a business process approach to managing …sensitive data involved; its access, acquisition, use,...

26
© Dennis Dickstein, Sept 12, 2011 Page 1 A Business Process Approach to Managing Operational Risk and Information Security Dennis Dickstein

Upload: others

Post on 23-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 1

A Business Process Approach to Managing Operational Riskand Information Security

Dennis Dickstein

Page 2: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 2

Flying Should Be Safe

Controls:1. Pilot (& Co-Pilot most of the time) in airplane2. Lights & Signs on runways3. Ground crew providing direction before runway4. Controllers talking to/watching aircraft from control tower

What happened to Comair flight 5191 in Lexington KY on Aug 27, 2006:Two runways: one short and one long (98% of operations) close to each otherConstruction forced passing over the short runway to get to the long runwayEarly morning, dark; lights not on the short runwayOne controller in tower; looked away to perform administrative tasks

The result:Flight took off short (wrong) runway49 people killed (all but the co-pilot)

Page 3: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 3

Surgery in Hospitals Should be Straightforward

Controls:1. Administrators admit the patient and document the treatment2. Technicians provide exact location for surgery3. Nurses confirm technician notes; report patient issues4. Doctors confirm all documentation and perform the surgery

What happened at Rhode Island Hospital in 2007:January patient: mark in wrong place; doctor operated on wrong sideJuly patient: location not written on form; doctor operated on wrong side November patient: nurse-doctor disagreement; doctor operated on wrong side

The Result:Expense; serious injury; death

This happened with other surgeries and with wrong doses of medicine

Page 4: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 4

Electricity Should be Available

Controls:1. People monitor and prune trees and manage the systems2. Local systems detect short-circuits; re-route power to other lines3. Regional systems provide backup alerts and service

What happened on August 14, 2003:Some trees in Ohio were not pruned; they hit some lines — short circuitLocal systems did not detect the short circuits and shut down wrong linesRegional systems did not collect real-time data and shut down more wrong linesPeople did not understand the problem until it was too late

Result:50 million people in US & Canada without power; losses of about $4-6 BillionThe US blamed Canada; Canada blamed Niagara Falls, then NY, then PA

A similar event occurred a month later, affecting 56 million people in Italy

Page 5: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 5

Definition of Risk

Operational Risk is the risk of loss resulting from inadequate or failed people, processes or technology

Risk is the potential that an action or inaction will lead to an undesirable outcome

Risks you wish to incur and perhaps profit from (expected risk):Market risk Credit risk

Risks you generally do not choose to have (unexpected risk):Reputation risk Operational risk

Operational Risk is the risk of loss resulting from inadequate or failed people, processes or technology

Risk is the potential that an action or inaction will lead to an undesirable outcome

Risks you wish to incur and perhaps profit from (expected risk):Market risk Credit risk

Risks you generally do not choose to have (unexpected risk):Reputation risk Operational risk

Page 6: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 6

Client and product

data

Shipping / distribution

Access to and use of

data

Physical security

Daily transactions

ITsecurity

Business

Recording and billing

Transaction processing risk

States' regulations

Federal regulations

Client and employee

privacy

International laws and standards

Vendor liability

Contracts

Liability with clients

Internal liability

Compliance risk

Priv

acy

& S

ecur

ity ri

skLegal / Liability risk

Client and product

data

Shipping / distribution

Access to and use of

data

Physical security

Daily transactions

ITsecurity

Business

Recording and billing

Transaction processing risk

States' regulations

Federal regulations

Client and employee

privacy

International laws and standards

Vendor liability

Contracts

Liability with clients

Internal liability

Compliance risk

Priv

acy

& S

ecur

ity ri

skLegal / Liability risk

Types of Operational Risk

Page 7: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 7

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

…looks back and reactsSource: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

…looks back and reacts

Typical Approach to Managing Operational Risk

Page 8: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 8

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

Consider the Business Process Framework

Page 9: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 9

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

Consider a Proactive Risk Management Framework

Page 10: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 10

A Proactive Operational Risk Management Framework

Process Management Framework

Set and Update the Risk Environment

Monitor Risk

DeterminePotential

Risk

Manage Risk

Design/RedesignProcess

Model/Simulate Process

Deploy, Execute and Monitor Process

Analyze Results

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

A Proactive Operational Risk Management Framework

Process Management Framework

Set and Update the Risk Environment

Monitor Risk

DeterminePotential

Risk

Manage Risk

Design/RedesignProcess

Model/Simulate Process

Deploy, Execute and Monitor Process

Analyze Results

A Proactive Operational Risk Management Framework

Process Management Framework

Set and Update the Risk Environment

Monitor Risk

DeterminePotential

Risk

Manage Risk

Design/RedesignProcess

Model/Simulate Process

Deploy, Execute and Monitor Process

Analyze Results

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

An Opportunity to Approach This Holistically

Page 11: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 11

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

Result: An Integrated Framework

Page 12: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 12

The Framework is Only One Part of the Puzzle

Sales and Marketing

Distribution and Operations Product Development / Manufacturing

Billing and Finance

Control functions: Audit, Legal, etc.

Set and Update the Risk Environment

Monitor Risk

Determine Potential

Risk

Manage Risk

Design/RedesignProcess

Model/Simulate Process

Deploy, Execute & Monitor Process

Analyze Results

Set and UpdateGoals/Strategy

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

Designing a framework is fairly straightforward. Obtaining buy-in is key…

Sales and Marketing

Distribution and Operations Product Development / Manufacturing

Billing and Finance

Control functions: Audit, Legal, etc.

Set and Update the Risk Environment

Monitor Risk

Determine Potential

Risk

Manage Risk

Design/RedesignProcess

Model/Simulate Process

Deploy, Execute & Monitor Process

Analyze Results

Set and UpdateGoals/Strategy

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

Designing a framework is fairly straightforward. Obtaining buy-in is key…

Page 13: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 13

Policies and Procedures

Data Breach (Incident) Review and Response

Internal Controls

Training

Security of Third Party Service Providers

"Programs"

Organization and Governance

Information Security Checklist – Not Only Technology

Page 14: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 14

Scope; what is covered

Protocols to follow; processes to monitor

Roles and Responsibilities

Recognizing risk – mitigating risk

Follow up with training

Scope; what is covered

Protocols to follow; processes to monitor

Roles and Responsibilities

Recognizing risk – mitigating risk

Follow up with training

Policies and Procedures

Page 15: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 15

What to do when an incident is identified –Is it a "reportable" breach?Protection services or other security measures?One-time event or indicative of a systemic control deficiency?

Roles and responsibilitiesContact point Analysis and determinationResponding, reporting and logging

Follow up with training

What to do when an incident is identified –Is it a "reportable" breach?Protection services or other security measures?One-time event or indicative of a systemic control deficiency?

Roles and responsibilitiesContact point Analysis and determinationResponding, reporting and logging

Follow up with training

Data Breaches

Page 16: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 16

And if you provide services, do not forget the new SOC 2 and SOC 3 reports…

Systems

People

Processes

And if you provide services, do not forget the new SOC 2 and SOC 3 reports…

Systems

People

Processes

Internal Controls

Page 17: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 17

WhatGeneral awarenessTest employee ability to follow policies and/or proceduresEmployee self-certification of policy / procedure adherenceSpecialized training for specific areas or functions

HowIn-person – "town halls" Conference calls On-line

WhatGeneral awarenessTest employee ability to follow policies and/or proceduresEmployee self-certification of policy / procedure adherenceSpecialized training for specific areas or functions

HowIn-person – "town halls" Conference calls On-line

Training

Page 18: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 18

Determine management of the relationshipsRoles and responsibilitiesGuidelines or checklists for internal relationship managers

Maintain an inventory, identifying for each:Purpose and service; contractual obligations; internal relationship managerSensitive data involved; its access, acquisition, use, storage and disposalRelative risk – allowing a risk-based approach to periodic reviews or assessments

Review processes and privacy/security controlsInitial review prior to or as part of contract negotiationPeriodic monitoring or auditingUse of new AICPA SOC 2 and SOC 3 reports

Even outsourced, the risk remains with you

Determine management of the relationshipsRoles and responsibilitiesGuidelines or checklists for internal relationship managers

Maintain an inventory, identifying for each:Purpose and service; contractual obligations; internal relationship managerSensitive data involved; its access, acquisition, use, storage and disposalRelative risk – allowing a risk-based approach to periodic reviews or assessments

Review processes and privacy/security controlsInitial review prior to or as part of contract negotiationPeriodic monitoring or auditingUse of new AICPA SOC 2 and SOC 3 reports

Even outsourced, the risk remains with you

Third Party Service Providers

Page 19: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 19

Written documentRoles and responsibilitiesCoverage

Management accountabilityTools to helpTools to enforce

How do you know?Policies, procedures and trainingEmployee self-certificationMetricsTestingCombination of above

Written documentRoles and responsibilitiesCoverage

Management accountabilityTools to helpTools to enforce

How do you know?Policies, procedures and trainingEmployee self-certificationMetricsTestingCombination of above

Do You Need Written Information Security Programs?

Page 20: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 20

Build and Integrate; Do Not Duplicate

CFTC: Annual Reviews

FFIEC: Risk Assessments

Documentation

Access control

Metrics

Third party service providers

Incidents / data breaches

Risk/effectiveness assessments

Training

Program administration

Board & other approvals

Communication

Reporting

Comprehensiveness: targeted or broad; risk-based or compliance-based

Policies and procedures

FACTA: Red Flags Program

GLBA: Information Security Program

MA: Information Security Program

CFTC: Annual Reviews

FFIEC: Risk Assessments

Documentation

Access control

Metrics

Third party service providers

Incidents / data breaches

Risk/effectiveness assessments

Training

Program administration

Board & other approvals

Communication

Reporting

Comprehensiveness: targeted or broad; risk-based or compliance-based

Policies and procedures

FACTA: Red Flags Program

GLBA: Information Security Program

MA: Information Security Program

Page 21: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 21

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

Option 1: Separate from business...

Option 2: Within the business...

Option 3: Partner with business...

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

Option 1: Separate from business...

Option 1: Separate from business...

Option 2: Within the business...

Option 3: Partner with business...

Aligning Risk Management to Business

Page 22: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 22

Chief Executive Officerand Executive Group

Head of Audit

Risk Committee

Senior AuditManagement

Audit Staff

General Counsel RegulatoryWorking Group

Board of Directors

Internal AuditGovernance

FinanceGovernance

RiskGovernance

LegalGovernance

RegulatoryComplianceGovernance

ProcessingGovernance

Cross-functionalCommittee

Chief FinancialOfficer

Chief Risk OfficerRegulatory/ComplianceManagement

Controller Managing LawyersProcessManagement

Accountants Lawyers StaffProcess Staff Risk Managers

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

Cross-functionalRisk Committee

Board of Directors

Chief Executive Officerand Executive Group

Chief RiskOfficer

Regulatory/ComplianceManagement

CFO/Controller GeneralCounsel

ProcessManagement

Accountants Lawyers StaffProcess Staff Risk Managers

Head of Audit

Audit Staff

Multi-Control Model Single Thread Model

Chief Executive Officerand Executive Group

Head of Audit

Risk Committee

Senior AuditManagement

Audit Staff

General Counsel RegulatoryWorking Group

Board of Directors

Internal AuditGovernance

FinanceGovernance

RiskGovernance

LegalGovernance

RegulatoryComplianceGovernance

ProcessingGovernance

Cross-functionalCommittee

Chief FinancialOfficer

Chief Risk OfficerRegulatory/ComplianceManagement

Controller Managing LawyersProcessManagement

Accountants Lawyers StaffProcess Staff Risk Managers

Source: Dennis I. Dickstein and Robert H. Flast. No Excuses: A Business Process Approach to Managing Operational Risk. Hoboken: John Wiley & Sons, 2009.

Cross-functionalRisk Committee

Board of Directors

Chief Executive Officerand Executive Group

Chief RiskOfficer

Regulatory/ComplianceManagement

CFO/Controller GeneralCounsel

ProcessManagement

Accountants Lawyers StaffProcess Staff Risk Managers

Head of Audit

Audit Staff

Multi-Control Model Single Thread Model

Create Risk Governance

Page 23: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 23

Sample Governance Structure

Corporate Risk Committee

Information Security Officer(Reside outside of Technology; include privacy/data protection)

Standing or ad hoc Corporate Committees- Client communications- New products/ services- Technology Risk or related

Possible staff functions- Framework/program- Data breaches- Complaints- Review/approve

changes/exceptions

Advisory Council or Committee- Legal- Compliance- Technology- Risk- Product- Sales / Marketing- Operations

Page 24: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 24

Line managers manage the risks of their areas

Risk management identifies, assesses and helps manage the risks

Compliance sets and communicates policy

Executive committees approve control design and review effectiveness

Internal audit independently confirms design and effectiveness

The Board of Directors reviews the results

DOES IT WORK?

Utilize Corporate Lines of Defense

Page 25: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 25

Risk Review

♦ Discovery and Identification(known and unknown risks)

♦ Evaluation(severity & probability)

♦ Mitigation options(cost - $ and other)

♦ Agreement(mitigation/acceptance)

ImpactBusiness & support

Process & systems

Counterparties

Third party service providers

Framework

♦ Roles & Responsibilities

♦ Procedures

♦ Outsourcing

♦ Governance

♦ Training/awareness

♦ Monitoring/testing(attestations not enough)

ImpactPeople

Policies

Process

Solutions

♦ Quick wins

♦ Tools

• Technology(in-house vs. vendor)

• Process change(flexible/adapt to business)

• People change(awareness checklists)

ImpactAccess

Use

Transport

Storage

Disposal

Obtain buy-in: the risks are real; the solutions can vary; and accept a level of risk when mitigation costs outweigh expected risk

LessonsLearned

LessonsLearned

Risk Review

♦ Discovery and Identification(known and unknown risks)

♦ Evaluation(severity & probability)

♦ Mitigation options(cost - $ and other)

♦ Agreement(mitigation/acceptance)

ImpactBusiness & support

Process & systems

Counterparties

Third party service providers

Framework

♦ Roles & Responsibilities

♦ Procedures

♦ Outsourcing

♦ Governance

♦ Training/awareness

♦ Monitoring/testing(attestations not enough)

ImpactPeople

Policies

Process

Solutions

♦ Quick wins

♦ Tools

• Technology(in-house vs. vendor)

• Process change(flexible/adapt to business)

• People change(awareness checklists)

ImpactAccess

Use

Transport

Storage

Disposal

Obtain buy-in: the risks are real; the solutions can vary; and accept a level of risk when mitigation costs outweigh expected risk

LessonsLearned

LessonsLearned

A Possible Approach

Page 26: A Business Process Approach to Managing …Sensitive data involved; its access, acquisition, use, storage and disposal Relative risk – allowing a risk-based appr oach to periodic

© Dennis Dickstein, Sept 12, 2011 Page 26

Now You Have No Excuses!