Information Technology Controls and Sarbanes-Oxley ISACA Roundtable Discussion April 15, 2004.

Slides:



Advertisements
Similar presentations
All Rights Reserved, Duke Medicine 2007 IT Security Presented by: Trisha Craig and Don Elsner Principal Auditors – IT Audit Duke University 1.
Advertisements

Computer Fraud Chapter 5.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Control and Accounting Information Systems
© Jerry L. Turner 2006 Jerry L Turner The University of Memphis An Efficient Approach to Identification and Documentation of Critical Accounting Application.
Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
INTERNAL CONTROL COMPONENT Pertemuan_6 Mata Kuliah: CSP402, IT Governance Tahun Akademik : 2012/2013 SAS 78 / COSO Describes the relationship between the.
DEPARTMENT OBJECTIVES 1. To Identify and deploy information technology to meet business objective at CKPL. 2.To Provide support to users for systems usage.
The TRUTH About SOX, Auditors & Oracle Applimation is the leading provider of Application Lifecycle Management solutions.
Information Security Policies and Standards
A Practical IT Approach To Sarbanes-Oxley Compliance
Adam Bearhalter Kristy Kelly Julie Bland Alex Tiset.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Implementation Audit and Control Background Internal Audit Role Go-Live Criteria Audit Approach - Systems Audit Approach - People Summary Agenda.
1 Sarbanes-Oxley IT Audits. 2 Sarbanes-Oxley 2002 Recommended “audit firms place a high priority on enhancing the overall effectiveness of auditors’ work.
Chapter 4 Internal Control Bus 319 Accounting Information Systems.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
CHAPTER 1. COMPUTER ACCOUNTING WITH QUICKBOOKS PRO 2009 WHY CHOOSE QUICKBOOKS?  3.5 million users  89% of small business accounting software sales.
World Class Security Experts © Copyright 2004 SkyView Partners LLC. All rights reserved. How IT is affected by Sarbanes-Oxley Act.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
SEC835 Database and Web application security Information Security Architecture.
IT Control Objectives for Sarbanes-Oxley
Overview of Systems Audit
Information Systems Security Computer System Life Cycle Security.
Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.
IRIS Business Warehouse Legacy Business Warehouse (LBW) Blueprint Specification May, 2000.
GRC - Governance, Risk MANAGEMENT, and Compliance
Overview:  Different controls in an organization  Relationship between IT controls & financial controls  The Mega Process Leads  Application of COBIT.
Everyone’s Been Hacked Now What?. OakRidge What happened?
Financial Statements Q&A. Name a type of Financial Statement?
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
IIA_Tampa_ Beth Breier, City of Tallahassee1 IT Auditing in the Small Audit Shop Beth Breier, CPA, CISA City of Tallahassee
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
Blueberry Software IT Security Audit Results. Results: Good.
Everyone’s Been Hacked Now What?. OakRidge What happened?
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
TRANSACTION PROCESSING CYCLE Presented to: Mr. Ahmad Tisman Pasha Presented by: Shafaque Mahmood Roll No
IMFO Annual Conference – 2015 S21: Good Governance & Oversight B2B.
Chapter 2 Securing Network Server and User Workstations.
ABT is defined by the benefits it bring to its clients Over a Decade of Innovation & Reliability Sample Client Application List.
Audit Evidence Process
Chapter 8 Auditing in an E-commerce Environment
Elements of Financial Statements. Purpose of financial statements Reporting accounting information to external decision makers.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Review of IT General Controls
Financial Closing Scenario Overview
Controlling Computer-Based Information Systems, Part II
Computer Control & Audit
Managing the IT Function
The Impact of Information Technology on the Audit Process
Computer-Based Processing: Developing an Audit Assessment Approach
The Impact of Information Technology on the Audit Process
مراجعه النظم Information Systems Audit
Purchases and Cash Disbursements Procedures
Accounting Overview Financial Accounting Managerial Accounting
County HIPAA Review All Rights Reserved 2002.
Financial Closing Scenario Overview
What are IAM Key Processes.
PLANNING A SECURE BASELINE INSTALLATION
Financial Statement Analysis
James Baranello MIS 5121:Business Process, ERP Systems & Controls Week 8: Security 2 – Roles Financial Processes and Controls.
NM Department of Homeland Security and Emergency Management
Presentation transcript:

Information Technology Controls and Sarbanes-Oxley ISACA Roundtable Discussion April 15, 2004

What are IT Controls? IT processes embedded within the Business Processes (application level controls) – e.g., SAP security restricts access to vendor master file Infrastructure/General Computer Controls – e.g., Change Management, UNIX security How do you determine what is in SOX scope?

Financial Statements -Balance Sheet -Income State -Cash Flow Stmt -Footnotes Develop Materiality/ Threshold Identify Significant Accounts -Individual -In Aggregate Major Classes of Transactions Processes Applications (e.g., SAP) Infrastructure (Database, Network, Operating Systems)

COBIT and COSO Link

Minimum Documentation Information Security  Policies, Procedures, Standards  Risk Assessment  Authentication Controls  Authorization Controls (including Administrator/Super User level)  User Access Administration (Granting, Terminating and Employee Transfers, Contractors)  Security Logging and Monitoring Controls  Other Technical Configurations  Physical Security Systems Development and Change Management Controls  Request/Approvals  Prioritizations  Development Standards  SDLC  Testing, QA, Migration  Documentation Maintenance Computer Operations  Batch Jobs (Abends, Performance/Capacity Monitoring)  Backups Relevant application controls (e.g.,Access Controls, Edit/Validation Checks, Interfaces, Audit Trails, etc.)