Questioning the need for separate IT risk management frameworks
|
|
|
- Stephany Potter
- 10 years ago
- Views:
Transcription
1 Questioning the need for separate IT risk management frameworks Nicolas Racz 1, Edgar Weippl 1,Andreas Seufert 2 1 Institut für Softwaretechnik und Interaktive Systeme TU Wien Favoritenstr. 9-11/ Wien, Austria 2 Institut für Business Intelligence, Steinbeis Hochschule Berlin {racz, eweippl}@ifs.tuwien.ac.at; [email protected] Abstract: The growing importance of enterprise risk management and the resulting integration efforts put the need for separate IT risk management frameworks in question. In this research we analyse common and distinct elements of the COSO enterprise risk management and ISACA Risk IT frameworks. The analysis affirms the hypothesis that separate IT risk management frameworks are redundant. 1 Motivation The alignment of IT with business objectives is an important part of contemporary IT management. Ever since the creation of the terms enterprise risk management (ERM) and governance, risk, and compliance (GRC) the search for integration possibilities within these disciplines has been ongoing. However as of today different frameworks are used for the management of business risks and IT risks. The emergence of horizontal integration (across disciplines and across departments) and vertical integration (across the organisational hierarchyand across process levels) has helped to realise that formerly separate approaches are often redundant [Mi07], which provokes the authors to establish the hypothesis that a separate management of IT risks might not be justified. 2 Status quo in research andpractice A quick scan of the ACM, SpringerLink and EmeraldInsight databases shows that in research as of today enterprise risk management and IT risk management (IT-RM) have hardlyever crossed paths. FoleyusesERM processes tomanage securityrisks [Fo09]. In their high-level process model for IT GRC management, Racz et al. [RWS10] use COSO ERM [CO04] as risk management standard, assuming that the selection of a framework that does not focus on IT would facilitate integration with non-it GRC in future research. 245
2 In practice enterprise risk management and IT risk management are also treated as separate topics. With ISO 31000:2009 [ISO09] (superseding AS/NZS 4360:2004 [AS04]) and ISO/IEC 27005:2008 [ISO08] the International Organization for Standardization treats ERM and information security risk management (including IT- RM) in two distinct standards. ISO does not even reference ISO/IEC The alignment of IT with business in practice is mainly done through the IT governance and management frameworks COBIT (Control Objectives for Information and related Technology [ITG07]) and ITIL (IT Infrastructure Library [OGC07]). These frameworks suggest enablingalignment through deriving IT goals from business goals. We can conclude that while the connection of IT risks with business objectives is enforced at present, the merger of IT-RM with ERM on a process level is hardly looked at. The frame of reference for research of integrated GRC [Ra10] recommends identifying integration possibilities on the strategic, process, organisational and technology level. Strategically, through the alignment of IT goals with business goals, the integration is already ongoing. We suggest to take the next step and to review potential synergies oferm and IT-RM on the process level. Following the claim of ERM to cover all risks ofanenterprise, IT-RM should either be completely covered by ERM and therefore be redundant; or it might enhance the broader ERM through detailed consideration ofitspecifics in the risk management process. 3 Methodology As a first step in evaluating our hypothesis we decided to carry out an exemplary comparison of an ERM framework with an IT-RM framework. Of course a comparison of two frameworks is not representative, but we selected widely-used frameworks (see below) that therefore suffice to provide afirst indication about the hypotheses validity. The results should then be discussed with other experts at the Informatik 2010 GRC workshop before taking further action. The methodology applied consists of four steps. First, we selected a framework for ERM and one for IT-RM. Second, the frameworks commonalities were identified. Third, we analysed the references of the ERM frameworktoitrisk and vice versa. Finally we discussed and summed upthe results. In the selection process for an ERM framework we considered ISO 31000:2009 and COSO ERM, two well-known standards for ERM. Their process models are very similar. On a high level they only differ in their wording. Establishing the context in the ISO standard corresponds to the internal environment of COSO ERM, risk evaluation and risk treatment equal risk response and control activities, etc. Eventually we opted for COSO ERM, as it is the successor ofthe widely implemented COSO framework for internal control [CO92], a de-facto standard explicitly acknowledged in the US Public Company Accounting Oversight Board Auditing Standard No. 5 for financial reporting [PCA07]. The standard is referenced in the Sarbanes Oxley Act of 2002, which ofall regulations passed in the new millennium probably has the strongest impact on risk management and internal control systems. 246
3 For IT risk management we chose the ISACA Risk IT Framework because it complements COBIT, which is arguably the most appropriate control and governance framework used by many organisations world-wide to ensure alignment of IT and business goals [RYC04]. The framework s importance is expected to grow since the new COBIT version 5, which is currently in development, plans to consolidate and integrate the Risk IT framework [ISA10]. ISO/IEC 27005:2008 was also considered. As it includes all aspects of information security (including non-it aspects), its scope surpasses the ISACA framework, which is limited to information technology. In our opinion Risk IT is more detailed, and it draws out the specifics of IT-RM more clearly. The identification of the frameworks commonalities in the second phase of our research was done through a mapping of the described processes of ISACA Risk IT to those of COSO ERM. The documentation of COSO ERM proved to be a hurdle. On the highest level the framework consists of seven processes and the internal environment component. Unfortunately the processes are not broken down. Instead COSO just names the basic sub-components, such as risk tolerance or inherent and residual risk. In order tomap the processes of ISACA Risk IT, we had togothrough the complete description ofthe COSO componentstofind ifthe same processes were included. The qualitative analysis of references from ERM to IT-RM and vice versa in the third research step was followed by a descriptive discussion and summary of the insights gained in the researchprocess. 4 Results and discussion 4.1Mapping of ISACA RiskITtoCOSO ERM Our comparison of risk management frameworks is based on the assumption that risk in ERM has the same characteristics as risk in IT-RM. In COSO ERM, risk is the possibility that an event will occur and adversely affect the achievement of objectives; events with a potentially positive impact may offset negative impacts or they may represent opportunities [Co04]. Throughout the framework risk then also refers to upside risk (opportunities). According to ISACA Risk-IT, ITrisk is acomponent of the overall risk universe of the enterprise [...]. IT risk is business risk [...]. It consists of ITrelated events and conditions that could potentially impact the business [ISA09]. The two frameworksconsequentlyshare a common understandingofthe term risk. ISACA Risk-IT consists of the three processes risk governance, risk evaluation, and risk response on level one, with three sub-processes each on level two. Level three comprises 43 processes. COSO ERM on the other hand describes 8high level processes with 41 sub-components. While the ERM framework is more profound on the internal environment component and on risk aggregation, Risk IT is more specific when it comes to IT specific and communication processes. Still, all but seven of the IT-RM processes caneasilybe mapped to COSO components (see appendix A). 247
4 Two of the exceptions deal with ERM integration: RG2.2: Co-ordinate IT risk strategy and business risk strategy, and RG2.3: Adapt IT risk practices to enterprise risk practices. They treat the alignment of IT and business risks on a strategic and on a process level; we will analyse them later on in the section about ERM references in the IT-RM framework. Three other processes that could not be mapped belong to the process group RG3: Make risk-aware business decisions : RG3.1: Gain management buy-in for the IT risk analysis approach, RG3.2: Approve IT risk analysis, and RG3.5: Prioritise IT risk response activities. Management buy-in for risk analysis approaches and their approval is not explicitly mentioned in COSO ERM, but it could seamlessly be integrated with the internal environment component. Prioritisation of response activities is probably so self-evident that COSO ERM does not highlight it; in COSO the prioritisation could be part of risk response. Furthermore the processes RE2.4: Perform a peer review of IT risk analysis and RE3.3: Understand IT capabilities do not exist in COSO ERM. Peer reviews are a control mechanism that can be seamlessly included in the ERM process. Understanding IT capabilities is an extremely general process that is a prerequisite for any kind of IT activity, therefore suitable to be added tothe internal environment component of COSO ERM. As we can see, drawing from the standards IT risks may be treated like any other risk, as the IT-RM framework is completely absorbed in COSO ERM, apart from the ERM integration specifics (RG2.2, RG2.3) analysed below. The ISACA framework does not explain why an IT-specific risk management framework in the hierarchical relationship to ERM would be necessary. It even disposes of the distinction by stating that IT riskis business risk, consisting of IT-related events that could potentially impact the business [ISA09]. Thus the need for separate IT risk frameworks is questionable. It seems to be owed more to the complexity of IT, to habits and to the separation of IT and business responsibilities in modern organisationsthantoareal business reason. 4.2 References ofcoso ERM to ISACA RiskITand vice versa In fact the Risk ITFramework (RG1.1) recommends taking atop-down, end-to-end look at business services and processes and identifying the major points of IT support. However it does little to support this advice. The relation toerm is explicitly treated in the framework. Integrate with ERM as a sub-process of risk governance states as goal to integrate the IT risk strategy and operations with the business strategic risk decisions that have been made at the enterprise level. Five key activities shall help achieve this goal. Three of them are governance processes indispensable for any risk domain: establishing and maintaining accountability for IT-RM (RG2.1), providing adequate resources for IT-RM (RG2.4) and providing independent assurance over IT- RM (RG2.5). RG2.1 involves business with IT risk through risk ownership and the ability to address IT risk issues. RG2.4 weighs investing resources for IT risks with investments in competing business risk issues, thus surpassing the IT risk domain and respecting all risk domainsoferm. RG2.5 actuallyisnot ERM-specific at all. Consequently we are left with the two other processes allegedly dealing with ERM integration that could not be mapped to COSO ERM before: co-ordinate IT risk 248
5 strategy and business risk strategy (RG2.2) and adapt IT risk practices to enterprise risk practices (RG2.3). RG2.2 requires to integrate any IT specifics into one enterprise approach and to define the IT department s role in operational risk management. Existing ERM principles and views of risk should be used wherever possible. How this integration works is not explained. RG2.3 demands that the business context for IT, and ERM expectations, activities and methods relevant to IT-RM be understood. IT-RM should be enhanced with useful ERM activities, ERM expectations should be met, and methods of other functions should be identified. The gaps between IT risk and ERM shall be closed but the frameworkowes a clear explanation ofhow this could be done. The COSO ERM framework onthe other hand gives even less advice on IT-RM. It is only high-level guidance as far as IT is concerned, but specifics of IT risk management may still be considered on lower process levels [Mo07]. It mentions the importance of information systems controls due to the widespread reliance on information systems [CO04]. General controls shall ensure the continued, proper operation of information systems, while application controls ensure completeness, accuracy and validity of information. General controls are further subdivided into controls for information technology management, information technology infrastructure, security management and software acquisition, development and maintenance. Apart from these controlrelated hints there is no detailed reference in COSO ERM to information technology. IT risks are not even mentioned. Thus the COSO ERM document remains on a very high level, not helpingpractitioners deal with IT risksinthe ERM context. 4.3 Discussion Drawing onthe results wesee the hypotheses that a separate framework for IT-RM might not be necessary preliminarily affirmed. ISACA implies a hierarchical structure between ERM and IT-RM, but our research rather suggests that the IT-RM framework might inhibit the integration with ERM through introduction of a redundant framework into the process. Certainly the comparison oftwo frameworks is not sufficient to prove the hypothesis, but it is a hint that further efforts to confirm the assertion are worthwhile. Future research would have to provide real case studyexamples to prove the point. In practice today IT-RM is started within the IT organisation and it is aligned with business mainly through business objectives. ERM is a top-down approach, and IT-RM is top-down within IT, but bottom-up on the enterprise level, as IT risksare analysed and subsequently linked to business objectives and quantifications from operational risk management. For example an IT risk manager might look at a database and identify the data therein, then find out which applications it is used in, next look at which business processes they support and, eventually, what the (financial) impact on these processes would be if the data lost itsintegrity, validity, privacyoravailability[rs09]. Historically the coexistence of ERM and IT-RM can be explained because enterprise-wide approaches to risk have only emerged over the last decade (COSO ERM as the first ERM framework was only published in 2004). IT-RM meanwhile has been around for muchlonger due to ever-present IT security and operational issues. 249
6 We argue that the more reasonable way to manage risks would be to follow a business process top-down to all its enabling resources, be they human or natural resources, technology or information. Starting at the process level, business would have to consult IT as part of the ERM exercise to deliver the IT resources linked to a specific process on the application, data and infrastructure level. Then the eventsand risks(e.g. data loss due to a virus) could be analysed hand-in-hand by business and IT. The main advantage of this end-to-end approach is that only relevant, value-creating business processes would be considered, and that they could be prioritised early-on. 5 Conclusion and future research The analysis of the COSO ERM and ISACA Risk IT frameworks has shown that the need for a separate IT-RM framework indeed is questionable. The majority of IT-RM processes match the ERM components; the few remaining processes can be integrated with ERM. We recommend future research to evaluate the possibility of creating an integrated approach to IT risks within enterprise risk management that makes the applicationofseparate IT-RM frameworks redundant. Bibliography [AS04] AS/NZS 4360:2004. Risk management. AS/NZS, [CO92] COSO: Internal control integrated framework [CO04] COSO: Enterprise risk management framework [Fo09] Foley, S.: SecurityRisk Management usinginternal Controls. WISG, [ISA09] ISACA: TheRiskITFramework. ISACA, Rolling Meadows, [ISA10] ISACA: COBIT5Design Paper ExposureDraft [ISO08] ISO/IEC 27005:2008. Information technology Security techniques Information securityrisk management. ISO/IEC, [ISO09] ISO 31000:2009.Risk management principles and guidelines. ISO, [ITG07] IT Governance Institute: COBIT 4.1. ISACA, RollingMeadows, [Mi07] Mitchell S.L.: GRC360: A framework to help organisations drive principled performance. In: Int. Journal of Disclosure andgovernance, 4:4, 2007;S [Mo07] Moeller, R.R.: COSO Enterprise Risk Management. Wiley, NewJersey, [OGC07]OfficeofGovernment Commerce: ITIL v3, [PCA07] Public Company Accounting Oversight Board: Auditing Standard No [Ra10] Racz, N.; Weippl, E.; Seufert, A.: A frame of reference for research of integrated governance, risk & compliance (GRC). In (De Decker, B.; Schaumüller-Bichl, I., Hrsg.): Communications andmultimedia Security. Springer, Berlin, 2010; S [RS09] Rath, M.; Sponholz, R.: IT-Compliance: Erfolgreiches Management regulatorischer Anforderungen, ESV Erich Schmidt Verlag, Berlin, 2009 [RWS10]Racz, N.; Weippl, E.; Seufert, A.: AProcess Model for Integrated IT Governance, Risk &Compliance Management. Databases and Information Systems VI. Selected Papers from theninth InternationalBalticConference, DB&IS [RYC04] Ridley, G.; Young, J.; Carroll, P.: COBIT and its utilization. Aframework from the literature. 37thHawaii International Conference on SystemSciences Proceedings,
7 Appendix A Mapping of ISACA Risk IT processes to COSO ERM components. Risk communication and Risk culture in the RITF are not part of the process model, but they are separately described in the framework document and have therefore been added. The wording of two mapped components might be very different, especially since the COSO components have very general names and sometimes include a variety of processes in their description. Each of the three authors first did the mapping onhis own using the COSO ERM and ISACA Risk-IT process descriptions. Results were then merged and discrepancies were discussed until a joint decision could be taken. COSO ERM Framework 01 Internal environment Risk management philosophy Risk appetite ISACA Risk IT Framework Risk culture RG1.5 Promote IT risk-aware culture Risk Culture Board of directors Integrity and ethical values Commitment to competence Management philosophy and operating style Organisational structure Assignment of authority and responsibility RG2.1 Establish and maintain accountability for IT risk management RG2.4 Provide adequate resources for IT risk management Humanresourcepolicies and practices Differences in environment 02 Objective setting RE2.1 Define IT risk analysis scope Strategic objectives Related objectives RG2.4 Provide adequate resources for IT risk management Selectedobjectives Risk appetite RG3.3 Embed IT risk considerations in strategic business decision making Risk tolerance RG1.2 Propose IT risk tolerancethresholds RG1.3 Approve IT risk tolerance 03 Eventidentification Events RE3.4 UpdateITrisk scenario components Factors influencing strategyand objectives RE3.5 Maintain the IT risk registerand IT risk map Methodology and techniques RE3.6 Develop IT risk indicators Event interdependencies RE1.3 Collectdataonrisk events Event categories RE1.4Identify risk factors Risks and opportunities RR1.4 IdentifyIT-related opportunities 04 Risk assessment RG1.1Perform enterpriseit risk assessment Inherent and residual risk RG3.4 Accept IT risk (= accept residual risk) Likelihood and impact RE2.2EstimateITrisk 251
8 04.03 Qualitative and quantitative methodologies and techniques RE3.1 Map IT resources to business processes RE3.2 Determine business criticality ofit resources RE1.1 Establish and maintain a model for data collection RE1.2 Collect data on the operating environment Correlation 05 Risk response Identify risk responses RE2.3 Identify risk response options Evaluate possible risk responses RR1.3 Interpret independent IT assessment findings Select response RR3.1 Maintain incident response plans RR3.3 Initiate incident response Portfolio view 06 Control activities Integration with risk response RR2.1 Inventory controls Types of control activities RR2.3 Respond to discovered risk exposure and opportunity General controls RR2.4 Implement controls Application controls Entity-specific RR3.2 Monitor ITrisk RR2.2 Monitor operational alignment with risk tolerance thresholds 08 Monitoring Ongoing Separate evaluations RG2.5 Provide independent assurance over IT risk management Reporting deficiencies 07 Information and communication Information Strategic and integrated systems Communication RR2.5 Report IT risk action plan progress RR3.4 Communicate lessons learned from risk events RR1.1 Communicate IT risk analysis results RR1.2 Report IT risk management activities and state of compliance RG1.6 Encourage effective communication of IT risk RG1.4 Align IT risk policy Risk Communication 252
A process model for integrated IT governance, risk, and compliance management
A process model for integrated IT governance, risk, and compliance management Nicolas Racz 1, Edgar Weippl 1, Andreas Seufert 2 1 TU Vienna, Institute for Software Technology and Interactive Systems, Favoritenstr.
How To Use Risk It
Risk IT A set of guiding principles and the first framework to help enterprises identify, govern and effectively manage IT risk. In business today, risk plays a critical role. Almost every business decision
Matthew E. Breecher Breecher & Company PC November 12, 2008
Applying COSO s Enterprise Risk Management Integrated Framework Matthew E. Breecher Breecher & Company PC November 12, 2008 The basic outline for this presentation was provided by: Objectives for the session:
An ISO Compliant and Integrated Model for IT GRC (Governance, Risk Management and Compliance)
An ISO Compliant and Integrated Model for IT GRC (Governance, Risk Management and Compliance) Nicolas Mayer 1, Béatrix Barafort 1, Michel Picard 1, and Stéphane Cortina 1 1 Luxembourg Institute of Science
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC) Nicolas Racz 1, Edgar Weippl 1, and Andreas Seufert 2 1 TU Vienna, Institute for Software Technology and Interactive
Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA
Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT
How To Transform It Risk Management
The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, [email protected] Abstract: The term of scenario is used
Chayuth Singtongthumrongkul
IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional
APPENDIX 50. Enterprise risk management - Risk management overview
APPENDIX 50 Enterprise risk management - Risk management overview Energex regulatory proposal October 2014 ENTERPRISE RISK MANAGEMENT Risk Management Overview (RMO) 06 11 2013 Table of Contents 1. INTRODUCTION...
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK ACCOUNTABLE SIGNATURE AUTHORISED for implementation SIGNATURE On behalf of Chief Executive Officer SAHRA Council Date Date
Enterprise Risk Management
Cayman Islands Society of Professional Accountants Enterprise Risk Management March 19, 2015 Dr. Sandra B. Richtermeyer, CPA, CMA What is Risk Management? Risk management is a process, effected by an entity's
ENTERPRISE RISK MANAGEMENT POLICY
ENTERPRISE RISK MANAGEMENT Approved by the Audit Committee on 14 February 2003 and adopted by resolution of the Board on 28 March 2003 Revisions approved by the Audit and Risk Committee on 14 February
COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.
COBIT 5 for Risk CS 3-7: Monday, July 6 4:00-5:00 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected] Disclaimer of Use and Association Note: It is understood that
A Risk-Based Audit Strategy November 2006 Internal Audit Department
Mental Health Mental Retardation Authority of Harris County ENTERPRISE RISK MANAGEMENT A Framework For Assessing, Evaluating And Measuring Our Agency s Risk A Risk-Based Audit Strategy November 2006 Internal
Principles for An. Effective Risk Appetite Framework
Principles for An Effective Risk Appetite Framework 18 November 2013 Table of Contents Page I. Introduction... 1 II. Key definitions... 2 III. Principles... 3 1. Risk appetite framework... 3 1.1 An effective
Policy 10.105: Enterprise Risk Management Policy
Name: Responsibility: Complements: Enterprise Risk Management Framework Coordinator, Enterprise Risk Management Policy 10.105: Enterprise Risk Management Policy Date: November 2006 Revision Date(s): January
An Effective Approach to Transition from Risk Assessment to Enterprise Risk Management
Bridgework: An Effective Approach to Transition from Risk Assessment to Enterprise Risk Management @Copyright Cura Software. All rights reserved. No part of this document may be transmitted or copied without
Operational Risk Management in a Debt Management Office
Operational Risk Management in a Debt Management Office Based on Client Presentation January 2008 Outline The importance of operational risk management (ORM) International best practice A high-level perspective,
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
Operational Risk Management - The Next Frontier The Risk Management Association (RMA)
Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
10-005 Enterprise Risk Management
10-005 Enterprise Risk Management Current update: 09/16/10 Original Issuance: 03/31/08 Purpose This policy provides guidance and direction to State Board of Administration business unit heads for identifying,
The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework
The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework Dorothy Gjerdrum, ARM-P, Chair of the ISO 31000 US TAG and Executive Director,
IT Governance: framework and case study. 22 September 2010
IT Governance: framework and case study Presenter Yaowaluk Chadbunchachai Advisory Services Ernst & Young Corporate Services Limited Presentation topics ERM and IT governance IT governance framework IT
COBIT 5 Introduction. 28 February 2012
COBIT 5 Introduction 28 February 2012 COBIT 5 Executive Summary 2012 ISACA. All rights reserved. 2 Information! Information is a key resource for all enterprises. Information is created, used, retained,
ENTERPRISE RISK MANAGEMENT POLICY
ENTERPRISE RISK MANAGEMENT POLICY TITLE OF POLICY POLICY OWNER POLICY CHAMPION DOCUMENT HISTORY: Policy Title Status Enterprise Risk Management Policy (current, revised, no change, redundant) Approving
Somewhere Today, A Project is Failing
Aligning CobiT and ITIL - The Business Benefit 2007 ISACA All rights reserved www.isaca.org Page - 1 Somewhere Today, A Project is Failing Chapter 1, Peopleware 2nd edition Tom DeMarco 2007 ISACA All rights
Five steps to Enterprise Risk Management
risk decisions 2011 Five steps to Enterprise Risk Management by Val Jonas CEO Risk Decisions Group www.riskdecisions.com management solutions Val Jonas: Five steps to Enterprise Risk Management Five steps
Moving Forward with IT Governance and COBIT
Moving Forward with IT Governance and COBIT Los Angeles ISACA COBIT User Group Tuesday 27, March 2007 IT GRC Questions from the CIO Today s discussion focuses on the typical challenges facing the CIO around
Introduction: ITIL Version 3 and the ITIL Process Map V3
Introduction: ITIL Version 3 and the ITIL Process Map V3 IT Process Maps www.it-processmaps.com IT Process Know-How out of a Box IT Process Maps GbR, 2009-2 - Contents HISTORY OF ITIL... 4 The Beginnings...
Enterprise Risk Management Framework 2012 2016. Strengthening our commitment to risk management
Enterprise Risk Management Framework 2012 2016 Strengthening our commitment to risk management Contents Director-General s message... 3 Introduction... 4 Purpose... 4 What is risk management?... 4 Benefits
COSO Framework 2013 & SOX Compliance. Roxanne L. Halverson, CISM, CGEIT Atlanta ISACA Geek Week August 19, 2013
COSO Framework 2013 & SOX Compliance Roxanne L. Halverson, CISM, CGEIT Atlanta ISACA Geek Week August 19, 2013 What s Happened On May 14, 2013, after a little more than 20 years the Committee of Sponsoring
CFE 2. Enterprise Risk Management. Study Guide - Supplemental Background Material
P a g e 1 CFE 2 Enterprise Risk Management Study Guide - Supplemental Background Material The passing score for this test is 74% Reference Guides: Enterprise Risk Management Best Practices: From Assessment
Gobierno de TI Enfrentando al Reto. IT Governance Facing the Challenge. Everett C. Johnson, CPA International President ISACA and ITGI
Gobierno de TI Enfrentando al Reto IT Facing the Challenge Everett C. Johnson, CPA International President ISACA and ITGI 1 Add titles Agenda Agenda IT governance keys IT governance focus areas: theory
A Risk Management Standard
A Risk Management Standard Introduction This Risk Management Standard is the result of work by a team drawn from the major risk management organisations in the UK, including the Institute of Risk management
Governance, Risk and Compliance in BPM - A Survey of Software Tools
Governance, Risk and Compliance in BPM - A Survey of Software Tools Falko Koetter, Monika Kochanowski, Jens Drawehn Fraunhofer Institute for Industrial Engineering IAO and University of Stuttgart IAT Stuttgart,
Benchmark of controls over IT activities. 2011 Report. ABC Ltd
www.pwc.com/cy Benchmark of controls over IT activities 2011 Report ABC Ltd... 2012 Scope and approach We wish to provide you with our IT Benchmarking report over IT activities at ABC Ltd (the Company)
Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Frequently Asked Questions
Guide to the Sarbanes-Oxley Act: IT Risks and Controls Frequently Asked Questions Table of Contents Page No. Introduction.......................................................................1 Overall
Understanding Enterprise Risk Management. Presented by Dorothy Gjerdrum Arthur J Gallagher
Understanding Enterprise Risk Management Presented by Dorothy Gjerdrum Arthur J Gallagher Learning Objectives Understand the components of a wellrun ERM program Review scope and process Explore the role
fs viewpoint www.pwc.com/fsi
fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a
Operational Risk Management Program Version 1.0 October 2013
Introduction This module applies to Fannie Mae and Freddie Mac (collectively, the Enterprises), the Federal Home Loan Banks (FHLBanks), and the Office of Finance, (which for purposes of this module are
Paisley Enterprise GRC Audit Profile. Linda Bergs
Paisley Enterprise GRC Audit Profile Linda Bergs Successful Implementation Champion Buy-in Budget Technology Who We Are Paisley is an independent software vendor providing innovative solutions for governance,
Risk Assessment & Enterprise Risk Management
Risk Assessment & Enterprise Risk 1 Healthcare Corporate Governance Today s environment requires building a culture of risk awareness and management of risk across the organization, while formulating less
Beyond risk identification Evolving provider ERM programs
Beyond risk identification Evolving provider ERM programs March 2016 At a glance PwC conducted research to assess the state of enterprise risk management (ERM) within healthcare providers and found many
Understanding and articulating risk appetite
Understanding and articulating risk appetite advisory Understanding and articulating risk appetite Understanding and articulating risk appetite When risk appetite is properly understood and clearly defined,
Developing an Effective Enterprise Risk Management Program
Developing an Effective Enterprise Risk Management Program Jay Brietz, CPA and CIA Senior Manager This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record
Transforming risk management into a competitive advantage kpmg.com
INSURANCE RISK MANAGEMENT ADVISORY SOLUTIONS Transforming risk management into a competitive advantage kpmg.com 2 Transforming risk management into a competitive advantage Assessing risk. Building value.
Executive's Guide to
Executive's Guide to IT Governance Improving Systems Processes with Service Management, COBIT, and ITIL ROBERT R. MOELLER WILEY John Wiley & Sons, Inc. Contents Preface xiii PART I: IT GOVERNANCE CONCEPTS
Avondale College Limited Enterprise Risk Management Framework 2014 2017
Avondale College Limited Enterprise Risk Management Framework 2014 2017 President s message Risk management is part of our daily life, something we do regularly; often without realising we are doing it.
1. FPO. Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Second Edition
1. FPO Guide to the Sarbanes-Oxley Act: IT Risks and Controls Second Edition Table of Contents Introduction... 1 Overall IT Risk and Control Approach and Considerations When Complying with Sarbanes-Oxley...
STANDARDS OF SOUND BUSINESS AND FINANCIAL PRACTICES. ENTERPRISE RISK MANAGEMENT Framework
STANDARDS OF SOUND BUSINESS AND FINANCIAL PRACTICES ENTERPRISE RISK MANAGEMENT Framework September 2011 Notice This document is intended as a reference tool to assist Ontario credit unions to develop an
Roles, Activities and Relationships
and in COBIT 5 Objective: Value Creation Benefits Realisation Risk Resource Enablers Scope Roles, Activities and Relationships Source: COBIT 5, figure 8 Key Roles, Activities and Relationships Roles, Activities
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Enterprise Risk Management A View. Clive Kelly CRO Zurich Insurance plc/zfs Europe (GI)
Enterprise Risk Management A View Clive Kelly CRO Zurich Insurance plc/zfs Europe (GI) Topics ERM some basics Responsibilities CRO evolution Challenges and priorities Conclusion Introduction 3 Zurich s
Enhancing IT Governance, Risk and Compliance Management (IT GRC)
Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enabling Reliable eservices Tawfiq F. Alrushaid Saudi Aramco Agenda GRC Overview IT GRC Introduction IT Governance IT Risk Management IT
ISO 31000 and Risk Management
ISO 31000 and Risk Management August 19, 2010 What is risk? All management is risk management! Risk Management Boot camp Threat + Vulnerability = Risk Risk Controls = Residual Risk Residual Risk Probability
ENTERPRISE RISK M A NAGEMENT POLICY
Tablelands Regional Council ENTERPRISE RISK M A NAGEMENT POLICY Draft Final Policy No: PD 3.3.1 File ref: PD 3.3.1 Policy Section: INSURANCE AND RISK MANAGEMENT Version: 1 Date Adopted: 7 July 2010 Review
RISK BASED AUDITING: A VALUE ADD PROPOSITION. Participant Guide
RISK BASED AUDITING: A VALUE ADD PROPOSITION Participant Guide About This Course About This Course Adding Value for Risk-based Auditing Seminar Description In this seminar, we will focus on: The foundation
Clarius Group Risk Management Policy and Framework
1. Introduction Clarius Group Risk Management Policy and Framework 1.1 Definition Risk is the chance of something happening that will have an impact on objectives. Risk provides the opportunity (upside)
Towards a Reference Model for Integrated Governance, Risk and Compliance
Towards a Reference Model for Integrated Governance, Risk and Compliance Pedro Vicente 1, Nicolas Racz 2 and Miguel Mira da Silva 1 1 Instituto Superior Técnico, Universidade Técnica de Lisboa, Avenida
JOE MOROLONG LOCAL MUNICIPALITY IT GOVERNANCE FRAMEWORK
JOE MOROLONG LOCAL MUNICIPALITY IT GOVERNANCE FRAMEWORK INDEX 1 Introduction... 2 Contextual background... 2.1 The CobiT 5 framework (2012)... 2.2 The ISO 27000 series (2005, 2011)... 2.3 The Risk IT
14 October 2015 ISACA Curaçao Conference By: Paul Helmich
Governance, Risk & Compliance A practical approach 14 October 2015 ISACA Curaçao Conference By: Paul Helmich Topics today What is GRC? How much of all the GRC literature, tools, etc. do I need to study
S11 - Implementing IT Governance An Introduction Debra Mallette
S11 - Implementing IT Governance An Introduction Debra Mallette S11 - Introduction to IT Governance Implementation using COBIT and Val IT Speaker: Debra Mallette, CGEIT, CISA, CSSBB Session Objectives
IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE
1 IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE ANSWERS AND PRACTICAL TIPS FROM THE IT GOVERNANCE AUDIT PROFESSIONALS JOHAN LIDROS, PRESIDENT EMINERE GROUP KATE MULLIN, CISO, HEALTH
IT Compliance 24.09.2007. After Hours Seminar September 2007 Zurich. Improving IT Risk & Compliance Management (RCM)
IT Compliance 24.09. AHS After Hours Seminar Zurich Improving IT Risk & Compliance Management (RCM) Bruno J. Wiederkehr Member of the Board ISACA Switzerland Chapter Agenda 1. Understanding the RCM Requirements
Internal Control Integrated Framework. May 2013
Internal Control Integrated Framework May 2013 0 Table of Contents COSO & Project Overview Internal Control-Integrated Framework Illustrative Documents Illustrative Tools for Assessing Effectiveness of
ERM and GRC Fundamentals. Risk Management Definitions & Guiding Principles. Module 1
ERM and GRC Fundamentals Risk Management Definitions & Guiding Principles Module 1 Agenda Introduction: Purpose and Goal of the Training (5 min.) Section 1: ERM / GRC Terms & Concepts (15 min.) Section
Enterprise risk management: A pragmatic, four-phase implementation plan
Enterprise risk management: A pragmatic, four-phase implementation plan Prepared by: John Brackett, Managing Director, Risk Advisory Services, RSM McGladrey, Inc. 704.442.3820, [email protected]
Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister
Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.
COSO Enterprise Risk Management. Establishing Effective Governance, Risk, and Compliance (GRC) Processes. 2nd Edition. Wiley Corporate F&A
Brochure More information from http://www.researchandmarkets.com/reports/2220031/ COSO Enterprise Risk Management. Establishing Effective Governance, Risk, and Compliance (GRC) Processes. 2nd Edition.
Portfolio Risk Management: aligning projects with business objectives to deliver value
risk decisions 2011 Portfolio Risk Management: aligning projects with business objectives to deliver value by Val Jonas CEO Risk Decisions Group and Susheel Chumber Professional Services Manager, Risk
THE BOARD S ROLE AND RESPONSIBILITIES OVER THE CONTROL ENVIRONMENT. Session 4
THE BOARD S ROLE AND RESPONSIBILITIES OVER THE CONTROL ENVIRONMENT Session 4 Road Map of Presentation Review of the key responsibilities of the Board - the direct links to the IC System & IA function Analyze
ITIL: What it is What it Can Do For You V2.1
ITIL: What it is What it Can Do For You V2.1 Service Solution Company Facilitated by: Patrick Musto Agenda Answer the questions what? and how? Historical Background Fundamental Principles 5 Lifecycle Phases
OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT
OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT ERM as the foundation for regulatory compliance and strategic business decision making CONTENTS Introduction... 3 Steps to developing an
ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION
ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION KEY FEATURES AND BENEFITS Manage multiple GRC initiatives on a single consolidated platform Support unique areas of operation with
Assessing & Managing IT Risk
Assessing & Managing IT Risk ISACA Pittsburgh Chapter Meeting October 18, 2010 Agenda Introductions IT Risk Assessment An Approach That Makes Sense to IT Measuring Risk Determining Results Audit Planning
IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS
IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS 1 Module 1: Principles of Risk and Risk Management Module aims The aim of this module is to provide an introduction to the principles and concepts of risk and
Integrated Risk Management:
Integrated Risk Management: A Framework for Fraser Health For further information contact: Integrated Risk Management Fraser Health Corporate Office 300, 10334 152A Street Surrey, BC V3R 8T4 Phone: (604)
DATA AUDIT: Scope and Content
DATA AUDIT: Scope and Content The schedule below defines the scope of a review that will assist the FSA in its assessment of whether a firm s data management complies with the standards set out in the
Transmittal Letter... 1. Objectives and Scope... 2. Approach... 3-7. Financial System... 8. Permitting Application... 9
Internal Audit Committee of Information Technology Risk Assessment Public Report Prepared By: Internal Auditors of Brevard County September 30, 2009 Table of Contents Transmittal Letter... 1 Objectives
ITIL Service Lifecycles and the Project Manager
1 ITIL Service Lifecycles and the Project Manager The intersection of IT Service and Project Delivery Presented to: Kansas City Mid-America PMI Chapter Mark Thomas January 17, 2011 1 Agenda 2 Introduction
INFORMATION TECHNOLOGY FLASH REPORT
INFORMATION TECHNOLOGY FLASH REPORT ISACA Releases COBIT 5: Updated Framework for the Governance and Management of IT May 18, 2012 In April, ISACA released COBIT 5 as a replacement for its current globally
University of St. Gallen Law School Law and Economics Research Paper Series. Working Paper No. 2008-19 June 2007
University of St. Gallen Law School Law and Economics Research Paper Series Working Paper No. 2008-19 June 2007 Enterprise Risk Management A View from the Insurance Industry Wolfgang Errath and Andreas
IT governance and business organization: some trends about the management of application portfolio
IT governance and business organization: some trends about the management of application portfolio Roberto Candiotto, Silvia Gandini 1 1 Dipartimento di Studi per l Economia e l Impresa (Università del
Governance, Risk and Compliance (GRC) software Business needs and market trends
Governance, Risk and Compliance (GRC) software Business needs and market trends David Cau Director Business Risk Deloitte The importance of a holistic view of risk and compliance issues and the difficulty
Guidance Note: Corporate Governance - Board of Directors. March 2015. Ce document est aussi disponible en français.
Guidance Note: Corporate Governance - Board of Directors March 2015 Ce document est aussi disponible en français. Applicability The Guidance Note: Corporate Governance - Board of Directors (the Guidance
SITA Service Management Strategy Implementation. Presented by: SITA Service Management Centre
SITA Service Management Strategy Implementation Presented by: SITA Service Management Centre Contents What is a Service? What is Service Management? SITA Service Management Strategy Methodology Service
Governance SPICE. ISO/IEC 15504 for Internal Financial Controls and IT Management. By János Ivanyos, Memolux Ltd. (H)
Governance SPICE ISO/IEC 15504 for Internal Financial Controls and IT Management By János Ivanyos, Memolux Ltd. (H) 1. Evaluating Internal Controls against Governance Frameworks Corporate Governance is
International Diploma in Risk Management Syllabus
International Diploma in Risk Management Syllabus Module 1: Principles of Risk and Risk Management The aim of this module is to provide an introduction to the principles and concepts of risk and risk management.
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
ENTERPRISE RISK MANAGEMENT ASSESSMENT GUIDE
ENTERPRISE RISK MANAGEMENT ASSESSMENT GUIDE WHITEPAPER CONTENTS CONTENTS INTRODUCTION 1 IS YOUR RISK MANAGEMENT PROCESS REALLY ASSESSING RISK? 1 IS YOUR RISK ASSESSMENT CONTEXT DRIVEN? 2 DOES YOUR RISK
Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com
COBIT 5 All together now! Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com 1 Copyright Notice COBIT is 1996, 1998, 2000, 2005 2012 ISACA and IT Governance Institute.
Understanding COBIT 5. based on ISACA Materials www.isaca.org/cobit. Prepared by: Deb Mallette, CGEIT, CISA, CSSBB, IMG BSMS EPDM, Process Consultant
Prepared by: Deb Mallette, CGEIT, CISA, CSSBB, IMG BSMS EPDM, Process Consultant Understanding COBIT 5 based on ISACA Materials www.isaca.org/cobit ISACA Silicon Valley Chapter Spring 1 Why COBIT is important
