Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks



Similar documents
"Integrating ITIL and COBIT 5 to Optimize IT Process and Service Delivery"

Information Security Governance:

How To Use Risk It

COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.

Understanding COBIT 5. based on ISACA Materials Prepared by: Deb Mallette, CGEIT, CISA, CSSBB, IMG BSMS EPDM, Process Consultant

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

Terms of Reference for an IT Audit of

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

A Contrarian Risk Management Perspective. Nicole Keaton SVP Identity & Access Management CGEIT CISA CISM

Chayuth Singtongthumrongkul

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

Assessing & Managing IT Risk

for Information Security

PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN

Presented by. Denis Darveau CISM, CISA, CRISC, CISSP

Trends in Information Technology (IT) Auditing

Revised October 2013

Enabling Information PREVIEW VERSION

Governance and Management of Information Security

COBIT 5 Introduction. 28 February 2012

IS Audit and Assurance Guideline 2402 Follow-up Activities

COBIT Helps Organizations Meet Performance and Compliance Requirements

ITAG RESEARCH INSTITUTE

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

REALIZING MAXIMUM BENEFITS FROM GOVERNANCE, RISKS AND COMPLIANCE (GRC) TOOLS

Enterprise Risk Management

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

IS Audit and Assurance Guideline 2202 Risk Assessment in Planning

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Athens, 2 December 2011 Hellenic American Union Conference Center

Enhancing IT Governance, Risk and Compliance Management (IT GRC)

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

INFORMATION TECHNOLOGY FLASH REPORT

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

KEY TRENDS AND DRIVERS OF SECURITY

Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK

ISACA is responding to the PCAOB questions principally from an information technology (IT) perspective.

Roles, Activities and Relationships

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Active Software Escrow s Usefulness for Companies Embracing COBIT 5 By Andrew Stekhoven

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

Enterprise Risk Management & Information Technology

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

IT Governance Implementation Workshop

Control Design & Implementation Week #5 CRISC Exam Prep ~ Domain #4. Bill Pankey Tunitas Group. Job Practice

Chart Optimize Transform Your Data Center

GRC Program Best Practices & Lessons Learned

Moving Forward with IT Governance and COBIT

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

Auditors Need to Know June 13th, ISACA COBIT 5 for Assurance

The PNC Financial Services Group, Inc. Business Continuity Program

Global Technology Audit Guide. Auditing IT Governance

This article describes how these seven enablers have contributed towards better information security management at HDFC Bank.

IT Service Management ITIL, COBIT

Integrating the Project Portfolio Management and Service Portfolio Management: The Governance of Enterprise IT Perspective

IT Governance: framework and case study. 22 September 2010

COBIT 5 Implementation Certifi cate. Training Course & Exam

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Information Security Management Systems

ISACA Tools Help Develop Cybersecurity Expertise

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Feature. A Higher Level of Governance Monitoring IT Internal Controls. Controls tend to degrade over time and between audits.

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013

The enemies ashore Vulnerabilities & hackers: A relationship that works

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

How To Transform It Risk Management

Performance Measures for Internal Auditing

Bridging the Gap Between IT and Facilities: Morgan Stanley Case Study

CLOUD SECURITY THROUGH COBIT, ISO ISMS CONTROLS, ASSURANCE AND COMPLIANCE

G11 EFFECT OF PERVASIVE IS CONTROLS

Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: Document Version Preprint (usually an early version)

Certified Information Security Manager (CISM)

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

Presentation on COBIT Education

FINDING THE RISK IN RISK ASSESSMENTS NYSICA JULY 26, Presented by: Ken Shulman Internal Audit Director, New York State Insurance Fund

THE DATA CENTER COMPLIANCE ACRONYMS YOU NEED TO KNOW

S11 - Implementing IT Governance An Introduction Debra Mallette

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

Office of the Chief Information Officer

Transcription:

Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks 2ο InfoCom Security Conference Anestis Demopoulos, Vice President ISACA Athens Chapter, & Senior Manager, Advisory Services, Ernst & Young 5 April 2012

Contents A few words about ISACA The need for an IT risk framework Risk IT Process model & CobiT Risk IT vs. other standards & frameworks Conclusions Benefits & Outcomes

What is ISACA? Non-profit association of individual members: IT auditors IT security professionals IT risk and compliance professionals IT governance professionals and more! Nearly all industry categories: financial, public accounting, government/public sector, technology, utilities and manufacturing. Formerly, the Information Systems Audit and Control Association -- ISACA now goes by its acronym only.

What is ISACA? Structure One International Headquarters Office 195 Chapters in 81 Countries 82 in N. America 43 in Europe 32 in Asia/ Middle East 21 in Latin America 8 in Africa 9 in Oceania (Source: ISACA International data as of October 2011)

ISACA Athens Chapter Founded in 1994 "Ινστιτούτο Ελέγχου Συστημάτων Πληροφορικής" Currently more than 385 members Its mission is to: Promote IT audit, security & governance in Greece Contribute in and promote relevant standards Support its members through educational activities Promote ISACA professional certifications Support networking and professional growth Governed by a local Board of Directors and supported by three Working Groups / Committees (Education issues, Newsletter and Web site)

What does ISACA do? Certifications 70,000+ CISAs certified since inception in 1978 12,000+ CISMs certified since inception in 2003 4,000+ CGEITs certified since inception in 2007 10,000+ CRISCs certified since inception in 2010

What does ISACA do? Research BMIS: The Business Model for Information Security

Why Care about IT Risk? Risk and value are two sides of the same coin Risk is inherent to all enterprises But Need to ensure opportunities for value creation are not missed by trying to eliminate all risk However Enterprises are dependent on automation and integration Need to cross IT silos of risk management Important to integrate with existing levels of risk management practices Compliance requirements

The need for a Framework Standards and frameworks are available, but are either too: Generic enterprise risk management oriented IT security oriented No comprehensive IT- related risk framework available (until now)

Risk IT Framework Risk IT Includes: The Risk IT Framework Summary + Core Framework Helps convey the risk landscape and processes and prioritize activities Available as a free download to all The Risk IT Practitioner Guide Provides practical guidance on improving risk management activities Available as a free download for ISACA members only (Both publications are available for purchase in print version) www.isaca.org/riskit

Risk IT Framework Risk IT complements and extends COBIT and Val IT to make a more complete IT governance guidance resource.

Risk IT Framework IT-related Risk Management Risk IT is not limited to information security. It covers all IT-related risks, including: Late project delivery Not achieving enough value from IT Compliance Misalignment Obsolete or inflexible IT architecture IT service delivery problems

Risk IT Domains

Risk IT Process model 1. Define a risk universe and scoping risk management 2. Risk appetite and risk tolerance 3. Risk awareness, communication and reporting: includes key risk indicators, risk profiles, risk aggregation and risk culture 4. Express and describe risk: guidance on business context, frequency, impact, COBIT business goals, risk maps, risk registers 5. Risk scenarios: includes capability risk factors and environmental risk factors 6. Risk response and prioritization 7. A risk analysis workflow: swim lane flow chart, including role context 8. Mitigation of IT risk using COBIT and Val IT

Process Model Examples 1.Define a risk universe and scoping risk management

Process Model Examples 2.Risk appetite and risk tolerance

Process Model Examples 5.Risk scenarios

Risk IT vs. other standards Standards and frameworks are available, but are either too: Generic enterprise risk management oriented IT security oriented No comprehensive IT- related risk framework available (until now)

Benefits & Outcomes Accurate view on current and near-future IT-related events End-to-end guidance on how to manage IT-related risks Understanding of how to capitalize on the investment made in an IT internal control system already in place Integration with the overall risk and compliance structures within the enterprise Common language to help manage the relationships Promotion of risk ownership throughout the organization Complete risk profile to better understand risk

COBIT 5 Brings together the principles that allow the enterprise to build an effective governance and management framework based on an holistic set of enablers that optimises information and technology investment and use for the benefit of stakeholders COBIT 5 is Coming: General Availability 10 April 2012

Questions? Thank you for your attention! Anestis Demopoulos info@isaca.gr www.isaca.gr anestis.demopoulos@gr.ey.com