Risk Management for Small & Medium Sized Enterprises

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Nishidh, CISSP. To comply with Sarbanes oxley and other legislations To comply with industry standards and business partner requirements To protect.
OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Chapter 14 Fraud Risk Assessment.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Chapter 10 Accounting Information Systems and Internal Controls
Control and Accounting Information Systems
Auditing Concepts.
Executive Insight through Enhanced Enterprise Risk Management Leverage Value From Your Risk Management Investment.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Security Controls – What Works
6/2/20151 Enterprise Risk & Assurance Management in Zurich North America Brian Selby MA (Audit), FIIA, QiCA, MBCS, CISA.
Health Aspect of Disaster Risk Assessment Dr AA Abubakar Department of Community Medicine Ahmadu Bello University Zaria Nigeria.
Operational risk management Margaret Guerquin, FSA, FCIA Canadian Institute of Actuaries 2006 General Meeting Chicago Confidential © 2006 Swiss Re All.
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
1 Environmental Management SMITE: 1 st Awareness Campaign Eng. Samer Abu Manneh.
The Information Systems Audit Process
Managing Project Risk.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Protection and Disaster Risk Reduction (Place) – (Date) Session 6.1: Integrating Protection into Disaster Risk Reduction.
Systemise your compliance management Peter Scott Consulting
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
“The Impact of Sarbanes Oxley, An Evolving Best Practice” Ellen C. Wolf Senior Vice President & Chief Financial Officer American Water National Association.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Information Systems Controls for System Reliability -Information Security-
Tan Jenny 23 September 2009 SESSION 4: Understanding Your IT Control Environment & Its Readiness.
Implementing an effective risk management strategy in a law firm
Information Technology Audit
Internal Auditing and Outsourcing
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
© 2007 Heuristic Management Systems Inc. Learning to Thrive in a Risk-averse Culture Chris Vandersluis President,
Global Risk Management Solutions Risk Management and the Board of Director: Moving Beyond Concepts to Execution Anton VAN WYK Partner, Global Risk Management.
CDS Operational Risk Management - October 28, 2005 Existing Methodologies for Operational Risk Mitigation - CDS’s ERM Program ACSDA Seminar - October 26.
David N. Wozei Systems Administrator, IT Auditor.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
1 Efficient, Transparent and Strategic Management Presented by: Prof. Venansius Baryamureeba Acting Vice Chancellor, Makerere University, Kampala, UGANDA.
Conducting Compliance Assessments and Building Internal Controls In Pharmaceutical R&D Third Annual Medical Research Summit – Session 2.01 Michael Swiatocha.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
The Connection between Risk Management and Internal Control in Organizations Mag. Norbert Wagner Budapest,
ISO 9001:2008 to ISO 9001:2015 Summary of Changes
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
A paper presented for the TEM Conference, Sydney, Australia 27 th -30 th August 2006 Presentation by Anne Walker, Risk Manager Massey University New Zealand.
RISK MANAGEMENT : JOURNEY OR DESTINATION ?. What is Risk? “ Any uncertain event that could significantly enhance or impede a Company’s ability to achieve.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Software Development Risk Assessment for Clouds National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department.
Introduction to Project Management Chapter 9 Managing Project Risk
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
TODAY’S OBJECTIVES Provide a practical, business-focused crisis management program Identify where your site is at risk of a crisis Introduce you to processes.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Managing Uncertainty, Creating Opportunity Enterprise Risk Management J. Brown, CEO.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
What is Internal Audit University of Date. What/Who is Internal Audit? A University department that reports directly to the Board of Regents (BOR) through.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
F8: Audit and Assurance. 2 Audit and Assurance Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B:
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Risk Management in Software Development Projects Roberto Torres Ph.D. 11/6/01.
Creating a Risk Thinking Organisation Jobs and Enterprise, Regeneration and Resources and Culture and Well Being Select Committee 1 st June 2011.
Auditing Concepts.
An Overview on Risk Management
I have many checklists: how do I get started with cyber security?
EC Strategy, Globalization, and SMEs
Understanding the current Public Sector landscape from an risk management point of view Applying the ethical responsibility to the Triple Bottom-line:
Managing IT Risk in a digital Transformation AGE
In the attack index…what number is your Company?
Presentation transcript:

Risk Management for Small & Medium Sized Enterprises Doug Steele is a partner at Grant Thornton LLP leading the Risk Management practice in Vancouver. Doug has extensive experience in IT audit and security, helping organizations manage their risks. His client base includes companies in both the financial and public sector, for whom he has performed comprehensive risk assessments, data integrity audits, computer conversion audits, penetration testing, post-implementation reviews, business process improvement projects and general computer control reviews. He has worked on numerous internal audit projects with several large credit unions. Doug is a Certified Information Systems Auditor, a member of the Institute of Chartered Accountants of British Columbia, and the former president of the Vancouver Chapter of the Information Systems and Control Association (ISACA). He is also a former co-chair of the Speakers Program for the West Coast Security Forum. Grant Thornton LLP Doug Steele, CA, CISA Partner, Technology Risk Management

Risk Definition: Potential of loss or failure from unforeseen events Lost opportunities or revenues Indicators: Changes in people or processes Multiple points of access Inability to monitor Evolving business & practices Dependency on systems Concentration or reach of business 2

Examples of Risks Criminal activities (fraud, robbery, vandalism) Environmental (biological, contamination) Loss of service (communication, power, water) Natural (earthquake, fire, flood, severe weather) Operational (system failure, human error) Organizational (strike, key personnel turnover) Political (civil disturbance, war) 3

Benefits of Risk Management Increased awareness of threats (early identification) Improved ability to respond to the unexpected Continuous improvement of products or services Enhanced ability to profit from new opportunities Improved management decision-making Higher probability of achieving objectives Enhanced stakeholder value More effective use of resources 4

Risk Management Structured Disciplined process Preventive measures Technology Internal controls Proactive measures Transferring risk Insurance Outsourcing Integrated with management processes Policies & procedures 5

Integrated Risk Management Aligns: Objectives (strategic, tactical, operational) Strategy (financial, reputation) Processes (operational, financial, compliance) People (culture, employees, community) Knowledge (internal, external) Technology (internal, outsourced) 6

Trends in Risk Management Movement: Pre-1980 Insurance 1980s Financial Risk Management 1990s Enterprise Risk Management Post-2000 Strategic Significance Focus now: Information security (anti-fraud, privacy) Disclosure / transparency (MI 52-109) Internal controls (MI 52-111, SOX) Business continuity planning 7

Integrated Risk Management Approach Adopt a methodology Identify potential risks & vulnerability Conduct a risk assessment Develop response strategies Develop risk management policy Monitor risk response effectiveness Update risk assessment continuously 8

Challenges for SMEs Finding the right balance of: Knowledgeable staff Experienced management Business infrastructure costs Technological infrastructure costs Consulting costs Competition from larger organizations Scarce resources (financial and other) 9

Practical Examples Successes Failures Lessons learned 10

Technology Solutions Automated internal controls Access (physical, network & application security) Edits (batch, balance, format, check digit) Validation Purchased software Fraud detection software Risk management & analysis software Continuous monitoring software Outsourcing (transferring the risk) Risk Analysis/Management Software (from Internal Auditor Magazine – Aug-05) 2005 Buyer’s Guide to Audit, Anti-Fraud & Assurance Software (www.auditsoftware.net/community/store) Aline (info@aline4sox.com) Audit Leverage Software (info@AuditLeverage.com) AutoAudit, Risk Navigator; The Paisley Solution (www.paisleyconsulting.com) Certus Governance Suite (www.certus.com) Confident Compliance; Continuous Compliance Suite (www.virsa.com) Decision Factor AEM (www.RuleSphere.com) Enterprise Risk Assessor (ERA); Pro Audit Advisor (www.methodware.com) eProcessManager (ePM) (www.eprocessmanager.com) Galileo; KnowledgeLeader (www.darcangelosoftwareservices.com) Operational Risk Management (ORM) Portal (www.protivi.com) Optial (www.optial.com) Pentana (www.pentana.com) Sharpe Decisions Executive Workshop (www.sharpedecisions.com) TeamRisk (www.pwc.com/teammate) 11

Other Solutions Good corporate governance (tone at the top) Internal audit activities External consulting services 12

Summary Know the risks Recognize the benefits Integrate risk management in the organization Accept, reject, transfer or mitigate risk Take advantage of technology Set the tone at the top Balance the costs Make risk management a continuous process 13

Thank you Questions? Doug Steele is a partner at Grant Thornton LLP leading the Risk Management practice in Vancouver. Doug has extensive experience in IT audit and security, helping organizations manage their risks. His client base includes companies in both the financial and public sector, for whom he has performed comprehensive risk assessments, data integrity audits, computer conversion audits, penetration testing, post-implementation reviews, business process improvement projects and general computer control reviews. He has worked on numerous internal audit projects with several large credit unions. Doug is a Certified Information Systems Auditor, a member of the Institute of Chartered Accountants of British Columbia, and the former president of the Vancouver Chapter of the Information Systems and Control Association (ISACA). He is also a former co-chair of the Speakers Program for the West Coast Security Forum.