Chapter 7 19-1 © 2012 Pearson Education, Inc. Publishing as Prentice Hall.

Slides:



Advertisements
Similar presentations
1 K P M G L L P A D V I S O R Y Changes in the IT Audit Profession Stephen G. Hasty, Jr. National Partner in Charge IT Advisory Savannah, GA January 4,
Advertisements

Risk The chance of something happening that will have an impact on objectives. A risk is often specified in terms of an event or circumstance and the consequences.
Auditing Governance Functions
Lisanne Sison Director ERM Bickmore
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Introduction to Enterprise Risk Management (ERM)
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
ISS IT Assessment Framework
IT Governance: Simultaneously Empowers and Controls Source: IT Governance, Chapter 1.
Copyright ©2013 Pearson Education, Inc. publishing as Prentice Hall
Business Ethics/ Social Responsibility/ Environmental Sustainability
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Information Systems Controls for System Reliability -Information Security-
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
Information Technology Audit
Project Human Resource Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Multnomah County Health Department ►Essential Services ►FDA Food Standards ►PACE Tools for Food Program Excellence Lila Wickham March 17, 2004 ♣
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Basics of OHSAS Occupational Health & Safety Management System
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright 2004 Prentice Hall1 Inside Stakeholders  Shareholders – the owners of the organization  Managers – the employees who are responsible for coordinating.
GRC - Governance, Risk MANAGEMENT, and Compliance
Joint Forum of Financial Market Regulators Guidelines for Capital Accumulation Plans November 2004 The Impact DC Plan Sponsors G3-PD Colin Ripsman Toronto.
INTERNAL CONTROL OVER FINANCIAL REPORTING
Roles and Responsibilities
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Hartley, Project Management: Integrating Strategy, Operations and Change, 3e Tilde Publishing Chapter 10 Risk Management Proactively managing the positive.
Risk Issues for the Board Presented By: Dr. Cesar G. Saldaña, Ph. D. Founding Fellow, ICD.
1 February 2005 Briefing Sessions Draft Regulations Using Water for Recreational Purposes.
ISO 9001:2008 to ISO 9001:2015 Summary of Changes
© 2001 Change Function Ltd USER ACCEPTANCE TESTING Is user acceptance testing of technology and / or processes a task within the project? If ‘Yes’: Will.
Copyright © Houghton Mifflin Company. All rights reserved.
RISK MANAGEMENT : JOURNEY OR DESTINATION ?. What is Risk? “ Any uncertain event that could significantly enhance or impede a Company’s ability to achieve.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
NEACS: CRO Perspective William Feher Vice President, Internal Audit and Chief Risk Officer October 27, 2015.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Kathy Corbiere Service Delivery and Performance Commission
0 ©2015 U.S. Education Delivery Institute While there is no prescribed format for a good delivery plan, it should answer 10 questions What a good delivery.
1 Pertemuan 22 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2015 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
#327 – Legal and Regulatory Risk: Silent and Possibly Deadly Deborah Frazer, CPA CISA CISSP Senior Director, Internal Audit PalmSource, Inc.
Service Design.
The IT Budgeting Process
Copyright © Houghton Mifflin Company. All rights reserved.MGT437
Building a Strong Relationship with the Business
Business Ethics/ Social Responsibility/ Environmental Sustainability
Presentation transcript:

Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Historical view it was a low-key activity focused on delivering projects and keeping applications up & running Today’s view much broader & complex recognized as integral part of technology-based work 19-2

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Can harm constituencies both within outside companies Damage corporate reputations Dampens organization’s ability to compete 19-3

© 2012 Pearson Education, Inc. Publishing as Prentice Hall 19-4 Legal/HazardsThird RegulatoryParties External Risk Operations Information Systems Development People Controls Processes Culture Governance Internal Risk ENTERPRISE RISK

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Third parties Partners Software vendors & service providers Suppliers & customers Hazards Disasters & pandemics Geopolitical upheavals Legal & regulatory issues Failure to adhere to the laws & regulations 19-5

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Information risks Privacy & quality Accuracy & protection People risks ( Poorly designed business process Failure to adapt business processes Cultural risks Risk aversion and Lack of risk awareness Control Ineffective controls). Governance Ineffective structure, roles 19-6

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Viruses Hackers Organized crime Industrial spies Terrorists 19-7

© 2012 Pearson Education, Inc. Publishing as Prentice Hall 1. Focus on what’s important : RM is not about anticipating all risks It’s to reduce significant risks to manageable level RM should not be about saying “no” to a risk It’s how to say “yes” building a more agile enterprise 19-8

© 2012 Pearson Education, Inc. Publishing as Prentice Hall 2. Expect image to change over time: RM actions should be continuous, iterative & structured Mandatory risk assessment implemented at different key stages Ongoing reviews & process of evaluation need to be adapted 19-9

© 2012 Pearson Education, Inc. Publishing as Prentice Hall 3. View risk from multiple levels & perspectives: RM assessments need to include root cause and multifaceted analyses Organizations need to assess risk trends and develop strategies for dealing with them 19-10

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Goal of a risk management framework (RMF) Ensure the right risks addressed At the right levels RMF guides Development of risk policies and Integrates appropriate risk standards and processes into existing practices

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Risk category Policies and standards Risk type Risk ownership Risk mitigation Risk reporting and monitoring

© 2012 Pearson Education, Inc. Publishing as Prentice Hall General area of risk involved (e.g., criminal, operations, third party) It includes the general principles for guiding risk decisions Principles identify any standards applied to each risk category Identify & label risks with generic name & definition (ideally linked to a business impact) Assign each risk an owner, either IT or the business Owners & stakeholders need clear responsibilities & accountabilities Major risks can be owned by committees Associate risk to controls, practices & tools addressing it effectively RFM provides consistent, effective & appropriate risk management Risk metrics reported in understandable way to organization Risk monitoring ongoing to evaluate possible changes

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Look beyond technical risk Develop a common language of risk Simplify the presentation Right size Standardize the technology base Rehearse Clarify roles & responsibilities Automate where appropriate Educate & communicate

© 2012 Pearson Education, Inc. Publishing as Prentice Hall IT risk involves many types of business risks Therefore should be managed holistically Integrated risk management framework helps organizations understand risk and make better decisions associated with it 19-15