TOP 10 TECHNOLOGY INITIATIVES Robert G Parker July 12, 2013.

Slides:



Advertisements
Similar presentations
Risk Management Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Advertisements

Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Presented by MUHAMMAD YAHYA AHMAD College of Education and Allied Program PCU, Manila.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Developing a Records & Information Retention & Disposition Program:
ICAICT202A - Work and communicate effectively in an IT environment
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Oscar Flores Accounting I FINANCIAL ANALYST. Financial analysts provide guidance to businesses and individuals making investment decisions. Financial.
Safety and Health Programs
SMART GRID: Privacy Awareness and Training – for PUCs/PSCs A Starting Point December 2011 SGIP-CSWG Privacy Group 1 DRAFT.
Prepared and Presented By: Frank Crawford, CPA.
Information Systems Controls for System Reliability -Information Security-
Network security policy: best practices
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 6. Ensuring Privacy AICPA-CPA Canada Privacy Definition “the rights and obligations of individuals.
Internal Auditing and Outsourcing
Consultancy.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 9. Preventing and Responding to Computer Fraud IT Security Ranked #2 Preventing and Responding.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
Internal controls. Session objectives Define Internal Controls To understand components of Internal Controls, control environment and types of controls.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 8: Client Risk Profile and Documentation
The Institutionalization of Business Ethics
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
The Accomplished Connoisseur: Professional Expertise in Support for the Corporate Law Department Presented by: Lisa Daulby Canadian Association of Law.
Risk Management Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
S-1 © RGP & UW-CISA 2010 Business & Technology Environment Summer 2010 Robert G Parker.
GIOA Conference – March “Facebook Me” TRUST THEN WHY CARE?
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
InfoSecurity and Outsourcing 17 March 2009 Colin Dixon Head of Risk and Compliance.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
The Internet of Things and Consumer Protection
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
S5: Internal controls. What is Internal Control Internal control is a process Internal control is a process Internal control is effected by people Internal.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
From cost to value: 2010 Global Survey on the CIO Agenda June 15 th, 2010 IT ADVISORY KPMG INTERNATIONAL.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Protecting your Managed Services Practice: Are you at Risk?
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
What is Travel Risk Management?
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Internal Controls For Municipalities Vermont State Auditor’s Office – August 2008.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
jasa.org Board of Directors Presentation & Training February 24 th, 2016 Corporate Compliance Program.
UNDERSTANDING INFORMATION MANAGEMENT (IM) WITHIN THE FEDERAL GOVERNMENT.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
New A.M. Best Cyber Questionnaire
PLANNING, MATERIALITY AND ASSESSING THE RISK OF MISSTATEMENT
Responding to Intrusions
Information Security: Risk Management or Business Enablement?
Making Information Security Manageable with GRC
Measuring What Matters
Certified Information Technology Professional (CITP) Credential
Information Technology and AISs
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

TOP 10 TECHNOLOGY INITIATIVES Robert G Parker July 12, 2013

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-2 Joint AICPA-CPA Canada Survey Conducted in Spring 2013 Survey Participants were asked : “What are the Top Five Priorities for Your Client or Organization in 2013? (Select five from list of 12 ) For the Priorities Selected Participants Were Asked a Series of Questions

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-3

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-4 TOP 10 TECHNOLOGY INITIATIVES Managing and Retaining Data Securing the IT Environment Enabling Decision Support -Analytics Managing IT Risk and Compliance Governing & Managing IT Investment Ensuring Privacy Managing Systems Implementation Leveraging Emerging Technologies Preventing and Responding to Computer Fraud Managing Vendors and Service Providers 2013

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-5 Not-for-profit and other Joint AICPA – CPA Canada Survey Questions were “Canadianized” for Canadian CPAs Canadian Survey Participants Public Accounting Business and Industry Government/Military 25% 40% 15% Consulting-Law 10%

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-6 TOP 10 TECHNOLOGY INITIATIVES 2013 Top Technology Initiatives IT Initiative Ranking Managing and retaining data 1 Securing the IT environment 2 Enabling decision support and analytics 3 Managing IT risks and compliance 4 Governing and managing IT investment and spending 5 Ensuring privacy 6 Managing systems implementation 7 Leveraging emerging technologies 8 Preventing and responding to computer fraud 9 Managing vendors and service providers 10

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-7 Canadian accounting professionals gave higher priority than U.S. professionals to: Enabling decision support and analytics Governing and managing IT investment and spending.. Are we the Same? U.S. professionals gave higher rankings to: Ensuring privacy, Managing system implementation Preventing and responding to computer fraud

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-8 Are we the Same?

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-9 1. Managing and Retaining Data Big Data Ranked 1 st in the USA and Canada Structured and non-structured data is being collected from many sources, GPS devices, blogs, video cameras, , VM, tweets, etc. Potential Benefits Better-more informed business decisions Faster responses Better client service. Greater insight to support future planning Better communications – e.g. using social media Risks - Issues Collection may violate laws and regulations Industry standards may be violated Contractual obligations may be violated Customer expectations may be compromised Data may be misinterpreted

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-10 vv Appropriately designed data retention policies and procedures to meet data retention requirements 54% 74% v Is adequately managing the cost of storing and archiving data 54% Survey Results v Understands data retention requirements (internal, legal, and compliance- related) 67% v Is properly backing-up its data and will be able to restore data in the event of an operational data loss or need to access historical data 1. Managing and Retaining Data

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-11 The big data trend now also allows more contexts around monitoring, analyzing events against combinations of other factors Issues Insurance companies monitor medications an individual receives; the conclusions it draws may not always be correct 1. Managing and Retaining Data Survey – Confidence - Only 54% expressed confidence that : The entity has appropriately designed data retention policies and procedures to meet data retention requirements. Analysis – Clearly Big Data and Data Analytics require additional attention and understanding I Doubt That 74% Will Be Able to Recover Historical Data