Governance of Outsourced IT Services. Donna Hutcheson, CISA Information Technology Audit Director Energy Future Holdings Corp.



Similar documents
Domain 1 The Process of Auditing Information Systems

Services Providers. Ivan Soto

Cloud Services and Business Process Outsourcing

Auditing Cloud Computing and Outsourced Operations

Managed IT Services. Eliminating technology pains in small businesses

IT Governance and Outsourcing

Cybersecurity in the States 2012: Priorities, Issues and Trends

Managed IT Services. Eliminating technology pains for small businesses

Mitigating Costly New Technology Risks For Continued Stability and Profitability

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Managed IT Services. Eliminating technology pains for small businesses

TECHNOLOGY STRATEGY AUDIT

Review of the Tax and License Collection and Distribution System

Seven Important Items to Consider When Evaluating Network Support Options

Healthcare Technology Audit Basics. Session Objectives

3/17/2015. Healthcare Technology Audit Basics. Session Objectives. Jennifer McGill, CIA, CISA, CGEIT April 20, 2015

Managing the Risk of Fraud in Outsourcing. Fernando Cancino, CFE, CIA

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

COMPUTER OPERATIONS AUDIT

Managed IT Services. Eliminating technology pains for small businesses

2011 NASCIO Recognition Award Nomination State of Georgia

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS

Managed IT Services:

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

Under the Digital Dome: State IT Priorities, Trends and Perspectives

1 What does the 'Service V model' represent? a) A strategy for the successful completion of all service management projects

US companies experience and attitudes towards security threats

CLASSIFICATION SPECIFICATION FORM

Navigating The Cloud: A Primer For Understanding Cloud Computing. White Paper: 2012

CHAPTER 10 GLOBAL, ETHICS, AND SECURITY MANAGEMENT

Managed IT Services. Eliminating technology pains in small businesses

Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010

Information Security and Risk Management

Managed IT Services. Eliminating technology pains in small businesses

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Managed IT Services. Eliminating technology pains in small businesses

Managed IT Services. Eliminating technology pains in small businesses

THE NEXT GENERATION OF DATA INSURANCE

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Managed IT Services. Eliminating technology pains for small businesses

OUTSOURCING GUIDELINES FOR BANKS AND FINANCIAL INSTITUTIONS, 2008

Managed IT Services. Eliminating technology pains in small businesses

Managed IT Services. Eliminating technology pains in small businesses

SENIOR INFORMATION SYSTEMS MANAGER

Technology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network

(Instructor-led; 3 Days)

Risk Management of Outsourced Technology Services. November 28, 2000

Information Security Services

Vendor Management. Outsourcing Technology Services

Managed IT Services. Eliminating technology pains in small businesses

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

AUDIT TAX SYSTEMS ADVISORY

Vendor Management. Minimizing Value Leakage. Deloitte Consulting LLP. November 19, 2013

A Checklist for Software as a Service (SaaS) Vendors and Application Service Providers

Vendor Management Best Practices

Call us today Managed IT Services. Proactive, flexible and affordable


BUSINESS PROCESS MANAGEMENT and IT. Helping Align IT with Business

Negotiating Contracts That Will Keep our Clouds Afloat: You re going to put THAT in a cloud? Meteorologist: Daniel T. Graham

Cyber, Security and Privacy Questionnaire

Vendor Risk Management Financial Organizations

ITIL V3 Foundation Certification - Sample Exam 1

CISM (Certified Information Security Manager) Document version:

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10

Whitepaper. Best Practices for Securing Your Backup Data. BOSaNOVA Phone: Web:

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

The 10 Disaster Planning Essentials For A Small Business Network

Altius IT Policy Collection Compliance and Standards Matrix

Managing business risk

Security Controls What Works. Southside Virginia Community College: Security Awareness

Enterprise Backup and Recovery Solution.

Supplier Security Assessment Questionnaire

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

FOUR QUESTIONS BANKS SHOULD ASK BUSINESS PROCESS OUTSOURCING PROVIDERS. An ebook that examines the answers

Technology Risk Management

SECURITY RISK MANAGEMENT

Network & Information Security Policy

Information Technology Risk

Office of the City Auditor and Clerk

ICASAS505A Review and update disaster recovery and contingency plans

21 Questions you should ask your IT service provider Before hiring them to support your network

Appendix A-2 Generic Job Titles for respective categories

How To Manage Information Security At A University

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

ASX SETTLEMENT OPERATING RULES Guidance Note 10

Managed Services. Business Intelligence Solutions

Office of Inspector General

INFORMATION SYSTEMS SPECIALIST

OPERATIONAL RISK RISK ASSESSMENT

Information Technology

Information Technology Services Guidelines

The 10 Disaster Planning Essentials For A Small Business Network

Cloud Computing Thunder and Lightning on Your Horizon?

Information Security Management Systems

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Considerations in Using Managed IT Services. Executive Guide #12 IT Services: Use In-House Staff or Outsource?

Transcription:

Governance of Outsourced IT Services Donna Hutcheson, CISA Information Technology Audit Director Energy Future Holdings Corp.

Topics Covered in This Session Common failures in governing outsourced IT services Services with higher risk due to outsourcing Effectively governing outsourced IT services Integrating internal business processes, outsourced business processes and outsourced IT services with effective governance for all Guidelines for oversight of key performance indicators that truly measure the effectiveness of outsourced IT services

Background IT services typically outsourced Traditional activities involved in IT governance Roles and responsibilities in managing outsourced IT services

IT Services Typically Outsourced Service Logical Security Specialized service Desktop & server maintenance Remote control Pro Provider cost and maintenance fee distributed among clients Rapid updates with live monitoring Dedicated staff with up to date knowledge No in-house training Consistent version control 55% reduction in IT costs per employee Risks Loss or unauthorized access of data Data Integrity Failure to fully design, develop and implement enterprise security architecture Rely primarily on the firewall Failure to understand the relationship security has with the organization Inability to support service during ongoing operation. Inaccurate/corrupted data and process integrity Inadequate built-in controls Few written procedures Inadequate unauthorized access protection Unapproved change implementation Failure to maintain the application Intellectual property theft Customer information - lost, manipulated or stolen Delayed service

IT Services Typically Outsourced (cont) Service Disaster recovery Voice and data telecommunications Infrastructure operations Pro Frequently outsourced IT service Well established outsource service Service costs -low maintenance and does not require dedicated full-time staff Reduces risk of destroying company business. Well established outsource service No need for land or building to house equipment/personnel Risks Hot/Cold recovery: Data access and integrity; Business/customer service disruption; Financial/external report misstatement; Lack of staff to support recovery; Access to recent back-up Illegal/malicious hacking; Denial of service attacks; Data corruption; Bottlenecks; Slow response times Inadequate risk assessment; Inadequate provider controls and ineffective monitoring Lack of strategic planning to meet buyer s needs Failure to maintain the system

IT Services Typically Outsourced (cont) Service Application Development and Maintenance Pro Do not pay provider during downtime No need to interview, hire, train team members No direct management of team members Risks Inefficiencies in the business process supported by the application Inadequate contingency strategies for delayed projects; Average outsourced projects are completed successfully and effectively 63% of the time

IT Services Typically Outsourced (cont) Service Help Desk Internal/ Customer Pro Less knowledgeable technicians can resolve 80% of all help desk calls Risks Information may not be shared among service departments and providers Conflicting behavior/solutions from the provider team Difficulty in identifying performance trends Inability to respond quickly to changing market conditions Loss of revenue from customer dissatisfaction Customer requirements may be misunderstood Provider staff may not be trained to meet customer needs effectively Inaccurate reporting Provider employees may breach organization standards related to security and confidentiality Incomplete/inaccurate recording and communication of problem common or critical Cultural differences may interfere with escalation of problems to appropriate staff Key decision-makers may not be aligned with day-to-day operations

Traditional Activities in IT Governance Contract Management Service Level Metrics and Reporting Business Project Liaison with Service Provider Annual Review of SAS 70s and Other Industry-specific Regulatory Compliance Routine Meetings to Resolve Issues Others from Session Participants

Buyer CIO Chief Information Officer coordinate internal technology strategic direction coordinate information technology as infrastructure for all business units manage external partnerships improve services to employees and partners CTO Chief Technology Officer (Business Specific) provide a technical voice in strategic planning reduce operating costs manage application specific solutions liaison with business owner CSO Chief Security Officer provide IT security vision, strategy and programs manage cyber security, standards, data and network asset protection Information Technology Leadership is bigger than a single service provider relationship Roles and Responsibilities Service Provider Service Delivery Managers relationship management ensure service levels communication with buyer management coordinate services across silos Service Operation Administrative Manager measurement of metrics reporting billing Project Management Office prepare proposals provide oversight of project activities change management communicate with business owner More from session participants

IT Governance (more than meets the eye)

An IT Strategy is Critical Training Clarity Remote Servers Comp 1 Technology Budget Thought Leadership Network Strategy Comp 2 Service Level Agreements Project Comp 3 Management Comp 6 Comp 5 Wireless Warehouse System ( Control System Design Network Security Strategic Plan Acquisition Divestiture Strategic Alliances Backup Strategy ROI Op Sys Enabling Technology Business Continuity Super Tech Other Support Budget Tracking/ Reporting Disaster Recovery Corporate Mining Technology KPI s VoIP Partner Relationship Comp 4 Resources

Business Expectation Management BPO = Business transactions/processes ITO = IT Services Positive changes in ITO = positive changes in the business processes Negative changes in ITO = negative changes in the business processes Broken or ineffective IT processes that are outsourced will not be miraculously repaired Buyer is always responsible for what, where, who, and how Only you know your business Only you are accountable for compliance with laws and regulations

Common Failures in Governing Outsourced IT Services Negotiating too hard to a least cost scenario Misplaced haste to get a contract in place Lack of an exit strategy Failure to control legal compliance Failure to plan for a long-term strong relationship Negotiating and managing from an Ivory Tower Ignoring performance details

Common Failures in Governing Outsourced IT Services (cont.) Impairing your ability to "Get Up and Walk Away" Burning bridges with other partners Failure to monitor service (business) Relinquishing control/oversight (business) Failure to review Outsourcer s internal controls Failure to audit services provided More from session participants

1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Insourced Research Data will be Provided at the working session Mixed Sourcing IT Services Risks Sourcing Comparison Outsourced Onshore Outsourced Offshore Cost Communication Controls Performance Risk Question: Is the total cost of outsourcing offshore = or less than the total cost of alternatives? Total = $ cost + communication + controls governance + performance + risk.

Governance Risks Strategic direction Who determines the problem to be solved? Motivation to find best functional strategy vs. cost effective strategy? Total costs Baseline Maintenance New projects Decommissioning services/applications Adding new services/controls

Governance Risks (cont.) Legal and regulatory consequences Financial controls (Sarbanes Oxley for U.S.) Data privacy (global issue) Effective controls assertion (SAS 70) Industry specific governing committees and standards

Active strategic guidance of the process is imperative to achieve monetary and functional value for corporate stakeholders. Each governance strategy should address: What problem are we trying to solve? What is the cost? Effective Governance Outsourced IT Services What is the value to the company? Do the services provided negatively impact required business functions?

Integrating Internal Business Processes, Outsourced Business Processes and Outsourced IT Services Outsourced Services IT and Business Business Processes Offshore Business Processes Onshore Outsourced Services -- IT Onsite Business Processes

Key Performance Indicators and Metrics for the Effectiveness of Outsourced IT Services Today Future Research Data will be Provided at the working session Future State will be Developed by Participants at the working session

Research results from five companies Outsourcing all IT services Onshore and offshore outsourcing Mixed mode outsourcing Discussion Research Data will be Provided at the working session

For More Information: Donna Hutcheson, CISA ISACA North Texas University Relations Director ISACA International Academic Relations Committee Director, Internal IT Auditing Donna.Hutcheson@energyfutureholdings.com

Thank you!