Be accountable for evaluating the adequacy of and effectiveness of policies, procedures, processes and internal controls and providing credible challenge to business aligned compliance partners, front line businesses and front line control.

More Uses of the Technology Risk Toolkit:

  • Be accountable for reviewing, documenting, evaluating and testing application controls, particularly automated controls on a wide range of ERP systems and software applications across a wide variety of client business processes.
  • Lead Cybersecurity, Technology Risk, and privacy assessments against industry standards as NIST, ISO, COBIT, GDPR, HIPAA, CCPA, CMMC, etc.
  • Manage: effective negotiation skills, a proactive and no surprises approach in communicating control issues and strength in sustaining independent views.
  • Be accountable for managing and overseeing large projects involving information security, Technology Risk management, Cybersecurity or Cyber risk management.
  • Ensure you spearhead; build and cultivate positive working relationships with internal customers with the intention to exceed customer expectations.
  • Collaborate with other project teams or IT Partners to coordinate delivery of solutions and minimize Technology Risk.
  • Provide integration delivery oversight once a transaction is closed specific to alignment with acquisition hypothesis and business case.
  • Continue to develop processes to streamline metric reporting and analytics through increased automation and digitization across all data sources.
  • Coordinate information security internal audit, external audit, regulatory and SOX review to help represent your organization from an information security and Technology Risk perspective.
  • Ensure you amplify; and your work helps disrupt an entire industry in positive ways while you get the opportunities, support and benefits you need.
  • Capture and document all relevant knowledge and know how to compile best practices in order to ensure delivery of high quality services and products.
  • Collaborate with internal team, external auditors, and client team members regarding business issues and potential solutions.
  • Coordinate efforts with external auditors, the client, and IT resources to establish non production environments for testing purposes.
  • Pilot: mature and execute Technology Risk management strategy for cloud based solutions, working closely with business, technology, and information security to allow cloud platform capabilities.
  • Identify and evaluate complex business and Technology Risks, internal controls which mitigate risks, and related opportunities for internal control improvement.
  • Warrant that your planning identifies and evaluates complex business and Technology Risks to mitigate risks, and provides for continuous improvement.
  • Organize: articulate compliance goals and initiatives effectively to gain buy in, trust, and collaboration from internal executives, product teams, and operations teams.
  • Collaborate with the ITS team, internal audit and the corporate security team to assess, remediate and prevent information Technology Risks.
  • Coordinate audit and regulatory inquiries and external vendor activities to help represent Oversight Board from an information security, recovery and Technology Risk perspective.
  • Provide leadership for your technology governance, risk and compliance program to enhance your Technology Risk posture.
  • Be successful in implementing and improving operational processes; can drive program efficiency and high customer satisfaction.
  • Provide subject matter assessor expertise to support the review of key inherent information and Technology Risks associated with a product or service.
  • Be certain that your planning provides insight and influence in determining the strategic direction for the development and deployment of threat detection capabilities and/or incident response plans.
  • Ensure you handle; developed consulting skills enabling you to work with others to elicit information, to think objectively and analytically and to influence outcomes positively.
  • Drive organizational change and awareness programs to ensure adoption and implementation of policies requirements.
  • Collaborate regularly with across functions to address emerging compliance requirements and control remediation efforts.
  • Be accountable for contributing to and leading System efforts to develop effective IT supervisory policy and guidance, supervisory activities, and IT analysis and thought leadership.
  • Be accountable for designing and developing Cybersecurity and Technology Risk programs using industry framework and methodologies.
  • Support the design and implementation of third party risk operating models, identifying, evaluating, and providing solutions to evaluate complex business and Technology Risks.
  • Orchestrate and drive the successful and timely completion of regulatory and Audit commitments working in partnership with all relevant stakeholders.

 

Categories: Articles