Administrative Risk Event Prioritization

Slides:



Advertisements
Similar presentations
Hazard and Risk Analysis What are the socio-economic and political trends? Consider recent assessment / reviews / baseline studies / analytical exercises.
Advertisements

Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series “Ten Minutes at a Time”
3rd Party Risk Categorization Process
Relevant Impact Building an Enterprise Security Program Tech Security ConferenceMinneapolis April 10, 2014.
CUAV Conference Risk Assessment May 18, 2015
Information System Security Plan Steps. STEP ONE – Understand the A sset Philosophically, we believe that “security should follow data” But we know that.
Risk Management Report to Audit Committee 26 September 2006 Lee Harris Assistant Chief Executive.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Section Topics Establish a framework for assessing risk
David N. Wozei Systems Administrator, IT Auditor.
1 Local Area Planning Update to TRANSAC – March 11, 2015.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
MCCVLC Distance Learning Administrators Survey Results & Discussion.
Idaho Cybersecurity Task Force Department of Administration 16 Sep 2015.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Office of Audit Services Risk Assessment California Public Employees’ Retirement System A.
Business Continuity Planning  What is it?  Why do we do it?  How do we do it?
Tax Administration Diagnostic Assessment Tool
Operational Risk Management & Compliance Officers
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
Managing Project Risk – A simplified approach Presented by : Damian Leonard.
A. Define the term risk. Business Risk – the potential for loss or failure.
SuccessFactors Recruiting.
EM-DAT TAG Meeting New York, October 26, 27 and Dang Quang Minh
Information Systems Security
Priorities for the Success AT Strategic Action Plan: SUMMARY
Utilizing Your Business Continuity Plan.
Factors to be considered for the Internal Auditors
Investment Intentions Survey 2016
Presentation to Portfolio Committee on Minerals & Energy
Operational Risk Management
The applications of BN in Supply Chain
Data Architecture World Class Operations - Impact Workshop.
Investment Intentions Survey 2016
IT Professional Perspective by William Haggerty
Risk Register I want to plan a project
HCS 446 Competitive Success/snaptutorial.com
HCS 446 Education for Service/snaptutorial.com
HCS 446 Teaching Effectively-- snaptutorial.com
Organizational Risk Assessment: Austin’s Strategic Audit Plan
Audit Plan Michelangelo Collura, Folake Stella Alabede, Felice Walden, Matthew Zimmerman.
CompTIA Security+ Study Guide (SY0-501)
Active Directory Audit
Hazard and Vulnerability Assessment
James Nobles| Legislative Auditor
به نام خداوند بخشنده و مهربان.
Enterprise Risk Management (ERM) at Clayton State University
What a non-IT auditor needs to know about IT & IT controls
Dr. Alexia Nalewaik and Prof. Anthony Mills
Business Continuity Planning
Risk Management Seminar
Information Technology Services Strategic Directions
SERVICENOW GOVERNANCE, RISK, AND COMPLIANCE
Total Current Staff & Faculty 9003 $333,957 $244,485 $89,
Putting It All Together
Information Technology Services Strategic Directions
Disaster Recovery at UNC
CRISIS EVENT Risk Assessment Crisis Management and Business Continuity
Eric Baran, WIRAB Staff April 30, 2018
Managing IT Risk in a digital Transformation AGE
Effective Risk Management in Decision Making Process
Internal Audit Who? What? When? How? Why? In brief . . .
Risk Scoring: Likelihood Less than 10%
Action title DUMMY SLIDE DUMMY SLIDE DUMMY SLIDE Situation
Likelihood 4 Allow 8 Mitigate 12 Avoid 16 3 Accept Severity
Presentation transcript:

Administrative Risk Event Prioritization Risk Events Research Non-compliance Can’t support student needs Failure to support key business processes Poor data – quality/timeliness/… Action by external bodies Provincial Auditor non-compliance Poor Donor reporting Faculty loss b/c of admin frustration Staff loss b/c of admin frustration Research loss “ “ “ Administrative inefficiencies 12. Cost of systems duplication 13. System misuse and fraud 14. Inability to support systems growth 15. Systems failure in event of disaster 16. Inability to attract/retain IT staff 17. Security Breach Primary BASE Focus Issues 1 Extreme 4 15 5 2 11 7 High 3 13 14 17 12 16 6 8 Medium 10 9 Impact Unit Level Focus Issues Low 1) Previous server model meant that incremental servers were added rather than trying to improve utilization of existing equipment 2) Support and Overhead cost growth were derivatives of the server growth 3) Obsolescence of OS is increasingly limiting ability to support business needs 4) Obsolescence also limits ability to provide layered services - web, reporting, etc. 5) Current assumption is that transition of Operations from IBM back to TC of itself will not impact this situation Very Low Note: IT Risks need final ranking and Priority assessment by BASE committee Very Low Low Medium High Very High Likelihood