Risk Assessment via the Audit Management Tool (IcDen © ) Halis KIRAL, CIA, CCSA, CGAP Head of Department for Internal Audit CHU 1.

Slides:



Advertisements
Similar presentations
DO YOU SPEAK FUTURE?. Cutting-edge technology for the development of business software applications Takes advantage of the most recent international trends,
Advertisements

Presentation by Priyanka Sawarkar
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Near East Plant Protection Network for Regional Cooperation & Knowledge Sharing Food and Agriculture Organization of the United Nations An Overview on.
SERVING CORPORATES AND INDIVIDUALS ©2012 BUSINESS REPORTING MANAGEMENT SERVICES, INC WELCOME.
DEPARTMENT OBJECTIVES 1. To Identify and deploy information technology to meet business objective at CKPL. 2.To Provide support to users for systems usage.
PUBLIC SECTOR INTERNAL AUDIT IN THE REPUBLIC OF LITHUANIA Mr. Jonas Vaitkevičius Head of Internal Audit and Financial Control Methodology and Monitoring.
Project Overview Enhancing Information and Communication system in GEFONT - Buddhi Acharya GEFONT.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
Chapter 12 Strategies for Managing the Technology Infrastructure.
SAFETY MANAGEMENT INFORMATION SYSTEM By: Fahad Ishfaq Senior Engineer Safety.
Tuesday, February 15, Management of Information Systems: Mini-3 Spring 2000.
Computers: Tools for an Information Age
OHT 14.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Software quality infrastructure components The need for procedures and.
SQL Forms Engine Koifman Eran Egri Ozi Supervisor: Ilana David.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Introduction to Systems Analysis and Design
Development plan and quality plan for your Project
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
N A managed approach to planning and controlling the implementation of complex application software. n A flexible tool kit, designed to support the Project.
IDF Grand for Internal Audit Capacity Building Ahmet BAŞPINAR Head of Department for Internal Audit CHU -TURKEY-
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
CHAPTER 5 Infrastructure Components PART I. 2 ESGD5125 SEM II 2009/2010 Dr. Samy Abu Naser 2 Learning Objectives: To discuss: The need for SQA procedures.
PayDox Corporate Document Management System Rotech AB Interface Ltd Business Software Integration.
PEM-PAL - 2nd Internal auditors’ Community of Practice Workshop
Corporate Support Richard Brown, Business Director.
January 2011 Travel Experts Website Prepared By : Gomaa, Kevin, and Lidiya.
Business Instant Messaging Facilitating Inter-Office Communication.
CMMi What is CMMi? Basic terms Levels Common Features Assessment process List of KPAs for each level.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.

Abstract Evidence can be the key to convicting someone of a crime, or acquitting a person of charges brought against them. To make sure the evidence is.
Auditing Information Systems (AIS)
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
QuikTrac 5.5, a validated Motorola Software Solution, allows you to take your Host ERP screens and extend them out to fixed or mobile devices including.
LECTURE IV. o Project HRM include the processes that organize, manage and lead the project team. o The project team is comprised of the people with assigned.
SYSTEMS ANALYSIS AND DESIGN LIFE CYCLE
Scott Butson District Technology Manager. Provide professional to all district staff Professional development has been provided on a regular basis to.
1 OGM Presentation for Your Hospital Today. 2 The Ongoing Maintenance Program The OGM Program Components.
Agenda  Project Overview  Project Goal & Scope  Estimates  Deadline  Project Environment  Delivery Plan  Project Plan  Team Structure  Risk Analysis.
interactive logbook Paul Kiddie, Mike Sharples et al. The Development of an Application to Enhance.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
The SQL Applications Documentation Tool for Dublin City Council.
MICROSOFT PROJECT 2010 Robert Olivieri Senior Instructor MicroAssist.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
Internal and external quality evaluation of internal audit in public sector in Ukraine Maxim Timokhin, Head of CHU, Public Financial Inspection, Ukraine.
~ pertemuan 4 ~ Oleh: Ir. Abdul Hayat, MTI 20-Mar-2009 [Abdul Hayat, [4]Project Integration Management, Semester Genap 2008/2009] 1 PROJECT INTEGRATION.
1 Sean Aluoto Anthony Keeley Eric Werner. 2 Project Plan Overview Project Lifecycle model Time line Deliverables Organization plan Risk management Design.
Reforms in the Albanian Public Procurement System 7 th Regional Public Procurement Forum Tbilisi, Georgia May 16-19, 2011 PUBLIC PROCUREMENT AGENCY 1.
Albanian Government Financial Information System (AGFIS) AGFIS is the system, through which the Government of Albania performs the entire budget execution.
AUDIT STAFF TRAINING WORKSHOP 13 TH – 14 TH NOVEMBER 2014, HILTON HOTEL NAIROBI AUDIT PLANNING 1.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Clouding with Microsoft Azure
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Hans Nieuwlands CIA CGAP CCSA CEO IIA Netherlands
Implementation of Computer Maintenance Management system - CMMS
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
Scheduler 1.0 By Vipul Sabhaya Udam Dewaraja.
LEARNING MANAGEMENT SYSTEM
Synthesizing knowledge During Project
Business Register Redesign Technology Strategy Plan
Enterprise Program Management Office
QUALITY ASSURANCE AND IMPROVEMENT PROGRAM
Microfinance Institutions
Cloud Computing LegalRun Solutions Why It’s Right for You!
LEARNING MANAGEMENT SYSTEM
06 | SQL Server and the Cloud
Warehouse Management System. Brilliant’s warehouse control system is specially supporting your day to day operations for your single or multiple warehouses.
Presentation transcript:

Risk Assessment via the Audit Management Tool (IcDen © ) Halis KIRAL, CIA, CCSA, CGAP Head of Department for Internal Audit CHU 1

2 İçDen is a comprehensive, highly configurable, powerful and easy to use Audit Management Tool, the audit management system tool of the Internal Audit Coordination Board (IACB), is a customized software product developed between 2013 and General Features IACB made the final decision in favor of using this tailor- made Audit Management System (AMS) tool due to its high level of adaptability and flexibility which enables to meet all the requirements of the IACB and its member institutions audits.

3 June-September 2012 Scenario Building Interview with firms ToR and Contract Firm Choice June-September 2012 Scenario Building Interview with firms ToR and Contract Firm Choice October-December 2012 Scenario Analysis Interview with IAUs Needs analysis and software development October-December 2012 Scenario Analysis Interview with IAUs Needs analysis and software development March-May 2013 Prototype experiment in various IAUs March-May 2013 Prototype experiment in various IAUs March-June 2013 Preparing web application March-June 2013 Preparing web application November-December day IcDen Training for 45 IAUs and 400 IA Prepairng internal audit plans of IAU via IcDen November-December day IcDen Training for 45 IAUs and 400 IA Prepairng internal audit plans of IAU via IcDen January 2014 –…. Carrying out IAA via IcDen for 45 IAU January 2014 –…. Carrying out IAA via IcDen for 45 IAU Project Schedule January 2015 –……. Carrying out IAA via IcDen for 105 (45+60) IAUs out of… And 636 internal auditors out of 820 internal auditors January 2015 –……. Carrying out IAA via IcDen for 105 (45+60) IAUs out of… And 636 internal auditors out of 820 internal auditors October-November day IcDen Training for 60 IAUs and internal auditors incuding milittary and police departments October-November day IcDen Training for 60 IAUs and internal auditors incuding milittary and police departments

4 SOFTWARE $ HARDWARE $ Storage Area Network (SAN) Windows Server 2012 Database Server SQL Server 2012 Firewall Other equipment Project Cost

5  Single Application Multi Database; IACB and its member institutions are using the same application and own database,  Web based application,  Generic structure and configurable; each institution apply their own methodology,  Role Based Security Model; all procedures and modules are connected to a role and roles are assigned to user groups. Key Features of IcDen I

6  Metro Style User Interface; easy to use and effective user interface,  Secure Host; has passed the security tests by TUBITAK (The Scientific and Technological Research Council of Turkey),  Multi-Language; supports English and Turkish. Key Features of IcDen II

7 Icden has already helped the IACB and its member institutions achieve following benefits; Improving efficiency and effectiveness, Carrying out timely audits, Measuring the planned of audits in order to improve programming and processes Benefits of IcDen I

8 Providing a high level of standardizations among the works of all audit teams completely in line with regularity audit manual, Establishing a better quality control review system, Producing timely management information to help senior management monitor audits and take necessary decisions, Facilitating information sharing in systematic way among auditors. Benefits of IcDen II

9 User Groups - CHU

10 User Groups - CAE

11 User Groups – Internal Auditors

12 Audit Universe Macro Risk Assessment Audit Package Program Risk Assessment via IcDen Audit Universe

13 Audit Universe Macro Risk Assessment Audit Package Program Macro Risk Assessment

14 Audit Package Program Audit Universe Macro Risk Assessment

15 Audit Program Audit Package Program Audit Universe Macro Risk Assessment

16 Audit Activities – Risk Control Matrix Preliminary Study Risk Control Matrix Field Work FindingsReporting

17 Reporting and Monitoring

18 Risk Assessment

19 Enhanced Risk Assessment; first step macro Risk Assessment (MRA) for each process. Second step Inherent Risk Assessment before audit fieldwork. Control Risk Assessment after final report and then Residual Risk Assessment after monitoring. These assessment are automatically reflected in the MRA. Risk Updating

20 Risk Updating

Many thanks… 21