CHAPTER 2: IT ENABLED SERVICES AND EMERGING TECHNOLOGIES... 2 PART 1: IT ASSURANCE SERVICES AND ROLE OF CAs IN BPO-KPO... 2 Learning Objectives...

Size: px
Start display at page:

Download "CHAPTER 2: IT ENABLED SERVICES AND EMERGING TECHNOLOGIES... 2 PART 1: IT ASSURANCE SERVICES AND ROLE OF CAs IN BPO-KPO... 2 Learning Objectives..."

Transcription

1 CHAPTER 2: IT ENABLED SERVICES AND EMERGING TECHNOLOGIES... 2 PART 1: IT ASSURANCE SERVICES AND ROLE OF CAs IN BPO-KPO... 2 Learning Objectives Introduction Opportunities for CAs IT Consulting and Assurance Services by CAs Using COBIT for providing IT-enabled services Set and maintain the IT Governance Framework Define IT Strategy Planning Manage Risk Review IT Security Management Compliance with external requirements Manage Continuity Business Process Outsourcing Knowledge Processing Outsourcing Medical Transcription Legal Transcription Data Entry and data processing IT Help-desk support Application development Risks and Controls of outsourced services... 9 Risks... 9 Controls Using global best practices Compliance with external requirements: Managing Business Continuity Summary References Questions Answers

2 CHAPTER 2: IT ENABLED SERVICES AND EMERGING TECHNOLOGIES PART 1: IT ASSURANCE SERVICES AND ROLE OF CAS IN BPO-KPO Learning Objectives To understand the need for CAs to embrace IT To understand opportunities for CAs in IT enabled services To gain an understanding of using best practice frameworks To gain an overview of IT enabled services like BPO To understand how to use best practices for providing assurance and consulting services 1.1 Introduction Information Technology has pervaded most of the aspects of every organisations be it an SME (Small and Medium Enterprises) or a huge organisation. Adoption of Information Technology carries its own threats, but the nature of threats could be different for SMEs or Large Enterprises. The threats to SME relate more to size and limited manpower. Some of the threats could be in the form of: Breakdown/failure of IT infrastructure: Hardware, network, system software, application software, etc. Loss or theft of IT resources including data impacting business due to lack of awareness of the need for IT security and low level of controls. Lack of adequate security affecting the confidentiality, integrity and availability of IT resources. Dependence on few personnel on managing IT, dependency on IT vendors and lack of skilled manpower due to lack of processes, policies, procedures, standards and guidelines. Lack of independent assurance of the status of IT security and controls In case of large enterprises they could be more in the nature of: Breach of security due to hacking resulting in non-availability of IT resources Breakdown of IT infrastructure due to inadequate business continuity plans 2

3 Lack of adequate risk management strategy and remedial measures Over dependency on key personnel Lack of appropriate clauses in SLA resulting in enterprises being at mercy of IT vendors Chartered Accountants have to embrace IT as IT is a key enabler in enterprises of all sizes and this is so even in enterprises providing services. CA firms are impacted by IT in two ways: By automation of their client s operations resulting in client s data being digital; and CA firms have to use IT in their own offices to provide services. 1.2 Opportunities for CAs For Chartered Accountants there exist opportunities in Auditing and Assurance as well as consulting areas. Chartered Accountants with their expertise in data and in depth understanding of systems and process functions are uniquely suited for providing consulting in control implementation of IT enabled services as well as review of the same. IT by default rather than by design has become critically relevant for CA firms. Technology deployment by design from a strategic perspective by CA firms could act as catalyst of growth and key differentiator to not only provide current service offerings to existing clients but also develop innovative delivery capabilities for new service offerings to existing /new clients. This can empower CA firms to stay ahead of the curve by enhancing capabilities to not only transform the way current services are provided but also provide IT enabled services in the areas of IT governance, risk, compliance assurance, consulting and implementation. For this transition to happen, it is important to determine how IT would be used by the enterprise and to invest in IT from a long-term perspective and after a well thought out assessment of the firm s needs. This will ensure that right technology and tools are available for use by the firm s staff. However, to develop their capabilities and technological infrastructure, the CA firms will have to do an assessment of the following: Identifying areas of specialization: It is important that the gaps between the current situation and the future needs are assessed and areas of specialisation planned. IT skills and competencies: The firm should inventorise its IT assets both in terms of skill levels and resources and plan on path required to reach its requirements. Assessing the existing and future applications: The evaluation of existing service delivery mechanism and other related procedures has to be carried out from the automation perspective. The firm should assess whether its processes and the software applications being used, are in tune with the future IT strategy or not. Determining type of technology infrastructure required: Identification of development areas of IT to ensure its appropriateness for future, is essential. Considering the technological changes, a firm should carefully assess its budgets and resource plans to serve both the present and future clients. 3

4 Module 1: Facilitating e-learning Service delivery: The CA firm has to assess the way it provides and delivers its services and the internal processes adopted by it, to develop new methodologies and ways to deliver services, to tune up with the capabilities of the implemented IT. IT culture and training: To develop and implement an IT solution, the firm not only requires investment in the technology but also has to ensure the automation of key processes and provide training to all the staff as per requirements, to imbibe the right IT culture. Right Migration Plan: Investing in the right technology solution is the most critical decision to make. Reviewing the current technology and application infrastructure and then identifying the gaps for future requirements and then implementing the migration plan makes it a very critical decision. Apart from adopting IT for their own office, CAs will have myriad challenges and opportunities in the area of Information Technology. Once CA has a good understanding of IT and related processes, they can provide assurance and consulting services to clients as well as other enterprises in many different sectors and industries. CAs can also help their clients in various areas such as: Meet the challenges in adoption of emerging technologies and computing models, like, cloud computing, BYOD, Social Media Usage, Big Data etc. Mitigation of risks in BPO-KPO and related areas. Use of BI using Data Warehouses, Data Mining, Data Marts, DSS, ESS, AI, etc. Adoption of ERP, E-Commerce etc. 1.3 IT Consulting and Assurance Services by CAs CAs could use global best practices for Consulting and Assurance in IT enabled services. COBIT 5 is one such framework which could be used to provide standardised approach to enable auditors to provide different types of IT enabled services. These processes have detailed management practices, input-output matrix, RACI (Responsible, Accountable, Consulted and Informed) chart and activities which can be used as a benchmark and customised for scoping assignments as required. The contents from each of these processes or a combination of selected processes as relevant can be referred and adapted for preparing the proposal. This could then become the starting point for discussing the scope and objectives of assurance/consulting assignment. Once the scope is agreed upon, the extracted contents from these processes can be customised and used as a benchmark for providing the required services. CAs using their cross functional and in depth knowledge can help an organisation implement Governance framework or help an organisation develop IT strategy for itself or provide assurance services in these areas Using COBIT for providing IT-enabled services CAs can use and adopt the best practices framework such as COBIT to provide various IT-enabled services. Some of the services in terms of scope and objectives derived from COBIT are given with sample scope, objectives and areas of review. These can be updated and expanded as per requirements of the assignment. 4

5 1. Set and maintain the IT Governance Framework Scope: Analyse and articulate the requirements for the governance of enterprise IT, and put in place and maintain effective enabling structures, principles, processes and practices, with clarity of responsibilities and authority to achieve the enterprise's mission, goals and objectives. Objective: Provide a consistent approach integrated and aligned with the enterprise governance approach. To ensure that IT---related decisions are made in line with the enterprise's strategies and objectives, IT---related processes are overseen effectively and transparently, compliance with legal and regulatory requirements are confirmed, and the governance requirements for board members are met. Areas of Review Evaluate design of enterprise governance of IT. Direct the Governance System. Monitor the Governance System. 2. Define IT Strategy Planning Scope: Provide a holistic view of the current IT environment, the future direction, and the initiatives required to migrate to the desired future environment, leveraging upon enterprise architecture building blocks and components to enable nimble, reliable and efficient response to strategic objectives. Objective: Align strategic IT plans with business objectives and clearly communicate the objectives and associated accountabilities so that these are understood by all, with the strategic options identified, structured and integrated with the business plans. Areas of review Understand enterprise direction. Assess the current environment, capabilities and performance. Define the target IT capabilities. Conduct a gap analysis. Define the strategic plan and road map. Communicate the IT strategy and direction. 3. Manage Risk Scope: Continually identify, assess and reduce IT related risks within levels of tolerance set by enterprise executive management. Objective: Integrate the management of IT related enterprise risk with overall enterprise risk management, and balance the costs and benefits of managing IT related enterprise risks. Areas of review 5

6 Module 1: Facilitating e-learning Collect data Analyse risk. Maintain a risk profile. Articulate risk. Define a risk management action portfolio Respond to risk. 4. Review IT Security Management Scope: Define, operate and monitor a system for information security management Objectives: Keep the impact and occurrence of information security incidents within the enterprise's risk appetite levels. Areas of review Establish and maintain ISMS (Information Security Management System). Define and manage an information security risk treatment plan. Maintain and review the ISMS. 5. Compliance with external requirements Scope: Evaluate that IT processes and IT- supported business processes are compliant with laws, regulations and contractual requirements. Obtain assurance that the requirements have been identified and complied with and that the IT compliance integrates with overall enterprise compliance. Objectives: Ensure that the enterprise is compliant with all applicable external requirements. Areas to review Identify external compliance requirements Optimise response to external requirements Confirm external compliance Obtain assurance to external compliance 6. Manage Continuity Scope: Establish and maintain a plan to enable the business and IT to respond to incidents and disruptions in order to continue operations of critical business processes and required IT services and maintain availability of information at a level acceptable to the enterprise. Objectives: Continue critical business operations and maintain availability of information at a level acceptable to the enterprise in the event of a significant disruption. Areas to review 6

7 Define the business continuity policy, objectives and scope. Maintain a continuity strategy. Develop and implement a business continuity response. Exercise, test and review the business continuity plan Review, maintain and improve the continuity plan. Conduct continuity plan training Manage backup arrangements Conduct post resumption review. 1.4 Business Process Outsourcing A Chartered Accountant could play a significant role in areas like outsourcing, cloud services, mobile computing, BPO/KPO, SLA, report validations etc. Let us understand the relevance of these in areas of BPO/KPO. Every modern organisation is dependent upon various operations that would enhance the productivity of the organisation. Outsourcing of various activities/services by an organisation takes advantage of core competences of service providers in these areas, so that the organisation can concentrate on its core business. Many of the IT enabled companies, a big chunk of which are Indian companies today provide a lot of outsourcing solutions/services. BPOs usually deal with fringe business activities such as customer care, finance and HR. The basic purpose is to cut on costs, and the functions outsourced do not have much value add to the organisation. Some of the activities which are outsourced are cheque clearing, ATM cash replenishment, account opening forms and Adhaar Card enrolment. Some of the IT Enabled business processes could be: Knowledge Processing Outsourcing Knowledge Process Outsourcing (KPO) is a subset of BPO. KPO involves outsourcing of core functions which may or may not give cost benefit to the organisation but helps in value addition. These processes are usually more specialized and knowledge based as compared to BPOs, and includes services related to R&D, Capital and insurance market services, legal services, biotechnology, animation and design, etc. KPO is application of specialized domain pertinent knowledge of a high level and is the high end of BPO. This may include, o Risk Management: The process includes services like monitoring the risk factor of various investments, looking after the returns, looking after at the viability of projects a company undertakes. It also includes making quarterly reports of investments and sending it to the company. o Claims Processing: The process includes checking of documents supporting the claim and storing online data of claims. o Consultation on accounting and tax implications of significant agreements and transactions helping in SEC Reporting, Mergers and Acquisitions, Private Placement Memorandum. 7

8 Module 1: Facilitating e-learning Medical Transcription Medical transcription is the process of converting voice-recorded reports into text. A medical transcriptionist listens to a recorded medical report. While listening, they type out the report. The medical reports are dictated (into Dictaphones) by physicians and other medical personnel. Clinical health systems and hospitals often reduce costs and increase efficiency by outsourcing tasks such as transcription and billing rather than assigning to doctors or physician who are overqualified for these duties. Outsourcing medical transcription gives the responsibility to more dedicated professionals (transcribers) in countries like India and other Asian countries, which leaves doctors to focus on core medical practice and procedures leading to better patient care. India incidentally has been a big beneficiary in this outsourced work, Medical transcribers and solution providers in India allow global healthcare practitioners, clinics and hospital deliver best results in medicine by performing transcription, editing / QA support through IT enabled processes Legal Transcription Legal transcription Similar to medical transcription but involves converting audio dictation by legal professionals and other recordings from legal cases into the printed word. Solicitors, attorneys and legal professionals use the services of legal transcriptionists to assist them in transcribing meetings memorandums, correspondence and court documents. Legal transcription is also used for recording court proceeding and interviews of witnesses. At a higher end, even preparation of legal cases are also outsourced which come in category of knowledge process outsourcing Data Entry and data processing Data entry in the area of accounting and many other business processes is increasingly being outsourced because of cost effectiveness. India is again a big data entry outsourcing hub, since we have a comprehensive range of quality of manpower with professionals in their desirable fields. This enables low cost data entry services with timeliness and high volume of data-entry operations possible along with data processing and analytics. Example of some these areas are outlined here. Taxation / Financial Accounting Outsourcing: India is known for having both cost as well as technical advantages when it comes to outsourcing IT services and processes. India has emerged as one of the most preferred country for outsourcing various services globally. These include supply chain management, sales, marketing, customer care, human resource besides financial services and E-Accounting services such as: o Accounts Payable: The process helps client to track payments originating across different locations and in different currencies. It helps to efficiently settle payment issues with vendors. o Accounts Receivable Management: The process includes managing as well as tracking the client's receivables in different locations. It also helps to manage the limit of credit extended by the client. 8

9 o Tax Processing: The process includes keeping proper tax data and auditing it and also maintenance of various documents and forms relating to taxation. o Cash Management: The process includes checking the cash flow statement of the company. It also includes checking the liquidity of the company, managing current assets like cash, inventories, bills payable and receivables etc IT Help-desk support IT help desk is a resource which provides a kind of single point of contact service to end users for all kinds of IT support. Their purpose is to trouble shoot problems and provide guidance on the technologies powering the business. For End User there are endless IT challenges to deal with on a daily basis. IT help desk facilitates all these challenges and provide a one point support for all of these. These days a help desk generally manages its requests for support through the use of software such as issue tracking systems. This software allows helpdesk to keep a track of users requests, sort user requests with the help of a unique number, and can frequently classify problems by user, computer program, or similar categories Application development Outsourcing Application Development allows the organisation to focus on its core competencies and at the same time take the benefit of core competency of vendor. Application Development services are also being catered by a large number of Indian companies, who are developing applications and solutions for a large number of overseas clients Risks and Controls of outsourced services Risks If we consider all the above areas of BPO, there are some common risks or security concerns: Privacy and Confidentiality- Disclosure of information related to overseas customer could lead to privacy and confidentiality issues which could create a liability. Attrition of staff-a high turnover rate has an indirect impact on the client organisation because it forces it to increase time spent on knowledge transfer and training new individuals. Legal Compliances- Vendors are liable for lot of compliances under several laws of India as well as of outsourcing country. For example medical transcription vendor liability has become important in light of HIPAA privacy and security regulations, which place an obligation on covered healthcare providers to ensure that their vendors safeguard confidentiality. Timeliness-In most of outsourcing Time is of essence and the service level agreements normally provide for Turn Around Time (TAT) which has to be adhered to. 9

10 Module 1: Facilitating e-learning Providing service in disaster- Most of SLAs also provide for clauses relating to provision of services in disaster also. Complying with SLAs-SLAs could provide for imposition of fee claw back in case of poor service. SLAs also provide for organisations to have in place a risk management program. Controls The security concerns can be mitigated by implemented appropriate controls. CAs as IS Auditors can understand the relevant security concerns and confirm whether appropriate controls have been implemented to address these risks, identify areas of control weaknesses and provide recommendations for risk mitigation. Access Controls- Have Information security management systems in place with secure practices like each employee required to have a secure password; Voice files and data files maintained in a secure data safe; Security during transmission using VPNs etc. HR Controls- Proper background checks, employee bonding Good Processes-Have documented processes and quality management systems Quality Assurance-Have quality assurance processes in place. Compliance Management- Have a system of legal compliances in place and regular review of the same. Contingency and Backup Plans- Have contingency and BCP in place 1.5 Using global best practices Compliance with external requirements: An Indian BPO service provider, located in India, is duty bound to comply with the various provisions of Indian laws which impact the outsourcing industry. There are numerous Indian legislations which Indian BPOs have to comply with apart from International legislations of the outsourcing country. For example: SOX or HIPAA of USA and PCI DSS or Basel Framework applicable to banking companies. CA can use the best guidance practice available in COBIT relating to: Process MEA03 Compliance with External requirements discussed earlier to ensure such regulatory compliances. COBIT also provides step by step approach for providing assurance of such areas. For example, in case of regulatory compliances, the steps could be: Identify external compliance requirements. Optimise response to external requirements. Confirm external compliance. Obtain assurance external compliance. 10

11 For Example, there are compliance requirements under the Information Technology Act which are applicable for any BPO-KPO. The specific areas of compliance which could be reviewed by the IS Auditor are: Section 43 A Section 67C Section 69B Section 70B Section 72A General Are various components of sensitive personal data or information vis-à-vis users/customers defined by the enterprise? Does the enterprise have a security policy? Is the security policy documented? Does the enterprise have an electronic record preservation and retention policy? Has the enterprise adopted/established appropriate policy, procedures and safeguards for monitoring and collecting traffic data or information? Are these documented? Does the enterprise have appropriate documented procedure to comply with the requests of CERT-IN regarding cyber security incidents? Does the enterprise have an adequate privacy policy? Whether the enterprise has provided for opt-in/opt-out clause in the privacy policy? Has the enterprise appointed designated officer/nodal officer/computer-in-charge to comply with the directions of competent authority/agency under various provisions of the Act? Whether details of such designated officer/nodal officer readily available online (at its website)? Managing Business Continuity Most of SLAs (Service Level Agreements) of BPOs provide for provision of services during disaster also. CAs as IS Auditors can use the best practices provided in the COBIT management process: DSS04 Manage Continuity to provide assurance in this area by assessing. Whether the organisation has a defined business continuity policy, with clear objectives and scope. Whether organisation maintains a continuity strategy. Whether the organisation has developed and implemented a business continuity response plan. 11

12 Module 1: Facilitating e-learning Whether the organisation exercises, tests and reviews the business continuity plan. Whether the organisation reviews, maintains and improves the continuity plan. Whether the organisation conducts continuity plan training. Whether the organisation manages backup arrangements. Whether the organisation conducts post resumption reviews. Apart from providing assurance services, a Chartered Accountant could also help a BOP KPO to manage continuity by providing consulting in the above areas. 1.6 Summary IT is a big enabler and a CA should understand IT for use in their own practice as well as for helping their clients implement and develop IT enables processes. CAs can use best practices framework such as COBIT for providing Assurance and Consulting services. IT has been a big enabling factor in BPO in medical transcription, legal transcription and data entry processing areas. There are, however, risks in these areas which have to be mitigated. CAs because of their understanding of IT risks, security and controls can provide assurance or consulting on mitigation of these risks and thus provide value addition to their clients. 1.7 References Questions 1. Why do Chartered Accountants need to embrace IT? A. IT is a trendy thing B. IT is a buzzword C. IT is a key enabler in Enterprises D. IT is interesting 2. Which of the following is an advantage of Outsourced services? A. Privacy and confidentiality B. Attrition of staff C. Cost cutting 12

13 D. Legal compliances 3. While auditing an Outsourced agreement, an IS auditor would be most concerned with: A. The commercial terms of outsourcing arrangement B. The continuity of operations in case of failure of service provider C. The location from which services are provided D. The loss of in-house IT competencies 4. Embracing IT will enable Auditors to provide Consulting and Assurance services in the areas of: A. IT Risk Management B. IT Strategic Planning C. IT Security Management D. All the above. 5. An IS Auditor auditing the on-line transaction processing system of an organization outsourced to a third party will be most concerned that A. Transactions are authorized by the outsourced agency. B. Transaction log is not printed on daily basis. C. Organization does not have adequate trained IT personnel. D. The third party is providing outsourced services to other clients also. 1.9 Answers 1 C 2 C 3 B 4 D 5 A 13

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES... Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation

More information

Security and Privacy in Cloud Computing

Security and Privacy in Cloud Computing Security and Privacy in Cloud Computing - Study Report Sai Lakshmi General Manager Enterprise Security Solutions 2 Agenda Background & Objective Current Scenario & Future of Cloud Computing Challenges

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

Chapter 3: Audit of business Continuity plan... 3 Learning Objectives... 3 3.1 Introduction... 3 3.2 Steps of BCP Process... 3 3.2.

Chapter 3: Audit of business Continuity plan... 3 Learning Objectives... 3 3.1 Introduction... 3 3.2 Steps of BCP Process... 3 3.2. Chapter 3: Audit of business Continuity plan... 3 Learning Objectives... 3 3.1 Introduction... 3 3.2 Steps of BCP Process... 3 3.2.1 Step 1: Identifying the mission or business-critical functions... 4

More information

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with

More information

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

Chayuth Singtongthumrongkul

Chayuth Singtongthumrongkul IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional

More information

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers How to Effectively Collaborate with Cloud Providers Agenda Overview of Topics Covered Agenda Evolution of the Cloud Comparison of Private vs. Public Clouds Other Regulatory Frameworks Similar to HIPAA

More information

Overview of Topics Covered

Overview of Topics Covered How to Effectively Collaborate with Cloud Providers Agenda Overview of Topics Covered Agenda Evolution of the Cloud Comparison of Private vs. Public Clouds Other Regulatory Frameworks Similar to HIPAA

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 Debbie Lew Agenda Review what is IT governance Review what is IT risk management A discussion of key IT risks to be aware of Page 2

More information

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting

More information

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

Information Technology Act & Data Protection. Vakul Sharma. Vakul Sharma. All Rights Reserved, 2010

Information Technology Act & Data Protection. Vakul Sharma. Vakul Sharma. All Rights Reserved, 2010 Information Technology Act & Data Protection Vakul Sharma Vakul Sharma. All Rights Reserved, 2010 When the Information Technology Act, 2000 was introduced it was the first technology legislation introduced

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald

Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald Federal CIO: Cloud Selection Toolkit Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald Agenda Project Introduction Agency Cloud Challenges Toolkit Solution Overview Step 1:

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

JOE MOROLONG LOCAL MUNICIPALITY IT GOVERNANCE FRAMEWORK

JOE MOROLONG LOCAL MUNICIPALITY IT GOVERNANCE FRAMEWORK JOE MOROLONG LOCAL MUNICIPALITY IT GOVERNANCE FRAMEWORK INDEX 1 Introduction... 2 Contextual background... 2.1 The CobiT 5 framework (2012)... 2.2 The ISO 27000 series (2005, 2011)... 2.3 The Risk IT

More information

Vendor Management. Outsourcing Technology Services

Vendor Management. Outsourcing Technology Services Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Cloud Governance is more than Security. Cloud Law or Legal Cloud?

Cloud Governance is more than Security. Cloud Law or Legal Cloud? more than Security Cloud Law or Legal Cloud? more than Security Governance principles more than Security Governance principles 1. Context definition Which organisation/ structure? Which roles and responsibilities?

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Whitepaper: 7 Steps to Developing a Cloud Security Plan Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for

More information

AMP Capital Investors Limited ABN 59 001 777 591 AFSL 232497. AMP Capital Derivatives Risk Statement

AMP Capital Investors Limited ABN 59 001 777 591 AFSL 232497. AMP Capital Derivatives Risk Statement AMP Capital Investors Limited ABN 59 001 777 591 AFSL 232497 AMP Capital Derivatives Risk Statement April 2015 Table of Contents 1. Responsible party... 3 2. Objective of the DRS... 3 3. Definition of

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

AN OVERVIEW OF INFORMATION SECURITY STANDARDS AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

HIPAA COMPLIANCE AND

HIPAA COMPLIANCE AND INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery

More information

CloudCheck Compliance Certification Program

CloudCheck Compliance Certification Program CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or

More information

Security in the Cloud: Visibility & Control of your Cloud Service Providers

Security in the Cloud: Visibility & Control of your Cloud Service Providers Whitepaper: Security in the Cloud Security in the Cloud: Visibility & Control of your Cloud Service Providers Date: 11 Apr 2012 Doc Ref: SOS-WP-CSP-0412A Author: Pierre Tagle Ph.D., Prashant Haldankar,

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

ISMS Implementation Guide

ISMS Implementation Guide atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...

More information

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Cloud Computing: Contracting and Compliance Issues for In-House Counsel International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

HIPAA Compliance and the Protection of Patient Health Information

HIPAA Compliance and the Protection of Patient Health Information HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

Module 6. Business Application Software Audit

Module 6. Business Application Software Audit Module 6 Business Application Software Audit MODULE 6: BUSINESS APPLICATION SOFTWARE AUDIT Table of Contents MODULE 6: BUSINESS APPLICATION SOFTWARE AUDIT... 1 SECTION 1: OVERVIEW... 9 MODULE 6: BUSINESS

More information

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI). Overview Certified in Data Protection (CDP) is a comprehensive global training and certification program which leverages international security standards and privacy laws to teach candidates on how to

More information

Information Security Managing The Risk

Information Security Managing The Risk Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

WEST COAST DISTRICT MUNICIPALITY IT GOVERNANCE FRAMEWORK IT CHARTER

WEST COAST DISTRICT MUNICIPALITY IT GOVERNANCE FRAMEWORK IT CHARTER WEST COAST DISTRICT MUNICIPALITY IT GOVERNANCE FRAMEWORK IT CHARTER MAY 2012 INDEX 1 Introduction... 1 2 Contextual background... 3 2.1 The CobiT 5 framework (2012)... 4 2.2 The ISO 27000 series (2005,

More information

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

What IT Auditors Need to Know About Secure Shell. SSH Communications Security What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

Sound Practices for the Management of Operational Risk

Sound Practices for the Management of Operational Risk 1 Sound Practices for the Management of Operational Risk Authority 1.1 Section 316 (4) of the International Business Corporations Act (IBC Act) requires the Commission to take any necessary action required

More information

Revised October 2013

Revised October 2013 Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Vendor Management Best Practices

Vendor Management Best Practices 23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

Outsourcing and Information Security

Outsourcing and Information Security IBM Global Technology Services Outsourcing and Information Security Preparation is the Key However ultimately accountability cannot be outsourced February 2009 page 2 1. Introduction 3 1.1 Reason for outsourcing

More information

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements

More information

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

May 2010. Cloud Vendor Charter. Vendor Version Not for distribution to customers

May 2010. Cloud Vendor Charter. Vendor Version Not for distribution to customers May 2010 Cloud Vendor Charter Vendor Version Not for distribution to customers Disclaimer This specification is published without responsibility on the part of BASDA Ltd or the various contributors, sponsors

More information

Aligning IT with Business Needs (Why Right-sourcing works)

Aligning IT with Business Needs (Why Right-sourcing works) Aligning IT with Business Needs (Why Right-sourcing works) Mike Ryan Aligning IT with Business Needs (Why Right-sourcing works) Mike Ryan Challanges running IT Keeping IT Running Value Costs Mastering

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT JANUARY 2008 GUIDELINE ON BUSINESS CONTINUITY GUIDELINE CBK/PG/14

More information

ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS)

ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS) ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS) TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIMS OF THE POLICY...

More information

Cyberprivacy and Cybersecurity for Health Data

Cyberprivacy and Cybersecurity for Health Data Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies

More information

Fly. Wealth and Retirement IT Hosting

Fly. Wealth and Retirement IT Hosting Fly. Wealth and Retirement IT Hosting 02 SunGard Hedge 360 SunGard Wealth and Retirement IT Hosting SunGard IT Hosting 01 241bn The global cloud computing market will reach $241 billion in 2020. Achieve

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

How To Write A Pca Dss Compliance Solution For Gameplan Group Ltd

How To Write A Pca Dss Compliance Solution For Gameplan Group Ltd PCI Compliance reporting solution This document describes GamePlan s PCI DSS compliance solution and its ability to assist organisations to be compliant with the regulatory requirements of the Payment

More information

RISK MANAGEMENT REPORT (for the Financial Year Ended 31 March 2012)

RISK MANAGEMENT REPORT (for the Financial Year Ended 31 March 2012) RISK MANAGEMENT REPORT (for the Financial Year Ended 31 March 2012) Integrated Risk Management Framework The Group s Integrated Risk Management Framework (IRMF) sets the fundamental elements to manage

More information

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand

More information

Firewall Administration and Management

Firewall Administration and Management Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall

More information

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Cloud Assurance: Ensuring Security and Compliance for your IT Environment Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware

More information

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland Audit Report Effectiveness of IT Controls at the Global Fund Follow-up report GF-OIG-15-20b Geneva, Switzerland Table of Contents I. Background and scope... 3 II. Executive Summary... 4 III. Status of

More information

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010

More information

Information Security Management System for Microsoft s Cloud Infrastructure

Information Security Management System for Microsoft s Cloud Infrastructure Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System

More information

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk

More information

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of

More information

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

M2TD Consulting Company. Profile 2014. M2TD Consulting 2014

M2TD Consulting Company. Profile 2014. M2TD Consulting 2014 M2TD Consulting Company Profile 2014 About M2TD Consulting M2TD is a level 1 BBBEE 100% black owned corporation with 61% black women ownership pioneering the Government strategy to empower women into leadership

More information

AlienVault for Regulatory Compliance

AlienVault for Regulatory Compliance AlienVault for Regulatory Compliance Overview of Regulatory Compliance in Information Security As computers and networks have become more important in society they and the information they contain have

More information

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security d.prince@lancaster.ac.uk

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security d.prince@lancaster.ac.uk Cyber Security and Cloud Computing Dr Daniel Prince Course Director MSc in Cyber Security d.prince@lancaster.ac.uk Scope of Today SME Attractors for Cloud Switching to the Cloud Public Private Hybrid Big

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased

More information

Design of Database Security Policy In Enterprise Systems

Design of Database Security Policy In Enterprise Systems Design of Database Security Policy In Enterprise Systems by Krishna R Singitam Database Architect Page 1 of 10 Table of Contents 1. Abstract... 3 2. Introduction... 3 2.1. Understanding the Necessity of

More information

My Docs Online HIPAA Compliance

My Docs Online HIPAA Compliance My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several

More information

10 Best-Selling Modules For Home Information Technology Professionals

10 Best-Selling Modules For Home Information Technology Professionals Integriertes Risk und Compliance Management als Elemente einer umfassenden IT-Governance Strategie Ing. Martin Pscheidl, MBA, MSc cert. IT Service Manager Manager, Technical Sales CA Software Österreich

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

CA XCOM Data Transport- Secure, Reliable File Transfer for Heterogeneous Environments

CA XCOM Data Transport- Secure, Reliable File Transfer for Heterogeneous Environments Research Report CA XCOM Data Transport- Secure, Reliable File Transfer for Heterogeneous Introduction File transfer sounds simple, right? Sending a file from here to there is not something that information

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

GUIDELINES ON RISK MANAGEMENT AND INTERNAL CONTROLS FOR INSURANCE AND REINSURANCE COMPANIES

GUIDELINES ON RISK MANAGEMENT AND INTERNAL CONTROLS FOR INSURANCE AND REINSURANCE COMPANIES 20 th February, 2013 To Insurance Companies Reinsurance Companies GUIDELINES ON RISK MANAGEMENT AND INTERNAL CONTROLS FOR INSURANCE AND REINSURANCE COMPANIES These guidelines on Risk Management and Internal

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information