FSA data review stock take. Dean Buckner Financial Services Authority March 2012

Size: px
Start display at page:

Download "FSA data review stock take. Dean Buckner Financial Services Authority March 2012"

Transcription

1 FSA data review stock take Dean Buckner Financial Services Authority March 2012

2 Agenda FSA data review process Common themes Next steps

3 FSA data review In three acts Act 1 Review of approx. 25 firms Objective: Determine dependencies in data & Systems work stream. Understand material data flows, agree scope and timing of external review Act 2 Scene 1 Firm s internal audit performs review Scene 2 FSA review of the review Act 3 Selective deep dive

4 Timings Act 1 September 2011 April 2012 Act 2 March 2012 Q Act 3 Q Q3 2013

5 Common themes (Act 1) Data governance operating model Data directory maintenance Data transformation Pervasive use of spreadsheets Data semantics Dependency on IT

6 Data operating model Needs careful design Design of operating model /= policy design Needs a manager! Some firms have appointed permanent managers Others are using the project manager until bau Others are using their existing governance frameworks and applying it to data risk & controls.

7 Other issues with data governance Inconsistent definition of data classification, ownership and responsibility Impact and materiality assessment firms are slowly getting to grips with this and there is no consistent approach.

8 Data directory maintenance Three different approaches. Tight coupling Structured directory, updated automatically Loose coupling Structured directory, semi-automatic update No coupling Freeform, unstructured, updated manually

9 Directory maintenance trade offs Tight coupling Benefit hardly any maintenance, automatic update Cost a pain to build, dependent on IT Loose coupling Benefit relationships can be accurately represented Cost Highly skilled maintenance No coupling Benefit no dependence on IT, flexibility Cost doesn t reflect reality, staff costs may prove prohibitive, possibly error prone FSA will not be prescriptive

10 Data transformation

11 Data is not just moved The idea of data movement is from IT N bytes of data are copied from system A to system B This kind of movement is trivial and uninteresting Typically when data passes from A to B, stuff happens Data sets are joined, merged, mapped Often transformed in exotic and interesting ways Data is operated on

12 Examples of data transformation Extrapolation, interpolation Extraction of key economic features A bond position is turned into a sensitivity calibration of risk factor stress

13 Scope of data transformation All material transformations of data outside the IM Kernel are in scope of the review. This includes Testing to confirm that the implementation (e.g. using spreadsheets, ETL, etc) complies with its design specifications Data Quality checks to ensure that the output of the transformation reflects the input data Where the transformation is functional, and its design involves expert judgment, the design or methodology or functional specification of the transformation is out of scope

14 Data semantics

15 What is semantics Semantics = fancy word for meaning Data records are made up of symbols which have a syntax and a meaning The same term can have a different meaning for different systems Different terms can have the same meaning for different systems

16 Meaning and translation Human dictionaries translate a term in one language into a term in another language with the same meaning omnis in Latin has the same meaning as the English quantifier every So different computer systems need translation or mapping tables

17 Semantic errors Many errors result from changes in the upstream meaning or basis of a term not being appropriately reflected downstream Basis is the hardest data characteristic to document and may well be the most frequent or material cause of error (See war stories below)

18 War story 1 A firm thought that its bodily injury motor claims estimates were not keeping pace with rapid inflation, so changed its claims diary from 12 months to 6 months Claims would be reviewed every six months, ensuring that case reserves were updated for claims inflation more frequently. The effect of reviewing small claims more often led to smaller claims being settled earlier and the surplus in the case estimates being released more quickly. Staff change meant loss of knowledge about the change so reason for distortion of claims data not understood. Result: significant underestimation of claims reserves. So an action that was intended to be prudent resulted in material under-reserving.

19 War story 2 Upstream system was sending credit swap positions using a single column Long position positive, short position negative For the new implementation, the one column was changed to two Amount of position now always positive, new column has B (buy) and S (sold) flag. Downstream system was never notified The first column remained the same, so nothing broke, and no preventative alarm was raised. Result: the downstream system thought all the short positions were really long positions. This led to a material mis-estimation of the firm s exposure.

20 War story 3 Upstream system didn t understand inflation bonds. These pay a fixed coupon plus an inflation factor computed using external data So they were booked as standard bonds, with the coupon adjusted upwards to compensate for the inflation factor This is very common practice for old systems which cannot represent new products without major engineering works. But the downstream system did understand inflation bonds, and assumed the upstream coupon amount was merely the fixed coupon component. So it added on an extra inflation factor which had already been included in the artificially adjusted coupon. Result: more material mis-estimation of exposure.

21 Controls over basis change Genuinely very difficult Getting computer systems to communicate with one another is one of the great unsolved problems of computer science Common methods include Quantitative change analysis Impact assessment Corporate memory Basic reconciliation or reasonableness checks

22 Dependency on IT

23 Impact of major IT implementations Key principle What we review is what you apply for If we review a tactical solution, then that is what you are applying for But what if there is a major strategic solution in the pipeline? Then we still review the tactical, and the strategic solution is model change

24 What is model change Change policy is key what items, systems, transformations related to data are part of the model change policy? change of platform only (same software and methodology)? Change of software only, no methodology change? Change of methodology?

25 Next steps

26 Act 2 Act 2 is marking the completed external reviews as they are returned by the firms Criteria Geographical, legal entity and systems scope should be proportionate [rewrite] Impact of finding should be clear and unequivocal Due dates must be consistent with application process Was there sufficient operational testing (one endto-end flow is probably not enough)

27 Materiality What materiality criteria were used to determine the scope of the audit and to assess impact of a finding / residual risk? Has audit considered: justification for determining materiality thresholds? consistency of materiality assessment with other policies? identification of future risks? possibility of material error caused by aggregation of errors which are not material singly?

28 External review format No precise criteria, except that it must include the FSA schedule at the top (as specified on our website). As per the scoping document, Act 2 results submission should include an executive summary, the FSA schedule, followed by details of each finding. Nice to have: Appendix of detailed findings, cross-referenced from main schedule Detailed findings to include rating, observation, clear articulation of impact and consequence, recommendation and management action plan with precise dates. Mitigating factors?

29 Act 3 Act 3 is optional deep dive following Act 3 is optional deep dive following themes identified by Act 2

30 Questions & Comments

Outstanding issues in Solvency II data management requirements

Outstanding issues in Solvency II data management requirements Outstanding issues in Solvency II data management requirements Dean Buckner 16 May 2013 Agenda Regulatory update Data review update Work in progress Thoughts on Data management framework Data directory

More information

SPREADSHEETS AND SOLVENCY II

SPREADSHEETS AND SOLVENCY II SPREADSHEETS AND SOLVENCY II Dean Buckner Financial Services Authority July 2010 Agenda Solvency II is the new framework for insurance regulation in the European Union. It is currently scheduled for late

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified Data Protection Officer The objective of the PECB Certified Data Protection Officer examination is to ensure that the candidate has acquired the knowledge and skills

More information

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648 CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648 This is a summary of a decision issued following the October 2017 hearings of the Disciplinary and Ethics Commission

More information

How WhereScape Data Automation Ensures You Are GDPR Compliant

How WhereScape Data Automation Ensures You Are GDPR Compliant How WhereScape Data Automation Ensures You Are GDPR Compliant This white paper summarizes how WhereScape automation software can help your organization deliver key requirements of the General Data Protection

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

Reference Framework for the FERMA Certification Programme

Reference Framework for the FERMA Certification Programme Brussels, 23/07/2015 Dear Sir/Madam, Subject: Invitation to Tender Reference Framework for the FERMA Certification Programme Background The Federation of European Risk Management Associations (FERMA) brings

More information

Work Breakdown Structure

Work Breakdown Structure MossAtre.book Page 491 Sunday, February 9, 2003 7:01 PM APPENDIX Work Breakdown Structure The work breakdown structure in this appendix reflects the contents of the enclosed CD-ROM. TASK_DATA 491 1 Your

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22301 Lead Implementer www.pecb.com The objective of the Certified ISO 22301 Lead Implementer examination is to ensure that the candidate

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 31000 Risk Manager www.pecb.com The objective of the PECB Certified ISO 31000 Risk Manager examination is to ensure that the candidate

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

Code Administration Code of Practice

Code Administration Code of Practice Code Administration Code of Practice As part of the energy Codes Governance Review Ofgem proposed that a Code of Practice be established to facilitate convergence and transparency in code Modification

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27005 Risk Manager www.pecb.com The objective of the PECB Certified ISO/IEC 27005 Risk Manager examination is to ensure that the candidate

More information

Business Requirements Document (BRD) Template

Business Requirements Document (BRD) Template Business Requirements Document (BRD) Template Following is a template for a business requirements document (BRD). The document includes many best practices in use today. Don t be limited by the template,

More information

PEFC Certification System Netherlands - Certification Procedures

PEFC Certification System Netherlands - Certification Procedures PCSN SCHEME DOCUMENT PCSN IV Issue 2 10-03-2017 PEFC Certification System Netherlands - Certification Procedures PEFC Netherlands Kokermolen 11 3994 DG Houten The Netherlands Tel: +31 30 693 0040 Fax:

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

Heads of Internal Audit Webinar. Integrated Assurance. 24 July In partnership with

Heads of Internal Audit Webinar. Integrated Assurance. 24 July In partnership with Heads of Internal Audit Webinar Integrated Assurance 24 July 2013 In partnership with WELCOME TO THE WEBINAR The audio for this webcast will be broadcast via your PC speakers you do not need to dial in.

More information

This tutorial has been prepared for computer science graduates to help them understand the basic-to-advanced concepts related to data mining.

This tutorial has been prepared for computer science graduates to help them understand the basic-to-advanced concepts related to data mining. About the Tutorial Data Mining is defined as the procedure of extracting information from huge sets of data. In other words, we can say that data mining is mining knowledge from data. The tutorial starts

More information

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium Discussion on: Evaluating Cybersecurity Coverage A Maturity Model Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium By: Eric C. Lovell PricewaterhouseCoopers LLP ( PwC ) March 24,

More information

REPORT 2015/010 INTERNAL AUDIT DIVISION

REPORT 2015/010 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/010 Audit of information and communications technology strategic planning, governance and management in the Investment Management Division of the United Nations Joint

More information

COMPLIANCE BRIEF: VARONIS AND THE US SECURITY AND EXCHANGE COMMISSION S OFFICE OF COMPLIANCE INSPECTIONS AND EXAMINATIONS (SEC OCIE)

COMPLIANCE BRIEF: VARONIS AND THE US SECURITY AND EXCHANGE COMMISSION S OFFICE OF COMPLIANCE INSPECTIONS AND EXAMINATIONS (SEC OCIE) COMPLIANCE BRIEF: VARONIS AND THE US SECURITY AND EXCHANGE COMMISSION S OFFICE OF COMPLIANCE INSPECTIONS AND EXAMINATIONS (SEC OCIE) OVERVIEW The SEC s Office of Compliance Inspections and Examinations

More information

Enabling Data Governance Leveraging Critical Data Elements

Enabling Data Governance Leveraging Critical Data Elements Adaptive Presentation at DAMA-NYC October 19 th, 2017 Enabling Data Governance Leveraging Critical Data Elements Jeff Goins, President, Jeff.goins@adaptive.com James Cerrato, Chief, Product Evangelist,

More information

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy. Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Implementer www.pecb.com The objective of the Certified ISO 22000 Lead Implementer examination is to ensure that the candidate

More information

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 Created : 20-06-2016 Checked: 20-06-2016 Approved : 20-06-2016 Indah Lestari Karlina

More information

M&A Cyber Security Due Diligence

M&A Cyber Security Due Diligence M&A Cyber Security Due Diligence Prepared by: Robert Horton, Ollie Whitehouse & Sherief Hammad Contents Page 1 Introduction 3 2 Technical due diligence goals 3 3 Enabling the business through cyber security

More information

Regulating Cyber: the UK s plans for the NIS Directive

Regulating Cyber: the UK s plans for the NIS Directive Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon

More information

GUIDELINES ON THE CONTINUING PROFESSIONAL DEVELOPMENT (CPD) HOURS. Appendix I. Guidelines on the Continuing Professional Development (CPD) Hours

GUIDELINES ON THE CONTINUING PROFESSIONAL DEVELOPMENT (CPD) HOURS. Appendix I. Guidelines on the Continuing Professional Development (CPD) Hours Appendix I Guidelines on the Continuing Professional Development (CPD) Hours Table of Contents Document Revision Control... i 1. Introduction... 1 2. Objectives... 1 3. Applicability... 1 4. Definition

More information

Global Statement of Business Continuity

Global Statement of Business Continuity Business Continuity Management Version 1.0-2017 Date January 25, 2017 Status Author Business Continuity Management (BCM) Table of Contents 1. Credit Suisse Business Continuity Statement 3 2. BCM Program

More information

RSB Standard for participating operators

RSB Standard for participating operators Type of document: RSB International Standard Status: Approved for certification Date: 1 March 2011 Version 2.0 RSB Standard for participating operators RSB reference code: RSB-STD-30-001 Published by the

More information

PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH?

PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH? PAPER PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH? By Peter Varhol www.actian.com ignificant change has arrived in how computing and storage consumes data concerning individuals. Merchants, data collection

More information

NHS Fife. 2015/16 Audit Computer Service Review Follow Up

NHS Fife. 2015/16 Audit Computer Service Review Follow Up NHS Fife 2015/16 Audit Computer Service Review Follow Up Prepared for NHS Fife April 2016 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability (Scotland)

More information

Achieving regulatory compliance by improving data quality

Achieving regulatory compliance by improving data quality Achieving regulatory compliance by improving data quality This White Paper outlines some of the techniques used by a Tier 1 global bank to implement a regulatory metrics platform (RegMetrics) to obtain

More information

Cybersecurity and Examinations

Cybersecurity and Examinations Tim Segerson, Deputy Director NCUA E&I Cybersecurity and Examinations October 6, 2016 Chicago, IL Connected Devices Declining costs + increased bandwidth + powerful algorithms will spur a new information

More information

Overview. Consolidating SCM Infrastructures - Migrating between Tools -

Overview. Consolidating SCM Infrastructures - Migrating between Tools - - Migrating between Tools - Neal R. Firth, SageRight, Inc. An affiliate of Vizim Worldwide, Inc. 1 Overview Introduction Organizational Factors Business and People Product Factors Features and Usage The

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified Management System Auditor www.pecb.com The objective of the PECB Certified Management System Auditor examination is to ensure that the candidates

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

Xcelerated Business Insights (xbi): Going beyond business intelligence to drive information value

Xcelerated Business Insights (xbi): Going beyond business intelligence to drive information value KNOWLEDGENT INSIGHTS volume 1 no. 5 October 7, 2011 Xcelerated Business Insights (xbi): Going beyond business intelligence to drive information value Today s growing commercial, operational and regulatory

More information

California ISO Audit Results for 2011 SSAE 16 & Looking Forward for 2012 December 15, 2011

California ISO Audit Results for 2011 SSAE 16 & Looking Forward for 2012 December 15, 2011 www.pwc.com California ISO Audit Results for 2011 SSAE 16 & Looking Forward for 2012 December 15, 2011 Agenda SSAE 16 Background Results of Audit Scope of Audit Looking Forward Closing Thoughts Slide 1

More information

Technical Security Standard

Technical Security Standard Technical Security Standard Title: Minimum Controls TSS Version: 1.1 Effective Date July 2018 This Standard defines the minimum baseline security controls and Summary: processes required for a given Information

More information

GOAL BASED NEW SHIP CONSTRUCTION STANDARDS. Development of the Interim guidelines for goal-based standards safety level approach SUMMARY

GOAL BASED NEW SHIP CONSTRUCTION STANDARDS. Development of the Interim guidelines for goal-based standards safety level approach SUMMARY E MARITIME SAFETY COMMITTEE 99th session Agenda item 6 MSC 99/6/1 12 March 2018 Original: ENGLISH GOAL BASED NEW SHIP CONSTRUCTION STANDARDS Development of the Interim guidelines for goal-based standards

More information

The Data Organization

The Data Organization C V I T F E P A O TM The Data Organization Best Practices Metadata Dictionary Application Architecture Prepared by Rainer Schoenrank January 2017 Table of Contents 1. INTRODUCTION... 3 1.1 PURPOSE OF THE

More information

OUR FINAL ASSURANCE PLAN FOR PR19

OUR FINAL ASSURANCE PLAN FOR PR19 OUR FINAL ASSURANCE PLAN FOR PR19 Contents 1 2 3 4 5 6 7 8 Introduction and background Our governance structure for PR19 What information needs assuring? Forms of assurance Our risk assessment process

More information

Agenda. Bibliography

Agenda. Bibliography Humor 2 1 Agenda 3 Trusted Digital Repositories (TDR) definition Open Archival Information System (OAIS) its relevance to TDRs Requirements for a TDR Trustworthy Repositories Audit & Certification: Criteria

More information

REPORT 2015/186 INTERNAL AUDIT DIVISION

REPORT 2015/186 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/186 Audit of information and communications technology operations in the Secretariat of the United Nations Joint Staff Pension Fund Overall results relating to the effective

More information

Solvency II Data quality and controls

Solvency II Data quality and controls Solvency II Data quality and controls Presentation by David Roberts 15 July 2011 Regulatory guidance on data quality EIOPA/LLOYD S CEIOPS DOC 37/09 (formerly CP43) paragraphs 3.56 to 3.90 Level 1 text:

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

COMPLIANCE BRIEF: HOW VARONIS HELPS WITH PCI DSS 3.1

COMPLIANCE BRIEF: HOW VARONIS HELPS WITH PCI DSS 3.1 COMPLIANCE BRIEF: HOW VARONIS HELPS WITH OVERVIEW The Payment Card Industry Data Security Standard (PCI-DSS) 3.1 is a set of regulations that govern how firms that process credit card and other similar

More information

AUDIT OF ICT STRATEGY IMPLEMENTATION

AUDIT OF ICT STRATEGY IMPLEMENTATION APPENDIX A 2 1. Background AUDIT OF ICT STRATEGY IMPLEMENTATION 1.1. This report summarises the findings from the audit of ICT Strategy Implementation. This was a planned audit assignment which was undertaken

More information

MedDRA BEST PRACTICES. Maintenance and Support Services Organization s (MSSO) Recommendations for Implementation and Use of MedDRA

MedDRA BEST PRACTICES. Maintenance and Support Services Organization s (MSSO) Recommendations for Implementation and Use of MedDRA MedDRA BEST PRACTICES Maintenance and Support Services Organization s (MSSO) Recommendations for Implementation and Use of MedDRA Acknowledgements ACKNOWLEDGEMENTS MedDRA trademark is registered by IFPMA

More information

POLICY FOR THE USE OF THE LIFE CERTIFICATION LOGO AND LIFE CERTIFYING BODIES ACCREDITATION LOGO. Version 2.0 International - English LIFE-IN-MP03-2.

POLICY FOR THE USE OF THE LIFE CERTIFICATION LOGO AND LIFE CERTIFYING BODIES ACCREDITATION LOGO. Version 2.0 International - English LIFE-IN-MP03-2. POLICY FOR THE USE OF THE LIFE CERTIFICATION LOGO AND LIFE CERTIFYING BODIES ACCREDITATION LOGO LIFE-IN-MP03- Version International - English (APRIL/2014) LIFE-IN-MP03--English 2 OBJECTIVE The document

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions What are Alacra Reference Data services? Alacra cross-references and maps multiple data sources together to create one clean, de-duped and consistently formatted file. REFERENCE

More information

Audit Report. Chartered Management Institute (CMI)

Audit Report. Chartered Management Institute (CMI) Audit Report Chartered Management Institute (CMI) 10 October 2012 Note Restricted or commercially sensitive information gathered during SQA Accreditation monitoring activities is treated in the strictest

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

Best Practices in Data Governance

Best Practices in Data Governance Best Practices in Data Governance July 22, 2011 Miami Presented by Malcolm Chisholm Ph.D. mchisholm@refdataportal.com Telephone 732-687-9283 Fax 407-264-6809 www.refdataportal.com www.bizrulesengine.com

More information

Building Information Modeling and Digital Data Exhibit

Building Information Modeling and Digital Data Exhibit Document E203 2013 Building Information Modeling and Digital Data Exhibit This Exhibit dated the day of in the year is incorporated into the agreement (the Agreement ) between the Parties for the following

More information

Getting Started with IT Service Management

Getting Started with IT Service Management Getting Started with IT Service Management SMSG 3rd March 2014 BCS Bristol Branch BCS Service Management Specialist Group The Service Management Specialist Group provides an avenue for developing and promoting

More information

CPA Exam and Licensure Information and FAQs

CPA Exam and Licensure Information and FAQs CPA Exam and Licensure Information and FAQs 1 CPA Exam and Licensure Information and FAQs July 2016 Dr. Gary Colbert, Director of Accounting Programs, University of Colorado Denver 1 Education and experience

More information

MOBILE VOICE SERVICE SCHEDULE

MOBILE VOICE SERVICE SCHEDULE MOBILE VOICE SERVICE SCHEDULE 1. About this document This Service Schedule forms part your Contract. In the event of any inconsistency between this Service Schedule and another clause of your Contract,

More information

White Paper: FSA Data Audit

White Paper: FSA Data Audit White Paper: SA Data Audit Background In most insurers the internal model will consume information from a wide range of technology platforms. he prohibitive cost of formal integration of these platforms

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

Trillium Consulting. Data Governance. Optimizing Business Outcomes through Data and Information Assets

Trillium Consulting. Data Governance. Optimizing Business Outcomes through Data and Information Assets Trillium Consulting Data Governance Optimizing Business Outcomes through Data and Information Assets DAMA Indiana Winter Meeting Indianapolis, Indiana January 20, 2011 Jim Orr, Global Director Enterprise

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

FIBO Operational Ontologies Briefing for the Object Management Group

FIBO Operational Ontologies Briefing for the Object Management Group FIBO Operational Ontologies Briefing for the Object Management Group March 20, 2013, Reston, VA David Newman Strategic Planning Manager, Senior Vice President, Enterprise Architecture Chair, Semantic Technology

More information

Comprehensive Data Quality Improvement through Data Governance An Executive Overview

Comprehensive Data Quality Improvement through Data Governance An Executive Overview Comprehensive Data Quality Improvement through Data Governance An Executive Overview Introducing MIKE2.0 An Open Source Methodology for Information Development http://www.openmethodology.org Management

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager The objective of the PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager examination is to ensure

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan

More information

MATLAB-Based Policy Simulator

MATLAB-Based Policy Simulator DRAFT MATLAB-Based Policy Simulator Regulatory & Risk Analytics (RRA) Prepared by Seth Aslin Date: October 2013 Presentation Outline Background and context to Project Navigator General project objectives

More information

Announcement date: December 1, 2009 New program launch date: May 1, 2010

Announcement date: December 1, 2009 New program launch date: May 1, 2010 Overview New Certified Management Accountant (CMA ) Certification Program Announcement date: December 1, 2009 New program launch date: May 1, 2010 Why did ICMA decide to update the curriculum and change

More information

HCS 2012 and the June 2015 Deadline

HCS 2012 and the June 2015 Deadline A Practical Primer on Pesticides Seminar Washington, DC HCS 2012 and the June 2015 Deadline April 24, 2015 David G. Sarvadi Partner Keller and Heckman LLP 1001 G Street NW, Suite 500 West Washington, DC

More information

OCM ACADEMIC SERVICES PROJECT INITIATION DOCUMENT. Project Title: Online Coursework Management

OCM ACADEMIC SERVICES PROJECT INITIATION DOCUMENT. Project Title: Online Coursework Management OCM-12-025 ACADEMIC SERVICES PROJECT INITIATION DOCUMENT Project Title: Online Coursework Management Change Record Date Author Version Change Reference March 2012 Sue Milward v1 Initial draft April 2012

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Request for Qualifications for Audit Services March 25, 2015

Request for Qualifications for Audit Services March 25, 2015 Request for Qualifications for Audit Services March 25, 2015 I. GENERAL INFORMATION A. Purpose This Request for Qualifications (RFQ) is to solicit a CPA firm with which to contract for a financial and

More information

-archiving. project roadmap CHAPTER 1. archiving Planning, policies and product selection

-archiving. project roadmap CHAPTER 1.  archiving Planning, policies and product selection INSIDE email archiving Planning, policies and product selection CHAPTER 1 Ready to dive into email archiving? Try this four-phased approach to get your project up and running Email-archiving project roadmap

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 14001 Lead Auditor examination is to ensure that the candidate

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made

More information

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED.

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED. Assistant Deputy Minister (Review Services) Reviewed by in accordance with the Access to Information Act. Information UNCLASSIFIED. Security Audits: Management Action Plan Follow-up December 2015 1850-3-003

More information

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Intermediate School District #917 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual April 2009 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility Requirements 5

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 17025 Lead Auditor The objective of the PECB Certified ISO/IEC 17025 Lead Auditor examination is to ensure that the candidate possesses the needed expertise

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 21500 Lead Project Manager The objective of the PECB Certified ISO 21500 Lead Project Manager examination is to ensure that the candidate has the knowledge and

More information

WHEN THE GOING GETS TOUGH, THE TOUGH GET GOING

WHEN THE GOING GETS TOUGH, THE TOUGH GET GOING WHEN THE GOING GETS TOUGH, THE TOUGH GET GOING OVERCOMING THE CYBER RISK APPETITE CHALLENGE APRIL 2018 AUTHORS Michael Duane, Partner Rico Brandenburg, Principal Matthew Gruber, Engagement Manager The

More information

Chapter 10. Administration

Chapter 10. Administration Chapter 10 Administration This Page Left Blank Intentionally CTAS User Manual 10-1 Administration: Introduction The Admin section is where you enter your local government s required and optional system

More information

European Risk Management Certification. Candidate Information Guide

European Risk Management Certification. Candidate Information Guide European Risk Management Certification Candidate Information Guide Presentation of FERMA Certification 3 Benefits 4 Eligibility criteria 5 Application and fees Examination details Syllabus: FERMA rimap

More information

Early Intervention Indiana First Steps Indiana First Steps HIPAA Testing Plan

Early Intervention Indiana First Steps Indiana First Steps HIPAA Testing Plan Testing and Certifying HIPAA Compliance with Transaction Sets Contingency Testing Plan... 2 Testing Description... 2 Testing Procedures for Providers/Payees... 3 Testing Protocols... 4 Six Plus One Levels

More information

SAS 70 & SSAE 16: Changes & Impact on Credit Unions. Agenda

SAS 70 & SSAE 16: Changes & Impact on Credit Unions. Agenda SAS 70 & SSAE 16: Changes & Impact on Credit Unions John Mason CISM, CISA, CGEIT, CFE SingerLewak LLP October 19, 2010 Agenda Statement on Auditing Standards (SAS) 70 background Background & purpose Types

More information

Understanding Software Engineering

Understanding Software Engineering McBreen.book Page 3 Wednesday, August 1, 2001 10:08 PM Chapter 1 Understanding Software Engineering In order to understand software engineering, we first need to look at the projects that were reported

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

Green Governance Growth

Green Governance Growth G3 Data Centers Green Governance Growth DELIVER MORE WITH LESS The economic downturn changed the dynamics of the business world. It shifted the measure of success, driving companies to rethink how they

More information

Validation of a CMS Software

Validation of a CMS Software Validation of a CMS Software GxP Webinar Paul Daniel Senior Regulatory Compliance Instructor Vaisala, Inc. Practical Webinar Stuff Challenges with your audio connection? Try calling by phone: U.S. & Canada

More information

Important Information

Important Information Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland

More information

SC32 WG2 Metadata Standards Tutorial

SC32 WG2 Metadata Standards Tutorial SC32 WG2 Metadata Standards Tutorial Metadata Registries and Big Data WG2 N1945 June 9, 2014 Beijing, China WG2 Viewpoint Big Data magnifies the existing challenges and issues of managing and interpreting

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

EXIN BCS SIAM Foundation. Sample Exam. Edition

EXIN BCS SIAM Foundation. Sample Exam. Edition EXIN BCS SIAM Foundation Sample Exam Edition 201704 Copyright EXIN Holding B.V. and BCS, 2017. All rights reserved. EXIN is a registered trademark. SIAM is a registered trademark. ITIL is a registered

More information

California Independent System Operator Corporation Fifth Replacement Electronic Tariff

California Independent System Operator Corporation Fifth Replacement Electronic Tariff Table of Contents 17. Transmission Ownership Rights (TORs)... 2 17.1 TRTC Instructions... 2 17.1.1 Responsibility to Create TRTC Instructions... 2 17.1.2 TOR Scheduling Coordinator Responsibilities...

More information

XBRL US Domain Steering Committee Taxonomy Review

XBRL US Domain Steering Committee Taxonomy Review XBRL US Domain Steering Committee Taxonomy Review for XBRL US Work In Process Taxonomy 2016 As Approved by the DSC on September 8, 2016 Prepared by: Scott Theis, DSC Chairman Campbell Pryde Michelle Savage

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27005 Risk Manager The objective of the Certified ISO/IEC 27005 Risk Manager examination is to ensure that the candidate has the knowledge and the skills to

More information