SlideShare una empresa de Scribd logo
1 de 9
RISK
FRAMEWORK
Enterprise Risk Management – Traditional and Emerging Components
Today’s ERM is composed of both traditional and emerging risks – both being key considerations for risk frameworks.
ERM
TRADITIONAL RISK
EMERGING RISK
Cyber – Data Privacy, Terrorism,
Cyber Threats
Disruptive Innovation – FinTech,
Digital Profiles, Technologies (AI,
Blockchain..) & Social Media
Other…
Conduct and Culture – Ethics,
Behaviour and MI Reporting
CRO – Operational, Regulatory and
Compliance Risk
CIO – Data, Analytics and Security
CTO – Systems and Technology
Infrastructure
Progressive,
integrated, and
thematic
Hierarchal, siloed
and aligned to ‘three-
lines of defence’
model
Enterprise Risk Framework – Integrated Risk Framework
Cyber
Disruptive
Innovation
Conduct and
Culture
Metrics and Reporting
Investigation Management and Financial Intelligence Unit
Case Management
Analytics
Data Management
Data Storage
• KPIs/KRIs
• Operational MI
• Visualisation
• Data aggregation
• Model performance
• Risk assessment
• Holistic customer risk
• Cross Function investigation
• Case management analytics
• Document management
• Work flow
• Consolidation & scoring
• Case analytics
• Holistic data view
• Model optimisation
• Model management
• Anomaly /Pattern analysis
• Predictive analytics
• Peer analysis
• Data policy & governance
• Data integrity
• Data Compliance & Protection
• Data validation
• Data interfaces
• List management
• Internal data
• External data
• Relational data
• Unstructured data
• SLA management including third parties
Common KPIs, metrics or functional accountabilities /
capabilities (Industry wise & Country wise)
Emerging Risks
Framework aligns closely with business units and technology groups to enhance risk capabilities, focusing on developing more adequate
models for addressing the emerging risks.
Traditional
Risks
DISCOVER
with insight
DESCRIBE
with impact
CO-CREATE
with agility
SUSTAIN
with improvement
SCALE
with excellence
Infringement of the EU GDPR can result in administrative fines of up to 4% of annual global
turnover or €20 million – whichever is greater.
CCPA (California Consumer Privacy Act) penalties in the law can include up to $7,500 per
violation. Effective from Jan 1st 2020
Erwin’s 2018 state of Data Governance Report states that only 6% of the companies are
prepared for Data Compliance & Protection regulations.
Brazil’s version of GDPR going live in February 2020, followed by 104 more countries who are
in process of drafting their own Data Compliance & Protection regulations.
Challenge -> Opportunity
Upcoming Challenges leading to huge opportunities
Note: In this case considered Data Compliance & Protection Risk Opportunity
From Burden… ..to Opportunity…
…to Strategic Market
Differentiation…
Target Audience: Across all Industries, Mid level Enterprises in respective countries where DCP law is applicable.
Risk Based
Decision Making
Digital Experience
Agile Enterprise
Enterprise Risk Framework Capability
Customer
Digital Experience
Enables the office of the CRO to drive digital
capabilities and minimize brand and reputational
risk through digital technologies. Includes:
• Upskill capabilities and improves risk culture
• Mitigate loss to customers and shareholders
• Value Realization
• Customer security and experience
Risk Based Decision Making and Profitable Growth
Uses a single-source of data and predictive analytics to measure and
assess value creation opportunities across the enterprise. Includes:
• Business risk analysis
• Integrated Risk Investment decisions
• Quantification of risk impacts
• Reduced risk capital allocation
• Risk based pricing and scenario analysis
Cost to Serve
Agile Enterprise
Helps clients strategise and design new digital risk
operating models that integrate front to middle
and back office activities across multiple
processes risks focused on achieving business
outcomes. Includes:
• Multi functional and empowered workforce
• Scalable and adaptable
• Influence and span of control
• Speed to consumer (both business and end
customer
Strategic Cost and Risk Reduction
Reduce cost of control and cost to serve through rationalization
of control measures and long term operation cost benefit of
improved technologies. Includes:
• Lower yearly rate of internal audit risk services
• Lower cost to serve
• Reduce regulatory cost
What value can be gained across the Organization ?
Enterprise Risk Framework – Value Proposition
REGULATORY CHALLENGE
Increasing demand from multiple regulators in
multiple jurisdictions
TALENT CHALLENGE
Shortage of skills in new and
emerging technologies
Shortage of core risk management
talent and skills
TECHNOLOGY CHALLENGE
Increased velocity, variety and
volume of data
Legacy technologies within the risk function
INTEGRATION CHALLENGE
Lack of integration with other business
functions, e.g. front office, operations, finance
OVERALL RETAIL COMMERCIAL
Sample Research Reports
High
Medium
High
High
High
Medium
How advanced is your institution’s use of the
following technologies?
What technologies enable your risk function to
address cost pressures?
Priority risk management capabilities to strengthen
Lack of integration with other business functions
was a challenge that impeded the effectiveness of
the risk function
Questions to C-Suite
Medium High Medium
High High High
Sample View of Banking Risk Assessment Heatmap
Research Insights across each Industry on Annual basis region-wise can be provided providing heatmaps of Regulatory Challenge, Talent
Challenge, Technology Challenge and Integration Challenge.
78% 81% 75%
78% 78% 78%
APPENDIX
Cyber & Disruptive Innovation – How to assess and report
Cyber threats are increasing and as the world becomes digitised and sensitive data resides in the cloud, on mobile devices and across the Internet, organizations
need to take an integrated view of their operational risk and cyber security. Disruptive innovations and digital technologies are sweeping across each Industry,
forcing a change in business and operating models. In the digital world, reputation and brand can quickly erode.
1
The Problem?
2
What can Risk do?
3
What is the Value?
Intensified customer power and
behaviour with new competition
appearing overnight
New commercial environment
creates new and unknown metrics
Integrate digital risk operating
model with integrated real time
KPIs/KRIs
Overlay reputational risk
management solutions such as
Social Media Monitoring
Customer Risk Analytics improve
returns and business decisioning (fraud,
marketing, customer, pricing, product)
Employ dedicated resources to sufficiently
understand digital risk and issues
Better devices and better connectivity
improve user experience, but create
an entry point for business risks
Increased knowledge understanding and
capital creates a proactive organisation
Real-time KPI/KRI help make strategic
decisions more rapidly and effectively
minimising cost and loss
Cyber attacks are a matter of
“when” not “if”
Cyber threats are growing and under
increasing scrutiny from regulators
Institutions must build resilience
into their business
Embrace a digital Ecosystem; robust
digital capabilities and technologies
outside the enterprise.
Manage digitally; requires real-
time orchestration of myriad
internal and external services.
Institutionalize resilience; ingrained at the
outset into objectives, strategies, processes,
technologies—and even culture.
Reduce potential business impact by
having robust crisis and continuity data
breach procedure
Proactive detection to identify, assess
and correct weak and vulnerable
operations within your business
Prevent reputational damage and mitigate
potential harm to customers and shareholders
Across the three common categories of data governance, vendors are on average very mature with over 66% of companies at growth stage of
development.
Data Privacy and Protection Vendor Sources
DATA CLASSIFICATION
(Few Examples)
ENCRYPTION
(Few Examples)
DATA LOSS PREVENTION (DLP)
(Few Examples)
Other Indicative Data Sources for Proposed Framework
 Assessment & Gap Analysis based on Industry and how big the organization volume of data
 Roadmap Design & Execution - Identify tactical remediation for prioritized areas to ensure key mandatory requirements
 Data Discovery & Knowledge Graphs - Identifying critical data on systems and records of data processing/ storage with data
subjects, legal basis, etc. through machine-learning driven data discovery.
 Continuous Monitoring & Tracking - Execution of tactical remediation recommended from roadmap through changes in processes,
policies and procedures.
 Risk to Advantage – Converting risk into a competitive advantage
Source: DLP, Encryption, Data Classification Individual Website sources and Owler

Más contenido relacionado

Similar a Risk Product.pptx

Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deckSusanna Harper
 
00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leoguiabusinessmedia
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Cognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challengeCognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challengeAlan Hsiao
 
Big Data and MDM altogether: the winning association
Big Data and MDM altogether: the winning associationBig Data and MDM altogether: the winning association
Big Data and MDM altogether: the winning associationJean-Michel Franco
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxSymptai Consulting Limited
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Make Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINERMake Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINERLeonardo Couto
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh ShanmughanathanSharath Kumar
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...RapidValue
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Digitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue SolutionsDigitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue SolutionsRadhakrishnan Iyer
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 

Similar a Risk Product.pptx (20)

Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Cognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challengeCognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challenge
 
Big Data and MDM altogether: the winning association
Big Data and MDM altogether: the winning associationBig Data and MDM altogether: the winning association
Big Data and MDM altogether: the winning association
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Make Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINERMake Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINER
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Digitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue SolutionsDigitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue Solutions
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 

Último

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 

Último (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

Risk Product.pptx

  • 2. Enterprise Risk Management – Traditional and Emerging Components Today’s ERM is composed of both traditional and emerging risks – both being key considerations for risk frameworks. ERM TRADITIONAL RISK EMERGING RISK Cyber – Data Privacy, Terrorism, Cyber Threats Disruptive Innovation – FinTech, Digital Profiles, Technologies (AI, Blockchain..) & Social Media Other… Conduct and Culture – Ethics, Behaviour and MI Reporting CRO – Operational, Regulatory and Compliance Risk CIO – Data, Analytics and Security CTO – Systems and Technology Infrastructure Progressive, integrated, and thematic Hierarchal, siloed and aligned to ‘three- lines of defence’ model
  • 3. Enterprise Risk Framework – Integrated Risk Framework Cyber Disruptive Innovation Conduct and Culture Metrics and Reporting Investigation Management and Financial Intelligence Unit Case Management Analytics Data Management Data Storage • KPIs/KRIs • Operational MI • Visualisation • Data aggregation • Model performance • Risk assessment • Holistic customer risk • Cross Function investigation • Case management analytics • Document management • Work flow • Consolidation & scoring • Case analytics • Holistic data view • Model optimisation • Model management • Anomaly /Pattern analysis • Predictive analytics • Peer analysis • Data policy & governance • Data integrity • Data Compliance & Protection • Data validation • Data interfaces • List management • Internal data • External data • Relational data • Unstructured data • SLA management including third parties Common KPIs, metrics or functional accountabilities / capabilities (Industry wise & Country wise) Emerging Risks Framework aligns closely with business units and technology groups to enhance risk capabilities, focusing on developing more adequate models for addressing the emerging risks. Traditional Risks DISCOVER with insight DESCRIBE with impact CO-CREATE with agility SUSTAIN with improvement SCALE with excellence
  • 4. Infringement of the EU GDPR can result in administrative fines of up to 4% of annual global turnover or €20 million – whichever is greater. CCPA (California Consumer Privacy Act) penalties in the law can include up to $7,500 per violation. Effective from Jan 1st 2020 Erwin’s 2018 state of Data Governance Report states that only 6% of the companies are prepared for Data Compliance & Protection regulations. Brazil’s version of GDPR going live in February 2020, followed by 104 more countries who are in process of drafting their own Data Compliance & Protection regulations. Challenge -> Opportunity Upcoming Challenges leading to huge opportunities Note: In this case considered Data Compliance & Protection Risk Opportunity From Burden… ..to Opportunity… …to Strategic Market Differentiation… Target Audience: Across all Industries, Mid level Enterprises in respective countries where DCP law is applicable.
  • 5. Risk Based Decision Making Digital Experience Agile Enterprise Enterprise Risk Framework Capability Customer Digital Experience Enables the office of the CRO to drive digital capabilities and minimize brand and reputational risk through digital technologies. Includes: • Upskill capabilities and improves risk culture • Mitigate loss to customers and shareholders • Value Realization • Customer security and experience Risk Based Decision Making and Profitable Growth Uses a single-source of data and predictive analytics to measure and assess value creation opportunities across the enterprise. Includes: • Business risk analysis • Integrated Risk Investment decisions • Quantification of risk impacts • Reduced risk capital allocation • Risk based pricing and scenario analysis Cost to Serve Agile Enterprise Helps clients strategise and design new digital risk operating models that integrate front to middle and back office activities across multiple processes risks focused on achieving business outcomes. Includes: • Multi functional and empowered workforce • Scalable and adaptable • Influence and span of control • Speed to consumer (both business and end customer Strategic Cost and Risk Reduction Reduce cost of control and cost to serve through rationalization of control measures and long term operation cost benefit of improved technologies. Includes: • Lower yearly rate of internal audit risk services • Lower cost to serve • Reduce regulatory cost What value can be gained across the Organization ? Enterprise Risk Framework – Value Proposition
  • 6. REGULATORY CHALLENGE Increasing demand from multiple regulators in multiple jurisdictions TALENT CHALLENGE Shortage of skills in new and emerging technologies Shortage of core risk management talent and skills TECHNOLOGY CHALLENGE Increased velocity, variety and volume of data Legacy technologies within the risk function INTEGRATION CHALLENGE Lack of integration with other business functions, e.g. front office, operations, finance OVERALL RETAIL COMMERCIAL Sample Research Reports High Medium High High High Medium How advanced is your institution’s use of the following technologies? What technologies enable your risk function to address cost pressures? Priority risk management capabilities to strengthen Lack of integration with other business functions was a challenge that impeded the effectiveness of the risk function Questions to C-Suite Medium High Medium High High High Sample View of Banking Risk Assessment Heatmap Research Insights across each Industry on Annual basis region-wise can be provided providing heatmaps of Regulatory Challenge, Talent Challenge, Technology Challenge and Integration Challenge. 78% 81% 75% 78% 78% 78%
  • 8. Cyber & Disruptive Innovation – How to assess and report Cyber threats are increasing and as the world becomes digitised and sensitive data resides in the cloud, on mobile devices and across the Internet, organizations need to take an integrated view of their operational risk and cyber security. Disruptive innovations and digital technologies are sweeping across each Industry, forcing a change in business and operating models. In the digital world, reputation and brand can quickly erode. 1 The Problem? 2 What can Risk do? 3 What is the Value? Intensified customer power and behaviour with new competition appearing overnight New commercial environment creates new and unknown metrics Integrate digital risk operating model with integrated real time KPIs/KRIs Overlay reputational risk management solutions such as Social Media Monitoring Customer Risk Analytics improve returns and business decisioning (fraud, marketing, customer, pricing, product) Employ dedicated resources to sufficiently understand digital risk and issues Better devices and better connectivity improve user experience, but create an entry point for business risks Increased knowledge understanding and capital creates a proactive organisation Real-time KPI/KRI help make strategic decisions more rapidly and effectively minimising cost and loss Cyber attacks are a matter of “when” not “if” Cyber threats are growing and under increasing scrutiny from regulators Institutions must build resilience into their business Embrace a digital Ecosystem; robust digital capabilities and technologies outside the enterprise. Manage digitally; requires real- time orchestration of myriad internal and external services. Institutionalize resilience; ingrained at the outset into objectives, strategies, processes, technologies—and even culture. Reduce potential business impact by having robust crisis and continuity data breach procedure Proactive detection to identify, assess and correct weak and vulnerable operations within your business Prevent reputational damage and mitigate potential harm to customers and shareholders
  • 9. Across the three common categories of data governance, vendors are on average very mature with over 66% of companies at growth stage of development. Data Privacy and Protection Vendor Sources DATA CLASSIFICATION (Few Examples) ENCRYPTION (Few Examples) DATA LOSS PREVENTION (DLP) (Few Examples) Other Indicative Data Sources for Proposed Framework  Assessment & Gap Analysis based on Industry and how big the organization volume of data  Roadmap Design & Execution - Identify tactical remediation for prioritized areas to ensure key mandatory requirements  Data Discovery & Knowledge Graphs - Identifying critical data on systems and records of data processing/ storage with data subjects, legal basis, etc. through machine-learning driven data discovery.  Continuous Monitoring & Tracking - Execution of tactical remediation recommended from roadmap through changes in processes, policies and procedures.  Risk to Advantage – Converting risk into a competitive advantage Source: DLP, Encryption, Data Classification Individual Website sources and Owler