RSA Archer Risk Intelligence Harnessing Risk to Exploit Opportunity June 4, 2014 Steve Schlarman GRC Strategist © Copyright 2014 EMC Corporation. All rights reserved. 1 Risk and Compliance Where is it today? © Copyright 2014 EMC Corporation. All rights reserved. 2 Governance, Risk, & Compliance Today © Copyright 2014 EMC Corporation. All rights reserved. 3 A New Risk World Global, Technology and Organizational factors have created significant risk landscapes for organizations. We must focus on building sustainable risk programs to address the rate and velocity of risk to navigate the risk landscape. © Copyright 2014 EMC Corporation. All rights reserved. 4 A New Compliance World Compliance can become a barrier to success or a competitive advantage. The path is decided by how well compliance processes are positioned for the future. Since 2009 • 131 new major regulations enacted • $70 billion in costs In 2012 In 2013 • 2,605 new rules • 69 classified as major • >$100 Million annual impact • 134 new rules enacted just by the EPA Source: Heritage Foundation We must focus on priority, the flow of incoming regulatory obligations and automation to turn compliance into a competitive advantage. © Copyright 2014 EMC Corporation. All rights reserved. 5 Opportunity and Risk © Copyright 2014 EMC Corporation. All rights reserved. 6 Schrödinger’s Cat © Copyright 2014 EMC Corporation. All rights reserved. 7 Globalization Risk or Opportunity? Big Data Regulatory Change Mobile Cloud Computing Risk AND Opportunity © Copyright 2014 EMC Corporation. All rights reserved. 8 The Opportunity Landscape What you are good at What your market wants Passion Opportunity What you want to do © Copyright 2014 EMC Corporation. All rights reserved. 9 The Compliance Burden What you have to do Compliance Activities $216B 87M hours Risks 83% 20% Risk Management Maturity -11% +37% What you are good at Got it covered? “Must Haves” What your market wants Passion Opportunity What you want to do © Copyright 2014 EMC Corporation. All rights reserved. Fuels growth but no time to execute 10 Risk Intelligence What you have to do Compliance Activities $216B 87M hours Risks 83% 20% Risk Management Maturity -11% +37% Transform Compliance Harness risks Exploit Opportunity © Copyright 2014 EMC Corporation. All rights reserved. What you are good at Got it covered? “Must Haves” What your market wants Passion Opportunity What you want to do Fuels growth but no time to execute 11 Change the Game… Automate compliance, reallocate resources/budget to manage risk, and proactively exploit opportunity Governance Risk Proactive Compliance Today’s GRC Focus © Copyright 2014 EMC Corporation. All rights reserved. Reactive Risk Intelligence 12 Risk Intelligence Harness risk for to exploit opportunities for competitive advantage • through better visibility, • enhanced analysis, and • improved metrics to drive intelligent, stream-lined actions; enabling the business to move quickly and predictably. © Copyright 2014 EMC Corporation. All rights reserved. 13 Intelligence Driven GRC Intelligence driven actions gives you priority, results and progress. Visibility Visibility + Analysis = Priority Priority + Action = Results Results + Metrics = Progress Analysis Action Metrics © Copyright 2014 EMC Corporation. All rights reserved. 14 Harnessing Risks… 1 2 What you have to do Core to Business; Vital to Success Market Table Stakes; Vital for Growth • Reputation • Ethics • Safety • Security • Resiliency 3 Everything else… 4 Safety Net © Copyright 2014 EMC Corporation. All rights reserved. 3 4 What you are good at The HIGH RISK Wedge “Must Haves” Got it covered 2 1 What your market wants Opportunity What you want to do 15 Exploiting Opportunity • Obligated Differentiators: Build and support the Business Case • Elective Differentiators: Freed up resources to build on core competencies • Improvement Wedge: Streamline processes, free up resources, encourage and enable continuous improvement • High Risk Wedge • Drive through the Risk Frontier (“Must haves” adjacent to what you are good at) with Quick Wins and steady progress • Opportunity Landscape • Protect the Innovation Frontier (Opportunities adjacent to what you are good at) through reduction of risk in new products, services and market initiatives © Copyright 2014 EMC Corporation. All rights reserved. Risk Frontier The HIGH RISK Wedge Obligated Differentiators What you are good at Elective Differentiators Improvement Wedge Innovation Frontier 16 The Journey Moving Towards Risk Intelligence © Copyright 2014 EMC Corporation. All rights reserved. 17 Building Risk Intelligence Board CIO LOB Executives CISO Business Operations Managers Business IT Risk Intelligence Security threats IT disruptions Poor misaligned IT practices Risks inherited from outside providers Harmful operational events Operational compliance failures Unknown, unidentified risks Significant business crises Regulatory violations and fines Business disruptions Poor misaligned business practices Poor internal controls and governance RSA Archer © Copyright 2014 EMC Corporation. All rights reserved. 18 Building Risk Intelligence Identify, assess & track emerging & operational risks Independently review & assure management actions Poor internal controls and governance Manage the lifecycle of 3rd party relationships Unknown, unidentified risks Establish business policies & standards Poor misaligned business & IT practices Establish IT policies & standards Operational compliance failures Inherited risks from external parties Regulatory violations & failures Security Threats Identify & resolve security deficiencies Detect & respond to attacks Identify & meet regulatory obligations Business disruptions Significant business crises Manage crisis & communications © Copyright 2014 EMC Corporation. All rights reserved. Implement and Monitor Controls Harmful incidents & events IT Disruptions Catalog & resolve operational incidents Identify & prepare business resumption strategies Prepare for & recover from IT outages 19 Building Risk Intelligence Identify, assess & track emerging & operational risks Independently review & assure management actions Manage the lifecycle of 3rd party relationships Audit Management Operational Risk Management IT Security Risk Management Identify & resolve security deficiencies Detect & respond to attacks Manage crisis & communications Establish IT policies & standards Regulatory & Corporate Compliance Management Third Party Management © Copyright 2014 EMC Corporation. All rights reserved. Establish business policies & standards Business Resiliency Management Catalog & resolve operational incidents Implement and Monitor Controls Identify & meet regulatory obligations Identify & prepare business resumption strategies Prepare for & recover from IT outages 20 Drivers… Model Risk Management Privacy Program Management Code of Federal Regulations Legal Matters Management Stakeholders Evaluation Regulatory Change Management Market Conduct Management Audit Management Foreign Corrupt Practices Act (FCPA) Conflict Minerals ISMS Foundation Regulatory & Corporate Compliance Management Third Party Management IT Security Risk Management Access Risk Management RedSeal Networks Veracode Security Review Key & Certificate Management McAfee Vulnerability Manager Skybox Security Risk Control © Copyright 2014 EMC Corporation. All rights reserved. Unified Compliance Framework Operational Risk Management Environmental Health & Safety Anti-Money Laundering PCI Compliance Business Resiliency Management Qualys Guard WhiteHat Security Sentinel Advanced Reporting & Governance for Authentication Manager CloudPassage Rapid7 Nexpose 21 Persona-centric Identify, assess & track emerging & operational risks Establish business policies & standards Independently review & assure management actions Manage the lifecycle of 3rd party relationships Establish IT Operational RiskPoor misaligned Unknown, standards Audit unidentified risks business & IT Management Poor internal practices Management controls and Regulatory & Operational governance Corporate compliance failures Chief Risk Third Party Compliance Inherited risks from Officer Management Regulatory violations external parties Management & failures ITSecurity Security Risk Threats Management Identify & resolve security deficiencies Detect & respond to attacks Significant business crises Manage crisis & communications © Copyright 2014 EMC Corporation. All rights reserved. Business disruptions Business Resiliency IT Disruptions Harmful Management incidents & events Catalog & resolve operational incidents policies & Implement and Monitor Controls Identify & meet regulatory obligations Identify & prepare business resumption strategies Prepare for & recover from IT outages 22 Issue-centric Identify, assess & track emerging & operational risks Independently review & assure management actions Establish business policies & standards Establish IT policies & Operational RiskPoor misaligned Unknown, Audit unidentified risks standards Management business & IT Poor internal Management practices controls and Implement and Regulatory & Operational Monitor governance Corporate Manage the Controls compliance failures Third Party Supply lifecycle of 3rd Compliance Inherited risks from Management party Chain Regulatory violations Identify & meet external parties Management relationships regulatory & failures Resiliency obligations ITSecurity Security Risk Business disruptions Threats Management Business Resiliency Significant IT Disruptions Identify & resolve Identify & prepare Harmful Management business security business resumption incidents & deficiencies Detect & respond to attacks crises Manage crisis & communications © Copyright 2014 EMC Corporation. All rights reserved. strategies events Catalog & resolve operational incidents Prepare for & recover from IT outages 23 Benefits of a Risk Intelligence Approach Better, more predictable decision-making Greater business opportunity Better business performance © Copyright 2014 EMC Corporation. All rights reserved. • • • • • • • • Comprehensive Business Context Prioritized Decisions Based on Impact Predictable Outcomes Embrace Known Risks to Exploit Opportunity Transition from Defense to Offense Improved Allocation of Resources/Budget Align Risk Objectives to Business Grow Opportunities 24 Planning Your Journey Siloed Managed Advantaged compliance focus, disconnected risk, basic reporting automated compliance, expanded risk focus, improved analysis/metrics fully risk aware, exploit opportunity Reduce Manage Gain Identify compliance cost resource known && unknown risk visibility risks new business opportunities Compliance Risk Opportunity © Copyright 2014 EMC Corporation. All rights reserved. 25 Siloed The CEO & CISO ride the elevator… We rolled out the last Microsoft security patches in less than 30 days, we shut down 50 virus infections and we passed our quarterly vulnerability scan for PCI. Soooo….that’s all good stuff. © Copyright 2014 EMC Corporation. All rights reserved. So how’s security these days? 26 Managed The CEO & CISO ride the elevator… We did an end to end review of customer record processing, found a few issues but resolved them. We also rolled out some special controls to support “Project Barracuda” – which I know is one of your key objectives. © Copyright 2014 EMC Corporation. All rights reserved. So how’s security these days? 27 Advantaged The CEO & CISO ride the elevator… I have a great idea on how to give customers secure access to their information that will blow the socks off our competition. Let’s talk about it over lunch. © Copyright 2014 EMC Corporation. All rights reserved. So how’s security these days? 28 Enterprise Risk ERM & ORM Trends © Copyright 2014 EMC Corporation. All rights reserved. 29 Market Observations & Trends - ERM • The level of maturity of ERM programs varies greatly by industry and by company within the same industry • Agreement on taxonomy, framework, and approach remains a challenge • Getting all silos / stakeholders on-board and working together is never ending process • Regulated companies are under increasing pressure to demonstrate risk management capabilities © Copyright 2014 EMC Corporation. All rights reserved. 30 The Perfect World ORM Dashboard Third Party Risk Network Security IT Risk Resiliency Service Levels Application Security © Copyright 2014 EMC Corporation. All rights reserved. Physical Liquidity Risk ORM Risk Area #2 Security ORM Risk Area #3 IT Operations Threat Intelligence Operational Risk ORM Risk Area #4 IT Compliance Security Incidents Market Risk ORM Risk Area #5 Credit Risk Strategic Risk ORM Risk Area #6 IT Risk Dashboard Vulnerability Management IT Security Risk Dashboard 31 The Drive for Sophistication • Desire to better anticipate and predict risk – Historical event analysis alone not adequate future predictor – What-if scenario analysis and “black swan” identification – Growing use of metrics (breadth, collection speed, & governance) – Identification of leading causal indicators – Data trending (metrics, meta-data, unstructured data) – Capturing changes in risk profile on on-going basis • More sophisticated risk assessment – Use of quantitative and qualitative risk assessment – Advanced analytics © Copyright 2014 EMC Corporation. All rights reserved. 32 Key Archer Capabilities • Questionnaires – Target asset types and identify common risks across assets • Risk Register – Catalog risks and track inherent/residual risks – KRIs and Metrics – Issues and Control Compliance – “Calculated Residual Risk” © Copyright 2014 EMC Corporation. All rights reserved. • Loss Events and Incidents • Rollups and Reporting • Risk Specific Monitoring – – – – – Security Operations Vulnerability Risk Resiliency Risk Compliance Risk Third Party Risk 33 RSA Archer and ISO:31000 Dashboards and Reports Enterprise Management Workflow and Notifications KRIs/Metrics Loss Events Questionnaires Risk Register Controls and Issues Management © Copyright 2014 EMC Corporation. All rights reserved. 34 Introduction to RSA Archer © Copyright 2014 EMC Corporation. All rights reserved. 35 RSA GRC Reference Architecture © Copyright 2014 EMC Corporation. All rights reserved. 36 RSA Archer Ecosystem Partners 50+ Partners Solutions 100+ Use Cases Content & Reports Workflows Expert Services Community Online Technology Summit Advisory Executive Forums Service © Copyright 2014 EMC Corporation. All rights reserved. RSA Archer GRC Foundation Platform Business Fundamentals Data Exchange Business Logic Solution Exchange 37 RSA Archer Foundation All key components required to lay a strong foundation for your enterprise wide GRC program Core Modules Business Process Business Objectives Products & Services Facilities & Locations IT Infrastructure Applications Information Assets Organizational Hierarchy Organizational Units & Departments Business Context Visualization Consolidated Data GRC Foundation Branding Workflow Roles/Responsibilities Central Repository System Auditing Calculations Data Management Search & Reporting Role Based Access Questionnaires Mobile Access Solution Configuration © Copyright 2014 EMC Corporation. All rights reserved. Common Taxonomies Common Data Model Data Import Integration APIs Data Mapping Pre-built Data Connectors Multiple Transport Modes Scheduled Data Feeds Data Publication Data Integration 38 RSA Archer Solutions Use Case Specific Solutions Environmental Health & Safety Stakeholder Evaluations Regulatory Change Mgmt PCI ISMS UCF Code of Federal Regulations Anti-Money Laundering Key & Certificate Mgmt Core Modules Policy Incident Security Operations Risk Vendor Vulnerability Risk Compliance Audit Business Continuity RSA Archer GRC Foundation © Copyright 2014 EMC Corporation. All rights reserved. 39 RSA Archer Solutions Identify, assess & track emerging & operational risks Independently review & assure management actions Manage the lifecycle of 3rd party relationships Audit Management Operational Risk Management IT Security Risk Management Identify & resolve security deficiencies Detect & respond to attacks Manage crisis & communications Establish IT policies & standards Regulatory & Corporate Compliance Management Third Party Management © Copyright 2014 EMC Corporation. All rights reserved. Establish business policies & standards Business Resiliency Management Catalog & resolve operational incidents Implement and Monitor Controls Identify & meet regulatory obligations Identify & prepare business resumption strategies Prepare for & recover from IT outages 40 Extending Solutions Model Risk Management Privacy Program Management Code of Federal Regulations Legal Matters Management Stakeholders Evaluation Regulatory Change Management Market Conduct Management Audit Management Foreign Corrupt Practices Act (FCPA) Conflict Minerals ISMS Foundation Regulatory & Corporate Compliance Management Third Party Management IT Security Risk Management Access Risk Management RedSeal Networks Veracode Security Review Key & Certificate Management McAfee Vulnerability Manager Skybox Security Risk Control © Copyright 2014 EMC Corporation. All rights reserved. Unified Compliance Framework Operational Risk Management Environmental Health & Safety Anti-Money Laundering PCI Compliance Business Resiliency Management Qualys Guard WhiteHat Security Sentinel Advanced Reporting & Governance for Authentication Manager CloudPassage Rapid7 Nexpose 41 RSA Archer Partner Ecosystem + 50 © Copyright 2014 EMC Corporation. All rights reserved. Partners for data transfer, content and services 42 RSA Archer Community GRC Summit Online Community Exchange Roadshows Customer Advocacy Working Groups © Copyright 2014 EMC Corporation. All rights reserved. • 120+ sessions • Annual event since 2003 • 800+ GRC practitioners • F2F access to product experts • 10,000+ Archer members • Interactive online community • Access to expert content • Ideas, requests and more • Access to GRC content • Certified new apps • Plug-ins and integrations • Services, ideas and more • Peer best practice sessions • Peer to peer networking • Available at a city near you • Annual event since 2007 • Executive Forum • Key Finding Reports • Customer Advisory Council • Birds-of-a-feather groups • Periodic meet ups • Influence product roadmap • Facilitated by Archer and / or interested customers 43 Critical Criteria TCO Time to Value Ecosystem Automation of tasks Code-free configuration Flexible deployment Out-of-the-box functionality Start small grow fast Mature service offering Technology partners Solution libraries Customer advocacy Communities © Copyright 2014 EMC Corporation. All rights reserved. 44 Industry Leadership Leader in eGRC MQ for 2013 Leader in Forrester GRC Wave Leader in BCM MQ for 2013 Quoted as “the most mature Leader in IT GRC MS for 2013 43+ countries © Copyright 2014 EMC Corporation. All rights reserved. offering in many occasions” 850+ customers 50 Fortune 100 companies 25+ industries 45
© Copyright 2026 Paperzz