COSO Enterprise Risk Management
|
|
- Kenneth Austin
- 6 years ago
- Views:
Transcription
1
2
3 COSO Enterprise Risk Management
4
5 COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc.
6 Copyright # 2007, 2011 by John Wiley & Sons, Inc. All rights reserved. First edition 2007 Second edition 2011 Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. PMI and PMBOK are registered marks for the Project Management Institute, Inc. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) , fax (978) , or on the Web at Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) , fax (201) , or online at Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) , outside the United States at (317) or fax (317) Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our web site at Library of Congress Cataloging-in-Publication Data Moeller, Robert R COSO enterprise risk management : establishing effective governance, risk, and compliance processes / Robert R. Moeller. 2nd ed. p. cm. (Wiley corporate f&a ; 560) Includes index. ISBN (hardback); ISBN (ebk); ISBN (ebk); ISBN (ebk) 1. Risk management. I. Title. HD61.M dc Printed in the United States of America
7 To my wife and very best friend, Lois Moeller
8
9 Contents Preface xi Chapter 1: Introduction: Enterprise Risk Management Today 1 The COSO Internal Controls Framework: How Did We Get Here? 2 The COSO Internal Controls Framework 3 COSO Internal Controls: The Principal Recognized Internal Controls Standard 14 An Introduction to COSO ERM 14 Governance, Risk, and Compliance 15 Global Computer Products: Our Example Company 16 Chapter 2: Importance of Governance, Risk, and Compliance Principles 21 Road to Effective GRC Principles 22 Importance of GRC Governance 23 Risk Management Component of GRC 25 GRC and Enterprise Compliance 26 Importance of Effective GRC Practices and Principles 28 Chapter 3: Risk Management Fundamentals 31 Fundamentals: Risk Management Phases 32 Other Risk Assessment Techniques 45 Chapter 4: COSO ERM Framework 51 ERM Definitions and Objectives: A Portfolio View of Risk 51 COSO ERM Framework Model 55 Other Dimensions of the ERM Framework 86 Chapter 5: Implementing ERM in the Enterprise 89 Roles and Responsibilities of an Enterprise Risk Management Function 90 Risk Management Policies, Standards, and Strategies 100 Business, IT, and Risk Transfer Processes 105 Risk Management Reviews and Corrective Action Practices 108 ERM Communications Approaches 112 CRO and an Effective Enterprise Risk Management Function 113 vii
10 viii & Contents Chapter 6: Importance of Strong Enterprise Governance Practices 115 History and Background of Enterprise Governance: A U.S. Perspective 116 Enterprise Integrity and Ethical Behavior 119 Disclosure and Transparency 125 Rights and Equitable Treatment of Shareholders and Key Stakeholders 126 Governance Role and Responsibilities of the Board 128 Governance as a Key Element of GRC 128 Chapter 7: Enterprise Compliance Issues Today 131 Compliance Issues Today 132 Establish a Compliance Assessment Team 133 Compliance Risk Assessments and Compliance Program Reviews 136 Work Unit Level Compliance Tracking and Review Processes 138 Compliance-Related Procedures and Staff Education Programs 141 Enterprise Hotline Compliance and Whistleblower Support 142 Assessing the Overall Enterprise Compliance Program 144 Chapter 8: Integrating ERM with COSO Internal Controls 147 COSO Internal Controls Background and Earlier Legislation 147 Efforts Leading to the Treadway Commission 151 COSO Internal Controls Framework 156 COSO Internal Controls and COSO ERM: Compared 174 Chapter 9: Sarbanes-Oxley and Enterprise Risk Management Concerns 177 Sarbanes-Oxley Act Background 177 SOx Legislation Overview 179 Enterprise Risk Management and SOx Section 404 Reviews 193 Internal Controls Reporting and Materiality 198 PCAOB Risk-Based Auditing Standards 199 Sarbanes-Oxley: The Other Sections 200 SOx and COSO ERM 201 Chapter 10: Corporate Culture and Risk Portfolio Management 203 Whistleblower and Hotline Functions 204 Risk Portfolio Management 208 Integrated Enterprise-Wide Risk Management 211 Chapter 11: OCEG Capability Model GRC Standards 215 GRC Capability Model Red Book 215 Other OCEG Materials: The Burgundy Book 223 Level and Scope of the OCEG Standards-Setting Authority 224
11 Contents & ix Chapter 12: Importance of GRC Principles in the Board Room 225 Board Decisions and Risk Management 226 Board Organization and Governance Rules 230 Corporate Charters and the Board Committee Structure 231 Audit Committees and Managing Risks 235 Establishing a Board-Level Risk Committee 238 Audit and Risk Committee Coordination 244 COSO ERM and Corporate Governance 245 Chapter 13: Role of Internal Audit in Enterprise Risk Management 247 Internal Audit Standards for Evaluating Risk 248 COSO ERM for More Effective Internal Audit Planning 251 Risk-Based Internal Audit Findings and Recommendations 264 COSO ERM and Internal Audit 265 Chapter 14: Understanding Project Management Risks 267 Project Management Process 268 PMBOK 1 Guide: A Guide to the Project Management Book of Knowledge 269 PMBOK 1 Guide s Project Manager Risk Management Approach 272 Project-Related Risks: What Can Go Wrong 282 Implementing ERM for Project Managers 285 Chapter 15: Information Technology and Enterprise Risk Management 291 IT and the COSO ERM Framework 292 IT Application Systems Risks 294 Effective IT Continuity Planning 302 Worms, Viruses, and System Network Risks 307 IT and Effective ERM Processes 309 Chapter 16: Establishing an Effective GRC Culture throughout the Enterprise 311 First Steps to Establishing a GRC Culture: An Example 312 Promoting the Concept of Enterprise Risk 314 Establishing of Enterprise-Wide Governance Awareness 319 Enterprise Codes of Conduct 323 Building a GRC Culture: Risk, Governance, and Compliance Education Programs 326 Keeping the GRC Culture Current 327 Chapter 17: ISO and Risk Management Worldwide Standards 331 ISO Standards-Setting Process 332 Understanding ISO
12 x & Contents ISO 38500: The Corporate Governance of IT 337 Implementing an ISO Standard 340 Chapter 18: ERM and GRC Principles Going Forward 343 ERM and GRC for the Internal Controls Professional 344 COSO s Ongoing Support Role 347 COSO ERM and GRC Future Prospects 348 About the Author 351 Index 353
13 Preface RISK MANAGEMENT IS ONE of those concepts where many business professionals will agree that, Yes, we need a good risk management program! but those same professionals often have difficulty, when pressed for a better definition, explaining what they mean by the term risk management. Formany business professionals, this lack of a consistent understanding of risk management has been similar, until recently, to the earlier lack of a general understanding of the term internal controls. Going as far back as the 1950s in the United States, internal and external auditors as well as many business professionals talked about the importance of good internal controls, but there was no one widely accepted, consistent definition of what was meant by that expression. It was not until the early 1990s with the release of the COSO internal control framework that we have had a consistent and widely recognized definition of internal controls for all enterprises. Risk management has had a similar history of inconsistent and not always clearly understood definitions. Insurance enterprises had their own definitions of risk management while others, such as credit management, have had a whole different set of definitions and understandings. Project managers had been frequently asked to rate a proposed new effort as high, medium, or low risk without fully understanding the meaning of such a rating. Over past years and until the very recent present, many enterprises including for-profit entities, not-for-profits, or governmental agencies have not had a consistent definition of the meaning of risk management and what was necessary to establish an effective risk management structure or framework. To help with this definition problem, the COSO guidance setting entity 1 developed a risk management definition or framework definition called COSO Enterprise Risk Management or COSO ERM. This risk management framework, updated with COSO guidance and published in 2011, 2 provides a structure and set of definitions to allow enterprises of all types and sizes to understand and better manage their risk environments. Similar to our concerns about a better way to look at and understand risk management, enterprises have had similar needs to improve their enterprise governance practices and both regulatory and ethics compliance standards. Although there have always been issues, interests in better enterprise governance and compliance standards first became particularly important at the beginning of this century with the corporate fraud related failure of the high-flying corporation Enron. This led to the passage of the Sarbanes-Oxley Act (SOx) in the United States and a worldwide xi
14 xii & Preface interest in enterprise governance and compliance issues. These concerns became even more significant with the worldwide financial recession starting around While enterprise risk management is a major focus of this book, governance, risk, and compliance issues are all equally important. Using the initials for each, we frequently refer to these as GRC issues and standards. Enterprises need to build and launch effective GRC processes. Starting with the letter R of this concept, a major objective of this book is to help business professionals, at all levels from staff internal auditors to corporate board members, to understand risk management concepts and best practices in general and make more effective use of the COSO ERM risk management framework. Using the COSO ERM framework s model and terminology, we will discuss the importance of understanding the various risks facing many aspects of business operations and how to use something called an enterprise s appetite for risk to help make appropriate decisions in many areas of business operations. COSO ERM concepts are important for all levels of an enterprise. In addition to its applicability for more senior managers, the chapters following will explain how all professionals in an enterprise can make better decisions through use of this COSO ERM framework and its recently released supporting guidance. The COSO ERM framework provides an improved way of looking at all aspects of risk in today s enterprise. This book is designed to help professionals to develop and follow an effective risk culture for many business and operating decisions. This updated second edition will also discuss effective enterprise governance practices including some of the key regulatory issues currently facing the modern enterprise. Our emphasis is not to just discuss rules and standards but to emphasize effective processes, particularly with an emphasis on using IT tools and processes and utilizing the internal audit function. Also, many of the following chapters will reference an example company that we have called Global Computer Products to help the reader understand the use and practical application of COSO ERM and other effective GRC processes. This hypothetical example company will be described in more detail in the chapters following. Chapter by chapter, this new second edition covers the following COSO ERM and GRC process description and recommended good practices: & Chapter 1. Introduction: Enterprise Risk Management Today. This introductory chapter introduces the concept of enterprise risk management and the related concepts of enterprise governance and compliance standards. We start by looking at an important standard for defining internal control, the Committee of Sponsoring Organizations (COSO) internal control framework, a worldwide accepted set of guidance materials for defining internal control in enterprises today. From this internal controls framework the chapter then introduces the similar looking in appearance, but very different, COSO enterprise risk management (ERM) framework, the major topic of many of the chapters in this book. We should note here that the COSO materials are not really standards in the sense of an SEC-mandated standards requirement, but they are really very strong
15 Preface & xiii & & & & guidance materials. Because they are so pervasive today, we will frequently reference them as standard practices. The chapter will also introduce us to an example company, Global Computer Products, which will be referenced for many examples throughout the book. However, the major objective of this chapter is to introduce COSO ERM and related governance and compliance principles and how they have changed since our first edition. Chapter 2. Importance of Governance, Risk, and Compliance (GRC) Principles. Events such as the collapse of the energy trading firm, Enron, and its public accounting firm, Arthur Andersen, and the enactment of the Sarbanes- Oxley Act (SOx) in 2002 raised a whole series of enterprise GRC issues that had been previously all but ignored. The collapse of housing markets almost worldwide during our recent great recession has also focused on needs today for improved compliance processes. This chapter reviews the elements of effective GRC processes and discusses why past events such as Enron and the more recent financial crises have emphasized the growing importance of enterprise governance, risk, and compliance processes. Chapter 3. Risk Management Fundamentals. Key concepts and the terminology used in risk assessments are introduced here. These include some of the basic graphical and probability tools that have been used by risk managers over time as well as the terminology used for risk transfers and assessments. These concepts will be helpful in understanding risks in both a quantitative and qualitative sense and in using and understanding COSO ERM. This chapter also will introduce some of the basic concepts of probability and how they are used to measure and assess risks. Chapter 4. The COSO ERM Framework. This chapter discusses some of the events that led to COSO ERM including ongoing industry and public concerns about the lack of a consistent definition of internal controls and an uncertainty of the meaning and concept of risk on an overall enterprise level. We introduce the threedimensional model or framework for understanding enterprise risk, COSO ERM, with its eight vertical components or layers as one model dimension, a second dimension of four vertical columns covering key risk objectives, and a third dimension describing the enterprise units in the risk framework. An understanding of these framework components sets the stage for understanding and using COSO ERM. The chapter also highlights some of the recent guidance material released by COSO on how to more effectively implement and use COSO ERM. Chapter 5. Implementing ERM in the Enterprise. Risk management must be understood in terms of its strategic, operational, reporting, and compliance objectives as well how it should be implemented throughout the enterprise, from an individual business unit to the entire enterprise. Beyond the Chapter 3 discussion of risk management fundamentals and the introduction of COSO ERM, these are the other two dimensions of this risk management framework, this chapter discusses these other two elements and how all three relate together. The idea is to think of enterprise risk management as an overall structure that will allow managers to understand and manage risks throughout an enterprise.
COSO Enterprise Risk Management
COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER WILEY John Wiley & Sons, Inc. Contents Preface xi Chapter 1: Introduction:
More information354 & Index Board of Directors Responsibilities Audit Committee and Risk Committee Coordination, 244 Audit Committee Functions and Responsibilities, 2
Index Accounts Payable Process Review Procedures Assessments, 191 Actions to Resolve Risks COSO ERM Control Activities, 97 Activity Management COSO ERM Control Activities, 81 AICPA SAS No. 1 Internal Controls
More informationReal-Time Optimization by Extremum-Seeking Control
Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley
More informationBrink s Modern Internal Auditing. Eighth Edition
Brink s Modern Internal Auditing Eighth Edition The Wiley Corporate F&A series provides information, tools, and insights to corporate professionals responsible for issues affecting the profitability of
More informationTable of Contents. Preface xiii PART I: IT GOVERNANCE CONCEPTS. Chapter 1: Importance of IT Governance for All Enterprises 3
Table of Contents Preface xiii PART I: IT GOVERNANCE CONCEPTS Chapter 1: Importance of IT Governance for All Enterprises 3 Chapter 2: Fundamental Governance Concepts and Sarbanes Oxley Rules 9 Sarbanes
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationCOMPONENT-ORIENTED PROGRAMMING
COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John
More informationHASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
More informationDIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING
DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationTable of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING
Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background
More informationTASK SCHEDULING FOR PARALLEL SYSTEMS
TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL
More informationRelational Database Index Design and the Optimizers
Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers
More informationIP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H
IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H Daniel Minoli A JOHN WILEY & SONS, INC., PUBLICATION IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO
More informationMicroprocessor Theory
Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A
More informationModern Experimental Design
Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.
More informationMODERN MULTITHREADING
MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING
More informationPractical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson
More informationOVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R.
OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! 2012 CPA EXAM REVIEW Auditing and Attestation O. Ray Whittington, CPA, PhD Patrick R. Delaney, CPA, PhD WILEY CPA EXAM REVIEW WILEY EXAM REVIEW Auditing
More informationAlgorithms and Parallel Computing
Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All
More information7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak
Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize
More informationAgile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler
Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques
More informationWIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE
More informationStudy Guide. Robert Schmidt Dane Charlton
Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine
More informationLinux Command Line and Shell Scripting Bible. Third Edtion
Linux Command Line and Shell Scripting Bible Third Edtion Linux Command Line and Shell Scripting BIBLE Third Edition Richard Blum Christine Bresnahan Linux Command Line and Shell Scripting Bible, Third
More informationGOVERNANCE, RISK, AND COMPLIANCE HANDBOOK
GOVERNANCE, RISK, AND COMPLIANCE HANDBOOK TECHNOLOGY, FINANCE, ENVIRONMENTAL, AND INTERNATIONAL GUIDANCE AND BEST PRACTICES Edited By ANTHONY TARANTINO, PHD JOHN WILEY &SONS, INC. Additional Praises for
More informationAssessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper
Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper What is the history behind Sarbanes-Oxley Act (SOX)? In 2002, the U.S. Senate added the Sarbanes-Oxley Act (SOX) to
More informationCOPYRIGHTED MATERIAL. Index
Index 2014 revised COSO framework. See COSO internal control framework Association of Certified Fraud Examiners (ACFE), 666 Administrative files workpaper document organization, 402 AICPA fraud standards
More informationMastering UNIX Shell Scripting
Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell
More information26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC
3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 26 February 2007 Office of the Secretary Public
More informationBeginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood
Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with
More informationPCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
More informationCloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn:
Making Everything Easier! Nextiva Special Edition Cloud Phone Systems Learn: What cloud phone systems are and how they can benefit your company About the many advantages a cloud phone system offers Features
More informationLinux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,
More informationSAP: Speeding GRC Control Testing by 90% with SAP Solutions for GRC
2015 SAP SE or an SAP affiliate company. All rights reserved. SAP: Speeding GRC Control Testing by 90% with SAP Solutions for GRC By implementing its solutions for governance, risk, and compliance (GRC),
More informationISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC
3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 27 April 2006 Ms. Nancy M. Morris, Secretary
More informationProfessional ASP.NET 2.0 Databases. Thiru Thangarathinam
Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Published by Wiley
More informationJoin the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle
Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationPresenter: Ian Musweu FCCA, FZICA, CRA. Head of Risk and Assurance Professional Insurance
Presenter: Ian Musweu FCCA, FZICA, CRA Head of Risk and Assurance Professional Insurance Contents: Introduction; Overview of the two major frameworks Frameworks side by side Similarities and differences
More informationBeginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett
Beginning Web Programming with HTML, XHTML, and CSS Second Edition Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Introduction............................................... xxiii Chapter
More informationSingapore Quick Guide to the COSO. Enterprise Risk Management and Internal Control Frameworks Edition
Singapore Quick Guide to the COSO Enterprise Risk Management and Internal Control Frameworks 2016 Edition The Protiviti-SAC COSO Academy The Protiviti-SAC COSO Academy in Singapore was formed by global
More informationEffective COBIT Learning Solutions Information package Corporate customers
Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides
More informationTools & Techniques I: New Internal Auditor
About This Course Tools & Techniques I: New Internal Auditor Course Description Learn the basics of auditing at the new internal auditor level. This course provides an overview of the life cycle of an
More informationRisk Management in Electronic Banking: Concepts and Best Practices
Risk Management in Electronic Banking: Concepts and Best Practices Jayaram Kondabagil BICENTENNIAL B1CBNTENNIAL John Wiley & Sons (Asia) Pte Ltd. Contents List of Figures xiii List of Tables xv Preface
More informationMagical Math G ROOVY G EOMETRY. Games and Activities That Make Math Easy and Fun. Lynette Long. John Wiley & Sons, Inc.
Magical Math G ROOVY G EOMETRY Games and Activities That Make Math Easy and Fun Lynette Long John Wiley & Sons, Inc. G ROOVY G EOMETRY Also in the Magical Math series Dazzling Division Delightful Decimals
More informationOracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR
Oracle PL/SQL FOR DUMmIES by Michael Rosenblum and Dr. Paul Dorsey Oracle PL/SQL For Dummies Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright 2006 by
More informationExploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education
Exploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education FEDERAL STUDENT AID ENTERPRISE RISK MANAGEMENT GROUP Cynthia Vitters 1. ERM
More informationThe Internet of Things
The Internet of Things The Internet of Things Connecting Objects to the Web Edited by Hakima Chaouchi First published 2010 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
More informationGRC SURVEY RESULT Please indicate your profession
COPENHAGEN?=! CO?=! MPLIANCE T o p i c a l a n d T i m e l y Riskability GRC Controllers Governance, Risk & Compliance COPENHAGEN?=! CHARTER Bribery, Fraud & Corruption GRC SURVEY RESULT. Please indicate
More informationPROJECT MANAGEMENT PROFESSIONAL (PMP)
PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAM PREPARATION TRAINING WHAT IS PMP? Government, commercial and other organizations employ PMP certified project managers in an attempt to improve the success rate
More informationSAS70 Type II Reports Use and Interpretation for SOX
SAS70 Type II Reports Use and Interpretation for SOX November 19, 2007 Presented by: Erin Erickson, Senior Manager Enterprise Governance and Brenda Karl, Director Technology Risk Management Agenda Background
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationOF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011
INTERNATIONAL FEDERATION OF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011 HISTORY OF THE IIA 1941 Founded in New York City 1944 First chapter outside the US chartered in Toronto 1948 First chapters outside
More informationStudio Guggino and Newtonpartner S.r.l. a team of professionals at the service of your Company
Studio Guggino and Newtonpartner S.r.l. a team of professionals at the service of your Company To get where the others fail, we have to achieve even higher goals www.sas70.it MISSION Our Mission consists
More informationInstitute of Certified Forensic Accountants. Certificate in Internal Auditing
Institute of Certified Forensic Accountants Certificate in Internal Auditing www.forensicglobal.org info@forensicglobal.org Welcome The Institute of Certified Forensic Accountants is a professional body
More information3/13/2015. COSO Revised: Implications for Compliance and Ethics Programs. Session Agenda. The COSO Framework
COSO Revised: Implications for Compliance and Ethics Programs Urton Anderson, CCEP Director of the Von Allmen School of Accountancy and EY Professor The University of Kentucky Session Agenda The COSO Framework
More informationTHE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING
FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive
More informationExploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz
MOBILE CLOUDS Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS MOBILE CLOUDS EXPLOITING DISTRIBUTED RESOURCES IN WIRELESS,
More informationFRAUD-RELATED INTERNAL CONTROLS
GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA TABLE OF CONTENTS I. THE NEED FOR INTERNAL CONTROLS Example... 1 Threats to an Organization s Internal Control Environment...
More informationImplementing Security and Tokens: Current Standards, Tools, and Practices
Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices
More informationUSING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES
WHITE PAPER USING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES Table of Contents I. Overview II. COSO to CobIT III. CobIT / COSO Objectives met by using QualysGuard 2 3 4 Using QualysGuard
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationiwork DUMmIES 2ND EDITION FOR
iwork FOR DUMmIES 2ND EDITION iwork FOR DUMmIES 2ND EDITION by Jesse Feiler iwork For Dummies, 2nd Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright
More informationBig data privacy in Australia
Five-article series Big data privacy in Australia Three actions you can take towards compliance Article 5 Big data and privacy Three actions you can take towards compliance There are three actions that
More informationJ2EE TM Best Practices Java TM Design Patterns, Automation, and Performance
J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance Darren Broemmer Wiley Publishing, Inc. Dear Valued Customer, The WILEY advantage We realize you re a busy professional with
More informationHands-On Oracle Application Express Security
Hands-On Oracle Application Express Security BUILDING SECURE APEX APPLICATIONS Recx Hands-On Oracle Application Express Security: Building Secure Apex Applications Published by John Wiley & Sons, Inc.
More informationNetwork Instruments white paper
Network Instruments white paper SOX AND IT How the Observer Performance Management Platform can help IT Professionals comply with the data practices components of Sarbanes-Oxley. EXECUTIVE SUMMARY U.S.
More informationmanner. IOPA conducts its reviews in conformance with Government Auditing Standards issued by the Comptroller General of the United States.
PCAOB Public Company Accounting Oversight Board 1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org The Honorable Christopher Cox Chairman Securities
More informationGOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI
GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles
More informationTRANSCANADA S AUDIT FOUNDATION FOR THE EXPANSION OF BUSINESS OPERATIONS
October 2014 TRANSCANADA S AUDIT FOUNDATION FOR THE EXPANSION OF BUSINESS OPERATIONS How TransCanada Achieved Value in Audit Management CASE STUDY Governance, Risk Management & Compliance Insight 2014
More informationSecuring SCADA Systems. Ronald L. Krutz
Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis,
More informationInformation technology - Security techniques - Privacy framework
INCITS/ISO/IEC 29100:2011[2012] (ISO/IEC 29100:2011, IDT) Information technology - Security techniques - Privacy framework INCITS/ISO/IEC 29100:2011[2012] PDF disclaimer This PDF file may contain embedded
More informationNetworking. 11th Edition. by Doug Lowe
Networking 11th Edition by Doug Lowe Networking For Dummies, 11th Edition Published by: John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, www.wiley.com Copyright 2016 by John Wiley & Sons,
More informationTraining Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner
Management and Information Technology Solutions Decker Consulting GmbH Training Catalog Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz Revision 9.1 05.12.2018 public Authorized Training Partner
More informationLinux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition.
DVD and CD-ROM Included Run or install 18 different Linux distributions from the multi-boot DVD and CD-ROM! Christopher Negus Linux 2009 Edition Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and
More informationSAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010
JAYACHANDRAN.B,CISA,CISM jb@esecurityaudit.com August 2010 SAS 70 Audit Concepts and Benefits Agenda Compliance requirements Overview Business Environment IT Governance and Compliance Management Vendor
More informationAccountancy (ACCTCY) Accountancy (ACCTCY) 1
Accountancy (ACCTCY) 1 Accountancy (ACCTCY) ACCTCY 2010: Introduction to Accounting Introduction to accounting for non-business majors. Emphasis on introducing students to business operations, as well
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security risk management
INTERNATIONAL STANDARD ISO/IEC 27005 First edition 2008-06-15 Information technology Security techniques Information security risk management Technologies de l'information Techniques de sécurité Gestion
More informationIT Audit Process Prof. Liang Yao Week Two IT Audit Function
Week Two IT Audit Function Why we need IT audit A Case Study What You Can Learn about Risk Management from Societe Generale? https://www.cio.com/article/2436790/security0/what-you-can-learn-about-risk-management-fromsociete-generale.html
More informationSystems and software engineering Requirements for managers of information for users of systems, software, and services
This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC/ IEEE 26511 Second edition 2018-12 Systems and software engineering Requirements for managers of information for
More informationISO/IEC Information technology Security techniques Code of practice for information security controls
INTERNATIONAL STANDARD ISO/IEC 27002 Second edition 2013-10-01 Information technology Security techniques Code of practice for information security controls Technologies de l information Techniques de
More informationAuditing and assurance
Auditing and assurance Higher School of Economics, ICEF Lecturer: Anna Pirozhkova Seminars: Tatiana Shurchkova Contacts +7 (916) 468 33 99 (Anna), ann.pirozhkova@gmail.com Target audience 4th Year students.
More informationMCITP Windows Server 2008 Server Administrator Study Guide
MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson MCITP Windows Server 2008 Server Administrator Study Guide MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson
More informationISO/IEC Information technology Security techniques Code of practice for information security management
This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 17799 Second edition 2005-06-15 Information technology Security techniques Code of practice for information security
More informationBASED INTERNAL AUDITING
ý Marketing Partner Content Partner BASED INTERNAL AUDITING IIA GL BAL TRAINING MATERIAL Mumbai 21 Dec 2018 8HOURS A bout This Course Course Description The COSO Internal Control Integrated Framework is
More informationA SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS
A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS Introduction If you re a growing service organization, whether a technology provider, financial services corporation, healthcare company, or professional
More informationOverview. Business value
PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to
More informationGlobal Security Consulting Services, compliancy and risk asessment services
Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment
More informationIEEE Electronic Mail Policy
IEEE Electronic Mail Policy 1. Policy Responsibility and related documents This policy is maintained by the IEEE Information Technology Strategy Committee (ITSC), with revisions submitted to the Board
More informationWHO SHOULD ATTEND COURSE OUTLINE. Course Outline :: PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAMINATION PREPARATORY COURSE::
Module Title Duration : PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAMINATION PREPARATORY COURSE : 5 days INTRODUCTION The Project Management Professional (PMP ) is an acclaimed professional certification
More informationDesigning Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran
More informationCOBIT 5 With COSO 2013
Integrating COBIT 5 With COSO 2013 Stephen Head Senior Manager, IT Risk Advisory Services 1 Our Time This Evening Importance of Governance COBIT 5 Overview COSO Overview Mapping These Frameworks Stakeholder
More informationRegulatory Notice 14-39
Regulatory Notice 14-39 Electronic Filing New Template Available on FINRA Firm Gateway for Compliance With SEA Rule 17a-5(f)(2) (Statement Regarding Independent Public Accountant) Executive Summary In
More informationPROJECT MANAGEMENT (PMGT)
PROJECT MANAGEMENT (PMGT) MASTER OF SCIENCE ONLINE INTERNATIONAL Harrisburg University of Science Technology is accredited by the Middle States Commission on Higher Education, 3624 Market Street, Philadelphia,
More informationCAPM TRAINING EXAM PREPARATION TRAINING
CAPM TRAINING EXAM PREPARATION TRAINING WHAT IS CAPM? PMI s Certified Associate in Project Management (CAPM) is a valuable entry-level certification for the individual who aspire to become project manager.
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Auditor www.pecb.com The objective of the Certified ISO 22000 Lead Auditor examination is to ensure that the candidate has
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationRisk Advisory Academy Training Brochure
Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty
More informationThe value of visibility. Cybersecurity risk management examination
The value of visibility Cybersecurity risk management examination Welcome to the "new normal" Cyberattacks are inevitable. In fact, it s no longer a question of if a breach will occur but when. Cybercriminals
More information