KPMG Canada s IT Advisory Services

Size: px
Start display at page:

Download "KPMG Canada s IT Advisory Services"

Transcription

1 I T A D V I S O R Y KPMG Canada s IT Advisory Services Helping clients address today s technology agenda A D V I S O R Y

2 Overview of KPMG Canada s IT Advisory Services KPMG s IT Advisory professionals can help you align your IT capabilities with the pressing strategic and financial objectives of your organization. We have the knowledge and experience to help you as you seek improved performance from your IT investments. With a fully coordinated service offering across the range of management challenges in IT, we work with senior management as they look to make the right choices at the right time and at the right cost. Asset Management and Contract Compliance 2 IT Attestation 10 Business Systems Advisory Cost Optimization for IT Due Diligence Enterprise Architecture Green/ Sustainable IT Infrastructure and Continuity IT Internal Audit IT Portfolio Management IT Sourcing IT Strategy IT Value Records and Knowledge Management Security Services IS Governance and Performance 9 Solution and Vendor Evaluation 18 1

3 Asset Management and Contract Compliance IM/IT Asset Management is focused on people, process, and technology. Asset Management considers the full asset lifecycle ( cradle to grave ) and is therefore not limited to IM/IT. It often involves Legal, Procurement, and Finance. KPMG s IT Advisory professionals review the processes and supporting discovery technology for managing IM/IT assets; review how assets are tracked and administered; and identify potential gaps in the controls. Assess IM/IT Asset Management operating effectiveness (variances between deployment and entitlement provide evidence of IM/IT Asset Management process weaknesses) and design effectiveness including people, process, and technology competencies in order to provide a complete picture of the IM/IT Asset Management root cause issues. Each IM/IT Asset Management component throughout the lifecycle is assessed an infrastructure optimization maturity: Basic, Standardized, Rationalized, or Dynamic. Financial savings Cost savings from enabling the organization to reach a higher level of IO maturity Information and control Lower support costs (help desk, IMAC, deployment) SAM Direct cost savings from licensing optimization and contract renegotiation Mitigate financial and legal risks Enablement of financial savings 2

4 Business Systems Advisory Business System Implementation, Optimization & Controls Integration Enterprise Application Strategy, Planning & Governance Business Requirements Identification Conversions, Interfaces, Business Testing and Validation Support ERP Health Check & Optimization Business System Standalone Services IFRS Enterprise Applications Conversion Business Process Controls / Access Controls & SoD / Information Security & Continuity Master Data Management / Data Quality & Integrity Governance, Risk & Compliance / Continuous Monitoring & Auditing When implementing a business system, an organization should seek a balance across four dimensions: - risk and controls; - process optimization; - organization and people; and - technology. 3

5 Cost Optimization for IT KPMG brings a globally consistent methodology for delivering cost optimization assignments that helps to create a better understanding of IM/IT value, enabling more appropriate investments in initiatives that both support and anticipate business goals. A typical review will cover the following initiatives: Strategic: generate sustainable performance improvements consistent with strategic goals and long-term value creation. Consider performance improvements that may reflect high degree of innovation and involve shifts of fundamental business models. Tactical: improve performance of existing business model to respond to emerging competitive pressures, deteriorating cost control or other margin pressures, stakeholder pressure for short-term performance improvement, and offers to acquire a portion of the business. Survival: rapid cost reduction to adapt to severe cost pressures, enabling the organization to stay in business. With survival at stake, speed is of the essence. KPMG s IT Advisory professionals can help organizations identify and stop all non-essential spend and cease non-core services. Benefits Reduce IT spend while maintaining IT performance against business goals Aligning future spend with high priority business investments Transparent reporting Improved utilization of existing investments Sustainable process improvements A risk- based approach Improved balance between the organization's resources and its risk across the technology agenda 4

6 Due Diligence Due Diligence includes reviewing the target organization to assess the risks associated with its IM/IT systems and the feasibility of the projected EBITDA, given the alignment of IM/IT plans with business plans. Due Diligence confirms the IM/IT assets involved in the transaction; assesses their suitability and capability to meet the investment hypothesis; reviews the historical and planned technology spending; identifies the existence of technology risks; and provides indications of anticipated postdeal expenditure with regard to IT. Additional to the core scope of IM/IT due diligence, and dependent on client interest and investment hypotheses, the engagement may include: Identification of opportunities to improve technology performance or achieve cost savings Assess the effort required to integrate the target with other entities, e.g. roll-up or with parent Provide suggestions on post-deal enhancements to improve target performance Review proposed transition service agreements. 5

7 Enterprise Architecture Business Model System Model KPMG Canada, through its recent acquisition of Chartwell IRM, brings skills and experience in Enterprise Architecture, which helps clients with the use of structured methods to plan and design complex business changes. In its simplest terms, we help client s use enterprise architecture to align the design of a business and its critical resources with its strategic vision. Our practitioners use standardized models or blueprints to analyze the design of an enterprise to identify business improvement opportunities. We then create a road map of change projects that are traceable to the strategic intent of the business. Improvements might include innovations in products and services, organizational structure and business processes, the quality and timeliness of business information, or the contribution of its IT. Value Chain to System Infrastructure Alignment & Integration Aligns Strategy Enterprise Architecture Aligns Aligns Business Architecture Solutions Architecture Aligns Aligns Aligns Business Operations Technology 6

8 Green/ Sustainable IT Developing and executing a green IT strategy requires a combination of business and technology skills and experience, as well as broad organizational cooperation across multiple functions such as IT architecture, data center operations, facilities management, corporate real estate, and procurement. Linking green IT initiatives to broader corporate green initiatives shaped by strategic-level Corporate and Social Responsibility (CSR) frameworks enables IT to be a value-added business partner in the journey to a greener business. It further offers organizations an unprecedented opportunity to align environmental management initiatives with broader sustainability initiatives. We take a top-down view shaped by strategic-level frameworks that help link green IT initiatives with a broader enterprise-wide program. Grassroots efforts and disparate green initiatives are a starting point in the effort to reduce the environmental and economic impact of IT, but a broader program-level effort that considers the total IT life cycle is often needed to yield enhanced benefits. KPMG s approach to Green IT leverages our Business Performance Improvement and Change Management methodologies, and provides a green lens for IT and data centre operations. 7

9 Infrastructure and Continuity Service Level Agreement Insurance Coverage Fault Tolerant Infrastructure Accounting and Finance Communication Technology Legal Human Resources Recoverability and Continuity of Operations Crisis Management Risk and Vulnerability Assessment: identifies potential threats; identifies vulnerabilities; identifies existing controls; analyzes exposures; prepares risk and vulnerability report. Business Impact Analysis: confirm assumptions; develop survey questionnaires; identify survey recipients; obtain business function data; distribute survey; collect responses; verify results; and prepare BIA report. Critical Recovery Resource Requirements: review business processes and determine recovery resource requirements; determine business process recovery time objectives; identify IM/IT processing requirements; identify IM/IT support profile; prepare business function recovery profiles. Alternative Recovery Strategies: identify viable support strategies; develop high-level relative cost assessments; analyze and determine most appropriate strategies; produce reports and procedures; prepare the business continuity plan; analyze exposures; develop implementation plans; negotiate vendor contracts. Plan Maintenance Initiation Business Review impact BIA analysis Review BCP Assess and other risks plans Review Design BCP the plan tests Develop Review a Governance road map Report 8

10 IS Governance and Performance Governance Review effectiveness of existing IM/IT governance model Assess and design a plan for improvements, ITIL/COBIT process design work (IT Operations, SDLC, PMO), organizational models Implementation, Change Management of planned design. Performance Assess the efficiency, cost, and effectiveness of IM/IT departments using KPMG s IS Governance Framework. The focus is on support and sustain the direction. Process Communication Controls People Strategic Initiatives Performance Management Business Alignment Technology Management Framework Communication Financial Management Compliance Risk Management Risk Transformation Strategic Spending Investment Management Cost Control Communication 9

11 IT Attestation KPMG provides a range of IT attestation services to help satisfy the requirements of third parties that depend on IT environments. The most common IT attestation services include : AICPA SAS 70 or CICA Section 5970 (S5970) examinations. Standard that was designed to serve the assurance needs of service providers relating to the integrity of processes and services that impact a Company s financial statements. Two types of reporting are available : Type 1: Use to assess the design of controls whether they are in operation as at point in time Type 2: Use to assess the design of controls in operation and the operating effectiveness of the controls over a period of time (typically 6 months to 12 months). KPMG Systrust and Webtrust KPMG Other Assurance Reports (CICA Section 5025, CICA Section 5815) Agreed-upon Procedures (CICA Section 9100 or 9110). Attestation services encompass a wide range of business processes including IT, custody, fund administration, clearing and depository, pension benefits administration, manufacturing/distribution, IT/web hosting, and payroll processing. Planning Data Gathering Test of Design Test of Operating Effectiveness Reporting 10

12 IT Internal Audit KPMG s IT Internal Audit services provides a cost-effective means of independently assuring that business understand the risks they face, and that they have effective controls in place across their IT organization to mitigate these risks. IT Internal Audit Needs Assessment: Our risk assessment methodology enables us to obtain a detailed understanding of IT risks facing the business, which supports the development of effective IT audit plans. IT Performance Review: Our approach is designed to help clients assess IT performance in selected areas or across the enterprise, so they can strike the right balance between business needs and IT resources. Business Systems Controls: A structured approach to assessing, designing, and implementing the processes and controls related to existing or new business software applications. IT General Controls Assessment: Assesses the technology risks facing your organization and whether existing controls are sufficient to address those risks. 11

13 IT Portfolio Management Alignment involves using an objective, balanced and accepted process to evaluate and filter component ideas to produce a prioritized list for the next business planning cycle. Benefits Management involves providing a structure and framework for the forecasting and realization of portfolio benefits. Capacity Management considers demand and supply, identifying constraints on the organization that could impede the delivery of the portfolio. Financial Management considers funding, investment opportunities and financial returns from the overall portfolio. Governance ensures that appropriate structures and processes are in place for effective decision making, work allocation and performance reporting. Organization & Leadership considers executive direction setting for the portfolio and structuring the organization for integration across portfolio, program and project levels. Performance Management involves tracking the delivery of the portfolio against a predefined set of parameters including time, cost, quality, risk and benefits. Risk Management manages the level of risk involved in delivering the portfolio. Stakeholder Engagement involves engaging individuals or groups of people within and outside the organization to ensure on-going support for the portfolio. A risk-based approach Improves management of the business risks, in relation to the appetite for risk Improved balance between the organization's resources and its risk A prioritized set of programs Prioritize based on the attractiveness and achievability of change initiatives Integrated planning at portfolio level Strategic priorities based on the accurate data Strategic alignment Strategic alignment between the programs and the business strategy Greater organizational agility in order to respond to the changing economic environment Controlled, measurable realization of corporate objectives all of which results in better returns on investment Cost reductions Reduced cost of delivering programs Optimal use of resources (increased cost savings) Non-aligned or programs with a low contribution will be terminated or rescope, minimizing future costs Benefits Maximum value from the organization's change programs and initiatives Increase visibility of benefit data across the portfolio Program failing to delivery benefits identified early Implement clear accountabilities for achieving benefits 12

14 IT Sourcing IT outsourcing options have become more complex over the years. As they each bring their strengths and weaknesses, they should be chosen with care, matching the business needs. KPMG's IT Sourcing methodology assists clients throughout the sourcing lifecycle, including the outsourcing of business and services as well as the implementation and operation of shared services. It is highly flexible, allowing for an overall approach to outsourcing, or providing assistance for existing outsourcing agreements. Our approach breaks a long and complex lifecycle into six manageable steps: develop the strategy, scope and plan, design and select, transition, deliver, evolve. Engagement activities can include: assessing proper IM/IT service delivery model for clients: in-house, outsourced, or hybrid; review of existing agreements the Right to Audit clause; contract renewals; evolve / remediation; and development of a services catalogue. Client business goals Focus on Core Business Release Capital Enhance Quality Reduce Costs Enhance Agility Reduce Risk Sourcing as a strategy Cost reduction through economies of scale Focus on core competencies by moving administrative functions from operations Improve process quality and efficiency Improve customer services Leverage technology in a common infrastructure with standard data Divestment new businesses developed Sourcing models Global Shared Services Regional Shared Services BOT (Build/Operate/Transfer) Joint Venture Outsourced Companies initially look for cost reductions, but expand to quality and enhanced competitiveness 13

15 IT Strategy KPMG s IM/IT Strategy is a dynamic process focused on the effective management of IM/IT performance, risk, and value. Our IM/IT Strategy Services methodology addresses: Establishing a process to help align IM/IT initiatives to the business strategy Recognizing that an important goal of effective IM/IT strategy is the improvement of business performance Develop 3-5 year plans to align the IM/IT strategy to the business strategy. KPMG s approach is based on six main steps as follows: Understand the business direction Perform IT capability assessment Identify refined business requirements Select IT alternatives Design IT strategic scenario Develop IT strategic plan KPMG has significant global IM/IT Strategy Services engagement experience. 14

16 IT Value To realize the true potential of IT investment, CIOs should align the IT agenda with that of the wider business. This approach helps to ensure that organizations invest in the most appropriate areas, applying strict investment criteria for change projects while delivering day-to-day activities effectively. This involves: Adopting rigorous portfolio management: this will help to evaluate the real business benefits of the various IT investment options available, ensuring a more optimal allocation of funds. Improving the planning and management of day-to-day operations: the use of robust industrialized processes along with effective control mechanisms, can significantly reduce the need for fire fighting and help IT managers meet the daily needs of the business. Such greater efficiency will also free up IT management to devote more time to strategic issues. Introducing a true partnership between IT and the business it serves: joint planning and regular liaison should align IT activity closely with business needs and make IT more responsive and adaptable to changing business circumstances. Distinguishing between change and run expenditure: these two have very different business models with different investment criteria. Expenditure on day-to-day operations is essentially an exercise in cost control and efficiency, whilst investment in change should focus on the strategic benefits, increased turnover and ultimately the shareholder value it brings to the business. Establishing an appropriate funding and governance model for IT: ensuring that the right decisions e.g. how much to spend / invest and on what - get made in the right place within the organization and in the right way. Prioritise and Deliver Value Opportunities Develop Economic Baseline Define Opportunities IT Value Assessment Develop Questionnaires Analyse Data Gather Data and Perform Interviews 15

17 Records and Knowledge Management Definition Management (Collection / Disposal) Inventory and classification of records Creation, alteration, and destruction Ownership Management (Storage, Custodianship & Preservation) Sensitivity Management (Storage / Access) Privacy and confidentiality Accessibility Management (Access / Use) Retrieval, Delivery and Decision Making Quality Management and Integrity 16

18 Security Services Identity Management and Role Based Access Control Policies, Standards, and Processes Vulnerability and Penetration Testing Security Assessment Security and Privacy Incident Management Data Centric Security Risk Assessment Security Operations Review Security Governance Strategy This model yields the four distinct areas upon which our services focus. Our fundamental model of enterprise security architecture is based on core enablers engaged in a process of protecting information assets. Information Security Assessment Enterprise Security Architecture Security Solutions & Integration The services are modular in nature and fit together as required to facilitate each client s unique requirements. Security Monitoring & Response Architecture 17

19 Solution and Vendor Evaluation Solution Assessment Provide independent advise to assist clients in assessing and strategizing their technology solution to best meet their needs. Business Case for System Change Requirements Definition Develop Business Case for the Selection Exercise and assist in comprehending the critical success factors for a successful case. Assist clients in identifying solution requirements, documenting both functional and technical requirements, prioritizing them and create new process maps and/or models. Market Research Evaluation Help clients in understanding the vendor and solution landscape. RFP/RFI Process Advise clients in the management of the Request for Proposal (RFP) or Request for Information (RFI) process. Vendor Due Diligence Conduct due diligence on potential suppliers to minimize the risk of selecting inappropriate partner. Independent Verification & Validation Offer advice or assistance to clients in planning the selection solution. Negotiation Support Recommend negotiation strategies regarding business terms, service levels and financial arrangement. 18

20 For more information on management issues in IT Please contact your KPMG adviser or any of our IT Advisory professionals Montréal Jean-François Coulonval (514) Greater Toronto Area Yvon Audette (416) Western Canada Shaun Wilson (604) Francis Beaudoin (514) Jeff Smith (416) Jeff Thomas (403) Ottawa Jim Alexander (613) Southwestern Ontario David Evans (519) Solly Patrontasch (613) or visit us at All information provided is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particular situation. 19

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased

More information

Identity & Access Management new complex so don t start?

Identity & Access Management new complex so don t start? IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach

More information

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 Agenda Key Definitions Risks Business Continuity Management Program BCM Capability Assessment Process BCM Value Proposition

More information

Transforming risk management into a competitive advantage kpmg.com

Transforming risk management into a competitive advantage kpmg.com INSURANCE RISK MANAGEMENT ADVISORY SOLUTIONS Transforming risk management into a competitive advantage kpmg.com 2 Transforming risk management into a competitive advantage Assessing risk. Building value.

More information

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/Continuous Monitoring INTRODUCTION New demands from the board, senior organizational

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

KPMG s Financial Management Practice. kpmg.com

KPMG s Financial Management Practice. kpmg.com KPMG s Financial Management Practice kpmg.com 1 KPMG s Financial Management Practice KPMG s Financial Management (FM) practice, within Advisory Management Consulting, supports the growing agenda and increased

More information

IT Insights. Managing Third Party Technology Risk

IT Insights. Managing Third Party Technology Risk IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate

More information

Meet challenges head on

Meet challenges head on Meet challenges head on Deal Advisory / Global We can help you master Financial Restructuring. Enhancing value through financial restructuring. / 1 Your vision. Our proven capabilities. Despite its challenges,

More information

IT Governance. What is it and how to audit it. 21 April 2009

IT Governance. What is it and how to audit it. 21 April 2009 What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures

More information

UNITED NATIONS OFFICE FOR PROJECT SERVICES. ORGANIZATIONAL DIRECTIVE No. 33. UNOPS Strategic Risk Management Planning Framework

UNITED NATIONS OFFICE FOR PROJECT SERVICES. ORGANIZATIONAL DIRECTIVE No. 33. UNOPS Strategic Risk Management Planning Framework UNOPS UNITED NATIONS OFFICE FOR PROJECT SERVICES Headquarters, Copenhagen O.D. No. 33 16 April 2010 ORGANIZATIONAL DIRECTIVE No. 33 UNOPS Strategic Risk Management Planning Framework 1. Introduction 1.1.

More information

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745 ECP - 601: Effective Business Continuity Management: ISO 22301 This 3-day course provides an intensive, hands-on workshop covering all major aspects for the design of an effective Business Continuity Plan

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page

More information

Project organisation and establishing a programme management office

Project organisation and establishing a programme management office PROJECT ADVISORY Project organisation and establishing a programme office Leadership Series 1 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital

More information

Agile project portfolio manageme nt

Agile project portfolio manageme nt Agile project portfolio manageme nt Agile project & portfolio summit at Harrisburg University May 9, 2016 Agile project portfolio management Agenda Portfolio management challenges Traditional portfolio

More information

Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt. Programme, Project & Service Management Analysis

Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt. Programme, Project & Service Management Analysis Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt Programme, Project & Service Management Analysis Table of Content 1 Executive Summary... 3 1.1 Scope of Work... 3 1.2 Methodology for

More information

How To Transform It Risk Management

How To Transform It Risk Management The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help

More information

Privacy and Security Framework, February 2010

Privacy and Security Framework, February 2010 Privacy and Security Framework, February 2010 Updated April 2014 Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and

More information

Securing the Microsoft Cloud

Securing the Microsoft Cloud Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from

More information

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Strengthening Cybersecurity Defenders #ISC2Congress Healthcare and Security "Information Security is simply a personal

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012

The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012 The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only Agenda Introduction Basic program components Recent trends in higher education risk management Why

More information

Update on AICPA Assurance Services Executive Committee Activities

Update on AICPA Assurance Services Executive Committee Activities Update on AICPA Assurance Services Executive Committee Activities Amy Pawlicki Director Business Reporting, Assurance & Advisory Services and XBRL AICPA Agenda ASEC overview Summary of work streams by

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting

ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact info@uxcconsulting.com.au http://www.uxcconsulting.com.au This summary

More information

Title here. Successful Business Model Transformation. in the Financial Services Industry. KPMG s Evolving World of Risk Management SECTORS AND THEMES

Title here. Successful Business Model Transformation. in the Financial Services Industry. KPMG s Evolving World of Risk Management SECTORS AND THEMES SECTORS AND THEMES Successful Business Model Transformation Title here in the Financial Services Industry Additional information in Univers 45 Light 12pt on 16pt leading KPMG s Evolving World of Risk Management

More information

Technical Management Strategic Capabilities Statement. Business Solutions for the Future

Technical Management Strategic Capabilities Statement. Business Solutions for the Future Technical Management Strategic Capabilities Statement Business Solutions for the Future When your business survival is at stake, you can t afford chances. So Don t. Think partnership think MTT Associates.

More information

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis

More information

At the Heart of Connected Manufacturing

At the Heart of Connected Manufacturing www.niit-tech.com At the Heart of Connected Manufacturing Transforming Manufacturing Operations to Drive Agility and Profitability The success of the new manufacturing network hinges on the agility of

More information

Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald

Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald Federal CIO: Cloud Selection Toolkit Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald Agenda Project Introduction Agency Cloud Challenges Toolkit Solution Overview Step 1:

More information

Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com

Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency kpmg.com Leveraging data analytics and continuous auditing processes 1 Executive

More information

Driving Business Value. A closer look at ERP consolidations and upgrades

Driving Business Value. A closer look at ERP consolidations and upgrades IT advisory SERVICES Driving Business Value A closer look at ERP consolidations and upgrades KPMG LLP Meaningful business decisions that help accomplish business goals and growth objectives may call for

More information

Cloud Computing. Key Initiative Overview

Cloud Computing. Key Initiative Overview David W. Cearley Research Vice President and Gartner Fellow This overview provides a high-level description of the Cloud Computing Key Initiative. IT leaders can use this guide to understand what they

More information

IT Transformation. Moving Beyond Service Management to a Strategic Business Role. August 2013. kpmg.com

IT Transformation. Moving Beyond Service Management to a Strategic Business Role. August 2013. kpmg.com IT Transformation Moving Beyond Service Management to a Strategic Business Role August 2013 kpmg.com KPMG surveyed over 275 attendees at ServiceNow s Knowledge13 conference, here is what we learned. Key

More information

Running the business of IT metrics that matter

Running the business of IT metrics that matter INFORMATION TECHNOLOGY SERVICES Running the business of IT metrics that matter November 2014 kpmg.com Contents Introduction... 2 Do you have the right KPIs to run IT as a business?... 4 Data is not the

More information

Telecom Expense Management

Telecom Expense Management Telecom Expense Professional Cost Group Ltd. Control your costs Manage your assets Transform your business Visit us online: www.pcmg.co.uk/tem Your Challenges. For most companies, fixed and mobile communications

More information

COMPREHENSIVE ASSET MANAGEMENT STRATEGY

COMPREHENSIVE ASSET MANAGEMENT STRATEGY COMPREHENSIVE ASSET MANAGEMENT STRATEGY APPROVED BY SENIOR MANAGEMENT COMMITTEE ON AUGUST 23, 2012 (TO BE FINALIZED AFTER APPROVAL OF CAM POLICY BY COUNCIL) August 2012 Contents CONTENTS EXECUTIVE SUMMARY

More information

APPROACHES TO SPEND ANALYSIS AND SOURCING WITH IMMEDIATE ROI THAT NO ONE TOLD YOU ABOUT, UNTIL NOW

APPROACHES TO SPEND ANALYSIS AND SOURCING WITH IMMEDIATE ROI THAT NO ONE TOLD YOU ABOUT, UNTIL NOW APPROACHES TO SPEND ANALYSIS AND SOURCING WITH IMMEDIATE ROI THAT NO ONE TOLD YOU ABOUT, UNTIL NOW Enporion, Inc. September, 2008 www.enporion.com TABLE OF CONTENTS Introduction... 3 With benefits like

More information

Fortune 500 Medical Devices Company Addresses Unique Device Identification

Fortune 500 Medical Devices Company Addresses Unique Device Identification Fortune 500 Medical Devices Company Addresses Unique Device Identification New FDA regulation was driver for new data governance and technology strategies that could be leveraged for enterprise-wide benefit

More information

From Chaos to Clarity: Embedding Security into the SDLC

From Chaos to Clarity: Embedding Security into the SDLC From Chaos to Clarity: Embedding Security into the SDLC Felicia Nicastro Security Testing Services Practice SQS USA Session Description This session will focus on the security testing requirements which

More information

Application Overhaul. Key Initiative Overview

Application Overhaul. Key Initiative Overview Scott D. Nelson Research Managing Vice President This overview provides a high-level description of the Application Overhaul Key Initiative. IT leaders can use this guide to understand how to develop an

More information

This volume is related to the topics of IT Governance and IT Portfolio Management.

This volume is related to the topics of IT Governance and IT Portfolio Management. ITIL Key Principles and Models This unit is aiming to help the candidate to comprehend and account for the key principles and models of Service Management and to balance some of the opposing forces within

More information

Defining a Secure Mobile Framework Architecture at DHA

Defining a Secure Mobile Framework Architecture at DHA Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com

An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com An example ITIL -based model for effective Service Integration and Management Kevin Holland AXELOS.com White Paper April 2015 Contents Introduction to Service Integration and Management 4 An example SIAM

More information

Negotiating Vendor Contracts. Key Initiative Overview

Negotiating Vendor Contracts. Key Initiative Overview Christopher Ambrose Research Vice President This overview provides a high-level description of the Negotiating Vendor Contracts Key Initiative. IT leaders can use this overview to understand how to improve

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

ERP. Key Initiative Overview

ERP. Key Initiative Overview Jeff Woods Research Managing Vice President This overview provides a high-level description of the ERP Key Initiative. IT leaders can use this overview to better understand what they need to do to prepare

More information

Office of the Chief Information Officer

Office of the Chief Information Officer Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business

More information

UPTIME MAGAZINE. june/july15 JUNE/JULY 2015. uptimemagazine.com

UPTIME MAGAZINE. june/july15 JUNE/JULY 2015. uptimemagazine.com june/july15 UPTIME MAGAZINE JUNE/JULY 2015 uptimemagazine.com AM Developing Plans Creating Value From Physical Assets by Mark Ruby 46 june/july 15A sset management plans form the cornerstone of an effective

More information

The promise and pitfalls of cyber insurance January 2016

The promise and pitfalls of cyber insurance January 2016 www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped

More information

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie

More information

Assessing Your Information Technology Organization

Assessing Your Information Technology Organization Assessing Your Information Technology Organization Are you running it like a business? By: James Murray, Partner Trey Robinson, Director Copyright 2009 by ScottMadden, Inc. All rights reserved. Assessing

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations

More information

SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE

SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE The Shared Assessments Trust, But Verify Model The Shared Assessments Program Tools are used for managing the vendor risk

More information

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:

More information

Accenture Technology Consulting. Clearing the Path for Business Growth

Accenture Technology Consulting. Clearing the Path for Business Growth Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers

More information

NEW PERSPECTIVES. Data Analysis Challenges: C1 is customer provided. Anticipate IRS Audits: System Development and Implementation Projects:

NEW PERSPECTIVES. Data Analysis Challenges: C1 is customer provided. Anticipate IRS Audits: System Development and Implementation Projects: NEW PERSPECTIVES on Healthcare Risk Management, Control and Governance www.ahia.org Journal of the Association of Heathcare Internal Auditors Vol. 31, No. 2, Summer, 2012 C1 is customer provided Data Analysis

More information

A. Planning is the process of anticipating the future and determining the courses of action necessary to achieve

A. Planning is the process of anticipating the future and determining the courses of action necessary to achieve Marketing Planning and Forecasting I. What Is Marketing Planning? A. Planning is the process of anticipating the future and determining the courses of action necessary to achieve organizational objectives.

More information

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 Debbie Lew Agenda Review what is IT governance Review what is IT risk management A discussion of key IT risks to be aware of Page 2

More information

Taking Information Security Risk Management Beyond Smoke & Mirrors

Taking Information Security Risk Management Beyond Smoke & Mirrors Taking Information Security Risk Management Beyond Smoke & Mirrors Evan Wheeler Omgeo Session ID: GRC-107 Insert presenter logo here on slide master. See hidden slide 4 for directions Session Classification:

More information

How to stay competitive in a converging healthcare system kpmg.com

How to stay competitive in a converging healthcare system kpmg.com Managing risk in a transforming healthcare organization How to stay competitive in a converging healthcare system kpmg.com 2 Healthcare Risk Management Managing the risk of healthcare transformation Healthcare

More information

RISK BASED AUDITING: A VALUE ADD PROPOSITION. Participant Guide

RISK BASED AUDITING: A VALUE ADD PROPOSITION. Participant Guide RISK BASED AUDITING: A VALUE ADD PROPOSITION Participant Guide About This Course About This Course Adding Value for Risk-based Auditing Seminar Description In this seminar, we will focus on: The foundation

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

IT Cost Reduction. Doing More with Less. Anita Ballaney, Vishwanath Shenoy, Michael Gavigan. Strategic IT cost reduction - Doing More with Less

IT Cost Reduction. Doing More with Less. Anita Ballaney, Vishwanath Shenoy, Michael Gavigan. Strategic IT cost reduction - Doing More with Less IT Cost Reduction Doing More with Less Anita Ballaney, Vishwanath Shenoy, Michael Gavigan Strategic IT cost reduction - Doing More with Less The current economic climate will force all businesses to thoroughly

More information

Keeping the Patient First

Keeping the Patient First Keeping the Patient First A Dialogue with Suppliers May 2011 Keeping the Patient First Supply chain consolidation and cost savings are driving significant change in the health system. Keeping the patient

More information

Unlocking value from your ERP service organization*

Unlocking value from your ERP service organization* Consulting Application Managed Services Technology Unlocking value from your ERP service organization* Application Support Effectiveness Assessment can help you identify and dismantle the roadblocks that

More information

RISK ADVISORY SERVICES CONSTRUCTION AUDIT SERVICES

RISK ADVISORY SERVICES CONSTRUCTION AUDIT SERVICES RISK ADVISORY SERVICES CONSTRUCTION AUDIT SERVICES AS ECONOMIC AND FINANCIAL CHALLENGES WEIGH ON, ORGANIZATIONS FIND IT INCREASINGLY DIFFICULT TO LOCATE ENOUGH MONETARY SUPPORT TO HELP FACILITATE THE CONSTRUCTION

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Security. Security consulting and Integration: Definition and Deliverables. Introduction Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data

More information

Strategies for assessing cloud security

Strategies for assessing cloud security IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary

More information

Procurement Outsourcing and. Shared Service Centers. SANFORD INTERNATIONAL I Global Sourcing I Supply Chain I Procurement I. www.sanfordint.com.

Procurement Outsourcing and. Shared Service Centers. SANFORD INTERNATIONAL I Global Sourcing I Supply Chain I Procurement I. www.sanfordint.com. Procurement Outsourcing and Shared Service Centers 3rd Floor Jonsim Place 228 Queen's Road East Wan Chai Hong Kong Telephone: (852) 2861 2222 Fax: (852) 2861 2266 www.sanfordint.com.hk INTRODUCTION Procurement

More information

Managing municipal assets for regulatory compliance with PSAB 3150

Managing municipal assets for regulatory compliance with PSAB 3150 Managing municipal assets for regulatory compliance with PSAB 3150 White paper July 2009 By Sil Zoratti Director of Marketing, The Createch Group, a Bell Canada company, Executive summary As of January

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

CS 101 November 15, 2010

CS 101 November 15, 2010 CS 101 November 15, 2010 Introductions David Kahan, 04 David.Kahan@ey.com Manager, IT Advisory Seha Islam, 08 & 09 Seha.Islam@ey.com Staff, IT Advisory 1 Facts about Ernst & Young $24.5 billion in revenue

More information

Practical Approaches to Achieving Sustainable IT Governance

Practical Approaches to Achieving Sustainable IT Governance Practical Approaches to Achieving Sustainable IT Governance Beyond Mandates: Getting to Sustainable IT Governance Best Practices Agenda IT Governance Definition IT Governance Principles IT Governance Decisions

More information

IIA Super Conference

IIA Super Conference www.pwc.com IIA Super Conference Software Asset Management (SAM) Internal Audits Agenda Introduction Software Asset Management (SAM) overview Potential Internal Audit Approach Example Risk Areas Summary

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015

Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015 Office of the Auditor General AUDIT OF IT GOVERNANCE Tabled at Audit Committee March 12, 2015 This page has intentionally been left blank Table of Contents Executive Summary... 1 Introduction... 1 Background...

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Module 6 Essentials of Enterprise Architecture Tools

Module 6 Essentials of Enterprise Architecture Tools Process-Centric Service-Oriented Module 6 Essentials of Enterprise Architecture Tools Capability-Driven Understand the need and necessity for a EA Tool IASA Global - India Chapter Webinar by Vinu Jade

More information

Tapping the benefits of business analytics and optimization

Tapping the benefits of business analytics and optimization IBM Sales and Distribution Chemicals and Petroleum White Paper Tapping the benefits of business analytics and optimization A rich source of intelligence for the chemicals and petroleum industries 2 Tapping

More information

Business Continuity and Disaster Recovery Planning

Business Continuity and Disaster Recovery Planning Business Continuity and Disaster Recovery Planning Jennifer Brandt, CISA A p r i l 16, 2015 HISTORY OF STINNETT & ASSOCIATES Stinnett & Associates (Stinnett) is a professional advisory firm offering services

More information

Management Update: CRM Vendor Evaluations in a Volatile Market

Management Update: CRM Vendor Evaluations in a Volatile Market IGG-06042003-01 M. Dunne Article 4 June 2003 Management Update: CRM Vendor Evaluations in a Volatile Market Decision makers often have difficulty in selecting software for customer relationship management

More information

An Enterprise Resource Planning Solution for Mill Products Companies

An Enterprise Resource Planning Solution for Mill Products Companies SAP Thought Leadership Paper Mill Products An Enterprise Resource Planning Solution for Mill Products Companies Driving Operational Excellence and Profitable Growth Table of Contents 4 What It Takes to

More information

Introduction. What is ITIL? Automation Centre. Tracker Suite and ITIL

Introduction. What is ITIL? Automation Centre. Tracker Suite and ITIL 1 Introduction The Information Technology Infrastructure Library (ITIL) aims to improve the management of IT services within the organization, for lowered costs, improved efficiency and productivity. But

More information

Sound Transit Internal Audit Report - No. 2014-3

Sound Transit Internal Audit Report - No. 2014-3 Sound Transit Internal Audit Report - No. 2014-3 IT Project Management Report Date: Dec. 26, 2014 Table of Contents Page Background 2 Audit Approach and Methodology 2 Summary of Results 4 Findings & Management

More information

Program Management Professional (PgMP) Examination Content Outline

Program Management Professional (PgMP) Examination Content Outline Program Management Professional (PgMP) Examination Content Outline Project Management Institute Program Management Professional (PgMP ) Examination Content Outline April 2011 Published by: Project Management

More information

UNLOCKING OUTSOURCING

UNLOCKING OUTSOURCING Four Keys to Preparing to Outsource Your Global Mobility Program Looking to create efficiencies in key areas of your value chain, and pushing to achieve maximum strategic financial value from your core

More information

ITIL Managing Digital Information Assets

ITIL Managing Digital Information Assets ITIL Managing Digital Information Assets Shirley Lacy, ConnectSphere Frieda Midgley, Digital Continuity Project Judith Riley, Digital Continuity Project Nigel Williamson, Digital Continuity Project White

More information

fs viewpoint www.pwc.com/fsi

fs viewpoint www.pwc.com/fsi fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Strategic Planning. Key Initiative Overview

Strategic Planning. Key Initiative Overview David Aron Research Vice President This overview provides a high-level description of the Strategic Planning Key Initiative. IT leaders can use it to create strategies that help the business win, and change

More information

Services for the CFO Financial Management Consulting

Services for the CFO Financial Management Consulting IBM Global Business Services Services for the CFO Financial Management Consulting Financial Management Chief financial officers (CFOs) are currently in a highly visible, highly influential position. They

More information

CISM ITEM DEVELOPMENT GUIDE

CISM ITEM DEVELOPMENT GUIDE CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps

More information