COBIT. IT Governance CEN 667

Size: px
Start display at page:

Download "COBIT. IT Governance CEN 667"

Transcription

1 COBIT IT Governance CEN 667 1

2 Project proposal (week 4) Goal of the projects are to find applicable measurement and metric methods to improve processes: For series of standards and For ITIL For Business Continuity and BS For Disaster Recovery For Penetration testing For Operational and Security Incident management For Risk Management Secure method for visual authentication Mobile securty access with speach recognition Other agreed with lecturer Literature review on selected topic - between 500 and 1000 words Proposal / for improvements of choosen method, approach, techniqe, - up to 2000 words List of references Document prepared in two columns as it should Be prepared for the conference paper Week report on updates 2

3 Project proposal (week 7) Candidate Topic Literature review draft Azizah Ibrahim Emina Aličković Jasmin Kevrić Mobile IPv6 handover packet loss avoidance A Novel Intrusion System Based on Support Vector Machines Algorithm improvement for the network anomaly detection using improved KDD 2009 NO NO NO Paper NO NO NO Adnan Miljković Implementation of two factor authentication for web appliacation YES (463 words) NO Fatih Ozturk Evolutionary Computation Method Application for Network Intrusion Detection System using Real Network Data NO NO Tarik Kraljić NO NO NO Adnan Kraljić NO NO NO 3

4 COBIT IT Governance CEN 667 4

5 Lectures Schedule Week Topic Introduction to IT governance Week 1 Overwiev of Information Security standards - ISO series of standards (27001, Week , 27003, 27004, 27005) Week 3 Information Technology Service management ISO and ISO Week 4 ITIL Week 5 Business Continuity and BS and BS Week 6 Disaster Recovery Week 7 COBIT Week 8 Project implementation (ISO and ISO 27003) Week 9 Midterm Week 10 Risk Managament (ISO 27005) Week 11 Application and Network Security and security testing Week 12 Specific Requirements and Controls Implementation (ISO 27002) Week 13 Operational and Security Incident managament Week 14 Perforamnce Measurement and Metrics (ISO 27004) Week 15 Audit (ISO 19011) and Plan- Do-Check-Act impovement cyclus 5

6 6

7 What is CobiT? What is the CobiT Framework? What is the Control Objectives document? How can auditors effectively use CobiT? 7

8 Authoritative, up-to-date, international set of generally accepted IT control objectives and control practices for day-to-day use by business managers and auditors. Structured and organized to provide a powerful control model 8

9 CobiT CobiT is designed to be the breakthrough IT governance tool that helps in the understanding and managing of risks and benefits associated with information and related IT. 9

10 C OB I T Control OBjectives for Information and Related Technology 10

11 Right information, to only the right party, at the right time. Information that is relevant, reliable and secure. Information provided by systems that have integrity by means of a well-managed and properly controlled IT environment. 11

12 A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise s goals by adding value while balancing risk versus return over IT and its processes. 12

13 IT Governance Objectives IT is aligned with the business and enables the business to maximize benefit IT resources are safeguarded and used in a responsible and ethical manner IT-related risks are addressed through appropriate controls and managed to minimize risk and exposure 13

14 The need for better operational controls Technology that makes new business processes possible may come with a loss of control Demand for increased effectiveness and efficiency The importance of technology The need to hold officers and senior management accountable and strengthen governance 14

15 Dashboard: How do responsible managers keep the ship on course? Scorecard: How do we achieve satisfactory results for our stake-holders? Benchmarking: How do we adapt in a timely manner to trends, developments, and best practices for our organization s environment? 15

16 Increasing dependence on information and the systems that deliver the information Increasing vulnerabilities and a wide spectrum of threats, such as cyber threats and information warfare Scale and cost of the current and future investments in information and information systems Potential for technologies to dramatically change organisations and business practices, create new opportunities and reduce costs 16

17 Secure buildings 1980s Glass-house Data centres Unpredictable and fast Unstructured and innovative Hard to implement Managed networks 1990s Network Business integration?? Streetwise users 21st Century Cyberspace Virtual Value Chain E-Commerce Extended Enterprise 17

18 CobiT s Scope and Overall Objectives 18

19 CobiT focuses on information having integrity and being secure and available. At the highest level, it focuses on the importance of information to the long-term success of the organization. 19

20 For Information System Services functions, CobiT can be applied from single point IT operations to across the enterprise. For application systems, CobiT can be applied from a single application-based system to enterprise-based systems. 20

21 CobiT is management oriented Supports corporate and IT governance Serves as excellent criteria for evaluation and a basis for audit planning 21

22 Addresses key attributes of information produced by IT. Links recommended control practices for IT to business and control objectives. Provides guidance in implementing and evaluating the appropriateness of IT-related control practices. 22

23 As a control model, CobiT should be tailored to organizational, platform and system standards. Use CobiT as the Structure to which you link organization-specific operational and control requirements, policies, and standards 23

24 Helps business process owners to ensure the integrity of information systems and auditors to provide statements of assurance by providing: management with generally applicable and accepted standards for good practice for IT control and governance users with a solid base upon which to manage IT and obtain assurance auditors with excellent criteria for review/audit work 24

25 Standards used to determine whether something meets expectations. Basis upon which one measures or compares something against. Need to be generally accepted, recognized, understandable, and defendable. Need to be authoritative. 25

26 CobiT as an Authoritative Source 26

27 CobiT is an Authoritative Source Built on a sound framework of control and IT-related control practices. Aligned with de jure and de facto standards and regulations. 27

28 Based on a Strong Foundation and Sound Principles of Internal Control 28

29 What is Internal Control? How it is defined impacts its design, exercise, and evaluation. 29

30 Purpose of Internal Control Designed to keep an organization on course toward achievement of its mission minimizing surprises along the way. Assist in dealing with rapidly changing economic and competitive environments, shifting customer demands and priorities, and restructuring for future growth. Source: Committee of Sponsoring Organizations (COSO) of the Treadway Commission, Internal Control - Integrated framework, Executive Summary, p

31 The design, implementation, and proper exercise of a system of internal controls should provide "reasonable assurance" that management's goals are attained, control objectives are addressed, legal obligations are met, and undesired events do not occur. Controls reduce or eliminate the risk of exposures, or the exposures themselves. 31

32 Internal Control Controls are framed by what is to be attained (control objectives) and the means to attain those goals (the controls). 32

33 Goals of Internal Control Keep things in Check Adhering to the Rules of the Road Reduce risk Based Upon Best Practices Proof the Rules Have Been Followed Provide assurance that operations are according to standard Keep those blasted auditors happy 33

34 Building CobiT s Definition of Internal Control 34

35 Control Internal control is broadly defined as a process, effected by an entity s board of directors, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories: efficiency and effectiveness of operations reliability of financial reporting compliance with applicable laws and regulations Source: Committee of Sponsoring Organizations (COSO) of the Treadway Commission, Internal Control - Integrated framework, Executive Summary, p

36 Control (as defined by COBIT) The policies, procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected. Source: COBIT Control Objectives, p

37 IT Control Objective A statement of desired result or purpose to be achieved by implementing control procedures in a particular IT activity 37

38 CobiT supports all fundamental Internal Control requirements 38

39 Internal Control Requirements Systemization Documentation Standards, defined expectations Measurement Appropriate risk assessment 39

40 Internal Control Requirements Well-defined operational and control objectives Appropriate controls Competent and trustworthy people Monitoring & evaluation 40

41 Observe actual state of system Observations Recommendations Document actual state of system Documentation Recommend changes to system Evaluation Evaluate system Desired state of system Goals and plans Source: Gelinas and Oram, Accounting Information Systems, 3rd ed., South-Western Publishing, 1996, p

42 Internal Control Review Observe the process & controls Gain Understanding Observations Document The process & controls Report Recommendations AWP & Work Papers Recommend Changes if needed Draw Conclusions Test & Evaluate Process & controls CRITERIA via CobiT Goals and plans 24

43 Control Principles Controls should be considered as built in rather than added on. Controls need to support control objectives that are tied to business objectives. In order to support monitoring and evaluation, controls need to be testable and auditable. Controls need to be cost effective. 43

44 Value of Internal Control Often the value of internal control is only recognized by the results of not having adequate control in place. Control Objectives and related controls are valued by the degree to which they assist an organization to achieve objectives and avoid undesired events. 44

45 Control Models: Structured or organized to present a control framework relative to control objectives and respective internal controls or control practices. Provide statements of responsibilities for control Provide guidance regarding mechanisms to assess the need for control, and to design, develop, implement and exercise control Requires that controls be monitored and evaluated. 45

46 To Be of Value, a Control Model Should Be: Based on sound principles Applicable & Flexible in application Comprehendible Subject to having staying power 46

47 Impact of Technology on Control Operational and control objectives change little Some technology-specific control objectives change There is a significant impact on the mix of controls used to address the control objectives. Technology can facilitate achieving control objectives 47

48 Impact of Technology on Audit Has provided us with some tools to increase audit effectiveness and efficiency Has allowed us to rethink post and preemptive or on-going audit techniques Has provided opportunities to facilitate achieving control objectives 48

49 Control Responsibilities Management -- primary responsibility for ensuring that controls are in place and in effect to provide reasonable assurance that operational and control objectives will be met. Users -- exercise controls. Audit -- evaluates, advises and provides statements of assurance regarding the adequacy of controls. 49

50 CobiT Assists in evaluating appropriateness of controls Assists in identifying desired states of systems and processes Assists in identifying what to look for when observing system operations Provides a working control model for IT-related control objectives 50

51 The CobiT Control Model Provides a Framework for Understanding Control Objectives and Control Practices 51

52 CobiT Framework 52

53 CobiT Framework Documents relationships among information criteria, IT resources, and IT processes Links control objectives and control practices to business processes and business objectives Assists in confirming that appropriate IT processes are in place Facilitates discussion 53

54 CobiT Framework Facilitates the understanding of the: relationship of controls to control objectives, importance of focusing on control objectives and their relationship to the business organization and its business processes, and value of managed processes and resources tied to strategic initiatives. 54

55 COBIT s Focus on Process and Objectives Business (organization) Objectives/Requirements Business Processes (to meet objectives) Information Required (for processes) IT Resources (to provide information) IT Processes (to manage & control resources) Retail merchandising (Walmart, etc.) ROI, market share, customer loyalty (right product, time, price) Order fulfillment (OE/S, Inventory, Purchasing) Data availability and reliability Data, Application Systems, People Planning & Organization, Delivery & Support 55

56 Framework s Three Components Business Requirements for Information IT Resources IT Processes 56

57 Business Requirements for Information To support business processes and satisfy business objectives, information needs to conform to certain criteria. COBIT calls these criteria business requirements for information. 57

58 Sources of Information Criteria Quality Requirements: Quality, Cost, Delivery, Better, Cheaper, Faster Fiduciary Requirements Effectiveness and Efficiency of operations Reliability of Financial Reporting Compliance with Laws and Regulations Security Requirements: Confidentiality, Integrity, Availability 58

59 Promotes a Healthy, Constructive Focus on Information Criteria Viewing Information as being: relevant and reliable delivered in a timely, correct, consistent, usable and complete manner accurate, complete and valid provided through an optimal use of resources protected against unauthorized use, manipulation or disclosure available when required in compliance with legal and contractual obligations 59

60 Information Criteria -- The 1st Component Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability of Information 60

61 Information Criteria -- The 1st Component Effectiveness: deals with information being relevant and pertinent to the business process as well as being delivered in a timely, correct, consistent, usable and complete manner. Efficiency: concerns the provision of information through the optimal (most productive and economical) use of resources. See Framework, p

62 Information Criteria -- The 1st Component Confidentiality: concerns the protection of sensitive information from unauthorized disclosure. Integrity: relates to the accuracy and completeness of information as well as its validity in accordance with business values and expectations. See Control Objectives, p

63 Information Criteria -- The 1st Component Availability: relates to information being available when required by the business process now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities. Compliance: deals with complying with those laws, regulations and contractual arrangements to which the business process is subject; i.e., externally imposed business criteria. See Framework, p

64 Information Criteria -- The 1st Component Reliability of Information: relates to the provision of appropriate information for management to operate the entity and for management, in providing financial reporting to users of the financial information, and in providing information to report to regulatory bodies with regard to compliance with laws and regulations. See Framework, p

65 IT Resources -- The 2nd Component Data Application Systems Technology Facilities People 65

66 IT Resources -- The 2nd Component Data: Objects in their widest sense (i.e., external and internal), structured and not structured, graphics, sound, etc. Application Systems: Application systems are understood to be the sum of manual and programmed procedures. See Control Objectives, page

67 IT Resources -- The 2nd Component Technology: Hardware, operating systems, data base management, networking, multimedia, etc. Facilities: Resources to house and support information systems. People: Include staff skills, awareness and productivity to plan, organize, acquire, deliver, support and monitor information systems and services. See Control Objectives, page

68 Information Processes (3rd component) (4) (34) Domains Processes Natural grouping of processes, often matching an organizational domain of responsibility A series of joined tasks & Activities with natural (control) breaks. (318) Tasks & Activities See Framework, p. 16. Actions needed to achieve a measurable result. Activities have a life-cycle whereas tasks are discrete 68

69 COBIT Domains: Information Processes (3rd Component) Planning/ Organization Monitoring Acquisition / Implementation Delivery / Support 69

70 How do they relate? IT Resources IT Processes Business Requirements Data Information Systems Technology Facilities Human Resources Planning and organisation Aquisition and implementation Delivery and Support Monitoring Effectiveness Efficiency Confidenciality Integrity Availability Compliance Information Reliability 70

71 IT Resource Management CobiT underscores and demonstrates a clear understanding that IT resources need to be managed by naturally grouped processes in order to provide organizations with type and quality, and availability and security of information needed to achieve organizational objectives. 71

72 Framework What you get BUSINESS PROCESSES What you need INFORMATION Do they match? Information Criteria effectiveness efficiency confidentiality integrity Availability Compliance reliability IT RESOURCES data application systems technology facilities people? 72

73 Process/Criteria Relationships Primary: the degree to which the defined control objective directly impacts the information requirement concerned. Secondary: the degree to which the defined control objective only satisfies to a lesser extent or indirectly the business requirement concerned. Blank: could be applicable; however, requirements are more appropriately satisfied by another criteria in this process and/or another process. = IT Resource is managed by this process See Control Objectives, page

74 The WATERFALL Navigation Aid -- High Level Control Objectives for Each Process The control of IT Processes which satisfy Business Requirements is enabled by Control Statements considering Control Practices See Framework, p

75 Data Application Systems Technology Facilities People Resources Effectiveness The planning process must consider data integrity requirements Efficiency Confidenciality Integrity Availability Compliance Reliability Requirements Monitoring Delivery and Support Aquisition and implementation Planning and Organisation (By Gustavo Solis) 75

76 Control Objectives 76

77 Control Objectives Planning and organisation 11 Acquisition and Implementation Domain 6 Delivery and Support 13 Monitoring Domain 4 77

78 Planning and Organization Domain 11 High-level Control Objectives 100 Detailed Control Objectives (IT-related management control practices) 170+ Control Tasks and Activities. 78

79 Planning and Organization Develop strategy and tactical plans for IT Identify ways that IT can best contribute to the achievement of business objectives Plan, communicate, and manage the realization of the strategic vision Establish the IT organization and set the stage for information management and the technology infrastructure See Control Objectives, p

80 Planning and Organization Domain PO 1 Define a Strategic Information Technology Plan PO 2 Define the Information Architecture PO 3 Determine the Technological Direction PO 4 Define the IT Organization and Relationships PO 5 Manage the Investment in Information Technology PO 6 Communicate Management Aims and Directions. Planning and organisation 11 Acquisition and Implementation Domain Delivery and Support Monitoring Domain 80

81 Planning and Organization Domain PO 7 Manage Human Resources PO 8 Ensure Compliance with External Requirements PO 9 Assess Risks PO 10 Manage Projects PO 11 Manage Quality. Planning and organisation 11 Acquisition and Implementation Domain Delivery and Support Monitoring Domain 81

82 Acquisition and Implementation Domain 6 High-level Control Objectives 68 Detailed Control Objectives (IT-related management control practices) 100+ Control Tasks and Activities 82

83 Acquisition and Implementation IT solutions Identified Developed or acquired Implemented Integrated into the business processes Change and maintain existing systems See Framework, p

84 Acquisition and Implementation Domain AI 1 Identify Automated Solutions AI 2 Acquire and Maintain Application Software AI 3 Acquire & Maintain Technology Infrastructure AI 4 Develop and Maintain IT Procedures AI 5 Install and Accredit Systems AI 6 Manage Changes Planning and organisation Acquisition and Implementation Domain 6 Delivery and Support Monitoring Domain 84

85 Delivery and Support Domain 13 High-level Control Objectives 126 Detailed Control Objectives (IT-related management control practices) 190+ Control Tasks and Activities 85

86 Delivery and Support Deliver required services Ensure security and continuity of services Set up support processes, including training Process data (including application controls) See Control Objectives, p

87 Delivery and Support Domain DS 1 Define Service Levels DS 2 Manage Third-Party Services DS 3 Manage Performance and Capacity DS 4 Ensure Continuous Service DS 5 Ensure Systems Security DS 6 Identify and Allocate Costs DS 7 Educate and Train Users Planning and organisation Acquisition and Implementation Domain Delivery and Support Monitoring Domain

88 Delivery and Support Domain DS 8 Assist and Advise IT Customers DS 9 Manage the Configuration DS 10 Manage Problems and Incidents DS 11 Manage Data DS 12 Manage Facilities DS 13 Manage Operations Planning and organisation Acquisition and Implementation Domain Delivery and Support 13 Monitoring Domain 88

89 Monitoring Domain 4 High-level Control Objectives 24 Detailed Control Objectives (IT-related management control practices) 51+ Control Tasks and Activities. 89

90 Monitoring Domain Regularly assess IT processes for Quality Compliance with control requirements Addresses management oversight of organization s control provisions Provides for audit function See Control Objectives, p

91 Monitoring Domain M 1 Monitor the Process M 2 Assess Internal Control Adequacy M 3 Obtain Independent Assurance M 4 Provide for Independent Audit. Planning and organisation Acquisition and Implementation Domain Delivery and Support 91 Monitoring Domain 4

92 Thank you 92

Introduction to IT Governance. IT Governance CEN 667

Introduction to IT Governance. IT Governance CEN 667 Introduction to IT Governance IT Governance CEN 667 1 Lectures Schedule Week Topic Week 1 Introduction to IT governance Overwiev of Information Security standards - ISO 27000 series of standards Week 2

More information

September 17, 2012 Pittsburgh ISACA Chapter

September 17, 2012 Pittsburgh ISACA Chapter September 17, 2012 Pittsburgh ISACA Chapter What is COBIT? Control Objectives for Information and related Technologies ISACA s guidance on the enterprise governance and management of IT. Builds on more

More information

FROM ERP TO COBIT MOVING TOWARD MATURE OF- THE-SHELF INFORMATION SYSTEMS. A Toy Example A Small Detergent Manufacturing Co.

FROM ERP TO COBIT MOVING TOWARD MATURE OF- THE-SHELF INFORMATION SYSTEMS. A Toy Example A Small Detergent Manufacturing Co. FROM ERP TO COBIT MOVING TOWARD MATURE OF- THE-SHELF INFORMATION SYSTEMS Armin Shmilovici and Eli Rohn Department of Information Systems Engineering Ben-Gurion University, Israel {armin, elirohn}@bgu.ac.il

More information

Governance SPICE. Using COSO and COBIT Process Assessment Models BPM GOSPEL

Governance SPICE. Using COSO and COBIT Process Assessment Models BPM GOSPEL Governance SPICE Using COSO and COBIT Process Assessment Models Linking Governance to Sustainable Value Creation BPM GOSPEL (LLP-LDV-TOI-2010-HU-001) This project has been funded with support from the

More information

Business Benefits by Aligning IT best practices

Business Benefits by Aligning IT best practices Business Benefits by Aligning IT best practices Executive Summary Since the Sarbanes-Oxley Act (Sarbanes-Oxley or SOX) was signed into law in 2002, many companies have adopted some IT practices to comply

More information

CGEIT Certification Job Practice

CGEIT Certification Job Practice CGEIT Certification Job Practice Job Practice A job practice serves as the basis for the exam and the experience requirements to earn the CGEIT certification. This job practice consists of task and knowledge

More information

Enterprise Architecture and COBIT

Enterprise Architecture and COBIT Enterprise and COBIT The Open Group October 22, 2003 www.realirm.co.za reducing risk, adding value, driving change Agenda 2 Introduction Case Study Enterprise and IT Governance Conclusion Business Orientation

More information

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests.

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests. Principles Principle 1 - Meeting stakeholder needs The governing body is ultimately responsible for setting the direction of the organisation and needs to account to stakeholders specifically owners or

More information

SOX perspective of internal control & COSO, COBIT Control frameworks.

SOX perspective of internal control & COSO, COBIT Control frameworks. SOX perspective of internal control & COSO, COBIT Control frameworks. Applies to: Business Experts. Summary An effective internal control is foundation of safe and sound organizational financial policy

More information

ECQA Certified Profession. Governance SPICE Model. Internal Financial Control Assessor Training Programme

ECQA Certified Profession. Governance SPICE Model. Internal Financial Control Assessor Training Programme ECQA Certified Profession Governance SPICE Model used by the Internal Financial Control Assessor Training Programme Contact: János Ivanyos Memolux Ltd. +36 1 467403 ivanyos@memolux.hu www.training.ia-manager.org

More information

ISO/IEC Process Mapping to COBIT 4.1 to Derive a Balanced Scorecard for IT Governance

ISO/IEC Process Mapping to COBIT 4.1 to Derive a Balanced Scorecard for IT Governance DISCUSS THIS ARTICLE ISO/IEC 27001 Process Mapping to COBIT 4.1 to Derive a Balanced Scorecard for IT Governance By Christopher Oparaugo, CISM, CGEIT, CRISC COBIT Focus 14 December 2015 The balanced scorecard

More information

Recognizing your needs

Recognizing your needs Our internal audit and IT risk assurance capability statement Recognizing your needs www.pwc.com/ph Our Assurance services Assurance PwC Assurance team delivers the assurance you need on the financial

More information

IT Audit at Brown. A collaboration between the Information Technology and Internal Audit Teams

IT Audit at Brown. A collaboration between the Information Technology and Internal Audit Teams IT Audit at Brown A collaboration between the Information Technology and Internal Audit Teams Page 1 Agenda Objective Risk Management Overview Internal Audit at Brown IT Audit at Brown Frequently Asked

More information

Strengthening Control and integrity: A Checklist for government Managers

Strengthening Control and integrity: A Checklist for government Managers Forum: Analytics and Risk Management Tools for Making Better Decisions Strengthening Control and integrity: A Checklist for government Managers By James A. Bailey The next contribution is based on a Center

More information

VIRGINIA POLYTECHNIC INSTITUTE AND STATE UNIVERSITY COMPLIANCE, AUDIT, AND RISK COMMITTEE OF THE BOARD OF VISITORS COMPLIANCE, AUDIT, AND RISK CHARTER

VIRGINIA POLYTECHNIC INSTITUTE AND STATE UNIVERSITY COMPLIANCE, AUDIT, AND RISK COMMITTEE OF THE BOARD OF VISITORS COMPLIANCE, AUDIT, AND RISK CHARTER VIRGINIA POLYTECHNIC INSTITUTE AND STATE UNIVERSITY COMPLIANCE, AUDIT, AND RISK COMMITTEE OF THE BOARD OF VISITORS I. PURPOSE COMPLIANCE, AUDIT, AND RISK CHARTER The primary purpose of the Compliance,

More information

AUDITING. Auditing PAGE 1

AUDITING. Auditing PAGE 1 AUDITING Auditing 1. Professionalism The International Professional Practices Framework (IPPF) is the conceptual framework that organizes authoritative guidance promulgated by The Institute of Internal

More information

CGEIT QAE ITEM DEVELOPMENT GUIDE

CGEIT QAE ITEM DEVELOPMENT GUIDE CGEIT QAE ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS PURPOSE OF THE CGEIT ITEM DEVELOPMENT GUIDE 3 PURPOSE OF THE CGEIT QAE... 3 CGEIT EXAM STRUCTURE... 3 WRITING QUALITY ITEMS... 3 MULTIPLE-CHOICE ITEMS...

More information

9. Internal control Internal control, as defined in accounting and auditing, is a process for assuring achievement of an organization's objectives in

9. Internal control Internal control, as defined in accounting and auditing, is a process for assuring achievement of an organization's objectives in 9. Internal control Internal control, as defined in accounting and auditing, is a process for assuring achievement of an organization's objectives in operational effectiveness and efficiency, reliable

More information

6. IT Governance 2006

6. IT Governance 2006 6. IT Governance 2006 Introduction The Emerging Enterprise Model 3 p IT is an integral part of the business p IT governance is an integral part of corporate governance 4 Challenges for the IT IT gets more

More information

Board Charter. Values Statement for IDCARE

Board Charter. Values Statement for IDCARE Board Charter New Zealand Entity Company Number 4918799 NZ Business Number 9429041070109 Australian Entity ABN 84 164 038 966 Values Statement for IDCARE In all its planning, services and behaviour, IDCARE

More information

EVALUATION OF INFRASTRUCTURE INFORMATION TECHNOLOGY GOVERNANCE USING COBIT 4.1 FRAMEWORK

EVALUATION OF INFRASTRUCTURE INFORMATION TECHNOLOGY GOVERNANCE USING COBIT 4.1 FRAMEWORK International Conference on Information Systems for Business Competitiveness (ICISBC 2013) 20 EVALUATION OF INFRASTRUCTURE INFORMATION TECHNOLOGY GOVERNANCE USING COBIT 4.1 FRAMEWORK Rusmala Santi 1) Syahril

More information

CGEIT ITEM DEVELOPMENT GUIDE

CGEIT ITEM DEVELOPMENT GUIDE CGEIT ITEM DEVELOPMENT GUIDE Updated March 2017 TABLE OF CONTENTS Content Page Purpose of the CGEIT Item Development Guide 3 CGEIT Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps

More information

Developing an Integrated Anti-Fraud, Compliance, and Ethics Program

Developing an Integrated Anti-Fraud, Compliance, and Ethics Program Developing an Integrated Anti-Fraud, Compliance, and Ethics Program Establishing an Effective Anti-Fraud, Compliance, and Ethics Function 2018 Association of Certified Fraud Examiners, Inc. Discussion

More information

Statement on Risk Management and Internal Control

Statement on Risk Management and Internal Control INTRODUCTION The Board affirms its overall responsibility for the Group s system of internal control and risk management and for reviewing the adequacy and effectiveness of the system. The Board is pleased

More information

Organizational Governance: Guidance for Internal Auditors. - July

Organizational Governance: Guidance for Internal Auditors. - July Position Paper Organizational Governance: Guidance for Internal Auditors - July 2006 - The Institute of Internal Auditors, 247 Maitland Avenue, Altamonte Springs, Florida 32701-4102, USA http://www.theiia.org

More information

PURCHASE ORDER ATTACHMENT Q-201 SOFTWARE QUALITY SUBCONTRACTOR REQUIREMENTS TASK DESCRIPTIONS - PURCHASE CATEGORY "A"

PURCHASE ORDER ATTACHMENT Q-201 SOFTWARE QUALITY SUBCONTRACTOR REQUIREMENTS TASK DESCRIPTIONS - PURCHASE CATEGORY A PURCHASE ORDER ATTACHMENT Q-201 SOFTWARE QUALITY SUBCONTRACTOR REQUIREMENTS TASK DESCRIPTIONS - PURCHASE CATEGORY "A" 1. SOFTWARE QUALITY PROGRAM. This attachment establishes the software quality requirements

More information

CITIBANK N.A JORDAN. Governance and Management of Information and Related Technologies Guide

CITIBANK N.A JORDAN. Governance and Management of Information and Related Technologies Guide CITIBANK N.A JORDAN Governance and Management of Information and Related Technologies Guide 2018 Table of Contents 1. OVERVIEW... 2 2. Governance of Enterprise IT... 3 3. Principles of Governance of Enterprise

More information

LI & FUNG LIMITED ANNUAL REPORT 2016

LI & FUNG LIMITED ANNUAL REPORT 2016 52 Our approach to risk management We maintain a sound and effective system of risk management and internal controls to support us in achieving high standards of corporate governance. Our approach to risk

More information

"IT Governance Helping Business Survival

IT Governance Helping Business Survival "IT Governance Helping Business Survival Steve Crutchley CEO & Founder Consult2Comply www.consult2comply.com Introduction Steve Crutchley Founder & CEO of Consult2Comply 39 Years IT & Business Experience

More information

Washington Metropolitan Area Transit Authority Board Action/Information Summary

Washington Metropolitan Area Transit Authority Board Action/Information Summary Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 201804 Resolution: Yes No TITLE: Board Audit Awareness Training PRESENTATION SUMMARY: The

More information

Internal Control Questionnaire and Assessment

Internal Control Questionnaire and Assessment Bureau of Financial Monitoring and Accountability Florida Department of Economic Opportunity September 30, 2017 107 East Madison Street Caldwell Building Tallahassee, Florida 32399 www.floridajobs.org

More information

IMPACT AND IMPORTANCE OF INTERNAL AUDIT IN SUCCESSFUL MANAGEMENT OF THE ENTERPRISE

IMPACT AND IMPORTANCE OF INTERNAL AUDIT IN SUCCESSFUL MANAGEMENT OF THE ENTERPRISE 832 IMPACT AND IMPORTANCE OF INTERNAL AUDIT IN SUCCESSFUL MANAGEMENT OF THE ENTERPRISE Fatmir Mehmeti¹ 1 Audit Company ETIKA Kosovo, fatmir_mehmeti@yahoo.com Abstract Internal audit is an independent activity

More information

ISO/IEC INTERNATIONAL STANDARD. Corporate governance of information technology. Gouvernance des technologies de l'information par l'entreprise

ISO/IEC INTERNATIONAL STANDARD. Corporate governance of information technology. Gouvernance des technologies de l'information par l'entreprise INTERNATIONAL STANDARD ISO/IEC 38500 First edition 2010-06-01 Corporate governance of information technology Gouvernance des technologies de l'information par l'entreprise Reference number ISO/IEC 38500:2008(E)

More information

Understanding the Challenge and Incredible Potential of IT Governance

Understanding the Challenge and Incredible Potential of IT Governance Understanding the Challenge and Incredible Potential of IT Governance REALIZING THE MOST VALUE FROM TECHNOLOGY THROUGH BUSINESS GOV ERNANC E O F IT Governance defined gov er nance noun (ˈgə-vər-nən(t)s)

More information

ISO Standards in Strengthening Organizational Resilience, Mitigating Risk & Addressing Sustainability Concerns

ISO Standards in Strengthening Organizational Resilience, Mitigating Risk & Addressing Sustainability Concerns ISO Standards in Strengthening Organizational Resilience, Mitigating Risk & Addressing Sustainability Concerns 13 December 2016 Joe Muratore Copyright 2012 BSI. All rights reserved. Enterprise Risk Management

More information

COSO ERM: Integrating with Strategy and Performance. Michael Parkinson

COSO ERM: Integrating with Strategy and Performance. Michael Parkinson COSO ERM: Integrating with Strategy and Performance Michael Parkinson Content The COSO Frameworks Risk (Enterprise) Risk Management The COSO risk management framework A few highlights Questions for management

More information

Internal Audit of ICT Governance in WFP. Office of the Inspector General Internal Audit Report AR/15/11

Internal Audit of ICT Governance in WFP. Office of the Inspector General Internal Audit Report AR/15/11 Fighting Hunger Worldwide Internal Audit of ICT Governance in WFP Office of the Inspector General Internal Audit Report AR/15/11 Contents Page I. Executive summary 3 II. Context and scope 5 III. Results

More information

https://www.e-janco.com

https://www.e-janco.com E-mail: support@e-janco.com https://www.e-janco.com Summary Table of Contents IT INFRASTRUCTURE, STRATEGY, AND CHARTER SUMMARY...1 Benefits of IT Infrastructure Management...1 Base Assumptions and Objectives...2

More information

Changes to The IIA Standards: What Board Members and Executive Management Need to Know

Changes to The IIA Standards: What Board Members and Executive Management Need to Know Changes to The IIA Standards: What Board Members and Executive Management Need to Know Introduction The Institute of Internal Auditors (IIA) is the leading standard- and guidance-setting body for the global

More information

Internal Financial Control (IFC)& Internal Financial Controls over Financial Reporting (IFCoFR)

Internal Financial Control (IFC)& Internal Financial Controls over Financial Reporting (IFCoFR) Internal Financial Control (IFC)& Internal Financial Controls over Financial Reporting (IFCoFR) Origin of IFC The first significant focus on internal control certification related to financial reporting

More information

SELF ASSESSMENT OF BUSINESS OBJECTIVES. Kelly Dorin CPA, CA, CIA, CFE, CCSA, CRMA

SELF ASSESSMENT OF BUSINESS OBJECTIVES. Kelly Dorin CPA, CA, CIA, CFE, CCSA, CRMA SELF ASSESSMENT OF BUSINESS OBJECTIVES Kelly Dorin CPA, CA, CIA, CFE, CCSA, CRMA Overview What is Control Self-Assessment (CSA) Benefits obtained from using CSA How would you use CSA Enterprise-wide CSA

More information

Internal Audit Quality Analysis Evaluation against the Standards International Standards for the Professional Practice of Internal Auditing (2017)

Internal Audit Quality Analysis Evaluation against the Standards International Standards for the Professional Practice of Internal Auditing (2017) Internal Audit Quality Analysis Evaluation against the Standards International Standards for the Professional Practice of Internal Auditing (2017) Assessor 1: Assessor 2: Date: Date: Legend: Generally

More information

Isaca Exam CISM Certified Information Security Manager Version: 6.1 [ Total Questions: 631 ]

Isaca Exam CISM Certified Information Security Manager Version: 6.1 [ Total Questions: 631 ] s@lm@n Isaca Exam CISM Certified Information Security Manager Version: 6.1 [ Total Questions: 631 ] Topic break down Topic Topic 1: INFORMATION SECURITY GOVERNANCE Topic 2: INFORMATION RISK MANAGEMENT

More information

This charter defines the purpose, authority and responsibility of News Corporation s (the Company ) Corporate Audit Department.

This charter defines the purpose, authority and responsibility of News Corporation s (the Company ) Corporate Audit Department. CORPORATE AUDIT DEPARTMENT CHARTER PURPOSE This charter defines the purpose, authority and responsibility of News Corporation s (the Company ) Corporate Audit Department. The Institute of Internal Auditors

More information

Internal Control Questionnaire and Assessment

Internal Control Questionnaire and Assessment Bureau of Financial Monitoring and Accountability Florida Department of Economic Opportunity September 15, 2016 107 East Madison Street Caldwell Building Tallahassee, Florida 32399 www.floridajobs.org

More information

CERT Resilience Management Model, Version 1.2

CERT Resilience Management Model, Version 1.2 CERT Resilience Management Model, Organizational Process Focus (OPF) Richard A. Caralli Julia H. Allen David W. White Lisa R. Young Nader Mehravari Pamela D. Curtis February 2016 CERT Program Unlimited

More information

Implementation of the CO BIT -3 Maturity Model in Royal Philips Electronics

Implementation of the CO BIT -3 Maturity Model in Royal Philips Electronics Implementation of the CO BIT -3 Maturity Model in Royal Philips Electronics Alfred C.E. van Gils Philips International BV Corporate Information Technology Eindhoven, The Netherlands Abstract: Philips has

More information

Education Quality Development for Excellence Performance with Higher Education by Using COBIT 5

Education Quality Development for Excellence Performance with Higher Education by Using COBIT 5 Education Quality Development for Excellence Performance with Higher Education by Using COBIT 5 Kemkanit Sanyanunthana Abstract The purpose of this research is to study the management system of information

More information

3.6.2 Internal Audit Charter Adopted by the Board: November 12, 2013

3.6.2 Internal Audit Charter Adopted by the Board: November 12, 2013 3.6.2 Internal Audit Charter Adopted by the Board: November 12, 2013 I. PURPOSE The purpose of this Charter is to formally define LACERS internal audit function s purpose, authority, and responsibility.

More information

IT Framework Memorandum. For. Supervised Institutions

IT Framework Memorandum. For. Supervised Institutions CENTRALE BANK VAN CURAÇAO EN SINT MAARTEN (Central Bank) IT Framework Memorandum For Supervised Institutions WILLEMSTAD, Updated version April 2011 IT Framework Memorandum for Supervised Institutions 1.

More information

The SAM Optimization Model. Control. Optimize. Grow SAM SOFTWARE ASSET MANAGEMENT

The SAM Optimization Model. Control. Optimize. Grow SAM SOFTWARE ASSET MANAGEMENT The Optimization Model Control. Optimize. Grow The Optimization Model In an ever-changing global marketplace, your company is looking for every opportunity to gain a competitive advantage and simultaneously

More information

1 Management Responsibility 1 Management Responsibility 1.1 General 1.1 General

1 Management Responsibility 1 Management Responsibility 1.1 General 1.1 General 1 Management Responsibility 1 Management Responsibility 1.1 General 1.1 General The organization s management with executive The commitment and involvement of the responsibility shall define, document

More information

Competency Area: Business Continuity and Information Assurance

Competency Area: Business Continuity and Information Assurance Competency Area: Business Continuity and Information Assurance Area Description: Business Continuity and Information Assurance competency area mainly concerns the continuity, auditing and assurance of

More information

Practices in Enterprise Risk Management

Practices in Enterprise Risk Management Practices in Enterprise Risk Management John Foulley Risk Management Practices Head SAS Institute Asia Pacific What is ERM? Enterprise risk management is a process, effected by an entity s board of directors,

More information

Internal Audit Charter

Internal Audit Charter Internal Audit Charter Authority Source: Endorsed by the Audit and Risk Management Committee and approved by the Vice- Chancellor Approval Date: 20/10/2017 Publication Date: 24/10/2017 Review Date: 20/10/2018

More information

Applying Integrated Assurance Management Scenarios for Governance Capability Assessment

Applying Integrated Assurance Management Scenarios for Governance Capability Assessment Applying Integrated Assurance Management Scenarios for Governance Capability Assessment János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, ivanyos@trusted.hu Abstract. The well established

More information

Contents An Introductory Overview of ITIL Service Lifecycle: concept and overview...3 I. Service strategy...6 The 4 P's of ITIL Service

Contents An Introductory Overview of ITIL Service Lifecycle: concept and overview...3 I. Service strategy...6 The 4 P's of ITIL Service ITIL 2011 Notes Contents An Introductory Overview of ITIL 2011...3 Service Lifecycle: concept and overview...3 I. Service strategy...6 II. The 4 P's of ITIL Service Strategy...6 Key processes and activities...7

More information

Records and Information Management Framework. Government Records Office Archives of Manitoba

Records and Information Management Framework. Government Records Office Archives of Manitoba Government Records Office Archives of Manitoba Version Control Initiated July 2017 Final Draft February 2018 Endorsed by the Archivist of Manitoba April 2018 Published May 2018 Authority This framework

More information

KING IV GOVERNANCE PRINCIPLES APPLICATION BY MURRAY & ROBERTS FY The governing body should lead ethically and effectively (Leadership)

KING IV GOVERNANCE PRINCIPLES APPLICATION BY MURRAY & ROBERTS FY The governing body should lead ethically and effectively (Leadership) KING IV GOVERNANCE PRINCIPLES APPLICATION BY MURRAY & ROBERTS FY2018 LEADERSHIP, ETHICS AND CORPORATE CITIZENSHIP 1. The governing body should lead ethically and effectively (Leadership) The Board is the

More information

TERMS OF REFERENCE & PROFILE: Director of the Board DATE: January 2018

TERMS OF REFERENCE & PROFILE: Director of the Board DATE: January 2018 TERMS OF REFERENCE & PROFILE: Director of the Board DATE: January 2018 REPORT TO: Membership PURPOSE OF THE BOARD OF DIRECTORS: The board of directors has ultimate accountability for the governance of

More information

KING III IT GOVERNANCE ALIGNED TO. Simon Liell-Cock Julio Graham Peter Hill CISA CISM CGEIT

KING III IT GOVERNANCE ALIGNED TO. Simon Liell-Cock Julio Graham Peter Hill CISA CISM CGEIT IT GOVERNANCE ALIGNED TO KING III Simon Liell-Cock Julio Graham Peter Hill CISA CISM CGEIT IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za info@itgovernance.com 0825588732

More information

KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 2, Desember 2017

KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 2, Desember 2017 Jurnal Ilmiah KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 2, Desember 2017 ISSN 0216 0544 e-issn 2301 6914 MATURITY LEVEL OF INFORMATION TECHNOLOGY USING COBIT FRAMEWORK 4.1 (CASE STUDY: CLOUD

More information

HLC Criteria and Core Component Crosswalk with AQIP Portfolio Processes

HLC Criteria and Core Component Crosswalk with AQIP Portfolio Processes HLC Criteria and Core Component Crosswalk with AQIP Portfolio Processes General Guidelines for Using this Crosswalk The crosswalk below gives the connections between HLC Criteria/Core Components and AQIP

More information

Chapter 9 Ethical Guidelines for Information Use

Chapter 9 Ethical Guidelines for Information Use Chapter 9 Ethical Guidelines for Information Use Managing and Using Information Systems: A Strategic Approach by Keri Pearlson & Carol Saunders Learning Objectives Understand how ethics should be framed

More information

Internal Audit of WFP s Per- Capita Funding Modality for Corporate IT Services. Office of the Inspector General Internal Audit Report AR/14/13

Internal Audit of WFP s Per- Capita Funding Modality for Corporate IT Services. Office of the Inspector General Internal Audit Report AR/14/13 Fighting Hunger Worldwide Internal Audit of WFP s Per- Capita Funding Modality for Corporate IT Services Office of the Inspector General Internal Audit Report AR/14/13 Contents Page I. Executive Summary

More information

Outline of the Discussion

Outline of the Discussion IT Risk Supervision Outline of the Discussion Define IT Risk Identify Scope of an IT Examination Describe a Bank s Operating Environment Identify Risks Considered in IT Supervision Describe the IT Ratings

More information

WORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B

WORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B 1. Work Plan & IV&V Methodology 1.1 Compass Solutions IV&V Approach The Compass Solutions Independent Verification and Validation approach is based on the Enterprise Performance Life Cycle (EPLC) framework

More information

Comparison Matrix ISO 9001:2015 vs ISO 9001:2008

Comparison Matrix ISO 9001:2015 vs ISO 9001:2008 Comparison Matrix ISO 9001:2015 vs ISO 9001:2008 Description: This document is provided by American System Registrar. It shows relevant clauses, side-by-side, of ISO 9001:2008 standard and the ISO 9001:2015

More information

20 Years in the Making. Meet the New ICIF: Revisions to COSO s Internal Control Integrated Framework. Dr. Sandra Richtermeyer COSO Board Member

20 Years in the Making. Meet the New ICIF: Revisions to COSO s Internal Control Integrated Framework. Dr. Sandra Richtermeyer COSO Board Member Meet the New ICIF: Revisions to COSO s Internal Control Integrated Framework Dr. Sandra Richtermeyer COSO Board Member Associate Dean and Professor of Accountancy Xavier University Cincinnati Ohio USA

More information

A look at the varied roles of internal auditors by... ALL IN A DAY S WORK INTERNAL AUDITING:

A look at the varied roles of internal auditors by... ALL IN A DAY S WORK INTERNAL AUDITING: A look at the varied roles of internal auditors by...... ALL IN A DAY S WORK INTERNAL AUDITING: SIMPLY GOOD BUSINESS ORGANIZATIONAL GOVERNANCE comprises the procedures established by representatives of

More information

RSA ARCHER IT & SECURITY RISK MANAGEMENT

RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, anti-virus, intrusion prevention systems, intrusion

More information

CORPORATE GOVERNANCE POLICY

CORPORATE GOVERNANCE POLICY CORPORATE GOVERNANCE STATEMENT Atlantic is committed to building a diversified portfolio of resources assets that deliver superior returns to shareholders. Atlantic will seek to achieve this through strong

More information

Data Protection Management System for GDPR compliance - using COBIT. January 2018

Data Protection Management System for GDPR compliance - using COBIT. January 2018 Data Protection Management System for GDPR compliance - using COBIT January 2018 Contents Executive summary 2 Using COBIT to establish a Data Protection Management System for the GDPR 4 Tools for the

More information

Internal Oversight Division. Audit Report. Audit of Enterprise Risk Management

Internal Oversight Division. Audit Report. Audit of Enterprise Risk Management Internal Oversight Division Reference: IA 2016-08 Audit Report Audit of Enterprise Risk Management December 16, 2016 IA 2016-08 2. TABLE OF CONTENTS LIST OF ACRONYMS... 3 EXECUTIVE SUMMARY... 4 1. INTRODUCTION...

More information

Our mission is to promote transparency and integrity in business. We monitor the quality of UK Public Interest Entity audits. We have responsibility f

Our mission is to promote transparency and integrity in business. We monitor the quality of UK Public Interest Entity audits. We have responsibility f Financial Reporting Council DELOITTE LLP AUDIT QUALITY INSPECTION JUNE 2018 Our mission is to promote transparency and integrity in business. We monitor the quality of UK Public Interest Entity audits.

More information

INFORMATION SYSTEMS AUDITING STANDARDS, GUIDELINES, BEST PRACTICES

INFORMATION SYSTEMS AUDITING STANDARDS, GUIDELINES, BEST PRACTICES 8 INFORMATION SYSTEMS AUDITING STANDARDS, GUIDELINES, BEST PRACTICES 8.0 INTRODUCTION Technology has affected all of us at home as well as at the work place. Articles engineered with cutting edge technology

More information

Developing a Framework to Improve and Enhance IT Services at One Malaysian Private University

Developing a Framework to Improve and Enhance IT Services at One Malaysian Private University Developing a Framework to Improve and Enhance IT Services at One Malaysian Private University Rasha Adnan Khther, Marini Othman College of Information technology, University Tenaga Nasional Jalan IKRAM-

More information

CHAPTER 2 THEORETICAL FOUNDATIONS. organization which responsible to record and employs physical resources and other

CHAPTER 2 THEORETICAL FOUNDATIONS. organization which responsible to record and employs physical resources and other CHAPTER 2 THEORETICAL FOUNDATIONS 2.1 Accounting Information System (AIS) Accounting information system can be defined as an integrated system within an organization which responsible to record and employs

More information

Report. Quality Assessment of Internal Audit at <Organisation> Draft Report / Final Report

Report. Quality Assessment of Internal Audit at <Organisation> Draft Report / Final Report Report Quality Assessment of Internal Audit at Draft Report / Final Report Quality Self-Assessment by Independent Validation by Table of Contents 1.

More information

Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System

Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System Professor PhD. Constantin MILITARU Polytechnic University of Bucharest, Romania

More information

Internal Audit for Local Government Units

Internal Audit for Local Government Units 1 Internal Audit for Local Government Units 2 Principles and Concepts of Internal Control (IC) Outline of Presentation 3 Definition of Internal Control (IC) IC in the Philippine Government General Objectives

More information

Business Continuity Policy

Business Continuity Policy Business Continuity Policy To ensure the effective availability of essential products and services, BCQ has raised this Business Continuity Policy in support of a comprehensive program for business continuity,

More information

Auditing Open Source Applications by Using COBIT 4.1

Auditing Open Source Applications by Using COBIT 4.1 Auditing Open Source Applications by Using COBIT 4.1 Assist. Cristian AMANCEI, PhD candidate Academy of Economic Studies, Bucharest, Romania Department of Computer Science in Economics cristian.amancei@ie.ase.ro

More information

SAMPLE SECURITY PLAN

SAMPLE SECURITY PLAN SAMPLE SECURITY PLAN 1.0 Introduction 1.1 Purpose The purpose of this document is to describe the Company s Security Management System. The Company is committed to the safety and security of our employees,

More information

MISSISSIPPI STATE UNIVERSITY INTERNAL AUDIT CHARTER

MISSISSIPPI STATE UNIVERSITY INTERNAL AUDIT CHARTER MISSISSIPPI STATE UNIVERSITY INTERNAL AUDIT CHARTER I. The Charter The Office of Internal Audit was established by the President of Mississippi State University to assist the University in meeting its

More information

Lake County School District. Quality Assurance & Improvement Program. Internal Self-Assessment for. The Internal Audit Department

Lake County School District. Quality Assurance & Improvement Program. Internal Self-Assessment for. The Internal Audit Department Lake County School District Quality Assurance & Improvement Program Internal Self-Assessment for The Internal Audit Department Fiscal Year 2017 2018 Completed By: Thomas A. Mock, CIA Date: January 31,

More information

ERM Retooled: Driving Performance by Revising and Enhancing Risk Management Governance Wipfli LLP

ERM Retooled: Driving Performance by Revising and Enhancing Risk Management Governance Wipfli LLP ERM Retooled: Driving Performance by Revising and Enhancing Risk Management Governance 2018 Wipfli LLP In September 2017, the Committee of Sponsoring Organizations (COSO) a committee that provides guidance

More information

Guidelines for Information Asset Management: Roles and Responsibilities

Guidelines for Information Asset Management: Roles and Responsibilities Guidelines for Information Asset Management: Roles and Responsibilities Document Version: 1.0 Document Classification: Public Published Date: April 2017 P a g e 1 Contents 1. Overview:... 3 2. Audience...

More information

Sarbanes-Oxley Compliance

Sarbanes-Oxley Compliance LANDESK WHITE PAPER Sarbanes-Oxley Compliance How LANDesk Management Solutions Support IT Asset Management and Overall IT Control Requirements Abstract: The Sarbanes-Oxley Act of 2002 implements strict

More information

CERT Resilience Management Model, Version 1.2

CERT Resilience Management Model, Version 1.2 CERT Resilience Management Model, Asset Definition and Management (ADM) Richard A. Caralli Julia H. Allen David W. White Lisa R. Young Nader Mehravari Pamela D. Curtis February 2016 CERT Program Unlimited

More information

Internal Control & Sarbanes-Oxley Act. ERPANET Workshop. Antwerp, April 14, PwC

Internal Control & Sarbanes-Oxley Act. ERPANET Workshop. Antwerp, April 14, PwC Internal Control & Sarbanes-Oley Act ERPANET Workshop Antwerp, April 14, 2004 PwC 2 Pw Agenda Background The Sarbanes-Oley Act - An Overview Approach to 404 readiness Background Reasons for New Legislation

More information

Internal Control in Higher Education

Internal Control in Higher Education Internal Control in Higher Education Daniel Adams Office of Audit Services Audit Services Mission To provide assurance and advisory services that are independent, objective and risk-based in order to protect

More information

Governance, COBIT and the Cloud a match made in the sky! Robert E Stroud CGEIT International Vice President ISACA Treasurer, Director Audit,

Governance, COBIT and the Cloud a match made in the sky! Robert E Stroud CGEIT International Vice President ISACA Treasurer, Director Audit, Governance, COBIT and the Cloud a match made in the sky! Robert E Stroud CGEIT International Vice President ISACA Treasurer, Director Audit, Standards & Compliance itsmf Intl. Service Management and Governance

More information

Evaluation Policy for GEF Funded Projects

Evaluation Policy for GEF Funded Projects Evaluation Policy for GEF Funded Projects Context Conservation International helps society adopt the conservation of nature as the foundation of development. We do this to measurably improve and sustain

More information

EAST SUSSEX FIRE AUTHORITY Job Description

EAST SUSSEX FIRE AUTHORITY Job Description EAST SUSSEX FIRE AUTHORITY Job Description Work Designation: Resources / Treasurer Location: Shared HQ Job Title ITG Manager Rank or Grade: Job Family 7 (subject to Job Evaluation) Responsible To: Assistant

More information

Opus2 or an Opus2 Affiliate within the Group (as applicable), shall be the Data Controller in respect of the Personal Data covered in this Notice.

Opus2 or an Opus2 Affiliate within the Group (as applicable), shall be the Data Controller in respect of the Personal Data covered in this Notice. Introduction Your privacy is important to Opus2. We have drafted this Privacy Notice (also referred to as Notice in this document) to help you understand who we are, what Personal Data we collect about

More information

UPPLIER ANUAL. Issued: 01 Aug 13

UPPLIER ANUAL. Issued: 01 Aug 13 UPPLIER ANUAL Issued: 01 Aug 13 Table of Contents Our Company 3 Our Vision 3 Scope and Purpose 4 Responsibilities 4 General Expectations and Requirements 5 Supplier Quality Management System 6 Supplier

More information

Diving into the 2013 COSO Framework. Presented by: Ronald A. Conrad

Diving into the 2013 COSO Framework. Presented by: Ronald A. Conrad Diving into the 2013 COSO Framework Presented by: Ronald A. Conrad 2 Objectives Obtain an understanding of why the COSO Framework has been updated Understand how the framework has changed Identify the

More information