IT Governance and Control: An Analysis of CobIT 4.1. Prepared by: Mark Longo
|
|
|
- Constance James
- 9 years ago
- Views:
Transcription
1 IT Governance and Control: An Analysis of CobIT 4.1 Prepared by: Mark Longo December 15, 2008
2 Table of Contents Introduction Page 3 Project Scope Page 3 IT Governance.Page 3 CobIT Framework..Page 4 General Control Objectives Page 5 Application Control Objectives..Page 6 IT Domains and Control.Page 9 Plan and organize...page 9 Acquire and Implement.Page 11 Deliver and Support..Page 12 Monitor and Evaluate Page 14 Conclusion Page 15 2
3 Introduction The ever-increasing competitiveness of modern business creates the need to utilize information technology to create efficiencies within the company. Information systems and related business processes require effective risk management, which can be achieved through appropriate use of control within the organization. CobIT 4.1 is a widely used IT Governance framework that takes a broad based best practices approach to linking IT to business goals, recognizing key IT process risks, and introducing more accountability into business and IT processes. Project Scope This project will attempt to take a creative approach to learning about CobIT and its role inside an organization. I will use an imaginary retail store, known as Store XYZ, as a case study to create an original IT Framework based on CobIT 4.1. We will assume this imaginary Store XYZ is operated like a small business. This assumption will make the business model of the business much simpler, therefore, allowing me simplify the process of planning, implementing, and monitoring an IT Governance system. As I enter the public accounting profession in an Advisory role, I hope this project will provide me with a base to understanding larger/more complex clients. CobIT 4.1, provided by the IT Governance Institute website, is the only source used during the report. IT Governance According to CobIT 4.1, the purpose of IT governance is to ensure that an organization s Enterprise IT helps achieve organizational objectives. The figure below represents the key components of IT Governance: strategic alignment, value delivery, risk management, resource 3
4 management, and performance measurement. Ideally, an organization s IT Governance should create value and even improve financial performance. IT systems must be integrated with organizational objectives to effectively measure performance and provide value. All the while, IT provides appropriate levels of risk management and reliability. More specifically, Store XYZ can accomplish effective IT governance by creating control objectives to address the various risks that occur within business and IT processes. Controls must be created to mitigate the risks that threaten the organization s objective. Source: CobIT 4.1 CobIT 4.1 Framework The CobIT acronym stands for Control Objectives for Information and related Technology. CobIT is a framework whose goal is to achieve superior management and control of IT and provide a roadmap to ideal IT Governance. An organization should recognize business processes and associated IT processes, likely and material risks, and design mitigating controls using the guidance provided by CobIT. This report will analyze 6 General control objectives, 6 IT Application control objectives, and several other control objectives across the 4 CobIT-defined 4
5 domains of IT management: Plan and Organize, Acquire and Implement, Deliver and Support Monitor and Evaluate. General Control Objectives The CobIT 4.1 process has so-called generic control requirements that apply generally to all businesses. Listed below is a summary of the 6 control objectives (PC 1-6) from CobIT 4.1: PC1 Process Goals and Objectives PC1 involves designing SMARRT IT process objectives that are specific, measurable, actionable, realistic, results-oriented, and timely. Each business and IT process should be linked to the business strategy and monitored with metrics. PC2 Process Ownership PC2 suggests assigning owners to IT processes to clarify responsibilities and create accountability within the process, thus allowing employee performance to be more easily evaluated. In addition, PC2 emphasizes assigning clear expectations and responsibilities to process owners to avoid an expectation gap. PC3 Process Repeatability Process Repeatability refers to the reliability and consistency, yet flexibility needed in the design of IT processes. A reliable and flexible system will produce accurate results in times of stability and dynamism. 5
6 PC4 Roles and Responsibilities PC4 seeks to thoroughly define key business processes and associated activities. The responsibilities of process owners must be clear. PC5 Policy, Plans and Procedures PC5 defines and communicates how all policies, plans and procedures that drive an IT process are documented, reviewed, maintained, approved, stored, communicated and used for training. PC6 Process Performance Improvement In order to measure performance, a detailed set of metrics must be established. Targets should be set, and performance measured in this on-going task of improving processes. Application Control Objectives The purpose of Application Control Objectives is to provide guidance into managing data inputted into the system, the reliability of system reporting, and assuring the data provided is accurate. Data security, integrity, and validity are recurring themes. The following section provides 6 suggested Application Control Objectives and brief explanations as they may relate to Store XYZ. AC1 Source Data Preparation and Authorization The first step is controlling the quality of data and information that flows into the IT system. This includes ensuring that Store XYZ s source documents such as PO s, invoices, customer information, etc. is originated and validated by the appropriate employees, through an 6
7 established process, and with accurate information. A risk in this process is that source forms are improperly validated and authorized. A control that can help mitigate this would be adopting segregation of duties so that a system of checks and balances is put in place where employees are held accountable for monitoring each other. For example, every payment made to a vendor should have the signature of the process owner and another independent employee to verify the payment accuracy and other pertinent information. Duty segregation should help to reduce careless errors by standardizing the validation and entry process, and it helps to deter fraud or other misuses of power. It is worth noting that segregation of duties within a small organization, such as Store XYZ, is often difficult to achieve because of the small number of managers and employees. AC2 Source Data Collection and Entry AC2 builds off of AC1 but focuses more on timely data input by appropriate staff. The risk inherent in this process is that too many employees may have access to the system, in other words, Store XYZ s IT system lacks restricted access. For example, only a select group of employees should have the ability to enter in a PO or pay an invoice. The system should have a unique username and password for each employee, so that the actions of all employees can be monitored and accountability given. All transaction approvals, authorizations, and data changes should be restricted to management, and no employee should be granted access to information not related to their job function. 7
8 AC3 Accuracy, Completeness and Authenticity Checks AC3 maintains the goal of ensuring that transactions are accurate, complete and valid. In modern companies, most transactions occur digitally, and Store XYZ would make use of IT to facilitate transactions and financial statement preparation for public companies. AC4 Processing Integrity and Validity AC4 seeks to maintain the integrity of the data throughout the entire data processing cycle. This includes having adequate security and control in place to restrict system access and detect suspicious transactions. In order to ensure that order data is processed accurately, Store XYZ can sample a batch of transactions and follow each through the system to the ledger. The users should be able to identify the person who authorized the transaction, entered it, and if any changes were made to the entry. Another unique control is to program a product flow analysis into the procurement system, so that order amounts significantly different from a benchmark period can be red flagged. AC5 Output Review, Reconciliation and Error Handling This control objective establishes the importance of ensuring that output is handled in an authorized manner, delivered to the appropriate recipient, and protected during transmission; that verification, detection and correction of the accuracy of output occurs; and that information provided in the output is used. On a sample basis, the output data should be cross-checked with source documents to ensure that system output is restricted to key employees and that no un authorized changes to the information occur. 8
9 AC6 Transaction Authentication and Integrity AC6 protects data during transmission. It states that control objectives should help ensure that data transmitted within the company is sent to appropriate locations, and the end users can verify its validity via a stamp of approval. AC6 differs from AC5 because AC6 focuses on the transmission of data from internal applications to business and operations. IT Domains and Control An important first step in implementing adequate IT control is creating control objectives whose design ensures that business objectives are achieved and risks are mitigated within business and IT processes. This analysis is divided into four CobIT-defined domains: Plan and Organize, Acquire and Implement, Deliver and Support, and Monitor and Evaluate. Plan and Organize Within the Plan and Organize (PO) domain, there are 10 IT processes that relate to designing, implementing, maintaining, and monitoring IT projects. Within each of the 10 Plan and Organize processes are several control objectives. The list below summarizes the 10 IT processes: Plan and Organize Process Summary PO1 Define a Strategic IT Plan PO2 Define the Information Architecture PO3 Determine Technological Direction PO4 Define the IT Processes, Organization and Relationships PO6 Communicate Management Aims and Direction PO7 Manage IT Human Resources PO8 Manage Quality PO9 Assess and Manage IT Risks PO10 Manage Projects PO5 Manage the IT Investment 9
10 Of these 10 processes, I will discuss PO1: Defining a Strategic IT Plan in more detail in terms of Store XYZ. I will address specific control objectives, risks, and controls that process stakeholders can utilize. In order to solidify the linkage between IT resources and business objectives, Store XYZ must define a strategic plan and develop control objectives. Control objectives should focus on delivering value, aligning IT with the business, measuring and evaluating system design, and achieving efficient portfolio management. For example, Control Objective PO1.2 Business-IT Alignment provides guidelines by which a company can utilize control to align its IT and business objectives. For example, lets say that Store XYZ actively sought to achieve a certain inventory turnover rate as part of its core strategy. When determining if a solid link between this goal and IT exists, we must determine if the IT system provides employees the tools needed to meet the business objectives. For example, to align this business objective with IT, the system needs certain capabilities. Most importantly, a reliable method of tracking inventory shipments needs to be present and fully integrated with IT. From the warehouse to the checkout line, the barcode inventory accounting system must be reliable across all areas. Once Store XYZ has a reliable inventory accounting process, the inventory manager can monitor system metrics such as inventory turnover and obsolescence rates at the click of a button. However, whether PO s and invoices are sent/received from suppliers electronically or manually, the data needs to eventually be accessible in electronic format to efficiently analyze the data. By taking a systematic 10
11 approach to understanding how risk within the inventory process affects its goals, Store XYZ successfully aligned its IT capabilities and business strategy. Acquire and Implement Within the Acquire and Implement (AI) domain, there are 7 IT processes: AI1 Identify Automated Solutions AI2 Acquire and Maintain Application Software AI3 Acquire and Maintain Technology Infrastructure AI4 Enable Operation and Use AI5 Procure IT Resources AI6 Manage Changes AI7 Install and Accredit Solutions and Changes Of these 7 processes, I will discuss AI4: Enable Operation and Use, which is concerned with the process of training employees to use system applications and software. According to CobIT 4.1, an important control objective is ensuring knowledge transfer to end-users. Employees must have the appropriate knowledge and skills required to use the IT system to create value and utilize metrics to evaluate performance to achieve organizational objectives. The risks inherent in this process include: inadequate employee training, system complexity, employee skill, and performance measurement. To mitigate these risks, Store XYZ, for example, should provide one-on-one training. A larger company may decide to adopt a training program up to several days long and provide online courses and certification. The company should also create a detailed operators manual. The manual can discuss the core business and IT processes, 11
12 responsibilities of process owners, important metrics, and provide other detailed instructions on using the IT applications. To ensure employees understand the system, the company can administer an annual examination that is tailored to testing the knowledge of specific process owners. Perhaps most importantly is that the design of the software and applications needs to be user-friendly. Deliver and Support Within the Deliver and Support (DS) domain, there are 13 IT processes: Deliver and Support Process Summary DS1 Define and Manage Service Levels DS2 Manage Third-party Services DS3 Manage Performance and Capacity DS4 Ensure Continuous Service DS5 Ensure Systems Security DS6 Identify and Allocate Costs DS8 Manage Service Desk and Incidents DS9 Manage the Configuration DS10 Manage Problems DS11 Manage Data DS12 Manage the Physical Environment DS13 Manage Operations DS7 Educate and Train Users Managing Third-Party Services (DS2) is an important IT process that requires control planning. There are 4 CobIT-defined control objectives areas, of which I will discuss Supplier Risk Management. Supplier risk management is a broad concept that can be simplified into more specific control objectives. The chart below lists possible control objectives that can be achieved through IT within Store XYZ. For each control objective, I identified risks inherent in the process and mitigating controls that provide detective or preventive control. 12
13 Store XYZ Control Matrix Supplier Risk Management Control Objectives Risks Controls Supplier shipments are on time, accurate, and efficient Suppliers offer competitive prices on quality products Supplier contracts conform to legal and contract requirements (1) Incorrect shipments or late orders (1) Current supplier prices are higher than other suppliers (2) Product quality is poor (1) Product safety recalls (2) Supplier shipment/payment terms are in accordance with a legal contract (1) Note ALL supplier Incidences in the system. Review supplier Incidences regularly and discuss issues with supplier (1) Utilize historical system data to monitor changes in inventory costs and supplier fees. (2) Create a product return reporting process, whereby customer service enters product returns and defects into a database. Monitor quality alerts and involve supplier (1) Working with suppliers, create a formal method of reporting and communicating product recalls, and automatic/conditional shipment cancellation. (2) Analyze credit terms of supplier contracts. Review new supplier contracts align to financial reporting 13
14 Monitor and Evaluate Within the Monitor and Evaluate (ME) domain, there are 4 IT processes CobIT 4.1 defines: ME1 Monitor and Evaluate IT Performance ME2 Monitor and Evaluate Internal Control ME3 Ensure Compliance With External Requirements ME4 Provide IT Governance I will discuss ME2: Monitor and Evaluate Internal Control in more detail. In order to effectively monitor and evaluate internal IT controls, a substantial amount of control testing may be required. The purpose of control testing is to provide assurance that a company s internal control structure is reliable, secure, and well designed. For example, suppose Store XYZ creates the following control objectives to monitor and evaluate internal control quality: Store XYZ Control Matrix Evaluating Internal Control Quality Control Objective Risk Controls Security Changes to restricted access applications are approved by the appropriate personnel Control system design The design of internal controls are adequate and consistent with the company s objectives Financial Reporting Payment to suppliers are initiated and approved by appropriate personnel in accordance with segregation of duties principles Unauthorized individuals obtain access to proprietary information Internal controls lack coherence and do not facilitate objective achievement An employee is able to initiate, approve, and record transactions Additions and changes to user access are approved by IT security personnel and upper management. An annual review of internal controls and adherence to CobIT and COSO principles Transaction source documents are reviewed for appropriate approval. IT system recognizes inappropriate user power and creates and formal Incident inquiry 14
15 Conclusion In conclusion, this report analyzes CobIT 4.1 and how its guidance helps create an ideal control structure within a business. I analyzed control objectives, risks, and mitigating controls across 4 IT domains: Plan and Organize, Acquire and Implement, Deliver and Support, and Monitor and Evaluate. I felt that this project was worthwhile and provided valuable insight into IT systems and control. 15
Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010
Dallas IIA Chapter / ISACA N. Texas Chapter Auditing Tuesday, October Project 20, 2009 Management Controls January 7, 2010 Table of Contents Contents Page # Project Management Office Overview 3 Aligning
Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister
Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
Corporate Property Automated Information System CPAIS. Privacy Impact Assessment
Corporate Property Automated Information System CPAIS Privacy Impact Assessment May 2003 CONTENTS Background...3 Access to the Data...5 Maintenance of Administrative Controls...9 1 Introduction The Office
Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement
Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.
IT Governance. What is it and how to audit it. 21 April 2009
What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Information Technology Auditing for Non-IT Specialist
Information Technology Auditing for Non-IT Specialist IIA Pittsburgh Chapter October 4, 2010 Agenda Introductions What are General Computer Controls? Auditing IT processes controls Understanding and evaluating
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation Market Offering: Package(s): Oracle Authors: Rick Olson, Luke Tay Date: January 13, 2012 Contents Executive summary
Effectively Assessing IT General Controls
Effectively Assessing IT General Controls Tommie Singleton UAB AGENDA Introduction Five Categories of ITGC Control Environment/ELC Change Management Logical Access Controls Backup/Recovery Third-Party
2009 Solvay Brussels School and IT Governance institute
IT Governance Masterclass Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA International VP, IT Governance Institute Professor, Solvay Business School Managing Partner, ICT Control NV 1 Georges Ataya
Internal Control Deliverables. For. System Development Projects
DIVISION OF AUDIT SERVICES Internal Control Deliverables For System Development Projects Table of Contents Introduction... 3 Process Flow... 3 Controls Objectives... 4 Environmental and General IT Controls...
P-Card Fraud Controls. Introduction
Introduction According to 2013 Association of Financial Professionals (AFP) Payments Fraud and Survey, the second most targeted payment type for fraud was corporate/commercial purchasing cards. 29% of
A CobiT Case Study. Drawing on CobiT for the implementation of an Enterprise Risk Management Framework. December 2008
A CobiT Case Study Drawing on CobiT for the implementation of an Enterprise Risk Management Framework December 2008 Presenter: Clive E. Waugh, CISSP C/EH 1 Risk Management Framework Objectives CobiT provided
Life Cycle Models, CMMI, Lean, Six Sigma Why use them?
Life Cycle Models, CMMI, Lean, Six Sigma Why use them? John Walz IEEE Computer Society, VP for Standards QuEST Forum Best Practices Conference Track 3 What, Where, How & Why Monday, 24-Sep-07, 4:30 5:30
Auditing Applications. ISACA Seminar: February 10, 2012
Auditing Applications ISACA Seminar: February 10, 2012 Planning Objectives Mapping Controls Functionality Tests Complications Financial Assertions Tools Reporting AGENDA 2 PLANNING Consideration / understanding
TOGAF TOGAF & Major IT Frameworks, Architecting the Family
Fall 08 TOGAF TOGAF & Major IT Frameworks, Architecting the Family Date: February 2013 Prepared by: Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. TOGAF
Combine ITIL and COBIT to Meet Business Challenges
Combine ITIL and COBIT to Meet Business Challenges By Peter Hill, Director, IT Governance Network, and Ken Turbitt, Best Practices Director, BMC Software BEST PRACTICES WHITE PAPER Table of Contents ABSTRACT...
HP Service Manager. Process Designer Content Pack 9.30.1. Processes and Best Practices Guide
HP Service Manager Process Designer Content Pack 9.30.1 Processes and Best Practices Guide Document Release Date: June, 2012 Software Release Date: June, 2012 1 Legal Notices Warranty The only warranties
ITIL v3 Service Manager Bridge
ITIL v3 Service Manager Bridge Course Length: 5 Days Course Overview This 5 day hands on, certification training program enables ITIL Version 2 certified Service Managers to upgrade their Service Manager
Best Practices for Planning and Budgeting. A white paper prepared by PROPHIX Software October 2006
A white paper prepared by PROPHIX Software October 2006 Executive Summary The continual changes in the business climate constantly challenge companies to find more effective business practices. However,
U.S. Department of the Treasury. Treasury IT Performance Measures Guide
U.S. Department of the Treasury Treasury IT Performance Measures Guide Office of the Chief Information Officer (OCIO) Enterprise Architecture Program June 2007 Revision History June 13, 2007 (Version 1.1)
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM
GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups
TOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy
TOGAF TOGAF & Major IT Frameworks, Architecting the Family by Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. Copyright 2013 ITpreneurs. All rights reserved.
Best practices for planning and budgeting. A white paper prepared by Prophix
A white paper prepared by Prophix Executive summary The continual changes in the business climate constantly challenge companies to find more effective business practices. However, common budgeting limitations
Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:
Beyond Sarbanes-Oxley: Using compliance requirements to boost business performance The business regulatory environment in the United States has changed. Public companies have new obligations to report
COBIT 4.1 TABLE OF CONTENTS
COBIT 4.1 TABLE OF CONTENTS Executive Overview....................................................................... 5 COBIT Framework.........................................................................
Office of the City Auditor. Audit Report. AUDIT OF ACCOUNTS PAYABLE APPLICATION CONTROLS (Report No. A10-003) October 2, 2009.
CITY OF DALLAS Dallas City Council Office of the City Auditor Audit Report Mayor Tom Leppert Mayor Pro Tem Dwaine Caraway Deputy Mayor Pro Tem Pauline Medrano Council Members Jerry R. Allen Tennell Atkins
PERFORMANCE MEASUREMENT TOOLS IN BUSINESS PROCESS MANAGEMENT A CONTEMPORARY APPROACH
PERFORMANCE MEASUREMENT TOOLS IN BUSINESS PROCESS MANAGEMENT A CONTEMPORARY APPROACH Associate Professor PhD. VERONICA ADRIANA POPESCU 1, Professor PhD. GHEORGHE N. POPESCU 2, Lecturer PhD. Cristina Raluca
Service Level Management
Process Guide Service Level Management Company ABC Service Improvement Program (SIP) Process Guide Service Level Management Table of Contents Document Information... 3 Approval... 4 Section 1: Process
Best Practices for Implementing Software Asset Management
Best Practices for Implementing Software Asset Management Table of Contents I. The Case for Software Asset Management (SAM)............................ 2 II. Laying the Groundwork for SAM............................................
Internal Controls, Fraud Detection and ERP
Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility
OVERVIEW DATA SHEET. MedAct Overview Data Sheet
MedAct Overview Data Sheet MedAct delivers an integrated solution for your HME/DMEPOS that provides end-to-end coverage of all your business needs. From patient intake and purchasing to inventory management,
PROJECT CHARTER GUIDE
Treasury Board of Canada Secretariat Secrétariat du Conseil du Trésor du Canada Enhanced Management Framework for Information Technology PROJECT CHARTER GUIDE February 1999 Chief Information Officer Branch
Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014
Electronic Audit Evidence (EAE) and Application Controls Tulsa ISACA Chapter December 11, 2014 Agenda Recent IT-related PCAOB inspection themes: Internal control over financial reporting Multi-location
Using QUalysgUard to Meet sox CoMplianCe & it Control objectives
WHITE PAPER Using QualysGuard to Meet SOX Compliance & IT Objectives Using QualysGuard To Meet SOX Compliance and IT Objectives page 2 CobIT 4.0 is a significant improvement on the third release, making
Leverage T echnology: Move Your Business Forward
Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright. Fulcrum Information Technology, Inc. Is Oracle ERP in Scope for 2014 Audit Plan? Learn,
TOPIC NO 30515 TOPIC Supplies and Materials Inventory Table of Contents Overview...2 Policy...4 Procedures...8 Internal Control...
Table of Contents Overview...2 Introduction...2 Effective management system...3 Maintenance versus value...3 Cost reduction...3 Policy...4 Inventory records...4 Considerations for agencies with large inventories...7
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND
SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND CONTENTS INTRODUCTION 3 EFFECTIVELY MANAGE THE SCOPE OF YOUR IMPLEMENTATION
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
1 5 9 5 8 N a t i o n a l F u n e r a l D i r e c t o r s A s s o c i a t i o n 2 0 0 8
S A M P L E I D E N T I T Y T H E F T P R E V E N T I O N P R O G R A M F O R F U N E R A L H O M E S 1. I n t r o d u c t i o n : I f y o u r f u n e r a l h o m e u n d e r t a k e s a n y o f t h e
ITIL V3 Sample Questions Page 1 of 15 Sample ITIL version 3 Foundation Examination. Instructions
Page 1 of 15 Sample ITIL version 3 Foundation Examination Instructions 40 questions should be attempted. There are no trick questions. You have 60 minutes to complete this paper. Candidates sitting the
MSD Supply Chain Programme Strategy Workshop
MSD Supply Chain Programme Strategy Workshop Day 2 APPENDIX Accenture Development Partnerships Benchmarking MSD s Current Operating Supply Chain Capability 1.0 Planning 2.0 Procurement 3.0 Delivery 4.0
Tel. 202.332.3566 Fax 202.332.3672 www.martinwallcpa.com MANAGEMENT LETTER
Tel. 202.332.3566 Fax 202.332.3672 www.martinwallcpa.com MANAGEMENT LETTER In planning and performing our audit of the financial statements of the U.S. Nuclear Waste Technical Review Board (NWTRB) for
Introduction to ITIL for Project Managers
CSC NORTH AMERICAN PUBLIC SECTOR Introduction to ITIL for Project Managers May Chantilly Luncheon Linda Budiman, PMP ITILv2 & ITILv3 Process Architect ITIL Service Manager, CobiT certified 5/13/2008 8:08:45
The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act*
The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act* July 2004 *connectedthinking The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act Introduction
Applying Business Architecture to the Cloud
Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support
Upgrade. Figure 1: Asset Lifecycle
Managing IT Assets Phillip J. Windley, Ph.D. Chief Information Officer Office of the Governor State of Utah Organizations usually have an inventory control function that is designed to track large capital
Establishing a Mature Identity and Access Management Program for a Financial Services Provider
Customer Success Stories TEKsystems Global Services Establishing a Mature Identity and Access Management Program for a Financial Services Provider FINANCIAL SERVICES NETWORK INFRASTRUCTURE SERVICES INFORMATION
Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
ICTEC. IT Services Issues 3.4.2008. HELSINKI UNIVERSITY OF TECHNOLOGY 2007 Kari Hiekkanen
ICTEC IT Services Issues 3.4.2008 IT Services? IT Services include (for example) Consulting, IT Strategy, IT Architecture, Process, Software Software development, deployment, maintenance, operation, Custom
Practical Guidance for Auditing IT General Controls. September 2, 2009
Practical Guidance for Auditing IT General Controls Chase Whitaker, CPA, CIA September 2, 2009 About Hospital Corporation of America $28B annual revenue $24B total assets $4.6B EBDITA $673M Net Income
Accounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
Risks in ERP implementation
Risks in ERP implementation ERP A high-end solution featuring integration of information technology and business application. Seeks to streamline and integrate operational processes and information flows
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
Generic Business Process (1) Expenditure Cycle & Revenue Cycle
Generic Business Process (1) Expenditure Cycle & Revenue Cycle Topik Bahasan Expenditure Cycle Revenue Cycle Sumber Materi Romney / Steinbart, Accounting Information Systems, 9th Edition ch.11-12, Prentice
SACM and CMDB Strategy and Roadmap. David Lowe ActionableITSM.com March 20, 2012
SACM and CMDB Strategy and Roadmap David Lowe ActionableITSM.com March 20, 2012 Disclaimer The strategy and roadmap information presented here is generic by nature and based on a highly hypothetical use
SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures?
SOLUTION BRIEF: CA IT ASSET MANAGER How can I reduce IT asset costs to address my organization s budget pressures? CA IT Asset Manager helps you optimize your IT investments and avoid overspending by enabling
Accounting Information Systems, 4th. Ed. CHAPTER 4 THE REVENUE CYCLE
Accounting Information Systems, th. Ed. CHAPTER THE REVENUE CYCLE The revenue cycle is the set of activities in a business which brings about the exchange of goods or services with customers for cash.
4 Testing General and Automated Controls
4 Testing General and Automated Controls Learning Objectives To understand the reasons for testing; To have an idea about Audit Planning and Testing; To discuss testing critical control points; To learn
Standard CIP 007 3 Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for securing
SAMPLE NPO Fiscal Policies & Procedures
SAMPLE NPO NOTE: The most important part of developing policies and procedures is that they are discussed and agreed upon within the organization. This template is designed to be used in conjunction with
IT Asset Management. ProPath. Office of Information and Technology
IT Asset Management ProPath Office of Information and Technology Table of Contents IT Asset Management Process Maps... 1 Process: IT Asset Management... 19 IT Asset Management and Goals... 22... 22 Goals...
Accounts Payable User Manual
Accounts Payable User Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia Notice of Authorship
Office of Contracting & Procurement and Support Service Center Desk Reference
Oracle PeopleSoft Enterprise I m in. DETROIT PUBLIC SCHOOLS Office of Contracting & Procurement and Support Service Center Desk Reference Created by the Division of Finance Office of Strategic Management
MNLARS Project Audit Checklist
Audit Checklist The following provides a detailed checklist to assist the audit team in reviewing the health of a project. Relevance (at this time) How relevant is this attribute to this project or audit?
NSSC Enterprise Service Desk Configuration Management Database (CMDB) Configuration Management Service Delivery Guide
National Aeronautics and Space Administration NASA Shared Services Center Stennis Space Center, MS 39529-6000 www.nssc.nasa.gov NASA Shared Services Center Version 1.0 NSSC Enterprise Service Desk Configuration
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative. Improving State Operations: Kentucky
2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative Improving State Operations: Kentucky Kevin Moore 6/1/2011 Executive Summary: Accounts Payable was a time consuming, inefficient
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Exhibit F. VA-130620-CAI - Staff Aug Job Titles and Descriptions Effective 2015
Applications... 3 1. Programmer Analyst... 3 2. Programmer... 5 3. Software Test Analyst... 6 4. Technical Writer... 9 5. Business Analyst... 10 6. System Analyst... 12 7. Software Solutions Architect...
Knowledge Management Series. Internal Audit in ERP Environment
Knowledge Management Series Internal Audit in ERP Environment G BALU ASSOCIATES Knowledge Management Series ISSUE-5 ; VOL 1 Internal Audit in ERP Environment APRIL/2012 Editorial Greetings..!!! Raja Gopalan.B
Attachment Y SaaS ITSM Demonstration and Scenarios
Attachment Y SaaS ITSM Demonstration and Scenarios Demonstration and Oral Presentation Agenda In accordance with Section 1.16 of the RFP, each Presenter will be provided a 3 hour time period to discuss
Information Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
At the Heart of Connected Manufacturing
www.niit-tech.com At the Heart of Connected Manufacturing Transforming Manufacturing Operations to Drive Agility and Profitability The success of the new manufacturing network hinges on the agility of
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
Cisco Network Optimization Service
Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings
Audit of IT Asset Management Report
Audit of IT Asset Management Report Recommended by the Departmental Audit Committee for approval by the President on Approved by the President on September 4, 2012 e-doc : 3854899 1 Table of Contents EXECUTIVE
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Department of Legislative Services Office of Legislative Audits. Maryland Insurance Administration
Maryland Insurance Administration Report Dated November 20, 2014 Audit Overview MIA licenses and regulates insurers, insurance agents and brokers who conduct business in the State, and monitors the financial
Appendix D to DIR Contract No. DIR-SDD-2102. SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for <DIR CUSTOMER> END USER SERVICES
Appendix D to DIR Contract No. DIR-SDD-2102 SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for END USER SERVICES TABLE OF CONTENTS 1. Introduction... 3 2. Term of SOW...
Which statement about Emergency Change Advisory Board (ECAB) is CORRECT?
ITIL Foundation mock exam 4 1. Which of the following is NOT a purpose of Service Transition? A) To ensure that a service can be managed, operated and supported B) To provide training and certification
The Importance of IT Controls to Sarbanes-Oxley Compliance
Hosted by Deloitte, PricewaterhouseCoopers and ISACA/ITGI The Importance of IT Controls to Sarbanes-Oxley Compliance 15 December 2003 1 Presenters Chris Fox, CA Sr. Manager, Internal Audit Services PricewaterhouseCoopers
:: IT SERVICES. Greater Visibility Through SAP Solution Manager Business Process Operations Dashboards
:: IT SERVICES Greater Visibility Through SAP Solution Manager Business Process Operations Dashboards :: IT SERVICES Visible or Invisible? Why do we need to monitor our critical business processes and
ITRM Guideline CPM 110-01 Date: January 23, 2006 SECTION 4 - PROJECT EXECUTION AND CONTROL PHASE
PROJECT MANAGEMENT GUIDELINE SECTION 4 - PROJECT EXECUTION AND CONTROL PHASE Table of Contents Introduction... 3 Project Execution and Control Phase Overview... 3 Activities and Documents in the Execution
Anatomy of an Enterprise Software Delivery Project
Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific
Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3
Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Outline What is IT Service Management What is ISO 20000 Step by step implementation
MCPHS IDENTITY THEFT POLICY
SECTION 1: BACKGROUND MCPHS IDENTITY THEFT POLICY The risk to the College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only
IT Financial Management and Cost Recovery
WHITE PAPER November 2010 IT Financial Management and Cost Recovery Patricia Genetin Sr. Principal Consultant/CA Technical Sales David Messineo Sr. Services Architect/CA Services Table of Contents Executive
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
