Effective Date: 18 september 2023
Issued by: Neobank Capital
Approved by: Chief Risk Officer (CRO) & Chief Information Security Officer (CISO)
1. Purpose
The purpose of this Risk Assessment and Treatment Policy is to establish a structured process for identifying, evaluating, managing, and mitigating risks to Neobank Capital’s operations, systems, and customers.
Objectives:
- Protect customer data and financial assets.
- Ensure compliance with global regulations, including GDPR, UK GDPR, CCPA, PCI DSS, and fintech-specific standards.
- Reduce the likelihood and impact of operational, financial, cybersecurity, and strategic risks.
- Support informed decision-making across all business functions.
2. Scope
This policy applies to:
- All employees, contractors, vendors, and third-party service providers.
- All systems, applications, cloud services, APIs, decentralized infrastructure, and operational processes.
- All risk categories including:
- Operational: Process failures, human error, system downtime
- Cybersecurity: Data breaches, hacking, malware, and cryptographic key compromise
- Financial: Fraud, payment errors, liquidity risks
- Regulatory & Compliance: Non-compliance with local or international regulations
- Strategic & Reputational: Business disruption, public perception, customer trust
3. Risk Management Principles
Neobank Capital follows these principles:
- Proactive Identification: Continuously detect potential threats to systems, processes, and data.
- Risk-Based Decision Making: Prioritize risks based on likelihood and potential impact.
- Regulatory Alignment: Ensure all risk treatments meet regulatory and industry standards.
- Continuous Monitoring: Maintain ongoing risk evaluation through automated systems, audits, and reporting.
- Integration: Align risk management with incident response, BC/DR, security, and compliance programs.
4. Roles and Responsibilities
Role | Responsibility |
Chief Risk Officer (CRO) | Lead enterprise risk management; approve risk treatment plans. |
Chief Information Security Officer (CISO) | Identify and mitigate cybersecurity and IT risks. |
Data Protection Officer (DPO) | Evaluate data privacy risks; ensure GDPR and CCPA compliance. |
Department Heads / Managers | Identify operational risks and implement mitigation controls within their areas. |
Employees / Contractors | Report observed or suspected risks; comply with risk mitigation measures. |
Risk Committee | Review high-level risks, approve treatment strategies, and monitor effectiveness. |
5. Risk Assessment Process
5.1 Identification
- Identify risks to people, processes, technology, and third-party relationships.
- Sources may include internal audits, monitoring tools, incident reports, and regulatory updates.
5.2 Analysis
- Determine likelihood (rare, unlikely, possible, likely, almost certain).
- Determine impact (insignificant, minor, moderate, major, critical) on:
- Customers
- Business operations
- Financial position
- Regulatory compliance
- Document risk scenarios and affected assets.
5.3 Evaluation
- Assign a risk rating (low, medium, high, critical) using a risk matrix.
- Prioritize risks for treatment based on impact and probability.
6. Risk Treatment
Neobank Capital applies the following risk treatment strategies:
- Avoidance: Eliminate activities or exposures that present unacceptable risk.
- Mitigation: Implement controls to reduce likelihood or impact, e.g., encryption, MFA, or process redesign.
- Transfer: Shift risk to third parties or insurers where appropriate, e.g., cyber insurance or vendor contracts.
- Acceptance: Acknowledge low-level risks and monitor them continuously.
Each treatment plan must include:
- Assigned owner
- Timeline and deadlines
- Required resources
- Monitoring and review plan
7. Risk Monitoring and Reporting
- Maintain a centralized Risk Register with all identified risks, assessments, and treatments.
- Monthly risk reports to the Risk Committee and senior management.
- Quarterly reviews of high and critical risks.
- Automated alerts for new or escalated risks detected in IT systems or business operations.
8. Third-Party and Vendor Risk
- Assess and monitor all third-party vendors for operational, security, and regulatory risk.
- Include risk mitigation and compliance requirements in contracts and SLAs.
- Conduct periodic audits and reviews of high-risk vendors.
9. Risk Documentation
Each risk assessment must include:
- Risk description and source
- Likelihood and impact evaluation
- Risk rating and category
- Assigned owner
- Risk treatment plan and status
- Monitoring and review notes
All records are retained for minimum 5 years or longer if required by law.
10. Training and Awareness
- Annual training on risk identification, reporting, and mitigation for all employees and contractors.
- Scenario-based exercises to reinforce understanding of cyber, operational, and financial risks.
- Specialized training for Risk Committee members, IT staff, and department heads.
11. Policy Review
- Reviewed annually or after any significant incident, regulatory change, or operational shift.
- Updates require approval by CRO, CISO, DPO, and Risk Committee.
12. Contact Information
Chief Risk Officer (CRO)
📧 risk@neobank.capital
Chief Information Security Officer (CISO)
📧 security@neobank.capital
Data Protection Officer (DPO)
📧 privacy@neobank.capital