University Technology Risks Assessment and Management April 2010 Pati Milligan, PhD Professor, Baylor University Waco, Texas.

Slides:



Advertisements
Similar presentations
Governance, Risk Management and Compliance: Summary of Basic Concepts & Program Goals Bob Kotic Chief Financial Officer University of Sydney.
Advertisements

Organizational Governance
©2009 ISACA/ITGI. All rights reserved.. ISACA At-a-Glance Founded in 1969; non-profit, independent association that helps members achieve greater trust.
ISACA Guidance and Practices Committee
Auditing Governance Functions
Course: e-Governance Project Lifecycle Day 1
Chapter 10 Accounting Information Systems and Internal Controls
Risk Management and Internal Controls ASSAL 20 November 2014 Annick Teubner Chair, IAIS Governance Working Group.
9 th Annual Public Health Finance Roundtable November 3, 2012 Boston, MA Peggy Honoré.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
2011 Governance, Risk, and Compliance Conference August 29 – 31, 2011 / Orlando, FL, USA The Top Four Essential Objectives to Auditing ERM Stephen E. McBride,
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
By Collin Smith COBIT Introduction By Collin Smith
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Enterprise IT Governance with COBIT – Part V
CORPORATE RISK MANAGEMENT & INSURANCE BY R P BLAH D.G.M. INCHARGE THE ORIENTAL INSURANCE COMPANY LIMITED REGIONAL OFFICE BHUBANESWAR.
Information Systems Controls for System Reliability -Information Security-
PAINTING THE FULL PICTURE
MGT-555 PERFORMANCE AND CAREER MANAGEMENT
Privileged and Confidential Strategic Approach to Asset Management Presented to October Urban Water Council Regional Seminar.
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
Vendor Risk: Effective Management is Essential
COBIT® 5 for Risk Introduction
Information Technology Audit
Internal Auditing and Outsourcing
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
An Educational Computer Based Training Program CBTCBT.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Chapter 3 Internal Controls.
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
Planning an Audit The Audit Process consists of the following phases:
The Challenge of IT-Business Alignment
Copyright T. Rowe Price. All rights reserved 1 Ms. Deborah D. Seidel of T. Rowe Price Financial Services Vice President and Manager of Compliance.
CDS Operational Risk Management - October 28, 2005 Existing Methodologies for Operational Risk Mitigation - CDS’s ERM Program ACSDA Seminar - October 26.
WSSB Capacity Enhancement Workshop 1 Session 3 Contract Management Systems.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Robert.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
IT GOVERNANCE  Objective : The objective of this area is to ensure that the Certified Information Systems Auditor ( CISA ) candidate understands and can.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Chapter 9: Introduction to Internal Control Systems
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
CAS Spring Meeting June 2007 Introduction to ERM …The Measurements, Quadrants, Tools, and Solutions Prof. Mark C. Vonnahme Fox Family Clinical Professor.
Risk Management for Small & Medium Sized Enterprises
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Managing Uncertainty, Creating Opportunity Enterprise Risk Management J. Brown, CEO.
PIC EU-28 Conference Paris, 26 – 27 November 2015 PIC An EU Approach Assurance Maps An Introductory workshop Nathan Paget United Kingdom.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
RISK MANAGEMENT IN THE PUBLIC SECTOR CONVERGING MULTIPLE STAKEHOLDER’S EXPECTATIONS Organised by National Treasury Presented by WELEKAZI DUKUZA CEREBRO.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
12-CRS-0106 REVISED 8 FEB 2013 EDM (Evaluate, Direct, and Monitor) CDG4I3 / Audit Sistem Informasi Angelina Prima K | Gede Ary W. KK SIDE
International Safety Rating System
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
JMFIP Financial Management Conference
Introduction to Business (MRK 151)
©2009 ISACA/ITGI. All rights reserved.
ISACA Guidance and Practices Committee
©2009 ISACA/ITGI. All rights reserved.
ISACA Guidance and Practices Committee
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
COBIT 5 and GRC Date.
Presentation transcript:

University Technology Risks Assessment and Management April 2010 Pati Milligan, PhD Professor, Baylor University Waco, Texas

Issues  What are Academic Technology Risks?  How do we Assess and Manage?  Where do we fail?  Future focus?  Private vs Public University Risk Assessments

As so aptly stated in the ACFE presentation: In the initial stages, fraud and stupidity bear a close resemblance.

Most universities are not for profit and limited staff/budget Academia is an open learning environment So what’s the big deal? Every component of the university is dependent on automation and integration We must integrate business and academic technology solutions to attain proper risk management Why Care About IT-related Risk?

IT Risk (more than meets the eye)

IT Risk Must Manage and Capitalize on Business Risk Some universities try to eliminate the very risks that drive research and education Guidance is needed on how to manage risk effectively ©2009 ISACA/ITGI. All rights reserved.

A Balance is Essential Risk and value are two sides of the same coin Risk is inherent to all enterprises Academic risk and industry risk are the same But… Need to ensure opportunities for value creation provided by Academia are not missed by trying to eliminate all risk

So How to Assess Technology Risk? Scope definition ◦ Business process identification, including  Roles within business process  Interest groups (internal and external) ◦ Academic needs ?? ◦ Assets that need protection?? Analysis ◦ Qualitative risk assessment methodology ◦ Identification of conflicts of interest ◦ Business need for access for identified roles vs Academic need for autonomy ◦ Issues with current access system

ISACA’s IT Risk Model

Risk Assessment to Risk Governance

Risk Domains Governance ◦ Responsibility and accountability for risk ◦ Risk appetite and tolerance ◦ Awareness and communication ◦ Risk culture Evaluation ◦ Risk scenarios ◦ Business impact descriptions Response ◦ Key risk indicators (KRIs) ◦ Risk response definition and prioritization ©2009 ISACA/ITGI. All rights reserved.

As you know..... Critical Low E D C B A A improbable B C D E unavoidable

Potential Academic Exposures Loss of competitive research Opposition research from other universities Loss of personal data

IT-related Risk Evaluation ©2009 ISACA/ITGI. All rights reserved. Technology risk is not limited to information security. It covers all IT-related risks, including: Late project delivery Not achieving enough value from IT Compliance ( FERPA, PFIA, SOX)?? Misalignment of business responsibilities Obsolete or inflexible IT architecture IT service delivery problems Autonomy for research and teaching

Approach and Interviews Public and Private Universities U.S. and Global Personal interviews with IT Auditors and Risk Management Officers On-site Observance

Questions to ask……. 1. How do you determine the level of risk to the university administrative functions in the following areas: a. Network Access b. Web Applications c. Online 2. What is the current IT infrastructure and the applications supporting major business processes (complete ISO levels if possible). How frequently does this change? Who supports this infrastructure, i.e. do the departments support any of the teaching and research nodes? 3. External Environment -- Do you outsource any of the IT Services? 4. Regulatory environment -- which compliance areas pose risk to the university ?

Questions to ask……. (cont.) 5. What is the Strategic importance of the technology network for the university? 6. What is the Operational importance of the networks for the university? Could the university sustain a network outage of 7 days? 7. Do you have a Risk management philosophy, process, and operating model? 8. Who manages Risk Governance (RG), Risk Evaluation (RE), and Risk Response (RR) for the university systems? 9. How are Technology decisions made? 10. Does the university offer online courses for credit? How is that managed? What is the risk if the system is unavailable or if the system is breached? 11. How is the Technology Investment (money for function) managed? Is technology (cost and value) a component of the Board of Director's meetings, risk and budget discussions? 12. What are the top five risk factors for the university?

Questions to ask……. (cont.) 13. What are the top-five IT risk scenarios? 14. Does the university experience any of the following issues? a. Late project delivery b. Not achieving enough value from IT c. Compliance d. Misalignment e. Obsolete or inflexible IT architecture f. IT service delivery problems 15. How often do you evaluate sunset legacy systems? 16. Describe your information security protection program? 17. Data Retention Policy ? 18. Consistency of Patch management? 19. Does IT use standard builds? 20. To what extent do you rely on in-house applications? 21. How much do you rely on contractors? 22. Do you global nationals working with sensitive data? 23. Data Ownership ……

Where do we generally fail? ◦ Impairing ability to “Publish or Perish" ◦ Burning bridges with research sponsors and partners ◦ Inadequate tenure track reviews ◦ Teaching and research effectiveness reviews ◦ Staff and Faculty training ◦ Decentralized survey administration – integrity of results ◦ Not all School/Department goals are met ◦ Academic vs. Business resource allocation not evaluated

January 2009 Where do we commonly fail? (cont.) Failure to monitor service (business) Relinquishing control/oversight (business) Failure to review any Outsource Service Providers’ internal controls Failure to audit all critical areas (network security) Failure to routinely review providers’ financial statements Failure to validate the destruction of confidential (proprietary, research, performance) data when no longer required Inadequate regulatory framework Business employees and faculty may not have the tools necessary to perform their duties effectively and efficiently?

Areas of Concern Ad-hoc access provision Too strict or too loose access Lack of or inadequate access policy Lack of integration with business processes Insufficient separation of duties Former employees or vendors with access Blurred network perimeter

For Those using Outsourced Services Don’t …… Negotiate too hard for a least cost scenario Misplace haste to get a contract in place Forget an exit strategy Fail to control legal compliance Fail to plan for a long-term strong relationship Negotiate and manage from an “Ivory Tower” Ignore performance details January 2009

©2009 ISACA/ITGI. All rights reserved. Always connect to university system objectives Align the management of IT-related business risk with overall university risk management Balance the costs and benefits of managing risk Promote fair and open communication of IT risk Establish the right tone from the top while defining and enforcing personal accountability for operating within acceptable and well-defined tolerance levels Understand that this is a continuous process and an important part of daily activities In Conclusion: Guiding Principles of Risk IT

Benefits and Outcomes Accurate view on current and near-future IT-related events End-to-end guidance on managing IT-related risks Understanding the investments made in technology for both business, research, and teaching Integration with the overall risk and compliance structures within the university Common language to help manage the relationships Promotion of risk ownership throughout the organization ©2009 ISACA/ITGI. All rights reserved.

January 2009 For More Information: ISACA IT Risk Toolkit ISACA/ITGI Risk Model (see model file) OCEG Burgandy Book Executive Summary

©2009 ISACA/ITGI. All rights reserved. Questions? Thank You!