Agency CEO Head of Government Internal Audit.
Certificate IV in Project Management Project Management Environment Course Number Qualification Code BSB41507.
Ship Recycling Facility Management System IMO Guideline A.962
OECD Guidelines on Insurer Governance
Corporate Support Richard Brown, Business Director.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Chapter 3 Internal Controls.
Implementing and Auditing Ethics Programs
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Certificate IV in Project Management Introduction to Project Management Course Number Qualification Code BSB41507.
Roles and Responsibilities
David Edgerton FCPA Director Quality + Expertise + Flexibility + Innovation = Confidence & Real Value Asset Managers Network Strategic Asset.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
SMS Planning.  Safety management addresses all of the operational activities of the entire organization.  The four (4) components of an SMS are: 1)
Adaptive Processes Consulting Pvt. Ltd. An ISO 9001:2000 Certified Company This document is the property of and proprietary to.
Copyright  2005 McGraw-Hill Australia Pty Ltd PPTs t/a Australian Human Resources Management by Jeremy Seward and Tim Dein Slides prepared by Michelle.
IT GOVERNANCE  Objective : The objective of this area is to ensure that the Certified Information Systems Auditor ( CISA ) candidate understands and can.
WEC MADRID 18 TH MARCH 2004 ASTRAZENECA’S APPROACH TO SUPPLIER RISK MANAGEMENT.
State Diamond Trader Strategic Plan 2012/13. Introduction The State Diamond Trader (SDT): Has been in operation for 5 years Has 92 registered clients.
Placing Information Security within an Organization
1 Integrated Risk Management: A Provincial Perspective Presentation by the Public Service Commission to the Portfolio Committee on Public Service and Administration.
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
Human Resources. Learning. Audits. Coaching Peppermint consultants Pty Ltd Level 4/150 Albert Road, South Melbourne, Victoria, Australia, 3205 Phone- 03.
SOLGM Wanaka Retreat Health and Safety at Work Act 2015 Ready? 4 February 2016 Samantha Turner Partner DDI: Mob:
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
Trusting your organisation UK Card Fraud Conference 2012 Keith Dewey, 28 March 2012.
TOGAF and Information Governance Richard Jeffrey-Cook TOGAF and Information Governance Richard Jeffrey-Cook DLM Forum - Dublin.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Primary Responsibilities of a Human Resource Manager 403, Atlanta Tower, Gulbai Tekra Road, Ambawadi Ahmedabad , Gujarat, India Phone numbers:
Draft - Enterprise Risk Management Risk Universe
Information Security Program
An Overview on Risk Management
IIASA Governance Review
Transforming IT Management
General Counsel and Chief Privacy Officer
Cyber Risk & Cyber Insurance - Overview
Medium-term estimates
Data Governance & Management Skills and Experience
WELCOME TO MELSAFE. INTERNAL AUDIT SERVICES OUR INTERNAL AUDIT SERVICES HELP FIRMS DEVELOP A CLEAR PICTURE OF THE INTERNAL AUDIT'S STRATEGIC ROLE WITHIN.
National Union Management Consultation Committee - Drug Manufacturing Inspection Transformation May 16, 2017 Regulatory Operations and Regions Branch.
Presentation transcript:

Client-Specific, Operational Risk Management, Solution- Building Workshops The following pages show a list of workshops that may be provided individually or as a twenty-five day curriculum that may be spread over one-year period The workshop delivery is client-specific. A client briefing will be held approximately one week prior to starting the workshop so that specific areas of interest and concern to the client enterprise may be addressed during the workshop The location is on the client-site or a client-selected external location. The course components may be used as a ‘shopping list’. A single workshop, a number, or the whole course may be selected The courses are charged at the facilitator’s daily fee rate. Participant numbers are at the discretion of the client but may range from one-person mentoring sessions, to twenty-person syndicated workshops. (Larger numbers will utilise two facilitators) The Board–level structured discussion, in its two-hour format (Please see over) will be delivered free of charge should a client elect to take the entire curriculum NT Hoppé Governance, Risk & Resilience Knowledge Transfer

1.21st Century Operational Risk Management (options) 2hrs/ Half-Day/1 Day Director and senior risk management-level structured discussion - Establishing the ORM scope, component parts, relationships, interfaces and framework - Developing an operational risk management (ORM) strategy and transformation programme 2. Organisation, Methods, Terms of Reference & Reporting 3 Days - Three lines of defence SWOT -ORM21, A methodology for applying and transforming ORM across an enterprise - ORM Assurance across the Extended Enterprise - How to; Assess, Measure, Monitor and Assure -The ORM Framework - Approach, Attitude Management & Risk Culture -Brand Protection, ‘normally’ and as part of incident management -Relationships with Legal, Compliance, Audit, Insurance and others 3. Risk Reviews & Assessment 2 Days -Risk Assessment Methods -Project Risk Assessment and Governance -Contribution of Key Risk Indicators, Key Performance Indicators and Key Control Indicators -ORM and Stress Testing 4. Reputation Risk Management (with the Reputation Consultancy Ltd) 2 Days + -Reputation risk assessment and risk registers -Assurance across the Extended Enterprise - ‘Normal’ management, and during change and incidents -Social media and Big Data analysis + Choice from four half-day workshops covering specific issues 5. Building a “Policy House” 2 Days -Scoping and developing Policy, Practices, Standards & Procedures -How to develop a visible, cohesive structure of mandated controls -Guidelines, promotion, implementation and sustainability 6. Extended Enterprise/Outsource Risk Management 2 Days - The Boundary of Control and the breadth and depth of the extended enterprise -Internal, External, Offshore and Chain Outsourcing -The extended ORM framework - ORM Assurance outside the boundary of control 7. Asset Risk Classification 1 Day -Classification and Assessment - The Classification Cube Model and its Implementation -The Classification Project Operational Risk Management Workshops (Primary Management Issues & Solutions) NT Hoppé Governance, Risk & Resilience Knowledge Transfer

Operational Risk Management Workshops (Key Risk Areas: How to Manage, Measure and Assure Them) 1. Assuring Resilience and Continuity 2 Days -Planning, Analysis and Comparison -Corporate resilience governance and assurance -Establishing an incident management and recovery capability -Scenario testing 2. Information Risk Management 2 Days -Information Risk as a strategic issue -Tope down, three-level sub-framework -Relationship with Information Technology Security and Information Security -Records Retention Risk Management -Privacy & Data Protection -Intellectual Property Protection 3. Process Risk Management 1 Day -Process Risk Assessment and Analysis -Converging pure process risk management with other KRAs -Process risk governance across the extended enterprise -Process Risk Management and quality assurance -Classification, measurement and reporting 4. Project Risk Management 1 Day - Blending with Six Sigma and Project Management Methodologies -Setting up the function for project approval, conduct and termination 5. Malfeasance Management 1 Day (Protection and investigation of deliberate acts against the organisation) - Developing and implementing a counter-malfeasance function - Investigations, Research, Operations & Oversight - Developing a proactive approach; Intelligence, Big Data and Supporting Structures 6. Human Resource (HR) Risk Management 1 Day (Protecting the organisation and its business from its people) -Recruitment risk management -Continuing HR risk assessment -Risk management in personnel termination and downsizing projects -Industrial relations monitoring - Risk training and communications 7. Personnel Protection & Physical Asset Protection 2 Days (Protecting the organisation’s people from the organisation) -Health & Safety when and wherever at work -Travel security, protection from and management of kidnap for ransom incidents -Property protection -Protective and detective systems 8. Organisation & Operations with Other Risk and Control Functions 1 Day The strength of relationship and formal network with: -Insured Risk, Legal Risk, Regulation & Compliance, Audit, Quality etc. 9. Operational Risk Measurement 1.5 Days -Key risk, performance and control indicators: What they are, how to use them, how to report them and how to forecast using them -Development and when to use ORM scorecards, heat-maps and footprints -Stress testing ORM, and within the firm-wide tests NT Hoppé Governance, Risk & Resilience Knowledge Transfer