SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Downloaden Sie, um offline zu lesen
1
Plan for Your Institution’s
Strategic Growth
5/19/2016
MAY 19, 2016
2
Our Discussion Topics
1. Why Strategic Planning
2. A Process That Works
3. Walking Through That Process
4. Minimizing Execution Risk
3
Converting Opportunities to Performance
Strategic Options
External
Factors
Changes emerging in the
external environment
Internal
Factors
Capabilities to execute
the strategy
Strategic Options: What is the best path to long-term value?
Growth
Long Term
Value
Organic
Acquired
Customer
Base
Share of
wallet
Profits
Geographic
footprint
New
customers
New or
better
products
Product
Mix
Efficiency
Invest to
Innovate
Invest to
reduce
costs
4
• Has done a critical, data-driven evaluation of internal
capabilities
• Effectively links operating and capital budgets to strategy;
strategic objectives with performance evaluation and rewards
DescriptionComponents
• Has done a critical, data-driven evaluation of
marketplace opportunities and needs
• Has strong mechanism for monitoring results on strategic
initiatives; actual performance versus expectations
Strategic Planning Components
4
Customers and Markets
Understood
Internal Capabilities
Understood
Effective Linkages
Progress is Known,
Tangible
Agreed Upon, Shared
Vision
Clearly Communicated
Future Direction
• Has done an effective job of involving key stakeholders
(owners, directors, leadership, senior management)
• Strategy statement/document clearly delineates the future
path and performance objectives; strategic initiatives to get
there
5
2 431
A Process That Works
5
5
Link to operating and
capital budgets;
management
objectives,
compensation
Execute the
Strategy
Agree and
communicate the
strategy, objectives,
and road map
Develop the
Strategy
Discuss performance,
strategic options; drive
to common
understanding
Conduct Planning
Sessions
Compile
comprehensive
information for
planning sessions
Establish a Common
Fact Base
Focus the organization on a course of action to achieve its objectives
1. Where are we now?
2. Where do we want to be?
Structured, logical path to build a well-thought out and agreed upon
strategy
3. How do we get there?
4. How do we measure our progress?
Simple Question Set
6
Changes Emerging in External Environment
Internet of things,
delivery channel
evolution or revolution,
cybersecurity − threats
to information assets
Economy
Political,
Regulatory
Technology
Customers
Industry
Competition
External
Factors
Analysis
Margin compression,
increased capital
requirements, lower
returns to owners,
acquire or be acquired
Prosperity trends, lackluster
GDP growth trends, monetary
policy, interest rates, capital
market directional trends
National elections and
business orientation,
regulatory compliance
and rising cost
Saturated markets,
scale and cost
advantages, new
entrants
Emerging segments;
changing preferences,
habits, and attributes;
brand loyalty
The ability of an organization to sense the changes emerging in its external environment
and to develop decisions and actions to mitigate risks and take advantage of
opportunities – and doing this better than the competition
1
7
Business Segment Assessment
7
Fact base established at business segment level
7
• What are our major
opportunities to
improve
operational
performance?
• What are the
internal strengths
and weaknesses of
the business –
people, process,
and technology?
• How do they help
or constrain the
business?
• What customer
segments,
products, and
markets offer the
greatest potential?
• What is the
strategy to most
profitably serve
those customer
segments and
markets?
• Who are the
competitors?
• What is the basis
of competition?
• How do we perform
versus those
companies?
Operating
Model
Internal
Capabilities
Opportunities
& Strategy
Competitive
Position
1
8
Integration
Strategy
Delivery
Network
Operating Model
Core
Competencies
Competitive
Analysis
Evaluating Opportunities and Options
Matching marketplace opportunities and core competencies by business
segment, overall
Products
Customer
Segments
Marketplace
Market
Opportunities
2
• Ask tough, but
necessary questions
• Agree on business
opportunities and core
capabilities
• Ask tough, but
necessary questions
• Agree on what not to
do, as well as do
9
Strategy − Focus on Course of Action to Achieve
Goals
3
Plan should capture and summarize
• Strategy statement
• Characterizes the products-to-target markets and segments,
channels to reach those targets; specifies explicit profit and
performance objectives; states distinguishing operational
philosophies
• Assumptions under which the plan was prepared
• Financial projections
• Desired future state
• Primary Strategic Initiatives to reach that desired future state
• Accountability, action steps and timelines, specific milestones,
success clearly defined
10
Citizens Business Bank (CBB)
The segment: small to middle size businesses, de novo in 1975
3 Top Performers Convert Opportunities Better
Than Others
Source: Winning Strategies in Community Banking, Project Excellence, 1998 KPMG Peat Marwick LLP
Winning Strategies in Community Banking
(KPMG 1998)
• Top Performing Community Bank − $1.3 billion in
assets
• Clear vision of strategy and market from beginning.
Business and professional market is where CBB can
make the difference and have the greatest
competitive advantage.
• CBB put in place a customer-focused sales driven
strategy with unparalleled customer service as a
cornerstone. Sales is a top priority. “If you are good
at sales, then good business will come to you,” per
CEO D. Linn Wiley.
“Wiley believes strongly that
today’s banking market demands a
commitment to rigorous
‘professional management.’ He
asserts, ‘We are a planning
oriented company.’ The bank goes
through an annual planning
process in November formulating
specific goals and plans for the
coming year. Wiley then puts in
place the structure and people to
support the plan.”
11
Citizens Business Bank
155 Consecutive Quarters of Profitability
105 of Paying Cash Dividends (2015)
3 Top Performers Convert Opportunities Better
Than Others continued
Source: CVB Financial Corp. Annual Report 2015; 4th Quarter Analyst Briefing
“Our team has worked hard to
execute the long-term strategy of
our bank which is to build and
maintain relationships with the best
small to middle size businesses
and their owners in our geographic
marketplace.”
- Chris Myers, CEO
4th Quarter 2015, Analyst Briefing
The Best Bank in America
(Forbes 2015)
• Top 5 Bank (Bank Director Magazine), SNL Top 100 $1 to
$10B − $7.7 billion in assets
• Vision…Become premier financial services
company...serving the comprehensive financial needs of
successful small to medium-sized businesses and their
owners.
• Mission…Achieve superior financial performance and
rank in the top 10 percent of financial institutions in the
nation in ROE and ROA…Will be achieved by delivering
the finest in financial products and services through
relationship banking commitments with businesses and
professionals…
12
Minimizing Execution Risk
Commit to an
identity
Differentiate and grow by being clear-
minded about what you can do best
1
Translate the
strategic into
every day
Build and connect the cross-functional
capabilities that deliver your strategic
intent
2
Put your
culture
to work
Celebrate and leverage your cultural
strengths
3
Cut costs to
grow stronger
Prune what doesn’t matter to invest more
in what does
4
Shape your
future
Reimagine your capabilities, create
demand, and realign your industry on
your own terms
5
Five Acts of Unconventional Leadership
Source: How Winning Companies Close the Strategy-to-Execution Gap, Paul Leinwand and Cesare Maindari, 2016 Harvard Business
School Publishing
4
• Have the right people on board
• Have a clear strategy and path
to execution
• Be agile in adapting to
changing external factors,
market circumstances
• Be very disciplined in plan
development and execution
13
• Planning Process: “There needs to be a great deal of intentional
discipline – a standard process that is predictable and executed every year.
– February – Executive management team looks out a couple of years; invite
experts of various types to participate in dialog
– May – Have extended meeting with board to look forward; discuss performance
– July – Update the strategy; offsite with board and executive management team
– September – Updated strategy reflected in the budgets
– Monthly and quarterly – Assess how well we are doing.”
• Strategy Execution: “Key to execution is accountability.
– Overall linkage is essential – strategic goals budget goals individual
goals/incentive plans
– Tie compensation to strategy. Some goals/aspects are easy since it’s meeting
the numbers; some are more difficult to establish because they are more
intangible – but they all need to be linked together.”
Source: Interview with CEO, Diversified Financial Services Company (Banking and Specialty Finance), 2016
4 Minimizing Execution Risk continued
14
Closing Comments
• It is essential that:
 Leadership has confidence in the strategy
 The strategy is understood across the bank
 The strategy can be or is being executed.
• Anything less makes dealing with headwinds extremely difficult.
• Q&A
With today’s external regulatory and competitive pressures and uncertain
economic environment, building franchise value requires a well-thought out
and agreed upon strategy.
15
Bill Walton
Partner
DHG Financial Services
bill.walton@dhgllp.com
D 404.575.8902
Suzanne Donner
Director
DHG Financial Services
suzanne.donner@dhgllp.com
D 404.681.8224
1
IT advisory
Cybersecurity Update
Rodney Murray, Principal
IT Advisory
2
IT advisory
Why are we talking Cyber? The Numbers
• 4 trillion
• 5%
• 4 minutes
• 100%
3
IT advisory
Agenda
• Brief Look at Data Breach Stats
• Data Breach Causes and Results
• Security Incidents – Common Scenarios
• How can we prepare?
4
IT advisory
Data Breach Stats
5
IT advisory
728
829
1099
1662
1531
1264
0
200
400
600
800
1000
1200
1400
1600
1800
2009 2010 2011 2012 2013 2014
Source: http://datalossdb.org/statistics
Recent Statistics
6
IT advisory
Recent Statistics
6%
8%
10%
11%
37%
Financial
Govt. & Public Sector
Education
Retail
Healthcare
Top 5 Sectors Breached by Number of
Incidents
Source: 2015 Symantec Internet Threat Report
7
IT advisory
Recent Statistics
$155
$165
$179
$215
$220
$300
$363
Industrial
Retail
Communications
Financial
Pharmaceuticals
Education
Health
Breach Cost Per Capita 2014
Source: Ponemon Institute 2015 Cost of Data
Breach Study
8
IT advisory
Recent Statistics
Average Time to Identify a Breach
206 days
Source: 2015 Verizon Data Breach Report
Ransomware
113%
9
IT advisory
Recent Statistics
Breach Root Causes 2015
Malicious or Criminal Attack
System Glitch
Human Error
Source: Ponemon Institute 2015 Cost of Data Breach Study
47%
24%
29%
10
IT advisory
Recent Statistics
Source: Hackmageddon.com
Cyber Espionage
11%
Hacktivisim
22%
Cyber Crime
67%
11
IT advisory
Recent Statistics
Source: http://datalossdb.org/statistics
12
IT advisory
Recent Known Breaches
Kardashian website
- Web application code deficiency
- 663,270 names and email addresses
Excellus Blue Cross Blue Shield - NY
- May have started 2 years ago
- 10 million records (names, DOB, SSN, credit cards)
University of Virginia
- Hack originating from China
www.privacyrights.org
13
IT advisory
Recent Known Breaches
Ashley Madison
- Hack originating from China but possible inside job
- 37 million records (including names posted online)
UCLA Health System
- Did not take “basic” steps to encrypt data
- 4.5 million records (names, DOB, SS#, credit cards)
Office of Personnel Management – D.C.
- 21.5 million social security numbers
14
IT advisory
Social Engineering
15
IT advisory
Social Engineering
Attention User:
Your email quota is almost exceeded. Starting
from December 8th, we are migrating to new email
interface. So we are currently doing maintenance
on our server. Please visit page below to update
your account and avoid losing your inbox.
http://xxxxxxxxxxxx.com/data/allow.html
Thank you.
Technical Team
16
IT advisory
Social Engineering
17
IT advisory
Top 5 Assessment Findings - Technical
Internet Service Provider connections
Outdated security patches
Voice over IP (telephone) lack of encryption
Weak and default passwords
Weak secondary device configurations
18
IT advisory
Top 5 Assessment Findings - Social
Weak physical site controls
Response to phishing email
- Provide logon credentials
- Click on a bad link or attachment
Response to vishing (accounting departments)
Response to fake website
19
IT advisory
Social Engineering - Physical Site Scenario
- Printer vendor who is taking over toner
cartridge supplies needs an inventory – behind
teller line
- General contracting company who won the bid
to fix anything visible to the public – got access
to bank vault
- From AT&T looking at access issues
- Fake letter if challenged - -
20
IT advisory
Social Engineering – Vishing Scenarios
- Known third party lender inquiring of the
Accounting department for missing wire
- Fictitious company starting a grant program,
has “had discussions with the CFO” and
needing a last minute wire transfer
- Utility company on behalf of their customer
regarding an “overdrafted account”
- Third party IT support vendor - -
21
IT advisory
Security Incident vs Data Breach
Perception is Important
– People use “breach” too frequently
– You don’t want your customers or regulators to think
you are subject to numerous breaches
– “Breach” suggests something bad happened or is
going to happen
– “Breach” has legal significance
• Incident Response Team should use “Security
Incident” not “Breach” on internal communications
22
IT advisory
Security Incidents –
Common Scenarios
23
IT advisory
Typical Security Incident Scenario
“Houston we have a problem …”
 Ransomware message
 Malware incident that escalates
 Network performance
 Increase in suspicious emails
 Notification from employees’ banks of
suspicious account login activity
24
IT advisory
Typical Security Incident Scenario
“Time for action …”
 Performs initial analysis and triage
 Notifies IT service providers
 Determines assistance is needed,
scrambles to find an outside security
specialist
 “Tick, tock, tick, tock …” or “$, $, $, $...”
25
IT advisory
Unanticipated Costs
• Investigation Costs
• Regulatory / Industry Fines or Penalties
• Remediation / Infrastructure Change Costs
• Mandatory Notification to Customers
• Brand Damage
26
IT advisory
How Can We Prepare?
27
IT advisory
How Can We Prepare?
Question – If someone was trying to breach
your systems today …
WHO WOULD BE THE FIRST TO NOTICE IT?
Reducing risk will require investment …
 Skillsets / resources
 Software / hardware solutions
 Third party relationships for monitoring
 User Awareness
28
IT advisory
How Can We Prepare?
Assign Responsibility for Data Protection
• CISO, CPO, CRO
• Responsible for overseeing ongoing data
protection program
• Must Maintain Awareness of New
Technologies and Their Risks
29
IT advisory
How Can We Prepare?
IT Risk Management
• Management should understand what data
they process and store
• IT threats should be considered as part of the
organizational risk management process
• Consider mitigation, transfer, or elimination of
risks
30
IT advisory
How Can We Prepare?
Strong Vendor Management Program
• Include Security as Part of Vendor Evaluation
Procedures
• Conduct Ongoing Evaluation of Vendor
Relationship
• Disgruntled Employees
• Remember Target’s Scenario
31
IT advisory
How Can We Prepare?
Strong Incident Response Program
“Not if, but when …”
 Roles and Responsibilities
 Who owns the program?
 Include PR and Legal Counsel as Part of Response
Team
 Ensure forensic skillset is available
 Continued regulatory focus
32
IT advisory
FFIEC Cybersecurity Assessment Tool (CAT)
• New guidance finalized earlier this year
– www.ffiec.gov/cyberassessmenttool.htm
• “Repeatable and Measureable”
• Incorporates principles from the FFIEC IT
Examination Handbook
• Two Parts:
1. Inherent Risk Profile
2. Cybersecurity Maturity
33
IT advisory
FFIEC CAT – Role of Management & Board
• Develop the plan to conduct the
Assessment
• Define the target state of cybersecurity
preparedness
• Oversee performance of monitoring and risk
mitigation
• Oversee changes to maintain or enhance
targeted state of preparedness
34
IT advisory
FFIEC CAT – 2. Cybersecurity Maturity
Innovative
Advanced
Intermediate
Evolving
Baseline
• 5 maturity
levels are
based upon
sophistication,
design, and
effectiveness of
controls
• Critical controls
include
detective,
preventative,
and responsive
35
IT advisory
Questions
Rodney Murray, CISA, CRISC
rodney.murray@dhgllp.com

Weitere ähnliche Inhalte

Was ist angesagt?

Professional Overview
Professional OverviewProfessional Overview
Professional OverviewMichael Kipp
 
Integrated Planning & Reporting Solution for Government
Integrated Planning & Reporting Solution for GovernmentIntegrated Planning & Reporting Solution for Government
Integrated Planning & Reporting Solution for GovernmentTridant
 
Nexus inv marketing plan
Nexus inv marketing planNexus inv marketing plan
Nexus inv marketing planAtiqur Rahman
 
Challenges in Creating Professional Services in a Software Development Organi...
Challenges in Creating Professional Services in a Software Development Organi...Challenges in Creating Professional Services in a Software Development Organi...
Challenges in Creating Professional Services in a Software Development Organi...Jeff Korn
 
Value prop and key points of differentiation 30 60 and 90 day pilot results v...
Value prop and key points of differentiation 30 60 and 90 day pilot results v...Value prop and key points of differentiation 30 60 and 90 day pilot results v...
Value prop and key points of differentiation 30 60 and 90 day pilot results v...steve cassia
 
Strategic Planning PowerPoint Presentation
Strategic Planning PowerPoint PresentationStrategic Planning PowerPoint Presentation
Strategic Planning PowerPoint PresentationLawrence Podgorny
 
Simple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning ToolSimple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning ToolB2BPlanner Ltd.
 
Strategic planning process in companies
Strategic planning process in companiesStrategic planning process in companies
Strategic planning process in companiesPinaki Bhadury
 
Siakos penny athens_20101026_v2
Siakos penny athens_20101026_v2Siakos penny athens_20101026_v2
Siakos penny athens_20101026_v2Nigel Penny
 
Deloitte CFO and finance discussion document
Deloitte CFO and finance discussion documentDeloitte CFO and finance discussion document
Deloitte CFO and finance discussion documentMarc Joiner
 
Bringing Your Marketing Plan To Life
Bringing Your Marketing Plan To LifeBringing Your Marketing Plan To Life
Bringing Your Marketing Plan To Lifeericgagliano
 
Bvp General Deck Facebook 1 19 12
Bvp General Deck Facebook 1 19 12Bvp General Deck Facebook 1 19 12
Bvp General Deck Facebook 1 19 12bvincentp
 
SMM Basics 101
SMM Basics 101 SMM Basics 101
SMM Basics 101 SignUp4
 
Key priorities and value creation during first 100 days as CEO of British Foo...
Key priorities and value creation during first 100 days as CEO of British Foo...Key priorities and value creation during first 100 days as CEO of British Foo...
Key priorities and value creation during first 100 days as CEO of British Foo...James Waddell
 
Vp sales business plan ver1.1
Vp sales business plan ver1.1Vp sales business plan ver1.1
Vp sales business plan ver1.1Umesh Jamwal
 
Frankfurt Bookfair Supply Chain Meeting: Publishing in a Digital Age
Frankfurt Bookfair Supply Chain Meeting: Publishing in a Digital AgeFrankfurt Bookfair Supply Chain Meeting: Publishing in a Digital Age
Frankfurt Bookfair Supply Chain Meeting: Publishing in a Digital AgeMichael Cairns
 
Business Planning Process
Business Planning ProcessBusiness Planning Process
Business Planning Processakdixit
 
Resume_SEP 29 2016_LANGEVIN
Resume_SEP 29 2016_LANGEVINResume_SEP 29 2016_LANGEVIN
Resume_SEP 29 2016_LANGEVINPAUL LANGEVIN
 

Was ist angesagt? (20)

Professional Overview
Professional OverviewProfessional Overview
Professional Overview
 
Integrated Planning & Reporting Solution for Government
Integrated Planning & Reporting Solution for GovernmentIntegrated Planning & Reporting Solution for Government
Integrated Planning & Reporting Solution for Government
 
Nexus inv marketing plan
Nexus inv marketing planNexus inv marketing plan
Nexus inv marketing plan
 
Challenges in Creating Professional Services in a Software Development Organi...
Challenges in Creating Professional Services in a Software Development Organi...Challenges in Creating Professional Services in a Software Development Organi...
Challenges in Creating Professional Services in a Software Development Organi...
 
Value prop and key points of differentiation 30 60 and 90 day pilot results v...
Value prop and key points of differentiation 30 60 and 90 day pilot results v...Value prop and key points of differentiation 30 60 and 90 day pilot results v...
Value prop and key points of differentiation 30 60 and 90 day pilot results v...
 
Strategic Planning PowerPoint Presentation
Strategic Planning PowerPoint PresentationStrategic Planning PowerPoint Presentation
Strategic Planning PowerPoint Presentation
 
Simple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning ToolSimple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning Tool
 
Strategic planning process in companies
Strategic planning process in companiesStrategic planning process in companies
Strategic planning process in companies
 
Siakos penny athens_20101026_v2
Siakos penny athens_20101026_v2Siakos penny athens_20101026_v2
Siakos penny athens_20101026_v2
 
Deloitte CFO and finance discussion document
Deloitte CFO and finance discussion documentDeloitte CFO and finance discussion document
Deloitte CFO and finance discussion document
 
Bringing Your Marketing Plan To Life
Bringing Your Marketing Plan To LifeBringing Your Marketing Plan To Life
Bringing Your Marketing Plan To Life
 
Bvp General Deck Facebook 1 19 12
Bvp General Deck Facebook 1 19 12Bvp General Deck Facebook 1 19 12
Bvp General Deck Facebook 1 19 12
 
CEB November 2015_Miller ORiordan (final)
CEB November 2015_Miller ORiordan (final)CEB November 2015_Miller ORiordan (final)
CEB November 2015_Miller ORiordan (final)
 
SMM Basics 101
SMM Basics 101 SMM Basics 101
SMM Basics 101
 
Key priorities and value creation during first 100 days as CEO of British Foo...
Key priorities and value creation during first 100 days as CEO of British Foo...Key priorities and value creation during first 100 days as CEO of British Foo...
Key priorities and value creation during first 100 days as CEO of British Foo...
 
Vp sales business plan ver1.1
Vp sales business plan ver1.1Vp sales business plan ver1.1
Vp sales business plan ver1.1
 
Frankfurt Bookfair Supply Chain Meeting: Publishing in a Digital Age
Frankfurt Bookfair Supply Chain Meeting: Publishing in a Digital AgeFrankfurt Bookfair Supply Chain Meeting: Publishing in a Digital Age
Frankfurt Bookfair Supply Chain Meeting: Publishing in a Digital Age
 
COSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORECOSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORE
 
Business Planning Process
Business Planning ProcessBusiness Planning Process
Business Planning Process
 
Resume_SEP 29 2016_LANGEVIN
Resume_SEP 29 2016_LANGEVINResume_SEP 29 2016_LANGEVIN
Resume_SEP 29 2016_LANGEVIN
 

Andere mochten auch

Unified Communications and VoIP Trends Briefing
Unified Communications and VoIP Trends BriefingUnified Communications and VoIP Trends Briefing
Unified Communications and VoIP Trends BriefingDon Gulling
 
Practical Defences Against A New Type of Professional Bank Fraudsters
Practical Defences Against A New Type of Professional Bank FraudstersPractical Defences Against A New Type of Professional Bank Fraudsters
Practical Defences Against A New Type of Professional Bank FraudstersAlbert Hui
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Strategic Planning 101
Strategic Planning 101Strategic Planning 101
Strategic Planning 101Robert Lasky
 
Ict4gov eservices strategic_planning
Ict4gov eservices strategic_planningIct4gov eservices strategic_planning
Ict4gov eservices strategic_planningnitotalib
 
Appreciative Inquiry For Strategic Planning
Appreciative Inquiry For Strategic Planning Appreciative Inquiry For Strategic Planning
Appreciative Inquiry For Strategic Planning Avi Z Liran
 
SISTEMA PARTICIPATIVO PARA IMPLEMENTAR LA CALIDAD TOTAL EN LAS EMPRESAS
SISTEMA PARTICIPATIVO PARA IMPLEMENTAR LA CALIDAD TOTAL EN LAS EMPRESASSISTEMA PARTICIPATIVO PARA IMPLEMENTAR LA CALIDAD TOTAL EN LAS EMPRESAS
SISTEMA PARTICIPATIVO PARA IMPLEMENTAR LA CALIDAD TOTAL EN LAS EMPRESASAcademia de Ingeniería de México
 
Mobile payments landscape in Zimbawe | Beyond 2015
Mobile payments landscape in Zimbawe | Beyond 2015Mobile payments landscape in Zimbawe | Beyond 2015
Mobile payments landscape in Zimbawe | Beyond 2015Evolys Digital
 
Estrategias de ruis beltran
Estrategias de ruis beltranEstrategias de ruis beltran
Estrategias de ruis beltranAnalia Reyes
 
AIESEC FTU Hanoi 1314_Best MarCom award application
AIESEC FTU Hanoi 1314_Best MarCom award applicationAIESEC FTU Hanoi 1314_Best MarCom award application
AIESEC FTU Hanoi 1314_Best MarCom award applicationAmy Phan
 

Andere mochten auch (20)

Unified Communications and VoIP Trends Briefing
Unified Communications and VoIP Trends BriefingUnified Communications and VoIP Trends Briefing
Unified Communications and VoIP Trends Briefing
 
Practical Defences Against A New Type of Professional Bank Fraudsters
Practical Defences Against A New Type of Professional Bank FraudstersPractical Defences Against A New Type of Professional Bank Fraudsters
Practical Defences Against A New Type of Professional Bank Fraudsters
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Strategic Planning 101
Strategic Planning 101Strategic Planning 101
Strategic Planning 101
 
Ict4gov eservices strategic_planning
Ict4gov eservices strategic_planningIct4gov eservices strategic_planning
Ict4gov eservices strategic_planning
 
Appreciative Inquiry For Strategic Planning
Appreciative Inquiry For Strategic Planning Appreciative Inquiry For Strategic Planning
Appreciative Inquiry For Strategic Planning
 
SISTEMA PARTICIPATIVO PARA IMPLEMENTAR LA CALIDAD TOTAL EN LAS EMPRESAS
SISTEMA PARTICIPATIVO PARA IMPLEMENTAR LA CALIDAD TOTAL EN LAS EMPRESASSISTEMA PARTICIPATIVO PARA IMPLEMENTAR LA CALIDAD TOTAL EN LAS EMPRESAS
SISTEMA PARTICIPATIVO PARA IMPLEMENTAR LA CALIDAD TOTAL EN LAS EMPRESAS
 
UMAV- Rodeo
UMAV- RodeoUMAV- Rodeo
UMAV- Rodeo
 
USBLink - Geral
USBLink - GeralUSBLink - Geral
USBLink - Geral
 
JESSICA COX TOCANDO EL CIELO
JESSICA COX TOCANDO EL CIELOJESSICA COX TOCANDO EL CIELO
JESSICA COX TOCANDO EL CIELO
 
Mobile payments landscape in Zimbawe | Beyond 2015
Mobile payments landscape in Zimbawe | Beyond 2015Mobile payments landscape in Zimbawe | Beyond 2015
Mobile payments landscape in Zimbawe | Beyond 2015
 
Ud 21 diseño parametrico
Ud 21 diseño parametricoUd 21 diseño parametrico
Ud 21 diseño parametrico
 
Estrategias de ruis beltran
Estrategias de ruis beltranEstrategias de ruis beltran
Estrategias de ruis beltran
 
Ciência e Desporto II
Ciência e Desporto IICiência e Desporto II
Ciência e Desporto II
 
Part-time higher education in the second decade of the twenty first century
Part-time higher education in the second decade of the twenty first centuryPart-time higher education in the second decade of the twenty first century
Part-time higher education in the second decade of the twenty first century
 
Guía cloud computing eticom v.final
Guía cloud computing eticom v.finalGuía cloud computing eticom v.final
Guía cloud computing eticom v.final
 
Transformers
TransformersTransformers
Transformers
 
AIESEC FTU Hanoi 1314_Best MarCom award application
AIESEC FTU Hanoi 1314_Best MarCom award applicationAIESEC FTU Hanoi 1314_Best MarCom award application
AIESEC FTU Hanoi 1314_Best MarCom award application
 
El factor maya jose arguelles
El factor maya   jose arguellesEl factor maya   jose arguelles
El factor maya jose arguelles
 

Ähnlich wie DHG Financial Services Strategic Planning and Cybersecurity Presentation

Improving your finance business partnering
Improving your finance business partneringImproving your finance business partnering
Improving your finance business partneringJamie DAVIES
 
ARM FD Solutions - strategic growth
ARM FD Solutions - strategic growthARM FD Solutions - strategic growth
ARM FD Solutions - strategic growthTony Mason, FCCA
 
Quincy Capital Ready for Retail 2016A
Quincy Capital Ready for Retail 2016AQuincy Capital Ready for Retail 2016A
Quincy Capital Ready for Retail 2016APaul McConville
 
Catalyst Strategies Strategic Planning Framework
Catalyst Strategies Strategic Planning FrameworkCatalyst Strategies Strategic Planning Framework
Catalyst Strategies Strategic Planning FrameworkCatStrat
 
The Marketing Plan, The Organizational Plan & The Financial Plan from Entrepr...
The Marketing Plan, The Organizational Plan & The Financial Plan from Entrepr...The Marketing Plan, The Organizational Plan & The Financial Plan from Entrepr...
The Marketing Plan, The Organizational Plan & The Financial Plan from Entrepr...Muhammad Putra
 
Fp&a operating model
Fp&a operating modelFp&a operating model
Fp&a operating modeljarobertson2
 
bsc washington.ppt
bsc washington.pptbsc washington.ppt
bsc washington.pptNabEel80440
 
Driving Key Account Growth: Planning and Execution to Access the White Space
Driving Key Account Growth: Planning and Execution to Access the White SpaceDriving Key Account Growth: Planning and Execution to Access the White Space
Driving Key Account Growth: Planning and Execution to Access the White SpaceRichardson
 
Your mantra for 2014 improve financial strength and performance for sba
Your mantra for 2014   improve financial strength and performance for sbaYour mantra for 2014   improve financial strength and performance for sba
Your mantra for 2014 improve financial strength and performance for sbaFriedman Associates
 
A Global Perspective on Alignment: Looking Over the Horizon Mitchell Weis...
A Global Perspective on Alignment:  Looking Over the Horizon  Mitchell Weis...A Global Perspective on Alignment:  Looking Over the Horizon  Mitchell Weis...
A Global Perspective on Alignment: Looking Over the Horizon Mitchell Weis...mitchweisberg
 
Cegos Benchmark For Effective Kam In The 21st Century D Fleiter 2011 07 23
Cegos   Benchmark For Effective Kam In The 21st Century D  Fleiter 2011 07 23Cegos   Benchmark For Effective Kam In The 21st Century D  Fleiter 2011 07 23
Cegos Benchmark For Effective Kam In The 21st Century D Fleiter 2011 07 23DieterFleiter
 

Ähnlich wie DHG Financial Services Strategic Planning and Cybersecurity Presentation (20)

Improving your finance business partnering
Improving your finance business partneringImproving your finance business partnering
Improving your finance business partnering
 
How portfolio management can deliver strategy
How portfolio management can deliver strategyHow portfolio management can deliver strategy
How portfolio management can deliver strategy
 
ARM FD Solutions - strategic growth
ARM FD Solutions - strategic growthARM FD Solutions - strategic growth
ARM FD Solutions - strategic growth
 
Quincy Capital Ready for Retail 2016A
Quincy Capital Ready for Retail 2016AQuincy Capital Ready for Retail 2016A
Quincy Capital Ready for Retail 2016A
 
The Balanced Scorecard
The Balanced ScorecardThe Balanced Scorecard
The Balanced Scorecard
 
Catalyst Strategies Strategic Planning Framework
Catalyst Strategies Strategic Planning FrameworkCatalyst Strategies Strategic Planning Framework
Catalyst Strategies Strategic Planning Framework
 
Strategic Management part_03_03
Strategic Management part_03_03Strategic Management part_03_03
Strategic Management part_03_03
 
The Marketing Plan, The Organizational Plan & The Financial Plan from Entrepr...
The Marketing Plan, The Organizational Plan & The Financial Plan from Entrepr...The Marketing Plan, The Organizational Plan & The Financial Plan from Entrepr...
The Marketing Plan, The Organizational Plan & The Financial Plan from Entrepr...
 
Fp&a operating model
Fp&a operating modelFp&a operating model
Fp&a operating model
 
bsc washington.ppt
bsc washington.pptbsc washington.ppt
bsc washington.ppt
 
bsc washington.ppt
bsc washington.pptbsc washington.ppt
bsc washington.ppt
 
BSC Washington.ppt
BSC Washington.pptBSC Washington.ppt
BSC Washington.ppt
 
Driving Key Account Growth: Planning and Execution to Access the White Space
Driving Key Account Growth: Planning and Execution to Access the White SpaceDriving Key Account Growth: Planning and Execution to Access the White Space
Driving Key Account Growth: Planning and Execution to Access the White Space
 
Social Business Planning
Social Business PlanningSocial Business Planning
Social Business Planning
 
Revenue Growth-High Final
Revenue Growth-High FinalRevenue Growth-High Final
Revenue Growth-High Final
 
Your mantra for 2014 improve financial strength and performance for sba
Your mantra for 2014   improve financial strength and performance for sbaYour mantra for 2014   improve financial strength and performance for sba
Your mantra for 2014 improve financial strength and performance for sba
 
A Global Perspective on Alignment: Looking Over the Horizon Mitchell Weis...
A Global Perspective on Alignment:  Looking Over the Horizon  Mitchell Weis...A Global Perspective on Alignment:  Looking Over the Horizon  Mitchell Weis...
A Global Perspective on Alignment: Looking Over the Horizon Mitchell Weis...
 
Brochure
BrochureBrochure
Brochure
 
Balance Scorecard, BSC.pdf
Balance Scorecard, BSC.pdfBalance Scorecard, BSC.pdf
Balance Scorecard, BSC.pdf
 
Cegos Benchmark For Effective Kam In The 21st Century D Fleiter 2011 07 23
Cegos   Benchmark For Effective Kam In The 21st Century D  Fleiter 2011 07 23Cegos   Benchmark For Effective Kam In The 21st Century D  Fleiter 2011 07 23
Cegos Benchmark For Effective Kam In The 21st Century D Fleiter 2011 07 23
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 

Kürzlich hochgeladen (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 

DHG Financial Services Strategic Planning and Cybersecurity Presentation

  • 1. 1 Plan for Your Institution’s Strategic Growth 5/19/2016 MAY 19, 2016
  • 2. 2 Our Discussion Topics 1. Why Strategic Planning 2. A Process That Works 3. Walking Through That Process 4. Minimizing Execution Risk
  • 3. 3 Converting Opportunities to Performance Strategic Options External Factors Changes emerging in the external environment Internal Factors Capabilities to execute the strategy Strategic Options: What is the best path to long-term value? Growth Long Term Value Organic Acquired Customer Base Share of wallet Profits Geographic footprint New customers New or better products Product Mix Efficiency Invest to Innovate Invest to reduce costs
  • 4. 4 • Has done a critical, data-driven evaluation of internal capabilities • Effectively links operating and capital budgets to strategy; strategic objectives with performance evaluation and rewards DescriptionComponents • Has done a critical, data-driven evaluation of marketplace opportunities and needs • Has strong mechanism for monitoring results on strategic initiatives; actual performance versus expectations Strategic Planning Components 4 Customers and Markets Understood Internal Capabilities Understood Effective Linkages Progress is Known, Tangible Agreed Upon, Shared Vision Clearly Communicated Future Direction • Has done an effective job of involving key stakeholders (owners, directors, leadership, senior management) • Strategy statement/document clearly delineates the future path and performance objectives; strategic initiatives to get there
  • 5. 5 2 431 A Process That Works 5 5 Link to operating and capital budgets; management objectives, compensation Execute the Strategy Agree and communicate the strategy, objectives, and road map Develop the Strategy Discuss performance, strategic options; drive to common understanding Conduct Planning Sessions Compile comprehensive information for planning sessions Establish a Common Fact Base Focus the organization on a course of action to achieve its objectives 1. Where are we now? 2. Where do we want to be? Structured, logical path to build a well-thought out and agreed upon strategy 3. How do we get there? 4. How do we measure our progress? Simple Question Set
  • 6. 6 Changes Emerging in External Environment Internet of things, delivery channel evolution or revolution, cybersecurity − threats to information assets Economy Political, Regulatory Technology Customers Industry Competition External Factors Analysis Margin compression, increased capital requirements, lower returns to owners, acquire or be acquired Prosperity trends, lackluster GDP growth trends, monetary policy, interest rates, capital market directional trends National elections and business orientation, regulatory compliance and rising cost Saturated markets, scale and cost advantages, new entrants Emerging segments; changing preferences, habits, and attributes; brand loyalty The ability of an organization to sense the changes emerging in its external environment and to develop decisions and actions to mitigate risks and take advantage of opportunities – and doing this better than the competition 1
  • 7. 7 Business Segment Assessment 7 Fact base established at business segment level 7 • What are our major opportunities to improve operational performance? • What are the internal strengths and weaknesses of the business – people, process, and technology? • How do they help or constrain the business? • What customer segments, products, and markets offer the greatest potential? • What is the strategy to most profitably serve those customer segments and markets? • Who are the competitors? • What is the basis of competition? • How do we perform versus those companies? Operating Model Internal Capabilities Opportunities & Strategy Competitive Position 1
  • 8. 8 Integration Strategy Delivery Network Operating Model Core Competencies Competitive Analysis Evaluating Opportunities and Options Matching marketplace opportunities and core competencies by business segment, overall Products Customer Segments Marketplace Market Opportunities 2 • Ask tough, but necessary questions • Agree on business opportunities and core capabilities • Ask tough, but necessary questions • Agree on what not to do, as well as do
  • 9. 9 Strategy − Focus on Course of Action to Achieve Goals 3 Plan should capture and summarize • Strategy statement • Characterizes the products-to-target markets and segments, channels to reach those targets; specifies explicit profit and performance objectives; states distinguishing operational philosophies • Assumptions under which the plan was prepared • Financial projections • Desired future state • Primary Strategic Initiatives to reach that desired future state • Accountability, action steps and timelines, specific milestones, success clearly defined
  • 10. 10 Citizens Business Bank (CBB) The segment: small to middle size businesses, de novo in 1975 3 Top Performers Convert Opportunities Better Than Others Source: Winning Strategies in Community Banking, Project Excellence, 1998 KPMG Peat Marwick LLP Winning Strategies in Community Banking (KPMG 1998) • Top Performing Community Bank − $1.3 billion in assets • Clear vision of strategy and market from beginning. Business and professional market is where CBB can make the difference and have the greatest competitive advantage. • CBB put in place a customer-focused sales driven strategy with unparalleled customer service as a cornerstone. Sales is a top priority. “If you are good at sales, then good business will come to you,” per CEO D. Linn Wiley. “Wiley believes strongly that today’s banking market demands a commitment to rigorous ‘professional management.’ He asserts, ‘We are a planning oriented company.’ The bank goes through an annual planning process in November formulating specific goals and plans for the coming year. Wiley then puts in place the structure and people to support the plan.”
  • 11. 11 Citizens Business Bank 155 Consecutive Quarters of Profitability 105 of Paying Cash Dividends (2015) 3 Top Performers Convert Opportunities Better Than Others continued Source: CVB Financial Corp. Annual Report 2015; 4th Quarter Analyst Briefing “Our team has worked hard to execute the long-term strategy of our bank which is to build and maintain relationships with the best small to middle size businesses and their owners in our geographic marketplace.” - Chris Myers, CEO 4th Quarter 2015, Analyst Briefing The Best Bank in America (Forbes 2015) • Top 5 Bank (Bank Director Magazine), SNL Top 100 $1 to $10B − $7.7 billion in assets • Vision…Become premier financial services company...serving the comprehensive financial needs of successful small to medium-sized businesses and their owners. • Mission…Achieve superior financial performance and rank in the top 10 percent of financial institutions in the nation in ROE and ROA…Will be achieved by delivering the finest in financial products and services through relationship banking commitments with businesses and professionals…
  • 12. 12 Minimizing Execution Risk Commit to an identity Differentiate and grow by being clear- minded about what you can do best 1 Translate the strategic into every day Build and connect the cross-functional capabilities that deliver your strategic intent 2 Put your culture to work Celebrate and leverage your cultural strengths 3 Cut costs to grow stronger Prune what doesn’t matter to invest more in what does 4 Shape your future Reimagine your capabilities, create demand, and realign your industry on your own terms 5 Five Acts of Unconventional Leadership Source: How Winning Companies Close the Strategy-to-Execution Gap, Paul Leinwand and Cesare Maindari, 2016 Harvard Business School Publishing 4 • Have the right people on board • Have a clear strategy and path to execution • Be agile in adapting to changing external factors, market circumstances • Be very disciplined in plan development and execution
  • 13. 13 • Planning Process: “There needs to be a great deal of intentional discipline – a standard process that is predictable and executed every year. – February – Executive management team looks out a couple of years; invite experts of various types to participate in dialog – May – Have extended meeting with board to look forward; discuss performance – July – Update the strategy; offsite with board and executive management team – September – Updated strategy reflected in the budgets – Monthly and quarterly – Assess how well we are doing.” • Strategy Execution: “Key to execution is accountability. – Overall linkage is essential – strategic goals budget goals individual goals/incentive plans – Tie compensation to strategy. Some goals/aspects are easy since it’s meeting the numbers; some are more difficult to establish because they are more intangible – but they all need to be linked together.” Source: Interview with CEO, Diversified Financial Services Company (Banking and Specialty Finance), 2016 4 Minimizing Execution Risk continued
  • 14. 14 Closing Comments • It is essential that:  Leadership has confidence in the strategy  The strategy is understood across the bank  The strategy can be or is being executed. • Anything less makes dealing with headwinds extremely difficult. • Q&A With today’s external regulatory and competitive pressures and uncertain economic environment, building franchise value requires a well-thought out and agreed upon strategy.
  • 15. 15 Bill Walton Partner DHG Financial Services bill.walton@dhgllp.com D 404.575.8902 Suzanne Donner Director DHG Financial Services suzanne.donner@dhgllp.com D 404.681.8224
  • 16. 1 IT advisory Cybersecurity Update Rodney Murray, Principal IT Advisory
  • 17. 2 IT advisory Why are we talking Cyber? The Numbers • 4 trillion • 5% • 4 minutes • 100%
  • 18. 3 IT advisory Agenda • Brief Look at Data Breach Stats • Data Breach Causes and Results • Security Incidents – Common Scenarios • How can we prepare?
  • 20. 5 IT advisory 728 829 1099 1662 1531 1264 0 200 400 600 800 1000 1200 1400 1600 1800 2009 2010 2011 2012 2013 2014 Source: http://datalossdb.org/statistics Recent Statistics
  • 21. 6 IT advisory Recent Statistics 6% 8% 10% 11% 37% Financial Govt. & Public Sector Education Retail Healthcare Top 5 Sectors Breached by Number of Incidents Source: 2015 Symantec Internet Threat Report
  • 23. 8 IT advisory Recent Statistics Average Time to Identify a Breach 206 days Source: 2015 Verizon Data Breach Report Ransomware 113%
  • 24. 9 IT advisory Recent Statistics Breach Root Causes 2015 Malicious or Criminal Attack System Glitch Human Error Source: Ponemon Institute 2015 Cost of Data Breach Study 47% 24% 29%
  • 25. 10 IT advisory Recent Statistics Source: Hackmageddon.com Cyber Espionage 11% Hacktivisim 22% Cyber Crime 67%
  • 26. 11 IT advisory Recent Statistics Source: http://datalossdb.org/statistics
  • 27. 12 IT advisory Recent Known Breaches Kardashian website - Web application code deficiency - 663,270 names and email addresses Excellus Blue Cross Blue Shield - NY - May have started 2 years ago - 10 million records (names, DOB, SSN, credit cards) University of Virginia - Hack originating from China www.privacyrights.org
  • 28. 13 IT advisory Recent Known Breaches Ashley Madison - Hack originating from China but possible inside job - 37 million records (including names posted online) UCLA Health System - Did not take “basic” steps to encrypt data - 4.5 million records (names, DOB, SS#, credit cards) Office of Personnel Management – D.C. - 21.5 million social security numbers
  • 30. 15 IT advisory Social Engineering Attention User: Your email quota is almost exceeded. Starting from December 8th, we are migrating to new email interface. So we are currently doing maintenance on our server. Please visit page below to update your account and avoid losing your inbox. http://xxxxxxxxxxxx.com/data/allow.html Thank you. Technical Team
  • 32. 17 IT advisory Top 5 Assessment Findings - Technical Internet Service Provider connections Outdated security patches Voice over IP (telephone) lack of encryption Weak and default passwords Weak secondary device configurations
  • 33. 18 IT advisory Top 5 Assessment Findings - Social Weak physical site controls Response to phishing email - Provide logon credentials - Click on a bad link or attachment Response to vishing (accounting departments) Response to fake website
  • 34. 19 IT advisory Social Engineering - Physical Site Scenario - Printer vendor who is taking over toner cartridge supplies needs an inventory – behind teller line - General contracting company who won the bid to fix anything visible to the public – got access to bank vault - From AT&T looking at access issues - Fake letter if challenged - -
  • 35. 20 IT advisory Social Engineering – Vishing Scenarios - Known third party lender inquiring of the Accounting department for missing wire - Fictitious company starting a grant program, has “had discussions with the CFO” and needing a last minute wire transfer - Utility company on behalf of their customer regarding an “overdrafted account” - Third party IT support vendor - -
  • 36. 21 IT advisory Security Incident vs Data Breach Perception is Important – People use “breach” too frequently – You don’t want your customers or regulators to think you are subject to numerous breaches – “Breach” suggests something bad happened or is going to happen – “Breach” has legal significance • Incident Response Team should use “Security Incident” not “Breach” on internal communications
  • 37. 22 IT advisory Security Incidents – Common Scenarios
  • 38. 23 IT advisory Typical Security Incident Scenario “Houston we have a problem …”  Ransomware message  Malware incident that escalates  Network performance  Increase in suspicious emails  Notification from employees’ banks of suspicious account login activity
  • 39. 24 IT advisory Typical Security Incident Scenario “Time for action …”  Performs initial analysis and triage  Notifies IT service providers  Determines assistance is needed, scrambles to find an outside security specialist  “Tick, tock, tick, tock …” or “$, $, $, $...”
  • 40. 25 IT advisory Unanticipated Costs • Investigation Costs • Regulatory / Industry Fines or Penalties • Remediation / Infrastructure Change Costs • Mandatory Notification to Customers • Brand Damage
  • 41. 26 IT advisory How Can We Prepare?
  • 42. 27 IT advisory How Can We Prepare? Question – If someone was trying to breach your systems today … WHO WOULD BE THE FIRST TO NOTICE IT? Reducing risk will require investment …  Skillsets / resources  Software / hardware solutions  Third party relationships for monitoring  User Awareness
  • 43. 28 IT advisory How Can We Prepare? Assign Responsibility for Data Protection • CISO, CPO, CRO • Responsible for overseeing ongoing data protection program • Must Maintain Awareness of New Technologies and Their Risks
  • 44. 29 IT advisory How Can We Prepare? IT Risk Management • Management should understand what data they process and store • IT threats should be considered as part of the organizational risk management process • Consider mitigation, transfer, or elimination of risks
  • 45. 30 IT advisory How Can We Prepare? Strong Vendor Management Program • Include Security as Part of Vendor Evaluation Procedures • Conduct Ongoing Evaluation of Vendor Relationship • Disgruntled Employees • Remember Target’s Scenario
  • 46. 31 IT advisory How Can We Prepare? Strong Incident Response Program “Not if, but when …”  Roles and Responsibilities  Who owns the program?  Include PR and Legal Counsel as Part of Response Team  Ensure forensic skillset is available  Continued regulatory focus
  • 47. 32 IT advisory FFIEC Cybersecurity Assessment Tool (CAT) • New guidance finalized earlier this year – www.ffiec.gov/cyberassessmenttool.htm • “Repeatable and Measureable” • Incorporates principles from the FFIEC IT Examination Handbook • Two Parts: 1. Inherent Risk Profile 2. Cybersecurity Maturity
  • 48. 33 IT advisory FFIEC CAT – Role of Management & Board • Develop the plan to conduct the Assessment • Define the target state of cybersecurity preparedness • Oversee performance of monitoring and risk mitigation • Oversee changes to maintain or enhance targeted state of preparedness
  • 49. 34 IT advisory FFIEC CAT – 2. Cybersecurity Maturity Innovative Advanced Intermediate Evolving Baseline • 5 maturity levels are based upon sophistication, design, and effectiveness of controls • Critical controls include detective, preventative, and responsive
  • 50. 35 IT advisory Questions Rodney Murray, CISA, CRISC rodney.murray@dhgllp.com