Hot Topics in Third Party Management. April 5, 2018 MEMBER OF ALLINIAL GLOBAL, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS

Similar documents
Navigating the Intersection of Vendor Management and Business Continuity

FMS New York/ New Jersey Chapter Meeting January 14, The Impact of Models. by: Scott Baranowski

THIRD-PARTY RISK MANAGEMENT

VENDOR RISK MANAGEMENT FCC SERVICES

US Business Continuity Safeguarding Your Business from a Disaster

Third Party Risk Management ( TPRM ) Transformation

Yale University Business Continuity Planning Quick Start Guide

RDC Audit & Compliance: Lessons from the Battlefield

NTGA Compliance & Operational Manager Due Diligence Process

Business Continuity Plan (BCP)

The top five benefits of outsourcing B2B payments processing

Audit Report. Audit of Contracting and Procurement Activities

The past, present and future of service organization control reporting

Recommended Practices for Subcontractor Management

Sharing experiences on audit quality. A selection of ideas and initiatives intended to assist the promotion of consistent audit quality in Australia

BCP Methodology Benefits realisation

Business Continuity vs. Operational Risk Management vs. Business Resiliency. Karen Dye Oakley, CBCP, MBCI

FGFOA 2017 Focus on the Future

OFFICE OF INSPECTOR GENERAL PALM BEACH COUNTY AUDIT REPORT: 2012-A-0004 CHILDREN S SERVICES COUNCIL REPORT ON EXTERNAL QUALITY REVIEW

Dovico Timesheet Hosted - May 2014 BEST PRACTICES

Vendor Risk Management Scoring PROCESSUNITY WEBINAR

ISO Business Continuity Management. Your implementation guide

Compliance Program Effectiveness Guide

IBM Resilient Incident Response Platform On Cloud

When Recognition Matters WHITEPAPER OCTAVE RISK ASSESSMENT WITH OCTAVE.

Session 7: Corporate Governance

RFQ ATTACHMENT V: RESPONSE TEMPLATE

Protecting Information Assets - Week 9 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protecting Information Assets

Good Corporate Governance (GCG) Being a good corporate citizen is good risk management

Proposed Attestation Requirements for FR Y-14A/Q/M reports. Overview and Implications for Banking Institutions

Safety Perception / Cultural Surveys

An introduction to business continuity planning

Session 4C: Model Governance: What Could Possibly Go Wrong? (Part I) Moderator: Dwayne Allen Husbands, FSA, MAAA

Business Continuity Planning and Disaster Recovery Planning

Citizens Property Insurance Corporation Business Continuity Framework

Risk Advisory Services Developing your organisation s governance for competitive advantage

ABS GUIDELINES ON CONTROL OBJECTIVES & PROCEDURES FOR OUTSOURCED SERVICE PROVIDERS. FREQUENTLY ASKED QUESTIONS 15 June 2017.

Make money, save money and manage risk

Audit s Role in Risk Governance

HR OUT-TASKING: IS IT RIGHT FOR YOUR ORGANIZATION?

SPECIFICATION NO. TxDOT * REVISED: AUGUST 2017 CRIMINAL BACKGROUND CHECKS

How Your Business Survival Depends On Disaster Recovery.

PCI Data Breach Preparedness How To Prevent Your Organization From Becoming the Next Data Breach Headline

MODULE I: MEDICARE & MEDICAID GENERAL COMPLIANCE TRAINING

Ecommerce & Accounting. Scott We Speak Ecommerce

NETWORKING EVENTS. The SIG Webinar will begin shortly. Once the webinar begins, the sound will come from your computer speakers.

POLICY MANUAL FOR ISO 9001:2008. Document: PM-9001:2008 Date: April 7, Uncontrolled Copy

The Sector Skills Council for the Financial Services Industry. National Occupational Standards. Risk Management for the Financial Sector

Lexis PSL Commercial. Transition in outsourcing

IT Framework Memorandum. For. Supervised Institutions

Madison Consulting Group. An Introduction to Our Compliance and Regulatory Consulting Services

Corporate Governance Management tool. Executing On Corporate Governance

United Way of the Virginia Peninsula

Thomson Reuters: Anti-Money Laundering Survey Insights

bulletin By-laws and Regulations By-law 17.19, Business Continuity Planning

Business Continuity & Disaster Recovery

CLERK OF THE CIRCUIT COURT

OFFICE OF INSPECTOR GENERAL CITY OF JACKSONVILLE AUDIT REPORT NO AR-0005

Internal Controls: Need Them, Have Them, Love Them

Evaluating Software Development Firms OUTSOURCING CHECKLIST

PRACTICE DEVELOPMENT STRATEGIES

The State of Banking Information Security Survey Copyright 2008 Information Security Media Group, Corp. Executive Overview

Print and Mail Discovery Session for Profile, Systematics and IBS Core Customer. Mark Wilson and Brett Cameron

Get ready for robots: why planning makes the difference between success and disappointment

Agenda. Procurement Services Contracts and Grants FY 14 Customer Satisfaction Survey Travel Program PCard

Designing and Implementing The CMDB

ISO Your implementation guide

See your auditor clearly. Transparency report: How we perform quality audit engagements

Process Improvement & Risk Management for ITES / KPO / BPO Industry. Riskpro, India

Guidelines for Information Asset Management: Roles and Responsibilities

GUIDELINES. Corporate Compliance. Kenneth D. Gibbs President & Chief Executive. Martin A. Cammer Senior Vice President & Corporate Compliance Officer

SUITABLE FOR FNSBKG401. Financial Services Training

Disaster Preparedness & Your Supply Chain

Triple C Housing, Inc. Compliance Plan

Emerging Technology and Security Update

Risk-Focused Examinations

Grow Your Practice With Bill.com for QuickBooks Online

EY Center for Board Matters. Leading practices for audit committees

PRACTICAL EXPERIENCE CERTIFICATE FOR INTERNATIONALLY TRAINED CANDIDATES

GUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2))

Enhancing Audit Committee Excellences through Internal Audit. 21 November 2017

2017 North American Pulse of Internal Audit. Public Sector Focus. Courageous Leadership: Instilling Confidence from Within

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER

A Guide to Professional Standards

2011 CFS Salary Guide

Request for Proposal For: 2018 American Bar Association Temporary Services

Business Continuity Management for Singapore s Logistics Sector. By Singapore Business Federation and Singapore Logistics Association

Present and functioning: Fine-tuning your ICFR using the COSO update

Measured through results Your accounts are just a click away. Bookkeeping Services. For small and medium size customers via the web

Launch of the SM&CR and the interaction with MiFID II

Business Continuity Management An Auditor s Perspective July 25, 2017

Quickstart Guide Online Payroll

Enterprise Content Management and Business Process Management

GDPR and Canadian organizations: Addressing key challenges GDPR and Canadian organizations: Addressing key challenges

Supply Chain Management within Business Continuity

Requirements Analysis and Design Definition. Chapter Study Group Learning Materials

Role of Operational Risk in the Product Lifecycle Presented By: Chris Nestore, SVP Head of Operational Risk Management, TD Bank

Applying Integrated Assurance Management Scenarios for Governance Capability Assessment

QUALITY MANAGEMENT SYSTEM POLICIES AND PROCEDURES

CFPB Readiness Series: Consumer Complaint Resolution and Tracking

Transcription:

Hot Topics in Third Party Management April 5, 2018 MEMBER OF ALLINIAL GLOBAL, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2018 Wolf & Company, P.C.

Before we get started Today s presentation slides can be downloaded at www.wolfandco.com/webinars/2018. The session will last about 50 minutes, and we ll then have time for Q & A. Our audience will be muted during the session. Please send your questions in using the Questions Box located on the webinar s control panel. 2

About Wolf & Company, P.C. Established in 1911 Offers Audit, Tax, and Risk Management services Offices located in: Boston, Massachusetts Springfield, Massachusetts Albany, NY Livingston, NJ Over 200 professionals As a leading regional firm founded in 1911, we provide our clients with specialized industry expertise and responsive service.

Financial Institution Expertise Over 45 Risk Management Professionals: IT Assurance Services Group Internal Audit Services Group Regulatory Compliance Services Group WolfPAC Solutions Group Provide services to over 300 financial institutions: Approximately 85 FIs with assets > $1B Approximately 40 publicly traded FIs Constant regulatory review of our deliverables Provide Risk Management Services in 27 states and 2 U.S. territories 4

Meet Today s Presenter Jason T. Clinton IT Assurance Senior Consultant Phone: 617-261-8132 Email: jclinton@wolfandco.com

Today s Agenda Fundamental Elements of a Vendor Management Program Office of Inspector General (OIG) Review Regulatory Expectations and Trends Completeness of Vendor Risk Assessments Usage of System and Organization Controls (SOC) Reports Subcontracting Arrangements 6

Fundamental Elements Risk Assessment Vendor Selection and Due Diligence Contract Structuring and Review Ongoing Monitoring 7

Risk Assessment 1. Strategic Risk 2. Reputation Risk 3. Operational Risk 4. Transaction Risk 5. Credit Risk 6. Compliance Risk 7. Other Risk Source: FDIC FIL 44-2008, Guidance For Managing Third-Party Risk None of this is new 8

Regulatory Guidance FDIC FIL 44-2008: Guidance for Managing Third- Party Risk OCC Bulletin 2013-29: Third Party Relationships FFIEC BCP Appendix J: Strengthening the Resilience of Outsourced Technology Services Cybersecurity Assessment Tool (CAT) External Dependencies Information Technology Risk-based Exam (InTREx) OIG EVAL-17-004: Technology Service Provider Contracts with FDIC-Supervised Institutions 9

Office of Inspector General Review OIG reviewed Technology Service Provider (TSP) contracts of FDIC-supervised institutions Scope: 48 critical vendor contracts from 19 financial institutions Results published as EVAL-17-004 in February 2017 Objective: Assess how clearly contracts with TSPs address: Business Continuity Planning Incident Response Handling 10

Evaluation Results Contracts provide FIs with limited assurance that TSPs: Could recover and resume critical operations timely and effectively if disrupted Appropriate steps would be taken to contain, manage, and report security incidents FFIEC took numerous steps to provide FIs with BCP, Cybersecurity, and Vendor Management guidance Many contracts are dated (pre-2015) and don t integrate new guidance Risk remains FIs may attempt to transfer their inherent responsibility for BCP and cybersecurity to TSPs 11

Recommendations and Response The FDIC should continue to reinforce with FIs the need to: Fully assess risks associated with TSPs Ensure contracts include specific, detailed provisions to address risks and protect FIs interests Clearly define contract terms around BCP and IRP The FDIC concurred with the recommendations and proposed actions responsive to the recommendations to be completed by October 2018 12

Takeaways for Financial Institutions During contract structuring and review consider: Requiring the TSP to establish a BCP that considers supporting required processing and restoring services to multiple clients under adverse scenarios Defining clear performance standards for restoring services Defining clear responsibilities and expectations for handling security incidents Ensuring clear terminology so the responsibilities of both parties are not subjective and open to interpretation Ensure FI management is engaged in writing and negotiating contracts to avoid contracts where TSP rights are more protected than the FIs 13

Risk Assessment Accuracy and Completeness Growing trend of vendor risk assessments missing contracted service providers and/or including service providers that are no longer in use Review processes and procedures to ensure necessary personnel are notified of new and/or terminated relationships Implement a process to periodically reconcile the risk assessment against an independent source (e.g. accounts payable) 14

Subcontracting Arrangements Growing trend of FIs not explicitly defining the responsibilities of subcontractors or performing adequate due diligence/ monitoring Define in contracts if/what services may be subcontracted and expectations for monitoring Ensure the risk assessment for service providers considers the use of subcontractors Perform due diligence/ monitoring on subcontractors to obtain a level of comfort with their control environment. 15

Proper Usage of SOC Reports Identify the correct SOC Report(s) to obtain from your service providers SOC 1 (SSAE 18): A report on a service provider s controls relevant to financial reporting SOC 2: A report on a service provider s controls relevant to the selected Trust Services Criteria (i.e. Security, Availability, Confidentiality, Processing Integrity, and Privacy) These reports may be issued as either a Type I or Type II. A Type I (as of date) assesses only the design of the controls. A Type II (defined time period) assess the design and operating effectiveness of controls. 16

Proper Usage of SOC Reports Collect the correct reports from your service provider Ensure the collected report(s) cover all contracted services or products Ensure the service provider does not just forward the report(s) of their subcontractor(s) Review the reports for content and completeness SOC Reports are not a one-stop shop for fulfilling due diligence and monitoring requirements Use a checklist/ form to guide your review of the reports 17

Proper Usage of SOC Reports What should be done if you obtain the wrong reports or the reports do not include all relevant controls? Contact the service provider and assess if different reports may be available that are more relevant Request additional materials to assess the service provider s control environment (e.g. policies and procedures, internal audit reports, regulatory examinations, etc.) Send the service provider a questionnaire or setup a meeting with their management to discuss the control environment Add the vendor to an internal watch list and report the issue to a designated committee or management to determine an appropriate level of action (e.g. additional monitoring, updating the contractual requirements, or termination of the relationship) 18

Questions! Jason T. Clinton IT Assurance Senior Consultant Phone: 617-261-8132 Email: jclinton@wolfandco.com