FROM HINDSIGHT TO FORESIGHT REPOSITIONING INTERNAL AUDIT TO DELIVER HIGHER VALUE
|
|
|
- Harold Wright
- 10 years ago
- Views:
Transcription
1 FROM HINDSIGHT TO FORESIGHT REPOSITIONING INTERNAL AUDIT TO DELIVER HIGHER VALUE Repositioning Internal Audit FY 2016-FY2017 Audit Resource Deployment Plan Resources and Staffing Supplemental Materials
2 Repositioning Internal Audit: Building Blocks of the New Internal Audit Function Our relationships embody respect, insight, balance, trust, and care. We value: Leadership development. Civility. The voices of our stakeholders. We operate transparently. We are aware of our impact. We have an enterprise view. We deliver insight and foresight to our colleagues and stakeholders through: Professional competence. Business acumen. Focus on Cornerstone Plan and Health System strategy. Data-driven analyses. Our network of colleagues and connections throughout the University and the profession. We serve the audit profession in the Commonwealth of Virginia, the higher education industry, and around the globe. We collaborate and share our knowledge generously. We set the bar for excellence and leading practice in internal auditing. 2
3 How we built the risk-based audit plan Audit Universe Academic Div: U.Va. s Budget System Hierarchical Org Data (Unit, Expenditure $, Grant $, FTEs) MC/Health System: May 2015 Operating Margin Report TO BUILD THE AUDIT PLAN WE ESTABLISHED AN AUDIT UNIVERSE AND ASSIGNED RISK WEIGHTINGS: Relevant UVA ERM Risks Regulatory Compliance Emerging practices (e.g. ACO, Value Based Care) Industry Risks: Higher Ed Healthcare Peer Benchmarking Hot Topics Enterprise Risks: 1. Funding to achieve goals 2. Management of human capital 3. Legal compliance 4. Keeping pace 5. Reputation w/key stakeholders 6. Geo-political and economic risks 7. Safety/security 8. Cybersecurity/leveraging IT 9. Org/operational efficiencies Strategic Objectives: Cornerstone Plan U.Va. Health System Strategy Stakeholder input including: ACR Chairman, MC Cabinet, EVP/COO, IT Leadership, Provost s Office 3
4 Audit Resources Deployment FY 16-FY 17 Academic Team Faculty Recruitment and Retention Research Expansion Initiative Med Center Team Clinical Engineering Charge Capture IT Team Cybersecurity IT Governance and Standards IT Asset Management Change Control and System Configuration Integrated Team Audits and Reviews Fiscal Stewardship (Pan-University) EPIC Phase 2 Implementation Managerial Reporting Implementation PeopleSoft Upgrade Physical Safety and Security Integrated Assurance: Compliance Oversight Verification Data Privacy Segregation of Duties (Oracle, PeopleSoft, EPIC) Audit Department Process Improvements 4
5 Audit Department Resources (future) Current vacancies in red Chief Audit Executive Redeployment of resources in green Maintains current 17 position headcount while increasing Managers span of control (3 rd Director role not replaced) Reporting location of Health System (HS) Auditors depends on skill sets of TBD Director Integrated Assurance Continuous Monitoring/Fraud Risk Hotline follow up Assoc Dir IT Director IT Audit Senior IT Auditor New Hire Senior IT Auditor Office Manager Special Projects (all areas) Manager Director HS and University Audits Senior Auditor Senior Auditor Manager HS Audits Senior HS Auditor New Hire HS Auditor Will need to evaluate where specialization of audit skills is required as we make new hires/shift current resources/cosource Audits will be conducted using pooled resource approach where possible. Administrative reporting would remain as shown. IT Auditor Staff Auditor New Hire HS Auditor 5
6 Unpacking the Audit Plan: Potential Scope of Audit Plan Topics SUPPLEMENTARY MATERIALS 6
7 Unpacking the Plan: Potential Scope Areas Academic Team Audit Why Selected Potential Scope Curry School of Education In progress from prior year plan Degree audit Centers and Clinics: licensure, background checks, patient health data, revenue generation/charge capture Academic Programming Faculty Recruitment and Retention Cornerstone Pillar IV: Assemble and Support a Distinguishing Faculty ERM Risk: Management of Human Capital Research Expansion Initiative Cornerstone Pillar II: Advance Knowledge ERM Risks: Funding to Achieve Goals; Keeping Pace Large program governance Effectiveness of risk management for strategically critical program Large program governance Effectiveness of risk management for strategically critical program 7
8 Unpacking the Plan: Potential Scope Areas Med Center Team Audit Why Selected Potential Scope Pyxis Medstation Access Review In progress from prior year plan User provisioning Evaluation of biometric access usage Clinical Engineering Cyber/ Data Security of Patient Information Patient Care/Safety & Quality of Patient Care ERM Risk: Legal and Compliance Staff Productivity Charge Capture OIG Workplan Margin Management ICD-10 Implementation EMR/Medical Documentation Regulatory Billing Compliance Value Based Care Healthcare Industry Major Trend Data security and privacy practices Device maintenance scheduling and equipment monitoring procedures Useful life monitoring and evaluation Evaluation of facility/technical fee billing by the MC for nurse only and procedure visits Billing of Medications and Med Administration TBD in partnership with MC leadership 8
9 Unpacking the Plan: Potential Scope Areas Audit Why Selected Potential Scope Information Security, Policy, and Records Office IT KPMG 2015 IT Security Assessment CEB 2015 Audit Plan Hotspots PCI Compliance Governance/Standards Information Security Policy Monitoring Procedures Data Loss Prevention Malware Prevention Cybersecurity ERM Risk: Cybersecurity/ Leveraging IT CEB 2015 Audit Plan Hotspots KPMG 2015 IT Security Assessment Incident response Network Operating Systems Databases (data-at-rest) BYOD (Bring Your Own Device) Change Control and System Configuration Key general computing controls KPMG 2015 IT Security Assessment Student Information System (SIS) Oracle & PS HR and FIN modules EPIC 9
10 Unpacking the Plan: Potential Scope Areas Audit Why Selected Potential Scope PeopleSoft Significant Upgrade Data Privacy IT Asset Management IT (Cont.) KPMG 2015 IT Security Assessment Privileged User Access SOD Service/Generic Accounts Patching Procedures Database Security IT Inventory Management: Central and Non-Central Assets and Systems Termination Handling Disposal Procedures Disaster Recovery Key general computing controls Changing Technology Replication Process Testing Key Metrics and SLAs 10
11 Fiscal Stewardship Unpacking the Plan: Potential Scope Areas Audit Why Selected Potential Scope EPIC Phase 2 Implementation (HS Revenue Module) Managerial Reporting Implementation Physical Safety and Security Integrated Team Audits and Reviews Cornerstone Pillar V: Steward the University's Resources to Promote Academic Excellence and Affordable Access Significant financial application Significant capital expenditure Significant financial application Significant capital expenditure ERM Risk: Safety/security of students, faculty and staff Key internal financial controls Unit-level fiscal discipline Application of University Financial Model Program governance Access/data security Configuration settings Segregation of duties Data security Data integrity Clery audit follow up Police training Physical security Building access 11
12 Unpacking the Plan: Potential Scope Areas Integrated Team Audits and Reviews (Cont d) Audit Why Selected Potential Scope Integrated Assurance ERM Risk: Legal and Compliance Higher Education Industry risks Reputational risks CEB 2015 Audit Plan Hotspots Privacy ERM Risk: Legal and Compliance CEB 2015 Audit Plan Hotspots Segregation of Duties Foundational fraud risk control Data security and integrity Reporting accuracy Effectiveness of 2 nd line of defense compliance functions: NCAA Environmental Health & Safety Research-related (OSP, IRB) Corp Compliance (Med Ctr) Title IX Clery Act ARMICS ( Government SOX ) PII (Personally Identifiable Data) Student Data HIPAA compliance Cloud and mobile environments Oracle PeopleSoft EPIC 12
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
How To Ensure Financial Compliance
Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Integrated Technology Plan (FY10 FY12)
(FY10 FY12) Anne Arundel Community College embraces and promotes a seamless integration of appropriate technologies in support of the learning community within the framework of the college s mission and
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Oracle ERP Support Benchmark Findings
Appendix K Oracle ERP Support Benchmark Findings City of Virginia Beach ComIT Master Technology Plan (Appendix K) 1 City of Virginia Beach Oracle ERP Support Benchmark Findings 23 September 2013 Prepared
Department of Human Resources
Workforce Services Workforce Policy and Planning Department Management/ Human Resource Information Systems Employee Relations Employment Compensation and Workforce Analysis Employee Benefits Organizational
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
The Role of Internal Audit in Risk Governance
The Role of Internal Audit in Risk Governance How Organizations Are Positioning the Internal Audit Function to Support Their Approach to Risk Management Executive summary Risk is inherent in running any
Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.
Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Topics: Explain why it is important for firms of all sizes to address cybersecurity risk. Demonstrate awareness
Importance of Compliance Training Al Josephs, Senior Director Policies and Training Ryan Whitehill, Manager Ethics and Compliance Training
Importance of Compliance Training Al Josephs, Senior Director Policies and Training Ryan Whitehill, Manager Ethics and Compliance Training April 24, 2013 About Tenet 49 Hospitals 117 Outpatient Centers
STRATEGIC HUMAN RESOURCE MANAGEMENT IN MODERN TIMES. By Maryam Bayi
STRATEGIC HUMAN RESOURCE MANAGEMENT IN MODERN TIMES By Maryam Bayi INTRODUCTION: INTRODUCTION: Strategic Human Resource Management as as tool tool for for measuring organizational success or or failure
PCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next:
11 Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next: 1. Why the Conversation has shifted. 2. How Boards are reacting. 3. What
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
How To Transform It Risk Management
The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help
Internal audit value optimization for insurance organizations
Internal audit value optimization for insurance organizations Webinar May 13, 2015 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.
ISE Northeast Executive Forum and Awards
ISE Northeast Executive Forum and Awards October 3, 2013 Company Name: Project Name: Presenter: Presenter Title: University of Massachusetts Embracing a Security First Approach Larry Wilson Chief Information
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
10 Best-Selling Modules For Home Information Technology Professionals
Integriertes Risk und Compliance Management als Elemente einer umfassenden IT-Governance Strategie Ing. Martin Pscheidl, MBA, MSc cert. IT Service Manager Manager, Technical Sales CA Software Österreich
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
2015 List of Major Management Challenges for the CFPB
September 30, 2015 MEMORANDUM TO: FROM: SUBJECT: Richard Cordray Director Consumer Financial Protection Bureau Mark Bialek Inspector General 2015 List of Major Management Challenges for the CFPB We are
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
The University of Texas MD Anderson Cancer Center Internal Audit Annual Report for FY2015
Purpose of the Annual Report The purpose of the internal audit annual report is to provide information on the assurance services consulting services, and other activities of the internal audit function.
Academic Division Enterprise Risk Management (ERM)
Academic Division Enterprise Risk Management (ERM) Audit and Compliance Committee March 24, 2015 Achieve competitive compensation Risk Category Risk Description Risk Owner Key Stakeholders Management of
Performing a Compliance Risk Assessment for Compliance Auditing & Monitoring in Healthcare Organizations
Performing a Compliance Risk Assessment for Compliance Auditing & Monitoring in Healthcare Organizations Author: Glen C. Mueller, Chief Audit & Compliance Officer, Scripps Health, San Diego, CA Introduction
FY15 Supplemental Information January 5, 2016
FY15 Supplemental Information January 5, 2016 Safe Harbor This document contains certain forward-looking statements. These statements are based on the company s current expectations as to the outcome and
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
Health Information Technology (HIT) Guide for the Delta Rural Hospital Performance Improvement (RHPI) Program
Health Information Technology (HIT) Guide for the Delta Rural Hospital Performance Improvement (RHPI) Program Health Information Technology Workforce: Current Issues and Recommended Solutions Prepared
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO
Position Description Senior Associate Dean and Chief Operating Officer of the Darden Graduate School of Business Administration University of Virginia
Position Description Senior Associate Dean and Chief Operating Officer of the Darden Graduate School of Business Administration University of Virginia May 6, 2013 The Darden School of Business at the University
Practical and ethical considerations on the use of cloud computing in accounting
Practical and ethical considerations on the use of cloud computing in accounting ABSTRACT Katherine Kinkela Iona College Cloud Computing promises cost cutting efficiencies to businesses and specifically
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION,
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma Governance, Risk, Compliance (GRC) Automation Siamak Razmazma [email protected] September 2009 Agenda Introduction to
Proposed Audit Plan for Fiscal Year 2015-16 and Preliminary Audit Plan for Fiscal Year 2016-17
Page 1 of 13 Proposed Audit Plan for Fiscal Year 2015-16 and Preliminary Audit Plan for Fiscal Year 2016-17 A June 2015 Page 2 of 13 Table of Contents Section I FY 2015-16 Proposed Audit Plan Pension and
Test Content Outline Effective Date: January 12, 2016. Nurse Executive Board Certification Examination
Board Certification Examination There are 175 questions on this examination. Of these, 150 are scored questions and 25 are pretest questions that are not scored. Pretest questions are used to determine
Healthcare Internal Audit: In a Time of Transition
The 2015 State of the Internal Audit Profession Study Healthcare Internal Audit: In a Time of Transition The healthcare industry in the United States is facing many challenges with the enactment of legislation
IT Compliance 24.09.2007. After Hours Seminar September 2007 Zurich. Improving IT Risk & Compliance Management (RCM)
IT Compliance 24.09. AHS After Hours Seminar Zurich Improving IT Risk & Compliance Management (RCM) Bruno J. Wiederkehr Member of the Board ISACA Switzerland Chapter Agenda 1. Understanding the RCM Requirements
Top Priorities for Internal Auditors in U.S. Healthcare Provider Organizations
Top Priorities for Internal Auditors in U.S. Healthcare Provider Organizations Key Areas for Improvement Include Compliance, Information Security, Social Media and Quality Assurance INTRODUCTION Historic
Information Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
ERP Survey Questionnaire
0 ERP Survey Questionnaire Thank you for your participation in the EDUCAUSE study of Enterprise Resource Planning (ERP) systems. The survey is a key part of a major study on ERP in higher education in
Click to edit Master title style. How To Choose The Right MSSP
How To Choose The Right MSSP Meet Eric Eric Devansky Director of Global Security Services 15 Years of experience in the Cyber Security industry CISSP Palo Alto CNSE VMWare VCP Connect with me: @TruShield
Next. CDS 2015 Survey Module 7 Information Security Survey Errata
1 CDS 2015 Survey Survey Errata This module includes questions about the IT security organization, staffing, policies, and practices related to information technology security. This is an optional module.
Vendor Management Best Practices
23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion
Information Technology Strategic Plan 2014-2017
Information Technology Strategic Plan 2014-2017 Leveraging information technology to create a competitive advantage for UW-Green Bay Approved December 2013 (Effective January 2014 December 2017) Contents
Vulnerability. Management
Solutions.01 Vulnerability Management.02 Enterprise Security Monitoring.03 Log Analysis & Management.04 Network Access Control.05 Compliance Monitoring Rewterz provides a diverse range of industry centric
Next. CDS 2015 Survey Module 7 Information Security Survey Errata
CDS 2015 Survey Survey Errata This module includes questions about the IT security organization, staffing, policies, and practices related to information technology security. This is an optional module.
Our Service Offering to SASOL
Our Service Offering to SASOL MEMBER FIRM ALIGNED WITH LIKE-MINDED FIRMS IN OVER 70 OFFICES ACROSS 25 COUNTRIES Giving our clients a competitive advantage by providing access to best practice. A BRIEF
Internal Audit and Advisory Services DRAFT
Internal Audit and Advisory Services DRAFT PAGE(S) Message from the Internal Audit and Advisory Services...1-2 Internal Audit and Advisory Services Plan...3-5 Objectives...6-7 Risk Assessment Process...8
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
HIM Master s Degree Competencies* Domains, Subdomains, and Tasks 2007 and Beyond
HIM Master s Degree Competencies* Domains, Subdomains, and Tasks 2007 and Beyond I. Domain: Health Data Management A. Data Structure 1. Evaluate reference terminologies to satisfy organizational information
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM
GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
Maximizing Configuration Management IT Security Benefits with Puppet
White Paper Maximizing Configuration Management IT Security Benefits with Puppet OVERVIEW No matter what industry your organization is in or whether your role is concerned with managing employee desktops
Leveraging SANS and NIST to Evaluate New Security Tools
Leveraging SANS and NIST to Evaluate New Security Tools Agenda About TaaSera A Problem to Solve Overview of NIST Cybersecurity Framework Overview of SANS CSC-20 Call to Action Conclusion Q&A Company Founded
FY 2015 Annual Audit Report
FY 2015 Annual Audit Report Table of Contents I. Compliance with House Bill 16 (Texas Government Code, Section 2102.015): Posting the Internal Audit Plan, Internal Audit Annual Report, and Other Audit
Office of Internal Audit. Activity Report. For the period from March 16, 2014 to August 8, 2014. Internal Audit Team
Activity Report For the period from March 16, 2014 to August 8, 2014 Internal Audit Team Stefanie Powell, CPA, CISA Interim Director Kelly Mintern, CPA, CIA Auditor Cynthia Nickerson, CPA Auditor Karen
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
DIGITAL STRATEGY SUMMARY 2014-2015
DIGITAL STRATEGY SUMMARY 2014-2015 Maria MacGunigal, CIO OUR STORY: We are at an important point in history where technology is pervasive in almost all aspects of our lives. Government is expected more
University Information Technology Security Program Standard
University Information Technology Security Program Standard July 2012 Version 3.0 This standard establishes requirements and general principles for initiating, implementing, maintaining, and improving
Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32
Audit Capabilities: Beyond the Checklist Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32 Agenda Beyond the Checklist Visa Overview Visa Internal Audit Overview
BIG SHIFT TO CLOUD-BASED SECURITY
GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF
HUMAN RESOURCES IN PUBLIC EDUCATION Where are we? Where should we be? Where HR Divisions should be. Where most HR Divisions are
HUMAN RESOURCES IN PUBLIC EDUCATION Where are we? Where should we be? Human Capital Management Human Resources Department Personnel Department Levers: Differentiated Pay Career Ladders Distribution of
Cybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
THE STRATEGIC PLAN OF THE INDIANA PUBLIC RETIREMENT SYSTEM FOR THE PERIOD OF FISCAL YEARS
THE STRATEGIC PLAN OF THE INDIANA PUBLIC RETIREMENT SYSTEM FOR THE PERIOD OF FISCAL YEARS 2016-2018 TABLE OF CONTENTS INTRODUCTION TO THE STRATEGIC PLAN 4 GOALS, OBJECTIVES & KEY OPERATIONAL REQUIREMENTS
High Value Audits: An Update on Information Technology Auditing. Robert B. Hirth Jr., Managing Director
High Value Audits: An Update on Information Technology Auditing Robert B. Hirth Jr., Managing Director The technology landscape and its impact on internal audit Technology is playing an ever-growing role
Auditing Cloud Computing and Outsourced Operations
Session 136 Auditing Cloud Computing and Outsourced Operations Monday, May 7, 2012 3:30 PM 5:00 PM Mike Schiller Director of Sales & Marketing IT, Texas Instruments Co Author, IT Auditing: Using Controls
Chairman Johnson, Ranking Member Carper, and Members of the committee:
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
