Dr. Yeffry Handoko Putra, M.T

Slides:



Advertisements
Similar presentations
Agenda What is Compliance? Risk and Compliance Management
Advertisements

Chapter 10 Accounting Information Systems and Internal Controls
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Control and Accounting Information Systems
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
IT Services Group 4 Jalal Hafidi Mathew Joseph Tolulope Oke
Security Controls – What Works
By Collin Smith COBIT Introduction By Collin Smith
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
1 Pertemuan 6 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
6-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Internal Control Evaluation: Assessing Control Risk.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
First Practice - Information Security Management System Implementation and ISO Certification.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Quality Manual for Interoperability Testing Morten Bruun-Rasmussen Presented by Jos Devlies, Eurorec.
Information Systems Controls for System Reliability -Information Security-
Fraud Prevention and Risk Management
Auditing Cloud Computing: Adapting to Changes in Data Management IIA and ISACA Joint Meeting March 12, 2013 Presented by: Jay Hoffman (AEP), John Didlott.
Quality Management in Business and Manufacturing Sectors.
How get your project management or professional services organization ISO 9001 certified.
COBIT®. COBIT - Control Objectives for Information and related Technology C OBI T was initially created by the Information Systems Audit & Control Foundation.
A NASSCOM ® Initiative Security and Quality Kamlesh Bajaj CEO, DSCI May 23, 2009 NASSCOM Quality Summit Hyderabad 1.
Information Security Framework & Standards
Continual Service Improvement Process
Chapter Three IT Risks and Controls.
Internal controls. Session objectives Define Internal Controls To understand components of Internal Controls, control environment and types of controls.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Quality Concepts within CMM and PMI G.C.Reddy
Chapter 6 Internal Control in a Financial Statement Audit Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
IT GOVERNANCE  Objective : The objective of this area is to ensure that the Certified Information Systems Auditor ( CISA ) candidate understands and can.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
S5: Internal controls. What is Internal Control Internal control is a process Internal control is a process Internal control is effected by people Internal.
Project Management Strategies Hidden in the CMMI Rick Hefner, Northrop Grumman CMMI Technology Conference & User Group November.
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Auditors’ Dilemma – reporting requirements on Internal Financial Controls under the Companies Act 2013 and Clause 49 of the Listing agreement V. Venkataramanan.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Dr. Ir. Yeffry Handoko Putra
Dr. Ir. Yeffry Handoko Putra
IS4680 Security Auditing for Compliance
Internal Control in a Financial Statement Audit
Overview of IT Governance & ITSM
Internal Control Principles
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
EITS Planning & Decision Support
Quality Management in Business and Manufacturing Sectors
Dr. Ir. Yeffry Handoko Putra
Chapter 10 Software Quality Assurance& Test Plan Software Testing
Building the Foundation of Compliance
Security Management.
Quality management standards
Building the Foundation of Compliance
Alignment of COBIT to Botswana IT Audit Methodology
Governance, audit and digital preservation
UNDERSTANDING FOR STANDARD
Quality Management in Business and Manufacturing Sectors
Chapter # 8 Quality Management Standards
Presentation transcript:

Dr. Yeffry Handoko Putra, M.T IT Audit and Control Dr. Yeffry Handoko Putra, M.T MAGISTER SISTEM INFORMASI

Sylabus Chap 1 – IT Audit Fundamental Chap 2 - Audit in Context Chap 3 – Internal Audit Chap 4 – External Audit Chap 5 – Audit Type and IT Audit Component Chap 6 - IT Audit Driver Chap 7 – IT Audit with COBIT 5 Chap 8 – CISA Certification Review

Reference [Gantz] Gants, S.,(2014), The Basic of IT Audit, Elsevier [ISACA] ISACA (2013), CISA Review Manual 2013

COBIT 5 Foundation Course - Sponsored by ISACA - Riyadh Chapter The Evolution of COBIT 5 Governance of Enterprise IT COBIT 5 2005/7 2000 1998 Evolution 1996 IT Governance COBIT4.0/4.1 BMIS (2010) Management COBIT3 Val IT 2.0 (2008) Control COBIT2 Reference section 4 Audit Risk IT (2009) COBIT1 2012 By Aqel M. Aqel, CISA, MBA, CSSGB, COBIT 5

Audit in many area

Evaluating criteria conformity: ITIL Assessment : What is IT Auditing? Evaluating criteria conformity: ITIL Assessment : Quantitative : Balanced Score Card: maturity model (cobit 4.1) Qualitative : PAM Cobit 5 (e.g. Partially, Not available, Fulfilled ) Inspection : CMMI model Comparing to standard, framework, requirement

What to audit entire organizations individual business units mission functions and business processes Services Systems Infrastructure or technology components Focused on : controlling, finding bias (differentiation to standard), method

Who make IT audit? Internal Audit External Audit

Why should do IT Auditing? Preventive Correcting Detective

Some reason to do IT Auditing complying with securities exchange rules that companies have an internal audit function; valuating the effectiveness of implemented controls; confirming adherence to internal policies, processes, and procedures; checking conformity to IT governance or control frameworks and standards;

Some reason to do IT Auditing (2) analyzing vulnerabilities and configuration settings to support continuous monitoring; identifying weaknesses and deficiencies as part of initial or ongoing risk management; measuring performance against quality benchmarks or service level agreements; verifying and validating systems engineering or IT project management practices;

Who perform IT Auditing (The Actor) Internal auditors : employee External IT Auditor: consultant Auditing firm Certification Organization (ISACA with CISA ) International Organization

External Auditor from ISACA Certified Information System Auditor (CISA) Certified in Risk and Information System Control (CRISC) Certified Information System Manager (CISM)

How to become IT Auditor

The good thing of IT Auditing (Auditing Context)

Categories of Performance Measures Performance Measurement: What are indicators of good IT performance? IT Control Profile: How can we measure the effectiveness of our controls? Risk Awareness: What are the risks of not achieving our objectives? Benchmarking: How do we perform relative to others and standards? Measures are effectively statistics. This provides some categories for performance metrics.

IS Auditor & IT Governance Are IS functions aligned with organization’s mission, vision, values, objectives and strategies? Does IS achieve performance objectives established by the business? Does IS comply with legal, fiduciary, environmental, privacy, security, and quality requirements? Are IS risks managed efficiently and effectively? Are IS controls effective and efficient? These are functions that an IS Auditor would we concerned with relative to IT governance. Fiduciary = Financial

Audit: Recognizing Problems End-user complaints Excessive costs or budget overruns Late projects Poor motivation - high staff turnover High volume of H/W or S/W defects Inexperienced staff – lack of training Unsupported or unauthorized H/W S/W purchases Numerous aborted or suspended development projects Reliance on one or two key personnel Poor computer response time Extensive exception reports, many not tracked to completion These are things that an auditor would look for.

Audit: Review Documentation IT Strategies, Plans, Budgets Security Policy Documentation Organization charts & Job Descriptions Steering Committee Reports System Development and Program Change Procedures Operations Procedures HR Manuals QA Procedures Contract Standards and Commitments Bidding, selection, acceptance, maintenance, compliance Auditors would review this documentation. Do they follow best practices? Do they document processes well?

IT Governance The main idea from COBIT with five key area:

IT Governance Also supported by The Information Technology Infrastructure Library (ITIL) and ISO/IEC 20000 for service management; The Project Management Body of Knowledge (PMBOK) and Projects in Controlled Environments version 2 (PRINCE2) for project management; Capability Maturity Model Integration (CMMI) and ISO/IEC 15504 for software development processes; and The ISO/IEC 27000 series and National Institute of Standards and Technology (NIST) risk management framework for information security management.

Risk Management COSO’s enterprise risk management framework

Risk Management NIST’s risk management framework

Compliance and certification

Quality management and quality assurance ISO 9001

The PDCA cycle popularized by W. Edwards Deming

Information Security Management System The ISMS process defined in ISO/IEC 27001 applies the familiar PDCA model