Third party assurance services

Size: px
Start display at page:

Download "Third party assurance services"

Transcription

1 TECHNOLOGY RISK SERVICES Third party assurance services Delivering assurance over your service providers

2 The current third party service provider environment Corporate UK has been transformed in recent years. Against the backdrop of increasing regulatory burden and in the face of dynamic and challenging markets, tough competition, resource pressures and increased IT complexity, firms are facing the challenge to improve performance. The use of third parties can introduce operational and financial improvements but can, if not managed properly, also magnify risk. The current corporate environment has increased the emphasis on outsourced service providers working with their clients and their clients auditors, to show that the risks associated with the outsourced service are being appropriately managed. Grant Thornton s third party assurance services, including the provision of service auditor reports, third party supplier operational and security risk assessments, third party contract reviews and customised vendor management audits, help to manage the third party risk and also provide assurance to senior management and other stakeholders. For many years the volume and diversity of services outsourced to third parties has been increasing across all industries. Many organisations today often depend on a vast number of service providers for support. We provide a few examples in the adjacent list. Information technology services including hosting, cloud computing, Software as a Service (SaaS) and Infrastructure as a Service (IaaS) Shared service centres Human resources and payroll Investment management and administration Pension administration Fund management Custody and securities administration Legislation, such as the 2002 Sarbanes Oxley Act, the Financial Instruments and Exchange Law (JSOX), other global data protection legislation, as well as several high profile data security incidents involving third parties, have helped to reinforce the general understanding that providing sensitive data to third parties can introduce significant additional risks. While outsourcing offers many established benefits, the current UK environment presents users of outsourced services with the very significant challenge of incorporating good governance practice over these functions, as well as demonstrating compliance. This is also compounded by ever changing and increasing levels of regulation and legislation. In the current commercial world doing the right thing is often not enough. A service organisation also needs to demonstrate that they have an effective operating environment. 2 Third party assurance services Third party assurance services 3

3 Absence of a third party risk assessment framework to enable effective categorisation and management of suppliers Third party assurance what are the available options? Inadequately defined contractual obligations Responding to stakeholder concerns Although companies outsource the performance of key services, they still retain responsibility for their regulatory requirements. They will also be responsible for ensuring that the control environments supporting their business processes are operating effectively, regardless of who is managing them. Companies will need to ensure that these outsourced processes are migrated in a structured manner and confirm procedures are in place to monitor and manage risks associated with the third party services provided. Third party audits There have been a number of high profile instances of third parties not properly controlling their client data. This has resulted in data loss, reputational damage and, in some instances, fines from the Information Commissioner s Office for failing to establish an appropriate control environment. Adjacent are some examples: There are many risks associated with use of third parties in financial, regulatory and operational terms. We have a team of specialist auditors who have undertaken various third party audits of outsourcing projects and operational contracts, and who have helped to identify improvement opportunities. As part of internal audit engagements or as standalone audits, we have performed the following third party reviews: Risk reviews of IT outsourcing projects Outsourcing contract reviews Poorly established system functional requirements which led to the non-delivery of a service contract Undefined Service Level Agreeemnts (SLAs) for systems which were not adequately tested prior to going live On-going service provisions where target service levels are not monitored or even measured Service providers can work with user organisations in several ways to provide this assurance by: Establishing detailed service level agreements with strong monitoring Obtaining a service auditor report from the outsourced service provider Project reviews over outsourcing programmes Reviews over vendor management and governance Cost verification audits Using a strong contractual and legal framework Using internal auditors to test the effectiveness of the outsourced control environment Completing an independent review of compliance with security and privacy requirements Royalty audits Third party functional and IT performance audits Third party security and data privacy audits 4 Third party assurance services Third party assurance services 5

4 Third party security assessment - case study We have completed security assessments, over several third party service providers, for a leading FTSE 100 media organisation. We established a bespoke testing framework aligned to industry good practice and which met client specific needs. We also completed systematic testing for a given period, communicating findings to both the third party service provider and user organisation. Third party supplier operational and security risk assessment As the business community continues to find new and innovative approaches to embrace the power of technology through established solutions, such as cloud computing and software/ infrastructure as a service or new means of mobile computing, the security threat increases in complexity. The need for reliable and up to date security practices, supported by the development of a mature organisational wide security culture, is now critical to protect organisational interests and executive reputations. The average cost of a data breach for a UK company has reached 1.7 million and is now 47 per lost customer record When allowing third parties access to a company s data, the operational activities may be outsourced, but the responsibility for ensuring that data is secure is not. Examples of fines for loss of laptops, unencrypted back-up tapes, customer information, etc demonstrate the financial, commercial and reputational impact of such breaches. Our third party security assessments can help assess the risk and possible impact of any information loss from third party vendors. We have performed a variety of customised third party security assessments to provide companies with the assurance that their third parties are securely and appropriately managing data in line with contractual agreements. Service auditor reports - SSAE 16, AAF, ISAE and ITF AAF 01/06, ITF reports, the international standard ISAE 3402 and the US SSAE 16 (previously known as SAS 70) are the most commonly used service auditor reports in the UK that deliver third party assurance over service providers. It is important to understand the differences and the expectations associated with each of the reporting frameworks in producing a service auditor report. This is to ensure the appropriate report type is selected. Each report has its own merits and we can help select the right report for different service providers and user organisation requirements. Service auditor reports, if planned and delivered effectively, can provide users of outsourced services and their auditors, with reasonable and demonstrable assurance that controls are operating effectively over outsourced processes. Additional benefits of service auditor reports may include: Meeting Sarbanes Oxley requirements associated with understanding operating effectiveness of outsourced controls Providing comfort that controls are being exercised over data Delivering assurance beyond the standard service level agreement Helping to identify process and technology weaknesses Auditors play a key role in the risk assessment associated with their clients outsourcing activities and service auditor reports including SSAE 16, ISAE 3402, AAF 01/06 and ITF 01/07. Reviews of risk management at, and after, migration are also being increasingly used. This is to provide a framework around which user organisations and their auditors can gain insight over the internal controls in place at service organisations. Service auditor reports SSAE 16 Statement on Standards for Attestation Engagements 16 ISAE 3402 International Standards for Assurance Engagements 3402 ITF 01/07 Information Technology Faculty of ICAEW 01/07 SAS 70 Service Organisation Auditing Standards 70 AAF 01/06 Audit and Assurance Faculty of ICAEW 01/06 Identifying the controls at the client organisation necessary to complement those of the outsourced service provider Service auditor report - case study Grant Thornton has helped many clients in obtaining service auditor reports against the AAF, ISAE 3402 and SSAE 16 frameworks. For one FTSE 350 services client, we initially held communications/understanding workshops to enhance awareness and communicate the implications of a service auditor report. We then facilitated identification of in-scope control objectives and associated control activities before performing a gap analysis. We have subsequently completed a number of type 1 and type 2 AAF reports in different parts of the client s business. 6 Third party assurance services Third party assurance services 7

5 Why Grant Thornton? Grant Thornton UK LLP is the UK member firm of Grant Thornton International, one of the world s leading international organisations of independently owned and managed accounting and consulting firms. This provides access to an international network and a wealth of multidisciplinary experience, offering comprehensive solutions to help you respond effectively to changing risks within, and outside, the organisation in order to achieve your business goals. Our team has experience of undertaking significant third party assurance work ranging from internal audits over outsourcing programmes, vendor management, contract reviews and management and bespoke third party security assessments. Our wealth of experience covers all industries and all sizes of clients and third parties and we can tailor our services to meet client needs. Our professionals understand your business. Commercially minded and risk focused, our team of independent thinkers offers, we believe, the best combination of quality, expertise and value. We aim to work in partnership with you to deliver incisive, value adding results. Our team features experienced audit, risk and contract experts, who have held senior positions in leading organisations. Who should I contact for assistance? To understand more about our third party assurance services or a wider range of our consulting services, please contact: Sandy Kumar Partner Head of Business Risk Services T +44 (0) E sandy.kumar@uk.gt.com Philip Keown Director Third Party Assurance Services Lead Corporates/Not for Profit T +44 (0) E philip.r.keown@uk.gt.com Ravi Joshi Associate Director Head of Technology Risk Services T +44 (0) E ravi.joshi@uk.gt.com Manu Sharma Associate Director Cyber Security and Privacy Services Lead T +44 (0) E manu.sharma@uk.gt.com How we can help We have an established methodology and considerable experience in working with our clients through all aspects of their service auditor reporting activities. This includes selecting and scoping, through to effective delivery of reports in line with SSAE 16, AAF 01/06, ITF 01/07 and ISAE 3402 standards. We can also provide expert reviews of third party contracts to ensure operational and other risks are appropriately managed and mitigated Grant Thornton UK LLP. All rights reserved. Grant Thornton means Grant Thornton UK LLP, a limited liability partnership. Grant Thornton is a member firm of Grant Thornton International Ltd (Grant Thornton International). References to Grant Thornton are to the brand under which the Grant Thornton member firms operate and refer to one or more member firms, as the context requires. Grant Thornton International and the member firms are not a worldwide partnership. Services are delivered independently by member firms, which are not responsible for the services or activities of one another. Grant Thornton International does not provide services to clients. This publication has been prepared only as a guide. No responsibility can be accepted by us for loss occasioned to any person acting or refraining from acting as a result of any material in this publication. grant-thornton.co.uk V22817

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Contract risk and assurance

Contract risk and assurance Contract risk and assurance Delivering value from your key contracts and suppliers Maximise performance, confirm costs and gain assurance over your third party relationships and suppliers Performance Risk

More information

Capital Projects. Providing assurance over effective delivery of projects

Capital Projects. Providing assurance over effective delivery of projects Capital Projects Providing assurance over effective delivery of projects Governance and oversight Project Scope and change Reporting and communication Project risk and success factors Delivery Major projects

More information

Informing the audit risk assessment Enquiries to those charged with governance Calderdale Council. Year ended 31 March 2013

Informing the audit risk assessment Enquiries to those charged with governance Calderdale Council. Year ended 31 March 2013 Informing the audit risk assessment Enquiries to those charged with governance Calderdale Council This version of the report is a draft. Its contents and subject matter remain under review and its contents

More information

Guidance for audit committees. The internal audit function

Guidance for audit committees. The internal audit function Guidance for audit committees The internal audit function March 2004 The Combined Code on Corporate Governance July 2003 C.3 Audit Committee and Auditors Main Principle: The board should establish formal

More information

Adding value to your ship management business. Shipping & Transport PRECISE. PROVEN. PERFORMANCE.

Adding value to your ship management business. Shipping & Transport PRECISE. PROVEN. PERFORMANCE. Adding value to your ship management business Shipping & Transport PRECISE. PROVEN. PERFORMANCE. 2 Shipping & Transport Adding value to your ship management business The management of risk and implementation

More information

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,

More information

The Audit Plan for West Mercia Energy Joint Committee

The Audit Plan for West Mercia Energy Joint Committee The Audit Plan for West Mercia Energy Joint Committee Year ended 31 March 2015 16th February 2015 Jon Roberts Partner T 0121 232 5410 E jon.roberts@uk.gt.com Andrew Davies Manager T 0121 232 5417 E andrew.davies@uk.gt.com

More information

UK Stewardship Code. Response by Generation Investment Management LLP. London / 31 March, 2015. Generation Investment Management Page 1

UK Stewardship Code. Response by Generation Investment Management LLP. London / 31 March, 2015. Generation Investment Management Page 1 UK Stewardship Code Response by LLP London / 31 March, 2015 Page 1 This document, available on our website, outlines our response to the UK Stewardship Code and the ways in which we discharge our stewardship

More information

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...

More information

ISO 27001 Gap Analysis - Case Study

ISO 27001 Gap Analysis - Case Study ISO 27001 Gap Analysis - Case Study Ibrahim Al-Mayahi, Sa ad P. Mansoor School of Computer Science, Bangor University, Bangor, Gwynedd, UK Abstract This work describes the initial steps taken toward the

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Internal Audit - progress report 2015-16 and 2016-17 plan

Internal Audit - progress report 2015-16 and 2016-17 plan Audit Committee, 16 March 2016 Internal Audit - progress report 2015-16 and 2016-17 plan Executive summary and recommendations Introduction Grant Thornton have prepared the attached report which sets out

More information

ISAE 3402 and SSAE 16 (replacing SAS 70) Reinforcing confidence through demonstration of effective controls

ISAE 3402 and SSAE 16 (replacing SAS 70) Reinforcing confidence through demonstration of effective controls ISAE 3402 and SSAE 16 (replacing SAS 70) Reinforcing confidence through demonstration of effective controls ISAE 3402 and SSAE 16 defined Overview of service organisation control reports Service organisation

More information

Informing the audit risk assessment for West Midlands Integrated Transport Authority Pension Fund

Informing the audit risk assessment for West Midlands Integrated Transport Authority Pension Fund Informing the audit risk assessment for West Midlands Integrated Transport Authority Pension Fund Year ended 31 March 2015 February 2015 John Gregory Engagements Lead T 07880 456 107 E john.gregory@uk.gt.com

More information

Insight and Peer Analysis

Insight and Peer Analysis Insight and Peer Analysis 2014 Insight as a source of competitive advantage We are living in a world that generates and consumes ever greater levels of data. More than ever before, this gives businesses

More information

Report to Governors on the Quality Report 2013/14

Report to Governors on the Quality Report 2013/14 Report to Governors on the Quality Report 2013/14 Gloucestershire Hospitals NHS Foundation Trust Year ended 31 March 2014 21 May 2014 John Golding Partner T 0117 305 7802 E john.golding@uk.gt.com Kevin

More information

Understanding ISO 27018 and Preparing for the Modern Era of Cloud Security

Understanding ISO 27018 and Preparing for the Modern Era of Cloud Security Understanding ISO 27018 and Preparing for the Modern Era of Cloud Security Presented by Microsoft and Foley Hoag LLP s Privacy and Data Security Practice Group May 14, 2015 Proposal or event name (optional)

More information

A Flexible and Comprehensive Approach to a Cloud Compliance Program

A Flexible and Comprehensive Approach to a Cloud Compliance Program A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility

More information

DRAFT. Informing the audit risk assessment for Cheshire Fire Authority. Year ending 31 March 2013 xx April 2013

DRAFT. Informing the audit risk assessment for Cheshire Fire Authority. Year ending 31 March 2013 xx April 2013 Informing the audit risk assessment for Cheshire Fire Authority This version of the report is a draft. Its contents and subject matter remain under review and its contents may change and be expanded as

More information

Client Alert. Global Information Technology & Communications Privacy, Data Protection and Information Management

Client Alert. Global Information Technology & Communications Privacy, Data Protection and Information Management Global Information Technology & Communications Privacy, Data Protection and Information Management Client Alert Umbrellas for Clouds: Risk Mitigation Strategies for SaaS Transactions www.bakermckenzie.com

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Implementing and monitoring effective compliance policies & procedures. charlesrussellspeechlys.com

Implementing and monitoring effective compliance policies & procedures. charlesrussellspeechlys.com Implementing and monitoring effective compliance policies & procedures charlesrussellspeechlys.com Robert Bond Partner Robert Bond has over 36 years' experience in advising national and international clients

More information

Third Party Supplier Security

Third Party Supplier Security Third Party Supplier Security Managing risk and compliance through external due diligence audits. Presented by: Stephen Higgins 6 th December 2012 To cover When third party supplier security goes wrong...

More information

Audit Quality Thematic Review

Audit Quality Thematic Review Thematic Review Professional discipline Financial Reporting Council January 2014 Audit Quality Thematic Review Fraud risks and laws and regulations The FRC is responsible for promoting high quality corporate

More information

Henkel s Compliance Management System (CMS)

Henkel s Compliance Management System (CMS) Henkel s Compliance Management System (CMS) As a company that operates in an ethically and legally correct manner, Henkel s image and reputation is inseparable from the appropriate conduct of each of its

More information

Outsourcing. FSA Regulated firms (including offshore outsourcing) Contents. March 2004

Outsourcing. FSA Regulated firms (including offshore outsourcing) Contents. March 2004 Outsourcing FSA Regulated firms (including offshore outsourcing) March 2004 Contents 2. Introduction 2. How do the regulations impact an outsourcing? 3. Prudential Sourcebooks 4. Service Level Agreements

More information

Risk Management Policy

Risk Management Policy 1 Purpose Risk management relates to the culture, processes and structures directed towards the effective management of potential opportunities and adverse effects within the University s environment.

More information

In partnership with. Food & Drink A fresh approach to risk management

In partnership with. Food & Drink A fresh approach to risk management In partnership with Food & Drink A fresh approach to risk management A thriving sector... In these difficult economic times the Food & Drink industry is a refreshing example of a sector that is expanding.

More information

Pharma CloudAdoption. and Qualification Trends

Pharma CloudAdoption. and Qualification Trends Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

How mature is the internal control framework at your service organisation? ISAE 3402 and SSAE 16: Reinforcing confidence through demonstration of

How mature is the internal control framework at your service organisation? ISAE 3402 and SSAE 16: Reinforcing confidence through demonstration of How mature is the internal control framework at your service organisation? ISAE 3402 and SSAE 16: Reinforcing confidence through demonstration of effective controls ISAE 3402 and SSAE 16 defined Overview

More information

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch SSAE 16 for Transportation & Logistics Companies Chris Kradjan Kim Koch 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind,

More information

The end of SAS70 what next for Performance Assurance?

The end of SAS70 what next for Performance Assurance? Enhancing Trust and Transparency The end of SAS70 what next for Performance Assurance? A perspective on transitioning from SAS 70 to ISAE 3402 pwc Enhancing Trust and Transparency 1 Contents What you need

More information

Protecting your brand in the cloud Transparency and trust through enhanced reporting

Protecting your brand in the cloud Transparency and trust through enhanced reporting Protecting your brand in the cloud Transparency and trust through enhanced reporting Third-party Assurance November 2011 At a glance Cloud computing has unprecedented potential to deliver greater business

More information

Shared service centres

Shared service centres Report by the Comptroller and Auditor General Cabinet Office Shared service centres HC 16 SESSION 2016-17 20 MAY 2016 4 Key facts Shared service centres Key facts 90m estimated savings made to date by

More information

Auditing Outsourcing Arrangements

Auditing Outsourcing Arrangements Auditing Outsourcing Arrangements Eileen Healy Enterprise Risk Services Director 16 April 2015 Contact Details: - Email: - ehealy@deloitte.ie Mobile: - 086 164 3082 Session Objectives To provide an understanding

More information

Information Governance Management Framework

Information Governance Management Framework Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date

More information

G24 - SAS 70 Practices and Developments Todd Bishop

G24 - SAS 70 Practices and Developments Todd Bishop G24 - SAS 70 Practices and Developments Todd Bishop SAS No. 70 Practices & Developments Todd Bishop Senior Manager, PricewaterhouseCoopers LLP Agenda SAS 70 Background Information and Overview Common SAS

More information

Closure support: Delivering a controlled wind down to maximise value

Closure support: Delivering a controlled wind down to maximise value Closure support: Delivering a controlled wind down to maximise value Why close? Why seek support? There are a number of reasons why businesses and organisations are closed down: a strategic decision to

More information

Overview TECHIS60441. Carry out security testing activities

Overview TECHIS60441. Carry out security testing activities Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being

More information

(NW & IT) Security: A Global Provider s Perspective

(NW & IT) Security: A Global Provider s Perspective ECTA Regulatory Conference 2006 Workshop Data Protection, Retention and Security Issues in the Electronic Communications (NW & IT) Security: A Global Provider s Perspective 15 November 2006, Brussels Marcel

More information

DRAFT. Report to Governors on the Quality Report 2015/16. Royal United Hospitals Bath NHS Foundation Trust] Year ended 31 March 2016 16 May 2016

DRAFT. Report to Governors on the Quality Report 2015/16. Royal United Hospitals Bath NHS Foundation Trust] Year ended 31 March 2016 16 May 2016 Report to Governors on the Quality Report 2015/16 This version of the report is a draft. Its contents and subject matter remain under review and its contents may change and be expanded as part of the finalisation

More information

Secure communication between accountants and their clients: The role of the client portal

Secure communication between accountants and their clients: The role of the client portal Secure communication between accountants and their clients: The role of the client portal The importance of security An audience poll conducted at a recent ICAEW event revealed that, when it came to cloud

More information

ESKISP6046.02 Direct security architecture development

ESKISP6046.02 Direct security architecture development Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable

More information

CYBER AND PRIVACY INSURANCE: LOSS MITIGATION SERVICES

CYBER AND PRIVACY INSURANCE: LOSS MITIGATION SERVICES CYBER AND PRIVACY INSURANCE: LOSS MITIGATION SERVICES How can you better prepare and respond to cyber risks? ACE developed Loss Mitigation Services to help policyholders understand and gauge various areas

More information

Governance in brief BIS and the FRC consult on options for UK implementation of the EU Audit Directive & Regulation

Governance in brief BIS and the FRC consult on options for UK implementation of the EU Audit Directive & Regulation January 2015 Governance in brief BIS and the FRC consult on options for UK implementation of the EU Audit Directive & Regulation Headlines The UK will take the option to extend the mandatory auditor rotation

More information

BARRAMUNDI L IMITED RISK MANAGEMENT POLICY

BARRAMUNDI L IMITED RISK MANAGEMENT POLICY BARRAMUNDI L IMITED RISK MANAGEMENT POLICY Last updated: 25 August 2014 THE OBJECTIVES OF RISK MANAGEMENT Risk management is the systematic process of managing an organisation's risk exposures to achieve

More information

Guidance on data security breach management

Guidance on data security breach management Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction

More information

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement. Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement June 2011 DISCLAIMER: This document is intended as a general guide only.

More information

erisks Policyholder s Guide to Privacy & Security Breach Response Planning

erisks Policyholder s Guide to Privacy & Security Breach Response Planning erisks Policyholder s Guide to Privacy & Security Breach Response Planning Professional Indemnity Financial Institutions Directors & Officers Management Liability Medical Malpractice Media Liability Level

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

ICANWK616A Manage security, privacy and compliance of cloud service deployment

ICANWK616A Manage security, privacy and compliance of cloud service deployment ICANWK616A Manage security, privacy and compliance of cloud service deployment Release 1 ICANWK616A Manage security, privacy and compliance of cloud service deployment Modification History Release Release

More information

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Aberdeen City Council IT Governance

Aberdeen City Council IT Governance Aberdeen City Council IT Governance Internal Audit Report 2013/2014 for Aberdeen City Council May 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary where applicable Terms or

More information

ICAEW. Audit Insights. Cyber Security 2015

ICAEW. Audit Insights. Cyber Security 2015 ICAEW Audit Insights Cyber Security 2015 BUSINESS WITH CONFIDENCE icaew.com/auditinsights About the ICAEW IT Faculty The ICAEW IT Faculty provides products and services to help its members make the best

More information

Public cloud vendors: security ranking and positioning analysis

Public cloud vendors: security ranking and positioning analysis Viewpoint Public cloud vendors: security ranking and positioning analysis By Edward Hamilton (Senior Manager) April 2011 Executive summary The market for cloud services is growing rapidly, but players

More information

Information Commissioner's Office

Information Commissioner's Office Information Commissioner's Office IT Procurement Review Ian Falconer Partner T: 0161 953 6480 E: ian.falconer@uk.gt.com Last updated 18 June 2012 Will Simpson Senior Manager T: 0161 953 6486 E: will.g.simpson@uk.gt.com

More information

The Annual Audit Letter for Torbay Council

The Annual Audit Letter for Torbay Council The Annual Audit Letter for Torbay Council Year ended 31 March 2014 October 2014 Alex Walling Engagement Lead T 0117 305 7804 E alex.j.walling@uk.gt.com Mark Bartlett Manager T 0117 305 7896 E mark.bartlett@uk.gt.com

More information

Securing the Microsoft Cloud

Securing the Microsoft Cloud Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from

More information

IT strategy. What is an IT strategy? 3. Why do you need an IT strategy? 5. How do you write an IT strategy? 6. Conclusion 12. Further information 13

IT strategy. What is an IT strategy? 3. Why do you need an IT strategy? 5. How do you write an IT strategy? 6. Conclusion 12. Further information 13 IT strategy made simple What is an IT strategy? 3 Why do you need an IT strategy? 5 How do you write an IT strategy? 6 step 1 Planning and preparation 7 step 2 Understanding your organisation s IT needs

More information

Growth Through Excellence

Growth Through Excellence Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...

More information

CFOs and CIOs: How do you know when to reach for the clouds?

CFOs and CIOs: How do you know when to reach for the clouds? CFOs and CIOs: How do you know when to reach for the clouds? I would like to have a way to allow many different users to have access to data and to have better analytic capabilities should we just move

More information

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015 NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au

More information

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management Care Providers Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Care providers are there to help those in need. But who helps the care

More information

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit 2014 Welcome to our third annual review of the IT hot topics facing Internal Audit functions within

More information

APB ETHICAL STANDARD 5 NON-AUDIT SERVICES PROVIDED TO AUDIT CLIENTS

APB ETHICAL STANDARD 5 NON-AUDIT SERVICES PROVIDED TO AUDIT CLIENTS APB ETHICAL STANDARD 5 NON-AUDIT SERVICES PROVIDED TO AUDIT CLIENTS (Re-issued December 2004) Contents paragraph Introduction 1-4 General approach to non-audit services 5-38 Identification and assessment

More information

Orchestrating the New Paradigm Cloud Assurance

Orchestrating the New Paradigm Cloud Assurance Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems

More information

OUTSOURCING AND SERVICE AUDITOR S REPORTS

OUTSOURCING AND SERVICE AUDITOR S REPORTS OUTSOURCING AND SERVICE AUDITOR S REPORTS FREEDOM TO DO BUSINESS Outsourcing and service Auditor s Reports 3 OUTSOURCING AND SERVICE AUDITOR S REPORTS SERVICE AUDITOR S REPORTS ARE GROWING IN IMPORTANCE,

More information

Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions

Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions Financial Conduct Authority Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions Introduction 1. A firm has many choices when designing its operating model

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

fmswhitepaper Why community-based financial institutions should practice enterprise risk management.

fmswhitepaper Why community-based financial institutions should practice enterprise risk management. fmswhitepaper Why community-based financial institutions should practice enterprise risk management. By Michael D. Cohn, CPA, CISA, CGEIT Director, WolfPAC Solutions Group Unique Insights Implementation

More information

G24: Audits of Controls at a Service Organization: New Standards SSAE 16 and ISAE 3402 Duff Donnelly and Jeffrey Spivack, Grant Thornton LLP

G24: Audits of Controls at a Service Organization: New Standards SSAE 16 and ISAE 3402 Duff Donnelly and Jeffrey Spivack, Grant Thornton LLP G24: Audits of Controls at a Service Organization: New Standards SSAE 16 and ISAE 3402 Duff Donnelly and Jeffrey Spivack, Grant Thornton LLP Audits of controls at a service organization Roadmap to the

More information

Lloyd s Managing Agents FSA Solvency II Data Audit

Lloyd s Managing Agents FSA Solvency II Data Audit Lloyd s Managing Agents FSA Solvency II Data Audit Working in partnership with you to provide the independent assurance that your Data Audit Report fulfils Lloyd s and FSA Solvency II requirements Lloyd

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased

More information

Safeguarding life, property and the environment

Safeguarding life, property and the environment DNV Healthcare Safeguarding life, property and the environment DNV Healthcare Contact us More information about our organisation and the services we offer can be found at our website dnv.com/healthcare

More information

Guidance on data security breach management

Guidance on data security breach management ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...

More information

Information Commissioner's Office

Information Commissioner's Office Phil Keown Engagement Lead T: 020 7728 2394 E: philip.r.keown@uk.gt.com Will Simpson Associate Director T: 0161 953 6486 E: will.g.simpson@uk.gt.com Information Commissioner's Office Internal Audit 2015-16:

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

DATA QUALITY STRATEGY

DATA QUALITY STRATEGY DATA QUALITY STRATEGY If you or anybody you know requires this or any other council information in another language, please contact us and we will do our best to provide this for you. Braille, Audio tape

More information

Manchester City Council

Manchester City Council Manchester City Council Accounts Audit Plan 2009/10 18 December 2009 Contents Page 1 Introduction 2 2 Approach and audit risks 3 3 Administration 13 4 Planned outputs 16 Appendices A B IFRS Action Plan

More information

Carey Group Company Secretarial (UK) The professional corporate support service

Carey Group Company Secretarial (UK) The professional corporate support service Carey Group Company Secretarial (UK) The professional corporate support service The professional corporate support service For businesses incorporated in the UK, there is a raft of legislation, compliance

More information

ESKITP714401 Implement procedures and standards relating to metrics for IT service delivery

ESKITP714401 Implement procedures and standards relating to metrics for IT service delivery Overview This sub-discipline covers the competencies required to perform performance metrics. Monitoring service level performance is a complex task requiring collection of data, detailed analysis, and

More information

PCL2\13991300\1 CYBER RISKS: RISK MANAGEMENT STRATEGIES

PCL2\13991300\1 CYBER RISKS: RISK MANAGEMENT STRATEGIES PCL2\13991300\1 CYBER RISKS: RISK MANAGEMENT STRATEGIES Cyber Attacks: How prepared are you? With barely a day passing without a reported breach of corporate information security, the threat to financial

More information

Hans Bos Microsoft Nederland. hans.bos@microsoft.com

Hans Bos Microsoft Nederland. hans.bos@microsoft.com Hans Bos Microsoft Nederland Email: Twitter: hans.bos@microsoft.com @hansbos Microsoft s Cloud Environment Consumer and Small Business Services Software as a Service (SaaS) Enterprise Services Third-party

More information

3 rd Party Vendor Risk Management

3 rd Party Vendor Risk Management 3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced

More information

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers)

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) June 2011 DISCLAIMER: This document is intended as a general guide only. To the extent permitted by law,

More information

Risk & Assurance. Tailored to your needs. Internal audit solutions

Risk & Assurance. Tailored to your needs. Internal audit solutions Risk & Assurance Tailored to your needs Internal audit solutions Internal audit solutions The need for internal audit has never been as urgent as it is today. Unmanaged risks can literally cause the demise

More information

Tasmanian Cloud & Government use of public cloud services

Tasmanian Cloud & Government use of public cloud services Tasmanian Cloud - Networking Tasmania Pre- Tender Consultation Tasmanian Cloud & Government use of public cloud services Scoping and implementation discussion paper Department of Premier and Cabinet Office

More information

Cloud computing. Advantages and disadvantages

Cloud computing. Advantages and disadvantages Cloud computing Advantages and disadvantages CPA Australia Ltd ( CPA Australia ) is one of the world s largest accounting bodies representing more than 139,000 members of the financial, accounting and

More information

Data Security Breach Management - A Guide

Data Security Breach Management - A Guide DATA PROTECTION (JERSEY) LAW 2005 GUIDANCE ON DATA SECURITY BREACH MANAGEMENT GD21 2 DATA PROTECTION (JERSEY) LAW 2005: GUIDANCE ON DATA SECURITY BREACH MANAGEMENT Introduction Organisations which process

More information

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of

More information

Gaining the competitive edge. Sports & Leisure PRECISE. PROVEN. PERFORMANCE.

Gaining the competitive edge. Sports & Leisure PRECISE. PROVEN. PERFORMANCE. Gaining the competitive edge Sports & Leisure PRECISE. PROVEN. PERFORMANCE. 2 Sports & Leisure Gaining the competitive edge Gaining the competitive edge The sports and leisure sector is a competitive and

More information

OUTSOURCING IT FUNCTIONS IN TIMES OF INCREASED REGULATION AND SECURITY CONCERNS. 2016 In-House Counsel Conference

OUTSOURCING IT FUNCTIONS IN TIMES OF INCREASED REGULATION AND SECURITY CONCERNS. 2016 In-House Counsel Conference OUTSOURCING IT FUNCTIONS IN TIMES OF INCREASED REGULATION AND SECURITY CONCERNS 2016 In-House Counsel Conference INTRODUCTION http://delvacca.acc.com http://delvacca.acc.com Presenters: Barbara Murphy

More information

Disaster recovery strategic planning: How achievable will it be?

Disaster recovery strategic planning: How achievable will it be? Disaster recovery strategic planning: How achievable will it be? Amr Ahmed Ernst & Young Advisory Services, Executive Director amr.ahmed@ey.com Christopher Rivera Ernst & Young Advisory Services, Manager

More information

The promise and pitfalls of cyber insurance January 2016

The promise and pitfalls of cyber insurance January 2016 www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped

More information