Sunday, December 6, 2009
Internet Security Standards Setting Bodies
International Telecommunications Union (ITU) X.273, Open Systems Network Layer Security, and X.509, Authetication Framework
International Standards Organization (ISO) ISO 17799
Institute of Electrical and Electronic Engineers (IEEE)
European Computer Manufacturers Association
Sunday, October 18, 2009
Business Lunch Tips for Auditors
Friday, October 16, 2009
Cut Your Public Audit Bill
Wednesday, October 14, 2009
Why Travel on Audits Light
#10:
Nobody can steal your luggage
#9:
Be more independent
#8: Extra time to get to the airport
#7:
Volunteer to be bumped, as no worry about luggage coming on the same flight
#6:
Catch public transportation, as no suitcases to roll around among lots of
people
#5: Don’t wait for getting luggage
#4: Avoid tipping
#3: Be environmental, as fewer luggage means less
weight to lift
#2: Avoid fees
#1:
“Lost Luggage
Friday, September 25, 2009
Photo Evidence Audit
- Document title
- Description
- Description writer
- Author
- Title
- Style
- Key Words
Tuesday, September 15, 2009
Lava Lamp for Auditors
If you wish to remember some facts, try intensely to forget them.
Auditing skills promote full employment for auditors.
If you laid all your sampling tests end to end, would they reach a conclusion?
Get your facts first, then you can properly arrange them.
An audit is just a flurry of activity without a program.
Audit opinions are plenty, implementations can be expensive.
Sunday, September 13, 2009
Develop Your Own Voice as Auditor
Stope over-analyzing what everyone else thinks! You cannot please everyone, and you cannot live in your head only all the time.
Search and Find Your Own Reasons to help others by auditing.
Audit your own goals, attitudes, resentments by asking yourself every question in the "book."
Write down your own reasons for passion to be an auditor. When you write things down you automatically reflect, and remember all those written "to do" lists that did get done.
Don't just file it, do something, act on your reasons to be great at auditing.
Don't worry about the dead ends. Just back up and move forward.
Saturday, September 12, 2009
Achieve Happiness As Auditor - Yes You Can
2. Don't forget to keep around a few annoying friends. It will sharpen your skills in dealing with incompatible people, and help you function in the world with people not like you.
3. Texting is for thumb people. Studies show that over 40% of what you write in emails is misunderstood.
4. Online friends don't exits in 3D real world. Only 7% of inter-personal exchange takes place through words, the rest, a mere 93% is non-verbal. We know that we exist, and who we are by seeing ourselves in the mirrors of other people's eyes.
5. No real friends, no spontenous criticism, and we miss it. Non-direct forms of communication are a great way to avoid being honest, by having the time to choose and craft words. We need quirks, humiliations and vulnerabilities that only real friendships provide.
6. Media Negativity Does Affect Us. After constant negative spins on just about everything, we feel at odds with the rest of the world. Like Mark Twain said, turn off all the news, and be happy. Almost no news will really affect your life, and what does affect, you won't be able to change anyway.
7. We feel less because we have less (friends). All these on-line friends don't place demands on us. BUT, we were wired to help and take care of others. We are a product of social interactions, so we need to be connected in real life, not through flat-screen monitors. Find a way to do something simple, but physical to help someone else. It really works.
Saturday, September 5, 2009
Scoring Risks
- The adequacy of internal controls
- The potential threats from transactions
- History of problems with system or application
- IT Architecture and Data Classification - is there a match
- The physical and logical security of information, equipment, and premises
- The adequacy of operating management oversight and monitoring
- Human resources, including the experience of management and staff, turnover, technical competence, management’s succession plan, and the degree of delegation
- Senior management oversight and appropriate governance
Great New Email Functions
- Undo sent message
- Snooze this message
- Reply to selected text
- Smart reply templates
- Attachment reminders
- Language-based filtering
- Usage trending
- Related message search
Friday, September 4, 2009
5 Key IT Skills Worth Having
2. Java
3. Lisp
4. C/C++
5. Unix form O/S familiarity
Knowing syntax to be able to read would be helpful for some IT Auditors
Thursday, September 3, 2009
Sign Your Should Charge More in Consulting Fees
They have new jobs after you finish this one.
You work and still get poverty assistance
Hey, any catch with your quote for the job?
Here you go, I have enough cash on me to pay you.
You have no friends among consultants.
You are hired without even telling them how much you charge
As you can't get all the work done, you live on cola and pizza
You get jobs from overseas outsourcers
Measuring Fraud Drivers - Yes, It Can Be Done
Envy Total thefts (robbery, burglary, larceny, and grand theft auto) per capita.
Wrath Number of violent crimes (murder, assault, and rape) per capita.
Sloth Expenditures on art, entertainment, and recreation compared with employment.
Gluttony Number of fast-food restaurants per capita.
Lust Number of STD cases reported per capita.
Pride Aggregate of the other six offenses—because pride is the root of all sin.
Feel free to put add these measures into a dashboard.
Web site Content Hell
- hit counters
- guestbooks
- stale links
- pages forever under construction
- pointless vanity pages
- advertisements from hell
- no email address for feedback
- unstable extensions
- broken HTML
- blinking text
- gratuitous animation
- marquees
- garish backgrounds
- unreadable text/background combinations
- "Best viewed with..."
- pop-up windows
- menus made entirely from image maps
- background MIDI, Flash, Shockwave
Becoming a Hacker
2. Don't bother trying to solve a previously solved problem: no glory
3. Hate boredom and repetitive work?
4. Love freedom without borders?
5. Forget attitude, impress with competence.
6. Get a really cool shirt at the next Def Con in Las Vegas (usually in August)
Wednesday, September 2, 2009
Compliance Program Key Elements
Monday, August 31, 2009
Involving Right Deparments in Compliance Issues
Accounting Irregularities Audit Committee, External/Internal Auditors, Compliance
Fraud Internal Audit, Loss Prevention, Risk Management, Compliance/Ethics
Workplace Violence Security, Operations, Legal, HR
Employee Theft (other than by head-hunters) Loss Prevention, HR
ETHICS The Federal Sentencing Guidelines for Organizations
Written standards of ethical workplace conduct
Means for an employee to anonymously report violations of ethics standards
Orientation or training on ethical workplace conduct
A specific office, phone line, e-mail, or Web site so that emps can get ethics advice
Evaluation of ethical conduct as part of regular performance appraisals
Discipline for employees who commit ethics violations
Sunday, August 30, 2009
Compliance Committee Key Issues
2. Review reports on internal controls
3. Examine all external reporting
4. Read internal audit reports
5. Evaluate internal audit activities, budget, staffing, and responsibilities
6. Consider all inquiries from external sources (including governmental)
7. Deal with all related party transactions and conflict of interests
8. Update conduct and ethics statements
9. Assess compliance program, including corporate communications.
10. Obtain input from Legal, Compliance, Board, and Internal Audit on compliance issues.
Friday, August 28, 2009
Deal with Human Component As Security Threat
Control the use of portable devices on the network
Trust employees, but not too much
Monitor network activity and audit who is doing what
Watch out for curious pokers into network and data security configurations
Determine your single point of failure
Physical security--no compensating controls here.
Wednesday, August 26, 2009
Audit Vulnerability
- Get raw info from people in crucial information flow areas.
- Get beyond surface concerns, and get to the real worries.
- Analyze information for gaps and inconsistencies,
- Determine where weakest links are
- Develop potential threats and their impacts list
- Communicate findings with change recommendations
- Focus on most likely threats and risks
Frequent QAR Findings In Internal Audit Departments
- Internal Audit Charter does not exist, is out of date, or not appropriate for the organization
- No on-going formal, consistent, self-assessments
- Limited input to the corporate governance and IT governance process and compliance assurance
- Hazy or improper reporting lines
- Too technically oriented IT audits, missing overall control framework contexts
- No effective continuing education opportunities and skills development
- Poor time tracking and remediation follow ups
- Lack of adequate formal audit planning and soliciting management's input on key risks
- Poor audit planning and approval documentation
Friday, August 21, 2009
Social Audit of Public Companies
2. Determine your culture's social and human focus initiatives and priorities
3. Link social obligations to corporate mission, culture, and responsibilities
4. Assess what problems you may be facing on a social audit-what you control, what don't
5. Determine the framework and methodology to use for audit
6. Determine the framework and methodology to use for comparison to actual practices.
7. Conclude on "integrated audit" Integrated here means key issues and peripheral concerns.
Friday, August 7, 2009
Total Risk Management Program
Specify boundary conditions and data input needed for predictive analysis
Select time scope for evaluation, and conditions to be measured
Establish an acceptable results range, and what is outside of it
List relevant predictors for the condition tested
Determine the cause for the risk condition
Measure conditions identify, and attempt to determine any value associated with it
Decide on the risk response to identified risk condition
Evaluate your "risk margin" and what risk to transfer
Choose between lowering threats (risks) and potential opportunities foregone.
Don't forget to have fun, while doing this.
Security When Facing Reduction In Force
- Check access and system logs often
- Secure weak spots, like "back door" facilities
- Inspect physical access controls, wake them up if you have to
- Examine existing change controls
- Timely remove asset access
- Inventory IT assets and track equipment returns
- Activate available audit trail recording features
Internal Risk Management
“Insider Threat” = Risk of actions of an Insider
Malicious Insider = Current or former employees or contractors who:
–intentionally exceeded or misused an authorized level of access to networks, systems or data,
and;
–affected the security of the organizations’ data, systems, or daily business operations
FMS Financial Management System
a. Collect, process, maintain, transmit, and report data about financial transactions
b. Support financial planning and budgeting
c. Store cost information
d. Aid in financial statement preparation
It is usually integrated with the main corporate application, or a module within it. If separate vendor used, it talks to main apps through some middle ware.
Thursday, August 6, 2009
Internal Audit Bread and Butter Issues
Strategic Management - map to corporate objectives
Decision Making - your employees can help with the budget
Executive Compensation - tax increases are coming?
Risk - fraud risk; risk management process
Analytics - the audit x-ray machine
Control Environment - stake claim to this turf
Automation - would be nice if it existed; now, just faster bicycles
IT Security - BCP, BRP, etc, etc...
Sunday, August 2, 2009
New Audit Tool - Free - Get It
The Dispute Finder Firefox Extension highlights disputed claims on web pages you browse and shows you evidence for alternative points of view. Watch the Videos to learn more.
Use this web interface to tell Dispute Finder what snippets to highlight and what evidence to present for alternative viewpoints. You can create a new disputed claim, mark new instances of a claim on the web, and add evidence that supports or opposes a claim.
http://disputefinder.cs.berkeley.edu/
Whatever you are evaluating, get the opposite opinion. This just came out, and they are planning additional upgrades
Tuesday, June 2, 2009
Thursday, May 28, 2009
Friday, May 8, 2009
PPF Professional Practice Framework from IIA
Provide a framework for performing and promoting a broad range of value-added internal audit activities;
Establish the basis for the evaluation of internal audit performance; and
Foster improved organizational processes and operations.
Internal Auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization operations. It helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes.
Principles Internal auditors are expected to apply and uphold the following principles:
Integrity The integrity of internal auditors establishes trust and thus provides the basis for reliance on their judgment.
Objectivity Internal auditors exhibit the highest level of professional objectivity in gathering, evaluating, and communicating information about the activity or process being examined. Internal auditors make a balanced assessment of all the relevant circumstances and are not unduly influenced by their own interests or by others in forming judgments.
Confidentiality Internal auditors respect the value and ownership of information they receive and do not disclose information without appropriate authority unless there is a legal or professional obligation to do so.
Competency Internal auditors apply the knowledge, skills, and experience needed in the performance of internal auditing services.
Wednesday, May 6, 2009
End Of Audit Tips
When exceptions are detailed, determine remediation deliverables.
Examine in detail the audit report in a timely manner.
Ask for input when implementing changes
Communicate remediation target dates. The corrective action deadlines may vary depending on the severity of the noncompliance.
Ask for feedback on how the level of support provided to auditors
Monday, May 4, 2009
How To Help Auditors
Avoid being judgmental.
Follow all documented and required procedures.
Make sure that you understand the purpose of the audit.
Ask questions or discuss compliance problems, if attention required.
Be flexible - any potential problem not within the scope of the audit - evaluate the potential risks of the problem if left unaddressed.
Communicate with the auditor as often is needed.
Saturday, May 2, 2009
Audit Survival Tactics
Do your own pre-audit. Use internal audit program. Look for accountability from management to assure that all issues found during your internal audit are corrected using good “root-cause” corrective actions.
Use the same checklists or requirements that auditors may use
List previous findings. Examine findings from all your previous audits. Make sure everything which was found previously has ceased to be a problem.
Make sure everyone in your area knows the appropriate procedures.
Provide documented objective proof for compliance to your policies and procedures.
Friday, May 1, 2009
Tips Before an Audit
• Check the scope, area focus, frequency, resources, both IT and internal.
• Communicate your audit plans.
• Just what is the objective? Be it regulatory compliance, QA, adherence to policies?
• Share audit plans, purposes, and scope of the audits with audit staff.
• Determine what standards, policies, and procedures will be used for comparisons.
• Document in detail what documentation and reports you will use
• Have a wonderful and exciting opening meeting with the auditees.
Thursday, April 30, 2009
PCI Security Milestones
· Milestone One: If you don’t need it, don’t store it
· Milestone Two: Secure the perimeter
· Milestone Three: Secure applications
· Milestone Four: Monitor and control access to your systems
· Milestone Five: Protect stored cardholder data
· Milestone Six: Finalize remaining compliance efforts, and ensure all controls are in place
Thursday, April 23, 2009
PCI Compliance Standards
Build and Maintain a Secure Network
Requirement 1: Install and maintain a firewall configuration to protect cardholder data
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
Protect Cardholder Data
Requirement 3: Protect stored cardholder data
Requirement 4: Encrypt transmission of cardholder data across open, public networks
Maintain a Vulnerability Management Program
Requirement 5: Use and regularly update anti-virus software
Requirement 6: Develop and maintain secure systems and applications
Implement Strong Access Control Measures
Requirement 7: Restrict access to cardholder data by business need-to-know
Requirement 8: Assign a unique ID to each person with computer access
Requirement 9: Restrict physical access to cardholder data
Regularly Monitor and Test Networks
Requirement 10: Track and monitor all access to network resources and cardholder data
Requirement 11: Regularly test security systems and processes
Maintain an Information Security Policy
Requirement 12: Maintain a policy that addresses information security
Wednesday, April 22, 2009
IT Security Matrix for Compliance
Use clear, green, yellow, and red to identify which layers/control types meet completely, partially, or not meet the control requirements on top. The deliverable will be a control assessment.
In some cases, two or more controls may provide a partial protection individually, but together may meet fully the control requirements.
Check to see if there are unnecessary controls, and analyze to identify where a single layer may address a control cluster.
Tuesday, April 21, 2009
Audit TCP/IP Infrastructure
•Analyze network diagrams (layer 1 & 2), design, and walk-through, list of network equipment and IP address list
•Verify diagrams with Ping and Trace Route
•Review utilization, trouble reports and help desk procedures
•Probe systems using scanning tools
•Verify network vendor oversight, user support, and network technicians services
•Review software settings on network equipment
•Inspect computer room and network locations
•Evaluate back-up and operational procedures
Monday, April 20, 2009
WLAN and Wireless Compliance
http://www.fcc.gov/oet/info/rules/part15/part15-91905.pdf
It covers various emission guidelines and regulations, focusing on unlicensed transmissions, such as low-power broadcasting. The 802.11x Wireless LAN (e.g. "Wi-Fi") 2.4 GHz, 5 GHz (U-NII) is under this regulation.
Include compliance requirements as appropriate in your WLAN and wireless compliance reviews, recommendations, and proposed documented policies, procedures, or internal standards.
Third-party BCP Impact Audit Scope
Defined cut over procedures
Risks to shared facilities and overall availability
Data backups and storage
Hardware and applications availability
Access security controls
Facility and environmental controls
Time frames for acceptable off site processing
Sunday, April 19, 2009
Security and Audit - Improve The Relatioship
Good controls should be part of the process, not after thought insertions. They address compliance requirements and enhance security. Monitor through metrics.
Design and implement best practices that fit your infrastructure; then, track through measurable performance metrics.
Be prepared to prove your assessment of the effectiveness of controls framework and mitigating factors.
Saturday, April 18, 2009
Audit Healthcare Provider Fraud Schemes
Documenting non-covered treatments as covered
Recording diagnosis and treatments based on what is covered
Performing more care than necessary
Coding for high pay than was performed
Misstating services performed
Pretending to be a health care worker to bill
Un-bundling services and coding
Thursday, April 16, 2009
Guess What's On Your Hard Drive
Internet Browser History Files
Temporary Internet Files
Automatic Backup Files
Power Saver Functions
Data about your data files
Unique Identifiers
Virtual Memory and Swap Files
Temporary Files
Spooled Files
Plenty of data for forensics and privacy issues
Internal Audit Essential Objectives
Adopt auditing appropriately to the environment
Upgrade audit skills inventory for effective performance
Wednesday, April 15, 2009
What Corporations Want from Internal Auditors
Input in risk mitigation
Efficient and effective periodic internal control assessments
Value-added improvements in processes and error reductions
Help with cost reductions
Providing appropriate assistance in achieving compliance
Assistance in fraud prevention, detection, and evaluations
Help with financial statement assurance
Tuesday, April 14, 2009
Mistakes Responding to Auditors
Not fully understanding the scope and implications of auditor inquiries
Forwarding documents to auditors with obvious errors
Responding with the wrong policy or procedure documents
Being distracted or confused by auditor's multiple requests
Not providing relevant info due to elimination of areas that are applicable to a request
Not having detail knowledge of the specific test area, and not asking for appropriate help
Attempting to respond to auditors by guessing or using intuition
IFRS Impact on Audit
Determine whether proposed internal control changes are aligned with the identified gaps.
Review current policies and documented processes to assess alignment
Analyze whether information gathering processes will support the new data requirements
Evaluate any workarounds to meet compliance requirements, resulting from lack of adequate information system integration of data collection processes
Review transition plans for risks and adequacy of testing
Determine whether adequate backup plans exist, and how backward compatibility will be maintained (this could be the sticky one)
Current Compliance Challenges
Developing coherent compliance strategies and policies becomes a challenge because of the diversity of regulations and potential conflicts among these regulations in different markets.
This creates a form a risk for corporations attempting to develop efficient and effective strategies to meet their obligations.
Friday, April 10, 2009
Improve Internal Audits
Envision potential value of recommendations, to ensure that higher-value areas are covered
Define audit objectives in detail to avoid over-extending resources
Use established formats for every audit process step to slow the flurry of emails
Risk assessments should use process owners input
Audit tools are fine as long as auditors understand what is obtained and tools limitations
Not only false positives are audit tool problems, but are things fine if no exceptions show up?
Audit findings should be meaningful, not just enough to fill up a report
Just What Is Internal Auditing?
“Internal auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization's operations.
It helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes.”*
* The International Standards for the Professional Practice of Internal Auditing
promulgated by the Institute of Internal Auditors
Thursday, April 9, 2009
Develop High-Performance Audit Teams
2. Let everyone in on what's going on. When changes happen, no one will be surprised. Ask for help and input when struggling with your decisions. Everyone appreciates the opportunity to add insight to important decisions. Hey, it also helps to build consensus.
3. Focus on obstacles and objectives. Not everything turns out as planned, but great teams shine by how they adjust to unforeseen changes.
4. Relax, you don't need to know everything. Let everyone share their experience and provide facts, analysis, and recommendations.
5. Get to know them and their goals, interests, and passions. For one thing, you will be able to connect what needs to be done to those persons and interests, and increase effectiveness and efficiency.
Wednesday, April 8, 2009
Fastrack BCP Steps
2. Know your data and ensure that it is protected, testing to ensure compatibility of restores
3. Check the UPS choices for your key servers, networks, ensuring that essential apps will be up
4. Document all, including your testing and changes to underlying process support
5. Develop communication duplications, assuming that what you rely on will fail
6. Be able to provide management with choices and costs, to permit right timely decisions
Tuesday, April 7, 2009
Audit Team Effectiveness Criteria
- Results that match goals and objectives
- Employing effectively available resources
- Developing cooperative relationships that enhance conflict resolution
- Bringing new insights and finding improved methods
- Developing appropriate team roles and responsibilities
- Ability to handle various organizational levels and interpersonal challenges
- Group effectiveness in decision-making and responding to unforeseen developments
- Being seen as providing added-value leadership on key issues
- Adherence to established internal audit processes
Monday, April 6, 2009
Computer Forensics Can Do
2. Who created/edited/deleted what and when
3. What documents were copied, and to what device
4. What was the content of communication between employees and outsiders
5. What other out of policy acts were attempted by the use of information systems
Saturday, April 4, 2009
Privacy Compliance
Privacy policies, if in place, have to encompass various requirements like PII, some of which seem almost contradictory. Generally, privacy is the safeguarding of information that can be identified with a person. The right to privacy implies ownership rights to one's own personal data.
For organizations, the concern is how to define, protect, and respond to privacy issues. Thus, auditors need to determine whether privacy-related information handling meets various privacy requirements.
A good starting point is to examine the current privacy statements, especially those sent to customers, and trace back to ensure that what is promised is adequately covered by policies, procedures, and actual practices. It will help to avoid potential false and deceptive business practices issues arising from not actually performing what has been promised to customers.
Friday, April 3, 2009
Comply While Centralizing Information and Data
Know your data and its location Map data and applications that handle it. Make sure you identify owners as data moves across applications.
Examine security for your and vendor-kept data Check third-party vendor contract for security specifications, and verify access over in-house data
When putting all your data in a single basket, watch the power flowing to it Examine potential and protection against any power disruptions
Monitor Activity Look at vendor performance reports and your own data stats. Compare it to the agreed service levels, and trace back to service levels to vendor contracts, determining if contracts adequately address performance.
Above all, have fun.
Thursday, April 2, 2009
How Not to Misunderstand an Auditor
Understand the question in terms of the applicable context.
Get a clear idea on what is to be delivered-the deliverable.
Provide only the appropriate documentation.
Check for errors on all documents provided, and keep a list of what was given.
Avoid being distracted by multiple requests when completing a specific request.
Don't overlook appropriate and relevant information.
If you don't understand what to provide, ask those who know more details.
Pay attention to the wording of requests, leaving intuition for picking lotto numbers.
Wednesday, April 1, 2009
Policy & Procedure Tactics
1. Baseline Policies: Review existing policies, creating an initial list of baseline compliance policies that will be maintained.
2. Issue-Specific Policies: See if there is a need to create any new issue-specific policies.
3. Existing Non-Compliance Policies: Which existing noncompliance policies should be reviewed for compliance with legal people?
4. Annual Policy Review: Each year review all compliance policies and procedures and determine whether any of the policies require revisions or updates.
Prepare the first draft of baseline and issue-specific compliance policies and procedures, as well as revisions to existing policies. Then, submit the first draft of the policies for appropriate approval. Next, get feedback on any draft policy via redlined draft or comments within a week of receipt of the draft. Get the right approval group to review and authorize the revisions
Tuesday, March 31, 2009
Surviving Stress of Organizational Change
As companies have to change, make your own adjustments to stay relevant
Whatever is going on, it is the reality, so decide to move on
Look how pressures and priorities have changed, so play by the new rules
Align with organization that changes even if painfully, low-stress entities give short-term comfort, but may not survive
Some things are well beyond personal control, so no use trying to affect something you cannot
When deciding on personal change, keep up the needed pace, so as not to lag behind
Reengineer what is under your scope, to meet current or new goals, eliminating the rest
Increase pace to maximize your personal productivity
Forget spending time worrying; be productive today and create your own future today
Make sure that you take on only as much as you can handle
Develop desire, passion, and love for your job, and stay romantically involved. Much of your life is spent there.
Find new assignments where you can grow, don’t just stay in your limited comfort zone
Life would be unbearably boring if you knew how everything ends. Enjoy uncertainty and instability, as they give the spice to life.
Organizations have to answer to many stakeholders, so they may not be able to look out for you as much we all hope.
How To Talk To Auditors
When interacting with the auditors in a professional manner, you project to audit teams that its function is respected and supported.
Expect professional interaction from the audit team and push back whenever there is an exception to this practice.
To contribute to a successful and accurate audit report, be receptive to auditor observations and the audit team’s recommendations.
Be firm when discussing anything they see as incorrect, in order to ensure there are no misunderstandings.
Keep in mind that you, and not the auditors, are responsible for defining and implementing solutions to issues found in the audit. Everyone will benefit from a cooperative, collaborative audit process that respects the independence and discretion of all participants.
Of course, auditors should listen to process management. And for its part, process management should encourage staff to be open and honest with auditors.
Monday, March 30, 2009
Corporate Compliance Goals Include:
Monitor the strengths and weaknesses of the documentation processes followed for all operations, and develop means to prevent and detect any improper acts or practices.
Develop a culture promoting prevention, detection, and resolution of exceptions that do not conform to federal and state law and public and private requirements.
Show and communicate the commitment to the compliance process.
Provide a centeral place for information and guidance on relevant federal and state statutes, regulations, and other requirements.
Let everyone know that they should report non-compliance issues, and consequences when not complying.
Develop mechanisms for handling any regulatory investigation or audit.
Record of all due diligence taken to comply with all regulations, rules, as well as interla policies.
How Vague or Transparent Auditors Should Be?
Being vague or diplomatic enhances relationships long after audit findings are remediated. As a leader, an auditor facing hard facts about lack of compliance may need to communicate the causes of low-level of performance. This can reframe any problem into a more pessimistic and less remediation-oriented focus.
An auditor being a leader has to balance the need for productive relations within an organization and frank assessments of condidtions. The concern is, of course, that by the way exceptions are framed, an auditor may be creating a self-fulfilling prophecy, positive or negative one.
What are your thoughts or experiences regarding this?
Sunday, March 29, 2009
Auditors Favorite Laws & More
- If you are looking for more than one thing, you'll find the most important one last.
- You will always get all the credit for the dumb audit finding or recommendation.
- When things are going right, you won't notice errors, so listen carefully to thoese being audited
- You only don't understand what you are auditing if you admit it.
- The glass is always full, half with water and half with air.
- You can't reason with Operations people who used to be auditors.
- Every audit finding is replaceable with a bigger finding.
- Whenever you make a finding, you will always find much more that needs to be fixed.
- The probability that you find something wrong is directly proportional to the square of the amount of inconvenience it can cause you during the exit conference.
- No degree of acceptance of audit findings can equal actual remediation of issues
- If things really look good, watch out, there is polyester over your eyes.
IF YOU ARE NOT ALWAYS CONFUSED, YOU ARE NOT IN TOUCH WITH REALITY
So stay confused, it's more fun that way.
Risk Assessment? What's Your Framework?
- Company culture
- Corporate objectives and strategies
- Level of complexity of organizational processes, as they will be analyzed
- Competitive fit for the entity and availability of resources
- Entity units chart, to ascertain level of organizational complexities
- Key processes, transaction types, way of measuring business activities
- Hungry? What's your risk appetite and risk tolerance?
- So, do you have skills and staff and time to get it all done? Congratulations.
Let me know how it turns out.
(the answer is ERM COSO and CobiT, but you knew that)
Become Audit Proof
- ID key business processes, as these are the skills your organization sells
- Protect your key business processes through BCP/DR
- Verify and document process changes
- Risk map your processes and verify that your key controls actually are the key controls
- Consider automating processes to eliminate risks, without causing new weaknesses
- Identify sensitive data, checking for Personally Identifiable Information (PII)
- What will you do when customer data is lost or stolen? Have a detailed plan.
- Document your areas of process owneship to avoid misunderstandings of responsibilities
- Above all, attempt to work together with auditors, enjoying the helpful consultative review.
- Remember that auditors really are to help and advise.
- Auditors want to add value just like everyone else.
Saturday, March 28, 2009
Why Auditors Make Mistakes?
- Premature stopping of fact gathering and diagnosis
- Relying too much on first impressions
- Relying too much on pattern recognition, especially if it looks like something from the past
- Human tendency to favor negative conclusions or rely on stereotypes to make decisions
- Defining conditions inaccurately because of biases or preconceptions
- Being influenced by others' opinions or analysis
- Judging based on easily recallected data
- Going with the gut, and not the systematic problem analysis
Data Management Notes
If you have paper and electronic, you need to keep the source—electronic. But, if you write anything on the paper, then the paper report becomes a unique document, so you must keep it.
MS Access DB may have to be provided, BUT ALSO reports may have to be run and provided, as these reports may use computations and data combinations, which makes them unique.
MS Excel spreadsheets also give formula information, unlike a paper report from it.
Encryption has to be selective. One company used a single encryption key and had to share that key, which allowed reading all their data, not just what was asked for.
A company must show that it exerted complete control over held documents, by showing restrictions to access, so that the data was not changed.
Data on portable devices is a problem. Get it off these gizmos.
For those people who have hold documents, put RED FLAGS, so that if they try to get a new PC, laptop, that the data on the old one is not destroyed or compromised.
Have documented, enforced, and monitored rules regarding email access and downloading You may end up searching for hold documents on numerous portable devices.
eDiscovery Insights
-Seek clarifications and monitoring feedback to ensure staying on proper track.
-Review ops to see what info sec processes can be used for a eDiscovery response program.
-Stay proactive. Develop the capabilities, have processes in place.
-Companies are defaulting to other party as they cannot provide info, usually within 30 days.
-Have not found specific legal requirement on the manner of preserving business documents.
-Look at Rules of Evidence and Discovery in the Federal Rules of Civil Procedures. Fun Read
-ISSUE: Retention of Records
-ISSUE: Back up of Files (BCP) Do not rely on tapes for storage of hold documents.
-Tapes—the problem is that you don’t where on the tape the info can be. Can be costly to find out
-For tapes from years back, must have backward capability to restore the system to the state that existed when the tape was created, to be able to read it without affecting it.
- DEFINE the DATA to be held. All further work will depend on that definition. Make sure it is not easily misinterpreted. Do not get more or you risk fishing expeditions.
- There could be multiple litigation holds on the same data that can extend its hold for years.
Data Breach Handling Considerations
- Have data classification schemes and use them, know what data you have.
- Must make sure that policies and procedures are actually followed.
- Secure “essentials” first, then move on to “excellent” security practices
- Secure partner connections. Many break-ins start with sub-sub-sub vendors.
- Create data retention plan, detailing how long to keep data.
- Have a plan to respond to data breaches, a breach incident response plan
- Conduct mock incident testing, even if only desk testing
- Put firewalls WITHIN the organization between divisions
- Stop communication of sensitive data through establishment of data zones.
- Monitor Event Logs
- Don’t rely on standards.
All the big names that got customer data stolen (we heard about from newspapers) were all PCI compliant.