Lessons Learned in Streamlining the Third-party Risk Assessment Process

Size: px
Start display at page:

Download "Lessons Learned in Streamlining the Third-party Risk Assessment Process"

Transcription

1 Lessons Learned in Streamlining the Third-party Risk Assessment Process

2 Agenda Welcome & Introductions Overview of the Third Party Risk Management Lifecycle Three Unique Perspectives on: Third Party Inventories Due Diligence & Ongoing Monitoring How the HITRUST Assurance Program Helps Third Parties (Service Provider Perspective Q&A & Wrap-up

3 Introductions Aaron Shapiro PwC Director Cybersecurity & Privacy Jeff Martin Senior Manager Information Security Anthem Debbie Hutchinson Availity Senior Manager Audit and Third Party Assurance

4 Overview of the Third Party Risk Management Lifecycle A robust Third Party Risk Management (TPRM) program is based on adoption of key building blocks, and successfully linking the program strategy, policies and processes together. TPRM is focused on understanding and managing risks associated with vendors and other third parties with which the company does business and/or shares data. The PwC Third Party Risk Management Program Framework Third parties Vendors Suppliers Joint Ventures Business Channels Marketing Partners Affiliates Subsidiaries Regulated Entities Pre-contract lifecycle activities TPRM Program Components Governance Framework Policy & Procedures Inventory Stratification Issues Management Risk Considerations Reputational Operational Credit/Financial Business Continuity and Resiliency Strategic/Country Subcontractor Technology Info Security & Privacy Compliance Post contract lifecycle activities PwC. Not for further distribution without the prior written permission of PwC. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details.

5 PwC THREE UNIQUE PERSPECTIVES

6 Residual risk maturity ranking Standard risk definition Controls do not exist/are not in place Controls are in place but are not documented appropriately or currently are not reviewed/ tested; controls are not consistently followed Controls are in place and are documented and reviewed; manual or partial automation Controls are in place, are documented appropriately, are reviewed on a periodic basis, have continuous control monitoring and fully automated if available Segment 1 Critical Segment 2 High Risk Inherent risk rating Segment 3 Moderate Risk Nature Timing Extent Nature Timing Extent Nature Timing Extent 1 Onsite Annual 2 Onsite Annual 3 Onsite 4 Onsite Testing Testing Testing Testing Onsite Onsite Onsite Onsite Annual Testing Testing Testing Testing Onsite Remote Remote Remote 18 Annual Testing Inquiry Inquiry Inquiry Segment 4 Low Risk Nature Timing Extent Remote Remote Self- Assess Self- Assess Month Inquiry Inquiry Inquiry Inquiry Three Unique Perspectives - PwC Third party inventory, stratification, due diligence & on-going assessment model The inventory, risk rating and on-going testing model enables a focus on efforts to establish the third party inventory and oversee services with higher levels of inherent risk. Refine Establish On-board Oversee Govern Existing Third Party Inventory Inherent risk assessment Pre-contract due diligence & residual risk Nature, timing and extent & On-going due diligence Refresh & Re-rank Residual risk rating New Third Parties Metrics & Reporting Third Party Scorecards Program Dashboards PwC. Not for further distribution without the prior written permission of PwC. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details.

7 Three Unique Perspectives - PwC Third party inventory This framework will assist the TPRM Program in focusing in on the inventory list by analyzing multiple sources in rapid manner and identifying the third parties that need to be included as part of the program, and rated by inherent risk. Total Third Party Inventory from mul6ple data sources Begin with A/P Spend and LOB files and remove categories that don t pose risk Iden6fy unique third par6es and validate services against exis6ng invoices/data sources. Remove categories that don t pose risk Perform cleansing and enhancement of third party data In-scope third party inventory for risk segmenta6on Inherent risk assessment Inherent Risk Ra6ng Star6ng with commodity categories, we use a process to focus on those products/services that do and do not pose inherent risk and thus to be included as part of the program. We then clean and enhance the exis6ng third party data to be put into the inventory repository. Common Third Party Inventory Data A4ributes Third Party Name Third Party Parent Name/Associated Third Par6es Product/Service Third Party Type (Business Process Outsourcing, Partnership, Technology etc.) Spend Business Lines/Processes Supported by the Third Party Country/Region where Third Party is Based Contract Date (Engagement Date) Results of Third Party Risk Classifica6on Results of s (e.g., Third Party Informa6on Security Assessments) PwC. Not for further distribution without the prior written permission of PwC. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details.

8 Three Unique Perspectives - PwC Due Diligence, Ongoing Monitoring & HITRUST Assurance Results of the inherent risk should drive the nature, timing and extent of activities used to monitor, oversee, and re-assess third party relationships. Due to the higher costs associated with more in-depth assessment activities, a risk based approach should be leveraged so that higher risk relationships receive more active risk management than lower risk relationships. Depth of Due Diligence Activities 0% None Very Low 40-50% Request and review third party report (e.g., HITRUST certification, SOC 1/2/3, ISO certification, etc.) Low 20-30% Inherent Risk Rating Require the completion and evaluation of a due diligence questionnaire Request and review third party report (e.g., HITRUST certification, SOC 1/2/3, ISO certification, etc.) Moderate 10-15% Perform on-site assessments (1-5 days) Require the completion and evaluation of a due diligence questionnaire Request and review third party report (e.g., HITRUST certification, SOC 1/2/3, ISO certification, etc.) High 3-5% PwC. Not for further distribution without the prior written permission of PwC. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details.

9 Anthem THREE UNIQUE PERSPECTIVES

10 Third Party Inventories - Anthem Follow the data; not the spend. Requires strong internal partnerships. Risk tiering can be more difficult in a highly regulated space. In-scope inventories can tend to balloon.

11 Due Diligence and Ongoing Monitoring- Anthem Inefficient pre-contract due diligence processes can impede timely procurement processes. Again, strong internal partnerships are necessary. Especially for larger organizations. Change is constant. Assessments are a point-in-time measurement. Additional pressures for enhancing ongoing monitoring. New regulations, new technologies, global marketplace, maturing client base.

12 How HITRUST Assurance Program Helps - Anthem Risk assurance activity can create exponential volumes of work. Leveraging the HITRUST Assurance Program helps to ensure a consistent and efficient approach. Anthem Information Security is requiring vendor Business Associates to achieve HITRUST certification on the environment that supports Anthem. Anthem Business Associates can leverage their HITRUST certification across the HITRUST Alliance partners.

13 Availity THREE UNIQUE PERSPECTIVES

14 Third Party Inventories - Availity Conduct a complete inventory of all third parties activities ranked by risk factors. Include all types of third party relationships that can include business associates, trading partners, service partners, subcontractors etc. Evaluate the relationships to have a comprehensive understanding of who are your third parties, what services/ functions they provide and what level of access they have to your organization s data/systems.

15 Due Diligence and Ongoing Monitoring- Availity Conduct due diligence assessments to identify any potential gaps that could create risks or compliance issues prior to contract. Third parties who have completed a HITRUST validated assessment may submit certification letter as part of their due diligence. Continue to monitor relationships to proactively account for any changes that can occur throughout the relationship cycle. Organizations need to move beyond the initial due diligence and annual reviews to proactively address the bigger challenge of monitoring and assessing third-party risks on an ongoing basis.

16 How HITRUST Assurance Program Helps Availity HITRUST assessment can help to evaluate your third party assurance program. Accepting the HITRUST certification can help due diligence by reducing time and efforts. Leveraging the CSF enables a single assessment to be accepted by many organizations across the industry. Focusing on third party risk management and consistent requirements of our third parties can help drive industry efficiencies.

17 Third Parties (Service Provider) Perspective Ability to effectively respond varies drastically Customer assessments come in all shapes and sizes and it can be very frustrating and difficult for third parties to respond timely Alignment to a recognized security/privacy framework (e.g., HITRUST CSF) helps organizations respond quickly, with less effort, and with positive results HITRUST certification and SOC 2s can relieve much of the headache associated with responding to customer requests

18 Q&A

Navigating the New Health Economy

Navigating the New Health Economy Navigating the New Health Economy How non-traditional healthcare players are using the HITRUST CSF to drive their security programs forward Speakers Dennis Quandt Risk Assurance Director, PwC Boston, MA

More information

Case Study Webinar: Vendor Risk Management at Global Lending Services

Case Study Webinar: Vendor Risk Management at Global Lending Services Case Study Webinar: Vendor Risk Management at Global Lending Services Al Palmer, SVP Compliance, Global Lending Services LLC (GLS) Melissa Brown, Compliance Manager, Global Lending Services LLC (GLS) John

More information

VENDOR RISK MANAGEMENT FCC SERVICES

VENDOR RISK MANAGEMENT FCC SERVICES VENDOR RISK MANAGEMENT FCC SERVICES Introductions Chris Tait, CISA, CFSA, CCSK, CCSFP Principal, Financial Services Baker Tilly Russ Sommers, CPA, CISA Senior Manager, Financial Services Baker Tilly Agenda

More information

Third Party Risk Management ( TPRM ) Transformation

Third Party Risk Management ( TPRM ) Transformation Third Party Risk Management ( TPRM ) Transformation September 20, 2017 Internal use only An introduction to TPRM What is a Third Party relationship? A Third Party relationship is any business arrangement

More information

Outsourcing transparency evolution

Outsourcing transparency evolution Outsourcing transparency evolution How information transparency creates value across the extended enterprise Outsourcing transparency evolution Transparent communication is evolving for outsource service

More information

Optimizing an Enterprise Wide Effective Vendor Risk Management Program. Pam Schott Head and VP Enterprise Supplier Governance

Optimizing an Enterprise Wide Effective Vendor Risk Management Program. Pam Schott Head and VP Enterprise Supplier Governance Optimizing an Enterprise Wide Effective Vendor Risk Program Pam Schott Head and VP Enterprise Supplier Governance June 1, 2015 Emerging Industry Trends As Procurement organizations mature; their focus

More information

Extended Enterprise Risk Management

Extended Enterprise Risk Management Extended Enterprise Risk Management Driving performance through the extended enterprise October 2015 A network within a network The Extended Enterprise is the concept that an organization does not operate

More information

Vendor Risk Management Scoring PROCESSUNITY WEBINAR

Vendor Risk Management Scoring PROCESSUNITY WEBINAR Vendor Risk Management Scoring PROCESSUNITY WEBINAR Today s Presenters Gary Phipps Director of Risk Solutions Ed Thomas Vice President of Marketing 2 ProcessUnity, Inc. All Rights Reserved. About ProcessUnity

More information

HITRUST CSF Assurance Program. The Common Healthcare Industry Approach for Assessing Security and Reporting Compliance

HITRUST CSF Assurance Program. The Common Healthcare Industry Approach for Assessing Security and Reporting Compliance The Common Healthcare Industry Approach for Assessing Security and Reporting Compliance February 2017 Contents Background and Challenges.... 3 Improving Risk Management While Reducing Cost and Complexity...

More information

How do we statisfy the information privacy and security assurance requests from our customers?

How do we statisfy the information privacy and security assurance requests from our customers? How can I leverage a single privacy and security assessment with all my customers? how are other organizations addressing third-party risk management? How do we statisfy the information privacy and security

More information

Hot Topics in Third Party Management. April 5, 2018 MEMBER OF ALLINIAL GLOBAL, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS

Hot Topics in Third Party Management. April 5, 2018 MEMBER OF ALLINIAL GLOBAL, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS Hot Topics in Third Party Management April 5, 2018 MEMBER OF ALLINIAL GLOBAL, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2018 Wolf & Company, P.C. Before we get started Today s presentation slides can

More information

HITRUST CSF Assurance Program

HITRUST CSF Assurance Program HITRUST CSF Assurance Program Common healthcare industry approach for assessing security and reporting compliance Background and challenges Compliance requirements for healthcare organizations and their

More information

Effective Vendor Risk Management. April 21, Mario A. Mosse. This Training is Brought to you by ComplianceOnline. Presenter:

Effective Vendor Risk Management. April 21, Mario A. Mosse. This Training is Brought to you by ComplianceOnline. Presenter: This Training is Brought to you by ComplianceOnline. Effective Vendor Risk Management Presenter: Mario A. Mosse April 21, 2017 This training session is sponsored by 2014 ComplianceOnline www.complianceonlie.com

More information

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER ARRIVAL OF GDPR IN 2018 The European Union (EU) General Data Protection Regulation (GDPR), which takes effect in 2018, will bring changes

More information

Identify and Manage Third Party Vendor Risks:

Identify and Manage Third Party Vendor Risks: Identify and Manage Third Party Vendor Risks: Using Automation to Increase Visibility Westfield Group Brian Roche Chief Procurement Officer Opus Samuel Mele Vice President Sales sig.org/summit Identify

More information

Vendor Management Risk Mitigation:

Vendor Management Risk Mitigation: Vendor Management Risk Mitigation: The Importance of Having a Formalized Methodology Sun Life Financial Laura Williams AVP, Procurement Opus Sam Mele Vice President Sales sig.org/summit Case Study: Supplier

More information

HOW TO LAUNCH A SUCCESSFUL WORKFORCE PLANNING CENTER OF EXPERTISE (COE)

HOW TO LAUNCH A SUCCESSFUL WORKFORCE PLANNING CENTER OF EXPERTISE (COE) HOW TO LAUNCH A SUCCESSFUL WORKFORCE PLANNING CENTER OF EXPERTISE (COE) April 17, 2012 Karen Piercy, Mercer Matthew Stevenson, Mercer 0 Today s presenters Karen Piercy Philadelphia +1 215 982 4276 karen.piercy@mercer.com

More information

Hot Topics in the Board Room

Hot Topics in the Board Room www.pwc.com Hot Topics in the Board Room Agenda State of the Internal Audit Profession Vendor Risk Management Privacy & Security April 2014 2 At a glance s 10 th Annual State of the Internal Audit Profession

More information

Applying a quality systems approach to improve supply chain management

Applying a quality systems approach to improve supply chain management Applying a quality systems approach to improve supply chain management Supplier selection and qualification Manufacturers need to have an established, regimented system for identifying critical success

More information

The past, present and future of service organization control reporting

The past, present and future of service organization control reporting The past, present and future of service organization control reporting Key takeaways from EY s Annual SOCR Client Conference March 2016 Study the past if you would define the future. Confucius b 1 Conference

More information

The Next Generation of Local Government: Transforming Non-Emergency and 311 Call Center Solutions to a Complete Constituent Experience

The Next Generation of Local Government: Transforming Non-Emergency and 311 Call Center Solutions to a Complete Constituent Experience The Next Generation of Local Government: Transforming Non-Emergency and 311 Call Center Solutions to a Complete Constituent Experience An Oracle White Paper February 2013 The Next Generation of Local Government

More information

The Future of Internal Auditing:

The Future of Internal Auditing: Internal Audit The Future of Internal Auditing: Changing Internal Audit s Value Proposition October 12, 2010 Istanbul, Turkey Presented by: Naman Parekh Partner, Agenda Background of the 2012 Study Key

More information

SOLUTION BRIEF RSA ARCHER AUDIT MANAGEMENT

SOLUTION BRIEF RSA ARCHER AUDIT MANAGEMENT RSA ARCHER AUDIT MANAGEMENT INTRODUCTION Internal audit departments are struggling to deliver strategic leadership, coordinated assurance and other services their stakeholders need, but this task isn t

More information

Leveraging IT risk management to boost competitive advantage

Leveraging IT risk management to boost competitive advantage Pharmaceuticals and Life Sciences Leveraging IT risk management to boost competitive advantage Achieving integrated information technology, governance, risk, and compliance Table of contents The heart

More information

STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS. April 25, 2018 In-House Counsel Conference

STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS. April 25, 2018 In-House Counsel Conference STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS April 25, 2018 In-House Counsel Conference Presenters: Daniela Ivancikova, Assistant General Counsel, University of Delaware Evan

More information

Excellence in Third Party Risk Management (TPRM)

Excellence in Third Party Risk Management (TPRM) Excellence in Third Party Risk Management (TPRM) www.pwc.ch FINMA Circular 2017/xx Outsourcing consultation paper - go live July 2017 Key changes Outsourcing of critical services to banks in the same financial

More information

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER ARRIVAL OF GDPR IN 2018 The European Union (EU) General Data Protection Regulation (GDPR) that takes effect in 2018 will bring changes for

More information

Is your supplier risk management keeping pace with your strategic

Is your supplier risk management keeping pace with your strategic Is your supplier risk management keeping pace with your strategic imperatives? What is the role of Internal Audit? Agenda 1. Introduction 2. What is supplier risk management? 3. What's the problem? 4.

More information

Risk Advisory Services Developing your organisation s governance for competitive advantage

Risk Advisory Services Developing your organisation s governance for competitive advantage Advisory Services Developing your organisation s governance for competitive advantage The Deloitte Advisory Platform of Services can help you to govern your strategic plan to guide your operations measure

More information

Trust Your Suppliers, Manage Your Risk The Importance of Third-Party Supplier Visibility About Perfect Commerce

Trust Your Suppliers, Manage Your Risk The Importance of Third-Party Supplier Visibility About Perfect Commerce Trust Your Suppliers, Manage Your Risk The Importance of Third-Party Supplier Visibility About Perfect Commerce Since 1994, Perfect Commerce has been automating spend management initiatives offering world-class

More information

Catching Fraud During a Recession Through Superior Internal Controls. FICPA s 25 th Annual Accounting Show. J. Stephen Nouss September 29, 2010

Catching Fraud During a Recession Through Superior Internal Controls. FICPA s 25 th Annual Accounting Show. J. Stephen Nouss September 29, 2010 Catching Fraud During a Recession Through Superior Internal Controls FICPA s 25 th Annual Accounting Show J. Stephen Nouss September 29, 2010 1 Session Objectives Fraud Facts (2008 Association of Certified

More information

CSR / Sustainability Governance and Management Assessment By Coro Strandberg President, Strandberg Consulting

CSR / Sustainability Governance and Management Assessment By Coro Strandberg President, Strandberg Consulting Introduction CSR / Sustainability Governance and Management Assessment By Coro Strandberg President, Strandberg Consulting www.corostrandberg.com November 2015 Companies which adopt CSR or sustainability

More information

RSA ARCHER MATURITY MODEL: AUDIT MANAGEMENT

RSA ARCHER MATURITY MODEL: AUDIT MANAGEMENT RSA ARCHER MATURITY MODEL: AUDIT MANAGEMENT OVERVIEW Internal Audit (IA) plays a critical role in mitigating the risks an organization faces. Audit must do so in a world of increasing risks and compliance

More information

International Finance Corporation

International Finance Corporation International Finance Corporation Corporate Governance and Internal Audit Overview Bob Lamm Independent Senior Advisor Center for Corporate Governance Deloitte LLP Neil White Global IA Analytics Leader

More information

Business Framework Change How You Manage Safety

Business Framework Change How You Manage Safety Business Framework Change How You Manage Safety December 1, 2017 Joseph Muratore Mark Drozdov Today s Speakers Joseph Muratore Commercial Director BSI USA & Canada Mark Drozdov BSI CES SVP & Technical

More information

Building a Framework for Effective Third-Party Risk Management (TPRM)

Building a Framework for Effective Third-Party Risk Management (TPRM) Building a Framework for Effective Third-Party Risk Management (TPRM) GARP Webcast Series On24 Tech Tips Brenda Boultwood Christopher Thackray APRIL 2016 Make sure your speakers are on Hit F5 any time

More information

WHY SUPPLIER MANAGEMENT?

WHY SUPPLIER MANAGEMENT? WHY SUPPLIER MANAGEMENT? A long-lasting partnership with suppliers is important for future business development. Goods and services procurement already accounts for more than 70 percent of Company s total

More information

Inventory performance today: Why is it declining?

Inventory performance today: Why is it declining? www.pwc.com Inventory performance today: Why is it declining? November 2015 Inventory performance today: Why is it declining? Inventory is often considered by manufacturers to be the most valuable category

More information

REGULATORY HOT TOPIC Third Party IT Vendor Management

REGULATORY HOT TOPIC Third Party IT Vendor Management REGULATORY HOT TOPIC Third Party IT Vendor Management 1 Todays Outsourced Technology Services Core Processing Internet Banking Mobile Banking Managed Security Services Managed Data Center Services And

More information

Vendor Management Challenges and Expectations An Open Discussion April 13, 2017

Vendor Management Challenges and Expectations An Open Discussion April 13, 2017 1 Practical solutions driving tangible results Vendor Management Challenges and Expectations An Open Discussion April 13, 2017 Agenda Common Themes Discussion Expectations Overcoming Obstacles Common Comments

More information

June PwC s Data and Analytics Survey 2016 Big Decisions

June PwC s Data and Analytics Survey 2016 Big Decisions June 2016 PwC s Data and Analytics Survey 2016 Big Decisions Are executives using Data & Analytics to make big decisions? In May 2014, we surveyed 1,135 senior executives on the ways they were making big

More information

Extended Enterprise Risk Management

Extended Enterprise Risk Management Extended Enterprise Risk Management Overview of Risks and Methodologies/Tools to Address FEI Presentation June 7, 2016 Our POV on Extended Enterprise Risk Management Operational Risk Framework Organizations

More information

Integrated Health and Wellness Advantage. The Anthem Blue Cross health and wellness approach

Integrated Health and Wellness Advantage. The Anthem Blue Cross health and wellness approach Integrated Health and Wellness Advantage The Anthem Blue Cross health and wellness approach It takes an organizational commitment to health and healthy behaviors to reach true wellness success. Together,

More information

AVEPOINT RISK INTELLIGENCE SYSTEM

AVEPOINT RISK INTELLIGENCE SYSTEM Technical Overview AVEPOINT RISK INTELLIGENCE SYSTEM Keeping your data privacy protection practices on the right track. INVENTORY MANAGER Inventory Records To understand how the data is collected, maintained,

More information

Vendor Due Diligence: Keep The Risk Out!

Vendor Due Diligence: Keep The Risk Out! Vendor Due Diligence: Keep The Risk Out! August 25, 2015 2015 ProcessUnity, Inc. All Rights Reserved. ProcessUnity Risk Suite Comprehensive, Flexible, Scalable RISK SUITE Enterprise Risk Regulatory Compliance

More information

The compliance investment

The compliance investment The compliance investment Realising the value of compliance through greater effectiveness, efficiency, and sustainability kpmg.com.au 2017 KPMG, an Australian partnership and a member firm of the KPMG

More information

White Paper Describing the BI journey

White Paper Describing the BI journey Describing the BI journey The DXC Technology Business Intelligence (BI) Maturity Model Table of contents A winning formula for BI success Stage 1: Running the business Stage 2: Measuring and monitoring

More information

ENTERPRISE RISK MANAGEMENT USING DATA ANALYTICS. Dan Julevich and Chris Dawes April 17, 2015

ENTERPRISE RISK MANAGEMENT USING DATA ANALYTICS. Dan Julevich and Chris Dawes April 17, 2015 ENTERPRISE RISK MANAGEMENT USING DATA ANALYTICS Dan Julevich and Chris Dawes April 17, 2015 Agenda ERM What, Why, How? ERM Keys to Success Fail, Survive, or Thrive? ERM Current State Overview ERM Leading

More information

IT GOVERNANCE. WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR PwC. April 4, 2013

IT GOVERNANCE. WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR PwC. April 4, 2013 IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR PwC April 4, 2013 Agenda The challenge IT Governance defined IT Governance components Next steps Questions THE CHALLENGE The

More information

Procurement Transformation on the Fast Track: Doing More with Less

Procurement Transformation on the Fast Track: Doing More with Less Procurement Transformation on the Fast Track: Doing More with Less February, 2010 ProcureAbility Presenters John Evans President and CEO ProcureAbility jevans@procureability.com 2 AN APPROACH UNHEARD OF

More information

The SAM Optimization Model. Control. Optimize. Grow SAM SOFTWARE ASSET MANAGEMENT

The SAM Optimization Model. Control. Optimize. Grow SAM SOFTWARE ASSET MANAGEMENT The Optimization Model Control. Optimize. Grow The Optimization Model In an ever-changing global marketplace, your company is looking for every opportunity to gain a competitive advantage and simultaneously

More information

Article from: CompAct. April 2013 Issue No. 47

Article from: CompAct. April 2013 Issue No. 47 Article from: CompAct April 2013 Issue No. 47 Overview of Programmatic Framework and Key Considerations Key elements Description Items to consider Definition and identification of EUCs The statement that

More information

ISACA Charlotte Chapter

ISACA Charlotte Chapter www.pwc.com ISACA Charlotte Chapter Robotic Process Automation (RPA) March 13, 2018 Speaking with you today Sachin Mandal PwC Partner Enterprise System Solutions Practice sachin.k.mandal@pwc.com (973)580-9950

More information

Managing complex services in SAP and Ariba from a client perspective. Ariba Live 2018

Managing complex services in SAP and Ariba from a client perspective. Ariba Live 2018 Managing complex services in SAP and Ariba from a client perspective Ariba Live 2018 Agenda Overview and main message Plan to play design overview Supplier qualification Contract management Managing procurement

More information

Strengthening Vendor Risk Management Program

Strengthening Vendor Risk Management Program Strengthening Vendor Risk Management Program ACUIA Region 5 Fall Meeting Portsmouth, N.H. October 2017 PKF O Connor Davies Risk Advisory Services Governance & Regulations Cyber-Security Risk Management

More information

Strengthening Your Enterprise Risk Management Process

Strengthening Your Enterprise Risk Management Process Strengthening Your Enterprise Risk Management Process Belinda Mumma, Senior Consultant, Enterprise Risk Management Services bmumma@sollievo.com (866) 605-5664 x3400 Discussion Topics Definition of Enterprise

More information

THE VALUE OF STRATEGIC SOURCING FOR PROCUREMENT PROFESSIONALS

THE VALUE OF STRATEGIC SOURCING FOR PROCUREMENT PROFESSIONALS THE VALUE OF STRATEGIC SOURCING FOR PROCUREMENT PROFESSIONALS UNDERSTANDING STRATEGIC SOURCING Maximizing value while minimizing cost is a business imperative across every discipline within organizations.

More information

Outsourcing and the Need for Supplier Audits

Outsourcing and the Need for Supplier Audits Outsourcing and the Need for Supplier Audits John A. Gatto Retired April 3, 2017 Agenda Why Audit Suppliers Outsourcing Supplier Risks Minimum Security Standards Audit Focus 2 1 Definitions Third Party

More information

The future of procurement in the age of digital supply networks The DBriefs Driving Enterprise Value series

The future of procurement in the age of digital supply networks The DBriefs Driving Enterprise Value series The future of procurement in the age of digital supply networks The DBriefs Driving Enterprise Value series Joe Chmielewski, Senior Manager, Deloitte Consulting LLP Vinod Venugopal, Principal, Deloitte

More information

Make money, save money and manage risk

Make money, save money and manage risk Make money, save money and manage risk The benefits of well-designed environment, health, safety and sustainability programs EHS and sustainability The opportunities and risks associated with environment,

More information

Points to Consider When Developing a TMF (Trial Master File) Strategy

Points to Consider When Developing a TMF (Trial Master File) Strategy PHLEXGLOBAL WHITE PAPER Points to Consider When Developing a TMF (Trial Master File) Strategy Presented By: Karen Redding Global Business Development Director Phlexglobal Ltd. kredding@phlexglobal.com

More information

HOW HR NEED S TO. By Karen Shellenback, Karen Piercy and Denise LaForte, Mercer Select Intelligence Mercer HR Transformation

HOW HR NEED S TO. By Karen Shellenback, Karen Piercy and Denise LaForte, Mercer Select Intelligence Mercer HR Transformation HOW HR NEED S TO CHANGE By Karen Shellenback, Karen Piercy and Denise LaForte, Mercer Select Intelligence Mercer HR Transformation YOUR BRIEFING IN 3 2 1 3 HIGHLIGHTS High performing HR organisations leverage

More information

Developing a Successful Product

Developing a Successful Product Developing a Successful Product What is the appropriate level of governance? Kelly Cusick, Deloitte Consulting LLP March 30, 2014 Antitrust Notice The Casualty Actuarial Society is committed to adhering

More information

Corporate Brochure. Elevate Your Flexible Workforce Management and Services Procurement

Corporate Brochure. Elevate Your Flexible Workforce Management and Services Procurement Corporate Brochure Elevate Your Flexible Workforce Management and Services Procurement Table of Contents SAP FIELDGLASS: POWERING YOUR FLEXIBLE WORKFORCE 4 IDENTIFYING YOUR CHALLENGES 6 DELIVERING YOUR

More information

And $100 million in savings.

And $100 million in savings. Efficiency, cash flow, timeliness. And $100 million in savings. S&P 500 Company implements American Express BIP as a part of a successful supply chain transformation. Published Nov. 23, 2015 THE CLIENT

More information

Future FS Leadership Development Managing Talent to Deliver Value

Future FS Leadership Development Managing Talent to Deliver Value Future FS Leadership Development Managing Talent to Deliver Value Service Overview: An effective Talent Management strategy ensures that an organization has the people and skills, now and in the future,

More information

The Path to Creating and Sustaining Value. The Scorecard. for Selecting, Managing & Leveraging your Services Team:

The Path to Creating and Sustaining Value. The Scorecard. for Selecting, Managing & Leveraging your Services Team: The Path to Creating and Sustaining Value The Scorecard for Selecting, Managing & Leveraging your Services Team: This presentation is only for the private consumption of ISC Session attendees. Any other

More information

How to Choose a Winning Supplier Management Solution

How to Choose a Winning Supplier Management Solution How to Choose a Winning Supplier Management Solution Network-Driven Solution Table of contents Why Use a Supplier Management Solution p. 3 Supplier Management Today p. 5 Supplier Management with a Purpose

More information

Beyond EDI Unlocking new value with transactions enabled by SAP Ariba and the Ariba Network

Beyond EDI Unlocking new value with transactions enabled by SAP Ariba and the Ariba Network Beyond EDI Unlocking new value with transactions enabled by SAP Ariba and the Ariba Network As a global trading community, the Ariba Network serves as a business-to-business marketplace for buying and

More information

SOLUTION BRIEF HELPING PREPARE FOR RISK ASSESSMENT & COMPLIANCE CHALLENGES FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

SOLUTION BRIEF HELPING PREPARE FOR RISK ASSESSMENT & COMPLIANCE CHALLENGES FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE HELPING PREPARE FOR RISK ASSESSMENT & COMPLIANCE CHALLENGES FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated

More information

CFO meets M&A: Value creation in the digital age The Dbriefs Driving Enterprise Value series

CFO meets M&A: Value creation in the digital age The Dbriefs Driving Enterprise Value series CFO meets M&A: Value creation in the digital age The Dbriefs Driving Enterprise Value series Lukas Hoebarth, Principal, Deloitte Consulting LLP Nnamdi Lowrie, Principal, Deloitte Consulting LLP Carina

More information

Emerging Technology and Security Update

Emerging Technology and Security Update Emerging Technology and Security Update February 13, 2015 Jordan Reed Managing Director Agenda 2015 Internal Audit Capabilities and Needs Survey 2014 IT Priorities Survey Results 2014 IT Security and Privacy

More information

Legal Project Management

Legal Project Management Legal Project Management SHB: Strategic Litigation Management (SLM) Partnering with clients to achieve better legal results at an exceptional value Where every client can expect: The client comes first

More information

How to Measure the Value of Your Internal Audit Group

How to Measure the Value of Your Internal Audit Group How to Measure the Value of Your Internal Audit Group Best practices to follow, pitfalls to avoid and success metrics to measure May 17, 2012 Agenda Strategic challenges: Implications for the enterprise

More information

Securitas Global and National Accounts Group

Securitas Global and National Accounts Group Securitas Global and National Accounts Group India Global Success Calls for a Singular Security Partner Organizations today have a continually heightened awareness of the impact of security practices on

More information

Operational Risk White Paper

Operational Risk White Paper Operational Risk White Paper Assessing and Mitigating Operational Risk in a Changing Environment by NICSA Compliance and Risk Management Committee April 2009 NICSA Compliance and Risk Committee Members

More information

Model Risk Management

Model Risk Management Model Risk Management Presented by: Lisa Thouin, CPA, CGMA FMS May 2016 Meeting Certified Public Accountants Consultants Wealth Management Technology Agenda Overview Model Risk Development, Implementation,

More information

Corporate renewable energy procurement survey insights

Corporate renewable energy procurement survey insights www.pwc.com/us/renewables Corporate renewable energy procurement survey insights June 2016 Executive summary One of the biggest developments in the renewable energy marketplace in the last 12 24 months

More information

Contract Lifecycle Management

Contract Lifecycle Management Contract Lifecycle Breakout Session Matthew O Connor Senior Consultant Contract Lifecycle in 30 Minutes What is CLM? Why do it When do we do it How do we do it What s New in BravoAdvantage 16 How Contract

More information

IT Governance Overview

IT Governance Overview IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope

More information

Portfolio Marketing. Research and Advisory Service

Portfolio Marketing. Research and Advisory Service Portfolio Marketing Research and Advisory Service SiriusDecisions Team Jeff Lash VP and Group Director, Go-to-Market Christina McKeon Service Director, Portfolio Marketing Tyler Anderson Team Leader, Account

More information

ServiceNow Knowledge 2016

ServiceNow Knowledge 2016 ServiceNow Knowledge 2016 Service and integration Point of view May 2016 Agenda Market trends Key challenges The EY SMI framework EY SMI service offerings Alignment with ServiceNow SIAM Value of SMI Appendix:

More information

Office of Information Technology (OIT) Strategic Plan FY

Office of Information Technology (OIT) Strategic Plan FY Office of Information Technology (OIT) Strategic Plan FY 2018 2022 Office of Information Technology - Vision, Mission, Pillars, and Values Vision Statement Boise State is a center for innovation, learning

More information

Bank of Ireland. Service Integration as a means to govern a multivendor. 11 th October 2013

Bank of Ireland. Service Integration as a means to govern a multivendor. 11 th October 2013 Bank of Ireland Integration as a means to govern a multivendor IT estate 11 th October 2013 Gerry Flanagan (Accenture) Sharon Donnelly (Bank of Ireland) Agenda Introductions What is Introduction and why

More information

IT Management Maturity. Phase 3: Moving from Proactive to Aligned

IT Management Maturity. Phase 3: Moving from Proactive to Aligned IT Management Maturity Phase 3: Moving from Proactive to Aligned IT Management Maturity Model for Mid-sized Enterprises: Proactive to Aligned To help IT leaders in mid-sized enterprises advance their IT

More information

GUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2))

GUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2)) GUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2)) Operational Risk Management MARCH 2017 STATUS OF GUIDANCE The Isle of Man Financial Services Authority ( the Authority ) issues guidance for

More information

INFORMATION SERVICES FY 2018 FY 2020

INFORMATION SERVICES FY 2018 FY 2020 INFORMATION SERVICES FY 2018 FY 2020 3-Year Strategic Plan Technology Roadmap Page 0 of 14 Table of Contents Strategic Plan Executive Summary... 2 Mission, Vision & Values... 3 Strategic Planning Process...

More information

Agenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM)

Agenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM) The Intersection of Enterprise-wide Risk (ERM) and Business Continuity (BCM) Marc Dominus 2005 Protiviti Inc. EOE Agenda Terminology and Process Introductions ERM Process Overview BCM Process Overview

More information

Looking beyond simple savings

Looking beyond simple savings Looking beyond simple savings PwC Singapore s Sourcing and Procurement Practice www.pwc.com/sg 2 Looking beyond simple savings l PwC Singapore s Sourcing and Procurement Practice Procurement for the 21

More information

Energy Trading Risk Management (ETRM) System Selection and Implementation Top Challenges

Energy Trading Risk Management (ETRM) System Selection and Implementation Top Challenges Energy Trading Risk Management (ETRM) System Selection and Implementation Top Challenges May 27, 2014 Energy Trading Risk Management Challenges Agenda Agenda Speaker Introduction Overview of Energy Trading

More information

The Firm of the Future How Technology Will Impact and Enable Effective Firm Management. Sponsored By:

The Firm of the Future How Technology Will Impact and Enable Effective Firm Management. Sponsored By: The Firm of the Future How Technology Will Impact and Enable Effective Firm Management Sponsored By: Before We Begin Ask questions through the Q&A widget Recorded session will be available starting tomorrow

More information

Asset Acceptance Capital Corp.

Asset Acceptance Capital Corp. Asset Acceptance Capital Corp. A Practical Approach to Enterprise Risk Management Detroit Chapter IIA September 14, 2010 1 Presenters Jeffrey S. Bankowski, CIA, CPA, CFF Jeff is currently the Vice President

More information

The Road to Shared IT Services. John Gohsman, Vice Chancellor and CIO

The Road to Shared IT Services. John Gohsman, Vice Chancellor and CIO The Road to Shared IT Services John Gohsman, Vice Chancellor and CIO John Gohsman Vice Chancellor of Information Technology and Chief Information Officer 2 IT @ WUSTL Vision (draft) 3 Current Trends core

More information

The Strategic Potential of Internal Audit

The Strategic Potential of Internal Audit June 2017 The Strategic Potential of Internal Audit Deliver Greater Value to Senior Management and Boards A white paper by William C. Watts, CIA Audit / Tax / Advisory / Risk / Performance Smart decisions.

More information

QUICK FACTS. Delivering a Managed Services Solution to Satisfy Exponential Business Growth TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Delivering a Managed Services Solution to Satisfy Exponential Business Growth TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Financial Services, Application Management Outsourcing ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Financial Services Revenue: Approximately $30 billion annually (parent

More information

Enterprise Content Management and Business Process Management

Enterprise Content Management and Business Process Management Enterprise Content Management and Business Process Management You Don t Have to Own IT to Control IT SM The changing business needs for Enterprise Content Management (ECM) and Business Process Management

More information

USAA's Supplier Governance Transformation that Optimizes Value and Addresses Risk

USAA's Supplier Governance Transformation that Optimizes Value and Addresses Risk USAA's Supplier Governance Transformation that Optimizes Value and Addresses Risk USAA Glenn Ellis Director, USAA Supplier Management Enlighta Nipun Sehgal CEO www.sig.org/eval USAA s Supplier Governance

More information

SOLUTION BRIEF RSA ARCHER REGULATORY & CORPORATE COMPLIANCE MANAGEMENT

SOLUTION BRIEF RSA ARCHER REGULATORY & CORPORATE COMPLIANCE MANAGEMENT RSA ARCHER REGULATORY & CORPORATE COMPLIANCE MANAGEMENT INTRODUCTION Your organization s regulatory compliance landscape changes every day. In today s complex regulatory environment, governmental and industry

More information

Third Party Information Security Risk Management Programs. Tanya Scott Risk and Controls Program Manager, Autodesk In-Depth Seminars D33

Third Party Information Security Risk Management Programs. Tanya Scott Risk and Controls Program Manager, Autodesk In-Depth Seminars D33 Third Party Information Security Risk Management Programs Tanya Scott Risk and Controls Program Manager, Autodesk In-Depth Seminars D33 Session Objectives / Agenda Objectives Obtain insight into Third

More information

Evaluating Software Development Firms OUTSOURCING CHECKLIST

Evaluating Software Development Firms OUTSOURCING CHECKLIST Evaluating Software Development Firms OUTSOURCING CHECKLIST Copyright Arcanys 2010 2017 INTRODUCTION Hiring an outsourced software development firm is a huge undertaking. If done properly, it can improve

More information