Sign In
Not register? Register Now!
Pages:
4 pages/β‰ˆ1100 words
Sources:
1 Source
Style:
Other
Subject:
Management
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.44
Topic:

Risk Management: Syniverse Data Breach

Other (Not Listed) Instructions:

Please write in accordance with the standards of "Meets or Exceeds Expectations". I will make additional payment if the number of words you write exceeds the number of words I require. This class is very important to me. I hope you can take it seriously and look forward to cooperating with you in the future!
If you have any questions, please feel free to ask.
I will upload the courseware for lectures 1-4 to help you with this work later.

Assignment 1: Risk Identification, Assessment, Response (Action plans) and Monitoring (KRIs) 

Assignment Objective: Learning Outcomes (L1, L2 & L3): Demonstrate your ability to understand, discuss and evaluate COSO Internal Control Framework and COSO ERM Framework principles.  Apply these concepts, terminology, methodology to risk assess real-life risk event. 

Utilize required reading and class material to demonstrate your understanding for Sessions 1,2,3 & 4. Use optional reference material provided in Canvas and research online to risk assess the event.

  • Risk Identification (root cause analysis including risk factors- triggers and conditions), 
  • Risk Assessment and Measurement (Assess Inherent Risk (Impact x Likelihood with rationale, Assign Control rating (with rationale and map the control weaknesses to COSO Internal Control and/or COSO ERM frameworks) to derive Residual Risk 
  • Risk Mitigation and Corrective Action Plans (projects/plans to strengthen specific control weakness identified above  
  • Risk Monitoring- Establish KRIs around risk factors identified in root cause analysis above 
    • COSO KRI paper entitled “Developing Key Risk Indicators to Strengthen Enterprise Risk management” provided in Canvas files (see sections on Developing KRIS, Sources & information when developing KRIS and KRI communication & reporting)
    • And other required and optional material provided in syllabus and as class material.

Step by Step Approach and Rubric for Grading: 

Select one real, material risk event of a public company from recent news (within the past 2 years, if possible) 

Note: It cannot be a risk event already discussed in the discussion (Homework) in Canvas. Create a Board report to identify, assess, respond (action plan) and monitoring (KRI) frequency. Students are expected to develop original work. 

The material risk can be non-financial (operational, model, vendor, cyber) or strategic or financial risk (credit, market, liquidity/funding). Please note that Reputational Risk is always a secondary or tertiary knock-on effect, so please do not select it.

 

Material Risk is a designation that (typically in a particular regulatory context) indicates that a certain risk is of sufficient significance for an organization that it must be managed following certain minimum criteria.  As part of Capital Adequacy Assessment Process, regulated financial institutions must identify and manage all their material risks.

(15 points): Risk Event Selection Process: How to ensure risks is material? For this, determine Inherent Risk to the company: Adapt the Likelihood and Impact rating in Session 2 slides to your company’s size, complexity, and business risk profile. To derive the materiality of the inherent risk, please follow the instructions provided in the class, If you have Qs, please ask us after you have documented your Impact rationale and likelihood rationale in discussion forum. This is the most important step as you don’t want to select a minor incident to report to the Board.

  1. Using the Impact x Likelihood scale + rationale for each, determine if the Inherent Risk rating is in Critical/ High range. This is generally the range of material risk, and it is important enough to be mitigated and reported to the board, even if it is well managed/ monitored and the controls are strong. 
  2. Make sure you have enough information (news or through research) to perform credible Bow-tie Root Cause analysis.

 

  1. (30 points): Identify the Risk Factors, Risk Conditions & Risk Consequences: For the selected material risk, conduct the root cause via Bow-Tie analysis Diagram using Session 1- Titanic template and include Risk Factors (Blues: Trigger events - root causes; Greens: Conditions - root causes); Risk Event: Red; Consequences: Yellows: Consequences and end event (loss))

(5 points): Describe the risk: Summarize in two sentences. (Describe who, what, when, why and how- root cause).

(10 points): Assign Control rating by identifying at least two controls that in your opinion were absent or weak. This is the Control weakness/ vulnerability/failure that was exploited and most likely contributed to risk materialization.

  • Control Effectiveness Rating: Utilize Control Effectiveness Rating provided in Slide 2 and between inherent and Control Matrix (in Blue). This will result in your residual risk rating. 
  • Control Rating Rationale + identify at least two controls weaknesses to contributed to risk event materializing. This is the Control weakness/ vulnerability that was exploited or has contributed to the event.
  • COSO Internal Control- 17 principles, Sample internal Controls & Summary with Examples (Sessions 1 & 2)
  • Revised COSO ERM Framework – 20 Principles (Session 3)

 

(5 points): Residual Risk Rating with Rationale in case of #1 below.

Depending on when the risk event has taken place, this may include the results of mitigation projects.

  1. If the risk event took place 1+ year ago, residual risk may include that some control weaknesses that have already been addressed by management. If that is so, you should clearly explain your rationale. 
  2. If the risk event took place within the past few months, it is possible that CAP is still in progress, and is being monitored till the risks are mitigated within appetite. 

 

(10 points): Establish a minimum of two Corrective Action Plan (projects) + expected completion timelines.

 A plan to correct (reduce/mitigate) an identified control deficiency risk to an acceptable level along with a completion timeline. An action plan can include creating a NEW control or enhance an existing, weak control. These can be projects/plans to strengthen specific control weakness identified above, generally around risk factors (triggers and conditions)  

 

(5 points): Assign a Risk Owner for Corrective Action Plan (CAP) (accountable person who owns the process where risk materialized). The CAP owner takes actions, monitors, and periodically reports to senior management on the progress made- on a monthly, quarterly basis as needed. 

  1. Define what roles and departments should be involved

 

(10 points): Establish Monitoring (KRIs and or KPIs): 

  1. Early warning signals (Cause related KRIs or exposure related KRIs) or 
  2. Lagging Indicators (loss related) or performance/action indicator (KPIs). 
  3. Provide KRI description, measure, and threshold (in terms of red, yellow, and Green)

 

  1. (5 points): Assign a sub-committee responsible + reporting frequency for monitoring the effectiveness of the mitigation/ CAP for the control deficiencies

 

  1. (5 points) Professional Writing (Written slides)
  2. Structure, Development, and Consistency of presentation- Organization, flow, and coherence of ideas. 
  3. Risk Identification and supporting Analysis. 
  4. Correct use of terminology and concepts taught in class. 
  5. Grammatically correct and clear layout of the presentation. 

Cite references in foot notes or end notes.

 

Other (Not Listed) Sample Content Preview:

Syniverse Data Breach
Student’s Name
Affiliation
Course
Professor
Due Date
Syniverse Data Breach
Syniverse is a Florida-based multinational telecommunications company that has a broad clientele base that include companies such as American Movil, Verizon, China Mobile, among others (Kovacs, 2021). One of the material risk event that the company has experienced in the recent two years is data breach. In this report, COSO Internal Control Framework and COSO ERM Framework principles are used to assess the Syniverse data breach.
Risk Event Selection Process
In order to understand the risk posed by data breach, it is essential to consider the inherent risk that data breach pose for Syniverse as a company. According to COSO, inherent risk details the risk that a business is likely to experience before an organization implements action to lower the influence of the risk on the organization. In order to understand the materiality of the inherent risk resulting from data breach, the Likelihood and Impact rating can be adapted to assess inherent risk on the (1) company’s size, (2) complexity, and (3) business risk.
Imminent

Low

Moderate

High

Critical

Critical

Frequent

Low

Moderate

High

High

705485336552002-48260482601001Critical

Occasional

Very Low

Low

Moderate

657225285753003High

High

Infrequent

Very Low

Very Low

Low

Moderate

Moderate

Rare

Very Low

Very Low

Low

Low

Moderate


Minor

Moderate

Significant

Severe

Catastrophic

From the qualitative analysis of the inherent risk that data breach pose to Syniverse Company’s size; the inherent risk can be classified as catastrophic given the sensitivity of the clientele to incidences that threaten to expose customer data. To this end, there is an inherent risk that client will seek services from competition at the expense of Syniverse’s growth. In addition, the inherent risk that the company face due to data breach can be classified as critical as the government can impose a fine that could adversely affect the company’s size.
With regard to complexity, the inherent risk posed by the data breach can be considered as critical. Increasingly, hackers are advancing the technological tools that they use to conduct cyber-attacks. Failure to address the issues places the company at a situation where the initial investment required to deal with the problem will be very high.
The inherent risk of the data breach to business is high. To this end, the Board has to consider that the negative publicity surrounding data breach may dampen the company’s ability to maintain the existing customers and attract new customers. From the analysis, it is evident that the data breach pose a significant inherent risk that should be addressed.
Bow Tie / Root Cause: Syniverse Data BreachData Breach Cyber AttacksCompromised SystemVulnerable Systems Customer Mistrust Business Interruption 235People Blackmail Fraud lateEquipmentFailure Unintentional Attacks Technology FailureHuman ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These Other Other (Not Listed) Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!