Tuesday, August 21, 2012
On the lighter side
How do cannibal auditors honor their clients? They toast them.
What do you call an accountant with an opinion? An auditor
What did the auditor do at a vampire convention? Count Dracula
How expensive is cannibal auditor's consulting? They charge an arm and a leg.
How can you cook the books without burning down the office?
Why auditors appears so reserved? They have strong internal controls.
What does accountant do hitting the mid-life crisis? Gets a faster calculator.
Friday, August 17, 2012
Effective Motivation for Increased Productivity
- You can attempt to get blood out of a stone.
- You can attempt to motivate a stone to give blood.
- You can empower a stone to motivate itself to give blood.
- You can inspire a stone to empower itself to motivate itself to give blood.
- You can embolden a stone to inspire itself to empower itself to motivate itself to give blood.
- You can ennoble a stone to embolden itself to inspire itself to empower itself to motivate itself to give blood.
Characteristics of Processes
Wednesday, August 15, 2012
Estimating Costs of Automated Controls
Tuesday, August 14, 2012
Major IT Governance Areas
Monday, August 13, 2012
Goals of Process Improvement
Friday, August 10, 2012
Governance Process Principles
Thursday, August 9, 2012
Politics of Cost Cutting
Wednesday, August 8, 2012
Risk Treatment
Tuesday, August 7, 2012
Improving Judgment
Monday, August 6, 2012
Avoiding Drift from Established Procedures
- Perform detailed after-action reviews to improve processes.
- Foster a climate of open and candid dialogue.
- Focus on information “handed off” from one unit of the IT to another.
- Challenge silo thinking and work out inter-unit rivalries.
- Support transparency in the IT organizational units and systems.
- Avoid duck-tape approaches to small problems. Small problems may hide large ones.
Sunday, August 5, 2012
Change Strategy in Complex Systems
2. Inappropriate Starts = No Project Plan
3. Frustration = Lack of Resources
4. Slow change = Lack of Incentives
5. Errors Made = Lack of Skills
6. Confusion = Lack of Mission or vision
Saturday, August 4, 2012
Risk Factors in Complex Systems
- Inter-dependency among system components
- Connectedness of a each component to the number of other components of a system
- Diversity exists where different software packages perform same function (not good thing)
- Adaptation through fixes and upgrades allowing the system to handle new conditions
Risk Categories
Key Risk Governance Concepts
Wednesday, September 7, 2011
Monday, September 5, 2011
Monday, August 1, 2011
E-Governance
Why IT Governance
2. Rewards based on singular program accomplishments, without the broader strategic focus.
3. Lack of delivery strategies across program boundaries
4. Increased user pressure from cloud/internet functionality and ease of use expectations
5. Drive for a cost-efficient single, common service and delivery interface in meeting user needs
Information Technology Governance
It combines accountability with the assignment of decision-making responsibilities. Governance includes cross-level communications about processes and key IT investments. When fully employed, IT governance is aligned with business governance. Its key components include collaboration, modular and incremental development and implementation of strategic and tactical initiatives.
Wednesday, April 13, 2011
Dodd-Frank Act for Banks
• Abolishes the Office of Thrift Supervision:
• Stronger lending limits
• Improves supervision of holding company subsidiaries
• Intermediate Holding Companies
• Interest on business checking
• Charter Conversions
• New Offices of Minority and Women Inclusion at the fed financial agencies
Dodd-Frank Act for Extraction Industry
TRANSPARENCY FOR EXTRACTION INDUSTRY
Tuesday, April 12, 2011
Dodd-Frank Act
- Ends Too Big to Fail Bailouts
- Advance Warning Systems
- Transparency & Accountability for Exotic Instruments
- Executive Compensation and Corporate Governance
- Protects Investors
- Enforces Regulations on the Books
Saturday, February 26, 2011
Six Sigma Internal Audit
Friday, February 25, 2011
Key Sox Compliance Items
Develop action plans for ongoing maintenance and monitoring of internal controls in accordance policies and regulatory requirements, including the Sarbanes-Oxley Act.
Identify and implement internal controls process improvements
Recommend and implement process improvement solutions, including tools which enable these solutions.
Implement the Sarbanes-Oxley testing and evaluation plan and develop the ongoing procedures for maintenance and testing of company controls.
Provide metrics that measure effectiveness these of initiatives.
Ensure that all compliance and process improvement activities follow the appropriate change management, governance, and documentation requirements.
Conduct walk through(s) of processes and develop control guidance documentation and training materials.
Friday, January 28, 2011
Understand Information Systems Relevant to the Audit
• The nature and type of records and source documents
• The processing involved from the initiation of transactions to their final processing, including the nature of computer files and the manner in which they are accessed, updated, and deleted
• For financial audits, the process used to prepare the entity's financial statements and budget information, including significant accounting estimates, disclosures, and computerized processing.
FISCAM Federal Information System Controls Audit Manual Approach
Evaluation of entity-wide controls and their effect on audit risk.
Evaluation of general controls and their pervasive impact on business process application controls.
Evaluation of security management at all levels (entitywide, system, and business process application levels).
A control hierarchy (control categories, critical elements, and control activities) to assist in evaluating the significance of identified IS control weaknesses
Groupings of control categories consistent with the nature of the risk.
Experience gained in GAO’s performance and review of IS control audits, including field testing the concepts in this revised FISCAM.
Document Network Architecture
● firewalls, routers, and switches
● intrusion detection or prevention systems
● critical systems, such as Web and mail systems, file transfer systems, etc.
● network management systems
● connections to inter- and intra-agency sites
● connections to other external organizations
● remote access—virtual private network and dial-in
● wireless connections.
Plan the Information System Controls Audit
● Obtain an understanding of an entity and its operations and key business processes
● Obtain a general understanding of the structure of the entity’s networks
● Identify key areas of audit interest (files, applications, systems, locations)
● Assess IS risk on a preliminary basis
● Identify critical control points (for example, external access points to networks)
● Obtain a preliminary understanding of IS controls
● Perform other audit planning procedures
Tuesday, June 22, 2010
Thursday, May 13, 2010
How to delete Facebook Account
http://www.wikihow.com/Permanently-Delete-a-Facebook-Account
Someone posted 10 reasons that you won't be able to delete your Facebook account. Here is the link
http://www.businessinsider.com/10-reasons-youll-never-quit-facebook-even-if-you-think-you-want-to-2010-5#youre-not-going-to-go-back-to-waiting-an-hour-to-send-an-email-to-30-people-with-40-photos-attached-1
There is one reason that may override others: Employability and Marketability. Hey, it's just your life on the Internet. Enjoy the ride, no matter what you decide.
Thursday, April 29, 2010
OFAC Compliance - Not as Easy as it Appears
OFAC compliance is tricky as:
1. Rules and customs vary from country to country, confusing companies entering global operations without adequate requirements preparation.
2. OFAC rules, along with the names on the SDN list, change often;
3. Third-party service providers and their own vendors may end up dealing with those OFAC prohibits.
Sunday, December 6, 2009
Internet Security Standards Setting Bodies
International Telecommunications Union (ITU) X.273, Open Systems Network Layer Security, and X.509, Authetication Framework
International Standards Organization (ISO) ISO 17799
Institute of Electrical and Electronic Engineers (IEEE)
European Computer Manufacturers Association
Sunday, October 18, 2009
Business Lunch Tips for Auditors
Friday, October 16, 2009
Cut Your Public Audit Bill
Wednesday, October 14, 2009
Why Travel on Audits Light
#10:
Nobody can steal your luggage
#9:
Be more independent
#8: Extra time to get to the airport
#7:
Volunteer to be bumped, as no worry about luggage coming on the same flight
#6:
Catch public transportation, as no suitcases to roll around among lots of
people
#5: Don’t wait for getting luggage
#4: Avoid tipping
#3: Be environmental, as fewer luggage means less
weight to lift
#2: Avoid fees
#1:
“Lost Luggage
Friday, September 25, 2009
Photo Evidence Audit
- Document title
- Description
- Description writer
- Author
- Title
- Style
- Key Words
Tuesday, September 15, 2009
Lava Lamp for Auditors
If you wish to remember some facts, try intensely to forget them.
Auditing skills promote full employment for auditors.
If you laid all your sampling tests end to end, would they reach a conclusion?
Get your facts first, then you can properly arrange them.
An audit is just a flurry of activity without a program.
Audit opinions are plenty, implementations can be expensive.
Sunday, September 13, 2009
Develop Your Own Voice as Auditor
Stope over-analyzing what everyone else thinks! You cannot please everyone, and you cannot live in your head only all the time.
Search and Find Your Own Reasons to help others by auditing.
Audit your own goals, attitudes, resentments by asking yourself every question in the "book."
Write down your own reasons for passion to be an auditor. When you write things down you automatically reflect, and remember all those written "to do" lists that did get done.
Don't just file it, do something, act on your reasons to be great at auditing.
Don't worry about the dead ends. Just back up and move forward.
Saturday, September 12, 2009
Achieve Happiness As Auditor - Yes You Can
2. Don't forget to keep around a few annoying friends. It will sharpen your skills in dealing with incompatible people, and help you function in the world with people not like you.
3. Texting is for thumb people. Studies show that over 40% of what you write in emails is misunderstood.
4. Online friends don't exits in 3D real world. Only 7% of inter-personal exchange takes place through words, the rest, a mere 93% is non-verbal. We know that we exist, and who we are by seeing ourselves in the mirrors of other people's eyes.
5. No real friends, no spontenous criticism, and we miss it. Non-direct forms of communication are a great way to avoid being honest, by having the time to choose and craft words. We need quirks, humiliations and vulnerabilities that only real friendships provide.
6. Media Negativity Does Affect Us. After constant negative spins on just about everything, we feel at odds with the rest of the world. Like Mark Twain said, turn off all the news, and be happy. Almost no news will really affect your life, and what does affect, you won't be able to change anyway.
7. We feel less because we have less (friends). All these on-line friends don't place demands on us. BUT, we were wired to help and take care of others. We are a product of social interactions, so we need to be connected in real life, not through flat-screen monitors. Find a way to do something simple, but physical to help someone else. It really works.
Saturday, September 5, 2009
Scoring Risks
- The adequacy of internal controls
- The potential threats from transactions
- History of problems with system or application
- IT Architecture and Data Classification - is there a match
- The physical and logical security of information, equipment, and premises
- The adequacy of operating management oversight and monitoring
- Human resources, including the experience of management and staff, turnover, technical competence, management’s succession plan, and the degree of delegation
- Senior management oversight and appropriate governance
Great New Email Functions
- Undo sent message
- Snooze this message
- Reply to selected text
- Smart reply templates
- Attachment reminders
- Language-based filtering
- Usage trending
- Related message search
Friday, September 4, 2009
5 Key IT Skills Worth Having
2. Java
3. Lisp
4. C/C++
5. Unix form O/S familiarity
Knowing syntax to be able to read would be helpful for some IT Auditors
Thursday, September 3, 2009
Sign Your Should Charge More in Consulting Fees
They have new jobs after you finish this one.
You work and still get poverty assistance
Hey, any catch with your quote for the job?
Here you go, I have enough cash on me to pay you.
You have no friends among consultants.
You are hired without even telling them how much you charge
As you can't get all the work done, you live on cola and pizza
You get jobs from overseas outsourcers
Measuring Fraud Drivers - Yes, It Can Be Done
Envy Total thefts (robbery, burglary, larceny, and grand theft auto) per capita.
Wrath Number of violent crimes (murder, assault, and rape) per capita.
Sloth Expenditures on art, entertainment, and recreation compared with employment.
Gluttony Number of fast-food restaurants per capita.
Lust Number of STD cases reported per capita.
Pride Aggregate of the other six offenses—because pride is the root of all sin.
Feel free to put add these measures into a dashboard.
Web site Content Hell
- hit counters
- guestbooks
- stale links
- pages forever under construction
- pointless vanity pages
- advertisements from hell
- no email address for feedback
- unstable extensions
- broken HTML
- blinking text
- gratuitous animation
- marquees
- garish backgrounds
- unreadable text/background combinations
- "Best viewed with..."
- pop-up windows
- menus made entirely from image maps
- background MIDI, Flash, Shockwave
Becoming a Hacker
2. Don't bother trying to solve a previously solved problem: no glory
3. Hate boredom and repetitive work?
4. Love freedom without borders?
5. Forget attitude, impress with competence.
6. Get a really cool shirt at the next Def Con in Las Vegas (usually in August)
Wednesday, September 2, 2009
Compliance Program Key Elements
Monday, August 31, 2009
Involving Right Deparments in Compliance Issues
Accounting Irregularities Audit Committee, External/Internal Auditors, Compliance
Fraud Internal Audit, Loss Prevention, Risk Management, Compliance/Ethics
Workplace Violence Security, Operations, Legal, HR
Employee Theft (other than by head-hunters) Loss Prevention, HR
ETHICS The Federal Sentencing Guidelines for Organizations
Written standards of ethical workplace conduct
Means for an employee to anonymously report violations of ethics standards
Orientation or training on ethical workplace conduct
A specific office, phone line, e-mail, or Web site so that emps can get ethics advice
Evaluation of ethical conduct as part of regular performance appraisals
Discipline for employees who commit ethics violations
Sunday, August 30, 2009
Compliance Committee Key Issues
2. Review reports on internal controls
3. Examine all external reporting
4. Read internal audit reports
5. Evaluate internal audit activities, budget, staffing, and responsibilities
6. Consider all inquiries from external sources (including governmental)
7. Deal with all related party transactions and conflict of interests
8. Update conduct and ethics statements
9. Assess compliance program, including corporate communications.
10. Obtain input from Legal, Compliance, Board, and Internal Audit on compliance issues.
Friday, August 28, 2009
Deal with Human Component As Security Threat
Control the use of portable devices on the network
Trust employees, but not too much
Monitor network activity and audit who is doing what
Watch out for curious pokers into network and data security configurations
Determine your single point of failure
Physical security--no compensating controls here.
Wednesday, August 26, 2009
Audit Vulnerability
- Get raw info from people in crucial information flow areas.
- Get beyond surface concerns, and get to the real worries.
- Analyze information for gaps and inconsistencies,
- Determine where weakest links are
- Develop potential threats and their impacts list
- Communicate findings with change recommendations
- Focus on most likely threats and risks
Frequent QAR Findings In Internal Audit Departments
- Internal Audit Charter does not exist, is out of date, or not appropriate for the organization
- No on-going formal, consistent, self-assessments
- Limited input to the corporate governance and IT governance process and compliance assurance
- Hazy or improper reporting lines
- Too technically oriented IT audits, missing overall control framework contexts
- No effective continuing education opportunities and skills development
- Poor time tracking and remediation follow ups
- Lack of adequate formal audit planning and soliciting management's input on key risks
- Poor audit planning and approval documentation
Friday, August 21, 2009
Social Audit of Public Companies
2. Determine your culture's social and human focus initiatives and priorities
3. Link social obligations to corporate mission, culture, and responsibilities
4. Assess what problems you may be facing on a social audit-what you control, what don't
5. Determine the framework and methodology to use for audit
6. Determine the framework and methodology to use for comparison to actual practices.
7. Conclude on "integrated audit" Integrated here means key issues and peripheral concerns.
Friday, August 7, 2009
Total Risk Management Program
Specify boundary conditions and data input needed for predictive analysis
Select time scope for evaluation, and conditions to be measured
Establish an acceptable results range, and what is outside of it
List relevant predictors for the condition tested
Determine the cause for the risk condition
Measure conditions identify, and attempt to determine any value associated with it
Decide on the risk response to identified risk condition
Evaluate your "risk margin" and what risk to transfer
Choose between lowering threats (risks) and potential opportunities foregone.
Don't forget to have fun, while doing this.
Security When Facing Reduction In Force
- Check access and system logs often
- Secure weak spots, like "back door" facilities
- Inspect physical access controls, wake them up if you have to
- Examine existing change controls
- Timely remove asset access
- Inventory IT assets and track equipment returns
- Activate available audit trail recording features
Internal Risk Management
“Insider Threat” = Risk of actions of an Insider
Malicious Insider = Current or former employees or contractors who:
–intentionally exceeded or misused an authorized level of access to networks, systems or data,
and;
–affected the security of the organizations’ data, systems, or daily business operations
FMS Financial Management System
a. Collect, process, maintain, transmit, and report data about financial transactions
b. Support financial planning and budgeting
c. Store cost information
d. Aid in financial statement preparation
It is usually integrated with the main corporate application, or a module within it. If separate vendor used, it talks to main apps through some middle ware.
Thursday, August 6, 2009
Internal Audit Bread and Butter Issues
Strategic Management - map to corporate objectives
Decision Making - your employees can help with the budget
Executive Compensation - tax increases are coming?
Risk - fraud risk; risk management process
Analytics - the audit x-ray machine
Control Environment - stake claim to this turf
Automation - would be nice if it existed; now, just faster bicycles
IT Security - BCP, BRP, etc, etc...
Sunday, August 2, 2009
New Audit Tool - Free - Get It
The Dispute Finder Firefox Extension highlights disputed claims on web pages you browse and shows you evidence for alternative points of view. Watch the Videos to learn more.
Use this web interface to tell Dispute Finder what snippets to highlight and what evidence to present for alternative viewpoints. You can create a new disputed claim, mark new instances of a claim on the web, and add evidence that supports or opposes a claim.
http://disputefinder.cs.berkeley.edu/
Whatever you are evaluating, get the opposite opinion. This just came out, and they are planning additional upgrades
Tuesday, June 2, 2009
Thursday, May 28, 2009
Friday, May 8, 2009
PPF Professional Practice Framework from IIA
Provide a framework for performing and promoting a broad range of value-added internal audit activities;
Establish the basis for the evaluation of internal audit performance; and
Foster improved organizational processes and operations.
Internal Auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization operations. It helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes.
Principles Internal auditors are expected to apply and uphold the following principles:
Integrity The integrity of internal auditors establishes trust and thus provides the basis for reliance on their judgment.
Objectivity Internal auditors exhibit the highest level of professional objectivity in gathering, evaluating, and communicating information about the activity or process being examined. Internal auditors make a balanced assessment of all the relevant circumstances and are not unduly influenced by their own interests or by others in forming judgments.
Confidentiality Internal auditors respect the value and ownership of information they receive and do not disclose information without appropriate authority unless there is a legal or professional obligation to do so.
Competency Internal auditors apply the knowledge, skills, and experience needed in the performance of internal auditing services.
Wednesday, May 6, 2009
End Of Audit Tips
When exceptions are detailed, determine remediation deliverables.
Examine in detail the audit report in a timely manner.
Ask for input when implementing changes
Communicate remediation target dates. The corrective action deadlines may vary depending on the severity of the noncompliance.
Ask for feedback on how the level of support provided to auditors
Monday, May 4, 2009
How To Help Auditors
Avoid being judgmental.
Follow all documented and required procedures.
Make sure that you understand the purpose of the audit.
Ask questions or discuss compliance problems, if attention required.
Be flexible - any potential problem not within the scope of the audit - evaluate the potential risks of the problem if left unaddressed.
Communicate with the auditor as often is needed.
Saturday, May 2, 2009
Audit Survival Tactics
Do your own pre-audit. Use internal audit program. Look for accountability from management to assure that all issues found during your internal audit are corrected using good “root-cause” corrective actions.
Use the same checklists or requirements that auditors may use
List previous findings. Examine findings from all your previous audits. Make sure everything which was found previously has ceased to be a problem.
Make sure everyone in your area knows the appropriate procedures.
Provide documented objective proof for compliance to your policies and procedures.
Friday, May 1, 2009
Tips Before an Audit
• Check the scope, area focus, frequency, resources, both IT and internal.
• Communicate your audit plans.
• Just what is the objective? Be it regulatory compliance, QA, adherence to policies?
• Share audit plans, purposes, and scope of the audits with audit staff.
• Determine what standards, policies, and procedures will be used for comparisons.
• Document in detail what documentation and reports you will use
• Have a wonderful and exciting opening meeting with the auditees.
Thursday, April 30, 2009
PCI Security Milestones
· Milestone One: If you don’t need it, don’t store it
· Milestone Two: Secure the perimeter
· Milestone Three: Secure applications
· Milestone Four: Monitor and control access to your systems
· Milestone Five: Protect stored cardholder data
· Milestone Six: Finalize remaining compliance efforts, and ensure all controls are in place
Thursday, April 23, 2009
PCI Compliance Standards
Build and Maintain a Secure Network
Requirement 1: Install and maintain a firewall configuration to protect cardholder data
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
Protect Cardholder Data
Requirement 3: Protect stored cardholder data
Requirement 4: Encrypt transmission of cardholder data across open, public networks
Maintain a Vulnerability Management Program
Requirement 5: Use and regularly update anti-virus software
Requirement 6: Develop and maintain secure systems and applications
Implement Strong Access Control Measures
Requirement 7: Restrict access to cardholder data by business need-to-know
Requirement 8: Assign a unique ID to each person with computer access
Requirement 9: Restrict physical access to cardholder data
Regularly Monitor and Test Networks
Requirement 10: Track and monitor all access to network resources and cardholder data
Requirement 11: Regularly test security systems and processes
Maintain an Information Security Policy
Requirement 12: Maintain a policy that addresses information security
Wednesday, April 22, 2009
IT Security Matrix for Compliance
Use clear, green, yellow, and red to identify which layers/control types meet completely, partially, or not meet the control requirements on top. The deliverable will be a control assessment.
In some cases, two or more controls may provide a partial protection individually, but together may meet fully the control requirements.
Check to see if there are unnecessary controls, and analyze to identify where a single layer may address a control cluster.
Tuesday, April 21, 2009
Audit TCP/IP Infrastructure
•Analyze network diagrams (layer 1 & 2), design, and walk-through, list of network equipment and IP address list
•Verify diagrams with Ping and Trace Route
•Review utilization, trouble reports and help desk procedures
•Probe systems using scanning tools
•Verify network vendor oversight, user support, and network technicians services
•Review software settings on network equipment
•Inspect computer room and network locations
•Evaluate back-up and operational procedures
Monday, April 20, 2009
WLAN and Wireless Compliance
http://www.fcc.gov/oet/info/rules/part15/part15-91905.pdf
It covers various emission guidelines and regulations, focusing on unlicensed transmissions, such as low-power broadcasting. The 802.11x Wireless LAN (e.g. "Wi-Fi") 2.4 GHz, 5 GHz (U-NII) is under this regulation.
Include compliance requirements as appropriate in your WLAN and wireless compliance reviews, recommendations, and proposed documented policies, procedures, or internal standards.
Third-party BCP Impact Audit Scope
Defined cut over procedures
Risks to shared facilities and overall availability
Data backups and storage
Hardware and applications availability
Access security controls
Facility and environmental controls
Time frames for acceptable off site processing
Sunday, April 19, 2009
Security and Audit - Improve The Relatioship
Good controls should be part of the process, not after thought insertions. They address compliance requirements and enhance security. Monitor through metrics.
Design and implement best practices that fit your infrastructure; then, track through measurable performance metrics.
Be prepared to prove your assessment of the effectiveness of controls framework and mitigating factors.
Saturday, April 18, 2009
Audit Healthcare Provider Fraud Schemes
Documenting non-covered treatments as covered
Recording diagnosis and treatments based on what is covered
Performing more care than necessary
Coding for high pay than was performed
Misstating services performed
Pretending to be a health care worker to bill
Un-bundling services and coding
Thursday, April 16, 2009
Guess What's On Your Hard Drive
Internet Browser History Files
Temporary Internet Files
Automatic Backup Files
Power Saver Functions
Data about your data files
Unique Identifiers
Virtual Memory and Swap Files
Temporary Files
Spooled Files
Plenty of data for forensics and privacy issues
Internal Audit Essential Objectives
Adopt auditing appropriately to the environment
Upgrade audit skills inventory for effective performance
Wednesday, April 15, 2009
What Corporations Want from Internal Auditors
Input in risk mitigation
Efficient and effective periodic internal control assessments
Value-added improvements in processes and error reductions
Help with cost reductions
Providing appropriate assistance in achieving compliance
Assistance in fraud prevention, detection, and evaluations
Help with financial statement assurance
Tuesday, April 14, 2009
Mistakes Responding to Auditors
Not fully understanding the scope and implications of auditor inquiries
Forwarding documents to auditors with obvious errors
Responding with the wrong policy or procedure documents
Being distracted or confused by auditor's multiple requests
Not providing relevant info due to elimination of areas that are applicable to a request
Not having detail knowledge of the specific test area, and not asking for appropriate help
Attempting to respond to auditors by guessing or using intuition
IFRS Impact on Audit
Determine whether proposed internal control changes are aligned with the identified gaps.
Review current policies and documented processes to assess alignment
Analyze whether information gathering processes will support the new data requirements
Evaluate any workarounds to meet compliance requirements, resulting from lack of adequate information system integration of data collection processes
Review transition plans for risks and adequacy of testing
Determine whether adequate backup plans exist, and how backward compatibility will be maintained (this could be the sticky one)
Current Compliance Challenges
Developing coherent compliance strategies and policies becomes a challenge because of the diversity of regulations and potential conflicts among these regulations in different markets.
This creates a form a risk for corporations attempting to develop efficient and effective strategies to meet their obligations.
Friday, April 10, 2009
Improve Internal Audits
Envision potential value of recommendations, to ensure that higher-value areas are covered
Define audit objectives in detail to avoid over-extending resources
Use established formats for every audit process step to slow the flurry of emails
Risk assessments should use process owners input
Audit tools are fine as long as auditors understand what is obtained and tools limitations
Not only false positives are audit tool problems, but are things fine if no exceptions show up?
Audit findings should be meaningful, not just enough to fill up a report
Just What Is Internal Auditing?
“Internal auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization's operations.
It helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes.”*
* The International Standards for the Professional Practice of Internal Auditing
promulgated by the Institute of Internal Auditors
Thursday, April 9, 2009
Develop High-Performance Audit Teams
2. Let everyone in on what's going on. When changes happen, no one will be surprised. Ask for help and input when struggling with your decisions. Everyone appreciates the opportunity to add insight to important decisions. Hey, it also helps to build consensus.
3. Focus on obstacles and objectives. Not everything turns out as planned, but great teams shine by how they adjust to unforeseen changes.
4. Relax, you don't need to know everything. Let everyone share their experience and provide facts, analysis, and recommendations.
5. Get to know them and their goals, interests, and passions. For one thing, you will be able to connect what needs to be done to those persons and interests, and increase effectiveness and efficiency.
Wednesday, April 8, 2009
Fastrack BCP Steps
2. Know your data and ensure that it is protected, testing to ensure compatibility of restores
3. Check the UPS choices for your key servers, networks, ensuring that essential apps will be up
4. Document all, including your testing and changes to underlying process support
5. Develop communication duplications, assuming that what you rely on will fail
6. Be able to provide management with choices and costs, to permit right timely decisions
Tuesday, April 7, 2009
Audit Team Effectiveness Criteria
- Results that match goals and objectives
- Employing effectively available resources
- Developing cooperative relationships that enhance conflict resolution
- Bringing new insights and finding improved methods
- Developing appropriate team roles and responsibilities
- Ability to handle various organizational levels and interpersonal challenges
- Group effectiveness in decision-making and responding to unforeseen developments
- Being seen as providing added-value leadership on key issues
- Adherence to established internal audit processes
Monday, April 6, 2009
Computer Forensics Can Do
2. Who created/edited/deleted what and when
3. What documents were copied, and to what device
4. What was the content of communication between employees and outsiders
5. What other out of policy acts were attempted by the use of information systems
Saturday, April 4, 2009
Privacy Compliance
Privacy policies, if in place, have to encompass various requirements like PII, some of which seem almost contradictory. Generally, privacy is the safeguarding of information that can be identified with a person. The right to privacy implies ownership rights to one's own personal data.
For organizations, the concern is how to define, protect, and respond to privacy issues. Thus, auditors need to determine whether privacy-related information handling meets various privacy requirements.
A good starting point is to examine the current privacy statements, especially those sent to customers, and trace back to ensure that what is promised is adequately covered by policies, procedures, and actual practices. It will help to avoid potential false and deceptive business practices issues arising from not actually performing what has been promised to customers.
Friday, April 3, 2009
Comply While Centralizing Information and Data
Know your data and its location Map data and applications that handle it. Make sure you identify owners as data moves across applications.
Examine security for your and vendor-kept data Check third-party vendor contract for security specifications, and verify access over in-house data
When putting all your data in a single basket, watch the power flowing to it Examine potential and protection against any power disruptions
Monitor Activity Look at vendor performance reports and your own data stats. Compare it to the agreed service levels, and trace back to service levels to vendor contracts, determining if contracts adequately address performance.
Above all, have fun.
Thursday, April 2, 2009
How Not to Misunderstand an Auditor
Understand the question in terms of the applicable context.
Get a clear idea on what is to be delivered-the deliverable.
Provide only the appropriate documentation.
Check for errors on all documents provided, and keep a list of what was given.
Avoid being distracted by multiple requests when completing a specific request.
Don't overlook appropriate and relevant information.
If you don't understand what to provide, ask those who know more details.
Pay attention to the wording of requests, leaving intuition for picking lotto numbers.
Wednesday, April 1, 2009
Policy & Procedure Tactics
1. Baseline Policies: Review existing policies, creating an initial list of baseline compliance policies that will be maintained.
2. Issue-Specific Policies: See if there is a need to create any new issue-specific policies.
3. Existing Non-Compliance Policies: Which existing noncompliance policies should be reviewed for compliance with legal people?
4. Annual Policy Review: Each year review all compliance policies and procedures and determine whether any of the policies require revisions or updates.
Prepare the first draft of baseline and issue-specific compliance policies and procedures, as well as revisions to existing policies. Then, submit the first draft of the policies for appropriate approval. Next, get feedback on any draft policy via redlined draft or comments within a week of receipt of the draft. Get the right approval group to review and authorize the revisions