IT Assurance Services And Role Of CA In BPO-KPO. IT Enabled Services And Emerging Technologies

Size: px
Start display at page:

Download "IT Assurance Services And Role Of CA In BPO-KPO. IT Enabled Services And Emerging Technologies"

Transcription

1 IT Assurance Services And Role Of CA In BPO-KPO IT Enabled Services And Emerging Technologies Chapter 2: Facilitated e-learning Part 1 of 2 CA M S Mehta, FCA 1

2 IT Assurance Services and Role of CA in BPO-KPO Task Statements 1.6 Consider the impact of deployment of key existing and emerging technologies. Knowledge Statements 1.8 Knowledge of Functioning and impact of key emerging technologies. 2

3 IT Assurance Services AND Role Topics Covered of CA in BPO-KPO Introduction Opportunities for CAs IT Consulting & Assurance services by CAs Business Process Outsourcing 3

4 Introduction Information Technology has pervaded every aspect of an Enterprise IT adoption carries some threats. Threats can be different for SMEs or Large Enterprises. The threats to SME relate more to size and limited manpower. In large enterprises it could be due to over dependency onkey personnel. 4

5 Why CAs require IT Competencies CAs need to embrace IT due to the very reason that IT is a key enabler in enterprises CAs require IT competencies, For survival with everything turning digital, online and E-returns, E- reports..the very subsistence depends on IT competencies. CA firms have to use IT in their own offices to provide services. To avail new opportunities With automation of their client s operations resulting in most of the client s data turning digital, new opportunities exist in Assurance & Consulting areas. 5

6 Opportunities for CAs Opportunities exist in Auditing, Assurance as well as consulting areas. CAs can develop innovative delivery capabilities for new service offerings to existing /new clients. CAs can provide services in the areas of:- IT Governance, Risk Management, Compliance Assurance, Consulting and Implementation 6

7 Empowering CAs Steps for developing IT capabilities To develop the capabilities & build technological infrastructure, the prerequisites will be based on following:- Identifying areas of Specialization. IT Skills and Competencies. Assessing the existing and future applications. Determining Type of Technology Infrastructure required. Service Delivery Methodologies. IT Culture & Training. Right Migration Plan. 7

8 IT Consulting & Assurance Services by CAs CA can use global best practices for Consulting & Assurance services. COBIT 5 is one such framework. These processes have detailed management practices, input-output matrix, RACI chart and activities. From these processes, proposals can be prepared regarding scope & objectives of the assignment. Extracted contents from processes can be customised and used as benchmarks. 8

9 IT Consulting & Assurance Services by CAs Sample areas for CAs to use COBIT:- EDM01 Set and Maintain the IT Governance Framework. In this area CA could adopt the best practices as per COBIT:- Scope Analyze requirements. Objective Provide a consistent approach integrated and aligned with the enterprise governance approach. Areas of Review Evaluate design of enterprise governance of IT. Direct the Governance System. Monitor the Governance System. 9

10 IT Consulting & Assurance Services by CAs APO02 Define IT Strategy Planning Scope Provide a holistic view of the current IT environment & future direction. Objective Communicate the objectives to be understood by all Areas of review Understand enterprise direction. Define the target IT capabilities. Define the strategic plan and road map. Communicate the IT strategy and direction. 10

11 IT Consulting & Assurance Services by CAs APO12 Manage Risk Scope Continually identify, assess and reduce IT related risks Objective Integrate the management of IT related enterprise risk with overall enterprise risk management Areas of review Collect data. Analyse risk. Maintain a risk profile. Articulate risk. Define a risk management action portfolio Respond to risk. 11

12 IT Consulting & Assurance Services by CAs APO13 Review IT Security Management Scope Define, operate and monitor a system for information security management Objectives Keep the impact and occurrence of information security incidents within the enterprise's risk appetite levels. Areas of review Establish and maintain ISMS Define and manage an information security risk treatment plan. Maintain and review the ISMS. 12

13 IT Consulting & Assurance Services by CAs MEA03 Compliance with External Requirements Scope Evaluate processes are compliant with laws, regulations and contractual requirements. Objectives Ensure that the enterprise is compliant with applicable external requirements. Areas to review Identify external compliance requirements Optimise response to external requirements Confirm external compliance Provide assurance to external compliance 13

14 IT Consulting & Assurance Services by CAs DS04 Manage Continuity Scope Etablishing a business plan to respond to incidents and disruption Objectives Continue critical business operations and maintain availability of information at a level acceptable to the enterprise in the event of a significant disruption. Areas review to Define the business continuity policy, objectives and scope. Maintain a continuity strategy. Develop and implement a business continuity response. Exercise, test and review the business continuity plan Manage, maintain and improve the continuity plan. Conduct continuity plan training Review backup arrangements Conduct post resumption reviews. 14

15 How a Chartered Accountant could play a significant role in areas like outsourcing using these practice areas 15

16 Business Process Outsourcing Outsourcing of activities/services by an organisation takes advantage of core competences of Service Providers in those areas, so that the organization can concentrate on its core business. Many IT enabled companies provide outsourcing solutions/services. Outsourcing deals with fringe business activities such as customer care, finance and HR. Purpose is to cut on costs and take advantage of core competency of others 16

17 Knowledge Process Outsourcing A subset of BPO. Involves outsourcing of core functions that help in value addition. More specialized and knowledge based than BPOs Include services related to:- R&D, Capital and insurance market, legal services, biotechnology, etc. 17

18 BPO-KPO-IT Enabled Business Processes Medical Transcription Legal Transcription Data Entry and Processing Act of converting voice-recorded medical Reports into text Converting audio dictation by legal professionals and other recordings from legal cases into the printed word Area of accounting and many other business processes are increasingly being outsourced because of cost effectiveness IT Helpdesk Suport Provides a single point of contact service to end users for all kinds of IT support. Application Development Involves Outsourcing of development as well as maintenance and support of applications 18

19 Outsourced Services-Risk Privacy & Confidentiality Attrition of staff Legal Compliances Timeliness 19

20 Outsourced Services-Control Access Controls HR Controls Good Processes Quality Assurance Compliance Management Contingency Backup Plans & 20

21 CA providing Assurance to outsourced services can use COBIT-Example Compliance with external requirements: An Indian BPO service provider is bound to comply with the various provisions of Indian laws which impact the outsourcing industry. CA can use MEA03 Compliance with External requirements discussed earlier to:- Identify external compliance requirements. Optimise response to external requirements. Confirm external compliance. Provide assurance for external compliance. 21

22 CA providing Assurance to outsourced services can use COBIT-Example Managing Business Continuity Most of the SLAs of BPOs provide for provision of services during disaster also. CA can use DS04 : Manage Continuity to provide assurance Whether the organisation has a defined business continuity policy, with clear objectives and scope. Whether organisation maintains a continuity strategy. Whether the organisation has developed and implemented a business continuity response plan. Whether the organisation exercises, tests and reviews the business continuity plan. Whether the organisation reviews, maintains and improves the continuity plan. Whether the organisation conducts continuity plan training. Whether the organisation manages backup arrangements. Whether the organisation conducts post resumption reviews. 22

23 References o.asp ledge-process-outsourcing-kpo finition_and_solutions 23

24 IT Assurance Services And Role of CA In BPO-KPO We have Learnt About Introduction Opportunities for CA s IT Consulting & Assurance services by CA s Business Process Outsourcing 24

25 IT Assurance Services And Role of CA In BPO-KPO Thank You 25

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 COBIT 5 Enabler Guides COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information

More information

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 Enabler Guides COBIT 5 COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information

More information

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 COBIT 5 Enabler Guides COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information

More information

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 Enabler Guides : Enabling es : Enabling Information Other Enabler Guides COBIT 5 Professional Guides Implementation for Information for Assurance for Risk Other Professional

More information

September 17, 2012 Pittsburgh ISACA Chapter

September 17, 2012 Pittsburgh ISACA Chapter September 17, 2012 Pittsburgh ISACA Chapter What is COBIT? Control Objectives for Information and related Technologies ISACA s guidance on the enterprise governance and management of IT. Builds on more

More information

Annex 1 (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5

Annex 1 (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5 Annex (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5 Annex 2 RACI chart for EDM0, Retrieved from COBIT5 Description: R Responsible The one(s) who performs the

More information

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests.

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests. Principles Principle 1 - Meeting stakeholder needs The governing body is ultimately responsible for setting the direction of the organisation and needs to account to stakeholders specifically owners or

More information

Information and Technology. Governance. System for

Information and Technology. Governance. System for 2019 strategy goals size Role of IT Sourcing model for IT Compliance requirements Etc. Design Factors SME Risk DevOps Etc. Priority governance management objectives Specific guidance from focus areas Target

More information

ISACA All Rights Reserved.

ISACA All Rights Reserved. Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems, PGD Computer Auditing Accredited COBIT 5 Trainer ISACA 2016. Business Value Value

More information

https://www.e-janco.com

https://www.e-janco.com E-mail: support@e-janco.com https://www.e-janco.com Summary Table of Contents IT INFRASTRUCTURE, STRATEGY, AND CHARTER SUMMARY...1 Benefits of IT Infrastructure Management...1 Base Assumptions and Objectives...2

More information

Changes Reviewed by Date. JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology: Issa Laty. CIO, Jordan- Mohammad Aburoub

Changes Reviewed by Date. JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology: Issa Laty. CIO, Jordan- Mohammad Aburoub Governance and Management of Information and Related Technologies Guide 2017 Revision History Changes Reviewed by Date Version Author JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology:

More information

IT and Security Governance. Jacqueline Johnson

IT and Security Governance. Jacqueline Johnson IT and Security Governance Jacqueline Johnson Background Control Objectives for Information and related Technology Developed by IT Governance Institute (ITGI) Not incremental High level standard 5 principles

More information

Portfolio, Program and Project Management Using COBIT 5

Portfolio, Program and Project Management Using COBIT 5 DISCUSS THIS ARTICLE Portfolio, Program and Project Using COBIT 5 By Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP COBIT Focus 11 September 2017 Many

More information

Auditing Open Source Applications by Using COBIT 4.1

Auditing Open Source Applications by Using COBIT 4.1 Auditing Open Source Applications by Using COBIT 4.1 Assist. Cristian AMANCEI, PhD candidate Academy of Economic Studies, Bucharest, Romania Department of Computer Science in Economics cristian.amancei@ie.ase.ro

More information

Process Improvement & Risk Management for ITES / KPO / BPO Industry. Riskpro, India

Process Improvement & Risk Management for ITES / KPO / BPO Industry. Riskpro, India Process Improvement & Risk Management for ITES / KPO / BPO Industry Riskpro, India 1 Who is Riskpro Why us? ABOUT US Riskpro is an organisation of member firms around India devoted to client service excellence.

More information

D ENABLE. Dimension 4 competence title and generic description level 1 level 2 level 3 level 4 level 5 knowledge skills

D ENABLE. Dimension 4 competence title and generic description level 1 level 2 level 3 level 4 level 5 knowledge skills Dim 1 Dimension 2 Dimension 3 Dimension 4 competence title and generic description level 1 level 2 level 3 level 4 level 5 knowledge skills D ENABLE D.1 Information Security Strategy Development Defines

More information

Role Profile. Role Details. Grade 4 Business unit. Date produced or updated March 2017

Role Profile. Role Details. Grade 4 Business unit. Date produced or updated March 2017 Role Profile Role Details Role Title Risk Officer Permanent Grade Business unit Risk Reporting to Head of Risk Date produced or updated March 2017 Purpose of Role To support the Head of Risk and Risk Director

More information

Log of Changes Implemented to the COBIT 5 Product Family

Log of Changes Implemented to the COBIT 5 Product Family Log of Changes Implemented to the COBIT 5 Product Family All of the edits detailed below up to were available to all downloaders as of. Anyone receiving the pdf files on or after already have the corrections

More information

Achieving Business/IT Alignment through COBIT 5

Achieving Business/IT Alignment through COBIT 5 Achieving Business/IT Alignment through COBIT 5 Prof. dr. Wim Van Grembergen University of Antwerp Antwerp Management School wim.vangrembergen@ua.ac.be Intro: EGIT and COBIT 5 Definition of EGIT Enterprise

More information

Ensuring Organizational & Enterprise Resiliency with Third Parties

Ensuring Organizational & Enterprise Resiliency with Third Parties Ensuring Organizational & Enterprise Resiliency with Third Parties Geno Pandolfi Tuesday, May 17, 2016 Room 7&8 (1:30-2:15 PM) Session Review Objectives Approaches to Third Party Risk Management Core Concepts

More information

Sub-section Content. 1 Preliminaries - Post title: Head of Group Risk - Reports to: CRO - Division: xxx - Department: xxx - Location: xxx

Sub-section Content. 1 Preliminaries - Post title: Head of Group Risk - Reports to: CRO - Division: xxx - Department: xxx - Location: xxx Sub-section Content 1 Preliminaries - Post title: Head of Group Risk - Reports to: CRO - Division: xxx - Department: xxx - Location: xxx 2 Job Purpose - To assist in the maintenance and development of

More information

Braindumps COBIT5 50q

Braindumps COBIT5 50q Braindumps COBIT5 50q Number: COBIT5 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Isaca COBIT 5 COBIT 5 Foundation I have correct many of questions answers. If there

More information

International Civil Aviation Organization FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015

International Civil Aviation Organization FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015 International Civil Aviation Organization WORKING PAPER 15/01/2015 rev. 0 FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015 Agenda Item 5: Review and elaborate on concepts,

More information

IT Management & Governance Tool Assess the importance and effectiveness of your core IT processes

IT Management & Governance Tool Assess the importance and effectiveness of your core IT processes IT & Governance Tool Assess the importance and effectiveness of your core IT processes STRATEGY& GOVERNANCE IT & Governance Framework APPS EDM01 ITRG04 DATA &BI ITRG06 IT Governance Application Portfolio

More information

Information Privacy and Cybersecurity in a King IV World

Information Privacy and Cybersecurity in a King IV World Information Privacy and Cybersecurity in a King IV World King IV The King IV Report on Corporate Governance for South Africa 2016, The Institute of Directors in Southern Africa. Released 1 November 2016

More information

Selftestengine COBIT5 36q

Selftestengine COBIT5 36q Selftestengine COBIT5 36q Number: COBIT5 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Isaca COBIT 5 COBIT 5 Foundation I have correct many of questions answers.

More information

Governance and Management of Information and Related Technologies Guide. Prepared for Jordan Ahli Bank

Governance and Management of Information and Related Technologies Guide. Prepared for Jordan Ahli Bank Governance and Management of Information and Related Technologies Guide Prepared for Jordan Ahli Bank 2017 Revision History Changes Reviewed by Approval Date Version Author ISACA Peter Tessin Feb 2017

More information

IT Audit Process. Prof. Mike Romeu. February 13, IT Audit Process. Prof. Mike Romeu

IT Audit Process. Prof. Mike Romeu. February 13, IT Audit Process. Prof. Mike Romeu February 13, 2017 1 IT Assurance and COBIT 5 Enablers Enablers are factors that, individually and collectively, influence whether something will work. 2. Processes 3. Organizational Structures 4. Culture,

More information

Introduction to COBIT 5

Introduction to COBIT 5 Introduction to COBIT 5 Executive Summary Information is a key resource for all enterprises, and from the time that information is created to the moment that it is destroyed, technology plays a significant

More information

COMPLIANCE HOW TO MITIGATE RISK IN YOUR CONTINGENT WORKFORCE STRATEGY

COMPLIANCE HOW TO MITIGATE RISK IN YOUR CONTINGENT WORKFORCE STRATEGY COMPLIANCE HOW TO MITIGATE RISK IN YOUR CONTINGENT WORKFORCE STRATEGY AGENDA 8:00 Registration, breakfast, coffee & tea 8:30 Introductions (Richard Eardley - MD Hays Ireland) 8:35 Risk Mitigation How To

More information

Business Continuity Framework

Business Continuity Framework Business Continuity Framework A definition to the Components of Resiliency March, 1 Business Continuity Framework 1. INTRODUCTION... 3 2. PURPOSE... 3 3. THE FRAMEWORK... 4 4. STEERING COMMITTEE... 5 5.

More information

An introduction to business continuity planning

An introduction to business continuity planning An introduction to business continuity planning What is business continuity, and is it relevant to me? Business continuity planning is about identifying the critical functions and services your business

More information

For a leader to be effective in today s uncertain world, they have to. understand the nature of complexity and adapt their leadership role in a

For a leader to be effective in today s uncertain world, they have to. understand the nature of complexity and adapt their leadership role in a Exercise and Testing IDRC 2010 Emergent Leadership For a leader to be effective in today s uncertain world, they have to understand the nature of complexity and adapt their leadership role in a manner

More information

COBIT 5 Foundation Exam

COBIT 5 Foundation Exam COBIT 5 Foundation Exam Sample Paper Multiple Choice Instructions 1. All 50 questions should be attempted. 2. All answers are to be marked on the answer sheet provided. 3. Please use a pencil and NOT ink

More information

Enabling consistent employee experience through HR Shared Services

Enabling consistent employee experience through HR Shared Services Enabling consistent employee experience through HR Shared Services Enable Consistent Great Employee Experience The Client is an American multinational technology company headquartered in Redmond, Washington,

More information

Guidelines for Information Asset Management: Roles and Responsibilities

Guidelines for Information Asset Management: Roles and Responsibilities Guidelines for Information Asset Management: Roles and Responsibilities Document Version: 1.0 Document Classification: Public Published Date: April 2017 P a g e 1 Contents 1. Overview:... 3 2. Audience...

More information

COSO ERM: Integrating with Strategy and Performance. Michael Parkinson

COSO ERM: Integrating with Strategy and Performance. Michael Parkinson COSO ERM: Integrating with Strategy and Performance Michael Parkinson Content The COSO Frameworks Risk (Enterprise) Risk Management The COSO risk management framework A few highlights Questions for management

More information

Internal Audit Charter POL-00009

Internal Audit Charter POL-00009 Charter POL-00009 Revision no. Approved for issue 10 Approved by Board 31 July 2017 Contents 1. Purpose... 3 2. Scope... 3 3. Role... 3 4. Responsibilities... 3 4.1 Planning... 3 4.2 Reporting... 4 4.3

More information

Technology s Role in Enterprise Risk Management

Technology s Role in Enterprise Risk Management FEATURE Technology s Role in Enterprise Risk Management www.isaca.org/currentissue The new COSO ERM framework document, Enterprise Risk Management Integrating With Strategy and, 1 is expected to have a

More information

Fujitsu Workplace Anywhere Delivering a service as mobile as your people need to be

Fujitsu Workplace Anywhere Delivering a service as mobile as your people need to be Fujitsu Workplace Anywhere Delivering a service as mobile as your people need to be Welcome to the age of mobility A new digital landscape Mobile technology is dramatically changing our everyday lives.

More information

Recognizing your needs

Recognizing your needs Our internal audit and IT risk assurance capability statement Recognizing your needs www.pwc.com/ph Our Assurance services Assurance PwC Assurance team delivers the assurance you need on the financial

More information

Agenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM)

Agenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM) The Intersection of Enterprise-wide Risk (ERM) and Business Continuity (BCM) Marc Dominus 2005 Protiviti Inc. EOE Agenda Terminology and Process Introductions ERM Process Overview BCM Process Overview

More information

2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval

2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval Presented by 2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system or transmitted in any form by any

More information

Enterprise Governance of IT

Enterprise Governance of IT Enterprise Governance of IT Prof. dr. Wim Van Grembergen University of Antwerp (UA) Antwerp Management School (AMS) IT Alignment and Governance Research Institute (ITAG) wim.vangrembergen@ua.ac.be What

More information

Competency Area: Business Continuity and Information Assurance

Competency Area: Business Continuity and Information Assurance Competency Area: Business Continuity and Information Assurance Area Description: Business Continuity and Information Assurance competency area mainly concerns the continuity, auditing and assurance of

More information

PERSONAL DATA PROTECTION POLICY

PERSONAL DATA PROTECTION POLICY PERSONAL DATA PROTECTION POLICY 1. Reasons 2. Principles and rights of personal data protection 3. Personal data protection policy 3.1 Purpose 3.2 Scope of application 3.3 Commitments 4. Responsibilities

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Learning Objectives To understand the concept of Business Continuity Management; To understand the key phases and components of a Business

More information

Third Party Risk Management ( TPRM ) Transformation

Third Party Risk Management ( TPRM ) Transformation Third Party Risk Management ( TPRM ) Transformation September 20, 2017 Internal use only An introduction to TPRM What is a Third Party relationship? A Third Party relationship is any business arrangement

More information

The ITIL v.3. Foundation Examination

The ITIL v.3. Foundation Examination The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 3, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.

More information

STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL

STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL Governance Digi.Com Berhad Annual Report 2017 73 STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL IN ACCORDANCE WITH PARAGRAPH 15.26 (b) OF THE MAIN MARKET LISTING REQUIREMENTS OF BURSA MALAYSIA SECURITIES

More information

GUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2))

GUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2)) GUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2)) Operational Risk Management MARCH 2017 STATUS OF GUIDANCE The Isle of Man Financial Services Authority ( the Authority ) issues guidance for

More information

Business Continuity Management Policy

Business Continuity Management Policy Business Continuity Management Policy Version FINAL 1.0 Ratified by Dudley CCG Audit Committee Date ratified 17/03/16 Name of originator(s) / author(s) David Morris, Midlands and Lancashire CSU/ Sue Johnson,

More information

REGULATORY HOT TOPIC Third Party IT Vendor Management

REGULATORY HOT TOPIC Third Party IT Vendor Management REGULATORY HOT TOPIC Third Party IT Vendor Management 1 Todays Outsourced Technology Services Core Processing Internet Banking Mobile Banking Managed Security Services Managed Data Center Services And

More information

Implementation and Use of a Contract Management Methodology

Implementation and Use of a Contract Management Methodology Implementation and Use of a Contract Management Methodology Introduction to contract processes and to the fundamental aspects of contract roles Ole Horsfeldt oho@gorrissenfederspiel.com Practical experiences

More information

The Path to Digital Transformation. A Roadmap for Business Success

The Path to Digital Transformation. A Roadmap for Business Success The Path to Digital Transformation A Roadmap for Business Success Table of Contents Introduction 3 Moving Toward Transformation 4 Overcoming Transformation Barriers 7 How DXC Technology Can Help 8 Conclusion

More information

VENDOR MANAGEMENT 101

VENDOR MANAGEMENT 101 VENDOR MANAGEMENT 101 Enterprise Risk Management Vendor Management Business Continuity IT GRC Internal Audit Regulatory Compliance Manager Introduction to Vendor Management About Your Presenter Andrea

More information

IT Risk Advisory & Management Services

IT Risk Advisory & Management Services IT Advisory & Management Services The (Ever) Evolving IT Management Organizations today, view IT risk management as a necessity. As a consequence, organizations need to realign their IT risk management

More information

Contents An Introductory Overview of ITIL Service Lifecycle: concept and overview...3 I. Service strategy...6 The 4 P's of ITIL Service

Contents An Introductory Overview of ITIL Service Lifecycle: concept and overview...3 I. Service strategy...6 The 4 P's of ITIL Service ITIL 2011 Notes Contents An Introductory Overview of ITIL 2011...3 Service Lifecycle: concept and overview...3 I. Service strategy...6 II. The 4 P's of ITIL Service Strategy...6 Key processes and activities...7

More information

Excellence in Third Party Risk Management (TPRM)

Excellence in Third Party Risk Management (TPRM) Excellence in Third Party Risk Management (TPRM) www.pwc.ch FINMA Circular 2018/3 Outsourcing banks and insurers Key changes The revised circular applies to banks and insurers What can be outsourced is

More information

December 2015 THE STATUS OF GOVERNMENT S GENERAL COMPUTING CONTROLS:

December 2015 THE STATUS OF GOVERNMENT S GENERAL COMPUTING CONTROLS: December 2015 THE STATUS OF GOVERNMENT S GENERAL COMPUTING CONTROLS: 2014 www.bcauditor.com CONTENTS Auditor General s Comments 3 623 Fort Street Victoria, British Columbia Canada V8W 1G1 P: 250.419.6100

More information

Implementation of Service Integration in a Multiprovider Environment Using COBIT 5

Implementation of Service Integration in a Multiprovider Environment Using COBIT 5 Knowledge. Proficiency. Implementation Implementation of Service Integration in a Multiprovider Environment Using COBIT 5 MARTIN ANDENMATTEN / CISA, CGEIT, CRISC, ITIL Master Published in COBIT Focus 28

More information

Service Strategy Quick Reference Guide

Service Strategy Quick Reference Guide Service Strategy Quick Reference Guide To enable service providers to think and act in a strategic manner to achieve strategic goals or objectives through the use of strategic assets Value Creation through

More information

t: +44 (0) f: +44 (0) e: w:

t: +44 (0) f: +44 (0) e: w: t: +44 (0)1355 593400 f: +44 (0)1355 579191 e: info@gaelquality.com w: www.gaelquality.com white paper Q-Pulse is a registered trademark of Gael Products Ltd. All rights reserved worldwide. Copyright 2009

More information

Appendix A - Service Provider RACI Model

Appendix A - Service Provider RACI Model Portfolio es: R A C / I P.1 Portfolio Strategy Centralized management of one or more portfolios (major programs), which includes identifying, prioritizing, authorizing, managing, and controlling projects,

More information

and COBIT 5 ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 2012 ISACA. All Rights Reserved.

and COBIT 5 ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 2012 ISACA. All Rights Reserved. Comparing COBIT4.1 and COBIT 5 ROBERT E STROUD CGEIT CRISC ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 1 2012 ISACA. All Rights Reserved. Comparing COBIT 4.1 and

More information

LEGAL PROCESS OUTSOURCING TEAM

LEGAL PROCESS OUTSOURCING TEAM LPO LEGAL PROCESS OUTSOURCING TEAM SYDNEY BRISBANE MELBOURNE PERTH SINGAPORE HONG KONG INDIA www.lawinorder.com sales@lawinorder.com 1300 004 667 OVERVIEW Law In Order s Legal Process Outsourcing (LPO)

More information

BC & RISK MANAGEMENT: CONVERGENCE IS REAL David Halford Forsythe Solutions Group Frank Perlmutter Strategic BCP

BC & RISK MANAGEMENT: CONVERGENCE IS REAL David Halford Forsythe Solutions Group Frank Perlmutter Strategic BCP BC & RISK MANAGEMENT: CONVERGENCE IS REAL David Halford Forsythe Solutions Group Frank Perlmutter Strategic BCP WHY THE CONVERGENCE OF BUSINESS CONTINUITY & RISK MANAGEMENT? The convergence of BC and RM

More information

Business Process Outsourcing on the rise in wealth management. Patrick Laurent Partner Technology & Enterprise Application Deloitte

Business Process Outsourcing on the rise in wealth management. Patrick Laurent Partner Technology & Enterprise Application Deloitte Business Process Outsourcing on the rise in wealth management Pascal Martino Partner Strategy, Regulatory & Corporate Finance Deloitte Patrick Laurent Partner Technology & Enterprise Application Deloitte

More information

Business Process Outsourcing

Business Process Outsourcing Business Process Outsourcing Business Process Outsourcing A Supply Chain of Expertises Vinod v. sople Professor and Deputy Director (Academics) ITM Business School Navi Mumbai New Delhi-110001 2009 BUSINESS

More information

Fujitsu Workplace Anywhere Delivering a service as mobile as your people need to be

Fujitsu Workplace Anywhere Delivering a service as mobile as your people need to be Fujitsu Workplace Anywhere Delivering a service as mobile as your people need to be Welcome to the age of mobility A new digital landscape Mobile technology is dramatically changing our everyday lives.

More information

Are you ready for IFRS 9? Structured, assured, cost effective IFRS 9 compliance solutions from Sopra Steria

Are you ready for IFRS 9? Structured, assured, cost effective IFRS 9 compliance solutions from Sopra Steria Are you ready for IFRS 9? Structured, assured, cost effective IFRS 9 compliance solutions from Sopra Steria Are you ready for IFRS 9? Structured, assured, cost effective IFRS 9 compliance solutions Time

More information

An Overview of the AWS Cloud Adoption Framework

An Overview of the AWS Cloud Adoption Framework An Overview of the AWS Cloud Adoption Framework Version 2 February 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes

More information

CRISC EXAM PREP COURSE: SESSION 4

CRISC EXAM PREP COURSE: SESSION 4 CRISC EXAM PREP COURSE: SESSION 4 Job Practice 2 Copyright 2016 ISACA. All rights reserved. DOMAIN 4 RISK AND CONTROL MONITORING AND REPORTING Copyright 2016 ISACA. All rights reserved. Domain 4 Continuously

More information

TOR NAME Responsible Owner Effective date Technology Strategy Committee (TSC) Terms of Reference (TOR) College Board

TOR NAME Responsible Owner Effective date Technology Strategy Committee (TSC) Terms of Reference (TOR) College Board TOR NAME Responsible Owner Effective date Technology Strategy Committee (TSC) Terms of Reference (TOR) Technology Strategy Committee March 30, 2017 TOR number Approval Body Replaces TSC 2017-18 TOR College

More information

BPO 2.0 REFINING THE VERY BASICS OF BUSINESS PROCESS OUTSOURCING WHITE PAPER

BPO 2.0 REFINING THE VERY BASICS OF BUSINESS PROCESS OUTSOURCING WHITE PAPER BPO 2.0 REFINING THE VERY BASICS OF BUSINESS PROCESS OUTSOURCING WHITE PAPER CONTENTS Introduction... 2 Factors that have necessitated the conception of BPO 2.0... 3 Increasing stress on efficiency and

More information

Fujitsu End User Services Delivering a service as mobile as your people need to be

Fujitsu End User Services Delivering a service as mobile as your people need to be Fujitsu End User Services Delivering a service as mobile as your people need to be Welcome to the age of mobility A new digital landscape Mobile technology is dramatically changing our everyday lives.

More information

6. IT Governance 2006

6. IT Governance 2006 6. IT Governance 2006 Introduction The Emerging Enterprise Model 3 p IT is an integral part of the business p IT governance is an integral part of corporate governance 4 Challenges for the IT IT gets more

More information

EMBRACING TECHNOLOGY Q&A WITH MARK SINANIAN

EMBRACING TECHNOLOGY Q&A WITH MARK SINANIAN SPEAKEASY EMBRACING TECHNOLOGY Q&A WITH MARK SINANIAN SENIOR DIRECTOR, SOLUTIONS MARKETING CANON SOLUTIONS AMERICA By Patricia Ames During a recent interview Mark Sinanian, senior director of marketing

More information

ECQA Certified Profession. Governance SPICE Model. Internal Financial Control Assessor Training Programme

ECQA Certified Profession. Governance SPICE Model. Internal Financial Control Assessor Training Programme ECQA Certified Profession Governance SPICE Model used by the Internal Financial Control Assessor Training Programme Contact: János Ivanyos Memolux Ltd. +36 1 467403 ivanyos@memolux.hu www.training.ia-manager.org

More information

Assessment of IT Operations. Frameworks* An Overview

Assessment of IT Operations. Frameworks* An Overview Assessment of IT Operations Leveraging Industry Standard Frameworks* An Overview *COBIT 5, ITIL,CMM,other SPEAKER BIOGRAPHY Sameer Gupta is a director in KPMG's Consulting Practice and has over 25 years

More information

Service Delivery Manager - CMDHB

Service Delivery Manager - CMDHB Principles Vision Purpose Statement Service Delivery Manager - CMDHB healthalliance Purpose, Vision and Principles To be right behind better healthcare. Our role as provider of non-clinical services to

More information

Business Resilience: Proactive measures for forward-looking enterprises

Business Resilience: Proactive measures for forward-looking enterprises IBM Global Services Business Resilience: Proactive measures for forward-looking enterprises protect deflect predict adapt Working with IBM, you can develop and implement a flexible business resilience

More information

EAST SUSSEX FIRE AUTHORITY Job Description

EAST SUSSEX FIRE AUTHORITY Job Description EAST SUSSEX FIRE AUTHORITY Job Description Job Title: Supplier Service Manager Job Family: JF6 Specialist/Technical Manager Reporting to: ITG Manager Responsible for: None. Main purpose of the job: Build

More information

Putnam Valley Central School District. Information Technology Internal Audit Report August 2017

Putnam Valley Central School District. Information Technology Internal Audit Report August 2017 Putnam Valley Central School District Information Technology Internal Audit Report August 2017 August 30, 2017 Audit Committee Putnam Valley Central School District 146 Peekskill Hollow Road Putnam Valley,

More information

Part 0: Overview and vocabulary

Part 0: Overview and vocabulary Edition 2016 Version 2.4 This work is licensed under a Creative Commons Attribution 4.0 International License. www.fitsm.eu Document control Document Title Part 0: Overview and vocabulary Document version

More information

BCP Methodology Benefits realisation

BCP Methodology Benefits realisation www.pwc.com.cy BCP Methodology Benefits realisation Risk Assurance Consulting (RAC) Risk Assurance Consulting (RAC) helps management to make well informed decisions. The insight and independent assurance

More information

MDS TS is part of the dynamic international Holding "Midis Group" that has over 35 years of service history within the UAE.

MDS TS is part of the dynamic international Holding Midis Group that has over 35 years of service history within the UAE. Corporate Profile MDS TS in a Glance MDS TS is part of the dynamic international Holding "Midis Group" that has over 35 years of service history within the UAE. At MDS TS, our teams of skilled professionals

More information

The Sector Skills Council for the Financial Services Industry. National Occupational Standards. Risk Management for the Financial Sector

The Sector Skills Council for the Financial Services Industry. National Occupational Standards. Risk Management for the Financial Sector The Sector Skills Council for the Financial Services Industry National Occupational Standards Risk Management for the Financial Sector Final version approved April 2009 IMPORTANT NOTES These National Occupational

More information

Reengineering your core processes and service layer A critical digital ecosystem enabler

Reengineering your core processes and service layer A critical digital ecosystem enabler Reengineering your core processes and service layer A critical digital ecosystem enabler Stéphane Hurtaud Partner Cybersecurity Leader Deloitte Jesper Nielsen Director Technology & Enterprise Application

More information

CARNEGIE MELLON UNIVERSITY

CARNEGIE MELLON UNIVERSITY CARNEGIE MELLON UNIVERSITY 1 Integrated Risk Management for the Enterprise Brett Tucker December 2018 Carnegie Mellon University Software Engineering Institute Carnegie Mellon University Pittsburgh, PA

More information

FIT FOR PURPOSE. IT Supply Chain Services SUPPLY CHAIN

FIT FOR PURPOSE. IT Supply Chain Services SUPPLY CHAIN FIT FOR PURPOSE IT Supply Chain Services MARKET DRIVERS EFFECTING CHANGE For contemporary organisations, maintaining a competitive edge means enabling users, and the business that supports them, through

More information

How do I remain nimble and efficient?

How do I remain nimble and efficient? www.pwc.com/india How do I remain nimble and efficient? We help the office of the CXO optimise performance of the support functions Unlocking the performance culture We address the fundamental questions

More information

Reading the Tea-leaves: IDC 2013 C-suite Survey. Chris Morris IDC

Reading the Tea-leaves: IDC 2013 C-suite Survey. Chris Morris IDC Reading the Tea-leaves: IDC 2013 C-suite Survey Chris Morris IDC Multidimensional Transformation By 2014 80% of New Software will be available via Cloud In 2013 Tablets & Smartphones Will Drive Almost

More information

Manager, Business Performance & Development / Capital Projects

Manager, Business Performance & Development / Capital Projects Bethesda Hospital Incorporated Position Description Date: Position Title: Reports to: Manager, Business Performance & Development / Capital Projects SECTION 1: Position Summary The is responsible for leading

More information

ASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016

ASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016 ASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016 Charles J. Brennan Chief Information Officer Office of Innovation and Technology 1234 Market

More information

COBIT 5 for Information Security. Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force

COBIT 5 for Information Security. Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force COBIT 5 for Information Security Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force First, a bit of background Just to level the playing field COBIT 5 Objectives o ISACA Board of Directors: tie together

More information

CAPABILITY PROFILE. Move the Digital Way

CAPABILITY PROFILE. Move the Digital Way CAPABILITY PROFILE Move the Digital Way Connecting you with Today & Tomorrow SFA Technologies, provides a gateway for entering the digital way of life, by assisting you with all levels of digital solutions,

More information

An Insider's Perspective: How URAC's New Core 4.0 Accreditation Standards Align with Best Practices in Today's Changing Healthcare Environment

An Insider's Perspective: How URAC's New Core 4.0 Accreditation Standards Align with Best Practices in Today's Changing Healthcare Environment An Insider's Perspective: How URAC's New Core 4.0 Accreditation Standards Align with Best Practices in Today's Changing Healthcare Environment Session Code: MN16 Date: Monday, October 23 Time: 2:45 p.m.

More information

ISO Revision Launch Event

ISO Revision Launch Event ISO Revision Launch Event ISO 14001: 2015 Stanley Wright Environmentalist Copyright 2014 BSI. All rights reserved. 1 Background to the requirements of environmental compliance An overall umbrella called

More information

Risk Management Policy and Framework

Risk Management Policy and Framework Risk Management Policy and Framework Introductory Note to User: CompanyLongName There is no requirement in Australia for a non-publicly listed entity (other than a company regulated by APRA) to comply

More information