Enterprise Risk Management & IT Implications BADM 559 Megan Kasbohm.

Slides:



Advertisements
Similar presentations
The Department of Energy Enterprise Risk Management Model
Advertisements

Lisanne Sison Director ERM Bickmore
Test Automation Success: Choosing the Right People & Process
Information Systems in Business
Assessing the impact of an aging workforce across global organizations.
ERM in the Rating Evaluation CAMAR Fall Meeting November 29, 2007 Thomas M. Mount, ACAS, MAAA Andrew Colannino, Vice President A.M.Best Company.
Contents Background and Introduction What is Private Equity?
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
A Portfolio Approach to Enterprise Risk Management Bruce B. Thomas November 11, 2002.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
The use of information systems to add value to the organization is strongly influenced by organizational structure, culture, and change Identify the value-added.
International IS strategy IS for Management1 International Information Systems Management and strategy.
What is an Information System? Input of DataResourcesProcessing Data Data Control of System Performance Storage of Data Resources Output of InformationProducts.
Business Management chapter five.
CORPORATE RISK MANAGEMENT & INSURANCE BY R P BLAH D.G.M. INCHARGE THE ORIENTAL INSURANCE COMPANY LIMITED REGIONAL OFFICE BHUBANESWAR.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved Marketing Concept, Customer Needs, American Marketing Association, Customers, Employees,
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Mission, Aims and Objectives
Information Systems Controls for System Reliability -Information Security-
Agenda Affiliate Marketing Background Essentials of Affiliate Marketing Adsmarket Solutions Mission Statement Process Methodology Summary About Adsmarket.
Dynamic Online Restaurant System. Successful projects  Have a clear objective  Have a scope that fits the objective  Relates to the standard organization.
Defining high-performance What is FM Diagnostics? A demonstration An application Benefits Today’s Agenda.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
The role of internal audit in enterprise-wide risk management (ERM)
INTERNATIONAL MARKETING MANAGEMENT
1. 2 IT innovations in specialized areas where competitors will have difficulty copying Excellence in design of processes and activities and how they.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
Copyright © 2011 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Planning and Strategic Management Chapter 04.
PowerPoint Presentation by Charlie Cook The University of West Alabama Business Essentials Ronald J. Ebert Ricky W. Griffin The Business of Managing 22.
Data On Call: Strategic Plan Deanna Lynch. Introduction  Background  Long Term Objectives  Vision, Mission, and Values  Internal and External Analyses.
Putting the Pieces Together Developing an Effective Business Plan.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 11-1 International Business Environments and Operations, 13/e Part Five Global Strategy,
Chapter 5 BUSINESS MANAGEMENT © 2007 Prentice Hall, Inc. All rights reserved.5–1 BUS 100.
Tingxuan Liu Risk Management in Software engineering.
TECHNOPRENEURSHIP (EM604) Session 6 20 Principles for Creating Successful Technology Ventures Dr. Winarno.
6.0 Business Strategy Chapter 38 HL Only. What is business strategy?  Business strategy A long-term plan of action for the whole organization, designed.
Introduction to Management LECTURE 17: Introduction to Management MGT
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Welcome! MT-499 Unit 4 Seminar. Contents SWOT Analysis Components Role of a SWOT Analysis Spartan Stores Example Group Exercise Role of Research in Developing.
ERM and the Pharmaceutical Industry. Risk  An innate part of every aspect of life, and the business environment is of no exception  Severity, both in.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Copyright © 2011 Pearson Education 11-1 International Business Environments and Operations, 13/e Global Edition Part Five Global Strategy, Structure, and.
Business Management Chapter five. Management  What makes a “good” manager?  What makes a “bad” manager? 5-2.
Foundations and Evolutions
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Or How to Gain and Sustain a Competitive Advantage for Your Sales Team Key’s to Consistently High Performing Sales Organizations © by David R. Barnes Jr.
Describe the potential of IT to improve internal and external communications By Jim Green.
Strategies in Action Chapter 7. Integration Strategies  Forward integration  involves gaining ownership or increased control over distributors or retailers.
What is a Strategy?. Examples of Corporate Strategy in 2008  InBev purchase of Anheuser Busch  Domestic airlines charging fees for meals, bags, etc.
Impact Research 1 Enabling Decision Making Through Business Intelligence: Preview of Report.
IMS 554 INFORMATION MARKETING for INFORMATION SYSTEMS DEPARTMENT CHAPTER 2 PRINCIPLES of MARKETING Pn Hasnah Hashim Lecturer Faculty of Information Management.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
11 International Strategy and Organization Chapter Objectives Explain the stages of identification and analysis that precede strategy selection.
Unifying Talent Management. Harnessing the Power of Workforce Intelligence in Talent Planning to Drive Business Performance.
Web - Mail – Image Sensors Market Forecast ( )
Analysis of the External Environment and Competition
Chapter 1 Introduction to Cost Management
Core Competencies Training for Supervisors
Approaches to Defining Risk
Core Competencies Training for Supervisors
Policies and Planning Premises: Strategic Management
BUSINESS ENVIRONMENT AND LAW
University of Muenster Consulting
5 BUSINESS MANAGEMENT © 2007 Prentice Hall, Inc. All rights reserved.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
MAZARS’ CONSULTING PRACTICE
KEY INITIATIVE Shared Services Function Management
Internal controls Project support overview.
Presentation transcript:

Enterprise Risk Management & IT Implications BADM 559 Megan Kasbohm

ERM is….  A framework for managing risk  An ongoing and continuous process for companies to implement with controls  Broad concept that can be tailored to individual company needs  A tool for minimizing risks and maximizing opportunities

8 ERM Components 1.Internal Environment : overall attitude of the firm- risk adverse, risk neutral or risk seeking 2.Existence of Objectives: objectives that align with overall company goals 3.Event Identification: Assess internal and external environment to identify potential risks 4.Risk Assessment: Determine likelihood and magnitude of potential risks 5.Risk Response Strategy: Choose how to strategically respond to significant risks 6.Control Activities: Implement controls to protect against identified risks 7.Communication: Communicate controls and strategies across all levels of the company 8.Monitoring: Continue to monitor the effectiveness of controls for risk management and make necessary changes.

IT & Risk Management  IT as an opportunity: IT can help companies minimize risks by implementing technology, ex: access logs for users  IT as a risk: IT can add risks, ex: information security from hackers  In today’s technological world, IT can cut costs, improve business processes and increase efficiency when used correctly

IT Usage Profiles  The Butler  Companies that are risk takers, or industry leaders, and tend to use IT for utility  Professional Service Companies  The Entrepreur  Companies that are risk takers, but use IT for strategic roles, as opposed to a utility role  Web B2C and consumer financial service companies  The Grinder  Companies that are risk adverse and employ IT for utility  Mineral extraction companies  The Team Player  Companies that are risk adverse and expect to use IT strategically, as opposed to for utility  Auto manufacturing companies and Deregulating utilities companies

Grant Thornton Case #1  Multinational Manufacturing Company  Company set an objective to provide global monitoring for print quality  New system helped them mitigate the risk of printing quality deterioration in expanding markets  Introduced additional risks such how the company will deal with expanding economies of scale  Management implemented a system that performs real-time quality system reporting to mitigate additional risk  Successful Implementation

Grant Thornton Case #2  Not-For-Profit company  Company set an objective to offer additional online services for certain customers  IT in this situation mitigates the risk of loosing customers to the growing online market  Also seizes the opportunity to reach out to a younger market  IT adds the high magnitude risk of hackers getting sensitive information  Company added user access logs to help guard against the risk of loss of security  Successful implenentation

SPSS Case  Involved in analytic software  Industry changes and developments required SPSS to update their IT portfolio  Started by setting a clear mission statement that included their new desire for growth and enterprise performance  Company needed a fundamental shift in culture and used a maturity model  SPSS was able to withstand the changing environment of the industry by drilling down to the fundamental issues and designing IT applications to support them  Successful Implementation

ICS/CITES Case  ICS Runs and operates seven computing labs across campus, division of CITES  Successfully uses IT applications to manage risks such as employee supervision  Needs to improve risk management and IT applications for customer service  CITES would benefit from working as company. They should implement ERM as a company and apply it to each division, such as ICS, to minimize risks.  Implementation needs improvement