SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Integrating Internal
Controls
Save money and increase the effectiveness of internal
controls and risk management processes by
coordinating compliance, enterprise risk management,
privacy, information security, internal audit, and
financial reporting control assessment.




                                             MOSS ADAMS LLP | 1
A TALE OF INEFFICIENCY. OR: WHY WE
    CARE
     o Performs and updates an IT security risk assessment
•   Information Security Manager, Brian

     o Designs and enforces IT policies and governance processes to ensure system security
     o Tests the effectiveness of the information security management program (ISMS)

     o Deals with constant requests from 4 different “audit”, “compliance”, or “security” stakeholders
•   Network Security Engineer, Bill

     o Ignores the various risk assessments, and just does what “he thinks is right”.

     o Performs an annual risk assessment of the audit universe
•   Internal Auditor, Mary

     o Examines internal controls for design and operating effectiveness.

     o Performs a risk assessment focused on financial reporting
•   Financial Auditor, John

     o Tests the operating effectiveness of key ICOFR controls

     o Keeps up to date with changing regulations, and communicates new requirements throughout
•   Compliance Manager, Sally

         the organization
     o Maintains a compliance management system to ensure that the organization is not breaking the
         law


                                                                                           MOSS ADAMS LLP | 2
• Integrate your risk-
 WHAT CAN I DO?

  centric business
  processes
                                     Enterprise Risk Management

                                Risk Assessment           Risk Management



   o Get your colleagues
     onboard
   o Develop a Map
                                                  Assurance


   o Create touchpoints
                             Control Design and Self    Operating Effectiveness


     between departments
                                  Assessment                    Testing



   o Crosswalk controls or
     testing at key
     touchpoints
                                         Program Management
                                  Compliance             Information Security



                                                                   MOSS ADAMS LLP | 3
THE GENERIC RISK MANAGEMENT CYCLE
               Assess Risks




                                  Perform
  Implement                     Assessment
Improvements                    of Controls’
                                Design and
                                 Operation



               Report Results
                                               MOSS ADAMS LLP | 4
• Internal Auditor, Mary: “You know Brian, I noticed that you are
 WHAT DOES IT LOOK LIKE?
  looking at new multi-factor authentication technologies for our
  internet banking customers. I was thinking about doing an audit
  to examine those controls.”

• Information Security Manager, Brian: “Interesting! That would
  be great! I did a risk assessment last year, and identified that as
  a key fraud risk.”

• Mary: “Let’s start by letting me evaluate your risk assessment as
  I plan my audit.”

• Brian: “OK. Also, I map my risk assessment to ISO 27002
  controls. Do you think you could report your audit against that
  standard to help me evaluate risks more effectively?”
                                                              MOSS ADAMS LLP | 5
• The format is not critical.
 WHAT IT LOOKS LIKE (CONTINUED)


• Just keep it simple, and manageable.




                                         MOSS ADAMS LLP | 6
HOW WILL THIS IMPACT MY


• Watch out. The auditors will start to pay heed
INFORMATION SECURITY PROGRAM?


  to your risk assessments, and will start to audit
  the areas you are concerned about.




                                              MOSS ADAMS LLP | 7
HOW WILL THIS IMPACT INTERNAL

• Your internal audit program will be challenged with
AUDITS?

  new sources of information for risk assessment and
  internal controls documentation.
• There may be messy conflicts of interest to be worked
  out.
   o This is a good sign that Internal Audit is valuable within your
     organization.
• You do not need to rely only on your own judgment or a
  simple survey as the only source to identify key risks in
  the organization.
   o Don’t let this be you:
        How many Information Security pros does it take to change a light
         bulb?
        How many did it take last year?

                                                                      MOSS ADAMS LLP | 8
SHARED RISK ASSESSMENTS?


    Entity Audit Process     Audit      Dollar   Operational   Compliance    Nature/      Strategic   Last time
                             Total      Volume      Risk         Risk       Sensitivity               Audited
                            Objective
                             Score

Information Technology      4.10        4.00     4.00          5.00         4.00          4.00        3.00
– Enterprise Applications

Accounting and Billing      4.30        4.00     5.00          4.00         5.00          3.00        4.00


Facilities                  3.80        5.00     4.00          3.00         2.00          4.00        5.00




                                                                                                 MOSS ADAMS LLP | 9
SHARE A CONTROL FRAMEWORK?

    COSO
    CobIT
    ISO 27000/27002
•


    NIST 800
•


    PMBOK
•


    CMMI
•


    CIS
•


    ITIL
•


    PCI
•


    Industry-Specific Compliance
•
•


Do we pick one, or do we integrate several?
•



                                              MOSS ADAMS LLP | 10
THE COSO INTERNAL CONTROL MODEL


                                   MONITORING:
                                   throughout


                                    CONTROL
                                   ACTIVITIES:
                             processes, procedures,
                           safeguards, access security,
                                  authorization

                            RISK ASSESSMENT:
                     identify, prioritize, mitigate risks;
                                   ongoing;
                             wide participation

                       CONTROL ENVIRONMENT:
             tone at the top, infrastructure, compliance;
             culture: integrity and competence of people

                                                                                 MOSS ADAMS LLP | 11

  Adapted from Committee of Sponsoring Organizations of the Treadway Commission (COSO)
• Code of Practice for Information Security
ISO 27002

    Management
  • Divides IT Security into 11 Categories (Domains)
  • Defines key controls over specific sub-categories
  • Defines implementation guidance for each key
    control
  • 39 Control Objectives with 139 Controls
  • Control objectives are generic functional
    requirement specifications for an organization’s
    information and information system security
    management control architecture
                                               MOSS ADAMS LLP | 12
• NIST offers security guidance in many areas
NIST


 • Special Publications 800 Series
 • Useful high level governance standards and
   practices
 • Practically every IT security subject is covered
   here
 • Written for the Federal Government but very
   useful for any organization


                                               MOSS ADAMS LLP | 13
NIST




       MOSS ADAMS LLP | 14
• Value of IT, Risk, and Control
COBIT

 • Links IT service delivery to business requirements
   (already defined, right?)
 • A lifecycle; constantly adapting, improving, re-
   adapting
 • Four Responsibility Domains:
   o Plan and Organize (PO)
   o Acquire and Implement (AI)
   o Deliver and Support (DS)
   o Monitor and Evaluate (ME)
 • Make a grocery list of needs and then go shopping

                                                  MOSS ADAMS LLP | 15
• CIS Benchmarks provide guidelines for operating
CENTER FOR INTERNET SECURITY (CIS)

   systems and databases;
 • User originated, widely accepted, and reflect the
   consensus of expert users worldwide;
 • Compliance with these benchmarks will reduce
   findings and lead to more secure computing
   platforms
 • Some benchmarks include :
       Windows Server
       Solaris
   o

       Oracle
   o

       Exchange
   o
   o

                                                 MOSS ADAMS LLP | 16
• When you don’t have a good understanding of
ITIL - PROCESS MODELING


  “what right looks like”
• Models most “Industry Standard” information and
  information system technology processes
• When in doubt “check it out and test it out”
      Maps to COBIT
      Complimentary to NIST and ISO
  o

      Helps to provide a starting place
  o

      Caution - can be complicated
  o
  o


                                           MOSS ADAMS LLP | 17
CAPABILITY MATURITY


   UNRELIABLE                  INFORMAL                 STANDARDIZED                   MONITORED                OPTIMIZED



Level 1 – Unreliable     Level 2 – Informal       Level 3 –                       Level 4 – Monitored      Level 5 – Optimized
                                                  Standardized
Unpredictable            Disclosure activities                                    Standardized controls    An integrated internal
environment where        and controls are         Control activities are          with periodic testing    control framework
control activities are   designed and             designed and in place.          for effective design     with
not designed             in place.                                                and operation with       real-time monitoring
                                                  Control activities have
or in place.                                                                      reporting to             by management
                         Controls are             been documented and
                                                                                  management.              with continuous
                         not adequately           communicated to
                                                                                                           improvement
                         documented;              employees.                      Automation and tools
                                                                                                           (Enterprise-Wide Risk
                         controls mostly                                          may be used in a
                                                  Deviations from control                                  Management).
                         dependent on                                             limited way to support
                                                  activities will likely not be
                         people.                                                  control activities.
                                                  detected.
                         No formal training
                         or communication
                         of control activities.




                                                                                                               MOSS ADAMS LLP | 18
CONCLUDING ON THE FRAMEWORKS

• Don’t spend all your time mapping
• Use what works
• Focus on the ‘key’ controls for your
  organization
• Focus on the risk assessment process first




                                               MOSS ADAMS LLP | 19
WHAT SOFTWARE SHOULD I BUY?

• Microsoft Excel
• Enterprise-grade GRC software
• Online internal control and risk management
  packages




                                          MOSS ADAMS LLP | 20
CONCLUDING

• In organizations where multiple groups have
  responsibilities for enterprise risk, internal
  control, information security, compliance:
   o Team up
   o Create touch points
       Risk Assessment
       Testing
       Controls documentation
   o Use the tools, don’t let them use you

                                             MOSS ADAMS LLP | 21
THANKS




 david.dyk@mossadams.com
 503-512-0004




                           MOSS ADAMS LLP | 22

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
Manish Dixit Ceh
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 

Was ist angesagt? (20)

SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
PECB Webinar: Enterprise Risk Management with ISO 27001 perspective
PECB Webinar: Enterprise Risk Management with ISO 27001 perspectivePECB Webinar: Enterprise Risk Management with ISO 27001 perspective
PECB Webinar: Enterprise Risk Management with ISO 27001 perspective
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
 
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalThread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC Certification
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
DSS ITSEC Conference 2012 - RISK & COMPLIANCE
DSS ITSEC Conference 2012 - RISK & COMPLIANCEDSS ITSEC Conference 2012 - RISK & COMPLIANCE
DSS ITSEC Conference 2012 - RISK & COMPLIANCE
 
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber Threats5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber Threats
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Growing Pains for Human Resources
Growing Pains for Human ResourcesGrowing Pains for Human Resources
Growing Pains for Human Resources
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 

Andere mochten auch

Control Self-Assessment article
Control Self-Assessment articleControl Self-Assessment article
Control Self-Assessment article
Deepika Menon
 
internal control and control self assessment
internal control and control self assessmentinternal control and control self assessment
internal control and control self assessment
Manoj Agarwal
 
Internal control system
Internal control systemInternal control system
Internal control system
Madiha Hassan
 
Internal control system
Internal control systemInternal control system
Internal control system
Hina Varshney
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditing
Hardik Shah
 

Andere mochten auch (16)

Effective Internal Controls (Annotated) by @EricPesik
Effective Internal Controls (Annotated) by @EricPesikEffective Internal Controls (Annotated) by @EricPesik
Effective Internal Controls (Annotated) by @EricPesik
 
Internal Control
Internal ControlInternal Control
Internal Control
 
Internal Quality Audit Training 26 27 March 2013
Internal Quality Audit Training 26 27 March 2013Internal Quality Audit Training 26 27 March 2013
Internal Quality Audit Training 26 27 March 2013
 
Hanrick Curran Audit Training - Internal Controls - March 2013
Hanrick Curran Audit Training - Internal Controls - March 2013Hanrick Curran Audit Training - Internal Controls - March 2013
Hanrick Curran Audit Training - Internal Controls - March 2013
 
Control Self-Assessment article
Control Self-Assessment articleControl Self-Assessment article
Control Self-Assessment article
 
Control self assessment (csa)
Control self assessment (csa)Control self assessment (csa)
Control self assessment (csa)
 
Control Self Assessment
Control Self AssessmentControl Self Assessment
Control Self Assessment
 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self Assessment
 
internal control and control self assessment
internal control and control self assessmentinternal control and control self assessment
internal control and control self assessment
 
Internal control and internal audit presentation for bank
Internal control and internal audit  presentation for bankInternal control and internal audit  presentation for bank
Internal control and internal audit presentation for bank
 
8. internal control new
8. internal control new8. internal control new
8. internal control new
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Internal Audit COSO Framework
Internal Audit COSO FrameworkInternal Audit COSO Framework
Internal Audit COSO Framework
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditing
 
Radio Communication
Radio CommunicationRadio Communication
Radio Communication
 

Ähnlich wie Integrating Internal Controls

Rob kloots presentation_issa_spain
Rob kloots presentation_issa_spainRob kloots presentation_issa_spain
Rob kloots presentation_issa_spain
Robert Kloots
 
Iso27001 Audit Services
Iso27001   Audit ServicesIso27001   Audit Services
Iso27001 Audit Services
tschraider
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
HyTrust
 

Ähnlich wie Integrating Internal Controls (20)

Rob kloots presentation_issa_spain
Rob kloots presentation_issa_spainRob kloots presentation_issa_spain
Rob kloots presentation_issa_spain
 
Iso27001 Audit Services
Iso27001   Audit ServicesIso27001   Audit Services
Iso27001 Audit Services
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls Monitoring
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It Risk Advisory Brochure
It Risk Advisory BrochureIt Risk Advisory Brochure
It Risk Advisory Brochure
 
It Risk Advisory Brochure
It Risk Advisory BrochureIt Risk Advisory Brochure
It Risk Advisory Brochure
 
It Risk Advisory Brochure
It Risk Advisory BrochureIt Risk Advisory Brochure
It Risk Advisory Brochure
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
 
Bpo risk management
Bpo risk managementBpo risk management
Bpo risk management
 
Moss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC AuditsMoss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC Audits
 
Strategic governance performance_management_systems
Strategic governance performance_management_systemsStrategic governance performance_management_systems
Strategic governance performance_management_systems
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Security Metrics Program
Security Metrics ProgramSecurity Metrics Program
Security Metrics Program
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management Solutions
 

Mehr von InnoTech

Mehr von InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 

KĂźrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

KĂźrzlich hochgeladen (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Integrating Internal Controls

  • 1. Integrating Internal Controls Save money and increase the effectiveness of internal controls and risk management processes by coordinating compliance, enterprise risk management, privacy, information security, internal audit, and financial reporting control assessment. MOSS ADAMS LLP | 1
  • 2. A TALE OF INEFFICIENCY. OR: WHY WE CARE o Performs and updates an IT security risk assessment • Information Security Manager, Brian o Designs and enforces IT policies and governance processes to ensure system security o Tests the effectiveness of the information security management program (ISMS) o Deals with constant requests from 4 different “audit”, “compliance”, or “security” stakeholders • Network Security Engineer, Bill o Ignores the various risk assessments, and just does what “he thinks is right”. o Performs an annual risk assessment of the audit universe • Internal Auditor, Mary o Examines internal controls for design and operating effectiveness. o Performs a risk assessment focused on financial reporting • Financial Auditor, John o Tests the operating effectiveness of key ICOFR controls o Keeps up to date with changing regulations, and communicates new requirements throughout • Compliance Manager, Sally the organization o Maintains a compliance management system to ensure that the organization is not breaking the law MOSS ADAMS LLP | 2
  • 3. • Integrate your risk- WHAT CAN I DO? centric business processes Enterprise Risk Management Risk Assessment Risk Management o Get your colleagues onboard o Develop a Map Assurance o Create touchpoints Control Design and Self Operating Effectiveness between departments Assessment Testing o Crosswalk controls or testing at key touchpoints Program Management Compliance Information Security MOSS ADAMS LLP | 3
  • 4. THE GENERIC RISK MANAGEMENT CYCLE Assess Risks Perform Implement Assessment Improvements of Controls’ Design and Operation Report Results MOSS ADAMS LLP | 4
  • 5. • Internal Auditor, Mary: “You know Brian, I noticed that you are WHAT DOES IT LOOK LIKE? looking at new multi-factor authentication technologies for our internet banking customers. I was thinking about doing an audit to examine those controls.” • Information Security Manager, Brian: “Interesting! That would be great! I did a risk assessment last year, and identified that as a key fraud risk.” • Mary: “Let’s start by letting me evaluate your risk assessment as I plan my audit.” • Brian: “OK. Also, I map my risk assessment to ISO 27002 controls. Do you think you could report your audit against that standard to help me evaluate risks more effectively?” MOSS ADAMS LLP | 5
  • 6. • The format is not critical. WHAT IT LOOKS LIKE (CONTINUED) • Just keep it simple, and manageable. MOSS ADAMS LLP | 6
  • 7. HOW WILL THIS IMPACT MY • Watch out. The auditors will start to pay heed INFORMATION SECURITY PROGRAM? to your risk assessments, and will start to audit the areas you are concerned about. MOSS ADAMS LLP | 7
  • 8. HOW WILL THIS IMPACT INTERNAL • Your internal audit program will be challenged with AUDITS? new sources of information for risk assessment and internal controls documentation. • There may be messy conflicts of interest to be worked out. o This is a good sign that Internal Audit is valuable within your organization. • You do not need to rely only on your own judgment or a simple survey as the only source to identify key risks in the organization. o Don’t let this be you:  How many Information Security pros does it take to change a light bulb?  How many did it take last year? MOSS ADAMS LLP | 8
  • 9. SHARED RISK ASSESSMENTS? Entity Audit Process Audit Dollar Operational Compliance Nature/ Strategic Last time Total Volume Risk Risk Sensitivity Audited Objective Score Information Technology 4.10 4.00 4.00 5.00 4.00 4.00 3.00 – Enterprise Applications Accounting and Billing 4.30 4.00 5.00 4.00 5.00 3.00 4.00 Facilities 3.80 5.00 4.00 3.00 2.00 4.00 5.00 MOSS ADAMS LLP | 9
  • 10. SHARE A CONTROL FRAMEWORK? COSO CobIT ISO 27000/27002 • NIST 800 • PMBOK • CMMI • CIS • ITIL • PCI • Industry-Specific Compliance • • Do we pick one, or do we integrate several? • MOSS ADAMS LLP | 10
  • 11. THE COSO INTERNAL CONTROL MODEL MONITORING: throughout CONTROL ACTIVITIES: processes, procedures, safeguards, access security, authorization RISK ASSESSMENT: identify, prioritize, mitigate risks; ongoing; wide participation CONTROL ENVIRONMENT: tone at the top, infrastructure, compliance; culture: integrity and competence of people MOSS ADAMS LLP | 11 Adapted from Committee of Sponsoring Organizations of the Treadway Commission (COSO)
  • 12. • Code of Practice for Information Security ISO 27002 Management • Divides IT Security into 11 Categories (Domains) • Defines key controls over specific sub-categories • Defines implementation guidance for each key control • 39 Control Objectives with 139 Controls • Control objectives are generic functional requirement specifications for an organization’s information and information system security management control architecture MOSS ADAMS LLP | 12
  • 13. • NIST offers security guidance in many areas NIST • Special Publications 800 Series • Useful high level governance standards and practices • Practically every IT security subject is covered here • Written for the Federal Government but very useful for any organization MOSS ADAMS LLP | 13
  • 14. NIST MOSS ADAMS LLP | 14
  • 15. • Value of IT, Risk, and Control COBIT • Links IT service delivery to business requirements (already defined, right?) • A lifecycle; constantly adapting, improving, re- adapting • Four Responsibility Domains: o Plan and Organize (PO) o Acquire and Implement (AI) o Deliver and Support (DS) o Monitor and Evaluate (ME) • Make a grocery list of needs and then go shopping MOSS ADAMS LLP | 15
  • 16. • CIS Benchmarks provide guidelines for operating CENTER FOR INTERNET SECURITY (CIS) systems and databases; • User originated, widely accepted, and reflect the consensus of expert users worldwide; • Compliance with these benchmarks will reduce findings and lead to more secure computing platforms • Some benchmarks include : Windows Server Solaris o Oracle o Exchange o o MOSS ADAMS LLP | 16
  • 17. • When you don’t have a good understanding of ITIL - PROCESS MODELING “what right looks like” • Models most “Industry Standard” information and information system technology processes • When in doubt “check it out and test it out” Maps to COBIT Complimentary to NIST and ISO o Helps to provide a starting place o Caution - can be complicated o o MOSS ADAMS LLP | 17
  • 18. CAPABILITY MATURITY UNRELIABLE INFORMAL STANDARDIZED MONITORED OPTIMIZED Level 1 – Unreliable Level 2 – Informal Level 3 – Level 4 – Monitored Level 5 – Optimized Standardized Unpredictable Disclosure activities Standardized controls An integrated internal environment where and controls are Control activities are with periodic testing control framework control activities are designed and designed and in place. for effective design with not designed in place. and operation with real-time monitoring Control activities have or in place. reporting to by management Controls are been documented and management. with continuous not adequately communicated to improvement documented; employees. Automation and tools (Enterprise-Wide Risk controls mostly may be used in a Deviations from control Management). dependent on limited way to support activities will likely not be people. control activities. detected. No formal training or communication of control activities. MOSS ADAMS LLP | 18
  • 19. CONCLUDING ON THE FRAMEWORKS • Don’t spend all your time mapping • Use what works • Focus on the ‘key’ controls for your organization • Focus on the risk assessment process first MOSS ADAMS LLP | 19
  • 20. WHAT SOFTWARE SHOULD I BUY? • Microsoft Excel • Enterprise-grade GRC software • Online internal control and risk management packages MOSS ADAMS LLP | 20
  • 21. CONCLUDING • In organizations where multiple groups have responsibilities for enterprise risk, internal control, information security, compliance: o Team up o Create touch points  Risk Assessment  Testing  Controls documentation o Use the tools, don’t let them use you MOSS ADAMS LLP | 21