SlideShare a Scribd company logo
1 
December 11, 2014 
Copyright 2014©, All rights reserved, 3W Partners LLC 
Scott Roller
2 
 Principal & Founder – 3W Partners LLC 
 25 Years – Fortune 500 Companies 
• Telecom 
• Financial Services 
 Leadership Roles in 
• Global Vendor Management 
• Ops / Strategy / Re-engineering 
• Outsourcing / Training 
 TL9001 (“ISO for telecom”) 
• Certified Lead Auditor 
Audited by… 
Regulators 
Gov’t Entities 
Ratings Agencies 
Others 
OCC, OTS, CFPB 
Fannie, Freddie, GAO 
Moody’s, Fitch, S&P 
ISO, Accounting firms
3 
Third-Party Oversight & Governance (TPOG) 
Brief History 
 Why the intense focus on vendors? 
 What led us here? 
Changing Landscape 
 Financial Crisis ~2008 
 Vendor management Prior to… and Now 
 Heightened regulator focus areas 
What Regulators Expect 
 12 Key Dimensions 
 Good resources to self-educate 
Technology & Tools 
 Increase you chances of success
4 
Financial Crisis 2008 
Prior to the Crisis 
Vendor focus very limited: 
• Business continuity 
• Financial strength 
• Credit risk 
Activities were outsourced 
• Unfortunately, so was 
vendor responsibility and 
accountability 
Post-mortem 
Vendors seen as a major 
contributing factor to the 
crisis 
Inadequate oversight from 
financial institutions 
Resulted in massive fraud and consumer distress 
Hidden risks when relationships are not managed closely
5 
Regulatory Response to the Financial Crisis 
Regulators have a renewed focus on third-party 
oversight 
OCC 
CFPB 
Federal Reserve Board 
FDIC 
NCUA 
Considerable Attention 
 Institutions must bear responsibility for supplier misdeeds 
• Numerous “casualties” already 
 Major focus on consumer interaction with vendors 
 Enterprise-wide engagement, especially executives 
 Push for independent reviews 
Will focus on 12 Key Dimensions today
6 
What I often see within the industry 
Programs are not overly mature 
Many organizations only do the basics 
 Financials 
 Continuity of business 
 Data and site security 
Hard to budget for vendor risk management 
Silo’s - Protecting turf 
 Minimal coordination 
 Not sharing best practices 
Led by single group 
 Versus cross-section of the enterprise 
Not part of larger enterprise-wide Risk Program 
Minimal investment 
Have we learned anything from the financial crisis?
7 
Recent examples… and consequences 
Collectively, they paid a total of more than $530 million to settle complaints 
of deceptive selling and predatory behavior by their third-party suppliers. 
Net Message: No one ever remembers the vendor name 
Source: http://www.mckinsey.com/insights/risk_management/managing_when_vendor_and_supplier_risk_becomes_your_own 
July 2013
8 
OCC 
CFPB 
Federal Reserve Board 
FDIC 
NCUA 
On Third-Party Oversight & Governance 
OCC Bulletin 2013-29 
• OCC Bulletin 2001-47 
• OCC Bulletin 2002-16: Foreign-Based Third-Party Service Providers 
Bulletin 2012-03 Service Providers 
SR 13-19 Guidance on Managing Outsourcing Risk 
• SR 00-4 (SUP): Outsourcing of Information Technology and Transaction 
• Processing 
Letter: Guidance For Managing Third-Party Risk 
• FDIC Compliance Manual, December 2012 
• FIL-44-2008: Guidance for Managing Third-Party Risk 
• FIL-50-2001: Bank Technology Bulletin: Technology Outsourcing 
Information Documents 
Supervisory Letter No.: 07-01 
Fortunately, expectations resemble one another
9 
These cover most regulatory expectations 
Risk Classification 
Due Diligence 
On-Boarding 
Contracts 
Compliance 
Audits 
MIS / Reporting 
Scorecards 
Annual Certifications 
Complaint Handling 
Escalations 
Governance 
Execute these well… satisfy your regulator(s)
10 
For effective third-party oversight 
Risk Classification 
 Risk-based segmentation 
 Scope and intensity of oversight is defined here 
 Must consider risks to… 
• Legal & Regulatory 
• Reputation 
• Sensitivity of data 
• Process complexity 
• Customer interface/impact 
• Public or private vendor 
Other Considerations 
• Domestic 
• Offshore 
• Core Bank Function 
• Non-Core 
• Number of similar suppliers 
• Percent of volume handled 
• Strategic (High) 
• Major (Med) 
• Basic (Low)
11 
Due Diligence 
 Assess the process of how suppliers are… 
• Sought 
• Vetted 
• Selected (and retained) 
 Consider vendor questionnaire and evaluation 
matrix 
On-Boarding 
 Have a plan to implement the vendor relationship 
• Technology, telecom, recruit, train (including compliance), etc. 
 Critical: System Entitlements 
• Limit vendor access to only what is “required” 
• Have a revocation process 
o Consider revoking within 24-hours of leaving
12 
Contracts 
 Regulators have specific expectations regarding vendor contracts 
 Examples of often-overlooked clauses: 
• Use of subcontractors 
• Termination for default 
• Compliance with laws 
• Privacy policy (sensitive info) 
• Electronic Transportable Media 
• Right to audit 
• Licensing 
• Indemnification 
• Notification of complaints 
• Handling of media inquiries 
• Service level monitoring 
• Limitation of liability 
• GSA “Excluded Party List” 
• HUD’s “Limited Denial of Participation” 
What is required of you … 
Is also required of ALL members of your “supply chain.” 
Make it contractual.
13 
Compliance 
 Identify all relevant compliance requirements and document how 
requirements are being met 
 Regulatory updates and change management process effectiveness 
• Flow down to vendors (operations, contracts, scorecards, etc.) 
Audits 
 Do your vendors... 
• “Say what they do?” (via Policy & Procedure Manual) 
• “Do what they say?” (can vendors demonstrate it?) 
 Have an audit schedule and comprehensive plan 
 Ensure risks are documented and controls are in place. 
Risk Classification 
• Strategic (High) 
• Major (Med) 
• Basic (Low) 
“Potential” Audit Frequency 
• Twice per year 
• Once per year 
• Every other year
14 
MIS / Reporting 
 You need timely and effective reporting in all supplier relationships. 
 Demonstrate you have sufficient visibility and control. 
Hard to achieve safety and soundness without robust reporting 
Scorecards 
 Identify key performance indicators (KPI)s, track and report on them. 
 Document vendor improvement plans. 
• Drive accountability. 
 Regular reviews. 
• Evidence of follow-up and actions 
o Warning notices 
o Training, certification 
o Volume adjustments 
o Expanded or decreased scope of work
15 
Annual Certifications 
 Re-certify vendors annually. 
No more 
• Financials 
• Licensing 
• Insurance 
• Data security 
• Capacity / Staffing 
• SLA performance 
• Process reviews 
• Compliance 
• Customer impact 
• Fees & incentives 
• Use of subcontractors 
• Training (especially compliance) 
• Business continuity 
• Audit results 
• Complaints 
• Media attention 
• Pending litigation 
• Mergers & Acquisitions 
• Ownership changes 
• Compensation practices 
 Keeping up with all changes: Yours, vendors, regulators, etc. 
• Assessing the impacts annually, at minimum. 
Very labor intensive dimension 
Due Diligence
16 
Complaint Handling 
 Requires an effective method of capturing, responding to and 
resolving complaints. 
• Especially where suppliers are involved. 
 Complaint source and severity: Major, Moderate, Minor. 
 Linkage of root cause back to the operation. 
 Report to senior leadership. 
Escalations 
Define your future reactions 
 When supplier problems arise, must have effective identification, 
escalation and management of issues. 
 Escalate to appropriate levels. Special review committee? 
 Examples: 
• Bad press 
• Multiple system outages 
• Multiple complaints 
• SLAs repeatedly not met 
• Downgraded financials 
• Fraud event 
• Audit findings
17 
Governance 
 Senior executive and/or Board Member engagement 
• “Fingerprints everywhere” 
o Drive and approve policy 
o Monitor vendor platform (via regular readouts) 
At-will access to vendor results 
o Sign-off on vendor selection and recertification (and action/exit) 
o Audit trail of their engagement 
 Proposed: Two Tier Governance Model 
Executive 
Committee 
Operations 
Committee 
Drive Vendor… 
• Performance / Quality 
• Control & Compliance 
• Risk & Change Mgmt. 
• Audits 
• Volume Allocations 
• Contingency plans 
Sets “TONE at the TOP” 
• Strategic Alignment 
• Risk appetite 
• Policy 
• Verify adequate oversight 
• Ask questions 
• Approve, Suspend & Terminate
Extremely useful when managing vendors and risks 
 Centralized repository; Security 
 Portal for easy access 
 Clear, actionable management reports and well-designed workflow 
systems 
• Essential for accountability across the institution 
 Measure your level of dependence on critical suppliers 
Build vs. Buy 
 Building a new third-party risk application from scratch is a big 
undertaking; 
• So too is enhancing a current risk tool to perform new functions 
 Consider “off-the-shelf” workflow and risk-management tools 
18
 Healthy, transparent and compliant 
 Consistency across vendors 
• OK to manage according to risk segmentation 
 Documentation 
• Policy & procedure; Roles & responsibilities 
• Audit trail 
 Performance based criteria 
 Adequate staffing for oversight 
• Number of resources 
• Skill and competency 
 Executive engagement 
• “Fingerprints everywhere” 
19 
Third-party relationships must be good for financial institution, 
its vendors and consumers 
Leverage technology where possible
20 
For a copy of today’s presentation… 
Scott Roller 
Principal / Founder 
3W Partners LLC 
scott@3Wpartners.net 
636.448.3713 cell 
www.3Wpartners.net

More Related Content

What's hot

Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
Transcendent Group
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides
SlideTeam
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
Adv Prashant Mali
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
CYBER RISK MANAGEMENT
CYBER RISK MANAGEMENTCYBER RISK MANAGEMENT
CYBER RISK MANAGEMENT
Pratham Sharma
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
LogRhythm
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
Strategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management RightStrategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management Right
Proformative, Inc.
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
AlienVault
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
Paul Feldman
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
Jonathan Sinclair
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
banerjeerohit
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
Priyanka Aash
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
Narudom Roongsiriwong, CISSP
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 

What's hot (20)

Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
CYBER RISK MANAGEMENT
CYBER RISK MANAGEMENTCYBER RISK MANAGEMENT
CYBER RISK MANAGEMENT
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Strategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management RightStrategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management Right
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 

Similar to Third-Party Oversight & Governance

Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?
EDR
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
Nidhi Gupta
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013Nidhi Gupta
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
Perficient, Inc.
 
Risk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal AuditRisk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal Audit
Smitesh Bhosale
 
CBA EDRppt
CBA EDRpptCBA EDRppt
CBA EDRpptJoe Benz
 
Traffic Lights & Threat Levels
Traffic Lights & Threat LevelsTraffic Lights & Threat Levels
Traffic Lights & Threat Levels
Matt Eckman
 
Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto Series
Continuity Control
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
Jim Kaplan CIA CFE
 
Manage Your Organization's Contract Risks Final
Manage Your Organization's Contract Risks FinalManage Your Organization's Contract Risks Final
Manage Your Organization's Contract Risks FinalFred Travis
 
RESPA-TILA Integrated Disclosure: Are You Ready?
RESPA-TILA Integrated Disclosure: Are You Ready?RESPA-TILA Integrated Disclosure: Are You Ready?
RESPA-TILA Integrated Disclosure: Are You Ready?
Infinitive
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
Perficient, Inc.
 
Monitor 17 may all presentations for website.ppt
Monitor 17 may all presentations for website.pptMonitor 17 may all presentations for website.ppt
Monitor 17 may all presentations for website.pptMonitorUpdate
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
Sami Benafia
 
The biggest problems caused by suppliers and how to prevent them
The biggest problems caused by suppliers and how to prevent themThe biggest problems caused by suppliers and how to prevent them
The biggest problems caused by suppliers and how to prevent them
Ali Zeeshan
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
Wilson Kao
 

Similar to Third-Party Oversight & Governance (20)

Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
 
Risk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal AuditRisk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal Audit
 
CBA EDRppt
CBA EDRpptCBA EDRppt
CBA EDRppt
 
Traffic Lights & Threat Levels
Traffic Lights & Threat LevelsTraffic Lights & Threat Levels
Traffic Lights & Threat Levels
 
Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto Series
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
 
Manage Your Organization's Contract Risks Final
Manage Your Organization's Contract Risks FinalManage Your Organization's Contract Risks Final
Manage Your Organization's Contract Risks Final
 
RESPA-TILA Integrated Disclosure: Are You Ready?
RESPA-TILA Integrated Disclosure: Are You Ready?RESPA-TILA Integrated Disclosure: Are You Ready?
RESPA-TILA Integrated Disclosure: Are You Ready?
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 
ISM final
ISM finalISM final
ISM final
 
Monitor 17 may all presentations for website.ppt
Monitor 17 may all presentations for website.pptMonitor 17 may all presentations for website.ppt
Monitor 17 may all presentations for website.ppt
 
My slides
My slidesMy slides
My slides
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
 
The biggest problems caused by suppliers and how to prevent them
The biggest problems caused by suppliers and how to prevent themThe biggest problems caused by suppliers and how to prevent them
The biggest problems caused by suppliers and how to prevent them
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 

More from EDR

Measure twice shields
Measure twice   shieldsMeasure twice   shields
Measure twice shields
EDR
 
Brownfields under trump panel
Brownfields under trump panelBrownfields under trump panel
Brownfields under trump panel
EDR
 
How technology is changing opp danielson
How technology is changing opp danielsonHow technology is changing opp danielson
How technology is changing opp danielson
EDR
 
Measure twice van buren
Measure twice   van burenMeasure twice   van buren
Measure twice van buren
EDR
 
Covering your bases parson
Covering your bases parsonCovering your bases parson
Covering your bases parson
EDR
 
Covering Your Bases Parson
Covering Your Bases ParsonCovering Your Bases Parson
Covering Your Bases Parson
EDR
 
CRE At A Crossroads Golin
CRE At A Crossroads GolinCRE At A Crossroads Golin
CRE At A Crossroads Golin
EDR
 
Covering Your Bases McDonald
Covering Your Bases McDonaldCovering Your Bases McDonald
Covering Your Bases McDonald
EDR
 
Strategic Growth Spiers
Strategic Growth SpiersStrategic Growth Spiers
Strategic Growth Spiers
EDR
 
Market Update Rossi
Market Update RossiMarket Update Rossi
Market Update Rossi
EDR
 
Market Update - Rossi
Market Update - RossiMarket Update - Rossi
Market Update - Rossi
EDR
 
Market Update - Keene
Market Update - KeeneMarket Update - Keene
Market Update - Keene
EDR
 
Market Update - Allen
Market Update - AllenMarket Update - Allen
Market Update - Allen
EDR
 
The World of CRE Finance
The World of CRE FinanceThe World of CRE Finance
The World of CRE Finance
EDR
 
Two Roads Diverged - Conway
Two Roads Diverged - ConwayTwo Roads Diverged - Conway
Two Roads Diverged - Conway
EDR
 
Brownfields Under Trump - Panel
Brownfields Under Trump - PanelBrownfields Under Trump - Panel
Brownfields Under Trump - Panel
EDR
 
Brownfields Under Trump - Bartsch
Brownfields Under Trump - BartschBrownfields Under Trump - Bartsch
Brownfields Under Trump - Bartsch
EDR
 
Covering Your Bases - Parson
Covering Your Bases - ParsonCovering Your Bases - Parson
Covering Your Bases - Parson
EDR
 
A Look at Brexit - Mellott
A Look at Brexit - MellottA Look at Brexit - Mellott
A Look at Brexit - Mellott
EDR
 
EDR REC CREC-HREC Presentation - Boston DDD
EDR REC CREC-HREC Presentation - Boston DDDEDR REC CREC-HREC Presentation - Boston DDD
EDR REC CREC-HREC Presentation - Boston DDD
EDR
 

More from EDR (20)

Measure twice shields
Measure twice   shieldsMeasure twice   shields
Measure twice shields
 
Brownfields under trump panel
Brownfields under trump panelBrownfields under trump panel
Brownfields under trump panel
 
How technology is changing opp danielson
How technology is changing opp danielsonHow technology is changing opp danielson
How technology is changing opp danielson
 
Measure twice van buren
Measure twice   van burenMeasure twice   van buren
Measure twice van buren
 
Covering your bases parson
Covering your bases parsonCovering your bases parson
Covering your bases parson
 
Covering Your Bases Parson
Covering Your Bases ParsonCovering Your Bases Parson
Covering Your Bases Parson
 
CRE At A Crossroads Golin
CRE At A Crossroads GolinCRE At A Crossroads Golin
CRE At A Crossroads Golin
 
Covering Your Bases McDonald
Covering Your Bases McDonaldCovering Your Bases McDonald
Covering Your Bases McDonald
 
Strategic Growth Spiers
Strategic Growth SpiersStrategic Growth Spiers
Strategic Growth Spiers
 
Market Update Rossi
Market Update RossiMarket Update Rossi
Market Update Rossi
 
Market Update - Rossi
Market Update - RossiMarket Update - Rossi
Market Update - Rossi
 
Market Update - Keene
Market Update - KeeneMarket Update - Keene
Market Update - Keene
 
Market Update - Allen
Market Update - AllenMarket Update - Allen
Market Update - Allen
 
The World of CRE Finance
The World of CRE FinanceThe World of CRE Finance
The World of CRE Finance
 
Two Roads Diverged - Conway
Two Roads Diverged - ConwayTwo Roads Diverged - Conway
Two Roads Diverged - Conway
 
Brownfields Under Trump - Panel
Brownfields Under Trump - PanelBrownfields Under Trump - Panel
Brownfields Under Trump - Panel
 
Brownfields Under Trump - Bartsch
Brownfields Under Trump - BartschBrownfields Under Trump - Bartsch
Brownfields Under Trump - Bartsch
 
Covering Your Bases - Parson
Covering Your Bases - ParsonCovering Your Bases - Parson
Covering Your Bases - Parson
 
A Look at Brexit - Mellott
A Look at Brexit - MellottA Look at Brexit - Mellott
A Look at Brexit - Mellott
 
EDR REC CREC-HREC Presentation - Boston DDD
EDR REC CREC-HREC Presentation - Boston DDDEDR REC CREC-HREC Presentation - Boston DDD
EDR REC CREC-HREC Presentation - Boston DDD
 

Recently uploaded

1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf
Neal Brewster
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Kezex (KZX)
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
lamluanvan.net Viết thuê luận văn
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
Writo-Finance
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
ManthanBhardwaj4
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
DOT TECH
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports
EasyReports
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
APP I Lecture Notes to students 0f 4the year
APP I  Lecture Notes  to students 0f 4the yearAPP I  Lecture Notes  to students 0f 4the year
APP I Lecture Notes to students 0f 4the year
telilaalilemlem
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
mikemetalprod
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
egoetzinger
 
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
nexop1
 
Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
SerdarHudaykuliyew
 
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
egoetzinger
 
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
Vighnesh Shashtri
 

Recently uploaded (20)

1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
 
5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
APP I Lecture Notes to students 0f 4the year
APP I  Lecture Notes  to students 0f 4the yearAPP I  Lecture Notes  to students 0f 4the year
APP I Lecture Notes to students 0f 4the year
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
 
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
 
Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
 
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
 

Third-Party Oversight & Governance

  • 1. 1 December 11, 2014 Copyright 2014©, All rights reserved, 3W Partners LLC Scott Roller
  • 2. 2  Principal & Founder – 3W Partners LLC  25 Years – Fortune 500 Companies • Telecom • Financial Services  Leadership Roles in • Global Vendor Management • Ops / Strategy / Re-engineering • Outsourcing / Training  TL9001 (“ISO for telecom”) • Certified Lead Auditor Audited by… Regulators Gov’t Entities Ratings Agencies Others OCC, OTS, CFPB Fannie, Freddie, GAO Moody’s, Fitch, S&P ISO, Accounting firms
  • 3. 3 Third-Party Oversight & Governance (TPOG) Brief History  Why the intense focus on vendors?  What led us here? Changing Landscape  Financial Crisis ~2008  Vendor management Prior to… and Now  Heightened regulator focus areas What Regulators Expect  12 Key Dimensions  Good resources to self-educate Technology & Tools  Increase you chances of success
  • 4. 4 Financial Crisis 2008 Prior to the Crisis Vendor focus very limited: • Business continuity • Financial strength • Credit risk Activities were outsourced • Unfortunately, so was vendor responsibility and accountability Post-mortem Vendors seen as a major contributing factor to the crisis Inadequate oversight from financial institutions Resulted in massive fraud and consumer distress Hidden risks when relationships are not managed closely
  • 5. 5 Regulatory Response to the Financial Crisis Regulators have a renewed focus on third-party oversight OCC CFPB Federal Reserve Board FDIC NCUA Considerable Attention  Institutions must bear responsibility for supplier misdeeds • Numerous “casualties” already  Major focus on consumer interaction with vendors  Enterprise-wide engagement, especially executives  Push for independent reviews Will focus on 12 Key Dimensions today
  • 6. 6 What I often see within the industry Programs are not overly mature Many organizations only do the basics  Financials  Continuity of business  Data and site security Hard to budget for vendor risk management Silo’s - Protecting turf  Minimal coordination  Not sharing best practices Led by single group  Versus cross-section of the enterprise Not part of larger enterprise-wide Risk Program Minimal investment Have we learned anything from the financial crisis?
  • 7. 7 Recent examples… and consequences Collectively, they paid a total of more than $530 million to settle complaints of deceptive selling and predatory behavior by their third-party suppliers. Net Message: No one ever remembers the vendor name Source: http://www.mckinsey.com/insights/risk_management/managing_when_vendor_and_supplier_risk_becomes_your_own July 2013
  • 8. 8 OCC CFPB Federal Reserve Board FDIC NCUA On Third-Party Oversight & Governance OCC Bulletin 2013-29 • OCC Bulletin 2001-47 • OCC Bulletin 2002-16: Foreign-Based Third-Party Service Providers Bulletin 2012-03 Service Providers SR 13-19 Guidance on Managing Outsourcing Risk • SR 00-4 (SUP): Outsourcing of Information Technology and Transaction • Processing Letter: Guidance For Managing Third-Party Risk • FDIC Compliance Manual, December 2012 • FIL-44-2008: Guidance for Managing Third-Party Risk • FIL-50-2001: Bank Technology Bulletin: Technology Outsourcing Information Documents Supervisory Letter No.: 07-01 Fortunately, expectations resemble one another
  • 9. 9 These cover most regulatory expectations Risk Classification Due Diligence On-Boarding Contracts Compliance Audits MIS / Reporting Scorecards Annual Certifications Complaint Handling Escalations Governance Execute these well… satisfy your regulator(s)
  • 10. 10 For effective third-party oversight Risk Classification  Risk-based segmentation  Scope and intensity of oversight is defined here  Must consider risks to… • Legal & Regulatory • Reputation • Sensitivity of data • Process complexity • Customer interface/impact • Public or private vendor Other Considerations • Domestic • Offshore • Core Bank Function • Non-Core • Number of similar suppliers • Percent of volume handled • Strategic (High) • Major (Med) • Basic (Low)
  • 11. 11 Due Diligence  Assess the process of how suppliers are… • Sought • Vetted • Selected (and retained)  Consider vendor questionnaire and evaluation matrix On-Boarding  Have a plan to implement the vendor relationship • Technology, telecom, recruit, train (including compliance), etc.  Critical: System Entitlements • Limit vendor access to only what is “required” • Have a revocation process o Consider revoking within 24-hours of leaving
  • 12. 12 Contracts  Regulators have specific expectations regarding vendor contracts  Examples of often-overlooked clauses: • Use of subcontractors • Termination for default • Compliance with laws • Privacy policy (sensitive info) • Electronic Transportable Media • Right to audit • Licensing • Indemnification • Notification of complaints • Handling of media inquiries • Service level monitoring • Limitation of liability • GSA “Excluded Party List” • HUD’s “Limited Denial of Participation” What is required of you … Is also required of ALL members of your “supply chain.” Make it contractual.
  • 13. 13 Compliance  Identify all relevant compliance requirements and document how requirements are being met  Regulatory updates and change management process effectiveness • Flow down to vendors (operations, contracts, scorecards, etc.) Audits  Do your vendors... • “Say what they do?” (via Policy & Procedure Manual) • “Do what they say?” (can vendors demonstrate it?)  Have an audit schedule and comprehensive plan  Ensure risks are documented and controls are in place. Risk Classification • Strategic (High) • Major (Med) • Basic (Low) “Potential” Audit Frequency • Twice per year • Once per year • Every other year
  • 14. 14 MIS / Reporting  You need timely and effective reporting in all supplier relationships.  Demonstrate you have sufficient visibility and control. Hard to achieve safety and soundness without robust reporting Scorecards  Identify key performance indicators (KPI)s, track and report on them.  Document vendor improvement plans. • Drive accountability.  Regular reviews. • Evidence of follow-up and actions o Warning notices o Training, certification o Volume adjustments o Expanded or decreased scope of work
  • 15. 15 Annual Certifications  Re-certify vendors annually. No more • Financials • Licensing • Insurance • Data security • Capacity / Staffing • SLA performance • Process reviews • Compliance • Customer impact • Fees & incentives • Use of subcontractors • Training (especially compliance) • Business continuity • Audit results • Complaints • Media attention • Pending litigation • Mergers & Acquisitions • Ownership changes • Compensation practices  Keeping up with all changes: Yours, vendors, regulators, etc. • Assessing the impacts annually, at minimum. Very labor intensive dimension Due Diligence
  • 16. 16 Complaint Handling  Requires an effective method of capturing, responding to and resolving complaints. • Especially where suppliers are involved.  Complaint source and severity: Major, Moderate, Minor.  Linkage of root cause back to the operation.  Report to senior leadership. Escalations Define your future reactions  When supplier problems arise, must have effective identification, escalation and management of issues.  Escalate to appropriate levels. Special review committee?  Examples: • Bad press • Multiple system outages • Multiple complaints • SLAs repeatedly not met • Downgraded financials • Fraud event • Audit findings
  • 17. 17 Governance  Senior executive and/or Board Member engagement • “Fingerprints everywhere” o Drive and approve policy o Monitor vendor platform (via regular readouts) At-will access to vendor results o Sign-off on vendor selection and recertification (and action/exit) o Audit trail of their engagement  Proposed: Two Tier Governance Model Executive Committee Operations Committee Drive Vendor… • Performance / Quality • Control & Compliance • Risk & Change Mgmt. • Audits • Volume Allocations • Contingency plans Sets “TONE at the TOP” • Strategic Alignment • Risk appetite • Policy • Verify adequate oversight • Ask questions • Approve, Suspend & Terminate
  • 18. Extremely useful when managing vendors and risks  Centralized repository; Security  Portal for easy access  Clear, actionable management reports and well-designed workflow systems • Essential for accountability across the institution  Measure your level of dependence on critical suppliers Build vs. Buy  Building a new third-party risk application from scratch is a big undertaking; • So too is enhancing a current risk tool to perform new functions  Consider “off-the-shelf” workflow and risk-management tools 18
  • 19.  Healthy, transparent and compliant  Consistency across vendors • OK to manage according to risk segmentation  Documentation • Policy & procedure; Roles & responsibilities • Audit trail  Performance based criteria  Adequate staffing for oversight • Number of resources • Skill and competency  Executive engagement • “Fingerprints everywhere” 19 Third-party relationships must be good for financial institution, its vendors and consumers Leverage technology where possible
  • 20. 20 For a copy of today’s presentation… Scott Roller Principal / Founder 3W Partners LLC scott@3Wpartners.net 636.448.3713 cell www.3Wpartners.net