Risk Matrix + GDPR
Risk Matrix + GDPR
Risks
Building a Framework
Things to consider when building your framework
2
Brainstorm Risks Events
3
Risk Event Identification Techniques
May include a combination of different types
of techniques combined with supporting
tools:
– Event Inventories
– Internal Analysis & Surveys
– Process Flow Analysis
– Current Events
– Facilitated Workshops and Interviews
4
Analyze, Quantify & Prioritize Risk
5
Methods to Rank Risk
Qualitative
A qualitative analysis would use a scale of "Low, Medium, High" to indicate the
likelihood of a risk event occurring.
Quantitative
A quantitative analysis will determine the probability of each risk event occurring.
For example, Risk #1 has an 80% chance of occurring, Risk #2 has a 27% chance of
occurring, and so on.
6
Develop Risk Analysis Matrix
Develop a risk mapping for impact and likelihood to help determine
which risks need risk response. For example:
7
Types of Risk Impact
In order to align discussions around why risk are significant and what should be done
about them, you should consider dividing your analysis in to types of impact:
Financial Reputation
Incurs unanticipated costs or Creates negative media
Strategic reduces revenues attention
Causes a strategic objective to Operational
fail Legal Affects the quality or efficiency of how
Triggers arbitration work gets done
Environmental, or litigation against Technology
Health and Safety your organization Exposes application,
Jeopardizes staff, volunteers or
data, operating systems, network or
others’ well-being
infrastructure to inappropriate
access/change 8
Example of a Risk Rating
9
Determine Risk Mitigation
10
Determine Risk Mitigation
Reduce / Mitigate risk Eliminate / Avoid risk
Activities with a high Activities with a high
likelihood of occurring, likelihood of loss and high
but impact is low. impact.
11
Risk mitigation - Insurance
12
Risk Examples
13
Example Category - Personnel/Volunteers Risk
• Injury at work
• Cause your organizations client injury
• Harm reputation of your organization
• High turnover
• Triggers a cyber security incident
14
Example Category - Financial Risk
• Inaccurate and/or insufficient• High transactional costs
financial information • Inadequate maintenance of
• No financial planning long-term sources of funding
(budgeting) • Inadequate reserves and
• Lack of financial liquidity cash flow
• Poor pricing policy (e.g., • Dependence on a low
overpriced activities in grant number of revenue sources
applications)
• Inadequate investment policy
• Excessive indebtedness
• Inadequate insurance
• FX losses
coverage
• Financial fraud
• Funds used against the intent
of donor/grantor
15
Example Category - Operational Risk
• Not enough beneficiaries • Lack of formalized
• Not enough well-trained procedures
Personnel • Inefficient and ineffective
• Uncertainty about security IT system
of assets • Implementing activities in
• Competition from other a dangerous environment
organizations • Natural disaster, fire,
• Dependence on suppliers flood, theft
(their strong bargaining • Deviation from core
power) mission “in search of”
• Ineffective fundraising funding sources
system
16
Example Category - Management
• Inadequate organization • Resignation of key
structure personnel
• Management lacks • Conflict of interest
adequate experience or • Ineffective
not well organized communication System
• Management dominated • No direction, strategy,
by individual leaders and plans
17
Example Category - Grant Risk
• Delays in disbursement
• Lack of knowledge and skills to utilize the awarded
grant
• Changes in environment preventing utilization of the
awarded grant
• Undervalued contract
18
Emerging Risks: Privacy / GDPR
Are you ready for the General Data Protection Regulation (GDPR)?
GDPR is the most important change in privacy in 20 years taking effect
May 25, 2018.
In the future, aspects of the European GDPR are likely to find their
way into other regulation as well, organizations should start to
prepare their policies and procedures for this.
19
GDPR - Overview
Introduction
GDPR Requirements
Penalties
20
What is the GDPR?
21
What is the GDPR? (cont’d)
Principle Based – Purpose limitation, data minimization, accuracy, storage limitation,
integrity and confidentiality, accountability
Data Protection Officers (regular and systematic monitoring on a large scale, or sensitive
data, or public body); Associations representing categories of controllers MAY designate
a DPO for their Controllers
Appropriate security of Personal Data
22
GDPR: Penalties, Complaints, Reputation
Penalties
• 20 million euro or up to 4% of total worldwide annual turnover,
whichever is higher
• Member States can impose additional fines not covered by Art. 83
Complaints/Investigations
Reputational Consequences
23
GDPR applies……
When a
company • offering or providing goods
processes an or services - even if no
EU data payment is required
subject’s
information if • monitoring individuals in
the processing person or online
is related to:
24
GDPR does not apply…
25
GDPR: Controllers and Processors
26
GDPR: Processing
27
GDPR: What is Personal Data?
28
GDPR: What is Sensitive Data?
29
GDPR: Key Changes
Increased transparency and creating new rights. Right to Access, Right
1 Data Subject Rights
to be Forgotten, Data Portability
30
GDPR: Security Requirements
Flexible requirement that takes into account several factors: (1) state of the
art; (2) implementation costs; (3) nature, scope, context and purposes of
processing; (4) risk of varying likelihood and severity for the rights and
freedoms of natural persons
31
GDPR: What Companies Can Do To Comply?
Organization: Processes:
• Assemble Your Team Determine Systems tied to
• Roles & Responsibilities Data
• Know your data Employee Outreach
• Security Obligations Collaboration
Training
Monitor & Enforce: Document:
Encourage Privacy Policy
Communication Security Policies
Make Good Conduct Visible Breach Response Plan
Manage Employee Error Document Retention Plan
32
GDPR: Data Governance
33
GDPR: Contracts for Using Processors
34
GDPR: Data Transfers
35
GDPR: Standard Contractual Clauses
36
GDPR: Data Transfer Exceptions
Public interest
Legal claims - necessary for the establishment, exercise, or defense of legal claims
Vital interests – necessary to protect the vital interests of data subject or of other persons
(if data subject is physically or legally incapable of giving consent)
37
Emerging Risks: Culture and Conduct
38
Culture and Conduct Risk: Recent Examples
For-Profit Wells Fargo – Banking Scandal
World
Volkswagen – Emissions Scandal
39
Culture & Conduct Risk: Tone from the Top
Ensure cultural values are reflected in the organization’s:
Risk
Strategy
appetite
Compliance
ACTIONS
frameworks
40
Culture & Conduct Risk: Independent Assurance
Organizations should demonstrate due diligence by conducting
independent risk reviews / health checks over the following areas:
41
Emerging Risks: Third-Party
42
Why Manage and Assess Third-Party Risks?
43
TPRM – Third Party Risk Management
44
TPRM Third-Party Stratification Example
Tier I
Tier 2
Tier 3
45
TPRM Third Party Due Diligence Example
Due Diligence is the process by which the vendor is reviewed
to determine its suitability for a given task.
Risk Assessment Financial
(Documentation, projections &
Categories of Risk, review
Vendor Audits
Legal Review and/or SOC
reports
46
ERM - Critical Success Factors
Obtain senior
management approval
and involvement
Designate committees or
individuals to champion
Develop Procedures
Involve business
and technical
experts
Formalize reporting to
leadership
47
Develop ERM Procedures
Who is responsible for initiating and conducting risk assessments
48
Formalize Risk Reporting
1 Updated Risk 2 Risk assessment criteria
Universe Use risk assessment criteria to
• Enterprise Universe prioritize risks – identify the most
• Survey Results significant risks to the organization
4 Mitigation Plans
Identify risk mitigation plans for top
10 most significant risks
50