JP Morgan Chase 2013 Annual Report Download - page 37

Download and view the complete annual report

Please find page 37 of the 2013 JP Morgan Chase annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 344

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344

35
flow of financial transactions. We
have invested heavily in improving
our overall cyber defenses and
dramatically improved our ability
to withstand these attacks. However,
as the threats continue to grow and
attacks continue to evolve, it’s crucial
that we evolve as well and focus
on tomorrow’s threats, as well as
today’s. To that end, we’ve nearly
doubled our investment in cyber-
security, including deployment of
increased monitoring and protection
technology, and we’ve expanded the
number of dedicated cybersecurity
professionals in the company to
focus on protecting our customers
and our sta.
Last year, we kicked o an eort to
develop multi-year technology plans
for our businesses and corporate
functions that reflect the firm’s top
priorities and business requirements.
These “road maps” will enable us to
manage the firm’s technology invest-
ments against the backdrop of a
strategic plan, which we’ll continue
to revisit and refine.
As we look to 2014, our reliance on
technology will continue to expand.
We will spend close to $250 million
on our cyber capabilities. IT will be
at the core of what we need to do to
adapt to the new global financial
architecture and to meet regulatory
requirements, including AML,
Comprehensive Capital Analysis and
Review (CCAR), Volcker and Dodd-
Frank, among others. We will lever-
age our internal cloud platforms to
further improve the eciency and
time to market for our IT infrastruc-
ture. Each of our business lines has a
robust set of strategic initiatives.
Whether it is upgrading our next-
generation digital and mobile
programs, enhancing our Asset
Management Solutions business,
improving our e-trading platforms,
enabling growth in Commercial
Banking or making our corporate
functions more eective, technology
is core to the delivery.
Conclusion
Not every organization has the lead-
ership team, the talent and the forti-
tude to make this level of investment
for the future. We feel privileged to
be able to do so on behalf of our
clients, our customers and our share-
holders. I could not be more proud
of our employees and our accom-
plishments to date. 2014 is another
important year for us, and I am
confident that we will continue to
deliver at the level you expect of us
– holding ourselves, our business
practices and our culture to the
highest standards.
Innovation is happening across
our business lines every day. Our
Consumer Branch of the Future is
powered by IT innovation. Our
recently completed Strategic
Reengineering Program in the CIB
has improved eciency by hun-
dreds of millions of dollars. IT is
improving not only the speed and
scale of our credit card authoriza-
tions but has enhanced our fraud
protection capabilities and is the
engine behind new, innovative
products, including BlueprintTM.
Each year, we invest hundreds of mil-
lions of dollars in our risk and con-
trols technology agenda. A sizable
part of this investment is dedicated
to ensuring that we have the systems
to identify problems – whether these
problems have to do with AML risk,
fraud risk or something else – on a
real-time basis. A core objective of
our technology strategy is to reduce
variability and increase consistency
and standardization. As such, one of
our most important goals is to lessen
our reliance on manual controls,
which are more susceptible to human
error. We also are seeking to substan-
tially reduce subjectivity to allow for a
more consistent and predictable way
to identify control gaps in the envi-
ronment. Systems enhancements,
including information technology and
data architecture, are critical to the
broad management of financial risks.
Our technology environment contin-
ues to be tested. In the past two
years, we have faced unprecedented
cyber threats from sophisticated
adversaries bent on wreaking havoc
in the financial industry. Two years
ago, we saw a rise in “denial of ser-
vice” attacks aimed at disrupting the
Matt Zames
Chief Operating Ocer