02/04/2026 | Press release | Distributed by Public on 02/04/2026 10:24
1. Background
1.1 Overview
Globally, cyber security has been ranked as the current and future top risk for organizations by the IIA's Risk in Focus 2025 (PDF) report. This ranking is consistent with OSFI's risk outlook.
NISTFootnote 1 describes cyber security as the process and controls related to preventing, detecting and responding to cyber incidents. Cyber incidents can have operational impacts, such as data loss, as well as reputational impacts, if stakeholders lose trust in OSFI due to the perception that OSFI cannot safeguard sensitive information. As a result, robust cyber security processes, supported by both the CIO and CSO teams, are critical to ensuring the integrity, availability, and confidentiality of OSFI's information.
Effective governance and risk management are essential to ensure cyber security risks are appropriately identified, assessed, and managed in alignment with OSFI's risk appetite. An effective cyber security governance and risk management structure should ensure accountability is clear across all stakeholders, with defined roles and responsibilities, to ensure that the decision-makers are well informed of OSFI's cyber security's exposures, mitigation strategies and responses.
1.2 Context on Why We Did This Audit
In the six years since the most recent engagement in this area, OSFI's cyber security risks have escalated, with the shift to a hybrid work environment and transition to the cloud along with increasing sophistication and frequency of cyber incidents targeting government institutions. This audit is the first engagement in a broader cyber security audit program and focused on the governance and risk management processes supporting cyber security operations.
2. Summary of Audit Results and Findings
2.1 Overview of Results
While OSFI has established cyber security governance and risk management processes, a resource-constrained environment and rapidly evolving risks underscore the need for improvement in the adaptability, integration and timeliness of risk management and oversight processes to enhance the effectiveness of preparedness and risk responses.
Overall, Internal Audit has identified three specific areas to enhance governance and risk management of cyber risk, including:
2.2 Management Response
Management agrees with the findings and recommendations contained within this report and has identified Management Action Plans with associated timelines for each recommendation as outlined in the relevant sections.
3. Key Findings
3.1 Governance and Oversight Processes
Effective cyber security governance and oversight require systematic and timely reporting to ensure accountability and effective decision-making.
What We Found
At OSFI, the Executive Committee (EC) provides oversight of operations, supported by other committees and sub-committees, including the Management Oversight Committee (MOC) and the Enterprise Risk Management Committee (ERMC). While these committees have defined terms of reference, IA did not find accountability and reporting mechanisms that supported effective EC oversight. Specifically, IA noted:
Why It Matters
Without access to relevant, timely, and integrated information, decision makers do not have an adequate understanding OSFI's overall risk exposure, which may limit the effectiveness of decision-making in supporting risk management and resource allocation.
Recommendation #1 (High Risk)
The Deputy Superintendent of Integrity, National Security and Integrated Solutions (INSIS), with Executive Leadership Team (ELT) input, should ensure that risk escalation and reporting requirements are established to enable effective decision-making, including through the CIO having direct access to the Superintendent.
3.2 Risk Management Challenge & Assessments
An effective risk management function is one that supports executive decision-making and accountability by providing independent monitoring and challenge of the effectiveness of risk management programs.
What We Found
OSFI's risk management function consists of the Enterprise Risk Management (ERM) and Internal Risk Management (IRM) teams. Established risk management processes include quarterly CRO updates to EC, Risk and Control Self-Assessment (RCSAs), etc. During the audit, IA noted some gaps in the risk management function's oversight and challenge for cyber security risk management, including:
Why It Matters
Without robust risk management monitoring and challenge, senior management has reduced visibility into the effectiveness of cyber security risk management, which may hinder oversight and decision-making.
Recommendation #2 (Medium Risk)
The CRO should implement monitoring and challenge activities, including monitoring KRIs and risk mitigation activities, to effectively support senior management oversight and decision-making.
3.3 Risk-Based Management
Integrated and risk-based resource management can enable agility in the reallocation and reprioritization of activities to adapt to changes in the risk environment.
What We Found
OSFI lacks a defined resource management process to clarify expectations and steps for Sectors to follow for resource allocation or requests. This gap created inconsistencies in resource requests relating to cyber security, requiring the establishment of a tiger team to propose resource management solutions.
The broader resourcing mechanisms, including interim measures such as the Resource Management Committee, will be further examined in the Audit of Budgeting and Financial Management for enterprise-wide implications.
Additionally, at both the Sector and divisional level, there is a lack of information to demonstrate how existing resources are being utilized across the different risk and operational priorities, limiting the effectiveness of resource reallocation decisions.
Why It Matters
Without integrated risk-based resource management, OSFI may not have adequate information to understand the impacts and be agile and prudent in managing existing resources.
Recommendation #3 (Medium Risk)
Given the constrained environment, the CIO and CSO should establish risk-integrated resource plans to inform Sector-level planning and enable agile resource management and prioritization for cyber risks.
3.4 Staffing Planning & Talent Management
Effective talent management mechanisms enable OSFI to ensure that it can effectively recruit and retain employees with the skillsets it needs.
What We Found
OSFI's ongoing recruitment and talent retention efforts are challenged by increased competitiveness for qualified cyber security talent, requiring proactive measures to support OSFI in attracting and retaining the talent it needs. IA noticed some gaps in OSFI's current staffing planning, recruitment, and retention processes related to the area of cyber security, including:
Why It Matters
To ensure it attracts and retains the talent it needs in this highly competitive industry, OSFI needs to be proactive in its planning and in ensuring it can attract and retain its workforce by offering competitive compensation packages.
Recommendation #4 (Medium Risk)
The CHRO should support the CIO and CSO in developing strategic workforce planning for critical positions, including but not limited to, succession plans and talent management solutions to minimize key staffing gaps.
Recommendation #5 (Medium Risk)
The CHRO should benchmark compensation packages against external compensation at an appropriate frequency to ensure OSFI's competitivity when hiring for cyber security positions.
3.5 Strengthening the Accountability and Agility of CIO and CSO Roles
As established by the GC Enterprise Cyber Security Strategy, strong, defined relationships and communication between CIOs and CSOs are essential to managing cyber security risks.
What We Found
TBS and OSFI policies identify three key accountable parties for cyber security related risks - the CIO, the CSO, and the Designated Official for Cyber Security (DOCS). While the CIO is broadly responsible for IT security, the DOCS (reporting to the CIO) is responsible for cyber security planning and integration specifically. Comparatively, the CSO is broadly responsible for OSFI's overall security posture and culture.
While both the CIO and CSO teams have taken steps to establish processes outlining their role in managing cyber security-related risks, IA noted some gaps, including:
Why It Matters
Without clear accountability and defined processes, business lines may not be able to effectively manage and respond to cyber security risks.
Recommendation #6 (Medium Risk)
The CIO and CSO, supported by the COO and CSRO, should define, document, and implement clear roles and responsibilities to ensure effective risk management.
3.6 Other Matters - Training and Awareness
Effective training is essential to ensure that staff understand cyber security risks and how to avoid them to minimize cyber incidents.
What We Found & Why It Matters:
There were established cyber security mandatory training and awareness programs, as well as annual refreshers and enterprise-wide initiatives, such as cyber security awareness month.
However, failure rates are not used to identify need for targeted/remedial training, which may result in training not effectively mitigating the risk of cyber incidents arising from employee actions.
Recommendation #7 (Low Risk)
The CIO should implement additional targeted training for employees who failed the simulation exercises.
Appendix A - Recommendation Ratings
Recommendations are ranked in order to assist management in allocating resources to address identified weaknesses and/or improve internal controls and/or operating efficiencies. These ratings are for guidance purposes only. Management must evaluate ratings in light of their own experience and risk appetite.
Recommendations are ranked according to the following definitions:
Appendix B - Key Terms & Acronyms
CIO Chief Information Officer - designated official responsible for leading the departmental IT, information, and data management functions. COO Chief Operating Officer - Assistant Superintendent overseeing the Corporate Services Sector, including the CIO and CSO functions. CSO Chief Security Officer - designated official responsible to the deputy head or to the departmental executive committee to provide leadership, coordination and oversight for departmental security management activities. ELT Executive Leadership Team - representing the membership of OSFI's executive committee. FINTRAC Financial Transactions and Reports Analysis Centre of Canada - Canada's financial intelligence unit and anti-money laundering and anti-terrorist financing supervisor. IIA Institute of Internal Auditors - global leader in standards, certification, education, research, and technical guidance for internal audit as a profession. SGO Strategic Governance Office - supports OSFI's governance bodies in fulfilling their mandate, including performing secretariat functions. TB Treasury Board - a federal Cabinet committee responsible for managing federal government operations, including through defining policies and rules, such as for IT management.Appendix C - About the Audit
C.1 Objective
To assess the effectiveness of cyber security processes including:
C.2 Scope
The overall scope of this audit was the period between April 1, 2023 and March 31, 2024. Areas within scope included:
Adjustments to Planned Scope: The initial audit scope included coverage related to third party risk management and recovery processes. However, during the audit, first-line had initiated work in these areas, which required adjustment to timing, specifically in:
Given that these changes have a significant impact on current processes, audit coverage of these areas has been deferred, and will be assessed as part of the FY2025-27 RBAP processes to ensure assurance activities add value. IA will also monitor progress on the initiatives identified to identify potential advisory opportunities.
C.3 Approach and Methodology
The audit leveraged agile methodologies and used a phased approach to cover cyber security risk management and governance processes, including those within the CIO and CSO groups, as well as broader enterprise-wide processes.
The audit was conducted through document reviews, interviews, and process walkthroughs. Limited sample-based testing was conducted to assess the operational effectiveness of governance processes.
C.4 Audit Criteria
The following criteria were established for this audit (based on the scope adjustment outlined above):
| Sprint | Relevant NIST Criteria |
|---|---|
| All Sprints |
|
| Sprint I - Risk Identification and Assessment |
|
| Sprint II - Risk Response, Governance, and Resource Prioritization |
|
C.5 Statement of Conformance
This review was conducted in conformance with the Institute of Internal Auditors' International Standards for the Professional Practice of Internal Auditing, consistent with the TB's Policy on Internal Audit, and as supported by the results of the Quality Assurance and Improvement Program.
C.6 Previous Audit Engagements
IA previously conducted an audit of OSFI's cyber security practice in 2018. The audit focused on cyber security processes and controls; and audit recommendations were issued for the consistent application and oversight of security practices for handling sensitive industry information. All recommendations have since been addressed by management and closed by IA.
Additionally, IA conducted a review of policies and practices related to information security in 2023. Three recommendations were issued relating to risk management processes and accountabilities, tracking of risk mitigation activities, and updates to security policies and training programmes. These recommendations are currently in-progress for implementation.