Auditing Application User Account Security and Identity Management with Data Analytics

Size: px
Start display at page:

Download "Auditing Application User Account Security and Identity Management with Data Analytics"

Transcription

1 Auditing Application User Account Security and Identity Management with Data Analytics James Kidwell, JD, CISA Senior Information Systems Auditor Audit Services Tom Valiquette, MBA, CIA Director, Corporate Compliance Compliance Data Solutions

2 What is your end game? 1. Evaluate for key risks (one-time audit) Active user accounts of terminated employees/contractors 2. Continuous Monitor Audit Services tool 3. Build case for corporate identity management solution What else happened: Continuous Audit business unit tool

3 Key Considerations Decide your end-game What is your corporate standard Source of truth Data normalization Known data exceptions Error validation & process improvement Continuous auditing & monitoring

4 Example #1 User Accounts Individual system installations Individual systems do not communicate with each other. Hospital 1 Hospital 2 Hospital 3 Not integrated with Windows Active Directory Hospital 4 Manual user account administration managed at each hospital Hospital 5 Hospital 6 Hospital 8 Hospital 7

5 Example #2 User Accounts Primary applications for Enterprise Some not integrated with Windows Active Directory Manual user account administration managed within Information Services External service providers Accounts Receivable System A Accounts Receivable System C Accounts Receivable System B Electronic Medical Record

6 Key Risks Risks External Regulator sanctions due to active user account for terminated teammate; (JCAHO Joint Commission on Accreditation of Healthcare Organizations) System access using terminated teammate account; Transitioning to central Accounts Receivable system.

7 Source of Truth Central list used to identify personnel Maintained to some standard Contains unique identifier Customer and Audit agree Employee Roster Active Directory Contractor Roster

8 Analytic Process Flow Continuous analytic cycle agreed to by Audit and Customer Every application account receives a result code for each testing cycle Pass/Fail If Fail High/Low risk

9 Data Preparation Provision data on same schedule Remove application-specific known user ID modifications Target and isolate approved administrative accounts Only ACTIVE target system user accounts TargetSystem User ID ComputedID (used for matching) TargetSystem User Last Name TargetSystem User First Name JOHNSON ELLIOT EJOHNS01 EJOHNS01 JOHNSON ELLIOT EJOHNS01W EJOHNS01 JOHNSON TIM ID Modification

10 Layered Testing Algorithm Target System Identify inactive, template, system, and deleted accounts

11 Error Validation UserID ErrorReason ErrorValidation ValidationReason 5309 EJOHNS01 Application userid not found in PeopleSoft EC99 - Valid Error RC99 - Remediation Plan Application userid first name does not RC02 - False Positive - match first name in PeopleSoft EC01 - Not Error Positive Teammate ID Allows customer opportunity to participate in audit process Demonstrates to senior leadership the customers willingness to correct problems Approved false-positives accounted for in continuous auditing program Remediation plans confirmed by continuous auditing program

12 Audited Results Client-Audited Results Test if client provided acceptable responses to previous analytic cycle results

13 Teammate Identification - PS Compare active accounts to Human Resources Match Enterprise ID - Network ID or Employee ID; Match Name First name characters, or Levenshtein first name or Levenshtein last name Teammate active in HR data yes/no

14 Teammate Identification - AD Compare active accounts to Active Directory Match Enterprise ID - Network ID or Employee ID; Match Name First name characters, or Levenshtein first name or Levenshtein last name Teammate active in AD data yes/no

15 Teammate Identification - itim Compare active accounts to itim Match Enterprise ID - Network ID or Employee ID; Match Name First name characters, or Levenshtein first name or Levenshtein last name Teammate active in itim data yes/no

16 Analytic Results

17 Report Results Audit finding detail Dashboards

18 Reports Identify primary audience (audit management, customer?) Summary vs. Detail Facilitate exception management process Continuous Auditing Continuous Monitoring

19 Continuous Monitoring Single Application with Multiple Installations

20 Continuous Monitoring Tier 1 Applications

21 Continuous Monitoring Tier 1 Applications Drill Down

22 Continuous Auditing/Monitoring Provides evidence for end-game Identify root cause(s) Monitor process improvement Need for central Identity Management System Transition auditing to business unit Monitor process improvement gains Monitoring provides re-audit signals Allows for key system comparison

23 Questions?

24 Tom Valiquette, Director Compliance Data Solutions Corporate Compliance O:

Auditing Application User Account Security and Identity Management with Data Analytics

Auditing Application User Account Security and Identity Management with Data Analytics Auditing Application User Account Security and Identity Management with Data Analytics James Kidwell, JD, CISA Senior Information Systems Auditor Audit Services Session Agenda and Learning Objectives Brief

More information

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/ Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system

More information

PeopleSoft IT General Controls

PeopleSoft IT General Controls PeopleSoft IT General Controls Performance Audit December 2009 Office of the Auditor Audit Services Division City and County of Denver Dennis J. Gallagher Auditor The Auditor of the City and County of

More information

Managing Approvals in Expenses. Understanding Approvals

Managing Approvals in Expenses. Understanding Approvals Managing Approvals in Expenses Managers are often the approvers for expense transactions. The major concerns of a manager would typically include policy compliance and fiscal responsibility. Managers may

More information

OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT

OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia,

More information

AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS

AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS OBJECTIVE Increase your IT vocab so that you can assess the risks related to your audits of EHRs and/or EHR related data AGENDA What

More information

Big Data, Data Analytics, and Data Visualization building your knowledge and expertise. September 15, 2015

Big Data, Data Analytics, and Data Visualization building your knowledge and expertise. September 15, 2015 + Big Data, Data Analytics, and Data Visualization building your knowledge and expertise September 15, 2015 Today s Agenda 2! Kickoff: Glossary of Terms! Data analytics! Data visualization! Big Data! Body

More information

Larry Laine, Deputy Land Commissioner and Chief Clerk. Annual Report on the Internal Audit Quality Assurance and Improvement Program

Larry Laine, Deputy Land Commissioner and Chief Clerk. Annual Report on the Internal Audit Quality Assurance and Improvement Program DATE: TO: FROM: SUBJECT: Larry Laine, Deputy Land Commissioner and Chief Clerk Tracey Hall, Deputy Commissioner of Internal Audit Annual Report on the Internal Audit The following report is presented in

More information

Microsoft Project Server Integration with SharePoint 2010

Microsoft Project Server Integration with SharePoint 2010 Microsoft Project Server Integration with SharePoint 2010 Microsoft Project Server 2010: brings together the business collaboration platform services of SharePoint Server 2010 with structured execution

More information

Directory of. Advertising Supplement

Directory of. Advertising Supplement Audit Management Advertising Supplement of Software Products Directory of Software Products leverages the power of information analytics to give business leaders greater understanding and confidence in

More information

AHIA HCCA Auditing & Monitoring Focus Group Defining the Key Roles and Responsibilities Corporate Compliance and Internal Audit.

AHIA HCCA Auditing & Monitoring Focus Group Defining the Key Roles and Responsibilities Corporate Compliance and Internal Audit. and Requirement: May be required if the organization must comply with Sarbanes-Oxley. Otherwise, is implemented as an organizational governance/business decision and best practice. Purpose: Provide independent

More information

The Evolution of Assurance Software & Methodology

The Evolution of Assurance Software & Methodology The Evolution of Assurance Software & Methodology Tim J. Leech FCA CIA, CCSA, CFE I started my career in Internal Auditing ( IA ) over 20 years ago in the spring of 1981. 1983 marked my first exposure

More information

TPSC Cloud, Collaborative Governance, Risk & Compliance Software

TPSC Cloud, Collaborative Governance, Risk & Compliance Software TPSC Cloud, Collaborative Governance, Risk & Compliance Software We believe that we can make an important contribution to the safety & quality in healthcare. The Patient Safety Company The Patient Safety

More information

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0 WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of

More information

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution Enterprise Cloud Solution is an end-to-end solution for the planning, execution and reporting of corporate external and internal audit and inspections across enterprise risk, safety, security and sustainability.

More information

White Paper. Support for the HIPAA Security Rule PowerScribe 360

White Paper. Support for the HIPAA Security Rule PowerScribe 360 White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as

More information

per concurrent user - OnDemand per managed server per named user - OnDemand

per concurrent user - OnDemand per managed server per named user - OnDemand ATTACHMENT A Units of Measurement and Definitions - Remedy OnDemand UNITS OF MEASUREMENT. The following Units of Measurement apply to certain BMC Subscription Services. UNIT OF MEASUREMENT per concurrent

More information

Basic Office Management

Basic Office Management we ll analyze your business processes and deliver sound advice based on best management practices increase lead capture and conversion rates increase per person productivity GURU Enterprise will be configured

More information

A Universal Approach to Integration Using UNIVERSAL DATA MODELS. Proprietary information of Universal Data Models, LLC 1

A Universal Approach to Integration Using UNIVERSAL DATA MODELS. Proprietary information of Universal Data Models, LLC 1 A Universal Approach to Integration Using UNIVERSAL DATA MODELS Proprietary information of Universal Data Models, LLC 1 No (person) is an island, entire of itself; every (person) is a piece of the continent,

More information

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement

More information

Quick Reference Guide

Quick Reference Guide Quick Reference Guide Your MACH3: Your company logo, your photograph and signature appear as they would in print and email campaigns. Security: Change your password and view an audit trail of visits to

More information

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution Enterprise Cloud Solution is an end-to-end solution for the planning, execution and reporting of corporate external and internal audit and inspections across enterprise risk, safety, security and sustainability.

More information

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical

More information

Using CAAT in Compliance

Using CAAT in Compliance Using CAAT in Compliance Auditing Suzann Hall, CPA, ACDA November 12, 2010 CHAN Founded in 1997 through the collaboration of Ascension Health and Catholic Health Initiatives, the two largest not-for-profit

More information

Testing for Duplicate Payments

Testing for Duplicate Payments Testing for Duplicate Payments Regardless of how well designed and operated, any disbursement system runs the risk of issuing duplicate payments. By some estimates, duplicate payments amount to an estimated

More information

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing

More information

Mecklenburg County Department of Internal Audit. PeopleSoft Application Security Audit Report 1452

Mecklenburg County Department of Internal Audit. PeopleSoft Application Security Audit Report 1452 Mecklenburg County Department of Internal Audit PeopleSoft Application Security Audit Report 1452 February 9, 2015 Internal Audit s Mission Through open communication, professionalism, expertise and trust,

More information

University of California Online Payroll / Personnel System. WEB PAN Application

University of California Online Payroll / Personnel System. WEB PAN Application University of California Online Payroll / Personnel System 1. PAN Reviewer Categories WEB PAN Application There are three categories of PAN Reviewers who receive PAN email notification on an action: Mandatory

More information

- Identity & Access Management

- Identity & Access Management IBM Software Group NSHE - Identity & Access Management 2006 IBM Corporation Identity & Access Management Access Management and The Monitoring, Auditing and Reporting for Compliance So What s The Problem

More information

Se i o Pricing Document

Se i o Pricing Document Se i o Pricing Document This document details pricing structures and policies for ServiceNow. It includes information on the ServiceNow pricing model for standard packages as well as all options and add---ons.

More information

Software Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539

Software Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539 Software Requirements Specification for Schlumberger Scheduling Assistant Page 1 Software Requirements Specification for Schlumberger Scheduling Assistant Version 0.2 Prepared by Design Team A Rice University

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

KAREN E. RUSHING. Ghost Employee Audit

KAREN E. RUSHING. Ghost Employee Audit KAREN E. RUSHING Clerk of the Circuit Court and County Comptroller Ghost Employee Audit Audit Services Karen E. Rushing Clerk of the Circuit Court and County Comptroller Jeanette L. Phillips, CPA, CGFO,

More information

University of Waterloo Financial Online Reporting Environment (FORE) Training Manual

University of Waterloo Financial Online Reporting Environment (FORE) Training Manual University of Waterloo Financial Online Reporting Environment (FORE) Training Manual Permission to use this document for non-commercial purposes, in original or modified form, is granted, provided that

More information

Public Key Infrastructure for a Higher Education Environment

Public Key Infrastructure for a Higher Education Environment Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware

More information

MS 20246C Monitoring and Operating a Private Cloud

MS 20246C Monitoring and Operating a Private Cloud MS 20246C Monitoring and Operating a Private Cloud Description: Days: 5 Prerequisites: This course describes how to monitor and operate a cloud with Microsoft System Center 2012 R2. This course focuses

More information

TECHNICAL HIGHLIGHTS. September 16 th,2015 Oglethorpe D. oneusg

TECHNICAL HIGHLIGHTS. September 16 th,2015 Oglethorpe D. oneusg TECHNICAL HIGHLIGHTS September 16 th,2015 Oglethorpe D oneusg Constitution one set of uniform business procedures, policies and practices one technical platform / software solution one support team and

More information

Stellar Active Directory Manager

Stellar Active Directory Manager Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly

More information

Oracle Business Intelligence (OBI) User s Guide October 2011

Oracle Business Intelligence (OBI) User s Guide October 2011 Page 1 of 9 Oracle Business Intelligence (OBI) User s Guide October 2011 OBI is a web-based reporting tool that enables PeopleSoft users to analyze and report on information stored in the PeopleSoft Finance

More information

OCR HIPAA Audits. Disclaimer. Message. I am here for your benefit. If you have questions, please ask. 1. Background 2. The Audit 3.

OCR HIPAA Audits. Disclaimer. Message. I am here for your benefit. If you have questions, please ask. 1. Background 2. The Audit 3. OCR HIPAA Audits Roger Brett Short Chief Compliance Officer October 2012 Disclaimer The information provided in this presentation does not constitute legal advice and is intended to be used for guidance.

More information

CA Technologies Solutions for Criminal Justice Information Security Compliance

CA Technologies Solutions for Criminal Justice Information Security Compliance WHITE PAPER OCTOBER 2014 CA Technologies Solutions for Criminal Justice Information Security Compliance William Harrod Advisor, Public Sector Cyber-Security Strategy 2 WHITE PAPER: SOLUTIONS FOR CRIMINAL

More information

SUMMARY OF Proactive Monitoring Procedures

SUMMARY OF Proactive Monitoring Procedures SUMMARY OF Proactive Monitoring Procedures for Secure Individual Identifiable Health Information OCTOBER 2014 Minnesota E-Health Initiative & the Minnesota Department of Health, Office of Health Information

More information

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS The promise of reduced administrative costs and improved caregiver satisfaction associated with user provisioning

More information

21 CFR Part 11 Electronic Records & Signatures

21 CFR Part 11 Electronic Records & Signatures Gap Analysis - Checklist 21 CFR Part 11 Electronic Records & Signatures his document is a proposal and starting point only. he type and extent of documentation depends on the process environment. he proposed

More information

Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s)

Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s) Document Hierarchy of Information Security General commitment to Information Security Installation of CorpSec Enabling CSO Installing Information Security Standard Corporate Security Policy Defining Assets,

More information

Achieving HIPAA Compliance with Identity and Access Management

Achieving HIPAA Compliance with Identity and Access Management Achieving HIPAA Compliance with Identity and Access Management A Healthcare Case Study Stephen A. Whicker Manager Security Compliance HIPAA Security Officer AHIS/St. Vincent Health DISCLAIMER: The views

More information

Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples

Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples June 3, 2015 Cliff Stephens, CISA Agenda Introductions Technological Advances in Analytics Capitalizing on Analytics

More information

Drupal 6 to Drupal 7 Migration Worksheet

Drupal 6 to Drupal 7 Migration Worksheet Drupal 6 to Drupal 7 Migration Worksheet Rationale for This Document An upgrade of a Drupal 6 website is a complex proposition. As a general rule of thumb, many professional Drupal development teams approach

More information

OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT

OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT Chief of Audits: Juan R. Perez Senior Audit Manager:

More information

Precisely Target the Right Audience

Precisely Target the Right Audience Precisely Target the Right Audience With Upsight Segmentation, you can create custom user segments from any combination of the 11 dimensions where Upsight automatically collects data. These segments provide

More information

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements

More information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment 4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,

More information

Blue Coat Cloud Data Protection Server Administration Guide

Blue Coat Cloud Data Protection Server Administration Guide Blue Coat Cloud Data Protection Server Administration Guide Software version 4.5.x September 16, 2015 2015 Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue Coat logos, ProxySG, PacketShaper,

More information

How Private Industry Protects Our Country's Secrets. James Kirk

How Private Industry Protects Our Country's Secrets. James Kirk An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets James Kirk Outline Background DOD Agency Responsible for Interpretation

More information

HP Service Manager. Service Request Catalog (SRC) Tips & Tricks Document

HP Service Manager. Service Request Catalog (SRC) Tips & Tricks Document HP Service Manager Service Request Catalog (SRC) Tips & Tricks Document (note: in process of updating to support v 9.32) 1 The HP Service Request Catalog (SRC) is a more robust and user- friendly version

More information

Nonprofit Data Management Checklist

Nonprofit Data Management Checklist Nonprofit Data Management Checklist The integration of cross-functional data and application of business intelligence will soon be a practice of not only the most strategic nonprofits, but of any nonprofit

More information

Our Data Analytics Journey, Methodology, and More. September 15, 2015

Our Data Analytics Journey, Methodology, and More. September 15, 2015 Our Data Analytics Journey, Methodology, and More September 15, 2015 Objectives High-level Objectives: Discuss Audit Data Analytics History Industry Personal History TIAA-CREF History Define our data analytics

More information

Time Attendance Management System TAMS

Time Attendance Management System TAMS Time Attendance Management System TAMS Business Case for HR Organizations are struggling with optimizing their Human Capital By Increasing Performance (Punctuality) By Curtailing Costs (Overtimes) While

More information

Automate PCI Compliance Monitoring, Investigation & Reporting

Automate PCI Compliance Monitoring, Investigation & Reporting Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently

More information

Leveraging Data Analytics and Continuous Auditing. Internal Audit. January 9, 2014

Leveraging Data Analytics and Continuous Auditing. Internal Audit. January 9, 2014 Leveraging Data Analytics and Continuous Auditing to Transform Internal Audit January 9, 2014 Presenter Introductions John Isenberg, Director KPMG Risk Consulting Dallas Cortnye King, Manager KPMG Risk

More information

The Netskope Active Platform

The Netskope Active Platform The Netskope Active Platform Enabling Safe Migration to the Cloud Massive Cloud Adoption Netskope is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

Risk & Hazard Management

Risk & Hazard Management Rivo Software Solution Layer provides a rapidly deployable complete set of hazard and risk management functionality from any device, accessible from anywhere through our highly secure cloud platform. Identify,

More information

ASSESSMENT REPORT 13 19. Federal PKI Compliance Report September 6, 2013

ASSESSMENT REPORT 13 19. Federal PKI Compliance Report September 6, 2013 ASSESSMENT REPORT 13 19 Federal PKI Compliance Report September 6, 2013 Date September 6, 2013 To Chief Information Officer From Inspector General Subject Assessment Report Federal PKI Compliance Report

More information

Feature. Multiagent Model for System User Access Rights Audit

Feature. Multiagent Model for System User Access Rights Audit Feature Christopher A. Moturi is the head of School of Computing and Informatics at the University of Nairobi (Kenya) and has more than 20 years of experience teaching and researching on databases and

More information

Roles and Responsibilities Corporate Compliance and Internal Audit

Roles and Responsibilities Corporate Compliance and Internal Audit Roles and Responsibilities and By Mark P. Ruppert, CPA, CIA, CISA, CHFP The focus group of Health Care Compliance Association (HCCA) and Association of Healthcare ors (AHIA) members continues to explore

More information

Innovative Projects: Big Data Revisited (An ACHE Qualified Education (Cat II), 1.0 Hour CEU)

Innovative Projects: Big Data Revisited (An ACHE Qualified Education (Cat II), 1.0 Hour CEU) 2015 ACHE-SETC Conference on Healthcare Leadership Innovative Projects: Big Data Revisited (An ACHE Qualified Education (Cat II), 1.0 Hour CEU) Jessie L. Tucker III, Ph.D., FACHE Harris Health Executive

More information

MS-10750: Monitoring and Operating a Private Cloud with System Center 2012. Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery

MS-10750: Monitoring and Operating a Private Cloud with System Center 2012. Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery MS-10750: Monitoring and Operating a Private Cloud with System Center 2012 This course describes the various components of System Center and how to deploy, monitor and manage a service and prepackaged

More information

Audit of Employee Self-Service Payroll System Access

Audit of Employee Self-Service Payroll System Access Audit of Employee Self-Service Payroll System Access MARTIN MATSON City Comptroller STACEY MAZMANIAN Audit Manager City of Milwaukee, Wisconsin September 2015 TABLE OF CONTENTS Transmittal Letter..1 I.

More information

Information Systems Access Policy

Information Systems Access Policy Information Systems Access Policy I. PURPOSE The purpose of this policy is to maintain an adequate level of security to protect data and information systems from unauthorized access. This

More information

CareConnect Onboarding

CareConnect Onboarding CareConnect Onboarding Privileged MSO Providers Manager Guide Effective February 18, 2016 CONTENTS OVERVIEW AND PURPOSE... 3 CareConnect Training Processes... Error! Bookmark not defined. GUIDING PRINCIPLES...

More information

MEDITECH CUSTOMERS & THE OIG QUESTIONNAIRE

MEDITECH CUSTOMERS & THE OIG QUESTIONNAIRE MEDITECH CUSTOMERS & THE OIG QUESTIONNAIRE Hospitals that have received Medicare incentive payments for meaningful use of electronic health records have been asked by the Office of Inspector General of

More information

Privacy & Security Requirements: from EHRs to PHRs

Privacy & Security Requirements: from EHRs to PHRs Privacy & Security Requirements: from EHRs to PHRs Oct 28, 2010 Presented by André Carrington, P.Eng, CISSP, CISM, CISA, CIPP/C Director, Implementation, Privacy & Security, SPS Purpose As suggested by

More information

Windows Server 2012 / Windows 8 Audit Fundamentals

Windows Server 2012 / Windows 8 Audit Fundamentals Windows Server 2012 / Windows 8 Audit Fundamentals Jacksonville ISACA Chapter May 17, Speaker Introduction: Timothy P. McAliley 13+ years in IT Currently work for Microsoft Premier Field Engineer SQL Server,

More information

SEO: How to Use Everyday Techniques to Increase Website Traffic. Robin Kelly @RobinKelly The University of Texas at Tyler

SEO: How to Use Everyday Techniques to Increase Website Traffic. Robin Kelly @RobinKelly The University of Texas at Tyler SEO: How to Use Everyday Techniques to Increase Website Traffic Robin Kelly @RobinKelly The University of Texas at Tyler SEO: How to Use Everyday Techniques to Increase Website Traffic STRUCTURE Built

More information

UOFL SHAREPOINT ADMINISTRATORS GUIDE

UOFL SHAREPOINT ADMINISTRATORS GUIDE UOFL SHAREPOINT ADMINISTRATORS GUIDE WOW What Power! Learn how to administer a SharePoint site. [Type text] SharePoint Administrator Training Table of Contents Basics... 3 Definitions... 3 The Ribbon...

More information

NetSuite OpenAir. The World s #1 Cloud Professional Services Automation Solution. Why NetSuite OpenAir? NETSUITE BENEFITS.

NetSuite OpenAir. The World s #1 Cloud Professional Services Automation Solution. Why NetSuite OpenAir? NETSUITE BENEFITS. NetSuite OpenAir The World s #1 Cloud Professional Services Automation Solution Data Sheet NETSUITE BENEFITS Benefits experienced by organizations using PSA include: 48% higher PS revenue growth over the

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

The University of Texas at Tyler. Audit of Compliance with Texas Administrative Code 202

The University of Texas at Tyler. Audit of Compliance with Texas Administrative Code 202 Audit of Compliance with Texas Administrative Code 202 August 2015 OFFICE OF AUDIT AND CONSULTING SERVICES 3900 UNIVERSITY BOULEVARD TYLER, TEXAS 75799 BACKGROUND Texas Administrative Code (TAC) Title

More information