A CobiT Case Study. Drawing on CobiT for the implementation of an Enterprise Risk Management Framework. December 2008

Size: px
Start display at page:

Download "A CobiT Case Study. Drawing on CobiT for the implementation of an Enterprise Risk Management Framework. December 2008"

Transcription

1 A CobiT Case Study Drawing on CobiT for the implementation of an Enterprise Risk Management Framework December 2008 Presenter: Clive E. Waugh, CISSP C/EH 1

2 Risk Management Framework Objectives CobiT provided guidance with essential framework elements: Governance Strategic Alignment Business Focus Control Objectives Establishment of Risk Appetite Assessment and Management of Risks Performance Management 2

3 CobiT Case Study The framework in practice 3

4 The framework in practice: 4 Domains CobiT Framework is comprised of 4 Domains, 34 Processes, 200 Control Objectives Plan and Organize Processes Acquire and Implement Process PO1 Define a Strategic IT Plan AI2 Acquire and Maintain Application PO2 Define the Information Architecture Software PO4 Define Organization and Relationships PO6 Communicate Management Aims and Direction PO9 Assess and Manage IT Risks PO10 Manage Projects Deliver and Support Processes DS2 Manage Third-party Services DS4 Ensure Continuous Service DS5 Ensure Systems Security Monitor and Evaluate Processes ME1 Monitor and Evaluate IT Performance ME2 Monitor and Evaluate Internal Control ME4 Provide IT Governance 4 Clive E. Waugh CISSP, C/EH

5 The framework in practice: Plan & Organize Plan and Organize process description: PO1 Define a Strategic IT Plan PO1.2 Business-IT Alignment Strategic Alignment PO2 Define the Information Architecture PO2.2 Data Classification Scheme PO4 Define the Organization & Relationships PO4.8 Responsibility for Risks, Security & Compliance PO4.15 Relationships PO6 Communicate Management Aims & Direction PO6.2 Enterprise IT Risk and Control Framework Risk Management Framework 5 Clive E. Waugh CISSP, C/EH

6 The framework in practice: Plan & Organize Plan and Organize process description continued: PO9 Assess and Manage IT Risks PO9.1 IT Risk Management Framework PO9.2 Establishment of Risk Context PO9.3 Event Identification PO9.4 Risk Assessment PO9.5 Risk Response PO9.6 Maintenance & Monitoring of a Risk Action Plan PO10 Manage Projects PO10.3 Project Management Approach PO10.4 Stakeholder Commitment PO10.9 Project Risk Management PO10.13 Project Performance Measurement, Reporting & Monitoring 6 Clive E. Waugh CISSP, C/EH

7 The framework in practice: Acquire & Implement Acquire and Implement process description: AI2 Acquire and Maintain Application Software AI2.4 Application Security and Availability SDLC integration 7 Clive E. Waugh CISSP, C/EH

8 The framework in practice: Deliver & Support Deliver and Support process description: DS2 Manage Third-party Services DS2.3 Supplier Risk Management Vendor Assessments DS4 Ensure Continuous Service DS4.2 IT Continuity Plans BIA & Risk Assessment DS5 Ensure Systems Security DS5.5 Security Testing, Surveillance & Monitoring Regular Vulnerability Assessments 8 Clive E. Waugh CISSP, C/EH

9 The framework in practice: Monitor & Evaluate Monitor and Evaluate process description: ME1 Monitor & Evaluate IT Performance ME1.5 Board and Executive Reporting ME1.6 Remedial Actions ME2 Monitor & Evaluate Internal Control ME2.3 Control Exceptions ME2.4 Control Self-assessment ME2.5 Assurance of Internal Control ME2.6 Internal Control at Third Parties ME2.7 Remedial Actions 9 ME4 Provide IT Governance ME4.1 Establishment of an IT Governance Framework ME4.2 Strategic Alignment ME4.5 Risk Management Clive E. Waugh CISSP, C/EH

10 The framework in practice: RM Functions Four main Risk Management Functions: Risk Cataloging Risk Reporting Remediation Planning Risk Acceptance Handling 10

11 Risk Cataloging Process Flow External audit Security Internal audit Customer Other Initial Risk Assmt. Critical High Medium Low Queued Immediate Group and Segment Leaders Immediately address risk Risk Mgmt Dept leaders Weekly Prioritization Documented, prioritized risks Group Leaders (SMT) Senior BU Leaders Risk Repository Confirms Details As Documented 11

12 Risk Cataloging - Overview of Prioritization Standards Risk Prioritization Sessions are conducted on a weekly basis Risk Prioritization Committee membership consists of Risk Management Dept management staff Risk Prioritization Standards are as follows: 1) Risks are first ranked into quadrants as follows (definitions on subsequent slides): a) Critical b) High c) Medium d) Low 2) Risks within High and Medium quadrants are then force ranked by business unit, from highest risk to lowest. 12

13 Risk Cataloging Risk Management Dept Role Risk Management Department s role in Cataloging risk: 1) Escalates Critical risks immediately 2) Queues non-critical risks for review by Ops-Security mgt during regular prioritization sessions 3) Captures risk data including description, impact, likelihood, BU ownership, priority, ranking 4) Proposes strategies for the remediation of immediate risk, and of root cause 5) Educates Business Unit and requests confirmation of risk details as documented. 13

14 Risk Cataloging Business Unit Role Business Unit s role in cataloging risk: Both the Business Unit Manager and designated Risk Management Coordinator for the BU are: 1) Informed of new risks by RM department as they are cataloged 2) Reviews and acknowledges documented risk details. 14

15 Risk Reporting Process Flow Risk Mgmt Dept Reports Actionable Data Changes in status / nature of risk Top Risks / Metrics Understands BU Mgr Risk And Coordinator Top Risks / Metrics Risk Mgt Cmmte Understands Risk Top Risks / Metrics Board Understands Risk 15

16 Risk Reporting Risk Management Dept Role Risk Management Department s role in the risk reporting process: 1) Briefs BU to ensure an effective understanding of the impact and likelihood of failures associated with highest risk items, along with proposed remediation strategies. 2) Collects status of BU risk management activity. 3) Briefs Risk Management Committee regularly to ensure an effective understanding of the impact and likelihood of failures associated with highest risk items, along with proposed remediation strategies. 4) Briefs IFID Board of Directors regularly to ensure an effective understanding of the impact and likelihood of failures associated with highest risk items, along with planned remediation strategies. 16

17 Risk Reporting Business Unit Role Business Unit s role in the risk reporting process: 1) Obtains an understanding of the impact and likelihood of failures associated with highest risk items, along with proposed remediation strategies. of highest-risk items for use in BU remediation planning efforts (discussed later). 2) Provides changes in status or nature of risk to Risk Management Department 17

18 Risk Reporting Business Unit Coordinator Defined Theme: Each business unit that owns risk drives risk management activity as directed by the business unit manager. Accomplished by a coordinator within the business unit, as assigned by business unit management. Responsibilities: 1) Receives the same risk briefings that are delivered to the business unit manager and to the Risk Management Committee. 2) Reports changes in status or nature of risk to Risk Management Department. 3) Provides quarterly plans for remediation of risk, as committed to by the business unit manager. 4) Drives remediation activities as committed to by the business unit manager. 18

19 Risk Reporting Risk Management Committee Role Risk Management Committee s role in the risk reporting process: 1) Obtains an understanding of the impact and likelihood of failures associated with highest risk items, along with proposed remediation strategies, for use in monitoring and directing BU risk management efforts (discussed later). 19

20 Remediation Planning Process Flow Risk Mgmt Dept Consults with BU Ensure impact/likelihood understood Understands risk and bus. priorities, BU Mgr proposes And plans Coordinator Balance risk vs. business priorities Risk Mgt Cmmte Understands risk and bus. priorities, approves plans 20

21 Remediation Planning Risk Management Dept Role Risk Management Department s role in the remediation planning process: 1) Supports business unit as needed to ensure an effective understanding of the impact and likelihood of failures associated with highest risk items, along with proposed remediation strategies. 21

22 Remediation Planning Business Unit Role Business unit s role in the remediation planning process: 1) Balances the potential for loss associated with highest known risk items against other known business priorities in an effort to help protect against anticipated loss. 2) Develops and proposes roadmap plan to Risk Management Committee for approval, using a standard format that clearly reflects intended progress against known risks. 22

23 Remediation Planning Risk Mgt Committee Role Risk Management Committee s role in the remediation planning process: 1) Consults with Risk Mgt Dept to ensure an effective understanding of the impact and likelihood of failures associated with highest risk items, along with proposed remediation strategies. 2) Balances the potential for loss associated with highest known risk items against other known business priorities in an effort to protect against anticipated loss. 3) Reviews and approves proposed roadmap plans that clearly reflect intended progress against known risks. 23

24 Risk Acceptance Handling Process Flow BU Representative Develop and deliver proposal for acceptance of risk Risk Mgt Dept Recommends either acceptance or remediation BU chain of command Approves or rejects proposal for acceptance Risk Mgt Cmmtte Approves or rejects proposal for acceptance Balance risk vs. business priorities 24

25 Risk Acceptance Risk Management Dept Role Risk Management Department s role in the risk acceptance process: 1) Reviews proposal for acceptance of risk as presented by the business unit that owns the risk. 2) Ensures effective representation of the nature of the risk, including impact and likelihood of related failures. 3) Provides recommendation for either acceptance or remediation of risk for review by the business unit chain of command, and by the Risk Management Committee. 4) Supports Business Unit in escalating through the business unit chain of command, and in presentation to the Risk Management Committee. 5) Records and Retains the results of decisions made. 25

26 Risk Acceptance Business Unit Role Business Unit s role in the risk acceptance process: 1) Develops proposal for acceptance of risk for review by the Risk Management Department. 2) Escalates proposal for acceptance of risk, including recommendation from the Risk Management Department, through the business unit chain of command. (Uses standard / consistent format) 3) Presents proposal, to the Risk Management Committee. (Uses standard / consistent format) 26

27 Risk Acceptance Risk Management Committee Role Risk Management Committee s role in the risk acceptance process: 1) Reviews proposal for acceptance of risk as presented by the business unit and Risk Management Department. (Uses standard / consistent format) 2) Votes for either acceptance or remediation of risk. 27

28 Documentation 28

29 ~ Charter ~ Enterprise Risk Management Enterprise Risk Management Mission Statement Deliver for our end users secure, always-available service and support in a cost effective manner that builds confidence. Responsibility Responsibilities include, but are not limited to, the following activities: Contributes to the strategic direction of offerings to customers Defining and publishing security policy requirements Implementation and maintenance of security infrastructure Administering access and privilege Security oversight of system and application development Security testing of the enterprise infrastructure Performing vendor and partner security assessments Identifying, prioritizing, managing the status of known risks issues Authority The Enterprise Risk Management Operations team is authorized to: Publish enterprise-level security policy requirements, and enforce Obtain the necessary assistance of personnel from related Business Units The Risk Management and Security department s authority extends to all risks 29

30 The Framework in practice Documentation Procedures Documentation: SOP: Risk Reporting Risk Management Committee Briefing and Decision Making SOP: Division President Briefing and Decision Making SOP: Escalation of Issues and Exceptions SOP: Business Impact Analysis (BIA) SOP: Asset Vulnerability Identification SOP: Risk Prioritization, Ranking and Approval SOP: Risk Inventory Maintenance SOP: Risk Treatment Planning SOP: Ongoing Coordination and Status Collection 30 Clive E. Waugh CISSP, C/EH

31 CobiT Case Study??? Questions??? 31

Services Providers. Ivan Soto

Services Providers. Ivan Soto SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed

More information

Ann Geyer Tunitas Group. CGEIT Domains

Ann Geyer Tunitas Group. CGEIT Domains 1 CGEIT Exam Prep May 17, 2011 Ann Geyer Tunitas Group CGEIT Domains 2 Job Practice Areas by Domain 25% IT Gov Frameworks 20% Risk Mgmt 15% Strategic Alignment 15% Value Delivery 13% Resource Mgmt 12%

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page

More information

Using QUalysgUard to Meet sox CoMplianCe & it Control objectives

Using QUalysgUard to Meet sox CoMplianCe & it Control objectives WHITE PAPER Using QualysGuard to Meet SOX Compliance & IT Objectives Using QualysGuard To Meet SOX Compliance and IT Objectives page 2 CobIT 4.0 is a significant improvement on the third release, making

More information

IT Governance and Control: An Analysis of CobIT 4.1. Prepared by: Mark Longo

IT Governance and Control: An Analysis of CobIT 4.1. Prepared by: Mark Longo IT Governance and Control: An Analysis of CobIT 4.1 Prepared by: Mark Longo December 15, 2008 Table of Contents Introduction Page 3 Project Scope Page 3 IT Governance.Page 3 CobIT Framework..Page 4 General

More information

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM) Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security

More information

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Office of the Chief Information Officer

Office of the Chief Information Officer Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business

More information

How Global Data Management (GDM) within J&J Pharma is SAVE'ing its Data. Craig Pusczko & Chris Henderson

How Global Data Management (GDM) within J&J Pharma is SAVE'ing its Data. Craig Pusczko & Chris Henderson How Global Data Management (GDM) within J&J Pharma is SAVE'ing its Data Craig Pusczko & Chris Henderson Abstract See how J&J Pharma organizational alignment drove the evolution of Global Data Management

More information

CLASSIFICATION SPECIFICATION FORM

CLASSIFICATION SPECIFICATION FORM www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information

More information

Taking Information Security Risk Management Beyond Smoke & Mirrors

Taking Information Security Risk Management Beyond Smoke & Mirrors Taking Information Security Risk Management Beyond Smoke & Mirrors Evan Wheeler Omgeo Session ID: GRC-107 Insert presenter logo here on slide master. See hidden slide 4 for directions Session Classification:

More information

RISK MANAGEMENT OVERVIEW 2011 RISK CONFERENCE SPONSORED BY THE FEDERAL RESERVE BANK OF CHICAGO AND DEPAUL UNIVERSITY

RISK MANAGEMENT OVERVIEW 2011 RISK CONFERENCE SPONSORED BY THE FEDERAL RESERVE BANK OF CHICAGO AND DEPAUL UNIVERSITY RISK MANAGEMENT OVERVIEW 2011 RISK CONFERENCE SPONSORED BY THE FEDERAL RESERVE BANK OF CHICAGO AND DEPAUL UNIVERSITY PRESENTED BY: LEN WIATR, CHIEF RISK OFFICER Len s Risk Management Philosophy Build a

More information

Institutional Data Governance Policy

Institutional Data Governance Policy Institutional Data Governance Policy Vanderbilt University and Medical Center Effective Date: 07/09/2014 Revision Date: N/A DOCUMENT CONTROL Document Title Institutional Data Governance Policy Summary:

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

EXPLORING THE CAVERN OF DATA GOVERNANCE

EXPLORING THE CAVERN OF DATA GOVERNANCE EXPLORING THE CAVERN OF DATA GOVERNANCE AUGUST 2013 Darren Dadley Business Intelligence, Program Director Planning and Information Office SIBI Overview SIBI Program Methodology 2 Definitions: & Governance

More information

IT Governance (Worthwhile Exercise?) January 10, 2013 Presented by Chad Murphy, CISA

IT Governance (Worthwhile Exercise?) January 10, 2013 Presented by Chad Murphy, CISA IT Governance (Worthwhile Exercise?) January 10, 2013 Presented by Chad Murphy, CISA Things we hear! You are making it much too complex. It is an IT problem! We do not know where to start! We do this already!

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis

More information

The role of IT in business-led Data Governance. by First San Francisco Partners

The role of IT in business-led Data Governance. by First San Francisco Partners The role of IT in business-led Data Governance by First San Francisco Partners 2 It s been said the first step in solving any problem is recognizing there is one. Fortunately today, more and more companies

More information

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013 Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices April 10, 2013 Today's Agenda: Key Topics Defining IT Governance IT Governance Elements & Responsibilities

More information

Achieving SOX Compliance with Masergy Security Professional Services

Achieving SOX Compliance with Masergy Security Professional Services Achieving SOX Compliance with Masergy Security Professional Services The Sarbanes-Oxley (SOX) Act, also known as the Public Company Accounting Reform and Investor Protection Act of 2002 (and commonly called

More information

Sound Transit Internal Audit Report - No. 2014-3

Sound Transit Internal Audit Report - No. 2014-3 Sound Transit Internal Audit Report - No. 2014-3 IT Project Management Report Date: Dec. 26, 2014 Table of Contents Page Background 2 Audit Approach and Methodology 2 Summary of Results 4 Findings & Management

More information

Project Management Office Charter

Project Management Office Charter Old Dominion University Office of Computing and Communication Services Project Management Office Charter Version: 1.0 Last Update: February 18, 2010 Created By: Anthony Fox, PMP OCCS Project Management

More information

Enabling Data Quality

Enabling Data Quality Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &

More information

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to

More information

Fundamentals of Risk Management Understanding, evaluating and implementing effective risk management

Fundamentals of Risk Management Understanding, evaluating and implementing effective risk management SECOND EDITION Fundamentals of Risk Management Understanding, evaluating and implementing effective risk management Paul Hopkin KoganPage LONDON PHILADELPHIA NEW DELHI CONTENTS List of figures xiv List

More information

Location of the job: CFO Revenue Assurance

Location of the job: CFO Revenue Assurance JOB PROFILE Title of position: Manager: Revenue Assurance Operations Number of subordinates: 5-10 Location of the job: CFO Revenue Assurance Level: 3 Position Code: Time span: 2-3 years Key Performance

More information

5 FAH-5 H-510 CONFIGURATION MANAGEMENT

5 FAH-5 H-510 CONFIGURATION MANAGEMENT 5 FAH-5 H-500 CONFIGURATION MANAGEMENT 5 FAH-5 H-510 PROJECT DEVELOPMENT AND CHANGE CONTROL (CT:ITS-4; 06-21-2012) (Office of Origin: IRM/BMP/GRP/GP) (Updated only to revise Office of Origin) 5 FAH-5 H-511

More information

Effective Enterprise Risk Management with ErmsCo ERM Foundation

Effective Enterprise Risk Management with ErmsCo ERM Foundation Executive Brief Effective Enterprise Risk Management with ErmsCo ERM Foundation Introduction to ErmsCo About ErmsCo ErmsCo is a consulting and training firm that focuses on assisting financial institutions

More information

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES SOX COMPLIANCE Achieving SOX Compliance with Professional Services The Sarbanes-Oxley (SOX)

More information

Final. North Carolina Procurement Transformation. Governance Model March 11, 2011

Final. North Carolina Procurement Transformation. Governance Model March 11, 2011 North Carolina Procurement Transformation Governance Model March 11, 2011 Executive Summary Design Approach Process Governance Model Overview Recommended Governance Structure Recommended Governance Processes

More information

Intelligent Customer Function (ICF)

Intelligent Customer Function (ICF) CAPABILITY AUDIT FOR HEIs Higher Education Institutions (HEIs) should organically develop their own to successfully manage the process of strategic sourcing. The capability audit provides an assessment

More information

RISK BASED AUDITING: A VALUE ADD PROPOSITION. Participant Guide

RISK BASED AUDITING: A VALUE ADD PROPOSITION. Participant Guide RISK BASED AUDITING: A VALUE ADD PROPOSITION Participant Guide About This Course About This Course Adding Value for Risk-based Auditing Seminar Description In this seminar, we will focus on: The foundation

More information

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie

More information

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA ARCHER OPERATIONAL RISK MANAGEMENT RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume

More information

Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010

Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010 Dallas IIA Chapter / ISACA N. Texas Chapter Auditing Tuesday, October Project 20, 2009 Management Controls January 7, 2010 Table of Contents Contents Page # Project Management Office Overview 3 Aligning

More information

Designing a Data Governance Framework to Enable and Influence IQ Strategy

Designing a Data Governance Framework to Enable and Influence IQ Strategy Designing a Data Governance Framework to Enable and Influence IQ Strategy Elizabeth M. Pierce University of Arkansas at Little Rock PG 135 Overview of Corporate and Key Asset Governance (Reproduced from

More information

Risk and Contingency Planning. Today s Topics. Key Terms. A Vital Component of Your ICD-10 Program

Risk and Contingency Planning. Today s Topics. Key Terms. A Vital Component of Your ICD-10 Program Risk and Planning A Vital Component of Your ICD-10 Program Today s Topics Key Terms Why is Risk Management Critical for ICD-10? Effective Risk Management and Best Concepts ICD-10 Risk Management Examples

More information

Risk Management to Contingency Planning. ICD-10 Operational Readiness Keith Hatch, Florida Blue (BCBS of Florida), Senior Manager

Risk Management to Contingency Planning. ICD-10 Operational Readiness Keith Hatch, Florida Blue (BCBS of Florida), Senior Manager Risk Management to Contingency Planning ICD-10 Operational Readiness Keith Hatch, Florida Blue (BCBS of Florida), Senior Manager Agenda Definitions Relationship between risk management, contingency planning

More information

Integrating ITSM and Cloud into Enterprise IT Governance

Integrating ITSM and Cloud into Enterprise IT Governance ITSM and Cloud Computing: Integrating ITSM and Cloud into Enterprise IT Governance Presented by: Eric Marks AgilePath Corporation President & CEO Agenda ITSM in Enterprise Governance Context ITSM Integration

More information

Phil Marshall Black Duck Software. 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved.

Phil Marshall Black Duck Software. 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved. Open Source Component Governance and Management Using COBIT Phil Marshall Black Duck Software 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved. Welcome Type in questions using the Ask A Question

More information

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management Course: Information Security Management in e-governance Day 1 Session 3: Models and Frameworks for Information Security Management Agenda Introduction to Enterprise Security framework Overview of security

More information

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners Agile Master Data Management TM : Data Governance in Action A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary What do data management, master data management,

More information

Service Level Management

Service Level Management Process Guide Service Level Management Company ABC Service Improvement Program (SIP) Process Guide Service Level Management Table of Contents Document Information... 3 Approval... 4 Section 1: Process

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?

Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed? Information Security Incident Management Program What is an Incident Management Program? It is a coordinated program of people, processes, tools and technology, which prevents and manages information security

More information

Managing Open Source Code Best Practices

Managing Open Source Code Best Practices Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate

More information

Enterprise Risk Management

Enterprise Risk Management Cayman Islands Society of Professional Accountants Enterprise Risk Management March 19, 2015 Dr. Sandra B. Richtermeyer, CPA, CMA What is Risk Management? Risk management is a process, effected by an entity's

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

Department of Veterans Affairs VA Directive 0054. VA Enterprise Risk Management (ERM)

Department of Veterans Affairs VA Directive 0054. VA Enterprise Risk Management (ERM) Department of Veterans Affairs VA Directive 0054 Washington, DC 20420 Transmittal Sheet April 8, 2014 VA Enterprise Risk Management (ERM) 1. REASON FOR ISSUE: This directive provides guidelines to help

More information

Developing and Implementing a Balanced Scorecard: A Practical Approach

Developing and Implementing a Balanced Scorecard: A Practical Approach RL Consulting Developing and Implementing a Balanced Scorecard: A Practical Approach White Paper Prepared by: Rick Leopoldi March 31, 2004 Copyright 2004. All rights reserved. Duplication of this document

More information

Immunization Information Systems (IIS) Strategic Plan

Immunization Information Systems (IIS) Strategic Plan (NCIRD) Immunization Information Systems (IIS) Strategic Plan Executive Summary Summary of IIS Strategic Plan v1.3 finalized on November 30, 2013 Last Reviewed February 2016 Table of Contents 1 Introduction...

More information

Service Portfolio Management PinkVERIFY

Service Portfolio Management PinkVERIFY -11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to

More information

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics

More information

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.

More information

How SAP Business Objects Dashboards Are Improving Decision Making at Caterpillar Parts Distribution

How SAP Business Objects Dashboards Are Improving Decision Making at Caterpillar Parts Distribution How SAP Business Objects Dashboards Are Improving Decision Making at Caterpillar Parts Distribution Greg Lauer & John Buckhold Caterpillar Inc. SESSION CODE: 0705 DASHBOARDS Dashboards at Cat Parts Distribution

More information

Taking a Proactive Approach to Crisis Management while Maintaining Business Continuity in a Tiered Environment

Taking a Proactive Approach to Crisis Management while Maintaining Business Continuity in a Tiered Environment Taking a Proactive Approach to Crisis Management while Maintaining Business Continuity in a Tiered Environment John Linse Director of Business Continuity Services, EMC 1 Setting the Stage Taking a Proactive

More information

Information Technology Project Oversight Framework

Information Technology Project Oversight Framework i This Page Intentionally Left Blank i Table of Contents SECTION 1: INTRODUCTION AND OVERVIEW...1 SECTION 2: PROJECT CLASSIFICATION FOR OVERSIGHT...7 SECTION 3: DEPARTMENT PROJECT MANAGEMENT REQUIREMENTS...11

More information

Building Security In:

Building Security In: #CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

14 October 2015 ISACA Curaçao Conference By: Paul Helmich

14 October 2015 ISACA Curaçao Conference By: Paul Helmich Governance, Risk & Compliance A practical approach 14 October 2015 ISACA Curaçao Conference By: Paul Helmich Topics today What is GRC? How much of all the GRC literature, tools, etc. do I need to study

More information

July 6, 2015. Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263

July 6, 2015. Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263 July 6, 2015 Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263 Re: Security Over Electronic Protected Health Information Report 2014-S-67

More information

Assessing & Managing IT Risk

Assessing & Managing IT Risk Assessing & Managing IT Risk ISACA Pittsburgh Chapter Meeting October 18, 2010 Agenda Introductions IT Risk Assessment An Approach That Makes Sense to IT Measuring Risk Determining Results Audit Planning

More information

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards

More information

Compliance Policy AGL Energy Limited

Compliance Policy AGL Energy Limited Compliance Policy AGL Energy Limited November 2013 Table of Contents 1. About this Document... 3 2. Policy Statement... 4 3. Purpose... 4 4. AGL Compliance Context... 4 5. Scope... 5 6. Objectives... 5

More information

The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP Presented by Mike O. Villegas, CISA, CISSP Agenda Information Security (IS) Vision at Newegg.com Typical Issues at Most Organizations Information Security Governance Four Inter-related CoBIT Domains ISO

More information

8 Best Practices for IT Security Compliance

8 Best Practices for IT Security Compliance ROADMAP TO COMPLIANCE ON THE IBM SYSTEM i WHITE PAPER APRIL 2009 Table of Contents Prepare an IT security policy... 4 How are users accessing the system?... 5 How many powerful users are on the system?...

More information

RISK MANAGEMENT POLICY

RISK MANAGEMENT POLICY RISK MANAGEMENT POLICY This is in compliance with clause 49 of Listing Agreement entered into between Kwality Limited (hereinafter referred to as the Company ) and Stock Exchange(s), and the provisions

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

Dr. Gad J. Selig, PMP, COP Managing Partner, GPS Group, Inc., Director, Technology Management & Dual Graduate Business Degree Programs & Associate

Dr. Gad J. Selig, PMP, COP Managing Partner, GPS Group, Inc., Director, Technology Management & Dual Graduate Business Degree Programs & Associate Panel Discussion Sharing Industry Knowledge Successful Business/IT Alignment, Execution & Governance Best Practices: Why, What and How? Society for Information Management March 15, 2006 SIM March 15, 2007

More information

BIG DATA KICK START. Troy Christensen December 2013

BIG DATA KICK START. Troy Christensen December 2013 BIG DATA KICK START Troy Christensen December 2013 Big Data Roadmap 1 Define the Target Operating Model 2 Develop Implementation Scope and Approach 3 Progress Key Data Management Capabilities 4 Transition

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012

The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012 The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only Agenda Introduction Basic program components Recent trends in higher education risk management Why

More information

From Capability-Based Planning to Competitive Advantage Assembling Your Business Transformation Value Network

From Capability-Based Planning to Competitive Advantage Assembling Your Business Transformation Value Network From Capability-Based Planning to Competitive Advantage Assembling Your Business Transformation Value Network Marc Lankhorst, BiZZdesign Iver Band, Cambia Health Solutions INTRODUCTIONS 2 1 Marc Lankhorst

More information

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations

More information

Pharmaceutical Compliance and Regulatory Congress 2009

Pharmaceutical Compliance and Regulatory Congress 2009 Pharmaceutical Compliance and Regulatory Congress 2009 Compliance Program Elements Track I: How Program Management Can Keep You On Track Edward H. Leskauskas Director, Compliance and Ethics Operations

More information

Data Governance Primer. A PPDM Workshop. March 2015

Data Governance Primer. A PPDM Workshop. March 2015 Data Governance Primer A PPDM Workshop March 2015 Agenda - SETTING THE STAGE - DATA GOVERNANCE BASICS - METHODOLOGY - KEYS TO SUCCESS Copyright 2015 Noah Consulting LLC. All Rights Reserved. Industry Drivers

More information

ITAG RESEARCH INSTITUTE

ITAG RESEARCH INSTITUTE ITAG RESEARCH INSTITUTE Control and Governance Maturity Survey Establishing a reference benchmark and a self-assessment tool Erik Guldentops Wim Van Grembergen Steven De Haes Control and Governance Maturity

More information

The Challenges and Myths of Sarbanes-Oxley Compliance

The Challenges and Myths of Sarbanes-Oxley Compliance W H I T E P A P E R The Challenges and Myths of Sarbanes-Oxley Compliance Meeting the requirements of regulatory legislation on the iseries. SOX-001 REV1b FEBRUARY 2005 Bytware, Inc. All Rights Reserved.

More information

Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL

Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL EGI Technical Forum 2011, Lyon (France) September 22, 2011 Dr. Thomas Schaaf www.gslm.eu EMERGENCE TECH LTD. The

More information

Executive Dashboards:

Executive Dashboards: Executive Dashboards: An Effective Tool for Managing Enterprise Project Risk In the current health IT environment, for most provider organizations, enterprise-wide EHR implementation projects represent

More information

The Role of Internal Audit In Business Continuity Planning

The Role of Internal Audit In Business Continuity Planning The Role of Internal Audit In Business Continuity Planning Dan Bailey, MBCP Page 0 Introduction Dan Bailey, MBCP Senior Manager Protiviti Inc. dan.bailey@protiviti.com Actively involved in the Information

More information

ILO. Information Technology Governance Committee (ITGC) Charter

ILO. Information Technology Governance Committee (ITGC) Charter ILO Information Technology Governance Committee (ITGC) Charter TABLE OF CONTENTS Charter... 1 Purpose... 1 Authority... 1 Membership... 1 Responsibilities... 2 Responsibilities of the ITG Committee...

More information

Data Governance Update. BOE workshop January 30, 2014

Data Governance Update. BOE workshop January 30, 2014 Data Governance Update BOE workshop January 30, 2014 IT Leadership Brett Miller, Chief Technology Officer Dave Reid, Director Enterprise Application Architecture Chris Paschke, Manager Information Security

More information

Service-Oriented Architecture Maturity Self-Assessment Report. by Hewlett-Packard Company. Developed for Shrinivas Yawalkar Yawalkar of CTS

Service-Oriented Architecture Maturity Self-Assessment Report. by Hewlett-Packard Company. Developed for Shrinivas Yawalkar Yawalkar of CTS Service-Oriented Architecture Maturity Self-Assessment Report by Hewlett-Packard Company Developed for Shrinivas Yawalkar Yawalkar of CTS September 18, 2007 INTRODUCTION Thank you for completing the HP

More information

April 20, 2006. Integrating COBIT into the IT Audit Process (Planning, Scope Development, Practices)

April 20, 2006. Integrating COBIT into the IT Audit Process (Planning, Scope Development, Practices) Integrating COBIT into the IT Audit Process (Planning, Scope Development, Practices) April 20, 2006 San Francisco ISACA Chapter Luncheon Seminar Presented By Lance M. Turcato, CISA, CISM, CPA Deputy City

More information

Asset Management: A Best Practices Guide

Asset Management: A Best Practices Guide Asset Management: A Best Practices Guide Introduction This guide will help you understand: What asset management means. Purpose The benefits of asset management. Best practices in asset management. How

More information

Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED

Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED Army Regulation 702 11 Product Assurance Army Quality Program Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED SUMMARY of CHANGE AR 702 11 Army Quality Program This major

More information

Feature. Developing an Information Security and Risk Management Strategy

Feature. Developing an Information Security and Risk Management Strategy Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide

More information

Growing Your Business Through The Project Management Office

Growing Your Business Through The Project Management Office Growing Your Business Through The Project Management Office Increasing Throughput Rate Achieving higher customer satisfaction Strengthening the weakest link Identifying the bottlenecks Reducing the program

More information

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 Agenda Key Definitions Risks Business Continuity Management Program BCM Capability Assessment Process BCM Value Proposition

More information

BC / DR Implementation Tying Disaster Recovery Investment to Measurable Business Value

BC / DR Implementation Tying Disaster Recovery Investment to Measurable Business Value BC / DR Implementation Tying Disaster Investment to Measurable Business Value Continuity Insights Conference May 16-18, 2005 Agenda Purpose Discuss best practice process and tools that might be leveraged

More information

Enterprise Application Security Program

Enterprise Application Security Program Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader Agenda Why is AppSec important? Why

More information

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT How Microsoft runs IT Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT 2 Source: Accenture Cloudrise: Rewards & Risks at the Dawn of Cloud Computing, November 2010 3 Source: Accenture Cloudrise:

More information

Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation

Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation Tying It All Together: Practical ERM Integration Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation November 16, 2007 1 Agenda Basis for ERM Integration ERM Objectives ERM Focus

More information

IT Governance: framework and case study. 22 September 2010

IT Governance: framework and case study. 22 September 2010 IT Governance: framework and case study Presenter Yaowaluk Chadbunchachai Advisory Services Ernst & Young Corporate Services Limited Presentation topics ERM and IT governance IT governance framework IT

More information

Module 6 Essentials of Enterprise Architecture Tools

Module 6 Essentials of Enterprise Architecture Tools Process-Centric Service-Oriented Module 6 Essentials of Enterprise Architecture Tools Capability-Driven Understand the need and necessity for a EA Tool IASA Global - India Chapter Webinar by Vinu Jade

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

Wilhelmenia Ravenell IT Manager Eli Lilly and Company

Wilhelmenia Ravenell IT Manager Eli Lilly and Company Wilhelmenia Ravenell IT Manager Eli Lilly and Company Agenda Introductions The Service Management Framework Keys of a successful Service management transformation Why transform? ROI and the customer experience

More information