Audit. In today s constantly changing business. The Relevant

Size: px
Start display at page:

Download "Audit. In today s constantly changing business. The Relevant"

Transcription

1 Edward Hill, CIA, CPA Executive Director Business Advisory Services Grant Thornton LLP The Relevant Audit IT GAIT-R provides a top-down, risk-based approach to scoping IT risks and processes into audits. In today s constantly changing business environment, with new threats and vulnerabilities emerging daily that put mission objectives at risk, auditors can make IT audits more relevant by tying them to the strategic objectives of the organization. In the past, IT audits typically focused on the IT control environment and technical infrastructure. As a result, auditors may have paid too much attention to details in IT-specific areas that were dated or irrelevant to achieving current business goals, rather than focusing resources on control and risk elements that support current mission-critical goals. Auditors must broaden the scope of IT audits to include the control and risk environment relevant to business objectives, which will differ based on each organization s dependence on technology to meet strategic objectives. Using this 57

2 approach and drawing on The IIA s Guide to the Assessment of IT Risk (GAIT) guidance, auditors will conduct a more meaningful audit that examines true business risk. As such, the level and type of IT support will be different for each organization. GAIT-R focuses on the likelihood of risk events occurring to determine the level of IT audit control testing needed. Under loss of the availability of applications and the infrastructure that supports them is almost always a critical risk if the applications are customer facing. Customers in today s information age demand 58 PRACTICAL GUIDANCE GAIT for Business and IT Risk (GAIT-R), issued by The IIA in 2008, is a method for scoping IT audits by sifting key controls through an eight-step series of top-down, risk-based filters. The result is a streamlined scope that focuses the IT audit on those key controls and risks across the enterprise that are essential to achieving business goals and objectives. The GAIT-R guidance takes a holistic view of audit scoping that includes financial, operational, legal, and compliance functionality as outlined in The Committee of Sponsoring Organizations of the Treadway Commission s (COSO s) Internal Control Integrated Framework. COSO identifies three broad internal control objectives: financial reporting, such as completeness, accuracy, proper valuation, and safeguarding of assets; operations, including items like price or customer service; and legal and regulatory. Of these three, only financial reporting requirements cut across all organizations. Operations and legal and regulatory requirements differ from company to company depending on its competitive niche and industry. A lowcost provider will have a different risk profile than a company competing on customer service in the same industry. GAIT Methodology Steps the model, the potential failure in an IT process, or risk occurence, is assessed to determine what effect the failure may have on the achievement of business objectives. If delivering timely information to customers were a critical business objective of a manufacturing company, the GAIT-R model would assess the potential impact that failing to meet this objective might have on the organization. To an e-commerce company, system availability is crucial to ongoing sales as well as an overall goal of customer confidence and loyalty. If the company has a technology failure that causes the purchasing system to go down, not only does that company lose sales, customers also may lose confidence in the company and migrate to other online providers. The These steps outline an approach to applying the GAIT principles to a business audit, which will identify the critical IT risks related to particular business objectives. 1. Identify the business objectives for which the controls are to be assessed. 2. Identify the key controls within business processes required to provide reasonable assurance that the business objectives will be achieved. 3. Identify the critical IT functionality relied on from among the key business controls. 4. Identify the significant applications where IT general controls need to be tested. 5. Identify IT general control process risks and related control objectives. 6. Identify the IT general control to test that it meets the control objectives. 7. Perform a holistic review of all key controls to ensure that considerations have been balanced between those controls that rely on IT and those that do not. 8. Determine the scope of the review and build an appropriate design and effectiveness testing program. The GAIT-R approach focuses internal audit effort where it is most needed, resulting in higher quality IT audits and making the internal auditor s role more valuable from a strategic planning perspective. immediate availability of information and lose confidence and interest when it s not available when they need it. As such, system availability controls and risks should be given audit priority to minimize the risk of key control failures. This approach focuses internal audit effort where it is most needed, resulting in higher quality IT audits. Internal auditors, and by extension the organization as a whole, also benefit from a better understanding of how particular IT processes and controls are designed to mitigate risk and contribute to the achievement of business objectives, making the role of internal auditors more valuable from a strategic planning perspective. RISK-BASED AUDITING Instead of focusing on specific controls, GAIT-R uses a top-down, risk-based approach written primarily for internal auditors. The methodology identifies risks, not specific controls, within IT business processes where a control or security failure could adversely affect the achievement of specific goals of an organization. The approach assumes that IT risk is most important when it relates to the potential failure of a key business process or objective. Once key IT controls are identified, GAIT-R uses structured reasoning to focus on those controls across the enterprise that are essential to achieving business goals and objectives. Used correctly, this filtering process streamlines the IT audit scope, minimizing resources spent on IT risks that are not critical to business objectives. Scoping IT audits using GAIT-R further refines the IT scope by adding a Internal Auditor june 2011

3 the relevant it audit relevant business filter. Traditionally, many auditors have viewed technology risk assessments in a silo, focusing audits on IT department objectives in a review of applications, technical infrastructure, IT processes, and IT projects across the organization. This traditional approach focuses on the effectiveness of technology against IT objectives rather than the supporting role of technology in achieving the goals of the business. GAIT-R takes the scoping process one step further by tying IT objectives to business objectives before taking a top-down approach. The refined scope on information systems that provide up-to-the-minute status of order processing and shipment tracking. The processes and applications are designed to achieve the goal of real-time and reliable customer support. If these systems are not available, the lack of timely information could impact customer satisfaction. If there is a goal of immediate shipping of in-stock inventory and the customerfacing system indicates that an item is in stock, but that system is out of sync with the warehouse and shipping systems, the order placed by the customer may not trigger the shipment of the item. The order on the trucks, and are rolling out of the warehouse by 7 a.m. the next day. The highly competitive restaurant supply business is reliant on processing accurate, complete, and timely orders. Therefore, the audit team should identify key risks in the process and understand how the company guarantees changes to this application are accurate and completely tested before being placed into operations. The IT assessment should include audits of all system applications and processes that affect key risk areas and contribute to the critical business objectives of on-time, accurate deliveries. Traditionally, many auditors have viewed technology risk assessments in a silo, focusing audits on IT department objectives in a review of applications, technical infrastructure, IT processes, and IT projects. should identify how technology is being used to enable business processes within the organization. As a result, audits of data security that use the GAIT-R methodology might focus on protecting the information assets that are required to support critical business operations, securing intellectual or proprietary property (such as the formula for a new product), and identifying where the damage to, or loss of, data could represent an immediate liability to the business as a whole. customer is likely to be upset and lose faith in the company. Identify the critical IT functionality relied on from among the key business controls For example, a food distributor that provides daily delivery of fresh produce and meats to upscale restaurants uses an automated pick-and-pack application. Orders for next day delivery must be placed by 10 p.m. through an online order system to ensure goods are sourced, sorted by restaurant, packed in the correct Identify the significant applications where IT general controls need to be tested In the restaurant supply example, audits should be tied directly to the achievement of key business goals. In the example, there most likely are several audits that would be associated with the business objective of achieving on-time, accurate deliveries. Based on the size and complexity of the systems, these audits would include change management over significant applications focusing specifically on the completeness of the testing before programs are moved into production. A complete analysis of the overall process also may identify IT infrastructure components critical to the achievement of the delivery goals. Identify IT general control process risks and related control objectives Key business-related risks could include: availability of the systems, consistency and accuracy of processing, ease of use and accuracy of customer-facing websites for entering orders or scheduling service, APPLYING THE METHODOLOGY The GAIT-R methodology covers the risk assessment and control identification process in eight steps, starting with understanding the business objectives for which controls are to be assessed and ending with a defined scope of work. The most significant and differentiating steps, with practical applications for clarification purposes, are summarized as follows (for the complete list of steps see GAIT Methodology Steps on page 58). Identify the business objectives for which the controls are to be assessed For example, an online retailer relies Top-down, Risk-based Principles The GAIT-R principles outline the overall approach to scoping IT audit work so that IT work addresses the most critical IT issues from a business objective standpoint. These principles will guide a user to the critical IT functions and will provide a business context to the IT audit work. Principle 1: The failure of technology is only a risk that needs to be assessed, managed, and audited if it represents a risk to the business. Principle 2: Key controls should be identified as the result of a top-down assessment of business risks, risk tolerance, and the controls required to manage or mitigate business risk. Principle 3: Business risks are mitigated by a combination of manual and automated key controls. Principle 4: IT general controls may be relied on to provide assurance of the continued and appropriate operation of automated key controls. 59

4

5 the relevant it audit use of company systems by vendors or other outside users, and reliance on and enablement of applications and other technologies. For example, a manufacturing plant uses an automatic reorder system to order key production parts. If the reorder system fails and key parts are not available as needed, production could come to a halt. The technology risk of this failure would be felt throughout the organization in a monthly sales drop and failure to meet existing production commitments. By identifying this risk up front in an IT audit, the company can test appropriate controls for success and identify a backup alternative supplier before the need is critical. Determine the scope of the review and build an appropriate design and effectiveness testing program A critical step in the application of the GAIT-R methodology is the identification of those key/critical controls related specifically to the identified business process and the related risks/controls to achieving the objective. Using the same example goal of accurate and on-time delivery, practical application focuses on the program change control audit. In the overall change control process there are several steps that are critical to an efficient and effective method, but are less critical to the objective if only fully tested and evaluated changes should be promoted into production. For example, the accuracy and completeness of the user change request process is not specifically relevant to ensuring the changed code is accurate. However, if the audit is designed to evaluate the efficiency and effectiveness of the change process overall, these steps would need to be evaluated. A STRONG BUSINESS CASE Although GAIT-R changes the IT focus and selection of controls targeted in an IT audit, the top-down, risk-based approach ensures a more effective audit scope, lowers cost in the long run, and improves the strategic overview. In addition, aligning IT risks with business goals puts IT audit findings in a business context that is more easily understood outside of IT circles. For example, audit findings from an assessment of the availability of customer service applications and the infrastructure that supports the achievement of superior customer service can help management understand what puts this goal at risk and make adjustments before IT issues impact it. Adopting GAIT-R takes up-front time, effort, and resources. Some internal auditors may question whether they have the skills and knowledge necessary to implement the methodology. The higher quality audits that result from focusing on true business risks, not just technology risks, should be justification enough for moving to this approach. Making the change to a GAIT-R approach to IT audits also is beneficial for internal auditors themselves. With GAIT-R, internal auditors become the interface between management and IT specialists, breaking through technology jargon to give the organization s leaders the information they need to understand the strategic implications of IT risk. To comment on this article, the author at [email protected]. Results that are Vital to Corporate Stakeholders Require Sharpe Decisions Sharpe Decisions Executive Workshop Sharpe Decisions Voting Systems Sharpe Decisions inc. For more information, visit our Web site or us at [email protected]. Helping you balance your risk Effective risk management is key to the success of your business. More and more companies view risk management as an area of strategic importance. Professional risk management advice and effective assurance mechanisms can deliver competitive advantage and enhance value to your stakeholders. RSM member firms have a comprehensive range of services designed to bring a new perspective to your organisation and define clear risk strategies. Meet partners from RSM International member firms at the International Conference, July 2011 in Kuala Lumpur. RSM International is the brand used by a network of independent accounting and consulting firms. Each member of the network is a legally separate and independent firm. The brand is owned by RSM International Association. The network is managed by RSM International Limited, neither of which provide accounting or consulting services. The network using the brand RSM International is not itself a separate legal entity of any description in any jurisdiction. Intellectual property rights used by members of the network including the trademark RSM International are owned by RSM International Association, an association governed by articles 60 et seq of the Civil Code of Switzerland whose seat is in Zug. RSM International Association,

ERP, CLOUD & TAX NAVIGATING MAJOR DECISIONS IN YOUR BUSINESS

ERP, CLOUD & TAX NAVIGATING MAJOR DECISIONS IN YOUR BUSINESS ERP, CLOUD & TAX NAVIGATING MAJOR DECISIONS IN YOUR BUSINESS ERP, cloud and tax Are you planning ahead? AN INVESTMENT IN A NEW ENTERPRISE RESOURCE PLANNING (ERP) SYSTEM IS A MAJOR DECISION. UNFORTUNATELY

More information

See your business in a new way.

See your business in a new way. Operations and Distribution Management Brochure See your business in a new way. Realize the future of your business today. See your business in a new way. Realize the future of your business today. Distribution

More information

The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework

The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework Dorothy Gjerdrum, ARM-P, Chair of the ISO 31000 US TAG and Executive Director,

More information

Sage MAS 90 and 200. Extended Enterprise Suite S

Sage MAS 90 and 200. Extended Enterprise Suite S Sage MAS 90 and 200 Extended Enterprise Suite S An End-to-End Approach to Business Software At Sage, we ve been supporting businesses like yours with world-class business software for well over a quarter

More information

Risk Management Solution for NPO

Risk Management Solution for NPO Risk Management Solution for NPO Achieving Mission with Best in Governance Disclaimer While utmost care has been taken to ensure content accuracy at the time of writing, no person should rely on the contents

More information

Simply Sophisticated. Information Security and Compliance

Simply Sophisticated. Information Security and Compliance Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns

More information

What you need to know when your customers and suppliers say it's time you started using EDI

What you need to know when your customers and suppliers say it's time you started using EDI What you need to know when your customers and suppliers say it's time you started using EDI INTRODUCTION Your customer s purchase orders - created on their computer - appear in your own financial software

More information

Corporate Governor. New COSO Framework links IT and business process

Corporate Governor. New COSO Framework links IT and business process Corporate Governor Providing vision and advice for management, boards of directors and audit committees Summer 2014 New COSO Framework links IT and business process Michael Rose, Partner, Business Advisory

More information

ENTERPRISE RISK MANAGEMENT FOR BANKS

ENTERPRISE RISK MANAGEMENT FOR BANKS ENTERPRISE RISK MANAGEMENT FOR BANKS Seshagiri Rao Vaidyula, Senior Manager, Governance, Risk and Compliance Jayaprakash Kavala, Consultant, Banking and Financial Services 1 www.wipro.com/industryresearch

More information

Field Service in the Cloud: Solving the 5 Biggest Challenges of Field Service Delivery

Field Service in the Cloud: Solving the 5 Biggest Challenges of Field Service Delivery Field Service in the Cloud: Solving the 5 Biggest Challenges of Field Service Delivery The ServiceMax Whitepaper Executive Summary The time has come for field service organizations to also reap the benefits

More information

Transaction Processing and Enterprise Resource Planning Systems. Goal of Transaction Processing. Characteristics of Transaction Processing

Transaction Processing and Enterprise Resource Planning Systems. Goal of Transaction Processing. Characteristics of Transaction Processing C H A P T E R 9 Transaction Processing and Enterprise Resource Planning Systems Goal of Transaction Processing Provide all the information needed to keep the business running properly and efficiently.

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Reduce Costs and Improve Materials Management with Mobile Technology

Reduce Costs and Improve Materials Management with Mobile Technology SAP Brief SAP Enterprise Asset Management SAP Inventory Manager for Maximo Objectives Reduce Costs and Improve Materials Management with Mobile Technology Streamline inventory processes for better asset

More information

Count, manage and move: Warehouse inventory control strategies

Count, manage and move: Warehouse inventory control strategies Count, manage and move: Warehouse inventory control strategies Prepared by: Paul Calamita, Partner, McGladrey LLP [email protected] Sean Ellis, Senior Associate, McGladrey LLP [email protected]

More information

Understanding Stock and Inventory Control

Understanding Stock and Inventory Control Understanding Stock and Inventory Control Stock control, otherwise known as inventory control, is used to show how much stock you have at any one time, and how you keep track of it. It applies to every

More information

A Risk-Based Audit Strategy November 2006 Internal Audit Department

A Risk-Based Audit Strategy November 2006 Internal Audit Department Mental Health Mental Retardation Authority of Harris County ENTERPRISE RISK MANAGEMENT A Framework For Assessing, Evaluating And Measuring Our Agency s Risk A Risk-Based Audit Strategy November 2006 Internal

More information

Guide To Increasing Online Sales - The Back (Office Story)

Guide To Increasing Online Sales - The Back (Office Story) Guide To Increasing Online Sales - The Back (Office Story) 4 Ways Your Inventory & Order Management Solution Plays A Pivotal Role The one sustainable competitive advantage you have to drive more online

More information

Coping with a major business disruption. Some practical advice

Coping with a major business disruption. Some practical advice Coping with a major business disruption Some practical advice Coping with a major business disruption What is business continuity? Business continuity planning (BCP) is a management process that helps

More information

Scope The data management framework must support industry best practice processes and provide as a minimum the following functional capability:

Scope The data management framework must support industry best practice processes and provide as a minimum the following functional capability: Data Management Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for data management across Redland City Council (RCC). This document will provide direction and

More information

Pharmaceutical Compliance and Regulatory Congress 2009

Pharmaceutical Compliance and Regulatory Congress 2009 Pharmaceutical Compliance and Regulatory Congress 2009 Compliance Program Elements Track I: How Program Management Can Keep You On Track Edward H. Leskauskas Director, Compliance and Ethics Operations

More information

4th Annual ISACA Kettle Moraine Spring Symposium

4th Annual ISACA Kettle Moraine Spring Symposium www.pwc.com 4th Annual ISACA Kettle Moraine Spring Symposium Session 2 Big Data May 14th, 2014 Session Objective Learn about governance, risks, and compliance considerations that become particularly important

More information

Strategies for optimizing your cash management

Strategies for optimizing your cash management Part of the Deloitte working capital series Make your working capital work for you Strategies for optimizing your cash management The Deloitte working capital series Strategies for optimizing your accounts

More information

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced

More information

Managing Procurement with SAP Business One

Managing Procurement with SAP Business One SAP Product Brief SAP s for Small Businesses and Midsize Companies SAP Business One Objectives Managing Procurement with SAP Business One Integrate optimized procurement with the entire business Integrate

More information

SafeNet DataSecure vs. Native Oracle Encryption

SafeNet DataSecure vs. Native Oracle Encryption SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises

More information

www.pwc.com ERM006 ERM and Business Continuity Management: Together at Last RIMS Annual Conference April 13, 2016

www.pwc.com ERM006 ERM and Business Continuity Management: Together at Last RIMS Annual Conference April 13, 2016 www.pwc.com ERM006 ERM and Business Continuity Management: Together at Last RIMS Annual Conference April 13, 2016 Your presenters Phil Samson Principal PricewaterhouseCoopers, Dallas Leads s Risk Management

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential

More information

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security

More information

Globalization Drives Market Need for Supply Chain Segmentation: Research & Key Strategies

Globalization Drives Market Need for Supply Chain Segmentation: Research & Key Strategies Globalization Drives Market Need for Supply Chain Segmentation: Research & Key Strategies Sponsored by: Conducted by: On behalf of: Introduction Businesses continue look to their supply chain operations

More information

University Audit and Compliance. Internal Controls Enterprise-Wide Risk Assessment

University Audit and Compliance. Internal Controls Enterprise-Wide Risk Assessment Internal Controls Enterprise-Wide Risk Assessment Balancing Risk and Controls In order to achieve goals and objectives, management needs to effectively balance risks and controls. Control procedures need

More information

Internal Controls and Risk Management Report

Internal Controls and Risk Management Report 42 Internal Controls and Risk Management Report Responsibility Our Board of Directors has the overall responsibility to ensure that sound and effective internal controls are maintained, while management

More information

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Industrial Cyber Security Risk Industrial Attacks Continue to Increase in Frequency & Sophistication Today, industrial organizations

More information

Know how much inventory is on hand. Inventory is money. Old and obsolete inventory can paralyze your business

Know how much inventory is on hand. Inventory is money. Old and obsolete inventory can paralyze your business WHITE PAPER Introduction Many small and medium-sized businesses are looking for smarter ways to operate in order to survive in this changing economy. After gaining control of your finances (generally with

More information

Outsourcing Corporate Tax Services

Outsourcing Corporate Tax Services Superior Strategies for Tax Compliance and Payment Payable Function Costly and Inefficient Why are companies increasingly outsourcing tax services that previously were handled by their own personnel? What

More information

What to look for if you need Advanced Inventory Management

What to look for if you need Advanced Inventory Management What to look for if you need Advanced Inventory Management Introduction Many small and medium-sized businesses are looking for smarter ways to operate in order to survive in this changing economy. After

More information

ENTERPRISE MANAGEMENT AND SUPPORT IN THE AUTOMOTIVE INDUSTRY

ENTERPRISE MANAGEMENT AND SUPPORT IN THE AUTOMOTIVE INDUSTRY ENTERPRISE MANAGEMENT AND SUPPORT IN THE AUTOMOTIVE INDUSTRY The Automotive Industry Businesses in the automotive industry face increasing pressures to improve efficiency, reduce costs, and quickly identify

More information

Advisory Services Application Services. The right choice.* Implementation starts with selection. *connectedthinking

Advisory Services Application Services. The right choice.* Implementation starts with selection. *connectedthinking Advisory Services Application Services The right choice.* Implementation starts with selection *connectedthinking Headline 2 The right choice.* Table of contents The heart of the matter 4 Making the right

More information

How To Save Money At The University Of California

How To Save Money At The University Of California THE UNIVERSITY OF CALIFORNIA ERM PROGRAM REDUCES THE COSTS OF RISK AND BORROWING BY JOHN BUGALLA AND KRISTINA NARVAEZ In December 2005, the University of California s Department of Risk Management was

More information

Management Update: The Eight Building Blocks of CRM

Management Update: The Eight Building Blocks of CRM IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful

More information

AdvAnced Business MAnAger The NexT GeNeraTioN of accounting software

AdvAnced Business MAnAger The NexT GeNeraTioN of accounting software Advanced Business Manager The Next Generation of accounting software Overview Advanced Business Manager (ABM) has been designed and developed by accountants to create the next generation of accounting

More information

Hand IN Hand: Balanced Scorecards

Hand IN Hand: Balanced Scorecards ANNUAL CONFERENCE T O P I C Risk Management WORKING Hand IN Hand: Balanced Scorecards AND Enterprise Risk Management B Y M ARK B EASLEY, CPA; A L C HEN; K AREN N UNEZ, CMA; AND L ORRAINE W RIGHT Recent

More information

Enterprise Risk Management

Enterprise Risk Management 2013 Government Accounting and Auditing Update Enterprise Risk Management Understanding and Implementing an ERM Framework Mike Sargent, Director- CliftonLarsonAllen May 2013 cliftonlarsonallen.com Discussion

More information

Bar Coding ROI in Mail Order Fulfillment and Distribution Centers APPLICATION WHITE PAPER

Bar Coding ROI in Mail Order Fulfillment and Distribution Centers APPLICATION WHITE PAPER Bar Coding ROI in Mail Order Fulfillment and Distribution Centers APPLICATION WHITE PAPER Copyrights 2005 ZebraLink and all product names and numbers including QL 420 are Zebra trademarks, and Zebra is

More information

Enhance Customer Service with Integrated Scale Management Software from SAP

Enhance Customer Service with Integrated Scale Management Software from SAP SAP Brief Extensions SAP Open Scale Management by GK Objectives Enhance Customer Service with Integrated Scale Management Software from SAP Use weight data to enhance item management Use weight data to

More information

RISK ADVISORY SERVICES. HYDRO UTILITIES Overview of Internal Audit & Control Services: 2014 Credentials

RISK ADVISORY SERVICES. HYDRO UTILITIES Overview of Internal Audit & Control Services: 2014 Credentials RISK ADVISORY SERVICES HYDRO UTILITIES Overview of Internal Audit & Control Services: 2014 Credentials THE INCREASED IMPORTANCE OF INTERNAL CONTROLS FOR HYDRO UTILITIES TO MEET THE OBJECTIVES OF FINANCIAL

More information

Clarius Group Risk Management Policy and Framework

Clarius Group Risk Management Policy and Framework 1. Introduction Clarius Group Risk Management Policy and Framework 1.1 Definition Risk is the chance of something happening that will have an impact on objectives. Risk provides the opportunity (upside)

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell. COBIT 5 for Risk CS 3-7: Monday, July 6 4:00-5:00 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected] Disclaimer of Use and Association Note: It is understood that

More information

Navigating the NIST Cybersecurity Framework

Navigating the NIST Cybersecurity Framework Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity

More information

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business. S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in

More information

Impact of New Internal Control Frameworks

Impact of New Internal Control Frameworks Impact of New Internal Control Frameworks Webcast: Tuesday, February 25, 2014 CPE Credit: 1 0 With You Today Bob Jacobson Principal, Risk Advisory Services Consulting Leader West Region [email protected]

More information

Effective Model Risk Management for Financial Institutions: The Six Critical Components

Effective Model Risk Management for Financial Institutions: The Six Critical Components January 2013 Effective Model Risk Management for Financial Institutions: The Six Critical Components A White Paper by Brookton N. Behm, John A. Epperson, and Arjun Kalra Audit Tax Advisory Risk Performance

More information

11 billion. reasons to say thank you to barcodes

11 billion. reasons to say thank you to barcodes YOU 11 billion reasons to say thank you to barcodes Copyright GS1 France - Fotolia, Istockphoto. Printed 09/11 INTRODUCTION On the importance of standards A standard represents an agreement that structures

More information

ENTERPRISE MANAGEMENT AND SUPPORT IN THE INDUSTRIAL MACHINERY AND COMPONENTS INDUSTRY

ENTERPRISE MANAGEMENT AND SUPPORT IN THE INDUSTRIAL MACHINERY AND COMPONENTS INDUSTRY ENTERPRISE MANAGEMENT AND SUPPORT IN THE INDUSTRIAL MACHINERY AND COMPONENTS INDUSTRY The Industrial Machinery and Components Industry Manufacturers in the industrial machinery and components (IM&C) industry

More information

Viega Supply Chain. The global leader in plumbing, heating and pipe joining systems

Viega Supply Chain. The global leader in plumbing, heating and pipe joining systems Viega Supply Chain The global leader in plumbing, heating and pipe joining systems A heritage of better ideas since 1899 Only the Viega Group offers a heritage of true innovation, from our humble beginning

More information

ISMS Implementation Guide

ISMS Implementation Guide atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation

More information

DRIVING B2B SALES IN THE AGE OF DIGITAL

DRIVING B2B SALES IN THE AGE OF DIGITAL DRIVING B2B SALES IN THE AGE OF DIGITAL DRIVING B2B SALES IN THE AGE OF DIGITAL WE RE ON THE CUSP OF A GENERATION SHIFT IN B2B PURCHASING. As Business-to-Business (B2B) buyers are exposed to innovative

More information

Third party assurance services

Third party assurance services TECHNOLOGY RISK SERVICES Third party assurance services Delivering assurance over your service providers The current third party service provider environment Corporate UK has been transformed in recent

More information

Driving Operations through Better, Faster Decision Making

Driving Operations through Better, Faster Decision Making Driving Operations through Better, Faster Decision Making Driving Operations through Better, Faster Decision Making Operations faces increasing pressure from all sides. Picky customers know that your competitors

More information

WHY ERP NO LONGER BELONGS IN THE BACK OFFICE IT S COMING OUT AND IT MEANS BUSINESS

WHY ERP NO LONGER BELONGS IN THE BACK OFFICE IT S COMING OUT AND IT MEANS BUSINESS WHY ERP NO LONGER BELONGS IN THE BACK OFFICE IT S COMING OUT AND IT MEANS BUSINESS CONTENTS I. HAVING DOUBLE VISION WITH ERP P1 II. THE TRADITIONAL ROLE OF ERP P2 III. A LACK OF CUSTOMER VISION P3 IV.

More information

THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK

THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK ACCOUNTABLE SIGNATURE AUTHORISED for implementation SIGNATURE On behalf of Chief Executive Officer SAHRA Council Date Date

More information

White Paper Advanced Inventory Control

White Paper Advanced Inventory Control White Paper Advanced Inventory Control Introduction If your business is similar to other small and medium-sized businesses, you are looking for smarter ways to run your company to survive in this changing

More information

BETTER SOFTWARE FOR BETTER BUSINESS. www.optosoftware.com.au

BETTER SOFTWARE FOR BETTER BUSINESS. www.optosoftware.com.au BETTER SOFTWARE FOR BETTER BUSINESS www.optosoftware.com.au WHAT IS OPTO SOFTWARE? Opto Software gives small and medium-sized manufacturers the power to streamline processes and manage production with

More information

The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005

The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005 The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program March 2005 Legal and Copyright Notice The Chemical Industry Data Exchange (CIDX) is a nonprofit corporation, incorporated in the

More information

Mapping the Technical Dependencies of Information Assets

Mapping the Technical Dependencies of Information Assets Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information

Enterprise risk management: A pragmatic, four-phase implementation plan

Enterprise risk management: A pragmatic, four-phase implementation plan Enterprise risk management: A pragmatic, four-phase implementation plan Prepared by: John Brackett, Managing Director, Risk Advisory Services, RSM McGladrey, Inc. 704.442.3820, [email protected]

More information

Four distribution strategies for extending ERP to boost business performance

Four distribution strategies for extending ERP to boost business performance Infor ERP Four distribution strategies for extending ERP to boost business performance How to evaluate your best options to fit today s market pressures Table of contents Executive summary... 3 Distribution

More information

8 Crucial Requirements for Supply Chain Optimization

8 Crucial Requirements for Supply Chain Optimization 8 Crucial Requirements for Supply Chain Optimization Introduction In today s world, businesses expect their trading partners to have full insight and control of their from end to end. For manufacturers

More information

Distributed Warehouse. Directing Your Warehouse Efficiency

Distributed Warehouse. Directing Your Warehouse Efficiency Distributed Warehouse Management System Directing Your Warehouse Efficiency Distributed Warehouse Management System If out of stock, you will lose sales. If you have too much stock, it can cost you money.

More information

Developing an Effective Enterprise Risk Management Program

Developing an Effective Enterprise Risk Management Program Developing an Effective Enterprise Risk Management Program Jay Brietz, CPA and CIA Senior Manager This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

Why is it so difficult to grow revenue, identify emerging customers and partners, and expand into new markets through the indirect sales channel?

Why is it so difficult to grow revenue, identify emerging customers and partners, and expand into new markets through the indirect sales channel? 1 Spring, 2012 Increase Revenues with Channel Sales Management www.channelinsight.com EXECUTIVE SUMMARY Why is it so difficult to grow revenue, identify emerging customers and partners, and expand into

More information

Practice Guide COORDINATING RISK MANAGEMENT AND ASSURANCE

Practice Guide COORDINATING RISK MANAGEMENT AND ASSURANCE Practice Guide COORDINATING RISK MANAGEMENT AND ASSURANCE March 2012 Table of Contents Executive Summary... 1 Introduction... 1 Risk Management and Assurance (Assurance Services)... 1 Assurance Framework...

More information

FULFILLING EXPECTATIONS: THE HEART OF OMNICHANNEL RETAILING

FULFILLING EXPECTATIONS: THE HEART OF OMNICHANNEL RETAILING FULFILLING EXPECTATIONS: THE HEART OF OMNICHANNEL RETAILING Creating the supply chain visibility, accuracy, control and flexibility retailers need to meet the demanding fulfillment expectations of the

More information

Internal Control Integrated Framework. May 2013

Internal Control Integrated Framework. May 2013 Internal Control Integrated Framework May 2013 0 Table of Contents COSO & Project Overview Internal Control-Integrated Framework Illustrative Documents Illustrative Tools for Assessing Effectiveness of

More information

Transform Audit Practices and Move Beyond Assurance

Transform Audit Practices and Move Beyond Assurance SAP Brief SAP s for Governance, Risk, and Compliance SAP Audit Management Objectives Transform Audit Practices and Move Beyond Assurance Advance along the technology curve Advance along the technology

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

RSA ARCHER AUDIT MANAGEMENT

RSA ARCHER AUDIT MANAGEMENT RSA ARCHER AUDIT MANAGEMENT Solution Overview INRODUCTION AT A GLANCE Align audit plans with your organization s risk profile and business objectives Manage audit planning, prioritization, staffing, procedures

More information

Risk Assessment & Enterprise Risk Management

Risk Assessment & Enterprise Risk Management Risk Assessment & Enterprise Risk 1 Healthcare Corporate Governance Today s environment requires building a culture of risk awareness and management of risk across the organization, while formulating less

More information

How To Transform It Risk Management

How To Transform It Risk Management The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help

More information

Warehouse Management System

Warehouse Management System Warehouse Management System POWERFUL AND EFFICIENT WAREHOUSE MANAGEMENT is designed to automate your materialshandling processes and increase productivity across your warehouse. PEAK PERFORMANCE Today,

More information

Sage ERP X3 What's new in Sage ERP X3 6.5?

Sage ERP X3 What's new in Sage ERP X3 6.5? Sage ERP X3 What's new in Sage ERP X3 6.5? Sage ERP X3 6.5 improves productivity, simplifies installation, and offers you new specialized features through cloud services. Enhancements include Electronic

More information

Enterprise Risk Management

Enterprise Risk Management Cayman Islands Society of Professional Accountants Enterprise Risk Management March 19, 2015 Dr. Sandra B. Richtermeyer, CPA, CMA What is Risk Management? Risk management is a process, effected by an entity's

More information

COSO 2013 Internal Control Framework

COSO 2013 Internal Control Framework COSO 2013 Internal Control A Guide to Implementation July 24, 2014 Justin Adamson Agenda COSO Background Changes to the Roadmap to Implementation Implementation Considerations & Lessons Learned 2 1 Who/What

More information

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.

More information

Understanding the impact of the connected revolution. Vodafone Power to you

Understanding the impact of the connected revolution. Vodafone Power to you Understanding the impact of the connected revolution Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends, understanding

More information

Tapping the benefits of business analytics and optimization

Tapping the benefits of business analytics and optimization IBM Sales and Distribution Chemicals and Petroleum White Paper Tapping the benefits of business analytics and optimization A rich source of intelligence for the chemicals and petroleum industries 2 Tapping

More information

ITIL Managing Digital Information Assets

ITIL Managing Digital Information Assets ITIL Managing Digital Information Assets Shirley Lacy, ConnectSphere Frieda Midgley, Digital Continuity Project Judith Riley, Digital Continuity Project Nigel Williamson, Digital Continuity Project White

More information

IT Insights. Managing Third Party Technology Risk

IT Insights. Managing Third Party Technology Risk IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate

More information

Ball Corporation. Situation. Ball Corporation strengthens global account management by using CRM in the cloud

Ball Corporation. Situation. Ball Corporation strengthens global account management by using CRM in the cloud Ball Corporation Ball Corporation strengthens global account management by using CRM in the cloud For more than 130 years, Ball Corporation has led its industry by providing innovative, valuable packaging

More information

How to build a great compliance program for your U.S. imports

How to build a great compliance program for your U.S. imports How to build a great compliance program for your U.S. imports For the importer of record, compliance means the complete and accurate recording of all internal processes through books and records, from

More information

Effective AML Model Risk Management for Financial Institutions: The Six Critical Components

Effective AML Model Risk Management for Financial Institutions: The Six Critical Components August 2012 Effective AML Model Risk Management for Financial Institutions: The Six Critical Components A White Paper by John A. Epperson, Arjun Kalra, and Brookton N. Behm Audit Tax Advisory Risk Performance

More information

The Business Case for Information Security. White Paper

The Business Case for Information Security. White Paper The Business Case for Information Security White Paper Version 1.0 Background Creating a compelling business case for information security can be a challenge. It s sometimes difficult to identify or articulate

More information