The Influence of Internal Audit on Information Security effectiveness: Perceptions of Internal Auditors Ray Henrickson CA CPA CISA VP Information Systems.

Slides:



Advertisements
Similar presentations
1 The Antecedents of Internal Auditors Adoption of Continuous Auditing Technology: Exploring UTAUT in an Organizational Context Ray Henrickson CAIT, CACISA.
Advertisements

Chapter 14 Fraud Risk Assessment.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley Materiality and Risk Chapter 9.
Presenters Ryan McMeekin Nancy Bong Scott Murphy University of Colorado SAP & ISACA University of Colorado SAP & ISACA.
Internal Audit Awareness
1 FACTA ID Theft Programs Auditing for Compliance Steven Nyren, CRCM Sheshunoff Consulting & Solutions BCAC Program – September 2008.
Auditing Computer-Based Information Systems
The quality framework of European statistics by the ESCB Quality Conference Vienna, 3 June 2014 Aurel Schubert 1) European Central Bank 1) This presentation.
PwC An evidence-based overview of indicators for return-to-work John Walsh.
Sarbanes-Oxley Compliance Process Automation
1 EventView 2009: Global Bruce MacMillan President and Chief Executive Officer Meeting Professionals International Kerry Smith Founder and CEO Event Marketing.
CAATTs for Data Extraction and Analysis
S11: Risk Based Audit Approach. Session Objectives  To define audit risks and establish the relationship between materiality and audit risk  To discuss.
The Demand for Audit and Other Assurance Services Chapter 1.
CHAPTER 7 ACCEPTING THE ENGAGEMENT AND PLANNING THE AUDIT Fall 2007 u Client Acceptance and Retention u Planning the Audit u Obtaining an Understanding.
Review of Introduction to Auditing
Midterm Review Evaluation & Research Concepts Proposals & Research Design Measurement Sampling Survey methods.
BIT-224 Audit Muhammad Khurshid Khan THE DEMAND FOR AUDITING Why do organizations request an audit? –Agency relationship Evidence supporting a demand.
Section 404 Audits of Internal Control and Control Risk
Report on Internal Audit and Investigation activities
Internal Auditing and Outsourcing
Compliance System Validation - An Audit Based Approach December 2012 Uday Gulvadi, CPA, CIA, CISA, CAMS Director - Internal Audit, Risk and Compliance.
Alignment with ISACA Model Curriculum for Information Systems Major.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
1 Designing Substantive Procedures The auditor “must plan and perform the audit to reduce the audit risk to an acceptably low level that is consistent.
Chapter 07 Internal Control McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
AUDITS What you should know - a campus perspective. Franz Lozano Director/Budget Officer (former Internal Auditor) San Francisco State University Academic.
Fundamental Auditing Concepts. Materiality Evidence Independence Audit risk IS and general audit responsibilities for fraud Assurance.
Do Material Weaknesses in Information-Technology Related Internal Controls Affect Firms’ 8-K Filing Timeliness and Compliance? October 1 - 3, 2015Symposium.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
Considering Materiality and Audit Risk
April 2008 Global Developments in Corporate Reporting Charles Tilley Chartered Institute of Management Accountants Chief Executive Global Developments.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Web system security issues: A developer's perspective Morrison, P. Jason 9 December 2004 BAD Information Security Web system security issues:
Audit Risk and Audit Evidence
Compliance Audit Subcommittee Reporting Work Plan Copenhagen, Denmark 6th of May 2010.
1 Audit Automation for Implementing Continuous Auditing: Principles and Problems October 2, 2009.
CALL in TESOL Teacher Training Greg Kessler Ohio University.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Chapter 06 Audit Planning, Understanding the Client, Assessing Risks, and Responding McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc.
Tax Administration Diagnostic Assessment Tool MODULE 11 “POA 9: ACCOUNTABILITY AND TRANSPARENCY”
Audit Evidence Process
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley The Demand for Audit and Other Assurance Services Chapter 1.
FINANCIAL SERVICES ADVISORY SERVICES 13 March 2007 Challenges faced by consultants whilst consulting on Basel II.
Guidelines Recommandations. Role Ideal mediator for bridging between research findings and actual clinical practice Ideal tool for professionals, managers,
Marketing Research Sample Report Outline Stephan Sorger NOT A TEMPLATE: PLEASE DO NOT TAKE THIS PPT, CROSS OUT SHISEIDO, AND ENTER.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Chapter 9 Audit Sampling – Part a.
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Materiality and Risk Chapter 9.
Chapter 3-Auditing Computer-based Information Systems.

Developing an Audit Program By Rodney Kocot President Systems Control and Security Incorporated Copyright © 2005 Rodney Kocot.
©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Considering Materiality and Audit Risk Chapter 9.
What Can We Learn From IT Control Weaknesses Reported under SOX 404? Efrim Boritz Louise Hayes Jee-Hae Lim University of Waterloo UWCISA 6th Bi-Annual.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
1 - 1 The Demand for Audit and Other Assurance Services Chapter 1.
Audit Planning, Understanding the Client, Assessing Risks and Responding Chapter 6.
The Demand for Audit and Other Assurance Services
Michael Romeu-Lugo MBA, CISA March 27, 2017
The Demand for Audit and Other Assurance Services
APHA 135th Annual Meeting and Expo November 3-7, 2007 Washington, DC
Week Thirteen – CAATs & Continuous Auditing
Sarbanes-Oxley Act (404) An IT Viewpoint
An IT Viewpoint Darin Kreimeyer, Senior Manager Newel Linford, Manager
Internal Audit’s Role in Preventing Fraud and Corruption
Portfolio Committee on Communications
Presentation transcript:

The Influence of Internal Audit on Information Security effectiveness: Perceptions of Internal Auditors Ray Henrickson CA CPA CISA VP Information Systems and Technology Audit The Bank of Nova Scotia

2 Background System environment – Complex, integrated systems Millions of transactions a day +1,000 systems Multiple IT channels – +150 people in information security area – Large security budget – Comprehensive and sophisticated security controls – Industry cooperation and collaboration Business environment – Highly desirable target – Extensive collaboration with third parties – The bad guys are really clever

3 Tried to link perceptions of relationship to quantitative outcomes Sample Population – Majority of respondents are in regulated businesses. Although no indication of the size of the organization or the size of the security function/budget. – Demographics – professionally experienced and skilled audit population. The study recognized and effectively dealt with inherent limitations – small sample size, cross sectional vs longitudinal study Positives

4 Relatively small number of findings and incidents reported Number of security-related audit findings had decreased over the past three years Number of security incidents in the past year had slightly decreased from what it was three years earlier Surprises

5 Quality of RelationshipAudit findings Security Incidents Frequency of Audit Relationship Frequency of AuditAudit findings Security Incidents Study Results

6 Quality of the relationship – The factors that underpin Frequency of audit – Difficult to link some of the identified areas to security Security incident – What is a security incident? – malware, identify theft, phishing, code level deficiency such as cross-site scripting of SQL injection, loss/theft of asset, man-in-the-middle/browser, DDOS, mobile computing, economic espionage, end user computing, segregation of duties, etc. Audit finding – What is the significance? What is the root cause of the finding – not doing the right thing or not doing things right? Consider – Definitions

7 To understand the auditors’ views on the choices and risk ranking of security vs other functional areas To assess the significance of the security issues and audit findings – Not all issues and findings are of equal significance Consider – Risk

8 Quality of relationship and frequency of audit don’t seem to relate to number of findings or number of security incidents but may be related to something else: Audit efficiency Audit scope and objectives Relevance of issues and recommendations Quality of reporting Supplemental analysis confirmed it is easier to find issues with the people than the technology. My Takeaways

9 No conclusion on how Internal Audit positively influences the effectiveness of information security Results may indicate that auditor independence and objectivity is not influenced by Quality of Relationship or Frequency of audit Both Audit and Information Security are working independently and collaboratively towards same objective – improved information security My Takeaways

10 Value of the Work Identifies some factors associated with relationships in the audit environment. Findings likely apply to other audit relationships. Suitable as a starting point for future studies by IS Assurance academics

11 Future Research Use different performance metrics Clarity of definition of terms More information on the size of the organization, the size of the security and the audit functions More granular information on nature and significance of audit issues Consider the organization’s assessment of risk Validate the survey in advance with an internal audit practitioner