Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit
|
|
- Alexandra Owens
- 8 years ago
- Views:
Transcription
1 Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit Presented to: ISACA and IIA Joint Mee/ng October 10, 2014 By
2 Outline Introduc.on The Evolving Role of Internal Audit The importance of Data Most Cost Effec.ve and Best prac.ces in Data Provisioning The next logical step - - CCM Most Cost Effec.ve and Best prac.ces in CCM
3 Rausch Advisory Services LLC. Internal Audit: SAS70/ISO Reviews Compliance Reviews Construc.on Audits Risk Mgt. Sarbanes Oxley (Including Automa.on) Data Analy.cs Con.nuous Controls Monitoring (CCM) PMO/Methodology Establishment and training De- provisioning Automa.on Informa/on Security: Informa.on Security Enterprise- wide Risk Assessment Business Con.nuity Management Vulnerability Assessments Social Engineering Network, Wireless and Web Applica.on Security Reviews Incident Analysis and Response Data Loss Preven.on Audi.ng and Implementa.on Interim Resource Management Security Awareness Training Finance & Accoun/ng: Close Accelera.on and Automa.on Budge.ng/FP&A - - System selec.on, Custom Solu.ons and applica.ons, and interim resources) Senior Staff Augmenta.on/Interim Execu.ves Custom Accoun.ng Applica.on development (in Excel, Access,.NET, SQL Server, Visual Basic and other technologies) Business Performance Improvement & Systems: PIVOT ( Profitability Improvement Via Op.mized Transac.ons ) Process Improvement, Quality, and Con.nuous Improvement Business Intelligence (Including KPI Metrics and linkage to strategy and incen.ve programs) Project Management Resources Custom Solu.ons in Time Capture, project tracking, Capex tracking Post Merger Integra.on (System Conversion and Realiza.on of Cost Synergies) Strategy Workshops and retreats Requirements Development and Systems Selec.ons Master Data Management and Centralized User ID Management Solu.ons 3
4 Evolving Role of Internal Audit Historic Mainstream CuOng- Edge Focus Audit en..es based on rota.onal plan Priori.ze audit en..es based on risk Focus on strategic, business, and process risk Perspec.ve Historic Historic Future Style Corporate police Father knows best Consultant and advisor Mandate Compliance with policies and procedures Assurance on financial control; compliance Business assurance Risk Focus Financial Financial plus Enterprise risks Tool Kit Compliance work programs Audit work programs for key processes; controls Risk frameworks, self- assessments Technology None Automated work papers Automated tes.ng and con.nuous monitoring Source: Deloice & Touche 4
5 Data Analy/cs is not just for IT Types 5
6 Where is the Data we need? Vast majority is in a database ERP systems GL s Other applica.ons Flat files 3rd party providers spreadsheets 6
7 What tool Can access all of these? SQL Server ETL / Data Provisioning Powerful Analy.cs Built in web server/ Repor.ng tool Job scheduler Alerts Powerful Flexible Scalable Easy to use Cost Effec.ve (Free) SQL Server Express with Advanced Services 7
8 SQL Server for Data Provisioning SSIS: Powerful, but not usually needed unless doing sophis.cated transforma.ons Linked Server: Virtual reference for use in Queries (think of it as a pointer to the data) Obtain Read Only Permissions to Source Run Simple Script to create linked Server Run queries to access data 8
9 SSIS Graphical Design 9
10 Crea/ng a Linked Server EXEC = '{Linked Server Name}',@srvproduct = '{System DSN Name}',@provider = 'MSDASQL',@datasrc = '{System DSN Name}' EXEC = '{Linked Server Name}',@useself = 'False',@locallogin = NULL,@rmtuser = '{Oracle User Name}',@rmtpassword = '{Oracle User Password}' 10
11 Querying with a Linked Server select * from [LinkedServerName]..SYSADM.PS_PAY_EARNINGS where PAY_END_DT >= DATEADD(dd, - 30, GETDATE()); GO 11
12 Reading in Flat Files - - KNVV Customer Master_ main INT nvarchar(max); exec xp_fileexist '\\SQLPRD08\S$\SAP_Source_Files\Pending_Uploads \KNVV.txt',@FileOK OUTPUT IF (@FileOK = 1) Begin - - Clear old data from prior day: if object_id('sarbox_automation.dbo.knvv') is not null drop table SARBOX_AUTOMATION.dbo.KNVV - - repull master table: = N'SELECT * into SARBOX_AUTOMATION.dbo.KNVV FROM OPENROWSET(''Microsoft.ACE.OLEDB.12.0'', ''Text; HDR=Yes; Database=\\SQLPRD08\S$\SAP_Source_Files \Pending_Uploads;FMT=Delimited( )'', ''SELECT * FROM KNVV.txt'')'; execute End go 12
13 Reading in Spreadsheet Data use CCM truncate table EarnCodesToInclude5_1 BULK INSERT dbo.earncodestoinclude5_1 FROM '\\eu-securefile.eu.emory.edu\finadmin\iad\iad- Share\CCMSAUDIT\Uploads\Earnings Codes\5.1 EARNINGS CODES TO INCLUDE.txt' WITH ( FIRSTROW = 2, FIELDTERMINATOR = '\t', ROWTERMINATOR = '\n' ); Go 13
14 Data Provisioning Model Centralized Model Self Service Model Auditor Data IT or Power User 14
15 New COSO Emphasis on CCM/Analy/cs Principle 16: Ongoing Evalua/ons: Technology offers an opportunity to use computerized monitoring, which has a very high standard of objec.vity (once programmed and tested) and allows for efficient review of large volumes of data at a low cost. Advances in automated ac.vi.es have made con.nuous monitoring computer applica.ons available, and these should be considered when selec.ng ongoing evalua.ons.
16 What is CCM? The use of a combina/on of monitoring sofware and defined business rules to detect, prevent, and monitor the opera/ng effec/veness of internal controls. Key aiributes of CCM/Best of Breed: 100% of transac.ons reviewed, not just a sample Tested in near real.me as they occur Fully automated Robust repor.ng capabili.es Excep.ons history is maintained for meta analysis Tracking and resolu.on is built in Passive alerts and no.fica.ons are built in
17 Evolving Audit Departments TRADITIONAL)AUDIT) Reac%ve' CCM) Proac%ve' Costly' Cost'Effec%ve' Date'Informa%on' Less'than'100%'of' Transac%ons' Real=Time' Comprehensive'='100%''of' Transac%ons'
18 Components of CCM Source Systems GL Reports & Dashboards AP AR Sta.s.cal and Analy.cal Rou.nes Con.nuously Performed on Data Excep.ons Iden.fied Repor.ng Tool Excep.on Management Interface HR Other Replica.on Or ETL Replicated Data For Analysis Alerts Invoice A123 from Acme Solu.ons in the amount of $ may be a duplicate of invoice in the amount of $543.21Dated from Acme Inc
19 Examples of CCM Algorithms Alert when SOD is violated (vs periodic tes.ng) Automated T&E/P- Card fraud detec.on (vs cost of human reviewers) Master File Tampering (Payables, Payroll, etc.) Prevent Revenue Leakage Access Cer.fica.ons/Central User ID Mgt 19
20 Daily No/fica/on of Process Status
21 Excep/on No/fica/ons Via
22 Repor/ng
23 Edit Mode
24 Management Repor/ng
25 Use Itera/ve Approach Iden.fy high risk areas Iden.fy processes that touch these areas Iden.fy systems involved in these processes Iden.fy transac.onal records and associated tables involved in those processes Iden.fy how a transac.on failure would manifest Develop Analy.cal algorithms to recognize 25
26 Download the PIVOT White Paper hip:// 26
27 Careers in Data Analy/cs Big Data is transforming businesses Technology is capturing data at speeds and volumes never even imaginable Accountants, Auditors and CPAs are well- posi.oned to take a leadership role in helping to use Big Data to help the organiza.on achieve business objec.ves Big Data has created a huge demand for professionals with analy.cal exper.se You can have a big impact on your organiza.on and your career
28 QUESTIONS CONTACT INFORMATION Wylie Roberts, C.P.A.: Michael Lisenby: hcp://
Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%
Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% EDI Moderniza6on: Before and ABer External Loca;ons, Partners, and Services Customers Suppliers / Service Providers Cloud/SaaS Applica;ons &
More informationIdentity and Access Positioning of Paradgimo
1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values
More informationSan Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL
San Jacinto College Banner & Enterprise Applica5on Review Task Force Report November 01, 2011 FINAL 1 Content Review goal and approach 3 Barriers to effec5ve use of Banner: Consultant observa5ons 10 Consultant
More informationPrivileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
More informationBPO. Accerela*ng Revenue Enhancements Through Sales Support Services
BPO Accerela*ng Revenue Enhancements Through Sales Support Services What is BPO? Business Process Outsorcing (BPO) is the process of outsourcing specific business func6ons to a third- party service provider
More informationDeveloping Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed
More informationProject Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
More informationMission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology
Mission To provide higher technological educa5on with quality, preparing competent professionals, with sound founda5ons in science, technology and innova5on, commi
More informationTop Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces
Top Practices in Health IT Compliance Data Breach & Leading Program Prac3ces Overview Introduc3on to ID Experts & Secure Digital Solu3ons Healthcare Data Breach Trends & Drivers Data Incident Management
More informationAVOIDING SILOED DATA AND SILOED DATA MANAGEMENT
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Management Expert September 2015 This presenta?on contains extracts from books that are: Copyright 2011 John Wiley & Sons,
More informationThe Evolu*on of Service Management
The Evolu*on of Extending Disciplines Across the Enterprise Michael Jones Regional CTO - Architecture Michael.Jones@servicenow.com 2015 Now All Rights Reserved 1 How work gets done today! Emails Spreadsheets
More informationBank of America Security by Design. Derrick Barksdale Jason Gillam
Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security
More informationFULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE
FULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE BENEFITS OF ENTERPRISE RISK MANAGEMENT (ERM) More effec$ve strategic and opera/onal planning: Alignment of objec/ves and risks
More informationA R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g
RM-C A R o a d t o y o u r C l o u d Professional Service C R M a n d C l o u d C o n s u l t i n g CRM-C Highlights! A Unique Cloud CRM Consulting service firm! Specializing in cloud CRM and Office Collaboration
More informationInforma.on Systems in Organiza.ons
Informa.on Systems in Organiza.ons MIS 2101 Week 7 / Chapter 7 Enhancing Business Processes Using Enterprise Informa.on Systems Photo: Objet Mathema+que by Man Ray, 1934 Chapter 7 Learning Objec.ves Core
More informationPerformance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv.
UNIVERSITY OF PAVIA Performance Management Ch. 9 The Performance Measurement Mechanism Chiara Demar8ni mariachiara.demar8ni@unipv.it Master in Interna+onal Business and Economics Defini8on Performance
More informationBig Data + Big Analytics Transforming the way you do business
Big Data + Big Analytics Transforming the way you do business Bryan Harris Chief Technology Officer VSTI A SAS Company 1 AGENDA Lets get Real Beyond the Buzzwords Who is SAS? Our PerspecDve of Big Data
More informationBest Prac*ces in Corporate Card Expense Management May 2012
Proprietary & Confiden0al Not to be distributed without the express wri9en consent of BMO Financial Group Best Prac*ces in Corporate Card Expense Management May 2012 Agenda Industry Trends and Best Prac0ces
More informationEverything You Need to Know about Cloud BI. Freek Kamst
Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to
More informationOnline Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1
Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll
More informationStrategy and Architecture to Establish 'Smart Plants'
Strategy and Architecture to Establish 'Smart Plants' About Intrigo We are a solu*on provider of Business Applica:ons focused on orchestra*ng Customer Value Networks in the changing SAP Enterprise technology
More informationDigital Communication Agency
Digital Communication Agency The & philosophy for us, brands need to connect. because customers are people. and the chord you need to strike is in the mind and in the heart Partners in Growth Why Barton
More informationUsing FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013
Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty
More informationProject Management Success on SharePoint
Project Management Success on SharePoint The Enterprise PMO Problem How to do the following: How to manage a large porolio of projects over a wide geographical region? How to manage project status repor9ng
More informationProtec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
More informationDriving Working Capital Op1miza1on from AP - rather than Treasury
Driving Working Capital Op1miza1on from AP - rather than Treasury Agenda Introduc1on of Basware Where s Treasury How AP Makes a Difference Unlocking New Value Streams Basware: Our Company Basware: Our
More informationCapitalize on your carbon management solu4on investment
Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 info@cdproject.net www.cdproject.net
More informationPayments Cards and Mobile Consul3ng Overview 2013
Payments Cards and Mobile Consul3ng Overview 2013 Our Services A digital publishing and marke3ng pla4orm for the future of payments Publishing Research Consul0ng Public Rela0ons Marke0ng/Branding Corporate
More informationDTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
More informationFTC Data Security Standard
FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls
More informationFixed Scope Offering (FSO) for Oracle SRM
Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,
More informationCouncil Monitoring & Assessment Program Development
Council Monitoring & Assessment Program Development Steve Giordano & Mark Monaco, Na9onal Oceanic & Atmospheric Administra9on Greg Steyer & Mike Lee, U.S. Geological Survey Alyssa Dausman & Jessica Henkel,
More informationEffec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
More informationDEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING
DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial
More informationHow To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9
Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may
More informationNETWORK DEVICE SECURITY AUDITING
E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,
More informationMAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
More informationEnterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.
Enterprise Thousands of companies save 1me and money by using SIMMS to manage their inventory. SIMMS is a powerful inventory management system that enables you to gain fast and accurate control over your
More informationAdvanced Invoice Processing: One Step at a Time. Sam Abadir Solu.on Manager Accoun.ng Percep.ve So7ware
Advanced Invoice Processing: One Step at a Time Sam Abadir Solu.on Manager Accoun.ng Percep.ve So7ware AutomaAon of Accounts Payable With only about 5 % of the world s invoices truly automated end- to-
More informationIBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance
IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance Mohan Natraj Content Collec(on & Archiving Informa(on Lifecycle Governance Enterprise Content Management 2011 IBM Corporation
More informationProgram Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
More informationIT Asset Management Best Practices Using RFID. Stephen Schwartz
IT Asset Management Best Practices Using RFID Stephen Schwartz 1 Agenda IAITAM Functional Areas ITAM Best Practice Areas for RFID Asset Life Cycle Process Understanding Your Policies & Processes Suggested
More informationInformation and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November
More informationDiscovering Computers Fundamentals, 2010 Edition. Living in a Digital World
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objec&ves Overview Discuss the importance of project management, feasibility assessment, documenta8on, and data and informa8on
More informationPhone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
More informationQubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management
Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for
More informationGAME-CHANGING TRENDS IN SUPPLY CHAIN
customer teams FIRST focused ANNUAL on serving REPORT override system designations BY THE of SUPPLY available CHAIN MANAGEMENT FACULTY AT THE The research partners at UNIVERSITY Ernst and Young OF TENNESSEE
More informationBusiness Analysis Center of Excellence The Cornerstone of Business Transformation
February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President
More informationExchange of experience from a SuccessFactors LMS Implementa9on
Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking
More informationThe Right BI Tool for the Job in a non- SAP Applica9on Environment
September 9 11, 2013 Anaheim, California The Right BI Tool for the Job in a non- SAP Applica9on Environment Speaker Name(s): Ty Miller Full Spectrum Business Intelligence Self Service Dashboards and Apps
More informationFinancial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank
Financial Fraud Threats & Preven3on Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank Why Pay ACen3on to Fraud Risks? Fraud occurs everywhere, and NO organiza3on is immune Changing business
More informationAn Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
More informationUAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
More informationHow Predic+ve Opera+onal Performance Can Transform a Services Organiza+on
How Predic+ve Opera+onal Performance Can Transform a Services Organiza+on Discover how one company reinvented its managed service business by using Splunk> to turn machine data into a Real Time Opera+ng
More informationAdding Value to Automated Web Scans. Burp Suite and Beyond
Adding Value to Automated Web Scans Burp Suite and Beyond Automated Scanning vs Manual Tes;ng Manual Tes;ng Tools/Suites At MSU - QualysGuard WAS & Burp Suite Automated Scanning - iden;fy acack surface
More informationIT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
More informationThe Pros and Cons of Organiza2on
Remain Independent or Align? A Guide To Manage Through This Cri2cal Decision Sponsored By: TRG Healthcare October 12, 2010 1 Welcome Remain Independent or Align? A Guide To Manage Through This Cri=cal
More informationIntegra(ng Data Analy(cs into a Risk- Based Audit Plan. Presented by: Andrew Simpson, MBA, Chief Operating Officer, CaseWare Analytics
Integra(ng Data Analy(cs into a Risk- Based Audit Plan Presented by: Andrew Simpson, MBA, Chief Operating Officer, CaseWare Analytics Drivers of Risk Management Risk is high on the agenda for boards today
More informationMain Research Gaps in Cyber Security
Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis
More informationCiviCRM Implementa/on Case Study
CiviCRM Implementa/on Case Study Leukaemia and Lymphoma Research www.leukaemialymphomaresearch.org.uk Parvez Saleh About the LLR Having gone through the socware/supplier selec/on process, the LLR decided
More informationOracle Solu?ons for Higher Educa?on
Presented with Oracle Solu?ons for Higher Educa?on Cole Clark Global Vice President Oracle, Educa?on & Research June 12, 2014 Oracle Confiden?al Internal/Restricted/Highly Restricted Safe Harbor Statement
More informationArmedia Capabili-es Brief Enterprise Content and Informa1on Management Professionals
Armedia Capabili-es Brief Enterprise Content and Informa1on Management Professionals Company Overview ü Founded 2002 ü CMMI Level 3 Appraised ü GSA IT- 70 GS- 35F- 0891P ü Headquarters: Atlanta, Ga ü Offices:
More informationFounda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
More informationB2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity
B2B Offerings Helping businesses op2mize Infolob s amazing b2b offerings helps your company achieve maximum produc2vity What is B2B? B2B is shorthand for the sales prac4ce called business- to- business
More informationFive Factors Driving Businesses to Rethink EDI on IBM i
Simplify and Accelerate e- Business Integra6on Five Factors Driving Businesses to Rethink EDI on IBM i EDI Change Drivers External Loca6ons, Partners, and Services Customers Suppliers / Service Providers
More informationComplete End to End AP Automation: The benefits for your organization
Complete End to End AP Automation: The benefits for your organization S:ck Around All session a*endees will receive Chris Elmore s best selling AP automa:on e- book: The 8 PiAalls of AP Automa:on 2 Agenda
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationBig Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas
Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that
More informationThe Real Score of Cloud
The Real Score of Cloud Mayur Sahni Sr. Research Manger IDC Asia/Pacific msahni@idc.com @mayursahni Digital Transformation Changing Role of IT Innova&on Informa&on Business agility Changing role of the
More informationWelcome. HITRUST 2014 Conference April 22, 2014 HITRUST. Health Information Trust Alliance
Welcome HITRUST 2014 Conference April 22, 2014 HITRUST Health Information Trust Alliance The Evolving Information Security Organization Challenges and Successes Jason Taule, Chief Security and Privacy
More informationORION Retail Systems. Orion Digital Integration Inc. Point of Sale Reinvented for a Mobile World
ORION Retail Systems Orion Digital Integration Inc Point of Sale Reinvented for a Mobile World O Orion Retail Systems ORION Digital Integraon Inc. - Corporate Profile Established in 2003, Orion Digital
More informationManaged Services. An essen/al set of tools for today's businesses
Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng
More informationPresenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant
Presenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant Challenges Facing the NHS A BI Perspec(ve Challenges Facing
More informationCS 5150 So(ware Engineering System Architecture: Introduc<on
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering System Architecture: Introduc
More informationAgenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment
2011 ERM Symposium March 14 16, 2011 Continuous Controls Monitoring Futuristic Approach to Enterprise Risk Management Swissotel, Chicago, Chicago IL. Speakers: Syed M. Ali Alan Ash Sr. Audit Manager, Director
More informationCS 4604: Introduc0on to Database Management Systems
CS 4604: Introduc0on to Database Management Systems B. Aditya Prakash Lecture #1: Introduc/on Many slides based on material by Profs. Murali, Ramakrishnan and Faloutsos Course Informa0on Instructor B.
More informationData Stream Algorithms in Storm and R. Radek Maciaszek
Data Stream Algorithms in Storm and R Radek Maciaszek Who Am I? l Radek Maciaszek l l l l l l Consul9ng at DataMine Lab (www.dataminelab.com) - Data mining, business intelligence and data warehouse consultancy.
More informationIntroduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
More informationSplunk for Networking and SDN
Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking
More informationOffice of Business and Financial Services. Department Budget Presenta0on
Office of Business and Financial Services Department Budget Presenta0on Office of Business and Financial Services Overview Office of Business and Financial Services Overview Fund for Budgetary Purposes General
More informationIntro to BI. Mul0- dimensional Analysis
Intro to BI BI Vendor Landscape BI Roles & Responsibili0es Data Governance and Quality DW Architectures ETL Processes BI Capabili0es & Maturity Mul0- dimensional Analysis BI Vendors and Products Module
More informationWORKSHOP People Change Management Strategy
WORKSHOP People Change Management Strategy You will create the People Change Management Strategy document in this workshop to help you answer the ques;on: How much People Change Management is needed for
More informationMobile Payments World. Consul4ng Overview 2013
Mobile Payments World Consul4ng Overview 2013 About Us Payments Cards and Mobile Consul4ng occupies a niche posi4on in the market. We have been in business for more than 17 years and through our Publica4ons
More informationSo#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
More informationChallenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS
Challenges of PM in Albania and a New Professional Perspec8ve Prepared by: Dritan Mezini, MBA, MPM B.S. CS Table of contents Presenter s brief introduc8on General Concepts What is a project? What is Project
More informationStep Away from the Waterfall: You Really Can Use Agile on an ERP Project
Step Away from the Waterfall: You Really Can Use Agile on an ERP Project October 2, 2012 This document is protected under the copyright laws of the United States and/or other countries as an unpublished
More informationPervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements
OpAuditTM from is the first compliance management product on the market to successfully track manual controls and technical controls in the same workflow-based system. This ingenious solution gathers &
More informationWorld Around EPiServer Add-Ons
World Around EPiServer Add-Ons Peter Yeung Director of Business Development Jacob Khan Solution Architect The Choice for Leaders in Digital Before We Start. An Exercise! Email / Marketing Personaliza+on
More informationIT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic
IT Governance in Organizations Experiencing Decentralization Jelena Zdravkovic Department of Computer & Systems Sciences (DSV), Stockholm University, Sweden Giannoulis About the Speaker Title: Associate
More informationInforma*on Management
Informa*on Management Deepak Mohan SVP, Informa3on Management Group 1 Symantec Informa*on Management Strategy Protect Completely Dedupe Everywhere Delete Confidently Discover Efficiently Backup, archive
More informationDeveloping the Agile Mindset for Organiza7onal Agility. Shannon Ewan Managing Director, ICAgile @ShannonEwan, @ICAgile
Developing the Agile Mindset for Organiza7onal Agility Shannon Ewan Managing Director, ICAgile @ShannonEwan, @ICAgile 1 Who is here today? And Why? 2 To kick things off What is Agile? 3 Agile is a mindset
More informationWe are pleased to offer the following program to Woodstock Area Educators:
DATE: Spring 2016 TO: RE: Woodstock Area Educators Upcoming Cohort Programs Presently, many teachers are enrolled in cohort graduate programs through partnerships between local regional offices of education,
More informationFrom Big Data to Value
From Big Data to Value The Power of Master Data Management 2.0 Sergio Juarez SVP Elemica EMEA & LATAM Reveal Oct 2014 Agenda Master Data Management Why Now? What To Do? How To Do It? What s Next? Today
More informationBig Data, Open Data Personal Data? Navigate around the Mine Fields to Avoid Unintended Consequences. Ann Cavoukian, Ph.D.
Big Data, Open Data Personal Data? Navigate around the Mine Fields to Avoid Unintended Consequences Ann Cavoukian, Ph.D. Privacy & Big Data Ins9tute Ryerson University Toronto Sunshine Summit September
More informationUnderstanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology
Understanding Cloud Compu2ng Services Rain in business success with amazing solu2ons in Cloud technology What is Cloud Compu2ng? Cloud compu2ng encompasses various services and ac2vi2es carried out over
More informationIMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS
IMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS ICD- 10 Acronym Interna(onal Classifica(on of Diseases Tenth Revision ICD- 10 Basic Facts Replaces ICD- 9 Five digit coding
More informationEAI. Op'mizing your integra'on cost. Sunil Kumar Pandey Persistent Systems Ltd. Session: 20188
EAI Op'mizing your integra'on cost Sunil Kumar Pandey Persistent Systems Ltd. Session: 20188 EAI need and challenges Mergers and acquisi'ons have become more common than ever before. Current economic situa'on
More informationDeveloping a Full- Spectrum Security Training Program
Developing a Full- Spectrum Security Training Program Wayne State University Compu3ng & Informa3on Kevin Hayes, CISSP, CISM Informa)on Security Officer Geoff Nathan Faculty Liason Agenda Background Our
More informationHow Do You Secure An Environment Without a Perimeter?
How Do You Secure An Environment Without a Perimeter? Using Emerging Technology Processes to Support InfoSec Efforts in an Agile Data Center PTC Briefing January 18, 2015 About the Presenters CHARLA GRIFFY-BROWN
More informationBill Sieglein, Founder CSO Breakfast Club PLATINUM SPONSOR: SOLUTIONARY
AGENDA 8:00 8:30 Breakfast and Social Networking 8:30 8:45 Welcome & Introduc@ons, Bill Sieglein, Founder CSO Breakfast Club 8:45 9:15 Keynote: Don Gray, Chief Security Strategist PLATINUM SPONSOR: SOLUTIONARY
More information