Controls Definition: Process of exercising a restraining or guiding influence over the activities of an object, organism, or system.

Slides:



Advertisements
Similar presentations
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Advertisements

Chapter 10 Accounting Information Systems and Internal Controls
Office of Operations 2009 Fall Conference Navigating Uncertain Times October 21-22, 2009 Risk Assessment and Internal Controls Internal Controls Anna Tomassacci.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Security Policies and Standards
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESS
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
Risk General Definition: exposure to the chance of adverse effects or loss; a hazard or dangerous chance Examples of risks to a company:  Erroneous Financial.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Lecture 8: Risk Management Controlling Risk
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
Factors to be taken into account when designing ICT Security Policies
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Chapter 11.  The board is ultimately responsible for risk management  Oversee strategic risks, operational risks, and financial risks  Many federal.
Chapter 4 Internal Controls McGraw-Hill/Irwin
Protecting ICT Systems
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Control and Accounting Information Systems
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
SEC835 Database and Web application security Information Security Architecture.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Introduction to Internal Control Systems
Chapter Three IT Risks and Controls.
Internal controls. Session objectives Define Internal Controls To understand components of Internal Controls, control environment and types of controls.
Chapter 5 Internal Control over Financial Reporting
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
The Connection between Risk Management and Internal Control in Organizations Mag. Norbert Wagner Budapest,
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Chapter 9: Introduction to Internal Control Systems
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Financial Accounting- BUS Spring 2015 Session 11 Fraud, I/C and Cash.
S5: Internal controls. What is Internal Control Internal control is a process Internal control is a process Internal control is effected by people Internal.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
Auditors’ Dilemma – reporting requirements on Internal Financial Controls under the Companies Act 2013 and Clause 49 of the Listing agreement V. Venkataramanan.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
8 INTERNAL CONTROL. Definition Duty  mgt (CEO)  Board  Internal auditor  Employee  External person.
Cybersecurity: Risk Management
Risk management.
Internal Control.
Design for Security Pepper.
Chapter 4 Internal Controls McGraw-Hill/Irwin
Managing the IT Function
I have many checklists: how do I get started with cyber security?
Internal control - the IA perspective
Final HIPAA Security Rule
Cybersecurity compliance for attorneys
Small Business Technical Checkup for the 21st Century
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Presentation transcript:

Controls Definition: Process of exercising a restraining or guiding influence over the activities of an object, organism, or system

COSO  Identify set of controls to guard against threat  Estimate costs and benefits of implementing controls  Evaluate whether to put controls in place  Implement controls (including training)  Monitor

Objective of Internal Controls To reduce likelihood that a threat will come to pass and result in a loss to the organization. (Mitigate risk) »Validity »Completeness »Accuracy »Compliance »Safeguard Assets »Authorized »Timely

Overall IC considerations Means to an end, standard controls are a guideline only Reasonable assurance, not perfection Cost-benefit Controls need context – the company, what it stands for, what level of risk management is willing to tolerate, industry risks involved, etc.

Computer systems controls Data protection –Unique ID/Password –Encryption –Firewalls Physical –Lock rooms –Access monitoring –Data transmission/Internet access restrictions Preventive –Labeling –Backup –Uninterruptible power sources –Disaster recovery

Control matrices Examples Link to Risks identified for groups SLP Corp