Lessons from McKesson s Approach to Maintaining a Mature, Cost-Effective Sarbanes-Oxley Program



Similar documents
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

SAP NetWeaver Identity Management Experiences from an Implementation at Colgate-Palmolive Company

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Analysis One Code Desc. Transaction Amount. Fiscal Period

Case 2:08-cv ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

How To Implement Itil V3

Colorado s Accountable Care Collaborative

Minimize Access Risk and Prevent Fraud With SAP Access Control

Managing Open Source Code Best Practices

Roles: Scrum Master & Project Manager

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Defining a Governance Model for Portals

Identity & Access Management new complex so don t start?

WEATHERHEAD EXECUTIVE EDUCATION COURSE CATALOG

Certified Identity and Access Manager (CIAM) Overview & Curriculum

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

EDI Services helps healthcare network streamline workflow, increase productivity, and improve revenue cycle management.

Consumer ID Theft Total Costs

Based on Chapter 11, Excel 2007 Dashboards & Reports (Alexander) and Create Dynamic Charts in Microsoft Office Excel 2007 and Beyond (Scheck)

Supervisor Instructions for Approving Web Time Entry

Proposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre

Advisory Services Oracle Alliance Case Study

Rapidly Defining a Lean CMMI Maturity Level 3 Process

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

GRC Program Best Practices & Lessons Learned

Accenture Cyber Security Transformation. October 2015

RBC Insurance Fetes Online Auto/Home Insurance Growth

SEO Presentation. Asenyo Inc.

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Process Validation Workshops. Overview Session

Analytic-Driven Quality Keys Success in Risk-Based Contracts. Ross Gustafson, Vice President Allina Performance Resources, Health Catalyst

Continuous Controls Monitoring. Virginia ISACA January Meeting 19 January 2010

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

Business Continuity in Healthcare

Implementing Carbon Reduction Without Impacting Working Capital. Presented by Dylan Crompton

Application Control Effectiveness for SAP. December 2007

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Implementing ITIL with Kaseya Tools

PowerSteering Product Roadmap Your Success Is Our Bottom Line

A BEST Case: Forecast Improvement Project. A Tale of Two BUs

Drill Down Deep Into Your Spend

CQC Compliance Monitoring Framework

Enterprise Risk Management VCU Process

SAP Training Are your people adequately trained to maximize your

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY Small Commercial Service (SCS-1) GSR

Discussion Outline. A. KPIs Defined. B. Why KPIs Matter. C. KPI Menu. D. Implementation. E. Example KPIs. F. Pitfalls

Use Data Strategy and Customer Analytics to Drive Business Decisions. Alison Shaffer August 26, 2010

Supporting a Continuous Process Improvement Model With A Cost-Effective Data Warehouse

Automating Sarbanes-Oxley Compliance Testing for SAP Applications. A Guide to Cost and Time Efficiencies for Annual SOX Compliance Initiatives

Employee performance management in a global setting. Brenda Wilson

RSA enables rapid transformation of Identity and Access Governance processes

SUMMARY PROFESSIONAL EXPERIENCE. IBM Canada, Senior Business Transformation Consultant

Enterprise Resource Planning (ERP) Program: Overview and Status Update

PROTECT YOUR WORLD. Identity Management Solutions and Services

Performance Dashboards in Local Government: What, Why, and How?

How SAP Business Objects Dashboards Are Improving Decision Making at Caterpillar Parts Distribution

Unifying Compensation:

The Five W's of SOC Operations. Kevin

Key Components of Enterprise Risk Management (ERM) Framework

Office of the Secretary of State

The Impact of Medicare Part D on the Percent Gross Margin Earned by Texas Independent Pharmacies for Dual Eligible Beneficiary Claims

California Department of Mental Health Information Technology Attention: MHSA-IT th Street, Room 141 Sacramento, CA 95814

How To Improve Your Business

Orange County Convention Center Orlando, Florida June 3-5, Streamlining LSO Online Course Functionality Rob Becker

SharePoint Governance: Planning, Strategy and Adoption

Atlanta Public Schools. Career Academy

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.

Marathon Petroleum Company: Automating Testing with SAP Quality Center, SAP Solution Manager and SAP TAO Myra Egbert, Betsy Buckley

IT Governance. Infocom India Presentation. Pathfinder Technology Solutions. December 6, 2006

Stephen Doune HRIS Project Manager Plan International

Visual Enterprise Architecture

SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned

Department of Public Welfare (DPW)

Company A Project Plan

Project Management Planning

Assignment 4 CPSC 217 L02 Purpose. Important Note. Data visualization

AP Automation at Fossil. How Fossil implemented Opentext Vendor Invoice Management Wim Schalken

Managing Health & Safety in Depot Maintenance

Market Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT.

RSA Identity Management & Governance (Aveksa)

Transcription:

Orange County Convention Center Orlando, Florida May 15-18, 2011 Lessons from McKesson s Approach to Maintaining a Mature, Cost-Effective Sarbanes-Oxley Program Vickie Pilotti Kelly Worley Ben Wienand ]

Overview SAP Security Introductions McKesson Overview Share our SOX Compliance Program journey through people, technology and processes Key Learning Q&A 2

Learning Points Journey through McKesson s SOX compliance program evolution Walk through a step-by-step approach to building out a longterm roadmap Identify how to create a holistic view of a SOX controls environment Walk away with short- and long-term ideas for opportunities to improve and streamline compliance processes Understand what McKesson is doing to further enhance its SOX program 3

McKesson Overview Largest healthcare services company in the world Fortune 14 -$108 Billion in revenue (FY10) More than 43,000 employees dedicated to healthcare Oldest U.S. healthcare company Established in 1833 177 years driving innovation in healthcare Only company offering solutions at every point of care Deep clinical, IT, and process expertise SAP processes are ISO 27001: 2005 certified 4

McKesson Overview We deliver 1/3 of all medicines used each day in North America 90% of retail pharmacies use our claims processing network 50% of hospitals use our software, automation, and services 20% of physicians use our software, supplies, and services 90% of public and private payors use our software, programs, and services 5

McKesson s Journey Organization/People Technology Process 6

SAP Security 7

SAP Security: The People The SAP Security Team is comprised of just four core team members and one manager:

Early SOX Compliance Program: Technology Phase 2: Compliant User Provisioning Phase 1: Risk and Remediation Phase 3: Super User Privilege Management Introduction McKesson selected SAP GRC tool in 2005 Selected 3 out of 4 modules We created a three phase plan of implementation 9

Early SOX Compliance Program: Technology Phase 2: Compliant User Provisioning Phase 1: Risk and Remediation Phase 3: Super User Privilege Management Phase 1 Allows one central repository for Segregation of Duties rules (SOD) Ties mitigating controls to Risks Provides details of risk for remediation 10

Early SOX Compliance Program: Phase 1 Benefit to McKesson Risk and Remediation Categorization of rules Ability to create custom rules Prioritized reporting of SOD s Identification of self conflictive role McKesson does not guarantee you will receive the same result 11

Early SOX Compliance Program: Technology Phase 2: Compliant User Provisioning Phase 1: Risk and Remediation Phase 3: Super User Privilege Management Phase 2 Automated user provisioning Works in conjunction with Risk & Remediation Minimizes risks 12

Early SOX Compliance Program: Phase 2 Benefit to McKesson Compliant User Provisioning Reduction of provisioning cycle time Enforced risk mitigation prior to provisioning Moved to Self Service Detailed audit logs McKesson does not guarantee you will receive the same result 13

Early SOX Compliance Program: Technology Phase 2: Compliant User Provisioning Phase 1: Risk and Remediation Phase 3: Super User Privilege Management Phase 3 Restricted access to sensitive transactions Ability to monitor sensitive access Reports changes made to system 14

Early SOX Compliance Program: Phase 3 Benefit to McKesson Audit simplification Super User Privilege Management Notification to owners process intervention Greater accountability change McKesson does not guarantee you will receive the same result 15

Enhancing the Program How to go from tool implementation to a comprehensive and fully integrated Compliance Program 16

You Need a Road with a Solid Vision 17

Envision Where You Want To Be Figure out your pain points Determine where you want to go Plot a course to get there Use high-level objectives Begin at 30,000 ft 18

Business Value/Decreased Cost of Ownership [ Create a High-Level Plan Phase 5: Evaluate results, and continue to build upon the improved model Q4 FY12 Phase 1: Build foundation Document all current processes and control mechanisms Q4 FY10 Phase 2: Identify process and control improvements. Set baseline metrics. GRAPHIC Roadmap, route 66 Q1 FY11 Phase 3: Gain alignment with stakeholders Q1/Q2 FY11 Phase 4: Begin implementing improvements based on priority and benefit vs. cost and return Q2 FY11 Sustainable Compliance 19

Where was McKesson going? Auditing and Self-Assessments Change Leadership Research Control Efficiency Collaboration Training/Education for: Role Owners and Managers Risk Owners Stakeholders and Sponsors Tools GRC Expansion Archer Custom Web applications Conferences Forums External discussions Process Lean efficiency and automation Accountability Easily auditable Collaboration Control Efficiency Governance Process & Design Consistency Executive Level Business Sponsorship 20

Refine the plan into a tactical roadmap Q4 FY10 Q1 FY11 Q2 FY11 Q3 FY11 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Process Process and Control Definition ZTEMP Process Monthly SoD Process Implementation of new processes, i.e., FF Reauthentication, SoD Rule Set Review, etc. User ID Standardization Fire Fighter Improvements for Program and Table Access Research GRC and Other Compliance Tools CUA, Password Self-Service, YROLE, Portal, IDM, SSO, Cross-system SoD s Ongoing External Research Tools Tool Scoping and Implementation? Education/ Change Leadership Definition and Scoping Implementation and continuous improvement 21 21

Align with Partners and Key Stakeholders Build solid partnerships with Internal Risk Agencies and Stakeholders Align cross agency objectives Understand what it is you re both trying to achieve 22

Building the Program Step by Step Control numbers tie back directly to the SOX workbooks Missing processes can either be left blank or noted otherwise (i.e., in another color)

Step by Step (cont.) A RACI chart was then crafted to identify the various process components, and who was responsible and accountable for each 24

Step by Step (cont.) Each process was then documented in a flowchart 25

Step by Step (cont.) End Result A solid foundational structure 26

New End State End Result All controls are active, in place, and green! 27

Additional Program Details The core controls within our program revolve around the validation of access and master data elements Philosophy is that all relevant data maintained within GRC should be validated at least once per year: User Access Risk Owners Role Owners Rule Set Etc. We refer to this as our Re-authentication Cycle, and it makes up 26% of our controls Helps to ensure data and access integrity, as well as validate the incoming process is working as intended 28

We had our house, but something was missing Auditing and Self-Assessments Change Leadership Research Control Efficiency Collaboration Training/Education for: Role Owners and Managers Risk Owners Stakeholders and Sponsors Tools GRC Expansion Archer Custom Web applications Conferences Forums External discussions Process Lean efficiency and automation Accountability Easily auditable Collaboration Control Efficiency Governance Process & Design Consistency Executive Level Business Sponsorship 29

Program Model Overhaul We redesigned our program model to accurately reflect our goals and long-term vision 30

Inclusion of Key Metrics We also recognized the need for key metrics to measure our success, and designed a SOX reporting dashboard Other metrics tracked separately include costs of the program and cost trend graphs 31

Updated Roadmap This revised thought process led to an update of the roadmap to again reflect the continuous improvement concept 32

Ideal End State The ultimate goal and end state is to: Eliminate the need for self-audits through the use of tools and technology Example: Implementation of Process Controls Achieve full automation of our SOX Compliance Program Not so we can kick our feet up, but so we can remain strategic, rather than tactical 33

Key Learning Leverage the strength of your people, technology and processes Build solid partnerships with Internal Risk Agencies and Stakeholders Build a compliance document to obtain a holistic view of your controls, being sure to tie back to applicable processes Construct a roadmap or strategic document Design an evaluation process to improve service efficiencies and automation Get ISO 27001:2005 certified! This adds additional process support and rigor to your program as well as external validation of your efforts that the customers can see. 34

Questions? Questions? 35

Contact Information Vickie Pilotti Sr. Manager SAP User Services Phone: 415-983-9157 Vickie.Pilotti@McKesson.com Kelly Worley SAP Security Manager Phone: 415-732-1226 Kelly.Worley@McKesson.com Ben Wienand SAP Compliance Manager Phone: 415-983-7691 Benjamin.Wienand@McKesson.com 36

Thank you for participating. ] Please remember to complete and return your evaluation form following this session. For ongoing education in this area of focus, visit www.asug.com. SESSION CODE: 1008