SlideShare a Scribd company logo
1 of 10
Strategic Enterprise Risk
Architecture
Sandeep Maira
Head, Enterprise Risk & Compliance Technology
The Bank of New York Mellon
2 Information Classification: General
Enterprise Risk Architecture Objectives
E2E Architecture for risk (and beyond) including data, processing and reporting
Benefits include -
• Satisfy regulatory as well as internal risk management objectives. Support CCAR but also
internal risk analysis.
• Reduce overall costs
• Improve enterprise wide data consistency
• Leverage advances in Big Data and computing power to provide advanced and predictive
analysis
3 Information Classification: General
Regulatory
Risk
Ad-hoc
Data Science
Control Framework :Data Governance, System Monitoring
Classification
Model
Development
Data Sourcing &
Staging
Model Dev/
Management
Aggregation
Credit Risk
Ops Risk
Liquidity Risk
Market Risk
Model
Management
Scenario
Management
CCAR
Calculators
Model
Parameters
Reporting/
Analysis
DataLake
CommonStagingDB
Reference Data
Collateral
Positions
Transactions
Credit Liquidity Basel
Business Process Management: Reviews, Handoffs
Target State Logical Architecture – Component View
VaR
4 Information Classification: General
3
1
4
5
Architecture
Components
Design Approach Benefits Challenges
Data • Leverage shared
position, transaction,
collateral and reference
data services across risk,
finance, treasury
• Provides data consistency
and traceability. Reduces
costs.
• Helps satisfy BCBS 239
and SR14-1
• Provides the basis for
advanced analysis
• Organizational
boundaries
• Upfront expense
Model
development
• Sandbox for model
development purposes
• Model registry for model
definitions and approval
• Scenario registry for
regulatory & internal
scenarios
• Scalable infrastructure for
model development
• Improve controls and
governance
• Reduce costs through
model re-use
• Ownership model
between business
and technology
• Multiple coding
languages
Calculators • Calculators as services • Consistent results for
given inputs
• Reusability and cost
reduction
• Integrating disparate
technologies
• Retrofitting can be
difficult
Risk Architecture Design Objectives and Approach
5 Information Classification: General
1
Architecture
Components
Design Approach Benefits Challenges
Aggregations • Configurable
aggregations for risk
measures
• Flexibility to aggregate and
drill down at all levels
• Deep and accurate
datasets
Workflow • Integrated workflows for
handoffs, approvals and
validations
• Single inbox for all tasks
• Streamline and reduce
operational overhead
• Improved data validation
• Enforce risk policies
• Integration of different
platforms
Reporting • Support static and flexible
ad-hoc capabilities
• Ability to slice and dice
on all major dimensions
and support rich
visualizations
• Threshold capabilities on
all required measures
• In-depth analysis of all
types of risk events
• Early and easy
identification of outliers
• Helps satisfy BCBS 239
and SR 14-1
• Acquiring breadth
and depth of data
Control • Support data lineage,
validations and glossaries
• Data reconciliations
• Robust exception
handling and alerting
• Satisfy BCBS 239 and
ensure data consistency,
accuracy and
completeness
• Monitor health of
production infrastructure
• Operational
ownership across
multiple business
lines
• Agreement on terms
Risk Architecture Design Objectives and Approach
6 Information Classification: General
Use Case - CCAR
• Acquire data from
master data sources into
common data staging
• Handoffs are validated
Models are developed
• Model risk management
approves models
• Scenarios are updated
• Models move to
production and source
data
• Results are aggregated
• Results are available for
reporting
• Data quality and system
monitoring checks
CCAR Process
1
1
2
6
3
4
5
7
8
9
2
3
4
5
6
7
8
9
7 Information Classification: General
What is my ‘exposure’ to Greece?
What is my credit risk?
What is my market risk?
What potential exposure will I
have with a further worsening?
Do I have any compliance
issues?
What ‘Greek’ counterparties do I have?
What is the current exposure and future
potential exposure?
What collateral do I have?
What Greek instruments do I have?
What hedges do I have in place?
Are there any AML issues?
For counterparty ABC with
high credit exposure, what
instruments do I hold? Do I
have any AML concerns ?
With further worsening of
conditions what might
happen?
What is my exposure with a 30
percent drop in Greek bonds?
More Interesting Q’s……..
8 Information Classification: General
Regulatory
Risk/Finance/
Treasury/
Compliance
Business
Intelligence
Reporting / Analysis
Risk
Treasury
Finance
‘Big Data’
DB
Regulatory
• The data lake can provide ‘Business Intelligence’ within and
across domains
• The ‘Big Data’ DB has very wide depth and breadth of data, for
advanced analysis. Data science analytics, including (for
example) statistical analysis and machine learning, can be
performed in this environment. This DB can also be used for
model development.
Compliance
Target State Logical Architecture – Modeling and Data
Science
Historical
Data
9 Information Classification: General
Appendix
10 Information Classification: General
Regulatory
Risk/Finance/
Treasury/
Compliance
Business
Intelligence
Reporting / Analysis
Risk
Treasury
Finance
‘Big Data’
DB
Regulatory
Compliance
Data Pathway
Control Frame Work :Data Governance Tools
• Data governance tools including data lineage, glossaries
• The ‘Big Data’ environment can also be used for ad-hoc
analysis
Target State Logical Architecture – Data Lineage

More Related Content

What's hot

Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC NextLabs, Inc.
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security NextLabs, Inc.
 
Building a Data Quality Program from Scratch
Building a Data Quality Program from ScratchBuilding a Data Quality Program from Scratch
Building a Data Quality Program from Scratchdmurph4
 
Michael Patterson Combinatorial Resume
Michael Patterson Combinatorial ResumeMichael Patterson Combinatorial Resume
Michael Patterson Combinatorial ResumeMichael Patterson
 
How Fannie Mae Leverages Data Quality to Improve the Business
How Fannie Mae Leverages Data Quality to Improve the BusinessHow Fannie Mae Leverages Data Quality to Improve the Business
How Fannie Mae Leverages Data Quality to Improve the BusinessDLT Solutions
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Resume DJ Elmore
Resume DJ ElmoreResume DJ Elmore
Resume DJ ElmoreDJ Elmore
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Data Quality Integration (ETL) Open Source
Data Quality Integration (ETL) Open SourceData Quality Integration (ETL) Open Source
Data Quality Integration (ETL) Open SourceStratebi
 
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FONandita Nityanandam
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cade Zvavanjanja
 
Risk View - InfoSec intro
Risk View - InfoSec introRisk View - InfoSec intro
Risk View - InfoSec introcswinney
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodologytbeckwith
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloudieeepondy
 
Petronas Project Oversight and Corporate Governance System Requirements
Petronas Project Oversight and Corporate Governance System RequirementsPetronas Project Oversight and Corporate Governance System Requirements
Petronas Project Oversight and Corporate Governance System RequirementsDarren Surin, BSc, MBA, PMP, ITIL
 
Data Quality Rules introduction
Data Quality Rules introductionData Quality Rules introduction
Data Quality Rules introductiondatatovalue
 
( Big ) Data Management - Data Quality - Global concepts in 5 slides
( Big ) Data Management - Data Quality - Global concepts in 5 slides( Big ) Data Management - Data Quality - Global concepts in 5 slides
( Big ) Data Management - Data Quality - Global concepts in 5 slidesNicolas Sarramagna
 

What's hot (20)

Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
 
Building a Data Quality Program from Scratch
Building a Data Quality Program from ScratchBuilding a Data Quality Program from Scratch
Building a Data Quality Program from Scratch
 
Michael Patterson Combinatorial Resume
Michael Patterson Combinatorial ResumeMichael Patterson Combinatorial Resume
Michael Patterson Combinatorial Resume
 
How Fannie Mae Leverages Data Quality to Improve the Business
How Fannie Mae Leverages Data Quality to Improve the BusinessHow Fannie Mae Leverages Data Quality to Improve the Business
How Fannie Mae Leverages Data Quality to Improve the Business
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Resume DJ Elmore
Resume DJ ElmoreResume DJ Elmore
Resume DJ Elmore
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
comesa cybersecurity
comesa cybersecuritycomesa cybersecurity
comesa cybersecurity
 
Data Quality Integration (ETL) Open Source
Data Quality Integration (ETL) Open SourceData Quality Integration (ETL) Open Source
Data Quality Integration (ETL) Open Source
 
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
 
Risk View - InfoSec intro
Risk View - InfoSec introRisk View - InfoSec intro
Risk View - InfoSec intro
 
Enterprise Threat Management
Enterprise Threat ManagementEnterprise Threat Management
Enterprise Threat Management
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloud
 
Petronas Project Oversight and Corporate Governance System Requirements
Petronas Project Oversight and Corporate Governance System RequirementsPetronas Project Oversight and Corporate Governance System Requirements
Petronas Project Oversight and Corporate Governance System Requirements
 
Data Quality Rules introduction
Data Quality Rules introductionData Quality Rules introduction
Data Quality Rules introduction
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
( Big ) Data Management - Data Quality - Global concepts in 5 slides
( Big ) Data Management - Data Quality - Global concepts in 5 slides( Big ) Data Management - Data Quality - Global concepts in 5 slides
( Big ) Data Management - Data Quality - Global concepts in 5 slides
 

Similar to Strategic Enterprise Risk and Data Architecture

Implementing bcbs 239 rdarr
Implementing bcbs 239 rdarrImplementing bcbs 239 rdarr
Implementing bcbs 239 rdarrmzahidgill
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?Denodo
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Denodo
 
Bridging Data Gaps with a Solid Data Foundation - A Key Imperative for Today’...
Bridging Data Gaps with a Solid Data Foundation - A Key Imperative for Today’...Bridging Data Gaps with a Solid Data Foundation - A Key Imperative for Today’...
Bridging Data Gaps with a Solid Data Foundation - A Key Imperative for Today’...Denodo
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?Lumension
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationKASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationDenodo
 
BCBS 239 - Risk Data Adequacy
BCBS 239 - Risk Data AdequacyBCBS 239 - Risk Data Adequacy
BCBS 239 - Risk Data Adequacynikatmalik
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Cognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challengeCognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challengeAlan Hsiao
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineSrikanth Sharma Boddupalli
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyDatabricks
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataCloudera, Inc.
 
Data architecture around risk management
Data architecture around risk managementData architecture around risk management
Data architecture around risk managementSuvradeep Rudra
 
Mergers Acquisitions and Tech Due Diligence
Mergers Acquisitions and Tech Due DiligenceMergers Acquisitions and Tech Due Diligence
Mergers Acquisitions and Tech Due DiligenceSharanjeet Kaur
 
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit UnionsWebinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit UnionsDenodo
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 

Similar to Strategic Enterprise Risk and Data Architecture (20)

Implementing bcbs 239 rdarr
Implementing bcbs 239 rdarrImplementing bcbs 239 rdarr
Implementing bcbs 239 rdarr
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Bridging Data Gaps with a Solid Data Foundation - A Key Imperative for Today’...
Bridging Data Gaps with a Solid Data Foundation - A Key Imperative for Today’...Bridging Data Gaps with a Solid Data Foundation - A Key Imperative for Today’...
Bridging Data Gaps with a Solid Data Foundation - A Key Imperative for Today’...
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationKASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
 
BCBS 239 - Risk Data Adequacy
BCBS 239 - Risk Data AdequacyBCBS 239 - Risk Data Adequacy
BCBS 239 - Risk Data Adequacy
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Cognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challengeCognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challenge
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform Strategy
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big Data
 
Data architecture around risk management
Data architecture around risk managementData architecture around risk management
Data architecture around risk management
 
Mergers Acquisitions and Tech Due Diligence
Mergers Acquisitions and Tech Due DiligenceMergers Acquisitions and Tech Due Diligence
Mergers Acquisitions and Tech Due Diligence
 
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit UnionsWebinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 

Recently uploaded

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 

Recently uploaded (20)

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 

Strategic Enterprise Risk and Data Architecture

  • 1. Strategic Enterprise Risk Architecture Sandeep Maira Head, Enterprise Risk & Compliance Technology The Bank of New York Mellon
  • 2. 2 Information Classification: General Enterprise Risk Architecture Objectives E2E Architecture for risk (and beyond) including data, processing and reporting Benefits include - • Satisfy regulatory as well as internal risk management objectives. Support CCAR but also internal risk analysis. • Reduce overall costs • Improve enterprise wide data consistency • Leverage advances in Big Data and computing power to provide advanced and predictive analysis
  • 3. 3 Information Classification: General Regulatory Risk Ad-hoc Data Science Control Framework :Data Governance, System Monitoring Classification Model Development Data Sourcing & Staging Model Dev/ Management Aggregation Credit Risk Ops Risk Liquidity Risk Market Risk Model Management Scenario Management CCAR Calculators Model Parameters Reporting/ Analysis DataLake CommonStagingDB Reference Data Collateral Positions Transactions Credit Liquidity Basel Business Process Management: Reviews, Handoffs Target State Logical Architecture – Component View VaR
  • 4. 4 Information Classification: General 3 1 4 5 Architecture Components Design Approach Benefits Challenges Data • Leverage shared position, transaction, collateral and reference data services across risk, finance, treasury • Provides data consistency and traceability. Reduces costs. • Helps satisfy BCBS 239 and SR14-1 • Provides the basis for advanced analysis • Organizational boundaries • Upfront expense Model development • Sandbox for model development purposes • Model registry for model definitions and approval • Scenario registry for regulatory & internal scenarios • Scalable infrastructure for model development • Improve controls and governance • Reduce costs through model re-use • Ownership model between business and technology • Multiple coding languages Calculators • Calculators as services • Consistent results for given inputs • Reusability and cost reduction • Integrating disparate technologies • Retrofitting can be difficult Risk Architecture Design Objectives and Approach
  • 5. 5 Information Classification: General 1 Architecture Components Design Approach Benefits Challenges Aggregations • Configurable aggregations for risk measures • Flexibility to aggregate and drill down at all levels • Deep and accurate datasets Workflow • Integrated workflows for handoffs, approvals and validations • Single inbox for all tasks • Streamline and reduce operational overhead • Improved data validation • Enforce risk policies • Integration of different platforms Reporting • Support static and flexible ad-hoc capabilities • Ability to slice and dice on all major dimensions and support rich visualizations • Threshold capabilities on all required measures • In-depth analysis of all types of risk events • Early and easy identification of outliers • Helps satisfy BCBS 239 and SR 14-1 • Acquiring breadth and depth of data Control • Support data lineage, validations and glossaries • Data reconciliations • Robust exception handling and alerting • Satisfy BCBS 239 and ensure data consistency, accuracy and completeness • Monitor health of production infrastructure • Operational ownership across multiple business lines • Agreement on terms Risk Architecture Design Objectives and Approach
  • 6. 6 Information Classification: General Use Case - CCAR • Acquire data from master data sources into common data staging • Handoffs are validated Models are developed • Model risk management approves models • Scenarios are updated • Models move to production and source data • Results are aggregated • Results are available for reporting • Data quality and system monitoring checks CCAR Process 1 1 2 6 3 4 5 7 8 9 2 3 4 5 6 7 8 9
  • 7. 7 Information Classification: General What is my ‘exposure’ to Greece? What is my credit risk? What is my market risk? What potential exposure will I have with a further worsening? Do I have any compliance issues? What ‘Greek’ counterparties do I have? What is the current exposure and future potential exposure? What collateral do I have? What Greek instruments do I have? What hedges do I have in place? Are there any AML issues? For counterparty ABC with high credit exposure, what instruments do I hold? Do I have any AML concerns ? With further worsening of conditions what might happen? What is my exposure with a 30 percent drop in Greek bonds? More Interesting Q’s……..
  • 8. 8 Information Classification: General Regulatory Risk/Finance/ Treasury/ Compliance Business Intelligence Reporting / Analysis Risk Treasury Finance ‘Big Data’ DB Regulatory • The data lake can provide ‘Business Intelligence’ within and across domains • The ‘Big Data’ DB has very wide depth and breadth of data, for advanced analysis. Data science analytics, including (for example) statistical analysis and machine learning, can be performed in this environment. This DB can also be used for model development. Compliance Target State Logical Architecture – Modeling and Data Science Historical Data
  • 9. 9 Information Classification: General Appendix
  • 10. 10 Information Classification: General Regulatory Risk/Finance/ Treasury/ Compliance Business Intelligence Reporting / Analysis Risk Treasury Finance ‘Big Data’ DB Regulatory Compliance Data Pathway Control Frame Work :Data Governance Tools • Data governance tools including data lineage, glossaries • The ‘Big Data’ environment can also be used for ad-hoc analysis Target State Logical Architecture – Data Lineage