SlideShare una empresa de Scribd logo
1 de 63
Enterprise Risk Management and
Emerging Risks
2
Melissa Musser, CPA, CITP, CISA
Director, Risk Advisory – Aronson LLC
Director at Aronson with 15 years of professional experience. Melissa delivers a
comprehensive best-in-class risk based audit approach to respond to financial,
compliance, operational & IT risks for small nonprofits to large global SEC
organizations. Areas of focus include but not limited to:
• Establishing, maintaining and optimizing internal controls and/or Sarbanes
Oxley 404 compliance programs.
• Planning, supervising and executing audits to ensure compliance with
policies and regulations and to monitor achievement of corporate
objectives.
• Developing and supporting Enterprise Risk Management and Internal Audit
programs
Prior to joining Aronson, Melissa spent eight years in public accounting as well as
five years as a manager of corporate and IT internal audit and risk management
for large global SEC organizations. Melissa has sat on numerous nonprofit
boards throughout her career and actively volunteers within her community. She
enjoys regularly sharing her knowledge with audiences as well having published
whitepapers on internal controls.
She has a Bachelor of Science Degree in Accounting with majors in both
Professional Accounting and Accounting Information Systems from the University
of Akron. She received a (PMBOK) Project Management Body of Knowledge
Certificate while there and also holds CPA, CITP and CISA (Certified Information
System Auditor) certifications.
240.364.2598
mmusser@aronsonllc.com
3
Donna McPartland
Privacy, Cybersecurity & Data Protection Counsel - Arent Fox LLP
Donna is Counsel in Arent Fox's Privacy, Cybersecurity & Data Protection practice
group. Formerly Chief Privacy Official at the Graduate Management Admission
Council. At the core of Donna's practice, she draws from nearly 20 years of
experience in the testing, higher education, and nonprofit industries. Donna
works with a variety of clients on their global data privacy and information
security issues, developing privacy programs, advising on cross border data
transfers, developing privacy policies, privacy impact assessments, data
governance programs, navigating information security standards, and addressing
issues in advanced technologies, including biometrics. Donna also advises
nonprofits on their general counsel and transactional matters. Donna has
significant in-house experience that clients can rely on to help them with their
privacy and security matters. Experience includes:
• Global Privacy Program Development and Management (115 countries)
• Cross Border Data Transfer Requirements
• Direct Interaction with EU and other international data protection
authorities (DPAs)
• Privacy Impact Assessments (PIAs)
• Information Security including NIST, ISO, and SOC standards
• Cloud Computing, social media and new technologies
• Biometrics
• Research and Marketing
+202.350.3765 (Work)
donna.mcpartland@arentfox.com
4
Derek Symer
Principal, Senior Vice President, AHT Insurance
Derek Symer, is an experienced Property & Liability Insurance Broker based in
AHT's DC Metro office. Derek focuses in the Nonprofit & Education sectors
including Associations, Think Tanks, NGOs and Educational Institutions including
private colleges and independent schools. In his work, Derek helps his clients
analyze their risk exposures and devise targeted risk transfer and mitigation
strategies to improve their total cost of risk. Within this work, Derek has
particular expertise in Directors & Officers Liability, Cyber Liability, Employment
Practices Liability, Media & Publishers Liability, Event Cancellation, and
International coverage.
In 2005, Derek co-founded the Business Managers Roundtable, a networking and
educational forum for business officers of private & independent schools. Derek
and AHT are members of the National Business Officers Association (NBOA),
American Society of Association Executives (ASAE), and Greater Washington
Society of Certified Public Accountants (GWSCPA).
AHT has been recognized by Business Insurance as a Best Place to Work in
Insurance.
+703.669.1121 (Work)
DSymer@ahtins.com
5
Highlights & Objectives
• Understand the importance of a Enterprise Risk Management
• Identify Risks to your mission / objectives / strategic plan
• Evaluate the likelihood and impact of risks
• Learn about emerging risks and best practices in mitigation
• Assess the overall risk & develop a practical response
6
Purpose
To provide a summary of potential events that may affect your organization and manage
risks to provide reasonable assurance regarding the achievement of your mission and
objectives.
E
R
M
nterprise
isk
anagement
7
Why is ERM on the Rise?
• Regulator demands
• Unanticipated risk events affecting the
organization
• Emerging best practice expectations
• Emerging corporate governance requirements
• Board of Director requests
http://www.aicpa.org/interestareas/businessindustryandgovernment/resources/erm/downloadabledocuments/aicpa_erm_research_study_2017.pdf
8
Why is this Important?
It is a proven methodology to capture your risks and visually rank them
so your organization can make informed decision on how to spend your
budget dollars.
Priorities
9
Work Smarter – Not Harder
10
Balance
Don’t let the loudest person in the room get
all the attention
11
Approach
Build your
ERM
Framework
Identify
Strategic
Objectives
Identify
Risks
Analyze
Quantify &
Prioritize
Risk
Determine
Risk
Mitigation
12
Build your ERM Framework
13
Building a Framework
Things to consider when building your framework
– Framework – ISO vr COSO
– Where to Start – Full rollout? Phased approach?
– What Model to implement- Risk factor vrs objectives
based?
– ERM Organizational position - CRO, CAE, Risk Manager,
Risk Committee?
14
Identify Objectives
Tie into strategy and mission
15
Example Risks to Objective Categories
Collaboration
Risk
Management
& Operational
Risk
Financial Risk
External &
Reputation
Risk
Personnel &
Volunteers
Risk
Grant Risk
16
Brainstorm Risks Events
17
Risk Event Identification Techniques
May include a combination of different types
of techniques combined with supporting
tools:
– Event Inventories
– Internal Analysis & Surveys
– Process Flow Analysis
– Current Events
– Facilitated Workshops and Interviews
18
Analyze, Quantify & Prioritize Risk
19
Methods to Rank Risk
Qualitative
A qualitative analysis would use a scale of "Low, Medium, High" to indicate the
likelihood of a risk event occurring.
Quantitative
A quantitative analysis will determine the probability of each risk event occurring.
For example, Risk #1 has an 80% chance of occurring, Risk #2 has a 27% chance of
occurring, and so on.
Our discussion will focus on qualitative analysis
20
Develop Risk Analysis Matrix
Develop a risk mapping for impact and likelihood to help determine which risks need risk
response. For example:
21
Types of Risk Impact
In order to align discussions around why risk are significant and what should be done about them, you
should consider dividing your analysis in to types of impact:
Strategic
Causes a strategic objective
to fail
Financial
Incurs unanticipated costs or
reduces revenues
Operational
Affects the quality or
efficiency of how work gets
done
Environmental,
Health and Safety
Jeopardizes staff,
volunteers or
others’ well-being
Technology
Exposes application,
data, operating systems, network or
infrastructure to inappropriate
access/change
Legal
Triggers arbitration
or litigation against
your organization
Reputation
Creates negative
media attention
22
Example of a Risk Rating
23
Determine Risk Mitigation
24
Determine Risk Mitigation
Reduce / Mitigate risk
Activities with a high
likelihood of occurring,
but impact is low.
Eliminate / Avoid risk
Activities with a high
likelihood of loss and high
impact.
Share / Transfer risk
Activities with low
likelihood of occurring,
but with a high impact.
Accept risk
If cost-benefit analysis
determines the cost to
mitigate risk is higher than
cost to bear the risk.
25
• Risk transfer involves moving risk to 3rd party via
contractual arrangement
• Insurance is most common Risk Transfer
mechanism
• Outsourcing: risk transfer financial offset – pre
incident assessment planning. loss control
property/cyber penetration testing.
Risk mitigation - Insurance
26
Risk Examples
27
Example Category - Personnel/Volunteers Risk
• Injury at work
• Cause your organizations client injury
• Harm reputation of your organization
• High turnover
• Triggers a cyber security incident
28
Example Category - Financial Risk
• Inaccurate and/or
insufficient financial
information
• No financial planning
(budgeting)
• Lack of financial liquidity
• Poor pricing policy (e.g.,
overpriced activities in
grant applications)
• Excessive indebtedness
• FX losses
• Financial fraud
• High transactional costs
• Inadequate maintenance of
long-term sources of funding
• Inadequate reserves and
cash flow
• Dependence on a low
number of revenue sources
• Inadequate investment policy
• Inadequate insurance
coverage
• Funds used against the intent
of donor/grantor
29
Example Category - Operational Risk
• Not enough beneficiaries
• Not enough well-trained
Personnel
• Uncertainty about
security of assets
• Competition from other
organizations
• Dependence on suppliers
(their strong bargaining
power)
• Ineffective fundraising
system
• Lack of formalized
procedures
• Inefficient and ineffective
IT system
• Implementing activities
in a dangerous
environment
• Natural disaster, fire,
flood, theft
• Deviation from core
mission “in search of”
funding sources
30
Example Category - Management
• Inadequate organization
structure
• Management lacks
adequate experience or
not well organized
• Management dominated
by individual leaders
• Resignation of key
personnel
• Conflict of interest
• Ineffective
communication System
• No direction, strategy,
and plans
31
Example Category - Grant Risk
• Delays in disbursement
• Lack of knowledge and skills to utilize the awarded
grant
• Changes in environment preventing utilization of the
awarded grant
• Undervalued contract
32
Emerging Risks: Privacy / GDPR
Are you ready for the General Data Protection
Regulation (GDPR)? GDPR is the most
important change in privacy in 20 years taking
effect May 25, 2018.
In the future, aspects of the European GDPR
are likely to find their way into other regulation
as well, organizations should start to prepare
their policies and procedures for this.
33
GDPR - Overview
Introduction
GDPR Requirements
Penalties
How it may impact
companies
What companies can do to
comply
34
What is the GDPR?
European Union’s new framework for data protection law replaces the 1995 Directive
One Stop Shop – EU “main establishment” of controller works with Lead Supervisory Authority
Application to Companies Worldwide - Simply offering products to and/or collecting data about
persons in the EU is enough for the law to apply- Applies to Data Controllers and Data Processors
Effective Date – May 25, 2018
35
What is the GDPR? (cont’d)
Principle Based – Purpose limitation, data minimization, accuracy, storage limitation, integrity and
confidentiality, accountability
Lawful Basis Required for Processing Personal Information
Greater Protections and Rights to Individuals in the EU
Privacy Information must be clearly communicated
Data Protection Officers (regular and systematic monitoring on a large scale, or sensitive data, or public
body); Associations representing categories of controllers MAY designate a DPO for their Controllers
Appropriate security of Personal Data
36
GDPR: Penalties, Complaints, Reputation
Penalties
• 20 million euro or up to 4% of total worldwide annual turnover,
whichever is higher
• Member States can impose additional fines not covered by Art. 83
Complaints/Investigations
Reputational Consequences
37
GDPR applies……
• offering or providing goods
or services - even if no
payment is required
• monitoring individuals in
person or online
When a
company
processes an EU
data subject’s
information if
the processing
is related to:
38
GDPR does not apply…
If the data does NOT relate
to an identified or
identifiable natural person
or if the data is rendered
anonymous in such a way
that the data subject is no
longer identifiable. (e.g.
fully anonymized data – no
identifiers; research report
that only includes statistical
information with no
identifiers)
What about pseudonymous
data?
•Pseudonymization is the
separation of data from direct
identifiers so that linkage to an
identity is not possible without
additional information that is held
separately. GDPR promotes the
use of this.
39
GDPR: Controllers and Processors
Controller: company that alone or jointly with others determines
the purposes and means of processing of personal data
Joint Controller: When two or more controllers determine the
purposes and means of processing
Processor: processes data on behalf of the controller
40
GDPR: Processing
Any operation which is
performed on personal
data such as collection,
storage, use, disclosure
by transmission,
dissemination or
otherwise making
available, erasure or
destruction.
Examples: processing
hotel room or
conference registrations
Selling books or online
courses
41
GDPR: What is Personal Data?
"Personal data" is any
information which relates
to a living individual who
can be identified:
• From that information
• From that information
combined with other
information held or
likely to come into the
possession of the
company
 Name
 Postal or work or email address
 Phone number
 ID numbers (e.g. passport, license)
 Location data (usually from devices)
 Bank account details
 Expressions of opinion
 Photographs, sound recordings, film
 IP addresses
 Information stored in cookies or
similar technologies
 Training records
Examples
42
GDPR: What is Sensitive Data?
“Sensitive data requires special
handling, higher protections
Not specifically defined under
the GDPR so Member States
can regulate further
GDPR prohibits their
processing unless exemptions
are in place: explicit consent,
employment obligations, etc.
 Biometric data
 Health and genetic data
(allergies)
 Employment data
 Criminal convictions
 Racial or ethnic data
 Political opinions
 Religious or philosophical
 Trade-union membership
 Sex life or sexual orientation
Examples
43
Data Subject Rights
Increased transparency and creating new rights. Right to Access, Right
to be Forgotten, Data Portability1
Consent
Consent for processing must be freely given, specific, informed and
unambiguous. Strict Requirements – see Art. 29 WP Guidance2
Data Processors and
controllers
More contract requirements to be flowed by controllers to processors
(data processing agreements)
Data Protection by
Design (DPbD)
DPbD is about ensuring that privacy is embedded throughout the
organization and being able to demonstrate compliance to regulators
4
Cross-Border
Transfers
This privacy-compliant cross-border data transfer strategy must
have “adequate protections”5
Data Breach
Notifications
Controllers required to notify competent supervisory authority
and, in certain cases, also to affected data subjects.
Generally within 72 hours.
6
3
GDPR: Key Changes
44
GDPR: Security Requirements
Flexible requirement that takes into account several factors: (1) state of the
art; (2) implementation costs; (3) nature, scope, context and purposes of
processing; (4) risk of varying likelihood and severity for the rights and freedoms
of natural persons
Breach notification requirement: 72 hours or without undue delay
Specific callouts for: encryption, pseudonymization, backups, procedures for
regularly testing/assessing/evaluating effectiveness of security measures
45
Document:
Privacy Policy
Security Policies
Breach Response Plan
Document Retention Plan
Monitor & Enforce:
Encourage
Communication
Make Good Conduct Visible
Manage Employee Error
Processes:
Determine Systems tied to
Data
Employee Outreach
Collaboration
Training
GDPR: What Companies Can Do To Comply?
Organization:
• Assemble Your Team
• Roles & Responsibilities
• Know your data
• Security Obligations
46
GDPR: Data Governance
• Policies – data governance policy with data
classification scheme
• Processes – roadmaps for determining governance
steps
• Data Mapping and Inventory – required to
document all data processing activities in lieu or
notifications/approvals to DPAs
• Vendor Management – who has data, where is it,
and how managed
Data
Governance
47
GDPR: Contracts for Using Processors
Processor must provide contractual guarantees that they use data
security technology and methods that meet GDPR
Gap analysis and legal review of contracts and determine if
amendments need to be made to meet GDPR requirements
Make amendments in order to continue using Processor in
compliance with new requirements
48
GDPR: Data Transfers
Only one part of GDPR compliance – still many other compliance
requirements
Options – need to have “adequate data privacy protections”
• Standard Contractual Clauses
• Privacy Shield - Not for Trade Associations, Other nonprofits, No Banks (must have FTC
jurisdiction)
• Binding Corporate Rules (GDPR gold standard, but complex)
• Country deemed by EU as having “adequate protections” (Argentina, Canada, Israel, New
Zealand, Switzerland, Uruguay - NOT US)
49
GDPR: Standard Contractual Clauses
What are
Standard
Contractual
Clauses?
Pre-approved contractual language to be incorporated into
agreements, unchanged.
Two sets of standard contractual clauses for transfers from data
controllers to data controllers established outside the EU/EEA
and one set for the transfer from controllers to
processors established outside the EU/EEA.
50
GDPR: Data Transfer Exceptions
Consent – must be informed, explicit, more complex under GDPR
Contract – must be necessary for performance or conclusion of a contract or
implementation of pre-contractual measures taken at the data subject's request
Public interest
Legal claims - necessary for the establishment, exercise, or defense of legal claims
Vital interests – necessary to protect the vital interests of data subject or of other persons
(if data subject is physically or legally incapable of giving consent)
51
Emerging Risks: Culture and Conduct
“It takes 20 years to build a reputation, and
five minutes to ruin it. If you think about that,
you’ll do things differently.”
-Warren Buffett
52
Culture and Conduct Risk: Recent Examples
For-Profit
World
Wells Fargo – Banking Scandal
Volkswagen – Emissions Scandal
Individuals Harvey Weinstein
Matt Lauer
Others
Non-Profit
World
Hotchkiss – Tick-Bite = $41 million
NRA
OXFAM
53
Culture & Conduct Risk: Tone from the Top
Ensure cultural values are reflected in the organization’s:
Strategy
Risk
appetite
Compliance
frameworks
ACTIONS
54
Culture & Conduct Risk: Independent Assurance
Organizations should demonstrate due diligence by conducting
independent risk reviews / health checks over the following areas:
Strategy
Policies &
practices Training
Investigation
procedures
Review of
KPIs
55
Emerging Risks: Third-Party
Fees and fines related to third-party risk may
be significant, the long-term brand and
financial impact of reputation loss can be
much worse. A third party engagement can be
ended, reputation loses are often far more
severe than any fine.
56
Why Manage and Assess Third-Party Risks?
Third-Party Risk Examples
Cyber Security Intellectual Property
Theft
Manufacturing Quality
Control
Data Protection Safety / Occupational
Hazard
Money Laundering
Bribery and Corruption Political Exposure Social Responsibility
Fraud Wage and Hour
Violations
Conflict Minerals
57
TPRM – Third Party Risk Management
• TPRM can reduce likelihood of:
 data breach costs
 operational failures
 vendor bankruptcy
 reputation damage
TPRM is the process of analyzing and mitigating risks to your
company by parties OTHER than your own company.
58
TPRM Third-Party Stratification Example
• Critical vendors (10%) – PII + critical systems
Tier I
• Major vendors (40%) – PII OR critical systems
Tier 2
• Vendors (50%) – commodities/low risk
purchases
Tier 3
59
TPRM Third Party Due Diligence Example
Due Diligence is the process by which the vendor is reviewed
to determine its suitability for a given task.
Risk Assessment
(Documentation,
Categories of Risk,
Financial
projections &
review
Insurance Review Background check
Legal Review
Vendor Audits
and/or SOC
reports
60
ERM - Critical Success Factors
Obtain senior
management approval
and involvement
Designate committees or
individuals to champion
Develop Procedures
Involve business
and technical
experts
Formalize reporting to
leadership
61
Develop ERM Procedures
Who is responsible for initiating and conducting risk assessments
Who will participate
What steps will be followed
How disagreements will be handled and resolved
What approvals will be needed
How assessments will be documented
How documentation will be maintained
Use risk assessment criteria to
prioritize risks – identify the most
significant risks to the organization
Mitigation Plans
1
Identify risk mitigation plans for top
10 most significant risks
2 Risk assessment criteria
4
Updated Risk
Universe
• Enterprise Universe
• Survey Results
Formalize Risk Reporting
3 Prioritized risk heat map
63
Any Questions?
mmusser@aronsonllc.com
Melissa Musser
Aronson
240.364.2598
Derek Symer,
AHT
Donna McPartland
Arent Fox
703.669.1121 202.350.3765
donna.mcpartland@arentfox.comDSymer@ahtins.com

Más contenido relacionado

La actualidad más candente

Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Andrew Smart
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceResolver Inc.
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideSlideTeam
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in businessr2financial
 
How to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkHow to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkColleen Beck-Domanico
 
ERM Presentation
ERM PresentationERM Presentation
ERM PresentationH Contrex
 
Integrating Risk Appetite With Strategy Feb 14 2011
Integrating Risk Appetite With Strategy   Feb 14 2011Integrating Risk Appetite With Strategy   Feb 14 2011
Integrating Risk Appetite With Strategy Feb 14 2011Andrew Smart
 
Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides SlideTeam
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Diane Christina
 
Enterprise Risk Management
Enterprise Risk Management Enterprise Risk Management
Enterprise Risk Management GAURAV SHARMA
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentationalygale
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Richard Swartzbaugh
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesSlideTeam
 
Operational risk ppt
Operational risk pptOperational risk ppt
Operational risk pptNehaKamboj10
 
Risk register
Risk registerRisk register
Risk registerAlexAfuya
 
Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard Andrew Smart
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 

La actualidad más candente (20)

Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and Performance
 
Risk management
Risk managementRisk management
Risk management
 
Risk Appetite
Risk AppetiteRisk Appetite
Risk Appetite
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation Slide
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in business
 
How to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkHow to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management Framework
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
Integrating Risk Appetite With Strategy Feb 14 2011
Integrating Risk Appetite With Strategy   Feb 14 2011Integrating Risk Appetite With Strategy   Feb 14 2011
Integrating Risk Appetite With Strategy Feb 14 2011
 
Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)
 
Enterprise Risk Management
Enterprise Risk Management Enterprise Risk Management
Enterprise Risk Management
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentation
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Operational risk ppt
Operational risk pptOperational risk ppt
Operational risk ppt
 
Risk register
Risk registerRisk register
Risk register
 
Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 

Similar a C-Suite’s Guide to Enterprise Risk Management and Emerging Risks

Five Lines of Assurance A New ERM and IA Paradigm
Five Lines of Assurance  A New ERM and IA ParadigmFive Lines of Assurance  A New ERM and IA Paradigm
Five Lines of Assurance A New ERM and IA ParadigmTim Leech
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...Linda Locke Reputation Strategist
 
mr neeraj - day 1 - compliance
mr neeraj - day 1 - compliancemr neeraj - day 1 - compliance
mr neeraj - day 1 - complianceNeeraj Verma
 
#Corpriskforum2016 - Tatiana Budishevskaya
#Corpriskforum2016 - Tatiana Budishevskaya#Corpriskforum2016 - Tatiana Budishevskaya
#Corpriskforum2016 - Tatiana BudishevskayaAlexei Sidorenko, CRMP
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinsteinRamaica Ona
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinsteinAahil Malik
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinsteinSukumar Reddy
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyNICSA
 
Risk management models - Core Consulting
Risk management models - Core ConsultingRisk management models - Core Consulting
Risk management models - Core ConsultingCORE Consulting
 
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...Association for Project Management
 
Abiliti Enterprise Governance 2010[Final]
Abiliti Enterprise Governance 2010[Final]Abiliti Enterprise Governance 2010[Final]
Abiliti Enterprise Governance 2010[Final]Nigel Tebbutt
 
A5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_enA5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_enocasiconference
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...PECB
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...Raleigh ISSA
 
The risk of risks: Reputation risk and resiliency Sept. 2014
The risk of risks: Reputation risk and resiliency Sept. 2014The risk of risks: Reputation risk and resiliency Sept. 2014
The risk of risks: Reputation risk and resiliency Sept. 2014Linda Locke Reputation Strategist
 
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...John Owens
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 

Similar a C-Suite’s Guide to Enterprise Risk Management and Emerging Risks (20)

Five lines of assurance a new paradigm in internal audit & erm
Five lines of assurance a new paradigm in internal audit & ermFive lines of assurance a new paradigm in internal audit & erm
Five lines of assurance a new paradigm in internal audit & erm
 
Five Lines of Assurance A New ERM and IA Paradigm
Five Lines of Assurance  A New ERM and IA ParadigmFive Lines of Assurance  A New ERM and IA Paradigm
Five Lines of Assurance A New ERM and IA Paradigm
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...
 
mr neeraj - day 1 - compliance
mr neeraj - day 1 - compliancemr neeraj - day 1 - compliance
mr neeraj - day 1 - compliance
 
#Corpriskforum2016 - Tatiana Budishevskaya
#Corpriskforum2016 - Tatiana Budishevskaya#Corpriskforum2016 - Tatiana Budishevskaya
#Corpriskforum2016 - Tatiana Budishevskaya
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinstein
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinstein
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinstein
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Risk management models - Core Consulting
Risk management models - Core ConsultingRisk management models - Core Consulting
Risk management models - Core Consulting
 
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
 
Abiliti Enterprise Governance 2010[Final]
Abiliti Enterprise Governance 2010[Final]Abiliti Enterprise Governance 2010[Final]
Abiliti Enterprise Governance 2010[Final]
 
A5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_enA5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_en
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...
 
The risk of risks: Reputation risk and resiliency Sept. 2014
The risk of risks: Reputation risk and resiliency Sept. 2014The risk of risks: Reputation risk and resiliency Sept. 2014
The risk of risks: Reputation risk and resiliency Sept. 2014
 
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 

Más de Aronson LLC

Allocating Direct and Indirect Costs for Nonprofits
Allocating Direct and Indirect Costs for NonprofitsAllocating Direct and Indirect Costs for Nonprofits
Allocating Direct and Indirect Costs for NonprofitsAronson LLC
 
To Bid or Not to Bid, That Is the Question
To Bid or Not to Bid, That Is the QuestionTo Bid or Not to Bid, That Is the Question
To Bid or Not to Bid, That Is the QuestionAronson LLC
 
Webinar: Understanding Business Tax Returns - A Case Study for Family Lawyers
Webinar: Understanding Business Tax Returns - A Case Study for Family LawyersWebinar: Understanding Business Tax Returns - A Case Study for Family Lawyers
Webinar: Understanding Business Tax Returns - A Case Study for Family LawyersAronson LLC
 
Virginia Businesses: STOP Overpaying Local BPOL Tax\
Virginia Businesses: STOP Overpaying Local BPOL Tax\Virginia Businesses: STOP Overpaying Local BPOL Tax\
Virginia Businesses: STOP Overpaying Local BPOL Tax\Aronson LLC
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionAronson LLC
 
Ready to Scale: Moving from Commercial to Government for Construction, Engine...
Ready to Scale: Moving from Commercial to Government for Construction, Engine...Ready to Scale: Moving from Commercial to Government for Construction, Engine...
Ready to Scale: Moving from Commercial to Government for Construction, Engine...Aronson LLC
 
Structuring Indirect Rates
Structuring Indirect RatesStructuring Indirect Rates
Structuring Indirect RatesAronson LLC
 
Surviving the GSA Schedule Contractor Assessment: What They'll Test and How t...
Surviving the GSA Schedule Contractor Assessment: What They'll Test and How t...Surviving the GSA Schedule Contractor Assessment: What They'll Test and How t...
Surviving the GSA Schedule Contractor Assessment: What They'll Test and How t...Aronson LLC
 

Más de Aronson LLC (8)

Allocating Direct and Indirect Costs for Nonprofits
Allocating Direct and Indirect Costs for NonprofitsAllocating Direct and Indirect Costs for Nonprofits
Allocating Direct and Indirect Costs for Nonprofits
 
To Bid or Not to Bid, That Is the Question
To Bid or Not to Bid, That Is the QuestionTo Bid or Not to Bid, That Is the Question
To Bid or Not to Bid, That Is the Question
 
Webinar: Understanding Business Tax Returns - A Case Study for Family Lawyers
Webinar: Understanding Business Tax Returns - A Case Study for Family LawyersWebinar: Understanding Business Tax Returns - A Case Study for Family Lawyers
Webinar: Understanding Business Tax Returns - A Case Study for Family Lawyers
 
Virginia Businesses: STOP Overpaying Local BPOL Tax\
Virginia Businesses: STOP Overpaying Local BPOL Tax\Virginia Businesses: STOP Overpaying Local BPOL Tax\
Virginia Businesses: STOP Overpaying Local BPOL Tax\
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & Construction
 
Ready to Scale: Moving from Commercial to Government for Construction, Engine...
Ready to Scale: Moving from Commercial to Government for Construction, Engine...Ready to Scale: Moving from Commercial to Government for Construction, Engine...
Ready to Scale: Moving from Commercial to Government for Construction, Engine...
 
Structuring Indirect Rates
Structuring Indirect RatesStructuring Indirect Rates
Structuring Indirect Rates
 
Surviving the GSA Schedule Contractor Assessment: What They'll Test and How t...
Surviving the GSA Schedule Contractor Assessment: What They'll Test and How t...Surviving the GSA Schedule Contractor Assessment: What They'll Test and How t...
Surviving the GSA Schedule Contractor Assessment: What They'll Test and How t...
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

C-Suite’s Guide to Enterprise Risk Management and Emerging Risks

  • 1. Enterprise Risk Management and Emerging Risks
  • 2. 2 Melissa Musser, CPA, CITP, CISA Director, Risk Advisory – Aronson LLC Director at Aronson with 15 years of professional experience. Melissa delivers a comprehensive best-in-class risk based audit approach to respond to financial, compliance, operational & IT risks for small nonprofits to large global SEC organizations. Areas of focus include but not limited to: • Establishing, maintaining and optimizing internal controls and/or Sarbanes Oxley 404 compliance programs. • Planning, supervising and executing audits to ensure compliance with policies and regulations and to monitor achievement of corporate objectives. • Developing and supporting Enterprise Risk Management and Internal Audit programs Prior to joining Aronson, Melissa spent eight years in public accounting as well as five years as a manager of corporate and IT internal audit and risk management for large global SEC organizations. Melissa has sat on numerous nonprofit boards throughout her career and actively volunteers within her community. She enjoys regularly sharing her knowledge with audiences as well having published whitepapers on internal controls. She has a Bachelor of Science Degree in Accounting with majors in both Professional Accounting and Accounting Information Systems from the University of Akron. She received a (PMBOK) Project Management Body of Knowledge Certificate while there and also holds CPA, CITP and CISA (Certified Information System Auditor) certifications. 240.364.2598 mmusser@aronsonllc.com
  • 3. 3 Donna McPartland Privacy, Cybersecurity & Data Protection Counsel - Arent Fox LLP Donna is Counsel in Arent Fox's Privacy, Cybersecurity & Data Protection practice group. Formerly Chief Privacy Official at the Graduate Management Admission Council. At the core of Donna's practice, she draws from nearly 20 years of experience in the testing, higher education, and nonprofit industries. Donna works with a variety of clients on their global data privacy and information security issues, developing privacy programs, advising on cross border data transfers, developing privacy policies, privacy impact assessments, data governance programs, navigating information security standards, and addressing issues in advanced technologies, including biometrics. Donna also advises nonprofits on their general counsel and transactional matters. Donna has significant in-house experience that clients can rely on to help them with their privacy and security matters. Experience includes: • Global Privacy Program Development and Management (115 countries) • Cross Border Data Transfer Requirements • Direct Interaction with EU and other international data protection authorities (DPAs) • Privacy Impact Assessments (PIAs) • Information Security including NIST, ISO, and SOC standards • Cloud Computing, social media and new technologies • Biometrics • Research and Marketing +202.350.3765 (Work) donna.mcpartland@arentfox.com
  • 4. 4 Derek Symer Principal, Senior Vice President, AHT Insurance Derek Symer, is an experienced Property & Liability Insurance Broker based in AHT's DC Metro office. Derek focuses in the Nonprofit & Education sectors including Associations, Think Tanks, NGOs and Educational Institutions including private colleges and independent schools. In his work, Derek helps his clients analyze their risk exposures and devise targeted risk transfer and mitigation strategies to improve their total cost of risk. Within this work, Derek has particular expertise in Directors & Officers Liability, Cyber Liability, Employment Practices Liability, Media & Publishers Liability, Event Cancellation, and International coverage. In 2005, Derek co-founded the Business Managers Roundtable, a networking and educational forum for business officers of private & independent schools. Derek and AHT are members of the National Business Officers Association (NBOA), American Society of Association Executives (ASAE), and Greater Washington Society of Certified Public Accountants (GWSCPA). AHT has been recognized by Business Insurance as a Best Place to Work in Insurance. +703.669.1121 (Work) DSymer@ahtins.com
  • 5. 5 Highlights & Objectives • Understand the importance of a Enterprise Risk Management • Identify Risks to your mission / objectives / strategic plan • Evaluate the likelihood and impact of risks • Learn about emerging risks and best practices in mitigation • Assess the overall risk & develop a practical response
  • 6. 6 Purpose To provide a summary of potential events that may affect your organization and manage risks to provide reasonable assurance regarding the achievement of your mission and objectives. E R M nterprise isk anagement
  • 7. 7 Why is ERM on the Rise? • Regulator demands • Unanticipated risk events affecting the organization • Emerging best practice expectations • Emerging corporate governance requirements • Board of Director requests http://www.aicpa.org/interestareas/businessindustryandgovernment/resources/erm/downloadabledocuments/aicpa_erm_research_study_2017.pdf
  • 8. 8 Why is this Important? It is a proven methodology to capture your risks and visually rank them so your organization can make informed decision on how to spend your budget dollars. Priorities
  • 9. 9 Work Smarter – Not Harder
  • 10. 10 Balance Don’t let the loudest person in the room get all the attention
  • 12. 12 Build your ERM Framework
  • 13. 13 Building a Framework Things to consider when building your framework – Framework – ISO vr COSO – Where to Start – Full rollout? Phased approach? – What Model to implement- Risk factor vrs objectives based? – ERM Organizational position - CRO, CAE, Risk Manager, Risk Committee?
  • 14. 14 Identify Objectives Tie into strategy and mission
  • 15. 15 Example Risks to Objective Categories Collaboration Risk Management & Operational Risk Financial Risk External & Reputation Risk Personnel & Volunteers Risk Grant Risk
  • 17. 17 Risk Event Identification Techniques May include a combination of different types of techniques combined with supporting tools: – Event Inventories – Internal Analysis & Surveys – Process Flow Analysis – Current Events – Facilitated Workshops and Interviews
  • 18. 18 Analyze, Quantify & Prioritize Risk
  • 19. 19 Methods to Rank Risk Qualitative A qualitative analysis would use a scale of "Low, Medium, High" to indicate the likelihood of a risk event occurring. Quantitative A quantitative analysis will determine the probability of each risk event occurring. For example, Risk #1 has an 80% chance of occurring, Risk #2 has a 27% chance of occurring, and so on. Our discussion will focus on qualitative analysis
  • 20. 20 Develop Risk Analysis Matrix Develop a risk mapping for impact and likelihood to help determine which risks need risk response. For example:
  • 21. 21 Types of Risk Impact In order to align discussions around why risk are significant and what should be done about them, you should consider dividing your analysis in to types of impact: Strategic Causes a strategic objective to fail Financial Incurs unanticipated costs or reduces revenues Operational Affects the quality or efficiency of how work gets done Environmental, Health and Safety Jeopardizes staff, volunteers or others’ well-being Technology Exposes application, data, operating systems, network or infrastructure to inappropriate access/change Legal Triggers arbitration or litigation against your organization Reputation Creates negative media attention
  • 22. 22 Example of a Risk Rating
  • 24. 24 Determine Risk Mitigation Reduce / Mitigate risk Activities with a high likelihood of occurring, but impact is low. Eliminate / Avoid risk Activities with a high likelihood of loss and high impact. Share / Transfer risk Activities with low likelihood of occurring, but with a high impact. Accept risk If cost-benefit analysis determines the cost to mitigate risk is higher than cost to bear the risk.
  • 25. 25 • Risk transfer involves moving risk to 3rd party via contractual arrangement • Insurance is most common Risk Transfer mechanism • Outsourcing: risk transfer financial offset – pre incident assessment planning. loss control property/cyber penetration testing. Risk mitigation - Insurance
  • 27. 27 Example Category - Personnel/Volunteers Risk • Injury at work • Cause your organizations client injury • Harm reputation of your organization • High turnover • Triggers a cyber security incident
  • 28. 28 Example Category - Financial Risk • Inaccurate and/or insufficient financial information • No financial planning (budgeting) • Lack of financial liquidity • Poor pricing policy (e.g., overpriced activities in grant applications) • Excessive indebtedness • FX losses • Financial fraud • High transactional costs • Inadequate maintenance of long-term sources of funding • Inadequate reserves and cash flow • Dependence on a low number of revenue sources • Inadequate investment policy • Inadequate insurance coverage • Funds used against the intent of donor/grantor
  • 29. 29 Example Category - Operational Risk • Not enough beneficiaries • Not enough well-trained Personnel • Uncertainty about security of assets • Competition from other organizations • Dependence on suppliers (their strong bargaining power) • Ineffective fundraising system • Lack of formalized procedures • Inefficient and ineffective IT system • Implementing activities in a dangerous environment • Natural disaster, fire, flood, theft • Deviation from core mission “in search of” funding sources
  • 30. 30 Example Category - Management • Inadequate organization structure • Management lacks adequate experience or not well organized • Management dominated by individual leaders • Resignation of key personnel • Conflict of interest • Ineffective communication System • No direction, strategy, and plans
  • 31. 31 Example Category - Grant Risk • Delays in disbursement • Lack of knowledge and skills to utilize the awarded grant • Changes in environment preventing utilization of the awarded grant • Undervalued contract
  • 32. 32 Emerging Risks: Privacy / GDPR Are you ready for the General Data Protection Regulation (GDPR)? GDPR is the most important change in privacy in 20 years taking effect May 25, 2018. In the future, aspects of the European GDPR are likely to find their way into other regulation as well, organizations should start to prepare their policies and procedures for this.
  • 33. 33 GDPR - Overview Introduction GDPR Requirements Penalties How it may impact companies What companies can do to comply
  • 34. 34 What is the GDPR? European Union’s new framework for data protection law replaces the 1995 Directive One Stop Shop – EU “main establishment” of controller works with Lead Supervisory Authority Application to Companies Worldwide - Simply offering products to and/or collecting data about persons in the EU is enough for the law to apply- Applies to Data Controllers and Data Processors Effective Date – May 25, 2018
  • 35. 35 What is the GDPR? (cont’d) Principle Based – Purpose limitation, data minimization, accuracy, storage limitation, integrity and confidentiality, accountability Lawful Basis Required for Processing Personal Information Greater Protections and Rights to Individuals in the EU Privacy Information must be clearly communicated Data Protection Officers (regular and systematic monitoring on a large scale, or sensitive data, or public body); Associations representing categories of controllers MAY designate a DPO for their Controllers Appropriate security of Personal Data
  • 36. 36 GDPR: Penalties, Complaints, Reputation Penalties • 20 million euro or up to 4% of total worldwide annual turnover, whichever is higher • Member States can impose additional fines not covered by Art. 83 Complaints/Investigations Reputational Consequences
  • 37. 37 GDPR applies…… • offering or providing goods or services - even if no payment is required • monitoring individuals in person or online When a company processes an EU data subject’s information if the processing is related to:
  • 38. 38 GDPR does not apply… If the data does NOT relate to an identified or identifiable natural person or if the data is rendered anonymous in such a way that the data subject is no longer identifiable. (e.g. fully anonymized data – no identifiers; research report that only includes statistical information with no identifiers) What about pseudonymous data? •Pseudonymization is the separation of data from direct identifiers so that linkage to an identity is not possible without additional information that is held separately. GDPR promotes the use of this.
  • 39. 39 GDPR: Controllers and Processors Controller: company that alone or jointly with others determines the purposes and means of processing of personal data Joint Controller: When two or more controllers determine the purposes and means of processing Processor: processes data on behalf of the controller
  • 40. 40 GDPR: Processing Any operation which is performed on personal data such as collection, storage, use, disclosure by transmission, dissemination or otherwise making available, erasure or destruction. Examples: processing hotel room or conference registrations Selling books or online courses
  • 41. 41 GDPR: What is Personal Data? "Personal data" is any information which relates to a living individual who can be identified: • From that information • From that information combined with other information held or likely to come into the possession of the company  Name  Postal or work or email address  Phone number  ID numbers (e.g. passport, license)  Location data (usually from devices)  Bank account details  Expressions of opinion  Photographs, sound recordings, film  IP addresses  Information stored in cookies or similar technologies  Training records Examples
  • 42. 42 GDPR: What is Sensitive Data? “Sensitive data requires special handling, higher protections Not specifically defined under the GDPR so Member States can regulate further GDPR prohibits their processing unless exemptions are in place: explicit consent, employment obligations, etc.  Biometric data  Health and genetic data (allergies)  Employment data  Criminal convictions  Racial or ethnic data  Political opinions  Religious or philosophical  Trade-union membership  Sex life or sexual orientation Examples
  • 43. 43 Data Subject Rights Increased transparency and creating new rights. Right to Access, Right to be Forgotten, Data Portability1 Consent Consent for processing must be freely given, specific, informed and unambiguous. Strict Requirements – see Art. 29 WP Guidance2 Data Processors and controllers More contract requirements to be flowed by controllers to processors (data processing agreements) Data Protection by Design (DPbD) DPbD is about ensuring that privacy is embedded throughout the organization and being able to demonstrate compliance to regulators 4 Cross-Border Transfers This privacy-compliant cross-border data transfer strategy must have “adequate protections”5 Data Breach Notifications Controllers required to notify competent supervisory authority and, in certain cases, also to affected data subjects. Generally within 72 hours. 6 3 GDPR: Key Changes
  • 44. 44 GDPR: Security Requirements Flexible requirement that takes into account several factors: (1) state of the art; (2) implementation costs; (3) nature, scope, context and purposes of processing; (4) risk of varying likelihood and severity for the rights and freedoms of natural persons Breach notification requirement: 72 hours or without undue delay Specific callouts for: encryption, pseudonymization, backups, procedures for regularly testing/assessing/evaluating effectiveness of security measures
  • 45. 45 Document: Privacy Policy Security Policies Breach Response Plan Document Retention Plan Monitor & Enforce: Encourage Communication Make Good Conduct Visible Manage Employee Error Processes: Determine Systems tied to Data Employee Outreach Collaboration Training GDPR: What Companies Can Do To Comply? Organization: • Assemble Your Team • Roles & Responsibilities • Know your data • Security Obligations
  • 46. 46 GDPR: Data Governance • Policies – data governance policy with data classification scheme • Processes – roadmaps for determining governance steps • Data Mapping and Inventory – required to document all data processing activities in lieu or notifications/approvals to DPAs • Vendor Management – who has data, where is it, and how managed Data Governance
  • 47. 47 GDPR: Contracts for Using Processors Processor must provide contractual guarantees that they use data security technology and methods that meet GDPR Gap analysis and legal review of contracts and determine if amendments need to be made to meet GDPR requirements Make amendments in order to continue using Processor in compliance with new requirements
  • 48. 48 GDPR: Data Transfers Only one part of GDPR compliance – still many other compliance requirements Options – need to have “adequate data privacy protections” • Standard Contractual Clauses • Privacy Shield - Not for Trade Associations, Other nonprofits, No Banks (must have FTC jurisdiction) • Binding Corporate Rules (GDPR gold standard, but complex) • Country deemed by EU as having “adequate protections” (Argentina, Canada, Israel, New Zealand, Switzerland, Uruguay - NOT US)
  • 49. 49 GDPR: Standard Contractual Clauses What are Standard Contractual Clauses? Pre-approved contractual language to be incorporated into agreements, unchanged. Two sets of standard contractual clauses for transfers from data controllers to data controllers established outside the EU/EEA and one set for the transfer from controllers to processors established outside the EU/EEA.
  • 50. 50 GDPR: Data Transfer Exceptions Consent – must be informed, explicit, more complex under GDPR Contract – must be necessary for performance or conclusion of a contract or implementation of pre-contractual measures taken at the data subject's request Public interest Legal claims - necessary for the establishment, exercise, or defense of legal claims Vital interests – necessary to protect the vital interests of data subject or of other persons (if data subject is physically or legally incapable of giving consent)
  • 51. 51 Emerging Risks: Culture and Conduct “It takes 20 years to build a reputation, and five minutes to ruin it. If you think about that, you’ll do things differently.” -Warren Buffett
  • 52. 52 Culture and Conduct Risk: Recent Examples For-Profit World Wells Fargo – Banking Scandal Volkswagen – Emissions Scandal Individuals Harvey Weinstein Matt Lauer Others Non-Profit World Hotchkiss – Tick-Bite = $41 million NRA OXFAM
  • 53. 53 Culture & Conduct Risk: Tone from the Top Ensure cultural values are reflected in the organization’s: Strategy Risk appetite Compliance frameworks ACTIONS
  • 54. 54 Culture & Conduct Risk: Independent Assurance Organizations should demonstrate due diligence by conducting independent risk reviews / health checks over the following areas: Strategy Policies & practices Training Investigation procedures Review of KPIs
  • 55. 55 Emerging Risks: Third-Party Fees and fines related to third-party risk may be significant, the long-term brand and financial impact of reputation loss can be much worse. A third party engagement can be ended, reputation loses are often far more severe than any fine.
  • 56. 56 Why Manage and Assess Third-Party Risks? Third-Party Risk Examples Cyber Security Intellectual Property Theft Manufacturing Quality Control Data Protection Safety / Occupational Hazard Money Laundering Bribery and Corruption Political Exposure Social Responsibility Fraud Wage and Hour Violations Conflict Minerals
  • 57. 57 TPRM – Third Party Risk Management • TPRM can reduce likelihood of:  data breach costs  operational failures  vendor bankruptcy  reputation damage TPRM is the process of analyzing and mitigating risks to your company by parties OTHER than your own company.
  • 58. 58 TPRM Third-Party Stratification Example • Critical vendors (10%) – PII + critical systems Tier I • Major vendors (40%) – PII OR critical systems Tier 2 • Vendors (50%) – commodities/low risk purchases Tier 3
  • 59. 59 TPRM Third Party Due Diligence Example Due Diligence is the process by which the vendor is reviewed to determine its suitability for a given task. Risk Assessment (Documentation, Categories of Risk, Financial projections & review Insurance Review Background check Legal Review Vendor Audits and/or SOC reports
  • 60. 60 ERM - Critical Success Factors Obtain senior management approval and involvement Designate committees or individuals to champion Develop Procedures Involve business and technical experts Formalize reporting to leadership
  • 61. 61 Develop ERM Procedures Who is responsible for initiating and conducting risk assessments Who will participate What steps will be followed How disagreements will be handled and resolved What approvals will be needed How assessments will be documented How documentation will be maintained
  • 62. Use risk assessment criteria to prioritize risks – identify the most significant risks to the organization Mitigation Plans 1 Identify risk mitigation plans for top 10 most significant risks 2 Risk assessment criteria 4 Updated Risk Universe • Enterprise Universe • Survey Results Formalize Risk Reporting 3 Prioritized risk heat map
  • 63. 63 Any Questions? mmusser@aronsonllc.com Melissa Musser Aronson 240.364.2598 Derek Symer, AHT Donna McPartland Arent Fox 703.669.1121 202.350.3765 donna.mcpartland@arentfox.comDSymer@ahtins.com

Notas del editor

  1. Here it is in simple terms - End goal providing the board with the top 10 to 20 enterpirse wide risks identified and the plan to approach the risk but in realtity so much more is happening when you impliemtn ERM – by preforming these exercises to gather and assess risks it assist in creating a culture developed around risk-aware / risk consious decision-making throughout the organization. Invaluable! It changes the cuture. 6 Fundamental benefits of elevating risk management to a strategic level   Reduce unacceptable performance variables Align and integrate varying views of risk management (eliminate silos) Build confidence of investment community and stakeholders Enhance corporate governance Successfully respond to a changing business environment Align strategy and corporate culture   ERM is a structured, consistent and continuous risk management process that is applied systematically across the entire organization. ERM drives value by:  Proactively identifying, assessing, and prioritizing significant risks  Developing and deploying effective mitigation strategies  Aligning with strategic objectives and business processes  Embedding key components into the organization’s culture:  Risk ownership, governance and oversight  Reporting and communications  Leveraging technology and tools  ERM is:  based on the Board’s and management’s expectations regarding acceptable levels of risk (“risk appetite”)
  2. Melissa So to continue with the theme of why this is important – last but not least – it helps you prioritize the already limited recourses that you have. Helps with smart budgeting – you can allocate resources in your budget to hire certain skill sets, certain technologies to help mitigate risks. Helps you be proactive rather than reactive
  3. An understanding of the entity’s objectives is essential to the success of your ERM program. Risks are defined as events that can prevent the achievement of objectives and are prioritized in risk assessments based in part on their impact to achieving objectives. Collaboration Risk Organization want to work internationally Specific Example of those risks are provided in later slides
  4. Note that the mitigation plan can be the next column for High risk and above
  5. Transition to Derek Note that we will go over risk examples and a deep dive on emerging risks – then will circle back to ERM critical success factors.
  6. For-Profit World Wells Fargo – Banking Scandal Volkswagen – Emissions Scandal Individuals Harvey Weinstein Matt Lauer Others Non-Profit World Hotchkiss – Tick-Bite = $41 million NRA OXFAM
  7. Consider annual board retreats where strategic plan is updated, enterprise risk management initiatives and townhall gatherings into your annual activities to ensure proper tone is conveyed from strategy to employee. Top management should be the example, not the exception. Ensure direct access to the leadership team is available and that there is a process in place for reporting culture, conduct and compliance issues. Whistleblower and Non-retaliation policies - Consider creating a policy or reviewing your existing one for adequacy Ensure that the organization incentives and/or internal promotions are linked to good conduct.
  8. Demonstrate Due Dilligence. Basic Employment Law Interviewing Skills Performance Reviews Sexual Harassment Supervisory Skills Diversity and inclusion Internaltional Travel – Due Dilligence
  9. 1. Soha Systems Survey on Third Party Risk Management notes that 63% of all data breaches can be attributed to a third party vendor. 2. Dependency on Vendors can create business continuity risks – Question to ask yourself is…If their services stopped would it interrupt our operations? (i.e. IT supplier or key role in the supply chain)? 3. Do your vendors interface with your financial systems? Synchronization risks can lead to a material misstatement.
  10. Due diligence is an ongoing activity, including review, monitoring, and management communication over the entire vendor lifecycle!
  11. Assess your current environment Develop a 3rd party framework based on your organizations context Develop a risk stratification guidelines to highlight risks by vendor Implement and conduct vendor assessments Establish a reporting process
  12. Competition is good. Don’t decide on a vendor too early in the process. Best price does not equal best vendor, focus on meeting your requirements Audit your process
  13. Develop and document procedures for conducting risk assessments and develop templates and tools to facilitate and standardize the process The procedures generally contain the following information:
  14. How are risks communicated from the business unit leaders to senior executives? Scheduled agenda discussion at management meetings Written reports prepared either monthly, quarterly or annually