Internal Audit s Role in Cloud Computing
|
|
|
- Hugo Lang
- 10 years ago
- Views:
Transcription
1 Internal Audit s Role in Cloud Computing
2 Introduction There are numerous risk factors that must be managed to ensure the availability of a public, private, hybrid or community cloud solution. Cloud computing has transformed the way businesses approach the consumption and delivery of IT services. It is a form of standardised IT-based capability such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) or Software as a Service (SaaS) offered by a service provider (e.g., public cloud) and intended to provide end-user access via the Internet from any computer. It is in theory, at least always available, can dynamically scale to adjust to demand, has web- or programmatic-based control interfaces, and enables full customer self-service. As this white paper discusses, there are numerous risk factors that must be managed to ensure the availability of a public, private, hybrid or community cloud solution. With cloud computing, applications and data are available to an organisation s user base, wherever and whenever users choose to connect. This means the business does not have to maintain the hardware and software required to deliver those services or provide all the support to keep those infrastructure components updated, secure and available. Other potential benefits to organisations that embrace the cloud computing model are 1 : Decoupling and separating the business service from the infrastructure needed to run it (i.e., virtualisation) Flexibility to choose multiple vendors that provide reliable and scalable business services, development environments and infrastructure that can be leveraged out of the box and billed on a metered basis with the potential for no long-term contracts Elastic nature of the infrastructure to rapidly allocate and de-allocate massively scalable resources to business services on a demand basis Cost-allocation flexibility for businesses using the cloud that want to move capital expenditures into operating expenses Reduced costs due to operational efficiencies More rapid deployment of new business services Operational risk reduction, if availability of services and operations are adequately protected within a contract 1 Introduction to Cloud Computing Architecture, Sun Microsystems Inc., June 2009, available for download at: 1
3 The Potential Risks of Cloud Computing The use of cloud computing does pose risks to the enterprise; but if key risks to the business are understood and planned for from the outset, they can be managed. Before moving to the cloud, companies should assess the following: Privileged user access How will the provider control access to our data? How can we be assured they will not abuse that access? Regulatory compliance Our business must adhere to regulatory requirements. How will we know if the provider is complying with those requirements? Data location and ownership Once our data is in the cloud, where exactly will it reside? Is the provider s data center located in a jurisdiction in which we don t currently operate? Do we understand the requirements of that jurisdiction? Do we have contracts with any customers that prohibit our company from storing data in certain jurisdictions? If there is a problem, or a legal matter, what rights do we have to the data? Data segregation If the same servers are used to store data from multiple customers, how will the provider ensure other customers cannot see our data and that we will not see theirs? Can other people access and change our data once it is in the cloud? Recovery Can the cloud go offline? If so, who is responsible for getting it back online? How quickly can that be done? What happens while we are waiting? Could our data be lost in the process? Do recovery capabilities support our obligations to stakeholders and/or customers? Investigative support What happens if we receive a legal hold notice? Will the cloud service provider help us secure the data? How do we know legal holds will be properly processed? What about other types of investigations? Long-term viability If our cloud service provider goes out of business, how do we get our data back? If our provider is a startup, do they have the long-term funding and business model to serve us? And if we are fully leveraging the cloud (SaaS, PaaS and IaaS), do we even have the capability to get the data back? How would we restore our data and applications if we did get it back? IT general controls Will our cloud environment be supported by fundamental IT general controls? How do we know the environment is secure? What is our provider doing to protect us from third parties hacking into our data? Can we perform periodic audits of the vendor s environment? What if we need to perform testing to support Sarbanes-Oxley or other regulatory requirements? Unknown cloud services Do we know all the cloud services already in use in our organisation? (Forty-four percent of European and fifty-five percent of U.S. respondents do not, according to a 2010 Security of Cloud Computing Users study by Ponemon Institute. 2 ) Due to increasing consumerisation (employees introducing and adopting technology in the enterprise) of cloud services, business units already may be using these services without IT s knowledge or any thought of data security. 2 Security of Cloud Computing Users: A Study of Practitioners in the U.S. and Europe, Ponemon Institute LLC, May 2010, available for download at: 2
4 Internal audit is well positioned through its role as an assurance function of the organisation to help management and the board identify and consider the key risks of leveraging cloud computing technology. Internal Audit s Role in the Cloud Computing Decision The risks outlined above are generally applicable throughout the cloud computing life cycle, whether an organisation is thinking about moving to the cloud, is in the process of implementing a cloud-based solution, or is already working in a cloud environment. (Some companies may be in various stages of all three.) Regardless of which stage your company is in, internal audit is well positioned through its role as an assurance function of the organisation to help management and the board identify and consider the key risks of leveraging cloud computing technology. Internal audit also can help the business determine whether those risks are being appropriately mitigated. Defining a Cloud Strategy Internal audit should engage company management to determine if a cloud computing strategy has been defined and communicated. If not, internal audit may be able to assist management in this process by helping to address the following questions: What is the business case for moving to the cloud? Organisations need a true understanding of the value they seek to gain by moving to the cloud, and determine if they can fully mitigate or accept the risks associated with working in this environment. Consider the following: Does your organisation have a complex application infrastructure? Are your applications no longer supported by the vendor or reliant upon legacy systems? If so, cloud vendors may not be able to support these applications or the servers on which they run. However, if your business looks to become increasingly scalable and efficient while reducing costs, a cloud hosting solution may be appropriate. Would this decision align with business needs? Before migrating to a cloud environment, companies should determine if such a move would align with their overall business strategy and objectives. Are your IT assets aging or reaching the point of retirement? Is there a strategy in place to reduce the cost of IT assets? If your organisation is looking for ways to decrease operational or labor costs, the business may be able to realise some cost benefits by selecting a cloud solution. Do we understand the current state of systems and data to be moved to the cloud? It is important to understand what exactly is being moved to the cloud. Would your company be moving sensitive and/or critical data? Will the business be able to continue complying with data retention requirements? Are there other applications or infrastructure that will have to be re-architected from a communications standpoint? Is your transaction volume going to exceed your (or the provider s) available bandwidth? Evaluating Vendors After weighing the potential benefits and risks of moving to the cloud computing model, the next step is to select the right vendor. Companies are often tempted to leverage the first cloud vendor they identify, or opt for the most popular provider. However, as is the case with any vendor relationship, many risks merit attention to help ensure your organisation s specific risks and controls are addressed. When evaluating potential cloud providers, companies should consider the following questions: Who will manage the vendor relationship? Companies that use third-party cloud providers should determine who will act as the liaison between the company and the vendor. This will help to ensure there are clear lines of communication between your company and the vendor s legal department, IT organisations and account managers. 3
5 How are assets protected? Information is arguably an organisation s most valuable asset as well as a potential liability. Cloud vendors should be able to describe the internal data security controls in place to protect data from intellectual property to customer information to internal bank account numbers. Your company should understand how the vendor manages its own security both physical security and logical security (e.g., access rights, user identification) by requesting security policies, vulnerability and penetration test results, and attestations on internal control environments. SSAE 16s (new industry standard that replaces the legacy SAS 70) and reports on compliance often provide insight into the vendor s control environment and any considerations a prospective client might need to address. Where SSAE 16s or other assessment reports are not available, it is still important to determine how you will obtain assurance that the vendor s security practices meet your business needs. How is responsibility divided? Your company needs a clear understanding of which party is operationally responsible for data stored in the cloud. Determine up front who is responsible for monitoring and controlling the servers, applications and data hosted in the cloud. Monitoring activities may include measuring bandwidth, monitoring server performance, applying patches and updates, managing network infrastructure, monitoring backups and providing intrusion detection services. Also, determine who is financially and legally responsible for the data, security and uptime. How will moving to the cloud impact disaster recovery planning? Disaster preparedness is growing in priority and significance for businesses of all types. One benefit of a cloud computing model is that many providers guarantee defined uptime and failover capabilities as a component of their business model and signed contract. Your company should request the prospective vendor s business continuity and disaster recovery plans and determine if they align with your business needs and recovery objectives. How does the vendor manage multiple tenants? In the cloud, your data may be stored on the same physical machine with other clients data. Your company should know what controls are in place to logically and even physically (whether on separate devices, sectioned off in separate cages or in completely separate bays) separate your data from other clients data. How would this change the technology environment? Implementing a cloud solution may change your organisation s technology environment, including network topology, interaction between systems and the flow of data. It is necessary for your company to understand which data sits on and flows between which devices. Also, determine who owns each of those components and who is responsible for governing the environment in each step along the way. Where is data physically stored? Cloud hosting providers can host data in a variety of locations, and your company should understand where your data will reside. If the vendor hosts data internationally, this may impose additional regulatory, international and ownership risks, depending on the country in which the vendor maintains its servers. How do the company s risks and controls align with the prospective vendor s? By performing a gap analysis, your company will be able to determine if there are any control or process gaps in place, which may expose your organisation to additional risks. Reports on compliance, SSAE 16s or other assessment reports from the vendor can provide additional insight into known deficiencies, operational risks and user control considerations. Implementing a Cloud Computing Model Once due diligence activities are complete, and a cloud service provider that aligns with the company s strategy, objectives and control framework has been selected, internal audit may shift to evaluating the implementation process. Internal audit can be integral in determining whether the level of planning was adequate to reduce project risk, while also providing independent feedback about the migration process. 4
6 Internal audit should evaluate implementation activities for adherence to the company s system development life cycle, project management and change management methodologies. Where deviations from these internal policies, processes and methodologies are required, it should be confirmed that all updates follow expected approval procedures. In addition to ensuring that fundamental cloud computing risk areas have been identified, this evaluation may provide an opportunity for internal audit to help assess the effectiveness of mitigation strategies/controls prior to implementing a cloud computing model. Questions the business should consider when implementing a cloud computing model include: What are the service level and operating level agreements (SLAs and OLAs)? While SLAs and OLAs are important for services hosted internally, these agreements have additional significance when the service is hosted in the cloud. With this objective measurement, there is a defined expectation of the level of service being provided. When the SLAs and OLAs were drafted, was the business involved in the decision-making process, or did IT unilaterally decide what was acceptable? Are there any legal, regulatory or contractual compliance requirements that must be taken into account? As the amount of permitted downtime (or other measure) decreases, the cost to the provider and presumably, the customer increases. What are our (and our cloud provider s) compliance responsibilities? There are many legal (e.g., legal hold, e-discovery), regulatory (e.g., Payment Card Industry Data Security Standard, Health Insurance Portability and Accountability Act, Gramm-Leach-Bliley Act, the European Union s Data Protection Directive, UK Data Protection Act, FSA Data Security Guidelines), and contractual compliance requirements that organisations need to consider when moving to the cloud. Outsourcing the hosting of a service to a third party does not change these requirements, which should be incorporated into the contract to provide a solid base for establishing necessary controls. How does the vendor prove compliance with relevant regulatory requirements? How will customers be notified of a security breach? How are incidents managed? What is the process for identifying and escalating an issue (e.g., a data breach) in a timely and efficient manner? Are you responsible for initiating contact with the vendor, or does the service provider have proactive monitoring in place so that it knows when something goes wrong? Establishing these basic processes and understanding escalation procedures and expected time to resolution are important. Who determines user access rights to data? Depending on the type of service purchased, user provisioning may be automated or manual. If it is a manual process, it may be executed by the organisation, the provider or both. Developing and defining a process for all situations, including end users and administrators, is important so that expectations are universally understood. While the process may not be identical to that of your organisation s internally hosted services, the same core principles should exist. How often is data backed up? Who is responsible for that process? Depending on the responsibilities defined between your organisation and the cloud vendor, backup and recovery processes that formally assign responsibility for monitoring backups; identifying, resolving and escalating errors and failures; and rotating data and media to a separate location for recovery purposes should be defined. If a daily backup routine fails, what happens? How will we inform and train end users? As with any significant change to an IT environment, end-user training is critical for ensuring process owners and other users in the organisation have adequate knowledge of newly defined processes and fully understand their roles in helping the business to meet data security and compliance expectations. 5
7 it is the responsibility of the chief audit executive to understand the security risks facing the organisation, and to work as a conduit to ensure the audit committee understands the risks and how well management is mitigating them. Monitoring the Vendor Once your company integrates the planned systems and data into a cloud environment, internal audit may evaluate whether the defined owner is adequately monitoring and controlling the vendor relationship. By this time, the organisation should be formally monitoring and reporting on the agreed-upon service levels, while investigating and resolving any variances. As a component of monitoring activities, your company should routinely review any documentation provided by the vendor relating to internal control assessments (whether from SSAE 16s, vulnerability scans or penetration tests). Additionally, internal audit should routinely evaluate regulatory requirements and determine if they are being addressed adequately by the cloud vendor and the company. In monitoring the cloud vendor relationship, the following should be confirmed: How the company s relationship with the vendor is managed A single person (i.e., relationship manager) should be identified as the primary point of contact with the cloud provider. That person (and any necessary backups) should regularly communicate with a counterpart at the provider. This existing relationship should be used to address issues that arise with the service (e.g., the breach of an SLA or OLA) and to reach resolution. Who is confirming the accuracy of invoices Prior to being paid, invoices should be reviewed to confirm pricing terms are consistent with the contract and the quantity of services being billed is accurate. Independent reports should be obtained to confirm the accuracy of any quantity on the invoice. Whether SLAs and/or OLAs are being monitored and reviewed Where SLAs and OLAs have been agreed to, they should be recalculated to confirm that the values provided by the cloud vendor are accurate. Additionally, penalties or incentives obtained due to SLA/OLA deviations should be recalculated to confirm the accuracy of the resulting payments and/or credits. How contractual control requirements (e.g., regulatory, security, privacy) are being monitored Contractual control requirements should be evaluated using the means made available through the contract, including right to audit, assessment reports (e.g., SSAE 16s, reports on compliance) and other evaluations. These methods should be used as frequently as possible, based on the terms of the contract, and the evaluation should be documented. Conclusion Cloud computing will continue to transform the way organisations manage IT increasing efficiencies while reducing costs but there are risks. Proactively identifying and understanding relevant risks before signing a contract and committing to a cloud hosting implementation is essential for success and for ensuring both data security and adherence to compliance demands. Organisations should establish processes to routinely re-evaluate and monitor risks once the business is working in the cloud. Internal audit should consider the risks and controls outlined in this paper and ensure management has evaluated potential risks and taken steps to address them proactively. Further, it is the responsibility of the chief audit executive to understand the security risks facing the organisation, and to work as a conduit to ensure the audit committee understands the risks and how well management is mitigating them. 6
8 About Protiviti Protiviti ( is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit. Through our network of more than 70 offices in over 20 countries, we have served more than 35 percent of FORTUNE 1000 and Global 500 companies. We also work with smaller, growing companies, including those looking to go public, as well as with government agencies. Protiviti is a wholly owned subsidiary of Robert Half International Inc. (NYSE: RHI). Founded in 1948, Robert Half International is a member of the S&P 500 index. About Our IT Internal Audit Services Protiviti s IT internal audit services help organisations understand their key technology risks and how well they are mitigating and controlling those risks. We also provide insight into the threats inherent in today s highly complex technologies. Protiviti provides a wide range of services for IT internal audit outsourcing and co-sourcing. The Protiviti methodology, which is both COSO- and CobIT-based, facilitates an overall IT internal audit management team (either Protiviti-led, client-led, or in combination) with execution of individual projects by subject-matter experts in each IT audit area. Other Thought Leadership from Protiviti Visit to obtain copies of these and other thought leadership materials from Protiviti: 2011 IT Audit Benchmarking Survey 2011 Information Technology Capabilities and Needs Survey 2011 Internal Audit Capabilities and Needs Survey The Current State of IT Security and Privacy Policies and Practices Using High Value IT Audits to Add Value and Evaluate Key Risks and Controls Powerful Insights (Protiviti s podcast series) IT Audit Assessing and Managing Risks Effectively within the IT Environment The Importance of Strong IT Governance During a Financial Crisis Social Media Use in Companies Managing the Risks Effectively Technology-enabled Audits Increasing Productivity and Delivering More Timely and Reliable Results Internal Audit Quality Assessment Reviews Required as well as Beneficial The Benefits of Outsourcing the Internal Audit Function Board Risk Oversight A Progress Report (from COSO and Protiviti): Where Boards of Directors Currently Stand in Executing Their Risk Oversight Responsibilities Changes to the IIA Standards: What Board Members and Executive Management Need to Know Testing the Reporting Process Validating Critical Information Guide to Internal Audit: Frequently Asked Questions about Developing and Maintaining an Effective Internal Audit Function (Second Edition) Internal Auditing Around the World (Volumes 1-7) 7
9 Protiviti Internal Audit and Financial Controls Practice Contact Information United Kingdom Jonathan Wyatt Managing Director Mark Peters Director United States David Brand Managing Director IT Audit Practice Leader Brian Christensen Executive Vice President Global Internal Audit
10 The Americas Europe United States Alexandria Atlanta Baltimore Boston Charlotte Chicago Cincinnati Cleveland Dallas Denver Fort Lauderdale Houston Kansas City Los Angeles Milwaukee Minneapolis New York Orlando Philadelphia Phoenix Pittsburgh Portland Richmond Sacramento Salt Lake City San Francisco San Jose Seattle Stamford St. Louis Tampa Washington, D.C. Woodbridge France Paris Germany Frankfurt Munich Italy Milan Rome Turin Middle East The Netherlands Amsterdam United Kingdom London Argentina Buenos Aires* Brazil Rio de Janeiro* São Paulo* Canada Kitchener-Waterloo Toronto Mexico Mexico City* Monterrey* Peru Lima* Venezuela Caracas* Bahrain Manama* Kuwait Kuwait City* Oman Muscat* United Arab Emirates Abu Dhabi* Dubai* Asia-Pacific Australia Brisbane Canberra Melbourne Perth Sydney China Beijing Hong Kong Shanghai Shenzhen India Bangalore Mumbai New Delhi Indonesia Jakarta** Japan Osaka Tokyo Singapore Singapore South Korea Seoul * Protiviti Member Firm ** Protiviti Alliance Member 2012 Protiviti Inc. An Equal Opportunity Employer. PRO Protiviti is not licensed or registered as a public accounting firm and does not issue opinions on financial statements or offer attestation services.
How To Manage A High Risk It Event
Jump-Starting the Centralizing Communication for High-Risk Information Technology Events Introduction Communication among key internal teams and quick, organized incident resolution for customers are essential
IT Audit Services. Ensuring the Right Systems and Controls Are in Place to Manage Risks Created by New Technologies
IT Audit Services Ensuring the Right Systems and Controls Are in Place to Manage Risks Created by New Technologies Why Data Matters Accurate and reliable data enables customers to place orders, companies
Member Firm Overview. Protiviti 1
Member Firm Overview Protiviti 1 Protiviti Independence, Integrity and Professionalism Protiviti is a global business consulting and internal audit firm composed of experts specializing in risk, advisory
Preparing for the Change to EMV and New Fraud and Security Risks: What U.S. Merchants Need to Know
Preparing for the Change to EMV and New Fraud and Security Risks: What U.S. Merchants Need to Know Introduction Recent large-scale data breaches and growing rates of credit card fraud have some U.S. merchants
Unlocking the Value of Continuous Monitoring and Control Automation Capabilities in SAP Process Control
Unlocking the Value of Continuous Monitoring and Control Automation Capabilities in SAP Process Control Determining Where and How to Begin an Implementation Introduction Automation of controls is a key
Implementing AML Transaction Monitoring Systems: Critical Considerations
Implementing AML Transaction Monitoring Systems: Critical Considerations Issue From a software implementation perspective, implementing an anti-money laundering (AML) transaction monitoring system may
Strategic Bring Your Own Device. Implementing an Effective Program to Create Business Benefits While Reducing Risk
Strategic Bring Your Own Device Implementing an Effective Program to Create Business Benefits While Reducing Risk Introduction Recent forecasts suggest that the global Bring Your Own Device (BYOD) market
Designing NetSuite ERP Application Security Leveraging Fastpath Assure Access Monitoring Solutions
Designing NetSuite ERP Application Security Leveraging Fastpath Assure Access Monitoring Solutions Introduction Defining NetSuite security requirements in the early phase of an implementation, upgrade
Changing Trends in Internal Audit and Advanced Analytics
Changing Trends in Internal Audit and Advanced Analytics Insights from a qualitative benchmarking study by Protiviti of the current state of internal audit data analytics functions in large financial services
Top Priorities for Internal Audit in Telecommunications
Top Priorities for Internal Audit in Telecommunications Assessing Telecommunications Industry Results from the 2012 Internal Audit Capabilities and Needs Survey TELECOMMUNICATIONS COMPANIES OR COMMUNICATIONS
Designing SAP Application Security Leveraging SAP Access Monitoring Solutions During SAP Implementations, Upgrades or Security Redesign Projects
Designing SAP Application Security Leveraging SAP Access Monitoring Solutions During SAP Implementations, Upgrades or Security Redesign Projects Introduction DEFINING SAP SECURITY REQUIREMENTS IN THE EARLY
The Governance Portal Minimize Risk. Maximize Performance.
The Governance Portal Minimize Risk. Maximize Performance. Maj o r an a ly s t s ha v e no t e d th a t Th e Go v e r n a n c e Po r t a l s in t e g r at e d au d i t m a n a g e m e n t mo d u l e is
Top Priorities for Internal Audit in Manufacturing
Top Priorities for Internal Audit in Manufacturing Assessing Manufacturing Industry Results from the 2012 Internal Audit Capabilities and Needs Survey LEADERSHIP TEAMS IN MANUFACTURING COMPANIES ARE LOOKING
Maximizing Sales Performance Through the Use of Sales Enrollment Contact Centers
Maximizing Sales Performance Through the Use of Sales Enrollment Contact Centers Making the enrollment contact center a more strategic component of the sales process for Medicare Advantage insurance plans
Understanding the FFIEC Cybersecurity Assessment Tool: An Internal Audit Perspective
Understanding the FFIEC Cybersecurity Assessment Tool: An Internal Audit Perspective Introduction IT IS ONLY A MATTER OF WHEN BEFORE SOMEONE USES CYBER AS A TOOL TO DO DAMAGE TO CRITICAL INFRASTRUCTURE
Growing With Governance, Risk and Compliance (GRC) Solutions. Avoiding Common Pitfalls to Maximize GRC Solutions
Growing With Governance, Risk and Compliance (GRC) Solutions Avoiding Common Pitfalls to Maximize GRC Solutions EXECUTIVE SUMMARY Many large organizations have recognized value in developing a holistic
The Solvency Modernization Initiative. Understanding the Most Significant Insurance Regulatory Reform in a Generation
The Solvency Modernization Initiative Understanding the Most Significant Insurance Regulatory Reform in a Generation Important developments in insurance regulatory policies and practices at an international
Bridging the Data Security Chasm. Assessing the Results of Protiviti s 2014 IT Security and Privacy Survey
Bridging the Data Security Chasm Assessing the Results of Protiviti s 2014 IT Security and Privacy Survey EXECUTIVE SUMMARY If data isn t the lifeblood of an organization, it without question is a critical
AVANTGARD Hosting and Managed Services
AVANTGARD Hosting and Managed Services AVANTGARD HOSTING AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and industry leading
Veolia Water. Integrating performance and risk management to develop a more responsive and more profitable global enterprise
PROFILES OF BEST-IN-CLASS ORGANIZATIONS Veolia Water Integrating performance and risk management to develop a more responsive and more profitable global enterprise Veolia Water Transforms with Its New
Joint General Assembly APLAC-PAC 2014 June 21-28, Guadalaja, Mexico
Joint General Assembly APLAC-PAC 2014 June 21-28, Guadalaja, Mexico Suggestions air transportation to Guadalajara, Mexico Below are some suggested connections that can be taken from different countries
Global Real Estate Outlook
Global Real Estate Outlook August 2014 The Hierarchy of Economic Performance, 2014-2015 China Indonesia India Poland South Korea Turkey Australia Mexico United Kingdom Sweden United States Canada South
AVANTGARD Private Cloud and Managed Services
AVANTGARD Private Cloud and Managed Services AVANTGARD PRIVATE CLOUD AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and
CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS
CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS Table of Contents 1 ABOUT FTI CONSULTING 2 CHALLENGES OVERCOME 3 OUR EXPERTISE 4 PROJECT TYPES 5 OUR TEAM ii FTI Consulting, Inc. CONSTRUCTION
Accredited TOGAF 9, ArchiMate 2 and IT4IT Training Course Calendar June 2016 onwards
Course Start Date Training Provider Training Course Name Type Course Location Duration Exam Status URL Contact Email Contact Telephone 2016-07-01 2016-07-01 Conexiam TOGAF 9 Training Course TOGAF 9 Combined
3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.
THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance
Accredited TOGAF 9 and ArchiMate 2 Training Course Calendar February 2016 onwards
Course Start Date Training Provider Training Course Name Type Course Location Duration Exam Status URL Contact Email Contact Telephone 2016-02-01 2016-02-01 EA Principals, Inc. TOGAF 9 Foundation and Certified
Synopsis: In the first September TripCase product release there will be several big updates.
TripCase Document Delivery 15.09 Implementation: 10 nd Sep2015 SIN time Synopsis: In the first September TripCase product release there will be several big updates. 1) Frontline agents will have access
P R E S S R E L E A S E
P R E S S R E L E A S E Contact: Robert McGrath 212.984.8267 [email protected] Corey Mirman 212.984.6542 [email protected] LONDON IS WORLD S MOST EXPENSIVE OFFICE MARKET FOR SECOND STRAIGHT YEAR
The Data Center of the Future: Creating New Jobs in Europe
The Data Center of the Future: Creating New Jobs in Europe New data centers will create hundreds of thousands of new jobs for Europe by 2020. But there is work to be done to capture this opportunity fully.
HYBRID CLOUD Why is it important & how do you manage it?
HYBRID CLOUD Why is it important & how do you manage it? TECTONIC SHIFT IN IT 5 How disruptive can the cloud be? 6 7 8 $223B $1B Total Valuation 234 $USD $10B FinTech Innovation 9 Platform to Innovate
Top 10 reasons to move to the cloud
Checklist: Top 10 reasons to move to the cloud WHITE PAPER Checklist: Top 10 reasons to move to the cloud There are many reasons to move to the cloud, including rapid deployment, reduced support, improved
T&E. Where Business Travelers Spend Money
T&E Where Business Travelers Spend Money Contents Introduction 3 Key Findings 4 Top Expensive Cities for Business Travel 5 International 5 U.S. 5 Top 10 Spend Categories 6 International 6 U.S. 7 Most Visited
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
Molnet öppnar nya möjligheter för kostnadseffektiv IT
Molnet öppnar nya möjligheter för kostnadseffektiv IT March 3 Magnus Arildsson, Cloud Leader, IBM Nordic 2015 IBM Corporation Market Shifts are creating a new era of IT Data is becoming the world s new
Alvarez & Marsal Global Forensic and Dispute Services. 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015
Alvarez & Marsal Global Forensic and Dispute Services 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015 A&M OVERVIEW GLOBAL REACH NEW YORK (GLOBAL HQ) LONDON (EUROPE HQ) HONG KONG
Cloud Services for Microsoft
The success of your business depends on your ability to adapt to a dynamic market environment, where globalisation and economic pressures are reshaping the landscape. To remain competitive, your organisation
Data, Data, Who Has The Data?
Data, Data, Who Has The Data? 13 February 2015 Mari Heiser IBM STSM (Senior Technical Staff Member) Master Certified Architect IBM Cloud Security and Compliance Twitter: @MariHeiser What is Cloud? The
Indian E-Retail Congress 2013
The Retail Track The Omni Channel Retail Supply Chain Indian E-Retail Congress 2013 Subhendu Roy Principal Consumer Industries and Retail Practice 15 February, 2013 Disclaimer This document is exclusively
Financial services regulation in Australia
Financial services regulation in Australia FEBRUARY What you need to know Financial services regulation in Australia February 2016 1 What you need to know Key points Do you do business in Australia or
01/ 02/ 03/ 04/ 05/ Beyond borders Deloitte Discovery April 23 rd 2015 Cyprus 1 Going beyond borders to move our clients ahead Deloitte Discovery Services - Deloitte Legal 2 The Deloitte
Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC
Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns Privacy and Information Management Practice / Washington, DC Disclaimer THIS PRESENTATION IS TO ASSIST IN A GENERAL
GLOBAL RETAIL TRENDS IMPLICATIONS FOR COMMERCIAL REAL ESTATE
GLOBAL RETAIL TRENDS IMPLICATIONS FOR COMMERCIAL REAL ESTATE Q2 2013 GLOBAL ECONOMY 2013: Steady Relative to 2012 1.7% CANADA 1.6% U.S. 2.9% MEXICO 1.1% UK -0.5% FRANCE -1.8% SPAIN 0.5% GERMANY -2.0% ITALY
CONSTRUCTION SOLUTIONS
CONSTRUCTION SOLUTIONS Wherever there is construction, there are challenges from contract negotiations to scheduling, budgeting, cost and quality control. Our attention to detail helps clients manage
Denied Boarding Eligibility
Option 1 Denied Boarding Compensation voucher may be used for a single Emirates operated two sector return journey between Dubai and the adjoining list of cities. (OR) Between Australia & New Zealand or
CONSULTING SERVICES Business & technology consulting and managed services
CONSULTING SERVICES Business & technology consulting and managed services SUNGARD CONSULTING SERVICES Leveraging global delivery to help drive operational efficiency while reducing IT cost Companies face
Real Estate. Expertise of a boutique. Reach of a global firm.
Real Estate Expertise of a boutique. Reach of a global firm. Inside Expertise of a boutique, reach of a global firm 1 Broad global coverage 2 Industry coverage 3 Our search process 4 Proprietary assessment
1999 COMMUNICATIONS STUDY LINKING COMMUNICATIONS WITH STRATEGY TO ACHIEVE BUSINESS GOALS
W A T S O N W Y A T T 1999 COMMUNICATIONS STUDY LINKING COMMUNICATIONS WITH STRATEGY TO ACHIEVE BUSINESS GOALS A CLOSE TIE between business and communications strategies will align the workforce with
Opportunities for Action. Achieving Success in Business Process Outsourcing and Offshoring
Opportunities for Action Achieving Success in Business Process Outsourcing and Offshoring Achieving Success in Business Process Outsourcing and Offshoring The list of companies that have launched efforts
Reaching New Levels of Supply Chain Effectiveness and Sustainability. Practical Considerations for Achieving a Strategic Sourcing Model
Reaching New Levels of Supply Chain Effectiveness and Sustainability Practical Considerations for Achieving a Strategic Sourcing Model Executive Summary By examining the current state of strategic sourcing
High Value Audits: An Update on Information Technology Auditing. Robert B. Hirth Jr., Managing Director
High Value Audits: An Update on Information Technology Auditing Robert B. Hirth Jr., Managing Director The technology landscape and its impact on internal audit Technology is playing an ever-growing role
Four steps to improving cloud security and compliance
white paper Four steps to improving cloud security and compliance Despite the widespread proliferation of cloud computing, IT decision makers still express major concerns about security, compliance, and
Digital Infrastructure and Economic Development. An Impact Assessment of Facebook s Data Center in Northern Sweden executive summary
Digital Infrastructure and Economic Development An Impact Assessment of Facebook s Data Center in Northern Sweden executive summary The Boston Consulting Group (BCG) is a global management consulting firm
World City Millionaire Rankings. May 2013
World City Millionaire Rankings May 2013 WealthInsight Publication date: May, 2013 About WealthInsight The WealthInsight Intelligence Center Database is an unparalleled resource and the leading resource
Ken Favaro Ashish Jain Samuel Bloustein. Small Business Banking Customers An Attractive Segment for Organic Growth
Leading Research Paul Hyde Ken Favaro Ashish Jain Samuel Bloustein Small Business Banking Customers An Attractive Segment for Organic Growth Small Business Customers Are Among the Most Profitable Segments
Effective Positioning of the Risk Management Organization
Effective Positioning of the Risk Management Organization Enabling the Chief Risk Officer s Success THIRD IN A SERIES Introduction The outcome of the relationship between risk professionals and line managers
Environment, Health And Safety. Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures
Environment, Health And Safety Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures WHAT IS THE THREAT TO YOUR COMPANY S COMPLIANCE RECORD AND GOOD
Denied Boarding Eligibility
Option 1 Denied Boarding Compensation voucher may be used for a single Emirates operated two sector return journey between Dubai and the adjoining list of cities. (OR) Between Australia & New Zealand or
AVANTGARD RECEIVABLES GETPAID Enterprise Edition
AVANTGARD RECEIVABLES GETPAID Enterprise Edition Comprehensive Order-to-Cash Management AvantGard Receivables GETPAID drives automation, workflow and collaboration across the order-to-cash cycle, with
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Marketing and Branding in Recruitment. Robert Wegenek Squire Patton Boggs (UK) LLP
Marketing and Branding in Recruitment Robert Wegenek Squire Patton Boggs (UK) LLP MARKETING AND BRANDING IN RECRUITMENT B2B and B2C Branding, taglines, slogans Above the line : advertising in traditional
Aiming for Outsourcing Excellence
by Mike Connolly [email protected] Vinay Couto [email protected] Gil Irwin [email protected] Karl Kellner [email protected] Aiming for Outsourcing Excellence The New Knowledge-Based Outsourcing
Robert Hutchens. Procurement s New Operating Model
Perspective Patrick W. Houston Robert Hutchens Procurement s New Operating Model Contact Information Florham Park, NJ Patrick W. Houston Partner +1-973-410-7602 [email protected] New York Robert Hutchens
SMART CITIES And ENERGY. Finding new markets in a changing world
SMART CITIES And ENERGY Finding new markets in a changing world 1 Today s Session Smart City introduction Growth Success Story - Smart Grid, Smart City Josh Gerber of SDG&E Growth Success Story - Blueprint
Software-as-a-service Delivery: The Build vs. Buy Decision
white paper Software-as-a-service Delivery: The Build vs. Buy Decision Introduction In order to deliver software on-demand, companies must either build and manage an infrastructure capable of supporting
SAS CLOUD ANALYTICS MAY 2015
SAS CLOUD ANALYTICS MAY 2015 SAS SOLUTIONS ONDEMAND HISTORY Established in 2000 Formed as the Application Service Provider Group HP ES40 6/833: Tru64 Unix V5.1 TruCluster. 4 CPU s, 8 GB Memory 2 SAS CLOUD
The ROI of a New Learning Management System (LMS)
The ROI of a New Learning Management System (LMS) How to Construct a Successful Business Case WHITE PAPER PERFORMANCE MANAGEMENT IN A SMALL-BUSINESS CULTURE How to Construct a Successful Business Case
Gross Domestic Product (GDP-PPP) Estimates for Metropolitan Regions in Western Europe, North America, Japan and Australasia
Gross Domestic Product (GDP-PPP) Estimates for Metropolitan Regions in Western Europe, North America, Japan and Australasia Draft April 2007 GROSS DOMESTIC PRODUCT ESTIMATES: METROPOLITAN REGIONS In Western
USER S GUIDE. Country Career Guide and USA/Canada City Career Guide. Combined Premium Collection
USER S GUIDE Country Career Guide and USA/Canada City Career Guide Combined Premium Collection Table of Contents Country Career Guides... 3 USA & Canada City Career Guides... 4 Browsing the Going Global
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
Cloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
How To Manage An Ip Telephony Service For A Business
Enabling organisations to focus on core revenue generating activities Your business needs reliable, flexible and secure communication tools to enable better connectivity and collaboration with your employees,
Goodbye Spokesperson, Hello Steward
Goodbye Spokesperson, Hello Steward The Transformation of Corporate Communications Once heralded as the seat held by the best storyteller in the company, corporate communications is no longer about amplifying
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
SEC Staff Addresses Third-Party Endorsements of Investment Advisers on Social Media Websites
April 2014 Practice Groups: Investment Management, Hedge Funds and Alternative Investments Private Equity SEC Staff Addresses Third-Party Endorsements of By Michael W. McGrath and Sonia R. Gioseffi On
Rents continue to recover. Global Office Index Q2 2014
Rents continue to recover Global Office Index Q2 2014 2 Global Office Index, Q2 2014 JLL Global Office Index Q2 2014 Rents continue to recover Steady improvement in both leasing activity and corporate
Corporate Presentation
Corporate Presentation XcellHost Cloud Services India Dubai Singapore Experience High Touch Support Reliable Secure Speed Scalable Manageable Value XcellHost About Us Founded in 1999. Global Reach Personal
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
