OSFI ties Canada’s financial competitiveness to operational resilience

With Ottawa leaning on innovation to boost competitiveness, OSFI is reminding insurers that true strength lies in resilience – not just capital

OSFI ties Canada’s financial competitiveness to operational resilience

Insurance News

By Branislav Urosevic

As Canada’s federal government doubles down on competitiveness and innovation through Budget 2025, insurers may find themselves with more room to modernize. The budget’s tax and policy measures – including expanded support for digital transformation and R&D – are expected to help financial institutions invest in efficiency and resilience. Some industry experts say these incentives could make it easier for insurers to strengthen their systems, automate processes, and build the kind of operational agility regulators now expect.

That expectation was underscored recently by Jacqueline Friedland (pictured centre left), executive director of the risk assessment and intervention hub at the Office of the Superintendent of Financial Institutions (OSFI). Speaking at the AM Best conference, she said the regulator’s new mantra is simple: operational resilience is financial resilience.

For Canada’s insurance sector, the era of treating technology, cyber, and operational failures as “non-financial” risks is over, she said.

“Canada’s financial system is facing a convergence of complex risks – from geopolitical and cyber threats to natural catastrophes, auto insurance reform and elevated credit risk,” she said. “Non-financial risks are no longer peripheral risks. Instead, we recognize that they are core drivers of financial and operational resilience.”

That statement reflects a regulator moving decisively toward integrated supervision. OSFI’s semi-annual update to its Annual Risk Outlook, released in October, highlights the same shift. “Our mandate and prudential framework are focused on both financial and operational resilience, as well as integrity and security, including national security,” Friedland said.

From stability to adaptability

The goal, she emphasized, is balance – between safety and sensible risk-taking. “We expect federally regulated financial institutions to be resilient and prepared to manage the risk they face,” she said. That means recognizing that risk-taking is not only permitted but expected, provided governance keeps pace with complexity.

Friedland described OSFI’s evolving supervisory posture as guided by one principle: “Always be advancing.”

The phrase, attributed to Superintendent Peter Routledge, captures the regulator’s effort to be more agile, targeted, and transparent in how it assesses threats. “Our actions will be deliberate, focused, and strategic, mindful that resilience in the financial system is essential to a strong economy,” she said.

Eight practices that define resilience

Friedland’s most practical contribution to the discussion came in the form of eight “best practices” drawn from OSFI’s Technology Risk Division and Operational Risk Division. They amount to a checklist for every insurer’s board and executive team.

  1. Identify what’s critical – and why.
    Resilient firms, she said, start with “a structured approach to assessing which operations are critical, including specific criteria for assessing criticality.” The exercise forces clarity about which business services must continue under stress.
  2. Measure when disruption exceeds tolerance.
    Organizations should be “establishing clear metrics for determining when an institution exceeds its tolerance for disruption,” a way of ensuring that early-warning indicators trigger escalation before outages cascade.
  3. Test like it matters.
    That means “going beyond simple tabletop testing when conducting scenario analysis” to prove that recovery plans and workarounds can withstand “severe but plausible” shocks — cyberattacks, vendor failures, or climate events.
  4. Treat operational capabilities as ‘table stakes.’
    Friedland called out “change management, cybersecurity, business continuity, and disaster recovery” as baseline disciplines that must be continuously maintained, not revisited after incidents.
  5. Keep tests long, layered, and realistic.
    Resilience is endurance, not agility alone. Tests should simulate prolonged disruptions and overlapping failures — lessons drawn from COVID, ransomware, and climate-linked events that exposed the limits of neat contingency plans.
  6. Practice cyber hygiene relentlessly.
    That includes “applying timely security patches, leveraging real-time threat intelligence, and proactively monitoring emerging risks such as AI-driven threats.” The growing use of generative AI tools, she noted, is already spawning “deepfake-based phishing attempts” that require behavioral anomaly detection, not just traditional perimeter defense.
  7. Respond fast – and prove it.
    She stressed the need for “a robust incident-management process… to respond swiftly and effectively to security events.” Firms should be able to show who decides what, when, and how communication flows internally and to regulators.
  8. Control access like it’s capital.
    Finally, “strengthening identity and access management controls by enforcing least privilege, multi-factor authentication, and continuous auditing” is essential to prevent both external and insider misuse.

Together, the eight points read like a blueprint for resilience by design – a system in which governance, technology, and testing converge into measurable outcomes rather than paperwork.

Evidence over promises

OSFI’s approach to supervision increasingly focuses on outcomes: can institutions demonstrate, with data and scenarios, that their controls actually work? The regulator no longer treats cyber, data integrity, or continuity as technical issues. They are systemic, affecting solvency, liquidity, and public confidence.

The expectation now is that firms can show proof of resilience – not intentions. That extends to their vendors and third parties: asset managers, MGAs, and cloud providers are all part of the operational-resilience perimeter.

“Our actions,” Friedland said, “will be deliberate, focused, and strategic.”

For insurers, that means embedding operational resilience into every line of defense – and treating downtime the same way they treat capital shortfalls: as a failure of management, not just of systems.

Related Stories

Keep up with the latest news and events

Join our mailing list, it’s free!