Lessons Learned in Streamlining the Third-party Risk Assessment Process
|
|
- Anastasia Little
- 6 years ago
- Views:
Transcription
1 Lessons Learned in Streamlining the Third-party Risk Assessment Process
2 Agenda Welcome & Introductions Overview of the Third Party Risk Management Lifecycle Three Unique Perspectives on: Third Party Inventories Due Diligence & Ongoing Monitoring How the HITRUST Assurance Program Helps Third Parties (Service Provider Perspective Q&A & Wrap-up
3 Introductions Aaron Shapiro PwC Director Cybersecurity & Privacy Jeff Martin Senior Manager Information Security Anthem Debbie Hutchinson Availity Senior Manager Audit and Third Party Assurance
4 Overview of the Third Party Risk Management Lifecycle A robust Third Party Risk Management (TPRM) program is based on adoption of key building blocks, and successfully linking the program strategy, policies and processes together. TPRM is focused on understanding and managing risks associated with vendors and other third parties with which the company does business and/or shares data. The PwC Third Party Risk Management Program Framework Third parties Vendors Suppliers Joint Ventures Business Channels Marketing Partners Affiliates Subsidiaries Regulated Entities Pre-contract lifecycle activities TPRM Program Components Governance Framework Policy & Procedures Inventory Stratification Issues Management Risk Considerations Reputational Operational Credit/Financial Business Continuity and Resiliency Strategic/Country Subcontractor Technology Info Security & Privacy Compliance Post contract lifecycle activities PwC. Not for further distribution without the prior written permission of PwC. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details.
5 PwC THREE UNIQUE PERSPECTIVES
6 Residual risk maturity ranking Standard risk definition Controls do not exist/are not in place Controls are in place but are not documented appropriately or currently are not reviewed/ tested; controls are not consistently followed Controls are in place and are documented and reviewed; manual or partial automation Controls are in place, are documented appropriately, are reviewed on a periodic basis, have continuous control monitoring and fully automated if available Segment 1 Critical Segment 2 High Risk Inherent risk rating Segment 3 Moderate Risk Nature Timing Extent Nature Timing Extent Nature Timing Extent 1 Onsite Annual 2 Onsite Annual 3 Onsite 4 Onsite Testing Testing Testing Testing Onsite Onsite Onsite Onsite Annual Testing Testing Testing Testing Onsite Remote Remote Remote 18 Annual Testing Inquiry Inquiry Inquiry Segment 4 Low Risk Nature Timing Extent Remote Remote Self- Assess Self- Assess Month Inquiry Inquiry Inquiry Inquiry Three Unique Perspectives - PwC Third party inventory, stratification, due diligence & on-going assessment model The inventory, risk rating and on-going testing model enables a focus on efforts to establish the third party inventory and oversee services with higher levels of inherent risk. Refine Establish On-board Oversee Govern Existing Third Party Inventory Inherent risk assessment Pre-contract due diligence & residual risk Nature, timing and extent & On-going due diligence Refresh & Re-rank Residual risk rating New Third Parties Metrics & Reporting Third Party Scorecards Program Dashboards PwC. Not for further distribution without the prior written permission of PwC. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details.
7 Three Unique Perspectives - PwC Third party inventory This framework will assist the TPRM Program in focusing in on the inventory list by analyzing multiple sources in rapid manner and identifying the third parties that need to be included as part of the program, and rated by inherent risk. Total Third Party Inventory from mul6ple data sources Begin with A/P Spend and LOB files and remove categories that don t pose risk Iden6fy unique third par6es and validate services against exis6ng invoices/data sources. Remove categories that don t pose risk Perform cleansing and enhancement of third party data In-scope third party inventory for risk segmenta6on Inherent risk assessment Inherent Risk Ra6ng Star6ng with commodity categories, we use a process to focus on those products/services that do and do not pose inherent risk and thus to be included as part of the program. We then clean and enhance the exis6ng third party data to be put into the inventory repository. Common Third Party Inventory Data A4ributes Third Party Name Third Party Parent Name/Associated Third Par6es Product/Service Third Party Type (Business Process Outsourcing, Partnership, Technology etc.) Spend Business Lines/Processes Supported by the Third Party Country/Region where Third Party is Based Contract Date (Engagement Date) Results of Third Party Risk Classifica6on Results of s (e.g., Third Party Informa6on Security Assessments) PwC. Not for further distribution without the prior written permission of PwC. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details.
8 Three Unique Perspectives - PwC Due Diligence, Ongoing Monitoring & HITRUST Assurance Results of the inherent risk should drive the nature, timing and extent of activities used to monitor, oversee, and re-assess third party relationships. Due to the higher costs associated with more in-depth assessment activities, a risk based approach should be leveraged so that higher risk relationships receive more active risk management than lower risk relationships. Depth of Due Diligence Activities 0% None Very Low 40-50% Request and review third party report (e.g., HITRUST certification, SOC 1/2/3, ISO certification, etc.) Low 20-30% Inherent Risk Rating Require the completion and evaluation of a due diligence questionnaire Request and review third party report (e.g., HITRUST certification, SOC 1/2/3, ISO certification, etc.) Moderate 10-15% Perform on-site assessments (1-5 days) Require the completion and evaluation of a due diligence questionnaire Request and review third party report (e.g., HITRUST certification, SOC 1/2/3, ISO certification, etc.) High 3-5% PwC. Not for further distribution without the prior written permission of PwC. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details.
9 Anthem THREE UNIQUE PERSPECTIVES
10 Third Party Inventories - Anthem Follow the data; not the spend. Requires strong internal partnerships. Risk tiering can be more difficult in a highly regulated space. In-scope inventories can tend to balloon.
11 Due Diligence and Ongoing Monitoring- Anthem Inefficient pre-contract due diligence processes can impede timely procurement processes. Again, strong internal partnerships are necessary. Especially for larger organizations. Change is constant. Assessments are a point-in-time measurement. Additional pressures for enhancing ongoing monitoring. New regulations, new technologies, global marketplace, maturing client base.
12 How HITRUST Assurance Program Helps - Anthem Risk assurance activity can create exponential volumes of work. Leveraging the HITRUST Assurance Program helps to ensure a consistent and efficient approach. Anthem Information Security is requiring vendor Business Associates to achieve HITRUST certification on the environment that supports Anthem. Anthem Business Associates can leverage their HITRUST certification across the HITRUST Alliance partners.
13 Availity THREE UNIQUE PERSPECTIVES
14 Third Party Inventories - Availity Conduct a complete inventory of all third parties activities ranked by risk factors. Include all types of third party relationships that can include business associates, trading partners, service partners, subcontractors etc. Evaluate the relationships to have a comprehensive understanding of who are your third parties, what services/ functions they provide and what level of access they have to your organization s data/systems.
15 Due Diligence and Ongoing Monitoring- Availity Conduct due diligence assessments to identify any potential gaps that could create risks or compliance issues prior to contract. Third parties who have completed a HITRUST validated assessment may submit certification letter as part of their due diligence. Continue to monitor relationships to proactively account for any changes that can occur throughout the relationship cycle. Organizations need to move beyond the initial due diligence and annual reviews to proactively address the bigger challenge of monitoring and assessing third-party risks on an ongoing basis.
16 How HITRUST Assurance Program Helps Availity HITRUST assessment can help to evaluate your third party assurance program. Accepting the HITRUST certification can help due diligence by reducing time and efforts. Leveraging the CSF enables a single assessment to be accepted by many organizations across the industry. Focusing on third party risk management and consistent requirements of our third parties can help drive industry efficiencies.
17 Third Parties (Service Provider) Perspective Ability to effectively respond varies drastically Customer assessments come in all shapes and sizes and it can be very frustrating and difficult for third parties to respond timely Alignment to a recognized security/privacy framework (e.g., HITRUST CSF) helps organizations respond quickly, with less effort, and with positive results HITRUST certification and SOC 2s can relieve much of the headache associated with responding to customer requests
18 Q&A
Navigating the New Health Economy
Navigating the New Health Economy How non-traditional healthcare players are using the HITRUST CSF to drive their security programs forward Speakers Dennis Quandt Risk Assurance Director, PwC Boston, MA
More informationCase Study Webinar: Vendor Risk Management at Global Lending Services
Case Study Webinar: Vendor Risk Management at Global Lending Services Al Palmer, SVP Compliance, Global Lending Services LLC (GLS) Melissa Brown, Compliance Manager, Global Lending Services LLC (GLS) John
More informationVENDOR RISK MANAGEMENT FCC SERVICES
VENDOR RISK MANAGEMENT FCC SERVICES Introductions Chris Tait, CISA, CFSA, CCSK, CCSFP Principal, Financial Services Baker Tilly Russ Sommers, CPA, CISA Senior Manager, Financial Services Baker Tilly Agenda
More informationThird Party Risk Management ( TPRM ) Transformation
Third Party Risk Management ( TPRM ) Transformation September 20, 2017 Internal use only An introduction to TPRM What is a Third Party relationship? A Third Party relationship is any business arrangement
More informationOutsourcing transparency evolution
Outsourcing transparency evolution How information transparency creates value across the extended enterprise Outsourcing transparency evolution Transparent communication is evolving for outsource service
More informationOptimizing an Enterprise Wide Effective Vendor Risk Management Program. Pam Schott Head and VP Enterprise Supplier Governance
Optimizing an Enterprise Wide Effective Vendor Risk Program Pam Schott Head and VP Enterprise Supplier Governance June 1, 2015 Emerging Industry Trends As Procurement organizations mature; their focus
More informationExtended Enterprise Risk Management
Extended Enterprise Risk Management Driving performance through the extended enterprise October 2015 A network within a network The Extended Enterprise is the concept that an organization does not operate
More informationVendor Risk Management Scoring PROCESSUNITY WEBINAR
Vendor Risk Management Scoring PROCESSUNITY WEBINAR Today s Presenters Gary Phipps Director of Risk Solutions Ed Thomas Vice President of Marketing 2 ProcessUnity, Inc. All Rights Reserved. About ProcessUnity
More informationHITRUST CSF Assurance Program. The Common Healthcare Industry Approach for Assessing Security and Reporting Compliance
The Common Healthcare Industry Approach for Assessing Security and Reporting Compliance February 2017 Contents Background and Challenges.... 3 Improving Risk Management While Reducing Cost and Complexity...
More informationHow do we statisfy the information privacy and security assurance requests from our customers?
How can I leverage a single privacy and security assessment with all my customers? how are other organizations addressing third-party risk management? How do we statisfy the information privacy and security
More informationHot Topics in Third Party Management. April 5, 2018 MEMBER OF ALLINIAL GLOBAL, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS
Hot Topics in Third Party Management April 5, 2018 MEMBER OF ALLINIAL GLOBAL, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2018 Wolf & Company, P.C. Before we get started Today s presentation slides can
More informationHITRUST CSF Assurance Program
HITRUST CSF Assurance Program Common healthcare industry approach for assessing security and reporting compliance Background and challenges Compliance requirements for healthcare organizations and their
More informationEffective Vendor Risk Management. April 21, Mario A. Mosse. This Training is Brought to you by ComplianceOnline. Presenter:
This Training is Brought to you by ComplianceOnline. Effective Vendor Risk Management Presenter: Mario A. Mosse April 21, 2017 This training session is sponsored by 2014 ComplianceOnline www.complianceonlie.com
More informationSOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER
EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER ARRIVAL OF GDPR IN 2018 The European Union (EU) General Data Protection Regulation (GDPR), which takes effect in 2018, will bring changes
More informationIdentify and Manage Third Party Vendor Risks:
Identify and Manage Third Party Vendor Risks: Using Automation to Increase Visibility Westfield Group Brian Roche Chief Procurement Officer Opus Samuel Mele Vice President Sales sig.org/summit Identify
More informationVendor Management Risk Mitigation:
Vendor Management Risk Mitigation: The Importance of Having a Formalized Methodology Sun Life Financial Laura Williams AVP, Procurement Opus Sam Mele Vice President Sales sig.org/summit Case Study: Supplier
More informationHOW TO LAUNCH A SUCCESSFUL WORKFORCE PLANNING CENTER OF EXPERTISE (COE)
HOW TO LAUNCH A SUCCESSFUL WORKFORCE PLANNING CENTER OF EXPERTISE (COE) April 17, 2012 Karen Piercy, Mercer Matthew Stevenson, Mercer 0 Today s presenters Karen Piercy Philadelphia +1 215 982 4276 karen.piercy@mercer.com
More informationHot Topics in the Board Room
www.pwc.com Hot Topics in the Board Room Agenda State of the Internal Audit Profession Vendor Risk Management Privacy & Security April 2014 2 At a glance s 10 th Annual State of the Internal Audit Profession
More informationApplying a quality systems approach to improve supply chain management
Applying a quality systems approach to improve supply chain management Supplier selection and qualification Manufacturers need to have an established, regimented system for identifying critical success
More informationThe past, present and future of service organization control reporting
The past, present and future of service organization control reporting Key takeaways from EY s Annual SOCR Client Conference March 2016 Study the past if you would define the future. Confucius b 1 Conference
More informationThe Next Generation of Local Government: Transforming Non-Emergency and 311 Call Center Solutions to a Complete Constituent Experience
The Next Generation of Local Government: Transforming Non-Emergency and 311 Call Center Solutions to a Complete Constituent Experience An Oracle White Paper February 2013 The Next Generation of Local Government
More informationThe Future of Internal Auditing:
Internal Audit The Future of Internal Auditing: Changing Internal Audit s Value Proposition October 12, 2010 Istanbul, Turkey Presented by: Naman Parekh Partner, Agenda Background of the 2012 Study Key
More informationSOLUTION BRIEF RSA ARCHER AUDIT MANAGEMENT
RSA ARCHER AUDIT MANAGEMENT INTRODUCTION Internal audit departments are struggling to deliver strategic leadership, coordinated assurance and other services their stakeholders need, but this task isn t
More informationLeveraging IT risk management to boost competitive advantage
Pharmaceuticals and Life Sciences Leveraging IT risk management to boost competitive advantage Achieving integrated information technology, governance, risk, and compliance Table of contents The heart
More informationSTEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS. April 25, 2018 In-House Counsel Conference
STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS April 25, 2018 In-House Counsel Conference Presenters: Daniela Ivancikova, Assistant General Counsel, University of Delaware Evan
More informationExcellence in Third Party Risk Management (TPRM)
Excellence in Third Party Risk Management (TPRM) www.pwc.ch FINMA Circular 2017/xx Outsourcing consultation paper - go live July 2017 Key changes Outsourcing of critical services to banks in the same financial
More informationSOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER
EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER ARRIVAL OF GDPR IN 2018 The European Union (EU) General Data Protection Regulation (GDPR) that takes effect in 2018 will bring changes for
More informationIs your supplier risk management keeping pace with your strategic
Is your supplier risk management keeping pace with your strategic imperatives? What is the role of Internal Audit? Agenda 1. Introduction 2. What is supplier risk management? 3. What's the problem? 4.
More informationRisk Advisory Services Developing your organisation s governance for competitive advantage
Advisory Services Developing your organisation s governance for competitive advantage The Deloitte Advisory Platform of Services can help you to govern your strategic plan to guide your operations measure
More informationTrust Your Suppliers, Manage Your Risk The Importance of Third-Party Supplier Visibility About Perfect Commerce
Trust Your Suppliers, Manage Your Risk The Importance of Third-Party Supplier Visibility About Perfect Commerce Since 1994, Perfect Commerce has been automating spend management initiatives offering world-class
More informationCatching Fraud During a Recession Through Superior Internal Controls. FICPA s 25 th Annual Accounting Show. J. Stephen Nouss September 29, 2010
Catching Fraud During a Recession Through Superior Internal Controls FICPA s 25 th Annual Accounting Show J. Stephen Nouss September 29, 2010 1 Session Objectives Fraud Facts (2008 Association of Certified
More informationCSR / Sustainability Governance and Management Assessment By Coro Strandberg President, Strandberg Consulting
Introduction CSR / Sustainability Governance and Management Assessment By Coro Strandberg President, Strandberg Consulting www.corostrandberg.com November 2015 Companies which adopt CSR or sustainability
More informationRSA ARCHER MATURITY MODEL: AUDIT MANAGEMENT
RSA ARCHER MATURITY MODEL: AUDIT MANAGEMENT OVERVIEW Internal Audit (IA) plays a critical role in mitigating the risks an organization faces. Audit must do so in a world of increasing risks and compliance
More informationInternational Finance Corporation
International Finance Corporation Corporate Governance and Internal Audit Overview Bob Lamm Independent Senior Advisor Center for Corporate Governance Deloitte LLP Neil White Global IA Analytics Leader
More informationBusiness Framework Change How You Manage Safety
Business Framework Change How You Manage Safety December 1, 2017 Joseph Muratore Mark Drozdov Today s Speakers Joseph Muratore Commercial Director BSI USA & Canada Mark Drozdov BSI CES SVP & Technical
More informationBuilding a Framework for Effective Third-Party Risk Management (TPRM)
Building a Framework for Effective Third-Party Risk Management (TPRM) GARP Webcast Series On24 Tech Tips Brenda Boultwood Christopher Thackray APRIL 2016 Make sure your speakers are on Hit F5 any time
More informationWHY SUPPLIER MANAGEMENT?
WHY SUPPLIER MANAGEMENT? A long-lasting partnership with suppliers is important for future business development. Goods and services procurement already accounts for more than 70 percent of Company s total
More informationInventory performance today: Why is it declining?
www.pwc.com Inventory performance today: Why is it declining? November 2015 Inventory performance today: Why is it declining? Inventory is often considered by manufacturers to be the most valuable category
More informationREGULATORY HOT TOPIC Third Party IT Vendor Management
REGULATORY HOT TOPIC Third Party IT Vendor Management 1 Todays Outsourced Technology Services Core Processing Internet Banking Mobile Banking Managed Security Services Managed Data Center Services And
More informationVendor Management Challenges and Expectations An Open Discussion April 13, 2017
1 Practical solutions driving tangible results Vendor Management Challenges and Expectations An Open Discussion April 13, 2017 Agenda Common Themes Discussion Expectations Overcoming Obstacles Common Comments
More informationJune PwC s Data and Analytics Survey 2016 Big Decisions
June 2016 PwC s Data and Analytics Survey 2016 Big Decisions Are executives using Data & Analytics to make big decisions? In May 2014, we surveyed 1,135 senior executives on the ways they were making big
More informationExtended Enterprise Risk Management
Extended Enterprise Risk Management Overview of Risks and Methodologies/Tools to Address FEI Presentation June 7, 2016 Our POV on Extended Enterprise Risk Management Operational Risk Framework Organizations
More informationIntegrated Health and Wellness Advantage. The Anthem Blue Cross health and wellness approach
Integrated Health and Wellness Advantage The Anthem Blue Cross health and wellness approach It takes an organizational commitment to health and healthy behaviors to reach true wellness success. Together,
More informationAVEPOINT RISK INTELLIGENCE SYSTEM
Technical Overview AVEPOINT RISK INTELLIGENCE SYSTEM Keeping your data privacy protection practices on the right track. INVENTORY MANAGER Inventory Records To understand how the data is collected, maintained,
More informationVendor Due Diligence: Keep The Risk Out!
Vendor Due Diligence: Keep The Risk Out! August 25, 2015 2015 ProcessUnity, Inc. All Rights Reserved. ProcessUnity Risk Suite Comprehensive, Flexible, Scalable RISK SUITE Enterprise Risk Regulatory Compliance
More informationThe compliance investment
The compliance investment Realising the value of compliance through greater effectiveness, efficiency, and sustainability kpmg.com.au 2017 KPMG, an Australian partnership and a member firm of the KPMG
More informationWhite Paper Describing the BI journey
Describing the BI journey The DXC Technology Business Intelligence (BI) Maturity Model Table of contents A winning formula for BI success Stage 1: Running the business Stage 2: Measuring and monitoring
More informationENTERPRISE RISK MANAGEMENT USING DATA ANALYTICS. Dan Julevich and Chris Dawes April 17, 2015
ENTERPRISE RISK MANAGEMENT USING DATA ANALYTICS Dan Julevich and Chris Dawes April 17, 2015 Agenda ERM What, Why, How? ERM Keys to Success Fail, Survive, or Thrive? ERM Current State Overview ERM Leading
More informationIT GOVERNANCE. WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR PwC. April 4, 2013
IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR PwC April 4, 2013 Agenda The challenge IT Governance defined IT Governance components Next steps Questions THE CHALLENGE The
More informationProcurement Transformation on the Fast Track: Doing More with Less
Procurement Transformation on the Fast Track: Doing More with Less February, 2010 ProcureAbility Presenters John Evans President and CEO ProcureAbility jevans@procureability.com 2 AN APPROACH UNHEARD OF
More informationThe SAM Optimization Model. Control. Optimize. Grow SAM SOFTWARE ASSET MANAGEMENT
The Optimization Model Control. Optimize. Grow The Optimization Model In an ever-changing global marketplace, your company is looking for every opportunity to gain a competitive advantage and simultaneously
More informationArticle from: CompAct. April 2013 Issue No. 47
Article from: CompAct April 2013 Issue No. 47 Overview of Programmatic Framework and Key Considerations Key elements Description Items to consider Definition and identification of EUCs The statement that
More informationISACA Charlotte Chapter
www.pwc.com ISACA Charlotte Chapter Robotic Process Automation (RPA) March 13, 2018 Speaking with you today Sachin Mandal PwC Partner Enterprise System Solutions Practice sachin.k.mandal@pwc.com (973)580-9950
More informationManaging complex services in SAP and Ariba from a client perspective. Ariba Live 2018
Managing complex services in SAP and Ariba from a client perspective Ariba Live 2018 Agenda Overview and main message Plan to play design overview Supplier qualification Contract management Managing procurement
More informationStrengthening Vendor Risk Management Program
Strengthening Vendor Risk Management Program ACUIA Region 5 Fall Meeting Portsmouth, N.H. October 2017 PKF O Connor Davies Risk Advisory Services Governance & Regulations Cyber-Security Risk Management
More informationStrengthening Your Enterprise Risk Management Process
Strengthening Your Enterprise Risk Management Process Belinda Mumma, Senior Consultant, Enterprise Risk Management Services bmumma@sollievo.com (866) 605-5664 x3400 Discussion Topics Definition of Enterprise
More informationTHE VALUE OF STRATEGIC SOURCING FOR PROCUREMENT PROFESSIONALS
THE VALUE OF STRATEGIC SOURCING FOR PROCUREMENT PROFESSIONALS UNDERSTANDING STRATEGIC SOURCING Maximizing value while minimizing cost is a business imperative across every discipline within organizations.
More informationOutsourcing and the Need for Supplier Audits
Outsourcing and the Need for Supplier Audits John A. Gatto Retired April 3, 2017 Agenda Why Audit Suppliers Outsourcing Supplier Risks Minimum Security Standards Audit Focus 2 1 Definitions Third Party
More informationThe future of procurement in the age of digital supply networks The DBriefs Driving Enterprise Value series
The future of procurement in the age of digital supply networks The DBriefs Driving Enterprise Value series Joe Chmielewski, Senior Manager, Deloitte Consulting LLP Vinod Venugopal, Principal, Deloitte
More informationMake money, save money and manage risk
Make money, save money and manage risk The benefits of well-designed environment, health, safety and sustainability programs EHS and sustainability The opportunities and risks associated with environment,
More informationPoints to Consider When Developing a TMF (Trial Master File) Strategy
PHLEXGLOBAL WHITE PAPER Points to Consider When Developing a TMF (Trial Master File) Strategy Presented By: Karen Redding Global Business Development Director Phlexglobal Ltd. kredding@phlexglobal.com
More informationHOW HR NEED S TO. By Karen Shellenback, Karen Piercy and Denise LaForte, Mercer Select Intelligence Mercer HR Transformation
HOW HR NEED S TO CHANGE By Karen Shellenback, Karen Piercy and Denise LaForte, Mercer Select Intelligence Mercer HR Transformation YOUR BRIEFING IN 3 2 1 3 HIGHLIGHTS High performing HR organisations leverage
More informationDeveloping a Successful Product
Developing a Successful Product What is the appropriate level of governance? Kelly Cusick, Deloitte Consulting LLP March 30, 2014 Antitrust Notice The Casualty Actuarial Society is committed to adhering
More informationCorporate Brochure. Elevate Your Flexible Workforce Management and Services Procurement
Corporate Brochure Elevate Your Flexible Workforce Management and Services Procurement Table of Contents SAP FIELDGLASS: POWERING YOUR FLEXIBLE WORKFORCE 4 IDENTIFYING YOUR CHALLENGES 6 DELIVERING YOUR
More informationAnd $100 million in savings.
Efficiency, cash flow, timeliness. And $100 million in savings. S&P 500 Company implements American Express BIP as a part of a successful supply chain transformation. Published Nov. 23, 2015 THE CLIENT
More informationFuture FS Leadership Development Managing Talent to Deliver Value
Future FS Leadership Development Managing Talent to Deliver Value Service Overview: An effective Talent Management strategy ensures that an organization has the people and skills, now and in the future,
More informationThe Path to Creating and Sustaining Value. The Scorecard. for Selecting, Managing & Leveraging your Services Team:
The Path to Creating and Sustaining Value The Scorecard for Selecting, Managing & Leveraging your Services Team: This presentation is only for the private consumption of ISC Session attendees. Any other
More informationHow to Choose a Winning Supplier Management Solution
How to Choose a Winning Supplier Management Solution Network-Driven Solution Table of contents Why Use a Supplier Management Solution p. 3 Supplier Management Today p. 5 Supplier Management with a Purpose
More informationBeyond EDI Unlocking new value with transactions enabled by SAP Ariba and the Ariba Network
Beyond EDI Unlocking new value with transactions enabled by SAP Ariba and the Ariba Network As a global trading community, the Ariba Network serves as a business-to-business marketplace for buying and
More informationSOLUTION BRIEF HELPING PREPARE FOR RISK ASSESSMENT & COMPLIANCE CHALLENGES FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE
HELPING PREPARE FOR RISK ASSESSMENT & COMPLIANCE CHALLENGES FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated
More informationCFO meets M&A: Value creation in the digital age The Dbriefs Driving Enterprise Value series
CFO meets M&A: Value creation in the digital age The Dbriefs Driving Enterprise Value series Lukas Hoebarth, Principal, Deloitte Consulting LLP Nnamdi Lowrie, Principal, Deloitte Consulting LLP Carina
More informationEmerging Technology and Security Update
Emerging Technology and Security Update February 13, 2015 Jordan Reed Managing Director Agenda 2015 Internal Audit Capabilities and Needs Survey 2014 IT Priorities Survey Results 2014 IT Security and Privacy
More informationLegal Project Management
Legal Project Management SHB: Strategic Litigation Management (SLM) Partnering with clients to achieve better legal results at an exceptional value Where every client can expect: The client comes first
More informationHow to Measure the Value of Your Internal Audit Group
How to Measure the Value of Your Internal Audit Group Best practices to follow, pitfalls to avoid and success metrics to measure May 17, 2012 Agenda Strategic challenges: Implications for the enterprise
More informationSecuritas Global and National Accounts Group
Securitas Global and National Accounts Group India Global Success Calls for a Singular Security Partner Organizations today have a continually heightened awareness of the impact of security practices on
More informationOperational Risk White Paper
Operational Risk White Paper Assessing and Mitigating Operational Risk in a Changing Environment by NICSA Compliance and Risk Management Committee April 2009 NICSA Compliance and Risk Committee Members
More informationModel Risk Management
Model Risk Management Presented by: Lisa Thouin, CPA, CGMA FMS May 2016 Meeting Certified Public Accountants Consultants Wealth Management Technology Agenda Overview Model Risk Development, Implementation,
More informationCorporate renewable energy procurement survey insights
www.pwc.com/us/renewables Corporate renewable energy procurement survey insights June 2016 Executive summary One of the biggest developments in the renewable energy marketplace in the last 12 24 months
More informationContract Lifecycle Management
Contract Lifecycle Breakout Session Matthew O Connor Senior Consultant Contract Lifecycle in 30 Minutes What is CLM? Why do it When do we do it How do we do it What s New in BravoAdvantage 16 How Contract
More informationIT Governance Overview
IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope
More informationPortfolio Marketing. Research and Advisory Service
Portfolio Marketing Research and Advisory Service SiriusDecisions Team Jeff Lash VP and Group Director, Go-to-Market Christina McKeon Service Director, Portfolio Marketing Tyler Anderson Team Leader, Account
More informationServiceNow Knowledge 2016
ServiceNow Knowledge 2016 Service and integration Point of view May 2016 Agenda Market trends Key challenges The EY SMI framework EY SMI service offerings Alignment with ServiceNow SIAM Value of SMI Appendix:
More informationOffice of Information Technology (OIT) Strategic Plan FY
Office of Information Technology (OIT) Strategic Plan FY 2018 2022 Office of Information Technology - Vision, Mission, Pillars, and Values Vision Statement Boise State is a center for innovation, learning
More informationBank of Ireland. Service Integration as a means to govern a multivendor. 11 th October 2013
Bank of Ireland Integration as a means to govern a multivendor IT estate 11 th October 2013 Gerry Flanagan (Accenture) Sharon Donnelly (Bank of Ireland) Agenda Introductions What is Introduction and why
More informationIT Management Maturity. Phase 3: Moving from Proactive to Aligned
IT Management Maturity Phase 3: Moving from Proactive to Aligned IT Management Maturity Model for Mid-sized Enterprises: Proactive to Aligned To help IT leaders in mid-sized enterprises advance their IT
More informationGUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2))
GUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2)) Operational Risk Management MARCH 2017 STATUS OF GUIDANCE The Isle of Man Financial Services Authority ( the Authority ) issues guidance for
More informationINFORMATION SERVICES FY 2018 FY 2020
INFORMATION SERVICES FY 2018 FY 2020 3-Year Strategic Plan Technology Roadmap Page 0 of 14 Table of Contents Strategic Plan Executive Summary... 2 Mission, Vision & Values... 3 Strategic Planning Process...
More informationAgenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM)
The Intersection of Enterprise-wide Risk (ERM) and Business Continuity (BCM) Marc Dominus 2005 Protiviti Inc. EOE Agenda Terminology and Process Introductions ERM Process Overview BCM Process Overview
More informationLooking beyond simple savings
Looking beyond simple savings PwC Singapore s Sourcing and Procurement Practice www.pwc.com/sg 2 Looking beyond simple savings l PwC Singapore s Sourcing and Procurement Practice Procurement for the 21
More informationEnergy Trading Risk Management (ETRM) System Selection and Implementation Top Challenges
Energy Trading Risk Management (ETRM) System Selection and Implementation Top Challenges May 27, 2014 Energy Trading Risk Management Challenges Agenda Agenda Speaker Introduction Overview of Energy Trading
More informationThe Firm of the Future How Technology Will Impact and Enable Effective Firm Management. Sponsored By:
The Firm of the Future How Technology Will Impact and Enable Effective Firm Management Sponsored By: Before We Begin Ask questions through the Q&A widget Recorded session will be available starting tomorrow
More informationAsset Acceptance Capital Corp.
Asset Acceptance Capital Corp. A Practical Approach to Enterprise Risk Management Detroit Chapter IIA September 14, 2010 1 Presenters Jeffrey S. Bankowski, CIA, CPA, CFF Jeff is currently the Vice President
More informationThe Road to Shared IT Services. John Gohsman, Vice Chancellor and CIO
The Road to Shared IT Services John Gohsman, Vice Chancellor and CIO John Gohsman Vice Chancellor of Information Technology and Chief Information Officer 2 IT @ WUSTL Vision (draft) 3 Current Trends core
More informationThe Strategic Potential of Internal Audit
June 2017 The Strategic Potential of Internal Audit Deliver Greater Value to Senior Management and Boards A white paper by William C. Watts, CIA Audit / Tax / Advisory / Risk / Performance Smart decisions.
More informationQUICK FACTS. Delivering a Managed Services Solution to Satisfy Exponential Business Growth TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES
[ Financial Services, Application Management Outsourcing ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Financial Services Revenue: Approximately $30 billion annually (parent
More informationEnterprise Content Management and Business Process Management
Enterprise Content Management and Business Process Management You Don t Have to Own IT to Control IT SM The changing business needs for Enterprise Content Management (ECM) and Business Process Management
More informationUSAA's Supplier Governance Transformation that Optimizes Value and Addresses Risk
USAA's Supplier Governance Transformation that Optimizes Value and Addresses Risk USAA Glenn Ellis Director, USAA Supplier Management Enlighta Nipun Sehgal CEO www.sig.org/eval USAA s Supplier Governance
More informationSOLUTION BRIEF RSA ARCHER REGULATORY & CORPORATE COMPLIANCE MANAGEMENT
RSA ARCHER REGULATORY & CORPORATE COMPLIANCE MANAGEMENT INTRODUCTION Your organization s regulatory compliance landscape changes every day. In today s complex regulatory environment, governmental and industry
More informationThird Party Information Security Risk Management Programs. Tanya Scott Risk and Controls Program Manager, Autodesk In-Depth Seminars D33
Third Party Information Security Risk Management Programs Tanya Scott Risk and Controls Program Manager, Autodesk In-Depth Seminars D33 Session Objectives / Agenda Objectives Obtain insight into Third
More informationEvaluating Software Development Firms OUTSOURCING CHECKLIST
Evaluating Software Development Firms OUTSOURCING CHECKLIST Copyright Arcanys 2010 2017 INTRODUCTION Hiring an outsourced software development firm is a huge undertaking. If done properly, it can improve
More information