An approach to the risk management of structured financial products. Marco Cammi Unità di Risk Management della Banca Monte dei Paschi di Siena

Size: px
Start display at page:

Download "An approach to the risk management of structured financial products. Marco Cammi Unità di Risk Management della Banca Monte dei Paschi di Siena"

Transcription

1 An approach to the risk management of structured financial products Marco Cammi Unità di Risk Management della Banca Monte dei Paschi di Siena Abstract The core of any risk management information system is always an analytical engine working according to a specific approach to calculate value-at-risk indicators. In this paper a description of relevant financial modeling issues and their implementation in the context of the risk management information system of Gruppo Monte dei Paschi di Siena will be presented. Introduction The Value-at-Risk analysis required by Gruppo Monte dei Paschi di Siena, whose trading portfolios include traditional financial instruments and derivatives, must be settled up to respond to a number of technical and organizational requirements. Among the most relevant issues, is worth mentioning the following: 1. the analytical procedure must be governed by analytical users, so that they can manage the inclusion of new financial instruments or different types of analysis. This activity must be kept easy and simple (analytical user are not system programmers) but at the same time it should allow users the treatment of complex modeling issues; 2. the whole computational procedure should be modular and trackable, so that the analytical model be self-documented and accessible for testing and validation by institutional authorities. This paper will shortly describe the way the risk analysis procedure has been organized in the context of the implementation of the Risk Management Information System of Gruppo Monte dei Paschi di Siena. First, the implementation approach will be reviewed, describing how Risk Dimensions basic concepts (environment, financial instrument, and so on) have been used to support the implementation. Then some critical implementation issues will be shortly mentioned, together with their proposed solutions. Organizing an analitical engine for Value-at-Risk Calculation

2 General architecture The risk analysis process is divided in several layers: 1. Operational Data Definition layer (data upload, transfert, import); 2. Data Warehouse layer (decoding, quality check, merging across different data sources); 3. Pre-analysis layer (retrieval of data, preparing data for subsequent analyses (VaR, ALM, other analyses); 4. Value-at-Risk analysis (computing VaR and other indexes at the required crossclassification level); 5. Post-analysis layer (storing of data produced during the analyses); 6. Report layer (presentation and publication of results). In the context of this project, these layers have been treated according to the following approach: - implement input data processing in SAS Warehouse Administrator (this covers layers 1 to 3); - implement VaR analysis in RD environment (layer 4); - implement post processing and reporting processes in SAS Warehouse Administrator (layer 5 and 6). Logic of implementation From a logical point of view, the implementation of these layers will proceed incrementally by singular steps, each step being related to a specific financial instrument. In fact, the data processing to be performed and the information of interest in each layer depend on the financial instrument we are considering. Different financial instruments and different analyses may require different data; different data may come from different sources; different sources may need different extraction techniques. For each classified financial instrument type, all layers are implemented progressively. Instrument covered are consolidated in a production procedure that incrementally provides a multiinstrument analysis procedure and can be used for calculation even before completion. When the entire set of instrument types has been treated, the production procedures is able to process all interesting portfolios. A pratical implementation using Risk Dimensions For the above mentioned reasons, we decided to organize data across layers, but at the same time to develop our procedures by financial instrument type and analysis. A further logical extension of this structure was the idea of dividing the Risk Dimensions analysis flow (layer 4) in steps and, for every step and for every financial instrument, to develop a suitable Risk Dimensions environment. A single instrument is then treated by means of an instrument environment, built by inheritance using several component environments, these latter covering the following steps:

3 - configuration settlement; - position data treatment; - market data treatment; - pricing. To obtain complete portfolio-based analyses, the inheritance between environments is used again to collect all the risk objects together. Complete analysis environments covering entire portfolios are built by selecting and merging appropriate instrument environments. By this means the complexity of complete analysis environments is kept to a minimum, and it is very easy to perform single- or multi-instrument analyses. An example of instrument environment inheritance structure is given in figure 1 for long futures. In figure 2 the inheritance structure of a complete analysis environment is partially shown. Environment creation is based on warehouse processes, so that variable definitions and position inclusions are performed automatically by using the proper functionalities of Risk Dimensions. In figure 3 processes building long future component environments of figure 1 are shown. The drawback of this approach is, obviously, the large number of component environments we had to put in place. In our case the front-office database is currently working with some twenty different instrument types. For every one of them, five steps have been singled out, each of them with its own Risk Dimensions environment. Moreover, in our system there are some other utility environments, e.g. pricing libraries links or common definitions. All this add up to a total of about one hundred environments. Possible critical issues and their management With so many different objects to manage and with non-trivial links between them, we had to pay attention to avoid some dangerous pitfalls. Two of the major critical issues are: - objects with the same usage should have the same definition (otherwise it will lead to inconsistency) - different objects should have different references (otherwise it will result in some ambiguity). One not being aware of that, even if very good risk measures for every single financial instrument can be obtained, rather poor performances will be achieved when executing portfolio analyses. For example: it is clear enough what is generally meant for maturity of a bond. But when talking about a bond option, what is maturity? The expiry date of the option, or the day when the bond pays back the principal amount? To compute risk calculations, both are needed, but mixing them in the wrong way, a quite bad result will be produced. A possible way to ensure consistency is to keep in a single place objects used across several instruments. Ambiguity must be managed by a proper discipline in naming conventions. Conclusions

4 The implementation of multi-stage and wide scope calculation procedures, like Value-at-Risk computations for real-world bank portfolios, is a complex task that must address opposing issues: - efficiency; - easiness in maintenance; - user friendiliness in naming and conventions. This contribution has briefly reviewed the pratical approach used in the Risk Management Unit of Gruppo Monte dei Paschi di Siena in building such procedure using the analytical environment of Risk Dimensions. Figure 1. - Inheritance structure of instrument environment for the treatment of long futures. Figure 2. - Inheritance structure of a complete analysis environment.

5 Figure 3. - Generation processes for component environemts of long futures. Figure 4. - Input data sources for a complete analysis environment.

Release notes. IBM Industry Models IBM Banking and Financial Markets Data Warehouse Version

Release notes. IBM Industry Models IBM Banking and Financial Markets Data Warehouse Version Release notes IBM Industry Models IBM Banking and Financial Markets Data Warehouse Version 8.8.0.0 28 th April 2016 Table of Contents About these release notes... 2 What s in the box... 2 Fixes since the

More information

Data Management Glossary

Data Management Glossary Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative

More information

Guidelines for a flexible and resilient statistical system: the architecture of the new Portuguese BOP/IIP system

Guidelines for a flexible and resilient statistical system: the architecture of the new Portuguese BOP/IIP system Guidelines for a flexible and resilient statistical system: the architecture of the new Portuguese BOP/IIP system Marques, Carla Banco de Portugal1, Statistics Department Av. D. João II, Lote 1.12.02 Lisbon

More information

Know What You Are Missing: How to Catalogue and Manage Missing Pieces of Historical Data

Know What You Are Missing: How to Catalogue and Manage Missing Pieces of Historical Data Know What You Are Missing: How to Catalogue and Manage Missing Pieces of Historical Data Shankar Yaddanapudi, SAS Consultant, Washington DC ABSTRACT In certain applications it is necessary to maintain

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Data Mining & Data Warehouse

Data Mining & Data Warehouse Data Mining & Data Warehouse Associate Professor Dr. Raed Ibraheem Hamed University of Human Development, College of Science and Technology (1) 2016 2017 1 Points to Cover Why Do We Need Data Warehouses?

More information

San Francisco Chapter. Cassius Downs Network Edge LLC

San Francisco Chapter. Cassius Downs Network Edge LLC Cassius Downs Network Edge LLC ITIL History ITIL Books V3 Objectives Business Benefits of V3 V3 Changes Training & Certification V2 or V3? Summary 2 Version 1 31 books developed in the 1980 s Focus: Technology

More information

Human Error Taxonomy

Human Error Taxonomy Human Error Taxonomy The Human Error Taxonomy (HET) provides a structure for requirement errors made during the software development process. The HET can be employed during software inspection to help

More information

Experian Fraud Prevention Solutions

Experian Fraud Prevention Solutions Experian Fraud Prevention Solutions FMVÖ Business Breakfast Cyber Crime prevention for the financial services industry 1 Experian Internal use only Introducing Experian 2 Experian Identity Theft is a Global

More information

Full file at

Full file at Chapter 2 Data Warehousing True-False Questions 1. A real-time, enterprise-level data warehouse combined with a strategy for its use in decision support can leverage data to provide massive financial benefits

More information

Summary of Consultation with Key Stakeholders

Summary of Consultation with Key Stakeholders Summary of Consultation with Key Stakeholders Technology and Communications Sector Electronic Manufacturing Services & Original Design Manufacturing Software & IT Services Hardware Semiconductors Telecommunication

More information

Release notes. IBM Industry Models IBM Banking & Financial Markets Data Warehouse for m1 version

Release notes. IBM Industry Models IBM Banking & Financial Markets Data Warehouse for m1 version Release notes IBM Industry Models IBM Banking & Financial Markets Data Warehouse for m1 version 8.6.0.0 Contents About these release notes...1 Fixes since the previous release...1 Known issues and limitations...3

More information

TDWI Data Governance Fundamentals: Managing Data as an Asset

TDWI Data Governance Fundamentals: Managing Data as an Asset TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training

More information

Portfolio Accounting. The Internet-based front end for Stifel s Portfolio Accounting System.

Portfolio Accounting. The Internet-based front end for Stifel s Portfolio Accounting System. eportfolio - The Internet-based front end for Stifel s Portfolio Accounting System. Credentials Once your credentials are established, you will access Stifel s Portfolio Accounting service at https://eportfolio.stifel.com.

More information

FAMI-QS VERSION 6 TRANSITION REQUIREMENTS

FAMI-QS VERSION 6 TRANSITION REQUIREMENTS Quality and Safety System for Specialty Feed Ingredients FAMI-QS VERSION 6 TRANSITION REQUIREMENTS P-MS-002/ Rev 01 2017-12-20 TABLE OF CONTENTS 1. Introduction... 3 2. FAMI-QS Code Version 6... 3 2.1.

More information

Reporting System for Commercial Bank Case Study.

Reporting System for Commercial Bank Case Study. Reporting System for Commercial Bank Case Study. Tadeusz Stawicki SAWAN &RRSHUDWLRQEHWZHHQ%DQN3U]HP\VáRZR+DQGORZ\6$LQ&UDFRZDQG6$:$1&RPSDQ\ specializing in SAS system projects for banking area began in

More information

ITIL Foundation. PeopleCert ITIL Foundation. Processexam.com. Exam Summary Syllabus Questions

ITIL Foundation. PeopleCert ITIL Foundation. Processexam.com. Exam Summary Syllabus Questions ITIL Foundation PeopleCert ITIL Foundation Processexam.com Exam Summary Syllabus Questions Table of Contents Key to success in ITIL Foundation Exam on PeopleCert ITIL Foundation... 2 PeopleCert ITIL Foundation

More information

Software Architecture

Software Architecture Software Architecture L T JayPrakash jtl@iiitb.ac.in Software Architecture (recap) Other Influences on SA Therefore, SA is important and look into its constituents! Every software system has an architecture!

More information

Best Practice for Creation and Maintenance of a SAS Infrastructure

Best Practice for Creation and Maintenance of a SAS Infrastructure Paper 2501-2015 Best Practice for Creation and Maintenance of a SAS Infrastructure Paul Thomas, ASUP Ltd. ABSTRACT The advantage of using metadata to control and maintain data and access to data on databases,

More information

The 360 Solution. July 24, 2014

The 360 Solution. July 24, 2014 The 360 Solution July 24, 2014 Most successful large organizations are organized by lines of businesses (LOBs). This has been a very successful way to organize for the accountability of profit and loss.

More information

PayThankYou LLC Privacy Policy

PayThankYou LLC Privacy Policy PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the

More information

Professional Qualifications for ITIL PRACTICES FOR SERVICE MANAGEMENT. The ITIL Foundation Certificate in IT Service Management SYLLABUS

Professional Qualifications for ITIL PRACTICES FOR SERVICE MANAGEMENT. The ITIL Foundation Certificate in IT Service Management SYLLABUS Professional Qualifications for ITIL PRACTICES FOR SERVICE MANAGEMENT The ITIL Foundation Certificate in IT Service Management SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a registered

More information

Top of Minds Report series Data Warehouse The six levels of integration

Top of Minds Report series Data Warehouse The six levels of integration Top of Minds Report series Data Warehouse The six levels of integration Recommended reading Before reading this report it is recommended to read ToM Report Series on Data Warehouse Definitions for Integration

More information

What is Software Architecture

What is Software Architecture What is Software Architecture Is this diagram an architecture? (ATM Software) Control Card Interface Cash Dispenser Keyboard Interface What are ambiguities in the previous diagram? Nature of the elements

More information

ITIL Foundation. Processexam.com. Exam Summary Syllabus Questions

ITIL Foundation. Processexam.com. Exam Summary Syllabus Questions ITIL Foundation Processexam.com Exam Syllabus Questions Table of s Key to success in ITIL Foundation Exam... 2 ITIL Foundation Certification Details:... 2 ITIL Foundation Exam Syllabus:... 2 ITIL Foundation

More information

INFRASTRUCTURE PLANNING, FINANCING AND INVESTMENT 22 OCTOBER 2010

INFRASTRUCTURE PLANNING, FINANCING AND INVESTMENT 22 OCTOBER 2010 INFRASTRUCTURE PLANNING, FINANCING AND INVESTMENT 22 OCTOBER 2010 OVERVIEW OF PRESENTATION 2 LANDSCAPE CHALLENGES FUNDING SOURCES (ROLE OF FINANCIAL INSTITUTIONS) ROLE OF GOVERNMENT OBSERVATIONS SUGGESTED

More information

Composite Software Data Virtualization The Five Most Popular Uses of Data Virtualization

Composite Software Data Virtualization The Five Most Popular Uses of Data Virtualization Composite Software Data Virtualization The Five Most Popular Uses of Data Virtualization Composite Software, Inc. June 2011 TABLE OF CONTENTS INTRODUCTION... 3 DATA FEDERATION... 4 PROBLEM DATA CONSOLIDATION

More information

Managing Data Resources

Managing Data Resources Chapter 7 OBJECTIVES Describe basic file organization concepts and the problems of managing data resources in a traditional file environment Managing Data Resources Describe how a database management system

More information

HPE ALM Standardization as a Precursor for Data Warehousing March 7, 2017

HPE ALM Standardization as a Precursor for Data Warehousing March 7, 2017 HPE ALM Standardization as a Precursor for Data Warehousing March 7, 2017 Brought to you by the Vivit Business Intelligence Special Interest Group led by Oded Tankus Hosted By Oded Tankus Project Manager

More information

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Presentation Objectives Introductions Cyber security context Cyber security in the maritime sector Developing cybersecurity

More information

Data Vault Brisbane User Group

Data Vault Brisbane User Group Data Vault Brisbane User Group 26-02-2013 Agenda Introductions A brief introduction to Data Vault Creating a Data Vault based Data Warehouse Comparisons with 3NF/Kimball When is it good for you? Examples

More information

Advanced Financial Modelling in Excel

Advanced Financial Modelling in Excel Advanced Financial Modelling in Excel The course includes teaches you how to resolve many complex issues in excel for financial modelling analysis with VBA including efficiently structuring financial models,

More information

SAP. Modeling Guide for PPF

SAP. Modeling Guide for PPF Modeling Guide for PPF Contents 1 Document Organization... 3 1.1 Authors... 3 1.2 Intended Group of Readers... 3 1.3 References... 3 1.4 Glossary... 4 2 Modeling Guidelines - Application Analysis... 6

More information

Making the Impossible Possible

Making the Impossible Possible Making the Impossible Possible Find and Eliminate Data Errors with Automated Discovery and Data Lineage Introduction Organizations have long struggled to identify and take advantage of opportunities for

More information

Portfolio Optimization Artificial Intelligence in Finance

Portfolio Optimization Artificial Intelligence in Finance Portfolio Optimization Artificial Intelligence in Finance Zsolt Bihary (Morgan Stanley) 213, Budapest Structuring (Securitization) Cash-flow Bank Investors Pool of Loans Bank wants to Get rid of risk Realize

More information

PROJECT MANAGEMENT PROFESSIONAL (PMP)

PROJECT MANAGEMENT PROFESSIONAL (PMP) PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAM PREPARATION TRAINING WHAT IS PMP? Government, commercial and other organizations employ PMP certified project managers in an attempt to improve the success rate

More information

Paper SAS Taming the Rule. Charlotte Crain, Chris Upton, SAS Institute Inc.

Paper SAS Taming the Rule. Charlotte Crain, Chris Upton, SAS Institute Inc. ABSTRACT Paper SAS2620-2016 Taming the Rule Charlotte Crain, Chris Upton, SAS Institute Inc. When business rules are deployed and executed--whether a rule is fired or not if the rule-fire outcomes are

More information

Data Quality Blueprint for Pentaho: Better Data Leads to Better Results. Charles Gaddy Director Global Sales & Alliances, Melissa Data

Data Quality Blueprint for Pentaho: Better Data Leads to Better Results. Charles Gaddy Director Global Sales & Alliances, Melissa Data Data Quality Blueprint for Pentaho: Better Data Leads to Better Results Charles Gaddy Director Global Sales & Alliances, Melissa Data Agenda What is Data Quality, and What Role Does it Play? 6 Concepts

More information

Document Control Information

Document Control Information Document Control Information Document Details Document Name Purpose of Document Document Version Number 4.2 Document Status Document Owner Prepared By To outline the syllabus for the ITIL v3 Foundation

More information

Design Patterns. An introduction

Design Patterns. An introduction Design Patterns An introduction Introduction Designing object-oriented software is hard, and designing reusable object-oriented software is even harder. Your design should be specific to the problem at

More information

The functions performed by a typical DBMS are the following:

The functions performed by a typical DBMS are the following: MODULE NAME: Database Management TOPIC: Introduction to Basic Database Concepts LECTURE 2 Functions of a DBMS The functions performed by a typical DBMS are the following: Data Definition The DBMS provides

More information

Data Warehouses Chapter 12. Class 10: Data Warehouses 1

Data Warehouses Chapter 12. Class 10: Data Warehouses 1 Data Warehouses Chapter 12 Class 10: Data Warehouses 1 OLTP vs OLAP Operational Database: a database designed to support the day today transactions of an organization Data Warehouse: historical data is

More information

Nonparametric Risk Attribution for Factor Models of Portfolios. October 3, 2017 Kellie Ottoboni

Nonparametric Risk Attribution for Factor Models of Portfolios. October 3, 2017 Kellie Ottoboni Nonparametric Risk Attribution for Factor Models of Portfolios October 3, 2017 Kellie Ottoboni Outline The problem Page 3 Additive model of returns Page 7 Euler s formula for risk decomposition Page 11

More information

TDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems

TDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems Data Analysis and Design for BI and Data Warehousing Systems Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your

More information

Data Points Structure Explanatory Documentation

Data Points Structure Explanatory Documentation Data Points Structure Explanatory Documentation Version: 0.2 (Public Draft) Publication date: 2009-12-08 Abstract This document contains a description of an approach for the explicit, consistent and coherent

More information

Managing Data Resources

Managing Data Resources Chapter 7 Managing Data Resources 7.1 2006 by Prentice Hall OBJECTIVES Describe basic file organization concepts and the problems of managing data resources in a traditional file environment Describe how

More information

Building a Data Warehouse step by step

Building a Data Warehouse step by step Informatica Economică, nr. 2 (42)/2007 83 Building a Data Warehouse step by step Manole VELICANU, Academy of Economic Studies, Bucharest Gheorghe MATEI, Romanian Commercial Bank Data warehouses have been

More information

Introduction to the Transaction matching screen

Introduction to the Transaction matching screen The purpose of the Transaction matching screen is to make sure that a portfolio s value is accurate for every day within a period. It does this by making it very simple to find and resolve unmatched transactions

More information

W.D.Gann Calculator Available Tools:

W.D.Gann Calculator Available Tools: W.D.Gann Calculator Available Tools: 1.Automated Tools: Gann Time Analysis Gann Square of 9 Gann Square of 12 GAV User Manual 2.Manual Tools: Gann Time Analysis Gann Square of 9 Gann Square of 12 1.Gann

More information

Exchange rates. Definition. Exchange rates. Search type

Exchange rates. Definition. Exchange rates. Search type Exchange rates Please note that our Getting Started guides are updated regularly however the screens displayed in this guide may vary from the actual screens you will use in Business ebanking as we are

More information

Transitioning from SAS 70 to SSAE 16

Transitioning from SAS 70 to SSAE 16 Industry Webinar Series SAS 70 ENDS EXIT TO SSAE 16 Transitioning from SAS 70 to SSAE 16 How Does This Apply to Your Organization? Cindy Boyle, Partner Rodney Walsh, Director BKD IT Risk Services Agenda

More information

Software Development. Modular Design and Algorithm Analysis

Software Development. Modular Design and Algorithm Analysis Software Development Modular Design and Algorithm Analysis Precondition and Postcondition To create a good algorithm, a programmer must be able to analyse a precondition (starting state) and a postcondition

More information

Date Author Version Change Reference Abd Elrahman Gamal V1.0 No Ref. Copy No. Name Position

Date Author Version Change Reference Abd Elrahman Gamal V1.0 No Ref. Copy No. Name Position 1 Document Control Change Record Date Author Version Change Reference 23 10-2016 Abd Elrahman Gamal V1.0 No Ref. Reviewers Shadi Diab Kamran Shaikh Name Position Manager, Supply Chain Management Applications

More information

Data Governance in Mass upload processes Case KONE. Finnish Winshuttle User Group , Helsinki

Data Governance in Mass upload processes Case KONE. Finnish Winshuttle User Group , Helsinki Data Governance in Mass upload processes Case KONE Finnish Winshuttle User Group 6.11.2014, Helsinki Just IT Mastering the Data Just IT is a Finnish company focusing on Data Governance and Data Management.

More information

Isabel 6 Guide #3. How to encode SEPA and Non-SEPA transactions from an ING account from region 3 & all other banks?

Isabel 6 Guide #3. How to encode SEPA and Non-SEPA transactions from an ING account from region 3 & all other banks? Isabel 6 Guide #3 How to encode SEPA and Non-SEPA transactions from an ING account from region 3 & all other banks? Version 2.1 06-11-2013 Purpose This document describes how to use the Isabel 6 Payment

More information

Quelle: SAP AG (Mai 2011)

Quelle: SAP AG (Mai 2011) Quelle: SAP AG (Mai 2011) Financial Consolidation with SAP BRIEF COMPARISION BETWEEN SAP SEM-BCS & SAP BUSINESSOBJECTS BPC The SEM-BCS (Business Consolidation System) application is considered as one of

More information

Deutsche Bank Corporate Banking & Securities. TradeMatch. User Guide.

Deutsche Bank Corporate Banking & Securities. TradeMatch. User Guide. Deutsche Bank Corporate Banking & Securities TradeMatch User Guide http://autobahn.db.com 1 TradeMatch Autobahn is Deutsche Bank s award-winning electronic distribution service. Since 1996, Autobahn has

More information

MATLAB-Based Policy Simulator

MATLAB-Based Policy Simulator DRAFT MATLAB-Based Policy Simulator Regulatory & Risk Analytics (RRA) Prepared by Seth Aslin Date: October 2013 Presentation Outline Background and context to Project Navigator General project objectives

More information

Analytics & Sport Data

Analytics & Sport Data Analytics & Sport Data Could Neymar s Injury be Prevented? SAS Data Preparation https://www.sas.com/en_gb/events/2017/ebooster-sas-partners.html AGENDA Player Performance Monitoring SAS Data Preparation

More information

PPR TOKENS SALE PRIVACY POLICY. Last updated:

PPR TOKENS SALE PRIVACY POLICY. Last updated: PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

FIBO Shared Semantics. Ontology-based Financial Standards Thursday Nov 7 th 2013

FIBO Shared Semantics. Ontology-based Financial Standards Thursday Nov 7 th 2013 FIBO Shared Semantics Ontology-based Financial Standards Thursday Nov 7 th 2013 FIBO Conceptual and Operational Ontologies: Two Sides of a Coin FIBO Business Conceptual Ontologies Primarily human facing

More information

GDPR: Is it just another regulation or a great opportunity for operational excellence? Athens, February 2018

GDPR: Is it just another regulation or a great opportunity for operational excellence? Athens, February 2018 GDPR: Is it just another regulation or a great opportunity for operational excellence? Athens, February 2018 GDPR Roadmap Continuous Awareness Program Implement Privacy Solutions Intergrade Privacy into

More information

Cyber Security: Threat and Prevention

Cyber Security: Threat and Prevention Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will

More information

POTENTIAL DIFFERENCES AT RISK ASSESSMENT AND RISK TREATMENT PLANNING BETWEEN ISO/IEC 27001:2005 AND ISO/IEC 27001:2013

POTENTIAL DIFFERENCES AT RISK ASSESSMENT AND RISK TREATMENT PLANNING BETWEEN ISO/IEC 27001:2005 AND ISO/IEC 27001:2013 POTENTIAL DIFFERENCES AT RISK ASSESSMENT AND RISK TREATMENT PLANNING BETWEEN ISO/IEC 27001:2005 AND ISO/IEC 27001:2013 Eka Pramudita Purnomo 1) and R. V. Hari Ginardi 2) Master s Program in Management

More information

CITADEL INFORMATION GROUP, INC.

CITADEL INFORMATION GROUP, INC. CITADEL INFORMATION GROUP, INC. The Role of the Information Security Assessment in a SAS 99 Audit Stan Stahl, Ph.D. President Citadel Information Group, Inc. The auditor has a responsibility to plan and

More information

Architecture Design Document for PIMS

Architecture Design Document for PIMS Architecture Design Document for PIMS 1. Overview 1.1. System Overview Personal Investment Management System (PIMS) is intended to help a user keep account of his/her investments in instruments such as

More information

DOCUMENT UPLOADS. NOTE: If you already have a pending filing created, select the Edit with the pending filing. Figure 1: Create New Filing

DOCUMENT UPLOADS. NOTE: If you already have a pending filing created, select the Edit with the pending filing. Figure 1: Create New Filing DOCUMENT UPLOADS NMLS includes functionality that allows a company to upload documentation required for Company (MU1) and Branch (MU3) applications as required by your state regulator. To ensure that you

More information

Basic System. Tutorial Guide API PRO. Open.7

Basic System. Tutorial Guide API PRO. Open.7 Tutorial Guide API PRO Basic System Open.7 The Basic system, or module 2.1 is the backbone in API PRO and it is an absolute pre-condition to run any of the other modules in API PRO that the basic system

More information

REVIEW OF THE BASIC CHARACTERISTICS OF OBJECT ORIENTATION

REVIEW OF THE BASIC CHARACTERISTICS OF OBJECT ORIENTATION c08classandmethoddesign.indd Page 282 13/12/14 2:57 PM user 282 Chapter 8 Class and Method Design acceptance of UML as a standard object notation, standardized approaches based on work of many object methodologists

More information

UBS Implementation Guidelines

UBS Implementation Guidelines UBS Implementation Guidelines DFÜ Agreement of Deutsche Kreditwirtschaft for Cash Management Reports camt.052.001.02 - DK Version 3.0 UBS Version 1.0 March 2017 Table of Contents 1. Cash Management Reports

More information

M&A Cyber Security Due Diligence

M&A Cyber Security Due Diligence M&A Cyber Security Due Diligence Prepared by: Robert Horton, Ollie Whitehouse & Sherief Hammad Contents Page 1 Introduction 3 2 Technical due diligence goals 3 3 Enabling the business through cyber security

More information

ISMS Implementation ISO IT Governance CEN 667

ISMS Implementation ISO IT Governance CEN 667 ISMS Implementation ISO 27003 IT Governance CEN 667 1 2 Standard Title: ISO/IEC 27003:2010 Information technology Security techniques Information security management system implementation guidance ISO/IEC

More information

PRISM - FHF The Fred Hollows Foundation

PRISM - FHF The Fred Hollows Foundation PRISM - FHF The Fred Hollows Foundation MY WORKSPACE USER MANUAL Version 1.2 TABLE OF CONTENTS INTRODUCTION... 4 OVERVIEW... 4 THE FHF-PRISM LOGIN SCREEN... 6 LOGGING INTO THE FHF-PRISM... 6 RECOVERING

More information

How to write ADaM specifications like a ninja.

How to write ADaM specifications like a ninja. Poster PP06 How to write ADaM specifications like a ninja. Caroline Francis, Independent SAS & Standards Consultant, Torrevieja, Spain ABSTRACT To produce analysis datasets from CDISC Study Data Tabulation

More information

OUTCOME OF THE 3 RD MEETING OF TARGET CONSOLIDATION CONTACT GROUP (TCCG)

OUTCOME OF THE 3 RD MEETING OF TARGET CONSOLIDATION CONTACT GROUP (TCCG) 05 June 2018 OUTCOME OF THE 3 RD MEETING OF TARGET CONSOLIDATION CONTACT GROUP (TCCG) 24 April 2018 09:30 to 17:00 held at the premises of the European Central Bank, Sonnemannstraße 20, meeting room MB

More information

TARGET Instant Payment Settlement

TARGET Instant Payment Settlement TARGET Instant Payment Settlement Karen Birkel - ECB Lorenzo Giammò - Banca d Italia Focus session, 13 December 2017, Paris TARGET Instant Payment Settlement (TIPS) 1 2 3 Status of the project Connectivity

More information

ITIL V3 Service Lifecycle - Continual Service Improvement (CSI)

ITIL V3 Service Lifecycle - Continual Service Improvement (CSI) ITIL V3 Service Lifecycle - Continual Service Improvement (CSI) Course Length: 3 Days Course Overview This hands-on course leads to a Certificate in ITIL V3 Service Lifecycle Management - Continual Service

More information

THE ITIL MANAGERS BRIDGE CERTIFICATION IN IT SERVICE MANAGEMENT

THE ITIL MANAGERS BRIDGE CERTIFICATION IN IT SERVICE MANAGEMENT THE ITIL MANAGERS BRIDGE CERTIFICATION IN IT SERVICE MANAGEMENT ITIL Service Manager to ITIL V3 Expert The ITIL Expert Certification is the highest certification level available in ITIL V3 today. However,

More information

Accelerate your SAS analytics to take the gold

Accelerate your SAS analytics to take the gold Accelerate your SAS analytics to take the gold A White Paper by Fuzzy Logix Whatever the nature of your business s analytics environment we are sure you are under increasing pressure to deliver more: more

More information

FSA data review stock take. Dean Buckner Financial Services Authority March 2012

FSA data review stock take. Dean Buckner Financial Services Authority March 2012 FSA data review stock take Dean Buckner Financial Services Authority March 2012 Agenda FSA data review process Common themes Next steps FSA data review In three acts Act 1 Review of approx. 25 firms Objective:

More information

Enterprise Backup and Restore technology and solutions

Enterprise Backup and Restore technology and solutions Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013

More information

Table XXX MBA Assessment Results for Basic Content Knowledge Learning Goal: Aggregate Subject Matter Scores

Table XXX MBA Assessment Results for Basic Content Knowledge Learning Goal: Aggregate Subject Matter Scores MBA for Basic Content Knowledge Learning Goal: Aggregate Subject Matter Scores Subject Matter Accounting Finance Information Systems Supply chain and analytics Management Marketing accounting related finance

More information

Development of Measurement Software Platform

Development of Measurement Software Platform Yuichi Morinari, Yasuyuki Kato [Summary] Recently, generic operating systems (OS), such as Embedded Windows and Linux, have become popular and there is more demand for porting applications to help cut

More information

Garrison Technology HOW SECURE REMOTE BROWSING DELIVERS HIGH SECURITY EVEN FOR MAINSTREAM COMMERCIAL ORGANISATIONS

Garrison Technology HOW SECURE REMOTE BROWSING DELIVERS HIGH SECURITY EVEN FOR MAINSTREAM COMMERCIAL ORGANISATIONS Garrison Technology HOW SECURE REMOTE BROWSING DELIVERS HIGH SECURITY EVEN FOR MAINSTREAM COMMERCIAL ORGANISATIONS The weak underbelly for most enterprises cybersecurity is the user endpoint. Laptops,

More information

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated: BUZCOIN TOKENS SALE PRIVACY POLICY Last updated: 20.10.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

Creating an Index in Microsoft Word

Creating an Index in Microsoft Word Creating an Index in Microsoft Word Version 2.0 Claudia Bräuer, Maria Dassing Version Date Author/Reviewer Comment 2.0 2016-01-29 Claudia Bräuer, Maria Dassing 1.0 2014-10-13 Maria Dassing Initial version

More information

The Design of Core C++ (Notes)

The Design of Core C++ (Notes) The Design of Core C++ (Notes) Uday Reddy May 13, 1994 This note is to define a small formal language called Core C++ which reflects the essential structure of C++. As the name implies, the design only

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

Standard Operating Procedure. Data Collection and Validation. Public

Standard Operating Procedure. Data Collection and Validation. Public Scope Special Requirements Process for receiving scientific data collections through the Data Collection Framework and for including data into the EFSA Scientific Data Warehouse. This procedure is a controlled

More information

Software Engineering - I

Software Engineering - I Software Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software Chapter 3 Requirement Engineering Copy Rights Virtual University of Pakistan 1 Requirement

More information

Royal Mail Mailmark Terms & Conditions

Royal Mail Mailmark Terms & Conditions Royal Mail Mailmark Terms & Conditions Royal Mail Mailmark Terms & Conditions 1 Background 1.1 These Royal Mail Mailmark Terms and Conditions (terms) set out the terms on which you and we agree that you

More information

John Snare Chair Standards Australia Committee IT/12/4

John Snare Chair Standards Australia Committee IT/12/4 John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC

More information

It s Proc Tabulate Jim, but not as we know it!

It s Proc Tabulate Jim, but not as we know it! Paper SS02 It s Proc Tabulate Jim, but not as we know it! Robert Walls, PPD, Bellshill, UK ABSTRACT PROC TABULATE has received a very bad press in the last few years. Most SAS Users have come to look on

More information

This instruction will guide you through all the procedures and activities, necessary for your participation in the trading.

This instruction will guide you through all the procedures and activities, necessary for your participation in the trading. Dear Participant! Welcome to the Sberbank AST Electronic Trading Platform the largest electronic trading operator in Russia! This instruction will guide you through all the procedures and activities, necessary

More information

Fortified Capital Limited. (Regulated by the Cyprus Securities & Exchange Commission) [COMPLAINT HANDLING PROCEDURE]

Fortified Capital Limited. (Regulated by the Cyprus Securities & Exchange Commission) [COMPLAINT HANDLING PROCEDURE] 2016 Fortified Capital Limited (Regulated by the Cyprus Securities & Exchange Commission) [COMPLAINT HANDLING PROCEDURE] Contents 2. Procedure... 2 2.1 Filing Complaints... 2 2.2 Receiving Complaints...

More information

Larry Clinton President & CEO Internet Security Alliance

Larry Clinton President & CEO Internet Security Alliance Larry Clinton President & CEO Internet Security Alliance lclinton@isalliance.org 703-907-7028 202-236-0001 Sr. Management & Cyber Security Good News!!! Pricewaterhouse Coopers survey of 9,000 executives

More information

Advance payment request User Manual

Advance payment request User Manual Interreg Italy-Croatia CBC Programme 2014-2020 SIU Management and monitoring system Advance payment request User Manual Version 1.0 of 03 May 2018 2 TABLE OF CONTENT INTRODUCTION... 4 SIU STANDARD FUNCTIONS

More information