Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.

Slides:



Advertisements
Similar presentations
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Advertisements

Analisa Proses. Terjemahan model analisis menjadi desain software.
Chapter 10 Accounting Information Systems and Internal Controls
Control and Accounting Information Systems
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
Title Slide Higher Education Office of Information Technology Management Methodology By James M. Dutcher.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
TI BISNIS ITG using COBIT &
COBIT Framework Source:
Centro de Convenciones, August 22-23, 2006
COBIT - II.
IT Governance Capability Maturity within Government
Roger Southgate Past President of ISACA London Chapter Member of the BSI Committees for Service Management and IT Governance Leader.
Using COBIT and ITIL Robert E Stroud CGEIT
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Office of the Secretary of Defense – Comptroller Financial Improvement and Audit Readiness Directorate Unclassified 17 September 2014 GAO Revised “Green.
By Collin Smith COBIT Introduction By Collin Smith
1 Pertemuan 6 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Managing the Information Technology Resource Jerry N. Luftman
Overview of IT Governance and
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
COBIT Framework Introduction. Problems with IT? – Increasing pressure to leverage technology in business strategies – Growing complexity of IT environments.
Sarbanes-Oxley Project Summary of COSO Framework Presented by Larry Dillehay & Scott Reitan Parkfield Group LLC.
Information Systems Controls for System Reliability -Information Security-
Introduction to IT Auditing
COBIT®. COBIT - Control Objectives for Information and related Technology C OBI T was initially created by the Information Systems Audit & Control Foundation.
© 2007 ISACA ® All Rights Reserved DAMA-NCR Chapter Meeting March 11, 2008.
Evolving IT Framework Standards (Compliance and IT)
Continual Service Improvement Process
Chapter 3 Internal Controls.
© IT Management Consulting Ltd., London, Implementing IT Governance Frameworks within Regulated Institutions.
Information ITIL Technology Infrastructure Library ITIL.
ISA 562 Internet Security Theory & Practice
COBIT Information Security An Introduction Tanvir Orakzai,PhD
Introduction to Internal Control Systems
Vijay V Vijayakumar.  SOX Act  Difference between IT Management and IT Governance  Internal Controls  Frameworks for Implementing SOX  COSO - Committee.
The Challenge of IT-Business Alignment
This Lecture Covers Review of Internal Control Definitions.
Chapter Three IT Risks and Controls.
Overview:  Different controls in an organization  Relationship between IT controls & financial controls  The Mega Process Leads  Application of COBIT.
Roles and Responsibilities
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
1. IT AUDITS  IT audits: provide audit services where processes or data, or both, are embedded in technologies.  Subject to ethics, guidelines, and.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
1 Optimizing IT Better Planning, Better Control, Better Results Copyright © 2009 K-12 Technology Works.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
COBIT 5 Introduction 28 February 2012.
Chapter 9: Introduction to Internal Control Systems
Presented by Peter Tessin, CISA, CRISC, MSA, PMP Technical Research Manager.
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
C OBI T and slides © 2007 IT Governance Institute. Used with permission. An Overview of C OBI T ®
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
#325 - CobiT and Service Delivery Debra Mallette, CISA, CSSBB Kaiser Permanente IT.
IT Auditor’s Role in IT Governance Fred C. Roth, CISA MIS Training Institute Session 425.
Presented by. Information! Information is a key resource for all enterprises. Information is created, used, retained, disclosed and destroyed. Technology.
COBIT 5 Executive Summary © 2012 ISACA. All rights reserved.1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
ISACA Willamette Valley Chapter Luncheon Thursday, March 20, 2008 Practical Auditors Guide for CobiT Steve Balough, CISA.
Chapter 8 Controlling Information Systems: IT Processes.
COBIT 5 Executive Summary
COMP532 IT INFRASTRUCTURE
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Internal control objectives
Governance, audit and digital preservation
COBIT 5 Executive Summary
Presentation transcript:

Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal Control - Integrated Framework” (1992) designed to help organizations monitor the quality of their internal control systems.

Figure 1.2 COSO Internal Control - Integrated Framework

Recognized for providing guidance on organizational governance, business ethics, internal control, enterprise risk management, fraud, and financial reporting. Guides executive management and governance entities to become more effective, efficient, and ethical business operations. Accepted as internal control framework for enterprises. The framework identifies and describes five interrelated components necessary for effective internal control.

Control Objectives for Information and related Technology (COBIT®) Accepted as internal control framework for IT. Provides a process framework and presents activities in a manageable and logical structure that will optimize IT-enabled investments, ensure service delivery and provide a benchmark to measure performance against.

“COBIT framework principle(figure 5): to provide the information that the enterprise requires to achieve its objectives, the enterprise needs to manage and control IT resources using a structured set of processes to deliver the required information services. “ COBIT is a process model that subdivides IT into 34 processes in line with the responsibility areas of plan, build, run and monitor, providing an end-to-end view of IT. CobIT’s Information Criteria – Effectiveness – Efficiency – Confidentiality – Availability – Compliant – Reliability

Business & IT Goals – Business Requirements – Governance Requirements – Information Criteria – Information Services IT Resources – Applications -automated user systems and manual procedures – Information –data input, processed, & output by information systems – Infrastructure -technology and facilities – People -personnel needed to plan, organize, acquire, implement, deliver, support, monitor & evaluate information systems & services.

P L A N & O R G A N I Z E Define a Strategic IT Plan Define the Information Architecture Determine Technological Direction Define the IT Processes, Organization and Relationships Manage the IT Investment Communicate Management Aims and Direction Manage IT Human Resources Manage Quality Assess and Manage IT Risks Manage Projects A C Q U I R E & I M P L E M E N T Identify Automated Solutions Acquire and Maintain Application Software Acquire and Maintain Technology Infrastructure Enable Operation and Use Procure IT Resources Manage Changes Install and Accredit Solutions and Changes D E L I V E R & S U P P O R T Define and Manage Service Levels Manage Third-party Services Manage Performance and Capacity Ensure Continuous Service Ensure Systems Security Identify and Allocate Costs Educate and Train Users Manage Service Desk and Incidents Manage the Configuration Manage Problems, Data, and Physical Environment M O N I T O R & E VA L U A T E ME1 Monitor and Evaluate IT Performance ME2 Monitor and Evaluate Internal Control ME3 Ensure Regulatory Compliance ME4 Provide IT Governance

Goals & Metrics Key Goal Indicators Key Performance Indicators