PROJECT ON SOX IT PROJECT (ASSURANCE SERVICE) BY ALKESH.V.DESHPANDE UNDER THE GUIDENCE Of Mr. PRASAD PENDSE ANB CONSULTING C0.PVT.LIMITED COLLEGE NAME.

Slides:



Advertisements
Similar presentations
Our Corporate Mission Quality Systems Management, Inc. (QSMI)
Advertisements

Introduction to our Facilities Management Services
Life Science Services and Solutions
IMPLEMENTING FINANCIAL AND ACCOUNTING SYSTEMS FOR GOVERNMENT CHRISTIAN T. SOTTIE THE CONTROLLER AND ACCOUNTANT-GENERAL GHANA.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Powered by SIS Technology. Debt collection challenges Increase your collections Decrease your costs Optimize your time Secure your data Organize your.
Virtual SharePoint Summit 2010 hosted by Rackspace Overcoming Collaboration Challenges with SharePoint Chris Samson Leslie Sistla Virtual SharePoint Summit.
SAP Travel OnDemand Travel and Expense Management
By Collin Smith COBIT Introduction By Collin Smith
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Presentation Title: Utilizing Business Process Management (BPM) and Enterprise Architecture (EA) to Achieve and Maintain a Competitive Advantage Presented.
1 July 23, 2002 Strategic Technology Plan Briefing to LOT Committee.
ECM Base Compliance Input Messaging & Alert Compliance dashboard Compliance Monitoring Internal & External Audit Tracking Access Control Compliance & Financial.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
What is Business Intelligence Business Intelligence (BI) encompasses the processes, tools, and technologies required to transform enterprise data into.
“This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
Getting Smarter with Information An Information Agenda Approach
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
EPM Live – Positioning for Enterprise Project Management Presented by: Sasha Lomas, PMP ASL InfoTech inc. March 3, 2010.
BUSINESS DRIVEN TECHNOLOGY
Understanding Data Warehousing
Presenting The Broker-Dealer Certification Tool The Compliance Department Inc. Broker Dealer Compliance Consultants Compliance SCORE Powered by Keane BRMS.
Classroom User Training June 29, 2005 Presented by:
Supporting tools in an IT Project & Portfolio Management environment Ann Van Belle -
ITIL & COBIT O6PLM Kevin Lisay – Rendy Winarta –
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
The Value of Fusion Middleware for Oracle Applications Shari White Sr. Solutions Consultant, FMW.
Business Analysis and Essential Competencies
- 1 - Roadmap to Re-aligning the Customer Master with Oracle's TCA Northern California OAUG March 7, 2005.
Chapter 6 Supporting Processes with ERP Systems Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 6-1.
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
Dr. Jana Jagodick Polytechnic of Namibia, 2012 Project Management Chapter 3 Project Management for Strategic Goal Achievement.
Roles and Responsibilities
@ ?!.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
1 Information Technology (IT) Auditing & Control Instructor: Dr. Princely Ifinedo Cape Breton University (CBU)
BPK Strategic Planning: Briefing for Denpasar Regional Office Leadership Team Craig Anderson Ahmed Fajarprana August 11-12, 2005.
+ Regulation and Compliance Summary “ Making Great Ideas Become Reality”
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. Information Technology Enterprise Strategic Investment.
BUSINESS DRIVEN TECHNOLOGY
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
EPA Geospatial Segment United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Segment Architecture.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
Project 2007 and Project Sever 2007 Overview Bob Schmidt.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 Click to edit Master title style What is Business Analysis Body of Knowledge?
Oracle’s EPM System and Strategy
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
Cross-System Data Capacity Developing State Level Strategies for Integration and Interoperability.
(OBIA) Training & Placement Program By Keen IT To request free demo session please mail us at
SAP BI – The Solution at a Glance : SAP Business Intelligence is an enterprise-class, complete, open and integrated solution.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
 The U.S. Securities and Exchange Commission (SEC) oversees the key participants in the securities world.  Concerned with promoting disclosure of important.
CMMI Certification - By Global Certification Consultancy.
BI Performance Management. Business Issues Too much information: Create confusions Multiple version of Truth: Lack of Trusted information: Incomplete,
EI Architecture Overview/Current Assessment/Technical Architecture
Transforming business
Digital Government Initiative Initiation Department of Information Technology Estevan Lujan, Acting Cabinet Secretary Susan Pentecost, Managing Director,
Enterprise Program Management Office
Employee engagement Delivery guide
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Financial Data and Analytics
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

PROJECT ON SOX IT PROJECT (ASSURANCE SERVICE) BY ALKESH.V.DESHPANDE UNDER THE GUIDENCE Of Mr. PRASAD PENDSE ANB CONSULTING C0.PVT.LIMITED COLLEGE NAME K.J. SOMAIYA INSTITUTE OF MANAGEMENT STUDIES & RESEARCH

Introduction  The Sarbanes–Oxley Act of 2002 also known as the 'Public Company Accounting Reform and Investor Protection Act' (in the Senate) and 'Corporate and Auditing Accountability and Responsibility Act' (in the House) and commonly called Sarbanes–Oxley, Sarbox or SOX, is a United States federal law enacted on July 30,  Sarbanes–Oxley contains 11 titles that describe specific mandates and requirements for financial reporting. Each title consists of several sections.  The Sarbanes-Oxley Act created new standards for corporate accountability as well as new penalties for acts of wrongdoing.  SOX applies to all public companies in the U.S. and international companies that have registered equity or debt securities with the Securities and Exchange Commission and the accounting firms that provide auditing services to them.

Scope of Project  SOX Auditing is a Process where we need to review several Applications and their Interfaces.  We need to check several controls regarding those Applications and Interfaces.  All the Application Owner (AO) as well the person in-charge of the Interfaces must adhere to rules and the policy lay down by Bank.  It is the ability to demonstrate controls implemented for quarterly certification.

Benefits  Findings can be used when evaluating current level of SOX compliance.  It would reduce the costs associated with performing separate risk assessments as part of the organization’s information security strategy.  It would bring information security related risks into the focus of the organization’s leadership because of its association with SOX compliance.  It would lay the groundwork for developing a generalized compliance driven risk assessment model that could incorporate any set of regulations or specifications.  It could be the first step in developing a risk management program for organizations that have to be SOX compliant.

Project Details In all there are 117 Applications and 170 Interfaces to be reviewed by the whole ANB SOX team, from which I need to review 14 Applications and 10 Interfaces. For every application we need to check 42 controls and for every interface 18 controls. Out of these 60 controls several can be done at our end itself, and for the remaining we need to arrange a meeting with the Application Owner (AO) or the concerned person for the Interface. So every day there is a Feeding File and a Personal Tracker that needs to be filled, for all the controls checked and to be sent to our Project Manager Mr. Prasad Pendse. These Applications are real time system Applications and Interfaces are connectivity between various applications.

Tools 1)Finacle Core Banking Solution 2)SAS EBI 3)Whizible 4)Data Centre Governance

Finacle  Finacle core banking solution is a comprehensive, integrated yet modular business solution that effectively addresses the strategic and day-to-day challenges faced by banks.  The solution has an integrated CRM module enabling banks to offer a rich and differentiated value proposition to customers. The layered Service Oriented Architecture (SOA), STP Capabilities, Web-enabled technology and 24X7 operations ensure multi-channel, multi-country and multi-currency implementations.  Key modules :- 1.Enterprise Customer Information 2.Wealth Management 3.Corporate Banking 4.Consumer Banking 5.Trade finance 6.Accounting backbone

SAS EBI  SAS Business Intelligence gives you the information when you need it, in the format you need.  SAS ® Enterprise BI Server is a comprehensive, easy-to-use business intelligence software solution that integrates the power of SAS analytics and data integration to share insights that power better business decisions.  Features : 1.Web and desktop reporting 2.Microsoft Office integration 3.Query and analysis 4.Interactive business visualization 5.OLAP storage and OLAP data exploration interface 6.Integrated analytics 7.Guided analysis 8.Metadata Management 9.Applications development

Whizible  Whizible is a suite of products that orchestrates the flow of information across the enterprise to deliver better decision making, alignment to corporate goals and execution that meets quality and schedule objectives creating a high performance organization as envisioned.  Features: – Project and Task Management – Resource Planning – Metrics and Reports – Issues Management – Change Request Management – Defects Management – Risk Management – Help-Desk Management – Document Sharing – Time and Expense Tracking – Quality Management

Data Centre Governance  Data Governance is the exercise of decision-making and authority for data-related matters.  An application that focuses on Privacy / Compliance / Security may look different from one that exists to support Data Warehouses and Business Intelligence  An application concentrating on Architecture / Integration may involve different participants than one whose goals involve Data Quality.  The universal goals for Data Governance Applications are as follows: 1. Enable better decision-making 2. Reduce operational friction 3. Protect the needs of data stakeholders 4. Train management and staff to adopt common approaches to data issues 5. Build standard, repeatable processes 6. Reduce costs and increase effectiveness through coordination of efforts 7. Ensure transparency of processes

Screen layouts

Duplicate User ID Here we tried to create a UserID as XYZ which is already exist Here same user tries to login Second time after 90days. User Deactivation after 90 Days Inactive User ID Here we tried to create a UserID as XYZ which is already exist

Here a user tries to create a master with ID which is already present. Duplicate master Maker Checker Here when a new user is created there are two persons involved in it one who makes it and other who approves that user

Password Change Here user is forced to change the password after 60 days of last password change. Here password entered by user is not visible as a plain/simple text. Here user enters password 123ab which is less then 8 characters Here user tries to change the password to a recently used password

File Upload Selecting the files which needs to be uploaded File is getting uploaded to the defined server. File uploaded successfully to the location Here user tries to upload the file “1030.mst” which is already uploaded