ISACA S IT Audit, Information Security & Risk Insights Africa 2014 MAY, 2014

Size: px
Start display at page:

Download "ISACA S IT Audit, Information Security & Risk Insights Africa 2014 MAY, 2014"

Transcription

1 ISACA S IT Audit, Information Security & Risk Insights Africa 2014 MAY, 2014 MANAGING IT RISKS IN THE BANKING INDUSTRY Emmanuel Ofori Boateng, Dep. Head, IT, Ecobank Ghana

2 OVERVIEW - HISTORY OF RISK MANAGEMENT - OVERVIEW OF IT RISKS IN BANKS - REMEDIES

3 HISTORY OF RISK MANAGEMENT The Study of Risk Management begun after WWII It had to do with market insurance to protect individuals and companies from various losses associated with accident. The use of derivatives are risk management instruments begun in the 1970s. International risk regulation and Operational Risks begun in the 1990s.

4 HISTORY OF RISK MANAGEMENT Concomitantly governance of risk management became essential and integrated risk management was introduced. In the wake of financial scandals and bankruptcies resulting from poor risk management; the Sarbenes- Oxley regulation was introduced in 2002 (Enron). However these regulations, governance rules and risk management methods failed to prevent the financial crisis that begun in 2007 (Lehman Brothers)

5 RISKS IN BANKS MARKET RISKS CREDIT RISKS OPERATIONAL RISKS

6 OPERATIONAL RISK The main characteristic of operational risk is that unlike market and credit risks, which mainly involve risks associated with trading or lending, everyone in the financial organization can be a source of operational risk

7 IT RISKS CLASSIFICATION IT risks can be classified according to their impact on the organization, as follows: 1. Security risk 2. Availability risk 3. Performance risk 4. Compliance risk

8 IT RISKS CLASSIFICATION SECURITY RISK the information will be altered, accessed, or used by unauthorized parties.

9 IT RISK CLASSIFICATION AVAILABILITY RISK that information or applications will be inaccessible due to system failure or natural disaster, including any recovery period.

10 IT RISK CLASSIFICATION PERFORMANCE RISK that underperformance of systems, applications, or personnel, or IT as a whole will diminish business productivity or value.

11 IT RISK CLASSIFICATION COMPLIANCE RISK that information handling or processing will fail to meet regulatory, IT or business policy requirements. Usually, it involves penalties, fines, or loss of reputation from failure to comply with laws or regulations

12 IT RISKS - IT GOVERNANCE - CYBERSECURITY (Cyberterrorism, Data loss) - CARD FRAUD - BIG DATA SECURITY & PRIVACY INTERNET BANKING HACKING VIRUSES OUTSOURCING

13 IT RISK Unauthorized Access: User/Developer access was not approved for a particular level of access or action; Example: Ensure privileged access is appropriately restricted. Excessive Access: User/Developer access level is beyond the scope of job role and responsibility; Example: Ensure the Principle of Least Privilege is in place people only have access to the information and transactions needed to perform their job and scope of responsibility

14 IT RISKS Unauthorized Changes: Program change was not approved before move to production Lack of control around the acquisition and implementation of new applications and maintenance of existing applications Lack of control around the acquisition, installation, configuration, integration, and maintenance of the IT infrastructure.

15 MITIGATING I.T. RISK ROLE OF BOARD OF DIRECTORS AND MANAGEMENT Federal Financial Institutions Examination Council (FFIEC) direct senior management and the board of directors to manage IT risks, including information security, business continuity and disaster recovery.

16 MITIGATING IT RISKS AUDITS AND OTHER INDEPENDENT REVIEWS

17 MITIGATING IT RISKS LEGAL FRAMEWORK EDUCATION

18 MITIGATING IT RISKS USING STANDARDS, FRAMEWORKS etc COBIT (ISACA): Control Objectives for Information Technology that focuses on four key domain areas of Plan & Organize, Acquire & Implement, Deliver & Support, and Monitor & Evaluate

19 MITIGATING IT RISKS ITIL (INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY) Framework for IT Service Management practices, such as Change Management, Incident Management, Problem Management, Configuration Management, Service Level Management

20 MITIGATING IT RISKS CMMi (Software Engineering Institute): Capability Maturity Model Integration for Software Development Lifecycle ISO20000: Framework and Certification for IT Service Management ISO27001: Framework and Certification for Information Security RiskIT (ISACA): IT-related buisness risk, focusing in Risk Evaluation, Risk Governance, and Risk Monitoring/Reporting

21 MITIGATING IT RISKS VENDOR MANAGEMENT RISKS AND CONTROLS

22 CONCLUSION In years to come, banks will face two major drivers that will challenge them to take on deepened I.T. risks: GLOBALIZATION AND INTERNET-RELATED TECHNOLOGIES

23 THANK YOU QUESTIONS?

Job Description. No of Direct Reports : 0. Titles of Direct Reports: Size of Department: 5. Budget Responsibility (direct) :

Job Description. No of Direct Reports : 0. Titles of Direct Reports: Size of Department: 5. Budget Responsibility (direct) : Job Description Job Title : Department : Compliance Analyst Information Technology Reporting to (Job Title) : Director of Risk, Security & Compliance No of Direct Reports : 0 Titles of Direct Reports:

More information

REGULATORY HOT TOPIC Third Party IT Vendor Management

REGULATORY HOT TOPIC Third Party IT Vendor Management REGULATORY HOT TOPIC Third Party IT Vendor Management 1 Todays Outsourced Technology Services Core Processing Internet Banking Mobile Banking Managed Security Services Managed Data Center Services And

More information

Business Benefits by Aligning IT best practices

Business Benefits by Aligning IT best practices Business Benefits by Aligning IT best practices Executive Summary Since the Sarbanes-Oxley Act (Sarbanes-Oxley or SOX) was signed into law in 2002, many companies have adopted some IT practices to comply

More information

Sarbanes-Oxley Compliance Kit

Sarbanes-Oxley Compliance Kit Kit February 2018 This product is NOT FOR RESALE or REDISTRIBUTION in any physical or electronic format. The purchaser of this template has acquired the rights to use it for a SINGLE Disaster Recovery

More information

SOX AND THE IT AUDITOR

SOX AND THE IT AUDITOR SOX AND THE IT AUDITOR 15 Years Later, Has Life Changed or Does It Just Drone on and on and on and Ross E. Wescott MA CISA CIA CCP CUERME Wescott & Associates The Conference that Counts, Albany New York

More information

Changing Hats: Business Continuity to Operations Risk Manager. Presenter

Changing Hats: Business Continuity to Operations Risk Manager. Presenter Changing Hats: Business Continuity to Operations Manager Continuity Insights Management Conference New Orleans, Louisiana Tuesday, April 13, 2008 9:45 11:00 AM Presenter Susan Rogers, MBCP Senior Vice

More information

IT Framework Memorandum. For. Supervised Institutions

IT Framework Memorandum. For. Supervised Institutions CENTRALE BANK VAN CURAÇAO EN SINT MAARTEN (Central Bank) IT Framework Memorandum For Supervised Institutions WILLEMSTAD, Updated version April 2011 IT Framework Memorandum for Supervised Institutions 1.

More information

Term Project. Sarbanes-Oxley Act (SOX) Hiroshi Tachibana (MBA 2 nd )

Term Project. Sarbanes-Oxley Act (SOX) Hiroshi Tachibana (MBA 2 nd ) Term Project Sarbanes-Oxley Act (SOX) Hiroshi Tachibana (MBA 2 nd ) Sarbanes-Oxley Act (SOX) was established in 2002 in order not to repeat company and accounting scandals which occurred from later 1990

More information

Topics. Background Approach Status

Topics. Background Approach Status 16 th September 2014 Topics Background Approach Status Background e-governance in India National e-governance Plan 2006 31 Mission Mode Projects Quality Assurance in e-governance Quality Assessment of

More information

A Guide to IT Risk Assessment for Financial Institutions. March 2, 2011

A Guide to IT Risk Assessment for Financial Institutions. March 2, 2011 A Guide to IT Risk Assessment for Financial Institutions March 2, 2011 Welcome! Housekeeping Control panel on the right side of your screen. Audio Telephone VoIP Submit Questions in the pane on the control

More information

Designing an Efficient IT Infrastructure. Lee Yee Ming 24 April 2014

Designing an Efficient IT Infrastructure. Lee Yee Ming 24 April 2014 Designing an Efficient IT Infrastructure Lee Yee Ming 24 April 2014 Designing an Efficient IT Infrastructure: Contents Identifying Needs 1. MDIC s Mandate and Operations 2. MDIC s IT Risk Management Designing

More information

CGEIT QAE ITEM DEVELOPMENT GUIDE

CGEIT QAE ITEM DEVELOPMENT GUIDE CGEIT QAE ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS PURPOSE OF THE CGEIT ITEM DEVELOPMENT GUIDE 3 PURPOSE OF THE CGEIT QAE... 3 CGEIT EXAM STRUCTURE... 3 WRITING QUALITY ITEMS... 3 MULTIPLE-CHOICE ITEMS...

More information

Types of Systems Audit & Relevance. Presented By: Prasad Pendse, CISA

Types of Systems Audit & Relevance. Presented By: Prasad Pendse, CISA Types of Systems Audit & Relevance Presented By: Prasad Pendse, CISA Agenda Systems Audit Categories & Types of Systems Audit, Relevance IT & Application Audits Security Audits Process Audits Advantages

More information

CGEIT ITEM DEVELOPMENT GUIDE

CGEIT ITEM DEVELOPMENT GUIDE CGEIT ITEM DEVELOPMENT GUIDE Updated March 2017 TABLE OF CONTENTS Content Page Purpose of the CGEIT Item Development Guide 3 CGEIT Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps

More information

Vendor Management Challenges and Expectations An Open Discussion April 13, 2017

Vendor Management Challenges and Expectations An Open Discussion April 13, 2017 1 Practical solutions driving tangible results Vendor Management Challenges and Expectations An Open Discussion April 13, 2017 Agenda Common Themes Discussion Expectations Overcoming Obstacles Common Comments

More information

Advanced Audit Techniques

Advanced Audit Techniques Advanced Audit Techniques Who should attend? Senior Auditors Audit Managers and those about to be appointed to that role Auditors that need to audit technical or complex business areas Assurance professionals

More information

YaSM and the YaSM Process Map. Introduction to YaSM Service Management

YaSM and the YaSM Process Map. Introduction to YaSM Service Management YaSM and the YaSM Process Map Introduction to YaSM Management Contents Why Yet another Management Model?... 5 YaSM - the idea... 5 A framework for everyone in the business of providing services... 6 YaSM

More information

Stephen M. Eells State Auditor. Department of the Treasury Division of Revenue and Enterprise Services Information Technology Systems

Stephen M. Eells State Auditor. Department of the Treasury Division of Revenue and Enterprise Services Information Technology Systems Department of the Treasury Division of Revenue and Enterprise Services Information Technology Systems February 6, 2017 to June 20, 2018 Stephen M. Eells State Auditor Table of Contents Scope... 1 Objective...

More information

Sarbanes-Oxley and the New Internal Auditing Rules

Sarbanes-Oxley and the New Internal Auditing Rules Sarbanes-Oxley and the New Internal Auditing Rules ROBERT R. MOELLER John Wiley & Sons, Inc. Sarbanes-Oxley and the New Internal Auditing Rules Sarbanes-Oxley and the New Internal Auditing Rules ROBERT

More information

Guidelines for Information Asset Management: Roles and Responsibilities

Guidelines for Information Asset Management: Roles and Responsibilities Guidelines for Information Asset Management: Roles and Responsibilities Document Version: 1.0 Document Classification: Public Published Date: April 2017 P a g e 1 Contents 1. Overview:... 3 2. Audience...

More information

IT EXAMS TOP 5 CITATIONS. Top 5 citations LOUISIANA BANKERS ASSOCIATION TECHNOLOGY CONFERENCE Policy and Risk Assessment 2.

IT EXAMS TOP 5 CITATIONS. Top 5 citations LOUISIANA BANKERS ASSOCIATION TECHNOLOGY CONFERENCE Policy and Risk Assessment 2. IT EXAMS LOUISIANA BANKERS ASSOCIATION TECHNOLOGY CONFERENCE 2015 @TrainaCPA TOP 5 CITATIONS Top 5 citations 1. Policy and Risk Assessment 2. ACH/CATO 3. Disaster planning 4. Audit 5. Oversight 1. POLICY

More information

PCI Data Breach Preparedness How To Prevent Your Organization From Becoming the Next Data Breach Headline

PCI Data Breach Preparedness How To Prevent Your Organization From Becoming the Next Data Breach Headline PCI Data Breach Preparedness How To Prevent Your Organization From Becoming the Next Data Breach Headline Presented by the Bryan Cave Payments Team and Special Guest Speaker Andi Baritchi Agenda Introduction

More information

STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS. April 25, 2018 In-House Counsel Conference

STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS. April 25, 2018 In-House Counsel Conference STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS April 25, 2018 In-House Counsel Conference Presenters: Daniela Ivancikova, Assistant General Counsel, University of Delaware Evan

More information

Sarbanes-Oxley Compliance

Sarbanes-Oxley Compliance LANDESK WHITE PAPER Sarbanes-Oxley Compliance How LANDesk Management Solutions Support IT Asset Management and Overall IT Control Requirements Abstract: The Sarbanes-Oxley Act of 2002 implements strict

More information

Operational Excellence By Automating Operational Risk Management. February 4, 2016 Doug Hatler, EVP of Sales

Operational Excellence By Automating Operational Risk Management. February 4, 2016 Doug Hatler, EVP of Sales Operational Excellence By Automating Operational Risk Management February 4, 2016 Doug Hatler, EVP of Sales Industry is in a Paradigm Shift Stakeholders & Reputation Operational Excellence & Risk Management

More information

Financial Institutions Consulting. Quality service. Personal attention.

Financial Institutions Consulting. Quality service. Personal attention. Financial Institutions Consulting Quality service. Personal attention. Why Weaver? With more than 65 years of experience and a commitment to our financial institution clients, Weaver is established as

More information

Payment Card Industry Compliance. May 12, 2011

Payment Card Industry Compliance. May 12, 2011 Payment Card Industry Compliance May 12, 2011 Agenda 1. Common Terms 2. What is PCI? 3. How Does PCI Impact YOU? 4. Levels of PCI Compliance 5. Self-Assessment Questionnaire (SAQ) 6. PCI High Level Overview

More information

RISK MANAGEMENT REPORT

RISK MANAGEMENT REPORT RISK MANAGEMENT REPORT A RCL FOODS RISK MANAGEMENT REPORT 2016 RISK MANAGEMENT REPORT FRAMEWORK Risk management is considered by the Board to be a key business discipline, designed to balance risk and

More information

Navigating the Intersection of Vendor Management and Business Continuity

Navigating the Intersection of Vendor Management and Business Continuity Navigating the Intersection of Vendor Management and Business Continuity MICHAEL BERMAN, J.D. Table of Contents Why are we here? Business Continuity and Vendor Management Primary Intersection BCP Each

More information

CRISC EXAM PREP COURSE: SESSION 4

CRISC EXAM PREP COURSE: SESSION 4 CRISC EXAM PREP COURSE: SESSION 4 Job Practice 2 Copyright 2016 ISACA. All rights reserved. DOMAIN 4 RISK AND CONTROL MONITORING AND REPORTING Copyright 2016 ISACA. All rights reserved. Domain 4 Continuously

More information

Software Licensing. March 18, Report City Auditor: Jed Johnson, CIA, CGAP. Major Contributor: Alexander Proza, CISA

Software Licensing. March 18, Report City Auditor: Jed Johnson, CIA, CGAP. Major Contributor: Alexander Proza, CISA Software Licensing March 18, 2019 Report 201809 City Auditor: Jed Johnson, CIA, CGAP Major Contributor: Alexander Proza, CISA Contents Executive Summary... 1 Authorization... 1 Objectives... 1 Scope and

More information

Business Continuity vs. Operational Risk Management vs. Business Resiliency. Karen Dye Oakley, CBCP, MBCI

Business Continuity vs. Operational Risk Management vs. Business Resiliency. Karen Dye Oakley, CBCP, MBCI Business Continuity vs. Operational Risk Management vs. Business Resiliency Karen Dye Oakley, CBCP, MBCI www.karendyeconsulting.com Background Most recently with Sun Microsystems, Inc. Director, Global

More information

Ensuring Organizational & Enterprise Resiliency with Third Parties

Ensuring Organizational & Enterprise Resiliency with Third Parties Ensuring Organizational & Enterprise Resiliency with Third Parties Geno Pandolfi Tuesday, May 17, 2016 Room 7&8 (1:30-2:15 PM) Session Review Objectives Approaches to Third Party Risk Management Core Concepts

More information

Sarbanes-Oxley: Company Case Study - Viacom Inc. IT General Controls - Sustaining Compliance Efforts. Anthony Noble VP, IT Internal Audit

Sarbanes-Oxley: Company Case Study - Viacom Inc. IT General Controls - Sustaining Compliance Efforts. Anthony Noble VP, IT Internal Audit Sarbanes-Oxley: A Focus on IT Controls Company Case Study - Viacom Inc. IT General Controls - Sustaining Compliance Efforts Anthony Noble VP, IT Internal Audit Today s Agenda Introduction Viacom Methodology

More information

Certificate in Internal Audit IV

Certificate in Internal Audit IV Certificate in Internal Audit IV The Senior Audit Role auditing key business activities Who should attend? Senior Auditors Audit Managers and those about to be appointed to that role Auditors that need

More information

Chapter 8 Governance of the Information Systems Organization

Chapter 8 Governance of the Information Systems Organization Chapter 8 Governance of the Information Systems Organization Jason C. H. Chen, Ph.D. Professor of MIS School of Business Administration Gonzaga University Spokane, WA 99258 chen@jepson.gonzaga.edu Today

More information

The State of Enterprise Risk Management 2016

The State of Enterprise Risk Management 2016 S URVEY The State of Enterprise Risk Management 2016 Photo by cassis Fotolia.com By Stephanie Balaouras Forrester Research and Disaster Recovery Journal have partnered to field a number of market studies

More information

IBM Service Management

IBM Service Management IBM Service IBM Service Platform Henrik Toft Solution Manager IBM Service 2008 IBM Corporation May 15, 2008 Best practice Service history 1980 1990 2000 2010 GITIL ITIL v1 ITIL v2 ITIL v3 Time (mid 80s)

More information

Achieve Continuous Compliance via Business Service Management (BSM)

Achieve Continuous Compliance via Business Service Management (BSM) Achieve Continuous Compliance via Business Service (BSM) Brian Holmes, CISA Solutions Consultant BMC Software Agenda Introduction Compliance: The Business Driver Challenges of IT Compliance Business Service

More information

Recognizing your needs

Recognizing your needs Our internal audit and IT risk assurance capability statement Recognizing your needs www.pwc.com/ph Our Assurance services Assurance PwC Assurance team delivers the assurance you need on the financial

More information

David M. Gow. Profile. Operational Risk Management Experience

David M. Gow. Profile. Operational Risk Management Experience david@davidmgow.com 416 238 1549 Profile Seeking career opportunities in Operational Risk Management (ORM). Over the last few years my career has centered on identifying and mitigating process and control

More information

Brink's Modern Internal Auditing

Brink's Modern Internal Auditing Brink's Modern Internal Auditing A Common Body of Knowledge Seventh Edition ROBERT R. MOELLER WILEY John Wiley & Sons, Inc. Preface About the Author xix XXV PART ONE CHAPTER 1 FOUNDATIONS OF MODERN INTERNAL

More information

Selftestengine COBIT5 36q

Selftestengine COBIT5 36q Selftestengine COBIT5 36q Number: COBIT5 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Isaca COBIT 5 COBIT 5 Foundation I have correct many of questions answers.

More information

Enterprise-Wide Security Transformation to Meet Escalating Regulatory Requirements

Enterprise-Wide Security Transformation to Meet Escalating Regulatory Requirements Enterprise-Wide Security Transformation to Meet Escalating Regulatory Requirements Modern corporations are faced with increasingly complex compliance and regulatory demands that require them to respond

More information

Advanced Audit Techniques

Advanced Audit Techniques Certificate in Internal Audit 4 Advanced Audit Techniques Who should attend? Senior Auditors Audit Managers and those about to be appointed to that role Auditors that need to audit projects, contracts

More information

Sarbanes-Oxley Compliance: Managing Technology Controls

Sarbanes-Oxley Compliance: Managing Technology Controls Sarbanes-Oxley Compliance: Managing Technology Controls WATCHIT PROGRAMS WatchIT delivers experience to the desktop. Our programs feature industry executives and experts who share insight and understanding

More information

1. You should attempt all 40 questions. Each question is worth one mark. 3. The pass mark for this exam is 26 out of 40 (65%).

1. You should attempt all 40 questions. Each question is worth one mark. 3. The pass mark for this exam is 26 out of 40 (65%). The ITIL Foundation Examination Sample Paper D Question Booklet Multiple Choice Examination Duration: 60 minutes Instructions 1. You should attempt all 40 questions. Each question is worth one mark. 2.

More information

"IT Governance Helping Business Survival

IT Governance Helping Business Survival "IT Governance Helping Business Survival Steve Crutchley CEO & Founder Consult2Comply www.consult2comply.com Introduction Steve Crutchley Founder & CEO of Consult2Comply 39 Years IT & Business Experience

More information

CGEIT Certification Job Practice

CGEIT Certification Job Practice CGEIT Certification Job Practice Job Practice A job practice serves as the basis for the exam and the experience requirements to earn the CGEIT certification. This job practice consists of task and knowledge

More information

BC & RISK MANAGEMENT: CONVERGENCE IS REAL David Halford Forsythe Solutions Group Frank Perlmutter Strategic BCP

BC & RISK MANAGEMENT: CONVERGENCE IS REAL David Halford Forsythe Solutions Group Frank Perlmutter Strategic BCP BC & RISK MANAGEMENT: CONVERGENCE IS REAL David Halford Forsythe Solutions Group Frank Perlmutter Strategic BCP WHY THE CONVERGENCE OF BUSINESS CONTINUITY & RISK MANAGEMENT? The convergence of BC and RM

More information

The Road from Information Technologies to IT Services

The Road from Information Technologies to IT Services The Road from Information Technologies to IT Services BBLF Business Master Classes Feb 20 th, 2007 Hristo Hristov Services Manager and Senior Consultant, ITCE MCSE + Messaging, ITIL Certified Agenda 2

More information

Third Party Risk Management ( TPRM ) Transformation

Third Party Risk Management ( TPRM ) Transformation Third Party Risk Management ( TPRM ) Transformation September 20, 2017 Internal use only An introduction to TPRM What is a Third Party relationship? A Third Party relationship is any business arrangement

More information

Chapter 9 Ethical Guidelines for Information Use

Chapter 9 Ethical Guidelines for Information Use Chapter 9 Ethical Guidelines for Information Use Managing and Using Information Systems: A Strategic Approach by Keri Pearlson & Carol Saunders Learning Objectives Understand how ethics should be framed

More information

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER ARRIVAL OF GDPR IN 2018 The European Union (EU) General Data Protection Regulation (GDPR), which takes effect in 2018, will bring changes

More information

Business Risk Management Handbook

Business Risk Management Handbook Business Risk Management Handbook A sustainable approach Linda Spedding Adam Rose i*" ""''SS^IH AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD ELSEVIER PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY

More information

Enterprise Security Architecture A Top-down Approach. Contextual Security Architecture. Logical Security Architecture. Physical Security Architecture

Enterprise Security Architecture A Top-down Approach. Contextual Security Architecture. Logical Security Architecture. Physical Security Architecture featu eature feature Enterprise Security A Top-down Approach Implementing security architecture is often a confusing process in enterprises. Traditionally, security architecture consists of some preventive,

More information

Questions which state 'This question does NOT use the case study' do not use the case study, and may be answered without reference to it.

Questions which state 'This question does NOT use the case study' do not use the case study, and may be answered without reference to it. ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE Case Study 1, version 1.1 CASE STUDY BOOKLET This booklet contains the case study upon which at least 8 of the 10 examination questions

More information

Risk Management Policy

Risk Management Policy Risk Management Policy 2015 Steadfast Group Limited ABN: 98 073 659 677 Risk Management Policy 1 ABN: 98 073 659 677 2013 Steadfast Group Limited Contents 1. INTRODUCTION 2 2. POLICY INTENT 2 3. POLICY

More information

Effects of GDPR and NY DFS on your Third Party Risk Management Program

Effects of GDPR and NY DFS on your Third Party Risk Management Program Effects of GDPR and NY DFS on your Third Party Risk Management Program Please disable popup blocking software before viewing this webcast June 27, 2017 Grant Thornton LLP. All rights reserved. 1 CPE Reminders

More information

Title: Configuration Management: The Core of IT Operations Session #: 495 Speaker: Donna Scott Company: Gartner

Title: Configuration Management: The Core of IT Operations Session #: 495 Speaker: Donna Scott Company: Gartner Title: Configuration Management: The Core of IT Operations Session #: 495 Speaker: Donna Scott Company: Gartner Predicts 2006 Increasing regulatory requirements will drive IT investment by as much as a

More information

Emerging Technology and Security Update

Emerging Technology and Security Update Emerging Technology and Security Update February 13, 2015 Jordan Reed Managing Director Agenda 2015 Internal Audit Capabilities and Needs Survey 2014 IT Priorities Survey Results 2014 IT Security and Privacy

More information

Presentation for INCC LUMS 2008 May 2, 2008 Presented by Shahed Latif, KPMG LLP, Silicon Valley

Presentation for INCC LUMS 2008 May 2, 2008 Presented by Shahed Latif, KPMG LLP, Silicon Valley MAINTAINING A SECURE GLOBAL ENTERPRISE : Challenges and Emerging Solutions Presentation for INCC LUMS 2008 May 2, 2008 Presented by Shahed Latif, KPMG LLP, Silicon Valley The 2008 Chief Information Security

More information

EVALUATING CONTRACT LIFECYCLE MANAGEMENT SOLUTIONS: BEST-IN-CLASS FEATURES

EVALUATING CONTRACT LIFECYCLE MANAGEMENT SOLUTIONS: BEST-IN-CLASS FEATURES EVALUATING CONTRACT LIFECYCLE MANAGEMENT SOLUTIONS: BEST-IN-CLASS FEATURES INTRODUCTION INTRODUCTION CONTRACTS FORM THE FOUNDATION OF ALL BUSINESSES AND EVERY BUSINESS RELATIONSHIP. THEY DEFINE EVERY ASPECT

More information

Risk assessment checklist - Acquire and implement

Risk assessment checklist - Acquire and implement Check Yes or No or N/A (where not applicable). Where a No is indicated, some action may be required to rectify the situation. Cross-references (e.g., See FN 1.01) point to the relevant policy in the First

More information

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER ARRIVAL OF GDPR IN 2018 The European Union (EU) General Data Protection Regulation (GDPR) that takes effect in 2018 will bring changes for

More information

IT Due Diligence in an Era of Mergers and Acquisitions

IT Due Diligence in an Era of Mergers and Acquisitions IT Due Diligence in an Era of Mergers and Acquisitions Session 49, March 6, 2018 Charlie Jones, Director of Project Management, University of Vermont Health Network 1 Conflict of Interest Charlie Jones;

More information

Defining and promoting excellence in the provision of mobile money services

Defining and promoting excellence in the provision of mobile money services SAFEGUARDING OF FUNDS DATA PRIVACY AML/CFT/FRAUD PREVENTION STAFF AND PARTNER MANAGEMENT CUSTOMER SERVICE TRANSPARENCY QUALITY OF OPERATIONS SECURITY OF SYSTEMS Defining and promoting excellence in the

More information

December 2015 THE STATUS OF GOVERNMENT S GENERAL COMPUTING CONTROLS:

December 2015 THE STATUS OF GOVERNMENT S GENERAL COMPUTING CONTROLS: December 2015 THE STATUS OF GOVERNMENT S GENERAL COMPUTING CONTROLS: 2014 www.bcauditor.com CONTENTS Auditor General s Comments 3 623 Fort Street Victoria, British Columbia Canada V8W 1G1 P: 250.419.6100

More information

ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE. Sample Paper 2, version 5.1. To be used with Case Study 1 QUESTION BOOKLET

ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE. Sample Paper 2, version 5.1. To be used with Case Study 1 QUESTION BOOKLET ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE Sample Paper 2, version 5.1 To be used with Case Study 1 Gradient Style, Complex Multiple Choice QUESTION BOOKLET Gradient Style, Complex

More information

London. November 27 th, Results. Lanesborough Hotel

London. November 27 th, Results. Lanesborough Hotel London November 27 th, 2007 Lanesborough Hotel Results 0. Compared to a year ago, has it become easier or harder to secure your networking environment? 1. Easier 7.1% 2. Harder 64.3% 3. The same 28.6%

More information

Vendor Due Diligence: Keep The Risk Out!

Vendor Due Diligence: Keep The Risk Out! Vendor Due Diligence: Keep The Risk Out! August 25, 2015 2015 ProcessUnity, Inc. All Rights Reserved. ProcessUnity Risk Suite Comprehensive, Flexible, Scalable RISK SUITE Enterprise Risk Regulatory Compliance

More information

Certificate in Internal Audit 3. Advanced Audit Techniques

Certificate in Internal Audit 3. Advanced Audit Techniques Certificate in Internal Audit 3 Advanced Audit Techniques Who should attend? Senior Auditors Audit Managers and those about to be appointed to that role Auditors that need to audit projects, contracts

More information

GAIT FOR BUSINESS AND IT RISK

GAIT FOR BUSINESS AND IT RISK GAIT FOR BUSINESS AND IT RISK (GAIT-R) The Institute of Internal Auditors March 2008 Table of Contents 1. Introduction...1 2. Executive Summary...2 3. Why GAIT-R?...4 4. The GAIT-R Principles...6 5. GAIT-R

More information

THE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE

THE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE THE CLOUD, RISKS AND INTERNAL CONTROLS Presented By William Blend, CPA, CFE AGENDA Cloud Basics Risks Related Cloud Use GOA on Service Level Agreements COSO ERM Internal Control Model 2 CLOUD BASICS Evolution

More information

A Practical and Effective Approach to Risk Assessment

A Practical and Effective Approach to Risk Assessment A Practical and Effective Approach to Risk Assessment IT Risk Assessment Case Study Portions of this presentation are from a 2007 & 2008 FFIEC Technology Conference presentation to bank examiners. Special

More information

How to Stand Up a Privacy Program: Privacy in a Box

How to Stand Up a Privacy Program: Privacy in a Box How to Stand Up a Privacy Program: Privacy in a Box Part III of III: Maturing a Privacy Program Presented by the IT, Privacy, & ecommerce global committee of ACC Thanks to: Nick Holland, Fieldfisher (ITPEC

More information

Braindumps COBIT5 50q

Braindumps COBIT5 50q Braindumps COBIT5 50q Number: COBIT5 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Isaca COBIT 5 COBIT 5 Foundation I have correct many of questions answers. If there

More information

ﺖﻴﻨﻣا ﺖﻳﺮﻳﺪﻣ ﻢﺘﺴﻴﺳ ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ يﺎﻫدراﺪﻧﺎﺘﺳا يﺎﻬﺘﺳﺎﻴﺳ ﻪﻳﺎﭘ ﺮﺑ تﺎﻋﻼﻃا BS7799 & BS15000 لوا ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ

ﺖﻴﻨﻣا ﺖﻳﺮﻳﺪﻣ ﻢﺘﺴﻴﺳ ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ يﺎﻫدراﺪﻧﺎﺘﺳا يﺎﻬﺘﺳﺎﻴﺳ ﻪﻳﺎﭘ ﺮﺑ تﺎﻋﻼﻃا BS7799 & BS15000 لوا ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ سمينار آموزشي سيستم مديريت امنيت اطلاعات بر پايه سياستهاي استانداردهاي BS7799 & BS15000 سمينار آموزشي اول Part One Information Security Management Systems Dr. Sc. Houman Sadeghi Kaji Spread Spectrum Communication

More information

VENDOR MANAGEMENT 101

VENDOR MANAGEMENT 101 VENDOR MANAGEMENT 101 Enterprise Risk Management Vendor Management Business Continuity IT GRC Internal Audit Regulatory Compliance Manager Introduction to Vendor Management About Your Presenter Andrea

More information

How to Maximize Your Internal Controls Program. June 15, 2017 Atlanta, GA

How to Maximize Your Internal Controls Program. June 15, 2017 Atlanta, GA How to Maximize Your Internal Controls Program June 15, 2017 Atlanta, GA Sarbanes-Oxley Update June 15, 2017 Rick Warren Principal patrick.warren@pwc.com Andres Leal Director andres.m.leal@pwc.com 3 Agenda

More information

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests.

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests. Principles Principle 1 - Meeting stakeholder needs The governing body is ultimately responsible for setting the direction of the organisation and needs to account to stakeholders specifically owners or

More information

INTERNAL CONTROLS AUDITOR JOHN BYRD, SENIOR AUDITOR TONYA CARRIGAN, SENIOR AUDITOR

INTERNAL CONTROLS AUDITOR JOHN BYRD, SENIOR AUDITOR TONYA CARRIGAN, SENIOR AUDITOR 1 INTERNAL CONTROLS FOR THE BEGINNING AUDITOR JOHN BYRD, SENIOR AUDITOR TONYA CARRIGAN, SENIOR AUDITOR UF HEALTH SHANDS HOSPITAL AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois www.ahia.org

More information

How to Measure the Value of Your Internal Audit Group

How to Measure the Value of Your Internal Audit Group How to Measure the Value of Your Internal Audit Group Best practices to follow, pitfalls to avoid and success metrics to measure May 17, 2012 Agenda Strategic challenges: Implications for the enterprise

More information

Feature. Internal Audit s Contribution to the Effectiveness of Information Security (Part 2) Perceptions of Internal Auditors

Feature. Internal Audit s Contribution to the Effectiveness of Information Security (Part 2) Perceptions of Internal Auditors Feature Paul John Steinbart is a professor in the Department of Information Systems in the W. P. Carey School of Business at Arizona State University (USA), where he also serves as the ISACA academic advocate.

More information

npliance IN 2008, MICROSOFT CORP. WAS FINED 899 MILLION Auditing for

npliance IN 2008, MICROSOFT CORP. WAS FINED 899 MILLION Auditing for IN 2008, MICROSOFT CORP. WAS FINED 899 MILLION EUROS (US $1.15 BILLION) BY EUROPEAN UNION REGULATORS for failing to comply with a 2004 antitrust order. The previous year, DaimlerChrysler paid a US $30

More information

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det. GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,

More information

ACHIEVING TOTAL COMPLIANCE IN THE CLOUD

ACHIEVING TOTAL COMPLIANCE IN THE CLOUD WHITE PAPER ACHIEVING TOTAL COMPLIANCE IN THE CLOUD Ensure Your Cloud Infrastructure is Audit-Ready for 35 Regulatory Standards with Cloud Management www.cloudcheckr.com ACHIEVING TOTAL COMPLIANCE IN THE

More information

EX0-114_Wins_Exam. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0

EX0-114_Wins_Exam.   Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0 EX0-114_Wins_Exam Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ 20000 IT Service Management Foundation Bridge based on ISO/IEC Total Questions: 78

More information

This Webcast Will Begin Shortly

This Webcast Will Begin Shortly This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: webcast@acc.com Thank You! Corporate Compliance Served Two Ways:

More information

CIRCULAR NO. MRD/DMS/13/2011, DATED

CIRCULAR NO. MRD/DMS/13/2011, DATED SEBI : ANNUAL SYSTEM AUDIT CIRCULAR NO. MRD/DMS/13/2011, DATED 29-11-2011 Keeping in view the rapid technological developments in the Securities Markets should not overshadow the risks that these innovations

More information

Supplier Security Directives

Supplier Security Directives Page 1 (8) Supplier Directives 1 Description This document (the Directives ) describes the security requirements applicable to Suppliers (as defined below) and other identified business partners to Telia

More information

B S R & Co. LLP. Reporting on Internal. Reporting An Overview. Sarbanes Oxley Act (SOX) 28 December 2013

B S R & Co. LLP. Reporting on Internal. Reporting An Overview. Sarbanes Oxley Act (SOX) 28 December 2013 B S R & Co. LLP Reporting on Internal Controls over Financial Reporting An Overview Sarbanes Oxley Act (SOX) 28 December 2013 Agenda Sarbanes Oxley Key Sections COSO Framework Management Approach to ICOFR

More information

Despite all of the cataclysmic predictions of computer systems and other

Despite all of the cataclysmic predictions of computer systems and other c01.tex (001-008) 12/12/03 2:55 PM Page 1 CHAPTER 1 Introduction ACCOUNTING AND AUDITING SCANDALS AND INTERNAL AUDIT Despite all of the cataclysmic predictions of computer systems and other process-related

More information

IT Service Management Foundation based on ISO/IEC20000

IT Service Management Foundation based on ISO/IEC20000 IT Service Management Foundation based on ISO/IEC20000 Number: EX0-115 Passing Score: 60 Time Limit: 90 min File Version: 4.0 http://www.gratisexam.com/ Exin EX0-115 IT Service Management Foundation based

More information

Argomi User Guide to MAS Outsourcing Regulations in Singapore

Argomi User Guide to MAS Outsourcing Regulations in Singapore Argomi User Guide to MAS Outsourcing Regulations in Singapore September 2017 Aarti Sreenivas & Ned Lowe Contents Page 1. Introduction 2. A Fresh Take on Compliance 3. Argomi & AWS 4. MAS Outsourcing Guidelines

More information

Governance Custodian to changing business trends and IT landscape

Governance Custodian to changing business trends and IT landscape Governance Custodian to changing business trends and IT landscape Suresh GP/ 6 th May 2014 Companies with effective IT Governance have profits that are 20 % higher than other companies pursuing similar

More information

Table of Contents 1. What s New... 1

Table of Contents 1. What s New... 1 Table of Contents Business and IT Impact Analysis Questionnaire... Impact - Risk... Scoring... 2 Facility / Business Function / Application... 3 Mandated Requirement Compliance... 4 Compliance - System

More information

IT Governance. Minghai Geng. BADM 559 Term Project

IT Governance. Minghai Geng. BADM 559 Term Project IT Governance Minghai Term Project December 15, 2008 Information Technology (IT) Governance is a broad and emerging topic that currently encompasses many factors. Simply, IT governance is the process of

More information