IMFO Annual Conference – 2015 S21: Good Governance & Oversight B2B.

Slides:



Advertisements
Similar presentations
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Advertisements

PFIZER BT DIVISION. Pfizer Ltd. Şti. - Pharmaceuticals Company History –1849 Charles Pfizer & Charles Erhart –1942 Penisilin Production –1957 Pfizer Turkey.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
Information Security Policies and Standards
Sage Evolution ERP IMFO Conference Expenditure Management
Institute of Municipal Finance Officers & Related Professions
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Factors to be taken into account when designing ICT Security Policies
Payment Card Industry (PCI) Data Security Standard
ITIL: Why Your IT Organization Should Care Service Support
Session 3 – Information Security Policies
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Chapter Three IT Risks and Controls.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Methodology for Information Strategy Planning for ERP By : Saleh A. Motawe Supervisor : Yassmen El bobo.
Chapter 6 of the Executive Guide manual Technology.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Information Systems Security Operational Control for Information Security.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
H UMAN R ESOURCES M ANAGEMENT Beki Webster Director, HR, Intelligence Systems Division Northrop Grumman Information Systems July 31, 2009.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Information Assurance Policy Tim Shimeall
Advanced Accounting Information Systems Day 20 Control and Security Frameworks October 9, 2009.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Appendix C: Designing an Operations Framework to Manage Security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
Advanced Accounting Information Systems Day 19 Control and Security Frameworks October 7, 2009.
Frontline Enterprise Security
Page 1 APAC ANNUAL TRAINING 2011 “Integration of specialist skills into AGSA regularity audits for greater oversight impact” 2- 3 Aug 2011 Presenter: Ms.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson National Accelerator Facility Mike Memory.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
PROGRESS ON THE IMPLEMENTATION OF AUDIT RECOMMENDATIONS FOR 2014/15: INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) 1 Briefing presentation to the Portfolio.
Subjects of the presentation:  Microsoft Business Solutions–Navision – integrated business solutions  Navision architecture  Product highlights  Security.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Managed IT Services JND Consulting Group LLC
Accounting Guru Cloud ERP (Enterprise Resource Planning) ERP Software https:
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Scales Technology FZCO
Finance & Accounting FIRM
Review of IT General Controls
Wholesale Distributors Campaign Briefing
Working at a Small-to-Medium Business or ISP – Chapter 8
Discovering Computers 2010: Living in a Digital World Chapter 14
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
I have many checklists: how do I get started with cyber security?
12 STEPS TO A GDPR AWARE NETWORK
Contact Center Security Strategies
Information Security Awareness
IS4680 Security Auditing for Compliance
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Presentation transcript:

IMFO Annual Conference – 2015 S21: Good Governance & Oversight B2B

Sage Evolution Info Share – Market Segmentation

Sage Evolution Info Share – Number of Sites South African and International sites 9,408 Total number of sites 67,732 Total number of users …and counting! DestinationSites International 4,795 South Africa 4,613

Sage Evolution At SAGE, we believe that Good Governance is about strong leadership mitigating risks through:- Embracing Corporate Discipline Respecting the Statutes Deploying Enabling Systems and Business Processes Empowering People Good Governance Defined

Sage Evolution IT Governance is informed by:- Corporate Governance of Information and Communication Technology Policy Framework (CGICTPF) adopted by Cabinet King III ISO COBIT 5 IT Governance

Sage Evolution COBIT 5 - Control Objectives for Information and Related Technology

Sage Evolution AGSA Focus - Security Management IT security is managed at the highest organizational level (CIO) Strong password controls to authenticate system access, minimum character length, alpha numeric, encrypted, forced change of password Firewalls & routers are configured correctly within the network environment Patch management processes to prevent exploitation of vulnerabilities Antivirus software is implemented across the organisation System configurations need to ensure that security vulnerabilities and incidents are detected, monitored, reported and resolved on a regular basis Activities within the system network including databases are tracked, using audit trails and reviewed on a regular basis by someone independent of administration functions and in a senior position

Sage Evolution AGSA Focus - User Access Management Formally documented and approved user account management standards and procedures are in place Formal access request for registering users, changing of access rights, password resets and termination of access rights is approved by management The number of users with administrator privileges that can perform all functions pertaining to user account management is minimised Activities of system administrators are monitored by an independent person, in a senior position Periodic reviews of employee access rights and privileges to ensure it is in line with their job responsibilities are performed

Sage Evolution AGSA Focus - IT Service Continuity The IT continuity and disaster recovery plans have been incorporated into the organisational business continuity plan. The IT continuity plan and DRP has been distributed, updated and tested and is also stored at an offsite location An IT backup and retention strategy has been implemented Backup procedures for data and programs exist and are performed according to above strategy Backups are stored in a secure offsite storage facility Physical access and environmental controls over the offsite storage facility are implemented

Sage Evolution Product Stack – Municipal Solutions Project Tracking Sales & Purchase Orders Inventory Management CashBook Receivables General Ledger/Budgets/ Financials General Ledger/Budgets/ Financials Payables Branch Accounting Bank Manager Cash Manager Multi Currency Credit Control Fixed Assets Management Fixed Assets Management Customer Consolidation Annuity Billing Annuity Billing Job Costing Serial Numbers Manufacturing Supply Chain Management Supply Chain Management Cutomer Relationship Management Point of Sale Payroll & Human Resources Pricing Matrix Inventory Advisor Inventory Advisor Multi - Warehousing Lot Tracking Sage Intelligence Reporting Centre Cloud Solutions Software Development Kit Mobility Municipal Billing mSCOA Governance

Conclusion – Thank You!