SlideShare a Scribd company logo
Enterprise Governance, Risk and Compliance Mapping
david.daniel@casewise.com
David Daniel
Leverage Architecture to Drive Consistent Enterprise GRC Management
2
© 2015 Casewise - confidential
RISKSHAZARDSEvolution of an event from identification to retrospective
Risk Lifecycle
LIKELIHOOD
OF OCCURANCE
awareness
controls
contingencies
recovery
preparations
OUTCOMES
IMPACTSCONSEQUENCES
TIME
3
© 2015 Casewise - confidential
Integrated approach encompasses all areas of the enterprise
ThreeTiered Risk Management
Tier 1: Organization
Governance
Tier 2: Business Process
Information Flows
Tier 3: Information Systems
Operational Environment
People
Process
Technology
Technical
Architecture
Process
Architecture
Business
Architecture
4
© 2015 Casewise - confidential
Risk Awareness
5
© 2015 Casewise - confidential
You can’t manage what you don’t know
Risk Awareness
 Identify areas of concern
– Direct risks
– Indirect risks
 Outline risk objectives
– Supports construction of risk appetite model
– “Right sizes” risk management practices
 Establish risk registry
– Maintain objective catalog
– Establish ownership
 Implement systematic identification processes
– Introduce risk awareness into strategic planning
– Benchmark against industry standards
– Inject risk mapping into SDLC
TOOLING
SERVICES
workshops
SERVICES
workshops
SERVICES
practice building
6
© 2015 Casewise - confidential
Guiding Information and Information Systems Security
Typical Information Security Objectives
Confidentiality
“Preserving authorized restrictions on information access and disclosure,
including means for protecting personal privacy and proprietary
information…”
A loss of confidentiality is the unauthorized disclosure of information.
Integrity
“Guarding against improper information modification or destruction, and
includes ensuring information non-repudiation and authenticity…”
A loss of integrity is the unauthorized modification or destruction of
information.
Availability
“Ensuring timely and reliable access to and use of information…”
A loss of availability is the disruption of access to or use of information or
an information system.
7
© 2015 Casewise - confidential
Risk Controls
8
© 2015 Casewise - confidential
Understand, implement, govern and monitor controls
Risk ManagementControls Framework
Categorize
Select
Implement
Assess
Authorize
Monitor
SERVICES
practice building
TOOLING
9
© 2015 Casewise - confidential
• Market-centric orientation provides
solid business guidance
• Fosters full-spectrum analysis of
risk and compliance issues
• Aligns risk appetite with business
goals and objectives
• Defines strong governance model to
support compliance
• Translates risk into business terms
that are easily consumable by
stakeholders
Control the activities that perform the business
Controls – Business Architecture
P E
S T
LEGAL
ENVIRONMENTAL
political economic
social technologic
10
© 2015 Casewise - confidential
Control the processes that operate the business
Controls – Process Architecture
• Objectively identifies key areas of
concern for continuity planning
• Builds culture of compliance by
overlaying strategic risk and
compliance onto day-to-day
activities
• Fosters innovation through risk
awareness and response
• Institutionalizes GRC in the fabric of
the enterprise
11
© 2015 Casewise - confidential
Control the systems that support the business
Controls –TechnicalArchitecture
• Risk management becomes core
area of concern for solution
development
• Supports objective recovery options
in day-to-day operations
• Facilitates audit/compliance
reporting
• Translates technical risk into
business terms
• Defines both functional and non-
functional requirements
12
© 2015 Casewise - confidential
Risk Mitigation and Response
13
© 2015 Casewise - confidential
Event handling and residual risk must be addressed systematically
Mitigation
 Prepare systematic recovery response to known risk
– Reduce
– Retain
– Avoid
– Transfer
 Map events to contingencies
– Develop systematic event response methodologies
– Understand how to respond to unforeseen events
 Understand Residual Risk
– Monitor and maintain residual risk register
– Provide feedback loop for continuous improvement
SERVICES
workshops
SERVICES
practice building
SERVICES
practice building
14
© 2015 Casewise - confidential
“Tell me and I forget.Teach me and I remember. Involve me and I learn.”
- Benjamin Franklin
Continuous Improvement
 Articulate responses objectively
– Construct root cause assessments to determine
causes/responses to events
 Identify KRI (Key Risk Indicators)
– Update and Manage a catalog of KRIs
– Map new KRIs to risk areas
 Reduce variability and uncertainty
– Each event is a learning environment: monitored,
measured, analyzed and communicated to risk
management teams
 Maintain Risk Management Maturity Model
– Managed growth of GRC capability in the enterprise
SERVICES
practice building
TOOLING
SERVICES
practice building
SERVICES
practice building
david.daniel@casewise.com
David Daniel
“If you don’t have the time to do something
right, where are you going to find the time to
fix it?”
- Stephen King

More Related Content

What's hot

Mike_Marco_eCG_02.2016_Short
Mike_Marco_eCG_02.2016_ShortMike_Marco_eCG_02.2016_Short
Mike_Marco_eCG_02.2016_ShortMike Marco
 
Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...
BCM Institute
 
Real Estate Solutions Services
Real Estate Solutions ServicesReal Estate Solutions Services
Real Estate Solutions Services
Maneer
 
Bcp Approach Presentation
Bcp Approach PresentationBcp Approach Presentation
Bcp Approach Presentation
epcb
 
Checklist Asset Management for educational purposes - ISO55000
Checklist Asset Management for educational purposes - ISO55000Checklist Asset Management for educational purposes - ISO55000
Checklist Asset Management for educational purposes - ISO55000
Cyrus Sorab
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
Security Executive Council
 
Lean Maintenance Training
Lean Maintenance Training Lean Maintenance Training
Lean Maintenance Training
Life Cycle Engineering
 
Casewise - lloyds banking Group - Case Study
Casewise - lloyds banking Group - Case StudyCasewise - lloyds banking Group - Case Study
Casewise - lloyds banking Group - Case Study
Jean-Patrick Ascenci
 
Enhancing Existing Risk Management in National Statistical Institutes by Usin...
Enhancing Existing Risk Management in National Statistical Institutes by Usin...Enhancing Existing Risk Management in National Statistical Institutes by Usin...
Enhancing Existing Risk Management in National Statistical Institutes by Usin...
Светла Иванова
 

What's hot (9)

Mike_Marco_eCG_02.2016_Short
Mike_Marco_eCG_02.2016_ShortMike_Marco_eCG_02.2016_Short
Mike_Marco_eCG_02.2016_Short
 
Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...
 
Real Estate Solutions Services
Real Estate Solutions ServicesReal Estate Solutions Services
Real Estate Solutions Services
 
Bcp Approach Presentation
Bcp Approach PresentationBcp Approach Presentation
Bcp Approach Presentation
 
Checklist Asset Management for educational purposes - ISO55000
Checklist Asset Management for educational purposes - ISO55000Checklist Asset Management for educational purposes - ISO55000
Checklist Asset Management for educational purposes - ISO55000
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
Lean Maintenance Training
Lean Maintenance Training Lean Maintenance Training
Lean Maintenance Training
 
Casewise - lloyds banking Group - Case Study
Casewise - lloyds banking Group - Case StudyCasewise - lloyds banking Group - Case Study
Casewise - lloyds banking Group - Case Study
 
Enhancing Existing Risk Management in National Statistical Institutes by Usin...
Enhancing Existing Risk Management in National Statistical Institutes by Usin...Enhancing Existing Risk Management in National Statistical Institutes by Usin...
Enhancing Existing Risk Management in National Statistical Institutes by Usin...
 

Viewers also liked

iSwarmGRC - Software Powered. Collectively Evolved.
iSwarmGRC -   Software Powered. Collectively Evolved.iSwarmGRC -   Software Powered. Collectively Evolved.
iSwarmGRC - Software Powered. Collectively Evolved.
Susan_Smith_iSwarm
 
Is The Sky Falling? Segmented Risk Identification Questions
Is The Sky Falling? Segmented Risk Identification QuestionsIs The Sky Falling? Segmented Risk Identification Questions
Is The Sky Falling? Segmented Risk Identification Questions
Christopher Gentry, PMP, ITILv3
 
Project risk management focus on risk identification techniques
Project risk management   focus on risk identification techniquesProject risk management   focus on risk identification techniques
Project risk management focus on risk identification techniques
Marco De Santis, PMP, CFPP
 
Project risk management workshops
Project risk management workshopsProject risk management workshops
Project risk management workshops
shippers1000
 
Coso Erm(2)
Coso Erm(2)Coso Erm(2)
Coso Erm(2)deeptica
 
Risk assessment techniques a critical success factor
Risk assessment techniques a critical success factorRisk assessment techniques a critical success factor
Risk assessment techniques a critical success factor
PECB
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
Andre Knipe
 

Viewers also liked (7)

iSwarmGRC - Software Powered. Collectively Evolved.
iSwarmGRC -   Software Powered. Collectively Evolved.iSwarmGRC -   Software Powered. Collectively Evolved.
iSwarmGRC - Software Powered. Collectively Evolved.
 
Is The Sky Falling? Segmented Risk Identification Questions
Is The Sky Falling? Segmented Risk Identification QuestionsIs The Sky Falling? Segmented Risk Identification Questions
Is The Sky Falling? Segmented Risk Identification Questions
 
Project risk management focus on risk identification techniques
Project risk management   focus on risk identification techniquesProject risk management   focus on risk identification techniques
Project risk management focus on risk identification techniques
 
Project risk management workshops
Project risk management workshopsProject risk management workshops
Project risk management workshops
 
Coso Erm(2)
Coso Erm(2)Coso Erm(2)
Coso Erm(2)
 
Risk assessment techniques a critical success factor
Risk assessment techniques a critical success factorRisk assessment techniques a critical success factor
Risk assessment techniques a critical success factor
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 

Similar to Enterprise Risk Management - GRC as a practice

Value creation through optimising risk
Value creation through optimising riskValue creation through optimising risk
Value creation through optimising risk
David Berkelmans
 
A holistic approach to Safety and Asset Integrity Excellence
A holistic approach to Safety and Asset Integrity ExcellenceA holistic approach to Safety and Asset Integrity Excellence
A holistic approach to Safety and Asset Integrity Excellence
Kienbaum Consultants
 
Super Strategies 2014 Risk Strategy Presentation
Super Strategies 2014  Risk Strategy PresentationSuper Strategies 2014  Risk Strategy Presentation
Super Strategies 2014 Risk Strategy PresentationDavid Fernandes
 
Aligning Risk Management with ITIL
Aligning Risk Management with ITILAligning Risk Management with ITIL
Aligning Risk Management with ITIL
Austin Songer
 
Managing Digitalisation Risks with Lean and Agile Thinking
Managing Digitalisation Risks with Lean and Agile ThinkingManaging Digitalisation Risks with Lean and Agile Thinking
Managing Digitalisation Risks with Lean and Agile Thinking
Wei Chieh Lim
 
Integrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityIntegrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityGeoff Rodrigues
 
Integrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityIntegrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityGeoff Rodrigues
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
Continuity and Resilience
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
Prime Infoserv
 
Effective And Efficient Quality Managements-1
Effective And Efficient Quality Managements-1Effective And Efficient Quality Managements-1
Effective And Efficient Quality Managements-1
karikalan murugasen
 
Strategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptxStrategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptx
elizabethrdusek
 
Strategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdfStrategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdf
elizabethrdusek
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
William Godwin
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Notes for Mental health business architecture
Notes for Mental health business architectureNotes for Mental health business architecture
Notes for Mental health business architecture
Donna Kelly
 
A business continuity challenge - Joseph Thomas
A business continuity challenge - Joseph ThomasA business continuity challenge - Joseph Thomas
A business continuity challenge - Joseph ThomasBCM Institute
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
Goutama Bachtiar
 

Similar to Enterprise Risk Management - GRC as a practice (20)

Value creation through optimising risk
Value creation through optimising riskValue creation through optimising risk
Value creation through optimising risk
 
A holistic approach to Safety and Asset Integrity Excellence
A holistic approach to Safety and Asset Integrity ExcellenceA holistic approach to Safety and Asset Integrity Excellence
A holistic approach to Safety and Asset Integrity Excellence
 
Super Strategies 2014 Risk Strategy Presentation
Super Strategies 2014  Risk Strategy PresentationSuper Strategies 2014  Risk Strategy Presentation
Super Strategies 2014 Risk Strategy Presentation
 
Aligning Risk Management with ITIL
Aligning Risk Management with ITILAligning Risk Management with ITIL
Aligning Risk Management with ITIL
 
Designing and implementing an integrated Corporate Governance Framework
Designing and implementing an integrated  	Corporate Governance FrameworkDesigning and implementing an integrated  	Corporate Governance Framework
Designing and implementing an integrated Corporate Governance Framework
 
Managing Digitalisation Risks with Lean and Agile Thinking
Managing Digitalisation Risks with Lean and Agile ThinkingManaging Digitalisation Risks with Lean and Agile Thinking
Managing Digitalisation Risks with Lean and Agile Thinking
 
Integrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityIntegrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic Priority
 
Integrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityIntegrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic Priority
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
Effective And Efficient Quality Managements-1
Effective And Efficient Quality Managements-1Effective And Efficient Quality Managements-1
Effective And Efficient Quality Managements-1
 
Strategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptxStrategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptx
 
Strategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdfStrategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdf
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
GP for Risk Management product sheet
GP for Risk Management product sheetGP for Risk Management product sheet
GP for Risk Management product sheet
 
MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1
 
Notes for Mental health business architecture
Notes for Mental health business architectureNotes for Mental health business architecture
Notes for Mental health business architecture
 
A business continuity challenge - Joseph Thomas
A business continuity challenge - Joseph ThomasA business continuity challenge - Joseph Thomas
A business continuity challenge - Joseph Thomas
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 

Recently uploaded

Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
Rob Healy
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
Alexey Krivitsky
 
Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
Pinta Partners
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
Ahmed AbdelMoneim
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
EUS+ Management & Consulting Excellence
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
tdt5v4b
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
strikingabalance
 
Risk-Management-presentation for cooperatives
Risk-Management-presentation for cooperativesRisk-Management-presentation for cooperatives
Risk-Management-presentation for cooperatives
bernanbumatay1
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
Matthew Sinclair
 
Employment Practices Regulation and Multinational Corporations
Employment PracticesRegulation and Multinational CorporationsEmployment PracticesRegulation and Multinational Corporations
Employment Practices Regulation and Multinational Corporations
RoopaTemkar
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
Ram V Chary
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
tdt5v4b
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 

Recently uploaded (19)

Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
 
Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
 
Risk-Management-presentation for cooperatives
Risk-Management-presentation for cooperativesRisk-Management-presentation for cooperatives
Risk-Management-presentation for cooperatives
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
 
Employment Practices Regulation and Multinational Corporations
Employment PracticesRegulation and Multinational CorporationsEmployment PracticesRegulation and Multinational Corporations
Employment Practices Regulation and Multinational Corporations
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 

Enterprise Risk Management - GRC as a practice

  • 1. Enterprise Governance, Risk and Compliance Mapping david.daniel@casewise.com David Daniel Leverage Architecture to Drive Consistent Enterprise GRC Management
  • 2. 2 © 2015 Casewise - confidential RISKSHAZARDSEvolution of an event from identification to retrospective Risk Lifecycle LIKELIHOOD OF OCCURANCE awareness controls contingencies recovery preparations OUTCOMES IMPACTSCONSEQUENCES TIME
  • 3. 3 © 2015 Casewise - confidential Integrated approach encompasses all areas of the enterprise ThreeTiered Risk Management Tier 1: Organization Governance Tier 2: Business Process Information Flows Tier 3: Information Systems Operational Environment People Process Technology Technical Architecture Process Architecture Business Architecture
  • 4. 4 © 2015 Casewise - confidential Risk Awareness
  • 5. 5 © 2015 Casewise - confidential You can’t manage what you don’t know Risk Awareness  Identify areas of concern – Direct risks – Indirect risks  Outline risk objectives – Supports construction of risk appetite model – “Right sizes” risk management practices  Establish risk registry – Maintain objective catalog – Establish ownership  Implement systematic identification processes – Introduce risk awareness into strategic planning – Benchmark against industry standards – Inject risk mapping into SDLC TOOLING SERVICES workshops SERVICES workshops SERVICES practice building
  • 6. 6 © 2015 Casewise - confidential Guiding Information and Information Systems Security Typical Information Security Objectives Confidentiality “Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information…” A loss of confidentiality is the unauthorized disclosure of information. Integrity “Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity…” A loss of integrity is the unauthorized modification or destruction of information. Availability “Ensuring timely and reliable access to and use of information…” A loss of availability is the disruption of access to or use of information or an information system.
  • 7. 7 © 2015 Casewise - confidential Risk Controls
  • 8. 8 © 2015 Casewise - confidential Understand, implement, govern and monitor controls Risk ManagementControls Framework Categorize Select Implement Assess Authorize Monitor SERVICES practice building TOOLING
  • 9. 9 © 2015 Casewise - confidential • Market-centric orientation provides solid business guidance • Fosters full-spectrum analysis of risk and compliance issues • Aligns risk appetite with business goals and objectives • Defines strong governance model to support compliance • Translates risk into business terms that are easily consumable by stakeholders Control the activities that perform the business Controls – Business Architecture P E S T LEGAL ENVIRONMENTAL political economic social technologic
  • 10. 10 © 2015 Casewise - confidential Control the processes that operate the business Controls – Process Architecture • Objectively identifies key areas of concern for continuity planning • Builds culture of compliance by overlaying strategic risk and compliance onto day-to-day activities • Fosters innovation through risk awareness and response • Institutionalizes GRC in the fabric of the enterprise
  • 11. 11 © 2015 Casewise - confidential Control the systems that support the business Controls –TechnicalArchitecture • Risk management becomes core area of concern for solution development • Supports objective recovery options in day-to-day operations • Facilitates audit/compliance reporting • Translates technical risk into business terms • Defines both functional and non- functional requirements
  • 12. 12 © 2015 Casewise - confidential Risk Mitigation and Response
  • 13. 13 © 2015 Casewise - confidential Event handling and residual risk must be addressed systematically Mitigation  Prepare systematic recovery response to known risk – Reduce – Retain – Avoid – Transfer  Map events to contingencies – Develop systematic event response methodologies – Understand how to respond to unforeseen events  Understand Residual Risk – Monitor and maintain residual risk register – Provide feedback loop for continuous improvement SERVICES workshops SERVICES practice building SERVICES practice building
  • 14. 14 © 2015 Casewise - confidential “Tell me and I forget.Teach me and I remember. Involve me and I learn.” - Benjamin Franklin Continuous Improvement  Articulate responses objectively – Construct root cause assessments to determine causes/responses to events  Identify KRI (Key Risk Indicators) – Update and Manage a catalog of KRIs – Map new KRIs to risk areas  Reduce variability and uncertainty – Each event is a learning environment: monitored, measured, analyzed and communicated to risk management teams  Maintain Risk Management Maturity Model – Managed growth of GRC capability in the enterprise SERVICES practice building TOOLING SERVICES practice building SERVICES practice building
  • 15. david.daniel@casewise.com David Daniel “If you don’t have the time to do something right, where are you going to find the time to fix it?” - Stephen King