Managing Third Party Risk In a world fraught w/Risk Trust In the Cloud How are you Protecting Customer Data? February 26, 2014 Case Study Vincent Campitelli.

Slides:



Advertisements
Similar presentations
AASHTO Internal Audit Conference 2012 – Phoenix Daniel Fodera, CMQ/OE Program Management Improvement Team Federal Highway Administration.
Advertisements

Effective Contract Management Planning
Auditing Governance Functions
The CCM framework consists of 11 Control Areas that are important to be measured, especially when comparing between different cloud provider offering.
SEMINAR NAIC/ASSAL/SVS REGULATION & SUPERVISION OF MARKET CONDUCT © 2014 National Association of Insurance Commissioners Overview and Purpose of Market.
How to Audit an ERP System via the Risk Management Route Presented by: Gabriel Lung ISACA London Chapter Events 2003/2004 ABN-AMRO, 250 Bishopsgate, London.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
E B a n k i n g Information Security Guidelines ABA’s Technology Risk Management – A Strategic Approach Telephone/Webcast Briefing June 17, 2002.
NAIC Review of ERM & Internal Controls David Altmaier Florida Office of Insurance Regulation.
3rd Party Risk Categorization Process
Vendor Management Frequent regulatory findings:
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
State Examinations Have No Fear, Help is Here. Risk-Focused Financial Condition Exams NAIC mandated for state insurance departments beginning 1/1/2010.
Guidance for Managing Third-Party Risk Chicago Region Regulatory Conference Call December 8, 2010.
Information Systems Controls for System Reliability -Information Security-
Oyinkan Adedun Adeleye Caitlyn Carney Tyler Nguyen.
E XAMINATION AND E NFORCEMENT I SSUES : B EYOND T HE P ILLARS The AMLA Third Annual Full Day BSA/AML Conference October 4, 2013 Presented by: John M. Geiringer.
IT Service Delivery And Support Week Eight IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA CISA CISSP) 1.
IT Outsourcing Andy Darnell Jennifer Lawrence Jessica Pruitt.
Vendor Risk: Effective Management is Essential
Auditing Cloud Computing: Adapting to Changes in Data Management IIA and ISACA Joint Meeting March 12, 2013 Presented by: Jay Hoffman (AEP), John Didlott.
Session No. 3 ICAO Safety Management Standards ICAO SMS Framework
Compliance System Validation - An Audit Based Approach December 2012 Uday Gulvadi, CPA, CIA, CISA, CAMS Director - Internal Audit, Risk and Compliance.
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
1 Gaming, Privacy and Security eGaming Experience in British Columbia British Columbia Lottery Corporation October 5, 2013 Gurmit Aujla – Director, Internal.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM Laura Posey, Chair CAIQ.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
Implementing and Auditing Ethics Programs
Fundamental Auditing Concepts. Materiality Evidence Independence Audit risk IS and general audit responsibilities for fraud Assurance.
ISACA Conference Key Legal Considerations 15 September 2014
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Hit ‘Page Down’ to advance, ‘Page Up’ to go back & ‘Esc’ to exit A full tour of the Covalent CPM (Corporate Performance Management) software….. Specifically.
The views expressed in this presentation do not necessarily reflect those of the Federal Reserve Bank of New York or the Federal Reserve System Association.
Conducting Clinical Risk Assessments And Implementing Compliance Practices Jane L. Stratton Chiron Corporation VP/Associate General Counsel Chief Compliance.
Cloud Compliance Considerations March 24, 2015 | Jason Smith, CISSP.
©2000 Bank for International Settlements 1 F I N A N C I A L S T A B I L I T Y I N S T I T U T E BANK FOR INTERNATIONAL SETTLEMENTS On-site Examination.
Internal Controls Christina Urias Managing Director – International Regulatory Affairs NAIC.
Implementing an Effective Global Anti-Bribery Program Implementing an Effective Global Anti-Bribery Program Elaine Murphy, MBA Director Health Care Compliance.
NEACS: CRO Perspective William Feher Vice President, Internal Audit and Chief Risk Officer October 27, 2015.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
FFIEC Cyber Security Assessment Tool
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Project Management Processes for a Project
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Report Performance Monitor & Control Risk Administer Procurement MONITORING & CONTROLLING PROCESS.
D3.2 Procurement Best Practices Interim Report 20 January 2016 Toward the European Open Science Cloud 1 Damir Savanovic, CSA.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM.
Is Vendor Management The New Risk Management? Douglas DeGrote.
1 1 Effective Administration of Commercial Contracts Breakout Session # Session D06 Name: Holly Walker, CPCM Corporate Learning Solutions and Contract.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM.
Three Lines of Defense and Business Continuity February 18, 2016.
Business Continuity Planning 101
May 3, 2016 Presented by: Jamila Piracci, Vice President, OTC Derivatives Alessandra Riccardi, Director of Capital and Risk NFA Webinar: Margin Model Approval.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Vendor Management by Banks: How Law Firms Are Affected Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
What Is Vendor Management And Why Is It Important To You?
Data Minimization Framework
Auditing Cloud Services
Advanced Third-Party Risk Issues
Vendor Management & Business Value
Procurement Reviews Marty Desautels, Associate Controller
#IASACFO.
Axar consulting Strategic Sourcing.
Devise the apt response
Structure of the Internal Audit Service
IS Risk Management Framework Overview
Effective Risk Management in Decision Making Process
The state of digital supplier risk management: In partners we trust
Presentation transcript:

Managing Third Party Risk In a world fraught w/Risk Trust In the Cloud How are you Protecting Customer Data? February 26, 2014 Case Study Vincent Campitelli – McKesson Corporation

Vendor Management Life Cycle IT Vendors serving McKesson 2. Analyze Determine the level of risk posed by each third party relationship using a risk model. 3. Evaluate Implement due diligence activities commensurate with the risk rating. 4. Mitigate Design appropriate risk mitigation plans to manage the residual risk of the relationship. 5. Monitor Design ongoing monitoring programs to identify events/activities that alter risk profile. 2

How are they identified ? Spend Analysis Corporate Procurement IT Procurement Legal /contracting Compliance Officers Business Unit managers 3

Assess inherent Risk Service description Contract Review R. A. questionnaire Risk Rating 4

Conduct Due Diligence Contract    Security Exhibits    BAA    Validation procedures   On-going monitoring   LOW RISK High RISK Moderate RISK Inherent Risk Residual Risk 5

Apply Risk Mitigation Contracts  Company paper  Right to audit  SLA’s Conditional Acceptance Third party reports Annual requirement Scope adjustment Corrective Action plans Corrective action plans 6

Monitoring Geopolitical events Environmental events Business events Contract events SLA performance Mergers/acquisitions/Ownership Fines/penalties/violations Audit failures 7

“Going to the Cloud” Lack of visibility Lack of control Contractual limitations Right to audit SLA limitations Exit strategy Data retention/location/return/use Reliance on 3 rd party reporting New Requirements Monitoring Oversight 8

How are they identified ? Spend Analysis Corporate Procurement IT Procurement Legal /contracting Compliance Officers Business Unit managers CLOUD BASED 9

Assess inherent Risk Service description Contract Review R. A. questionnaire Risk Rating Tailored for CSP’s : CSA CAIQ CCM v3.0 Star Registry Response indices Yes No AI 10

Conduct Due Diligence Contract    Security Exhibits    BAA    Validation procedures   On-going monitoring   LOW RISK High RISK Moderate RISK Inherent Risk Residual Risk 11

Cloud Services – Responsibility/Accountability 12

Control Responsibilities by Service Model 13

CSA CCM controls – Key Controls 14

CSA based Control Requirements 15

Apply Risk Mitigation Contracts  Company paper  Right to audit  SLA’s  Security SLA’s Conditional Acceptance Third party reports – SOC 2 Annual requirement Scope adjustment Corrective Action plans Corrective action plans 16