State Leadership Accountability Act

Slides:



Advertisements
Similar presentations
OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Advertisements

University Safety Office 10 Parks Road Oxford OX1 3PD Health and Safety Self Assurance Toolkit Directly.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
MnSCU Audit Committee September 17, An Assessment of Practices for Monitoring Satisfactory Academic Progress for Financial Aid Recipients John Asmussen.
Sodexo.com Group Internal Audit. page 2 helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and.
Association of Local Government Auditors 1 Best Practices for Effective Internal Controls - Citywide Presentation to: California Society of Municipal Finance.
Office of the Secretary of Defense – Comptroller Financial Improvement and Audit Readiness Directorate Unclassified 17 September 2014 GAO Revised “Green.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
First Practice - Information Security Management System Implementation and ISO Certification.
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
BRIEFING TO THE PORTFOLIO COMMITTEE ON THE DPSA’S RISK MANAGEMENT STRATEGY PRESENTATION TO THE PORTFOLIO COMMITTEE 12 MAY
Preparing Scotland’s first Records Management Plan Ava Wieclawska Records Manager.
Chicagoland IASA Spring Conference
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
Key changes from OHSAS 18001:1999
Regulatory Requirements & Compliance: Ensuring Effective Outcomes Presented By: John E. Palmer, CPA Managing Director/Principal.
An Overview of Environmental Management Systems (EMS)
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
The Implementation of HIPAA Joan M. Kiel, Ph.D., C.H.P.S. Duquesne University Pittsburgh, Pennsylvania.
Office of the Auditor 1 “Getting an Audit From Project Initiation to Out the Door: Internal Controls and Tips for Ourselves” 20 th Annual Conference Guam.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
The Expectation Triad Healthcare Engineering Consultants Regulatory Compliance: “Ensuring that all of the required standards are being met”
Methods of Administration MOA Element 1 Designation of State and Sub-State Level Equal Opportunity (EO) Officer.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
The Government Recordkeeping Survey 2008 Natalie Dewson, Senior Advisor, Government Recordkeeping Programme, Archives New Zealand.
Standard on Counter Disaster Strategies Catherine Robinson Senior Project Officer, Government Recordkeeping RM Forum 23 rd February 2004.
Working with HIT Systems
Objectives and Agenda The Third Wave of the NRS: A National Seminar on NRS Improvement for State Directors of Adult Education American Institutes for Research.
Records and the Law Jan Liebaers Cayman Islands National Archive.
Solutions Within Reach
An Overview: The Role of the Audit Committee in Monitoring, Oversight, and Compliance Derry Harper, Inspector General and Director of Compliance.
KENTUCKY: POLICIES & PRACTICE Preventing, Detecting, and Investigating Test Security Irregularities: A Comprehensive Guidebook On Test Security For States.
Managing Records: Good government, Better business. FOI Presentations to Boards & Committees Cayman Islands National Archive November 2008.
AML O FFICER STR working Committee. S UBJECTS Technical aspects Aspects of day-to-day compliance AML Officer duties & responsibility Challenging facing.
S3: Understanding the Business. Session objective To explain why understanding of the business of the entity is important for the auditor To explain why.
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Building A Pharmaceutical Compliance Program Presentation to the Sixth Annual Congress on Health Care Compliance February 7, 2003 Janice Toran Fujisawa.
Key Leader Orientation 3- Key Leader Orientation 3-1.
 Background  Components and Guidelines  Frequently Asked Questions OVERVIEW.
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
Current MFRPS State Implementation Status February 3, :15 – 9:45 am Timothy Weigner Staff Director U.S. FDA Office of Regulatory Affairs, Office.
OVERVIEW OF ACTIVITIES AT GSU MONITORING BY ERASMUS + OFFICE in ARMENIA 25 MARCH 2016.
“The Role of CPSB and CASB in the Transformation and Growth of Counties” By CS Peterson Mwangi.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Safety Committee Formation
Job Titles Examples Used for HISD Nonexempt Jobs
Roles & Responsibilities of an Impressive Program Governance Plan
An Update on FERPA and Student Privacy
Overview of Structure General Data Protection Regulation (GDPR)
Health and Safety Self Assurance Toolkit 2017
Club Administration PP Dave Taylor.
Learn Your Information Security Management System
Auditing Cloud Services
Presentation to the Portfolio Committee on Finance
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
Privacy Project Framework & Structure
RECORDS AND INFORMATION
IS4550 Security Policies and Implementation
Survey Readiness RIDEOUT HEALTH Kimberly Black
Safety Assessment Efficiency Group 2 - Exercise 1
Product Positioning, Partner Resources and recent developments
2017 Administration and Finance Conference
Are we ready to move to the Operation Phase?
Emerging Audit and Internal Control Issues
Risk Management NDS Forum June 23rd 2010.
Management commitment and responsibility Safety accountability of managers Appointment of key safety personnel SMS Implementation Plan Coordination.
Presentation transcript:

State Leadership Accountability Act Department of Finance Office of State Audits and Evaluations 1

Agenda Overview of SLAA Top Ten Risks in 2015 Challenges From 2015 Trends Resources Controls Challenges From 2015 Upcoming Activities Question and Answer

What is SLAA Legal Requirement for Management to do the Following With Internal Controls: Establish Monitor Maintain Report

Government Code Sections What is SLAA Government Code Sections 13400-13407

What Changed in 2015 Launch of Web Portal Defined Risks Ongoing Monitoring Section

What is SLAA

2015 SLAA Summary 112 reports received 596 risks reported 97 entities contacted for clarification/revision

Most Common Risk 2015

Key Person Dependence, Succession Planning Common Controls Develop a Succession Plan Follow Existing Succession Plan Train/Cross-Train Staff Write/Update Policies & Procedures

Key Person Dependence, Succession Planning CalHR Workforce Planning Resources http://www.calhr.ca.gov/state-hr-professionals/Pages/workforce-planning.aspx

2nd Most Common Risk 2015

FI$Cal Conversion FI$Cal Forums http://www.fiscal.ca.gov/resources/fiscalforum.html

3rd Most Common Risk 2015

4th Most Common Risk 2015

California Information Security Office Data Security Data Breaches Visual http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ California Information Security Office http://www.cta.ca.gov/ois/

5th Most Common Risk 2015

6th Most Common Risk 2015

7th Most Common Risk 2015

8th Most Common Risk 2015

8th Most Common Risk 2015 http://slge.org/wp-content/uploads/2016/05/State-and-Local-Government-Workforce-2016-Trends.pdf

9th Most Common Risk 2015

10th Most Common Risk 2015

Other was Number 1 Risk Factor Challenges in 2015 Other was Number 1 Risk Factor Broad vs Narrow Definitions Finding the Right Risk Factor

Challenges in 2015 Ongoing Monitoring Process Limited to Reported Risks? What is Fully Implemented?

Risk Assessment Process Challenges in 2015 Risk Assessment Process Who Should Be Involved? What Criteria Was Used to Determine Reported Risks?

Challenges in 2015

Upcoming Activities June 30, 2016 Corrective Action Plans Preliminary Plans for Roundtable Meetings Refining Risk Definitions Web Portal Improvements Recording Training

Questions

Contacting SLAA http://dof.ca.gov/osae/fisma/ SLAAHotline@dof.ca.gov