SlideShare a Scribd company logo
XeroRisk Corporate Risk Governance
Enterprising risk management
Contents

   Risk Governance Overview
       Why manage risks ?
       Risk Maturity
       Integrated Risk Management


   Line Xero
       Background
       Services


   XeroRisk
       XeroRisk: A flexible deployment solution
       Roadmap
Why manage risks ?

“A company's objectives, its internal organisation and the environment in which it operates
    are continually evolving and as a result, the risks it faces are continually changing. A
    sound system of internal control therefore depends on a thorough and regular evaluation
    of the nature and extent of the risks to which the company is exposed. Since profits are,
    in part, the reward for successful risk-taking in business, the purpose of internal control is
    to help manage and control risk appropriately rather than to eliminate it.”

“The guidance is based on the adoption by a company's board of a risk-based approach to
   establishing a sound system of internal control and reviewing its effectiveness. This
   should be incorporated by the company within its normal management and governance
   processes. It should not be treated as a separate exercise undertaken to meet regulatory
   requirements.”


Turnbull Report, September 1999
The Evolution of Risk Management

Previously                     Now
      Historical risks only        Non-traditional risks
      Expert management            Causes of risk
      Statistical analysis         Organisation-wide involvement
                                    Senior management buy-in
                                    Risk indicators
Risk Governance Maturity


Maturing
• Simplistic framework
• Departmental
• Limited corporate visibility
• Risk exposure may be inaccurate
• Mitigation plans may be used
 to identify priorities
                                                        Mature
                                                        • Flexible governance framework
                                                        • Whole of company
                                                        • Corporate visibility & control
                                                        • Risk appetite known & monitored
                                                        • Use of risk data to drive
               Immature                                  investments & priorities
               • Risk management is ad-hoc
               • Individuals or small teams
               • No corporate visibility
               • Appetite & exposure unknown
               • Risk data not used to drive strategy
Integrated risk management

   Risk management must be a “whole of company” process
        Requires board level buy-in to objectives and methods of risk management
        Risks are controlled at the appropriate level within the business, by the most
         appropriate people
        Control & management of risks must be part of the normal business process – not an
         add-on or afterthought

   Risks must be balanced at the corporate level
        Without risk co-ordination, perceived risks may be blown out of proportion
        There must be mechanisms to escalate risks to the appropriate level.

   The risk management system needs to support the risk process without being
    intrusive
        Intrusion usually results in non-use
        Risk co-ordination & challenge processes become “big stick” exercises.
Integrating RM & strategic processes



                                  Quantify risk
           Identify risks                                                  Identify risk:
                                   Impact &         Agree acceptable
           & understand                                                   Related actions
                                   mitigation          Risk levels
              origins                                                        required
                                  Cost/benefit



                       Identify actions        Monitor         Monitor external        Update
Agree strategic
                      Required & likely     implementation       & internal         Assumptions &
    goals
                           effects            of actions          changes               goals
Line Xero : Company Overview

   Formed in 1990 as an IT strategy consultancy

   Provides IT Design Authority services to a number of FTSE-100
    companies

   Created XeroRisk as a product in 2004
       Originally built for United Utilities
       Strong take up in asset intensive & regulated businesses


   Operates e-commerce web application facilities on behalf of
    several Internet based businesses
Line Xero: XeroRisk Overview

   Simplicity
       Licensing
          Easy & flexible licensing schemes
          Trust based
          Clear commercials

       Support
          Dedicated support team
          Dedicated support telephone number & self-service portal

       Development
          Clear roadmap
          Zero cost upgrades   & functional improvements
Line Xero: Hosting Services

   Operate two datacentres
     Melton Mowbray – Production
     Maidenhead – Disaster Recovery

 1 DR failover in 2006 (for 3 hours) – network
  outage
 Mirrored database services – 15min recovery
 Clustered in-centre d/b services
 Tape backups & tape shipping
XeroRisk: A risk management solution

                                     Fully web based application

                                     Integrates with existing business
Application             Risk          processes

of Actions           Assessment      Simple to deploy
& Controls
                                     Very intuitive to use

                                     Risks identified, managed &
           Assignment                 controlled “on the ground”
               of
                                     Corporate exposure valued &
           ownership                  monitored through escalation and
          & monitoring                aggregation
XeroRisk: Functional Coverage
Standards Based Compliance


   Supports the core requirements of AS/NZS 4360:1999

       The only recognised risk management standard approved by ISO
       Ensures the full traceability of risk management and mitigation actions


   Supports elements of Basel II

       A risk management process for banking & financial environments
       Requires the risk process and associated systems to support both
        Board & Senior Management oversight of risk exposure.
XeroRisk Features

   Full organisation model support
   Role based security
   Fully configurable risk assessment
    categories & levels
   Email escalation & notification
   Full audit trail of all user risk
    management activities
   Built in reporting functions include
    Excel export, graphs etc
   Support for unlimited users, risks,
    organisation units, hierarchy levels
A flexible deployment solution

   Quick Implementation
        XeroRisk doesn’t require installation on each client
        Generic branded product available “off the shelf”
        Branding to follow corporate styles can be quickly developed

   Reduced support costs
        New releases & updates are installed on central servers
        Does not impact corporate desktop builds or current security policies

   True Thin-Client
        There are no ActiveX or Java components downloaded to the client
        Partners or contractors can be quickly added without IS intervention

   Low client hardware demands
        Only a standard web browser is required for access
        Integrates with standard or thin client desktops (e.g. Citrix)

   Industry leading components
        Windows 2003 Server or higher (Windows 2003 server recommended)
        Microsoft SQL Server 2000 (Microsoft SQL Server 2005 SP2 recommended)
Deployment: Delivery mechanisms

   Intranet
        Installed on your hardware
        Managed by in-house team

   Internet
        Installed on your hardware
        Managed by your existing service provider

   Hosted (ASP) Dedicated Solution
        Installed on dedicated Line Xero hardware
        All system resources dedicated to you, with bespoke control over security, DR,
         backup regimes etc.
        Managed by Line Xero support personnel

   Hosted (ASP) Shared Solution
        Installed on Line Xero hardware
        You share the application server & database resources with other clients
        Managed by Line Xero support personnel
Deployment: Choosing the model

                                                        Intranet   Internet                 Hosted
                                                                                Shared            Dedicated
Do you need absolute control of your data ?                                                            
                                                                            using 128-bit SSL   using 128-bit SSL
                                                                                   or VPN              or VPN

Will you allow contractors or partners access ?
                                                         /                                          
Do you need XeroRisk to follow your corporate style ?                                                
Will you need bespoke functionality developing to
meet your risk management process ?                                                                  
Do you require a system availability of 24 x 7 ?                                                     
Can your in-house IS support team manage the
technical environment used by XeroRisk ?                  
Do you need to integrate XeroRisk data with other
business systems ?                                                                                   
Deployment: Professional Services

   Implementation management & consultancy
        Project management of end-to-end solution
        Customisation of base product to support client requirements.
        Definition of process and training needs
        Product branding (“skinning”) to follow corporate styles

   Technical Support
        Definition of deployment architecture
        Hardware & infrastructure definition
        Capacity planning and hardware sizing

   CD Backups
        Applicable for hosted deployments
        Includes production & delivery of regular database archives

   Training
        Training solutions including train-the-trainer, group training etc.
Deployment: Security Architecture
External      Web Browser                                                          Web Browser      Internal
   Users                                                                                            Users
            Optional 128-bit SSL



                                                         Firewall

                                                Login and Authentication

                                               Access control & permissions

      Role based permissions               Administrator functions                     Security applied on per-
      To functional areas                  for account/system maintenance              object basis

    Demilitarised Zone



                    DR                                Primary                       Secondary
                 Database          Mirroring         Database       Log shipping    Database
Deployment: Technical Architecture




                     Microsoft Windows 2003 Server




                                                                     Microsoft Windows 2003 Server
                                                                                                       Stored
Web Browser                                              COM+                                        Procedures
(Java Script)


                                                        Web
                                                        Components

                                                                                                     SQL Server
 LAN/WAN                                                                                               2005
     or                                              IIS (.Net)
  Internet

                                                      SMTP
Integration with Collaborative Products

   Business Process Management

        Integration with Business Objects Management suite

        Currently integrated at the portal level


   Reporting & Analytical tools

        Published database schema

        Accessible with most reporting toolkits e.g. Business Objects, Forest & Trees
Industry Positioning

UK markets
                                                         Example Water Clients
 Utilities
        Gas
                               Communications
                                    Postal Services
        Water
        Electricity
                               Public Services
   Transport                       Police
                                    Local Authorities
        Rail Operators
        Rail Maintenance
        Airlines


International markets
   Utilities
        Water
        Electricity
Development Roadmap


              October 2007          January 2008                April 2008                 July 2008

Development    Release 5.3             Release 6.0


                                      Release 5.3
Production


                                                                             Release 6.0




  Promotion of client installations from R5.2.1 to R5.3 will be agreed through normal change control
  processes.

  Promotion to R6.0 will be a longer process due to extensive re-engineering of the underlying
  presentation technology. Hub installations will require additional cross-business testing.
Release Features

   Release 6.0
       Hierarchical configuration                  Pie & 3D Charting
       Specific ordering (Organisation units)      ASP.Net Re-code
       On-screen calendaring                       Opportunities
       “Active indicator” for picklist items       Web Services/The Hub
       User groups & Teams improvements
       Action list tick boxes
       Straight to Action Plan tab
       Scheduled reporting improvements
       Flag high impact/low likelihood risks
       Integrated SMS notification
       Mobile XeroRisk
       Running commentary
       “My “Home” page
       XeroRisk Dashboard
Web Services

                                       Business
                                      Application      
                            

                                                 


                                        Web Service    
1. User logs onto the business
   application                         XeroRisk v6.0
2. The user is authenticated by the
   security services                                  4. The security object provided by
                                                          the business application is
3. A request is made to access risk
                                                          checked
   data
                                          XeroRisk     5. If the user has appropriate
                                           V6.0
                                                          privileges, the risk data is
                                                          retrieved
                                                       6. The data is transferred through an
                                                          XML schema
The Hub

                                      The Hub

Object permissions
                                                                         Security objects
  Authority to link
                                                                         Link requests
      Object views
                                                                         Message updates



                  Company                                      Company
                     A                                            B



                                                    External
        Finance         Asset Mgmt                                HR       Finance
                                                    services


                                       Link data
                                     Risk updates      Internal risks
Any Questions?
Demonstration
Thank you

More Related Content

What's hot

2005 issa journal-risk-management
2005 issa journal-risk-management2005 issa journal-risk-management
2005 issa journal-risk-managementasundaram1
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business ValueHyTrust
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
IBM Danmark
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
CSCJournals
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
DFLABS SRL
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suiteSymantec
 
Techserv Brochure
Techserv BrochureTechserv Brochure
Techserv Brochure
guest8a430d
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
Ramsés Gallego
 
IT GRC with Symantec
IT GRC with SymantecIT GRC with Symantec
IT GRC with SymantecArrow ECS UK
 
FedRAMP 3PAO Training
FedRAMP 3PAO Training FedRAMP 3PAO Training
FedRAMP 3PAO Training 1ECG
 
Facilities Management Security solution
Facilities Management Security solutionFacilities Management Security solution
Facilities Management Security solution
Ssgstubbs
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccessasundaram1
 
The Perfect Storm
The Perfect StormThe Perfect Storm
The Perfect Storm
Ramsés Gallego
 
Axoss Security Audit Services
Axoss Security Audit ServicesAxoss Security Audit Services
Axoss Security Audit Services
Bulent Buyukkahraman
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
Anand Subramaniam
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
EnterpriseGRC Solutions, Inc.
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
Maganathin Veeraragaloo
 
Implementing FISMA Moderate Applications on AWS
Implementing FISMA Moderate Applications on AWSImplementing FISMA Moderate Applications on AWS
Implementing FISMA Moderate Applications on AWS
Amazon Web Services
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017
EQS Group
 

What's hot (20)

Security Maturity Model
Security Maturity ModelSecurity Maturity Model
Security Maturity Model
 
2005 issa journal-risk-management
2005 issa journal-risk-management2005 issa journal-risk-management
2005 issa journal-risk-management
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
Techserv Brochure
Techserv BrochureTechserv Brochure
Techserv Brochure
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
IT GRC with Symantec
IT GRC with SymantecIT GRC with Symantec
IT GRC with Symantec
 
FedRAMP 3PAO Training
FedRAMP 3PAO Training FedRAMP 3PAO Training
FedRAMP 3PAO Training
 
Facilities Management Security solution
Facilities Management Security solutionFacilities Management Security solution
Facilities Management Security solution
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess
 
The Perfect Storm
The Perfect StormThe Perfect Storm
The Perfect Storm
 
Axoss Security Audit Services
Axoss Security Audit ServicesAxoss Security Audit Services
Axoss Security Audit Services
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Implementing FISMA Moderate Applications on AWS
Implementing FISMA Moderate Applications on AWSImplementing FISMA Moderate Applications on AWS
Implementing FISMA Moderate Applications on AWS
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017
 

Similar to Xero Risk Product Presentation V3.2

Risk Taker Product Presentation V1.0 7th January 2008
Risk Taker   Product Presentation V1.0   7th January 2008Risk Taker   Product Presentation V1.0   7th January 2008
Risk Taker Product Presentation V1.0 7th January 2008Carl Booth
 
Agiliance Risk Vision
Agiliance Risk VisionAgiliance Risk Vision
Agiliance Risk Vision
agiliancecommunity
 
Agiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key StepsAgiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key Steps
agiliancecommunity
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking
 
Governance, Risk, and Compliance Services
Governance, Risk, and Compliance ServicesGovernance, Risk, and Compliance Services
Governance, Risk, and Compliance Services
Capgemini
 
ICAM Our Vision
ICAM Our VisionICAM Our Vision
ICAM Our Vision
Jonathan McGuinness
 
Ta Security
Ta SecurityTa Security
Ta Securityjothsna
 
TA security
TA securityTA security
TA security
kesavars
 
Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.
Mindtree Ltd.
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability Management
Tuan Phan
 
NEMEA Compliance center
NEMEA Compliance centerNEMEA Compliance center
NEMEA Compliance center
NEMEA Security Services
 
ProcessGene GRC Software Suite
ProcessGene GRC Software SuiteProcessGene GRC Software Suite
ProcessGene GRC Software Suite
ProcessGene Ltd
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
InnoTech
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Risk Offering Summary
Risk Offering SummaryRisk Offering Summary
Risk Offering Summarydgeoghegan
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern
 
Risk Management Methodology
Risk Management MethodologyRisk Management Methodology
Risk Management Methodology
laurahees
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementJamesMooreCo
 

Similar to Xero Risk Product Presentation V3.2 (20)

Risk Taker Product Presentation V1.0 7th January 2008
Risk Taker   Product Presentation V1.0   7th January 2008Risk Taker   Product Presentation V1.0   7th January 2008
Risk Taker Product Presentation V1.0 7th January 2008
 
Agiliance Risk Vision
Agiliance Risk VisionAgiliance Risk Vision
Agiliance Risk Vision
 
Agiliance Risk Vision
Agiliance Risk VisionAgiliance Risk Vision
Agiliance Risk Vision
 
Agiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key StepsAgiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key Steps
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance Requirements
 
Governance, Risk, and Compliance Services
Governance, Risk, and Compliance ServicesGovernance, Risk, and Compliance Services
Governance, Risk, and Compliance Services
 
ICAM Our Vision
ICAM Our VisionICAM Our Vision
ICAM Our Vision
 
Ta Security
Ta SecurityTa Security
Ta Security
 
TA security
TA securityTA security
TA security
 
Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability Management
 
NEMEA Compliance center
NEMEA Compliance centerNEMEA Compliance center
NEMEA Compliance center
 
ProcessGene GRC Software Suite
ProcessGene GRC Software SuiteProcessGene GRC Software Suite
ProcessGene GRC Software Suite
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Risk Offering Summary
Risk Offering SummaryRisk Offering Summary
Risk Offering Summary
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Risk Management Methodology
Risk Management MethodologyRisk Management Methodology
Risk Management Methodology
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk Management
 

Xero Risk Product Presentation V3.2

  • 1. XeroRisk Corporate Risk Governance Enterprising risk management
  • 2. Contents  Risk Governance Overview  Why manage risks ?  Risk Maturity  Integrated Risk Management  Line Xero  Background  Services  XeroRisk  XeroRisk: A flexible deployment solution  Roadmap
  • 3. Why manage risks ? “A company's objectives, its internal organisation and the environment in which it operates are continually evolving and as a result, the risks it faces are continually changing. A sound system of internal control therefore depends on a thorough and regular evaluation of the nature and extent of the risks to which the company is exposed. Since profits are, in part, the reward for successful risk-taking in business, the purpose of internal control is to help manage and control risk appropriately rather than to eliminate it.” “The guidance is based on the adoption by a company's board of a risk-based approach to establishing a sound system of internal control and reviewing its effectiveness. This should be incorporated by the company within its normal management and governance processes. It should not be treated as a separate exercise undertaken to meet regulatory requirements.” Turnbull Report, September 1999
  • 4. The Evolution of Risk Management Previously Now  Historical risks only  Non-traditional risks  Expert management  Causes of risk  Statistical analysis  Organisation-wide involvement  Senior management buy-in  Risk indicators
  • 5. Risk Governance Maturity Maturing • Simplistic framework • Departmental • Limited corporate visibility • Risk exposure may be inaccurate • Mitigation plans may be used to identify priorities Mature • Flexible governance framework • Whole of company • Corporate visibility & control • Risk appetite known & monitored • Use of risk data to drive Immature investments & priorities • Risk management is ad-hoc • Individuals or small teams • No corporate visibility • Appetite & exposure unknown • Risk data not used to drive strategy
  • 6. Integrated risk management  Risk management must be a “whole of company” process  Requires board level buy-in to objectives and methods of risk management  Risks are controlled at the appropriate level within the business, by the most appropriate people  Control & management of risks must be part of the normal business process – not an add-on or afterthought  Risks must be balanced at the corporate level  Without risk co-ordination, perceived risks may be blown out of proportion  There must be mechanisms to escalate risks to the appropriate level.  The risk management system needs to support the risk process without being intrusive  Intrusion usually results in non-use  Risk co-ordination & challenge processes become “big stick” exercises.
  • 7. Integrating RM & strategic processes Quantify risk Identify risks Identify risk: Impact & Agree acceptable & understand Related actions mitigation Risk levels origins required Cost/benefit Identify actions Monitor Monitor external Update Agree strategic Required & likely implementation & internal Assumptions & goals effects of actions changes goals
  • 8. Line Xero : Company Overview  Formed in 1990 as an IT strategy consultancy  Provides IT Design Authority services to a number of FTSE-100 companies  Created XeroRisk as a product in 2004  Originally built for United Utilities  Strong take up in asset intensive & regulated businesses  Operates e-commerce web application facilities on behalf of several Internet based businesses
  • 9. Line Xero: XeroRisk Overview  Simplicity  Licensing  Easy & flexible licensing schemes  Trust based  Clear commercials  Support  Dedicated support team  Dedicated support telephone number & self-service portal  Development  Clear roadmap  Zero cost upgrades & functional improvements
  • 10. Line Xero: Hosting Services  Operate two datacentres  Melton Mowbray – Production  Maidenhead – Disaster Recovery  1 DR failover in 2006 (for 3 hours) – network outage  Mirrored database services – 15min recovery  Clustered in-centre d/b services  Tape backups & tape shipping
  • 11. XeroRisk: A risk management solution  Fully web based application  Integrates with existing business Application Risk processes of Actions Assessment  Simple to deploy & Controls  Very intuitive to use  Risks identified, managed & Assignment controlled “on the ground” of  Corporate exposure valued & ownership monitored through escalation and & monitoring aggregation
  • 13. Standards Based Compliance  Supports the core requirements of AS/NZS 4360:1999  The only recognised risk management standard approved by ISO  Ensures the full traceability of risk management and mitigation actions  Supports elements of Basel II  A risk management process for banking & financial environments  Requires the risk process and associated systems to support both Board & Senior Management oversight of risk exposure.
  • 14. XeroRisk Features  Full organisation model support  Role based security  Fully configurable risk assessment categories & levels  Email escalation & notification  Full audit trail of all user risk management activities  Built in reporting functions include Excel export, graphs etc  Support for unlimited users, risks, organisation units, hierarchy levels
  • 15. A flexible deployment solution  Quick Implementation  XeroRisk doesn’t require installation on each client  Generic branded product available “off the shelf”  Branding to follow corporate styles can be quickly developed  Reduced support costs  New releases & updates are installed on central servers  Does not impact corporate desktop builds or current security policies  True Thin-Client  There are no ActiveX or Java components downloaded to the client  Partners or contractors can be quickly added without IS intervention  Low client hardware demands  Only a standard web browser is required for access  Integrates with standard or thin client desktops (e.g. Citrix)  Industry leading components  Windows 2003 Server or higher (Windows 2003 server recommended)  Microsoft SQL Server 2000 (Microsoft SQL Server 2005 SP2 recommended)
  • 16. Deployment: Delivery mechanisms  Intranet  Installed on your hardware  Managed by in-house team  Internet  Installed on your hardware  Managed by your existing service provider  Hosted (ASP) Dedicated Solution  Installed on dedicated Line Xero hardware  All system resources dedicated to you, with bespoke control over security, DR, backup regimes etc.  Managed by Line Xero support personnel  Hosted (ASP) Shared Solution  Installed on Line Xero hardware  You share the application server & database resources with other clients  Managed by Line Xero support personnel
  • 17. Deployment: Choosing the model Intranet Internet Hosted Shared Dedicated Do you need absolute control of your data ?     using 128-bit SSL using 128-bit SSL or VPN or VPN Will you allow contractors or partners access ? /    Do you need XeroRisk to follow your corporate style ?     Will you need bespoke functionality developing to meet your risk management process ?     Do you require a system availability of 24 x 7 ?     Can your in-house IS support team manage the technical environment used by XeroRisk ?  Do you need to integrate XeroRisk data with other business systems ?    
  • 18. Deployment: Professional Services  Implementation management & consultancy  Project management of end-to-end solution  Customisation of base product to support client requirements.  Definition of process and training needs  Product branding (“skinning”) to follow corporate styles  Technical Support  Definition of deployment architecture  Hardware & infrastructure definition  Capacity planning and hardware sizing  CD Backups  Applicable for hosted deployments  Includes production & delivery of regular database archives  Training  Training solutions including train-the-trainer, group training etc.
  • 19. Deployment: Security Architecture External Web Browser Web Browser Internal Users Users Optional 128-bit SSL Firewall Login and Authentication Access control & permissions Role based permissions Administrator functions Security applied on per- To functional areas for account/system maintenance object basis Demilitarised Zone DR Primary Secondary Database Mirroring Database Log shipping Database
  • 20. Deployment: Technical Architecture Microsoft Windows 2003 Server Microsoft Windows 2003 Server Stored Web Browser COM+ Procedures (Java Script) Web Components SQL Server LAN/WAN 2005 or IIS (.Net) Internet SMTP
  • 21. Integration with Collaborative Products  Business Process Management  Integration with Business Objects Management suite  Currently integrated at the portal level  Reporting & Analytical tools  Published database schema  Accessible with most reporting toolkits e.g. Business Objects, Forest & Trees
  • 22. Industry Positioning UK markets Example Water Clients  Utilities  Gas  Communications  Postal Services  Water  Electricity  Public Services  Transport  Police  Local Authorities  Rail Operators  Rail Maintenance  Airlines International markets  Utilities  Water  Electricity
  • 23. Development Roadmap October 2007 January 2008 April 2008 July 2008 Development Release 5.3 Release 6.0 Release 5.3 Production Release 6.0 Promotion of client installations from R5.2.1 to R5.3 will be agreed through normal change control processes. Promotion to R6.0 will be a longer process due to extensive re-engineering of the underlying presentation technology. Hub installations will require additional cross-business testing.
  • 24. Release Features  Release 6.0  Hierarchical configuration  Pie & 3D Charting  Specific ordering (Organisation units)  ASP.Net Re-code  On-screen calendaring  Opportunities  “Active indicator” for picklist items  Web Services/The Hub  User groups & Teams improvements  Action list tick boxes  Straight to Action Plan tab  Scheduled reporting improvements  Flag high impact/low likelihood risks  Integrated SMS notification  Mobile XeroRisk  Running commentary  “My “Home” page  XeroRisk Dashboard
  • 25. Web Services Business Application     Web Service  1. User logs onto the business application XeroRisk v6.0 2. The user is authenticated by the security services  4. The security object provided by the business application is 3. A request is made to access risk checked data XeroRisk 5. If the user has appropriate V6.0 privileges, the risk data is retrieved 6. The data is transferred through an XML schema
  • 26. The Hub The Hub Object permissions Security objects Authority to link Link requests Object views Message updates Company Company A B External Finance Asset Mgmt HR Finance services Link data Risk updates Internal risks