Top Banner
1 LexisNexis Risk & Compliance Emerging technology and its impact on GRC www.lexisnexis.com.au/ riskandcompliance LexisNexis Risk & Compliance February 22, 2013
24

WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

Jan 13, 2015

Download

Technology

LexisNexisAUS

LexisNexis & the Australasian Compliance Institute Webinar

Did you know that only 6% of GRC professionals felt satisfied that their company’s governance processes and controls are keeping pace with technological change?

What risks lie ahead in the mobile and data-driven future? Are you in control of technological change?

Click here to download the white paper or view the webinar (http://www.lexisnexis.com.au/registrationforms/randcwhitepaper.aspx)

Stay in touch with the latest legal industry updates, white papers, research and special offers via our Twitter feed: http://twitter.com/LexisNexisAUS or LinkedIn http://www.linkedin.com/groups?gid=4632029&trk=myg_ugrp_ovr
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

1LexisNexis Risk & Compliance

Emerging technologyand its impact on GRC

www.lexisnexis.com.au/riskandcompliance

LexisNexis Risk & ComplianceFebruary 22, 2013

Page 2: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

2LexisNexis Risk & Compliance

Introduction to guest presenters & housekeeping

Emerging Technology & Impact on GRC

Emerging Technology Spotlight• Surveillance and Monitoring

• New Payment Technology

• Bring Your Own Device (BYOD)

• Big Data

• Cyber Security

• IP Protection & Information Privacy

The future of GRC – delivering ROI in times of increased risk:

New KYC Paradigm and GRC technology

Questions

Today’s Agenda

www.lexisnexis.com.au/riskandcompliance

Page 3: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

3LexisNexis Risk & Compliance

Today’s Presenters

Matthew Lawrence

Matthew is a technology product strategist with 15 years’ experience in software development, product marketing, project management and technology strategy. Currently Matthew works in product innovation for LexisNexis Pacific. His most recent product, LexisNexis Red, was recognised in the 2012 BRW 30 Most Innovative Companies in Australia list.

Mark Dunn

Mark is the Market Planning Manager, LexisNexis Risk & Compliance, and was a pioneering developer of the LexisNexis Know Your Customer (KYC) application, used by banks, law firms and accounting firms to conduct enhanced customer due diligence for anti-money laundering compliance, and by global institutions for anti-bribery and corruption investigations.

www.lexisnexis.com.au/riskandcompliance

Anthony Quinn

Anthony is an independent management consultant with more than 17 years experience as a Program and Project Manager, responsible for running large scale transformation change programs for many investment and retail banks in Australia, Europe the U.K. and U.S. Anthony is currently the Program Manager for FATCA for a Sydney based investment bank and also runs www.financialcrimesconsulting.com which offers financial crime prevention solutions.

Page 4: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

4LexisNexis Risk & Compliance

• Presenters will introduce key technology themes

• Discussion after each theme

• Please send in any questions you have via Go-To chat and we will have the panel address them

• There should be time for a Q&A at the end

Housekeeping

www.lexisnexis.com.au/riskandcompliance

Page 5: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

5LexisNexis Risk & Compliance

Emerging Technology & Impact on GRC

Key governance concerns include:• Accelerating global regulations – FATCA, FOFA,

Code of Banking Practice, Financial Claims Scheme, Basel III and AML, ABC

• Governance, processes & control

• IT Risk and emerging technologies – new payment methods

• Information Privacy/Security and Cyber-Security 6% felt satisfied that their company’s governance

process and controls are keeping pace with technological change.

28% identified social media

(impact on reputation & customer strategy)

Sources: Deloitte Bribery & Corruption Survey, AU & NZ, 2012; Is Governance Keeping Pace? KPMG, Audit Committee Institute 2012

What challenges are GRC professionals facing?

• Nearly a billion people used Facebook in June 2012

• Twitter generates over 200 million tweets per day

• 100 billion searches are generated each month via Google

• The volume of business data worldwide doubles every 1.2 years

Technology is changing the way businesses and individuals are interacting, communicating and sharing information.

58% of audit professionals

identified risk around information data

privacy & security as causing them the

most angst

www.lexisnexis.com.au/riskandcompliance

Page 6: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

6LexisNexis Risk & Compliance

• Surveillance and Monitoring

• New Payment Technology

• Bring Your Own Device (BYOD)

• Big Data

• Cyber Security

• IP Protection & Information Privacy

Emerging Technology Spotlight

www.lexisnexis.com.au/riskandcompliance

Page 7: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

7LexisNexis Risk & Compliance

Surveillance & Monitoring

CONTEXT

• Omnipresent technology connected to the web is the ultimate panopticon

• Almost everyone carries a device which constantly sends information about that person’s location (via GPS), activities and interactions

• Growing adoption of employee monitoring tools: keystroke monitoring, email logs, web activity, etc

THREATS & RISKS

• Millions of transactions occurring each day; need sophisticated transaction monitoring systems to identify unusual or suspicious behaviour

• Internal monitoring – emails and internal trading to ensure compliance with trading blackouts etc

• Surveillance is most likely restricted by law – but often the legal framework is ambiguous.

• Surveillance may be required by law!• Significant risk of breaching employee privacy• Impact on employee morale

REDUCING THE RISK

• Deploying state of the art transaction monitoring systems – configuration of rules by subject matter experts and extensive tuning / fine tuning

• Regular review of TMP effectiveness – which rules have fire and never fired

• Ensuring compliance with policies and procedures – breach monitoring and

• Ongoing oversight and independent reviews• Using social media monitoring tools to detect insurance fraud• Effective due diligence – KYC/KYE

CASESTUDY

www.lexisnexis.com.au/riskandcompliance

∙ Use of data analytic tools to mine data to support criminal investigations – corporate collapses such as Enron, email analytics between main players

Page 8: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

8LexisNexis Risk & Compliance

New Payment Technology

CONTEXT

• New technology emerging with contactless payment systems such as credit cards and debit cards, key fobs, smartcards or other devices that use radio-frequency identification (RFID) for making secure payments

• According to RBA statistics, there are an estimated $470 million dollars in cash transactions under $35 moving through the Australian economy each day, or around $170 billion per year

• Technology to be adopted by businesses in 18-24monthsForms:• Contactless cards – go money and pay wave• Peer to peer payment via mobile phone• Kaching

THREATS & RISKS

• The RFID chip feature comes switched on, and can't be switched off. The consumer has no choice - the card comes with the functionality

• No authentication is performed of the authority of the person to use the card (i.e. no signature, no PIN).

• Transactions may or may not involve visual notification to the cardholder, who may or may not notice any such display

• Data privacy concerns (over-collecting information)

REDUCING THE RISK

• Know your limits• Be app savvy• Put security measures in place • Wipe your old phone

CASESTUDY

www.lexisnexis.com.au/riskandcompliance

Use of digital currency account to facilitate Internet fraud and money launderingA young person, acting as a nominee, opened a digital currency account to enable him to receive the proceeds of Internet banking thefts from an offshore associate. He then attempted to redeem the value of the digital currency account by requesting the digital currency exchanger to provide him with postal money orders. In an effort to conceal his identity he informed the cash dealer that he had lost his passport and requested that the exchanger call a money service business and inform them that a person matching his description would present himself to collect the money orders at a particular time. It is believed that he was not going to send money offshore but would keep the proceeds for himself. He has been arrested and prosecuted.

Page 9: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

9LexisNexis Risk & Compliance

Bring Your Own Device (BYOD)

CONTEXT

• BYOD refers to employees bringing their own computing devices – such as smartphones, laptops and PDAs – to the workplace for use and connectivity on the corporate network

• BYOD is about a mobile and flexible working environment which offers significant productivity enhancements for “on-site” GRC tasks (e.g. OH&S, food safety, environmental inspections, etc.)

• 80% of employees used own devices at work• 53% of companies condone BYOD• 63 % of employees believe BYOD positively influences their view

of the company

THREATS & RISKS

• Data loss or leakage (assuming a device is stolen/lost without being backed up and secured)

• Data held on personal devices might be discoverable. (When someone participates in a BYOD program everything an employee does on her personal iPhone, for example, could be used as evidence in a lawsuit against her employer.)

• Who's responsible for Repetitive Stress Injuries from the use of a BYOD device?

• Shared devices – how secure is corporate data from an employee’s partner or housemate?

• Unsafe disposal of devices (i.e. hard drive tossed without being wiped)

• Impact on individual’s content (e.g. personal photos) if device is wiped by action of another company employee

REDUCING THE RISK

• Remote locking / deleting of devices – wiping iPhones remotely• Mobile Device Management (MDM)• Education

CASESTUDY

2011: Eighteen months ago a financial services firm (Blackstone) allowed employed to use iPads. Today, there are some 600 iPads among nearly 2,000 employees that tap the corporate network for confidential documents and emails. Most of them are privately owned BYOD devices. Issues around how to slove IP security. Problem solved through central mobile device management such as Mobileron and WatchBox.

www.lexisnexis.com.au/riskandcompliance

Page 10: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

10LexisNexis Risk & Compliance

Big Data

CONTEXT

• Big data is a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications

“It’s important to recognise that this is an information revolution more than a technology revolution” KPMG Audit Committee Institute Report, 2012

Big data will be a key driver of innovation, productivity, competition and transparency

THREATS & RISKS

• Tools which enable more sophisticated data mining and pattern analysis mean that it is possible to identify ‘interesting’ information that was previously unattainable

• Wasting money • Databases are not free – how to ensure ROI on Big Data

projects?• Privacy breaches• Copyright infringement

REDUCING THE RISK

• Governance! • Obtain consents• Anonymise• Identify and avoid or secure “toxic data”. E.g. credit card

numbers• Third part content (copyright)• Data handling policies and policing• Effective due diligence process - KYE

CASESTUDY ∙ Wikileaks – published tens of thousands

of classified military documents ∙ Industrial espionage – stealing trade secrets and designs etc. ∙ Facebook has hundreds of millions of users and

sensitivities of data loss ∙ Kim Dotcom – piracy of documents via Megaupload

www.lexisnexis.com.au/riskandcompliance

Page 11: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

11LexisNexis Risk & Compliance

Cyber Security

CONTEXT

• Information security as applied to computers and networks• The 2012 Cyber Crime and Security Survey Report,

commissioned by CERT Australia, revealed that cyber attacks are now more coordinated and targeted for financial gain

• Cost of cybercrime $5bn per year and growing• SMEs reported individual loss of $650m due to cybercrime• 44% of attacks originating from within organisations

THREATS & RISKS

• Most common form of cyber security issue is actually theft/vandalism by current/former employees

• Cloud based storage raises additional risk as data is held by a third party and potentially stored in a foreign jurisdiction (the US Patriot Act has raised concerns in the Pacific Region)

• Denial of service attacks can be problematic for businesses with heavy online presence or critical business functions using a web interface

• Breach of confidentiality information• Millions of transactions occurring each day; need

sophisticated transaction monitoring systems to identify unusual or suspicious behaviour

• Internal monitoring – emails and internal trading to ensure compliance with trading blackouts etc.

REDUCING THE RISK

• Ensuring firewalls are in place to protect data• Email blockers for filtering out spam emails• Ensuring employees are unable to download software files from

unknown sources• Preventing employees from accessing certain websites• Informing customers of the importance of protecting their

identities• Deploying state of the art transaction monitoring systems –• Effective due diligence – KYC/KYE/KYS• Regular review of TMP effectiveness – which rules have fire and

never fired• Ensuring compliance with policies and procedures – breach

monitoring• Ongoing oversight and independent reviews• Using social media monitoring tools to detect insurance fraud

CASESTUDY

SEPT 2012: CERT Australia receives calls from more than 25 organisations being targeted by ransomware. > The attacks encrypted files on the compromised system and/or locked victims out of the desktop environment. > The attacks also encrypted files in the system backups. The victims were then asked by the attacker to pay a fine using a payment or money transfer service, to obtain the codes that would unlock the computer and/or decrypt the data.

DATA MINING: Use of data analytic tools to mine data to support criminal investigations – corporate collapses such as Enron, email analytics between main playerswww.lexisnexis.com.au/riskandcompliance

Page 12: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

12LexisNexis Risk & Compliance

Intellectual Property & Information Privacy

CONTEXT

• Intellectual Property (IP) Protection and Information Privacy are closely linked

• IP is an important asset in today's knowledge economy and should be strategically managed

THREATS & RISKS

• Not differentiating between personal information that is required by law to be collected and information that is not

• A 'collection notice' is not provided (as is required by Australian law)

• Sensitive information is collected but is not recognised as being sensitive

• Risk of legal noncompliance if information is used for another purpose or disclosed without authority

• Risk of privacy complaints if there is legal noncompliance or the public is surprised by a use for another purpose or a disclosure

• The most commonly stolen IP is customer databases

REDUCING THE RISK

• Block USB ports to reduce data loss• Monitoring emails that employees send to ensure data

remains secure• Force change of password regularly• Educate staff on not sharing passwords• User access reviews to ensure password• Ensure data protection / data destruction policies are

followed• Effective due diligence: KYC/KYE/KYS/KYSS

CASESTUDY

∙ Wikileaks – published tens of thousands of classified military documents ∙ Industrial espionage – stealing trade secrets and designs etc. ∙ Facebook has hundreds of millions of users and

sensitivities of data loss ∙ Kim Dotcom – piracy of documents via Megaupload ∙ Aaron Schwartz – indicted for computer fraud and

downloading documents from JSTOR with the intention to share on web..

www.lexisnexis.com.au/riskandcompliance

Page 13: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

13LexisNexis Risk & Compliance

Delivering ROI in time of increased risk:

The New KYC Paradigm & GRC Technology

The Future of GRC

www.lexisnexis.com.au/riskandcompliance

Page 14: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

14LexisNexis Risk & Compliance

Regulatory Drivers • Anti-money laundering• Anti-Bribery & corruption• Financial services standards

Regulatory Drivers • Anti-money laundering• Anti-Bribery & corruption• Financial services standards

Real GDP GrowthIMF Data Mapper (September 2011)

Real GDP GrowthIMF Data Mapper (September 2011)

Transparency InternationalCorruption Perceptions Index (December 2012)

Transparency InternationalCorruption Perceptions Index (December 2012)

Business Drivers • Emerging market investment• Business reputation management• Ethical codes and standards• Avoiding fines and penalties • Ongoing business process efficiency

Business Drivers • Emerging market investment• Business reputation management• Ethical codes and standards• Avoiding fines and penalties • Ongoing business process efficiency

Countries that attract the greatest investment carry the greatest risk

Countries that attract the greatest investment carry the greatest risk

14

Due diligence dynamics evolvingIt’s no longer all about ‘KYC’

Page 15: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

15LexisNexis Risk & Compliance

ProcurementProcurement

RiskRisk StrategyStrategyComplianceCompliance LegalLegal

Anti-Bribery & Corruption Other Regulation Sanctions Regime

CreditCredit

FraudFraudAMLAML

Know Your Customer’s Customer

Know Your Customer’s Customer

Know Your Supplier

Know Your Supplier

Know Your Customer

Know Your Customer

Know Your Employee

Know Your Employee

15

Due diligence dynamics evolvingIt’s no longer all about ‘KYC’

Corporate Security

Corporate Security

ProductProduct OperationsOperations Finance/TaxFinance/Tax

Page 16: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

16LexisNexis Risk & Compliance

Procurement

Corporate

Security

Audit CreditStrategyAML Fraud

Conflictschecking

IDverification

Supplierdue diligence

Employeescreening

Transactionmonitoring

Reputationchecks

Countryrisk

Companydue diligence

InvestigationsSanctionschecks

ABC / AML Fraud Audit Strategy Procurement Credit

Creditreference

M&Adue diligence

CorporateSecurity

16

Watchlistchecks

PEPchecks

Sales agentdue diligence

Due diligence dynamics evolvingIt’s no longer all about ‘KYC’

Page 17: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

17LexisNexis Risk & Compliance

Towards a consistent due diligence processBenefits of consolidating key due diligence tasks

Regulatory Reputational

Business Financial

Page 18: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

18LexisNexis Risk & Compliance

• Helps demonstrate robust ABC and sanctions complianceand adherence to associated industry standards & best practice

• Helps implementation and ongoing maintenance of a consistent risk-based approach scaled to company size

• Enables indication of clear risk flags and maintenance of comprehensive audit trail

• Enables more discipline and control to be implemented through hard coded role profiles, permission settings, incident escalation and approvals to support ‘four eyes’ check

Towards a consistent due diligence processBenefits of consolidating key due diligence tasks

Regulatory

Page 19: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

19LexisNexis Risk & Compliance

• Helps protect hard earned brand and business reputationsthrough comprehensive and consistent due diligence process to mitigate AML, ABC and other risks

• Helps business maintain strong ethical standards and adhere to codes of conduct

• Helps demonstrate and promote robust processes and controls to customers and business partners

Towards a consistent due diligence processBenefits of consolidating key due diligence tasks

Reputational

Page 20: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

20LexisNexis Risk & Compliance

• Effective and consistent due diligence process improvesspeed of execution and competitive edge in key high riskdeveloping markets

• Efficient and streamlined onboarding experience enhancesboth external and internal customer and other third-partyservice levels

• Helps Compliance and associated teams reinforce benefitsand emphasise positive contribution to business successthrough improved service levels and provision of moreeffective management intelligence to support Boardengagement

Towards a consistent due diligence processBenefits of consolidating key due diligence tasks

Business

Page 21: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

21LexisNexis Risk & Compliance

• Helps mitigate regulatory fines, financial penalties and contract debarment

• Prompts regular review and audit of due diligence research resources to address content overlap and cost duplication thereby reducing cost of sale etc

• Consistent process enables business to easier test and benchmark cost efficiencies and other associated benefits

Towards a consistent due diligence processBenefits of consolidating key due diligence tasks

Financial

Page 22: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

22LexisNexis Risk & Compliance

RISKASSESSMENT

DUE DILIGENCE RESOURCES

IndividualSubscription

Services

AggregatedSubscription

Services

Outsourced Risk Advisors

HighLow

High

Emerging GRC Solutions & Tools

www.lexisnexis.com.au/riskandcompliance

Page 23: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

23LexisNexis Risk & Compliance

Special Offer for Webinar Attendees

www.lexisnexis.com.au/riskandcompliance

• All webinar attendees are entitled to a 15% discount on Lexis® Diligence until 31 March 2013.

- Lexis Diligence is one of the most advanced, intuitive and end-to-end KYC screening solutions available in the market, to help mitigate increased technological risk.

- Register for a free demonstration via this link or call LexisNexis Customer Relations on 1800 772 772. http://www.lexisnexis.com.au/riskandcompliance/demo.aspx

- Use Discount Code: ACIWEBINAR- For more information about LexisNexis Risk &

Compliance solutions, visit www.lexisnexis.com.au/riskandcompliance

*General terms and conditions and terms of trade apply.

Page 24: WEBINAR: Emerging technology and its impact on Governance, Risk and Compliance (GRC)

24LexisNexis Risk & Compliance

Questions

www.lexisnexis.com.au/riskandcompliance

LexisNexis Risk & CompliancePresenter: Aaron Cleavely-MillwoodEmail: [email protected]: http://www.lexisnexis.com.au/riskandcompliance/Join the conversation: http://www.linkedin.com/groups?gid=4632029&trk=myg_ugrp_ovr