Chapter 5 5-1 © 2009 Pearson Education, Inc. Publishing as Prentice Hall.

Slides:



Advertisements
Similar presentations
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Advertisements

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Auditing Governance Functions
Analisa Proses. Terjemahan model analisis menjadi desain software.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Welcome! Internal Auditing CHAPTER 1. Definition Internal auditing is an independent, objective, assurance and consulting activity designed to add value.
8 - 1 ©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Audit Planning and Analytical Procedures Chapter 8.
TI BISNIS ITG using COBIT &
COBIT Framework Source:
COBIT - II.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
By Collin Smith COBIT Introduction By Collin Smith
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
COBIT Framework Introduction. Problems with IT? – Increasing pressure to leverage technology in business strategies – Growing complexity of IT environments.
Internal Control and Internal Audit
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Purpose of the Standards
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Information Systems Controls for System Reliability -Information Security-
Information Technology Audit
Internal Auditing and Outsourcing
Project Human Resource Management
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
WHERE WE ARE 22 member associations in 20 countries Over 4300 individual members who are responsible for risk management and/or insurance in their organisations.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Continual Service Improvement Process
Developing IT Capabilities
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Monitoring Internal Control Systems Johann Rieser Senior Auditor, Ministry of Finance, Vienna.
Internal Control in a Financial Statement Audit
Roles and Responsibilities
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Audit Planning and Analytical Procedures Chapter 8.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
1. IT AUDITS  IT audits: provide audit services where processes or data, or both, are embedded in technologies.  Subject to ethics, guidelines, and.
Presented By Tay Un Soo Senior VP, Bank of Commerce President of ISACA - Malaysia Chapter 1999 National Accountants Conference THRIVING IN THE DIGITAL.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Kathy Corbiere Service Delivery and Performance Commission
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IT Auditor’s Role in IT Governance Fred C. Roth, CISA MIS Training Institute Session 425.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Audit Planning and Analytical Procedures Chapter.
Chapter 8 Controlling Information Systems: IT Processes.
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Getting to Know Internal Auditing
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Project Human Resource Management
Getting to Know Internal Auditing
Getting to Know Internal Auditing
A Framework for Control
Transforming IT Management
Getting to Know Internal Auditing
Presentation transcript:

Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall

Information Technology SOX Industry Specific Regulations (Pharmaceuticals, Oil sands) International Regulations – Security & Forensics Privacy Laws – (Canada, EEC) 5-2

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Recent regulations impact a greater number of systems. Systems are more interconnected. (Interpol, Banks, CIA) Organizations are more dependent on Information Systems. (Banks, IBM e- commerce, Facebook, Amazon & EBay) Systems are more global and are affected by many countries. (EEC, US(SOX)) [GAPP] 5-3

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Requires an annual evaluation of internal controls and procedures for financial ethics Requires the CEO and CFO personally certify controls. Requires independent auditors test control effectiveness. Controls must be designed to achieve ethical objectives using established criteria. Controls and control objectives must be documented. COBIT – Control Objectives for Information & related technologies 5-4

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 1. Increasing Cost and Challenges 1. $5.5 Billion for SOX targets Benefits and Opportunities 1. SOX is good for IT 5-5

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Compliance to say SOX requires a significant resource investment. Compliance adds new project costs and lengthens development schedules. (Syncrude, IBM) CIOs must personally attest to the effectiveness of IT’s internal controls and the quality of information. 5-6

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Compliance requires that IT staff have adequate training and excellent written communication skills. Compliance requires the organization adopt a document retention strategy. 5-7

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Compliance provides an opportunity to enhance business processes. Compliance has enhanced IT visibility with executives and the board of directors. (Maybe offering strategic direction) Compliance has increased the importance of security, quality, data architecture, and change management. 5-8

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Improved overall IT governance Enhanced understanding of IT by senior executives Better business decisions based on more accurate information Improved IT-Business alignment Reduced risk of system security breaches 5-9

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Reduced difficulty complying with new regulations More efficient and effective operations An integrated approach to security Enhanced risk management competencies Overall effective ethical practices 5-10

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 5-11 Figure 5.1 New Systems Daily operation Information (Enabling IT Work)

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 1. Enabling IT Work 2. New Systems 3. Information 4. Daily Operations 5. Controlling IT Work 5-12

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Physical and Virtual Access across corps, new staff hires with access privileges Security Architecture requires practices Business Continuity Planning and Disaster Recovery (9/11, 2003 blackout) IT Governance (awareness & training required for compliance) HR Management and Training IT Finance (involving IT mgrs.) 5-13

© 2009 Pearson Education, Inc. Publishing as Prentice Hall IT Strategic Planning to be aligned with business strategy system Risk Assessment system Project Management system 5-14

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Information Architecture Who has access to Data Document Retention Data Administration How to create, collect, organize, analyze, maintain & archive data 5-15

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Operations and Infrastructure Support Help Desk Change Management Change Control Board (CCB) Change Management database 5-16

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Testing and Validation Documentation Management Quality Assurance All are elements of quality Management Everyone is responsible 5-17

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Organize for Compliance 1. Reduce cost Ensure procedures are followed React with new regulation Use Standards and Frameworks Emphasize Training and Awareness for compliance Ensure Appropriate Business Resources Business strategy is communicated so that IT strategy can support it 5-18

© 2009 Pearson Prentice Hall Plan and organize (IT environment) IT strategic planning Information architecture Determine technological direction IT organization and relationships Manage the IT investment Communication of management aims and direction Management of human resources Compliance with external requirements Assessment of risks Manage projects Manage quality 5-19

© 2009 Pearson Prentice Hall Acquire and implement (program development and program change) Identify automated solutions Acquire or develop application software Acquire technology infrastructure Manage changes Deliver and support (computer operations and access to programs and data) Define and manage service levels Manage third-party services 5-20

© 2009 Pearson Prentice Hall Manage performance and capacity Ensure continuous service Ensure systems security Identify and allocate costs Educate and train users Assist and advise customers Manage the configuration Manage problems and incidents Manage data Manage facilities Manage operations 5-21

© 2009 Pearson Prentice Hall Monitor and evaluate (IT environment) Monitoring Adequacy of internal controls Independent assurance Internal audit 5-22

© 2009 Pearson Education, Inc. Publishing as Prentice Hall New laws and regulations have had a significant impact on IT. IT managers are struggling to implement new controls to support these regulations. IT in the future will be controlled, standardized, and bureaucratized. 5-23