Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit

Size: px
Start display at page:

Download "Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit"

Transcription

1 Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit Presented to: ISACA and IIA Joint Mee/ng October 10, 2014 By

2 Outline Introduc.on The Evolving Role of Internal Audit The importance of Data Most Cost Effec.ve and Best prac.ces in Data Provisioning The next logical step - - CCM Most Cost Effec.ve and Best prac.ces in CCM

3 Rausch Advisory Services LLC. Internal Audit: SAS70/ISO Reviews Compliance Reviews Construc.on Audits Risk Mgt. Sarbanes Oxley (Including Automa.on) Data Analy.cs Con.nuous Controls Monitoring (CCM) PMO/Methodology Establishment and training De- provisioning Automa.on Informa/on Security: Informa.on Security Enterprise- wide Risk Assessment Business Con.nuity Management Vulnerability Assessments Social Engineering Network, Wireless and Web Applica.on Security Reviews Incident Analysis and Response Data Loss Preven.on Audi.ng and Implementa.on Interim Resource Management Security Awareness Training Finance & Accoun/ng: Close Accelera.on and Automa.on Budge.ng/FP&A - - System selec.on, Custom Solu.ons and applica.ons, and interim resources) Senior Staff Augmenta.on/Interim Execu.ves Custom Accoun.ng Applica.on development (in Excel, Access,.NET, SQL Server, Visual Basic and other technologies) Business Performance Improvement & Systems: PIVOT ( Profitability Improvement Via Op.mized Transac.ons ) Process Improvement, Quality, and Con.nuous Improvement Business Intelligence (Including KPI Metrics and linkage to strategy and incen.ve programs) Project Management Resources Custom Solu.ons in Time Capture, project tracking, Capex tracking Post Merger Integra.on (System Conversion and Realiza.on of Cost Synergies) Strategy Workshops and retreats Requirements Development and Systems Selec.ons Master Data Management and Centralized User ID Management Solu.ons 3

4 Evolving Role of Internal Audit Historic Mainstream CuOng- Edge Focus Audit en..es based on rota.onal plan Priori.ze audit en..es based on risk Focus on strategic, business, and process risk Perspec.ve Historic Historic Future Style Corporate police Father knows best Consultant and advisor Mandate Compliance with policies and procedures Assurance on financial control; compliance Business assurance Risk Focus Financial Financial plus Enterprise risks Tool Kit Compliance work programs Audit work programs for key processes; controls Risk frameworks, self- assessments Technology None Automated work papers Automated tes.ng and con.nuous monitoring Source: Deloice & Touche 4

5 Data Analy/cs is not just for IT Types 5

6 Where is the Data we need? Vast majority is in a database ERP systems GL s Other applica.ons Flat files 3rd party providers spreadsheets 6

7 What tool Can access all of these? SQL Server ETL / Data Provisioning Powerful Analy.cs Built in web server/ Repor.ng tool Job scheduler Alerts Powerful Flexible Scalable Easy to use Cost Effec.ve (Free) SQL Server Express with Advanced Services 7

8 SQL Server for Data Provisioning SSIS: Powerful, but not usually needed unless doing sophis.cated transforma.ons Linked Server: Virtual reference for use in Queries (think of it as a pointer to the data) Obtain Read Only Permissions to Source Run Simple Script to create linked Server Run queries to access data 8

9 SSIS Graphical Design 9

10 Crea/ng a Linked Server EXEC = '{Linked Server Name}',@srvproduct = '{System DSN Name}',@provider = 'MSDASQL',@datasrc = '{System DSN Name}' EXEC = '{Linked Server Name}',@useself = 'False',@locallogin = NULL,@rmtuser = '{Oracle User Name}',@rmtpassword = '{Oracle User Password}' 10

11 Querying with a Linked Server select * from [LinkedServerName]..SYSADM.PS_PAY_EARNINGS where PAY_END_DT >= DATEADD(dd, - 30, GETDATE()); GO 11

12 Reading in Flat Files - - KNVV Customer Master_ main INT nvarchar(max); exec xp_fileexist '\\SQLPRD08\S$\SAP_Source_Files\Pending_Uploads \KNVV.txt',@FileOK OUTPUT IF (@FileOK = 1) Begin - - Clear old data from prior day: if object_id('sarbox_automation.dbo.knvv') is not null drop table SARBOX_AUTOMATION.dbo.KNVV - - repull master table: = N'SELECT * into SARBOX_AUTOMATION.dbo.KNVV FROM OPENROWSET(''Microsoft.ACE.OLEDB.12.0'', ''Text; HDR=Yes; Database=\\SQLPRD08\S$\SAP_Source_Files \Pending_Uploads;FMT=Delimited( )'', ''SELECT * FROM KNVV.txt'')'; execute End go 12

13 Reading in Spreadsheet Data use CCM truncate table EarnCodesToInclude5_1 BULK INSERT dbo.earncodestoinclude5_1 FROM '\\eu-securefile.eu.emory.edu\finadmin\iad\iad- Share\CCMSAUDIT\Uploads\Earnings Codes\5.1 EARNINGS CODES TO INCLUDE.txt' WITH ( FIRSTROW = 2, FIELDTERMINATOR = '\t', ROWTERMINATOR = '\n' ); Go 13

14 Data Provisioning Model Centralized Model Self Service Model Auditor Data IT or Power User 14

15 New COSO Emphasis on CCM/Analy/cs Principle 16: Ongoing Evalua/ons: Technology offers an opportunity to use computerized monitoring, which has a very high standard of objec.vity (once programmed and tested) and allows for efficient review of large volumes of data at a low cost. Advances in automated ac.vi.es have made con.nuous monitoring computer applica.ons available, and these should be considered when selec.ng ongoing evalua.ons.

16 What is CCM? The use of a combina/on of monitoring sofware and defined business rules to detect, prevent, and monitor the opera/ng effec/veness of internal controls. Key aiributes of CCM/Best of Breed: 100% of transac.ons reviewed, not just a sample Tested in near real.me as they occur Fully automated Robust repor.ng capabili.es Excep.ons history is maintained for meta analysis Tracking and resolu.on is built in Passive alerts and no.fica.ons are built in

17 Evolving Audit Departments TRADITIONAL)AUDIT) Reac%ve' CCM) Proac%ve' Costly' Cost'Effec%ve' Date'Informa%on' Less'than'100%'of' Transac%ons' Real=Time' Comprehensive'='100%''of' Transac%ons'

18 Components of CCM Source Systems GL Reports & Dashboards AP AR Sta.s.cal and Analy.cal Rou.nes Con.nuously Performed on Data Excep.ons Iden.fied Repor.ng Tool Excep.on Management Interface HR Other Replica.on Or ETL Replicated Data For Analysis Alerts Invoice A123 from Acme Solu.ons in the amount of $ may be a duplicate of invoice in the amount of $543.21Dated from Acme Inc

19 Examples of CCM Algorithms Alert when SOD is violated (vs periodic tes.ng) Automated T&E/P- Card fraud detec.on (vs cost of human reviewers) Master File Tampering (Payables, Payroll, etc.) Prevent Revenue Leakage Access Cer.fica.ons/Central User ID Mgt 19

20 Daily No/fica/on of Process Status

21 Excep/on No/fica/ons Via

22 Repor/ng

23 Edit Mode

24 Management Repor/ng

25 Use Itera/ve Approach Iden.fy high risk areas Iden.fy processes that touch these areas Iden.fy systems involved in these processes Iden.fy transac.onal records and associated tables involved in those processes Iden.fy how a transac.on failure would manifest Develop Analy.cal algorithms to recognize 25

26 Download the PIVOT White Paper hip:// 26

27 Careers in Data Analy/cs Big Data is transforming businesses Technology is capturing data at speeds and volumes never even imaginable Accountants, Auditors and CPAs are well- posi.oned to take a leadership role in helping to use Big Data to help the organiza.on achieve business objec.ves Big Data has created a huge demand for professionals with analy.cal exper.se You can have a big impact on your organiza.on and your career

28 QUESTIONS CONTACT INFORMATION Wylie Roberts, C.P.A.: Michael Lisenby: hcp://

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% EDI Moderniza6on: Before and ABer External Loca;ons, Partners, and Services Customers Suppliers / Service Providers Cloud/SaaS Applica;ons &

More information

Identity and Access Positioning of Paradgimo

Identity and Access Positioning of Paradgimo 1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values

More information

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL San Jacinto College Banner & Enterprise Applica5on Review Task Force Report November 01, 2011 FINAL 1 Content Review goal and approach 3 Barriers to effec5ve use of Banner: Consultant observa5ons 10 Consultant

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

BPO. Accerela*ng Revenue Enhancements Through Sales Support Services

BPO. Accerela*ng Revenue Enhancements Through Sales Support Services BPO Accerela*ng Revenue Enhancements Through Sales Support Services What is BPO? Business Process Outsorcing (BPO) is the process of outsourcing specific business func6ons to a third- party service provider

More information

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013 Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology Mission To provide higher technological educa5on with quality, preparing competent professionals, with sound founda5ons in science, technology and innova5on, commi

More information

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces Top Practices in Health IT Compliance Data Breach & Leading Program Prac3ces Overview Introduc3on to ID Experts & Secure Digital Solu3ons Healthcare Data Breach Trends & Drivers Data Incident Management

More information

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Management Expert September 2015 This presenta?on contains extracts from books that are: Copyright 2011 John Wiley & Sons,

More information

The Evolu*on of Service Management

The Evolu*on of Service Management The Evolu*on of Extending Disciplines Across the Enterprise Michael Jones Regional CTO - Architecture Michael.Jones@servicenow.com 2015 Now All Rights Reserved 1 How work gets done today! Emails Spreadsheets

More information

Bank of America Security by Design. Derrick Barksdale Jason Gillam

Bank of America Security by Design. Derrick Barksdale Jason Gillam Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security

More information

FULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE

FULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE FULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE BENEFITS OF ENTERPRISE RISK MANAGEMENT (ERM) More effec$ve strategic and opera/onal planning: Alignment of objec/ves and risks

More information

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g RM-C A R o a d t o y o u r C l o u d Professional Service C R M a n d C l o u d C o n s u l t i n g CRM-C Highlights! A Unique Cloud CRM Consulting service firm! Specializing in cloud CRM and Office Collaboration

More information

Informa.on Systems in Organiza.ons

Informa.on Systems in Organiza.ons Informa.on Systems in Organiza.ons MIS 2101 Week 7 / Chapter 7 Enhancing Business Processes Using Enterprise Informa.on Systems Photo: Objet Mathema+que by Man Ray, 1934 Chapter 7 Learning Objec.ves Core

More information

Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv.

Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv. UNIVERSITY OF PAVIA Performance Management Ch. 9 The Performance Measurement Mechanism Chiara Demar8ni mariachiara.demar8ni@unipv.it Master in Interna+onal Business and Economics Defini8on Performance

More information

Big Data + Big Analytics Transforming the way you do business

Big Data + Big Analytics Transforming the way you do business Big Data + Big Analytics Transforming the way you do business Bryan Harris Chief Technology Officer VSTI A SAS Company 1 AGENDA Lets get Real Beyond the Buzzwords Who is SAS? Our PerspecDve of Big Data

More information

Best Prac*ces in Corporate Card Expense Management May 2012

Best Prac*ces in Corporate Card Expense Management May 2012 Proprietary & Confiden0al Not to be distributed without the express wri9en consent of BMO Financial Group Best Prac*ces in Corporate Card Expense Management May 2012 Agenda Industry Trends and Best Prac0ces

More information

Everything You Need to Know about Cloud BI. Freek Kamst

Everything You Need to Know about Cloud BI. Freek Kamst Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to

More information

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll

More information

Strategy and Architecture to Establish 'Smart Plants'

Strategy and Architecture to Establish 'Smart Plants' Strategy and Architecture to Establish 'Smart Plants' About Intrigo We are a solu*on provider of Business Applica:ons focused on orchestra*ng Customer Value Networks in the changing SAP Enterprise technology

More information

Digital Communication Agency

Digital Communication Agency Digital Communication Agency The & philosophy for us, brands need to connect. because customers are people. and the chord you need to strike is in the mind and in the heart Partners in Growth Why Barton

More information

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013 Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty

More information

Project Management Success on SharePoint

Project Management Success on SharePoint Project Management Success on SharePoint The Enterprise PMO Problem How to do the following: How to manage a large porolio of projects over a wide geographical region? How to manage project status repor9ng

More information

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items

More information

Driving Working Capital Op1miza1on from AP - rather than Treasury

Driving Working Capital Op1miza1on from AP - rather than Treasury Driving Working Capital Op1miza1on from AP - rather than Treasury Agenda Introduc1on of Basware Where s Treasury How AP Makes a Difference Unlocking New Value Streams Basware: Our Company Basware: Our

More information

Capitalize on your carbon management solu4on investment

Capitalize on your carbon management solu4on investment Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 info@cdproject.net www.cdproject.net

More information

Payments Cards and Mobile Consul3ng Overview 2013

Payments Cards and Mobile Consul3ng Overview 2013 Payments Cards and Mobile Consul3ng Overview 2013 Our Services A digital publishing and marke3ng pla4orm for the future of payments Publishing Research Consul0ng Public Rela0ons Marke0ng/Branding Corporate

More information

DTCC Data Quality Survey Industry Report

DTCC Data Quality Survey Industry Report DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6

More information

FTC Data Security Standard

FTC Data Security Standard FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls

More information

Fixed Scope Offering (FSO) for Oracle SRM

Fixed Scope Offering (FSO) for Oracle SRM Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,

More information

Council Monitoring & Assessment Program Development

Council Monitoring & Assessment Program Development Council Monitoring & Assessment Program Development Steve Giordano & Mark Monaco, Na9onal Oceanic & Atmospheric Administra9on Greg Steyer & Mike Lee, U.S. Geological Survey Alyssa Dausman & Jessica Henkel,

More information

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist

More information

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial

More information

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9 Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may

More information

NETWORK DEVICE SECURITY AUDITING

NETWORK DEVICE SECURITY AUDITING E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,

More information

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al

More information

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory. Enterprise Thousands of companies save 1me and money by using SIMMS to manage their inventory. SIMMS is a powerful inventory management system that enables you to gain fast and accurate control over your

More information

Advanced Invoice Processing: One Step at a Time. Sam Abadir Solu.on Manager Accoun.ng Percep.ve So7ware

Advanced Invoice Processing: One Step at a Time. Sam Abadir Solu.on Manager Accoun.ng Percep.ve So7ware Advanced Invoice Processing: One Step at a Time Sam Abadir Solu.on Manager Accoun.ng Percep.ve So7ware AutomaAon of Accounts Payable With only about 5 % of the world s invoices truly automated end- to-

More information

IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance

IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance Mohan Natraj Content Collec(on & Archiving Informa(on Lifecycle Governance Enterprise Content Management 2011 IBM Corporation

More information

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895

More information

IT Asset Management Best Practices Using RFID. Stephen Schwartz

IT Asset Management Best Practices Using RFID. Stephen Schwartz IT Asset Management Best Practices Using RFID Stephen Schwartz 1 Agenda IAITAM Functional Areas ITAM Best Practice Areas for RFID Asset Life Cycle Process Understanding Your Policies & Processes Suggested

More information

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November

More information

Discovering Computers Fundamentals, 2010 Edition. Living in a Digital World

Discovering Computers Fundamentals, 2010 Edition. Living in a Digital World Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objec&ves Overview Discuss the importance of project management, feasibility assessment, documenta8on, and data and informa8on

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for

More information

GAME-CHANGING TRENDS IN SUPPLY CHAIN

GAME-CHANGING TRENDS IN SUPPLY CHAIN customer teams FIRST focused ANNUAL on serving REPORT override system designations BY THE of SUPPLY available CHAIN MANAGEMENT FACULTY AT THE The research partners at UNIVERSITY Ernst and Young OF TENNESSEE

More information

Business Analysis Center of Excellence The Cornerstone of Business Transformation

Business Analysis Center of Excellence The Cornerstone of Business Transformation February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President

More information

Exchange of experience from a SuccessFactors LMS Implementa9on

Exchange of experience from a SuccessFactors LMS Implementa9on Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking

More information

The Right BI Tool for the Job in a non- SAP Applica9on Environment

The Right BI Tool for the Job in a non- SAP Applica9on Environment September 9 11, 2013 Anaheim, California The Right BI Tool for the Job in a non- SAP Applica9on Environment Speaker Name(s): Ty Miller Full Spectrum Business Intelligence Self Service Dashboards and Apps

More information

Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank

Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank Financial Fraud Threats & Preven3on Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank Why Pay ACen3on to Fraud Risks? Fraud occurs everywhere, and NO organiza3on is immune Changing business

More information

An Econocom Group company. Your partner in the transi4on towards Mobile IT

An Econocom Group company. Your partner in the transi4on towards Mobile IT An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets

More information

UAB Cyber Security Ini1a1ve

UAB Cyber Security Ini1a1ve UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment

More information

How Predic+ve Opera+onal Performance Can Transform a Services Organiza+on

How Predic+ve Opera+onal Performance Can Transform a Services Organiza+on How Predic+ve Opera+onal Performance Can Transform a Services Organiza+on Discover how one company reinvented its managed service business by using Splunk> to turn machine data into a Real Time Opera+ng

More information

Adding Value to Automated Web Scans. Burp Suite and Beyond

Adding Value to Automated Web Scans. Burp Suite and Beyond Adding Value to Automated Web Scans Burp Suite and Beyond Automated Scanning vs Manual Tes;ng Manual Tes;ng Tools/Suites At MSU - QualysGuard WAS & Burp Suite Automated Scanning - iden;fy acack surface

More information

IT Change Management Process Training

IT Change Management Process Training IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge

More information

The Pros and Cons of Organiza2on

The Pros and Cons of Organiza2on Remain Independent or Align? A Guide To Manage Through This Cri2cal Decision Sponsored By: TRG Healthcare October 12, 2010 1 Welcome Remain Independent or Align? A Guide To Manage Through This Cri=cal

More information

Integra(ng Data Analy(cs into a Risk- Based Audit Plan. Presented by: Andrew Simpson, MBA, Chief Operating Officer, CaseWare Analytics

Integra(ng Data Analy(cs into a Risk- Based Audit Plan. Presented by: Andrew Simpson, MBA, Chief Operating Officer, CaseWare Analytics Integra(ng Data Analy(cs into a Risk- Based Audit Plan Presented by: Andrew Simpson, MBA, Chief Operating Officer, CaseWare Analytics Drivers of Risk Management Risk is high on the agenda for boards today

More information

Main Research Gaps in Cyber Security

Main Research Gaps in Cyber Security Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis

More information

CiviCRM Implementa/on Case Study

CiviCRM Implementa/on Case Study CiviCRM Implementa/on Case Study Leukaemia and Lymphoma Research www.leukaemialymphomaresearch.org.uk Parvez Saleh About the LLR Having gone through the socware/supplier selec/on process, the LLR decided

More information

Oracle Solu?ons for Higher Educa?on

Oracle Solu?ons for Higher Educa?on Presented with Oracle Solu?ons for Higher Educa?on Cole Clark Global Vice President Oracle, Educa?on & Research June 12, 2014 Oracle Confiden?al Internal/Restricted/Highly Restricted Safe Harbor Statement

More information

Armedia Capabili-es Brief Enterprise Content and Informa1on Management Professionals

Armedia Capabili-es Brief Enterprise Content and Informa1on Management Professionals Armedia Capabili-es Brief Enterprise Content and Informa1on Management Professionals Company Overview ü Founded 2002 ü CMMI Level 3 Appraised ü GSA IT- 70 GS- 35F- 0891P ü Headquarters: Atlanta, Ga ü Offices:

More information

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael

More information

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity B2B Offerings Helping businesses op2mize Infolob s amazing b2b offerings helps your company achieve maximum produc2vity What is B2B? B2B is shorthand for the sales prac4ce called business- to- business

More information

Five Factors Driving Businesses to Rethink EDI on IBM i

Five Factors Driving Businesses to Rethink EDI on IBM i Simplify and Accelerate e- Business Integra6on Five Factors Driving Businesses to Rethink EDI on IBM i EDI Change Drivers External Loca6ons, Partners, and Services Customers Suppliers / Service Providers

More information

Complete End to End AP Automation: The benefits for your organization

Complete End to End AP Automation: The benefits for your organization Complete End to End AP Automation: The benefits for your organization S:ck Around All session a*endees will receive Chris Elmore s best selling AP automa:on e- book: The 8 PiAalls of AP Automa:on 2 Agenda

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that

More information

The Real Score of Cloud

The Real Score of Cloud The Real Score of Cloud Mayur Sahni Sr. Research Manger IDC Asia/Pacific msahni@idc.com @mayursahni Digital Transformation Changing Role of IT Innova&on Informa&on Business agility Changing role of the

More information

Welcome. HITRUST 2014 Conference April 22, 2014 HITRUST. Health Information Trust Alliance

Welcome. HITRUST 2014 Conference April 22, 2014 HITRUST. Health Information Trust Alliance Welcome HITRUST 2014 Conference April 22, 2014 HITRUST Health Information Trust Alliance The Evolving Information Security Organization Challenges and Successes Jason Taule, Chief Security and Privacy

More information

ORION Retail Systems. Orion Digital Integration Inc. Point of Sale Reinvented for a Mobile World

ORION Retail Systems. Orion Digital Integration Inc. Point of Sale Reinvented for a Mobile World ORION Retail Systems Orion Digital Integration Inc Point of Sale Reinvented for a Mobile World O Orion Retail Systems ORION Digital Integraon Inc. - Corporate Profile Established in 2003, Orion Digital

More information

Managed Services. An essen/al set of tools for today's businesses

Managed Services. An essen/al set of tools for today's businesses Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng

More information

Presenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant

Presenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant Presenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant Challenges Facing the NHS A BI Perspec(ve Challenges Facing

More information

CS 5150 So(ware Engineering System Architecture: Introduc<on

CS 5150 So(ware Engineering System Architecture: Introduc<on Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering System Architecture: Introduc

More information

Agenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment

Agenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment 2011 ERM Symposium March 14 16, 2011 Continuous Controls Monitoring Futuristic Approach to Enterprise Risk Management Swissotel, Chicago, Chicago IL. Speakers: Syed M. Ali Alan Ash Sr. Audit Manager, Director

More information

CS 4604: Introduc0on to Database Management Systems

CS 4604: Introduc0on to Database Management Systems CS 4604: Introduc0on to Database Management Systems B. Aditya Prakash Lecture #1: Introduc/on Many slides based on material by Profs. Murali, Ramakrishnan and Faloutsos Course Informa0on Instructor B.

More information

Data Stream Algorithms in Storm and R. Radek Maciaszek

Data Stream Algorithms in Storm and R. Radek Maciaszek Data Stream Algorithms in Storm and R Radek Maciaszek Who Am I? l Radek Maciaszek l l l l l l Consul9ng at DataMine Lab (www.dataminelab.com) - Data mining, business intelligence and data warehouse consultancy.

More information

Introduc)on to the IoT- A methodology

Introduc)on to the IoT- A methodology 10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy

More information

Splunk for Networking and SDN

Splunk for Networking and SDN Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking

More information

Office of Business and Financial Services. Department Budget Presenta0on

Office of Business and Financial Services. Department Budget Presenta0on Office of Business and Financial Services Department Budget Presenta0on Office of Business and Financial Services Overview Office of Business and Financial Services Overview Fund for Budgetary Purposes General

More information

Intro to BI. Mul0- dimensional Analysis

Intro to BI. Mul0- dimensional Analysis Intro to BI BI Vendor Landscape BI Roles & Responsibili0es Data Governance and Quality DW Architectures ETL Processes BI Capabili0es & Maturity Mul0- dimensional Analysis BI Vendors and Products Module

More information

WORKSHOP People Change Management Strategy

WORKSHOP People Change Management Strategy WORKSHOP People Change Management Strategy You will create the People Change Management Strategy document in this workshop to help you answer the ques;on: How much People Change Management is needed for

More information

Mobile Payments World. Consul4ng Overview 2013

Mobile Payments World. Consul4ng Overview 2013 Mobile Payments World Consul4ng Overview 2013 About Us Payments Cards and Mobile Consul4ng occupies a niche posi4on in the market. We have been in business for more than 17 years and through our Publica4ons

More information

So#ware quality assurance - introduc4on. Dr Ana Magazinius

So#ware quality assurance - introduc4on. Dr Ana Magazinius So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something

More information

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS Challenges of PM in Albania and a New Professional Perspec8ve Prepared by: Dritan Mezini, MBA, MPM B.S. CS Table of contents Presenter s brief introduc8on General Concepts What is a project? What is Project

More information

Step Away from the Waterfall: You Really Can Use Agile on an ERP Project

Step Away from the Waterfall: You Really Can Use Agile on an ERP Project Step Away from the Waterfall: You Really Can Use Agile on an ERP Project October 2, 2012 This document is protected under the copyright laws of the United States and/or other countries as an unpublished

More information

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements OpAuditTM from is the first compliance management product on the market to successfully track manual controls and technical controls in the same workflow-based system. This ingenious solution gathers &

More information

World Around EPiServer Add-Ons

World Around EPiServer Add-Ons World Around EPiServer Add-Ons Peter Yeung Director of Business Development Jacob Khan Solution Architect The Choice for Leaders in Digital Before We Start. An Exercise! Email / Marketing Personaliza+on

More information

IT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic

IT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic IT Governance in Organizations Experiencing Decentralization Jelena Zdravkovic Department of Computer & Systems Sciences (DSV), Stockholm University, Sweden Giannoulis About the Speaker Title: Associate

More information

Informa*on Management

Informa*on Management Informa*on Management Deepak Mohan SVP, Informa3on Management Group 1 Symantec Informa*on Management Strategy Protect Completely Dedupe Everywhere Delete Confidently Discover Efficiently Backup, archive

More information

Developing the Agile Mindset for Organiza7onal Agility. Shannon Ewan Managing Director, ICAgile @ShannonEwan, @ICAgile

Developing the Agile Mindset for Organiza7onal Agility. Shannon Ewan Managing Director, ICAgile @ShannonEwan, @ICAgile Developing the Agile Mindset for Organiza7onal Agility Shannon Ewan Managing Director, ICAgile @ShannonEwan, @ICAgile 1 Who is here today? And Why? 2 To kick things off What is Agile? 3 Agile is a mindset

More information

We are pleased to offer the following program to Woodstock Area Educators:

We are pleased to offer the following program to Woodstock Area Educators: DATE: Spring 2016 TO: RE: Woodstock Area Educators Upcoming Cohort Programs Presently, many teachers are enrolled in cohort graduate programs through partnerships between local regional offices of education,

More information

From Big Data to Value

From Big Data to Value From Big Data to Value The Power of Master Data Management 2.0 Sergio Juarez SVP Elemica EMEA & LATAM Reveal Oct 2014 Agenda Master Data Management Why Now? What To Do? How To Do It? What s Next? Today

More information

Big Data, Open Data Personal Data? Navigate around the Mine Fields to Avoid Unintended Consequences. Ann Cavoukian, Ph.D.

Big Data, Open Data Personal Data? Navigate around the Mine Fields to Avoid Unintended Consequences. Ann Cavoukian, Ph.D. Big Data, Open Data Personal Data? Navigate around the Mine Fields to Avoid Unintended Consequences Ann Cavoukian, Ph.D. Privacy & Big Data Ins9tute Ryerson University Toronto Sunshine Summit September

More information

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology Understanding Cloud Compu2ng Services Rain in business success with amazing solu2ons in Cloud technology What is Cloud Compu2ng? Cloud compu2ng encompasses various services and ac2vi2es carried out over

More information

IMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS

IMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS IMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS ICD- 10 Acronym Interna(onal Classifica(on of Diseases Tenth Revision ICD- 10 Basic Facts Replaces ICD- 9 Five digit coding

More information

EAI. Op'mizing your integra'on cost. Sunil Kumar Pandey Persistent Systems Ltd. Session: 20188

EAI. Op'mizing your integra'on cost. Sunil Kumar Pandey Persistent Systems Ltd. Session: 20188 EAI Op'mizing your integra'on cost Sunil Kumar Pandey Persistent Systems Ltd. Session: 20188 EAI need and challenges Mergers and acquisi'ons have become more common than ever before. Current economic situa'on

More information

Developing a Full- Spectrum Security Training Program

Developing a Full- Spectrum Security Training Program Developing a Full- Spectrum Security Training Program Wayne State University Compu3ng & Informa3on Kevin Hayes, CISSP, CISM Informa)on Security Officer Geoff Nathan Faculty Liason Agenda Background Our

More information

How Do You Secure An Environment Without a Perimeter?

How Do You Secure An Environment Without a Perimeter? How Do You Secure An Environment Without a Perimeter? Using Emerging Technology Processes to Support InfoSec Efforts in an Agile Data Center PTC Briefing January 18, 2015 About the Presenters CHARLA GRIFFY-BROWN

More information

Bill Sieglein, Founder CSO Breakfast Club PLATINUM SPONSOR: SOLUTIONARY

Bill Sieglein, Founder CSO Breakfast Club PLATINUM SPONSOR: SOLUTIONARY AGENDA 8:00 8:30 Breakfast and Social Networking 8:30 8:45 Welcome & Introduc@ons, Bill Sieglein, Founder CSO Breakfast Club 8:45 9:15 Keynote: Don Gray, Chief Security Strategist PLATINUM SPONSOR: SOLUTIONARY

More information