SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Emerging Risks - 2016
IA Focus
Sourav Chandgothia & Sudharm Kulkarni
Tuesday, April 28, 2016
Agenda
Cybersecurity
Third Party
outsourcing
Relationships
Product Security
BEPS & Global
Tax Reform
Mergers,
Acquisitions &
Divestitures
Anti-Bribery &
Anti Corruption
Data
Governance
Intellectual
Property
Protection
Cybersecurity
Cybersecurity Risks
Failure to cover cybersecurity basics.
Lack of Cybersecurity Policy
Confusing compliance with Cybersecurity
The Human factor – the weakest link
Bring your own device (BYOD) & the Cloud
Lack of Security training
Constantly revolving risks
Focus Area for Internal Audit
Top-down risk assessment using industry as a guide.
Review existing processes and controls.
Review the organization’s cybersecurity framework with regulatory expectations.
Assess implementations of revised technology security models.
Evaluate the organization’s security incident response and communications plans.
Assess third-party security providers.
Third-Party Outsourcing Relationships
Third Party Risks
Operational Risks
Compliance Risks
Reputation Risk
Strategic Risk
Credit Risk
Focus Area for Internal Audit
Evaluating the methodology the organization uses to identify third parties,
including segmentation and classification, and the risks associated with them.
Providing insight and feedback on the organization’s third-party management
program, including vetting, due diligence and monitoring.
Executing risk-based third-party reviews that include procedures tailored to
address the specific risks a third-party presents.
Investigating anomalies identified as a result of the organization’s third-party
vetting process.
Product Security
Product Security Risks
Compromised
Product
security
Associated
Risks with
product
software
updates.
Untimely
patches and
updated to the
product
software.
Product
susceptible to
“Zero-day
vulnerabilities”.
Focus Area for Internal Audit
Evaluate
encryption
processes for
at-rest and in-
motion content
and leveraging
industry
standards as a
guide.
Analyze role-
based product
access
policies to help
ensure
compliance
with
regulations.
Top-down risk
assessment
on vulnerable
OS, database,
and
application
level ports.
Evaluating the
regulatory
compliance of
each product
Assess
existing
product
continual
monitoring and
effective
logging
processes.
BEPS and Global Tax Reform
Saturday, September 24, 2016
BEPS & Global Tax Reform Risks
Global tax expense and effective tax rate volatility due to rapid
and significant change in international tax norms.
Reputational damage to the organization due to new regulatory
requirements for enhanced tax transparency and country-by-
country reporting.
Tax compliance risk related to the proliferation of anti-BEPS
regulatory requirements across multiple countries
Focus Area for Internal Audit
Assist the company and
its tax function in
preparing a BEPS
readiness assessment
and developing an
action plan.
Advise on the
enhancement or
development of a
corporate tax code of
conduct and supporting
tax controls.
Assess the company’s
readiness for
compliance with the
array of transparency
measures.
Evaluate the
effectiveness of
automated compliance
programs for tax
transparency reporting
and enhanced transfer
pricing documentation.
Mergers, acquisitions and divestitures
M&A Risks
Failing to move the discovery process along expeditiously
Poor Due Diligence
Absence of security over information
Paying substantially more than the Fair Value
Failure to create focus during the integration process and involve front-line operating personnel.
Lack of transparency during the integration process.
Focus Area for Internal Audit
Perform “post mortem”
reviews on prior deals or
divestitures to assess the
effectiveness of
procedures and
playbooks
Assess the adherence to
accounting and internal
control due diligence
checklists that address
key deal areas (i.e.,
quality of earnings and
assets, cash flows,
unrecorded liabilities).
Understand the
communication
processes between
finance, internal audit,
and deal teams to assess
control implications of
executing business
process change during
active integrations or
divestitures.
Conduct a project risk
assessment review of the
business integration or
divestiture process,
focusing on potential
risks, integration success
metrics, and information
systems
Anti-Corruption & Anti-Bribery
Statistics
Focus Area for Internal Audit
Support management in designing a global anti-bribery compliance strategy.
Update internal audit programs to ensure they contain suitable anti-bribery and corruption procedures.
Facilitate management’s bribery and corruption risk assessment activities.
Collaborate with the business and other compliance teams on awareness and education campaigns,
especially on a global scale.
Enhance existing anti-bribery and corruption programs, including third-party risk management, due
diligence, and advanced data analytics.
Assist the company to help ensure it meets the requirements/guidance provided by the Department of
Justice.
Data Governance
Focus Area for Internal Audit
Focus Area for Internal Audit
Guiding third-party risk
assessment and
compliance specifically
related to IP
agreements with third
parties.
Conducting a process,
gap and risk
assessment of the
internal IP process as
it relates to the IP
lifecycle.
Aiding with the draft of
consistent compliance
standards and, once
approved,
communicating these
to relevant individuals
through a training and
awareness program.
Assist with the
implementation of
control to help improve
the integrity and
security of critical
business data.
Perform an audit of IT
access and security
around the company’s
IP to determine if any
potential areas of risk
are present.
Intellectual property protection
Focus Area for Internal Audit
Risks of Data
Leaks
IP strategy not
aligned with the
product strategy
IP Management
processes not
aligned with
compliance
requirements.
Higher Costs
due to errors
and Litigation
Buy or Create IP
difference cost
risk
Obsolesce
Risks
Focus Area for Internal Audit
Perform an audit of IT access and security around the
technology company’s IP.
Assist with the implementation of control to help improve
the integrity and security of critical business data
Aiding with the drafting of consistent compliance
standards.
Conduct a process, gap and risk assessment of the
internal IP process as it relates to the IP lifecycle
Guide third-party risk assessment and compliance
specifically related to IP agreements with third parties.
Q & A
Saturday, September 24, 2016
Thank you
Saturday, September 24, 2016

Weitere ähnliche Inhalte

Was ist angesagt?

Governance, risk and compliance framework
Governance, risk and compliance frameworkGovernance, risk and compliance framework
Governance, risk and compliance framework
Ceyeap
 

Was ist angesagt? (19)

GRC 101 ISACA Bengaluru on 28th Dec 2013
GRC 101 ISACA Bengaluru on 28th Dec 2013GRC 101 ISACA Bengaluru on 28th Dec 2013
GRC 101 ISACA Bengaluru on 28th Dec 2013
 
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best PracticeThird Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
 
Hernan Huwyler Managing Third Pary Risks - Internal Audit Europe Conference
Hernan Huwyler Managing Third Pary Risks - Internal Audit Europe ConferenceHernan Huwyler Managing Third Pary Risks - Internal Audit Europe Conference
Hernan Huwyler Managing Third Pary Risks - Internal Audit Europe Conference
 
International Standard on Assurance Engagements ISAE 3000 Audits
International Standard on Assurance Engagements ISAE 3000 AuditsInternational Standard on Assurance Engagements ISAE 3000 Audits
International Standard on Assurance Engagements ISAE 3000 Audits
 
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPARiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
 
Governance, risk and compliance framework
Governance, risk and compliance frameworkGovernance, risk and compliance framework
Governance, risk and compliance framework
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
Third-party Governance and Risk Management - 2018
Third-party Governance and Risk Management - 2018Third-party Governance and Risk Management - 2018
Third-party Governance and Risk Management - 2018
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT Risks
 
EAI Compliance Infographic
EAI Compliance InfographicEAI Compliance Infographic
EAI Compliance Infographic
 
White Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewWhite Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic review
 
My slides
My slidesMy slides
My slides
 
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management Introduction
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 

Andere mochten auch

Andere mochten auch (11)

Practica informática m.a.s
Practica informática m.a.sPractica informática m.a.s
Practica informática m.a.s
 
Presentación
PresentaciónPresentación
Presentación
 
Analisis dafo 1.docx---28 de julio 2016
Analisis dafo 1.docx---28 de julio 2016Analisis dafo 1.docx---28 de julio 2016
Analisis dafo 1.docx---28 de julio 2016
 
Wvc diseño
Wvc diseño Wvc diseño
Wvc diseño
 
Web 2.0 y aprendizaje colaborativo
Web 2.0 y aprendizaje colaborativoWeb 2.0 y aprendizaje colaborativo
Web 2.0 y aprendizaje colaborativo
 
Preventing Bad Breath
Preventing Bad BreathPreventing Bad Breath
Preventing Bad Breath
 
ASHOK-HSE
ASHOK-HSEASHOK-HSE
ASHOK-HSE
 
サブコンのススメ
サブコンのススメサブコンのススメ
サブコンのススメ
 
CV_Muhammad_Shoaib - June 2016
CV_Muhammad_Shoaib - June 2016CV_Muhammad_Shoaib - June 2016
CV_Muhammad_Shoaib - June 2016
 
Конкурсна пропозиція на посаду Голови правління ПАТ "УЗ"
Конкурсна пропозиція на посаду Голови правління ПАТ "УЗ"Конкурсна пропозиція на посаду Голови правління ПАТ "УЗ"
Конкурсна пропозиція на посаду Голови правління ПАТ "УЗ"
 
Конкурсна пропозиція на посаду голови дп уз
Конкурсна пропозиція на посаду голови дп узКонкурсна пропозиція на посаду голови дп уз
Конкурсна пропозиція на посаду голови дп уз
 

Ähnlich wie Presentation_IA Focus

GP_for_Third_Party_Anti-Corruption_product_sheet
GP_for_Third_Party_Anti-Corruption_product_sheetGP_for_Third_Party_Anti-Corruption_product_sheet
GP_for_Third_Party_Anti-Corruption_product_sheet
Marco Villacorta Olano
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
Prashant Jain
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdf
SALES97
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots
Ron Steinkamp
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
Alireza Ghahrood
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
Nidhi Gupta
 

Ähnlich wie Presentation_IA Focus (20)

GP_for_Third_Party_Anti-Corruption_product_sheet
GP_for_Third_Party_Anti-Corruption_product_sheetGP_for_Third_Party_Anti-Corruption_product_sheet
GP_for_Third_Party_Anti-Corruption_product_sheet
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
 
Goldman Sachs Investor Presentation Deck Oct 2007.pdf
Goldman Sachs Investor Presentation Deck Oct 2007.pdfGoldman Sachs Investor Presentation Deck Oct 2007.pdf
Goldman Sachs Investor Presentation Deck Oct 2007.pdf
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdf
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots
 
Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto Series
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessment
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Forensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and  Global Experience: the Intelligent Connection - EY IndiaForensic Services and  Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
 
Forensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
 
Forensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
 
Forensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
 
Forensic Services and Global Experience:the Intelligent Connection - EY India
Forensic Services and Global Experience:the Intelligent Connection - EY IndiaForensic Services and Global Experience:the Intelligent Connection - EY India
Forensic Services and Global Experience:the Intelligent Connection - EY India
 

Presentation_IA Focus

  • 1. Emerging Risks - 2016 IA Focus Sourav Chandgothia & Sudharm Kulkarni Tuesday, April 28, 2016
  • 2. Agenda Cybersecurity Third Party outsourcing Relationships Product Security BEPS & Global Tax Reform Mergers, Acquisitions & Divestitures Anti-Bribery & Anti Corruption Data Governance Intellectual Property Protection
  • 4. Cybersecurity Risks Failure to cover cybersecurity basics. Lack of Cybersecurity Policy Confusing compliance with Cybersecurity The Human factor – the weakest link Bring your own device (BYOD) & the Cloud Lack of Security training Constantly revolving risks
  • 5. Focus Area for Internal Audit Top-down risk assessment using industry as a guide. Review existing processes and controls. Review the organization’s cybersecurity framework with regulatory expectations. Assess implementations of revised technology security models. Evaluate the organization’s security incident response and communications plans. Assess third-party security providers.
  • 7. Third Party Risks Operational Risks Compliance Risks Reputation Risk Strategic Risk Credit Risk
  • 8. Focus Area for Internal Audit Evaluating the methodology the organization uses to identify third parties, including segmentation and classification, and the risks associated with them. Providing insight and feedback on the organization’s third-party management program, including vetting, due diligence and monitoring. Executing risk-based third-party reviews that include procedures tailored to address the specific risks a third-party presents. Investigating anomalies identified as a result of the organization’s third-party vetting process.
  • 10. Product Security Risks Compromised Product security Associated Risks with product software updates. Untimely patches and updated to the product software. Product susceptible to “Zero-day vulnerabilities”.
  • 11. Focus Area for Internal Audit Evaluate encryption processes for at-rest and in- motion content and leveraging industry standards as a guide. Analyze role- based product access policies to help ensure compliance with regulations. Top-down risk assessment on vulnerable OS, database, and application level ports. Evaluating the regulatory compliance of each product Assess existing product continual monitoring and effective logging processes.
  • 12. BEPS and Global Tax Reform Saturday, September 24, 2016
  • 13. BEPS & Global Tax Reform Risks Global tax expense and effective tax rate volatility due to rapid and significant change in international tax norms. Reputational damage to the organization due to new regulatory requirements for enhanced tax transparency and country-by- country reporting. Tax compliance risk related to the proliferation of anti-BEPS regulatory requirements across multiple countries
  • 14. Focus Area for Internal Audit Assist the company and its tax function in preparing a BEPS readiness assessment and developing an action plan. Advise on the enhancement or development of a corporate tax code of conduct and supporting tax controls. Assess the company’s readiness for compliance with the array of transparency measures. Evaluate the effectiveness of automated compliance programs for tax transparency reporting and enhanced transfer pricing documentation.
  • 16. M&A Risks Failing to move the discovery process along expeditiously Poor Due Diligence Absence of security over information Paying substantially more than the Fair Value Failure to create focus during the integration process and involve front-line operating personnel. Lack of transparency during the integration process.
  • 17. Focus Area for Internal Audit Perform “post mortem” reviews on prior deals or divestitures to assess the effectiveness of procedures and playbooks Assess the adherence to accounting and internal control due diligence checklists that address key deal areas (i.e., quality of earnings and assets, cash flows, unrecorded liabilities). Understand the communication processes between finance, internal audit, and deal teams to assess control implications of executing business process change during active integrations or divestitures. Conduct a project risk assessment review of the business integration or divestiture process, focusing on potential risks, integration success metrics, and information systems
  • 20. Focus Area for Internal Audit Support management in designing a global anti-bribery compliance strategy. Update internal audit programs to ensure they contain suitable anti-bribery and corruption procedures. Facilitate management’s bribery and corruption risk assessment activities. Collaborate with the business and other compliance teams on awareness and education campaigns, especially on a global scale. Enhance existing anti-bribery and corruption programs, including third-party risk management, due diligence, and advanced data analytics. Assist the company to help ensure it meets the requirements/guidance provided by the Department of Justice.
  • 22. Focus Area for Internal Audit
  • 23. Focus Area for Internal Audit Guiding third-party risk assessment and compliance specifically related to IP agreements with third parties. Conducting a process, gap and risk assessment of the internal IP process as it relates to the IP lifecycle. Aiding with the draft of consistent compliance standards and, once approved, communicating these to relevant individuals through a training and awareness program. Assist with the implementation of control to help improve the integrity and security of critical business data. Perform an audit of IT access and security around the company’s IP to determine if any potential areas of risk are present.
  • 25. Focus Area for Internal Audit Risks of Data Leaks IP strategy not aligned with the product strategy IP Management processes not aligned with compliance requirements. Higher Costs due to errors and Litigation Buy or Create IP difference cost risk Obsolesce Risks
  • 26. Focus Area for Internal Audit Perform an audit of IT access and security around the technology company’s IP. Assist with the implementation of control to help improve the integrity and security of critical business data Aiding with the drafting of consistent compliance standards. Conduct a process, gap and risk assessment of the internal IP process as it relates to the IP lifecycle Guide third-party risk assessment and compliance specifically related to IP agreements with third parties.
  • 27. Q & A Saturday, September 24, 2016