Current Information Technology Issues Norbert Mika NJ Mika Consulting Inc.

Slides:



Advertisements
Similar presentations
Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Advertisements

Chapter 1 Business Driven Technology
Ethics, Privacy and Information Security
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Security and Personnel
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
1 An Overview of Computer Security computer security.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
Database Administration
What is an Information System? Input of DataResourcesProcessing Data Data Control of System Performance Storage of Data Resources Output of InformationProducts.
Copyright © 2003 Americas’ SAP Users’ Group Making a Profit with Customer Service David Baethke, Vice President, The Baer Group Wednesday, May 21, 2003.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
VENDORS, CONSULTANTS AND USERS
SOX Compliance Don’t fight what can help you. Skye L. Rogers  9 Years experience working in Systems & Operations in various roles.  4 years focusing.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
1 The Role of the Finance Department Higher Grade Business Management 2009.
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
IT Assurance and Reliability Why Should You Care? Richard Oppenheim, CPA, CITP President, SysTrust Services Corporation Presented to ISACA Regional Meeting.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
The Internetworked E-Business Enterprise
Chapter 13: Data Security & Disaster Recovery Database Management Systems.
Organizing Information Technology Resources
IT Control Objectives for Sarbanes-Oxley
Evolving IT Framework Standards (Compliance and IT)
Management Information Systems
DBS201: DBA/DBMS Lecture 13.
Information ITIL Technology Infrastructure Library ITIL.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Vijay V Vijayakumar.  SOX Act  Difference between IT Management and IT Governance  Internal Controls  Frameworks for Implementing SOX  COSO - Committee.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Auditing Information Systems (AIS)
Chapter 13 Information Resource Management The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
Everyone’s Been Hacked Now What?. OakRidge What happened?
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 12 Integrating the Organization from End to End – Enterprise Resource Planning.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
Lecture 4. IS Planning & Acquisition To be covered: To be covered: – IS planning and its importance Cost-benefit analysis Cost-benefit analysis Funding.
Review Exam 2 Chapters 6 – 10. Chapter 6 – Systems Development Systems Development Concepts Challenges in Systems Development Types of System Development.
Introduction to Information Security
State of the Market IT Spending Directions Stephen Minton Vice President IDC Worldwide IT Markets.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
EXtensible Mark-Up Language (XML) Enabling the exchange and integration of business information Virginia, April 2002.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Chapter 15 Telecommunication Department Management.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Ron Johnson, CFA Litman/Gregory Asset Management.
Welcome to the ICT Department Unit 3_5 Security Policies.
Virtual Directory Services and Directory Synchronization May 13 th, 2008 Bill Claycomb Computer Systems Analyst Infrastructure Computing Systems Department.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Discovering Computers 2010: Living in a Digital World Chapter 14
Awareness program on ISO/TS16949:2002
Relation between information modeling and network operation
Making Information Security Actionable with GRC
ECT 589: E-Commerce Management
Awareness program on ISO/TS16949:2002
Strategic Information Systems
Presentation transcript:

Current Information Technology Issues Norbert Mika NJ Mika Consulting Inc.

Agenda Current hot issues Current hot issues SOX SOX ISO-TS ISO-TS “IT Doesn’t Matter”, Nicholas Carr “IT Doesn’t Matter”, Nicholas Carr Security Security Types of breaches Types of breaches What can be done? What can be done? Current Technologies Current Technologies

Role of IT To provide the systems and technological infrastructure to support improvements in operational efficiency and responsiveness To provide the systems and technological infrastructure to support improvements in operational efficiency and responsiveness

IT Should be Engaged In… Process and Product Design Process and Product Design Analysis and Design Tools Analysis and Design Tools Knowledge Management Knowledge Management Production Systems Production Systems Equipment controls Equipment controls Scheduling Scheduling Simulators Simulators Infrastructure Infrastructure Data Communications Networks Data Communications Networks Database Systems Database Systems Intranet, Intranet and Extranet, EDI Intranet, Intranet and Extranet, EDI Disaster Recovery Disaster Recovery Administration and Management Administration and Management Productivity tools Productivity tools Supply Chain Management Supply Chain Management Decision Support Systems Decision Support Systems IT Focused Education IT Focused Education

Challenges IT Department Resources Shifting Priorities Competition Customer Demands Production drivers (tactical vs. strategic) Regulations

Sarbanes-Oxley Act of 2002 Public Company Accounting Reform and Investor Protection Act Affects publicly traded companies in the US Affects publicly traded companies in the US Resulting from cases of corporate fraud Resulting from cases of corporate fraud Monitors auditors and company executives Monitors auditors and company executives Adds controls to keep statements of assets and revenues honest Adds controls to keep statements of assets and revenues honest Designed to bolster the confidence of the investing public Designed to bolster the confidence of the investing public On March 30, 2004, the Canadian Securities Commission regulations were in force in most provinces. This covers best practices in corporate governance, annual reports and continuous disclosure. On March 30, 2004, the Canadian Securities Commission regulations were in force in most provinces. This covers best practices in corporate governance, annual reports and continuous disclosure.

IT and SOX 2/3 of IT managers believe they only need to update their documentation to be compliant 1 2/3 of IT managers believe they only need to update their documentation to be compliant 1 45% said changes will be in contract management and supply-chain systems 45% said changes will be in contract management and supply-chain systems 35% said changes will be in improving spending analysis and invoice reconciliation processes 35% said changes will be in improving spending analysis and invoice reconciliation processes None of those surveyed were going to spend money on IT None of those surveyed were going to spend money on IT Other surveys 2 showed that most agree IT must play an integral role in meeting SOX regulations by providing the systems and support necessary Other surveys 2 showed that most agree IT must play an integral role in meeting SOX regulations by providing the systems and support necessary 1 Aberdeen Group 2 Hackett Group and Gartner Financial Services

ISO-TS ISO Technical Specification aligns American, German, French and Italian automotive quality systems ISO Technical Specification aligns American, German, French and Italian automotive quality systems Specifies quality requirements for design/development, production, installation and servicing of automotive related products Specifies quality requirements for design/development, production, installation and servicing of automotive related products Includes component of maintaining good customer service Includes component of maintaining good customer service Focuses on continuous improvement Focuses on continuous improvement Put together by International Automotive Task Force (IATF) and various national trade associations Put together by International Automotive Task Force (IATF) and various national trade associations

What does SOX and TS have in common? Adds accountability Adds accountability Adds fiscal challenges Adds fiscal challenges Requires good IT Infrastructure Requires good IT Infrastructure Examples of how external pressures are creating challenges to the IT departments Examples of how external pressures are creating challenges to the IT departments

IT Doesn’t Matter “IT has become a commodity. Affordable and accessible to everyone, it no longer offers strategic value to anyone.” Nicholas Carr, Harvard Business Review

IT Doesn’t Matter Carr suggests: Carr suggests: Spend less Spend less Follow, don’t lead Follow, don’t lead Focus on risks, not opportunities Focus on risks, not opportunities Needless to say, Carr spurred much debate with his paper Needless to say, Carr spurred much debate with his paper

Security Backup Backup Disaster Recovery Disaster Recovery Authentication Authentication Authorization Authorization Computer Crime Computer Crime

Examples of Computer Crime Theft Theft Illegal software Illegal software Viruses Viruses Denial of Service Denial of Service Network Eavesdropping Network Eavesdropping Scanners Scanners Password Crackers Password Crackers Sniffers Sniffers Spoofing Spoofing Backdoors Backdoors Internal Internal

Preventing Computer Crime Identify and protect assets Identify and protect assets Implement appropriate physical security Implement appropriate physical security Implement user security Implement user security Deter programmers Deter programmers Review logs Review logs Protect network communications Protect network communications Prosecute criminals Prosecute criminals

Advances in IT Business intelligence/knowledge Business intelligence/knowledge Wireless world Wireless world Convergence Convergence Portal Portal Virtual meetings Virtual meetings