SlideShare ist ein Scribd-Unternehmen logo
1 von 67
GAIT Approach to Regulatory Compliance Edward L. Hill Managing Director  Protiviti Jay R. Taylor, CIA, CFE, CISA General Director of Audit  General Motors Corporation
Today’s  Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is  GAIT? ,[object Object],[object Object]
Why Was  GAIT Formed? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Survey on  ITGC Sox Scoping ,[object Object],[object Object],[object Object],[object Object]
Need  for Guidance? ,[object Object],Yes - 77%
Who  Developed GAIT for SOX scoping? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who  Helped with GAIT for SOX scoping? ,[object Object],[object Object],[object Object],[object Object]
What  is GAIT for SOX scoping?   ,[object Object],[object Object],[object Object]
How  Does GAIT for SOX Scoping Work? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Top-Down Risk-Based
Overall  GAIT Scoping ,[object Object],[object Object],[object Object],[object Object],[object Object],RISK of material misstatement/fraud to financial statements & disclosures Scope according to RISK of material misstatement/fraud.
IT Risk Assessment  and Scoping ,[object Object],[object Object],[object Object],[object Object],STEP 1 :  validate  understanding STEP 2 : perform  risk assessment at each layer  STEP 3 :  Conclude:  is it REASONABLY POSSIBLE a failure in this IT Process area could impact application controls & result in a material misstatement? Risk is not eliminated; is it reduced to a REASONABLE level. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],GAIT  Principle 1
[object Object],GAIT  Principle 2
Financially Significant-  Definition ,[object Object],[object Object],[object Object]
[object Object],GAIT  Principle 3
[object Object],GAIT  Principle 4
[object Object],[object Object],The  GAIT Methodology
[object Object],The  GAIT Methodology
[object Object],The  GAIT Methodology
[object Object],The  GAIT Methodology
[object Object],[object Object],[object Object],[object Object],© 2007 Protiviti Inc.  All Rights Reserved.  This document is for your company’s internal use only and may not be distributed to any other third party.
Background for GAIT for Deficiency Evaluations ,[object Object],[object Object],[object Object],[object Object]
Principles ,[object Object],[object Object]
Indirect Relationship
Reliance Chain
Principles ,[object Object],[object Object],[object Object]
Principles ,[object Object],[object Object]
Assessment Steps
Assessment Steps
Assessment Steps
Assessment Steps
Closing  Summary ,[object Object],[object Object],[object Object]
GAIT for IT and Business Risk Edward Hill, CIA Managing Director Protiviti
GAIT for IT and Business Risk-   What it is meant to be ,[object Object],[object Object],[object Object]
Who should use this guidance? ,[object Object],[object Object],[object Object],[object Object]
Principles ,[object Object],[object Object]
Principles ,[object Object],[object Object]
Sub Principles- identification of key ITGC’s   ,[object Object],[object Object],[object Object]
Key control types: ,[object Object],[object Object],[object Object],[object Object]
TOP-DOWN METHODOLOGY   ,[object Object],[object Object]
TOP-DOWN METHODOLOGY   ,[object Object],[object Object]
TOP-DOWN METHODOLOGY   ,[object Object],[object Object]
Step 7-  Perform a “reasonable person,” holistic review of all the key controls identified
Step 8.  Determine the scope of the review ,[object Object],[object Object],[object Object]
Step 8.  Determine the scope of the review ,[object Object],[object Object],[object Object],[object Object]
Closing  Summary ,[object Object],[object Object],[object Object]
Case Study Audit of Environmental Compliance Management Process Using GAIT Jay R. Taylor
1.  Business Objectives ,[object Object],[object Object],[object Object]
Business Risks  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Overview for the Environmental Management Process (EMP) Data Acquisition and Validation Report Development and Review Project Completion File Reports ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
So … we only have a certain number of audit hours …  What is critical to review?  Why??
2.  Key Controls in the Business Process to Achieve Business Objectives A = Timeliness B =  Completeness C = Accuracy Objectives Key Controls A B C 1. Calendar-based reminders to users prompting input of critical data  (automated) X X 2. Entry and edit of chemical purchases, usages, losses, releases, etc. (hybrid) X 3. Comparison of current results (post-calculation) to previous results (automated) X X 4. Final review of reports including support data (hybrid – heavy dependence) (note: “precision”) X X 5. e-Filing of regulatory reports X
3. Critical IT Functionality Relied Upon from Among the Key Business Controls Key Controls Related IT Functionality 1. Calendar reminders to users (automated) Programmed routine including user notification 2. Entry and edit of chemical purchases (hybrid) Programmed edits against tables (range check; chemical types; etc.) 3. Comparison of current results to previous results (automated) Calculate quantities not accounted for, and compare to thresholds and priors 4. Final review of report including support (hybrid) Select transactions, format, and print user reports 5. e-Filing of regulatory reports Select, format, & transmit
4. The Applications Where IT General Controls Need to be Tested ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. IT General Control Process Risks and Related Control Objectives Key Controls Related Risks Control Objectives 1. Calendar reminders  ,[object Object],[object Object],2. Entry/edit of purchases, receipts, etc. ,[object Object],[object Object],3. Comparison of results (period to period; similar facilities; threshold comparisons, etc.) ,[object Object],[object Object]
5. IT General Control Process Risks and Related Control Objectives, Continued Key Controls Related Risks Control Objectives 4. Final review of report  ,[object Object],[object Object],5. e-Filing of reports ,[object Object],[object Object],[object Object]
6. IT General Controls to Test, That Meet the Control Objectives Control Objectives IT General Controls (Examples) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
7.  Perform a “reasonable person,” holistic review of all the key controls identified ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Q: Extremely good or bad??  Impact the audit plan?
8. Scope of the Review – Integrated Audit – Coverage of All Business Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scope Change Needed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions and Lessons Learned ,[object Object],[object Object],[object Object],[object Object]
Conclusions and Lessons Learned, Continued ,[object Object],[object Object],[object Object],[object Object]
Conclusions and Lessons Learned, Continued ,[object Object],[object Object],[object Object],[object Object]
More Information . . . ,[object Object],[object Object]
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
Using COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk AnalysisUsing COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk Analysiswebmentorman
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal ControlsBharath Rao
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfawish11
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOXMahesh Patwardhan
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties SolutionsAhmed Abdul Hamed
 
Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isacapooshu
 
Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014Tami Flowers
 
Agile in a highly regulated organization: part 2 2014
Agile in a highly regulated organization: part 2 2014Agile in a highly regulated organization: part 2 2014
Agile in a highly regulated organization: part 2 2014Tami Flowers
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringEmma Kelly
 
Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100Net at Work
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and ControlAsad Raza
 

Was ist angesagt? (20)

IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Using COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk AnalysisUsing COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk Analysis
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isaca
 
Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014
 
Agile in a highly regulated organization: part 2 2014
Agile in a highly regulated organization: part 2 2014Agile in a highly regulated organization: part 2 2014
Agile in a highly regulated organization: part 2 2014
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls Monitoring
 
Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100
 
Orientation in IT Audit
Orientation in IT AuditOrientation in IT Audit
Orientation in IT Audit
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
Government and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP SystemsGovernment and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP Systems
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and Control
 
Ch2 2009 cisa
Ch2 2009 cisaCh2 2009 cisa
Ch2 2009 cisa
 
Internal Controls
Internal ControlsInternal Controls
Internal Controls
 

Andere mochten auch

Research Methodology in Gait Analysis
Research Methodology in Gait AnalysisResearch Methodology in Gait Analysis
Research Methodology in Gait AnalysisPrasanna Lenka
 
광고와 뉴미디어1
광고와 뉴미디어1광고와 뉴미디어1
광고와 뉴미디어1Chaenam, Jun
 
블로그의이해
블로그의이해블로그의이해
블로그의이해Chaenam, Jun
 
Speechless Brochure
Speechless BrochureSpeechless Brochure
Speechless Brochuresharmuys
 
1일차 20140326
1일차 201403261일차 20140326
1일차 20140326Jake Yoon
 
통합적마케팅커뮤니케이션 세부기획
통합적마케팅커뮤니케이션 세부기획통합적마케팅커뮤니케이션 세부기획
통합적마케팅커뮤니케이션 세부기획Chaenam, Jun
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circularSusana Valls Andreu
 
Africrans pwr point for schools
Africrans pwr point for schoolsAfricrans pwr point for schools
Africrans pwr point for schoolsg4husky
 
G+ Summer C Study 20130716(6일차)
G+ Summer C Study 20130716(6일차)G+ Summer C Study 20130716(6일차)
G+ Summer C Study 20130716(6일차)Jake Yoon
 
Faculty instructional technology
Faculty instructional technologyFaculty instructional technology
Faculty instructional technologyPatricia Hetu
 
마케팅커뮤니케이션
마케팅커뮤니케이션마케팅커뮤니케이션
마케팅커뮤니케이션Chaenam, Jun
 
Android virtualization을 통한 IoT구현
Android virtualization을 통한 IoT구현Android virtualization을 통한 IoT구현
Android virtualization을 통한 IoT구현Jake Yoon
 
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aGene Kim
 
Teacher Ed Brunch Pwr Point Heidi
Teacher Ed Brunch Pwr Point HeidiTeacher Ed Brunch Pwr Point Heidi
Teacher Ed Brunch Pwr Point Heidig4husky
 

Andere mochten auch (20)

Research Methodology in Gait Analysis
Research Methodology in Gait AnalysisResearch Methodology in Gait Analysis
Research Methodology in Gait Analysis
 
광고와 뉴미디어1
광고와 뉴미디어1광고와 뉴미디어1
광고와 뉴미디어1
 
블로그의이해
블로그의이해블로그의이해
블로그의이해
 
Kisah nanokarbon
Kisah nanokarbonKisah nanokarbon
Kisah nanokarbon
 
Exposion equipo3 tema 4
Exposion equipo3 tema 4Exposion equipo3 tema 4
Exposion equipo3 tema 4
 
Speechless Brochure
Speechless BrochureSpeechless Brochure
Speechless Brochure
 
1일차 20140326
1일차 201403261일차 20140326
1일차 20140326
 
통합적마케팅커뮤니케이션 세부기획
통합적마케팅커뮤니케이션 세부기획통합적마케팅커뮤니케이션 세부기획
통합적마케팅커뮤니케이션 세부기획
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circular
 
El arte
El arteEl arte
El arte
 
Africrans pwr point for schools
Africrans pwr point for schoolsAfricrans pwr point for schools
Africrans pwr point for schools
 
Fall2010 ed meeting
Fall2010 ed meetingFall2010 ed meeting
Fall2010 ed meeting
 
G+ Summer C Study 20130716(6일차)
G+ Summer C Study 20130716(6일차)G+ Summer C Study 20130716(6일차)
G+ Summer C Study 20130716(6일차)
 
Produccion antigua
Produccion antiguaProduccion antigua
Produccion antigua
 
Faculty instructional technology
Faculty instructional technologyFaculty instructional technology
Faculty instructional technology
 
아이애드
아이애드아이애드
아이애드
 
마케팅커뮤니케이션
마케팅커뮤니케이션마케팅커뮤니케이션
마케팅커뮤니케이션
 
Android virtualization을 통한 IoT구현
Android virtualization을 통한 IoT구현Android virtualization을 통한 IoT구현
Android virtualization을 통한 IoT구현
 
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
 
Teacher Ed Brunch Pwr Point Heidi
Teacher Ed Brunch Pwr Point HeidiTeacher Ed Brunch Pwr Point Heidi
Teacher Ed Brunch Pwr Point Heidi
 

Ähnlich wie Iiaic08 power point cs2-3_track_regulatory session v3

Information technology controls- David A. Richards, Alan S. Oliphant, Charles...
Information technology controls- David A. Richards, Alan S. Oliphant, Charles...Information technology controls- David A. Richards, Alan S. Oliphant, Charles...
Information technology controls- David A. Richards, Alan S. Oliphant, Charles...Alejandro Rivera Santander
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk ConsultingPrashant Jain
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only
Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf OnlyVisual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only
Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf OnlyJoe Oringel
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAHTommy Seah
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007David Cunningham
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.gueste080564
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.renetta
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computingguestc1bca2
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013Mike Wright
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c 2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c Security B-Sides
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1cGene Kim
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004Donald E. Hester
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Hendri Eka Saputra
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?Eryk Budi Pratama
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceBill Lisse
 

Ähnlich wie Iiaic08 power point cs2-3_track_regulatory session v3 (20)

Information technology controls- David A. Richards, Alan S. Oliphant, Charles...
Information technology controls- David A. Richards, Alan S. Oliphant, Charles...Information technology controls- David A. Richards, Alan S. Oliphant, Charles...
Information technology controls- David A. Richards, Alan S. Oliphant, Charles...
 
Audit Report Model and Sample
Audit Report Model and SampleAudit Report Model and Sample
Audit Report Model and Sample
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
A Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And ManagementA Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And Management
 
Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only
Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf OnlyVisual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only
Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c 2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
Sharpening the Lens
Sharpening the LensSharpening the Lens
Sharpening the Lens
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT Governance
 

Mehr von Gene Kim

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Gene Kim
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)Gene Kim
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience ReportGene Kim
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...Gene Kim
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)Gene Kim
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was ReleasedGene Kim
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedGene Kim
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesGene Kim
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity ConferenceGene Kim
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?Gene Kim
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!Gene Kim
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?Gene Kim
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsGene Kim
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementGene Kim
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOGene Kim
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns DistilledGene Kim
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKimGene Kim
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksGene Kim
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Gene Kim
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...Gene Kim
 

Mehr von Gene Kim (20)

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons Learned
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process Improvement
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFO
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps Rocks
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...
 

Iiaic08 power point cs2-3_track_regulatory session v3

  • 1. GAIT Approach to Regulatory Compliance Edward L. Hill Managing Director Protiviti Jay R. Taylor, CIA, CFE, CISA General Director of Audit General Motors Corporation
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 28.
  • 29.
  • 34.
  • 35. GAIT for IT and Business Risk Edward Hill, CIA Managing Director Protiviti
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. Step 7- Perform a “reasonable person,” holistic review of all the key controls identified
  • 46.
  • 47.
  • 48.
  • 49. Case Study Audit of Environmental Compliance Management Process Using GAIT Jay R. Taylor
  • 50.
  • 51.
  • 52.
  • 53. So … we only have a certain number of audit hours … What is critical to review? Why??
  • 54. 2. Key Controls in the Business Process to Achieve Business Objectives A = Timeliness B = Completeness C = Accuracy Objectives Key Controls A B C 1. Calendar-based reminders to users prompting input of critical data (automated) X X 2. Entry and edit of chemical purchases, usages, losses, releases, etc. (hybrid) X 3. Comparison of current results (post-calculation) to previous results (automated) X X 4. Final review of reports including support data (hybrid – heavy dependence) (note: “precision”) X X 5. e-Filing of regulatory reports X
  • 55. 3. Critical IT Functionality Relied Upon from Among the Key Business Controls Key Controls Related IT Functionality 1. Calendar reminders to users (automated) Programmed routine including user notification 2. Entry and edit of chemical purchases (hybrid) Programmed edits against tables (range check; chemical types; etc.) 3. Comparison of current results to previous results (automated) Calculate quantities not accounted for, and compare to thresholds and priors 4. Final review of report including support (hybrid) Select transactions, format, and print user reports 5. e-Filing of regulatory reports Select, format, & transmit
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.

Hinweis der Redaktion

  1. Steve During today’s presentation, we will discuss: What GAIT is. Why GAIT was established. Who developed GAIT GAIT Principles & Methodology Tips & Practical Techniques And getting started with GAIT And now, to kick off today’s presentation, I’d like to begin with an overview of what GAIT is and the problems that GAIT is designed to alleviate . . .
  2. Steve A January, 2007, survey* indicated inefficiencies exist in scoping ITGC, costs are too high for many organizations, and guidance would be highly valuable. * 533 respondents, primarily internal auditors and IT Audit managers.
  3. Steve More than three-quarters felt guidance would be of high value. And now, Steve, please tell our viewers about the GAIT team.
  4. Steve In early 2005, the IIA Technology Committee created the GAIT task force, which has held five GAIT Summits since July 2005 The GAIT Summits assembled key stakeholders from internal auditing, management, external auditing, and federal regulators GAIT Team’s Vision and Goals To develop in 2006 a set of widely-used and widely-accepted guiding principles, tools, methodologies and scenarios that can be used by management and auditors to properly scope IT general controls work for financial reporting and SOX-404. To develop a short- and medium-term roadmap that moves the GAIT Principles from new guidance to great advice to generally accepted. To develop a long-term roadmap that expands the GAIT Principles from internal control objectives for just financial reporting, to one that encompasses compliance with laws and regulations, operating effectiveness, etc.
  5. The GAIT methodology examines each financially significant application and determines whether failures in the IT business processes at each layer in the stack represent a likely threat to the consistent operation of the application’s critical functionality. If a failure is likely, GAIT identifies the IT business process risks in detail and the related ITGC control objectives that, when achieved, mitigate the risks. COBIT and other methodologies can identify the key controls to address the ITGC control objectives. In short, the GAIT methodology guides you through asking three questions in sequence: What IT functionality in the financially significant applications is critical to the proper operation of the business process key controls that prevent/detect material misstatement (i.e., what is the critical IT functionality)? For each IT process at each layer in the stack, is there a reasonable likelihood that a process failure would cause the critical functionality to fail —indirectly representing a risk of material misstatement (i.e., if that process failed at that layer, what effect would there be on the critical functionality? Would it cause the functionality to fail such that there would be a reasonably likely risk of material misstatement)? If such IT business process risks exist, what are the relevant IT control objectives (i.e., what IT control objectives need to be achieved to provide assurance over the critical functionality)?
  6. Steve During today’s presentation, we will discuss: What GAIT is. Why GAIT was established. Who developed GAIT GAIT Principles & Methodology Tips & Practical Techniques And getting started with GAIT And now, to kick off today’s presentation, I’d like to begin with an overview of what GAIT is and the problems that GAIT is designed to alleviate . . .