WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Robert.

Slides:



Advertisements
Similar presentations
©2009 ISACA/ITGI. All rights reserved.. ISACA At-a-Glance Founded in 1969; non-profit, independent association that helps members achieve greater trust.
Advertisements

Risk Management at Harvard – Panel Discussion Harvard IT Summit
ISACA Guidance and Practices Committee
Alignment of COBIT to Botswana IT Audit Methodology
Lisanne Sison Director ERM Bickmore
IMFO Audit & Risk Indaba June 2012
Chapter 10 Accounting Information Systems and Internal Controls
Control and Accounting Information Systems
Risk Management and Internal Controls ASSAL 20 November 2014 Annick Teubner Chair, IAIS Governance Working Group.
Introduction to Enterprise Risk Management (ERM)
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Using COBIT and ITIL Robert E Stroud CGEIT
2011 Governance, Risk, and Compliance Conference August 29 – 31, 2011 / Orlando, FL, USA The Top Four Essential Objectives to Auditing ERM Stephen E. McBride,
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Operational risk management Margaret Guerquin, FSA, FCIA Canadian Institute of Actuaries 2006 General Meeting Chicago Confidential © 2006 Swiss Re All.
Applying COSO’s Enterprise Risk Management — Integrated Framework
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Enterprise IT Governance with COBIT – Part V
Enterprise Risk Management in DHHS
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
Frequently Asked Questions (FAQ) prepared by some members of the ICH Q9 EWG for example only; not an official policy/guidance July 2006, slide 1 ICH Q9.
“The Impact of Sarbanes Oxley, An Evolving Best Practice” Ellen C. Wolf Senior Vice President & Chief Financial Officer American Water National Association.
Information Systems Controls for System Reliability -Information Security-
PAINTING THE FULL PICTURE
How can projects be controlled?
Opportunities & Implications for Turkish Organisations & Projects
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
COBIT® 5 for Risk Introduction
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Continual Service Improvement Process
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
Building a Corporate Risk Culture Shane Troyer, CPA, CIA, CFE, CISSP Principal Operational Advisory Joost Houwen, CISA,
The Impact and Opportunity of Compliance and IT Governance - Robert E Stroud VP, Service Management ITSM & Governance Evangelist ISACA.
COSO: Current ERM Challenges and Our Responses RIMS 2012 Annual Conference April 17, 2012 by David Landsittel COSO Chairman.
CDS Operational Risk Management - October 28, 2005 Existing Methodologies for Operational Risk Mitigation - CDS’s ERM Program ACSDA Seminar - October 26.
Enterprise Risk Management & IT Compliance March 30, 2010 Presented by: Ken Rowe, Director Enterprise Systems Assurance & Chief Security Officer University.
Roles and Responsibilities
IRS Enterprise Risk Management (ERM)
Risk Management For the Board of The Law Society 16 February 2005.
Overview of COBIT5 and Impact on Local Content for IT By Mrs Tokunbo Martins Director Banking Supervision (Central Bank of Nigeria)
The Connection between Risk Management and Internal Control in Organizations Mag. Norbert Wagner Budapest,
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 Introducing Enterprise Risk Management (ERM) - The KOC Experience November 2012 Khaled Al-Awadhi Risk Management Team Kuwait Oil Company.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Chapter 3 Governance.
ITIL VS COBIT 06 PLM - Group 9
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
1 COSO ERM Framework Update Our Next Challenge and Opportunity September 2015.
Five Risk Management Best Practices Scott Moss, CIS P/C Trust Director ERM – ISO
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
ERM and Information Risks July 2013 Advisory. 1 © KPMG, a partnership established under Ghanaian law and a member firm of the KPMG network of independent.
#327 – Legal and Regulatory Risk: Silent and Possibly Deadly Deborah Frazer, CPA CISA CISSP Senior Director, Internal Audit PalmSource, Inc.
USDA 2016 Financial Management Training Transforming Shared Services
Module 6: Business Application Software Audit Chapter 1: Business Application Software Audit 1.
©2009 ISACA/ITGI. All rights reserved.
COBIT® 5 for Risk Introduction
ISACA Guidance and Practices Committee
©2009 ISACA/ITGI. All rights reserved.
Alignment of COBIT to Botswana IT Audit Methodology
Copyright © 2009 PMI RiskSIG
ISACA Guidance and Practices Committee
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
COBIT® 5 for Risk Introduction
COBIT® 5 for Risk Introduction
COBIT 5 and GRC Date.
An overview of Internal Controls Structure & Mechanism
Operational Risk Management
Presentation transcript:

WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Robert E Stroud CGEIT VP Service Management & Governance, CA Technologies International Vice President, ISACA

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Robert E Stroud CGEIT international VP, ISACA service management & governance evangelist CA —29 years in Industry Experience —15+ years banking industry —VP Service Management & ITSM & IT Governance CA —International Vice President ISACA\ITGI —Former Chair COBIT Steering Committee & chief architect —IT Governance Committee —Contributor to COBIT V4 and V4.1 —Contributor to the Control Objectives for Basel II —Contributor to ITIL\COBIT\ISO17799 Management Overview —ITIL v3 Update Management Board and Reviewer —ITIL v3 ITIL Advisory Group, Mentor & Reviewer —Author ITIL Business Perspective Volume 2 —Executive Board itSMF International Treasurer and Director Audit Standards & compliance —Former Board Member USA itSMF 2

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Important Information on the content within…. — The Risk IT Framework and The Risk IT Practitioner Guide including select text and figures featured within this presentation are the property of ISACA. Copyright © 2009 ISACA. All rights reserved. — ISACA, ITGI and COBIT are registered trademarks of ISACA. Val IT and Risk IT are trademarks of ISACA. — This presentation is presented with the permission of ISACA. 3

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Agenda — Introduction — The ‘Risk IT Framework’ — The ‘Risk IT Practitioner Guide’ – Managing Risk in Practice — Risk Governance — Risk Evaluation — Risk Response — Summary

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk and value are intertwined! — Risk has 2 sides − Value preservation − Value creation IT related risk = materialised business impact because of IT related event

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA IT (Related) risks ITGI survey 2008, on IT related problems:

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA it related risk management - summary — Various standards & frameworks available, but either: − Generic Enterprise Risk Management oriented − IT Security oriented — No comprehensive IT Related Risk framework available 7

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk it principles

The “Risk IT Framework”

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Risk IT — Risk IT is a framework based on a set of guiding principles and featuring business processes and management guidelines that confirm these principles — The Risk IT framework is to be used to help implement IT governance — Organisations that have adopted (or are planning to adopt) CobiT as their IT Governance framework can use Risk IT to enhance risk management.

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Purpose of "'Risk IT'" The Risk IT framework explains IT risk and will enable users to: − Integrate the management of IT risk into the overall enterprise risk management of the organisation − Make well-informed decisions about the extent of the risk, the risk appetite and the risk tolerance of the enterprise − Understand how to respond to the risk In brief, the framework allows the enterprise to make appropriate risk-adjusted decisions.

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA The Risk IT Framework

‘Risk IT Practitioner Guide’ – managing risk in practice

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Risk IT practitioner guide

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA suppemental tools and materials — The Risk IT Practitioner Guide, is supported by an implementation tool kit, containing the following templates: − Enterprise IT Risk Assessment Form (figure 7) − Risk Communication Flows (figure 14) − Template Risk Register Entry (figure 36) − Generic IT Risk Scenarios (figure 40) − Generic IT Risk Scenarios and Mapped to COBIT and Val IT Processes (figure 41) − Generic IT Risk Scenarios and Environmental Risk Factors (figure 42) − COBIT Controls and Val IT Key Management Practices to Mitigate IT Risk (figure 48)

risk governance 16

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk governance

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA business – enterprise risk management (ERM) — Enterprise risk management (ERM) includes the methods and processes used by organizations to manage risks and seize opportunities related to the achievement of their objectives. — ERM provides a framework for risk management — By identifying and proactively addressing risks and opportunities, business enterprises protect and create value — ERM can also be described as a risk-based approach to managing an enterprise

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA the definition of it risk — IT risk is the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise. — IT risk consists of IT-related events that could potentially impact the business. — IT risk always exists, whether or not it is detected or recognised by an organisation

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA it related business risk

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA it risk in the risk hierarchy

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA essentials of risk governance — Risk Appetite and Tolerance — Responsibilities and accountability for IT Risk Management — Awareness and Communication — Risk Culture

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk appetite and tolerance - definition — Risk appetite The broad-based amount of risk a company or other entity is willing to accepts in pursuit of its mission (or vision) — Risk tolerance The acceptable variation relative to the achievement of an objective (and often is best measured in the same units as those used to measure the related objective)

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk appetite — Risk appetite is the amount of risk an entity is prepared to accept when trying to achieve its objectives. When considering the risk appetite levels for the enterprise, two major factors are important: — The enterprise‘s objective capacity to absorb loss — The culture towards risk taking – cautious or aggressive

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk appetite - examples

Virtualization and the Cloud - The Death of ITIL? Or the Opportunity of a Lifetime? Copyright © 2010 CA Blog: risk tolerance Risk tolerance is the tolerable deviation from the level set by the risk appetite definition, e.g., standards require projects to be completed within the estimated budgets and time, but overruns of 10 percent of budget or 20 percent of time are tolerated.

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA responsibilities and accountability for it risk managment

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA awareness and communication benefits — Executive management‘s understand the actual exposure to IT risk, enabling definition of appropriate and informed risk responses — Awareness amongst all internal stakeholders of the importance of integrating risk and opportunity in their daily duties — Transparency to external stakeholders regarding the actual level of risk managment processes in use

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Implications of poor communications — False sense of confidence at the top on the degree of actual exposure related to IT — Unbalanced communication to the external world on risk, especially in cases of high but managed risk, may lead to an incorrect perception on actual risk by third parties such as clients, investors or regulators — Perception that the enterprise is trying to cover up known risk from stakeholders

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA what to communicate

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Risk Culture

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Risk Evaluation

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA business impact

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA it risk scenario development

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk factors

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk scenarios

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA example scenario list

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk evaluation

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA key risk indicators (KRIs) 39

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk response options 40

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk response options and influences 41

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA parameter for risk response selection 42

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk response prioritisation 43

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA risk response & prioritisation 44

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Risk and Opportunity 45

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA CobiT, Val IT & Risk IT 46

summary

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA summary — Risk IT saves time, cost and effort by providing a clear method to focus on IT-related business risks — Risk IT provides the guidance to help executives and management ask the key questions — Risk IT allows organizations to make better risk-adjusted decisions — Risk IT allows organizations to manage their enterprises risk is managed more effectively

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA summary — Risk and value are two sides of the same coin — Risk is inherent to all enterprises — Balance must be struck that avoids value destruction and ensures that opportunities for value creation are not missed

Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Copyright © 2010 CA Thank you Contact details: Robert E Stroud CGEIT Tel:(631) BLOG: Twitter: 50

WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Robert E Stroud CGEIT VP Service Management & Governance, CA Technologies International Vice President, ISACA