Information Systems Risk Management in Uganda

Slides:



Advertisements
Similar presentations
Chapter 10 Accounting Information Systems and Internal Controls
Advertisements

Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Control and Accounting Information Systems
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Service Design – Section 4.5 Service Continuity Management.
Audit Guidance Using the Federal Information System Controls Audit Manual (FISCAM) to Achieve Audit Objectives in Financial and Performance Audits Mickie.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
6-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Internal Control Evaluation: Assessing Control Risk.
Applying COSO’s Enterprise Risk Management — Integrated Framework
Expanded Version of COSO a presentation by Steve Wadleigh Expanded Version of COSO a presentation by Steve Wadleigh Standards for Internal Control in the.
Auditing A Risk-Based Approach To Conducting A Quality Audit
Office of Inspector General (OIG) Internal Audit
The Information Systems Audit Process
Risk Assessment Frameworks
Information Systems Controls for System Reliability -Information Security-
Internal Auditing and Outsourcing
1 Bölgesel Rekabet Edebilirlik Operasyonel Programı’nın Uygulanması için Kurumsal Kapasitenin Oluşturulmasına Yönelik Teknik Yardım Technical Assistance.
Chapter 3 Internal Controls.
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Chapter 07 Internal Control McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter Three IT Risks and Controls.
Chapter 5 Internal Control over Financial Reporting
Monitoring Internal Control Systems Johann Rieser Senior Auditor, Ministry of Finance, Vienna.
Introduction In 1992, the Committee Of Sponsoring Organizations of the Treadway Commission (COSO) published Internal Control-Integrated Framework (1992.
Internal Control in a Financial Statement Audit
Internal Control in a Financial Statement Audit
Risk Management For the Board of The Law Society 16 February 2005.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
The Connection between Risk Management and Internal Control in Organizations Mag. Norbert Wagner Budapest,
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Chapter 9: Introduction to Internal Control Systems
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 5 Evaluating the Integrity and Effectiveness of the Client’s Control Systems.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
6/11/2016 Filename Session 135 Control Practices and Control Theories Jeff Roth, CISA.
Company LOGO Chapter4 Internal control systems. Internal control  It is any action taken by management to enhance the likelihood that established objectives.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Business Continuity Planning 101
#327 – Legal and Regulatory Risk: Silent and Possibly Deadly Deborah Frazer, CPA CISA CISSP Senior Director, Internal Audit PalmSource, Inc.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
#127 – Risk Management Basics Deborah Frazer, CPA CISA CISSP Senior Director, Internal Audit PalmSource, Inc.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
JMFIP Financial Management Conference
Internal Control in a Financial Statement Audit
An Overview on Risk Management
PLANNING, MATERIALITY AND ASSESSING THE RISK OF MISSTATEMENT
Developing the Overall Audit Plan and Audit Program
Internal Control in a Financial Statement Audit
Chapter 4 Internal Controls McGraw-Hill/Irwin
COSO and ERM Committee of Sponsoring Organizations (COSO) is an organization dedicated to providing thought leadership and guidance on internal control,
HUMAN RESOURCE GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE
Internal control objectives
Building the Foundation of Compliance
Building the Foundation of Compliance
Internal control - the IA perspective
Tim Grow, CPA Charleston Office Managing Shareholder
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Good practices for risk assessment and control activities
Presentation transcript:

Information Systems Risk Management in Uganda ISACA Kampala Chapter Presentation by Mugabi Joseph, CISA, CRISC. Tuesday, May 31, 2011.

Lay Out of the Presentation What is Information Systems Risk Management (ISRM)? What are the objectives of ISRM? The Internal Perspective-The IS Auditors’ Audit Risks. The External Perspective-The IS Auditors’ Clients’ Risks. The IS Audit/Assurance Cycle. ISACA IT Audit and Assurance Standards and Guideline on ISRM Best Practice. Selection of a Risk Assessment Methodology Current Uganda ISRM practices. Challenges of Managing ISRM Risks Summary of the IS Auditor’s roles in regards to ISRM. Roles the IS Auditor should NOT undertake. References. Conclusion. Lay Out of the Presentation

What is Information Systems Risk Management (ISRM) IS are the combination of strategic, managerial and operational activities involved in the gathering, recording, processing, storage, distributing, and use of information and its related technologies. Risk is the possibility of an act or event occurring that would have an adverse effect on the organization and its information systems. Risk—In business, the potential that a given threat will exploit vulnerabilities of an asset or group of assets to cause loss and/or damage to the assets; usually measured by a combination of impact and probability/likelihood of occurrence (COBIT4.1). What is Information Systems Risk Management (ISRM)

What is Information Systems Risk Management (ISRM)-Cont’d Risk is the combination of the likelihood of events occurring and the impact those events have on the organization either opportunities for benefit (upside) or threats to success (downside).-CRISC. Risk management is the coordinated activities to direct and control an organization with regard to risk (ISACA Glossary). Risk management is the process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level (NIST-USA).

What is Information Systems Risk Management (ISRM)-Cont’d Risk Appetite is the amount of risk, on a broad level, that an entity is willing to accept in pursuit of its mission Risk Tolerance is the acceptable level of variation that management is willing to allow for any particular risk as it pursues objectives Risk Response are the approaches an organization makes in dealing with the identified and ranked risks viz. avoidance, acceptance, transfer or mitigation .

What is Information Systems Risk Management (ISRM)-Cont’d The COSO Enterprise Risk Management (ERM)-is a process, effected by an entity's board of directors, management, and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives. The COSO ERM Framework has eight Components and four objectives categories. It is an expansion of the COSO Internal Control-Integrated Framework . The eight components are: Internal Environment, Objective Setting, Event Identification, Risk Assessment, Risk Response, Control Activities, Information and Communication and Monitoring. The four objectives categories are :- Strategy - high-level goals, aligned with and supporting the organization's mission Operations - effective and efficient use of resources Financial Reporting - reliability of operational and financial reporting Compliance - compliance with applicable laws and regulations.

What are the Objectives of ISRM? To secure the organization and its IS assets. To enable the organization to accomplish its mission and vision. To enable management to make well-informed risk management decisions to justify the organization’s expenditures that is part of an IS budget.  To optimize the assignment of IS audit resources through a comprehensive understanding of the organization’s IS environment, audit universe and the risks associated with each auditable universe unit; so as to maximize benefits.  Use the risk based audit approach in audit and assurance work; direct more resources to high business risk areas and add value continuously.

The Internal Perspective: The IS Auditor’s Risks Audit risk is the risk of the IS auditor reaching an incorrect conclusion based upon audit findings. Threefold:- Inherent risk is the susceptibility of an audit area to error in a way that could be material, individually or in combination with other errors, assuming that there were no related internal controls. E.g complex IS. Control risk is the risk that an error that could occur in an audit area and could be material, individually or in combination with other errors, will not be prevented or detected and corrected on a timely basis by the internal control system .e,g. not-updated anti-virus. Detection risk is the risk that the IS auditor’s substantive procedures will not detect an error that could be material, individually or in combination with other errors.e.g. Lack of BCP, DRP, logs not reviewed.

The External Perspective: The IS Auditors’ Clients’ Risks Ineffective Information security Inadequate Disaster recovery/business Plans. Inadequate Vulnerability Management.  Non-Compliance with regulations and policies. Lack of Organization ISRM governance. Mobile device mismanagement Cloud computing safety and security concerns over data

The IS Audit/Assurance Cycle 21 September 2018 Information Sytems Risk Management in Uganda

ISACA IT Audit and Assurance Standards and Guidelines on ISRM Best practice The IS auditor should use an appropriate risk assessment technique or approach in developing the overall IS audit plan and in determining priorities for the effective allocation of IS audit resources. When planning individual reviews, the IS auditor should identify and assess risks relevant to the area under review. Risk assessment is a technique used to examine auditable units in the IS audit universe and select areas for review to include in the IS annual plan that have the greatest risk exposure .  An auditable unit is defined as a discrete segment of every organization and its systems.

ISACA IT Audit and Assurance Standards and Guidelines on ISRM Best practice Cont’d Determination of the IS audit universe should be based on knowledge of the organization's IT strategic plan, objectives, its operations and discussions with responsible management. The use of risk assessment in the selection of audit projects allows the IS auditor to quantify and justify the amount of IS audit resources needed to complete the IS audit plan or a particular review. The IS auditor can prioritize scheduled reviews based on perceptions of risk and contribute towards the documentation of risk management frameworks (Updated Risk Register Template 2003.xls ).

ISACA IT Audit and Assurance Standards and Guidelines on ISRM Best practice Cont’d An IS auditor should carry out a preliminary assessment of the risks relevant to the area under review. IS audit engagement objectives for each specific review should reflect the results of such a risk assessment. Selection of the most relevant material in COBIT applicable to the scope of the particular audit is based on the choice of specific COBIT IT processes and consideration of COBIT’s control objectives and associated management practices.

Selection of a Risk Assessment Methodology Judgmental-IS Auditor ranks risk as high, medium or low subjectively. Analytical-numeric risk ranking for high, medium or low. e,.g Pentana system In deciding which is the most appropriate risk assessment methodology, IS auditors should consider issues such as: Type of information required to be collected (some systems use financial effects as the only measure—this is not always appropriate for IS audits); cost of software or other licenses required to use the methodology; availability of information.

Risk Assessment Measurement-Manual Auditable Unit Audit Risk Ranking (1-10); Low to High Business Risk Ranking (1-3) Weighted Total Risk Ranking Criticality of system/business/customer loyalty LAN Users of the system Procurement Business Continuity Plans Disaster Recovery Plans Payables Project Budget Prior Audit Findings Region/Branch/ Offices

Risk Assessment Measurement-ICT System

Current Uganda ISRM practices. Organizations undertake ISRM with guidance of:- Laws; Regulations; Guidelines Policies; Procedures Credit reference bureau, Know Your Employee (KYE); Know Your Customer (KYC)-in banking sector; Stakeholders are:- Government regulatory entities, ministries, agencies, parastatals, projects. Private sector/businesses-KPIs and staff appraisal rating tool; open communication on risk. NGOs and project log-frames. Risk committees, Risk directors, Risk officers, group meetings

Challenges of Managing ISRM Risks Many organizations do not understand that they are also in the business of managing their business risks, from the boardroom to management commitment to the data network. Everybody by default is a risk manager. ISRM risk management is a very difficult endeavor because risk variables can often interact in complex and elusive ways.  Lack of management understanding of what the organization’s key IS risks are.  Lack of defined/enabling laws, standards or principles for risk management in organizations; delay in passing AML bill.  Loss of efficiency and effectivity in risk management processes through silos.  Poor funding and staffing for risk management purposes.

Summary of the IS Auditor’s roles in regards to ISRM Giving assurance on the IS risk management processes. Giving assurance that risks are correctly evaluated. Evaluating risk management processes. Evaluating the reporting of key risks. Reviewing the management of key risks.

Roles the IS Auditor should NOT undertake Setting the risk appetite; Imposing risk management processes; Management assurance on risks; Taking decisions on risk responses; Implementing risk responses on management’s behalf; Accountability for risk management.

References www.isaca.org/glossary Top Business/Technology Issues Survey Results 2011, ISACA. www.coso.org/documents/COSO_ERM. IT Standards, Guidelines, and Tools and Techniques for Audit and Assurance and Control Professionals, ISACA, August 2010. Control Objectives for Information and related Technology (COBIT®) 4.1, ITGI, 2007; www.itgi.org. www.sepiasolutions.net/Software/Pentana.html CRISC Review Manual, 2011.

Conclusion  IS risk management is a fundamental element of corporate/organizational governance with the tone set at the top. Management is responsible for establishing and operating the risk management framework on behalf of the board. IS Auditor’s core role is to provide continuous assurance to management and to the board on the effectiveness of the IS risk management. Critical noting that information and the technology systems that support it represent the organization’s most valuable assets. Business requires satisfaction in the areas of effectiveness, efficiency, confidentiality, integrity, availability, compliance and reliability of information assets to meet business objectives.