This document provides an introduction to Resolver's compliance application. It describes Resolver's integrated risk management software which helps organizations address common compliance challenges such as ensuring accurate data, competing priorities, maximizing budgets, and streamlining disparate processes. The software aims to provide risk-based prioritization, rely on the three lines of defense model, and streamline processes. Goals for 2018 include reducing time and costs for customers, visualizing changing risk over time, minimizing efforts for board reports, providing personalized experiences, and improving workflows and communication.
6. RISK AND COMPLIANCE
PROFESSIONALS
INFORMATION SECURITY
PROFESSIONALS
CORPORATE SECURITY
PROFESSIONALS
How Compliance Helps…
• Privacy Regulations
(PIPEDA, Privacy Shield, etc.)
• Anti-Money Laundering Legislation
• Canadian Anti-Spam Legislation
(CASL)
• American Disabilities Act (ADA)
• Foreign Account Tax Compliance
Act (FATCA)
• National Institute of Standards and
Technology (NIST)
• AICPA Trust Services Criteria
• ISO 27001
• Health Insurance Portability and
Accountability Act
• Payment Card Industry Data Security
Standard (PCI DSS)
• Clery Act and Crime Reporting
• International Association if Campus
Law Enforcement Administrators
(IACLEA)
• North American Electric Reliability
Corporation – CIP 14 (NERC)
• Security Risk Assessment
Methodology for the Petroleum and
Petrochemical Industries
(ANSI/API 780)
• Customs-Trade Partnership Against
Terrorism (C-TRAT)
7. Common Challenges
LACK OF CONFIDENCE
Ensuring the accuracy of data and the breath of coverage
COMPETING PRIORITIES
Compliance professionals are accountable to multiple stakeholders who present
conflicting priorities
MAXIMIZING BUDGET
Siloed teams result in the duplication of work, reduced accountability and
program inefficiencies
INEFFECTIVE AND DISPARATE PROCESSES
Siloed risk assessment requests result in risk owner fatigue and allows for
significant risks to go unnoticed
8. How Software Helps
PROVIDE AN OPINION ON THE STATUS OF COMPLIANCE
Demonstrate program effectiveness and how risk migration activities support
business priorities
RISK BASED PRIORITIZATION
Align compliance efforts with business priorities and areas of critical exposure
RELY ON THE THREE LINES OF DEFENCE
Stretch limited budgets by leveraging the work of other business units and reduce
the duplication of work
STREAMLINE PROCESSES TO ACHIEVE CONSISTENT DATA
Enterprise-wide coordination and consistency in how compliance risks are rated,
controlled, documented and reported
9. Goals
2018
Reduce Time and Cost to Deliver Software to Customers
Fast, efficient migrations and/or application expansion.
Visualize a Changing Risk Environment Over Time
Phase III of Assessments: Data that tells a story and supports cross organization
decision making.
Minimize Efforts to get Board (or meeting) Ready
Clean, concise, branded. Reduced time and effort to prepare shared reports.
A Tailored Experience to You - Personalization
Continuously tailored experience based of previous behavior.
Efficient and Supportive Communication that Inspires Collaboration
Software that encourages collaboration and clear communication between all user types.
10. WORKFLOW
IMPROVEMENTS
Processes will
handle the handoff
and notification of
relevant information
across teams and
various roles
ENHANCED
COMMNUNICATIO
N
Platform will enable
custom email
templates, summary
of my task, and an
email digest
PERSONALIZED
EXPERIENCE
Users gain a better
understanding about
what information is
relevant to them
TRENDING WITHIN
REPORTS
Information will be
presented in easy to
understand formats
to ensure insights
are simple to share
and communicate
REGULATORY
LIBRARY
A regulatory library of
relevant regulatory
standards
Q3 Q3 Q4 2019Q2
All information is confidential and subject to change.
11. ““You would need 50 spreadsheets
and 30,000 VLOOKUP’s to get all
that information and present it using
Excel spreadsheets.”
Pam Huggler, Street Capital