SlideShare une entreprise Scribd logo
1  sur  30
Enterprise Risk Management for
Community Banks
Brian T. O’Hara CISA, CISM, CRISC, CISSP
CISO The Mako Group, LLC
btohara@makopro.com
http://www.linkedin.com/in/brianohara/
Twitter: @brian_t_ohara
The Mako Group, LLC
• IT & Info Sec Auditing
• IT Risk Assessments
• Security Training
• Vulnerability
Assessments
• Social Engineering
• PCI DSS 3
• FISMA Audits
• Penetration Testing
• Gap Assessments
• SOC 1 and SOC 2
• SOX 404
• HIPAA
• Virtual CISO
The Mako Group, LLC
• 1570 Woodward Ave.
Detroit, MI 48266
Phone: 313.355.0538
Email: detroit@makopro.com
• 110 West Berry Street - Suite 2400
Fort Wayne, IN 46802
Phone: 260.267.5999
Email: fortwayne@makopro.com
• 8555 River Road - Suite 315
Indianapolis, IN 46240
Phone: 317.941.MAKO (6256)
Email: indianapolis@makopro.com
BIO
• CISO of The Mako Group, LLC
• ISSA Fellow
• Program Chair, CINT Ivy Tech NE
• Adjunct Faculty Indiana Tech
• CISSP - Certified Info Systems Security Prof.
• CISA - Certified Information Systems Auditor
• CISM - Certified Information Security Manager
• CRISC - Certified Risk Info System Controls
BIO
• CAE of The Mako Group, LLC
• CPA
• MSA – Masters of Accountancy
• ISACA Detroit Chapter
• CISA - Certified Information Systems Auditor
• Previously ran the Sarbanes-Oxley and FDICIA
programs for Ally Bank
What Is ERM?
• Enterprise Risk Management (“ERM”) is a
strategic business discipline that supports the
achievement of an organization’s objectives by
addressing the full spectrum of its risks and
managing the combined impact of those risks as
an interrelated risk portfolio. (http://www.rims.org/erm/pages/WhatisERM.aspx)
ERM Elements?
• Tied to Bank’s Strategic Plan
• Chief Risk Officer (Top Down Approach)
• Correlations (non-silo)
• Target Objectives
• Measurable
• Focus on Outcomes
ERM Principles
• Not just about Risk Mitigation
– It is a management system
• Management Model that leads to action
• Unified Approach
• Answers Key Questions
Quiz 1
• Who Invented the World Wide Web?
• Tim Berners-Lee
ERM Key Questions
• Do we understand risk across the enterprise?
• What is the reward?
• Is the risk acceptable?
• Is the reward great enough?
• Does it link strategies?
• Is it supported from the top down?
• Are discussions made with input to business as
opposed to protecting lines of business?
Who Is ERM Designed For?
• Community Banks?
• Size?
• Complexity?
• Affordability?
• Value Add?
Examples
• Larger Banks
• Publicly Traded Companies (SOX)
• Service Providers (CORE)
ERM Value?
• Provides a more robust picture of risk
• Corrects Silo Risk Mentality
• Provides Greater Transparency
• Delivers Effective Resource Allocation
• Shifts Focus from Reactive to Proactive
• Examiner Expectations
Sound ERM
• IT Risks Rolled Up
• NO Risk Silos
• Integrated with Business Strategy
• Provides More Accurate Picture of Tolerance
• More Effective Resource Allocation
• Proactive v Reactive
• Helps Identify Key Controls
Poor ERM
• Risk Silos
• Poor View of Overall Risks
• Reactive rather than Proactive
• Examples
– Target
– TJ Max
– Heartland Payment Processors
Quiz 2
• What was the first commercial web browser?
ERM Frameworks?
• COSO
• RIMS
• ISO
• COBIT
• FFIEC Guidance
• Johnson and Johnson
• NIST
Risk Management Frameworks?
• CyberSecurity (Exec Order 13636)
• NIST
• COBIT
• COSO
• ISO
• FFIEC Guidance
Communicating ERM Across Enterprise
• Quantitative v & Qualitative
• $ to Risk to Exposure
• Opportunities
How To Implement ERM
• Pick a framework
• Get top management buy in
• Establish Enterprise stakeholders
How to Discuss with Sr. Mgmt
• Cost
• Risk
• Opportunity
How to Explain
• Quantitative v Qualitative Information
Quiz 3
• Who sent the first official “email” over the
internet?
• Mark Tomlinson
When is ERM not a good fit?
• Lack of Sr. Management Buy in
• Size and complexity of operations
• Too expensive, cost v benefit
ERM Problems
• Lack of single unifying framework
• Remains reactive
• Discounts insiders (relies on “experts”)
• Does not calculate mitigation costs
• Fails to rank risk
• Lack of academic studies showing
effectiveness
Cybersecurity Framework
• NIST Creation
• Fits smaller community banks
• Easily tailored and scalable
• Encompasses ERM key components
• Provides control mappings to standards
• Above and beyond examiner expectations
• Affordable implementations
The Mako Group’s Approach (Hybrid)
• Guided (organization is the expert)
• Holistic
• Eclectic
• Customized based on organization needs
• Based on value added
• Built to optimize resource allocation
Conclusions
• ERM is not always a good fit
• Can be costly
• Can add unforeseen visibility
• Can add predictive value
• Can still provide guiding principles
Summary
• ERM value still unclear
• ERM is a holistic approach
• More Complex
• More about choosing pieces that work for you
• Hybrid approaches using models like
Cybersecurity Framework provides best of
both worlds
THANKS
Brian T. O’Hara CISA, CISM, CRISC, CISSP
CISO The Mako Group, LLC
btohara@makopro.com
http://www.linkedin.com/in/brianohara/
Twitter: @brian_t_ohara

Contenu connexe

Tendances

Alex Sidorenko at the 6th G31000 Risk management conference in Dubai
Alex Sidorenko at the 6th G31000 Risk management conference in DubaiAlex Sidorenko at the 6th G31000 Risk management conference in Dubai
Alex Sidorenko at the 6th G31000 Risk management conference in DubaiAlexei Sidorenko, CRMP
 
6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk ManagementPECB
 
The Intersection of Risk, Security, and Performance
The Intersection of Risk, Security, and PerformanceThe Intersection of Risk, Security, and Performance
The Intersection of Risk, Security, and PerformanceResolver Inc.
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right postureParag Deodhar
 
Risk management automation
Risk management automationRisk management automation
Risk management automationsheyam selvaraj
 
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...Resolver Inc.
 
Crisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMSCrisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMSAtlantic Training, LLC.
 
Risk managemet made easy
Risk managemet made easyRisk managemet made easy
Risk managemet made easysheyam selvaraj
 
Public Sector Enterprise Risk Management
Public Sector Enterprise Risk ManagementPublic Sector Enterprise Risk Management
Public Sector Enterprise Risk ManagementDr David Hancock
 
Globals - Too Big to Govern?
Globals - Too Big to Govern?Globals - Too Big to Govern?
Globals - Too Big to Govern?Resolver Inc.
 
Enterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationEnterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationAlexander Larsen
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop Ersoy AKSOY
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceResolver Inc.
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsResolver Inc.
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk managementSubhendu Datta
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsResolver Inc.
 
The Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementThe Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementCorporater
 

Tendances (20)

Alex Sidorenko at the 6th G31000 Risk management conference in Dubai
Alex Sidorenko at the 6th G31000 Risk management conference in DubaiAlex Sidorenko at the 6th G31000 Risk management conference in Dubai
Alex Sidorenko at the 6th G31000 Risk management conference in Dubai
 
6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management
 
The Intersection of Risk, Security, and Performance
The Intersection of Risk, Security, and PerformanceThe Intersection of Risk, Security, and Performance
The Intersection of Risk, Security, and Performance
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right posture
 
Risk management automation
Risk management automationRisk management automation
Risk management automation
 
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
 
Crisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMSCrisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMS
 
Risk managemet made easy
Risk managemet made easyRisk managemet made easy
Risk managemet made easy
 
#corpriskforum2016 - Erike Young
#corpriskforum2016 - Erike Young#corpriskforum2016 - Erike Young
#corpriskforum2016 - Erike Young
 
Public Sector Enterprise Risk Management
Public Sector Enterprise Risk ManagementPublic Sector Enterprise Risk Management
Public Sector Enterprise Risk Management
 
Globals - Too Big to Govern?
Globals - Too Big to Govern?Globals - Too Big to Govern?
Globals - Too Big to Govern?
 
Enterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationEnterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample Presentation
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and Performance
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
Emerging Risks
Emerging RisksEmerging Risks
Emerging Risks
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk management
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 Steps
 
The Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementThe Purpose of Holistic Risk Management
The Purpose of Holistic Risk Management
 

Similaire à Michigan Bankers Association Best 2014 enterprise risk management ppt

CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security GovernanceCNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security GovernanceSam Bowne
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Dont let governance risk and compliance be a roll of the dice | ESPC22
Dont let governance risk and compliance be a roll of the dice |  ESPC22 Dont let governance risk and compliance be a roll of the dice |  ESPC22
Dont let governance risk and compliance be a roll of the dice | ESPC22 Nikki Chapple
 
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramCNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramSam Bowne
 
The ESRM Skills Cocktail
The ESRM Skills CocktailThe ESRM Skills Cocktail
The ESRM Skills CocktailDoreen Loeber
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureSecurity Innovation
 
Democratization and Decisions through Data: Scaling Search at the Enterprise ...
Democratization and Decisions through Data: Scaling Search at the Enterprise ...Democratization and Decisions through Data: Scaling Search at the Enterprise ...
Democratization and Decisions through Data: Scaling Search at the Enterprise ...Keith Goode
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
Knowledge Management - By Joe Hessmiller
Knowledge Management - By Joe HessmillerKnowledge Management - By Joe Hessmiller
Knowledge Management - By Joe HessmillerComputer Aid, Inc
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarConcept Searching, Inc
 
Lecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptxLecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptxRoshanKC10
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
10 Essentials for Effective Teams Governance
10 Essentials for Effective Teams Governance10 Essentials for Effective Teams Governance
10 Essentials for Effective Teams GovernanceChristian Buckley
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarConcept Searching, Inc
 
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxhforhassan101
 

Similaire à Michigan Bankers Association Best 2014 enterprise risk management ppt (20)

CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security GovernanceCNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Dont let governance risk and compliance be a roll of the dice | ESPC22
Dont let governance risk and compliance be a roll of the dice |  ESPC22 Dont let governance risk and compliance be a roll of the dice |  ESPC22
Dont let governance risk and compliance be a roll of the dice | ESPC22
 
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramCNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
 
The ESRM Skills Cocktail
The ESRM Skills CocktailThe ESRM Skills Cocktail
The ESRM Skills Cocktail
 
Estrat social2014
Estrat social2014Estrat social2014
Estrat social2014
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
 
CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
 
Democratization and Decisions through Data: Scaling Search at the Enterprise ...
Democratization and Decisions through Data: Scaling Search at the Enterprise ...Democratization and Decisions through Data: Scaling Search at the Enterprise ...
Democratization and Decisions through Data: Scaling Search at the Enterprise ...
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Knowledge Management - By Joe Hessmiller
Knowledge Management - By Joe HessmillerKnowledge Management - By Joe Hessmiller
Knowledge Management - By Joe Hessmiller
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Lecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptxLecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptx
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
10 Essentials for Effective Teams Governance
10 Essentials for Effective Teams Governance10 Essentials for Effective Teams Governance
10 Essentials for Effective Teams Governance
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches Webinar
 
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Michigan Bankers Association Best 2014 enterprise risk management ppt

  • 1. Enterprise Risk Management for Community Banks Brian T. O’Hara CISA, CISM, CRISC, CISSP CISO The Mako Group, LLC btohara@makopro.com http://www.linkedin.com/in/brianohara/ Twitter: @brian_t_ohara
  • 2. The Mako Group, LLC • IT & Info Sec Auditing • IT Risk Assessments • Security Training • Vulnerability Assessments • Social Engineering • PCI DSS 3 • FISMA Audits • Penetration Testing • Gap Assessments • SOC 1 and SOC 2 • SOX 404 • HIPAA • Virtual CISO
  • 3. The Mako Group, LLC • 1570 Woodward Ave. Detroit, MI 48266 Phone: 313.355.0538 Email: detroit@makopro.com • 110 West Berry Street - Suite 2400 Fort Wayne, IN 46802 Phone: 260.267.5999 Email: fortwayne@makopro.com • 8555 River Road - Suite 315 Indianapolis, IN 46240 Phone: 317.941.MAKO (6256) Email: indianapolis@makopro.com
  • 4. BIO • CISO of The Mako Group, LLC • ISSA Fellow • Program Chair, CINT Ivy Tech NE • Adjunct Faculty Indiana Tech • CISSP - Certified Info Systems Security Prof. • CISA - Certified Information Systems Auditor • CISM - Certified Information Security Manager • CRISC - Certified Risk Info System Controls
  • 5. BIO • CAE of The Mako Group, LLC • CPA • MSA – Masters of Accountancy • ISACA Detroit Chapter • CISA - Certified Information Systems Auditor • Previously ran the Sarbanes-Oxley and FDICIA programs for Ally Bank
  • 6. What Is ERM? • Enterprise Risk Management (“ERM”) is a strategic business discipline that supports the achievement of an organization’s objectives by addressing the full spectrum of its risks and managing the combined impact of those risks as an interrelated risk portfolio. (http://www.rims.org/erm/pages/WhatisERM.aspx)
  • 7. ERM Elements? • Tied to Bank’s Strategic Plan • Chief Risk Officer (Top Down Approach) • Correlations (non-silo) • Target Objectives • Measurable • Focus on Outcomes
  • 8. ERM Principles • Not just about Risk Mitigation – It is a management system • Management Model that leads to action • Unified Approach • Answers Key Questions
  • 9. Quiz 1 • Who Invented the World Wide Web? • Tim Berners-Lee
  • 10. ERM Key Questions • Do we understand risk across the enterprise? • What is the reward? • Is the risk acceptable? • Is the reward great enough? • Does it link strategies? • Is it supported from the top down? • Are discussions made with input to business as opposed to protecting lines of business?
  • 11. Who Is ERM Designed For? • Community Banks? • Size? • Complexity? • Affordability? • Value Add?
  • 12. Examples • Larger Banks • Publicly Traded Companies (SOX) • Service Providers (CORE)
  • 13. ERM Value? • Provides a more robust picture of risk • Corrects Silo Risk Mentality • Provides Greater Transparency • Delivers Effective Resource Allocation • Shifts Focus from Reactive to Proactive • Examiner Expectations
  • 14. Sound ERM • IT Risks Rolled Up • NO Risk Silos • Integrated with Business Strategy • Provides More Accurate Picture of Tolerance • More Effective Resource Allocation • Proactive v Reactive • Helps Identify Key Controls
  • 15. Poor ERM • Risk Silos • Poor View of Overall Risks • Reactive rather than Proactive • Examples – Target – TJ Max – Heartland Payment Processors
  • 16. Quiz 2 • What was the first commercial web browser?
  • 17. ERM Frameworks? • COSO • RIMS • ISO • COBIT • FFIEC Guidance • Johnson and Johnson • NIST
  • 18. Risk Management Frameworks? • CyberSecurity (Exec Order 13636) • NIST • COBIT • COSO • ISO • FFIEC Guidance
  • 19. Communicating ERM Across Enterprise • Quantitative v & Qualitative • $ to Risk to Exposure • Opportunities
  • 20. How To Implement ERM • Pick a framework • Get top management buy in • Establish Enterprise stakeholders
  • 21. How to Discuss with Sr. Mgmt • Cost • Risk • Opportunity
  • 22. How to Explain • Quantitative v Qualitative Information
  • 23. Quiz 3 • Who sent the first official “email” over the internet? • Mark Tomlinson
  • 24. When is ERM not a good fit? • Lack of Sr. Management Buy in • Size and complexity of operations • Too expensive, cost v benefit
  • 25. ERM Problems • Lack of single unifying framework • Remains reactive • Discounts insiders (relies on “experts”) • Does not calculate mitigation costs • Fails to rank risk • Lack of academic studies showing effectiveness
  • 26. Cybersecurity Framework • NIST Creation • Fits smaller community banks • Easily tailored and scalable • Encompasses ERM key components • Provides control mappings to standards • Above and beyond examiner expectations • Affordable implementations
  • 27. The Mako Group’s Approach (Hybrid) • Guided (organization is the expert) • Holistic • Eclectic • Customized based on organization needs • Based on value added • Built to optimize resource allocation
  • 28. Conclusions • ERM is not always a good fit • Can be costly • Can add unforeseen visibility • Can add predictive value • Can still provide guiding principles
  • 29. Summary • ERM value still unclear • ERM is a holistic approach • More Complex • More about choosing pieces that work for you • Hybrid approaches using models like Cybersecurity Framework provides best of both worlds
  • 30. THANKS Brian T. O’Hara CISA, CISM, CRISC, CISSP CISO The Mako Group, LLC btohara@makopro.com http://www.linkedin.com/in/brianohara/ Twitter: @brian_t_ohara

Notes de l'éditeur

  1. As an information security firm, The Mako Group specializes in protection - providing security through auditing, testing and assessments. And, we do it all with the highest quality standards possible. That means an exclusive team of executive-level staff, easy-to-understand reviews and a proprietary audit guide that's the most comprehensive in the industry. When you choose The Mako Group, you're gaining a partnership that dives into the very core of your overall security, ensuring that your company and entire control environment are stronger as a result. And that adds up to a better, more secure future for you.
  2. Mr. O’Hara has been involved in the field of information security for over 17 years and currently serves as the CISO for The Mako Group, LLC, an IT Security Consulting company specializing in Auditing and Information Security for the Health Care, Manufacturing, Retail and Financial industries as well as both the private and public sectors. As CISO, his responsibilities include overseeing and managing security related functions including but not limited to audit and regulatory compliance reviews, development and implementation of Risk Management frameworks and internal security and development of strategic planning with regard to emerging technologies. He holds a BA from Indiana University, Bloomington and an MA from the University of North Dakota. When Brian isn’t out speaking or trying to solve your business security problems he spends time riding his bike, playing one of seven instruments and walking one or more of his five dogs (shelties named after musicians). In addition he enjoys eating his wife Brenda’s famous gourmet cooking 
  3. Shane O’Donnell has been involved in the fields of Accounting, Risk Management and Audit for over 10 years and currently serves as the Chief Audit Executive for The Mako Group, an IT Security Consulting company specializing in Auditing and Information Security for the Health Care, Manufacturing, Retail and Financial industries as well as both the private and public sectors. As CAE his duties include overseeing the overall audit function, developing The Mako Group engagement methodology and servicing The Mako Group’s clients.   Shane holds a BA in Accounting from Western Michigan University and an MSA in Accounting from Walsh College. He received his initial audit training at PricewaterhouseCoopers and was the Manager of Financial Controls at Ally Bank prior to joining The Mako Group. As Chief Audit Executive, Shane’s responsibilities include:   Developing and overseeing the application The Mako Group audit methodology Performing comprehensive risk assessments identifying vulnerabilities and creating actionable plans to mitigate outstanding risks Performing training with new staff members to maintain high level of service to customers Partnering with companies to improve and test compliance with applicable rules and regulations   Mr. O’Donnell has presented and conducted training on topics of interest to the audit community such as:   Sarbanes-Oxley Compliance FDICIA Compliance Risk Management Internal Control Implementation   Mr. O’Donnell is an active member in the Detroit Chapter of ISACA and is a Certified Public Accountant and Certified Information Systems Auditor.
  4. Enterprise Risk Management (“ERM”) is a strategic business discipline that supports the achievement of an organization’s objectives by addressing the full spectrum of its risks and managing the combined impact of those risks as an interrelated risk portfolio. ERM represents a significant evolution beyond previous approaches to risk management in that it: Encompasses all areas of organizational exposure to risk (financial, operational, reporting, compliance, governance, strategic, reputational, etc.); Prioritizes and manages those exposures as an interrelated risk portfolio rather than as individual “silos”; Evaluates the risk portfolio in the context of all significant internal and external environments, systems, circumstances, and stakeholders; Recognizes that individual risks across the organization are interrelated and can create a combined exposure that differs from the sum of the individual risks; Provides a structured process for the management of all risks, whether those risks are primarily quantitative or qualitative in nature; Views the effective management of risk as a competitive advantage; and Seeks to embed risk management as a component in all critical decisions throughout the organization (http://www.rims.org/erm/pages/WhatisERM.aspx)
  5. Is ERM really meant for community banks and at what size does it begin to make sense? Person owned credit unions are specifically exempted from performing ERM activities in NCAU regs.
  6. http://coso.org/-ERM.htm http://www.rims.org/resources/erm/Pages/default.aspx http://ww.iso.org FFIEC – see included documents http://www.jnj.com http://www.nist.gov
  7. Cybersecurity Framework – see included documents
  8. One common theme throughout the literature has to do with the difficulties discussing technical findings with the C Suite. Most authors recommend that risk be discussed in terms of the opportunities to the organization and how it fits with the risk tolerance profile.