Chapter 19 19-1 © 2012 Pearson Education, Inc. Publishing as Prentice Hall.

Slides:



Advertisements
Similar presentations
ETHICS AS CULTURE KEY ELEMENTS Stage One (primary) – Key Elements of a Culture of Ethics Appoint an ethics program manager to oversee your ethics-related.
Advertisements

1 K P M G L L P A D V I S O R Y Changes in the IT Audit Profession Stephen G. Hasty, Jr. National Partner in Charge IT Advisory Savannah, GA January 4,
Auditing Governance Functions
Lisanne Sison Director ERM Bickmore
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Introduction to Enterprise Risk Management (ERM)
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Integrated Marketing Communications Chapter Copyright © 2010 Pearson Education, Inc. publishing as Prentice Hall.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
IT Governance: Simultaneously Empowers and Controls Source: IT Governance, Chapter 1.
Copyright ©2013 Pearson Education, Inc. publishing as Prentice Hall
Developing a Business Mindset
Copyright ©2013 Pearson Education, Inc. publishing as Prentice Hall
Business Ethics/ Social Responsibility/ Environmental Sustainability
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Information Systems Controls for System Reliability -Information Security-
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Technology Audit
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Continual Service Improvement Process
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright 2004 Prentice Hall1 Inside Stakeholders  Shareholders – the owners of the organization  Managers – the employees who are responsible for coordinating.
Chapter 1: Marketing Planning: New Urgency, New Possibilities
GRC - Governance, Risk MANAGEMENT, and Compliance
Roles and Responsibilities
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
PowerPoint presentation to accompany Chopra and Meindl Supply Chain Management, 5e 1-1 Copyright ©2013 Pearson Education, Inc. publishing as Prentice Hall.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Hartley, Project Management: Integrating Strategy, Operations and Change, 3e Tilde Publishing Chapter 10 Risk Management Proactively managing the positive.
Risk Issues for the Board Presented By: Dr. Cesar G. Saldaña, Ph. D. Founding Fellow, ICD.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2001 Change Function Ltd USER ACCEPTANCE TESTING Is user acceptance testing of technology and / or processes a task within the project? If ‘Yes’: Will.
Copyright © Houghton Mifflin Company. All rights reserved.
RISK MANAGEMENT : JOURNEY OR DESTINATION ?. What is Risk? “ Any uncertain event that could significantly enhance or impede a Company’s ability to achieve.
Public Affairs Management
NEACS: CRO Perspective William Feher Vice President, Internal Audit and Chief Risk Officer October 27, 2015.
An Update of COSO’s Internal Control–Integrated Framework
Kathy Corbiere Service Delivery and Performance Commission
0 ©2015 U.S. Education Delivery Institute While there is no prescribed format for a good delivery plan, it should answer 10 questions What a good delivery.
1 Pertemuan 22 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2015 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
FROM PRINCIPLE TO PRACTICE: Implementing the Principles for Digital Development Perspectives and Recommendations from the Practitioner Community.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Service Design.
The IT Budgeting Process
Copyright © Houghton Mifflin Company. All rights reserved.MGT437
Building Better IT Leaders from the Bottom Up
Building a Strong Relationship with the Business
Business Ethics/ Social Responsibility/ Environmental Sustainability
Vitol’s Compliance systems against bribery and corruption
Section 8.3 The Law of Cosines
Presentation transcript:

Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Historical view – it was a low-key activity focused on delivering projects and keeping applications up and running. Today’s view – it has become much broader and complex, and it is recognized as an integral part of any technology- based work. 19-2

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Harm constituencies both within and outside companies. Damage corporate reputations. Dampens an organization’s ability to compete. 19-3

© 2012 Pearson Education, Inc. Publishing as Prentice Hall 19-4 Legal/HazardsThird RegulatoryParties External Risk Operations Information Systems Development People Controls Processes Culture Governance Internal Risk ENTERPRISE RISK

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Third parties (i.e., partners, software vendors, service providers, suppliers, customers). Hazards (i.e., disasters, pandemics, geopolitical upheavals). Legal and regulatory issues (i.e., failure to adhere to the laws and regulations). 19-5

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Information risks (i.e., privacy, quality, accuracy, and protection). People risks (i.e., poorly designed business process, failure to adapt business processes). Cultural risks (i.e., risk aversion and lack or risk awareness). Control (i.e., ineffective controls). Governance (i.e., ineffective structure, roles). 19-6

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Viruses Hackers Organized crime Industrial spies Terrorists 19-7

© 2012 Pearson Education, Inc. Publishing as Prentice Hall 1. Focus on what’s important : RM is not about anticipating all risks but about attempting to reduce significant risks to a manageable level (Austing and Darby 2003). RM should not be about saying “no” to a risk, but how to say “yes” – thereby building a more agile enterprise (Caldwell and Mogul 2006). 19-8

© 2012 Pearson Education, Inc. Publishing as Prentice Hall 2. Expect the image to change over time: RM actions should be continuous, iterative, and structured. Mandatory risk assessment should be implemented at different key stages. Ongoing reviews and process of evaluation need to be adapted (Coles and Moulton 2003). 19-9

© 2012 Pearson Education, Inc. Publishing as Prentice Hall 3. View risk from multiple levels and perspectives: RM assessments need to include root cause and multifaceted analyses. Organizations need to assess risk trends and develop strategies for dealing with them

© 2012 Pearson Education, Inc. Publishing as Prentice Hall The goal of a risk management framework (RMF) is to ensure that the right risks are being addresses at the right levels. The RMF guides the development of risk policies and integrates appropriate risk standards and processes into existing practices (e.g., the SDLC).

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Risk category Policies and standards Risk type Risk ownership Risk mitigation Risk reporting and monitoring

© 2012 Pearson Education, Inc. Publishing as Prentice Hall The general area of enterprise risk involved (e.g., criminal, operations, third party, etc.).

© 2012 Pearson Education, Inc. Publishing as Prentice Hall It includes the general principles for guiding risk decisions. The principles identify any standards that should apply to each risk category (i.e., SAI Global is an international standard).

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Each risk should be identified and labeled with a generic name and definition, ideally linked to a business impact.

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Each type of risk should have an owner, either in IT or in the business. Owners and stakeholders should have clear responsibilities and accountabilities. Major risks can be owned by committees (i.e., enterprise risk committee or risk review council).

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Each type of risk should be associated with controls, practices, and tools for addressing it effectively. The goal of the framework is to provide means by which risks can be managed consistently, effectively, and appropriately.

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Risk metrics should be reported in a way the organization understands (e.g., high, medium, low). Risk monitoring is an ongoing process because levels and types of risks are changing continually.

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Look beyond technical risk Develop a common language of risk Simplify the presentation Right size Standardize the technology base Rehearse Clarify roles and responsibilities Automate where appropriate Educate and communicate

© 2012 Pearson Education, Inc. Publishing as Prentice Hall IT risk is involved in many types of business risks and therefore should be managed holistically. An integrated risk management framework helps organizations understand risk and make better decisions associated with it

© 2012 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2012 Pearson Education, Inc. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall