SlideShare ist ein Scribd-Unternehmen logo
1 von 80
Keeping an Eye On Risk
Current Concerns and Supervisory Oversight
Tony Coble, CPA
Kyle Konopasek, CIA
CBIZ MHM, LLC – Kansas City
Tony Coble, CPA
Managing Director – CBIZ MHM, LLC
Shareholder, Mayer Hoffman McCann P.C
11440 Tomahawk Creek Parkway
Leawood, KS 66211
 Direct: (913) 234-1031
 Email: acoble@cbiz.com
Presenters
Kyle Konopasek, CIA, CICA
Manager – CBIZ MHM, LLC
11440 Tomahawk Creek Parkway
Leawood, KS 66211
 Direct: (913) 234-1020
 Email: kkonopasek@cbiz.com
About CBIZ and Mayer Hoffman McCann P.C.
With offices in major cities throughout the United States, CBIZ is one of
the nations leading providers of outsourced business services, including
accounting and tax, internal audit, risk management, and a wide range
of consulting services. CBIZ is strategically associated with Mayer
Hoffman McCann P.C. (MHM). MHM is an independent public
accounting firm with more than 280 shareholders in more than 35
offices. MHM specializes in attest services for mid-market and growing
businesses, with a specialty practice devoted to financial institutions.
Together, CBIZ and Mayer Hoffman McCann P.C. are one of the top
accounting providers in the country.
Topics to include:
• Information Security
– Social Engineering Audit
– Security Awareness Program
• Interest Rate Risk Management/Model Validation
• Vendor Management Best Practices
Learning objectives
• Gain an understanding of leading edge risk management
practices for Credit Unions
• Gain insight on the Board and Supervisory Committees’
role in the internal control structure.
• Recognize areas of potential weakness in the
organization.
• Gain an understanding of the regulatory environment and
impact on risk management.
Information Security Program
Information Security Program - Defined
Is the written plan created and implemented by a
credit union to identify and control risks to
information and information systems and to
properly dispose of information.
Information Security Program
• Should address security guidelines safeguarding
the confidentiality and security of information and
proper disposal.
• Should address privacy rules limiting the credit
union’s disclosure of nonpublic personal
information to unaffiliated third parties.
Board and Supervisory Committee
Responsibilities
• Ensure that information security program is
developed, implemented, and maintained
• Approve the information security program
• Oversee the implementation and maintenance of
the program
The Regulatory Scene
• Important security regulations and industry
standards:
– Gramm-Leach Bliley Act (GLBA)
– Fair and Accurate Credit Transactions Act (FACTA)
– Payment Card Industry Data Security Standards (PCI
DSS)
Gramm-Leach-Bliley Act (GLBA)
• Requirements
– Implementing and maintaining a comprehensive
information security program
– Assessing and evaluating threats
– Implementing controls commensurate with associated
risks
– “Pretexting protection”, which includes safeguards
against social engineering attacks
– Oversight of service providers
– Board of Directors involvement and approval
Fair and Accurate Credit Transactions Act (FACTA)
• FACTA is targeted to the growing problem of identity
theft. The red flags rules require:
– Ongoing and comprehensive risk assessments to identify covered
accounts and related threats
– Based on the risk assessment, a comprehensive identity theft
program.
– Formal change of address procedures
– Employee training
– Development of specific policies, procedures and practices to
combat identity theft
– Oversight of third party providers
Payment Card Industry Data Security Standards (PCI
DSS)
• PCI is a standard, not a regulation. One of the
requirements to be PCI compliant:
– Perform external and internal penetration tests at least once a
year and after any significant infra-structure or application
upgrades.
SOCIAL ENGINEERING
Social Engineering as a tool
• Social engineering is highly encouraged for GLBA, as it
offers steps against pretexting.
• Social engineering serves as an exceptional tools to
counter identity theft.
• What is Social Engineering?
o Manipulate people into doing something rather than
by breaking in using technical means.
• Attacker uses human interaction to obtain or compromise
information.
• Attacker may appear unassuming or respectable.
– Pretend to be a new employee, repair man, utility provider, etc.
– May even offer credentials.
What is social engineering?
• By asking questions, the attacker may piece
enough information together to infiltrate an
organization’s network.
– May attempt to get information from many sources.
What is social engineering?
• Quid Pro Quo
– Something for something.
• Phishing
– Fraudulently obtaining private information.
• Baiting
– Real world Trojan horse.
• Pretexting
– Invented scenario.
• Diversion Theft
– Lying and convincing others of a false truth—a con.
Types of social engineering
• Something for something
– Call random phone numbers at an organization claiming to be
from technical support.
– Eventually you will reach someone with a legitimate problem.
– Grateful you called them, they will follow your instructions.
– The attacker will “help” the user, but will really have the victim type
commands that will allow the attacker to install malware.
Quid Pro Quo
• Fraudulently obtaining private information
– Send an email that looks like it came from a legitimate business.
– Request verification of information and warn of some
consequence if not provided.
– Usually contains a link to a fraudulent web page that looks
legitimate.
• Example: Update login information to new HR portal.
– User gives information to the social engineer/attacker.
Phishing
• Spear phishing
– Specific phishing that include your name or demographic info.
• Vishing
– Phone phishing—may be a voice system asking for call back.
Phishing - continued
• Real example
– Obtain email address of many employees in target organization
including key individual targets like Controller, Staff Accountant,
Executive Assistant, etc.
– Develop website to “change password” or “setup new account” for
a human resources vacation request system.
• Actual organization website is “Western States Credit Union”
• Link to attacker’s website is “Western States Credlt Union”
– Email website link to obtained email addresses.
Phishing - continued
• Real world Trojan horse
– Uses physical media.
– Relies on greed and/or the curiosity of the target/victim.
– Attacker leaves a malware infected CD or USB thumb drive in an
obvious location so that it is easily found.
– Attacker uses an intriguing r curious label to gain interest.
• Example: “Employee Salaries and Bonuses 2014”
– Curious employee uses the media and unknowingly installs
malware.
Baiting
• Invented scenario
– Involves prior research and a setup used to establish legitimacy.
• Give information that a user would normally not divulge.
– This technique is used to impersonate and imitate authority.
• Uses prepared answers to a target’s questions.
• Other useful information is gathered for future attacks.
• Example: “VP of Facilities” visiting a branch.
Pretexting
– Illegal examples from an inside testing perspective
• Law enforcement
• Fire
• Military/government official
Pretexting - continued
• Real example – Telecom provider
Pretexting - continued
• Real example
– Pose as a major telecom provider.
– Props:
• rented white van with magnetic logo
• logo polo shirts and hats
• business cards
• work order
• ID badge.
– Enter credit union branch and ask to inspect the “roving telecom
adapter” because they have been recalled.
Pretexting - continued
• Con
– Persuade deliver person that delivery has been requested
elsewhere.
• When delivery is redirected, attacker persuades delivery driver to
unload near a desired address.
• Example: Attacker parks a “security vehicle” in bank parking lot.
Target attempts to deposit money in night drop or ATM but is told by
attacker that it is out of order. Target then gives money to attacker for
deposit and safekeeping.
Diversion Theft
• Scavenging key bits of information from many documents
put out in the trash.
– Literally involves getting in a dumpster during off-peak hours and
looking for information.
– Janitorial crews could be involved. Are they bonded?
• Document shredders are not always the answer
– Vertical cut, cross cut, micro cut, and security cut.
Dumpster diving
• No matter how robust an organization’s:
– Firewalls
– Intrusion detection systems
– Anti-virus/malware software
– Other technological and physical safeguards
• The human is always the weakest link when dealing with
security and protecting valuable information.
• Knowledge is power.
– People sometimes want others to “know what they know” to
demonstrate importance.
Weakest Link?
• Training
– User awareness
• User knows that giving out certain information is bad.
• Policies
– Employees are not allowed to divulge information.
– Prevents employees from being socially pressured or tricked.
– Polices MUST be enforced to be effective.
How to prevent social engineering?
• Every organization must decide what information is
sensitive and should not be shared.
• Password management
• Physical security
• Network defenses may only repel attacks
– Virus protection
– Email attachment scanning
– Firewalls, etc.
• Security must be tested periodically.
How to prevent social engineering?
• Third-party testing
– Hire a third-party to attempt to attack targeted areas of the
organization.
– Have the third-party attempt to acquire information from
employees using social engineering techniques.
– Learning tool for the organization—not a punishment for
employees.
How to prevent social engineering?
SECURITY AWARENESS
• Security awareness reflects an organization’s mindset or
attitude toward protecting the physical and intellectual
assets of an organization. This attitude guides the
approach used to protect those assets. In general, the
approach is referred to as a security awareness program.
What is security awareness?
• What elements reflect the overall strength of an
organization’s security culture?
– What causes a security awareness program to fail?
– What comprises a successful security awareness program?
• Even the best technical security efforts will fail if the organization has
a weak security culture.
Security awareness success
1) Not understanding what security awareness really is.
– Major difference between security awareness and security
training.
• Watching an online video about security awareness is training.
– The primary goal of security awareness is to change behavior.
2) Reliance on checking the box.
– Satisfying compliance standards equate to strong security
awareness or even that security exists.
• Merely prove the minimum standards have been met.
• Standards are vague and difficult to measure.
– EXAMPLE: “A security awareness program must be in place.”
Why do security awareness programs fail?
3) Failing to acknowledge that security awareness is a
unique discipline.
– Who is responsible for the function?
– Does the person have the knowledge, skills, and abilities?
– Does the person have soft skills such as strong communication
and marketing ability?
• Initial efforts to implement security awareness and to affect change
over time require such skills.
Why do security awareness programs fail?
4) Lack of engaging and appropriate materials.
– Annual computer-based training is not enough.
– It is critical that multiple versions or styles of security awareness
materials be implemented.
• Ensure the materials are appropriate to the organization based on
industry and employee demographics.
• Younger employees respond better to blogs and twitter feeds while
older employees prefer traditional materials like posters and
newsletters.
Why do security awareness programs fail?
5) Not collecting metrics.
– Without metrics, there is no way to determine if security
awareness goals are being met.
• Are we wasting money or providing value?
• What is working and what is not?
• Are our losses decreasing?
– Collecting metrics on a regular basis allows for adjustments.
– Measure the impact to the organization.
Why do security awareness programs fail?
5) Not collecting metrics (continued).
– Example metrics include:
• Number of people who fall victim to a phishing attack.
• Number of employees who understand and follow security policies.
• Number of employees securing desk environment at end of day.
• Number of employees using strong passwords.
• Number of employees who understand, follow, and enforce policies for
restricted access to facilities.
• Who has or has not completed annual security awareness training.
• Types of reinforcement training, who is it communicated to, and how
often.
Why do security awareness programs fail?
6) Unreasonable expectations.
– No security counter-measure will ever be successful at mitigating
all incidents.
7) Relying upon a single training exercise.
– Focusing on a single security weakness or threat approach when
there are dozens leaves an organization open to attack to ignored
approaches.
Why do security awareness programs fail?
1) C-suite support.
– Awareness program support from executive management leads to
more freedom, increased budgets, and support from other
departments.
– Obtaining strong support from top level management is first
priority.
• Consider materials designed specifically for executives—newsletters
and brief articles that highlight relevant news and information.
Keys to security awareness success
2) Partnering with key departments.
– Get other departments involved in the program that might provide
additional resources toward program success.
• Human resources, legal, compliance, marketing, etc.
• Consider the needs of these other departments and incorporate into
the overall security awareness approach.
3) Creativity
– Small budgets for security awareness are common, however,
creativity and enthusiasm can bridge the gap created by a small
budget.
Keys to security awareness success
4) Metrics.
– Prove the security awareness program effort is successful—utilize
metrics.
5) Explanation and transparency.
– Focus and how to accomplish specific actions through clear
explanation.
– Instead of telling people to not do certain things, explain how they
can do certain things safely.
Keys to security awareness success
6) 90-day plans.
– Many programs follow a one-year plan with one topic covered
monthly.
• Does not reinforce knowledge and does not permit feedback or
consider ongoing events.
– A 90-day plan is most effective as it permits re-evaluation of the
program and its goals more regularly.
• Focus on 3 topics simultaneously and reinforce during the 90 days.
• Can be easily adjusted to address current and key issues.
Keys to security awareness success
7) Multimodal awareness materials
– Utilize multiple forms of security awareness materials.
• Newsletters
• Blogs
• Newsfeeds
• Phishing simulation
• Games
– Participative approaches have the most long-term success.
Keys to security awareness success
8) Incentivized security awareness programs.
– Develop “Incentivized Awareness Programs”.
– Focus on creating a reward structure to incentivize people for
exercising desired behaviors.
– This technique switches the entire awareness paradigm by
encouraging employees to elicit a natural and desired behavior
rather than forcing them.
Keys to security awareness success
• Habits drive security culture and there are no
technologies that will ever make up for poor security
culture.
• Awareness programs, when properly executed, provide
knowledge that instills behavior.
Key take away
INTEREST RATE RISK
MANAGEMENT & MODEL
VALIDATION
• The potential loss from unexpected changes in interest
rates which can significantly impact profitability and
market value of equity.
What is interest rate risk?
• The amount at risk is a function of the magnitude and
direction of interest rate changes and the size and
maturity structure of the mismatch position.
• If interest rates rise, the cost of funds increases more
rapidly than the yield on assets, thereby reducing net
income.
• If the exposure is not managed properly it can erode
profitability.
Interest rate risk in more detail . . .
• A key element of management of interest rate risk is to
perform an independent validation of the modeling
system.
• Why? Financial market and economic conditions present
significant risk management challenges to institutions of
all sizes.
• Resources:
– Interagency Advisory on Interest Rate Risk Management issued
January 6, 2010.
– Interagency Advisory on Interest Rate Risk Management
Frequently Asked Questions issued January 12, 2012
Managing interest rate risk
• Models have long been a critical tool used by Credit
Unions to manage the various risks they face.
• Models need to be understood – not a “Black Box”.
Model validation
• Performing interest rate risk model validation is also a
best practice.
– It strengthens reliance on the model to make sound business
decisions.
– It addresses “model risk”, or the possibility of adverse
consequences from management decisions resulting from
incorrect or improperly used model outputs.
– Identifies weaknesses in:
• Data setups
• Inputs
• Behavior assumptions
Interest rate model validation
• Who should perform interest rate risk model validation
procedures?
– Consider expertise.
– Consider experience.
– Consider independence.
• Internal audit
• ALM model vendor
• CPA firm/consulting firm
• Investment brokers/advisors
• Corporate credit unions
Performing a model validation
• Model input
– Data
– Assumptions
• Model processing
– Mathematics and formulas/code
– Mechanics
– Theory
• Model output/reports
– Model results
– Context of reports
Key components of a validation
• Data and setup issues
– Data reconciles to the general ledger
– Market data
– Account attributes
– Contractual input
Model input
Models typically receive automated fees from many
sources:
– Interest rate curves
– Cost of funds
– Balance Sheet data
Model input
Models also utilize infrequently updated or hardcoded
values:
– Credit Union’s unit costs
– Leverage targets
Model input
• Assumptions
– Prepayments
– Non-maturity shares
– Price sensitivity
– Reinvestment rates
– Discount rates
– Economics – stresses to portfolio
Model input
• The testing of model inputs should regularly employ either
specified or statistically determined “stressed” model
input variables.
Model input
• During times of stress, one does not want data that
assumes market liquidity and an ample supply of buyers
and sellers across all risk categories.
Model input
Validation should include:
– Software vendor supplied verifications
– Predictive analysis
– Benchmarking
– Back-testing
Model processing
• Testing and validation should evaluate:
– The validity of the conceptual soundness of the model
– Potential limitations in the model and range of applicability
– Model effectiveness both through back testing and periodic
reviews of model results.
Model processing
• Are reports easy to understand?
• Do reports make comparisons to policy limits?
• Do reports meet regulatory guidelines/preference?
Model reports
• Models must capture the complexity of the institution and
the phenomena they want to simulate.
• Credit unions must have the information necessary to
know, monitor, and govern the models used.
Model reports
• Does the model meet the business needs and regulatory
requirements of the financial institution?
• Is the model capable of institution-specific modeling?
• Can it model the financial institution’s balance sheet
instruments?
Model adequacy
• Is the model contained in a strong control environment?
– Documented user procedures and processes.
– Is user training and cross training adequate and documented?
• Does the model satisfy governance needs?
– ALCO policy
– ALCO limits
– ALCO meetings with minutes
Model control and governance
• No regulatory standard exists for how frequently an
interest rate risk model should be validated.
– Interagency guidance suggests annually.
– At least as often, an on same cycle, as regulatory examinations.
• Depends on the size and risk of the financial institution.
– What is the complexity of the ALM environment?
– What is the risk appetite and risk tolerance of executive
management?
• Industry best practice suggests every 3 years by a third-
party vendor supplemented with internal testing annually.
Model validation frequency
VENDOR MANAGEMENT
BEST PRACTICES
• The vendor management process begins by selecting the
right vendor for the right reasons.
• The vendor selection process can be a very complicated
and emotional undertaking if you don't know how to
approach it from the very start.
• You will need to analyze your business requirements,
search for prospective vendors, lead the team in selecting
the winning vendor and successfully negotiate a contract
while avoiding contract negotiation mistakes.
Vendor selection
• Don’t get blinded by the “glitz and sizzle” that some
vendors project.
• A lot of salespeople and specialty consultants do not
always equate to a strong vendor—they may not be there
after the contract is signed.
• Ask all questions.
– Is the outsourcing area within the vendor’s expertise?
Scrutinize the prospects
• Be wary of restrictive or exclusive relationships.
– Limitations with other vendors or with future customers.
• Do not accept a contract with severe penalties for what
are small incidents.
• Do not accept long-term contracts.
– Short-term contracts with option periods are more appropriate.
• Consider the vendor’s needs.
– A small and insignificant issue to you may be very important to the
vendor.
• Overall, show good faith and willingness to work together.
Remain flexible
• Once the vendor relationship has commenced, don’t
assume all will go according to plan.
• The vendor’s performance must be monitored constantly
at the start.
– Should include the requirements most critical to the business.
• Quality of service, order of completion, response time, etc.
Monitor performance
• Communicate.
• Communicate.
• Communicate.
• Establish a well maintained line of communication.
– Avoid misunderstandings
– Proactively address issues before they become problems.
Communicate constantly
• Having a vendor management program in place will
greatly enhance the vendor relationship and protect the
business.
– Vendor management policy approved by the board of directors.
– Define what constitutes a critical vendor.
– Establish a vendor risk assessment process.
– Establish regular vendor review procedures.
• Vendor SOC reports (formerly SAS 70 reports) on file are current
Vendor management program components
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighFRSecure
 
Symantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec Website Security
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWithum
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach AnalysisTal Be'ery
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudGoutama Bachtiar
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceShawn Tuma
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case studyAbhilash vijayan
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesKroll
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentationSreejith Nair
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Kroll
 

Was ist angesagt? (20)

HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad Nigh
 
Symantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threats
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
 

Andere mochten auch

Should You Consider a Defined Contribution Model?
Should You Consider a Defined Contribution Model?Should You Consider a Defined Contribution Model?
Should You Consider a Defined Contribution Model?CBIZ, Inc.
 
Does your wellness program follow ACA guidelines?
Does your wellness program follow ACA guidelines? Does your wellness program follow ACA guidelines?
Does your wellness program follow ACA guidelines? CBIZ, Inc.
 
CBIZ Small Business Employment Index - September 2015
CBIZ Small Business Employment Index - September 2015CBIZ Small Business Employment Index - September 2015
CBIZ Small Business Employment Index - September 2015CBIZ, Inc.
 
2014 Kansas City CFO Breakfast Series
2014 Kansas City CFO Breakfast Series 2014 Kansas City CFO Breakfast Series
2014 Kansas City CFO Breakfast Series CBIZ, Inc.
 
Health Care Reform - Year-End Wrap Up
Health Care Reform - Year-End Wrap UpHealth Care Reform - Year-End Wrap Up
Health Care Reform - Year-End Wrap UpCBIZ, Inc.
 
Architecture, Engineering & Construction Seminar - 2015
Architecture, Engineering & Construction Seminar - 2015Architecture, Engineering & Construction Seminar - 2015
Architecture, Engineering & Construction Seminar - 2015CBIZ, Inc.
 
Health Reform Bulletin Oct, 2015 - Amendments to the small employer definitio...
Health Reform Bulletin Oct, 2015 - Amendments to the small employer definitio...Health Reform Bulletin Oct, 2015 - Amendments to the small employer definitio...
Health Reform Bulletin Oct, 2015 - Amendments to the small employer definitio...CBIZ, Inc.
 
BIZGrowth Strategies Summer 2015
BIZGrowth Strategies Summer 2015BIZGrowth Strategies Summer 2015
BIZGrowth Strategies Summer 2015CBIZ, Inc.
 
Construction Vital Statistics - May 2015
Construction Vital Statistics - May 2015Construction Vital Statistics - May 2015
Construction Vital Statistics - May 2015CBIZ, Inc.
 
Retirement Programs for Nonprofits:
Retirement Programs for Nonprofits:Retirement Programs for Nonprofits:
Retirement Programs for Nonprofits:CBIZ, Inc.
 
Wellbeing Insights | June 2015
Wellbeing Insights | June 2015Wellbeing Insights | June 2015
Wellbeing Insights | June 2015CBIZ, Inc.
 
Cbiz Wellbeing Insights October 2015
Cbiz Wellbeing Insights October 2015Cbiz Wellbeing Insights October 2015
Cbiz Wellbeing Insights October 2015CBIZ, Inc.
 
Wellbeing Insights Newsletter August 2015
Wellbeing Insights Newsletter August 2015Wellbeing Insights Newsletter August 2015
Wellbeing Insights Newsletter August 2015CBIZ, Inc.
 
Seven Keys to Unlocking the Door to Your Dreams - Exit Strategies for Busines...
Seven Keys to Unlocking the Door to Your Dreams - Exit Strategies for Busines...Seven Keys to Unlocking the Door to Your Dreams - Exit Strategies for Busines...
Seven Keys to Unlocking the Door to Your Dreams - Exit Strategies for Busines...CBIZ, Inc.
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
 
Benefit Beat, December 2013
Benefit Beat, December 2013Benefit Beat, December 2013
Benefit Beat, December 2013CBIZ, Inc.
 
PROGRAMA TENTATIVO FESTEJO 130 AÑOS
PROGRAMA TENTATIVO FESTEJO 130 AÑOSPROGRAMA TENTATIVO FESTEJO 130 AÑOS
PROGRAMA TENTATIVO FESTEJO 130 AÑOSOCTAVIO VALLE
 
Ficha Preinscripcion XIII Jomusis
Ficha Preinscripcion XIII JomusisFicha Preinscripcion XIII Jomusis
Ficha Preinscripcion XIII Jomusisunife
 

Andere mochten auch (20)

Should You Consider a Defined Contribution Model?
Should You Consider a Defined Contribution Model?Should You Consider a Defined Contribution Model?
Should You Consider a Defined Contribution Model?
 
Does your wellness program follow ACA guidelines?
Does your wellness program follow ACA guidelines? Does your wellness program follow ACA guidelines?
Does your wellness program follow ACA guidelines?
 
CBIZ Small Business Employment Index - September 2015
CBIZ Small Business Employment Index - September 2015CBIZ Small Business Employment Index - September 2015
CBIZ Small Business Employment Index - September 2015
 
2014 Kansas City CFO Breakfast Series
2014 Kansas City CFO Breakfast Series 2014 Kansas City CFO Breakfast Series
2014 Kansas City CFO Breakfast Series
 
Health Care Reform - Year-End Wrap Up
Health Care Reform - Year-End Wrap UpHealth Care Reform - Year-End Wrap Up
Health Care Reform - Year-End Wrap Up
 
Architecture, Engineering & Construction Seminar - 2015
Architecture, Engineering & Construction Seminar - 2015Architecture, Engineering & Construction Seminar - 2015
Architecture, Engineering & Construction Seminar - 2015
 
Health Reform Bulletin Oct, 2015 - Amendments to the small employer definitio...
Health Reform Bulletin Oct, 2015 - Amendments to the small employer definitio...Health Reform Bulletin Oct, 2015 - Amendments to the small employer definitio...
Health Reform Bulletin Oct, 2015 - Amendments to the small employer definitio...
 
BIZGrowth Strategies Summer 2015
BIZGrowth Strategies Summer 2015BIZGrowth Strategies Summer 2015
BIZGrowth Strategies Summer 2015
 
Construction Vital Statistics - May 2015
Construction Vital Statistics - May 2015Construction Vital Statistics - May 2015
Construction Vital Statistics - May 2015
 
Retirement Programs for Nonprofits:
Retirement Programs for Nonprofits:Retirement Programs for Nonprofits:
Retirement Programs for Nonprofits:
 
Wellbeing Insights | June 2015
Wellbeing Insights | June 2015Wellbeing Insights | June 2015
Wellbeing Insights | June 2015
 
Cbiz Wellbeing Insights October 2015
Cbiz Wellbeing Insights October 2015Cbiz Wellbeing Insights October 2015
Cbiz Wellbeing Insights October 2015
 
Wellbeing Insights Newsletter August 2015
Wellbeing Insights Newsletter August 2015Wellbeing Insights Newsletter August 2015
Wellbeing Insights Newsletter August 2015
 
Seven Keys to Unlocking the Door to Your Dreams - Exit Strategies for Busines...
Seven Keys to Unlocking the Door to Your Dreams - Exit Strategies for Busines...Seven Keys to Unlocking the Door to Your Dreams - Exit Strategies for Busines...
Seven Keys to Unlocking the Door to Your Dreams - Exit Strategies for Busines...
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Circular 17
Circular 17Circular 17
Circular 17
 
Icones Livros
Icones LivrosIcones Livros
Icones Livros
 
Benefit Beat, December 2013
Benefit Beat, December 2013Benefit Beat, December 2013
Benefit Beat, December 2013
 
PROGRAMA TENTATIVO FESTEJO 130 AÑOS
PROGRAMA TENTATIVO FESTEJO 130 AÑOSPROGRAMA TENTATIVO FESTEJO 130 AÑOS
PROGRAMA TENTATIVO FESTEJO 130 AÑOS
 
Ficha Preinscripcion XIII Jomusis
Ficha Preinscripcion XIII JomusisFicha Preinscripcion XIII Jomusis
Ficha Preinscripcion XIII Jomusis
 

Ähnlich wie Keeping an Eye On Risk - Current Concerns and Supervisory Oversight

Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20Marc S. Sokol
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Craig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFestCraig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFestPRFest
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 

Ähnlich wie Keeping an Eye On Risk - Current Concerns and Supervisory Oversight (20)

Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Craig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFestCraig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFest
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 

Mehr von CBIZ, Inc.

BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023CBIZ, Inc.
 
BIZGrowth Strategies - Back to Basics Special Edition
BIZGrowth Strategies - Back to Basics Special EditionBIZGrowth Strategies - Back to Basics Special Edition
BIZGrowth Strategies - Back to Basics Special EditionCBIZ, Inc.
 
The Advantage — Summer 2023
The Advantage — Summer 2023The Advantage — Summer 2023
The Advantage — Summer 2023CBIZ, Inc.
 
BIZGrowth Strategies - Workforce & Talent Optimization Special Edition
BIZGrowth Strategies - Workforce & Talent Optimization Special EditionBIZGrowth Strategies - Workforce & Talent Optimization Special Edition
BIZGrowth Strategies - Workforce & Talent Optimization Special EditionCBIZ, Inc.
 
BIZGrowth Newsletter - Economic Slowdown Solutions Special Edition
BIZGrowth Newsletter - Economic Slowdown Solutions Special EditionBIZGrowth Newsletter - Economic Slowdown Solutions Special Edition
BIZGrowth Newsletter - Economic Slowdown Solutions Special EditionCBIZ, Inc.
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
Connections Help Law Practice Efficiently Obtain $5 Million Line of Credit
Connections Help Law Practice Efficiently Obtain $5 Million Line of CreditConnections Help Law Practice Efficiently Obtain $5 Million Line of Credit
Connections Help Law Practice Efficiently Obtain $5 Million Line of CreditCBIZ, Inc.
 
Custom Communication Plan & Active Enrollment Result in Increased Consumerism
Custom Communication Plan & Active Enrollment Result in Increased ConsumerismCustom Communication Plan & Active Enrollment Result in Increased Consumerism
Custom Communication Plan & Active Enrollment Result in Increased ConsumerismCBIZ, Inc.
 
Experienced Consulting Approach Leads Engineering Firm to the Right CFO
Experienced Consulting Approach Leads Engineering Firm to the Right CFOExperienced Consulting Approach Leads Engineering Firm to the Right CFO
Experienced Consulting Approach Leads Engineering Firm to the Right CFOCBIZ, Inc.
 
BIZGrowth Strategies - Summer 2022
BIZGrowth Strategies - Summer 2022BIZGrowth Strategies - Summer 2022
BIZGrowth Strategies - Summer 2022CBIZ, Inc.
 
Inflation, Interest Rates & the Disruption to CRE
Inflation, Interest Rates & the Disruption to CREInflation, Interest Rates & the Disruption to CRE
Inflation, Interest Rates & the Disruption to CRECBIZ, Inc.
 
CBIZ Quarterly Manufacturing and Distribution "Hot Topics" Newsletter (May-Ju...
CBIZ Quarterly Manufacturing and Distribution "Hot Topics" Newsletter (May-Ju...CBIZ Quarterly Manufacturing and Distribution "Hot Topics" Newsletter (May-Ju...
CBIZ Quarterly Manufacturing and Distribution "Hot Topics" Newsletter (May-Ju...CBIZ, Inc.
 
Rethinking Total Compensation to Retain Top Talent
Rethinking Total Compensation to Retain Top TalentRethinking Total Compensation to Retain Top Talent
Rethinking Total Compensation to Retain Top TalentCBIZ, Inc.
 
Common Labor Shortage Risks & Tips to Mitigate Your Exposures
Common Labor Shortage Risks & Tips to Mitigate Your ExposuresCommon Labor Shortage Risks & Tips to Mitigate Your Exposures
Common Labor Shortage Risks & Tips to Mitigate Your ExposuresCBIZ, Inc.
 
How the Great Resignation Affects the Tax Function
How the Great Resignation Affects the Tax FunctionHow the Great Resignation Affects the Tax Function
How the Great Resignation Affects the Tax FunctionCBIZ, Inc.
 
Using Technology to Secure Talent
Using Technology to Secure TalentUsing Technology to Secure Talent
Using Technology to Secure TalentCBIZ, Inc.
 
Experienced Consulting Approach Leads Engineering Firm to the Right CFO
Experienced Consulting Approach Leads Engineering Firm to the Right CFOExperienced Consulting Approach Leads Engineering Firm to the Right CFO
Experienced Consulting Approach Leads Engineering Firm to the Right CFOCBIZ, Inc.
 
BIZGrowth Strategies - The Great Resignation Special Edition
BIZGrowth Strategies - The Great Resignation Special EditionBIZGrowth Strategies - The Great Resignation Special Edition
BIZGrowth Strategies - The Great Resignation Special EditionCBIZ, Inc.
 
Tax incentive alert KS
Tax incentive alert KSTax incentive alert KS
Tax incentive alert KSCBIZ, Inc.
 
CBIZ Quarterly Commercial Real Estate "Hot Topics" Newsletter (Jan-Feb 2022)
CBIZ Quarterly Commercial Real Estate "Hot Topics" Newsletter (Jan-Feb 2022)CBIZ Quarterly Commercial Real Estate "Hot Topics" Newsletter (Jan-Feb 2022)
CBIZ Quarterly Commercial Real Estate "Hot Topics" Newsletter (Jan-Feb 2022)CBIZ, Inc.
 

Mehr von CBIZ, Inc. (20)

BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
BIZGrowth Strategies - Back to Basics Special Edition
BIZGrowth Strategies - Back to Basics Special EditionBIZGrowth Strategies - Back to Basics Special Edition
BIZGrowth Strategies - Back to Basics Special Edition
 
The Advantage — Summer 2023
The Advantage — Summer 2023The Advantage — Summer 2023
The Advantage — Summer 2023
 
BIZGrowth Strategies - Workforce & Talent Optimization Special Edition
BIZGrowth Strategies - Workforce & Talent Optimization Special EditionBIZGrowth Strategies - Workforce & Talent Optimization Special Edition
BIZGrowth Strategies - Workforce & Talent Optimization Special Edition
 
BIZGrowth Newsletter - Economic Slowdown Solutions Special Edition
BIZGrowth Newsletter - Economic Slowdown Solutions Special EditionBIZGrowth Newsletter - Economic Slowdown Solutions Special Edition
BIZGrowth Newsletter - Economic Slowdown Solutions Special Edition
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Connections Help Law Practice Efficiently Obtain $5 Million Line of Credit
Connections Help Law Practice Efficiently Obtain $5 Million Line of CreditConnections Help Law Practice Efficiently Obtain $5 Million Line of Credit
Connections Help Law Practice Efficiently Obtain $5 Million Line of Credit
 
Custom Communication Plan & Active Enrollment Result in Increased Consumerism
Custom Communication Plan & Active Enrollment Result in Increased ConsumerismCustom Communication Plan & Active Enrollment Result in Increased Consumerism
Custom Communication Plan & Active Enrollment Result in Increased Consumerism
 
Experienced Consulting Approach Leads Engineering Firm to the Right CFO
Experienced Consulting Approach Leads Engineering Firm to the Right CFOExperienced Consulting Approach Leads Engineering Firm to the Right CFO
Experienced Consulting Approach Leads Engineering Firm to the Right CFO
 
BIZGrowth Strategies - Summer 2022
BIZGrowth Strategies - Summer 2022BIZGrowth Strategies - Summer 2022
BIZGrowth Strategies - Summer 2022
 
Inflation, Interest Rates & the Disruption to CRE
Inflation, Interest Rates & the Disruption to CREInflation, Interest Rates & the Disruption to CRE
Inflation, Interest Rates & the Disruption to CRE
 
CBIZ Quarterly Manufacturing and Distribution "Hot Topics" Newsletter (May-Ju...
CBIZ Quarterly Manufacturing and Distribution "Hot Topics" Newsletter (May-Ju...CBIZ Quarterly Manufacturing and Distribution "Hot Topics" Newsletter (May-Ju...
CBIZ Quarterly Manufacturing and Distribution "Hot Topics" Newsletter (May-Ju...
 
Rethinking Total Compensation to Retain Top Talent
Rethinking Total Compensation to Retain Top TalentRethinking Total Compensation to Retain Top Talent
Rethinking Total Compensation to Retain Top Talent
 
Common Labor Shortage Risks & Tips to Mitigate Your Exposures
Common Labor Shortage Risks & Tips to Mitigate Your ExposuresCommon Labor Shortage Risks & Tips to Mitigate Your Exposures
Common Labor Shortage Risks & Tips to Mitigate Your Exposures
 
How the Great Resignation Affects the Tax Function
How the Great Resignation Affects the Tax FunctionHow the Great Resignation Affects the Tax Function
How the Great Resignation Affects the Tax Function
 
Using Technology to Secure Talent
Using Technology to Secure TalentUsing Technology to Secure Talent
Using Technology to Secure Talent
 
Experienced Consulting Approach Leads Engineering Firm to the Right CFO
Experienced Consulting Approach Leads Engineering Firm to the Right CFOExperienced Consulting Approach Leads Engineering Firm to the Right CFO
Experienced Consulting Approach Leads Engineering Firm to the Right CFO
 
BIZGrowth Strategies - The Great Resignation Special Edition
BIZGrowth Strategies - The Great Resignation Special EditionBIZGrowth Strategies - The Great Resignation Special Edition
BIZGrowth Strategies - The Great Resignation Special Edition
 
Tax incentive alert KS
Tax incentive alert KSTax incentive alert KS
Tax incentive alert KS
 
CBIZ Quarterly Commercial Real Estate "Hot Topics" Newsletter (Jan-Feb 2022)
CBIZ Quarterly Commercial Real Estate "Hot Topics" Newsletter (Jan-Feb 2022)CBIZ Quarterly Commercial Real Estate "Hot Topics" Newsletter (Jan-Feb 2022)
CBIZ Quarterly Commercial Real Estate "Hot Topics" Newsletter (Jan-Feb 2022)
 

Kürzlich hochgeladen

Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration TrainingCalvinarnold843
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansNugget Global
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
71368-80-4.pdf Fast delivery good quality
71368-80-4.pdf Fast delivery  good quality71368-80-4.pdf Fast delivery  good quality
71368-80-4.pdf Fast delivery good qualitycathy664059
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 

Kürzlich hochgeladen (20)

Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration Training
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business Loans
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
71368-80-4.pdf Fast delivery good quality
71368-80-4.pdf Fast delivery  good quality71368-80-4.pdf Fast delivery  good quality
71368-80-4.pdf Fast delivery good quality
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 

Keeping an Eye On Risk - Current Concerns and Supervisory Oversight

  • 1. Keeping an Eye On Risk Current Concerns and Supervisory Oversight Tony Coble, CPA Kyle Konopasek, CIA CBIZ MHM, LLC – Kansas City
  • 2. Tony Coble, CPA Managing Director – CBIZ MHM, LLC Shareholder, Mayer Hoffman McCann P.C 11440 Tomahawk Creek Parkway Leawood, KS 66211  Direct: (913) 234-1031  Email: acoble@cbiz.com Presenters Kyle Konopasek, CIA, CICA Manager – CBIZ MHM, LLC 11440 Tomahawk Creek Parkway Leawood, KS 66211  Direct: (913) 234-1020  Email: kkonopasek@cbiz.com
  • 3. About CBIZ and Mayer Hoffman McCann P.C. With offices in major cities throughout the United States, CBIZ is one of the nations leading providers of outsourced business services, including accounting and tax, internal audit, risk management, and a wide range of consulting services. CBIZ is strategically associated with Mayer Hoffman McCann P.C. (MHM). MHM is an independent public accounting firm with more than 280 shareholders in more than 35 offices. MHM specializes in attest services for mid-market and growing businesses, with a specialty practice devoted to financial institutions. Together, CBIZ and Mayer Hoffman McCann P.C. are one of the top accounting providers in the country.
  • 4. Topics to include: • Information Security – Social Engineering Audit – Security Awareness Program • Interest Rate Risk Management/Model Validation • Vendor Management Best Practices
  • 5. Learning objectives • Gain an understanding of leading edge risk management practices for Credit Unions • Gain insight on the Board and Supervisory Committees’ role in the internal control structure. • Recognize areas of potential weakness in the organization. • Gain an understanding of the regulatory environment and impact on risk management.
  • 7. Information Security Program - Defined Is the written plan created and implemented by a credit union to identify and control risks to information and information systems and to properly dispose of information.
  • 8. Information Security Program • Should address security guidelines safeguarding the confidentiality and security of information and proper disposal. • Should address privacy rules limiting the credit union’s disclosure of nonpublic personal information to unaffiliated third parties.
  • 9. Board and Supervisory Committee Responsibilities • Ensure that information security program is developed, implemented, and maintained • Approve the information security program • Oversee the implementation and maintenance of the program
  • 10. The Regulatory Scene • Important security regulations and industry standards: – Gramm-Leach Bliley Act (GLBA) – Fair and Accurate Credit Transactions Act (FACTA) – Payment Card Industry Data Security Standards (PCI DSS)
  • 11. Gramm-Leach-Bliley Act (GLBA) • Requirements – Implementing and maintaining a comprehensive information security program – Assessing and evaluating threats – Implementing controls commensurate with associated risks – “Pretexting protection”, which includes safeguards against social engineering attacks – Oversight of service providers – Board of Directors involvement and approval
  • 12. Fair and Accurate Credit Transactions Act (FACTA) • FACTA is targeted to the growing problem of identity theft. The red flags rules require: – Ongoing and comprehensive risk assessments to identify covered accounts and related threats – Based on the risk assessment, a comprehensive identity theft program. – Formal change of address procedures – Employee training – Development of specific policies, procedures and practices to combat identity theft – Oversight of third party providers
  • 13. Payment Card Industry Data Security Standards (PCI DSS) • PCI is a standard, not a regulation. One of the requirements to be PCI compliant: – Perform external and internal penetration tests at least once a year and after any significant infra-structure or application upgrades.
  • 15.
  • 16. Social Engineering as a tool • Social engineering is highly encouraged for GLBA, as it offers steps against pretexting. • Social engineering serves as an exceptional tools to counter identity theft.
  • 17. • What is Social Engineering? o Manipulate people into doing something rather than by breaking in using technical means.
  • 18. • Attacker uses human interaction to obtain or compromise information. • Attacker may appear unassuming or respectable. – Pretend to be a new employee, repair man, utility provider, etc. – May even offer credentials. What is social engineering?
  • 19. • By asking questions, the attacker may piece enough information together to infiltrate an organization’s network. – May attempt to get information from many sources. What is social engineering?
  • 20. • Quid Pro Quo – Something for something. • Phishing – Fraudulently obtaining private information. • Baiting – Real world Trojan horse. • Pretexting – Invented scenario. • Diversion Theft – Lying and convincing others of a false truth—a con. Types of social engineering
  • 21. • Something for something – Call random phone numbers at an organization claiming to be from technical support. – Eventually you will reach someone with a legitimate problem. – Grateful you called them, they will follow your instructions. – The attacker will “help” the user, but will really have the victim type commands that will allow the attacker to install malware. Quid Pro Quo
  • 22. • Fraudulently obtaining private information – Send an email that looks like it came from a legitimate business. – Request verification of information and warn of some consequence if not provided. – Usually contains a link to a fraudulent web page that looks legitimate. • Example: Update login information to new HR portal. – User gives information to the social engineer/attacker. Phishing
  • 23. • Spear phishing – Specific phishing that include your name or demographic info. • Vishing – Phone phishing—may be a voice system asking for call back. Phishing - continued
  • 24. • Real example – Obtain email address of many employees in target organization including key individual targets like Controller, Staff Accountant, Executive Assistant, etc. – Develop website to “change password” or “setup new account” for a human resources vacation request system. • Actual organization website is “Western States Credit Union” • Link to attacker’s website is “Western States Credlt Union” – Email website link to obtained email addresses. Phishing - continued
  • 25. • Real world Trojan horse – Uses physical media. – Relies on greed and/or the curiosity of the target/victim. – Attacker leaves a malware infected CD or USB thumb drive in an obvious location so that it is easily found. – Attacker uses an intriguing r curious label to gain interest. • Example: “Employee Salaries and Bonuses 2014” – Curious employee uses the media and unknowingly installs malware. Baiting
  • 26. • Invented scenario – Involves prior research and a setup used to establish legitimacy. • Give information that a user would normally not divulge. – This technique is used to impersonate and imitate authority. • Uses prepared answers to a target’s questions. • Other useful information is gathered for future attacks. • Example: “VP of Facilities” visiting a branch. Pretexting
  • 27. – Illegal examples from an inside testing perspective • Law enforcement • Fire • Military/government official Pretexting - continued
  • 28. • Real example – Telecom provider Pretexting - continued
  • 29. • Real example – Pose as a major telecom provider. – Props: • rented white van with magnetic logo • logo polo shirts and hats • business cards • work order • ID badge. – Enter credit union branch and ask to inspect the “roving telecom adapter” because they have been recalled. Pretexting - continued
  • 30. • Con – Persuade deliver person that delivery has been requested elsewhere. • When delivery is redirected, attacker persuades delivery driver to unload near a desired address. • Example: Attacker parks a “security vehicle” in bank parking lot. Target attempts to deposit money in night drop or ATM but is told by attacker that it is out of order. Target then gives money to attacker for deposit and safekeeping. Diversion Theft
  • 31. • Scavenging key bits of information from many documents put out in the trash. – Literally involves getting in a dumpster during off-peak hours and looking for information. – Janitorial crews could be involved. Are they bonded? • Document shredders are not always the answer – Vertical cut, cross cut, micro cut, and security cut. Dumpster diving
  • 32. • No matter how robust an organization’s: – Firewalls – Intrusion detection systems – Anti-virus/malware software – Other technological and physical safeguards • The human is always the weakest link when dealing with security and protecting valuable information. • Knowledge is power. – People sometimes want others to “know what they know” to demonstrate importance. Weakest Link?
  • 33. • Training – User awareness • User knows that giving out certain information is bad. • Policies – Employees are not allowed to divulge information. – Prevents employees from being socially pressured or tricked. – Polices MUST be enforced to be effective. How to prevent social engineering?
  • 34. • Every organization must decide what information is sensitive and should not be shared. • Password management • Physical security • Network defenses may only repel attacks – Virus protection – Email attachment scanning – Firewalls, etc. • Security must be tested periodically. How to prevent social engineering?
  • 35. • Third-party testing – Hire a third-party to attempt to attack targeted areas of the organization. – Have the third-party attempt to acquire information from employees using social engineering techniques. – Learning tool for the organization—not a punishment for employees. How to prevent social engineering?
  • 37. • Security awareness reflects an organization’s mindset or attitude toward protecting the physical and intellectual assets of an organization. This attitude guides the approach used to protect those assets. In general, the approach is referred to as a security awareness program. What is security awareness?
  • 38. • What elements reflect the overall strength of an organization’s security culture? – What causes a security awareness program to fail? – What comprises a successful security awareness program? • Even the best technical security efforts will fail if the organization has a weak security culture. Security awareness success
  • 39. 1) Not understanding what security awareness really is. – Major difference between security awareness and security training. • Watching an online video about security awareness is training. – The primary goal of security awareness is to change behavior. 2) Reliance on checking the box. – Satisfying compliance standards equate to strong security awareness or even that security exists. • Merely prove the minimum standards have been met. • Standards are vague and difficult to measure. – EXAMPLE: “A security awareness program must be in place.” Why do security awareness programs fail?
  • 40. 3) Failing to acknowledge that security awareness is a unique discipline. – Who is responsible for the function? – Does the person have the knowledge, skills, and abilities? – Does the person have soft skills such as strong communication and marketing ability? • Initial efforts to implement security awareness and to affect change over time require such skills. Why do security awareness programs fail?
  • 41. 4) Lack of engaging and appropriate materials. – Annual computer-based training is not enough. – It is critical that multiple versions or styles of security awareness materials be implemented. • Ensure the materials are appropriate to the organization based on industry and employee demographics. • Younger employees respond better to blogs and twitter feeds while older employees prefer traditional materials like posters and newsletters. Why do security awareness programs fail?
  • 42. 5) Not collecting metrics. – Without metrics, there is no way to determine if security awareness goals are being met. • Are we wasting money or providing value? • What is working and what is not? • Are our losses decreasing? – Collecting metrics on a regular basis allows for adjustments. – Measure the impact to the organization. Why do security awareness programs fail?
  • 43. 5) Not collecting metrics (continued). – Example metrics include: • Number of people who fall victim to a phishing attack. • Number of employees who understand and follow security policies. • Number of employees securing desk environment at end of day. • Number of employees using strong passwords. • Number of employees who understand, follow, and enforce policies for restricted access to facilities. • Who has or has not completed annual security awareness training. • Types of reinforcement training, who is it communicated to, and how often. Why do security awareness programs fail?
  • 44. 6) Unreasonable expectations. – No security counter-measure will ever be successful at mitigating all incidents. 7) Relying upon a single training exercise. – Focusing on a single security weakness or threat approach when there are dozens leaves an organization open to attack to ignored approaches. Why do security awareness programs fail?
  • 45. 1) C-suite support. – Awareness program support from executive management leads to more freedom, increased budgets, and support from other departments. – Obtaining strong support from top level management is first priority. • Consider materials designed specifically for executives—newsletters and brief articles that highlight relevant news and information. Keys to security awareness success
  • 46. 2) Partnering with key departments. – Get other departments involved in the program that might provide additional resources toward program success. • Human resources, legal, compliance, marketing, etc. • Consider the needs of these other departments and incorporate into the overall security awareness approach. 3) Creativity – Small budgets for security awareness are common, however, creativity and enthusiasm can bridge the gap created by a small budget. Keys to security awareness success
  • 47. 4) Metrics. – Prove the security awareness program effort is successful—utilize metrics. 5) Explanation and transparency. – Focus and how to accomplish specific actions through clear explanation. – Instead of telling people to not do certain things, explain how they can do certain things safely. Keys to security awareness success
  • 48. 6) 90-day plans. – Many programs follow a one-year plan with one topic covered monthly. • Does not reinforce knowledge and does not permit feedback or consider ongoing events. – A 90-day plan is most effective as it permits re-evaluation of the program and its goals more regularly. • Focus on 3 topics simultaneously and reinforce during the 90 days. • Can be easily adjusted to address current and key issues. Keys to security awareness success
  • 49. 7) Multimodal awareness materials – Utilize multiple forms of security awareness materials. • Newsletters • Blogs • Newsfeeds • Phishing simulation • Games – Participative approaches have the most long-term success. Keys to security awareness success
  • 50. 8) Incentivized security awareness programs. – Develop “Incentivized Awareness Programs”. – Focus on creating a reward structure to incentivize people for exercising desired behaviors. – This technique switches the entire awareness paradigm by encouraging employees to elicit a natural and desired behavior rather than forcing them. Keys to security awareness success
  • 51. • Habits drive security culture and there are no technologies that will ever make up for poor security culture. • Awareness programs, when properly executed, provide knowledge that instills behavior. Key take away
  • 52. INTEREST RATE RISK MANAGEMENT & MODEL VALIDATION
  • 53. • The potential loss from unexpected changes in interest rates which can significantly impact profitability and market value of equity. What is interest rate risk?
  • 54. • The amount at risk is a function of the magnitude and direction of interest rate changes and the size and maturity structure of the mismatch position. • If interest rates rise, the cost of funds increases more rapidly than the yield on assets, thereby reducing net income. • If the exposure is not managed properly it can erode profitability. Interest rate risk in more detail . . .
  • 55. • A key element of management of interest rate risk is to perform an independent validation of the modeling system. • Why? Financial market and economic conditions present significant risk management challenges to institutions of all sizes. • Resources: – Interagency Advisory on Interest Rate Risk Management issued January 6, 2010. – Interagency Advisory on Interest Rate Risk Management Frequently Asked Questions issued January 12, 2012 Managing interest rate risk
  • 56. • Models have long been a critical tool used by Credit Unions to manage the various risks they face. • Models need to be understood – not a “Black Box”. Model validation
  • 57. • Performing interest rate risk model validation is also a best practice. – It strengthens reliance on the model to make sound business decisions. – It addresses “model risk”, or the possibility of adverse consequences from management decisions resulting from incorrect or improperly used model outputs. – Identifies weaknesses in: • Data setups • Inputs • Behavior assumptions Interest rate model validation
  • 58. • Who should perform interest rate risk model validation procedures? – Consider expertise. – Consider experience. – Consider independence. • Internal audit • ALM model vendor • CPA firm/consulting firm • Investment brokers/advisors • Corporate credit unions Performing a model validation
  • 59. • Model input – Data – Assumptions • Model processing – Mathematics and formulas/code – Mechanics – Theory • Model output/reports – Model results – Context of reports Key components of a validation
  • 60. • Data and setup issues – Data reconciles to the general ledger – Market data – Account attributes – Contractual input Model input
  • 61. Models typically receive automated fees from many sources: – Interest rate curves – Cost of funds – Balance Sheet data Model input
  • 62. Models also utilize infrequently updated or hardcoded values: – Credit Union’s unit costs – Leverage targets Model input
  • 63. • Assumptions – Prepayments – Non-maturity shares – Price sensitivity – Reinvestment rates – Discount rates – Economics – stresses to portfolio Model input
  • 64. • The testing of model inputs should regularly employ either specified or statistically determined “stressed” model input variables. Model input
  • 65. • During times of stress, one does not want data that assumes market liquidity and an ample supply of buyers and sellers across all risk categories. Model input
  • 66. Validation should include: – Software vendor supplied verifications – Predictive analysis – Benchmarking – Back-testing Model processing
  • 67. • Testing and validation should evaluate: – The validity of the conceptual soundness of the model – Potential limitations in the model and range of applicability – Model effectiveness both through back testing and periodic reviews of model results. Model processing
  • 68. • Are reports easy to understand? • Do reports make comparisons to policy limits? • Do reports meet regulatory guidelines/preference? Model reports
  • 69. • Models must capture the complexity of the institution and the phenomena they want to simulate. • Credit unions must have the information necessary to know, monitor, and govern the models used. Model reports
  • 70. • Does the model meet the business needs and regulatory requirements of the financial institution? • Is the model capable of institution-specific modeling? • Can it model the financial institution’s balance sheet instruments? Model adequacy
  • 71. • Is the model contained in a strong control environment? – Documented user procedures and processes. – Is user training and cross training adequate and documented? • Does the model satisfy governance needs? – ALCO policy – ALCO limits – ALCO meetings with minutes Model control and governance
  • 72. • No regulatory standard exists for how frequently an interest rate risk model should be validated. – Interagency guidance suggests annually. – At least as often, an on same cycle, as regulatory examinations. • Depends on the size and risk of the financial institution. – What is the complexity of the ALM environment? – What is the risk appetite and risk tolerance of executive management? • Industry best practice suggests every 3 years by a third- party vendor supplemented with internal testing annually. Model validation frequency
  • 74. • The vendor management process begins by selecting the right vendor for the right reasons. • The vendor selection process can be a very complicated and emotional undertaking if you don't know how to approach it from the very start. • You will need to analyze your business requirements, search for prospective vendors, lead the team in selecting the winning vendor and successfully negotiate a contract while avoiding contract negotiation mistakes. Vendor selection
  • 75. • Don’t get blinded by the “glitz and sizzle” that some vendors project. • A lot of salespeople and specialty consultants do not always equate to a strong vendor—they may not be there after the contract is signed. • Ask all questions. – Is the outsourcing area within the vendor’s expertise? Scrutinize the prospects
  • 76. • Be wary of restrictive or exclusive relationships. – Limitations with other vendors or with future customers. • Do not accept a contract with severe penalties for what are small incidents. • Do not accept long-term contracts. – Short-term contracts with option periods are more appropriate. • Consider the vendor’s needs. – A small and insignificant issue to you may be very important to the vendor. • Overall, show good faith and willingness to work together. Remain flexible
  • 77. • Once the vendor relationship has commenced, don’t assume all will go according to plan. • The vendor’s performance must be monitored constantly at the start. – Should include the requirements most critical to the business. • Quality of service, order of completion, response time, etc. Monitor performance
  • 78. • Communicate. • Communicate. • Communicate. • Establish a well maintained line of communication. – Avoid misunderstandings – Proactively address issues before they become problems. Communicate constantly
  • 79. • Having a vendor management program in place will greatly enhance the vendor relationship and protect the business. – Vendor management policy approved by the board of directors. – Define what constitutes a critical vendor. – Establish a vendor risk assessment process. – Establish regular vendor review procedures. • Vendor SOC reports (formerly SAS 70 reports) on file are current Vendor management program components