SlideShare a Scribd company logo
www.nicsa.org
Third-Party Risk Management:
Implementing a Strategy
Part I of II
1
SPONSORED BY:
www.nicsa.org
The use of third-party service providers has become increasingly pervasive, complex, and
interconnected within the investment management industry
• Increased number of core operations and IT
services being outsourced
• Third parties also outsource - common
providers can create layering and unforeseen
concentration risk
• Dispersed dependencies create increased
reliance and risk exposure from entities outside
of your direct control
This growth of the extended enterprise model calls for continued evolution of the Extended
Enterprise Risk Management (EERM) strategy, with mature programs applying a consistent,
enterprise-wide level of discipline that extends across the entire third-party lifecycle.
An evolving landscape
:
Copyright © 2015 Deloitte Development LLC. All rights reserved.
www.nicsa.org
 Enhanced quality of risk management processes through centralized execution on the business’ behalf
 Transparency into third-party performance and risk exposure by improving information flow through the organization
 Improved efficiency through centralized tools and processes
 Reduced risks through centralization of controls and quality gates
 Increased consistency scale and common communication
Strategy & Planning
Contract &
On-board
Evaluate
& Select
Terminate
Off-board
Manage &
Monitor
Third-Party
Management
Lifecycle
Strategy & planning – Develop sourcing strategy,
consider cost/benefits and develop business
Evaluate & select - Identify and assess risks / perform
due diligence
Contract & on-board - Incorporate risk, compliance,
and performance requirements in contracts
Manage & monitor - Perform risk management and
ongoing monitoring & coordinating with each third
party
Terminate & off-board - Determine need to terminate the
third party and manage the off-boarding process
Some benefits of an EERM Framework
Many companies are moving toward an end-to-end framework to create a controlled and efficient process to effectively manage the
business and regulatory requirements. A well-designed and sustainable framework can help manage third-party risks and provide
structure for governance and monitoring the process.
Maintaining control &
managing third-party risk
:
Copyright © 2015 Deloitte Development LLC. All rights reserved.
www.nicsa.org
CPE CODE:
897
www.nicsa.org
Governance and
Oversight
The organizational
structure, committees,
and roles and
responsibilities for
managing third parties
EERM Framework
Risk
Domains
Operating
Model
Components
Business
Objectives
Risk and Compliance
Management
Growth / Innovation Client Experience Cost Reduction
Improved Time to
Market
Reputation Risk Strategic RiskGeopolitical Risk
Contractual Risk
Information Security
Risk
Transaction /
Operational Risk
Financial Stability
Risk
Business Continuity
Risk
Compliance / Legal
Risk
Credit Risk
Plan, Evaluate and Select Contract and On-board Manage and Monitor Terminate and Off-boardManagement
Process
Detail
Our EERM framework—based on the Office of the Comptroller of the Currency (OCC) and other regulatory requirements, as well as
industry practices—provides a structured review of the operating model components required to support an effective program.
 An effective EERM program supports business objectives including growth, innovation, reduced cost, and risk and compliance.
 Delivering effective EERM requires a comprehensive operating model that includes governance and oversight, policies and standards, management
processes, tools and technology, risk metrics and reporting, and risk culture.
 Management and risk domains support delivery of EERM capabilities and the management of risk. Each domain is comprised of its own set of management
activities/capabilities and related risks.
Deloitte Advisory’s EERM framework
Risk Culture
Tone at the top, clarity
on risk appetite,
appropriate training
and awareness. to
promote positive risk
culture
Policies and
Standards
Management
expectations for the
management of third
parties and related
risks
Risk Metrics and
Dashboard
Reports identifying
risks and performance
associated with third
parties, tailored
toward multiple levels
of management
Management
Processes
Processes to manage
risks across the third-
party lifecycle
Tools and
Technology
Tools and technology
that support EERM
processes
:
Copyright © 2015 Deloitte Development LLC. All rights reserved.
www.nicsa.org
Stages of EERM Capability Maturity
StakeholderValue
Integrated
Risk
Intelligent
Top Down
FragmentedInitial
• Ad hoc/chaotic
• Depends primarily on
individual heroics,
capabilities, and verbal
wisdom
• Independent EERM
activities
• Limited focus on the
linkage of third-party
risks with the
company’s overall
strategic risks
• Limited alignment of
risks to strategies
• Disparate monitoring &
reporting functions
• Common framework,
program statement,
policy
• Routine risk
assessments
• Communication of
risks to the key
stakeholders
• Awareness activities
• Dedicated team
• Coordinated risk
management activities
across identified
segments
• Risk appetite is fully
defined
• Risk monitoring,
measuring, and
reporting to the board
• Contingency plans and
escalation procedures
in place
• EERM discussion is
embedded in the
company’s strategic
planning, capital
allocation, product
development, etc.
• Risk-sensing, early
warning risk indicators
used
• Risk modeling
/scenarios applied
• Industry benchmarking
used regularly
Representative Attributes Describing Each Maturity Level
Initial Fragmented Top Down Integrated
Risk
Intelligent
Capability Maturity Stages
1. How capable is the organization today to manage its extended enterprise risks?
2. How capable does it need to be?
3. How can it get to its desired state? By when?
4. How can we leverage existing extended enterprise risk management practices?
:
Copyright © 2015 Deloitte Development LLC. All rights reserved.
www.nicsa.org
This presentation contains general information only and Deloitte is not, by means of this presentation, rendering
accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a
substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may
affect your business. Before making any decision or taking any action that may affect your business, you should consult a
qualified professional advisor.
Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation.
About Deloitte
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”),
its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and
independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see
www.deloitte.com/about for a detailed description of DTTL and its member firms. Please see www.deloitte.com/us/about
for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to
attest clients under the rules and regulations of public accounting.
www.nicsa.org
CPE CODE:
430
www.nicsa.org
• Broker approval
• CP approval and
monitoring
• CP exposure reporting
• Best Execution reporting
• Risk Contribution
monitoring and reporting
• Scenario analysis
Head of Risk
Management US
• Analytics monitoring
and reporting
• Performance Attribution
• Fund Performance
monitoring
• GIPS reporting
• Peer analysis
Global Risk
US CEO
Operational
Risk
Broker-Counterparty
Risk
Performance
Analytics &
Attribution
Investment Risk
VENDOR ASSESSMENT TEAM
Vendor Relationship Owners
Vendor Universe
Vendor
Governance
Office Information
Security
Business
Continuity
Operational
Risk
Finance
Compliance
incl. Privacy
Purchasing
Legal
Op Risk Management System
- Relationship Owner
Attestations
- Framework Attestations
Emerging Risks
- Compliance-Risk Oversight
- Top Risks
• Risk and event
identification and
assessment
• Monitoring and
reporting
9
www.nicsa.org
Vendor Governance Purview
Assessment Areas
• Business Continuity
• Data Integrity and Security
• Financial Terms & Stability
• Insurance
• Internal Controls
• Losses / Legal Actions
• Regulatory Compliance
• Reputation
• Service Levels
VG Office
• Maintain framework
• Coordinate Initial Assessment / Take-on
• Coordinate Periodic Due Diligence
• Raise Concerns
• Track Remediation Actions
• Report out
• Participate in Compliance-Risk Oversight
Discussions
Vendor Universe *
Tier 1 (Core A)
• Functionally critical
• Financially critical
• Subject to laws / regulations
• Necessary to legal / regulatory
obligations
• Central to control functions
Tier 2 (Core B)
• Failure could cause serious
damage
• Annual outlay > $500k
Tier 3 (Non-core)
* Exceptions
• Financial distributors
• Brokers and Counterparties
VENDOR ASSESSMENT TEAM
• Op Risk Management System
• Vendor Assessment System
• SIG Questionnaire (Shared
Assessments Group)
Vendor Universe
Vendor
Governance
Office
10
www.nicsa.org
Board
Oversight
Custodian
Fund Accounting
Financial Reporting
Tax Compliance
Transfer Agent
SubTAs & Omnibus Providers
Sub-Advisors
Pricing Services
Others For
Management
Consideration
Printing and Mailing
15c Materials
Blue Sky Reporting
Escheatment Services
Proxy Solicitation Services
Others
11
Third-Party
Oversight
Independent
Director
Viewpoint
www.nicsa.org
CPE CODE:
755
12
www.nicsa.org
Board Oversight
Independent Director Viewpoint
Consider Board
Committee Structure
– Committees: Audit;
Compliance; Contracts
– Where should oversight
reside?
– Interdisciplinary approach
13
Frequency of
Board Reporting
Level of Detail
– Dashboards
www.nicsa.org
Inventory of Third-Party Service Providers
Independent Director Viewpoint
14
Name
Nature of Services Provided
Primary Management oversight: “Business Owner” of
Each Relationship
Summary of Management’s Oversight Functions
Summary of Board Reporting on Each Provider
www.nicsa.org
High Level “Sub-TA Dashboard”
Independent Director Viewpoint
15
For each relationship:
AUM Date last visit Risk Rank
Review
Status
SSAE#16 or
FICCA
Reports

More Related Content

What's hot

Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
Magdalena Matell
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance
BOC Group
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
EDR
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
Continuity and Resilience
 
Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009
Ahmad Azwang Aisram Omar
 
Key risk indicators shareslide
Key risk indicators shareslideKey risk indicators shareslide
Key risk indicators shareslide
Zakaria Salah, Ph.D,MBA
 
Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
Transcendent Group
 
GRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance ExecutiveGRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance Executive
Max Neira Schliemann
 
Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in Oversight
NICSA
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
Mark S. Mahre
 
Compliance Risk Assessment
Compliance Risk AssessmentCompliance Risk Assessment
Compliance Risk Assessment
Compliance Consultant
 
TPRM - POV Presentation Final v2
TPRM - POV Presentation Final v2 TPRM - POV Presentation Final v2
TPRM - POV Presentation Final v2 Jason Mussman
 
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATIONOPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATIONFrackson Kathibula-Nyoni
 
How to measure and manage legal risk
How to measure and manage legal riskHow to measure and manage legal risk
How to measure and manage legal risk
Berkman Solutions
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Saras Singh
 
Risk Management Fundamentals
Risk Management FundamentalsRisk Management Fundamentals
Risk Management Fundamentalsmikaelastafrace
 
Riskpro - Operational Risk Management
Riskpro - Operational Risk ManagementRiskpro - Operational Risk Management
Riskpro - Operational Risk Management
Manoj Jain
 

What's hot (20)

Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
 
Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009
 
Key risk indicators shareslide
Key risk indicators shareslideKey risk indicators shareslide
Key risk indicators shareslide
 
Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
 
GRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance ExecutiveGRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance Executive
 
Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in Oversight
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
 
Compliance Risk Assessment
Compliance Risk AssessmentCompliance Risk Assessment
Compliance Risk Assessment
 
TPRM - POV Presentation Final v2
TPRM - POV Presentation Final v2 TPRM - POV Presentation Final v2
TPRM - POV Presentation Final v2
 
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATIONOPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
 
How to measure and manage legal risk
How to measure and manage legal riskHow to measure and manage legal risk
How to measure and manage legal risk
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)
 
Risk Management Fundamentals
Risk Management FundamentalsRisk Management Fundamentals
Risk Management Fundamentals
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
 
Riskpro - Operational Risk Management
Riskpro - Operational Risk ManagementRiskpro - Operational Risk Management
Riskpro - Operational Risk Management
 

Viewers also liked

Project Management Office (PMO)
Project Management Office (PMO)Project Management Office (PMO)
Project Management Office (PMO)
Anand Subramaniam
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management Introduction
Naveen Grover
 
Petronas Project Oversight and Corporate Governance System Requirements
Petronas Project Oversight and Corporate Governance System RequirementsPetronas Project Oversight and Corporate Governance System Requirements
Petronas Project Oversight and Corporate Governance System RequirementsDarren Surin, BSc, MBA, PMP, ITIL
 
Case Study on Risk management in M&A_Anuj Kamble_Veronica Barreda
Case Study on Risk management in M&A_Anuj Kamble_Veronica BarredaCase Study on Risk management in M&A_Anuj Kamble_Veronica Barreda
Case Study on Risk management in M&A_Anuj Kamble_Veronica BarredaAnuj Kamble
 
viaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global WorkforceviaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global Workforce
VIA
 
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsKate Tomlinson
 
9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption PreventionKendal Peterson
 
Singapore Training - Copy
Singapore Training  - CopySingapore Training  - Copy
Singapore Training - CopyAhmed HAMDY
 
Clifton Gunderson IT Oversight
Clifton Gunderson IT OversightClifton Gunderson IT Oversight
Clifton Gunderson IT Oversight
almaraz
 
Top 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China LandscapeTop 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China LandscapeDr Neale O'Connor, CPA (Aust)
 
Singapore company compliance
Singapore company complianceSingapore company compliance
Singapore company compliance
G. Mathew
 

Viewers also liked (11)

Project Management Office (PMO)
Project Management Office (PMO)Project Management Office (PMO)
Project Management Office (PMO)
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management Introduction
 
Petronas Project Oversight and Corporate Governance System Requirements
Petronas Project Oversight and Corporate Governance System RequirementsPetronas Project Oversight and Corporate Governance System Requirements
Petronas Project Oversight and Corporate Governance System Requirements
 
Case Study on Risk management in M&A_Anuj Kamble_Veronica Barreda
Case Study on Risk management in M&A_Anuj Kamble_Veronica BarredaCase Study on Risk management in M&A_Anuj Kamble_Veronica Barreda
Case Study on Risk management in M&A_Anuj Kamble_Veronica Barreda
 
viaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global WorkforceviaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global Workforce
 
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
 
9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention
 
Singapore Training - Copy
Singapore Training  - CopySingapore Training  - Copy
Singapore Training - Copy
 
Clifton Gunderson IT Oversight
Clifton Gunderson IT OversightClifton Gunderson IT Oversight
Clifton Gunderson IT Oversight
 
Top 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China LandscapeTop 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China Landscape
 
Singapore company compliance
Singapore company complianceSingapore company compliance
Singapore company compliance
 

Similar to Third-Party Risk Management: Implementing a Strategy

Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
Nidhi Gupta
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013Nidhi Gupta
 
Erm talking points
Erm talking pointsErm talking points
Erm talking points
EnterpriseGRC Solutions, Inc.
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
EnterpriseGRC Solutions, Inc.
 
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
John Owens
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
Jim Kaplan CIA CFE
 
IT Services Development
IT Services DevelopmentIT Services Development
IT Services Development
Elijah Ezendu
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurance
wisnu wardhana, i nyoman
 
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Third Party Risk Management
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
Perficient, Inc.
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
Security Executive Council
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
Aronson LLC
 
Weaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingWeaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingAndrew Topa
 
Applying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_effortsApplying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_effortsSubhajit Bhuiya
 
Gaining Greater Control Over Commodity Planning & Procurement for Manufacturers
Gaining Greater Control Over Commodity Planning & Procurement for ManufacturersGaining Greater Control Over Commodity Planning & Procurement for Manufacturers
Gaining Greater Control Over Commodity Planning & Procurement for Manufacturers
Eka Software Solutions
 
Deloitte Risk Consulting Flyer - Lapman Lee Netherlands Lead
Deloitte Risk Consulting Flyer - Lapman Lee  Netherlands LeadDeloitte Risk Consulting Flyer - Lapman Lee  Netherlands Lead
Deloitte Risk Consulting Flyer - Lapman Lee Netherlands LeadLapman Lee ✔
 
138 مبادرة #تواصل_تطوير المحاضرة ال 138 من المبادرة دكتور مهندس / أكرم حسن اس...
138 مبادرة #تواصل_تطوير المحاضرة ال 138 من المبادرة دكتور مهندس / أكرم حسن اس...138 مبادرة #تواصل_تطوير المحاضرة ال 138 من المبادرة دكتور مهندس / أكرم حسن اس...
138 مبادرة #تواصل_تطوير المحاضرة ال 138 من المبادرة دكتور مهندس / أكرم حسن اس...
Egyptian Engineers Association
 

Similar to Third-Party Risk Management: Implementing a Strategy (20)

Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Erm talking points
Erm talking pointsErm talking points
Erm talking points
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
 
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
 
IT Services Development
IT Services DevelopmentIT Services Development
IT Services Development
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurance
 
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Weaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingWeaver - Financial Institutions Consulting
Weaver - Financial Institutions Consulting
 
Applying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_effortsApplying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_efforts
 
Gaining Greater Control Over Commodity Planning & Procurement for Manufacturers
Gaining Greater Control Over Commodity Planning & Procurement for ManufacturersGaining Greater Control Over Commodity Planning & Procurement for Manufacturers
Gaining Greater Control Over Commodity Planning & Procurement for Manufacturers
 
GP for Risk Management product sheet
GP for Risk Management product sheetGP for Risk Management product sheet
GP for Risk Management product sheet
 
Deloitte Risk Consulting Flyer - Lapman Lee Netherlands Lead
Deloitte Risk Consulting Flyer - Lapman Lee  Netherlands LeadDeloitte Risk Consulting Flyer - Lapman Lee  Netherlands Lead
Deloitte Risk Consulting Flyer - Lapman Lee Netherlands Lead
 
138 مبادرة #تواصل_تطوير المحاضرة ال 138 من المبادرة دكتور مهندس / أكرم حسن اس...
138 مبادرة #تواصل_تطوير المحاضرة ال 138 من المبادرة دكتور مهندس / أكرم حسن اس...138 مبادرة #تواصل_تطوير المحاضرة ال 138 من المبادرة دكتور مهندس / أكرم حسن اس...
138 مبادرة #تواصل_تطوير المحاضرة ال 138 من المبادرة دكتور مهندس / أكرم حسن اس...
 

More from NICSA

Understanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data QualityUnderstanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data Quality
NICSA
 
The Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: BlockchainThe Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: Blockchain
NICSA
 
Industry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing RoundtableIndustry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing Roundtable
NICSA
 
Understanding Regulation Best Interest
Understanding Regulation Best InterestUnderstanding Regulation Best Interest
Understanding Regulation Best Interest
NICSA
 
Trends in the Advisor Market
Trends in the Advisor Market Trends in the Advisor Market
Trends in the Advisor Market
NICSA
 
New Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance LandscapeNew Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance Landscape
NICSA
 
Navigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions LandscapeNavigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions Landscape
NICSA
 
Engaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse WorkforceEngaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse Workforce
NICSA
 
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate OutcomesRetirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
NICSA
 
Building Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with DataBuilding Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with Data
NICSA
 
FinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the HorizonFinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the Horizon
NICSA
 
Preparing for the Next-Gen Client Base
Preparing for the Next-Gen Client BasePreparing for the Next-Gen Client Base
Preparing for the Next-Gen Client Base
NICSA
 
Tax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting TrapsTax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting Traps
NICSA
 
Next Generation Proxy Voting
Next Generation Proxy VotingNext Generation Proxy Voting
Next Generation Proxy Voting
NICSA
 
Best Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance ProgramBest Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance Program
NICSA
 
AI Trends with Traction
AI Trends with TractionAI Trends with Traction
AI Trends with Traction
NICSA
 
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-DeliveryRule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
NICSA
 
Rethinking Product Development
Rethinking Product DevelopmentRethinking Product Development
Rethinking Product Development
NICSA
 
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the WorkplaceThe Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
NICSA
 
Data Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business StrategyData Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business Strategy
NICSA
 

More from NICSA (20)

Understanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data QualityUnderstanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data Quality
 
The Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: BlockchainThe Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: Blockchain
 
Industry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing RoundtableIndustry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing Roundtable
 
Understanding Regulation Best Interest
Understanding Regulation Best InterestUnderstanding Regulation Best Interest
Understanding Regulation Best Interest
 
Trends in the Advisor Market
Trends in the Advisor Market Trends in the Advisor Market
Trends in the Advisor Market
 
New Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance LandscapeNew Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance Landscape
 
Navigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions LandscapeNavigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions Landscape
 
Engaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse WorkforceEngaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse Workforce
 
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate OutcomesRetirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
 
Building Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with DataBuilding Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with Data
 
FinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the HorizonFinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the Horizon
 
Preparing for the Next-Gen Client Base
Preparing for the Next-Gen Client BasePreparing for the Next-Gen Client Base
Preparing for the Next-Gen Client Base
 
Tax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting TrapsTax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting Traps
 
Next Generation Proxy Voting
Next Generation Proxy VotingNext Generation Proxy Voting
Next Generation Proxy Voting
 
Best Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance ProgramBest Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance Program
 
AI Trends with Traction
AI Trends with TractionAI Trends with Traction
AI Trends with Traction
 
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-DeliveryRule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
 
Rethinking Product Development
Rethinking Product DevelopmentRethinking Product Development
Rethinking Product Development
 
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the WorkplaceThe Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
 
Data Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business StrategyData Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business Strategy
 

Recently uploaded

The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
mikemetalprod
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
marketing367770
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
Writo-Finance
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
Falcon Invoice Discounting
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
DOT TECH
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
managementaccountingunitiv-230422140105-dd17d80b.ppt
managementaccountingunitiv-230422140105-dd17d80b.pptmanagementaccountingunitiv-230422140105-dd17d80b.ppt
managementaccountingunitiv-230422140105-dd17d80b.ppt
SuseelaPalanimuthu
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
DOT TECH
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
FinTech Belgium
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf
morearsh02
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Kezex (KZX)
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
DOT TECH
 
APP I Lecture Notes to students 0f 4the year
APP I  Lecture Notes  to students 0f 4the yearAPP I  Lecture Notes  to students 0f 4the year
APP I Lecture Notes to students 0f 4the year
telilaalilemlem
 
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
beulahfernandes8
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
GunjanSharma28848
 
234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt
PravinPatil144525
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Henry Tapper
 
Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024
Commercial Bank of Ceylon PLC
 

Recently uploaded (20)

The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
managementaccountingunitiv-230422140105-dd17d80b.ppt
managementaccountingunitiv-230422140105-dd17d80b.pptmanagementaccountingunitiv-230422140105-dd17d80b.ppt
managementaccountingunitiv-230422140105-dd17d80b.ppt
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
 
APP I Lecture Notes to students 0f 4the year
APP I  Lecture Notes  to students 0f 4the yearAPP I  Lecture Notes  to students 0f 4the year
APP I Lecture Notes to students 0f 4the year
 
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
 
234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
 
Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024
 

Third-Party Risk Management: Implementing a Strategy

  • 1. www.nicsa.org Third-Party Risk Management: Implementing a Strategy Part I of II 1 SPONSORED BY:
  • 2. www.nicsa.org The use of third-party service providers has become increasingly pervasive, complex, and interconnected within the investment management industry • Increased number of core operations and IT services being outsourced • Third parties also outsource - common providers can create layering and unforeseen concentration risk • Dispersed dependencies create increased reliance and risk exposure from entities outside of your direct control This growth of the extended enterprise model calls for continued evolution of the Extended Enterprise Risk Management (EERM) strategy, with mature programs applying a consistent, enterprise-wide level of discipline that extends across the entire third-party lifecycle. An evolving landscape : Copyright © 2015 Deloitte Development LLC. All rights reserved.
  • 3. www.nicsa.org  Enhanced quality of risk management processes through centralized execution on the business’ behalf  Transparency into third-party performance and risk exposure by improving information flow through the organization  Improved efficiency through centralized tools and processes  Reduced risks through centralization of controls and quality gates  Increased consistency scale and common communication Strategy & Planning Contract & On-board Evaluate & Select Terminate Off-board Manage & Monitor Third-Party Management Lifecycle Strategy & planning – Develop sourcing strategy, consider cost/benefits and develop business Evaluate & select - Identify and assess risks / perform due diligence Contract & on-board - Incorporate risk, compliance, and performance requirements in contracts Manage & monitor - Perform risk management and ongoing monitoring & coordinating with each third party Terminate & off-board - Determine need to terminate the third party and manage the off-boarding process Some benefits of an EERM Framework Many companies are moving toward an end-to-end framework to create a controlled and efficient process to effectively manage the business and regulatory requirements. A well-designed and sustainable framework can help manage third-party risks and provide structure for governance and monitoring the process. Maintaining control & managing third-party risk : Copyright © 2015 Deloitte Development LLC. All rights reserved.
  • 5. www.nicsa.org Governance and Oversight The organizational structure, committees, and roles and responsibilities for managing third parties EERM Framework Risk Domains Operating Model Components Business Objectives Risk and Compliance Management Growth / Innovation Client Experience Cost Reduction Improved Time to Market Reputation Risk Strategic RiskGeopolitical Risk Contractual Risk Information Security Risk Transaction / Operational Risk Financial Stability Risk Business Continuity Risk Compliance / Legal Risk Credit Risk Plan, Evaluate and Select Contract and On-board Manage and Monitor Terminate and Off-boardManagement Process Detail Our EERM framework—based on the Office of the Comptroller of the Currency (OCC) and other regulatory requirements, as well as industry practices—provides a structured review of the operating model components required to support an effective program.  An effective EERM program supports business objectives including growth, innovation, reduced cost, and risk and compliance.  Delivering effective EERM requires a comprehensive operating model that includes governance and oversight, policies and standards, management processes, tools and technology, risk metrics and reporting, and risk culture.  Management and risk domains support delivery of EERM capabilities and the management of risk. Each domain is comprised of its own set of management activities/capabilities and related risks. Deloitte Advisory’s EERM framework Risk Culture Tone at the top, clarity on risk appetite, appropriate training and awareness. to promote positive risk culture Policies and Standards Management expectations for the management of third parties and related risks Risk Metrics and Dashboard Reports identifying risks and performance associated with third parties, tailored toward multiple levels of management Management Processes Processes to manage risks across the third- party lifecycle Tools and Technology Tools and technology that support EERM processes : Copyright © 2015 Deloitte Development LLC. All rights reserved.
  • 6. www.nicsa.org Stages of EERM Capability Maturity StakeholderValue Integrated Risk Intelligent Top Down FragmentedInitial • Ad hoc/chaotic • Depends primarily on individual heroics, capabilities, and verbal wisdom • Independent EERM activities • Limited focus on the linkage of third-party risks with the company’s overall strategic risks • Limited alignment of risks to strategies • Disparate monitoring & reporting functions • Common framework, program statement, policy • Routine risk assessments • Communication of risks to the key stakeholders • Awareness activities • Dedicated team • Coordinated risk management activities across identified segments • Risk appetite is fully defined • Risk monitoring, measuring, and reporting to the board • Contingency plans and escalation procedures in place • EERM discussion is embedded in the company’s strategic planning, capital allocation, product development, etc. • Risk-sensing, early warning risk indicators used • Risk modeling /scenarios applied • Industry benchmarking used regularly Representative Attributes Describing Each Maturity Level Initial Fragmented Top Down Integrated Risk Intelligent Capability Maturity Stages 1. How capable is the organization today to manage its extended enterprise risks? 2. How capable does it need to be? 3. How can it get to its desired state? By when? 4. How can we leverage existing extended enterprise risk management practices? : Copyright © 2015 Deloitte Development LLC. All rights reserved.
  • 7. www.nicsa.org This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about for a detailed description of DTTL and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
  • 9. www.nicsa.org • Broker approval • CP approval and monitoring • CP exposure reporting • Best Execution reporting • Risk Contribution monitoring and reporting • Scenario analysis Head of Risk Management US • Analytics monitoring and reporting • Performance Attribution • Fund Performance monitoring • GIPS reporting • Peer analysis Global Risk US CEO Operational Risk Broker-Counterparty Risk Performance Analytics & Attribution Investment Risk VENDOR ASSESSMENT TEAM Vendor Relationship Owners Vendor Universe Vendor Governance Office Information Security Business Continuity Operational Risk Finance Compliance incl. Privacy Purchasing Legal Op Risk Management System - Relationship Owner Attestations - Framework Attestations Emerging Risks - Compliance-Risk Oversight - Top Risks • Risk and event identification and assessment • Monitoring and reporting 9
  • 10. www.nicsa.org Vendor Governance Purview Assessment Areas • Business Continuity • Data Integrity and Security • Financial Terms & Stability • Insurance • Internal Controls • Losses / Legal Actions • Regulatory Compliance • Reputation • Service Levels VG Office • Maintain framework • Coordinate Initial Assessment / Take-on • Coordinate Periodic Due Diligence • Raise Concerns • Track Remediation Actions • Report out • Participate in Compliance-Risk Oversight Discussions Vendor Universe * Tier 1 (Core A) • Functionally critical • Financially critical • Subject to laws / regulations • Necessary to legal / regulatory obligations • Central to control functions Tier 2 (Core B) • Failure could cause serious damage • Annual outlay > $500k Tier 3 (Non-core) * Exceptions • Financial distributors • Brokers and Counterparties VENDOR ASSESSMENT TEAM • Op Risk Management System • Vendor Assessment System • SIG Questionnaire (Shared Assessments Group) Vendor Universe Vendor Governance Office 10
  • 11. www.nicsa.org Board Oversight Custodian Fund Accounting Financial Reporting Tax Compliance Transfer Agent SubTAs & Omnibus Providers Sub-Advisors Pricing Services Others For Management Consideration Printing and Mailing 15c Materials Blue Sky Reporting Escheatment Services Proxy Solicitation Services Others 11 Third-Party Oversight Independent Director Viewpoint
  • 13. www.nicsa.org Board Oversight Independent Director Viewpoint Consider Board Committee Structure – Committees: Audit; Compliance; Contracts – Where should oversight reside? – Interdisciplinary approach 13 Frequency of Board Reporting Level of Detail – Dashboards
  • 14. www.nicsa.org Inventory of Third-Party Service Providers Independent Director Viewpoint 14 Name Nature of Services Provided Primary Management oversight: “Business Owner” of Each Relationship Summary of Management’s Oversight Functions Summary of Board Reporting on Each Provider
  • 15. www.nicsa.org High Level “Sub-TA Dashboard” Independent Director Viewpoint 15 For each relationship: AUM Date last visit Risk Rank Review Status SSAE#16 or FICCA Reports

Editor's Notes

  1. 6