1 Into-. 2 What is IntoSAINT? Intosai Self Assessment INTegrity vulnerabilities Integrity controls.

Slides:



Advertisements
Similar presentations
Organizational Governance
Advertisements

STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
Strengthening Foundations
Ensuring Effective Monitoring, Certification and Verification of Emissions by Jed Jones Lloyd’s Register.
The Role of the Auditor General Colin Murphy Auditor General for Western Australia.
Auditing Concepts.
1 Regional policy The Resource BOOK of PPP case studies Second International workshop on PPP Brussels 5th July Roberto Ridolfi.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Professional Development: Problems and Perspectives Danguolė Subačienė Manager of Personnel Training Division National Audit Office of Lithuania.
Dr. Julian Lo Consulting Director ITIL v3 Expert
OMB Circular A-123 – Management’s Responsibility for Internal Control Policy Applicability Sources of Information Assessment, Documentation and Reporting.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Security Controls – What Works
The Irish standard for Energy Management – IS393
Summary Report of CSO Meeting GEF Expanded Constituency Workshop (ECW), Southern Africa 15 th July 2013 Livingstone, Zambia (
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 12-1 Chapter Twelve Auditing the Human Resource Management Process.
19 March 2008Corruption Risk Mapping1 Corruption risk mapping Towards an Integrity risk map for the Hungarian public sector.
IAIS Standards Setting Activities and the Insurance Core Principles Washington – 4 May 2004 Luc Cardinal – Member of Secretariat International Association.
The Evergreen, Background, Methodology and IT Service Management Model
Gap Analysis Public Sector Accounting and Auditing A Diagnostic Tool for Benchmarking National Standards to International Standards.
Combating Terrorism Financing 1 National Accountants Conference 2004, Kuala Lumpur “Combating Terrorism Financing” 13 October 2004 by Koid Swee Lian Financial.
Workshop on the Insurance Core Principles IV Conference on Insurance Regulation and Supervision in Latin America Punta Cana, May Makoto Okubo,
Internal controls. Session objectives Define Internal Controls To understand components of Internal Controls, control environment and types of controls.
Monitoring Internal Control Systems Johann Rieser Senior Auditor, Ministry of Finance, Vienna.
Keogh and Associates Copyright 2003 Sellers, Resellers, Integrators, Consultants What Are Their Roles?? Presenter Colin Keogh Keogh and Associates.
Page 1 Presentation to the Portfolio Committee on Tourism Fundamentals of effective Internal Control 21 July 2010.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Internal and Governmental Financial Auditing and Operational Auditing.
Grosu-Axenti Diana Financial Inspection Director Financial Inspection vs External & Internal audit in Republic of Moldova.
Prevention of Market Abuse in Germany | | Seite 1 The German Approach - Prevention of Market Abuse after Implementation of the European Market.
What do these changes mean for Agreement State Programs?
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
1 Algemene Rekenkamer | Postbus | 2500 EA Den Haag Report to CBC Steering Committee from the IntoSAINT workstream 10 September 2015, Stockholm.
HRD Audit. What is HRD? HRD is any process or activity that, either initially or over the longer- term, has the potential to develop adults work-based.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
ACCREDITATION CRITERIA CONFLICT OF INTEREST CONTENT INTEGRITY.
Office of Pipeline Safety Qualifications of Individuals: Protocol Review Integrity Management Workshop July 23-24, 2002.
Risk Identification in Practice Solange Berstein Chair IOPS Technical Committee Superintendent Pension Supervisor Chile.
AMEDA 10th meeting October PERSPECTIVES OF STICODEVAM DURING THE NEXT YEARS STICODEVAM is working on three new project 1.Safety of data exchanged.
9 december 2010Auditing integrity1 Experiences in Auditing Integrity in The Netherlands Ina de Haan Netherlands Court of Audit.
Nuclear Security Culture William Tobey Workshop on Strengthening the Culture of Nuclear Safety and Security, Sao Paulo, Brazil August 25-26, 2014.
19 March 2008Assessment workshop1 Assessment methodology.
INTOSAI WORKING GROUP ON KEY NATIONAL INDICATORS Audit on Social Protection of Vulnerable Groups Mrs Ivanka Kesyakova, SAI Bulgaria Sofia, March.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
S5: Internal controls. What is Internal Control Internal control is a process Internal control is a process Internal control is effected by people Internal.
Supporting policy development in the field of ICH in Africa CONCLUSIONS Constantine — ALGERIA 28 September to 2 October 2015.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Definition: According to E. Geister , “ Manpower planning is the process including forecasting, developing and controlling by which a firm ensures that.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Practical Use of International Standards in the Control and Auditing Activities of Federal Treasury Prague, March, 2016 Head of Internal Control (Audit)
RTI International RTI International is a trade name of Research Triangle Institute. Facilitated Self-Assessment and Action Planning: Building.
Page 1 Procurement and Probity Issues that Impact on the School Environment Presentation to the Tasmanian Schools Administrators’ Association (TSAA) Hobart.
This project has been funded with support the European Commission
Auditing Concepts.
Business Excellence Model
HUMAN RESOURCE PLANNING
Presentation to the Parliamentary Portfolio Committee on Energy
Kode Etik dan IA Standard Dr Rilla Gantino, SE., AK., MM
Unit 4: Assessments The most difficult thing in life is to know yourself.—Thales.
Project proposal for ISO 27001:2013 implementation
CBC IntoSAINT Project Group’s Progress Report 2017
Towards an Optimal Internal Control Environment
CBC IntoSAINT Project Group’s Progress Report 2017
SAIs FIGHTING CORRUPTION – INTOSAINT STRATEGY
Standards differentiation and convergence / Recommendations
The Role of the Information Security Officer Getting It Right
Session 5: Securing Home Networks Conclusions & Recommendations
Reliability Assurance Initiative (RAI) 101
CBC IntoSAINT Project Group
SECURITY AND RISK MANAGEMENT CONSULTANT
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

1 Into-

2 What is IntoSAINT? Intosai Self Assessment INTegrity vulnerabilities Integrity controls

3 Two day workshop With cross section of employees

4 Utilises knowledge and experience of employees Promotes integrity awareness !

5 Quick results Practical and applicable recommendations

6 Ownership Integrity

7 SAI leads by example Integrity in public sector

8

9 Mini-workshop

10 Assessment methodology Object definition - organisation - processes Assessment vulnerabilities Assessment Maturity level Integrity Control System Gap analysis Recommendations - Reducing vulnerability - Strengthening controls

11 Vulnerabilities Vulnerable processes exist in all government organisations Some activities and processes are inherently more vulnerable than others Some factors can make processes more vulnerable

12 Inherent vulnerabilities ElementsVulnerable areas /activities /actions Relationship of the entity with its environment Contractingprocurement, tenders, orders, assignments, awards Paymentsubsidies, benefits, allowances, grants, sponsoring Granting / Issuance permits, licenses, identity cards, authorizations, certificates Regulatingconditions of permits, setting standards / criteria Inspection / audit supervision, oversight, control, inspection, audit Enforcementprosecution, justice, sanctioning, punishment Managing public property Informationnational security, confidential information, documents, dossiers, copyright Moneytreasury, financial instruments, portfolio management, cash/bank, premiums, expenses, bonuses, allowances, etc. Goodshandling, management and consumption (stocks, computers) Real estatebuying / selling

MR Average

14 Vulnerability enhancing factors 1. Complexity 2. Change / dynamics 3. Management 4. Personnel 5. Problem history

16 Assessment maturity level Integrity Control System What is the maturity level of the integrity control system? Existence of controls Operation of controls Effectiveness of controls Object definition - organisation - processes Assessment vulnerabilities Assessment Maturity level Integrity Control System Gap analysis Recommendations - Reducing vulnerability - Strengthening controls

17 Integrity Control System

18 Maturity levels LevelCriteria 0 - The measure does not exist 1 - The measure exists - The measure is not implemented / observed 2 - The measure exists - The measure is implemented / observed - The measure is not effective 3 - The measure exists - The measure is implemented / observed - The measure is effective

19 IntoSAINT webpage