IT Governance, Risk, and Compliance
|
|
|
- Karin Parsons
- 10 years ago
- Views:
Transcription
1 May Annual Report IT Governance, Risk, and Compliance Improving business results and mitigating financial risk IT Policy Compliance Group
2
3 Contents Executive summary IT GRC, business results, and GRC capability maturity IT GRC among the most mature An empirical IT GRC capability maturity model Implications and analysis Key recommendations for action What is IT GRC? Safely managing the speed of IT The business impact of IT GRC maturity Business results: Customers, revenues, expenses, and profits Loss or theft of sensitive data and IT GRC maturity Regulatory compliance deficiencies and IT GRC maturity Business downtime from IT service disruptions IT GRC maturity, financial rewards, and risks Business pressures impacting IT Business and financial risks Financial risk from the loss or theft of customer data Financial risk from business disruptions due to IT service disruptions IT GRC: IT governance, risk, and compliance management Organizational competencies and IT GRC maturity Who should be involved in IT governance Who should be involved in assessing and demonstrating compliance Employee training: A culture of compliance Organizational actions to improve IT GRC results Business risks, assessments, and priorities IT GRC functions and practices Framework usage and IT GRC maturity Measurable results, Continuous Quality Improvement, and IT GRC IT Policy Compliance Group i
4 Practices and capabilities aligned with IT GRC maturity Actions taken in IT to improve IT GRC maturity Frequency of reporting for IT procedures and functions Frameworks for IT assurance, audit, and IT operations Control objectives and controls Automating activities in IT Frequency of controls assessment, measurement, monitoring, and reporting Assessment, measurement, and monitoring of IT general controls What color is the IT change management program? IT audit strategy and scope Putting IT GRC into action Spending on regulatory compliance Time spent on regulatory compliance by IT assurance and audit Managing the improvements Assess, improve, measure The integrated approach to IT GRC Appendix A: GRC CMM tables Appendix B: Results by industry and size Industry results Large enterprises: Slightly more at risk About the benchmarks About IT Policy Compliance Group
5 Executive summary Managing the value delivered by IT is traditionally associated with managing change to business procedures and applications that directly impact customer retention, sales, revenues, profits, and expenses. Although valid, this view as the sole way to measure the value of IT is under siege as more organizations experience increasing loss or theft of customer data and endure the fallout from these events, including customer defections, revenue losses, declines in public capitalization, increases in expenses, and short-term profit declines. Not limited to managing and protecting customer data, IT is being challenged to maintain nearly 100 percent uptime to avoid business disruptions while cost-effectively responding to numerous legal requests, statutes, and regulatory audits. In today s global economy, the livelihood of the organization is linked to how well the IT function manages the availability, integrity, and confidence of the information and IT systems used to operate core business procedures. Whether it is protecting information or meeting legal and regulatory requirements, the challenge confronting IT managers in an increasingly interconnected world means managing business opportunity and risk simultaneously. The most recent research conducted by the IT Policy Compliance Group shows that improvements to data protection and compliance are paying big dividends among firms with the most mature governance, risk management, and compliance management practices. These include: Consistently higher revenues than all other firms Much higher profits than all others Better customer retention rates Dramatically lower financial risks and losses from the loss or theft of customer data Significantly reduced financial impact from business disruptions caused by IT disruptions Much lower spending on regulatory audit Business results among firms with the most mature practices 17 percent higher revenues 14 percent higher profits 18 percent higher customer satisfaction rates 17 percent higher customer retention levels 96 percent lower financial losses from the loss or theft of customer data 50 times less likely to lose or have customer data stolen 50 percent less spent on regulatory compliance annually Unfortunately, only slightly more than one in ten firms are enjoying the extraordinary business benefits associated with these most mature practices. In contrast, about seven in ten organizations are experiencing business results that are half of what the leading firms deliver while also posting financial losses that are much higher. Moreover, most of these firms are overspending on regulatory compliance due to high use of manual procedures and less mature practices. The worst performers, about two in ten organizations, are experiencing much lower business results than all other firms, much higher financial losses, and much more difficulty with regulatory and legal mandates IT Policy Compliance Group 1
6 What is striking from the research is the organizations with best business results are the same firms with the most mature practices. The converse is also true: the organizations with the worst business results are the same firms with the least mature practices. Defining IT GRC broadly as (1) the management of value delivered to the organization by IT; (2) the management of risk associated with the use and disposition of IT resources; and (3) the management of compliance with corporate policies, legal statutes, and regulatory audits, this annual report shines a spotlight on the competencies, capabilities, and practices that are most responsible for influencing and impacting business rewards and risks. IT GRC, business results, and GRC capability maturity Simply put, the more mature the practices for managing reward and risk, the better the business results of the organization and the lower the financial risks. Conversely, the less mature the IT practices, the worse the business results and financial losses (see Figure 1). Firms with the most mature IT GRC practices experience, on average, 8.5 percent more revenue than those operating in the middle of the normative range. Compared to the least mature, the most mature firms are experiencing revenues that are 17 percent higher. Similar disparity in results for expenses in IT, profits for the firm, customer satisfaction, and customer retention show that the maturity of IT GRC practices for managing reward and risk has a direct impact on the organization. IT GRC Maturity Population 20% 68% 12% Customer satisfaction Customer retention Revenue Expenses Profits -8.7% -4.4% 0% 4.4% 8.7% -6.3% -3.2% 0% 3.2% 7.3% -8.5% -4.3% 0% 4.3% 8.5% -6.4% -3.2% 0% 3.2% 6.4% -6.9% -3.5% 0% 3.5% 6.9% Financial risk from customer data loss/theft 9.6% of revenue 8% of revenue 6.4% of revenue 3.2% of revenue 0.4% of revenue Financial risk from disrupted business operations 10% of revenue 3% of revenue 1% of revenue 0.4% of revenue 0.2% of revenue Spending on regulatory compliance 37% lower than maximum 3% lower than maximum 3% lower than maximum 20% lower than maximum 52% lower than maximum N: XXX Figure 1. Operating results and IT GRC maturity IT Policy Compliance Group
7 IT GRC among the most mature Marked by a focus on operational excellence, firms with the most mature IT GRC profiles have established an integrated approach to managing risk and reward within the IT function and across the entire organization. Among these firms, senior managers in IT are employing the balanced scorecard to: 1. Regulate reward and risk decisions impacting the organization 2. Establish policies and objectives for IT 3. Institute a learning and growth culture that includes continuous quality improvement within the IT function (see Figure 2) Financial Senior managers Customers Balanced scorecard Vision and strategy Business procedures Business rewards Business risks Learning and growth Assess Improve Measure Policies and control objectives 75% of maximum IT assurance, risk internal controls, audit management Procedural (manual) controls Assess Improve Measure Automated (technical) controls IT and audit operations Common procedures, configurations, and controls Continuous measurement Figure 2. IT GRC among the most mature Within the IT function, and across legal, audit, internal controls, and business lines, the management of objectives for business reward and risk are being achieved with continuous quality improvement, control objectives, frequent measurement and reporting, common procedures, and high levels of automation, all complemented by IT service level objectives and contracts with IT vendors. Within the IT operations function, the focus is on common IT procedures, more automated controls, continuous measurement, and diligent IT change management and prevention procedures. Marked by the use of Six Sigma among some firms and simpler Continuous Quality Improvement cycles among many others, the most mature organizations establish a focus on operational excellence within IT that reflects results back into the objectives established and improved through the use of a balanced scorecard. Among these firms, the hallmark of the approach is: Make it easy to understand, easy to implement, and continuously improved IT Policy Compliance Group 3
8 The Continuous Quality Improvement effort for the governance of IT and the balancing of reward and risk associated with the use of IT takes place at all levels within IT, and across the organization, among the most mature organizations. An empirical IT GRC capability maturity model Primary benchmark research conducted by the IT Policy Compliance Group during the past two years has resulted in a GRC Capability Maturity Model (GRC CMM) with specific practices, competencies, and capabilities associated with each maturity level. This fact-based GRC Capability Maturity Model can be used to assess current maturity levels and quantify the business outcomes associated with each maturity level, as well as identify desired business outcomes and the capabilities, practices, and competencies needed to improve results. The scale employed for the GRC CMM borrows from prior research, including significant contributions made by ISACA and the IT Governance Institute. Against this scale, the business results, financial losses, financial risks, business disruptions, and regulatory compliance experience of more than 2,600 firms have been mapped, from worst (level 1) to best (level 5) results. The competencies, capabilities, and practices associated with each maturity level in the GRC CMM are those of the firms with specific business results at each level. This basis for the practices, capabilities, and competencies in the GRC CCM delivers empirical insight into what is working and not working, based upon primary research and facts, not hypothesis. Implications and analysis The way to improve business results and to reduce risk, loss, and expense is to increase or enhance the IT GRC competencies, practices, and capabilities governing the business rewards and risks associated with the use and disposition of IT. While most organizations will need to improve results, operating at the highest maturity level may be inappropriate for some firms. For some, the desired objective may be to operate at level 4.5 or 4.0 on the GRC CMM maturity scale. As a result, improving the balance between business reward and risk for a specific organization is going to be a journey that must be taken relative to the industry within which it competes. Organizational competencies The organizational competencies implemented by the most mature firms include leadership by IT, legal, audit and finance functions; employee training and a culture of compliance; improvements to specific practices and capabilities within IT operations; IT assurance and audit; and a continuous quality improvement effort. Organizational competencies IT, legal, internal audit, and finance leadership Employee training and a culture of compliance Improvements to IT risk assessments, data protection, IT audit, risk, and compliance practices and capabilities Adjustments to spending in IT to support needed capabilities A continuous quality improvement program for IT GRC An integrated IT GRC program These are the hallmarks of an integrated IT GRC program being implemented by the most mature firms IT Policy Compliance Group
9 Practices and capabilities In addition to organizational competencies, specific practices and capabilities leading to better business results and less financial risk, loss, and expense include segmenting and safeguarding customer data, rationalizing policies and control objectives, common procedures and systems, more controls, much more automation, change management, and continuous measurement, among others. Key recommendations for action Based on the relationship between the maturity of IT GRC practices among organizations and the business reward and risk outcomes being experienced by firms at different maturity levels, the key recommendations from the research include actions for senior managers, vice presidents, managers, and directors, as well as recommendations for use within IT operations, IT assurance, and IT audit. Although the end goal for some firms may be to operate at the most mature levels for IT GRC, others may find this inappropriate. All firms will want to evaluate their specific financial rewards and risks when deciding which level of IT GRC maturity is desirable, and what improvements have to be made to achieve their objectives. For this reason, it is important that managers first assess the maturity of their own organization; determine the optimal reward, risk, and expense targets; establish the desired level of maturity; and identify and implement the improvements needed to achieve their objectives. After identifying objectives for important business metrics, the GRC CMM enables organizations to identify the following, based on targeted maturity levels: Increases in revenue, profit, and customer retention Avoidance or mitigation of financial and operational risk and loss Expense reductions for legal and regulatory compliance Practices and capabilities needed to achieve objectives Organizational competencies needed to achieve objectives Practices and capabilities Safeguarding of customer data and systems Rationalized policies and control objectives Common IT procedures and systems More controls Automation of controls and activities Effective change management Continuous measurement Key recommendations Use a balanced scorecard or similar tool to improve the delivery of value and the performance results of IT. Staff the governance committee from senior business, financial, legal, regulatory, and audit committee members. Drive improvements to maturity and business outcomes with a measurable and continuous quality improvement program throughout IT. Insist on monthly reporting to drive improvements. Improve and automate technology controls to mitigate and avoid financial risk, brand damage, and business disruptions. Improve the skills and automate the activities within IT assurance, audit, and risk management. Segment and limit, where possible, to reduce exposure and costs. Manage change management and prevention to avoid higher financial risks and cost inefficiencies. Continuously measure and assess conditions, controls, objectives, and policies to maintain an appropriate balance between reward and risk IT Policy Compliance Group 5
10 It is important to assess results, both before and after changes to practices, capabilities, and competencies within the organization. Only by measuring before and after will the organization know whether the improvements are sufficient or not. This simple recipe for Continuous Quality Improvement supplies the backbone for a measurable and integrated IT GRC program within IT that will optimize the balance between reward and risk, as demonstrated by the results being achieved by the most mature organizations. Improving competencies, practices, and capabilities The capabilities, practices, and competencies directly associated with higher GRC CCM maturity levels provide the opportunity to diagnose specific shortfalls or misaligned activities that a firm may already have implemented (see Figure 3). Current state Desired state Assessment Business results Business risks Current state Desired state Competencies Practices Capabilities Current state Desired state Figure 3. Managing improvements to IT GRC maturity For instance, an organization may have implemented continuous monitoring but may find that its Continuous Quality Improvement program is based on vague or nonexistent metrics that stifle its progress. Or, a firm may find that it has implemented a balanced scorecard for the alignment of value delivered by IT without any of the underlying practices necessary to enhance IT GRC maturity IT Policy Compliance Group
11 Some organizations may find that moving from their current state of maturity will require an incremental approach through planned stages. In this case, it is critical to identify the shortfalls against benchmarked practices and capabilities and develop phased plans that are based on priorities to improve specific practices as part of a longer-term plan for improving results. Assessing the current level of maturity and the desired objective, along with the practices and capabilities needed to improve results, can be accomplished with the assistance of this research report. The tables in Appendix A list specific business outcomes for each maturity level. Similarly, the practices, capabilities, and competencies correlated with each maturity level are listed in these tables. The current state of maturity, desired objectives, and specific practices that might be needed to improve results can also be found in the tables in Appendix A. In addition, interactive assessment tools at the IT Policy Compliance Group website ( will provide an automated method to assess the current maturity of the organization, the business outcomes for each level of maturity, and the improvements that can be targeted. What is IT GRC? Simply, IT GRC encompasses the practices for delivering the following: 1. Greater business value from IT strategy, investment and alignment 2. Significantly reduced business and financial risk from the use of IT 3. Conformance with policies of the organization and its external legal and regulatory compliance mandates While some of these practices involve continuous improvement to quality, others involve practices and capabilities that are known to be effective, along with objectives for what the organization wants to achieve. IT GRC energizes the entire organization to imagine what it can achieve, establishes methods for achieving their objectives, and demonstrates the practices that are proven to work for minimizing business and financial risk. Fundamentally, IT GRC is about striking an appropriate balance between business reward and risk, enabling an organization to more effectively anticipate and manage business risk while more effectively delivering value for the organization (see Figure 4) IT Policy Compliance Group 7
12 Safely managing the speed of IT Much like a team trying to win an automobile race, an organization may choose to press the accelerator pedal of IT usage and change to the floor. But, when road conditions, fuel remaining in the tank, tire conditions, brakes, and drivers change, or when drivers are not paying attention, accidents are more likely to occur. Moderate speed Moderate risk Lower speed Lower risk % of maximum Higher speed Higher risk % of maximum 75% of maximum Figure 4. Managing the speed of IT Objectives of organizations cannot be achieved when IT change does not keep pace with changing business conditions. Similarly, when the pace of IT change or use is faster, accidents are more likely. IT GRC involves the practices and procedures implemented to: Govern the investment and alignment of IT strategies and resources Manage risks associated with the introduction, use, and disposition of IT resources Manage compliance with company policy, regulatory, and legal requirements Like the driver of an automobile, experience begets greater maturity, enabling some organizations to accelerate past competitors with less worry IT Policy Compliance Group
13 The business impact of IT GRC maturity IT GRC maturity covered by this research report is based upon the following: 1. Primary research results conducted with thousands of organizations 2. The practices and capabilities directly related to business rewards and risks experienced by these firms 3. The practices and capabilities associated with each level of reward and risk The result is a maturity matrix that is based upon empirical evidence (see Figure 5). IT GRC Maturity Population 20% 68% 12% Nonexistent practices and procedures Initial ad hoc procedures and practices Repeatable but intuitive procedures and practices Defined procedures and practices Managed and measured procedures and practices Optimized and balanced procedures and practices Business result metrics Lowest results Lowest to highest results Highest results Financial impact from data loss or theft and IT service level disruptions Highest financial risk Highest to lowest Lowest financial risk IT GRC business risk indicators Highest Highest to lowest Lowest N: 2,608 Figure 5. IT GRC maturity capability model The descriptions of the maturity levels for GRC in this report are similar to and borrow from much previous research, including contributions made by supporting members of the IT Policy Compliance Group, including the Computer Security Institute, the Institute of Internal Auditors, ISACA, the IT Governance Institute, Protiviti, and Symantec (see Appendix A) IT Policy Compliance Group 9
14 However, after the scale and descriptions of the maturity levels, the findings contained in this report differ markedly from available maturity models in three principal ways, as follows: 1. The findings are focused exclusively on IT GRC. 2. The maturity described by the report is directly linked to financial results and risks from primary research benchmarks. 3. The practices and capabilities are directly related to business outcomes at each maturity level, based on primary research benchmarks. There are many different maturity models available. Most provide a way to assess practices and capabilities needed to improve results for a specific purpose, along with a roadmap for evaluating current and desired future states. The maturity relationships contained in this report rely on benchmark findings and publicly available data for business outcomes, financial risks, and business risk indicators throughout the entire spectrum, from one end to the other. If a result, a practice or a capability is not grounded in the reality of actual experience, it is not contained in the report or the GRC CMM. There are direct relationships between the maturity of IT GRC practices and capabilities, and the business results positive and negative being experienced by organizations. The primary IT GRC metrics tracked by the benchmarks include customer satisfaction, customer retention, revenue, profit, financial loss and the occurrence of such losses after the loss or theft of customer data, business disruptions leading to financial losses that are directly related to IT service disruptions, and the number of regulatory compliance deficiencies that must be corrected to pass audit and that are costing the organization more, or less, money to sustain regulatory audit results. Results from the benchmarks consistently show a normal distribution of results for these metrics, from the worst business results to the best, from the worst financial losses to the best, from the most business disruptions to the least, and from the most difficulty with regulatory audit to the least. Consistently, within and across all of the benchmarks, the population with the worst results is 20 percent of the population of firms participating in the benchmarks, and those firms with the best results number 12 percent of the population. In between these two ends of the spectrum lies a majority of the population, 68 percent, with normative results: between the worst and the best. This consistently normal distribution of results is accompanied by consistent research findings related to a number of factors, including: Actions being taken to improve results Competencies and capabilities to take these actions Practices implemented by organizations to take these actions The consistency in business outcomes, aligned with consistent findings in the actions, competencies, capabilities, and practices forms the basis for the GRC CMM being covered in this annual report, focusing on IT GRC maturity IT Policy Compliance Group
15 Across more than 2,600 separate organizations, the findings show that roughly two in ten organizations are operating with worst business results and the highest business risks. The findings also show that a little more than one in ten organizations are posting the best business results and the least financial risk. In between these two are a majority of firms, with neither the best business results nor the worst financial losses (see Figure 6). Percentage of organizations 80% 70% 60% 50% Business results: worst Financial loss and risk: highest Regulatory audit results: worst Business results: best Financial loss and risk: lowest Regulatory audit results: best 40% 30% 20% 10% 0% Normative N: 2,608 IT GRC maturity Figure 6. Distribution of business results by maturity Each of the metrics measured by the benchmarks shows results that are consistently repeated, including business results, financial risk from data loss or theft, business disruptions, and the experience that organizations are having with regulatory compliance. Business results: Customers, revenues, expenses, and profits The most recent benchmarks measure the impact that improvements to data protection, regulatory compliance, and IT service level resiliency have had on business results, including customer satisfaction, customer retention, revenue, expenses, and profits. Tracked on a 10-point scale and measured by percentage changes, the results show the same population distribution: Twenty percent of organizations have an overall score of 6.37 for these five business results, on the high-end of no impact. Sixty-eight percent of firms have an overall score of 6.86 for these five business results, on the low-end of a slight increase. Twelve percent of organizations have an overall score of 7.40, in the middle of the range for slight increase IT Policy Compliance Group 11
16 The raw scores clearly show that firms with better IT GRC results are enjoying much better results when it comes to satisfying customers, retaining customers, and growing revenues and profits than all other organizations (see Figure 7). Raw scores: How improvements to data protection and IT compliance have impacted business results Population distribution 5 68% 12% 4 20% N: 558 Normative Large decline Small decline 1. Customer satisfaction 2. Customer retention 3. Revenues 4. Expenses 5. Profits No impact Small increase Large increase Figure 7. Business results Although there is a slight improvement among all firms, the results show clearly that the most mature firms are experiencing much better business results. Unfortunately, the average scores across these performance domains do not show the gulf separating the results between the organizations with the least and most mature IT GRC profiles. The percentage changes and relative scores provide much greater insight into the contribution to business results being achieved by firms with the most mature IT GRC practices. Business results: Relative to the norm Whether normalized to the mean scores for each business metric or measured directly from percentage changes that occurred for organizations, the change in value for customer satisfaction, customer retention, revenues, expenses, and profits shows a swing that ranges from nearly negative 10 percent on the low side among the least mature to nearly positive 10 percent on the high side being experienced by most mature firms, matching raw scores from other portions of the benchmarks (see Figure 8). Although posting results that are on the high end of no impact, the majority of firms operating as least mature are experiencing results that are 7.4 percent less than that of the firms operating at the IT GRC norm for all business metrics IT Policy Compliance Group
17 The most mature firms, those posting results in the middle of slight increase for all business metrics, are experiencing results that are averaging 7.6 percent more than the firms operating at the norm for all business metrics. Average raw scores for business metrics Change relative to industry norm for business metrics % 7.0 Slight increase 5% 6.5 0% 6.0 No impact -5% 5.5 Normative -10% Normative N: 558 Normative Customer satisfaction Customer retention Revenues Expenses Profits Figure 8. Relative and raw scores for business results The majority of firms those operating at IT GRC norm are not experiencing the more dramatic differences in revenues, expenses, profits, customer satisfaction, or customer retention being posted by the firms with the most, or least, mature IT GRC profiles, practices, competencies, and capabilities. Loss or theft of sensitive data and IT GRC maturity The loss or theft of sensitive data is another of several IT GRC business risk indicators tracked by the benchmarks. The population distribution for these metrics show: 1. Twenty percent of the population has the worst data protection results, with more than 12 losses or thefts of sensitive data each year. 2. Sixty-eight percent of the population has normative data protection results, with between 3 and 12 losses or thefts of sensitive data annually. 3. Twelve percent of the population has the best data protection results, with fewer than 3 losses or thefts of sensitive data each year IT Policy Compliance Group 13
18 Data theft or loss and IT GRC maturity correlation: Same firms dominate In addition to the population distribution, the set of organizations that compose each of the major areas (least mature, normative, and most mature) is almost identical, with slight variations. For example, 75 percent of the firms with the least mature IT GRC results are the same firms with the largest and most frequent losses or thefts of sensitive data. Almost all 92 percent of the firms with middling IT GRC results are the same firms with somewhere between 3 and 12 losses or thefts of sensitive data each year. And, nearly all 96 percent of the firms with the best IT GRC results are the exact same firms with the fewest and least frequent losses or thefts of sensitive data annually (see Figure 9). Population 68% Percentage of organizations 100% 80% 12% 60% 20% 40% 20% Normative 0% More than 12 3 to 12 Less than 3 Number of annual losses or thefts of sensitive business data N: 1,014 Figure 9. Data loss or theft results The alignment of the findings raises some interesting questions, such as: Is information more secure because of better regulatory compliance practices? Do better data protection practices deliver better customer satisfaction, retention, revenue, and profits? Are more mature results for IT GRC related to better business results, better data protection, and regulatory compliance results? IT Policy Compliance Group
19 Regulatory compliance deficiencies and IT GRC maturity Regulatory compliance results are but one of several IT GRC business risk indicators tracked by the benchmarks. The population distribution for these metrics show: 1. Twenty percent of the population has the worst regulatory compliance results, with more than 12 deficiencies that must be corrected to pass audit. 2. Sixty-eight percent of the population has normative regulatory compliance results, with between 3 and 12 deficiencies that must be corrected to pass audit. 3. Twelve percent of the population has the best regulatory compliance results, with fewer than 3 deficiencies that must be corrected to pass audit. = worst compliance results; most mature = best compliance results In addition to the population distribution, the organizations that compose each of the major areas (least mature, normative, and most mature) demonstrate alignment of results by maturity. For example, 76 percent of the firms with the least mature IT GRC results are the same firms with the most audit deficiencies that must be corrected to pass audit (see Figure 10). Population 68% Percentage of organizations 100% 80% 12% 60% 20% 40% 20% Normative 0% More than 12 hours 3 to 12 hours Less than 3 hours Number of regulatory compliance deficiencies that must be corrected to pass audit N: 2,084 Figure 10. Regulatory compliance results 2008 IT Policy Compliance Group 15
20 Almost all 93 percent of the firms with middling IT GRC results are the same firms with somewhere between 3 and 12 audit deficiencies that must be corrected to pass audit. And, nearly all 97 percent of the firms with the best IT GRC results are the same firms with the least number of regulatory audit deficiencies that must be corrected to pass audit. Business downtime from IT service disruptions Very similar results are posted for business disruptions due to IT service disruptions, many of which are due to IT security events. Roughly 20 percent of all firms suffer the highest levels of downtime: more than 80 hours annually. Another 68 percent are operating somewhere in the middle, with between 2 and 80 hours of downtime each year due to IT disruptions. And, only 12 percent are fortunate enough to have business operations halted for 2 hours or less each year due to IT disruptions. Business downtime and IT GRC maturity correlation: Same firms dominate The majority 80 percent of organizations with the least business downtime from IT service disruptions are the same firms with the least data loss or theft and the fewest regulatory compliance deficiencies to correct. A majority 63 percent of the firms with the most stagnant business results are the same firms with the most business downtime from IT disruptions, the largest number of regulatory compliance deficiencies, and the most loss of sensitive data. Lastly, 78 percent of the firms with annual hours lost to IT service disruptions are the same firms with normative results for all of the metrics (see Figure 11). Population 68% Percentage of organizations 100% 80% 12% 60% 20% 40% 20% Normative 0% More than 80 hours 2 to 80 hours Less than 2 hours Annual hours of downtime from IT service disruptions N: 1,014 Figure 11. Business downtime from IT service disruptions IT Policy Compliance Group
21 The alignment of the findings raises an interesting question: What are the IT GRC practices that translate into improved business results, including higher revenue, better profits, better customer retention, and improvements in IT service reliability, as well as better regulatory compliance results and less frequent loss of sensitive data? IT GRC maturity, financial rewards, and risks All of the business and financial rewards, and all of the financial and operating risks from the benchmarks, are aligned with IT GRC maturity among firms (see Figure 12). Percentage of organizations with the same results 100% 90% 80% 70% 60% 50% 20% of population 68% of population 12% of population 40% 30% 20% 10% 0% Average maturity N: 2,608 Normative Business results: -Customer satisfaction -Customer retention -Revenues -Expenses -Profits Number of compliance deficiencies to pass regulatory audit Losses/thefts of sensitive data Number of business disruptions from IT service disruptions Hours to recover from business disruptions Figure 12. Alignment of IT GRC maturity with business rewards and risks The majority of the firms that are least mature when it comes to IT GRC are experiencing the worst business results, the most financial risk from data loss or theft, the highest financial losses from IT-based business disruptions, and the worst regulatory compliance results. In contrast, the majority of firms with the most mature IT GRC profiles are the same firms experiencing the best business results, the least financial losses from data loss or theft, the lowest financial risk from IT-based business disruptions, and the least number of problems with regulatory compliance. Lastly, the majority of the firms operating in the norm are experiencing financial results that are between those of the firms with the least mature and most mature IT GRC profiles, practices, capabilities, and competencies IT Policy Compliance Group 17
22 Business pressures impacting IT The business pressure that most impacts IT among all organizations is the protection of sensitive data. This includes customer data, employee data, corporate data, and IT security- and audit-related data (see Figure 13). Percentage of organizations 50% 40% 30% 20% 10% 0% N: 1, Revenue and profit 2. Market share and time to market 3. IT maintenance budgets 4. Delivery of new IT projects 5. Improving/sustaining regulatory audit results 6. Protecting sensitive data 7. Avoiding/recovering from business disruptions 8. Managing outsourced, offshored and third-party IT vendors 9. Hiring and retention of IT skills 10. Improving or sustaining IT service levels 11. Acquisitions or mergers 12. Inconsistencies in IT systems, applications, practices, procedures, and controls Figure 13. Primary pressures impacting IT After protecting sensitive data, the pressures most impacting the use of IT include: Revenue and profit IT maintenance budgets Avoiding and recovering from IT-based business disruptions Inconsistencies in IT resources, procedures, and controls The hiring and retention of IT skills Improving or sustaining regulatory audit results Although protecting sensitive data is the top pressure impacting IT among all firms, the handling and protection of sensitive information is a more crucial issue among larger enterprises than among small businesses for two reasons: 1. There are more people with access to sensitive data across larger firms IT Policy Compliance Group 2. The global nature of business operations among larger organizations requires compliance with more complex regulatory and legal statutes governing the handling of information than among small businesses operating within local regions.
23 Business and financial risks Among the firms with the best business results, the capabilities if impaired or compromised that pose the most business risk include: The protection of sensitive information The integrity and availability of IT resources Compliance with regulatory mandates The financial statements and structure of the organization (see Figure 14). Most risk to the organization if the following are impaired or compromised Percentage of organizations 100% 80% 60% 40% 20% 0% N: 1,042 Normative 1. Customer data 2. Building and grounds 3. Core business information 4. IT networks, applications, or systems 5. Compliance with regulatory mandates 6. Corporate brand and reputation 7. Supply chains 8. Distribution channels 9. Financial structure or statements 10. Telecommunications and Internet services Figure 14. Business risks Moreover, with the exception of disruptions to supply chains and distribution channels, 60 percent or more of the leading firms those with the best business results rate IT-enabled business capabilities as posing the most risk for the organization should these be impaired or compromised. In contrast, only 30 percent of firms performing at the norm believe that compromises to IT-enabled business capabilities pose the most risk to the organization. Lastly, less than 10 percent of the organizations with the most stagnant business results see impaired IT-enabled business capabilities as posing the most risk to the organization IT Policy Compliance Group 19
24 Financial risk from the loss or theft of customer data Firms with the least mature IT GRC practices that have experienced the loss or theft of customer data are enduring financial losses equivalent to 8 to 9 percent of revenue for about a six- to twelve-month period. Although this rate may provide a useful guideline for the worst case, it is not predictive for other firms. The expected financial loss for data loss or theft, derived from benchmarks conducted with 1,461 organizations and confirmed from publicly available data, provides a more predictive set of guidelines for the likely financial loss that will occur, based on the maturity of an organization s IT GRC practices (see Figure 15). Capital at risk after the loss or the theft of customer data $10 billion $1 billion $100 million $10 million $1 million $100 thousand $10 thousand $10 million $100 million $1 billion $10 billion $100 billion Annual revenue Capital at risk Annual revenue $10 million $100 million $1 billion $10 billion $100 billion $840,000 $9.6 million $96 million $960 million $7.2 billion $35,000 $400,000 $4 million $40 million $300 million N: 1,461 Figure 15. Expected financial loss from theft or loss of customer data IT Policy Compliance Group
25 Not all firms are experiencing identical losses after customer data is lost or stolen. For example, some firms are experiencing significant declines in market capitalization accompanied by significant costs without experiencing customer defections and revenue declines. Others have experienced larger declines in customers and revenue, slight declines in market capitalization, and modest increases in costs associated with litigation and cleanup efforts. The expected financial losses by maturity account for all contributions, including lost revenue from customer defections; lost market capitalization from declines in publicly traded shares; and direct costs for handling subsequent litigation, penalties, settlements, cleanup, data restoration, and customer notifications. Not included are direct costs for improving IT GRC practices subsequent to the loss event. Despite a specific type of loss, the benchmarks reveal a consistent pattern of expected loss that is confirmed by available data, and that shows a direct relationship between the size of the loss as a percentage of revenue, and the maturity of an organization s IT GRC program. The lowest loss rates being experienced by the most mature firms are consistently below one percent of revenue, while the highest loss rates consistently hover between eight and nine percent of revenue among the firms with the least mature IT GRC programs. The vast majority of firms are experiencing financial losses between these two extremes: from nine percent to less than one percent of revenue. Obviously, this is a large loss range, and the losses can be reduced by improving the maturity of IT GRC practices and capabilities. Experience of a large retailer A large retailer that experienced a theft of customer data in 2007 took $270 million in charges against profits for expenses related to the loss and theft of customer data. The capital loss from the firm s share-price decline amounted to more than $950 million in the first three months after the event. This decline was slightly reversed to a $680 million loss after the first year. Recent gains have erased much of the $680 million loss, but there is almost $260 million in value not recovered fifteen months after the loss event occurred. Combined, the loss has been a little more than $530 million, a lot of angst among investors, some among customers, and new expenditures for protecting customer data. The loss expectancy chart shows that this firm should have expected a loss of nearly $600 million, given its IT GRC maturity levels. Although slightly higher than actual experience, additional costs not publicly reported are not included, nor is subsequent spending to improve IT GRC practices included IT Policy Compliance Group 21
26 Experience of a large financial services firm A large financial services firm experienced a theft or loss of customer data in 2006 and took a charge against earnings of slightly more than $100 million. The capital loss predicted by the loss chart for this firm is slightly more than $100 million, indicating closer alignment with actual experience. This firm is continuing to spend additional monies to improve its IT GRC capabilities and practices. These costs are likewise not included as part of the actual costs incurred for the loss event. Financial risk from business disruptions due to IT service disruptions The financial capital at risk from business disruptions that are due to IT systems, applications, and networks being impaired or compromised ranges from 9 percent of revenue to less than 1 percent of revenue. Unlike the loss or theft of customer data, the financial impact from IT-based business disruptions depends on the number and duration of the disruptions, and how much of the productive capacity of the organization is impaired by such events. For example, if 100 percent of the productive capacity of the organization is impacted by these disruptions, then the loss rates are going to approach the highest levels. Conversely, if these disruptions impact less than 10 percent of the productive capacity of the firm, then the loss rates are going to be much lower. The benchmarks consistently show direct relationships between the number of IT service disruption events impacting business operations annually, the number of hours it takes for firms to recover from these disruptions, and the maturity of the organizations IT GRC practices. The factors determining the financial impact from business disruptions due to IT service disruptions include the extent of the impact (less than 100 percent of operations) and the maturity of the organizations IT GRC practices (see Figure 16) IT Policy Compliance Group
27 Capital at risk from annual business disruptions for IT disruptions $10 billion $1 billion $100 million $10 million 100% of business operations are disrupted $1 million $100 thousand 10% of business operations are disrupted $10 thousand $1 thousand $10 million $100 million $1 billion $10 billion $100 billion Annual revenue 100% of business disrupted 10% of business disrupted Capital at risk if 100% of business is impacted Annual revenue $10 million $100 million $1 billion $10 billion $100 billion Least mature $470,000 $4.8 million $59 million $785 million $10.9 billion Most mature $7,200 $74,500 $914,000 $12 million $168 million N: 1,461 Figure 16: Capital at risk from IT-related business disruptions For example, the productive capacity within the automotive, leasing, rental, banking, financial services, and manufacturing industries impacted by Internet security threats can result in severe financial consequences for these organizations. Even in other industries where telecommunications and IT networks are vital, such as retail, entertainment, energy distribution, transportation, hospitality services, government, and law enforcement, among others, IT-led business disruptions can have financial consequences that range from minor inconveniences to dramatic impact on revenue, costs, customers, and reputations IT Policy Compliance Group 23
28 Experience of an automotive manufacturer In 2004, a large automotive manufacturer found that one of its assembly plants was shuttered after an Internet worm infected robotic equipment on its assembly lines. Taking more than a week to clean up and restore operations and return the assembly lines to productive capacity meant that supply chain operations were halted in their tracks. Also impacted were logistics, procurement, transportation, and distribution to dealers. The manufacturer took steps to avoid loss event from occurring again, including isolating the manufacturing sites from other networks, instituting a massive employee education and training program, and implementing continuous monitoring and measurements. Experience of a rental and leasing company In 2005, the retail outlets of a leasing company were hit by an Internet security threat. Unable to conduct business for two days in one of the busiest metropolitan areas in the world, this firm asked its customers to do business with competitors and provided the affected customers with compensation to avoid a permanent loss of these customers. IT GRC: IT governance, risk, and compliance management The benchmarks show a direct connection between business results, financial risk, and IT GRC indicators for firms, with results clearly aligned based on GRC maturity (see Figure 17). IT GRC Maturity Population 20% 68% 12% Customer satisfaction Customer retention Revenue Expenses Profits -8.7% -4.4% 0% 4.4% 8.7% -6.3% -3.2% 0% 3.2% 7.3% -8.5% -4.3% 0% 4.3% 8.5% -6.4% -3.2% 0% 3.2% 6.4% -6.9% -3.5% 0% 3.5% 6.9% Financial risk from customer data loss/theft 9.6% of revenue 8% of revenue 6.4% of revenue 3.2% of revenue 0.4% of revenue Financial risk from disrupted business operations 10% of revenue 3% of revenue 1% of revenue 0.4% of revenue 0.2% of revenue Spending on regulatory compliance 37% lower than maximum 3% lower than maximum 3% lower than maximum 20% lower than maximum 52% lower than maximum N: XXX Figure 17. Business results and IT GRC maturity IT Policy Compliance Group
29 The questions of whether better compliance practices lead to better data protection, or whether better IT assurance practices leads to more resilient systems that support business procedures, are moot. The evidence from the benchmarks shows an almost one-to-one relationship between actions and practices implemented by an organization to improve GRC maturity with better business results and lower business risk. The benchmarks also show the opposite: When not implemented, the practices and capabilities are directly linked to worse business results, much higher levels of financial and business risk, and higher spending on regulatory compliance. Assessing the current state of IT GRC maturity is but a start toward improving the results, business outcomes, and financial risks that are shown to be almost completely aligned with IT GRC maturity. Once assessed, the next step on the journey to better business results, lower financial risk, and reduced spending on regulatory compliance is to identify the practices and capabilities that are shown to be directly related to improving results. Organizational competencies and IT GRC maturity There are common organizational practices and capabilities being implemented by the firms with the most mature IT GRC profiles. Possessing better business track records, less financial and business risk, less worry about customer data, lower spending on regulatory compliance, and almost uninterrupted IT services, the actions and capabilities implemented by these firms are an excellent gauge for assessing what is working. Although there are more details behind these competencies, there is no doubt that if implemented, these competencies can improve results for the 88 percent of firms with less mature IT GRC profiles and worse results than the most mature organizations. Who should be involved in IT governance Organizational competencies Senior management involvement Involvement of the audit committee IT, legal, internal audit, and finance leadership Employee training and a culture of compliance Improvements to IT risk assessments, data protection, IT audit, and risk and compliance practices and capabilities Adjustments to spending in IT to support needed capabilities A Continuous Quality Improvement program for IT GRC An integrated IT GRC program The governance of IT is a management function. Focused on delivering greater value from IT services that anticipate and meet the needs of evolving business conditions, it is sometimes a tightrope walk involving a wide range of factors, including resource constraints, objectives, unceasing demand for new or changed capabilities from the business leaders of the organization, quality levels, functionality, and timeliness. Like any other function in the organization, the governance of IT also involves an understanding of and the management of business risks from the use of IT. As the benchmark evidence clearly shows, business results, financial risks, regulatory compliance results, and spending are all intimately linked with the IT GRC maturity profiles of organizations IT Policy Compliance Group 25
30 Based on the evidence, from least mature to most mature, the top three organizational functions that make the most difference to improving IT GRC maturity are the involvement of: 1. Senior management 2. Managers and directors in IT 3. The audit committee Following closely behind these is involvement by: 1. The IT governance committee 2. Staff in IT (including contractors and service providers) 3. Internal and external audit functions 4. Business unit managers (see Figure 18). Percentage of organizations 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Normative 1. Senior managers 2. Business unit managers 3. Managers and directors in IT 4. Staff in IT 5. Contractors or service providers 6. Internal and external auditors 7. Audit committee 8. IT governance committee N: 313 Figure 18. Who s involved in IT governance These are the top eight functions involved in governing IT. As the findings clearly show, the governance of IT is not the responsibility of a single function or group within the organization. Rather, IT GRC maturity improvements depend on a transparent, shared responsibility: one that is able to successfully meet the very different needs and functions of the organization IT Policy Compliance Group
31 Who should be involved in assessing and demonstrating compliance Unlike the management and governance of IT, assessing and demonstrating compliance is the act of gathering and demonstrating evidence that the organization s policies are being implemented, that the controls needed to demonstrate compliance with policy are working and effective, and that the risks the organization faces are understood and being managed. The assessment and demonstration of compliance is often a shared responsibility between audit, IT assurance, internal controls, and IT operations, and most often with the direction of assistance of the IT risk management and IT audit functions. In addition, the benchmark results show that the legal function plays a critical role in the success of the most mature IT GRC organizations. Whether it is compliance with company policies and legal statutes, responding to requests or summonses for information, or managing regulatory audits, the functions involved in demonstrating compliance among firms with the most mature IT GRC results are dominated by: The IT and IT security functions The legal function for organizations After these two, the other functions involved in assessing and demonstrating compliance include finance and internal audit and to a lesser extent the IT governance committee, the audit committee, and compliance and risk management functions in organizations (see Figure 19). Percentage of organizations 70% 60% 50% 40% 30% 20% 10% 0% N: 313 Normative 1. Customer service 2. Finance 3. Internal audit and controls 4. Product design and development 5. Procurement, purchasing, and logistics 6. Manufacturing 7. Sales and marketing 8. Legal 9. IT and IT security 10. Compliance and risk management 11. Audit committee 12. IT governance committee Figure 19. Who s involved in assessing and demonstrating compliance 2008 IT Policy Compliance Group 27
32 Based on interviews conducted with members, better results for IT GRC are being achieved by firms with an almost activist IT audit function: one where there is a great deal of cooperation between the business units, the entities being audited, the IT assurance function, legal counsel, IT assurance, and operations. Conversely, organizations with passive IT audit functions and IT audit functions not auditing technical controls are among the organizations with lower IT GRC maturity profiles, worse business results, heightened business risks, and worse regulatory compliance results. Employee training: A culture of compliance The benchmarks show that a culture of compliance, reinforced by senior management and implemented with formalized training for employees, is one of the core competencies being implemented by organizations with the most mature IT GRC profiles. The most mature firms are implementing and delivering on-demand training for employees, more consistently, when compared to all other organizations. Most often taking the format of Web-based education, training, the top subjects for employee training among the most mature organizations include ethics and codes of conduct, IT compliance, IT security and data protection policies, regulatory policies and procedures, discrimination and harassment, and emergency response and restoration procedures (see Figure 20). Percentage of organizations 80% 70% 60% 50% 40% 30% 20% 10% N: 313 Normative 0% Ethics and code of conduct 2. Financial reporting and insider trading 3. Handling conflicts of interest 4. Legal requests and summonses for information 5. IT compliance, IT security, and data protection policies 6. Regulatory policies and procedures 7. Discrimination and harassment policies and procedures 8. Emergency response and restoration 9. Customer service and sales contracts 9 Figure 20. Employee training and IT GRC maturity IT Policy Compliance Group
33 Organizational actions to improve IT GRC results Actions speak louder than words, especially when the actions are aligned with better business and financial results. For example, the primary actions taken by the most mature IT GRC firms include: Improving IT risk, assurance, and data protection practices Improving IT audit, risk, and compliance practices Adjusting the focus of and spending within IT to support these After these three, the actions most closely linked with improved IT GRC maturity include acquiring IT capabilities to improve results, improving project and portfolio management practices, improving IT skills and retention programs, codifying IT service levels and contracts, and improving IT governance practices. Nearly all of the actions taken by firms are aligned with IT GRC maturity improvements, as well as top-line and bottom-line business results (see Figure 21). The interesting anomaly, improving IT governance practices, indicates that specific actions, practices, and capabilities being taken by the least mature firms are not resulting in improvements; rather, the actions being taken by the least mature firms are actually retarding results, are counterproductive, or are insufficient when compared with the results being achieved by the most mature firms. Percentage of organizations 70% 60% 50% 40% 30% 20% 10% 0% N: 558 Normative 1. Adjusted focus and spending in IT to meet business needs 2. Improved IT risk, assurance, and data protection practices 3. Acquired IT capabilities to improve results 4. Improved IT audit and compliance practices 5. Improved IT skills, hiring, and retention programs 6. Improved IT project and portfolio management practices 7. Codified IT service level agreements and contracts 8. Improved IT governance practices Figure 21. Organizational actions to improve IT GRC results 2008 IT Policy Compliance Group 29
34 As such, the actions and specific practices and capabilities being employed by the most mature IT GRC firms provide the best gauge for ascertaining the practices and capabilities needed by a majority of organizations, 88 percent of which are having worse business results and higher financial loss experiences than the most mature firms. Business risks, assessments, and priorities Given the predictable downside financial risk from the theft or loss of sensitive data and the loss of productive capacity from IT service disruptions, every firm should evaluate whether it should ignore the risks, transfer the risks, or mitigate the risks. Ignoring IT-based risk is impossible unless the organization wants to turn off all the IT systems that assist and enable business procedures. Transferring a portion of the financial risks may be possible. Mitigating these risks is almost a necessity to avoid reputation and brand damage, in addition to the financial consequences of these risks. Assessing the risks In addition to the magnitude of financial loss occurring after the loss or theft of customer data or from business disruptions, the frequency of occurrence of loss events must be taken into account when prioritizing risk. Organizations with the most mature IT GRC programs are delaying the onset of financial loss from the theft or loss of customer data, and from business disruptions due to IT service disruptions (see Figure 22). Likely occurrence of data loss or theft based on maturity level Likely occurrence of business disruptions from IT service interruptions based on maturity level Years to event 1, Number of disruptions per year $1 million $10 million $100 million $1 billion $10 billion $100 billion 0 $10 million $100 million $1 billion $10 billion $100 billion Annual revenue Annual revenue N: xxxx Figure 22. Likelihood of primary IT GRC risks IT Policy Compliance Group
35 Unless an organization wants to start over, data loss or theft and their attendant harm to reputations and brands is a risk that calls for mitigation. However, not all IT servicelevel disruptions have equal downside risk for the organization. As a result, it is important to identify and isolate disruptions from IT services that will most impact the organization, making sure to account for embedded and unseen dependent business procedures that may not be apparent at first. IT GRC functions and practices The key IT governance competencies and practices being implemented by the most mature IT GRC organizations include: Strategic IT planning and business alignment IT performance assessment and measurement IT security, assurance, and risk management IT audit and compliance management IT operations and resource management These are the five primary IT GRC activities currently implemented by a majority of the firms with the best business results and the least financial risk (see Figure 23). Percentage of organizations 80% 70% 60% 50% 40% 30% 20% 10% 0% N: 558 Normative 1. Strategic IT planning and business alignment 2. IT steering and standards committees 3. IT operations and resource management 4. IT audit and compliance management 5. IT security, assurance, and risk management 6. IT vendor and service provider management 7. IT performance assessment and management Figure 23. IT GRC functions and practices 2008 IT Policy Compliance Group 31
36 How do you know whether the value being delivered by IT meets expectations, or that that use of IT resources is not placing the firm at greater risk? The only way to discern the answers to these questions is to measure results. In addition to the five primary IT GRC functions, the most mature firms also routinely assess and report on the status of IT governance on a much more frequent basis than all other firms. On average, the assessment of these functions by the most mature firms takes place once every five to six weeks. By contrast, the least mature firms are not routinely assessing the status of these key functions. Instead of once every five to six weeks, the average rate of measurement among the least mature organizations is once every six months. Lastly, the majority of the firms operating at the norm are conducting these assessments nearly once every quarter (see Figure 24). Times per year Normative 1. Delivery of innovative solutions 2. Alignment of IT with business change 3. The value of IT service delivery 4. The business risks of IT 5. IT resources and skills 6. Performance of IT N: 558 Figure 24. Frequency of IT governance assessment and reporting More frequent assessment and reporting on the status of these functions for IT governance is leading to better delivery of business value and lower financial risk among the most mature organizations. Framework usage and IT GRC maturity Frameworks are evolving sets of practices that are shown to work, and represent codified bodies of knowledge based on past experience. However, not all frameworks are created equal: Some focus on procedures and processes, others focus on quality, others focus on the management of resources to achieve business objectives, others on detailed best practices within IT, and still others focus on technical software and hardware controls IT Policy Compliance Group
37 Which works: Components of many, or selection to drive results? Despite being widely available, there is a significant difference in the way firms are employing frameworks that is directly related to the maturity of IT GRC. Most firms the 88 percent not operating at the most mature levels are employing a buffet-style approach to the use of frameworks. The majority of firms are electing to choose components from multiple frameworks. For instance, the majority of the least mature firms are choosing to select components from four to five frameworks for use within IT operations, IT assurance, and IT audit. In contrast, less than 20 percent of these same firms are selecting even one framework for the governance of IT value being delivered by the firm. Among normative IT GRC firms, the same buffet-style behavior occurs, but the number of frameworks dwindles from four or five to two or three. Finally, by the time some of these firms emerge among the most mature, the number of frameworks increases to four or five again, but a selective weeding out of frameworks has occurred. The buffet-style selection behavior has been replaced by a decided focus on the primary frameworks that are being relied upon to assist the organization with its own framework for its objectives against which results are measured (see Figure 25). Adoption of frameworks for use with IT governance and operations by maturity level Adoption of frameworks for use with IT governance and operations by the most mature 100% 90% 80% 80% 60% 40% 20% 70% 60% 50% 40% 30% 20% 10% 0% Least mature Norm Most mature 0% Frameworks used for IT operations, assurance, audit, compliance, and external vendors Frameworks used by senior managers in IT for managing the value delivered by IT 1. ISO 2. ITIL 3. SDLC 4. CIS benchmarks 5. CobiT 6. Balanced scorecard 7. CMMI 8. IT Portfolio Management 9. Project Management Maturity 10. Six Sigma N: 558 Figure 25. Frameworks, least to most mature 2008 IT Policy Compliance Group 33
38 Frameworks for managing the value delivered by IT The primary frameworks being employed by the most mature organizations for managing and governing the value delivered by IT include: Six Sigma, or a Continuous Quality Improvement program Project management maturity or IT portfolio management A capability maturity model and a balanced scorecard Frameworks for IT operations, assurance, audit, and vendor management The primary frameworks being employed by the most mature organizations for managing agility, risk, and compliance within IT operations to meet organizational objectives and policies include: ISO, CobiT, and related IT process frameworks The CIS benchmarks covering configuration best practices for technology controls SDLC for managing projects and change Measurable results, Continuous Quality Improvement, and IT GRC A Continuous Quality Improvement cycle for Six Sigma and Deming cycles is being implemented for IT governance and within IT operations, IT assurance, and IT audit by the majority of the most mature firms (see Figure 26). Act Check Plan Do Deming cycle: PDCA Plan: Establish objectives and procedures to deliver results per specifications. Do: Implement the procedures. Check: Monitor the procedures against objectives and specifications. Act: Apply actions to improve results. Further modify procedures as appropriate. Assess Improve Measure Repeat Define Control Measure Improve Analyze Six Sigma: DMAIC Define plans that must be in place to improve results. Measure the systems that support the plans. Analyze gaps and develop desired state. Improve system elements to improve results. Control and maintain to sustain results IT Policy Compliance Group Figure 26. Continuous Quality Improvement and IT GRC
39 Using a Continuous Quality Improvement program is essential to increasing the maturity of IT GRC, with the value being delivered by better business results, the management of risk, and compliance with internal and external policies and statutes. Although Six Sigma is identified as the primary Continuous Quality Improvement framework for management, the research also shows that full-bore Six Sigma within IT operations is resulting in less than optimum results. For this reason, simpler and less hidebound approaches to continuous quality improvement in IT operations involving a cycle of assessment, improvement, measurement, and repetition is appropriate for most organizations. In addition to specific practices and capabilities, it is continuous quality improvement, integrated from IT operations through the balanced scorecard, that is responsible for driving solid improvements in IT GRC maturity, lower financial risk, and better business results among the most mature firms. Whether it is data protection, regulatory compliance, or the delivery of value from IT, the most mature firms are continuously improving quality in an Insight In addition to specific practices and capabilities, it is continuous quality improvement, integrated from IT operations through the balanced scorecard, that is responsible for driving improvements. integrated and repeatable manner, with practices and capabilities being implemented to support results (see Figure 27). Financial Customers Balanced scorecard Vision and strategy Business procedures Learning and growth New technology capabilities Change to existing capabilities M&A Vendor management Business rewards Portfolio management Project and risk management Business risks Assess Improve Measure IT process frameworks: ISO, ITIL, SDLC, CobiT, PCI Policies and control objectives Procedural (manual) controls Employee education/training Manual procedural controls Assess Improve Measure Automated (technical) controls Policy-in, audit log-out Machine controls and CIS benchmarks Employee notification and certification Common IT procedures Policy management, on-boarding, off-boarding, IT asset management, controls mapping, configuration controls, resource scanning, audit logs, change management, prevention, risk management Figure 27. IT GRC among the most mature firms 2008 IT Policy Compliance Group 35
40 Through the balanced scorecard, the most mature firms are balancing risk and reward, establishing policies and control objectives, and continually assessing the risk/reward balance to ensure it is appropriate. Balancing projects, resources, and timeframes is accompanied by more detailed procedural and process frameworks and control statements related to procedures that are implemented in IT. These are accompanied by policies and procedures (manual and technical) for controls implemented in IT that reflect the risk/reward balance being sought by the organization. Whether the objective is increased revenues and profits, lower financial and reputation risks, or greater systems resiliency for business purposes, the most mature organizations are constantly seeking to improve results. Although not perfect, the most mature organizations are continuously assessing the risk/reward balance, determining what improvements or changes need to be introduced, measuring the results, repeating these steps, and implementing specific practices and capabilities to achieve their objectives. Practices and capabilities aligned with IT GRC maturity Putting IT GRC into action involves repeatable practices and procedures. There are ten key practices and capabilities being implemented by the most mature firms. Actions taken in IT to improve IT GRC maturity The actions taken in IT to improve IT GRC results include: Improving IT controls and procedures Protecting data on PCs and laptops Segmenting and limiting access to sensitive data Increasing the frequency of monitoring and measurements (see Figure 28) The additional actions taken by the most mature firms include: Delivering training for employees Identifying the leakage of sensitive data Correcting gaps in controls and procedures Automating the collection of IT audit data Practices and capabilities Access to sensitive and protected data on PCs and laptops is segmented and protected. Meaningful and measurable control objectives and policies based on business risks are employed. IT policies, process frameworks, and control objectives are mapped to one another. Common IT procedures are employed for audit. Three times more controls are employed than objectives. Consistent configurations and common IT procedures are employed. Automation is widely employed. 50 percent of all controls are technical controls and 100 percent of these are automated. Specific IT activities are automated. Policy-in and audit-out for technical controls is managed. IT change control and unauthorized change prevention are implemented. Monitoring, measurement, and reporting occur, from continuously to once a month IT Policy Compliance Group
41 Clearly, the most mature firms are enjoying better results because these organizations are taking fundamental actions and implementing practices in IT that are very different from all other firms. Segmenting and limiting access to sensitive data The most common tactic employed by firms that must pass the PCI DSS audit (relevant to firms processing and holding credit card data) is to isolate the systems that hold, process, and touch credit card data covered by the PCI audit requirements. The number of systems subject to the PCI audit can be reduced significantly by segmenting and limiting access to the data. By segmenting access to the systems that are used to process credit card data, firms are significantly reducing the impact and costs of conforming with PCI DSS audits. Accomplished in a variety of ways, including network isolation, software isolation, hardware isolation, firewalls, controls on physical access, and controls on authorized access, the segmentation and limits imposed on access reduces the number of systems that must be audited to pass the PCI audit. Percentage of organizations 80% 70% 60% 50% 40% 30% 20% 10% 0% N: 558 Normative 1. Segmented and limited access to sensitive data 2. Increased the frequency of monitoring and measurements 3. Established objectives and measured results 4. Delivered training for employees 5. Improved IT controls and procedures 6. Automated the collection of IT audit data 7. Reoriented audit to focus on common IT procedures 8. Corrected gaps in controls and procedures 9. Rationalized IT policies, procedures, and standards 10. Prioritized business and IT assurance risks 11. Identified sensitive data leakage 12. Protected data on PCs and laptops Figure 28. Actions taken in IT to improve IT GRC results 2008 IT Policy Compliance Group 37
42 For many successful firms, passing PCI audits also involves isolating the systems, networks and applications that touch sensitive data, resulting in reductions to the number of systems that must be audited by a factor of 10. For example, firms with 4,000 systems typically find that fewer than 400 of these actually have anything to do with the PCI audit. Different strokes for different folks Not all firms have to pass the strict requirements of PCI audits. Some organizations may have more pressing issues to confront and others less. For example, the law enforcement, utility generation, transportation, and chemical and pharmaceutical manufacturing sectors have very different pressures and different regulatory audit mandates than do manufacturers, legal Insight Identify and isolate the systems touching sensitive data to reduce the costs of regulatory audits and improve IT GRC maturity. service firms, banks, retailers, insurance companies, and financial service firms. As an extreme example, some organizations have placed lead shields around buildings, and are employing cryptography for everything transmitted outside the buildings. Although this approach is not common, there are multiple ways of segmenting and limiting access to sensitive data. Whichever approaches to controlling the segmentation and limitation of access to sensitive data are employed, this key action is being taken by firms with the most mature IT GRC profiles and practices. Frequency of reporting for IT procedures and functions The most mature firms are reporting on the effectiveness of IT procedures on a more frequent basis, on average once every four to six weeks (see Figure 29). Times per year N: 558 Normative 1. Vendor and third-party services 2. IT assets, system configurations, and settings 3. Personnel security 4. Employee training 5. Physical security 6. IT access controls 7. Business continuity/disaster recovery 8. IT security policies 9. Information protection controls 10. Incident response 11. IT change management IT Policy Compliance Group Figure 29. Frequency of reporting on IT procedures, activities, and controls
43 The most frequently reported areas include the status of information protection controls; physical security; incident response; business continuity and disaster recovery; IT access controls, including those for applications, databases, networks, and other systems; personnel security; and IT assets, configurations, and settings. Unlike the most mature firms, the frequency of reporting among 88 percent of all organizations is taking place, at best, once every six months. This finding is in line with organizations that do not have a Continuous Quality Improvement program in place. Infrequent reporting by a majority of firms means that any measurements being taken are too infrequent to effectively improve results. Frameworks for IT assurance, audit, and IT operations The frameworks employed within IT for assurance, information security, and regulatory compliance that are making the most difference among the most mature firms include: ISO and ITIL CIS benchmarks SDLC CobiT The research shows that the most mature IT GRC firms are consistently employing these five frameworks within IT operations, assurance, and audit. The ISO and CobiT frameworks are more similar to each other than to others, each being a process view of IT activities. Some firms select one or the other, while others select both: CobiT for financial audit and ISO for IT activities. Among the most mature firms, mapping the activity controls from one to another, along with sufficient documentary evidence, is assisting in the effort to more smoothly pass audit. The ITIL framework is all about service levels: a requirement for measuring the level of service delivered internally and by third-party service vendors, including offshored and outsourced IT services. The CIS benchmarks are best practices at the machine and systems levels for IT assurance. These benchmarks are technology specific. Where the CIS benchmarks are machine focused, the ISO and CobiT frameworks are functional and practice focused. Necessary and sufficient IT service level agreements are very useful for describing service levels for IT, and CobiT is the standard lingua franca employed by external auditors conducting Sarbanes-Oxley (SOX) audits. However, organizations are very unlikely to fail a SOX audit for deficiencies in IT general controls, or for that matter for Insight CobiT, ITIL, and ISO may be necessary, but the CIS benchmarks are sufficient for improving IT GRC results. deficiencies in ISO-based controls that are mapped to CobiT. However, without the CIS benchmarks, the research shows a higher predisposition to more business downtime and greater risk from the loss or theft of sensitive data, including customer data. CobiT, ITIL, and ISO may be necessary, but the CIS benchmarks are sufficient for improving IT GRC results IT Policy Compliance Group 39
44 Control objectives and controls The most mature firms have more controls than control objectives, while the least mature organizations have more objectives than controls (see Figure 30). Ratio of controls to control objectives More controls than objectives 100 Fewer controls than objectives Number of control objectives Number of controls N: 1,060 Figure 30. Control objectives and controls What s a control objective? Control objectives are policies describing the risks. For example, a control objective might start with: We will safeguard and not lose or have stolen any customer data. In addition to being objective statements about risk, control statements also include the policies implemented by the organization, the procedures and controls being implemented to mitigate the risks, the objectives for what constitutes acceptable performance results, Continuous Quality Improvement objectives, and key performance indicators being measured. Together, these elements constitute effective control objectives for IT GRC being implements by the most mature organizations. Control objectives and IT GRC related business risk Control objectives for IT GRC commonly address business risk, financial risk, legal risk, regulatory risk, reputation risk, and IT-related risks. Although unusual, control objectives for IT GRC could also address market risk, currency risk, legal risk, labor risk, supply-chain risk, and distribution channel risk, among others IT Policy Compliance Group The business risks are shown to include financial loss from the loss or theft of customer data and business disruptions that result from IT service disruptions. Legal risks include the loss of customer data and legal summonses and requests for the production of , records, and other data among other risks.
45 Control objectives for IT GRC encompass regulatory risk as these relate to civil penalties, criminal penalties, fines, and reputation risk, and might be related to J-SOX, European Data Privacy Directives, specific industry requirements, or any number of other regulatory mandates and audits. In addition to these, there are also risks associated with the use of different IT service delivery options and technologies. For example, outsourcing the ERP systems or sales automation systems poses very different risks than implementing and sustaining these internally. Similarly, a firm conducting acquisitions is going to have different risks associated with the merger of different IT systems, procedures, and people than firms not conducting acquisitions. The use of technology is also associated with different risks. For example, file sharing and instant messaging services pose unique business risks that do not exist with mainframe transaction systems and the use of common proxy authentication services for reservation systems. Key performance indicators and control objectives Key performance indicators are a subset of what should be included in control objectives. Such indicators include: Metrics that can be measured Metrics that provide trend indications about the risk profile of the organization The benchmark results show that the key performance indicators are clearly focused on IT general controls and IT assurance in particular. One size does not fit all Insight Control objectives for IT GRC encompass high-level statements about risk, policies implemented by the organization, procedures and controls to mitigate risk, objectives for performance results, Continuous Quality Improvement objectives, and key performance indicators being measured. Insight Key performance indicators include: Number of serious IT security incidents per unit time Number of reports of data lost or stolen per unit time Number of inactive user accounts Number of Internet threats per unit time Number of administrative account In addition to key performance indicators, log entries per unit time the benchmarks show the ratio of controls to control objectives is directly related to making continuous quality improvements to IT GRC maturity. The reason the ratio of controls to control objectives is important is that not all firms are operating with a control objective count as low as 30. In fact, the research shows that the number of control objectives is currently related to firm size, with small businesses having about 25, midsize organizations having about 50, and large enterprises having 75 or more control objectives, on average. For a large enterprise with 75 control objectives, the research shows the optimum number of controls would be 225 or more. A continuous quality improvement for this firm might be to reduce the number of objectives over time, thereby reducing the number of controls. If this firm had only 125 controls, the improvement program might be to simultaneously reduce the number of control objectives while increasing the number of controls IT Policy Compliance Group 41
46 The ratio of controls to control objectives provides a size-independent method by which to ascertain the improvements in these two that are most appropriate for any organization. Remember, a larger set of control objectives with a correspondingly larger set of controls is going to be more costly to sustain than a smaller set of objectives and controls (see Figure 31). Ratio of controls to control objectives Less than one control per objective Two or more controls per objective N: 1,060 Figure 31. Ratio of controls to control objectives What s a control? Controls are the procedures put in place to mitigate risk. These could be procedural or manual in nature, or could be implemented in technology. For example, a control might ensure that changes to underlying datasets or applications can only be performed after the approval of someone other than a database administrator. Similarly, access to sensitive information may be controlled by a technical access control, including user accounts and entitlements, directories, application logon systems, server logon systems, network access controls, and cryptographic controls on information content. The list of all possible controls is beyond the scope of this research report. However, the research shows the firms with the least mature IT GRC results are implementing a majority of controls as procedural or manual controls. In contrast, the organizations with the most mature IT GRC results have reduced the proportion of manual or procedural controls to 50 percent or less, while increasing the proportion of technical controls to 50 percent or more. Among firms with the most mature IT GRC profiles, automated technology controls have slightly edged out manual procedural controls to mitigate risk while delivering better business results (see Figure 32) IT Policy Compliance Group
47 Ratio of controls to control objectives 80% 70% 60% 50% Manual: two thirds Technical: one third 40% 30% Manual: less than half Technical: more than half 20% 10% 0% Percentage of controls that are manual procedures Percentage of controls that are technical N: 2,041 Figure 32. Procedural and technical controls Automation of technical controls In addition to a 50 percent mix of procedural and technical controls, the most mature IT GRC firms have also automated a majority of the technology controls, with almost 100 percent of the available technical controls being automated. This contrasts sharply with most firms operating at the norm that have automated less than 30 percent of a smaller set of technical controls, and even more sharply with the least mature firms, who have fewer technical controls with less than 10 percent of these being automated. Ranging from 70 percent to close to 100 percent, the most mature firms have taken two approaches that have clearly contributed to improved results, as follows: 1. More technical controls have been deployed to act as proxies for procedural controls. 2. Almost all of the technical controls have been automated. Insight Continuous quality improvement dictates moving from manual controls to a profile that is evenly mixed between manual and automated technology controls... In contrast, the majority of firms are automating less than 50 percent of the available controls for IT GRC, and the least mature are automating 10 percent or less of the available controls for IT GRC (see Figure 33) IT Policy Compliance Group 43
48 Percentage of technical controls that are automated 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% Less than 10% More than 50% 0% N: 2,041 Figure 33. Automation of technical controls Connect the dots: Technical controls, policies, and control objectives Control objectives operate on technical control mechanisms by way of policy. From high-level policy that is related to organizational objectives, legal statutes, and regulatory requirements, control objectives must then be translated to IT assurance descriptions and then to binary mechanisms implemented within technical controls. Unfortunately, there are often gaps between human-readable policies and the implementation of policy in technical control mechanisms. Although there is a great deal of assistance to automate this mapping, less than 30 percent of all firms are currently taking advantage of this automation. Whether accomplished by hand or mapped using software, the input for any control activity or action is fundamentally policy, which the technical mechanisms use to make decisions, and the output of the action, which only consists of audit logs containing evidence about conformance to policy. This is one of the key reasons why the most mature organizations are consistently measuring, monitoring, assessing, and reporting on control effectiveness: the devil is in the details of the log files (see Figure 34) IT Policy Compliance Group
49 Technical control mechanism People IT resources INPUT What is the policy? What is the policy? People applications IT resources Financial applications Perimeters Audit logs OUTPUT Audit logs Figure 34. Technical control mechanisms The analog to consistent measurement of log files for manual procedural controls is found from more consistent self-assessment of manual procedural controls conducted among the most mature IT GRC firms. The Continuous Quality Improvement objectives for the firms not operating at the most mature level of IT GRC include rationalizing: Policies across control objectives Controls and control objectives for the frameworks being employed for internal and external audit Self assessment of manual procedural controls Consistent measurement of technical controls Among the most mature firms, these efforts are leading to rational control objectives, policies that are based on relevant IT GRC risks, more controls per objective, all of which are accompanied by much clearer and transparent communication and evidence for internal and external audit IT Policy Compliance Group 45
50 Automating activities in IT The most common activities in IT that are being automated by the most mature IT GRC firms include: Ongoing monitoring and measurements Collection of audit-related data Procedures and controls Further ahead than the general population, the activities automated by the most mature firms also include ongoing assessment of compliance with policy, remediation, and change management (see Figure 35). Percentage of organizations 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% N: 454 Normative 1. Procedures and controls 2. Assessment of compliance with policies 3. Collection of audit-related data 4. Remediation and change management 5. Ongoing monitoring and reporting Figure 35. Automation of activities By comparison, very few of the least mature firms automate procedures and controls and only marginally more of these firms are automating other activities. The two activities most automated among the least mature include ongoing monitoring and reporting, and the collection of IT audit data. However, given fewer controls than control objectives among the least mature, and the scant number of technical controls being automated by these firms, the extent of automation of IT GRC activities is low, at best. In comparison, the majority of firms operating at the norm are somewhat in the middle when it comes to automating these IT GRC activities IT Policy Compliance Group
51 Frequency of controls assessment, measurement, monitoring, and reporting The most mature firms assess and report on the effectiveness of controls much more frequently than all other firms. In fact, on average, these firms are measuring and reporting 22 times per year. The minimum frequency for controls effectiveness reporting among the most mature is once every month a finding from the benchmarks that has not changed across more than 2,600 organizations (see Figure 36). In contrast, the least mature firms are measuring and reporting on the effectiveness of controls once to twice per year, while the majority of firms operating at the norm are assessing and reporting on the effectiveness of controls once per quarter, on average. Frequency of controls assessment (times per year) Less than 1.6 times per year 5 More than 12 times per year N: 2,608 Figure 36. Frequency of control assessment and reporting The infrequency with which a majority of organizations are assessing the effectiveness of controls is similar to saying that trees in the forest cannot fall if we are not there to hear or see them fall. But trees fall, whether we are there or not. When it comes to IT GRC, business results, risks, financial losses, reputation risk, and business uptime all depend on continuous assessment and measurement; not measuring the effectiveness of controls is very risky for the business IT Policy Compliance Group 47
52 Assessment, measurement, and monitoring of IT general controls What are the most mature firms measuring more frequently? The answer is: Almost all major IT systems, including IT systems; operating systems; applications; databases; network equipment and software; IT system log files and controls; and user accounts entitlements, permissions, administrative groups, and privileged access accounts. Nearly 60 percent or more of these firms are routinely measuring all of these IT systems once per month or more (see Figure 37). Although not as widely practiced, the measurement of applications, the Web, , Internet systems, Internet threat controls, and file-level permissions are also being assessed more frequently by the most mature firms. Percentage of organizations 80% 60% 40% 20% 0% Normative N: 1, Internet threat controls 2. IT systems and operating systems 3. Applications 4. Databases 5. Web, , and Internet systems 6. Network equipment and software 7. IT system log files and controls 8. User accounts, permissions, and entitlements 9. Administrative groups and system privileges 10. Registries and directions 11. File-level permissions Figure 37. IT general controls routinely measured If a loss or theft of customer data occurs and no one notices, did it really ever happen? If operating at the least mature GRC levels, it may take months or years to find out, and several incidents and financial harm to change behavior hopefully it will not be too late IT Policy Compliance Group
53 What color is the IT change management program? Change management is to IT what quality control is to manufacturing. Change management is responsible for ensuring that changes in IT do not impact business information, business procedures, customer satisfaction, customer retention, revenue, expenses, and profit. And when it comes to IT assurance, change management is one of the bedrock practices for assuring the reliability of service levels, and the integrity and confidentiality of information. The most mature firms are almost always implementing a full IT change management program that tracks change requests from inception to retirement, and every step in between (see Figure 38) Never done Sometimes done Always done N: 454 Normative 1. Change requests are closed out 2. Change requests are tested after deployment 3. Change requests are tested before deployment 4. Change requests are assessed 5. Change requests are recorded Figure 38. Completeness of IT change management programs In contrast, normative firms are only sometimes implementing aspects of a full IT change management program and less mature organizations are less assiduous still about IT change management IT Policy Compliance Group 49
54 A Continuous Quality Improvement objective for a majority of firms should be to fully implement an IT change management program, from inception, assessment, and testing to completion. A negative side effect of the widespread culture of convenience with which most IT is now associated, due in large part to designed-in simplicity, is that formal IT change management practices are slowly becoming a lost art. If current staff in IT have little or no experience with change management, it may be necessary to either hire consultants with experience to assist in developing and implementing appropriate IT change management practices, or hiring staff to develop and sustain a change management program that is fit for the company s purpose. In either event, a complete IT change management program is one of the hallmark practices that the most mature organizations implement. In addition, these firms also use a strategy of prevention, when unfettered control could lead to unacceptable risks. Preventing unauthorized change In addition to implementing quality control in IT in the form of a complete IT change management program, the most mature firms are also preventing unauthorized change to IT resources on production systems (see Figure 39). Implementing an almost real-time notification for critical changes to IT systems that violate policy, the most mature firms are preventing unauthorized change and the introduction of unauthorized IT systems, software, and network components to major IT resources, including unauthorized change to the following: network systems and software; Web, , and Internet systems; registries and directories; databases; servers and operating systems; and user accounts, entitlements, and permissions. Close behind these major systems are changes to Internet threat controls, application software, IT security log files and controls, administrative groups, and system privileges. Percentage of organizations 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% N:454 Normative 1. Internet threat controls 2. Servers and operating systems 3. Application software 4. Databases 5. Web, , and Internet systems 6. Network systems and software 7. IT security log files and controls 8. Administrative groups and system privileges 9. User accounts, permissions, and entitlements 10. Registries and directories 11. File-level permissions Figure 39. Preventing unauthorized change to IT resources IT Policy Compliance Group
55 Not tested by the benchmarks but confirmed from interviews conducted with members of the Group, many firms are also employing change management when PCs, laptops, and PDAs want to access corporate production networks. If policies are not met, these devices are being prevented from accessing corporate networks until specific policy objectives and authorizations have been met. The biggest impact of preventing unauthorized change is that the most mature firms are spending much less time on remediation and fixing problems, when compared with the majority of firms. Less than 10 percent of the time being spent on IT GRC activities among the most mature firms is spent on firefighting, remediation, and fixes. In contrast, the least mature firms are spending nearly 60 percent of their time putting out fires and fixing problems. A Continuous Quality Improvement program for IT GRC depends upon more frequent assessment of controls, a complete change management program, and an unauthorized change prevention management program. IT audit strategy and scope Current IT audit strategy and the scope of IT audit is not materially impacting results for firms. For example, common IT procedures have been adopted by most organizations, but this has not resulted in a material difference in IT GRC performance results among firms (see Figure 40). Percentage of organizations 80% 100% 60% 80% 40% 60% 40% 20% 20% 0% 0% N: 454 Normative 1. Common IT procedures have not been identified for audit 2. Common IT procedures are used for IT audit 1. Separate audits of business functions are conducted 2. Separate audits of business entities and units are conducted 3. Separate audits of regulatory mandates are conducted 4. Separate audits of common IT procedures are conducted Figure 40. Audit strategy and focus 2008 IT Policy Compliance Group 51
56 Most organizations are conducting IT audit the old-fashioned way, by auditing different business function and business entities serially and separately. This approach is resulting in auditing the same IT systems and applications multiple times. In addition, IT auditors are conducting separate audits in support of different regulatory audits, as well as conducting separate audits of common IT procedures. Almost all of IT auditors who were interviewed say that changing the focus and strategy to leverage common IT procedures across business functions will transform current workload and IT GRC maturity profiles into a more smoothly functioning system with fewer surprises, less loss of customer data, and more reliable IT systems and business procedures. Better business results Higher customer satisfaction Better customer retention Higher revenues Larger profits Lower financial risks Lower customer data loss or theft Less business downtime Less money spent on regulatory compliance Putting IT GRC into action The evidence is clear. Improving IT GRC is directly related to significant benefits being achieved by the most mature firms, including better business results and lower financial risks. However, benchmarks show that these improvements also come at additional expense. More money being spent on IT assurance The research shows that proportionally more funds are being spent by the most mature IT GRC firms on the IT assurance and audit functions to improve results (see Figure 41) IT Policy Compliance Group
57 Amount spent for IT assurance and IT security as a percentage of the IT budget 12% 10% 8% 6% 4% 2% 0% Normative N: 2,608 Figure 41. Spending on IT assurance and IT security Although not all organizations have the same size IT budgets, the benchmarks show consistency in the size of IT budgets based on the size of an organization. Moreover, the research findings consistently show that firms operating within the norm, and those operating at the least mature IT GRC levels, are spending less on IT assurance and security, while not implementing the practices and capabilities of the most mature firms IT Policy Compliance Group 53
58 Spending on regulatory compliance Annual spending on regulatory compliance depends on the size of the organization, as well as its IT GRC maturity. Total spending on compliance includes fees paid to auditors, consultants, internal audit, IT, legal assistance, and labor costs to comply with legal statutes, external regulations, and audits. Small businesses have fewer audits than the largest of enterprises, and spend proportionally much less on regulatory compliance than larger enterprises. The benchmarks also show that spending on compliance is directly related to the maturity of IT GRC practices (see Figure 42). For example, average annual spending on regulatory compliance among firms with $1 billion in revenue is $7.6 million when the firm is performing at a normative maturity level of 2.5. However, another $1 billion firm operating at a more mature IT GRC level of 4.5 is spending $4.9 million on regulatory compliance, a difference of $2.7 million annually, or a 35 percent reduction in spending compared with a firm of the same size operating at the lower maturity level. Total spending on regulatory compliance among firms at norm, IT GRC level 2.5, by revenue Relative spending on regulatory compliance based on IT maturity $10 million $100 million $1 billion $10 billion $100 billion Annual revenue 1. $100 million 2. $10 million 3. $1 million 4. $100 thousand Normative N: 2,608 Figure 42. Annual spending on regulatory compliance The research findings consistently show an increase in spending on regulatory compliance as maturity increases, and a subsequent reduction in spending as firms improve the practices and capabilities that lead to higher IT GRC maturity, improved business results, and reduced business risk. Annual spending on regulatory compliance is consistent by company size and industry, indicating that improved IT GRC maturity is resulting in cost savings for all firms IT Policy Compliance Group
59 Time spent on regulatory compliance by IT assurance and audit In addition to the total amount spent on regulatory compliance, the benchmarks show a similar pattern to the amount of time, or labor, being allocated to assessing and demonstrating regulatory compliance. Costs for labor increase through the normative stage and then decline as firms improve the practices and capabilities leading to more mature IT GRC results (see Figure 43). Time spent on regulatory compliance by IT assurance and IT security 40% 30% 20% 10% 0% Normative N: 2,608 Figure 43. Time spent on regulatory compliance Among the common reasons cited by participants at the most mature firms for the decreases in spending on regulatory audit and the time spent on compliance are: Consistency between internal policies and industry-focused frameworks being employed by auditors Consistency between expectations, employee education, and behavior More automation of controls and activities Much less time spent on remediation and fixing problems Consistency between policy documentation, procedures, and practices for audit review Greater transparency of procedures, practices, and evidence for audit review Although not all organizations will realize the same level of savings (some may achieve more and some less), the benchmarks clearly show that annual spending related to regulatory compliance declines significantly with improvements in the maturity of IT GRC practices and capabilities IT Policy Compliance Group 55
60 Managing the improvements Improving IT GRC maturity will come with Expense to improve IT GRC maturity some additional costs. Depending on where the Employee education organization finds itself on the maturity curve, More technical controls additional costs may include more technical Automation of procedures and controls, a Continuous Quality Improvement controls program, employee education and training, Continuous Quality Improvement and management reporting systems. As part program of the exercise to put IT GRC into action, it Management and reporting is important to compare the additional costs applications against reduced spending and lower financial risks. For many organizations, the financial benefits are going to outweigh the costs by orders of magnitude (see Figure 44). Financial profile when IT GRC maturity moves from 2.5 to 4.5* Current state Desired state Increase (decrease) Percentage change annually Financial risks Data loss and theft $56 million every 3 years $24 million every 10 years ($16.3 million annually) (87%) Business downtime $2.3 million 48 hours annually $0.53 million 11 hours annually ($1.77 million 37 hours annually) (77%) Spending Regulatory compliance $7.6 million annually $4.9 million annually ($2.7 million annually) (36%) Labor time spent in IT 34% annually 21% annually (13% annually) (38%) * For an organization with $1 billion in annual revenue or budget Figure 44. Financial impact of IT GRC maturity The example chosen is for a firm with $1 billion in annual revenue currently operating at a maturity level of 2.5 that desires to improve the maturity of its practices and capabilities to level 4.5. This firm would see an 87 percent decline in annualized financial capital at risk from the loss of data or theft by improving its IT maturity from norm, at 2.5, to one of the most mature, at 4.5 on the IT GRC maturity scale. The firm would also experience a 77 percent decline in annualized financial risk from business disruptions due to improvements in IT GRC practices and capabilities. Similarly, the firm would experience a 36 percent decline in annual spending for regulatory compliance and a 33 percent decline in annual spending on labor related to assessing and demonstrating compliance for external auditors IT Policy Compliance Group
61 The benchmarks clearly show that improved business results, savings from reduced spending for regulatory audit, and reduced financial risk make it worth the effort to take the next steps. Assess, improve, measure Improving IT GRC maturity practices is its own quality improvement procedure that, at its core, simply means assessing the current state of IT GRC maturity, identifying which maturity profile is optimum for the organization based on business and financial results, identifying gaps in current practices, improving practices and capabilities, and measuring the results (see Figure 45). Where are you now? Where do you need to be? Maturity level Business results Business risks What practices and capabilities are needed? Practice improvements Capability improvements... Figure 45. Assess, improve, measure Some practices and capabilities may be further ahead than what is required to improve results, while other practices and capabilities will be further behind. After improving capabilities and practices, firms should do the following: Assess the maturity of the organization. Determine the business and financial outcomes from the improvements. Identify and implement the next practices and capabilities to improve. Measure results and repeat the procedure IT Policy Compliance Group 57
62 The integrated approach to IT GRC The research identifies the key organizational competencies being exploited by the most mature firms to drive better results. These include: Greater senior management involvement; involvement by the audit committee; leadership among IT, legal, audit and financial; improvements to IT risk assessments, data protection, IT audit, risk and compliance practices; a Continuous Quality Improvement program that extends from senior managers all the way through operations (see Figure 46) Financial Customers Balanced scorecard Vision and strategy Business procedures Senior managers Business rewards Business risks Learning and growth Assess Improve Measure Policies and control objectives 75% of maximum IT assurance, risk internal controls, audit management Procedural (manual) controls Assess Improve Measure Automated (technical) controls IT and audit operations Common procedures, configurations, and controls Continuous measurement Figure 46. Organizational competency, integrated IT GRC IT Policy Compliance Group
63 The research also reveals the practices and capabilities that are most responsible for driving better results, including: Protection and segmentation of access to sensitive data Measurable control objectives based on reward and risk Rationalization of policies and frameworks Common IT procedures Consistent IT configurations More technical controls Automation of technical controls and IT assurance and audit activities Management of policy and audit for technical controls IT change management and the prevention of unauthorized change Continuous monitoring, measurement, and reporting The firms with the best business results and the lowest financial losses and risks are employing an integrated IT GRC program merging the delivery of IT value with the management of risk, legal, and compliance objectives. The approach adopted by the most mature firms starts with the balanced scorecard, employs a Continuous Quality Improvement program throughout IT, and connects the dots between IT operations, IT assurance, IT audit, IT management, and the business results of the organization. It is obviously going to be easier for a firm currently operating at maturity level 3.5 to move to a maturity level of 4.5 than for a firm currently operating at maturity level 2.5 to do so. Rather than trying to do too much at once moving from level 2.5 to level 4.5 it may make more sense to take smaller but critical steps on the journey to improving results by improving IT GRC maturity. A phased approach is more likely to result in increased chances of success, less risk, more measurable value for the organization, higher revenues, improved profits, greater customer satisfaction and retention, less financial risk, and more reliable IT services, all accompanied by less concern, time, and money being spent on regulatory compliance IT Policy Compliance Group 59
64 Appendix A: GRC CMM tables IT GRC maturity level Level 0 Level 1 Level 2 Level 3 Level 4 Level 5 Description Nonexistent procedures and practices There is no ongoing oversight of IT related activities to ensure that an enterprise s IT services add value to the organization and that IT-related risks are appropriately managed. Initial/ad hoc procedures and practices IT initiatives are driven by senior managers and primary business stakeholders, based on the changing needs of the business. Problems are resolved on a project basis with teams formed and dissolved as needed. Routine governance activities do not take place. No one realizes that more formalized oversight of IT is required. Repeatable but intuitive procedures and practices Governance of IT depends on the experience of IT managers, with limited involvement from business stakeholders. Most IT initiatives are funded based on prior year spending, with little flexibility built in for expected business change. Senior managers become involved in IT when major business initiatives are off-track. IT successes or failures are typically limited to technical measures. Oversight of IT is focused on case-by-case business issues that arise. Defined procedures and practices Informal practices are formalized and institutionalized, with relatively simple and unsophisticated measurement and assessment techniques. Specific procedures are developed to govern IT activities. External audit frameworks are utilized to assess the effectiveness of IT in delivering value. The mitigation of risk from IT operations is handled on a case-bycase basis with no consistency. Managed and measured procedures and practices Procedural and practice frameworks are defined for oversight and management of IT activities. These frameworks are used as the basis for governance of IT in the organization. Common IT procedures are identified and selected areas for improvement are based on these. Senior management team reviews value delivery and risks related to IT. Spending on IT is based on a mixture of value and risk metrics. Optimized and balanced procedures and practices Senior management has enough information about IT to make informed business decisions without being personally involved in running IT. IT activities are optimally directed to deliver business value and avoid business risk, both of which are measured, with backup plans to correct deviations and problems. Continuous Quality Improvement programs are implemented to consistently measure deviations from objectives. Continuous improvement of prioritized IT capabilities is embedded and benchmarked against internal and external metrics, as well as internal and external audit results. Spending on IT is optimized and changed to deliver the greatest value at a risk appropriate for the organization. Table 1. GRC CMM maturity spectrum IT Policy Compliance Group
65 Financial Customers Balanced scorecard Vision and strategy Business procedures Learning and growth New technology capabilities Change to existing capabilities M&A Vendor management Business rewards Portfolio management Project and risk management Business risks Assess Improve Measure IT process frameworks: ISO, ITIL, SDLC, CobiT, PCI Policies and control objectives Procedural (manual) controls Employee education/training Manual procedural controls Assess Improve Measure Automated (technical) controls Policy-in, audit log-out Machine controls and CIS benchmarks Employee notification and certification Common IT procedures Policy management, on-boarding, off-boarding, IT asset management, controls mapping, configuration controls, resource scanning, audit logs, change management, prevention, risk management Figure 47. Organizational competency: Integrated IT GRC 2008 IT Policy Compliance Group 61
66 Senior management involvement Audit committee involvement IT, legal, internal audit, and finance leadership Employee training and a culture of compliance Improvements to IT risk assessments, data protection, IT audit, risk, and compliance practices and capabilities Adjustments to spending in IT to support needed capabilities A Continuous Quality Improvement program for IT GRC An integrated IT GRC program Table 2. Organizational competencies among the most mature Access to sensitive and protected data on PCs and laptops is segmented and protected. Meaningful and measurable control objectives and policies are employed, based on business risks. IT policies, process frameworks, and control objectives are mapped to one another. Common IT procedures are employed for audit. Three times more controls than objectives are employed. Consistent configurations and common IT procedures are employed. Automation is widely employed. 50 percent of all controls are technical controls and 100 percent of these are automated. Specific IT activities are automated. Policy-in and audit-out for technical controls is managed. IT change controls and unauthorized change prevention are implemented. Monitoring, measurement, and reporting occur from continuously to once a month. Table 3. Practices and capabilities among the most mature IT Policy Compliance Group
67 Culture and budgeting Level 0 Level 1 Level 2 Level 3 Level 4 Level 5 View of IT contribution to the organization Not measured IT is viewed as a utility expense and structured as such. IT is primarily viewed as a utility expense, with specific projects for business growth. IT is viewed as a utility expense and enabler of business growth. IT is structured as an expense, with targets established for business growth. IT is viewed as an enabler of business growth. IT budgeting, spending, and focus Not measured IT spending is done from business units only. Business units retain ownership of major applications. IT is responsible for infrastructure. Most IT spending on IT is done by central IT headquarters only. Business units purchase from vetted lists and IT is responsible for maintaining existing services. Spending and budgets for IT are shared between business units and IT headquarters based on balanced scorecard. Table 4. Culture, budgeting, and spending Business outcomes Level 0 Level 1 Level 2 Level 3 Level 4 Level 5 Customer satisfaction Not measured 8.7% lower 4.4% lower No change 4.4% higher 8.7% higher Customer retention Not measured 6.3% lower 3.7% lower No change 3.7% higher 7.3% higher Revenues Not measured 8.5% lower 4.3% lower No change 4.3% higher 8.5% higher Expenses Not measured 6.4% lower 3.2% lower No change 3.2% higher 6.4% higher Profits Not measured 6.9% lower 3.5% lower No change 3.5% higher 6.9% higher Table 5. Business metrics, financial rewards, and risks Loss and risk Level 0 Level 1 Level 2 Level 3 Level 4 Level 5 Capital loss from data loss or theft Approaches 10% of revenue, depending on firm size Around 8% of revenue, depending on firm size Around 6.5% of revenue, depending on firm size Around 5% of revenue, depending on firm size Around 3% of revenue, depending on firm size Around 0.5% of revenue, depending on firm size Frequency of capital loss from the loss or theft of sensitive data Once every halfyear to once every 10 years, depending on firm size Once every year to once every 16 years, depending on firm size Once every year to once every 25 years, depending on firm size Once every 1.5 years to once every 45 years, depending on firm size Once every 2.5 years to once every 77 years, depending on firm size Once every 13 years to once every 800 years, depending on firm size Capital loss from IT-based business disruptions 3 30% of revenue, depending on operational impact 1 9% of revenue, depending on operational impact 0.4 4% of revenue, depending on operational impact 0.1 1% of revenue, depending on operational impact % of revenue, depending on operational impact % of revenue, depending on operational impact Table 6. Financial losses and risks 2008 IT Policy Compliance Group 63
68 Indicators Level 0 Level 1 Level 2 Level 3 Level 4 Level 5 Number of annual losses or thefts of sensitive data annually Number of business disruptions based on IT service disruptions Hours to resume business operations after IT service disruptions Total hours of downtime annually Regulatory compliance deficiencies to correct to pass audit 16 or more or less 24 or more or less 28 or more or less 672 or more or less 16 or more or less Table 7. Business and financial risk indicators IT services Level 0 Level 1 Level 2 Level 3 Level 4 Level 5 Maturity by percentage of IT services performed by third-party vendors, outsourced, or offshored Not measured Between 40% and 60% of all IT services are outsourced or offshored. Between 60% and 80% of all IT services are outsourced or offshored. Between 80% and 100% of all IT services are outsourced or offshored. Between 20% and 40% of all IT services are outsourced or offshored. Between 0% and 20% of all IT services are outsourced or offshored. Table 8. Third-party, outsourced, and offshored IT services CQI Level 0 Level 1 Level 2 Level 3 Level 4 Level 5 Existence and completeness of CQI programs Not measured CQI is nonexistent CQI is nonexistent. CQI is implemented in ad-hoc fashion and not connected with business results. CQI program implemented by senior management team for major business initiatives. Integrated CQI program is implemented from balanced scorecard through operations. Table 9. Continuous Quality Improvement IT Policy Compliance Group
69 Maturity level 1 Maturity level 2 Maturity level 3 Maturity level 4 Maturity level 5 Behavior and usage within IT operations, IT assurance, and IT audit Four to five different frameworks are consulted but none are adopted as standards for use with IT operations, IT assurance, and IT audit. Two to three different frameworks are consulted as the organization narrows down what it considers best practices for use with IT operations. Organization attempts to standardize on one to two industry frameworks for use with IT operations, IT assurance, and IT audit. List of frameworks is expanded to develop own framework to more effectively manage challenges within IT operations, IT assurance, and IT audit. Own framework for IT operations, IT assurance, and IT audit is mapped to four or five different frameworks for managing risk, regulatory compliance, and business rewards. Behavior within IT management None are consulted or adopted. Project management skills are emphasized, but no framework adoption occurs. Frameworks for project management are adopted to deliver technology solutions. Frameworks for business management, project management, and portfolio management are implemented to manage business rewards. Frameworks for business management, project management, portfolio management, capability management, and quality improvement are implemented to balance reward and risk. Table 10. Behavior and use of frameworks Maturity level 1 Maturity level 2 Maturity level 3 Maturity level 4 Maturity level 5 Training and education about company policies Is left to the discretion of hiring managers. Is delivered to employees upon hiring and documented in employee handbook. Is delivered to all employees as part of onsite and required manager training programs, and is typically delivered once per year. New programs dealing with legal and regulatory requirements are delivered as part of core curriculum. Delivery method starts to include Web- and computerassisted training. Formalized training program is implemented with Web- and computerassisted course and policy curriculum, with multiple courses delivered every year. Table 11. Employee training and education 2008 IT Policy Compliance Group 65
70 Maturity level 1 Maturity level 2 Maturity level 3 Maturity level 4 Maturity level 5 Primary focus areas for employee training Ethics and code of conduct Ethics and code of conduct Ethics and code of conduct Ethics and code of conduct Ethics and code of conduct Handling conflicts of interest Handling conflicts of interest IT compliance, security, and data protection policies Discrimination and harassment Handling conflicts of interest IT compliance, security, and data protection policies IT compliance, security, and data protection policies Regulatory policies and procedures Discrimination and harassment IT compliance, security, and data protection policies Regulatory policies and procedures Discrimination and harassment Handling conflicts of interest Handling conflicts of interest Financial reporting and insider trading Emergency response and restoration Financial reporting and insider trading Handling legal requests and summonses for information Table 12. Employee training and education Maturity level 1 Maturity level 2 Maturity level 3 Maturity level 4 Maturity level 5 Spending on IT assurance and audit as a percentage of the IT budget 5.2% to 7.4% 6.4% to 8.6% 7.4% to 9.6% 8.6% to 10.6% 9.6% to 11.6% Table 13. Spending on IT assurance and audit Source: IT Policy Compliance group, IT Policy Compliance Group
71 Maturity level 1 Maturity level 2 Maturity level 3 Maturity level 4 Maturity level 5 Actions taken to improve control objectives for IT GRC Audit-based to pass the primary audit. Audit-based to pass multiple audits. Mixture of organizational policies to pass multiple audits. Common policies and control objectives across multiple audits. Policies and control objectives are rationalized based on business risks. Actions taken to improve controls for IT GRC Dominant manual and procedural controls to pass audit are documented. Manual procedures and controls are rationalized against policies and control objectives. Manual and technically automated procedures and controls for highest business risks are identified. Mix of manual, procedural, and technical controls is changed. Modifications are documented through multiple audits. Most technical procedures are fully automated. High-cost, low-value manual procedures are fully automated. Organizational actions taken to improve IT GRC results Evidence about conformance with policies is gathered to pass the primary audit. Gaps in procedures and IT general controls are fixed to pass audit. Rules and responsibilities of policy owners are established. Self-assessments of mostly manual procedural controls are conducted to pass audits. Employee training is left to individual managers. Evidence about conformance with policies is gathered to pass multiple audits. Gaps in procedural controls and IT general controls are fixed to pass multiple audits. Rules and responsibilities of policy owners are established. Self-assessments of mostly manual procedural controls are conducted to pass audits. Employee training is paper-based in employee manuals. Self-assessments of procedural controls are conducted. Gaps in procedures and IT general controls are fixed to pass audit. Rules and responsibilities of policy owners are established. Evidence about conformance with policies is gathered to pass audits. Employee training is paper-based in employee manuals. Self-assessments of procedural controls are conducted. Monitoring and measurement of technical controls are being automated. Gaps in procedural controls and IT general controls are fixed to pass multiple audits. Policy owners are responsible for authorizing access to IT resources and employee training is a mix of electronic, paper, and instructor-led. Self-assessments of procedural controls are conducted. Monitoring and measurement of technical controls are fully automated. The collection of audit data and remediation of gaps are automated. Controls, frameworks, policies, and control objectives are mapped to one another. Consistent IT configurations are employed and enforced. Policy owners are responsible for authorizing access to IT resources and employee training is electronic. Table 14. Actions to improve results 2008 IT Policy Compliance Group 67
72 Maturity level 1 Maturity level 2 Maturity level 3 Maturity level 4 Maturity level 5 Number of control objectives Basis for control objectives An amalgam of audit control statements, recommendations from auditors, and financial reporting risks. An amalgam of audit control statements, recommendations from auditors, and financial reporting risks. A mixture of recommendations from internal audit, finance, and IT. A mixture of recommendations from internal audit, IT audit, IT assurance, and legal. Based on ongoing risk assessments conducted across the organization covering finance, legal, regulatory, IT, and other organizational risks. Number of controls Proportion of manual controls Proportion of automated technical controls Proportion of technical controls that are fully automated 72% 66% 60% 53% 48% 28% 34% 40% 47% 52% 3% 8% 23% 49% 96% Basis for controls Whatever manual procedures and technical controls are available and recommendations of auditors. Whatever manual procedures and technical controls are available and recommendations of auditors. Business risks from internal audit, finance, IT, and recommendations of auditors. Consensus of business risks from leadership and audit committee. Consensus of business risks from leadership and audit committee. Table 15. Policies, objectives, and controls IT Policy Compliance Group
73 Maturity level 1 Maturity level 2 Maturity level 3 Maturity level 4 Maturity level 5 Frequency of IT general controls assessment, measurement, monitoring, and reporting for regulatory audit Frequency of IT general controls assessment, measurement, monitoring, and reporting for data protection Percentage of IT general controls routinely assessed, measured, monitored, and reported Once every 300 days Once every 222 days Once every 105 days Once every 45 days Once every 17 days Once every 300 days Once every 210 days Once every 90 days Once every 29 days Once every 4 days 30% 40% 50% 60% 70% Table 16. Frequency of measurement, assessment, and reporting Maturity level 1 Maturity level 2 Maturity level 3 Maturity level 4 Maturity level 5 IT change management program Change management for IT is not considered a priority or is unknown. Change management is limited to PCs and financial systems to pass audits. Change management for critical IT resources is identified and more are implemented for critical IT resources. Change management is Implemented for critical IT resources. Change management is implement for all IT resources. Unauthorized changes to IT resources automatically prevented 25% 35% 45% 60% 75% Unauthorized changes to IT resources managed by exception 75% 65% 55% 40% 25% Table 17. Change management and prevention 2008 IT Policy Compliance Group 69
74 Appendix B: Results by industry and size Industry results A firm s operation in a more highly regulated industry is not a guarantee of better IT GRC results. Among more than 41 industries, those with marginally worse results than the market at large include: Banking Financial and accounting services Government and public administration Although the benchmarks show that the IT GRC maturity of firms in most industries are in line with all other organizations, banking, government (public administration), and financial services (including accounting services) have proportionately more firms operating at the least mature level for IT GRC than the general industry (see Figure 48). Percentage of organizations 90% 80% 70% Normative maturity benchmark 60% 50% 40% benchmark 30% 20% benchmark 10% 0% Normative Banking (113) Construction, architecture, engineering services (97) Education Financial, accounting services (164) Government (public administration) (140) Health, medical, dental services (214) Insurance (102) Legal services (96) Manufacturing (234) Retail trade (137) Figure 48. Industry results IT Policy Compliance Group
75 Rather than 20 percent of the population performing at the least mature levels, these industries (banking, financial services, and government public administration agencies) have 25 percent, 26 percent, and 29 percent respectively performing at the least mature levels. Among banks, marginally more perform better than the industry average, with 14 percent among the most mature. The difference, 61 percent, shows that fewer banks are performing at the norm when compared with the industry average. Among financial services firms, 14 percent are performing better than the industry average among the most mature. The difference, 60 percent, shows fewer financial services firms are performing at the industry norm when compared with the industry average for normative performers at 68 percent of the population. Among all civil government agencies, from large to small, the population performing at the most mature levels numbers just 10 percent, 2 percent less than the industry average. The difference, 61 percent, shows fewer government agencies are performing at the industry average for normative IT GRC results. In addition, there are far more normative performers for IT GRC among firms in architecture, construction, engineering, and legal services, with 83 percent and 78 percent of these firms among the normative performers for IT GRC. Other industries Although not yet reliable due to smaller sample sizes, early results indicate the industries with significant variation from industry averages include the following: Aerospace, with about 3 in 10 firms being among the most mature Telecommunications services, with about 3 in 10 firms being among the least mature Travel, accommodation, and hospitality services, with about 8 in 10 firms being in the norm Utilities, with about 8 in 10 firms being in the norm Computer software and services, with about 8 in 10 firms being in the norm Wholesale trade, with about 8 in 10 firms being in the norm The research shows there is no advantage accruing to a company due to the regulatory nature of the industry in which the firm competes. Rather, it is the actions, practices, and capabilities that are employed for IT GRC maturity that are making the difference to business results and financial risks IT Policy Compliance Group 71
76 Large enterprises: Slightly more at risk Similar to industry results, most organizations of varying size, as measured by annual revenues or annual budget, are performing in line with the industry averages for IT GRC, with 20 percent operating at the least mature level, 68 percent at norm and 12 percent operating at the most mature levels. However, the variation among large firms (those with more than $1 billion in revenue) shows more of these firms 28 percent are operating at the least mature levels for IT GRC maturity. This is 8 percent above average when compared with 20 percent for all firms. The number of large enterprises operating at the norm numbers 58 percent of all large firms, down significantly from the industry average of 68 percent. The difference, 14 percent, indicates that a smaller set of the largest firms are operating above the industry average with the most mature IT GRC profiles (see Figure 49). These results are in line with related research that shows large firms make up the bulk of the population that finds Sarbanes-Oxley the most pressing regulatory mandate for the organization, and similar results showing the dominant framework of choice for IT GRC among the least mature is either ITIL or CobiT, as well as the results for control objectives showing larger enterprises with an average of 75 control objectives, 2.5 times more than is ideal. Percentage of organizations 80% 70% 60% 50% 40% 30% 20% 10% 0% Less than $50 million $50 million to $999 million $1 billion or more Normative Annual revenue or budget Figure 49. IT GRC maturity by size of company by revenue The combination of larger financial exposure, and more frequent loss or theft of customer data, means that a proportionally larger number of firms among those with $1 billion or more in revenue are more at risk than midsize and small businesses within the same industry IT Policy Compliance Group
77 About the benchmarks Topics researched by the IT Policy Compliance Group (IT PCG) benchmarks are part of an ongoing research calendar established by input from supporting members, advisory members, and general members of the Group, as well as from findings compiled from ongoing research. This annual report includes research findings that date back one quarter, two quarters, one year, and even two years ago. The aggregation of findings across multiple research studies has only been conducted where all the findings for specific tracking questions are identical, or where the analysis of variance shows the findings within and across all of the benchmarks are within the population means and standard deviations. The most recent benchmarks included in this report were conducted between December 2007 and March 2008 with 558 separate, qualifying organizations. The consistent findings related to tracking questions from earlier benchmarks conducted between June 2007 and March 2008 with up to 2,608 separate firms have been included, but only where errors do not skew results of findings. The majority of the organizations (90 percent) participating in the benchmarks are located in North America and the remaining ten percent of the participants for the research findings come from countries located in Africa, Asia Pacific, Europe, the Middle East and South America. Although the majority of participants hail from North America, many members of the Group from outside this geography have, through separate communications, indicated that the results cited apply equally well within their organizations that happen to be located in other industrialized and rapidly industrializing geographies from around the world. As a result, the Group believes the findings related to the maturity of IT GRC practices and business outcomes that are cited in this report are applicable to most organizations and areas of the world where IT services are embedded as part of common business procedures. In addition to specific tracking questions common to each benchmark, the benchmarks are also designed to uncover the relationship between business results, the actions that organizations have taken in response to business pressures, and the capabilities these organizations have to respond to business pressures. Industries represented Almost every industry has participated in the benchmark, including accounting services, advertising, aerospace, agriculture, apparel, architecture, automotive, banking, chemicals, computer equipment and peripherals, computer software and services, construction, consumer durable goods, consumer electronics, consumer packaged goods, distribution, education, engineering services, financial services, general business and repair services, government (public administration), government (defense and intelligence), health, medical and dental services, insurance, law enforcement, legal services, management services, scientific and consulting services, manufacturing, medical devices, metals and metal products, mining, oil and gas, paper, timber and lumber, pharmaceuticals, public relations, publishing, media and entertainment, real estate, rental and leasing services, retail trade, telecommunications equipment, telecommunication services, transportation and warehousing, travel, accommodation and hospitality services, utilities, and wholesale trade. Manufacturing accounts for roughly twelve percent of participating organizations. All other industries account for less than ten percent of the benchmark participants IT Policy Compliance Group 73
78 Revenue of participating organizations Thirty-three percent of the organizations participating in the benchmark have annual revenues, assets under management, or budgets that are less than $50 million. Another 31 percent have annual revenues, assets under management, or budgets that are between $50 million and $999 million. The remaining 36 percent have annual revenues, assets under management, or budgets that are $1 billion or more. Number of people employed by participating organizations Thirty percent of the participating organizations employ less than 250 people. Twentynine percent employ between 250 and 2,499 people. The remaining 41 percent employ 2,500 or more people. Job titles of participants Twenty-eight percent of the participants in the benchmark are senior managers (CEO, CFO, CIO, and so on), 13 percent are vice presidents, 34 percent are managers or directors, 24 percent are staff, and 1 percent work as internal consultants. Roles of participants Thirty-two percent of the participants work in IT, another 27 percent work in finance and internal controls, 15 percent work in legal and compliance, 5 percent work in sales and marketing, 5 percent work in product design and development, and the remaining 16 percent of the participants work in a wide range of job functions, including customer service, manufacturing, procurement, and logistics. About IT Policy Compliance Group The IT Policy Compliance Group is dedicated to promoting the development of research and information that will help organizations meet their policy and regulatory compliance goals. The IT Policy Compliance Group focuses on assisting member organizations to improve business, governance, risk management, and compliance results based on fact-based benchmarks. The IT Policy Compliance Group Web site at features content by leading experts in the world of compliance and published reports containing primary research. Research benchmarks and interactive assessment tools sponsored by the Group deliver fact-based insight and recommendations about what is working and why, and what can be done to improve results. The Group s research is designed to help legal, financial, internal controls, and professionals to: Benchmark results and efforts against peers and best-in-class performers Identify key drivers, challenges, and responses to improve results Determine the applicability and use of specific capabilities to improve results Identify best practices for IT governance, risk, and compliance The Group relies upon its supporting members, advisory members, associate members, and significant benchmark findings to drive its research and editorial calendar IT Policy Compliance Group
79 IT Policy Compliance Group Supporters Symantec Corporation Stevens Creek Blvd. Cupertino, CA (408) The Institute of Internal Auditors 247 Maitland Ave. Altamonte Springs, FL (407) Information Systems Audit and Control Association 3701 Algonquin Rd., Suite 1010 Rolling Meadows, IL (847) Computer Security Institute 600 Harrison St. San Francisco, CA (415) Protiviti 1290 Avenue of the Americas, 5th Floor New York, NY (212) IT Governance Institute 3701 Algonquin Rd., Suite 1010 Rolling Meadows, IL (847) IT Policy Compliance Group 75
80 Founded in 2005, the IT Policy Compliance Group conducts benchmarks that are focused on delivering fact-based guidance on steps that can be taken to improve results. Benchmark results are reported through for the benefit of members. IT Policy Compliance Group Contact: Managing Director, Jim Hurley Telephone: +1 (216) May 2008 The information contained in this publication has been obtained from sources that the IT Policy Compliance Group believes to be reliable, but are not guaranteed. Research publications reflect current conditions that are subject to change without notice. Copyright 2008 IT Policy Compliance Group. All rights reserved
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Transforming life sciences contract management operations into sustainable profit centers
Point of View Generating life sciences Impact Transforming life sciences contract management operations into sustainable profit centers Globally, life sciences companies spend anywhere from $700 million
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Building the business case for continuity and resiliency
Global Technology Services Research Analysis Risk Management Building the business case for continuity and resiliency The economics of IT risk and reputation and their importance to business continuity
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
Can you afford another day without Managed File Transfer (MFT)?
IPSWITCH FILE TRANSFER WHITE PAPER Can you afford another day without Managed File Transfer (MFT)? www.ipswitchft.com Introduction It s easy to understand why many organizations are confused about the
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:
Beyond Sarbanes-Oxley: Using compliance requirements to boost business performance The business regulatory environment in the United States has changed. Public companies have new obligations to report
IT Governance: framework and case study. 22 September 2010
IT Governance: framework and case study Presenter Yaowaluk Chadbunchachai Advisory Services Ernst & Young Corporate Services Limited Presentation topics ERM and IT governance IT governance framework IT
10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
SUSTAINING COMPETITIVE DIFFERENTIATION
SUSTAINING COMPETITIVE DIFFERENTIATION Maintaining a competitive edge in customer experience requires proactive vigilance and the ability to take quick, effective, and unified action E M C P e r s pec
Hosting and cloud services both provide incremental and complementary benefits to the organization
33 Yonge St., Suite 420, Toronto, Ontario Canada, M5E 1G4 W H I T E P A P E R I D C a n d T E L U S E n t e r p r i s e C l o u d S t u d y, 2 0 1 3 : C a p i t a l i z i n g on C l o u d ' s W i n d o
Whitepaper: 7 Steps to Developing a Cloud Security Plan
Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for
Accenture Technology Consulting. Clearing the Path for Business Growth
Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers
CGI Payments360. Moving money with greater agility and confidence. Experience the commitment
CGI Payments360 Moving money with greater agility and confidence Experience the commitment Addressing today s payments realities Customers want the ability to buy anything, pay anyone and bank anywhere
ENTERPRISE RISK MANAGEMENT FOR BANKS
ENTERPRISE RISK MANAGEMENT FOR BANKS Seshagiri Rao Vaidyula, Senior Manager, Governance, Risk and Compliance Jayaprakash Kavala, Consultant, Banking and Financial Services 1 www.wipro.com/industryresearch
Establishing a Mature Identity and Access Management Program for a Financial Services Provider
Customer Success Stories TEKsystems Global Services Establishing a Mature Identity and Access Management Program for a Financial Services Provider FINANCIAL SERVICES NETWORK INFRASTRUCTURE SERVICES INFORMATION
Benchmarking VoIP Performance Management
Benchmarking VoIP Performance Management March 2008 Page 2 Executive Summary Aberdeen surveyed 159 organizations to identify best practices for managing Voice over Internet Protocol (VoIP). This report
The Power of Risk, Compliance & Security Management in SAP S/4HANA
The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution
DYNAMIC INFRASTRUCTURE Helping build a smarter planet
John Sheehy Systems Architect 18 Feb 2009 Building a smarter planet with a dynamic infrastructure DYNAMIC INFRASTRUCTURE Helping build a smarter planet 1 2009 IBM Corporation The world is smaller and flatter.
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Stakeholder Analysis: The Key to Balanced Performance Measures
Stakeholder Analysis: The Key to Balanced Performance Measures Robert M. Curtice Vice President, Performance Improvement Associates The Need for Balanced Performance Measures Traditional business performance
NEEDS BASED PLANNING FOR IT DISASTER RECOVERY
The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
Accenture Sustainability Performance Management. Delivering Business Value from Sustainability Strategy
Accenture Sustainability Performance Management Delivering Business Value from Sustainability Strategy Global executives are as committed as ever to sustainable business. Yet, executing a sustainability
The economics of IT risk and reputation
Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global
CREATING THE RIGHT CUSTOMER EXPERIENCE
CREATING THE RIGHT CUSTOMER EXPERIENCE Companies in the communications, media, and entertainment industries are using big-data technologies, user-centered design, and operational alignment methodologies
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
Global Shared Support Service:
Global Shared Support Service: Leveraging expertise, sharing costs andderiving value Chandra Shekar Kakal Shared service in any field comes with an implicit assumption of reduced cost and improved efficiency.
IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE
1 IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE ANSWERS AND PRACTICAL TIPS FROM THE IT GOVERNANCE AUDIT PROFESSIONALS JOHAN LIDROS, PRESIDENT EMINERE GROUP KATE MULLIN, CISO, HEALTH
Report to the 79 th Legislature. Use of Credit Information by Insurers in Texas
Report to the 79 th Legislature Use of Credit Information by Insurers in Texas Texas Department of Insurance December 30, 2004 TABLE OF CONTENTS Executive Summary Page 3 Discussion Introduction Page 6
Driving Business Value. A closer look at ERP consolidations and upgrades
IT advisory SERVICES Driving Business Value A closer look at ERP consolidations and upgrades KPMG LLP Meaningful business decisions that help accomplish business goals and growth objectives may call for
TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel
AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,
Hewlett-Packard Separation Will Create Two New Industry-Leading Public Companies
Hewlett-Packard Separation Will Create Two New Industry-Leading Public Companies Investor Presentation October 6, 2014 Safe harbor This presentation contains forward-looking statements that involve risks,
Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology
Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology Key findings from the survey include: while audit software tools have been available
Managing business risk
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
How to Develop Successful Enterprise Risk and Vendor Management Programs
Project Management Institute New York City Chapter January 2014 Chapter Meeting How to Develop Successful Enterprise Risk and Vendor Management Programs Christina S. Kite Senior Vice President Corporate
APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES
APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES APICS INSIGHTS AND INNOVATIONS ABOUT THIS REPORT This report examines the role that supply chain risk management plays in organizations
Portfolio Company Performance Analysis and Reporting Automation
Portfolio Company Performance Analysis and Reporting Automation Providing transparent and accurate performance data to investors, partners and auditors is becoming increasingly important, if not critical
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
Creating Competitive Advantage with Strategic Execution Capability
Cognizant 20-20 Insights Creating Competitive Advantage with Strategic Execution Capability By embracing the Strategic Execution Framework, organizations can identify and resolve internal stress points
ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT
Accounting and Management Information Systems Vol. 11, No. 1, pp. 44 55, 2012 ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT Pavel NĂSTASE 1 and Simona Felicia UNCHIAŞU
The Business Case for Cloud Backup
The Business Case for Cloud Backup Table of Contents Introduction...2 SMB Data Protection Essentials...2 The Business Case for Outsourcing Data Protection...3 Considerations for Choosing a Cloud Backup
Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs
Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains
Sample Financial institution Risk Management Policy 2011
Sample Financial institution Risk Management Policy 2011 1 Contents Risk Management Program...2 Internal Control and Risk Management Diagram... 2 General Control Environment... 2 Specific Internal Control
Executive Summary... 2. Sales Reps And Operations Professionals Need Rich Customer Data To Meet Revenue Targets... 3
Executive Summary... 2 Sales Reps And Operations Professionals Need Rich Customer Data To Meet Revenue Targets... 3 Lack Of Accurate, Timely, And Actionable Customer Data Makes Goal Attainment Difficult...
DEMONSTRATING THE ROI FOR SIEM
DEMONSTRATING THE ROI FOR SIEM Tales from the Trenches HP Enterprise Security Business Whitepaper Introduction Security professionals sometimes struggle to demonstrate the return on investment for new
Credit Union Liability with Third-Party Processors
World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with
DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING. A CaseWare IDEA Research Report
DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING A CaseWare IDEA Research Report CaseWare IDEA Inc. is a privately held software development and marketing company, with offices in Toronto
A new paradigm for EHS information systems: The business case for moving to a managed services solution
White Paper A new paradigm for EHS information systems: The business case for moving to a managed services solution Business solutions through information technology TM Entire contents 2005 by CGI Group
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013
WHITE PAPER. SPEECH ANALYTICS for Predicting Customer Churn. Uniphore Software Systems Contact: [email protected] Website: www.uniphore.
WHITE PAPER SPEECH ANALYTICS for Predicting Customer Churn Uniphore Software Systems Contact: [email protected] Website: www.uniphore.com 1 Table of Contents Introduction... 3 Problems... 3 Solution...
Optimizing Application Management Outsourcing:
A P P L I C A T I O N S A WHITE PAPER SERIES SYNTEL, A U.S.-BASED IT SERVICE PROVIDER WITH AN EXTENSIVE GLOBAL DELIVERY SERVICE, SUGGESTS SPECIFIC BEST PRACTICES FOR REDUCING COSTS AND IMPROVING BUSINESS
A Benchmark Study of Multinational Organizations
A Benchmark Study of Multinational Organizations Research Report Independently Conducted by Ponemon Institute LLC January 2011 The True Cost of Compliance Benchmark Study of Multinational Organizations
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Business Process Services. White Paper. Effective Credit Risk Assessment Strengthening the Financial Spreading with Technology Enablers
Business Process Services White Paper Effective Credit Risk Assessment Strengthening the Financial Spreading with Technology Enablers About the Author Vijay Muppavarapu Vijay is a subject matter expert
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
Western Union. Khalid Fellahi, SVP & GM WU Digital. March 25, 2014
Western Union Khalid Fellahi, SVP & GM WU Digital March 25, 2014 SAFE HARBOR This presentation contains certain statements that are forward-looking within the meaning of the Private Securities Litigation
Realizing Hidden Value: Optimizing Utility Field Service Performance by Measuring the Right Things
Energy and Utility Insights Realizing Hidden Value: Optimizing Utility Field Service Performance by Measuring the Right Things Utilities Realizing Hidden Value About the Author Rob Milstead serves as the
CISM (Certified Information Security Manager) Document version: 6.28.11
CISM (Certified Information Security Manager) Document version: 6.28.11 Important Note About CISM PDF techexams CISM PDF is a comprehensive compilation of questions and answers that have been developed
The Eight Dimensions of Customer Experience for Financial Services
WHITE PAPER: FINANCIAL SERVICES The Eight Dimensions of Customer Experience for Financial Services OCTOBER 2007 Table of Contents Executive Summary SECTION 1 2 Financial Institutions Shift Their Focus
10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff
Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff The Challenge IT Executives are challenged with issues around data, compliancy, regulation and making confident decisions on their business
Business resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
Profitable Product Development for SME. Small to Midsize Enterprises Profiting from Innovation
Small to Midsize Enterprises Profiting from Innovation March 2007 Executive Summary S mall to midsize enterprises (SMEs) are actively pursuing product development improvements to deliver more innovative
Explosive Growth Is No Accident: Driving Digital Transformation in the Insurance Industry
Explosive Growth Is No Accident: Driving Digital Transformation in the Insurance Industry By Mike Sarantopoulos, SVP, Insurance Practice, NTT DATA, Inc. and David Liliedahl, VP, Life & Annuity Portfolio,
Demonstrating the ROI for SIEM: Tales from the Trenches
Whitepaper Demonstrating the ROI for SIEM: Tales from the Trenches Research 018-101409-01 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters:
10 Hidden IT Risks That Threaten Your Practice
(Plus 1 Fast Way to Find Them) Your practice depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
Thriving in the New Normal for Tax Administration
Experience the commitment ISSUE PAPER Thriving in the New Normal for Tax Administration This paper discusses how tax agencies can identify specific revenue collection initiatives and begin to build the
Worksoft Case Study www.worksoft.com 1
U.S. Federal Government Agency Executive Summary A U.S. Federal Government Agency recently adopted Worksoft Certify to increase efficiency, reduce costs, shorten project timelines, capture institutional
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Engagement and Culture: Engaging Talent in Turbulent Times
Point of View Engagement and Culture: Engaging Talent in Turbulent Times When businesses confront an external environment characterized by challenge and confusion, why should they be interested in human
Effectiveness or Efficiency? Is your firm tracking the right Real Estate Metrics? TENANT PERSPECTIVES. The Challenge of Real Estate Management
Effectiveness or Efficiency? Is your firm tracking the right Real Estate Metrics? By Joseph Hamilton, SVP, Cornish & Carey Client Solutions The Challenge of Real Estate Management Managing real estate
Cloud Computing Safe Harbor or Wild West?
IT Best Practices Series Cloud Computing Safe Harbor or Wild West? With IT expenditures coming under increasing scrutiny, the cloud is being sold as an oasis of practical solutions. It s true that many
S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.
S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in
Assessing Your Business Analytics Initiatives
Assessing Your Business Analytics Initiatives Eight Metrics That Matter WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 The Metrics... 1 Business Analytics Benchmark Study.... 3 Overall
Validating Third Party Software Erica M. Torres, CRCM
Validating Third Party Software Erica M. Torres, CRCM Michigan Bankers Association Risk Management & Compliance Institute September 29, 2014 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT
