IT Audit at UBS - a Fully Integrated Approach
|
|
|
- Wendy Carson
- 10 years ago
- Views:
Transcription
1 ISACA CH After Hour Seminary Public IT Audit at UBS - a Fully Integrated Approach Gerd Lierhaus Group Internal Audit, IT WM&SB January 2011
2 Table of Contents 1. UBS Group Internal Audit 2. Former IT Audit Approach 3. UBS Group Internal Audit Process 4. Integrated IT Audit Approach Example 1: Change Management Example 2: Access Control 5. Benefits and challenges 6. Questions & Answers 1
3 Section 1 UBS Group Internal Audit
4 Locations of Group Internal Audit Located in nine countries Stamford New York Weehawken London Luxembourg Frankfurt Switzerland (5 locations) Tokyo Hong Kong Singapore Sydney Americas 26% Asia Pacific 13% Headcount as of 1 March 2010: FTE / 308 people Europe CH 23% 38% 3
5 Audit involvement of IT WM&SB in 2011 (planning) IT led audits Board of Directors (BoD): 10 of 13 in total; 1 lead Cycle audits: 6 of 28; 4 leads Business led audits WM&SB:12 EMEA: 9 Corcorate Center: 6 4
6 Section 2 Former IT Audit Approach
7 Overview Pure IT audits Focused on IT infrastructure Very few IT process audits in the application area Integrated audits: covered IT Control Areas 1. IT Strategy and Management 2. System Processing and Business Processes 3. System Security 4. IT System Operations 5. Business Contingency Planning 6
8 Characteristics of this approach Relatively independent planning of the major IT part Difficult scoping for the general IT controls (GITC) Relatively independent fieldwork conduction No interconnection for the GITC part IT owned working paper Resulting in relatively independent IT issues on general IT controls In case of issues with a general IT process Risk of the issue not necessarily in the (business) focus of the audit Addressees somewhere in the IT, maybe not even informed beforehand Weaknesses Less acceptance by the business audit as 'added value' was not very high Producing 'always' the same type of IT issues, e.g. on access control Additional IT review cycles extending reporting periods Shift of scope from business to IT Conflicts in the rating of issues respectively with the overall audit rating 7
9 Former Approach - Audit Process Business Begins IT presents flow and testing at the end of WBS Planning + Discussion Opportunity Walkthrough / WBS Opportunity Whiteboard IT Ends IT Begins Testing Opportunity Reporting Opportunity Business Ends IT Reviews IT RCMs Workpaper Opportunity Biz Reviews Biz RCMs 8
10 Section 3 UBS Group Internal Audit Process
11 Risk-based audit execution with the "Thin Red Line" concept The "Thin Red Line" is a concept of maintaining focus on the most important risks Clearly determined and communicated audit objectives 10
12 Risk-based audit testing approach 11
13 Section 4 Integrated IT Audit Approach
14 Integrated Approach - Audit Process Business and IT begins Begin research in advance of fieldwork - start to prepare for future meetings (proactive vs. reactive) Attend initial kick off meetings with Business Manager (RA) Attend relevant business walkthroughs to understand the F2B flow (IT impact) Demo and obtain QA access to the applications of focus At WBS, IT presents F2B flow and testing approach via business objective Whiteboard Enhanced AF & Data Testing Engage with the RA and draft MLs in relation to their business context with clear impact / risk statements. Work with the RA to provide IT relevant context for the ES and Supplementary Business Information (SBI). Business / IT Ends Business Reviews Business & IT RCMs (and Work papers as necessary) 13
15 The IT integrated audit approach - principles of operation IT audit scope driven by the key audit objectives, whether these are business or technology related. Planning for integrated audits is done jointly, with IT and business auditors attending meetings with key business and Group Technology management. Walkthroughs are performed jointly to understand all aspects of the business and process flow. Whiteboards based on common process flow charts that reflect business and technology risks, aligned with the key audit objectives. IT fieldwork driven by key audit risks and focus on automated application controls and functionality assess fit for purpose. Enhanced application functionality testing - CAATS, real system test scenarios, and review of logic (system, reporting, or exception handing) IT work papers and RCM components included under the business RCM sections: no separate IT application working papers Joint assessment of issues to reflect impact holistically: IT involvement in materiality assessment and drafting of the audit report. 14
16 Example 1: Change Management in an IT process audit Assess the control effectiveness of the whole process Determine Key Risks in the process Evaluate the design of Key Controls Assess the operational effectiveness of these key controls in a sample testing Sample within the IT function Sample of IT projects providing business functionality Test conduction RSO UAT PSO Requirements engineering Make or buy the software Integration testing Deploy software into production Rollback procedures Test approach Test data management Test Plan Code management Segregation of duties 15
17 Example 1: Change Management in an integrated audit Assess the operational effectiveness of business related Key Controls 1. Requirements Sign-off (RSO): Involvement of business as a key stakeholder 2. Production Sign-off (PSO): Approval provided by the business representative IT audit: including appropriate other necessary stakeholders 3. Suitable Test Plan covering all business risks IT audit: including necessary IT specific tests 4. Effective User Acceptance Testing (UAT) Integrated approach All four key controls require business understanding Effective audit testing only with a close cooperation between IT and business audit Business audit knows the responsibilities and business requirements and expected results IT audit knows the process and tools; and IT specific responsibilities and requirements 16
18 Example 2: Access Control in an IT process audit Assess the control effectiveness of the whole process Determine Key Risks in the process Evaluate the design of Key Controls Assess the operational effectiveness of these key controls in a sample testing Sample within the IT function Sample of Business applications 17
19 Example 2: Access Control in an integrated audit Assess the operational effectiveness of business related Key Controls 1. Request assessment and approval: Appropriateness of approver chain 2. Periodical review: Actually conducted 3. Authorization concept: a) Reflecting business needs b) IT audit, in the management system: Access rights for administration roles c) IT audit, on application level: Actual implementation Integrated approach All three key controls require business understanding Controls 1, 2 and 3a can be conducted by business without IT Control 3: parts b) and especially c) require IT audit know-how and skills but a control weakness here has a direct business impact 18
20 Section 5 Benefits and challenges
21 Benefits IT general controls mostly covered in themed reviews where there is more opportunity to assess holistically at the entity level and determine materiality Reduced IT general controls testing during integrated audits in order to maximize the application functionality testing approach allow flexibility to test IT general controls if part of key audit objectives and risks. More communication between teams so that audit scope, objectives and responsibilities are transparent to the entire audit team involved in an integrated audit. Focus on the business process risks to determine application and IT testing Increased joint testing and facilitate improved understanding of the processing flows, whether business or IT. Increased use of CAATS, data mining and automated testing techniques. Ideally: no IT issues but business issues on underlying IT controls 20
22 Challenges IT issue is NOT a weakness of operational effectiveness of the respective application but a design issue 1. In the related IT process; or 2. In a broader business context Examples A PSO is not only not effectively conducted but the respective unit is not using the (audited) standard Change Management process No effectively designed PSO; e.g. in a small international unit Access rights are not only not effectively assigned for the application in scope but the authorization concept for a whole bunch of related applications is not effectively designed Consequences Assessment of a process necessary which is not in the scope of the audit Decision to be made whether Scope needs to be extended to address the full issue Broader issue is handled separately 21
23 Audit Planning Activities Instrument to deal with "Emerging risks": Anticipatory Auditing Targeted review New (unplanned) audit 22
24 Questions & Answers
Solutions. Expertly addressing your software needs.
Solutions Expertly addressing your software needs. SIX Financial Information Solutions combines the perfect interplay of data, processes and software to develop customized solutions and services tailored
Prof. Dr. Nick Gehrke Alexander Rühle
Prof. Dr. Nick Gehrke Alexander Rühle AGENDA 15:00 16:00 Session 1 1. Introducing Process Mining 2. Case #1: Financial Process Mining 3. Introducing the profiling methodology 4. Case #2: Financial Process
HYBRID CLOUD Why is it important & how do you manage it?
HYBRID CLOUD Why is it important & how do you manage it? TECTONIC SHIFT IN IT 5 How disruptive can the cloud be? 6 7 8 $223B $1B Total Valuation 234 $USD $10B FinTech Innovation 9 Platform to Innovate
AGILE SOFTWARE TESTING
AGILE SOFTWARE TESTING Business environments continue to rapidly evolve, leaving many IT organizations struggling to keep up. This need for speed has led to an increased interest in the Agile software
Equinix Cloud Exchange Datacenter Forum. Stephane Buchs, IMS 17 th September 2014
Equinix Cloud Exchange Datacenter Forum Stephane Buchs, IMS 17 th September 2014 Largest carrier-neutral data center provider Market Challenge Expanding addressable market; ensuring consistent performance
Predictive Metrics for B2B Trade Credit
AvantGard Receivables Predictive Metrics for B2B Trade Credit Managing credit and collections cost-effectively is critical, especially in today s economic climate. Companies are dealing with resource constraints
Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology
Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology Key findings from the survey include: while audit software tools have been available
Frontier International
International research insights from Frontier Advisors Real Assets Research Team Issue 15, June 2015 Frontier regularly conducts international research trips to observe and understand more about international
Designing NetSuite ERP Application Security Leveraging Fastpath Assure Access Monitoring Solutions
Designing NetSuite ERP Application Security Leveraging Fastpath Assure Access Monitoring Solutions Introduction Defining NetSuite security requirements in the early phase of an implementation, upgrade
Audit of the Policy on Internal Control Implementation
Audit of the Policy on Internal Control Implementation Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada February 18, 2013 1 TABLE OF
AVANTGARD Hosting and Managed Services
AVANTGARD Hosting and Managed Services AVANTGARD HOSTING AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and industry leading
SFC proposes amendments to regulation of automated trading services guidelines
SFC proposes amendments to regulation of automated trading services guidelines 1 Briefing note December 2015 SFC proposes amendments to regulation of automated trading services guidelines On 20 November
Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010
Dallas IIA Chapter / ISACA N. Texas Chapter Auditing Tuesday, October Project 20, 2009 Management Controls January 7, 2010 Table of Contents Contents Page # Project Management Office Overview 3 Aligning
The supporting information for audit/engagement procedures is part of the required Audit/Engagement Documentation (See Section 240.00).
LAST REVISED: DECEMBER 31, 2012 PAGE 1 OF 7 AUDIT/ENGAGEMENT PROGRAM DEFINITION Set of specific audit/engagement procedures that are designed to meet identified audit/engagement objectives, reduce AR,
RSA ARCHER AUDIT MANAGEMENT
RSA ARCHER AUDIT MANAGEMENT Solution Overview INRODUCTION AT A GLANCE Align audit plans with your organization s risk profile and business objectives Manage audit planning, prioritization, staffing, procedures
AMBIT ISLAMIC BANKING. Ambit Risk Management & Compliance
AMBIT ISLAMIC BANKING Ambit Risk Management & Compliance AMBIT RISK MANAGEMENT & COMPLIANCE FOR ISLAMIC BANKING With Islamic banking growing at rapid rates, a new and highly competitive playing field has
Sony Internal Audit Presentation to ISACA Tokyo Chapter
Sony Internal Audit Presentation to ISACA Tokyo Chapter Tuesday, March 12, 2013 Internal Audit Department Sony Corporation Internal Audit Agenda 1 Overview of Sony Corporation Overview of Sony Corporation
Business Continuity Management
GENERALLY ACCESSIBLE Business Continuity Management Field Report from an Audit Point of View ISACA Swiss Chapter - After Hour Seminar 28 August 2006 - Urs Voigt - Group Internal Audit Disasters Happen
Imperative. Tim Mohn Industry Principal Sparta Systems
Enterprise Level ChangeControl: Control: A Life Science Business Imperative Tim Mohn Industry Principal Sparta Systems Agenda GlobalChange Control: An Overview Benefits and Challenges Change Control as
J.P. Morgan Global Liquidity. Managed Reserves Fund Operation Services Guide. JPM Managed Reserves Fund
J.P. Morgan Global Liquidity Managed Reserves Fund Operation Services Guide JPM Managed Reserves Fund Insight Process =use Results For+institutional only Strictly not for public distribution Welcome to
AVANTGARD Private Cloud and Managed Services
AVANTGARD Private Cloud and Managed Services AVANTGARD PRIVATE CLOUD AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and
Market Data Feed. Go with the flow.
Market Data Feed Go with the flow. The Market Data Feed (MDF) is a high performance, real-time market data service with customizable data selection. This competitive solution is a key source of financial
CONSULTING SERVICES Business & technology consulting and managed services
CONSULTING SERVICES Business & technology consulting and managed services SUNGARD CONSULTING SERVICES Leveraging global delivery to help drive operational efficiency while reducing IT cost Companies face
Department of Audit and Compliance. Quality Self-Assessment
Department of Audit and Compliance Quality Self-Assessment November 2014 CONTENTS EXECUTIVE SUMMARY... 2 PURPOSE OF SELF-ASSESSMENT... 4 SELF-ASSESSMENT SCOPE OF WORK... 4 RESULTS OF SELF-ASSESSMENT WORK...
Moving Forward with IT Governance and COBIT
Moving Forward with IT Governance and COBIT Los Angeles ISACA COBIT User Group Tuesday 27, March 2007 IT GRC Questions from the CIO Today s discussion focuses on the typical challenges facing the CIO around
Introducing a Capacity Management Maturity Model
Introducing a Capacity Management Maturity Model Business units are demanding more services and greater reliability from IT, while also trying to constrain, or even reduce, budgets. In those rare cases
END-TO-END BANKING SOLUTIONS
END-TO-END BANKING SOLUTIONS AND SERVICES PARTNERING WITH THAKRAL ONE BI AND ANALYTICS MOVING FROM BIG DATA TO REAL DATA Increased pressures from regulatory compliance, rapid global economic changes, and
Organizing for Sourcing Excellence Insights for impact on profitability and revenue.
Organizing for Sourcing Excellence Insights for impact on profitability and revenue. The Transformation of Procurement Strategic decision making opportunities that can have immediate impact on profitability
Applying Risk Assessment to Your Audit Plan Break-out Session T3, Tuesday, October 26 2:00-2:50pm
Applying Risk Assessment to Your Audit Plan Break-out Session T3, Tuesday, October 26 2:00-2:50pm Mike Brown Senior Vice President, Corporate Audit State Street Corporation Rich Reynolds Partner PricewaterhouseCoopers
METRICS TO HELP IMPROVE YOUR WORKFORCE PRODUCTIVITY
METRICS TO HELP IMPROVE YOUR WORKFORCE PRODUCTIVITY KEY RESULTS FROM MERCER 2013-2014 WORKFORCE METRICS DATABASE Tom Jacob, Mercer Ephraim Spehrer-Patrick, Mercer Milan Taylor, Mercer TODAY S PRESENTERS
Module 2 IS Assurance Services
Module 2 IS Assurance Services Chapter 2: IS Audit In Phases Phase 2: Part: 2 of 3 CA A.Rafeq 1 Chapter 2: Agenda Chapter 2: IS Audit in Phases Phase1: Plan Phase 2: Execute Phase 3: Report 2 Phase 2:
Linarch. April 2011. Sample Report - Global Ethernet Exchange Services Market
Linarch April 2011 Sample Report - Global Ethernet Exchange Services Market 2010-2014 Table of Contents 1. Introduction... 3 2. Market Size, Outlook and Segmentation... 4 3. Vendor Landscape... 8 3.1 Leading
Internal Financial Controls
Internal Financial Controls Who All Are Responsible? 3 What is Internal Financial Control (IFC)? 5 What is Internal financial controls over financial reporting (ICFR)? Internal Controls Global Perspective
COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG
COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG Information on a Course offered by Division of Business Course Title: (English) Accounting Information Systems (Chinese) Course Code: BUS20282
The Lawson Customer Relationship Management Solution
The Lawson Customer Relationship Management Solution Provides improved return on trade promotions and maximizes the efficacy of your sales organization Are you making the most of your customer relationships?
Continuous Controls Monitoring ISACA, Houston Chapter. August 17, 2006
Continuous Controls Monitoring ISACA, Houston Chapter August 17, 2006 Purpose of Discussion Understand impact of Continuous Controls Monitoring (CCM) on the Information Systems Audit community To perform
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Changing data needs from a life cycle perspective in the context of ISO 55000
Changing data needs from a life cycle perspective in the context of ISO 55000 Mr. Ed de Vroedt and Mr. Peter Hoving Affiliation: UMS Group Europe; [email protected], +316 1026 6162 ABSTRACT This paper
2014 Global Asset Management Survey
2014 Global Asset Management Survey It is always wise to look ahead, but difficult to look further than you can see. Winston Churchill A survey carried out globally by Linedata. Introduction It is always
Open Source Business Rules Management System Enables Active Decisions
JBoss Enterprise BRMS Open Source Business Rules Management System Enables Active Decisions What is it? JBoss Enterprise BRMS provides an open source business rules management system that enables active
THE VALUE OF TRUSTED DATA. How Asset Managers Use Technology To Turn Data Into Actionable Insight
THE VALUE OF TRUSTED DATA How Asset Managers Use Technology To Turn Data Into Actionable Insight THE VALUE OF TRUSTED DATA HOW ASSET MANAGERS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT Faced with
Basware Invoice Automation Demonstration
Basware Invoice Automation Demonstration Better Buying, Better Selling, Connected Commerce with Basware Thomas Noe Presales Engineer Mobile: 917-207-7689 Email: [email protected] Rich Roberts Account
Implementing Good Corporate Governance in Banks
TRAINING PROGRAMME In questions of power, let no more be heard of confidence in man, but bind him down from mischief by the chains of the constitution. Thomas Jefferson Implementing Good Corporate Governance
Enterprise Level Change Control: A Life Science Business Imperative. Presented by: Carl Ning Solutions Delivery Manager Sparta Systems
Enterprise Level Change Control: A Life Science Business Imperative Presented by: Carl Ning Solutions Delivery Manager Sparta Systems Agenda Global Change Control: An Overview Benefits and Challenges Change
A NEW GENERATION OF REFERENCE DATA SERVICES. From Interactive Data, The Reference Data Powerhouse
A NEW GENERATION OF REFERENCE DATA SERVICES From Interactive Data, The Reference Data Powerhouse SM Success in today s markets demands constant innovation: expansion across asset classes and geographies,
How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks
Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks 2ο InfoCom Security Conference Anestis Demopoulos, Vice President ISACA Athens Chapter, & Senior Manager, Advisory Services, Ernst
EXPERTISE NEEDED EXPERTISE FOUND
Our global capabilities EXPERTISE NEEDED EXPERTISE FOUND www.nesglobaltalent.com Our global capabilities ManagedServices We offer a range of bespoke managed services, which enable you to outsource part
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Cloud PPM for Project-centric Service Organizations
Cloud PPM for Project-centric Service Organizations Heidi Zee, Managing Partner & CEO, Frontera Consulting Kevin Beyer, Managing Partner of Global Fusion Services, Frontera Consulting Fiona Purves, Strategy
SRM How to maximize vendor value and opportunity
Operations Excellence: Supplier Relationship Management SRM How to maximize vendor value and opportunity 27th November 2014 Zagreb DDr. Michael Strohmer, Partner, A.T. Kearney [email protected]
opinion piece IT Security and Compliance: They can Live Happily Ever After
opinion piece IT Security and Compliance: They can Live Happily Ever After Contents Pitfalls, misconceptions and mistakes 01 It s not all doom and gloom 01 Take the right steps towards compliance and IT
StruxureWare. How to reconcile efficiency and availability in a virtualized data center. for data centers
How to reconcile efficiency and availability in a virtualized data center TM StruxureWare for data centers Soeren Brogaard Jensen 27th of October 2011 Vilnius, Litauen Schneider Electric the global specialist
Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Frequently Asked Questions
Guide to the Sarbanes-Oxley Act: IT Risks and Controls Frequently Asked Questions Table of Contents Page No. Introduction.......................................................................1 Overall
Fast, scalable and CAPEX-free servers in Pacnet's advanced data centers PACNET HARDWARE-AS-A-SERVICE
Products and Services DATA CENTER SERVICES Pacnet HaaS Fast, scalable and CAPEX-free servers in Pacnet's advanced data centers Pacnet Hardware-as-a-Service (HaaS) allows you to deploy multiple fixed-configuration
Strategic Workforce Planning
Strategic Workforce Planning Jeff Lindeman, SPHR Chair, ACI-NA Human Resources Committee Director, Human Resources San Diego County Regional Airport Authority Agenda What is strategic anyway? Human Capital
Planning an ERP Implementation Project @ Small and Medium Enterprises
Planning an ERP Implementation Project @ Small and Medium Enterprises 27 th Regional WIRC Conference 31 August 2012 Table of Contents What is an SME and ERP Why an ERP for the SME segment Assessing the
Preparing for the Convergence of Risk Management & Business Continuity
Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
Guide to Chinese Share Classes v1.1
Guide to Chinese Share Classes v1.1 ftserussell.com October 2015 Guide to Chinese Share Classes China incorporated companies listed in the People s Republic of China (PRC) can issue different classes of
Market leading multi-bank/multi-asset trading platform, independent from market maker banks
360T 360T is the leading global provider of web-based trading technology. This best-in-class trading technology enables clients to trade OTC financial instruments, particularly foreign exchange (FX) and
AVANTGARD RECEIVABLES. Predictive Metrics for Healthcare / Hospitals
AVANTGARD RECEIVABLES Predictive Metrics for Healthcare / Hospitals PREDICTIVE METRICS FOR HEALTHCARE / HOSPITALS In the United States, hospitals, physician groups, labs, clinics and other healthcare providers
RMBC s Governance Framework for Significant Partnerships
RMBC s Governance Framework for Significant Partnerships 1.0 Introduction 1.1 Corporate governance describes how organisations direct and control what they do. For a council, this includes how it relates
A BearingPoint Accelerator
> GRC A BearingPoint Accelerator Working closely with the client, we deliver a rigorous and effective integrated GRC (Governance, Risk and Compliance) solution one that is not only right for the client,
Munich Re s growth strategy in emerging markets
Munich Re International Health Munich Re s growth strategy in emerging markets Monika Nothhelfer Abu Dhabi 13 October 2008 MR Group has identified the global health markets as a major growth driver Global
Template K Implementation Requirements Instructions for RFP Response RFP #
Template K Implementation Requirements Instructions for RFP Response Table of Contents 1.0 Project Management Approach... 3 1.1 Program and Project Management... 3 1.2 Change Management Plan... 3 1.3 Relationship
Building a Global Business Architecture Function Global Life Business Division, Zurich Insurance Services
Building a Global Business Architecture Function Global Life Business Division, Zurich Insurance Services Author: Tim Blaxall, Chief Business Architect, Global Life Version 1.0 June 2013 Global Life Architecture
Introduction. What is ITIL? Automation Centre. Tracker Suite and ITIL
1 Introduction The Information Technology Infrastructure Library (ITIL) aims to improve the management of IT services within the organization, for lowered costs, improved efficiency and productivity. But
Q3 FY16 Total Revenue up by 24% YoY to Rs 672 million
Q3 FY16 Total Revenue up by 24% YoY to Rs 672 million Chennai, 28 th January, 2016: SQS India BFSI Ltd. (formerly known as Thinksoft Global Services Ltd ) (BSE: 533121) (NSE: SQSBFSI), announced its third
Business Continuity Management Planning Methodology
, pp.9-16 http://dx.doi.org/10.14257/ijdrbc.2015.6.02 Business Continuity Management Planning Methodology Dr. Goh Moh Heng, Ph.D., BCCLA, BCCE, CMCE, CCCE, DRCE President, BCM Institute [email protected]
IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN
i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann
Continuous Monitoring?
Continuous Auditing or Continuous Monitoring? Drs. Arie Pronk RE RA CISA CAMS VUrORE Thema avond Continuous Auditing (Dynamisering van de Audit) 5 september 2006, Amsterdam 1 Biography Arie Pronk is Head
mêéëéåíéê=_áçöê~éüó= Jack Gray Adjunct Professor Centre for Capital Market Dysfunctionality University of Technology, Sydney=
mêéëéåíéê_áçöê~éüó Jack Gray Adjunct Professor Centre for Capital Market Dysfunctionality University of Technology, Sydney After a 20-year intellectually promiscuous academic career around the world in
RPO ASIA RECRUITMENT PROCESS OUTSOURCING. Baker s Dozen. Customer Satisfaction Ratings RPO PROVIDERS 2010 Winner
RPO ASIA RECRUITMENT PROCESS OUTSOURCING Baker s Dozen Customer Satisfaction Ratings RPO PROVIDERS 2010 Winner Hudson RPO Asia is proud to be the winner of a number of industry rated awards including:
Aberdeen University: Back on campus event
Asset Management: a rewarding and exciting career choice 5 November 2014 Alex Barr (MA, Economics and Accountancy, 1992) For investment professional use only Not for public distribution Agenda Asset Management
Mastering entity data with the LEM
ENTERPRISE Solutions HOW FINANCIAL SERVICES FIRMS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT Mastering entity data with the LEM Thought leaders believe that building an LEM could help firms gain
EMERGING TRENDS IN HR AND RECRUITMENT SERVICES Martin Nicholls
EMERGING TRENDS IN HR AND RECRUITMENT SERVICES Martin Nicholls WHO IS KELLY? Since 1946, Kelly has grown to be a global leader in delivering workforce solutions. Revenue exceeds US$5.6 b EMEA AMERICAS
Information Technology Engineers Examination. Systems Auditor Examination. (Level 4) Syllabus
Information Technology Engineers Examination Systems Auditor Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 2.0 May
Best Practice Strategies for Managing and Mitigating Key Cyber Risks. Brendan Saunders, Principal Security Consultant - November 2015
Best Practice Strategies for Managing and Mitigating Key Cyber Risks Brendan Saunders, Principal Security Consultant - November 2015 1 Agenda Key Cyber Risks Technical Threats People The Cyber Assurance
LSEG Information Services Division. Investor and Analyst presentation. Mark Makepeace Group Director of Information Services, CEO of FTSE
LSEG Information Services Division Investor and Analyst presentation Mark Makepeace Group Director of Information Services, CEO of FTSE 1 Table of Contents SECTION 1) Introduction by Xavier Rolet (CEO,
ABOUT THE REPORT. Prepared by Bloomberg Audience Insights 2
Brought to you by ABOUT THE REPORT In July-August 2014, Bloomberg Audience Insights completed an online survey examining risk interconnectivity from the perspective of global corporates, looking specifically
Introduction to PRINCE2
1-1 Introduction to PRINCE2 By Geert Vermeiren IIL Trainer and Consultant 2008 International Institute for Learning, Inc. 1-1 About IIL IIL Worldwide Locations IIL has regional offices throughout the US
Pictet Asset Management
Pictet Asset Management The Group Pictet was founded in Geneva in 1805 and is today one of the largest private banks in Europe and a leading independent asset and wealth manager. Pictet is wholly owned
MSCI Global Minimum Volatility Indices Methodology
MSCI Global Minimum Volatility Indices Methodology Table of Contents Section 1: Introduction... 3 Section 2: Characteristics of MSCI Minimum Volatility Indices... 3 Section 3: Constructing the MSCI Minimum
