SlideShare ist ein Scribd-Unternehmen logo
1 von 31
I.T. Strategy, Risk
Management & Governance
Steve Howse, C.Dir.
President, Millington & Associates Inc.
steve@millington.ca
President, Millington & Associates Inc.
• Facilitator, Strategist, Communications & PR, I.T.
Assessments & Risk Mitigation, Governance
• 16 years Corporate Leadership
Forum Chair, MacKay CEO Forums
• The CEO peer learning group partnered with Canada’s Best
Managed Companies.
Adjunct Professor,
• DeGroote School of Business, McMaster University
- Strategy, B2B Marketing, International Business
• Executive Education
- Sales Leadership, Strategic Planning, Crisis Management
• The Director’s College
- IT Strategy, Corporate Reputation Management
Professional Speaker
• Conferences, Corporate Events, Sales Rallies
Board Appointments
Numerous For Profit and NFP Boards
What is IT Strategy &
Governance
• Assure IT assets are leveraged effectively
• Understand the risk & rewards, therefore making informed
choices
• Understand IT capacity & capability and assess alignment
with organizational goals and objectives
• Appropriate exposure and discussion at the board level
• Measurement and course correction
June 12, 2015
• Cyber attacks raid small firms too: City's NoMoreClipboard a victim
• Store your medical records in one place online, be able to update them from your
own home when needed and, more importantly, be able to share them with a
physician or other health care group before you get to a doctor’s office or
emergency room.
• But what happened last month to the NoMoreClipboard network – as well as the
network for the Fort Wayne medical software company behind it – is also the
latest in a growing trend plaguing the health care industry as a whole:
• They were hacked.
• People’s names, addresses, dates of birth and Social Security numbers as well
as other information were all vulnerable for nearly three weeks in May until
officials with Medical Informatics Engineering – the parent company of
NoMoreClipboard – discovered the hack.
Why is IT Governance Important?
• Target: Credit Card information
– Target spent $61 million through Feb. 1 responding to the
breach, according to its fourth-quarter report to investors.
– Target’s profit for the holiday shopping period fell 46 percent
• Others in 2014: K-Mart; Home Depot, Dairy Queen & Goodwill
• Bell Mobility - Billing
• TJX (Winners / HomeSense) hacker stole client info including
credit cards
TJX
• What are the key learnings?
• What could have been done differently?
Carol Meyrowitz, President and Chief Executive Officer
of The TJX Companies, stated:
"From the inception of our Company, our customers have
always come first. We deeply regret any inconvenience
our customers may have experienced as a result of the
criminal attack on our computer system”.
• Estimated costs to TJX related to this settlement were
reflected as part of the $107 million (after tax) reserve
for estimated potential losses…
• Future non-cash charges of $21 million (after tax)
anticipated to be taken in fiscal 2009.
May 8, 2013: Nearly 70% of
Canadian businesses hit by cyber
attacks, says year-long survey
• Over a one-year period, 69 per cent of Canadian businesses said
they experienced some type of cyber attack
• Dubbed the Study of the Impact of Cyber Crime on Businesses in
Canada, the survey followed 520 small, medium and large
Canadian businesses over the course of one year and tracked how
their bottom line was affected by cyber crime.
• "About a quarter (26 per cent) of those interviewed say that attacks
had a considerable impact on their business both in terms of
financial loss and reputational damage with financial fraud being
the biggest threat," the report states.
Take A Moment – Once
Around The Room
• List 3 concerns you have about IT
strategy & Risk
1.
2.
3.
Areas to Address
Strategic Issues
1. Strategy and
Planning
2. Technology Trends
3. Performance
4. Personnel
Internal Control
Issues
5. Governance
Risk Issues
6. Risk and Controls
7. Personal Information
and Privacy
8. E- Business
9. Availability
10. Legal Issues
The Bart Study
• The questions are a
good idea
• Those who use them
have higher performance
• Some questions are
over-asked
• Only 40ish percent use
them
• Everyone uses them
after a problem
Going to the Gym
• Everyone believes exercise
is a good idea
• Exercise leads to physical
and mental wellness
• Doing one exercise over
and over will have little
result
• Most people can’t find the
time to go
• Everyone takes care of
their health after a scare
Bring the 20 questions to meetings – process makes you SMART
Strategic Issues
I Strategy & Planning
1. Does management have:
– A plan that is monitored and updated
– Link to annual and long term budget
– Basis for project prioritization
II Technology Trends
2. Does management have:
– Procedures to investigate trends
– Assess them in efforts to better position the company
Strategic cont’d
III Performance
3. Does the IT department have
– Key Performance Indicators in place
– Monitored & benchmarked to industry standards
4. Is the same same in place for 3rd
Party Providers
Annual report cards, penalty clauses
IV Personnel
5-6. Has management processes:
– Identified required skills
– Attract, develop and retain key personnel
Internal Control Issues
V Governance
7. Has the Board:
– Created an IT subcommittee (OR)
– Assigned 1 member
- Investment in, processes & use of IT
7. Has Management:
– Assigned IT corp. governance to sufficient senior
management
– Communicated IT policies to personnel
7. What compliance policies are in place
– SOX, CSA
Risk Issues
VI Risk & Controls
10. Does risk assessment occur for:
– Internal systems and processes
– Outsourced services & third party communications
– Any other services
– HOW ARE THE RESULTS ACTED UPON
10. How does management ensure data integrity in regard to:
1. Relevance, completeness, accuracy & timeliness
2. Appropriate use
• How often are systems audited for
– Risk mitigation
– Controls in place for major business processes
How big is your dog?
Lets take a deeper look into Risk
Management at the board level
Risk cont’d
VII Personal Information Privacy
13. An individual assigned to Privacy:
– Policy, legislation and compliance
14. Identify and comply with legislation in regard to
protecting personal information
VIII E-Business
15. Review of risks and controls for E-Biz transactions
16. What protection (internal & external) is in place to
protect against financial loss or embarrassment
Risk cont’d
IX Availability
17. What availability policies are in place for systems and data
18. Does the organization understand
– The impact of service interruptions
– The need for business continuance / disaster recovery
– If Business Continuance (BCP) are tested and improved
regularly
X Legal Issues
19. Has management considered and addresses:
– Software, hardware, service agreements & copyright laws
20. Has the above policies been disseminated to all personnel
Top Risks of 2014
• Overreliance on one security monitoring software:
• Technology innovations that outpace security:
• Outdated operating systems:
• Lack of encryption:
• Data on user-owned mobile devices:
• Lack of management support:
• Challenges recruiting and retaining qualified IT staff
• Segregation of duties
What we can do?
• The Millington Way – be vulnerable
Be open about what you don’t understand
• Bring the 20 question books with you to board
meetings
Submit the 20 questions as an agenda item
Assign to committee for a report/assessment based
on 20 questions
Review the report by committee (audit/risk)
Submit report to board for approval
Add to Internal Audit reporting process
• Dedicate 1 Board member or form an IT Committee or a Risk
Committee
Qualifications: Work for a Tech company; former CIO, Risk
Expert, sits on other boards
• Ensure the CTO / CIO reports to the CEO and not the CFO
–Not a budget controlled area
–CEO needs a strong understanding
• Invite the CTO to joint strategy sessions
–Ask for a risk assessment of strategic plan
• Benchmark the IT knowledge of the Board as it relates to the
company
–As it relates to your industry
• Ensure Business Continuance plans are in place and
tested regularly
Including a Crisis Communications Plan
• Ensure Internal Audit measures IT
Both internal and external systems
Consider a Chief Risk Officer
• Complete an assessment of your vulnerabilities
The board can hire a firm to attack the system
Questions & Discussions?
Steve Howse
Millington & Associates
steve@millington.ca
416-452-4813
Areas to Address – The 20 Questions
Strategic Issues
1. Strategy and Planning
2. Technology trends
3. Performance
4. Personnel
Internal Control Issues
5. Governance
Risk Issues
6. Risk and Controls
7. Personal Information
and Privacy
8. E- Business
9. Availability
10. Legal Issues

Weitere ähnliche Inhalte

Was ist angesagt?

FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security RisksHeimdal Security
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderCSI Solutions
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityKevin Duffey
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesAlex Rudie
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesTripwire
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityShareDocView.com
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?PECB
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 

Was ist angesagt? (20)

FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services Provider
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 

Andere mochten auch

Why Ireland for Cyber Security - Presentation
Why Ireland for Cyber Security - Presentation Why Ireland for Cyber Security - Presentation
Why Ireland for Cyber Security - Presentation IDA-Ireland
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionTripwire
 
IT Optimization & Risk Management
IT Optimization & Risk ManagementIT Optimization & Risk Management
IT Optimization & Risk ManagementJeromie Jackson
 
Lpg reticulated gas system (cylinder bank) digital energy
Lpg reticulated gas system (cylinder bank) digital energyLpg reticulated gas system (cylinder bank) digital energy
Lpg reticulated gas system (cylinder bank) digital energyAbu Bakar Siddiqui
 
Prepayment Metering System
Prepayment Metering SystemPrepayment Metering System
Prepayment Metering Systemkmhasanc
 
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSGSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSSRINIVAS REDDY
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Andere mochten auch (15)

Why Ireland for Cyber Security - Presentation
Why Ireland for Cyber Security - Presentation Why Ireland for Cyber Security - Presentation
Why Ireland for Cyber Security - Presentation
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
 
Meter data
Meter dataMeter data
Meter data
 
CISSPills #3.03
CISSPills #3.03CISSPills #3.03
CISSPills #3.03
 
IT Optimization & Risk Management
IT Optimization & Risk ManagementIT Optimization & Risk Management
IT Optimization & Risk Management
 
Meter sets
Meter setsMeter sets
Meter sets
 
Lpg reticulated gas system (cylinder bank) digital energy
Lpg reticulated gas system (cylinder bank) digital energyLpg reticulated gas system (cylinder bank) digital energy
Lpg reticulated gas system (cylinder bank) digital energy
 
Prepayment Metering System
Prepayment Metering SystemPrepayment Metering System
Prepayment Metering System
 
Cybersecurity - NSA Style
Cybersecurity - NSA StyleCybersecurity - NSA Style
Cybersecurity - NSA Style
 
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSGSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ähnlich wie Role of The Board In IT Governance & Cyber Security-Steve Howse

[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
Item46763
Item46763Item46763
Item46763madunix
 
IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014ArmeniaFED
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008ssusera19f45
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
Executive's Handbook on IT Strategy and Governance
Executive's Handbook on IT Strategy and GovernanceExecutive's Handbook on IT Strategy and Governance
Executive's Handbook on IT Strategy and GovernanceKuda Musundire CA (Z), RPA
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challengeFERMA
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsJim Merrifield, IGP, CIP
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir FancySaskSummit
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxanthonywanjohi5
 
Setting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeSetting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeCloud Watchmen Inc.
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptxjamiejohngianna
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 

Ähnlich wie Role of The Board In IT Governance & Cyber Security-Steve Howse (20)

[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Item46763
Item46763Item46763
Item46763
 
IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Executive's Handbook on IT Strategy and Governance
Executive's Handbook on IT Strategy and GovernanceExecutive's Handbook on IT Strategy and Governance
Executive's Handbook on IT Strategy and Governance
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
IT Governances
IT GovernancesIT Governances
IT Governances
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir Fancy
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptx
 
Setting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeSetting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance Office
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 

Kürzlich hochgeladen

Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 

Kürzlich hochgeladen (20)

Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

Role of The Board In IT Governance & Cyber Security-Steve Howse

  • 1. I.T. Strategy, Risk Management & Governance Steve Howse, C.Dir. President, Millington & Associates Inc. steve@millington.ca
  • 2. President, Millington & Associates Inc. • Facilitator, Strategist, Communications & PR, I.T. Assessments & Risk Mitigation, Governance • 16 years Corporate Leadership Forum Chair, MacKay CEO Forums • The CEO peer learning group partnered with Canada’s Best Managed Companies. Adjunct Professor, • DeGroote School of Business, McMaster University - Strategy, B2B Marketing, International Business • Executive Education - Sales Leadership, Strategic Planning, Crisis Management • The Director’s College - IT Strategy, Corporate Reputation Management Professional Speaker • Conferences, Corporate Events, Sales Rallies Board Appointments Numerous For Profit and NFP Boards
  • 3. What is IT Strategy & Governance • Assure IT assets are leveraged effectively • Understand the risk & rewards, therefore making informed choices • Understand IT capacity & capability and assess alignment with organizational goals and objectives • Appropriate exposure and discussion at the board level • Measurement and course correction
  • 4. June 12, 2015 • Cyber attacks raid small firms too: City's NoMoreClipboard a victim • Store your medical records in one place online, be able to update them from your own home when needed and, more importantly, be able to share them with a physician or other health care group before you get to a doctor’s office or emergency room. • But what happened last month to the NoMoreClipboard network – as well as the network for the Fort Wayne medical software company behind it – is also the latest in a growing trend plaguing the health care industry as a whole: • They were hacked. • People’s names, addresses, dates of birth and Social Security numbers as well as other information were all vulnerable for nearly three weeks in May until officials with Medical Informatics Engineering – the parent company of NoMoreClipboard – discovered the hack.
  • 5. Why is IT Governance Important? • Target: Credit Card information – Target spent $61 million through Feb. 1 responding to the breach, according to its fourth-quarter report to investors. – Target’s profit for the holiday shopping period fell 46 percent • Others in 2014: K-Mart; Home Depot, Dairy Queen & Goodwill • Bell Mobility - Billing • TJX (Winners / HomeSense) hacker stole client info including credit cards
  • 6. TJX • What are the key learnings? • What could have been done differently?
  • 7. Carol Meyrowitz, President and Chief Executive Officer of The TJX Companies, stated: "From the inception of our Company, our customers have always come first. We deeply regret any inconvenience our customers may have experienced as a result of the criminal attack on our computer system”.
  • 8. • Estimated costs to TJX related to this settlement were reflected as part of the $107 million (after tax) reserve for estimated potential losses… • Future non-cash charges of $21 million (after tax) anticipated to be taken in fiscal 2009.
  • 9. May 8, 2013: Nearly 70% of Canadian businesses hit by cyber attacks, says year-long survey • Over a one-year period, 69 per cent of Canadian businesses said they experienced some type of cyber attack • Dubbed the Study of the Impact of Cyber Crime on Businesses in Canada, the survey followed 520 small, medium and large Canadian businesses over the course of one year and tracked how their bottom line was affected by cyber crime. • "About a quarter (26 per cent) of those interviewed say that attacks had a considerable impact on their business both in terms of financial loss and reputational damage with financial fraud being the biggest threat," the report states.
  • 10. Take A Moment – Once Around The Room • List 3 concerns you have about IT strategy & Risk 1. 2. 3.
  • 11. Areas to Address Strategic Issues 1. Strategy and Planning 2. Technology Trends 3. Performance 4. Personnel Internal Control Issues 5. Governance Risk Issues 6. Risk and Controls 7. Personal Information and Privacy 8. E- Business 9. Availability 10. Legal Issues
  • 12. The Bart Study • The questions are a good idea • Those who use them have higher performance • Some questions are over-asked • Only 40ish percent use them • Everyone uses them after a problem Going to the Gym • Everyone believes exercise is a good idea • Exercise leads to physical and mental wellness • Doing one exercise over and over will have little result • Most people can’t find the time to go • Everyone takes care of their health after a scare Bring the 20 questions to meetings – process makes you SMART
  • 13. Strategic Issues I Strategy & Planning 1. Does management have: – A plan that is monitored and updated – Link to annual and long term budget – Basis for project prioritization II Technology Trends 2. Does management have: – Procedures to investigate trends – Assess them in efforts to better position the company
  • 14. Strategic cont’d III Performance 3. Does the IT department have – Key Performance Indicators in place – Monitored & benchmarked to industry standards 4. Is the same same in place for 3rd Party Providers Annual report cards, penalty clauses IV Personnel 5-6. Has management processes: – Identified required skills – Attract, develop and retain key personnel
  • 15. Internal Control Issues V Governance 7. Has the Board: – Created an IT subcommittee (OR) – Assigned 1 member - Investment in, processes & use of IT 7. Has Management: – Assigned IT corp. governance to sufficient senior management – Communicated IT policies to personnel 7. What compliance policies are in place – SOX, CSA
  • 16. Risk Issues VI Risk & Controls 10. Does risk assessment occur for: – Internal systems and processes – Outsourced services & third party communications – Any other services – HOW ARE THE RESULTS ACTED UPON 10. How does management ensure data integrity in regard to: 1. Relevance, completeness, accuracy & timeliness 2. Appropriate use • How often are systems audited for – Risk mitigation – Controls in place for major business processes
  • 17. How big is your dog?
  • 18. Lets take a deeper look into Risk Management at the board level
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Risk cont’d VII Personal Information Privacy 13. An individual assigned to Privacy: – Policy, legislation and compliance 14. Identify and comply with legislation in regard to protecting personal information VIII E-Business 15. Review of risks and controls for E-Biz transactions 16. What protection (internal & external) is in place to protect against financial loss or embarrassment
  • 25. Risk cont’d IX Availability 17. What availability policies are in place for systems and data 18. Does the organization understand – The impact of service interruptions – The need for business continuance / disaster recovery – If Business Continuance (BCP) are tested and improved regularly X Legal Issues 19. Has management considered and addresses: – Software, hardware, service agreements & copyright laws 20. Has the above policies been disseminated to all personnel
  • 26. Top Risks of 2014 • Overreliance on one security monitoring software: • Technology innovations that outpace security: • Outdated operating systems: • Lack of encryption: • Data on user-owned mobile devices: • Lack of management support: • Challenges recruiting and retaining qualified IT staff • Segregation of duties
  • 27. What we can do? • The Millington Way – be vulnerable Be open about what you don’t understand • Bring the 20 question books with you to board meetings Submit the 20 questions as an agenda item Assign to committee for a report/assessment based on 20 questions Review the report by committee (audit/risk) Submit report to board for approval Add to Internal Audit reporting process
  • 28. • Dedicate 1 Board member or form an IT Committee or a Risk Committee Qualifications: Work for a Tech company; former CIO, Risk Expert, sits on other boards • Ensure the CTO / CIO reports to the CEO and not the CFO –Not a budget controlled area –CEO needs a strong understanding • Invite the CTO to joint strategy sessions –Ask for a risk assessment of strategic plan • Benchmark the IT knowledge of the Board as it relates to the company –As it relates to your industry
  • 29. • Ensure Business Continuance plans are in place and tested regularly Including a Crisis Communications Plan • Ensure Internal Audit measures IT Both internal and external systems Consider a Chief Risk Officer • Complete an assessment of your vulnerabilities The board can hire a firm to attack the system
  • 30. Questions & Discussions? Steve Howse Millington & Associates steve@millington.ca 416-452-4813
  • 31. Areas to Address – The 20 Questions Strategic Issues 1. Strategy and Planning 2. Technology trends 3. Performance 4. Personnel Internal Control Issues 5. Governance Risk Issues 6. Risk and Controls 7. Personal Information and Privacy 8. E- Business 9. Availability 10. Legal Issues

Hinweis der Redaktion

  1. Meet Stupid Steve
  2. Nov – Credentials of an AC contractor Pick any industry and you will be able to Google an attack
  3. On the website for 2-years
  4. Can you think of an industry not effected by I.T.
  5. IT effects: accounting, inventory management, resource planning, marketing etc - it effects each department Boards by their nature will take a longer view than the exec team (bart study)
  6. The BART Study vs Going to the Gym
  7. We are hear to ask questions
  8. The board will get a presentation on the savings of outsourcing - The Bell story Bell – 2004, 2005, 97,000 vs. 37,000 = 30M year/yr in revenue – final nail in Sabia
  9. IT Sub committee is a component of Audit (why _ internal audit is key) Who does the CIO report to???? Courier - Patriot act
  10. Any major IT Budget cuts???
  11. Criminals look for an easy house in the neighborhood How big is your dog compared to others in the industry Do an assessment – sleep at night
  12. RIM _ How did it effect you The BB story – sales guy SOCIAL MEDIA - Millenials
  13. Airline Reservation system– JUST ASK QUESTIONS Explain it to them Have then sign it back
  14. Submit the 20 questions as an agenda item Assign to committee for a report/assessment based on 20 questions Review the report by committee (audit/risk) Submit report to board for approval Add to Internal Audit reporting process
  15. Final thought _ Maple Leaf food Exists today because regularly asked the question, can our product damage our customers Can we show we have taken reasonable efforts to protect our stakeholders Are we prepared to handle the message My question to you - what is your meat slicer in your IT department Normally I stay for lunch