You are on page 1of 17

Technology Risk

Management 2.0
A New Approach

Internal Audit, Risk, Business & Technology Consulting


Executive Summary

The conclusions of a technology risk study, The companies assessed in Protivitis Technology Risk
study all have ambitions to mature their technology
which explored whether technology risk risk activities, but it is uncertain whether they will be
functions have the right strategy, skills and able to achieve their goals, given delivery and budget
pressures. In many cases, to effect necessary changes,
operating models in place to enable the
significant modifications are needed, not only to risk
organization to understand, assess and management processes and tools, but also to the way in
which governance, risk management and compliance
manage existing and emerging risk, have
teams are organized.
reinforced Protivitis long-held view that
This process does not necessarily require additional
technology risk is failing to keep up with the people or cost. Firms can drive operational effectiveness
and efficiencies through consolidation or better integra-
rapid pace of technological change.1 This
tion of technology governance, risk management and
is particularly true for organizations that compliance activities, but this will only be achieved by
using technology more effectively. The operating model
are struggling with the notion that they are
needs to come first, however. Once the framework has
becoming a technology company. been established, a creative risk function can bring it to
life and increase levels of automation using technology.

Technology risk is failing to keep up with the rapid Ultimately, technology risk activities need to undergo a
pace of technological change. digital transformation to be fit for purpose. It is time to
reimagine the way firms manage technology risk and
empower the risk function to become innovators and
remain relevant to the business.

This paper introduces the Protiviti Technology Risk


Model 2.0 a proven framework and methodology
firms can use to create a more integrated and more
effective technology risk function. This approach goes
much deeper than utilizing a common platform: it seeks
to re-engineer and redesign the way technology risk
and information security work is done by integrating
methodologies to create a more holistic view of risks in
the enterprise.

The results of the technology risk study are set out in the Protiviti white paper, Technology Risk: The Need for Change: www.protiviti.com.
1

protiviti.com Technology Risk Management 2.0 1


The Protiviti Technology Risk Model 2.0

The Protiviti Technology Risk Model 2.0 framework and risk, vendor management, information security and
methodology is designed to enable better integration cybersecurity teams, to name a few. Implementing a
of the various groups performing technology risk more integrated approach creates a more effective and
activities. This can include activities performed by efficient IT and technology risk function that focuses
individuals in the technology risk function, the IT on the customer and user experience rather than on the
department, the operational risk team, information downside risks impacting the organization.

Protiviti Technology Risk Model 2.0

Customer (Internal/External) Facing Service Catalogue

Deposits* Mortgages* Insurance* Trading Equities* Financial Reporting*

Top-Down Business Risk Assessment


Risk Analysis
RISK CATEGORIES: THREAT ANALYSIS:

High
C I A S R OI WM OI OI 1

Business
Impact
Med
# Risk Scenarios Identified (Primary Threat Actors*)
Likelihood of occurrence
1
(includes consideration of
identified controls)

Technology Entity Mapping

Platforms Processes Third Parties

TopBottom
Down Business
Up RiskRisk
Assessment
Assessment

Risk and Remediation Incident Transparency Reporting


Controls Library Plans Response Plans

INCIDENT ANALYSIS

CONTINUOUS MONITORING
Compliance

Frameworks Standards Regulations INTERNAL AUDIT

* These are only examples of high-level categories.

2 Protiviti
The Protiviti Technology Risk Model 2.0 framework First, organizations need to decide what they want
helps firms to visualize an ideal end state and provide to integrate and how. The Protiviti Technology Risk
a tried-and-tested methodology to realize that vision. Model 2.0 seeks to deduce how different functions work
The effective implementation of this framework together and how their varied standards, taxonomies
drives a wholesale transformation in the organization. and agendas can be brought together to align with the
Success relies on firms having sponsorship at the goals of the business. Once firms have determined
appropriate level and an effective change management common processes, common languages and common
process in place. approaches, only then can they be combined in a common
system. Starting with a common system and trying to
This approach is not to be confused with the well-
superimpose a different approach is rarely successful.
versed arguments for firms to implement a common
By approaching this from the other direction, once the
governance, risk and compliance (GRC) platform.
risk management functions are aligned, the technology
Although a common GRC platform is useful, since
should fall into place more naturally.
it can streamline and bring risk reports and data
together, the focus in this approach is on how
firms can fundamentally re-engineer and redesign Integrating Top Down and Bottom
the way the various functions that manage and/or Up Approaches
report on technology risk work together to integrate
Existing approaches adopted by almost all organizations
methodologies, as well as languages and culture.
for technology risk are conducted from the bottom up and
Many firms have struggled to fully implement complex are focused on the risk assessments of the technology
GRC projects in the past, which is often caused by components. Top-down risk analysis is typically only
the tendency for such projects to be technology-led. performed to inform the scope of the assessments. The
People and functions need to align first in terms of analysis then quickly moves to a bottom-up assessment
their methodologies, processes and cultures before of the technology components the systems and
an integrated approach can be underpinned by a core processes supporting applications identified as high
technology platform and supporting tools. risk to highlight potential issues. These activities are not

protiviti.com Technology Risk Management 2.0 3


informed by main business risks, identified by senior Integrating a bottom-up approach with a top-down
executives, which could arise from the organizations approach, one focused on customer experience, threat
dependence on technology. Furthermore, no consider- analysis and an assessment of risk appetite, is a critical
ation is given to risk appetite. This lack of focus on the step that many organizations struggle with or miss
customer (internal or external) and the events the risk completely. This must be addressed if technology risk
function is seeking to prevent when performing tech- functions are to evolve to the next level and provide
nology risk assessments, results in technology-centric real business insights for key stakeholders.
conclusions that provide limited insights for the business.

Top-down risk assessment Bottom-up risk and controls review

Use understanding
of control
1 2 environment to 3 4
Determine the Validate scenarios support risk Identify key risk Consolidate
critical customer and threat actors scenario analysis entities relevant to information about
(internal or external) with stakeholders specic risk scenario current state of
risk scenarios control environment

7 6 8 5
Review risk Determine impact Use understanding Capture and track Augment controls
appetite and and consider of key risk closure of agreed data with service
conclude on threat and scenarios to risk remediation management data
actions required controls to assess prioritize activities
likelihood observations &
recommendations

Top down risk assessment that focuses on the


customer (internal or external) is not typically
performed and does not form basis of risk reporting

4 Protiviti
Integrating Top Down and Bottom Up

Top-down risk assessment

CUSTOMER (INTERNAL/EXTERNAL) SERVICES MAPPED: CRITICAL RISK SCENARIOS ASSESSED:


Relative Risk Levels
Obtain insurance Process payment Process mortgage Complete an ATM
quote online online application online withdrawal

Impact of occurrence Very High


Risk Appetite
1
3 2

4
Impact 5
# Risk Scenarios Identified (Primary Threat Actors*) 6
C I A 15
7
8
1 Failure to complete a significant number of customer payments in 9
accordance with agreed processing deadlines (OI, SA, UA, WM) 11 10
12
2 Payments are not accurately booked (OI, SA) 13
14
16

High
17
PRIMARY THREATS SOURCE:
Internal Threats: OI: Opportunistic Insider; WM: Well-Meaning Insider;
Likelihood of occurrence
External Threats: UA: Unsophisticated Attacker; SA: Sophisticated Attacker
(includes consideration of identified controls)

Consolidated view of controls


in Transparency Report combined
with analysis of threats used to
assess likelihood

Bottom-up risk and controls review

Process Entity Relevant Entities


payment Type (mapping of entities to Customer Services) Risks and Controls
online of relevant entities
Technology Mainframe Environment assessed against
standard frameworks
Technology Web Services Environment
(such as CSEG, NIST)
Third Party Hosting Provider A

protiviti.com Technology Risk Management 2.0 5


All firms should conduct a top-down risk assessment critical to providing services to customers. Technology
that considers the business impact of those risks failures can represent genuine physical health and
dependence on technology can present. This assessment safety issues, if not life and death risks. The failure of an
needs to focus on the areas deemed of most importance autonomous car, control system at an industrial plant or
to the organization, which are usually, but not always, labeling system at a pharmaceutical company by way of
those that impact the customer experience. Ideally, the example, can have catastrophic consequences.
assessment needs to be conducted from a board-level
Not all risks and associated business outcomes are
perspective to identify areas of critical importance.
created equally. Once identified, risks need to be ranked
When identifying risks, the following categories should by taking into account the business impact. This
be considered: confidentiality, integrity, availability, top-down risk assessment is a critical step, which is
safety and regulatory. For example, the loss of any generally not well performed by many risk functions
confidential data or information can be a major issue today, as revealed by the Protiviti Technology Risk study.
for a bank, while systems integrity and availability are

6 Protiviti
Protiviti Threat Assessment Model

They threaten the security


Threat actors Illustrative mitigation
They typically: of company information
category solutions
when they:

Well-meaning 1. Do not intend any harm 1. Are not aware that their Awareness training
insider (WM) 2. Are just trying to do actions can cause harm Data loss prevention
their job 2. Are forced to do things in an Document management
insecure manner because
they are not aware of any Data centric security
secure alternatives solutions

3. Believe they must do things Anti-virus/malware


in an insecure manner out protection
of urgency Web access restrictions

Opportunistic 1. Are legitimate users but have 1. Use their access in an Identity and access
insider (OI) high levels of access and/or unauthorised manner management
have been given more access 2. Can ethically justify their Logical access management
than they require misuse Privileged access
2. Would abuse access but not management
usually go as far as bypassing
controls to gain access User behavioral analytics

Unsophisticated 1. May or may not have 1. Use attack methods that Vulnerability
attacker (UA) legitimate access to dont ultimately succeed but Patching
information are otherwise harmful to our
computing systems Anti-virus/malware
2. Choose targets protection
opportunistically, often 2. Use attack methods that
based on easy-to-find have been released publicly IDS/IPS
weaknesses before vendors have had a SIEM/SOC
3. Have a relatively low chance to provide fixes
Privileged access
motivation to succeed with 3. Are not detected early on, management
attacks despite setting off alarms
End-user training (managing
4. Utilise simple, well-known social engineering threat)
attack methods
Disaster recovery/crisis
5. Are very noisy in their management
attacks

Sophisticated 1. Have a specific interest in 1. Apply their resources to any Continuous people screening
attacker (SA) damaging their targets or specific target Threat intelligence
see them as economically 2. Have a competing economic
profitable Advanced user behavioral
interest analytics
2. Are highly motivated to 3. Are state-supported
succeed with their attacks Advanced privileged access
controls (with enhanced
3. Have access to the technical segregation of duties rules)
and financial resources they
need to be successful Enhanced disaster recovery/
crisis management
4. Are very stealthy in their
attacks High security environments

protiviti.com Technology Risk Management 2.0 7


Threat Assessment
Threat Assessment is performed using Protivitis Threat Assessment model, which is explained on the
previous page.

Top-down risk assessment Threat assessment

C I A S Threat Levels Control Effectiveness

WM OI UA SA WM OI UA SA

Risk Description
Line of Business

Risk Description
Risk Description
Risk Description
Risk Description
Risk Description
Risk Description
Line of Business

Risk Description
Risk Description
Risk Description
Risk Description
Risk Description

1 2 3 ................. 98 99 1 2 3 4 5 1 2 3 4 5

Business Impact Priority Monitor Threat Levels Assess Controls

Once high impact areas have been identified, firms The types of controls and the organizations view of the
should conduct a threat assessment, which can be risk effectiveness of those controls may vary significantly
ranked, to determine where the greatest threats are depending on the source and sophistication of the
likely to emerge. attacker. Identifying the threat actors associated with
each risk allows the risk function to conduct a more
The Protiviti Technology Risk Model 2.0 divides
accurate assessment of the likelihood of a successful
threats, at least those resulting from targeted attacks,
attack a key component of the risk assessment
into internal and external categories. External threats
process. This exercise combines an analysis of the
primarily from hackers are classed as unsophisticated
perceived threat levels with an assessment of the
attackers (UA), while, at the far end of the scale are
effectiveness of the controls.
organized crime networks or terrorist groups, as well
as state actors, or foreign governments, are categorized Firms need to ask some fundamental questions when
as sophisticated attackers (SA). Internal threats are considering threat levels: Given a particular business
divided into opportunistic insiders (OI) and well- risk, where does the firm believe the threat is coming
meaning insiders (WM). from? What are the motivations for the attack? What

8 Protiviti
tools do the attackers have at their disposal? The When performing a threat analysis, the risk
required controls vary significantly depending on function needs to be aware of the effectiveness of
the perceived source of the threat. The motivation the control environment. The assessment should
and risk appetite of the perceived attacker also consider technology controls as well as business
has a significant impact on the threat assessment. process controls. For example, if an attacker attempts
Firms should be much more concerned about control to exploit weaknesses in change management and/
weaknesses when they are aligned with the perceived or privileged access controls to create and process
source of a credible threat. fictitious payments, the threat is significantly reduced

Top-down risk assessment

Relative Risk Levels


Relative Risk Levels
Very High

Risk Appetite
Very High

2
1 Observed
3
Risk Appetite Current
4
1
5
State
Impact of occurrence

2
15
6
3
7
8
9
11 10 4
12
5
Impact of occurrence

13
14
16 6
High

17

Likelihood of occurrence 7
(includes consideration of identified controls) 8
9
11 10
12
Risk management strategies 13
need to be identified for all risks
assessed as above risk appetite. Target 14
State
High

Likelihood of occurrence
(includes consideration of identified controls)

Entity Relevant Entities Risk Mitigation Activities Priority


Type (Mapping of entities to customer services) (Required to achieve target state)

Technology Mainframe Environment Privileged access management enhancement program extension


High
to mainframe
Technology Web Services Environment
Targeted education and awareness training for call center staff High
Third Party Hosting Provider A
Relocation of mainframe Medium

protiviti.com Technology Risk Management 2.0 9


if it is anticipated that the attack would be detected that matter most to the business. A key step in this
and blocked by monitoring activities performed in process is to identify and understand the companys
the middle and/or the back office. This is where a crown jewels those assets that are most critical
GRC platform can be helpful as it provides easy-to- to the business and have the lowest risk appetite. The
understand reports that give a consolidated view of risk function needs to understand where these assets
controls and/or control issues impacting the relevant are located assess the controls and put plans in place to
technology entities that are mapped to the risk being respond to and minimize losses should the scenario arise.
assessed. This process is referred to in the Protiviti
The top-down risk assessment process provides a
methodology as transparency reporting.
mechanism for understanding what the critical assets
Where possible, platform dashboards should emphasize are and where they reside. And, as set out above, the
the controls that are most relevant, given the perceived association of the risk profile to those assets, is what
source of the threat, to enable a quick conclusion to any drives risk mitigation priorities.
likelihood of the threat occurring.

Once the organization has succeeded in identifying Technology is Not a Silo


the risks that could materially damage the firm by
In todays organizations, technology is integral to
combining the assessment of potential business impact
almost all business processes. Most principal risk
with the perceived likelihood of occurrence, it can
frameworks used by financial institutions present
then start to consider its risk appetite and whether the
technology, and in many cases cybercrime, as discrete
current assessment of residual risk falls outside of risk
risk categories. While such risk categories are only
tolerance. For those risks assessed as outside tolerance,
used for reporting, adopting this approach can result
risk mitigation actions need to be defined.
in the risk assessment process focusing more on the
Traditional technology risk approaches use the results technology than on business risks arising from the
of the bottom-up analysis to identify gaps in the use of technology. Considered separately, it is extremely
control framework, which are all assumed to require difficult to assess the business impact and/or to define
remediation or risk acceptance. Many firms are finding risk appetite.
prioritizing the required actions to be extremely difficult,
Separating out the technology risk team from the
as they are unable to determine the business impact
operational risk team gives the impression that the two
and whether the gap is within risk tolerance. Using the
risk disciplines can be considered separately, but such an
approach set out above, firms can prioritize any required
approach encourages the broader operational risk team
remediation identified through the risk assessment
to ignore potential business process risks that relate to
process based on the likelihood of such an incident and
technology, assuming that these are assessed by the
the severity of the impact, with the most critical and
technology risk group. Technology risk teams tend to
impactful risks being addressed first.
look at technology in a standardized way, and often do
Regardless of the attention given to risk mapping and not consider risks that arise from the way that the system
threat assessments, absolute resilience is an unrealistic is being used or the nature and extent of business process
goal. Incidents will occur from time to time. Risk controls provided to mitigate the risk. This can result in
mitigation efforts need to focus on those areas technology risk being misrepresented in risk reporting.

10 Protiviti
Integrating Vendor Risk Management integration with third-party solutions is driving greater
dependence on vendors, increasing the importance of
Threats posed by vendors and third party contractors
effective vendor management.
have been attracting regulatory attention, with
financial services firms being required to perform Even though firms reliance on technology is increasing,
vendor risk assessments. Information technology is in reality they control far less of this than they ever
no exception. IT is much more complex than it once have before. The combination of increased dependence
was. While most businesses still manage and operate and less direct control raises some concerns, and
some in-house developed systems from their own regulators are becoming more focused on this topic.
data centers, the increasing adoption of cloud and

Risk Management Silos

Customers Suppliers

Hosting providers

Suppliers suppliers
Consumers
xAAS
INFORMATION
TECHNOLOGY
Outsourcing providers
Businesses
Telecoms

CONTRACTUAL OPERATIONAL RISK VENDOR RISK


COMPLIANCE MANAGEMENT MANAGEMENT

Most organizations have adopted approaches to firms data (vendor risk management), and the
managing risks arising from contractual obligations, risks arising from the technology firms use in-house
but their approaches are rarely coordinated or (operational risk management). These varied approaches,
consistent. This includes failing to meet obligations if all are performed, are typically owned by different
to customers imposed on the company by regulators teams, using different systems, with relatively little
(contractual compliance), the risks presented by information shared between them.
suppliers operating processes, managing and holding

protiviti.com Technology Risk Management 2.0 11


This lack of integration presents a number of The lack of coordination of remedial actions taken,
discrete risks: as different teams agree to different risk mitigation
strategies in a non-coordinated way, puts a strain on
The potential for significant misrepresentation of
those responsible for driving remediation efforts.
risk exposures in operational risk reporting, due to
the under representation of the impact of vendor The Protiviti Technology Risk Model 2.0 proposes a much
and/or contractual compliance risk in operational more integrated approach, with a common methodology
risk reports; for both operational risk management and vendor risk
management. The same principles should be applied
The potential for significant duplication of effort when
whether the technology is operated in-house or by a
performing assessments, resulting in unnecessary
third party. This integrated approach to vendor risk is
cost and frustration as auditees are repeatedly asked
illustrated in the diagram below.
the same questions;

Integrated Approach to Vendor Risk Management

1
Third-party entity
identied through
operational risk process

4 2

GRC platform Vendor risk team


automatically perform top-down
engages supplier risk assessment of
periodically to vendor to identify
submit evidence key risks

5 4 3

GRC platform 6 Vendor provided


automatically access to its
engages supplier to INTEGRATED third-party entity
conrm remediation TECHNOLOGY record in GRC system
plans executed GOVERNANCE, RISK to document controls
MANAGEMENT AND
COMPLIANCE
4 4
PLATFORM
GRC platform Vendor risk team
automatically review controls
engages supplier submission and
periodically to 5 decide evidence
reconrm controls If gaps are requirements
identied,
remediation plan
agreed with supplier

12 Protiviti
Adopting this integrated approach to vendor risk 5. A process is established to track and manage the
presents numerous benefits, as compared with a more closure of remediation plans agreed with vendors
traditional approach: when risks are identified.

1. Existing third parties that require inclusion 6. The approach is fully integrated with operational risk
in the vendor risk program are derived from reporting (if the same process and/or systems are
the top-down assessment of potential risks to used). This ensures that third-party risks are fully
the business, rather than from an analysis of considered in operational risk reporting, when threat
procurement spend (which can result in smaller, assessments are performed.
high-risk suppliers being missed).

2. The vendor risk teams effort is focused on deter- Effectiveness of Management Reporting
mining the main, specific risks the supplier/service
One significant observation from the Protiviti
provider presents to the business, rather than drawing
Technology Study was how few organizations have been
on standard schedules (e.g., information security
able to develop insightful reports. Reporting in general
requirements) to prescribe the required controls.
was found to lack impact. This stems from the fact that
3. Vendors are granted access to a system that provides approaches adopted are typically from the bottom up.
details of the controls they have put in place within Businesses have lots of information about technology
their organization to manage the risks on the compa- risks, but provide limited insight on business impact
nys behalf. This approach allows vendors to manage and whether the risk profile of the organization is
their own businesses, but also provides transparency increasing or decreasing and why.
to the buyer of the service on how risks are managed.
Once the integrated approach has been implemented,
It also reinforces the vendors responsibilities.
firms can utilize tools such as The Protiviti Risk
4. The system engages with suppliers on a regular basis Index to provide executives with a complete view of
to reaffirm those controls are operating effectively. risk, showing how risk is changing over time.2 Firms
This reminds suppliers of their commitments and can aggregate their top-down business risks using
responsibilities, while providing increased assurances a dashboard, which can give a macro-level view of
the controls are operating continuously. whether the companys risk exposure is rising or falling.

See The Protiviti Risk Index: A Single-Number Snapshot of Organizational Risk: www.protiviti.com/US-en/insights/protiviti-risk-index.
2

protiviti.com Technology Risk Management 2.0 13


The Protiviti Risk Index is a customizable solution business-centric, technology risk metrics to experience
designed specifically to capture, calculate and evaluate real benefits in months, while also helping to engage
a large volume of complex risk data and reduce it to senior management and board members.
a single-number snapshot of organizational risk. By
amalgamating the reports of these top-down business
risks into a single view of risk, new and changing risks
are more easily identified and the firm can track if it is
getting better as a result of certain mitigation efforts,
for example.

Getting to the stage where the organization has a


top-down view of its business-centric technology
risk to enable real-time business decision making is
a significant and time-consuming project, however
firms can populate the index with bottom-up,

In Conclusion

This paper provides a high-level overview of some The challenge for many firms will be deciding where
of the key components of Protivitis Technology to start and receiving buy-in from discrete operating
Risk Model 2.0. This is a common methodology units to work together to drive the required change.
and approach that can be used to fully integrate all Chief risk officers will have a critical role to play in
functions tasked with assessing and helping the this process.
organization to manage operational risks arising
Agreeing upon a common approach to the top-down
from the use of technology.
risk assessment a process that is ineffective in most
As highlighted in the whitepaper Technology Risk: technology risk management activities can be a
The Need for Change, there is a strong case for good place to start.
transformation. Almost all participants in our
study acknowledged that their current approach
to technology risk management is not adequate.

14 Protiviti
ABOUT PROTIVITI

Protiviti is a global consulting firm that delivers deep expertise, objective insights, a tailored approach and unparalleled collaboration to help leaders
confidently face the future. Protiviti and our independently owned Member Firms provide consulting solutions in finance, technology, operations, data,
analytics, governance, risk and internal audit to our clients through our network of more than 70 offices in over 20 countries.

We have served more than 60 percent of Fortune 1000 and 35 percent of Fortune Global 500 companies. We also work with smaller, growing companies,
including those looking to go public, as well as with government agencies. Protiviti is a wholly owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948,
Robert Half is a member of the S&P 500 index.

HOW CAN PROTIVITI HELP WITH TECHNOLOGY RISK?

Based on our research and industry participation, it is apparent that there is enormous pressure for financial services technology and IT leaders to become
more nimble and adaptive, yet there is also pressure to maintain controls and manage costs. Our blend of consulting expertise and deep industry experience
uniquely positions us to design and deliver pragmatic, risk-sensitive solutions in response to these challenges.

Protiviti has been helping clients to design and implement effective approaches to risk management. We have a strong reputation in risk management,
security and privacy, IT governance, and analytics and a loyal base of clients based on the breadth of our skills. We also seek to overlay a deep understanding
of industry-specific concerns in our solution development. Our dedication to develop pragmatic solutions to address the real, underlying client needs helps us
produce value for our clients. This combination has made us a trusted partner to our clients.

We seek to help organizations assess the effectiveness of current technology risk models and assist with the design and implementation of a more
effective approach.

We can provide the following services:


IT strategy and governance Data management

Enterprise architecture Risk technology

Regulatory risk and compliance Risk reporting (Protiviti Risk Index)

Security and privacy Vendor management

Service assurance Technology risk management (Protiviti Risk 2.0 Model)

Operations improvement Operational risk management

CONTACTS

Ed Page Jonathan Wyatt


Managing Director Managing Director
+1.312.476.6093 +44.20.7024.7522
ed.page@protiviti.com jonathan.wyatt@protiviti.co.uk

Andrew Struthers-Kennedy Jeff Weber


Managing Director Managing Director
+1.410.454.6879 +1.412.402.1712
andrew.struthers-kennedy@protiviti.com jeffrey.weber@protiviti.com

Michael Thor Barbi Goldstein


Managing Director Managing Director
+1.317.510.4685 +1.212.603.8351
michael.thor@protiviti.com barbi.goldstein@protiviti.com

Carl Hatfield
Managing Director
+1.617.330.4813
carl.hatfield@protiviti.com

protiviti.com Technology Risk Management 2.0 15


2015 Protiviti Inc. An Equal Opportunity Employer. M/F/Disability/Vet. PRO-0515
THE AMERICAS UNITED STATES Kansas City Salt Lake City ARGENTINA* MEXICO*
Alexandria Los Angeles San Francisco Buenos Aires Mexico City
Atlanta Milwaukee San Jose
Baltimore Minneapolis Seattle BRAZIL* PERU*

Boston New York Stamford Rio de Janeiro Lima


Sao Paulo
Charlotte Orlando St. Louis
VENEZUELA*
Chicago Philadelphia Tampa CANADA Caracas
Cincinnati Phoenix Washington, D.C. Kitchener-Waterloo
Cleveland Pittsburgh Winchester Toronto
Dallas Portland Woodbridge
Fort Lauderdale Richmond CHILE*
Houston Sacramento Santiago

EUROPE FRANCE NETHERLANDS KUWAIT* SAUDI ARABIA* UNITED ARAB


MIDDLE EAST Paris Amsterdam Kuwait City Riyadh EMIRATES*
AFRICA Abu Dhabi
GERMANY UNITED KINGDOM OMAN* SOUTH AFRICA* Dubai
Frankfurt London Muscat Johannesburg
Munich
BAHRAIN* QATAR*
ITALY Manama Doha
Milan
Rome
Turin

ASIA-PACIFIC CHINA JAPAN INDIA* AUSTRALIA


Beijing Osaka Bangalore Brisbane
Hong Kong Tokyo Hyderabad Canberra
Shanghai Kolkata Melbourne
Shenzhen SINGAPORE Mumbai Sydney
Singapore New Delhi

*MEMBER FIRM

2017 Protiviti Inc. An Equal Opportunity Employer M/F/Disability/Veterans. PRO-0317-103095


Protiviti is not licensed or registered as a public accounting firm and does not issue opinions on financial statements or offer attestation services.

You might also like