Continuous Monitoring?

Size: px
Start display at page:

Download "Continuous Monitoring?"

Transcription

1 Continuous Auditing or Continuous Monitoring? Drs. Arie Pronk RE RA CISA CAMS VUrORE Thema avond Continuous Auditing (Dynamisering van de Audit) 5 september 2006, Amsterdam 1

2 Biography Arie Pronk is Head of Group Audit Operations / Operations & Services within ABN AMRO. He is responsible for world wide Group Audit Communications, CAATs Services, Audit Systems Support and Audit Issue Tracking. As Global Project Manager CAATs Implementation, he is responsible for delivering a global CAATs infrastructure and methodology to Group Audit. 2/30

3 Agenda 1. Introduction 3. Current Environment & Developments 5. Challenge & Solution 7. Proof of Concept Continuous Monitoring 3/30

4 Introduction 4/30

5 IIA s Global Technology Audit Guide 3 GTAG 3 Continuous Auditing? Implications for Assurance, Monitoring, and Risk Assessment Continuous Auditing Method used to perform audit related activities on a continuous basis includes control and risk assessment Performed by Internal Audit Continuous Monitoring Processes to ensure policies/processes are operating effectively and to assess adequacy/effectiveness of controls Performed by operational/financial management; audit independently evaluates adequacy of management activities Continuous Assurance Combination of continuous auditing and audit oversight of continuous monitoring The power of continuous auditing lies in the intelligent and efficient continuous testing of controls and risks that result in timely notification of gaps and weaknesses to allow immediate follow up and remediation 5/30

6 IIA s Global Technology Audit Guide 3 The business and regulatory environment and emerging audit standards are driving auditors and management to make more effective use of information and data analysis technologies as a fundamental enabler of continuous auditing and continuous monitoring Pressure to perform ongoing evaluation of internal controls Many of the techniques of continuous monitoring of controls by management are similar to those that may be performed in continuous auditing by the internal audit department The outcomes of continuous auditing and monitoring (by management) are similar and involve notifications or alerts indicating control deficiencies or higher risk levels 6/30

7 IIA s Global Technology Audit Guide 3 7/30

8 Current Environment & Developments 8/30

9 Take overs Assurance Our Environment Back to Basics Outsourcing Internal Control Cost Reduction Globalization Audit ROB SOX Tabaksblat A turbulent period with hours and money being spent on SOXA testing, Compliance investigations, preparations for Basel II etc. Synergies Offshoring Basel II WID Risk Management Compliance Insourcing 9/30

10 Our Environment Turbulent period with increasing regulatory demands, more disclosure of procedures and controls, extensive testing of internal controls (e.g. SOXA, Basel2, Corporate Governance) Growing claim on business and audit resources for internal control and compliance related activities Business and Corporate Functions both focus on: Increasing Economic Profit Adhere to internal control and compliance regulations Lower costs to improve efficiency ratio 10/30

11 See SOXA etc. as an opportunity! Try to reduce costs and increase benefits! Steps: 3. Think of control as a process Control needs to be viewed as a process model, not just a series of checklists to be completed * Global Guideline Activity: 12 Determine data application needed, extraction date and location of data Once the request is completed and all appropriate testing parameters are Introduction included, the CAAT team will determine the data application needed, cut off date and location of data. (Activity 12) The objective is to determine if the data can be independently obtained by the Objective CAATs Team or the CAATs Team needs to request a 3rd party like IT to deliver the data to them. CAATs Expert Responsible A complete data request including all appropriate testing parameters in the Conditions CAATs Knowledge Database. CAATs Knowledge Database Resources/Tools Determine entity involved, application, hardware platform, required Activities tables and fields, extraction date etc. Verify whether the CAATs Team is able to technically interface with the hardware platform, application and data Verify if the required authorization is already granted by the business owner and request authorization for access, if needed Determine tables and fields needed by using the data dictionary Verify if data access and extraction is indeed possible Verify if data with the required extraction date is available Comments Decision 13 Can data be independently obtained by CAATs? Next Instruction Activity 16 Get needed data via approved extraction methods Interdependencies More information It s a Business responsibility but Audit can add value! The motivation to implement better controls should come from a desire to improve operations, risk management processes, and governance * Shift from extensive testing to monitoring & active risk management Companies need to develop better monitoring procedures that will help them identify when a process has suffered a decrease in control * * Rittenberg, There is No Shortcut to Good Controls; Internal Auditor, August /30

12 See SOXA etc. as an opportunity! (cntd) Steps (cntd): 2. Integrate control into basic operating activities and avoid unnecessary costs & procedures 5. Synergize by having Business and Corporate Functions work together! Business, Audit, Compliance, Risk Management, IT, Finance, etc. are all looking for the same data on risks and controls! Go from control checklists to control monitoring Go from reactive through detective to proactive 12/30

13 Challenge & Solution 13/30

14 Our Challenge Business needs & challenges Keep up with the changing organization & (control) environment Identify and manage risks across the enterprise Increase level of internal control Implement monitoring processes that signal impending control deficiencies and take corrective action immediately Audit needs & challenges Enhance audit assurance to internal and external stakeholders Assess control effectiveness and compliance with standards over time Pro active audit planning and approach More efficient and effective SOXA testing 14/30

15 Required Solution? Further improve risk management and control systems Enhance cooperation/synergies between Business and Corporate Functions Monitor (key) controls more continuously Integrate control monitoring in day to day business activities Install information systems infrastructure to access, analyze and report relevant information on (key) controls Address documenting requirements 15/30

16 Continuous Control Monitoring 16/30

17 Continuous Control Monitoring (cntd) We need to make sure that monitoring processes signal impending control deficiencies and that corrective action is taken in a timely fashion* * Rittenberg, There is No Shortcut to Good Controls; Internal Auditor, August 2005 The challenge for business management and corporate functions is to process and refine large volumes of data into actionable information** This challenge is met by establishing an information systems infrastructure to source, capture, process, analyze and report relevant information** ** COSO ERM 17/30

18 IIA s Global Technology Audit Guide 3 18/30

19 What is the link with Audit? The internal audit activity should assist the organization by identifying and evaluating significant exposures to risk and contributing to the improvement of risk management and control systems. IIA Performance Standard 2110 Internal audit functions need to keep up with the changing competitive organisation environment and provide audit coverage aligned with the key risk areas of the organisation The challenge is to work smarter not harder; for internal audit to cover expanding exposures more efficiently and deliver more value through ideas that generate cost savings, revenue enhancements and process improvements E&Y Internal Audit Benchmarking Survey; April /30

20 What is the link with Audit? (cntd) Enhanced assurance to internal and external stakeholders by better assessing control effectiveness and compliance with standards over time through (continuous) monitoring a larger number of controls with less resources Improved quality of audits, more efficient and more effective audits by gathering more audit evidence and testing larger populations/data sets Flexibility in allocating audit resources to higher risk areas and allowing to be responsive to changes in the control environment by using CAATs on a regular basis to provide continuous auditing or monitoring of key controls or performance indicators Not only: Test reliability of data and transactions Acquire audit evidence and fact finding But also: Identify trends, pinpoint exceptions, and highlight potential areas of concern in our audit objects/universe (continuous) monitor controls and identify control issues and ensure compliance with standards 20/30

21 3. Proof of Concept Continuous Monitoring 21/30

22 HP s Continuous Control Modelling and Monitoring (CCMM) Note: The challenge for business management and corporate functions is to process and refine large volumes of data into actionable information (COSO ERM) Possible solution for providing the information systems infrastructure for documenting and monitoring (key) controls New assessment approach that systematically isolates and predicts emerging risks in a dynamic control environment to give ongoing visibility to compliance 22/30

23 CCMM Lifecycle AAB Accounts Payable AAB Accounts Payable C ont rols (Excel AAB Account s Payable C ont rols (Excel AAB Account s Payable Spr eadsheet ) C ont rols (Excel Spr eadsheet ) ates C ont rol s (Excel SO XA Templ Spreadsheet) Spr eadsheet ) Busi ness Processes Business Processes Application 1. (re-)model the Business Environment into (key) controls 4. Make decisions upon Reporting and Alerts Tailored Loops for: -C ISO organization -C FO organization -Business Units -G roup Audit -G roup Functions -SO X C om pliance C ontrols M odeling D atabase Infrastructure 2. Collect and Analyse data Analysis Engine Application KPIs Controls & Metrics 3. Present Real-time Dashboards (Controls, KRI s, KPI s) FinancialKRIs Infrastructure KRIs 23/30

24 Objective Proof of Concept Scope: Accounts Payable process ABN AMRO BU Netherlands (Q1 2006) 3 tracks Objective Accounts Payable SAP system access controls Accounts Payable financial process controls Accounts Payable process and SOXA testing template/audit program modelling Assess usability of CCMM toolbox in an ABN AMRO environment (processes and IT infrastructure) Questions for ABN AMRO Do CCMM tools offer added value in addition to already existing tools and techniques? And if so, where can we gain most? 24/30

25 Benefits identified Model Customizable and flexible control environment model Ability to document and maintain SOXA templates and audit programs Dashboards Dashboards based on exception reporting with drill down functionality Reporting Historical data and trend analysis; Benchmark across multiple applications 25/30

26 Value adding components Run time insight in key controls and impending areas of concern Multi location/system comparisons Off site monitoring Automate repetitive tasks Process/risk/control/test repository 26/30

27 Next steps Enough positive feedback for next phase Build Business Case for pilot project Get Management buy in; Business and Corporate Functions collaboration Focus on SOXA relevant processes implemented in multiple locations 27/30

28 Possible Showstoppers... Availability of data and cooperation of IT personnel Required knowledge of systems and data dictionaries Tooling, Education, Support Budget, Commitment... The under use of CAATS may be due to a shortage of skills in internal audit functions to perform the testing, investment constraints, set up time, or not seeing the benefits to be gained from CAATs E&Y Internal Audit Benchmarking Survey; April /30

29 Final note Goal Continuous Monitoring Provide comfort to management on control over, and performance of, processes 29/30

30 Questions? 30/30

31 Annex 31/30

32 Introduction ABN AMRO International bank with origins going back to th biggest bank in Europe and 13th in the world Over 3,000 branches in almost 60 countries and territories A staff of about 97,000 full time equivalents worldwide Focusing on: consumer and commercial clients in our home markets of the Netherlands, the US Midwest, Brazil and in selected growth markets around the world selected wholesale clients with an emphasis on Europe, and financial institutions private clients 32/30

33 Introduction Group Audit Internal audit function of ABN AMRO Holding N.V., encompasses all majority and wholly owned subsidiary companies FTE Region spread Asia 15% Netherlands 37% Global Head of Group Audit: Peter Diekman About 850 employees world wide (auditors and support staff) Assurance services and Consulting services: Operational Audits, IT Audits, Financial Audits, Compliance Audits, Project Audits, Inspections, Consultancy and Special Investigations Europe 16% North America 10% Latin America 22% 33/30

Vendor Risk Management

Vendor Risk Management Vendor Risk Many risk programs have only an internal focus to ensure all people, processes and systems are in control. However, as organizations rely more heavily on outsourcing key business processes,

More information

RSA ARCHER AUDIT MANAGEMENT

RSA ARCHER AUDIT MANAGEMENT RSA ARCHER AUDIT MANAGEMENT Solution Overview INRODUCTION AT A GLANCE Align audit plans with your organization s risk profile and business objectives Manage audit planning, prioritization, staffing, procedures

More information

How To Write An Impactful Audit Report

How To Write An Impactful Audit Report IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI How To Write An Impactful Audit Report The role of Audit adds increasingly more value Susan

More information

Information overload: How to make data analytics work for the internal audit function

Information overload: How to make data analytics work for the internal audit function Information overload: How to make data analytics work for the internal audit function Danny Miller, Scott Higgins and Michael Rose Contents 1 A value proposition for internal audit 2 Leveraging data analytics

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA ARCHER OPERATIONAL RISK MANAGEMENT RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume

More information

Case Study: ICICI BANK INTERNAL AUDIT DEPARTMENT PENTANA AUDIT WORK SYSTEM IMPLEMENTATION

Case Study: ICICI BANK INTERNAL AUDIT DEPARTMENT PENTANA AUDIT WORK SYSTEM IMPLEMENTATION Introduction Emerging trends in the banking sector due to globalisation, liberalisation, increasing environment complexity, regulatory requirements & accountability is driving banks in India to adopt &

More information

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation Copyright, AlgoSec Inc. All rights reserved The Need to Ensure Continuous Compliance Regulations

More information

The Power of Risk, Compliance & Security Management in SAP S/4HANA

The Power of Risk, Compliance & Security Management in SAP S/4HANA The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution

More information

COMPLIANCE MANAGEMENT SYSTEM

COMPLIANCE MANAGEMENT SYSTEM COMPLIANCE MANAGEMENT SYSTEM Ensuring Your Bank Meets Regulatory Standards Overview of Compliance Exams Examination Purpose: Assess the quality of an institution s compliance management system (CMS) for

More information

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT Through CGIAR Financial Guideline No 3 Auditing Guidelines Manual the CGIAR has adopted the IIA Definition of internal auditing

More information

TAX MANAGEMENT CONSULTING. How can you be more efficient at managing tax?

TAX MANAGEMENT CONSULTING. How can you be more efficient at managing tax? TAX MANAGEMENT CONSULTING How can you be more efficient at managing tax? NEW HEAD OF TAX/CFO TAX TRANSPARENCY Business Case Dispute Resolution Finance Transformation Authority Interaction Compliance Delivery

More information

Contract Management The Mavericks Won t Like This!

Contract Management The Mavericks Won t Like This! Contract Management The Mavericks Won t Like This! Keith Wallis How Much Did That Project Cost? Real Life Example Original contract amount $500K Variations scope changes not visible Total variations =

More information

COMPANY LEVEL CONTROLS A PRACTICAL FRAMEWORK

COMPANY LEVEL CONTROLS A PRACTICAL FRAMEWORK COMPANY LEVEL CONTROLS A PRACTICAL FRAMEWORK During the past two years a group of internal control specialists of large Dutch companies listed in the USA have held regular meetings to share experiences

More information

Impact of New Internal Control Frameworks

Impact of New Internal Control Frameworks Impact of New Internal Control Frameworks Webcast: Tuesday, February 25, 2014 CPE Credit: 1 0 With You Today Bob Jacobson Principal, Risk Advisory Services Consulting Leader West Region [email protected]

More information

Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment

Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment Global Technology Audit Guide Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment Author David

More information

Enterprise Risk Management in Compliance 360

Enterprise Risk Management in Compliance 360 Enterprise Risk Management in Compliance 360 2 Enterprise Risk Management in Compliance 360 Effective risk management involves identifying and understanding the risks the organization is faced with, analyzing

More information

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes

More information

Taking the pain out of Risk and Compliance Management Systems. Presented by Andrew Batten 23 April 2015

Taking the pain out of Risk and Compliance Management Systems. Presented by Andrew Batten 23 April 2015 Taking the pain out of Risk and Compliance Management Systems Presented by Andrew Batten 23 April 2015 Operational Improvement Technology Solutions Providing consultancy services Gap assessments Food standard

More information

Agenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment

Agenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment 2011 ERM Symposium March 14 16, 2011 Continuous Controls Monitoring Futuristic Approach to Enterprise Risk Management Swissotel, Chicago, Chicago IL. Speakers: Syed M. Ali Alan Ash Sr. Audit Manager, Director

More information

COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE

COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE COMMITTEE OF SPONSORING ORGANIZATIONS (COSO) 2013 The Committee of Sponsoring Organizations (COSO) Internal Controls Integrated Framework,

More information

COSO 2013 Internal Control Framework

COSO 2013 Internal Control Framework COSO 2013 Internal Control A Guide to Implementation July 24, 2014 Justin Adamson Agenda COSO Background Changes to the Roadmap to Implementation Implementation Considerations & Lessons Learned 2 1 Who/What

More information

INTERNAL AUDIT SOFTWARE BUYER S GUIDE

INTERNAL AUDIT SOFTWARE BUYER S GUIDE BarnOwl Solutions INTERNAL AUDIT SOFTWARE BUYER S GUIDE CONTENTS 1. The need for internal audit 2. What do the standards say? 3. Why implement internal audit software 4. Steps to the successful implementation

More information

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS

More information

High Value Audits: An Update on Information Technology Auditing. Robert B. Hirth Jr., Managing Director

High Value Audits: An Update on Information Technology Auditing. Robert B. Hirth Jr., Managing Director High Value Audits: An Update on Information Technology Auditing Robert B. Hirth Jr., Managing Director The technology landscape and its impact on internal audit Technology is playing an ever-growing role

More information

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS Our solutions dynamically connect business transactions, strategy, and operations to the ever-changing regulatory environment,

More information

Applying Risk Assessment to Your Audit Plan Break-out Session T3, Tuesday, October 26 2:00-2:50pm

Applying Risk Assessment to Your Audit Plan Break-out Session T3, Tuesday, October 26 2:00-2:50pm Applying Risk Assessment to Your Audit Plan Break-out Session T3, Tuesday, October 26 2:00-2:50pm Mike Brown Senior Vice President, Corporate Audit State Street Corporation Rich Reynolds Partner PricewaterhouseCoopers

More information

A Sarbanes-Oxley Roadmap to Business Continuity

A Sarbanes-Oxley Roadmap to Business Continuity A Sarbanes-Oxley Roadmap to Business Continuity NEDRIX Conference June 23, 2004 Dr. Eric Schmidt [email protected] Control Solutions International TECHNOLOGY ADVISORY, ASSURANCE & RISK MANAGEMENT

More information

Establishing a Quality Assurance and Improvement Program

Establishing a Quality Assurance and Improvement Program Chapter 2 Establishing a Quality Assurance and Improvement Program O v e rv i e w IIA Practice Guide, Quality Assurance and Improvement Program, states that Quality should be built in to, and not on to,

More information

Project Management Office Best Practices

Project Management Office Best Practices Project Management Office Best Practices Agenda Maturity Models (Industry & PMO) PMO Areas of Expertise (Scale & Scope) Project Management Office Process Model Project Management Framework PMO Implementation

More information

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/Continuous Monitoring INTRODUCTION New demands from the board, senior organizational

More information

Linking Risk Management to Business Strategy, Processes, Operations and Reporting

Linking Risk Management to Business Strategy, Processes, Operations and Reporting Linking Risk Management to Business Strategy, Processes, Operations and Reporting Financial Management Institute of Canada February 17 th, 2010 KPMG LLP Agenda 1. Leading Practice Risk Management Principles

More information

How to measure your business resiliency

How to measure your business resiliency How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic [email protected]

More information

Leveraging Data Analytics and Continuous Auditing. Internal Audit. January 9, 2014

Leveraging Data Analytics and Continuous Auditing. Internal Audit. January 9, 2014 Leveraging Data Analytics and Continuous Auditing to Transform Internal Audit January 9, 2014 Presenter Introductions John Isenberg, Director KPMG Risk Consulting Dallas Cortnye King, Manager KPMG Risk

More information

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Learning Objectives Understand how data analysis can impact/improve business Understand typical data analysis challenges Understand the various

More information

IBM 2010 校 园 蓝 色 加 油 站 之. 商 业 流 程 分 析 与 优 化 - Business Process Management and Optimization. Please input BU name. Hua Cheng [email protected].

IBM 2010 校 园 蓝 色 加 油 站 之. 商 业 流 程 分 析 与 优 化 - Business Process Management and Optimization. Please input BU name. Hua Cheng chenghua@cn.ibm. Please input BU name IBM 2010 校 园 蓝 色 加 油 站 之 商 业 流 程 分 析 与 优 化 - Business Process Management and Optimization Hua Cheng [email protected] Agenda Why BPM What is BPM What is BAM How BAM helps optimization

More information

Using Assurance Models in IT Audit Engagements

Using Assurance Models in IT Audit Engagements Using Assurance Models in IT Audit Engagements Adrian Baldwin, Yolanta Beres, Simon Shiu Trusted Systems Laboratory HP Laboratories Bristol HPL-2006-148R1 January 29, 2008* audit, assurance, compliance,

More information

Enterprise Program Portfolio Management (EPPM) Why does your organization need Enterprise Portfolio and Program Management (EPPM) software?

Enterprise Program Portfolio Management (EPPM) Why does your organization need Enterprise Portfolio and Program Management (EPPM) software? Enterprise Program Portfolio Management (EPPM) Why does your organization need Enterprise Portfolio and Program Management (EPPM) software? Executive Overview Software has an essential role to play in

More information

Case Management and Real-time Data Analysis

Case Management and Real-time Data Analysis SOLUTION SET AcuityPlus Case Management and Real-time Data Analysis Introduction AcuityPlus enhances the Quality Assurance and Management capabilities of the Cistera Convergence Server by taking existing

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

Third-Party Cybersecurity and Data Loss Prevention

Third-Party Cybersecurity and Data Loss Prevention Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management

More information

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.

More information

Change Management Trends in Governance Structures

Change Management Trends in Governance Structures Change Management Trends in Governance Structures Cheryl Yaeger BenchMark Consulting International OVERVIEW Financial institutions are operating in a very dynamic marketplace today; this requires the ability

More information

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma Governance, Risk, Compliance (GRC) Automation Siamak Razmazma [email protected] September 2009 Agenda Introduction to

More information

Contracts Management Software as a Tool for SOX Compliance

Contracts Management Software as a Tool for SOX Compliance Contracts Management Software as a Tool for SOX Compliance White Paper (281) 334-6970 [email protected] www.prodagio.com In 2002, following the scandals involving corporations such as Enron, WorldCom,

More information

Implementing COBIT based Process Assessment Model for Evaluating IT Controls

Implementing COBIT based Process Assessment Model for Evaluating IT Controls Implementing COBIT based Process Assessment Model for Evaluating IT Controls By János Ivanyos, Memolux Ltd. (H) Introduction New generations of governance models referring to either IT or Internal Control

More information

Solution Overview Better manage environmental, occupational safety, and community health hazards by turning risk into opportunity

Solution Overview Better manage environmental, occupational safety, and community health hazards by turning risk into opportunity Environment, Health and Safety We make it happen. Better. Solution Overview Better manage environmental, occupational safety, and community health hazards by turning risk into opportunity April 2014 A

More information

XBRL & GRC Future opportunities?

XBRL & GRC Future opportunities? XBRL & GRC Future opportunities? Suzanne Janse Deloitte NL Paul Hulst Deloitte / Said Tabet EMC Presenters Suzanne Janse Deloitte Netherlands Director ERP (SAP, Oracle) Risk Management GRC software Paul

More information

The Role of Internal Audit In Business Continuity Planning

The Role of Internal Audit In Business Continuity Planning The Role of Internal Audit In Business Continuity Planning Dan Bailey, MBCP Page 0 Introduction Dan Bailey, MBCP Senior Manager Protiviti Inc. [email protected] Actively involved in the Information

More information

OUTSOURCING AND SERVICE AUDITOR S REPORTS

OUTSOURCING AND SERVICE AUDITOR S REPORTS OUTSOURCING AND SERVICE AUDITOR S REPORTS FREEDOM TO DO BUSINESS Outsourcing and service Auditor s Reports 3 OUTSOURCING AND SERVICE AUDITOR S REPORTS SERVICE AUDITOR S REPORTS ARE GROWING IN IMPORTANCE,

More information

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES THOMSON REUTERS ACCELUS ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES PROACTIVE. CONNECTED. INFORMED. THOMSON REUTERS ACCELUS Compliance management Solutions Introduction The advent of new and pending

More information

Compliance Management, made easy

Compliance Management, made easy Compliance Management, made easy LOGPOINT SECURING BUSINESS ASSETS SECURING BUSINESS ASSETS LogPoint 5.1: Protecting your data, intellectual property and your company Log and Compliance Management in one

More information

ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS ACCELUS RISK MANAGEMENT SOLUTIONS

ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS ACCELUS RISK MANAGEMENT SOLUTIONS ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS Our solutions dynamically connect business transactions, strategy, and operations to

More information

Internal Loss Data Collection in a Global Banking Organisation

Internal Loss Data Collection in a Global Banking Organisation Internal Loss Data Collection in a Global Banking Organisation Operational Risk Policy & Support Kevin Moffitt / Gerrit Jan van de Lagemaat 1 Contents I. Introduction - Defining the Site II. III. IV. Drafting

More information

Internal Control over Financial Reporting Guidance for Smaller Public Companies

Internal Control over Financial Reporting Guidance for Smaller Public Companies Internal Control over Financial Reporting Guidance for Smaller Public Companies Frequently Asked Questions Internal Control over Financial Reporting Guidance for Smaller Public Companies Frequently Asked

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

Enterprise Risk Management & Information Technology

Enterprise Risk Management & Information Technology Enterprise Risk Management & Information Technology Presented by Scott Perry and Gary Ross Slalom Consulting, San Francisco Agenda Introductions Session Objectives Overview of Enterprise Risk Management

More information

CRM for Business Intelligence

CRM for Business Intelligence DATA SHEET CRM for Business Intelligence MAXIMIZER CRM Published By Real-time visibility into your business Strategize effectively and make informed business decisions with timely, accurate insight into

More information

ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT

ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT Accounting and Management Information Systems Vol. 11, No. 1, pp. 44 55, 2012 ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT Pavel NĂSTASE 1 and Simona Felicia UNCHIAŞU

More information

Rethinking Key Account Management: adapting and refining your Sales organization s response to the new realities

Rethinking Key Account Management: adapting and refining your Sales organization s response to the new realities Rethinking Key Account Management: adapting and refining your Sales organization s response to the new realities Managing the future Most executives recognize that the real assets of a company are embedded

More information

CRM for Business Intelligence

CRM for Business Intelligence CRM for Business Intelligence Real-time visibility into your business Strategise effectively and make informed business decisions with timely, accurate insight into your organisation. Maximizer CRM 2015

More information

Data Quality for BASEL II

Data Quality for BASEL II Data Quality for BASEL II Meeting the demand for transparent, correct and repeatable data process controls Harte-Hanks Trillium Software www.trilliumsoftware.com Corporate Headquarters + 1 (978) 436-8900

More information

Identity & Access Management new complex so don t start?

Identity & Access Management new complex so don t start? IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach

More information

www.pwc.com Leveraging Continuous Auditing / Continuous Monitoring in internal audit April 10, 2012

www.pwc.com Leveraging Continuous Auditing / Continuous Monitoring in internal audit April 10, 2012 www.pwc.com Leveraging Continuous Auditing / Continuous Monitoring in internal audit April 10, 2012 Agenda 1. Introductions to DA, CA & CM [] 2. Inventory management continuous monitoring [The Gap] 3.

More information

Internal Audit Practice Guide

Internal Audit Practice Guide Internal Audit Practice Guide Continuous Auditing Office of the Comptroller General, Internal Audit Sector May 2010 Table of Contents Purpose...1 Background...1 Definitions...2 Continuous Auditing Professional

More information

How do you manage the growing complexity of software development? Is your software development organization as responsive to your business needs as

How do you manage the growing complexity of software development? Is your software development organization as responsive to your business needs as How do you manage the growing complexity of software development? Is your software development organization as responsive to your business needs as it could be? Borland Core SDP enables your IT organization

More information

Thought Leadership White Paper

Thought Leadership White Paper Thought Leadership White Paper Introduction Contracts form the foundation of all businesses and every business relationship. They define every aspect of a business s activities procurement, sales, marketing,

More information

3 rd Party Vendor Risk Management

3 rd Party Vendor Risk Management 3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced

More information

PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution

PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution 1. The Challenge Large enterprises are experiencing an ever increasing burden of regulation and legislation against which they

More information

LEVERAGE TECHNOLOGY TO EMPOWER INTERNAL AUDIT

LEVERAGE TECHNOLOGY TO EMPOWER INTERNAL AUDIT LEVERAGE TECHNOLOGY TO EMPOWER INTERNAL AUDIT PRESENTED BY: BRYAN BURNHART, CISA NORTH AMERICAN PRE-SALES MANAGER THOMSON REUTERS GRC COLLEGES AND UNIVERSITIES 2010 Thomson Reuters. All Rights Reserved.

More information

Best practices for planning and budgeting. A white paper prepared by Prophix

Best practices for planning and budgeting. A white paper prepared by Prophix A white paper prepared by Prophix Executive summary The continual changes in the business climate constantly challenge companies to find more effective business practices. However, common budgeting limitations

More information

14 TRUTHS: How To Prepare For, Select, Implement And Optimize Your ERP Solution

14 TRUTHS: How To Prepare For, Select, Implement And Optimize Your ERP Solution 2015 ERP GUIDE 14 TRUTHS: How To Prepare For, Select, Implement And Optimize Your ERP Solution Some ERP implementations can be described as transformational, company-changing events. Others are big disappointments

More information

Cloud Infrastructure Security Management

Cloud Infrastructure Security Management www.netconsulting.co.uk Cloud Infrastructure Security Management Visualise your cloud network, identify security gaps and reduce the risks of cyber attacks. Being able to see, understand and control your

More information

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Regulatory compliance. Server virtualization. IT Service Management. Business Service Management. Business Continuity planning.

More information

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES... Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

6/8/2016 OVERVIEW. Page 1 of 9

6/8/2016 OVERVIEW. Page 1 of 9 OVERVIEW Attachment Supervisory Guidance for Assessing Risk Management at Supervised Institutions with Total Consolidated Assets Less than $50 Billion [Fotnote1 6/8/2016 Managing risks is fundamental to

More information

Compliance. Group Standard

Compliance. Group Standard Group Standard Compliance Serco is committed to good governance practices and the management of risks supported by a robust business compliance process SMS-GS-G2 Compliance July 2014 v1.0 Serco Public

More information

SUSTAINING COMPETITIVE DIFFERENTIATION

SUSTAINING COMPETITIVE DIFFERENTIATION SUSTAINING COMPETITIVE DIFFERENTIATION Maintaining a competitive edge in customer experience requires proactive vigilance and the ability to take quick, effective, and unified action E M C P e r s pec

More information

APPLICATION OF KING III CORPORATE GOVERNANCE PRINCIPLES 2014

APPLICATION OF KING III CORPORATE GOVERNANCE PRINCIPLES 2014 WOOLWORTHS HOLDINGS LIMITED CORPORATE GOVERNANCE PRINCIPLES 2014 CORPORATE GOVERNANCE PRINCIPLES 2014 CORPORATE GOVERNANCE PRINCIPLES 2014 This table is a useful reference to each of the King III principles

More information

OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT

OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT ERM as the foundation for regulatory compliance and strategic business decision making CONTENTS Introduction... 3 Steps to developing an

More information

Concur Customer Experience 2015 REPORT. Concur // Customer Experience 2015 Report

Concur Customer Experience 2015 REPORT. Concur // Customer Experience 2015 Report Concur Customer Experience 2015 REPORT 1 Contents 3 Welcome Contents 4 Gathering feedback 5 The impact of your feedback 5 User experience evolution 5 Product reliability 7 Looking toward the future 7 Customer

More information

APPLICATION OF THE KING III REPORT ON CORPORATE GOVERNANCE PRINCIPLES

APPLICATION OF THE KING III REPORT ON CORPORATE GOVERNANCE PRINCIPLES APPLICATION OF THE KING III REPORT ON CORPORATE GOVERNANCE PRINCIPLES Ethical Leadership and Corporate Citizenship The board should provide effective leadership based on ethical foundation. that the company

More information

Client Onboarding Process Reengineering: Performance Management of Client Onboarding Programs

Client Onboarding Process Reengineering: Performance Management of Client Onboarding Programs KNOWLEDGENT INSIGHTS volume 1 no. 4 September 13, 2011 Client Onboarding Process Reengineering: Performance Management of Client Onboarding Programs In the midst of the worst economic environment since

More information

CDC UNIFIED PROCESS PRACTICES GUIDE

CDC UNIFIED PROCESS PRACTICES GUIDE Document Purpose The purpose of this document is to provide guidance on the practice of Quality Management and to describe the practice overview, requirements, best practices, activities, and key terms

More information

Leveraging a Maturity Model to Achieve Proactive Compliance

Leveraging a Maturity Model to Achieve Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................

More information

fs viewpoint www.pwc.com/fsi

fs viewpoint www.pwc.com/fsi fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a

More information

A proven 5-step framework for managing supplier performance

A proven 5-step framework for managing supplier performance IBM Software Industry Solutions Industry/Product Identifier A proven 5-step framework for managing supplier performance Achieving proven 5-step spend framework visibility: benefits, for managing barriers,

More information

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT

More information

One source. One amazing service. Procurement Process and the Sarbanes-Oxley Act

One source. One amazing service. Procurement Process and the Sarbanes-Oxley Act One source. One amazing service. Procurement Process and the Sarbanes-Oxley Act May, 2005 EXECUTIVE SUMMARY Public companies are spending a great deal of time and effort to comply with the Sarbanes-Oxley

More information

Best Practices for Planning and Budgeting. A white paper prepared by PROPHIX Software October 2006

Best Practices for Planning and Budgeting. A white paper prepared by PROPHIX Software October 2006 A white paper prepared by PROPHIX Software October 2006 Executive Summary The continual changes in the business climate constantly challenge companies to find more effective business practices. However,

More information

Accenture Federal Services. Federal Solutions for Asset Lifecycle Management

Accenture Federal Services. Federal Solutions for Asset Lifecycle Management Accenture Federal Services Federal Solutions for Asset Lifecycle Management Assessing Internal Controls 32 Material Weaknesses: identified in FY12 with deficiencies noted in the management of nearly 75%

More information

IIA Position Paper: THE THREE LINES OF DEFENSE IN EFFECTIVE RISK MANAGEMENT AND CONTROL

IIA Position Paper: THE THREE LINES OF DEFENSE IN EFFECTIVE RISK MANAGEMENT AND CONTROL IIA Position Paper: THE THREE LINES OF DEFENSE IN EFFECTIVE RISK MANAGEMENT AND CONTROL JANUARY 2013 TABLE OF CONTENTS Introduction... 1 Before the Three Lines: Risk Management Oversight and Strategy-Setting...

More information

MDaudit Compliance made easy. MDaudit software automates and streamlines the auditing process to improve productivity and reduce compliance risk.

MDaudit Compliance made easy. MDaudit software automates and streamlines the auditing process to improve productivity and reduce compliance risk. MDaudit Compliance made easy MDaudit software automates and streamlines the auditing process to improve productivity and reduce compliance risk. MDaudit As healthcare compliance, auditing and coding professionals,

More information

Enterprise Risk Management (ERM): In Action. January 2010. Co-presented by: Michael Yip, Marsh Risk Consulting Norma Essary, DFW International Airport

Enterprise Risk Management (ERM): In Action. January 2010. Co-presented by: Michael Yip, Marsh Risk Consulting Norma Essary, DFW International Airport January 2010 Enterprise Risk Management (ERM): In Action Co-presented by: Michael Yip, Risk Consulting Norma Essary, DFW International Airport www.marsh.com Discussion Topics Enterprise Risk Management

More information