A new approach for compliance management Münich - Germany

Size: px
Start display at page:

Download "A new approach for compliance management Münich - Germany"

Transcription

1 A new approach for compliance management Münich - Germany hanco.gerritse@kpn.com marc.sel@pwc.be

2 Contents Introduction About KPN about PwC What problem did we have to solve PwC approach/tooling The KPN case Way forward (jointly) 1

3 About KPN KPN is the leading multimedia company in the Netherlands, providing consumers and consumer households with fixed and mobile telephony-, internet- and TV services. To business customers, KPN delivers voice-, internet- and data services as well as fullymanaged, outsourced ICT solutions. Both nationally and internationally, KPN provides wholesale network services to third parties, including operators and service providers. In Germany and Belgium, KPN pursues a multi-brand strategy with its mobile operations, and serves multiple customer segments in consumer as well as business markets. As of December 31, 2006, KPN served 6.3 million wireline voice subscribers, 8.6 million mobile customers, 2.1 million Internet customers and 0.3 million TV-customers in the Netherlands as well as 15.0 million mobile customers in Germany and Belgium. With 28,368 people (25,976 FTEs), KPN posted revenues of EUR 12.1 bn, with an EBITDA of EUR 4.8bn in KPN was incorporated in 1989 and is listed on the Amsterdam-, New York-, London- and Frankfurt stock exchanges. 2

4 About PwC - yesterday PricewaterhouseCoopers has been created by the merger of two firms - Price Waterhouse and Coopers & Lybrand - each with historical roots going back some 150 years. Set out below are some key milestones in the history of both firms Samuel Lowell Price sets up in business in London 1854 William Cooper establishes his own practice in London, which seven years later becomes Cooper Brothers 1865 Price, Holyland and Waterhouse join forces in partnership 1874 Name changes to Price, Waterhouse & Co Robert H. Montgomery, William M. Lybrand, Adam A. Ross Jr. and his brother T. Edward Ross form Lybrand, Ross Brothers and Montgomery 1957 Cooper Brothers & Co (UK), McDonald, Currie and Co (Canada) and Lybrand, Ross Bros & Montgomery (US) merge to form Coopers & Lybrand 1982 Price Waterhouse World Firm formed 1990 Coopers & Lybrand merges with Deloitte Haskins & Sells in a number of countries around the world 1998 Worldwide merger of Price Waterhouse and Coopers & Lybrand to create PricewaterhouseCoopers 2002 IBM buys PwC Management Consulting Services 3

5 About PwC today and tomorrow PricewaterhouseCoopers is one of the leading providers of industry-focused Assurance, Tax and Advisory Services internationally. The use of our networks, experience, industry knowledge and business understanding in each of those areas distinguishes the way we work. PricewaterhousCoopers operations are divided into a number of business units or service lines. They refine our offering in Assurance, Tax, and Advisory Services. 4

6 What problem did we have to solve Functionally: To be SOx compliant it was necessary for KPN to vastly improve both the authorisation process and control of authorisations with regard to SOx relevant applications within KPN s Fixed Division before the last quarter of In Q we could not provide evidence that authorisations in 48 SOx relevant applications: Did not violate corporate authorisations policies Did not violate necessary segration of duties per application We did not have an up to date set of Business Process Rules per application Next to SOx compliance we also had to solve authorisation control in 19 NMA (The Dutch Competion Regulator ) relevant applications KPN did not have a tool or structured approach to analyse authorisation compliance to BPR s and/or analyse authorisation structures. Technically: dispersed landscape of diverse applications only limited information available only limited time available 5

7 PwC approach and tooling Approach: Caspar built during various information access control assignments worldwide work structure, templates, accelerators Toolset: Eurekify s Sage Complemented with own scripts 6

8 Approach Compliance process Discover Interprete Implement Monitor Report Act 1 Identify applications in scope Via compliance officer, SOX project, process owners, Publish periodic compliance reports 2 Identify compliance drivers Structured into generic and application specific 7 Feedback results to application owners 3 Build SAGE configuration Based on RBAC model (users, roles, resources) 5 6 Verify violations (if any) Execute BPR s over configuration 7 4 Translate compliance drivers into technical BPR s (business process rules) in XML

9 PwC approach and tooling Approach KPN Sage implementation L0 Project Management Ongoing project management WP 0.1 Initial detailed projectplanning WP 0.2 Draft project procedures and standards WP 0.3 Progress reporting WP 0.4 Maintain detailed project plan WP 0.5 Quality control WP 0.6 Issue and escalation management WP 0.7 draft project closure document L1 Controls Catalogue WP1.1 Definition of generic controls catalogue based on GCC7 WP1.2 Definition of specific controls catalogues WP 1.4 Definition of end user procedures WP 1.3 Test of controls catalogue WP1.5 Definition of specific controls catalogues 2nd round WP 1.7 elaboration of end user procedures WP 1.6 Test of controls catalogue 2nd round WP1.8 Definition of specific controls catalogues 3rd round WP 1.9 elaboration of end user procedures WP 1.10 Test of controls catalogue 3rd round Repeat x number of times until finished L2 Data Mapping and Interfacing WP 2.1 Authorisation inventory set-1 WP 2.3 Data loading WP 2.2 Data mapping and selection of interface mechanisms WP 2.5 Training (OTJ) WP 2.4 First round of BPR definition WP 2.6 Authorisation inventory 2nd round WP 2.8 Data loading WP 2.7 Data mapping and selection of interface mechanisms 2nd round WP 2.9 2nd round of BPR definition WP 2.6 Authorisation inventory 3rd round WP 2.8 Data loading WP 2.7 Data mapping and selection of interface mechanisms 3rd round WP 2.9 3rd round of BPR definition Repeat x number of times until finished L3 Infrastructure & operations WP 3.1 Set-up of Sage platforms WP 3.2 Elaboration of infrastructure procedures (config, change, backup, ) WP 3.4 Further elaboration of procedures WP 3.3 Batch automation WP 3.5 Further elaboration of batch automation L4 Sage administrators start Periodical reviews WP 4.1 Support Sage administrators performing periodical reviews mei 06 - juni 06 First 6-10 applications juni 06 - juni 06 Remaining applications Acceptance of each specific controls catalogue incl. Sage implementation Acceptance of project plan Acceptance of generic controls catalogue by Finance manager, KPN audit and External Financial Auditor Evaluation of first 6-10 applications Adjust project planning accordingly Detailed progress report Acceptance of each specific controls catalogue incl. Sage implementation

10 Caspar Control libraries Proposed structure We propose a multi-tier structure for a control library that is focused on identity and access management: Tier #1: the control baselines Tier #2: controls related to organisational structure and processes Tier #3: controls related to time 9

11 Caspar Control libraries Tier #1 commonly accepted principles Individual accountability authorisations are granted to specific individual users. Use rids/accounts are not shared. Single user identification a user should have a single identifier per platform. Authorisations should be allocated through roles (or a similar grouping mechanism). Direct links between users and resources should be avoided. No single user should have all authorisations. No users should accumulate so many authorisations that there can be reasonable suspicion that the risk for (un)intentional misbehaviour increases. There should be no orphans in the identity and access management system. Obviously the organisation may keep expired users and authorisations for historical reasons, these should however be separated from the active set. 10

12 Caspar Control libraries Tier #2 controls related to organisational structure and processes Authorisations should be limited to the appropriate functional organisational scope and processes. Where required this may lead to Chinese Walls (ref the wellknown Brewer-Nash model) Authorisations should reflect a high-level segregation between production, acceptance/test and development environments. Authorisations should reflect the required segregation-of-duties (combinations of certain authorisations are to be forbidden). Specific functions within the organisation require specific authorisations. For example, auditors will have read authorisations only. 11

13 Caspar Control libraries - segregation of duty (1) Business process BP execution initiate execute Separation of standing data approve from transaction data BP control review & reconcile (2) Control process Independent control (e.g. internal audit, external audit, regulator, ) 12

14 Caspar Control libraries Tier #3 controls related to time Users that are no longer employed or servicing the organisation need to be blocked. Users that have not accessed the systems for the last 90 days need to be blocked. Etc. 13

15 Tooling Selected technology We selected Eurekify Sage DNA ( Tool combines Role engineering and role mining Automated recognition of out-of-pattern privileges for cleanup Compliance verification based on specified business process rules Utilizes advanced pattern recognition technology Data model is user-role-resource, NIST RBAC-compliant 14

16 Tooling Introducing the Sage Business Process Rules Sage Policy BPR Rule Types Business Constraints SOD - License Type 1 - Business Constraints Types Role-Role a restriction on the users in two sets of roles Role-Resource a restriction between the users in a set of roles and a set of resources Resource-Resource a restriction on the users in two sets of resources User Attribute Role a restriction between users with a certain attribute value and a set of roles User Attribute Resource a restriction between users with a certain attribute value and a set of resources Restrictions Forbidden Users in left side are not allowed to be on right side Must be Users in left side must also be on right side Only allowed Users in left side are only allowed to roles/resources on right side May be Only users in left side (and not others) are allowed to roles/resources on right side 15

17 Compliance Sage Business Process Rules Sage Policy BPR Rule Types Business Constraints SOD - License Type 2 - Segregation of Duty Types Segregation of Duty Roles Users are restricted in how many of the roles on the left they can have Segregation of Duty Resources Users are restricted in many of the resources on the left they can have In each of these, you must have a NUMBER on the right side Restrictions No more than Users cannot have more than NUMBER of roles/resources on the left No less than Users cannot have less than NUMBER of roles/resources on the left Exactly Users must have exactly the NUMBER of roles/resources on the left More types exist 16

18 The KPN case Approach of the problem Pilot with PwC for two applications Start of Quick and Dirty clean up of redundant authorisations Based on experience of Pilot Authorisation Project was started with PwC and KPMG The scope were the authorisations of all 48 SOx and 19 NMA relevant applications within KPN s Fixed Division. Role KPMG: mainly advisory towards KPN Management with regard to BPR s both generic and application specific. This also to safeguard against potential conflicts of interest between PwC as KPN s external auditor and PwC s role in the project. Role PwC: technical coaching of the project. Parallel: start long term more structural Identity Access Management project. 17

19 The KPN case A view on the loaded authorisation data in one application PICASSO (imaginary name) PICASSO configuration 18

20 The KPN case Analysing PICASSO As one can easily see, this configuration handled the authorisations of 1212 users, via 443 roles onto 230 resources There were no direct links from users to resources (as dictated by best-practice ). Furthermore: 5 roles (32 users) have all resources this is not in line with good practice. 22 users had no access to any resources at all they were only present for historical reasons. 251 of 443 roles have no users at all (due to reorganizations should be cleaned on a short term). 74 roles have only 1 user. Many sets of roles exist with the same (or almost the same) resources. Furthermore, a significant number of users could not be related to the official HR database. 19

21 The KPN case Identifying the PICASSO compliance drivers We identified: 1. The existing authorisations matrix, manually maintained in Excel; 2. Restriction of a particular resource (PICASSO function) to specific employee classes - access to function F5909 restricted to billing employees (role R- HSE-BLL) and TNU analysts (role R-BPX089); 3. Restriction of a particular function combination to a specific employee class - access to the combination of functions F5909-F5326 restricted to billing employees (role R-HSE-BLL); 4. Users belonging to the retail organisational unit may only have read access. 20

22 The KPN case Illustration of a driver The first driver: authorisations matrix (translated into 14 BPR s may have / must have / only allowed to have ) roles (function groups) resources (functions) 21

23 The KPN case Illustration of a BPR The first driver translated in a BPR (partial view). are only allowed to have people in this role access to these resources 22

24 The KPN case Illustration The second compliance driver access to function F5909 is restricted to billing employees (role R-HSE-BLL) and TNU analysts (role R-BPX089) is technically expressed as the following BPR-rule: are the only ones that may have people in this role access to this resource 23

25 The KPN case Illustration of a full policy Here is an example of a full policy for application PICASSO 24

26 The KPN case Illustration of a list of violations 25

27 The KPN case Dashboard 26

28 The KPN case Results KPN, assisted by PwC, implemented Sage with regard to SOx relevant and NMa relevant applications making possible: Analysis in authorisations Discovery of violations of BPR s or prove of compliancy Set of generic BPR s Set of specific BPR s per Application signed off by Business Owners Both generic and specific BPR s were implemented in Sage Training of KPN employees in using Sage and enabling KPN to do it s own authorisation compliancy monitoring on a quarterly basis as part of KPN s General Computer Controls. Overall Result: KPN compliancy to SOx 404 over Basis for further structural improvements for Identity and Access Management within KPN. 27

29 The KPN case Deliverables Process SCP Sage Configuration Preparation technical report on where, when and how the authorisation data was extracted SCC Sage Configuration and Compliance functional report, making explicit which configuration was used, which business process rules were applicable and what the resulting violations (if any) were 28

30 The way forward Dual-track approach Compliance monitoring Compliance office Business segments KIAM KPN Identity and Access Management Establishing IAM requirements Conceptual design Technical design Mapping onto product suite Implementation 29

31 Further references users.skynet.be/marc.sel 2006 PricewaterhouseCoopers. All rights reserved. PricewaterhouseCoopers refers to the network of member firms of PricewaterhouseCoopers International Limited, each of which is a separate and independent legal entity. *connectedthinking is a trademark of PricewaterhouseCoopers. 30

Genealogy of Consulting Firms. Preview

Genealogy of Consulting Firms. Preview Genealogy of Consulting Phil Osborn, Principle IT Management Consultants Jack D. Becker, UNT w/editorial assistance from BCIS 4690 Class; Summer, 2008 & Summer, 2010 Version 4; July, 2010 BCIS 4690 1 Preview

More information

Identity & Access Management new complex so don t start?

Identity & Access Management new complex so don t start? IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach

More information

KPN Grows SMB Business with Managed IP PBX Solution

KPN Grows SMB Business with Managed IP PBX Solution KPN Grows SMB Business with Managed IP PBX Solution By S. Loe KPN is the incumbent service provider in the Netherlands and a major player in the telecommunications industry worldwide. In 2006, the company

More information

Regulated Documents. A concept solution for SharePoint that enables FDA 21CFR part 11 compliance when working with digital documents

Regulated Documents. A concept solution for SharePoint that enables FDA 21CFR part 11 compliance when working with digital documents Regulated Documents A concept solution for SharePoint that enables FDA 21CFR part 11 compliance when working with digital documents Contents Life science industry challenges Regulated Documents our service

More information

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Migrating to the Cloud Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Organisations are looking for new ways to deliver IT services and demanding that ICT

More information

www.pwc.com/hu Power issues A PwC üdvözli PwC s services Győrt for the energy sector PwC welcomes Győr

www.pwc.com/hu Power issues A PwC üdvözli PwC s services Győrt for the energy sector PwC welcomes Győr www.pwc.com/hu Power issues A PwC üdvözli PwC s services Győrt for the energy sector PwC welcomes Győr PwC has a strong presence in the field of energy consulting both in Hungary and in the region. Using

More information

Using QUalysgUard to Meet sox CoMplianCe & it Control objectives

Using QUalysgUard to Meet sox CoMplianCe & it Control objectives WHITE PAPER Using QualysGuard to Meet SOX Compliance & IT Objectives Using QualysGuard To Meet SOX Compliance and IT Objectives page 2 CobIT 4.0 is a significant improvement on the third release, making

More information

Third Party Supplier Security

Third Party Supplier Security Third Party Supplier Security Managing risk and compliance through external due diligence audits. Presented by: Stephen Higgins 6 th December 2012 To cover When third party supplier security goes wrong...

More information

Minimize Access Risk and Prevent Fraud With SAP Access Control

Minimize Access Risk and Prevent Fraud With SAP Access Control SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Access Control Minimize Access Risk and Prevent Fraud With SAP Access Control Table of Contents 3 Quick Facts 4 The Access

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Qlik UKI Consulting Services Catalogue

Qlik UKI Consulting Services Catalogue Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction

More information

ADDENDUM 5 TO APPENDIX 4 TO SCHEDULE 3.3

ADDENDUM 5 TO APPENDIX 4 TO SCHEDULE 3.3 ADDENDUM 5 TO APPENDIX 4 TO SCHEDULE 3.3 TO THE Statement of Technical Approach for Help Desk Services Northrop Grumman s help desk solution will put in place the people, processes and tools to deliver

More information

ISO/IEC 20000 IT Service Management - Benefits and Requirements for Service Providers and Customers

ISO/IEC 20000 IT Service Management - Benefits and Requirements for Service Providers and Customers ISO/IEC 20000 IT Service Management - Benefits and Requirements for Service Providers and Customers Authors Ralf Buchsein, Manager, KESS DV-Beratung GmbH Klaus Dettmer, Product Manager, iet Solutions GmbH

More information

Healthcare, Part 1: Perceptions of consulting firms in the healthcare sector

Healthcare, Part 1: Perceptions of consulting firms in the healthcare sector EXTRACT SECTOR REPORT PROGRAMME 2015 Healthcare, Part 1: Perceptions of consulting firms in the healthcare sector Contents Executive summary 3 Methodology 4 Perceptions of quality 6 Comparing views in

More information

KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014

KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014 KPMG Advisory Microsoft Dynamics CRM Advisory, Design & Delivery Services A KPMG Service for G-Cloud V April 2014 Table of Contents Service Definition Summary (What s the challenge?)... 3 Service Definition

More information

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.

More information

An Introduction to Continuous Controls Monitoring

An Introduction to Continuous Controls Monitoring An Introduction to Continuous Controls Monitoring Reduce compliance costs, strengthen the control environment and lessen the risk of unintentional errors and fraud Richard Hunt, Managing Director Marc

More information

The Age of Audit: The Crucial Role of the 4 th A of Identity and Access Management in Provisioning and Compliance

The Age of Audit: The Crucial Role of the 4 th A of Identity and Access Management in Provisioning and Compliance The Age of Audit: The Crucial Role of the 4 th A of Identity and Access Management in Provisioning and Compliance Consul risk management, Inc Suite 250 2121 Cooperative Way Herndon, VA 20171 USA Tel: +31

More information

IMPROVING AUDIT READINESS BY MANAGING YOUR DYNAMICS ERP

IMPROVING AUDIT READINESS BY MANAGING YOUR DYNAMICS ERP IMPROVING AUDIT READINESS BY MANAGING YOUR DYNAMICS ERP Building Sustainable Control Accountability Contents 1 EXECUTIVE SUMMARY... 1 2 MANAGING YOUR DYNAMICS ERP SYSTEM: AUDIT READINESS... 1 2.1 Common

More information

A Systems Implementation Project Planning Guide. Solutions & Project Management Services for Systems & Operations Projects

A Systems Implementation Project Planning Guide. Solutions & Project Management Services for Systems & Operations Projects A Systems Implementation Project Planning Guide Solutions & Project Management Services for Systems & Operations Projects Business Requirements Analysis Overview Project Plan High-Level Detailed Design

More information

White Paper Software Quality Management

White Paper Software Quality Management White Paper What is it and how can it be achieved? Successfully driving business value from software quality management is imperative for many large organizations today. Historically, many Quality Assurance

More information

WHITE PAPER. iet ITSM Enables Enhanced Service Management

WHITE PAPER. iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted

More information

Sarbanes-Oxley Control Transformation Through Automation

Sarbanes-Oxley Control Transformation Through Automation Sarbanes-Oxley Control Transformation Through Automation An Executive White Paper By BLUE LANCE, Inc. Where have we been? Where are we going? BLUE LANCE INC. www.bluelance.com 713.255.4800 info@bluelance.com

More information

A Forrester Consulting Thought Leadership Paper Commissioned By BMC Software Industrializing IT Workload Automation

A Forrester Consulting Thought Leadership Paper Commissioned By BMC Software Industrializing IT Workload Automation A Forrester Consulting Thought Leadership Paper Commissioned By BMC Software June 2012 Table Of Contents Executive Summary... 2 Automation Is The Key To An Efficient IT... 3 Challenge In Implementing Automation

More information

The Danwood Group Professional Services Offering DANWOOD

The Danwood Group Professional Services Offering DANWOOD The Danwood Group Professional Services Offering DANWOOD Our Professional Services Our Professional Services department can provide you with a variety of services from Audit and Assessment to Technical

More information

Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM)

Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM) Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM) Pankaj Jalote 1 Infosys Technologies Ltd. Bangalore 561 229 Fax: +91-512-590725/590413 Jalote@iitk.ernet.in, jalote@iitk.ac.in

More information

REPORT 2014/001 INTERNAL AUDIT DIVISION. Audit of information and communications technology help desk operations at United Nations Headquarters

REPORT 2014/001 INTERNAL AUDIT DIVISION. Audit of information and communications technology help desk operations at United Nations Headquarters INTERNAL AUDIT DIVISION REPORT 2014/001 Audit of information and communications technology help desk operations at United Nations Headquarters Overall results relating to the adequacy and effectiveness

More information

CA Vulnerability Manager r8.3

CA Vulnerability Manager r8.3 PRODUCT BRIEF: CA VULNERABILITY MANAGER CA Vulnerability Manager r8.3 CA VULNERABILITY MANAGER PROTECTS ENTERPRISE SYSTEMS AND BUSINESS OPERATIONS BY IDENTIFYING VULNERABILITIES, LINKING THEM TO CRITICAL

More information

1 Introduction... 2 2 Product Description... 2 3 Strengths and Challenges... 4 4 Copyright... 5

1 Introduction... 2 2 Product Description... 2 3 Strengths and Challenges... 4 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The

More information

ISO20000: What it is and how it relates to ITIL v3

ISO20000: What it is and how it relates to ITIL v3 ISO20000: What it is and how it relates to ITIL v3 John DiMaria; Certified Six Sigma BB, HISP BSI Product Manager; ICT (ISMS,ITSM,BCM) Objectives and Agenda To raise awareness, to inform and to enthuse

More information

A best practice case implementing Role Based Access Control at ABN AMRO A long and winding road

A best practice case implementing Role Based Access Control at ABN AMRO A long and winding road A best practice case implementing Role Based Access Control at ABN AMRO A long and winding road Agenda 1. Introduction 2. Reasons for the RBAC project 3. Background 4. Concept 5. A slow start 6. Soll versus

More information

Improving PCI Compliance with Network Configuration Automation

Improving PCI Compliance with Network Configuration Automation Improving PCI Compliance with Network Configuration Automation technical WHITE PAPER Table of Contents Executive Summary...1 PCI Data Security Standard Requirements...2 BMC Improves PCI Compliance...2

More information

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations

More information

www.pwc.com Advisory Services Oracle Alliance Case Study

www.pwc.com Advisory Services Oracle Alliance Case Study www.pwc.com Advisory Services Oracle Alliance Case Study A global software company turns a Sarbanes-Oxley challenge into an opportunity for cost reduction and performance improvement Client s challenge

More information

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma Governance, Risk, Compliance (GRC) Automation Siamak Razmazma Siamak.razmazma@protiviti.com September 2009 Agenda Introduction to

More information

TOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy

TOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy TOGAF TOGAF & Major IT Frameworks, Architecting the Family by Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. Copyright 2013 ITpreneurs. All rights reserved.

More information

Document Quality Assurance Solutions

Document Quality Assurance Solutions Get the app White Paper Document Quality Assurance Solutions Introduction For most organizations, quality has become a number one priority. The high costs of errors and the recovery from them is driving

More information

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects State of Arkansas Office of Information Technology 124 W. Capitol Ave. Suite 990 Little Rock, AR 72201 501.682.4300 Voice 501.682.4020 Fax http://www.cio.arkansas.gov/techarch Best Practices Statement

More information

DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING. A CaseWare IDEA Research Report

DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING. A CaseWare IDEA Research Report DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING A CaseWare IDEA Research Report CaseWare IDEA Inc. is a privately held software development and marketing company, with offices in Toronto

More information

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data an eprentise white paper tel: 407.290.6952 toll-free: 1.888.943.5363 web: www.eprentise.com Author: Helene Abrams Published:

More information

DeBondo Capital Limited Presents FRANKFURT STOCK EXCHANGE : LISTING OVERVIEW

DeBondo Capital Limited Presents FRANKFURT STOCK EXCHANGE : LISTING OVERVIEW DeBondo Capital Limited Presents FRANKFURT STOCK EXCHANGE : LISTING OVERVIEW TABLE OF CONTENTS 2 DEBONDO CAPITAL - INTRODUCTION THE GERMAN STOCK MARKET THE FSE LISTING PROCESS DEBONDO SERVICES DEAL FLOW

More information

Accenture leverages Accenture Video Solution to help KPN be Over-the-Top in the Dutch TV market in record time

Accenture leverages Accenture Video Solution to help KPN be Over-the-Top in the Dutch TV market in record time Accenture leverages Accenture Video Solution to help KPN be Over-the-Top in the Dutch TV market in record time 1 About KPN KPN is a leading information and telecommunications provider in the Netherlands,

More information

Offering Data Protection Assessments. A Managed Service Provider s Guide

Offering Data Protection Assessments. A Managed Service Provider s Guide A Managed Service Provider s Guide Companies worldwide rely on complex backup environments to protect their data. Because of the size and complexity of the environments the level of backup reliability

More information

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing 1 Introduction to Identity Management Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications An overview of business drivers and technology solutions. 2 Identity and Access Needs

More information

QA Engagement Models. Managed / Integrated Test Center A Case Study

QA Engagement Models. Managed / Integrated Test Center A Case Study 1 QA Engagement Models Managed / Integrated Test Center A Case Study 2 Today s Agenda» Background» Overview of QA Engagement Models MTC & ITC» The Journey to Steady State» Transition Approach» Challenges

More information

Industry. Head of Research Service Desk Institute

Industry. Head of Research Service Desk Institute Asset Management in the ITSM Industry Prepared by Daniel Wood Head of Research Service Desk Institute Sponsored by Declaration We believe the information in this document to be accurate, relevant and truthful

More information

Published April 2010. Executive Summary

Published April 2010. Executive Summary Effective Incident, Problem, and Change Management Integrating People, Process, and Technology in the Datacenter Published April 2010 Executive Summary Information technology (IT) organizations today must

More information

Consulting in Procurement April 2015

Consulting in Procurement April 2015 Consulting in Procurement April 2015 Introductions Meet the team Leon Smith Director Shauna Gallagher Manager Mick Davies Senior Manager Chris Croisdale Manager 2 Background & context Objectives of the

More information

Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0

Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0 Service Support Configuration Management ITIL Configuration Management - 1 Goals of Configuration Management The goals of Configuration Management are to: Account for all the IT assets and configurations

More information

White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management White Paper November 2006 BMC Best Practice Process Flows for Asset and ITIL Configuration Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,

More information

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5

More information

STATE OF ARIZONA Department of Revenue

STATE OF ARIZONA Department of Revenue STATE OF ARIZONA Department of Revenue Douglas A. Ducey Governor September 25, 2015 David Raber Director Debra K. Davenport, CPA Auditor General Office of the Auditor General 2910 North 44 th Street, Suite

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance

More information

CDC UNIFIED PROCESS PRACTICES GUIDE

CDC UNIFIED PROCESS PRACTICES GUIDE Purpose The purpose of this document is to provide guidance on the practice called Project Close-Out and to describe the practice overview, requirements, best practices, activities, and key terms related

More information

Program Lifecycle Methodology Version 1.7

Program Lifecycle Methodology Version 1.7 Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated

More information

Submitted electronically via Open to Comments page on IFRS Foundation website

Submitted electronically via Open to Comments page on IFRS Foundation website Submitted electronically via Open to Comments page on IFRS Foundation website IFRS Foundation IASB 30 Canon street London, EC4M 6XH United Kingdom Amsterdam, 20 November 2012 Ref: B2012.64 Subject: Eumedion

More information

The ITIL v.3. Foundation Examination

The ITIL v.3. Foundation Examination The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.

More information

Modelling, Analysing and Improving an ERP Architecture with ArchiMate

Modelling, Analysing and Improving an ERP Architecture with ArchiMate Modelling, Analysing and Improving an ERP Architecture with ArchiMate June 25th, 2014 Heinz-Juergen Scherer, TransWare Tim Vehof, BiZZdesign Agenda Introduction Enterprise Architecture ERP systems and

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Top Challenges in Payroll & HR

Top Challenges in Payroll & HR Top Challenges in Payroll & HR About The Author Heading to her third year of experience within Accace, Maria Cojocariu is currently company s Payroll Manager, responsible with coordinating the local payroll

More information

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp. Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms

More information

TOGAF TOGAF & Major IT Frameworks, Architecting the Family

TOGAF TOGAF & Major IT Frameworks, Architecting the Family Fall 08 TOGAF TOGAF & Major IT Frameworks, Architecting the Family Date: February 2013 Prepared by: Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. TOGAF

More information

Identity & Access Management

Identity & Access Management Identity & Access Management Get in control: IT Governance, people, permission and technical challenges. February 2009 Information Risk Control B.V. Faculty Electrical Engineering, Mathematics and Computer

More information

Achieving Regulatory Compliance through Security Information Management

Achieving Regulatory Compliance through Security Information Management www.netforensics.com NETFORENSICS WHITE PAPER Achieving Regulatory Compliance through Security Information Management Contents Executive Summary The Compliance Challenge Common Requirements of Regulations

More information

Stakeholder management and. communication PROJECT ADVISORY. Leadership Series 3

Stakeholder management and. communication PROJECT ADVISORY. Leadership Series 3 /01 PROJECT ADVISORY Stakeholder management and communication Leadership Series 3 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital programmes,

More information

Statement of Work. LabTech Implementation Bronze. LabTech Software 4110 George Road Suite 200 Tampa, FL 33634

Statement of Work. LabTech Implementation Bronze. LabTech Software 4110 George Road Suite 200 Tampa, FL 33634 Statement of Work LabTech Implementation Bronze LabTech Software 4110 George Road Suite 200 Tampa, FL 33634 US Direct: 813.397.4600 UK: 0844.544.1690 AUS: 3.8652.1797 www.labtechsoftware.com Contents Section

More information

Software Asset Management (SAM) and ITIL Service Management - together driving efficiency

Software Asset Management (SAM) and ITIL Service Management - together driving efficiency Software Asset Management (SAM) and ITIL Service Management - together driving efficiency Ian Preskett MIET C.Eng. MBCS CITP Software Asset Management Consultant ian.preskett@ipassociatesltd.co.uk Agenda

More information

Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan

Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan Identity & Access Management Case Study & Lessons Learned Prepared by Tariq Jan Investment Bank Case Study Top 5 leading global financial services firm $116 billion in revenue $2 trillion in assets 220k

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

Support and Maintenance of Hyperion Applications. Presenter: Stuart Lothian

Support and Maintenance of Hyperion Applications. Presenter: Stuart Lothian Support and Maintenance of Hyperion Applications Presenter: Stuart Lothian About AMOSCA AMOSCA are an Enterprise Performance Management (EPM) and Business Intelligence (BI) consultancy providing financial

More information

1 Why should monitoring and measuring be used when trying to improve services?

1 Why should monitoring and measuring be used when trying to improve services? 1 Why should monitoring and measuring be used when trying to improve services? a) To validate, direct, justify and intervene b) To validate, measure, monitor and change c) To validate, plan, act and improve

More information

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, streamline compliance reporting, and reduce the overall

More information

Aberdeen City Council IT Asset Management

Aberdeen City Council IT Asset Management Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates

More information

Access Governance. Delivering value. What you gain. Putting a project back on track for success

Access Governance. Delivering value. What you gain. Putting a project back on track for success What you gain Risk-managed access Having a second line of defence to identify what needs to be controlled and who owns it lowers your operational costs, while taking a risk-based approach ensures greater

More information

Reduce risk. Reduce cost. Raise performance.

Reduce risk. Reduce cost. Raise performance. Reduce risk. Reduce cost. Raise performance. Services for professional procurement. Be better informed, make better decisions. Procurement and supply chain risk management www.achilles.com Meeting your

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform

More information

Webinar Solutions for Lead Generation Get More For Less

Webinar Solutions for Lead Generation Get More For Less Dakota Performance Solutions Webinar Solutions for Lead Generation Get More For Less Matthew A. Marnach President & CEO Presented by: Matt Haynes Director, Webinar Services and Event Management Introduction

More information

An Analysis of the B2B E-Contracting Domain - Paradigms and Required Technology 1

An Analysis of the B2B E-Contracting Domain - Paradigms and Required Technology 1 An Analysis of the B2B E-Contracting Domain - Paradigms and Required Technology 1 Samuil Angelov and Paul Grefen Department of Technology Management, Eindhoven University of Technology, P.O. Box 513, 5600

More information

High-End-Software-Discovery in the Datacenter and Oracle DB Software Metering. 2015 nova ratio AG Page 1

High-End-Software-Discovery in the Datacenter and Oracle DB Software Metering. 2015 nova ratio AG Page 1 High-End-Software-Discovery in the Datacenter and Oracle DB Software Metering 2015 nova ratio AG Page 1 The Company Profile Founded 1995 as service provider, developed in 2000 to be a solution provider

More information

SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND

SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND CONTENTS INTRODUCTION 3 EFFECTIVELY MANAGE THE SCOPE OF YOUR IMPLEMENTATION

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Revision Date Author Description of change. 10 07Jun13 Mark Benton Removed Admin. Manager from approval

Revision Date Author Description of change. 10 07Jun13 Mark Benton Removed Admin. Manager from approval Page 2 of 15 Document Revision History Revision Date Author Description of change 10 07Jun13 Mark Benton Removed Admin. Manager from approval 12Feb13 Mark Benton 08 01Oct12 Mark Benton 07 8/30/2012 Refer

More information

A discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration.

A discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration. A discussion of information integration solutions November 2005 Deploying a Center of Excellence for data integration. Page 1 Contents Summary This paper describes: 1 Summary 1 Introduction 2 Mastering

More information

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics

More information

Project Roles and Responsibilities Template

Project Roles and Responsibilities Template Purpose The purpose of this document is to provide a summary of the primary roles in the X project and the responsibilities associated with each role. A roles and responsibilities spreadsheet also maps

More information

N(i) 2 WHITE PAPER on CHANGE MANAGEMENT

N(i) 2 WHITE PAPER on CHANGE MANAGEMENT on CHANGE MANAGEMENT ABOUT THIS... 2 IT AND CHANGE MANAGEMENT... 3 RESPONDING TO PERFORMANCE AND ACCOUNTABILITY DEMANDS...3 AN EMERGING NEED FOR CHANGE MANAGEMENT...3 DEFINING CHANGE MANAGEMENT... 4 WHAT

More information

3.B METHODOLOGY SERVICE PROVIDER

3.B METHODOLOGY SERVICE PROVIDER 3.B METHODOLOGY SERVICE PROVIDER Approximately four years ago, the American Institute of Certified Public Accountants (AICPA) issued Statement on Standards for Attestation Engagements (SSAE) No. 16, Reporting

More information

Oracle Role Manager. An Oracle White Paper Updated June 2009

Oracle Role Manager. An Oracle White Paper Updated June 2009 Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship

More information

NIIT Technologies White Paper

NIIT Technologies White Paper www.niit-tech.com Migrating Lotus Notes Applications to SharePoint NIIT Technologies White Paper CONTENTS Introduction- Migrating from Lotus Notes to SharePoint 3 Methodology 3 Tools Available for 5 Conclusion

More information

How To Audit A Windows Active Directory System

How To Audit A Windows Active Directory System South Northamptonshire Council Windows Active Directory Final Internal Audit Report - September Distribution list: Mike Shaw IT & Customer Services Manager David Price Director of Community Engagement

More information

The Principles of Audit Automation for Access Control

The Principles of Audit Automation for Access Control The Principles of Audit Automation for Access Control Redmond Identity Summit 2014 Directories Devices Identity Marvin Tansley Thank You to our Sponsors Gold Silver Plus Silver Agenda The Role of Identity

More information

At the Heart of Enterprise Collaboration

At the Heart of Enterprise Collaboration At the Heart of Enterprise Collaboration Breaking the Migration Barrier From Lotus Notes to Microsoft SharePoint Abstract Collaboration across devices, workspaces, and geographical locations has become

More information

Accelerate your business with unmatched efficiency in invoice processing

Accelerate your business with unmatched efficiency in invoice processing Accelerate your business with unmatched efficiency in invoice processing Markets and applications Education Absence registration, test answer forms, evaluations Invoices Healthcare Menu selection forms,

More information

-Blue Print- The Quality Approach towards IT Service Management

-Blue Print- The Quality Approach towards IT Service Management -Blue Print- The Quality Approach towards IT Service Management The Qualification and Certification Program in IT Service Management according to ISO/IEC 20000 TÜV SÜD Akademie GmbH Certification Body

More information

Distribution: Sheryl L. Sculley, City Manager Gloria Hurtado, Assistant City Manager Ben Gorzell, Chief Financial Officer Dr.

Distribution: Sheryl L. Sculley, City Manager Gloria Hurtado, Assistant City Manager Ben Gorzell, Chief Financial Officer Dr. Distribution: Sheryl L. Sculley, City Manager Gloria Hurtado, Assistant City Manager Ben Gorzell, Chief Financial Officer Dr. Thomas Schlenker, Director, San Antonio Metropolitan Health District Robert

More information

FAMI-QS Certification Rules for Operators. Rules for Operators

FAMI-QS Certification Rules for Operators. Rules for Operators Rules for Operators TABLE OF CONTENTS 1. Application for certification and FAMI QS associate membership...2 2. Assessment of operators...3 2.1. Audit planning...3 2.2. Frequency of audits and re certification...5

More information

Avon & Somerset Police Authority

Avon & Somerset Police Authority Avon & Somerset Police Authority Internal Audit Report IT Service Desk FINAL REPORT Report Version: Date: Draft to Management: 19 February 2010 Management Response: 12 May 2010 Final: 13 May 2010 Distribution:

More information

Feature. Multiagent Model for System User Access Rights Audit

Feature. Multiagent Model for System User Access Rights Audit Feature Christopher A. Moturi is the head of School of Computing and Informatics at the University of Nairobi (Kenya) and has more than 20 years of experience teaching and researching on databases and

More information

TP 7: Identity 3.0 Dynamic Identity and Access Management

TP 7: Identity 3.0 Dynamic Identity and Access Management TP 7: Identity 3.0 Dynamic Identity and Access Management Michael Kunz Universität Regensburg June 29, 2015 1 Agenda 1. Introduction 2. Identity Data Cleansing 3. Role Development & Optimization 4. Dynamic

More information

Software Licence Compliance. A guide to Software Asset Management in the Enterprise

Software Licence Compliance. A guide to Software Asset Management in the Enterprise Software Licence Compliance A guide to Software Asset Management in the Enterprise Prepared by the xassets Software Development Team Paul Lambert, 22 nd March 2004 Overview Software Asset Management (SAM)

More information