Comments
Description
Transcript
P a g e 1
Page |1 International Association of Risk and Compliance Professionals (IARCP) 1200 G Street NW Suite 800 Washington, DC 20005-6705 USA Tel: 202-449-9750 www.risk-compliance-association.com Top 10 risk and compliance management related news stories and world events that (for better or for worse) shaped the week's agenda, and what is next Number Four ... It is the only number that has the same number of characters as its value in the English language. It is the smallest composite number that is equal to the sum of its prime factors. The smallest squared prime (p2). Francis Bacon believed that age appears to be best in four things; old wood best to burn, old wine to drink, old friends to trust, and old authors to read. Today, we can read that the European Systemic Risk Board (ESRB) General Board has identified four systemic risks as representing the most material threats to the stability of the EU financial sector: 1. An abrupt reversal of compressed global risk premia, amplified by low secondary market liquidity; 2. Weak profitability prospects for banks and insurers in a low nominal growth environment, amid incomplete balance sheet adjustments; 3. Rising of debt sustainability concerns in the public and non-financial private sectors, amid low nominal growth; _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) Page |2 4. Prospective stress in a rapidly growing shadow banking sector, amplified by spill over and liquidity risk. The first systemic risk, assessed to be the most significant of the four, materialises through a change in investor preferences in the developed financial markets and, most notably, in the United States, with an increasing aversion to holding long-term fixed income securities. This induces a portfolio reallocation towards short-term instruments, causing a rise in US long-term risk-free interest rates and risk premia across all financial asset classes. The first systemic risk acts as a trigger for the vulnerabilities related to the remaining three sources of risk. In the EU this would lead, in particular, to a weakening of domestic demand, a decline in property prices and a renewed widening of sovereign credit spreads, as well as to a sell-off by the shadow banking sector that would amplify the shocks to financial asset prices in the EU. We can read the above in an interesting paper: “Adverse macro-financial scenario for the EBA 2016 EU-wide bank stress testing exercise” _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) Page |3 This is not an easy to understand document, so you will need some time to go through the details. On the bright side, it is easier to understand from the doctoral dissertation of the German philosopher Arthur Schopenhauer “On the Fourfold Root of the Principle of Sufficient Reason / Über die vierfache Wurzel des Satzes vom zureichenden Grunde”. Read more at Number 3 below. Welcome to the Top 10 list. Best Regards, George Lekatis President of the IARCP General Manager, Compliance LLC 1200 G Street NW Suite 800, Washington DC 20005, USA Tel: (202) 449-9750 Email: [email protected] Web: www.risk-compliance-association.com HQ: 1220 N. Market Street Suite 804, Wilmington DE 19801, USA Tel: (302) 342-8828 _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) Page |4 Yves Mersch: Oral hearing of the Federal Constitutional Court Introductory statement of the European Central Bank by Mr Yves Mersch, Member of the Executive Board of the European Central Bank, at the Oral hearing of the Federal Constitutional Court in the OMT proceedings, Karlsruhe “You have once again invited the European Central Bank to provide its opinion, as an expert third party, on the decision of the Governing Council of the European Central Bank of 6 September 2012, whose compatibility with national constitutional law you are reviewing in these proceedings. This is the decision that approves the main parameters of the Eurosystem's outright monetary transactions on the secondary market for government bonds - so-called OMTs. European Union Agency For Network And Information Security Big Data Threat Landscape and Good Practice Guide The term Big Data is often used loosely to designate the palette of algorithms, technology and systems employed for collecting data of unprecedented volume and variety, and extracting value from them by massively parallel computation of advanced analytics. The sources of Big Data are many and diverse. Distributed multimedia sensors on the Internet of Things, mobile telecommunication devices and networks, distributed business processes, and Web-based applications are all candidate data providers/generators. As Big Data usage has increased over the years, the various algorithms, technologies, and systems are gradually reaching a level of development and maturity suitable for widespread adoption. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) Page |5 Adverse macro-financial scenario for the EBA 2016 EU-wide bank stress testing exercise The European Banking Authority (EBA) 2016 EU-wide stress testing exercise will require banks to use the presented outcome of the adverse macro-financial scenario for variables such as GDP, inflation, unemployment, asset prices and interest rates in order to estimate the potential adverse impact on profit generation and capital. The adverse scenario covers three years, starting from the first quarter of 2016, when the shocks are assumed to materialise, and ending in 2018. 2016 EU-wide stress test: Frequently Asked Questions The EU-wide stress test serves as a common foundation on which national authorities can base their supervisory assessment of banks’ resilience to relevant shocks, in order to identify residual areas of uncertainties, as well as appropriate mitigation actions. Moreover, the exercise strengthens market discipline, through the publication of consistent and granular data on a bank by bank level illustrating how balance sheets are affected by common shocks. The EU-wide stress test is initiated and coordinated by the EBA and undertaken in cooperation with the Competent Authorities (the Single Supervisory Mechanism for the euro area banks), the European Central Bank (ECB), the European Systemic Risk Board (ESRB) and the European Commission (EC). The 2016 exercise covers a sample of 51 banks representing about 70% of EU banks total assets. The EBA develops a common methodology that is applied by all the banks in the sample and checked by supervisors. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) Page |6 Building a sound global Islamic financial system Opening remarks by Dr Zeti Akhtar Aziz, Governor of the Central Bank of Malaysia (Bank Negara Malaysia), at the Islamic Financial Services Board (IFSB) - Meet the Members & Industry Engagement Session, Kuala Lumpur “It is my pleasure to welcome you to this Industry Engagement Session organised by the IFSB. Since its introduction in 2012, these sessions have drawn encouraging response from the members and the industry. Such an interface between the regulators, industry and the IFSB has become even more important in the current environment in which greater global attention is being accorded to the reform of prudential regulations.” PCAOB Launches Redesigned Website Optimized for Mobile Devices The Public Company Accounting Oversight Board launched a newly redesigned website at www.pcaobus.org that uses a responsive web design. The new PCAOB site scales to fit any screen: desktop, laptop, tablet, and smartphone. In addition to the responsive design, pcaobus.org features enhanced navigation. Visitors can get to the most popular pages within the PCAOB website using the new expandable navigation – the mega menu – at the top of any page. In addition, handy footer links at the bottom of every page also provide access to the most popular and important PCAOB content. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) Page |7 Regulatory landscape for 2016 - positioning for a dynamic, trusted and vibrant market Keynote address by Mr Ong Chong Tee, Deputy Managing Director (Financial Supervision) of the Monetary Authority of Singapore, at the SGX Equities Dialogue 2016, Singapore “2016 has started on a challenging note for global stock markets. The first trading week of this year alone saw global markets losing close to S$3 trillion, led by sharp declines in the Chinese stock market. The STI Index has fallen by more than 20% during the last 12 months to the lowest level since October 2011. Oil prices are testing lows last seen in 2004 and many other commodity prices are also under downward pressure. Banks and the German economy - will they continue to work hand in hand? Speech by Dr Andreas Dombret, Member of the Executive Board of the Deutsche Bundesbank, at the 4th Regensburger Wirtschaftsgespräch, Industrie- und Handelskammer (IHK) Regensburg, Regensburg. “Mark Twain once said, "A banker is a fellow who lends you his umbrella when the sun is shining, but wants it back the minute it begins to rain." I probably don't have to point out that bankers aren't, of course, like that well, at least most of them aren't. On the contrary, banks often play a very important role for enterprises and for the economy as a whole. They act as mediators between those who invest capital and those who need it.” _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) Page |8 Challenges for France's economy and financial sector in 2016 Mr François Villeroy de Galhau, Governor of the Bank of France, Paris “2016 has already been marked by volatility: weak financial markets and commodity prices, from China and the Middle East; political uncertainty in Europe, in Southern Europe, in Eastern Europe, North-Western Europe with the British referendum, and even in Central Europe with the refugee crisis. It is our duty to be vigilant, but we must also, on the one hand, distinguish real information from background noise and real challenges - and there are no shortages of them - from the sensational and sometimes excessive statements at this start of this year; on the other hand, in the face of current volatility, we must stick to our medium-term objectives.” Hearing at the Committee on Economic and Monetary Affairs of the European Parliament Introductory statement by Mr Mario Draghi, President of the European Central Bank, before the Hearing at the Committee on Economic and Monetary Affairs of the European Parliament, Brussels “In my remarks today, I will address in turn the global economic context, recent financial developments and the state of the euro area recovery. I will conclude by briefly presenting our most recent decision to disclose the Agreement on Net Financial Assets - or ANFA - as I know this topic is of concern to some of you.” _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) Page |9 Yves Mersch: Oral hearing of the Federal Constitutional Court Introductory statement of the European Central Bank by Mr Yves Mersch, Member of the Executive Board of the European Central Bank, at the Oral hearing of the Federal Constitutional Court in the OMT proceedings, Karlsruhe Mr Chairman, Distinguished members of the Second Senate, Introduction You have once again invited the European Central Bank to provide its opinion, as an expert third party, on the decision of the Governing Council of the European Central Bank of 6 September 2012, whose compatibility with national constitutional law you are reviewing in these proceedings. This is the decision that approves the main parameters of the Eurosystem's outright monetary transactions on the secondary market for government bonds - so-called OMTs. I am happy to accept this invitation. What has changed since the last oral hearing on 11 June 2013? The Court of Justice of the European Union has, on the basis of the facts provided by you, responded to the questions submitted to it for a preliminary ruling. The Court of Justice of the European Union, which is competent under the Treaties to interpret Union law and the validity of the acts of the Union's institutions, including the European Central Bank, found OMTs to be compatible with Union law: The European Central Bank did not exceed its monetary policy mandate either as regards the conditionality, the selectivity or the parallelism of OMTs nor as a circumvention of the limits and conditions laid down by the assistance programmes of the European Stability Mechanism - the so-called _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 10 ESM. The Court of Justice of the European Union followed the arguments put forward by the European Central Bank and confirmed that OMTs in view of their objectives and the instruments provided for achieving them, fall within the area of monetary policy and therefore within the powers of the Eurosystem. Monetary policy measures, such as OMTs, may have indirect effects on the stability of the euro area, without this leading to monetary policy measures being treated as equivalent to economic policy measures. The fact that the European Central Bank will take an independent monetary policy decision on the implementation of OMTs also excludes the possibility that the ESM's assistance programmes were circumvented. The Court of Justice of the European Union also confirmed that OMTs are proportional and that the European Central Bank, as regards the judicial review of these conditions, should be granted a broad discretion. As a result the European Central Bank was entitled to take the view that the purchase of government bonds on the secondary markets, in accordance with the conditions laid down on 6 September 2012, is likely to facilitate the monetary policy transmission mechanism and to safeguard the singleness of monetary policy. These conditions were characterised by the fact that the interest rates for government bonds in the various euro area Member States were highly volatile with extreme spreads, which were not caused by macroeconomic differences but by strong distortions of the government bond markets, largely due to the unfounded concerns of investors regarding the reversibility of the euro. OMTs do not go beyond what is required in order to achieve these objectives. They are not only strictly linked to their objectives, their volume is also - as the European Central Bank indicated in the last oral hearing - limited in several respects. The Court of Justice of the European Union also decided that OMTs do not breach the prohibition of monetary financing. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 11 In particular, the Court emphasised that OMTs do not remove the impetus for Member Stets to follow a sound budgetary policy. The Governing Council of the European Central Bank's draft decision and draft guideline on OMTs, which were already available on 6 September 2012, contain adequate safeguards to ensure that the intervention of the Eurosystem does not result in an effect equivalent to that of a direct purchase of government bonds from the public authorities and bodies of the Member States. I should like to cite a few examples. The European Central Bank's Governing Council decides on the scope, the start, the continuation and the suspension of the intervention on the secondary markets. In addition, a minimum period is observed between the issue of a security on the primary market and its purchase on the secondary market. Furthermore, any prior announcement concerning either its decision to carry out such purchases or the volume of purchases envisaged is precluded. There is therefore no certainty that government bonds will be purchased. What role does the European Central Bank see for itself in these oral proceedings in the light of this confirmation of its actions? The European Central Bank cannot make any statements on the compatibility of OMTs with national constitutional law as it has no competence in this regard. Nevertheless, the ECB's working assumption has always been that the Maastricht Treaty, which transferred monetary policy to the European Central Bank, has been declared as being compatible with national constitutional law. The European Central Bank is participating in this oral hearing in order to assist in clarifying any remaining questions, insofar as they are based on the subject matter of these proceedings, i.e. OMTs are covered but not other monetary policy measures. At the same time the European Central Bank's Governing Council must be _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 12 able to decide independently on future monetary policy, in order to fulfil its duty of maintaining price stability in the euro area, as the Senate has described in paragraph 32 of its order for reference. Mr Chairman, Distinguished members of the Second Senate, Following on from these introductory words I will focus on two points, which you identified in your communication with the European Central Bank as being significant: First, the timeliness and modalities for the implementation of OMTs; Second, the possible volume of OMTs and potential risks for the federal budget. Timeliness and modalities for the implementation of OMTs As regards the timeliness of OMTs, let me be quite clear: OMTs were developed in January 2012, to confront an extraordinary crisis situation. This crisis situation was characterised by massive distortions of the government bond market that developed their own momentum. This in turn led to a disruption of the monetary policy transmission mechanism, which posed a threat for price stability. With OMTs the Eurosystem substantiated one of the monetary policy instruments provided for under the Statute. It can be activated by the Governing Council, providing the conditions and the need for such action are present. The European Central Bank's Governing Council may activate OMTs under the following conditions, which must be met cumulatively: - The Governing Council of the European Central Bank must establish that the monetary policy transmission mechanism is impaired, in particular due to unfounded fears regarding the reversibility of the euro, and is leading to unwarranted spreads on the government bond markets. - The Member State whose government bonds will be sold on the _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 13 secondary market must participate in an appropriate ESM programme. Appropriate, in this context, means exclusively macroeconomic adjustment programmes or enhanced conditions credit lines, which facilitate primary market purchases on the government bonds market via a corresponding ESM facility. - The Member State whose government bonds are being purchased on the secondary market must comply with the strict conditionality and satisfactorily implement, as verified by the Governing Council of the European Central Bank, the programme. - The Member State whose government bonds are being purchased on the secondary market must have access, or be regaining access, to the government bonds market. This will also be verified by the European Central Bank's Governing Council. As regards the first condition, the impairments to the monetary policy transmission mechanism have noticeably declined, not least thanks to the monetary policy measures carried out by the European Central Bank, in particular the development of OMTs. The euro area is confronting a slow but steady recovery. Certain Member States that in 2011 and 2012 were subject to market overreactions are now seeing signs of positive growth. Irrespective of the fact that yields for government bonds have reacted in varying degrees to new economic developments, there has been a clear reduction in the yield spreads compared to the situation in 2012. It is not the aim of OMTs to harmonise interest rates regardless of the differences between Member States' macroeconomic or budgetary situation. Concerning the second condition, two euro area Member States are currently undergoing ESM macroeconomic adjustment programmes. However, none of these programmes allow primary market purchases through the ESM to the government bonds market. In conclusion, I can state that OMTs are in principle available as monetary _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 14 policy instruments. The conditions for their crisis and location-related activation are, however, not currently met. Possible volumes and potential risks for the federal budget With regard to the possible volume of OMTs it remains the case that no ex ante quantitative limits are set on the size of OMTs in order to prevent market participants from adjusting to this situation and using these instruments for their own purposes to the detriment of the effectivity of the monetary policy instruments put in place. Notwithstanding this, the possible volume of OMTs is in fact quantitatively limited to one to three-year government bonds, which are suitable for OMTs. Government bonds with a maturity of on to three years form only a small part of the entire volume of government bonds. The Court of Justice of the European Union has confirmed that it follows from this that the commitments that the European Central Bank enters into are, in fact, circumscribed and limited. In order to ensure that maturities are not significantly shortened, it is foreseen that the European Central Bank's Governing Council will closely monitor the maturity structure and the termination of new issues of government bonds in the concerned Member States. Thus the volume of OMTs is limited in a variety of ways. In assessing the potential risks of OMTs it should be taken into account that, in principle, the use of monetary policy instruments to maintain price stability entails financial risks for the Eurosystem. This applies not only to OMTs but also to main refinancing operations, to cite just one standard monetary policy instrument as an example. The Eurosystem uses main refinancing operations to make central bank money available to banks. In principle, these bank loans could also fail, even though the risk of this occurring is slight. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 15 Therefore, the European Central Bank's Governing Council limits these risks, by requiring the provision of collateral for main refinancing operations. The European Central Bank's Governing Council has also taken precautions with regard to OMTs in order to limit the Eurosystem's financial risk. This is done, in particular, by applying a requirement of strict conditionality and the monitoring of the satisfactory implementation of the programme. This strict conditionality, compliance with which is to be independently assessed by the European Central Bank from the monetary policy perspective, ensures that the Member States concerned apply sufficient budgetary discipline and carry out structural reforms, to achieve a sustainable budgetary position. For the implementation of OMTs, as for other monetary policy operations of the European Central Bank, creditworthiness and risk management rules apply. In this way an excessive default risk is avoided. It should be added, that the European Central Bank will not carry out any purchases using OMTs during the review of an ESM assistance programme. This also ensures that market conditions are not directly influenced by European Central Bank purchases whilst the programme is being assessed by the Troika. The comparison between OMTs and main refinancing operations demonstrates that the financial risks of various monetary policy instruments differ as to their degree but not as regards their principle nature. Thus the Court of Justice of the European Union held in its judgment that the precautions foreseen for OMTs are likely to reduce the risk of losses. It also recalled that a central bank, such as the European Central Bank, has a duty to take decisions that, like open market transactions, inevitably involve a risk of floss. With regard to the necessity mentioned in the hearing outline, in connection with the potential risks of OMTs for the federal budget, for a _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 16 recapitalisation of the Bundesbank, I would confirm the position of the European Central Bank that was provided in the last oral hearing. As far as I am aware, under German law there is no obligation for the federal government to recapitalise the Bundesbank, even when its losses are of such a magnitude that its equity base is threatened. Such a "default liability" can also not be deduced as a general rule under Union law in respect of the individual Member States when the central bank's equity is drastically reduced. In accordance with the principle of financial independence as established by Article 130 of the Treaty on the Functioning of the European Union it follows that a central bank must permanently have adequate equity available to fulfil its monetary policy tasks within the Eurosystem. However, this does not mean that every loss must be immediately and fully offset by private or public shareholders or the Member States. A central bank can in the short and medium-term, even with reduced or negative equity, fulfil its Eurosystem monetary policy tasks. In this respect a reduced or negative equity does not preclude from the outset an orderly and stability-oriented monetary policy. Only when this situation continues for too lengthy a period - the European Central Bank's last Convergence Report spoke of "a prolonged period of time" - would doubts arise as to whether the central bank can still adequately fulfil its Eurosystem monetary policy tasks. Only in such an extreme case - and exclusively in this case - would they be recapitalised, not immediately, but - again in the words of the European Central Bank's Convergence Report - "within a reasonable period of time". Conclusion Mr Chairman, Distinguished members of the Second Senate, I and my colleagues are at your disposal for further questions on these and other issues. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 17 European Union Agency For Network And Information Security Big Data Threat Landscape and Good Practice Guide Executive Summary The term Big Data is often used loosely to designate the palette of algorithms, technology and systems employed for collecting data of unprecedented volume and variety, and extracting value from them by massively parallel computation of advanced analytics. The sources of Big Data are many and diverse. Distributed multimedia sensors on the Internet of Things, mobile telecommunication devices and networks, distributed business processes, and Web-based applications are all candidate data providers/generators. As Big Data usage has increased over the years, the various algorithms, technologies, and systems are gradually reaching a level of development and maturity suitable for widespread adoption. Experience has shown that Big Data applications can provide a dramatic increase in the efficiency and effectiveness of decision-making in complex organizations and communities. It is expected that it will constitute an important part of a thriving data-driven economy, with applications ranging from science and business to military and intelligence. However, besides its benefits or in some cases because of them, Big Data also bears a number of security risks. Big Data systems are increasingly becoming attack targets by threat agents, and more and more elaborate and specialized attacks will be devised to exploit vulnerabilities and weaknesses. This Threat Landscape and Good Practice Guide for Big Data provides an overview of the current state of security in the Big Data area. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 18 In particular, it identifies Big Data assets, analyses exposure of these assets to threats, lists threat agents, takes into account published vulnerabilities and risks, and points to emerging good practices and new researches in the field. To this aim, ongoing community-driven efforts and publicly available information have been taken into account. The study analyses threats to all identified Big Data asset classes. Highlights include: Big Data threats include, but are not limited to, threats to ordinary data. The high level of replication in Big Data storage and the frequency of outsourcing Big Data computations introduce new types of breach, leakage and degradation threats that are Big Data-specific. Big Data is having significant privacy and data protection impacts. The creation of links at data collection (a.k.a. “ingestion”) time is a key requirement for parallelization – and therefore performance - of Big Data analytics, but the additional information it creates may increase the impact of data leakages and breaches. The interests of different asset owners (e.g., data owners, data transformers, computation and storage service providers) in the Big Data area are not necessarily aligned and may even be in conflict. This creates a complex ecosystem where security countermeasures must be carefully planned and executed. As in many other areas of ICT, starting to apply basic privacy and security best practices would significantly decrease overall privacy and security risks in the Big Data area. At this still early stage of this emerging paradigm, embracing the Security-by-default principle can prove to be both highly practical and beneficial; as opposed to the cost and effort required to provide ad hoc solutions later on. This guide finally provides a gap analysis presenting a comparison between identified Big Data threats and identified Big Data countermeasures. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 19 In this context, the lack of current Big Data countermeasures and pressing needs in the development of next-generation countermeasures are discussed. In particular, the question arises of the trend of current countermeasures of adapting existing solutions against traditional data threats to the Big Data environments, mostly focusing on the volume of the data. This practice mainly targets scalability issues and clearly does not fit the Big Data peculiarities (5V- Volume, Variety, Value...) resulting in partial and ineffective approaches. A set of recommendations for next-generation countermeasures concludes the guide. Among these recommendations, we remark: i) to depart from current approaches for traditional data, defining Big Data-specific solutions, ii) to identify gaps and needs for current standards, planning the definition of standardization activities, iii) to focus on training of specialized professionals, iv) to define tools for security and privacy protection of Big Data environments, v) to clearly identify Big Data assets simplifying the selection of solutions mitigating risks and threats. Aligning to its mandate ENISA published two more reports studying the impact of Big Data in the more specialized areas of data protection and privacy (“Privacy by design in big data”4) and critical infrastructures. 1. Introduction In this reports ENISA elaborates on threats related to Big Data, a technology that has gained much traction in recent years and is expected to play a significant role affecting various aspects of our sociatey, ranging from health, food security, climate and resource efficiency to energy, intelligent transport systems and smart cities. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 20 The European Commission has acknowledged the potential impact of Big Data in a “thriving data-driven economy” by outlining a strategy on Big Data. According to estimates, the value of just personal data of EU citizens has “the potential to grow to nearly €1 trillion annually by 2020” (sic). It is thus conceivable that data will continue to be a significant economic drive. But also in science and research Large and nowadays Big Data continue to proliferate and many agencies and institutions in Europe and around the globe have or are planning to launch Big Data projects to facilitate scientific data analysis and exploitation. Big Data technologies are also being used in military applications; such as fighting terrorism; assisting in combat; gathering and analysing intelligence from heterogeneous sources, including battlefield data and open sources. In addition, many existing data intensive environments have in recent years adopted a Big Data approach. To name just a few examples, Facebook is thought to store one of the biggest datasets worldwide, storing more than 300 petabytes of both structured and unstructured data; Twitter recently decided to tap directly into its own raw data using Big Data analytics and the world’s telecommunications capacity was already by 2007 near 65 Exabytes (without signs of this trend declining); straining existing storage and analytic processes and technologies. Given that Big Data approaches make use of extremely novel and high tech ICT systems, with little time to mature against cyber-attacks it is not suprising that attacks are showing an increased trend in both number, sophistication and impact. But because of the loose use of definitions and the unwillingness of affected organizations to disclose attack data, accurate estimates are not easy to come up with. Additionally, as more and more businesses and organizations venture into the Big Data field, attackers will have more incentives to develop specialized attacks against Big Data. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 21 Somewhat paradoxically, Big Data approaches can also be used as a powerful tool to combat cyber threats by offering security professionals valuable insigts in threats and incident management. Being an ENISA deliverable in the area of Threat Landscape, this report constitutes a detailed threat assessment in the area of Big Data, based on input from the ENISA Threat Landscape activities. The rationale behind this piece of work is to “deepen” the generic threat assessment by taking into account the specificities of Big Data. Policy context Threat analysis and emerging trends in cyber security are an important topic in the Cyber Security Strategy for the EU. Moreover, the new ENISA regulation highlights the need of analysing current and emerging risks and dictates that “the Agency, in cooperation with Member States and, as appropriate, with statistical bodies and others, collects relevant information”. More specifically, it is stated that it should “enable effective responses to current and emerging network and information security risks and threats”. To this end the ENISA Work Programme 2015 included this study on “Big Data Threat Landscape and Good Practice Guide” as one of this year’s deliverables (“WPK1.1-D2: Risk Assessment on two emerging technology/application areas” that focuses on Big Data). The report aims to identify emerging trends in cyber-threats and to provide a concise state of the art analysis of the cyber threat and security issues of Big Data; consolidating existing and open literature and available information, and contributing to a cyber security public and private initiatives by addressing industry concerns in the area.. 1.1 Scope This report contributes to the definition of a threat landscape, by providing an overview of current and emerging threats applicable to Big Data technologies, and their associated trends. Several Big Data definitions exist in the literature and the area is constantly being shaped by advantages in methods, tools, and new applications, thus it _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 22 is not possible to take into consideration all Big Data systems. The research done focuses on assets, threats and controls applicable to prominent, important and/or widely used 1.2 Big Data systems. The goal is to deepen our understanding of the threats that affect Big Data and to provide good practices and recommendations for those threats that are considered important or emerging. 1.3 Target audience It is expected that this report will be useful for performing detailed Risk Assessments (RA) and Risk Management (RM) by Big Data providers and operators according to their particular needs and for Big Data consumers in drafting their SLAs. The asset and threat taxonomies presented here are to be expanded by asset owners, based on the particular Big Data system instantiation at hand, before being used as input to RA/RM and cyber threat exposure analysis. Moreover, the presented Big Data threat landscape will be of use to policy-makers for understanding the current state of threats and respective mitigation practices and measures in the area. Further, the extensive research of relevant existing literature in Big Data security and threat research means this study will be of particular interest to researchers and institutions working in the field. 1.4 Methodology This study and its outcome are based on desk research and review of conference papers, articles, technical blogs and a variety of other open sources of information relevant to Big Data. This report identifies the majority of sources consulted; the details of all documentary sources consulted during this study are available on request. More than one hundred documentary sources were identified through a number of search methods, including specialist search engines for academic sources and journal articles. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 23 The sources collected are all in English. The overall work went through a three-step process as follows: The first step “Information collection” was about the identification and collection of relevant information, in particular the assets and threats. The second step “Assessment, Guidelines and Gap Analysis” performed an analysis about the collected information to identify current and emerging trends and then elaborated countermeasures in a Big Data scenario. The third step “Good practices definition” was focused on findings, current practices, and needs that formalized the Big Data threat landscape report. A final note, all referenced web resources were last accessed in November 2015. 1.5 Structure of this document The structure of document is as follows: in section 2 we define Big Data and describe an abstract architecture upon which the study is based; in section 3 we present an asset taxonomy for Big Data; in section 4 we identify threats against Big Data, based on the threat taxonomy used by ENISA in “Threat Landscape and Good Practice Guide” reports, and map these threats to Big Data assets; in section 5 we consider which threat agents are more relevant to Bog Data attacks; in section 6 we present a set of recommendations and good practices for Big Data; we conclude in section 7 with a gap analysis. In addition 6 annexes are provides at the end of the report. Annex A contains the Big Data asset taxonomy in full depth; including all identified asset groups, asset types, assets and asset details. Annex B contains the detailed Big Data asset taxonomy diagram. Annex C contains the Big Data threat taxonomy in full detail; including all identified threat groups/types correlated to threat agents and affected Big Data assets. Annex D contains the detailed Big Data threat taxonomy diagram. Annex E contains a concise presentation on how Big Data analytics can assist security professionals in analysing threats and attacks and detecting _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 24 intrusion and fraud cases. Annex F contains a summary of existing threat taxonomies, which were used along with ENISA’s threat taxonomy to drive this study. 2. Big Data Environments The term Big Data describes the vast amount of data in our information-driven world. In a 2001 research report and related lectures, the META Group (now Gartner) defined the data growth challenges and opportunities as being three-dimensional, i.e. increasing Volume (amount of data), Velocity (speed of data in and out), and Variety (range of data types and sources). Gartner, and then the industry, used this "3Vs" model for describing Big Data: "Big data is high volume, high velocity, and/or high variety information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.”. Additionally, some new Vs have been added by some organizations to further define Big Data: "Veracity" (data authenticity since the quality of captured data can vary greatly and an accurate analysis depends on the veracity of source data), “Variability” (data meaning is often changing, and the data can show inconsistency at times, and this can hamper the process of handling and managing the data effectively) and “Value” (the potential revenue of Big Data). This being a developing field, several other alternative or complenetary definitions have been proposed, in an effort to capture different nuances attributed to Big Data; such as its evolutianary nature: “datasets whose size is beyond the ability of typical database software tools to capture, store, manage, and analyze.” (sic). Given that the field is still not mature, for the purposes of this report we take into account the different ways Big Data is defined. While a great scientific opportunity exists with Big Data, this growth is outpacing the technological advances in computational power, storage, analysis and analytics. Furthermore a real concern is arising about the security of this massive amount of digital information, the data protection and privacy issues, and _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 25 the protection of the (critical) infrastructure supporting it. 2.1 Big Data architecture The architecture is a high-level conceptual model that facilitates the discussion of security requirements in Big Data and introduces the terminology used in this report. It does not represent the system architecture of a specific Big Data system, nor it is tied to any specific vendor products, services, or reference implementation, but rather it is a tool for describing some common Big Data components; i.e. the Big Data environment. In our vision the notion of Big Data architecture can be detailed into five layers: “Data sources”, “Integration process”, “Data storage”, “Analytics and computing models“, “Presentation”. The function of each layer is as follows: The “Data sources” layer consists of disparate data sources, ranging from sensor streaming data, to structured information such as relational databases, and to any sort of unstructured and semi-structured data. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 26 The “Integration process” layer is concerned with acquiring data and integrating the datasets into a unified form with the necessary data pre-processing operations. The “Data storage” layer consists of a pool of resources such as distributed file systems, RDF stores, NoSQL and NewSQL databases, which are suitable for the persistent storage of a large number of datasets. The “Analytics and computing models” layer encapsulates various data tools, such as Map Reduce, which run over storage resources and include the data management and the programming model. The “Presentation” layer enables the visualisation technologies. Cloud computing can be deployed as the infrastructure layer for Big Data systems to meet some infrastructure requirements, such as cost-effectiveness, elasticity, and the ability to scale up or down. 3. Big Data assets Assets can be abstract assets (like processes or reputation), virtual assets (for instance, data), physical assets (cables, a piece of equipment), human resources, money”. An item of our taxonomy is either a description of data itself, or describes assets that generate, process, store or transmit data chunks and, as such, is exposed to cyber-security threats. For information security considerations, this study focuses on assets that are related mainly to information and communication technology (ICT) under the scope of Big Data. A major source of information for this study is the work made by the NIST Big Data Public Working Group (NBD-PWG), which is developing consensus on important and fundamental questions related to Big Data. They have produced two draft Volumes (Volume 1 about Definitions and Volume 2 about Taxonomy). Another source of information is the report “Big Data Taxonomy”, issued by Cloud Security Alliance (CSA) Big Data Working Group in September 2014. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 27 In that document, CSA proposes a six-dimensional taxonomy for Big Data, pivoted around the nature of the data to be analysed. The objective is to help “navigate the myriad choices in compute and storage infrastructures as well as data analytics techniques” and the proposed structure is mainly intended as a high-level taxonomy for decision makers. Specifically, most of the terminology used in this report for high level asset types (Data, Infrastructure, Analytics, and Security and Privacy techniques) comes, with some small modifications, from the CSA taxonomy; where our term Infrastructure also comprises of the other two CSA main categories; viz. Compute Infrastructure and Storage Infrastructure. Another high-level type, Roles, comprises human resources and other related assets, as in previous ENISA thematic studies. 3.1 Big Data asset taxonomy _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 28 The full list of identified the Big Data assets is given in Annex A. 3.2 Big Data asset categories With the following list we attempt to identify some of the known Big Data valuable assets in a hierarchical manner. The first and second level category items (asset group and asset type) can be thought of as intuitively clear, but we give a brief description of them nevertheless. The full taxonomy, with further levels in the taxonomy such assets and asset details, is presented in Annex A. Data – This is the core category of the Big Data taxonomy and includes: Metadata, i.e. schemas, indexes, data dictionaries and stream grammars’ data (which often but not necessarily come together with stream data). Structured data, i.e. database records structured according to a data model, as for example a relational or hierarchical schema; structured identification data, as for example users’ profiles and preferences; linked open data; inferences and re-linking data structured according to standard formats. Semi-structured and unstructured data, for example logs, messages and web (un)formatted data (Web and Wiki pages, e-mail messages, SMSs, tweets, posts, blogs, etc.), files and documents (e.g. PDF files and Office suite data in Repositories and File Servers), multimedia data (photos, videos, maps, etc.), and other non-textual material besides multi-media (medical data, bio-science data and raw satellite data before radiometric/geometric processing, etc.). Streaming data, i.e. single-medium streaming (for example in-motion sensor data) and multimedia streaming (remote sensing data streams, etc.). Volatile data, i.e. data that are either in motion or temporarily stored, as, for example, network routing data or data in devices’ random access memory. Infrastructure – The term infrastructure comprises software, hardware resources denoting both physical and virtualized devices, the basic computing infrastructure with its batch and streaming processes and the storage infrastructure with all sort of database management systems, ranging from old-style relational databases to NoSQL or NewSQL, as well _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 29 as Semantic Web tools. Specifically, the Infrastructure first level category includes: Software, including operating systems, device drivers, firmware, server-side software packages (as Web and Application Server software) and applications. Applications sub-category includes software implementation as back-end services and all sorts of functionalities that utilize other assets in order to fulfil a defined task, such as for example asset management tools, requirements gathering applications, billing services and tools to monitor performances and SLAs. Hardware (physical and virtual), i.e. servers (physical devices and hardware nodes, all the virtualized hardware, including virtual Data Centres with their management consoles and virtual machines, as well as the physical hardware supporting their provisioning), clients, network devices (for example, physical switches, virtual switches and virtual distributed switches, etc.), media and storage devices (the various types of disk storage, etc.), data gathering devices (sensors, remote platforms as airborne platforms or drones, etc.), Human Interface Devices (HID) and mobile devices. Computing Infrastructure Models, this category includes paradigms of abstract processing architectures, on whether the processing can be done in batch mode, for example MapReduce; on real-time/near real- time streaming data, as for example Sketch or Hash-based models; or follow a unified approach supporting both, as for example Cloud Dataflow. Storage Infrastructure Models, this category includes paradigms of abstract storage architectures, including Big Files and triples-based models. Big Data Analytics – This category includes models which define protocols and algorithms for Big Data analysis, like procedures, models, algorithms definitions down to the source code, and analysis’ results. The category includes: Data analytics algorithms and procedures, which include algorithm source code with their set-up parameters, configuration and thresholds, metrics, the model definitions, advanced techniques that streamline the data preparation stage of the analytical process. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 30 Analytical results, either in textual or in graphical mode (e.g. spatial layouts, abstract, interactive and real time visualizations). Security and Privacy techniques – This category name includes the term “techniques” to remark that the security-related assets it includes are the ones of interest to attackers and therefore more subject to unauthorized disclosure and leakage, as for example security best practice documents, cryptography algorithms and methods, information about the access control model used, etc. The category includes the following sub-categories: Infrastructure Security, i.e. the first aspect of a Big Data ecosystem security, which deals with how to secure the distributed computation systems and the data stores, with security Best Practices and policy set-ups. Data Management, i.e. documents and techniques about how to secure Data Storage and Logs, and documentation about granular audits and data life cycle (Data provenance). Integrity and reactive security, which deals with all the practices, techniques, and documents related to End Point validation and filtering and the monitoring of real-time security, including incident handling and information forensics. Data Privacy, i.e. all the techniques put in place to protect privacy as it is requested by law, for example cryptographic methods and access control. Roles - This terminology for this category was introduced by the NIST Big Data Public Working Group and includes: Data provider, such as enterprises, organizations, public agencies, academia, network operators and end- users. Data consumer, partly overlapping the previous category, but from a different scope, and including enterprises, organizations, public agencies, academia and end-users. Operational roles, i.e. system orchestrators (business leader, data scientists, architects, etc.), Big Data application providers (application and platform specialists), Big Data framework providers (Cloud provider personnel), security and privacy specialists, technical management (in-house staff, _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 31 etc.). We remark that leaving the taxonomy unbalanced (some sub trees, like those rooted in Data and Infrastructure are deeper than others) is a deliberate choice. Indeed some leaf subcategories of our taxonomy, such as Models definitions, could be used to integrate external taxonomies designed for different reasons, such as data science ones. Another remark is that most of the categories and sub-categories could be related to data, rather than Big Data. For example, relational databases are a very typical and common resource in every enterprise infrastructure, not necessarily storing big data volumes. Even when relational databases have big volume size, they are often manageable through traditional hardware clusters, appliances and software tools. Another example is applications’ random-access memory (featured in volatile data category), i.e. the data that is temporarily in memory due to processing operations. This memory is often (though not invariably, as witnessed by the success of in-memory processing systems) not large, compared to massive data sizes of in-memory databases. Nevertheless, we included these assets in our taxonomy for completeness of information. Data stored in relational databases, often very valuable for data owners, might be used in some cases as data source for analytics, while leakage of RAM content could compromise login credentials and cryptographic keys, paving the way to dangerous attacks to Big Data. The presented asset taxonomy should only be considered as a snapshot of the complex range of Big Data assets and could as such not be exhaustive. 4. Big Data threats 4.1 ENISA threat taxonomy _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 32 In this section, we introduce the major characteristics of the ENISA threat taxonomy. The ENISA taxonomy is a comprehensive one, with a special focus on cyber-security threats; i.e., threats applying to information and communication technology assets. Additional non-ICT-stemming threats have been considered to cover threats to physical assets and also both natural disasters [not directly triggered by humans] and environmental disasters directly caused by human. The threat taxonomy has been developed by the ENISA Threat Landscape (ETL) Group and is a consolidation of threats previously considered in other thematic reports and extensive research. The taxonomy includes threats applicable to the Big Data assets and only these are depicted in figure 4-1. In the following subsection, threats specific to Big Data that were identified through extensive literature that have been assigned to the relevant categories defined in ENISA’s Threat Taxonomy are mapped to the previously discussed Big Data Asset Taxonomy. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 33 4.2 Mapping threats to Big Data assets _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 34 In this section, we discuss the threats that can be mapped to the Big Data asset taxonomy presented in the previous chapter. This analysis is based on an extensive review of actual threat incidents and attacks to Big Data presented in articles, technical blogs, conference papers, as well as online surveys for gathering supplemental information. Our review was driven by the ENISA generic threat taxonomy presented in the previous section. In general terms, threats, such as network outage or malfunctions of the supporting infrastructure, may heavily affect Big Data. In fact, since a Big Data has millions of pieces of data and each piece may be located in a separate physical location, this architecture leads to a heavier reliance on the interconnections between servers. Past ENISA thematic reports have dealt in depth with threats such as outages and malfunctions, which affect network communication links. For this reason, in this report, we don’t take these threats into account. Also, we chose not to dwell on physical attacks (deliberate and intentional), natural and environmental disasters, and failures / malfunction (e.g. malfunction of the ICT supporting infrastructure), since their effects are strongly mitigated by the intrinsic redundancy of Big Data, though Big Data owners deploying their systems in private clouds or other on-premise infrastructure should take these attacks under serious consideration . In general, a threat is “any circumstance or event with the potential to adversely impact an asset through unauthorized access, destruction, disclosure, modification of data, and/or denial of service”. Given the definition we gave of Big Data (Volume, Velocity, Variety, Veracity, Variability and Value), a threat to a Big Data asset can be considered as any circumstance or event that affects, often simultaneously, big volumes of data and/or data in various sources and of various types and/or data of great value. We also identify two different sub-categories of threats: “Big Data Breach” and “Big Data Leak”, orthogonal to the used threat taxonomy. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 35 A breach occurs when “a digital information asset is stolen by attackers by breaking into the ICT systems or networks where it is held/transported”. We can define “Big Data Breach” as the theft of a Big Data asset executed by breaking into the ICT infrastructure. A Big Data Leak on the other hand, can be defined as the (total or partial) disclosure of a Big Data asset at a certain stage of its lifecycle. A Big Data Leak can happen for example in inadequate design, improper software adaptation or when a business process fails. In terms of the attacker model, a Big Data Breach requires pro-active hostile behaviour (the break-in), while a Big Data Leak can be exploited even by honest-but- curious attackers. 4.2.1 Threat Group: Unintentional damage / loss of information or IT assets This group includes Information leakage or sharing due to human errors, unintentional intervention or erroneous use of administration of systems (misconfiguration), loss of devices. Threat: Information leakage/sharing due to human error Accidental threats are those not intentionally posed by humans. They are due to misconfiguration, skill- based slips and clerical errors (for example pressing the wrong button), misapplication of valid rules (poor patch management, use of default user names and passwords or easy-to-guess passwords), and knowledge-based mistakes (software upgrades and crashes, integration problems, procedural flaws). Information leakage due to misconfiguration can be a common problem: according to a recent study, erroneous system administration setups led to numerous weaknesses in four different Big Data technologies; viz. Redis, MongoDB, Memcache and ElasticSearch. According to the same study most of these new products “are not meant to be exposed to the Internet. [...] These technologies' default settings tend to have no configuration for authentication, encryption, authorization or any other type of security controls that we take for granted. Some of them don't even have a built-in access control.” _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 36 Furthermore, in the past, there have been reported incidents of inappropriate sharing of files containing possible sensitive and confidential information, which affected even very popular online services like Dropbox. This is also confirmed by many surveys. The assets targeted by these threats include asset group “Data”, and asset “Applications and Back-end services” (such as for example “Billing services”). Threat: Leaks of data via Web applications (unsecure APIs) Various sources claim that Big Data is often built with little security. New software components are usually provided with service-level authorization, but few utilities are available to protect core features and application interfaces (APIs). Since Big Data applications are built on web services models, APIs may be vulnerable to well-known attacks, such as the Open Web Application Security Project (OWASP) Top Ten list, with few facilities for countering common web threats. The security software vendor Computer Associate (CA) and other sources report data breaches, due to insecure APIs, in many industries, especially in social networks, mobile photo-sharing and video-sharing services, as Facebook, Yahoo and Snapchat. For example, a threat of this category may consist in injection attacks to Semantic Web technologies through SPARQL code injection. Security flaws are rather common in new Big Data languages like SPARQL, RDQL (both are read-only query languages) and SPARUL (or SPARQL/Update, which has modification capabilities). The use of these new query languages introduces vulnerabilities already found in a bad use of old-style query languages, since attacks like SQL, LDAP and XPath injection are already well known and still dangerous. Libraries of these new languages provide tools to validate user input and minimize the risk. However, “main ontology query language libraries still do not provide any _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 37 mechanism to avoid code injection” and without these mechanisms, attackers’ arsenal might get enhanced with SPARQL, RDQL and SPARQL injections. Other new Big Data software products, as for example Hive, MongoDB and CouchDB, also suffer from traditional threats such as code execution and remote SQL injection. The assets targeted by these threats belong to group “Data” and asset type “Storage Infrastructure models” (such as “Database management systems (DBS)” and “Semantic Web tools”) Threat: Inadequate design and planning or incorrect adaptation Techniques for improving Big Data analytics performance and the fusion of heterogeneous data sources increase the hidden redundancy of data representation, generating ill-protected copies. This challenges traditional techniques to protect confidentiality51 and the effect of redundancy must be taken into account. As already stated, Big Data redundancy can be seen as a threat mitigation technique for physical attacks, disasters and outages, however in some cases it signals a system weakness, being a risk booster for Big Data leaks. In other words, if our Big Data storage replicates data records ten times and distributes the copies to ten storage nodes for some reason (e.g., to speed up the analytics pipeline), the ten nodes may end up with different levels of security robustness (e.g., different security software versions) and this will increase the probability of data disclosure and data leaks. This can be considered a specific weakness of Big Data designs. On the other hand we can also note that even the redundancy and the replication that are necessary features to enhance Big Data functionality, are not always a failsafe against data loss. For example Hadoop, the well-known framework for Big Data processing, replicates data three times by default, since this protects against inevitable failures of commodity hardware. However, a corrupted application could destroy all data replications. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 38 Also, recent studies put forward the idea that Hadoop redundancy could even be a non-linear risk booster for Big Data leakages. Even the design of the Hadoop Distributed File System (HDFS) signals problems as reported by literature. HDFS is the basis of many Big Data large-scale storage systems and is used by social networks. HDFS clients perform file system metadata operations through a single server known as the Namenode, and send and retrieve file system data by communicating with a pool of nodes. The loss of a single node should never be fatal, but the loss of the Namenode cannot be tolerated. Big social networks, such as Facebook, suffered this problem and took countermeasures against the threat (Hadoop installed at Facebook includes one of the largest single HDFS cluster, more than 100 PB physical disk space in a single HDFS file system). One more threat related to the design is the lack of scalability of some tools. For example NIST reports that original digital rights management (DRM) techniques were not built to scale and to meet demands for the forecasted use of the data and “DRM can fail to operate in environments with Big Data characteristics— especially velocity and aggregated volume”. The assets that are targeted by these threats belong to asset groups “Data” and “Big Data analytics”, and to asset types “Software”, “Computing Infrastructure models“ and “Storage Infrastructure models”. 4.2.2 Threat Group: Eavesdropping, Interception and Hijacking This group includes threats that rely on alteration/manipulation of the communications between two parties. These attacks do not require installing additional tools or software on the victims’ infrastructure. Threat: Interception of information A common issue that affects any ICT infrastructure is when offenders can _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 39 intercept communications between nodes by targeting the communication links. Various sources claim that inter-node communication with new Big Data tools is often unsecured, that it is not difficult to hijack a user session or gain unauthorized access to services in social networks as Facebook and Twitter, and that there is evidence of flaws in communication protocols. Big Data software distributions (for example Hadoop, Cassandra, MongoDB, Couchbase) rarely have the protocols that ensure data confidentiality and integrity between communicating applications (e.g., TLS and SSL) enabled by default or configured properly (e.g., changing default passwords). The assets targeted by this threat belong to asset groups “Data” and “Roles”, and to asset “Applications and Back-end services”. 4.2.3 Threat Group: Nefarious Activity/Abuse This group includes threats coming from nefarious activities. Unlike the previous group, these threats (often) require the attacker to perform some actions altering the victims’ ICT infrastructure; usually with the use of specific tools and software. Threat: Identity fraud Big Data systems store and manage credentials for accessing personal data and financial accounts with information such as credit card numbers and payment and billing details, which are targets for cyber criminals. Big Data systems also store profiling data that can describe user behaviour, preferences, habits, travel, media consumption at a high degree of detail, and may help attackers in more elaborate forms of impersonation fraud, creating big opportunities for identity thieves. Since most Big Data systems are built on top of cloud infrastructure, a threat to users’ identity is, for example, when the control of a system interface, in either a Big Data system based on a large public cloud or in a widely used private cloud, gets lost. A successful attack on a console grants the attacker complete power over the victim's account, including all the stored data. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 40 The control interfaces could be initially compromised via novel signature wrapping and advanced XSS techniques, then privilege escalation may lead to identity fraud. While in traditional information systems the loss of control of a console interface could cause limited information leakage, in Big Data the effect is amplified and the impact is more severe. Social engineering is not a new issue, but as social networking becomes important both for home users and businesses, attacks often involve social engineering. Attackers have been abusing social networks since they first came online. For example, XSS vulnerabilities on Twitter have been used to push malicious and fake tweets, while Internet malware has emerged on Facebook as a means of promoting malicious profiles. The assets targeted by these threats are “Personal identifiable information”, “Applications and Back end services” (such as, for example, “Billing services”) and “Servers”. Threat: Denial of service Big Data components can be threaten by traditional denial of service (DoS) and distributed denial of service (DDoS) attacks. For example, such attacks may remove Big Data components from the network and then exploit its vulnerabilities or an attacker could exhaust the limited resources in a Hadoop cluster, leading to a significant decrease of system performance and causing the loss of the targeted resource to other cloud users. But, at the same time, countering mechanisms have been developed for/using Big Data systems. For example administrators of Hadoop infrastructure can deploy specialized components to track DDOS attacks. In the past this kind of attacks has led to some service outages for Amazon distributed storage, through elevated levels of authenticated requests and account validation. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 41 Furthermore, as already stated, also specific attacks against social networks such as Facebook have been mounted, exploiting some weaknesses of the Hadoop Distributed File system, for example the Namenode single server. Assets targeted by this threat include the asset “Servers” (viz. Virtualized Data Centre”, “Physical Machine” and “Virtual Machine”) and the asset “Network”. Threat: Malicious code / software / activity These very generic threats affect almost all the ICT components of an infrastructure. Examples of these threats are: i) exploit kits, which allow virus and malware infections, ii) worms, which may be distributed by using the network to send copies to other nodes, iii) Trojans, which are pieces of malware that facilitate unauthorized access to a computer system, iv) backdoors and trapdoors, which are undocumented entry points into a computer program, generally inserted by a programmer to allow remote access to the program, v) service spoofing, which is an attack in which the adversary successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage, vi) web application attacks and injection attacks through code injection – examples of exploiting this threats to mount more elaborate attacks have already been discussed –. After the deployment of the code, the attacker may manipulate infected devices. In Big Data, malware infected nodes may send targeted commands to other servers and disturb or manipulate their operations, worms may replicate themselves sending copies to other nodes and affect the behaviour of all components connected to the network. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 42 There is always the possibility that vendors of Big Data tools, or somebody else in the software chain, may have installed firmware with backdoors or some hidden functionality to facilitate access to the devices, in particular in the context of very new technologies such as NoSQL and NewSQL. An example of hacking Big Data through a malicious code attack is reported in literature as faulty results of the Hadoop logging data system. System administrators use Hadoop server logs to identify potential attacks. A demo of this hack requires that a service, called Flume, streams logs into a SQL based Hadoop data store (Hcatalog). In this scenario, an attacker runs a malicious script and alters the results by modifying the log data before Flume can stream them into Hcatalog. The logs can be corrupted even when Hadoop services seem to be working as expected. Malicious software can be a threat also in distributed programming frameworks, which use parallel computation, and may have untrusted components. For example, MapReduce computational framework splits the input file into multiple chunks: in the first phase a mapper reads the data, performs computation, and outputs key/value pairs. In the second phase, a reducer works on these pairs and outputs the result. A key issue is how to secure the mappers, since untrusted mappers alter results. With large data sets, it becomes difficult to identify malicious mappers. The assets targeted by this attack include “Database management systems (DBMS)” (such as the traditional “Relational SQL” databases, and the Big Data new tools “NoSQL” and “NewSQL”), and asset type “Computing infrastructure models”. Threat: Generation and use of rogue certificates Device signing and media encryption can be critically undermined by the use of rogue certificates allowing attackers the access to Big Data assets and _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 43 communication links. These can then be used to access data storage and thus causing data leakage, intercept and hijack individuals’ secure Web-based communications, misuse of brand, and upload/download malware or force updates, which potentially contain undesired functionality for Big Data software and hardware components. Social networks such as Facebook are affected. According to reports in some circumstances download flaws allowed attackers to plant a malicious file on a victim’s machine that looks like it is coming from a trusted Facebook domain. Many assets are targeted by this threat: including asset groups “Data” and “Big Data analytics”, and assets “Software” and “Hardware”. Threat: Misuse of audit tools / Abuse of authorizations / Unauthorized activities Audit information is necessary to ensure the security of the system and understand what went wrong; it is also necessary due to compliance and regulation. The scope and the granularity of the audit might be different in a Big Data context and the effect of the misuse of such information may be amplified. For example, key personnel at financial institutions require access to large data sets that contain personally identifiable data . Also, there can be massive breaches of privacy when employees of providers hosting social networks, using their administrative credentials, regularly access private user information. For this reason, it is important to keep security-relevant chronological records. Since the misuse and abuse of authorization can become a common issue, it is necessary to protect a large number of assets containing granular audits, documentation of the security policies, logs and cryptographic keys (e.g. all the assets included in category “Security and privacy techniques” of our asset taxonomy). _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 44 The assets targeted by these threats include “identification record data”, “Database management systems (DBS)” (for example “NoSQL” and “NewSQL”) and asset group “Security and privacy techniques”. Threat: Failures of business process Failures of business process according to ENISA taxonomy are threats of damage and/or loss of assets due to improperly executed business process. In Big Data, this class includes all threats related to data integrity that can be favoured by Big Data storage policies. In particular, the highly-replicated and eventual consistency nature of big data represents a driver towards attacks to data integrity, where data items stored in different replicas can be inconsistent. This scenario is summarized in the new concept of Big Data degradation, which represents an increasing risk for Big Data correctness. This scenario also defines a “Big Data Leak”, a total or partial disclosure of a Big Data asset at a certain stage of its lifecycle as opposed to a “Big Data breach” (e.g. a theft of an asset executed by breaking into the infrastructure). In our case Big Data can be unwillingly disclosed by the owner to the provider of an outsourced process, for example when computing data analytics. This disclosure of information, at a certain stage of the Big Data lifecycle, can be exploited by an honest, but curious attacker, even without hostile intention. Also, several cases of inadequate anonymisation of users are reported. While data collection and aggregation uses anonymization techniques, individual users can be re-identified by leveraging other Big Data datasets, often available in the public domain. This is an emergent phenomenon introduced by Big Data variety that has the ability to infer identity from anonymized datasets by correlating with apparently innocuous public information. Examples related to de-identification of personally identifiable information _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 45 (PII) are given by the AOL case and by NIST Big Data publications in Web logs collection and analysis. For a more detailed study on deanonymizatuion and anonymity issues in Big Data systems see ENISA’s report “Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics “. The assets targeted by this threat include asset groups “Data” and “Big Data analytics”. 4.2.4 Threat Group: Legal This group includes threats due to the legal implications of a Big Data system such as violation of laws or regulations, the breach of legislation, the failure to meet contractual requirements, the unauthorized use of Intellectual Property resources, the abuse of personal data, the necessity to obey judiciary decisions and court orders. Threat: Violation of laws or regulations / Breach of legislation / Abuse of personal data Data storage in the European Union falls under the Data Protection directive: organizations are required to i) adhere to this compliancy law throughout the life of the data, ii) remain responsible for the personal data of their customers and employees, and iii) guarantee its security even when a third-party like a cloud provider processes the data on their behalf. In the traditional data centric model, data is stored on-premise, and every organization has control over the information. In Big Data, instead, a real concern is arising about the security of this massive amount of digital information and the protection of the critical infrastructure supporting it, as demonstrated by a vast literature about privacy risks. We should also note that EU has stricter regulations regarding the collection of personal data than other countries, but sometimes multinationals operating in the EU are based in the United States. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 46 In this context, the most important privacy issues are how to protect individual privacy when the data is stored in multiple sites, and how efficient the protection isError! Bookmark not defined. Big Data also raises the potential issue of data residency. Data, when stored in cloud storage of providers that offer multi-national storage solutions, may fall under different legal jurisdictions. An example brought by the NIST Big Data Public Working Group regards the custody of pharmaceutical data beyond trial disposition, which is unclear, especially after firms merge or dissolve. The assets targeted by this threat include asset groups “Data” (especially “identification record data”) and “Roles”. 4.2.5 Threat Group: Organisational threats This group includes threats pertaining to the organizational sphere. Threat: Skill shortage The analysis of large datasets can underpin new waves of productivity growth and innovation, and unlock significant value. However, companies and policy makers must tackle significant hurdles, such for instance a possible shortage of skilled data scientists and managers. The asset targeted by this threat is asset group “Roles”. 5. Threats agents According to ENISA Threat Landscape 2013, a threat agent is “someone or something with decent capabilities, a clear intention to manifest a threat and a record of past activities in this regard”. For Big Data asset owners it is crucial to be aware of which threats emerge from which threat agent group. This study does not develop a new glossary on threat agents, but utilises the ENISA Threat Landscape 2013’s consolidation of several publications. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 47 The categorization of threat agents is as follows: Corporations: they refer to organizations/enterprises that adopt and/or are engaged in offensive tactics. In this context, corporations are considered as hostile threat agents and their motivation is to build competitive advantage over competitors, who also make up their main target. Depending on their size and sector, corporations usually possess significant capabilities, ranging from technology up to human engineering intelligence, especially in their area of expertise. Cyber criminals: they are hostile by nature. Moreover, their motivation is usually financial gain and their skill level is, nowadays, quite high. Cybercriminals can be organised on a local, national or even international level. Cyber terrorists: they have expanded their activities and engage also in cyber-attacks. Their motivation can be political or religious, and their capability varies from low to high. Preferred targets of cyber terrorists are mostly critical infrastructures (e.g. public health, energy production, telecommunication), as their failures cause severe impact in society and government. It has to be noted, that in the public material analyses, the profile of cyber terrorists still seems to be blurred. Script kiddies: they are unskilled individuals using scripts or programs developed by others to attack computer systems and networks, and deface websites. Online social hackers (hacktivists): they are politically and socially motivated individuals that use computer systems to protest and promote their cause. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 48 Their typical targets are high profile websites, corporations, intelligence agencies and military institutions. Employees: they refer to the staff, contractors, operational staff or security guards of a company. They can have insider access to company’s resources, and are considered as both non-hostile threat agents (i.e. distracted employees) and hostile agents (i.e., disgruntled employees). This kind of threat agents possesses a significant amount of knowledge that allows them to place effective attacks against assets of their organization. Nation states: they can have offensive cyber capabilities and use them against an adversary. Nation states have recently become a prominent threat agent due to the deployment of sophisticated attacks that are considered as cyber weapons. From the sophistication of these malware, it can be confirmed that Nation states have a plethora of resources and they have a high level of skills and expertise. All agents listed in this section, may have an interest in exploiting certain vulnerabilities in Big Data for different reasons. Only some specific threats come more typically from certain agents, as, for instance, the abuse of authorization that is related to corporation employee, who can use their administrative credentials to access systems. In the following table we propose a cross relation between threats and agents in Big Data. Annex C presents an overall mappings between assets, threat agents and threats. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 49 6. Good practices In this section, we provide a discussion summarizing good practices93 to protect Big Data assets. A good practice is a method or technique that has consistently shown results superior to those achieved with other means, and that is used as a benchmark. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 50 To this aim, different sources have been collected, reviewed, and mapped to the previously identified Big Data threats. They specify vulnerabilities, recommendations, controls, countermeasures, and good practices published by institutions or working groups, and relevant for the protecting the assets and counteracting the threats in this report. The first result of our analysis is that publicly available information on Big Data security issues mainly originates from research and is based on requirements and generic assumptions, while materials of real-life experience are not often available. This is mainly due to the fact that development of Big Data infrastructures and their related security measures are at an early stage of maturity. In fact, on one side, many of Big Data infrastructures have been operational for a limited period of time; on the other side, Big Data security assessment is in many cases managed confidentially for reasons of competitiveness. Generally speaking, Big Data being a collection of input channels from sensors, networks, storage and computing systems, and output to data consumers, there is shared responsibility for security and infrastructure management. Every party, such as a data provider or a data consumer, should be conscious that its own security also depends on the security of its neighbours. Countermeasures and good practices are expected to be implemented to increase security of single parties, and of other related parties when applicable. Different documents produced by the following bodies have been examined: ISO, COBIT, Council on Cyber Security (CCS) and NIST. ISO terminology proposes security controls, while COBIT provides best practices that allow bridging the gap between control requirements, technical issues and business risks. The CCS is an independent and not-for-profit organization, which presents a recommended set of actions (the so called CIS Critical Security Controls for Effective Cyber Defence). _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 51 When appropriate, we provide practices suggested by the NIST Big Data use cases. During the analysis, we tried to uniform the terminologies used by the above bodies, which in some cases were nonhomogeneous. For controls and technologies specifically directed towards data protection see ENISA’s “Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics” (2015). One more source of potential controls and technical countermeasures stems from the use of Big Data analytics as a tool for increasing system and data security, and improving intrusion detection and prevention. For completeness a small presentation of the expected capabilities is given in Annex E: Big Data analytics for security. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 52 _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 53 _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 54 7. Gap analysis In this section, we provide a gap analysis for those cases where further research and investigations are required in the areas of Big Data threats, security, and good practice. This analysis aims to close the gaps highlighted in the previous section and is summarised as follows. The use of cryptography may be not always sufficient and there are obvious risks associated to administrators and security professionals with equivalent privileges. This is especially true when threats related to information leakage and/or sharing due to human errors are considered. Furthermore, leaks of data via Web applications (unsecure APIs) and inadequate design/planning or improperly adaptation need an improved design of computing and storage infrastructure models, while streaming data from sensors may have issues of confidentiality that cannot be mitigated by current solutions. Personal identifiable information is at risk even when best practices are widely followed and calls for privacy-oriented defensive approaches. Malicious code and activities pose a risk to models of computing infrastructure and storage due to the difficulties of patch management in a Big Data heterogeneous environment, while violation of laws or regulations, breach of legislation and abuse of personal data may affect final users. All these breaches requires, on one side, Big Data specific countermeasures, and, on the other side, the involvement of policy makers to reflect changes in current IT environment in EU laws and legislations. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 55 Finally, a skill shortage in roles such as data scientists is foreseen. We categorize the gaps into four groups: gaps (i) on data, (ii) on the use of cryptography (iii) on computing and storage models and (iv) on roles (e.g. administrators, data scientist, and final users). Gaps on data protection Major gaps are found due to threats to privacy (e.g., the identification of personal identifiable information) and to confidentiality of sensor data streams. As already reported in this report, several cases of identity fraud due to traffic capture and data mining have been recorded in recent years. Big Data analysis has facilitated the intrusion of privacy by strengthening common techniques and further research in this field is required. Since countermeasures, discussed in the previous section, such as anonymization did not prove to be always effective against Big Data mining, new research efforts are made to devise better controls. For example, a promising topic, actively researched, is privacy-preserving data mining (PPDM). The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. In addition, it is foreseeable to have streams of data from sensors certified when possible. Since centralized cryptography systems are hard to implement when a large number of sensors is involved, the use of Trusted Computing (TC) appears to be a promising technology. Trusted computing relies on Trusted Platform Modules (TPMs) and related hardware to prove integrity of software, processes, and data. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 56 TPM chips are not expensive and could be fitted in sensors at build time. TPM-enabled devices could provide reliable data streams. However, on the server side (e.g., Big Data cloud-based installations), the use of this new technology is more challenging since hardware TPM should be adapted to virtualized environments. A researched approach is based on the notion of virtual Trusted Platform Module (vTPM), which provides secure storage and cryptographic functions of TPM to applications and operating systems running in virtual machines. Other hardware-based security technologies include the development of new processors for the embedded smart sensors. These new processors include protected areas for storage of user authentication keys, as well as areas of the processor that are off-limits to unauthorized users. Besides the above technically-oriented aspects of data protection gaps, in 2015 ENISA has conducted a privacy-oriented assessment of Big Data ”Privacy by design in big data”4. In this work, more thorough privacy gaps have been identified and recommendations have been made. Highlights include: application of privacy by design, preservation of privacy by data analytics and the need for coherent and efficient privacy policies for big data. It is recommended to refer to this document in order to obtain full perspective of security and privacy issues of Big Data. Use of cryptography in applications and back-end services The use of cryptography in Big Data as a mitigation countermeasure can be challenging. Gaps related to the use of cryptography are mainly related to: i) performance and scalability, _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 57 ii) protection of logical and physical fragments, such as data blocks. In fact, in Big Data, cryptography adds complexity and negatively affects performance. New dedicated products and ad hoc solutions are under development, as for example the already discussed TC and TPM technologies, while some interesting new approaches to cryptography for Big Data applications as the notion of “cryptography-as-a-service” in cloud environments are emerging. In recent years, there has been a lot of discussion around novel, but still rather esoteric crypto-algorithms. Homomorphic encryption, honey encryption and other proposals could, at least in theory, provide end-to-end data protection and confidentiality. As an example, assuming the existence of a fully homomorphic cryptoscheme, one could use public Big Data systems to perform analytics – with the expected speed or accuracy losses – without ever revealing the data to anyone else, not even the computation and storage service provider. Research is still ongoing but the interested reader can find a concise study of the current state of the art in ENISA’s “Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics”. Gaps on computing and storage models Computing Infrastructure and storage models in Big Data face new challenges such as the lack of standardization and portability of security controls among different open source projects (e.g., different Hadoop versions) and Big Data vendors, and the poor design of security features. Often, standards do not exist or are still under development. An example of lack of standards is brought by NIST Big Data Working Group for the shipping industry, which uses Big Data in the identification, transport, and handling of items in the supply chain. However, at the moment, the status of the shipped items (e.g., unique identification number, GPS coordinates, sensors information, etc.) is not passed through the entire chain. A unique identification schema is under development within an ISO _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 58 technical committee. From a security perspective, we note that in a traditional management system as, for example, in an SQL relational database, security has slowly evolved and many new controls have been proposed over the years. Unlike such solutions, the security of Big Data components has not undergone the same level of rigor or evaluation due to the immaturity of Big Data research and development. Gaps on roles (administrators, data scientist, and final users) As stated in the previous section, many roles can be critical in Big Data, in particular system administrators, data scientist, and users. Big Data administrators and other privileged users are a big concern since they require access to corporate data systems when working on behalf of the cloud services provider. Moreover, they could use their grants to access key stores and other sensitive information. All the data scientist positions are unlikely to be filled in the near future, while users might not always be conscious of or care about the legal implications of data storage – legal implications that will vary large and wide around the world. Awareness, education, and training are the keys to close these gaps concerning human resourses. Some new online educational web sites are offering specialised courses in Big Data, for example the Big Data University sponsored by IBM, and MIT. The Big Data University is run by a community, which includes many IBM staff members, contributing voluntarily to the development of courses, and to enhancing the site; also Amazon is contributing to the initiative. Other courses are available at Massive Open Online Course (MOOC) websites like Coursera. But, as with ICT security, it will take years to fulfil industry’s requirements on skilled and trained personnel. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 59 Recommendations The above gaps naturally result in a set of recommendations that can be classified as general recommendations, technical recommendation and recommendation on human resources. General recommendations: they target the main Big Data stakeholders such as owner of Big Data projects and policy makers. In particular, stakeholders should depart by the assumption that a Big Data environment is simply a traditional data environment focusing on large amount of data. Big Data is more than a simple scalability problem, and management tools and risk assessment countermeasures and solutions should consider and address all 5V characterizing a Big Data environment. This consideration is important both for policy makers specifying laws and regulations targeting current ICT environment, and stakeholders managing Big Data platforms and analytics. Especially for the latters, it becomes fundamental to evaluate i) the current level of security by understanding the assets covered (and not covered) by existing security measures, ii) the effectiveness of the application of good practices adapted from traditional security and privacy tools and techniques. General recommendation requires a parallel standardization effort supporting the definition of proper and specific Big Data tools and legislations. Technical recommendations: they target owners of Big Data projects and developers of corresponding products. Following general recommendation of being Big Data specific, stakeholders should limit as much as possible the practice of adapting existing products to Big Data. Big Data introduces completely novel environments with new assets, threats, risk, and challenges. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 60 As a consequence, new products are needed to provide effective countermeasures and increase the trustworthiness of Big Data environments. Such products must be put in the Big Data life cycle after a careful evaluation, through pilots, aimed to verify and prove their correct behaviour. Success of these new products passes from a commitment by third- party vendors to apply security measures and stay focused on any updates. Moreover, developers of Big Data products should benefit from new tools providing security and privacy functionalities by default. To conclude, as already specified in the general recommendations, international bodies are invited to support this shift to Big Data specific security and privacy solutions by starting a gap analysis on Big Data standards, and new standardization activities according to the identified gaps. Recommendations on human resources: they target human resources managing and using Big Data assets. As in traditional environments, in fact, human resources are one of the main sources of threats, and include users that attack a system either maliciously or accidentally. To limit these scenarios, all involved parties should focus on training of specialized professionals. Big players should support education initiatives on Big Data to raise/train tomorrow's scientists, fostering information and communication technology security awareness and training programs. Private companies and governmental bodies should encourage technical staff to attend offline/online courses from respected institutes to increase their competences. Final users should learn about their rights and threats to privacy attending courses and educational initiatives. Big Data administrator and other privileged users should cooperate with the international community to exchange on threats and promote the _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 61 application of good practices as mitigation measures. Finally, Big Data administrator should rely on good practices, and report on their implementations choices in terms of considered assets, threat, countermeasures, and identified gaps. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 62 Adverse macro-financial scenario for the EBA 2016 EU-wide bank stress testing exercise The European Banking Authority (EBA) 2016 EU-wide stress testing exercise will require banks to use the presented outcome of the adverse macro-financial scenario for variables such as GDP, inflation, unemployment, asset prices and interest rates in order to estimate the potential adverse impact on profit generation and capital. The adverse scenario covers three years, starting from the first quarter of 2016, when the shocks are assumed to materialise, and ending in 2018. 1. Main risks to stability of the EU financial sector The narrative of the adverse scenario reflects the four systemic risks identified by the ESRB General Board as representing the most material threats to the stability of the EU financial sector: 1. An abrupt reversal of compressed global risk premia , amplified by low secondary market liquidity; 2. Weak profitability prospects for banks and insurers in a low nominal growth environment, amid incomplete balance sheet adjustments; 3. Rising of debt sustainability concerns in the public and non-financial private sectors, amid low nominal growth; 4. Prospective stress in a rapidly growing shadow banking sector, amplified by spill over and liquidity risk. In the adverse scenario, the first systemic risk, assessed to be the most significant of the four, materialises through a change in investor preferences in the developed financial markets and, most notably, in the United States, with an increasing aversion to holding long-term fixed income securities. This induces a portfolio reallocation towards short-term instruments, causing a rise in US long-term risk-free interest rates and risk premia across all financial asset classes. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 63 The increases are amplified by limited secondary market liquidity. A protracted period of global financial market uncertainty would follow, leading to a confidence-driven contraction of domestic demand in emerging markets, in line with country-specific vulnerabilities. The first systemic risk acts as a trigger for the vulnerabilities related to the remaining three sources of risk. In the EU this would lead, in particular, to a weakening of domestic demand, a decline in property prices and a renewed widening of sovereign credit spreads, as well as to a sell-off by the shadow banking sector that would amplify the shocks to financial asset prices in the EU. 2. Macro-financial shocks driving the out come of the adverse scenario Specific macro-financial shocks that are assumed to materialise under each of the parts of the scenario are presented in Table 1. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 64 Concerning the calibration of the specific shocks, the yields on long-term Treasury securities United States are assumed to rise sharply, deviating by 250 basis points (bps) from the baseline by end-2016. The increased investor risk aversion would affect the prices of European fixed income instruments, and yields on ten-year German sovereign debt would increase by about 80 basis points over the same horizon. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 65 The impact on sovereign bond yields would be lasting, so that German ten-year bond yields would remain some 53 basis points above the baseline levels in 2018 (see Table 2). In addition, sovereign credit spreads in the euro area would widen, reflecting broadly the market assessment of individual sovereigns’ vulnerabilities. Overall, long-term interest rates in the EU would be higher by 71 basis points in 2016, 80 basis points in 2017 and 68 basis points in 2018. Against the backdrop of global financial tensions, bilateral nominal exchange rates of the central and eastern European (CEE) countries against the euro would depreciate sharply, by between 8% and 24% in the course of 2016, corresponding to the historical exchange rate volatilities. Subsequently, these exchange rates would remain stable at the weaker levels for the remainder of the exercise horizon. The increase in bond yields in the CEE countries would be stronger than that observed in the euro area and western European non-euro area countries. At the same time, the Swiss franc would appreciate by 23% against the euro (see Table 3). These exchange rate movements would take place despite the implied strong fundamental misalignment of the respective currencies that would not begin to correct before end-2018. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 66 More generally, the global increase in risk premia has effects well beyond fixed income markets. Global equity prices would decline by 36% by the end of 2016. As a result, and amplified by a sell-off by shadow banking entities, EU stock prices would fall, on an annual basis, by 25% in comparison with the baseline scenario in 2016, followed by a mild recovery that would reduce the average deviation from the baseline scenario to about 16% in 2018 (see Table 4). Commodity prices would also be affected, responding to financial shocks _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 67 and the expected weakening of global economic growth, with oil prices falling by about 48% in 2016 compared with the baseline projection of about 54 US dollars per barrel, standing at about 44% below baseline levels in 2017 and 2018. Money market rates (three-month interbank offered rates) in all EU countries would rise by about 33 basis points compared with the baseline scenario in 2016, reflecting a higher credit premium. This additional credit premium would decline to 23 basis points in 2017 and 6 basis points in 2018. As monetary policy is assumed to follow the expectations implied by the baseline scenario also under the adverse scenario, this increase should not be interpreted as being driven by monetary policy decisions. Tighter financing conditions caused by a reduction in the availability of funding from shadow banking entities would contribute directly to a contraction in economic activity. It is assumed that banks would respond by tightening lending standards on loans to the private non-financial sector. This funding shock is represented by country-specific shocks to the cost of corporate credit and loans to households, via an increase in the user cost of capital and a reduction in the financial wealth of households respectively. The corresponding impact on 2018 GDP is estimated to be limited to about 0.12%. Finally, swap rates would respond to the increase in money market rates and long-term government bond yields. Depending on the maturity, euro swap rates would increase by between 44 and 58 basis points in 2016 compared with the baseline, and remain elevated until 2018. Detailed paths for swap rates for the US dollar and most EU currencies are presented in the annex. The increased global uncertainty would reduce global economic growth, notably through confidence and financial spillovers to emerging market economies (EMEs), spanning all major emerging market regions (Asia, _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 68 Latin America, emerging Europe). The spillovers give rise to a sudden re-assessment of growth expectations in these countries. In turn, sizeable capital outflows from EMEs lead to a reduction in emerging market asset prices, causing domestic demand in these economies to suffer from both tighter financing conditions and business and consumer confidence shocks. This would have an impact on the EU economies through trade channels, as foreign demand for EU exports would be materially reduced. The estimated impact of the above-mentioned financial and real shocks on economic activity in the countries outside the EU would be sizeable, in particular for EMEs that are also commodity exporters (see Table 5). Cumulative GDP growth in the developed economies would be between 2.5% and 5% lower than under the baseline scenario in 2016-17. By 2018, as the impact of the shocks would begin to wear off, GDP growth rates would approach those projected under the baseline scenario. Among the main emerging economies, the impact would be particularly strong for Brazil, Russia and Turkey, while for China and India total GDP would stand about 4.5% below the baseline projections in 2018. Overall, the demand for EU exports would stand nearly 8% below the baseline projection in 2017 and 6.5% below the baseline in 2018. The global shocks are also assumed to negatively affect confidence, resulting in country-specific reductions in private consumption and investment in all EU countries. Lower consumer confidence, together with increased risk premia, would additionally cause a slowdown in property market activity, both in the residential and commercial property segments. The exogenous shocks to house prices reflect the country-specific misalignment of house prices with regard to estimated fundamental levels and historical volatility of house prices. These shocks, which overall drive the house prices down by about 6%, are _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 69 supplemented with a common shock of about 7.5% affecting all EU countries and some country-specific exogenous add-ons calibrated according to the assessment of national competent authorities. Commercial property prices are also affected by a common shock, calibrated in a uniform way for all EU countries at about 7%. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 70 3. Results for the euro area and European Union As a combined result of the foreign demand shocks, financial shocks and domestic demand shocks in the EU, the scenario implies a deviation of EU GDP from its baseline level by 3.1% in 2016, 6.3% in 2017 and 7.1% in 2018. The implied EU real GDP growth rates under the adverse scenario over the three years of the exercise amounts to -1.2%, -1.3% and +0.7% respectively (see Table 6). The major part of the impact on GDP is driven by the domestic demand factors, namely the exogenously set reductions in consumption and _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 71 investment, which collectively reduce EU real GDP by about 3.6% compared with the baseline by 2018 (see Chart 1). Assumed shocks to foreign demand contribute a further 2.7% to the total 2018 deviation of EU GDP from the baseline. The combined impact of interest rate, house price and stock price shocks is somewhat weaker. The positive contribution of lower commodity prices and weaker exchange rates to EU GDP moderates the negative deviation from the baseline by about 0.8%. In combination with substantially lower headline inflation, the impact on nominal GDP would be particularly pronounced. In a historical perspective, the adverse scenario, leading to a total reduction in EU GDP by 1.7% in 2018 from the 2015 level, is slightly less severe than the 2008-10 period when the EU economy contracted by about 2.0% over three years. The recession considered under the adverse scenario is longer but shallower than the 2008-10 events (see Chart 2). _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 72 The Harmonised Index of Consumer Prices (HICP) inflation rate in the EU _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 73 under the adverse scenario is well below the baseline scenario, by -2.0 p.p. in 2016, -1.9 p.p. in 2017 and -2.1 p.p. in 2018 (see Table 7). Following a sharp reduction in energy and food commodity prices in early 2016, under the adverse scenario HICP inflation would reach -0.9% in 2016. Prices would fall slightly in 2017 and 2018, with annual inflation rates of -0.2% and -0.2% respectively. The projected inflation is initially driven by much lower commodity prices, which explain a large majority of the deviation of HICP inflation rate from the baseline scenario in 2016. Over time, the deviation is increasingly explained by the impact on prices of weaker aggregate demand, both domestic and foreign. The adverse scenario implies a substantial increase in the EU unemployment rate, instead of a slight reduction expected under the baseline scenario. The EU unemployment rate would reach 11.6% in 2018, some 2.8 percentage points higher than the baseline (see Table 8). Residential property prices in the EU would fall, reflecting the assumed exogenous shocks as well as their reaction to the general deterioration in the economic outlook. Overall, EU residential property prices would stand about 21.3% below the baseline levels by 2018 (see Table 9), having contracted by about 10.7% from the 2015 levels. Commercial property prices, similar to residential property prices, would deviate downwards from the levels consistent with the baseline economic projections. By 2018, prime commercial property prices would contract by about 15% from their 2015 levels, and stand about 23% below the baseline projections (see Table 10). _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 74 In comparison with the adverse scenario of the 2014 EU-wide stress testing exercise, this scenario would result at the end of the horizon in a similarly-sized deviation from baseline of EU GDP level (-7.1% compared with -7.0% in the 2014 exercise) and a much stronger deviation of the price level (-5.8% and -2.8% respectively) from the baseline. The impact on GDP is driven primarily by more severe domestic demand shocks, as foreign demand shocks are less severe than in the 2014 scenario and lower commodity prices stimulate growth in the EU economy. Owing to a more favourable baseline projection than in the 2014 exercise, GDP over the three- year horizon falls by -1.7% in the adverse scenario, which is slightly higher than the -2.1% assumed in the 2014 exercise. Consumer prices fall by 1.3% over the horizon in the adverse scenario, while they were assumed to increase by 1.7% in the 2014 exercise. The impact of both scenarios on the EU unemployment rate and residential property prices is similar. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 75 The change in residential property prices over the horizon, however, is somewhat less adverse in this scenario (-10.7%) than in the 2014 exercise (-15.4%), again owing to a substantially more favourable baseline. As the impact of this scenario on commercial property prices is stronger than that assumed in the 2014 exercise, the change over the horizon is also more adverse (-15.0%, compared to -8.3% in 2014). _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 76 _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 77 _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 78 2016 EU-wide stress test: Frequently Asked Questions Scope 1. Why does the EBA run an EU-widestress test? The EU-wide stress test serves as a common foundation on which national authorities can base their supervisory assessment of banks’ resilience to relevant shocks, in order to identify residual areas of uncertainties, as well as appropriate mitigation actions. Moreover, the exercise strengthens market discipline, through the publication of consistent and granular data on a bank by bank level illustrating how balance sheets are affected by common shocks. 2. Who is involved? The EU-wide stress test is initiated and coordinated by the EBA and undertaken in cooperation with the Competent Authorities (the Single Supervisory Mechanism for the euro area banks), the European Central Bank (ECB), the European Systemic Risk Board (ESRB) and the European Commission (EC). The 2016 exercise covers a sample of 51 banks representing about 70% of EU banks total assets. 3. How does it work in practice? The EBA develops a common methodology that is applied by all the banks in the sample and checked by supervisors. The EBA also acts as a data hub for the final dissemination of the outcome of the common exercise. Competent Authorities (CAs) are responsible for the quality assurance process and the supervisory reaction function. The EBA supports the CAs’ quality assurance process by providing common quality assurance guidelines and EU-wide descriptive statistics on the main risk parameters. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 79 4. Will banks under take an asset quality review ahead of the stress test? In 2016, the stress test will not be preceded by a coordinated EU-wise asset quality review (AQR) as it was the case in 2014. However, the assessment of asset quality is regularly undertaken by CAs as part of their supervisory work. Process and roles 5. What is the role of the EBA? The EBA is responsible for developing and providing CAs with a common methodology to allow them to undertake a rigorous assessment of banks’ resilience under stress in a common and comparable way. The ESRB is responsible for designing a common adverse scenario on which the stress test can be run. The EC provides the baseline scenario. The EBA also provides CAs with EU descriptive statistics on risk parameters for the purposes of consistency checks. Furthermore, the EBA acts as a data hub for the final dissemination of the common exercise, thus ensuring transparent and comparable disclosure of banks’ results. Finally, the EBA plays a key role in ensuring effective communication and coordination between home and host authorities in the framework of colleges of supervisors. 6. What are the roles of national Competent Authorities (CAs) and the Single Supervisory Mechanism? CAs, including the Single Supervisory Mechanism for the euro area banks, are responsible for ensuring that banks correctly apply the common methodology developed by the EBA. In particular CAs and the SSM are responsible for assessing the reliability and robustness of banks’ assumptions, data, estimates and results. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 80 Furthermore, CAs and the SSM are responsible for the quality assurance process as well as for the resulting supervisory actions. 7. What banks will be involved in the stress test? The 2016 EU-wide stress test exercise will be carried out on a sample of banks covering about 70% of the EU banking sector, as expressed in terms of total consolidated assets as of end 2014. It will include 51 EU banks from 15 European countries. 8. Why has the sample shrunk compared to the 2014 EU-wide stress test and also to the 2015 EU-wide transparency exercise? Following a wide ranging exercise in 2014, the EBA decided to focus on a more homogeneous sample of large banks, to ensure greater comparability while ensuring a significant coverage of EU banking assets. The 2016 EU-wide stress test exercise is carried out on a sample of 51 banks covering broadly 70% of the national banking sector in the Eurozone, each non-Eurozone EU Member State and Norway, as expressed in terms of total consolidated assets as of end 2014. To be included in the sample, banks have to have a minimum of EUR 30 bn in assets. This threshold is consistent with the criterion used for inclusion in the sample of banks reporting supervisory reporting data to the EBA, as well as with the SSM definition of a significant institution. Smaller banks not included in the 2016 EU-wide stress test will be tested by their relevant competent authorities as part of the SREP Process. Timeline and disclosure 9. What is the timeline for the stress test? After the launch of the exercise, banks will proceed to estimate the impact of the adverse scenario on banks’ balance sheets. Banks’ results will be quality assured and challenged by the CAs. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 81 This can lead to resubmissions and possible additional iterations. The EBA expects to publish the final results of the 2016 EU-wide stress test by early Q3 2016. 10.How will data and results be published? The most important aspect of the EBA’s common EU-wide exercise is the disclosure of comparable and consistent data and results across the EU. Results will be disclosed on a bank by bank basis and the EBA will act as a data hub for the final dissemination of the outcome of the common exercise. The level of granularity of the data disclosed will be consistent with that of the 2014 EU-wide stress test and 2015 EU-wide transparency exercise. It will include the capital position of banks, risk exposures, and sovereign holdings. The credibility of the EU-wide stress test rests on transparency. Market participants will be able to determine for themselves how supervisors and banks are dealing with remaining pockets of vulnerability. Methodological aspects and scenario 11.Why have you moved from a ‘pass or fail’ stress test to an exercise where no specific capital hurdle is defined? The objective of the crisis stress tests was to identify possible capital shortfalls and require immediate recapitalisation actions. As banks have now moved to a more steady-state setting, the aim of the 2016 exercise is rather to assess remaining vulnerabilities and understand the impact of hypothetical adverse market dynamics on banks. Although no hurdle rates or capital thresholds are defined for the purpose of the exercise, CAs will use stress test results as an input to the Supervisory Review and Evaluation Process (SREP). In addition the publication of capital ratios will enable market participants to make their own assessment. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 82 12. What are the key methodological changes compared to the previous exercise? The building blocks of the common methodology are rather similar to those of the 2014 exercise. Some improvements have been included for both refining the previous methodology, based on prior experience, and addressing new relevant risks. In this regard, a methodology to estimate conduct risk-related losses is now included. Additionally, a more precise treatment of FX lending risk and hedging, together with a refinement of the net interest income (NII) methodology, were also introduced. 13.How will the EBA ensure consistency between both Eurozone and non-Eurozone countries in the conduct of the exercise? The aim of an EU-wide stress test is to assess the resilience of financial institutions across the Single Market to adverse market developments. Consistency in the way the exercise is conducted across the EU is necessary to ensure a rigorous assessment as well as comparability of data. To this end, two elements are crucial: (1) a common methodology and consistently applied constraints, such as a static balance sheet, which will provide market participants and institutions with a common exercise to contrast and compare EU banks under adverse market conditions; (2) a common baseline and adverse macro-economic scenario. In addition, the EBA will provide comparative analysis at the end of the quality assurance process by CAs and bank results will be discussed in in the framework of colleges of supervisors involving home and host authorities, as well as the EBA. 14.What is the scope of consolidation? The EU-wide stress test will be conducted on the highest level of consolidation (group level). _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 83 Subsidiaries of banks in the European Economic Area are excluded given the Single Market perspective of the exercise. 15. How will the stress test results feed into the SREP process? The 2016 EU-wide stress test will be one crucial piece of information in the SREP process in 2016. The results of the stress test will allow CAs to assess banks’ ability to meet applicable minimum and additional own funds requirements under the stress conditions against the common scenarios and assumptions. Furthermore, the results of the stress tests will be a solid ground for a discussion with individual banks to better understand relevant management actions and how their capital planning may be affected by the stress and ensure that the banks will be above the applicable capital requirements. As stated in the EBA Guidelines on common procedures and methodologies for the SREP, CAs are expected to factor the results of the EU-wide Stress test, together with ICAAP and other supervisory stress tests and other assessments into the assessment of banks’ adequacy of own funds, and in particular their ability to meet the own funds requirements over the economic cycle. Supervisors have a wide range of tools available which will be applied on a case by case basis. In order to inform the SREP process, the timeline of the exercise has been brought forward compared to 2014. 16.How will the stress test results be used for cross border banks? The results of the stress test forming a vital part of information for SREP purposes will be discussed within the framework of colleges of supervisors established for cross-border banks. Any measures affecting additional own funds requirements (Pillar 2 requirements) will be jointly agreed by the members of the colleges, as required under the legislation of joint decisions on institutions-specific prudential requirements. In order to inform the SREP process and the calendar of the joint decisions _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 84 in 2016, the timeline of the exercise has been brought forward compared to 2014. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 85 Building a sound global Islamic financial system Opening remarks by Dr Zeti Akhtar Aziz, Governor of the Central Bank of Malaysia (Bank Negara Malaysia), at the Islamic Financial Services Board (IFSB) - Meet the Members & Industry Engagement Session, Kuala Lumpur It is my pleasure to welcome you to this Industry Engagement Session organised by the IFSB. Since its introduction in 2012, these sessions have drawn encouraging response from the members and the industry. Such an interface between the regulators, industry and the IFSB has become even more important in the current environment in which greater global attention is being accorded to the reform of prudential regulations. The strengthening of such an interface provides an important platform for building greater understanding on the expectations, issues and areas of concern amongst the regulators, the industry and the IFSB. With more than a decade since the inauguration of the IFSB in November 2002, the IFSB has built a solid global reputation as a prudential standard-setting body for Islamic finance. Its achievements also include initiatives to increase international regulatory cooperation, to encourage uniformity of regulatory frameworks and the efforts to enhance the monitoring of financial risks in the Islamic financial system. The enhanced stability and resilience of the current global Islamic financial system is reinforced by its vibrant growth and its increasing internationalisation and integration into the international financial system. This is a realisation of the aspirations and vision of the IFSB Founding Members. The IFSB has also made significant advancements in taking forward the recommendations made in the Islamic Finance and Global Financial _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 86 Stability Report 2010 towards achieving financial stability in the national and the international Islamic financial system. The prudential standards including that for liquidity management issued by the IFSB takes into account the unique characteristics of Islamic finance and are also designed to not impose any regulatory burden while upholding the financial stability agenda. The effective implementation of the standards issued by the IFSB is key towards promoting the soundness and stability of Islamic financial institution. To enhance this prospect, the IFSB has strengthened its role in facilitating greater jurisdictional preparedness in the adoption of these standards through the provision of technical assistance to its members. Malaysia is one of the jurisdictions that has adopted and operationalised the prudential standards and the guiding principles that have been issued for the industry. The implementation of these standards and guiding principles support the regulatory framework that we now have in place in our Islamic financial system. As the industry is aware, it places emphasis on the enforcement of standards for capital adequacy, effective risk management practices, liquidity management, greater financial disclosure and governance, reinforced by a strong Shariah and legal framework. Among the important initiatives of the IFSB is also the establishment of the International Islamic Liquidity Management Corporation (IILM) in 2010 which has changed the landscape for liquidity management in the international Islamic financial system, particularly in strengthening the cross-border liquidity arrangements among the Islamic financial institutions. A further initiative during the same year was the introduction of the Islamic Financial Stability Forum (IFSF), set up in 2010 to further solidify the global efforts in areas that will contribute towards safeguarding financial stability. Deliberations on wide ranging issues that pertain to risks to financial stability in the Islamic financial system have taken place at this forum. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 87 Greater awareness on issues relating to regulation and supervision of Islamic finance have also been raised at international meetings, conferences, seminars, workshops and other dialogues that have been organised by the IFSB in many countries across several continents. The initiatives and milestones achieved by the IFSB have indeed paved the way for jurisdictions across the globe to build a solid foundation for the progressive growth of Islamic finance that is underpinned with stability. Additionally, the early recognition by the IFSB of the increasing interconnectivity in a financial system, the IFSB, unlike other prudential standard setting bodies, has advanced its mission through the development of prudential standards for a broader coverage that includes the banking, capital market and insurance or takaful sectors. The prudential standards issued by the IFSB takes into account the specificities of Islamic finance and the dynamics of the various Shariah contracts used in the wide ranging products offered by Islamic financial institutions. It is within this context that Islamic financial institutions are able to perform its role more effectively as financial intermediaries that are differentiated from its conventional counterparts. With greater readiness, Islamic financial institutions can strategically position themselves to further realise the true value proposition of Islamic finance, particularly as a financial regime that places emphasis on risk-sharing and that further strengthens the link of finance to the real economy. Of importance, industry players will be better positioned to ride the evolutionary waves of financial innovation that is prevalent in Islamic finance in order to enable greater offerings of risk-sharing products to customers and businesses. In Malaysia, Islamic banks now have the potential to be better able to pursue their role as investment intermediaries through the offering of investment accounts in addition to the entrenched deposit products, in which various modes of risk-sharing contracts can be applied. This is supported by the legal recognition of investment accounts in the Islamic Financial Services Act 2013 (IFSA). _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 88 It provides a differentiation between the deposit account and the investment account which offers a new investment avenue that caters for a wider range of investor risk-return preferences. In contrast to the deposit account, these funds are being channelled directly to finance entrepreneurship in productive activities. In promoting entrepreneurship and value-creating activities, it also contributes towards generating growth and enhances the prospects for job creation. Additionally, the Investment Account Platform (IAP) that is currently being developed will provide a centralised multi-bank platform as a new financing option for entrepreneurs with viable projects as well as an opportunity for the investing public to finance these projects. It is encouraging that to date, eight Islamic banks are offering investment accounts to their customers. More are expected to follow when the value proposition of such investment accounts, with its unique features and the different target market become better understood. The industry-led communication by the Association of Islamic Banking Institutions Malaysia will contribute towards increasing the awareness of customers on the concept and on the key features of investment account. The latest establishment of a consortium developed by four Islamic banks to develop and operate the IAP which is to be launched next month is also another initiative to advance this new offering. In the development of the investment account, it will be essential for Islamic banks, investors and entrepreneurs to embrace the different approaches in the management of the risk and return relationships that are embedded in the variations of the Shariah contracts used in such investment accounts. These relationships need to be well understood by the parties involved and which are aligned with clear contractual and operational requirements. The IFSB has an important role in not only providing guidance but also in initiating the convergence of the different practices between IFSB members with regard to the treatment of the investment account - also referred to as _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 89 profit sharing investment account (PSIA) - in the IFSB standards. More in-depth work can also be explored by the IFSB on the prudential requirements for the investment account to further ensure a conducive environment for such risk-sharing offerings. The global Islamic financial system is now operating at a time when the international economic and financial environment has become immensely more challenging. New risks that are more complex, with more profound systemic implications are emanating with the increasing forces of financial liberalisation, globalisation, technological advancement, intensified competition, financial innovation and the internationalisation of Islamic finance. Cumulatively, these developments necessitate greater prudential regulation and supervisory oversight to ensure a resilient and sustainable financial system. The role of the IFSB remains instrumental and paramount as we face a time of increasing uncertainties. Continuous and stronger support for the IFSB, particularly from its members including in actively providing feedback on its Consultative Papers and in the participation in IFSB related events, supported by the existing collaboration and cooperation among the regulators would collectively strengthen the potential for the IFSB to manage its journey ahead. Greater concerted efforts by members to consistently adopt and implement the prudential standards issued by the IFSB will not only contribute towards preserving financial stability but it will also enhance regulatory harmonisation across jurisdictions. These efforts will indeed place us on a path to realising our quest and shared aspirations for a more resilient and sound global Islamic financial system. It is also timely for the IFSB to elevate its level of engagement and connectivity with other international standard setting bodies. This would enable the framework for financial stability in the context of _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 90 Islamic finance to interface with the arrangements that exists for the conventional financial system, therefore avoiding any fragmentation in the global regulatory framework. Malaysia, as the host of the IFSB will continue to be committed to support its development and its potential as a prudential standard-setting body in the international financial system. On that note, I wish you a productive session today and look forward to the constructive outcomes of this engagement. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 91 PCAOB Launches Redesigned Website Optimized for Mobile Devices The Public Company Accounting Oversight Board launched a newly redesigned website at www.pcaobus.org that uses a responsive web design. The new PCAOB site scales to fit any screen: desktop, laptop, tablet, and smartphone. In addition to the responsive design, pcaobus.org features enhanced navigation. Visitors can get to the most popular pages within the PCAOB website using the new expandable navigation – the mega menu – at the top of any page. In addition, handy footer links at the bottom of every page also provide access to the most popular and important PCAOB content. While the most visited sections of the site – Standards, for example – can be found at the same URLs, many of the main pages for program areas have been enhanced. Also, the PCAOB Careers section has been redesigned. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 92 Regulatory landscape for 2016 - positioning for a dynamic, trusted and vibrant market Keynote address by Mr Ong Chong Tee, Deputy Managing Director (Financial Supervision) of the Monetary Authority of Singapore, at the SGX Equities Dialogue 2016, Singapore Ladies and Gentlemen Good afternoon. I am delighted to join you at the inaugural SGX Equities Dialogue. A challenging start 1. 2016 has started on a challenging note for global stock markets. The first trading week of this year alone saw global markets losing close to S$3 trillion, led by sharp declines in the Chinese stock market. The STI Index has fallen by more than 20% during the last 12 months to the lowest level since October 2011. Oil prices are testing lows last seen in 2004 and many other commodity prices are also under downward pressure. 2. The prevailing negative market sentiments reinforce the importance of various measures undertaken by both MAS and SGX together with different market stakeholders, to build a more robust and resilient financial market. These include areas relating to capital, liquidity and margin rules, infrastructure resilience and so on; all of which complement various measures on promoting high standards of professional conduct, improved corporate disclosures as well as retail investor education. We have also worked with the industry at large on regular stress tests and crisis management exercises. The current uncertain macroeconomic and market environments underscore the importance of staying vigilant to new or growing risk areas and vulnerabilities. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 93 3. But it is also important not to lose sight of the long-term positives. Our capital markets continue to attract a diverse range of players and activities. Besides SGX, international exchange groups such as the InterContinental Exchange (ICE) and EUREX, have or will establish exchanges and clearing houses in Singapore. These will add to the vibrancy of our exchange landscape in parallel with the continued growth in our asset management industry. The last asset management survey done for 2014 showed robust growth in total assets under management, with assets under management increasing by 30% to S$2.4 trillion. There is clearly a role for our capital markets to help match savers and users of capital and in the management of financial risks. 4. The SGX Equities Dialogue this afternoon is a good occasion for sharing, discussion and reflection on developments affecting our securities market. Allow me to use this address to share some thoughts on our market regulatory structure, and MAS' roles in market surveillance and enforcement; and I will conclude by sharing some shorter remarks on new trends and on skills development. A sound regulatory system 5. As an international centre, Singapore's financial market is influenced by many external factors. The growth of our financial sector in part has been driven by our ability to attract international investors, traders and financial intermediaries to participate in our financial markets, and for foreign corporates to tap our markets for their funding and hedging needs. Clearly, Singapore does not and cannot operate in isolation from rest of the world; indeed, we have become an important node in the global financial system. 6. Singapore's attraction and standing as an international financial centre must be underpinned by investor confidence in a stable business _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 94 environment, with clear rule of law and a sound regulatory framework. Only when there is confidence and stability in the system would corporates, financial institutions and individuals tap our financial centre to invest, to raise capital and to manage risks. 7. As our markets develop, we must continue to safeguard this reputation of integrity, trust and resilience. Because many global financial institutions operate here, we have to also measure ourselves to international standards and expectations by incorporating international rules and best practices where appropriate. In the securities markets, the MAS has an active role in international standard setting bodies such as International Organisation of Securities Commissions (IOSCO); as an example, we co-chair a CPMI-IOSCO Working Group on strengthening the cyber resilience of financial market infrastructures, including dealing with cyber-threats. 8. As exchanges in Singapore are key financial market infrastructure with a global participation, they are regulated to meet international standards. Many of these standards are implemented through the exchanges' own business rules to ensure fair and orderly trading. 9. This brings me to the subject of SGX as a self-regulatory organisation or SRO. Singapore's capital markets operate under a dual-level regulatory framework. The MAS is the statutory regulator, and we have the broad mandate of overseeing the proper functioning of financial markets, including exchanges like the Singapore Exchange (SGX) and newer entrants such as ICE Futures Singapore (ICE Futures) and EUREX. The MAS, as you all know, is an integrated financial supervisor and our Capital Markets Group performs the equivalent regulatory functions as other standalone securities regulators including the SEC in the US, the SFC in Hong Kong or ASIC in Australia; our regulatory powers encompass policy making, supervision and enforcement. 10. The exchanges, with their frontline interface with industry players, traders and investors, perform complementary and important roles in ensuring fair, orderly and transparent markets. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 95 The exchanges are accountable to MAS on how they exercise these regulatory responsibilities. 11. Questions have been raised, and quite understandably so, on whether a listed for-profit exchange can discharge its role as a regulator. 12. In Singapore, this issue has been reviewed periodically since the demutualisation and merger of the Stock Exchange of Singapore (SES) and Singapore International Monetary Exchange (SIMEX) in 1999, to form SGX. It is important to be mindful of what the SRO function entails. 13. Let me elaborate. The SRO function goes beyond listings, which has been the main area of focus. This is partly because the listings function is the more visible part of the SRO to investors and listed companies. But in fact, the SRO function is much broader. Besides functioning as a listing authority, the SGX's SRO role also encompasses a market surveillance function to uphold the integrity of the market, and a member supervision function to ensure participants' adherence to trading and clearing rules. 14. So removing the SRO function from the SGX - as some have suggested could mean that the exchange will not need to undertake market surveillance; nor to regulate members for compliance with rules of the exchange. Others have suggested removing only the listing authority function from SGX. But the flip side is that this risks losing the synergy of its regulatory function with its other roles pertaining to the development of a viable and credible marketplace; and creates ambiguity as to who oversees proper conduct of listed companies - the separate listing authority or the exchange. 15. It is worth noting that SGX's SRO function is neither a new invention nor "uniquely Singapore". _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 96 Exchange self-regulation has a long history in financial markets and in many established markets. Most, if not all exchanges globally, perform a varying range of SRO functions. Global exchanges - like the New York Stock Exchange (NYSE), NASDAQ, ICE and Chicago Mercantile Exchange (CME) in the US, and London Stock Exchange (LSE) in the UK, and Hong Kong Exchange (HKEx), Australian Securities Exchange (ASX) Group and the Japan Exchange (JPX) Group in Asia - are also SROs. This brings me to my next point. 16. There is no single "correct" model for the SRO. Neither is a particular model cast in stone and unchangeable. The division of regulatory responsibilities between the statutory regulator and the exchange's SRO function - or some other regulatory model - has to reflect and adapt to each jurisdiction's circumstances, market environment and other idiosyncrasies. To illustrate this diversity: In the US, the SEC has primary responsibility for reviewing IPO filings made by companies. Member supervision is undertaken by the Financial Industry Regulatory Authority (FINRA), a separate industry SRO which supervises all securities broker dealers. US exchanges are responsible for market surveillance, although some have outsourced the duties to FINRA. In UK, the LSE performs market surveillance and member supervision, while listings are approved by its statutory regulator i.e. the Financial Conduct Authority. In Asia, HKEx, JPX Group and ASX Group perform all SRO functions in the areas of listings, member supervision and market surveillance, much like in Singapore. There may also be additional structures and processes in place to _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 97 supplement the SRO functions. For example HKEx has an independent Listing Committee that makes all formal decisions on listing applications. 17. The varied practices across the globe suggest the viability of different SRO models with their attendant benefits and limitations that may be appropriate to one jurisdiction while not necessarily to others. But what is common is that the notion of exchanges as frontline regulators has not been radically changed nor dismantled. 18. In Singapore's context, when we review the role of the MAS vis-? -vis an SRO, a key consideration is who is better placed to make that assessment of risk-return tradeoffs in the strategy to support a sustained thriving marketplace. A stringent set of entry or policing criteria can limit growth and development; a loose set of criteria can undermine long-term confidence of market participants including investors and companies. On either end, the exchange's own shareholders and other stakeholders including the investing public will be worse off. In addition, we have to consider who is in a more nimble position to manage the different types of risks posed by market participants on the exchange itself including early detection and preliminary investigations. 19. I should emphasise that these do not mean that concerns over potential conflict of interest especially with respect to the listing function are unfounded. Hence the MAS regularly reviews the extent to which the SRO functions listings, member supervision and surveillance - should reside with the exchange. The answer is not necessarily a binary "yes" or "no" outcome each time but involves a review of whether there are sufficient safeguards and conflict-mitigants incorporated into the exchange's governance, organisation structure and including its reward and recognition system in relation to the SRO function. 20. I will highlight our recent review in the three areas of listing, member _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 98 supervision and market surveillance. Much work has been done to enhance the exchange's role around listings. We believe that SGX - as the only securities exchange in Singapore remains an appropriate listing authority. SGX has raised its admission criteria, and enhanced the governance process by setting up three new independent listings committees to complement SGX's listing and disciplinary processes. The committees comprise a diverse mix of reputable, independent and experienced individuals to represent both investor and public interest. We believe these are positive developments and we should allow these committees to carry out their respective oversight functions. 21. However, we have also determined that there is scope to recalibrate the responsibilities of the exchange vis-? -vis the MAS in the areas of member supervision and market surveillance. The impetus for such a recalibration is not because we think that there is material or potential conflict-of-interest risk. Rather, as Singapore's financial landscape features more than one exchange, it is not efficient to have each exchange carry out similar supervisory roles of common members. Member supervision 22. Therefore, with respect to member supervision, MAS will redefine the scope of regulatory responsibilities between MAS and exchanges so that overlaps faced by intermediaries who are members of different exchanges, and at the same time regulated by MAS, are minimised. To elaborate, exchanges typically supervise intermediaries to ensure that they comply with the exchange rules, uphold high standards of market integrity and are financially sound. MAS, on the other hand, supervise intermediaries for compliance with MAS' statutory licensing requirements pertaining to systemic and conduct risks. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 99 23. In practice, exchange rules can and do overlap with the statutory requirements under the Securities and Future Act. The regular dialogue and co-ordination between MAS and SGX have allowed us to manage inspection visits in a way that reduces the burden on intermediaries who are both licensed by MAS and are members of SGX. 24. However, this will become more challenging when more than one exchange operates in Singapore. For example, an intermediary that is licensed by MAS, can also be a member of both SGX and ICE Futures; it should not have to undergo three separate inspections a year, especially if a number of areas are duplicative. 25. In the US which has many more exchanges, they have either set up a separate industry SRO to undertake member supervision in the case of the securities market or relied on an exchange to play a "lead SRO" role in the futures market. 26. As a statutory regulator, MAS will remain primarily responsible for the supervision of intermediaries who are our licensees in areas of capital and reserves, business conduct, anti-money laundering & counter terrorist financing (AML/CFT) and operational resilience. These are areas which have been stipulated in our regulations and notices, and are statutory obligations to be complied with. Starting from this year, MAS will no longer require exchanges to inspect their members in these areas as long as the entities are licensed by MAS. In other words, MAS will effectively be the "lead regulator" in these areas. 27. The need to form a separate SRO at this juncture for the purpose of member supervision is in our view, not compelling. It is unlikely to be an efficient model given the size of our market. In fact, it may require greater coordination since there will be more parties involved, namely MAS, the exchanges and yet another SRO. 28. The exchanges will remain responsible for areas affecting their respective market operations such as those relating to the priority of orders on a trading floor or risk management rules on margin requirements. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 100 In other words, these are business rules which members have to comply with, and may differ from exchange to exchange. Exchanges will need to supervise their members for compliance, in accordance with the risks these members pose to the markets or clearing houses, and undertake disciplinary proceedings for members who breach their rules. 29. Clearly, we cannot avoid all overlaps and even some differences between MAS' regulations and exchanges' rules in certain areas such as those relating to financial resources and business conduct requirements. This is in a way inevitable as MAS' regulations have to cover all capital markets intermediaries regardless whether they are members of exchanges or not. Exchanges, depending on the type of products that they offer, may need to impose differentiated requirements on different members depending on the assessment of product risks and credit worthiness of their members, which may or may not be regulated by MAS. Protocols on information sharing between MAS and exchanges' SRO units will hence be mapped out. 30. At a broader level, we believe this change will lead to greater supervisory efficiency and better system-wide risk management. While exchanges will retain their regulatory responsibilities in terms of member supervision, their resources can be concentrated on the supervision of members with significant risk exposures on their respective exchange. This can include members which are not under MAS' oversight such as those based overseas. Market surveillance 31. The MAS on our part will be enhancing our surveillance capabilities both within and across markets. The presence of multiple exchanges, each focused on its own markets, can give rise to blind spots as each exchange may not have the complete picture of common members' exposure and activities. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 101 There are also certain markets such as in the OTC derivatives space that are not under the direct surveillance of exchanges. 32. Hence MAS, as the statutory regulator, will be in a better position to aggregate and review different pools of information in the activities across exchanges and market sectors to anticipate possible risk and to investigate potential misconduct and market abuses. 33. Advancement in technology, particularly in the field of data analytics, has brought about enhanced surveillance techniques. In terms of capacity building, the MAS will enhance our analytics and thematic studies of big datasets to detect hitherto complex patterns, for potential market misconduct and abuses. 34. What all these mean, is that in each market, both the exchange and MAS will be looking out for potential risks, albeit based on different parameters. This will increase the robustness of the overall oversight of market activities. Robust enforcement and market discipline 35. These enhancements to our surveillance efforts will complement, in a significant way, our enforcement actions against market misconduct. The objective is on early detection as well as to support more expedient investigations and tough enforcement actions. This will also augment our toolkit to combat misdemeanors such as market manipulation and insider trading. 36. MAS has and will spare no effort to investigate any serious market misconduct and to take appropriate enforcement action. This is not always an easy task because investigations into market misconduct often involve complex and large scale relationships, which will necessitate considerable investigation resources. Market misconduct is often perpetrated by multiple parties, some of whom may be outside our jurisdiction. Such cross-border investigations present additional challenges, as crucial _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 102 evidence may be situated beyond the jurisdictional reach of enforcement agencies and require coordination by multiple agencies globally. 37. I am pleased to note that the joint investigations arrangement between MAS and the Commercial Affairs Department (CAD) which commenced last year for all potential market misconduct offences has facilitated greater efficiency in the enforcement process and enabled both agencies to pursue more effective enforcement outcomes. There have been queries on the status of the investigations by MAS and CAD in the penny stocks debacle; it is still premature for me to comment but I just want to note that this is a complex exercise that is ongoing and involves reviewing vast amounts of trade data from more than 500 trading accounts (both local and overseas), requiring our investigators to obtain and comb through more than 20,000 communication messages, many witnesses and other pieces of potential evidence. Investigations are at an advanced stage and charges are likely to be filed against the responsible parties in the course of this year. 38. Notwithstanding the complexity of current or future investigations, our enforcement agencies will be relentless in our pursuit of persons who break our securities laws. We will also seek criminal actions or higher civil penalties in appropriate cases to send the right deterrent message. I encourage you to read our Capital Markets Enforcement monograph which outlines our philosophy and approach to enforcement. 39. However, it is neither realistic nor desirable for regulators to police every single trade in our financial markets, which will require inordinate resources. Instead, the surveillance and enforcement functions of the MAS should be complemented by a culture of market discipline through greater transparency. This will allow market participants including investors and analysts to query, and to exercise their interests as stakeholders. As former Federal Reserve Chairman Alan Greenspan once said, "Transparency challenges market participants not only to provide _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 103 information, but also to place that information in a context that makes it more meaningful". A dynamic and evolving market 40. I will now move on to some broader development areas. Financial markets will evolve, in part driven by technology and as a response to regulatory requirements. Just as technology has improved operational efficiency of stock exchanges in the 1990s from an open-outcry pit system to real-time electronic trading screens, technology will continue to transform and improve how exchanges and other financial market infrastructures work. 41. The trend of financial markets "electronification" is inevitable as more financial products are standardised and traded electronically. We are likely to see more algorithmic trading which do not require human intervention in trading decisions. As the cost of setting up trading platforms declines, trading venues including exchanges, electronic crossing networks, multilateral trading facilities will proliferate and compete for liquidity. 42. We have seen significant investments in technology to reduce latency and design in ever-smarter algorithms to trade more efficiently. Whether such innovations have led to more efficient markets for end-users to invest and to manage their risks are still subject to some debate. Regulators worldwide also have been keeping abreast with innovative developments to understand newer forms of risks and market linkages, as well as to embrace the opportunities that these may bring. I will highlight a few examples that will be relevant to the world of exchanges. 43. I think we can expect innovations in distributed ledger technology that will be applied to the "plumbing" of financial markets, areas which we hitherto tend to take for granted. A distributed system should in theory improve resilience as it theoretically _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 104 removes the risk of a single point of failure. If the clearing and settlement of equity trades can be reduced from the existing standard of 2-3 days to as little as 10 minutes, this will further reduce settlement risk. Some have said that the near instant settlement of transactions can transform the financial system and free up billions of dollars' worth of collateral that is locked up during the trade settlement period. 44. Technology can also lead to "commoditisation" of certain financial intermediation functions. Just 15 years ago, the cost of brokerage for retail investors was as much as 1%. But now our retail investors are able to access global markets at significantly lower brokerage costs. There will be no let up on cost pressure. We used to hear about brokerages such as E-Trade offering stock trading at a $9.99 flat commission; now we have the likes of Robinhood in the U.S. offering retail trading for free. 45. The advent of "robo advisers" also suggests that investors can access automated investment advice on their Smartphones, without the need for human interface. Some commentators believe that computer algorithms can essentially provide customized advice to investors at a fraction of costs compared to human financial advisers. 46. The interplay of new technology, different platforms and new players inevitably suggests faster and cheaper options ahead. These can impinge on the existing job roles in our financial marketplace. Technology-driven applications may very well become alternatives to the traditional stockbroking service offering. If a consumer is already getting regular and instant updates on the markets using his Smartphone, it is only natural for him to expect higher service _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 105 levels from his stockbroker beyond ad-hoc market updates and pure execution. If consumers are already comfortable with making and receiving payments instantly via internet banking, there will be calls to shorten if not eliminate the 2 to 3 days taken to settle and deliver his stock. So the business model of CDP as a central securities depository may need to be reviewed in future. Upskilling the stockbroking industry 47. This leads me to the subject of skills upgrading. The Government has launched the SkillsFuture initiative last year, to allow all Singaporeans to acquire a mastery of skills and to be better prepared for future jobs. This can be helpful to financial market professionals such as our trading representatives as example. 48. The Institute of Banking and Finance (IBF) has worked with SGX to conduct a survey polling some 1,200 trading representatives last year for their feedback on their training needs and professional development. IBF has also organised extensive consultations with multiple stakeholders such as Securities Association of Singapore (SAS) and the Society of Remisiers of Singapore (SRS), as well as arranged focus group discussions with individual remisiers and dealers. 49. As a follow up to these consultations, IBF will be introducing a new set of competency standards to help trading representatives acquire competencies to service their clients better. IBF will also be working closely with the SGX Academy, SRS as well as the larger broking-firms to have in place a wide offering of training programmes to be made available to trading representatives 50. MAS will continue to support the various training initiatives. All learning and development programmes formally recognised by IBF will receive at least 50% funding subsidy from the Financial Sector Development Fund (FSDF). _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 106 In addition, trading representatives who are prepared to undergo the IBF Standards certification programme will receive 70% funding subsidy. You might be aware that the SkillsFuture Credit has already been rolled out early this month. Trading representatives can use the $500 Credit for eligible training programmes. I encourage all trading representatives to make use of these schemes to upskill themselves. 51. MAS has also looked into some feedback from the industry that certain business conduct rules pose operational challenges to trading representatives who provide advice to customers on their trades. Currently, trading representatives are subject to the same requirements as those imposed on financial advisory representatives, and are required to take into consideration the customer's investment objectives, financial situation and particular needs to ensure suitability of the products recommended which can take time to do so. Yet we recognise the time-sensitive nature of execution services for listed non-complex products such as SGX-listed shares. MAS will therefore look to exempt trading representatives from requirements that apply to financial advisory representatives by the middle of this year. This change will make it easier for trading representatives to provide investment advice on simple products. Conclusion 52. Finally, let me conclude here and thank you all for your patience and attention. May I wish everyone a very energetic and prosperous year of the Monkey. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 107 Banks and the German economy - will they continue to work hand in hand? Speech by Dr Andreas Dombret, Member of the Executive Board of the Deutsche Bundesbank, at the 4th Regensburger Wirtschaftsgespräch, Industrie- und Handelskammer (IHK) Regensburg, Regensburg. 1. Introductory remarks Mr Witzany President Olschok Ladies and gentlemen I am delighted to be here in Regensburg to speak to you today. Over the next hour, I would like to discuss with you whether banks and savings banks and enterprises will be able to continue working hand in hand in future to tackle the challenges of business life. I have learned that the forum provided by your first Wirtschaftsgespräch already discussed to what extent the sometimes complex rules of the Basel III framework might affect the supply of credit to small and medium-sized enterprises (SMEs) in particular. I would now like to revisit that debate and continue it in my speech. 2. Banks and enterprises: for or against each other? Mark Twain once said, "A banker is a fellow who lends you his umbrella when the sun is shining, but wants it back the minute it begins to rain." I probably don't have to point out that bankers aren't, of course, like that well, at least most of them aren't. On the contrary, banks often play a very important role for enterprises and for the economy as a whole. They act as mediators between those who invest capital and those who need it. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 108 They finance investments, they take on and manage risks, they settle payments and they play a supporting role for enterprises in IPOs. That means that businesses need banks, but that banks also need businesses. As at the end of last year, German banks and savings banks had lent a total of far over €900 billion to domestic enterprises alone - that corresponds to just under 12% of their consolidated balance sheet total. Their lending business, in particular with corporate clients, is therefore a key pillar of our domestic credit institutions' business activity. I am certainly not exaggerating when I say that this kind of cooperation between banks and savings banks and enterprises works well in Germany in the vast majority of cases. The traditional concept of the "house bank", or relationship banking, has major importance in particular for the German Mittelstand. Many enterprises work together with just a single credit institution, and, in a lot of cases, have done so for many years. Nevertheless, the recent financial crisis has not left the relationship between credit institutions and enterprises unaffected. The banks' standing was severely damaged, a lot of trust was forfeited, and quips like that by Mark Twain started making the rounds again. The loss of trust went so far that some enterprises made enquiries at the Bundesbank during the crisis about whether they could open an account with us, because they said that they no longer had any confidence in the commercial banks. At the same time, massive government financial rescue packages were being put together - without them it is likely that there would have been a complete collapse of the financial system with even more serious consequences for the real economy. 3. Banking regulation: we'll soon be there The financial crisis and the ensuing global financial crisis have made it abundantly clear to us how closely interlinked the financial system and the _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 109 real economy are. We have learned that institutions can be so large that they can't really be removed from the market - this is known in the debate as the "too big to fail" problem. We are also aware that credit institutions' bonus systems can get out of hand and generate destabilising effects if they are geared excessively to short-term profits and ignore long-term risks. And we now know that the banks' high degree of interconnectedness and phenomena such as herding behaviour can indeed give rise to risks for the financial system, even though each individual bank is stable when viewed in isolation. Comprehensive reforms were and are therefore still necessary in order to create a secure financial system that reliably fulfils its actual purpose for the real economy. And that is why we have seen many new regulatory initiatives over the past few years. Today, seven and a half years after the collapse of Lehman Brothers - which for many was the beginning of the financial crisis - we are significantly closer to our goal than ever before. In response to the financial crisis, the G20 countries have worked on improving the resilience of the individual banks. Strengthening the individual banks as the smallest component part of the financial system strengthens the system itself. With this goal in mind, in 2010 the Basel Committee on Banking Supervision adopted a regulatory framework, called Basel III for short. The first step set out in this framework was to overhaul the capital requirements in place for credit institutions. Equity capital is key to the stability of the banks as it constitutes their main buffer for absorbing losses. Under the new rules, banks have to satisfy higher capital requirements in terms of both quantity and quality. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 110 Since last year, these institutions have been required to hold CET1 capital equal to 4.5% of their risk-weighted assets. This was followed on 1 January by an additional 0.625% for the capital conservation buffer, which is set to rise to a total of 2.5% by 2019. From 2019, when it is possible for all instruments to be deployed in full, banks and savings banks will have to hold CET1 capital equal to at least 7% of risk-weighted assets. This is a significant increase compared with the 2% minimum ratio that applied until the end of 2013. What is more, the other new capital instruments, which include the countercyclical capital buffer and the additional buffers for the most significant institutions, also need to be backed by CET1 capital. The new rules will help make the banking system more stable as a whole. At the same time, however, it goes without saying that the new rules also place a cost burden on the banks. This is by no means unintentional in the case of buffers for the most significant institutions: as their systemic importance puts them at an advantage in terms of funding costs, this burden levels the playing field at least in part. However, some observers fear that this is also detrimental to the real economy. They argue that the new rules are making it more expensive for banks to lend and are therefore concerned that the institutions will be forced to reduce their lending activities in the future. The Basel Committee was well aware of the impact that the new rules would have. It was for this reason that the Committee also established transitional periods with the aim of rendering it easier for banks and savings banks to make the necessary adjustments. These apply to both the qualitative and the quantitative aspects of the new capital requirements. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 111 For example, the capital instruments that are no longer eligible for inclusion in CET1 capital will not be excluded in one fell swoop; instead, they will be phased out over a period of several years. Furthermore, increasing requirements regarding the level of capital to be held will be introduced only gradually. But the Basel Committee has also come in for criticism in response to these transitional periods - in the eyes of some government representatives and market observers, they appeared to constitute too great a concession to the banks. Personally, however, I believe that the Committee has served the interests of the real economy, in particular, without having to compromise on in its efforts to increase the resilience of the banking system. Of course, the development of Basel III has and will continue to be accompanied by impact studies that assess the effects of the new rules on financial institutions and the real economy. These studies have thus far come to the conclusion that the short-term economic impact is rather low and are therefore consistent with numerous earlier findings that were able to demonstrate, for instance, that credit institutions' borrowing costs would only rise marginally if additional capital requirements were imposed. According to these findings, increasing capital requirements by 100 basis points would, on average, cause institutions' overall capital costs to rise by less than ten basis points. Turning our attention to the future, tighter regulation actually promotes prosperity because it lessens the likelihood of financial crises. This is a very important point! When talking about the implications of regulation, we cannot focus solely on the short-term costs that the banks are facing - we must also pay attention to the long-term benefits. Just think of the many billions of euros of public money that had to be spent in Germany alone over recent years to stabilise the banks. In some countries, taking this measure has even plunged governments _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 112 themselves into significant financial difficulties. Viewed from this perspective, I think the price we are paying for stricter regulation is entirely appropriate. Of course, the impact that reforms have on the real economy must, nevertheless, always be taken into account. Our objective, not just within the Basel Committee, is to make banks safer and thus minimise the likelihood of financial crises. At the same time, we want to ensure two things in the event of an institution running into trouble: that the taxpayer will not immediately be called upon once again to foot the bill for failings on the part of the bank's management, and that the institution can be resolved without causing any major disruptions. Aside from this, the regulation seeks to accommodate those enterprises that rely on bank loans. Take, for instance, the Basel framework's "SME package", which was introduced under Basel II and updated under Basel III. As part of this package, the capital that has to be held against loans to small and medium-sized enterprises is cut by as much as half depending on probability of default and collateral. As a result, capital costs for loans to small and medium-sized enterprises are significantly cheaper than those for loans to larger enterprises. It will come as no surprise to you that it was the Bundesbank that campaigned so hard for this SME-friendly regulation. Notably, the Basel framework's SME package creates significant incentives for lending to small and medium-sized enterprises. Thanks to this regulation, I believe that we have been able to sensibly exert a positive influence on the relationship between banks and enterprises. 4. Regulation calls for a sense of proportion If we are to discuss the impact of banking regulation on small and medium-sized enterprises, I believe we must also consider the regulatory _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 113 implications for small and medium-sized banks and savings banks. The global regulatory reform of the banking sector in the past few years was intended to tighten the regulation of internationally active credit institutions whilst also creating a fair and level playing field worldwide. As a result, however, almost all regulatory measures are essentially aimed at internationally active large banks. This makes absolute sense in the context of the crisis. But here and there, there is a feeling that in applying the rules we may have thrown the baby out with the bathwater; in other words, we have made the rules so complex that they are overwhelming small and medium-sized institutions. As a result, the debate about the proportionality of regulation is heating up. Of course, tighter regulation means a considerable workload for banks and savings banks, as well as for supervisors. But it is also very important to weigh this against the cost to society of financial crises. Size is only one of several important criteria that determine whether an institution is "systemically important". Other major factors are substitutability, interconnectedness and exposure to similar risks, which is why we cannot simply apply a less complex set of rules to small banks than to their large competitors. Instead, these institutions must be regulated in relation to the risk they pose. At this point, I feel it is very important to emphasise that the current regulatory and supervisory frameworks are already largely proportionate. For example, at present, risk-weighted capital requirements are calculated differently under standardised approaches and internal ratings-based approaches. Furthermore, a portfolio has been introduced to help determine regulatory capital requirements in retail banking. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 114 And last but not least, small and medium-sized institutions are benefiting from greater regulatory leeway for business with corporate customers from the SME sector, which are an important client group for these banks. So as you can see, the implications of the sometimes complex new rules of the Basel III framework affect credit institutions and enterprises in similar ways. Small and medium-sized market participants, in particular - both in the financial sector and in the real economy - are concerned about the new regulation. However, I think many of their worries are unfounded. The Basel framework creates active incentives to lend to SMEs, which play an important role in employment and economic activity - especially in Germany. In addition, the new rules will provide relief for credit institutions that are less significant in terms of their impact on financial stability. In my opinion, Basel III will bring us a balanced framework that lays the foundations for sustainable economic growth. 5. Capital markets union will broaden the funding base As I mentioned earlier, the cooperation between banks and enterprises is hugely important for both parties. Whilst banks provide financing to enterprises, they are themselves dependent on enterprises to generate their income. I am firmly convinced that this symbiotic relationship in Germany functions well. But the financial crisis also showed that this symbiosis can very quickly evolve into a destructive relationship, specifically when individual banks conduct business of rather limited use to the real economy, the repercussions of which cause everyone to suffer in the end. Enterprises suffer when a crisis in the financial system snowballs into an economic crisis. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 115 Taxpayers suffer when the state has to rescue ailing banks. And banks suffer when their reputations are ruined in the wake of a crisis and both enterprises and the general public lose their trust in them. Against this backdrop, it is crucial that banks remember their true role: to finance the real economy. So how might the future relationship between banks and enterprises look? You may be familiar with the concept of the "capital markets union", which is currently the subject of much debate and which aims to bring about deeper integration of Europe's financial markets - and not just the debt markets, but also the equity capital markets. I am assuming that this will also trigger further changes to the structure of the European financial system. But we mustn't overlook the fact that much has already changed in recent years. In 1999, bank loans still made up 22% of German enterprises' liabilities; in the third quarter of 2015, this figure fell to just over 14% - and this was despite the healthy economic situation in Germany. Following their experiences in the financial crisis, when a number of banks drastically reduced their credit supply, enterprises have started seeking alternatives to the traditional bank loan and, where possible, have increasingly turned to the capital market. The scale of capital market financing nonetheless remains low in Germany especially when compared to the United States or the United Kingdom. All the same, I am confident that the cooperation between banks and enterprises will still be of great importance going forward. For SMEs, in particular, the relationship with their principal bank continues to play a vital role - not least because trust is built on past experience. A principal bank thus has an information advantage over another investor, which is highly likely to benefit enterprises. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 116 But besides market-based funding, other lenders such as insurers, other financial intermediaries or trade credits from other enterprises are also increasingly taking the place of traditional bank loans. The use of own funds has also risen, primarily among SMEs. In short, the funding options for German enterprises are becoming more varied. At this point, one might worry that this development will have a negative impact on banks' earnings, but I would like to put something into perspective here. Diversification of funding sources can surely contribute to the stability and efficiency of the financial system - and that ultimately benefits the banks, too. There is still a great deal of potential in this respect in Germany especially, but also other European countries, compared with the English-speaking world. For this reason, I take a thoroughly positive view of the increased importance of bonds, securitisations and borrowers' notes, even in the SME sector. It is particularly important, however, to pay attention to the quality of these instruments, especially in such a young market segment. Thus, even SME bonds do not provide a real way out of the funding problems of weak enterprises, but instead are a suitable instrument for larger SMEs with high credit quality. 6. Conclusion Let me sum up by saying that banks and enterprises are closely interconnected. They play a crucial role in the functioning of our economy, both individually and together. Yet to a great extent, banks and enterprises shape their relationship themselves: banks decide which enterprises to lend to at which conditions, and enterprises return this trust with their demand for loans. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 117 I am therefore firmly convinced that credit institutions and enterprises, working hand in hand, will still be able to overcome the future challenges of business life. Even so, their relationship will certainly experience further change in the coming years and incorporate additional participants, mainly in the capital market. I consider this a positive development, as the next rainstorm is sure to come, and when it does, it will be a good thing that enterprises are able to procure their umbrellas both on the capital market and in the shape of loans. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 118 Challenges for France's economy and financial sector in 2016 Mr François Villeroy de Galhau, Governor of the Bank of France, Paris Ladies and gentlemen, Thank you for coming here today to this magnificently restored Golden Gallery. This is the first time that I am giving this address as Governor of the Banque de France, but it is an auspicious tradition that brings us together. I would like to start by extending my warmest wishes to you, your colleagues and your institutions. 2016 has already been marked by volatility: weak financial markets and commodity prices, from China and the Middle East; political uncertainty in Europe, in Southern Europe, in Eastern Europe, North-Western Europe with the British referendum, and even in Central Europe with the refugee crisis. It is our duty to be vigilant, but we must also, on the one hand, distinguish real information from background noise and real challenges - and there are no shortages of them - from the sensational and sometimes excessive statements at this start of this year; on the other hand, in the face of current volatility, we must stick to our medium-term objectives. This evening I will not discuss the Eurosystem's monetary policy as we are in the "silent period" leading up to the Governing Council meeting this Thursday. Such long-term strategies also apply to the reforms in Europe and in France. I would like to broaden my personal wishes to three collective wishes: for our country and its economy first; for its smooth financing second; and for financial stability and the soundness of your institutions lastly. 1) Today a confirmed recovery is underway, with growth of over 1% in _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 119 France in 2015, and 1.5% in the euro area. In 2016, despite the uncertainties, all indicators point to higher growth. France must now transform this modest but real recovery into strong, lasting, job-creating growth. To do this, two conditions must be met in 2016: public reforms must be pursued, and corporate investment must be stepped up. As regards the reforms, France is currently being penalised by excessive debt levels in its public sector (differential of 25% of GDP vis-à -vis Germany, whereas both countries displayed the same level in 2010) and the deterioration in its trade balance and competitiveness. The fight for growth and against unemployment can only be won over time, with the great virtue of steadfastness. We must therefore keep up all efforts with regard to containing government expenditure and hold firm on that which is starting to work: the Responsibility and Solidarity Pact and the Tax Credit for encouraging Competitiveness and Jobs (CICE) should enable us to catch up, between 2014 and 2017, one-third of our competitiveness lag with Germany which built up over the first years of the euro (1999-2007). Transforming the CICE into a permanent reduction in social contributions for corporations would be a very welcome development. But more is required; the unemployed and youth cannot afford to wait. In addition to emergency plans, at least four reforms appear obvious since they have worked for our European neighbours: apprenticeships on a widespread level; simplifications, including in the area of labour law; the development of entrepreneurship; and lastly the decentralisation of social dialogue to the company level, i.e. as close as possible to the economic and human reality. Corporate investment depends first and foremost on the willingness and the confidence of thousands of entrepreneurs, but it must naturally be promoted by financing- and therefore by you. 2) This brings me to my wish concerning the smooth financing of the economy, against the backdrop of persistently low interest rates. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 120 Monetary policy is proving to be effective: in 18 months, since June 2014 and the announcement of non-standard policies, bank lending rates to business have fallen by around 80 basis points in the euro area, and outstanding bank loans have risen from a negative growth of 2.5% in June 2014 to positive growth of 0.9% in November 2015. According to estimates, including the decisions of 3 December 2014, non-standard policies improve the growth outlook for the euro area by 1% between 2015 and 2017, and that of inflation by 0.5 percentage point in 2016 and 0.3 percentage point in 2017. Bank lending must therefore remain accessible. In this respect, French banks have achieved good results. Bank lending to business has risen more sharply in France than anywhere else in Europe: up 4.5% in annual terms at end-November 2015, compared with a rise of 1% in Germany, and 0% in Italy. Moreover, interest rates in France are among the lowest in Europe. Interest rates on new bank lending are currently below 2% on average, compared to 5% in 2007. However, I would like to stress the fact that access to cash loans is more difficult for very small enterprises. Their fragile financial position may be one reason; but there is an ongoing misunderstanding with the banks that the latter must seriously address. French households' savings must also adjust to the low interest rate environment. This is an opportunity to encourage more "risky" and more long-term investments, both in the interest of investors themselves and of our economy. Today only 31% of French households' financial investments are made up of risky assets, against 45% in the euro area. This requires taking action in two directions. First, the decrease in interest rates should be gradually passed on to risk-free investment returns - this is why I proposed lowering the rate on _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 121 the PEL, the French housing savings plan, this is also why we must resolutely continue to lower the returns on life insurance invested in euro funds. Second, new products should be developed: probably less liquid, with or without a capital protection over the long term, and possibly offering the best equity performance over time. A crucial point is to avoid any tax distortions to the detriment of these products compared to liquid and risk-free investments. It remains all the more essential to fully inform investors about the risks involved when they invest their savings; two examples come to mind today, unit-linked contracts, and managers offering disintermediated financing. 3) My third and last collective wish for 2016 is that of financial stability and sound financial institutions. Since the financial crisis, the regulatory framework and the supervisory and oversight architecture have been considerably strengthened. This was necessary, I believe no one here doubts it. In the banking sector, this involved implementing Basel III / CRD4-CRR, finalising the TLAC, the new anti-shock weapon, and setting up the European banking union, which now includes two effective mechanisms: the single supervisory mechanism, and -since 1 January- the single resolution mechanism. Today, French banks are sounder: their core Tier 1 solvency ratio stood on average at 12% in September 2015, against 6% at end-2007. And contrary to the fears that have often been expressed, including by some of you, the current situation shows that these rules have not impacted lending and growth, in particular thanks to the positive effects of monetary policy. In 2016, the projects still underway should be completed. In particular in order to improve the comparability of internal models - and thus improve their credibility -, not to substantially increase overall capital requirements. To finalise and stabilise Basel III, not to open a new Basel IV. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 122 The insurance sector has not been left out. The entry into force of the European regulatory reform Solvency 2, also on 1 January, marks a profound break. We all know that "Solva 2" may still be improved; but it is a significant step forward. In this respect, it is important that all institutions continue their efforts to improve governance and enhance the quality of estimates and data submitted to supervisors, in order to ensure an adequate monitoring of risks, in particular those linked to the persistence of very low interest rates. At the international level, other challenges lie ahead, notably the definition of systemic groups - it must be similar on both sides of the Atlantic, like you I am sensitive to this-, harmonised capital requirements and resolution strategies. However, the soundness of the financial system does not depend solely on prudential regulations. It also depends on the confidence that economic players and the public, households and businesses, have in their financial system. In this respect, the efforts of financial institutions to protect their clients are essential. In 2016, what is needed is a firm implementation of the Eckert law on dormant bank accounts and unclaimed life insurance policies, and greater freedom of choice of loan insurance on real estate loans. And, of course, more than ever, we need to step up the fight against money laundering and terrorist financing. New measures have already been taken, some are being strengthened. I expect from financial institutions - both insurers and banks - an exemplary participation in this fight. I know that they fully agree to the principle, but they must now carry it through in their daily management; it is in your interest as compliance risk has become as vital, as strategic, as credit risk. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 123 May your institutions be strong on both fronts; may our country be as involved in the economic battle as in the fight against terrorism, with the contribution of all of us; and may each one of you remain vigilant and active, yet as serene as possible in 2016. Thank you for your attention. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 124 Innovation and change Speech by Mr François Villeroy de Galhau, Governor of the Bank of France, at the Annual Exchange Conference "Innovation and change", Paris Ladies and gentlemen, It gives me great pleasure to respond to Stephane Boujnah's invitation and take part in this annual conference, the subject of which is key to the French economy today. Our economy, which is at the frontier of technology, must be able to innovate continuously - and thus change - in order to improve its growth prospects. As a result, business investment, which is one of the keys to innovation, must be able to find new financing. This does not mean that traditional financing through bank loans is no longer necessary, far from it. It means that funding must become more diverse in order to meet companies' financing needs, regardless of their size, age or sector. And of course, in this area, Euronext and the entire financial community have a vital role to play. But before addressing in more detail the financial levers of business investment, I would first like to talk about the economic levers that precede the need for financing. I. In economic terms, how are France and the euro area currently faring, and how can we move things up a gear? 2016 has already got off to a volatile start: weakness in financial and commodity markets, originating in China and the Middle East; political uncertainty in Europe, in southern Europe, in Eastern Europe, in north-western Europe with the British referendum, and even in central Europe with the refugee crisis. It is our duty to be vigilant, but we have two other imperatives: on the one hand, to separate the reality from the hype, the real challenges - and there is no shortage of them - from the sensationalist and sometimes excessive _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 125 statements made early this year; on the other, to stick to our medium-term objectives in the face of the current volatility. This evening, I will not speak of monetary policy, since we are in the silent period before the Governing Council meeting on Thursday. But this long-term strategy must apply to economic policy as a whole, including the need for reform. a) Today a confirmed recovery is underway, with growth of over 1% in France in 2015 and 1.5% in the euro area. In 2016, despite the uncertainties, all indicators point to higher growth. Despite the weakening of large emerging countries, the French and European economies should continue to benefit from an exceptional combination of three trends: (i) the significant drop in oil and commodity prices (-45% and-31% respectively, in dollar terms, between 1 January 2015 and 14 January 2016); (ii) the downward trend in the exchange rate of the euro against the dollar (-10% over the same period); (iii) and very low interest rates (-80 basis points in bank lending rates since June 2014). The non-standard monetary policy that we have conducted in Europe since June 2014 has done a lot for our economy. We now have reliable and concurrent estimates of its effectiveness: it has boosted growth prospects in the euro area by about 1% for the period 2015 to 2017, and those of inflation by 0.5 percentage point in 2016 and 0.3 percentage point in 2017. All this is a lot... and in this respect our growth performance remains insufficient, lower than what should be achieved thanks to these exceptional economic stimuli, and lower than the European average. b) We must now turn our too moderate economic recovery into strong, sustainable and job-creating growth. This shall notably be achieved by boosting business investment. The _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 126 problem does not lie with the amount of French investment, since the investment rate of non-financial corporations, which stood at 22.9% in 2015, is slightly above its long-term average, i.e. 21.4% since 1980. The problem lies with its quality and productivity, which is insufficient to support growth: a large amount of construction, not enough machinery and equipment nor research and development. Boosting productive investment is not something that can be decided from above: it depends on the decisions of thousands of entrepreneurs. But all are above all sensitive to three levers. First, growth prospects, since order books, i.e. expected demand or GDP, are the main drivers of investment. To raise medium-term growth in France, structural reforms are essential. Today we know France's handicaps: a highly indebted public sector, declining competitiveness, unwieldy procedures. We also know the solutions: they have worked in other European countries, Sweden in the 1990s, Germany in the 2000s, Spain in the 2010s. The second lever is confidence. Uncertainty is the enemy of investment. To reduce uncertainty, rules should be simplified, stabilised and made more visible. Finally, the third lever is profitability. This factor has a more direct effect for many SMEs which are sensitive to the volume of their self-financing. II. However, while firms' investment decisions are mainly influenced by economic levers, financial levers also have an important role to play. a) Today, companies need more appropriate financing: our challenge concerns equity financing more than debt financing. In order to steer investments increasingly towards innovation, making _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 127 them de facto more and more risky, financing has to evolve. Innovative investments call for new modes of financing. European companies therefore need loans that are less secured, but also, for business start-ups and growing businesses, more equity capital. Indeed, equity capital has two advantages: it gives the entrepreneur access to long-term funds while also offering investors strong upside potential to reward the risk incurred. A catching-up economy - like Europe until the 1980s, and many emerging countries today - can finance its growth through debt. An economy at the technological frontier, which carries greater risk, must rely more on equity financing. However, in the euro area, companies' financing structure remains predominantly based on debt rather than equity. By comparison, the net equity of non-financial corporations represents 123% of GDP in the United States, against 52% in the euro area. This transatlantic divide, which is hardly ever mentioned, is even larger than the gap in rates of debt disintermediation: the well-known figure of 20% of capital market financing in Europe compared with 75% in the United States. b) With regard to debt, France's situation currently appears on the whole satisfactory. Bank financing remains easily accessible. Indeed, in terms of volume, outstanding bank loans to businesses are rising at a faster pace in France than anywhere else in Europe, posting growth of 4.5% year-on-year at end-November 2015, compared with +2.1% in the United Kingdom, +1.0% in Germany, 0.0% in Italy and an average of +0.9% for the euro area. Interest rates in France are also among the lowest in Europe: the average nominal rate on new bank loans is currently less than 2% compared with 5% in 2007. Lastly, SMEs generally have little difficulty obtaining investment loans: _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 128 according to the Banque de France's survey, in the third quarter of 2015, 92% of loan applications were accepted (i.e. at least 75% of the amount requested was granted), although there is still room for improvement in the case of VSEs. At the same time, bond financing is increasing. The trend towards the diversification of debt financing appears to be more marked in France than in neighbouring European countries, with companies increasingly turning to capital markets to meet their funding needs. The disintermediation rate, that is the share of bond financing in overall corporate debt, has risen from 24.2% in 2008 to 38.6% in 2015, compared with respective rates of 14.1% and 13.5% for Germany and Italy. Nonetheless, in France, market financing is mainly the preserve of large corporations, accounting for some 70% of their total financial debt, compared with 25% for mid-caps and less than 5% for SMEs. Yet forcing them to switch to disintermediated financing would make little sense: this diversification of funding has to remain optional, driven by demand from companies themselves, rather than being imposed according to a set timetable and pre-defined objectives. c) The priority of increasing equity funding can be achieved via several channels. With regard to "internal" equity, that is self-financing, the outlook is improving. For SMEs in particular, self-financing is crucial as it is still the method of choice for financing investment, even when companies have access to debt. The decline in French corporate profit margins since 2008 is a source of concern in this respect. However, the issue has been clearly identified and steps have been taken to tackle it, with the Tax Credit for Competitiveness and Employment or CICE, and the Responsibility and Solidarity Pact. These reforms are expected to boost the average corporate profit share from 29.5% in 2014 to over 32% in 2017. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 129 In terms of "external" equity, of course, here at Euronext you're at the heart of the action. As the leading pan-European stock exchange, you have a central role to play in enabling firms to access capital market financing, in the form of debt, of course, but above all in the form of equity. In this respect, I'd like to acknowledge Euronext's efforts - under the supervision of the AMF with which the Banque de France has an excellent working relationship - to draw investors back to the bourse, and to encourage firms of all sizes and all sectors to tap capital markets. In the first three quarters of 2015, Euronext helped 38 companies carry out an initial public offering, raising a total of EUR 82.9 billion of equity and debt capital in both primary and secondary markets. Its subsidiary EnterNext, which is dedicated to the financing and promotion of small and mid-caps, in turn enabled 26 companies to carry out IPOs, raising EUR 6 billion over the period. You are thus helping to bring about two important reconciliations: between the worlds of business and finance, and between France and its appetite for risk. What's more you are achieving this with a European dimension. I can't stress this enough: having a strong position in market infrastructure is vital for the French economy. I would like to look beyond Euronext now, and focus on two more general avenues for promoting equity financing. First, the French public needs to adapt its savings behaviour to the current low interest rate environment. This is a chance to encourage a "riskier" and more long-term approach to investment, in the interest both of savers and our economy. Today, only 31% of households' financial investments are made up of risky assets, compared with 45% in the euro area. This means taking action in two areas: first, the decrease in interest rates should be gradually passed on to risk-free investment returns - which is _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 130 why I proposed lowering the rate on the PEL, the French housing savings plan, and why we must continue to lower the returns on life insurance savings invested in euro funds; second, we need to develop new products: less liquid, and with or without a long-term capital guarantee, and which allow savers to benefit from the higher returns offered by equities over the long term. A crucial point is to avoid any tax distortions that might mean these products are penalised more than liquid and risk-free investments. This level playing field in terms of taxation should also apply to the companies that are financed: in other words we need to avoid making debt financing more attractive than equity financing- and we know we have a long way to go on this. The second avenue for fostering equity financing is to boost cross-border capital flows within the euro area. One of the great paradoxes of the single currency bloc is that investment is too low while savings are generally in plentiful supply: the region has a high current account surplus, of more than EUR 300 billion per year, or over 3% of GDP for the 12 months up to end-September 2015. The problem is that these savings cannot circulate freely between member states due to financial fragmentation. This situation has serious consequences. It generates a growth lag, as excess savings in core countries are unable to satisfy the demand for investment in the periphery. It also makes the euro area more fragile, as national shocks cannot be smoothed by fiscal transfers - due to the lack of a fiscal union - or by stable, long-term private sector capital flows. By way of comparison, in the United States, 39% of shocks are absorbed by capital flows between federal states and only 13% by government transfers. These are flows of equity, not of credit: the former are much more effective at absorbing shocks as they are a genuine means of cross-border risk sharing. A large part of the solution lies at European level, with the European Commission's plan for a Capital Markets Union (CMU). _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 131 However, the goals and ambition of this project need to be more clearly defined if it is to be a success. I prefer to talk instead about a Financing and Investment Union, for two reasons: first, because capital markets are merely a tool - the main objective is the sound financing of investment; second, because our channels of funding need to remain diverse - capital markets must coexist alongside bank lending, as well as private equity funding from insurers and asset managers. This Financing and Investment Union should be a consolidation and synthesis of the CMU, the Banking Union and the Juncker Plan. It would allow us to foster even greater cross-border capital flows, and share the burden of risk through innovative mechanisms, such as European venture capital schemes. Let me conclude with a more general remark. It's tempting sometimes to be fatalistic: to say our growth depends on China, and that innovation can only come from the United States. Admittedly, the international environment does play an important role; but our economic destiny depends primarily on us, on our ability to innovate and to reform. Financing is merely a part of our current transformation, one that lends support to the economy and to our businesses. But it is a vital part of that transformation, and I am pleased that this conference is giving it the consideration it deserves. Thank you for your attention. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 132 Hearing at the Committee on Economic and Monetary Affairs of the European Parliament Introductory statement by Mr Mario Draghi, President of the European Central Bank, before the Hearing at the Committee on Economic and Monetary Affairs of the European Parliament, Brussels Mr Chairman, Honourable Members of the Economic and Monetary Affairs Committee, Ladies and Gentlemen, The first weeks of this year have shown that the euro area and the Union at large face significant challenges. A strong effort by all policy makers will be needed in the months ahead to overcome them. I am therefore grateful to be back before your committee to discuss these challenges and how the ECB can contribute to tackling them. In my remarks today, I will address in turn the global economic context, recent financial developments and the state of the euro area recovery. I will conclude by briefly presenting our most recent decision to disclose the Agreement on Net Financial Assets - or ANFA - as I know this topic is of concern to some of you. The state of the global economy Let me start with the state of the global economy. In recent weeks, we have witnessed increasing concerns about the prospects for the global economy. Activity and trade data have been weaker than expected, turbulence in financial markets has intensified and commodity prices have declined further. Slowing growth in emerging market economies is a focal point for this uncertainty. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 133 In the early years of this century, many emerging economies expanded at a rapid pace. They benefited from increasing integration with the global economy and the tailwinds of buoyant financial markets. As these factors diminish, many countries have to adjust to a new reality. In several economies the slowdown has revealed and exacerbated structural problems which are increasingly restraining growth. A continuation of the rebalancing process is needed to secure sustainable growth over the medium term. This could imply some headwinds in the short term, which will require close monitoring of the related risks. One consequence of this adjustment is the divergence of economic cycles. While the recovery in advanced economies is gradually proceeding, the growth momentum in emerging market economies has weakened. Weaker global demand has also contributed to the recent fall in the price of oil and other commodities, which in turn may have aggravated fiscal and financial fragilities in some commodity-exporting economies. Countries that have suffered worsening terms of trade have seen a sharp decline in activity, while investment in their energy sectors has contracted. Recent financial developments Since early December, a general deterioration in market sentiment has taken root and has gathered pace over the last week. This initially appeared closely linked to concerns regarding weakening economic activity around the globe - notably in emerging markets - and to potential adverse signals from falling commodity prices. Over time however, market sentiment has become more volatile and susceptible to rapid change. In this environment, stock prices significantly declined and bank equity prices were particularly hit, both globally and in Europe. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 134 The sharp fall in bank equity prices reflected the sector's higher sensitivity to a weaker-than-expected economic outlook; it also reflected fears that some parts of the banking sector were exposed to the higher risks in commodity-producing sectors. The bulk of euro area listed banks, although they have relatively limited exposure to emerging markets and commodity producing countries, are currently trading well below their book values. The fall in bank equity prices was amplified by perceptions that banks may have to do more to adjust their business models to the lower growth/lower interest rate environment and to the strengthened international regulatory framework that has been put in place since the crisis. However, we have to acknowledge that the regulatory overhaul since the start of the crisis has laid the foundations for durably increasing the resilience not only of individual institutions but also of the financial system as a whole. Banks have built higher and better-quality capital buffers, have reduced leverage and improved their funding profiles. Moreover, the Basel Committee on Banking Supervision noted that substantial progress has been made towards finalising post-crisis reforms and that the remaining elements of the regulatory reform agenda for global banks are being finalised. The clarification of these elements will provide regulatory certainty on the stability of the future framework. This will support the banking sector's ability to make long term sustainable business plans into the future. In fact, central bank governors and heads of supervision indicated that they are committed to not significantly increase overall capital requirements across the banking sector. In the euro area, the situation in the banking sector now is very different from what it was in 2012. Perhaps most importantly, euro area banks have significantly strengthened their capital positions over the past few years, notably as a consequence of the Comprehensive Assessment conducted in 2014. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 135 For significant institutions, the CET1 ratio has increased from around 9 to 13%, making them more resilient to adverse shocks. In addition, the quality of the banks' capital has also been substantially improved. With the 2015 Supervisory Review and Evaluation Process (SREP), the ECB has outlined the steady-state Pillar 2 supervisory capital requirements. This means that, all things equal, capital requirements will not be increased further. Hence, the banking sector can now conduct much better capital planning. Moreover, in 2015, the banks under ECB supervision further increased profits relative to 2014. This allows banks to have appropriate distribution policies while still meeting regulatory capital requirements and buffers, and to support lending to the economy. In addition, the ECB's monetary policy actions continue to support banks' financing conditions and, more broadly, economic activity. Clearly, some parts of the banking sector in the euro area still face a number of challenges. These range from uncertainty about litigation and restructuring costs in a number of banks to working through a stock of legacy assets, particularly in the countries most affected by the financial crisis. There is a subset of banks with elevated levels of non-performing loans (NPLs). However, these NPLs were identified during the Comprehensive Assessment, using for the first time a common definition, and have since been adequately provisioned for. Therefore, we are in a good position to bring down NPLs in an orderly manner over the next few years. For this purpose, the ECB's supervisory arm is working closely with the relevant national authorities to ensure that our NPL policies are _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 136 complemented by the necessary national measures. The state of the euro area recovery and the role of economic policies Against the background of downward risks emanating from global economic and financial developments, let me now turn to the economic situation in the euro area. The recovery is progressing at a moderate pace, supported mainly by our monetary policy measures and their favourable impact on financial conditions as well as the low price of energy. Investment remains weak, as heightened uncertainties regarding the global economy and broader geopolitical risks are weighing on investor sentiment. Moreover, the construction sector has so far not recovered. In order to make the euro area more resilient, contributions from all policy areas are needed. The ECB is ready to do its part. As we announced at the end of our last monetary policy meeting in January, the Governing Council will review and possibly reconsider the monetary policy stance in early March. The focus of our deliberations will be twofold. First, we will examine the strength of the pass-through of low imported inflation to domestic wage and price formation and to inflation expectations. This will depend on the size and the persistence of the fall in oil and commodity prices and the incidence of second-round effects on domestic wages and prices. Second, in the light of the recent financial turmoil, we will analyse the state of transmission of our monetary impulses by the financial system and in particular by banks. If either of these two factors entail downward risks to price stability, we will not hesitate to act. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 137 In parallel, other policies should help to put the euro area economy on firmer grounds. It is becoming clearer and clearer that fiscal policies should support the economic recovery through public investment and lower taxation. In addition, the ongoing cyclical recovery should be supported by effective structural policies. In particular, actions to improve the business environment, including the provision of an adequate public infrastructure, are vital to increase productive investment, boost job creations and raise productivity. Compliance with the rules of the Stability and Growth Pact remains essential to maintain confidence in the fiscal framework. The Agreement on Net Financial Assets Let me conclude by turning briefly to the recent decision to publish the Agreement of Net Financial Assets, also known as ANFA. This is another step to live up to our commitment to be accountable and transparent, both towards you as Parliament and towards the public at large. The ANFA is an agreement between the ECB and the euro area National Central Banks - the NCBs. It ensures that monetary policy is unaffected by NCB operations related to their national, non-monetary policy tasks. The right to perform such tasks dates back to the start of Economic and Monetary Union. At that time, the founding member states decided to centralise only central bank functions and tasks that are necessary to conduct a single monetary policy. All other tasks remained with the NCBs. Such national, non-monetary policy tasks include managing the NCBs' remaining foreign reserves - including gold - after the transfer of foreign _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 138 reserves to the ECB, managing some non-monetary policy portfolios including those related to pension funds for their employees, or providing payment services to national governments. When the NCBs hold portfolios not related to monetary policy as part of their national tasks, these portfolios are financed either by central bank money provided by the NCBs or by non-monetary liabilities. This does not interfere with monetary policy as long as it is limited to less than the amount of banknotes needed by the public. This limit ensures that banks still have to borrow from the Eurosystem at the monetary policy rate set by the Governing Council. Here is where the ANFA comes in. Its purpose is to limit the size of the NCBs' non-monetary policy portfolios, net of the related liabilities, and thus to ensure that the Eurosystem can effectively implement the single monetary policy. Of course, when performing national tasks, the NCBs must comply with the Treaty including the prohibition of monetary financing. Moreover, if these tasks were to interfere with monetary policy in any other way, they can be prohibited, limited or have conditions placed on them by the Governing Council. The publication of the previously confidential ANFA text was a unanimous decision of the ECB and the NCBs in the Eurosystem to live up to our commitment to be transparent. This publication should resolve misunderstandings about ANFA. In particular, it clarifies that the sole purpose of ANFA is to set limits for non-monetary policy operations related to national tasks of the NCBs, which they are allowed to conduct according to the Treaty. Nothing more and nothing less. These limits ensure that the NCBs' operations do not interfere with the objectives and tasks of the Eurosystem and, in particular, with the single monetary policy. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 139 Finally, complementing the information on ANFA, the ECB also published data on the Eurosystem's aggregate net financial assets. The NCBs will follow suit and disclose their respective net financial assets when publishing their annual financial accounts. These data provide factual information to the public as to which part of central bank money demand is provided by non-monetary policy operations. Thank you for your attention, and I look forward to your questions. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 140 Disclaimer The Association tries to enhance public access to information about risk and compliance management. Our goal is to keep this information timely and accurate. If errors are brought to our attention, we will try to correct them. This information: is of a general nature only and is not intended to address the specific circumstances of any particular individual or entity; should not be relied on in the particular context of enforcement or similar regulatory action; - is not necessarily comprehensive, complete, or up to date; is sometimes linked to external sites over which the Association has no control and for which the Association assumes no responsibility; is not professional or legal advice (if you need specific advice, you should always consult a suitably qualified professional); - is in no way constitutive of an interpretative document; does not prejudge the position that the relevant authorities might decide to take on the same matters if developments, including Court rulings, were to lead it to revise some of the views expressed here; does not prejudge the interpretation that the Courts might place on the matters at issue. Please note that it cannot be guaranteed that these information and documents exactly reproduce officially adopted texts. It is our goal to minimize disruption caused by technical errors. However some data or information may have been created or structured in files or formats that are not error-free and we cannot guarantee that our service will not be interrupted or otherwise affected by such problems. The Association accepts no responsibility with regard to such problems incurred as a result of using this site or any linked external sites. _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 141 The International Association of Risk and Compliance Professionals (IARCP) You can explore what we offer to our members: 1. Membership – Become a standard, premium or lifetime member. You may visit: www.risk-compliance-association.com/How_to_become_member.htm If you plan to continue to work as a risk and compliance management expert, officer or director throughout the rest of your career, it makes perfect sense to become a Life Member of the Association, and to continue your journey without interruption and without renewal worries. You will get a lifetime of benefits as well. You can check the benefits at: www.risk-compliance-association.com/Lifetime_Membership.htm 2. Weekly Updates - Subscribe to receive every Monday the Top 10 risk and compliance management related news stories and world events that (for better or for worse) shaped the week's agenda, and what is next: http://forms.aweber.com/form/02/1254213302.htm 3. Training and Certification - Become a Certified Risk and Compliance Management Professional (CRCMP) or a Certified Information Systems Risk and Compliance Professional (CISRSP). The Certified Risk and Compliance Management Professional (CRCMP) training and certification program has become one of the most recognized programs in risk management and compliance. There are CRCMPs in 32 countries around the world. Companies and organizations like IBM, Accenture, American Express, USAA etc. consider the CRCMP a preferred certificate. You can find more about the demand for CRCMPs at: www.risk-compliance-association.com/CRCMP_Jobs_Careers.pdf _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP) P a g e | 142 You can find more information about the CRCMP program at: www.risk-compliance-association.com/CRCMP_1.pdf (It is better to save it and open it as an Adobe Acrobat document). For the distance learning programs you may visit: www.risk-compliance-association.com/Distance_Learning_and_Certificat ion.htm For instructor-led training, you may contact us. We can tailor all programs to specific needs. We tailor presentations, awareness and training programs for supervisors, boards of directors, service providers and consultants. 4. IARCP Authorized Certified Trainer (IARCP-ACT) Program - Become a Certified Risk and Compliance Management Professional Trainer (CRCMPT) or Certified Information Systems Risk and Compliance Professional Trainer (CISRCPT). This is an additional advantage on your resume, serving as a third-party endorsement to your knowledge and experience. Certificates are important when being considered for a promotion or other career opportunities. You give the necessary assurance that you have the knowledge and skills to accept more responsibility. To learn more you may visit: www.risk-compliance-association.com/IARCP_ACT.html 5. Approved Training and Certification Centers (IARCP-ATCCs) - In response to the increasing demand for CRCMP training, the International Association of Risk and Compliance Professionals is developing a world-wide network of Approved Training and Certification Centers (IARCP-ATCCs). This will give the opportunity to risk and compliance managers, officers and consultants to have access to instructor-led CRCMP and CISRCP training at convenient locations that meet international standards. ATCCs use IARCP approved course materials and have access to IARCP Authorized Certified Trainers (IARCP-ACTs). To learn more: www.risk-compliance-association.com/Approved_Centers.html _____________________________________________________________ International Association of Risk and Compliance Professionals (IARCP)