A CIO`s Perspective on Compliance & Risk Management

advertisement
A CIO’s Perspective on Compliance &
Risk Management
Keeping Stakeholders and Auditors Happy with ICT Value
Contributions and Controls
Steve Sanazaro
For TACUA
April 8, 2010
1
Topline Summary
 Objective: improve your understanding and your ability to team with IT
leaders to implement and manage a robust and meaningful compliance
regime
 Briefly describe the general and college/university environment
 Discuss IT Governance – where teamwork and cohesion begins
 Describe the role, agenda and cross-pressures on CIOs and their
organizations
 Demonstrate some of the sources of dysfunctional friction between
compliance and achieving the IT agenda
 Provide a roadmap to:
 IT – Compliance collaboration and integration for efficiency and productivity
2
My Background…welcome to my day job
 Executive and technology roles in all three aspects of information and communications
technology:




Commercial technology product development – e-business, data communications, reservations
technology, business applications
Corporate executive – business strategy and operations, technology planning and implementation and
managing ICT (CIO/CTO/CEO/COO)
Professional services provider: advising corporations in a range of industries on business-technology
opportunities and managing strategic initiatives (consultant)
Educator and mentor of the next generation of business-technology leaders (the 110% factor)
 Diverse industry experience in the US and other countries:





Software, telecom, e-commerce, distribution and supply chain management, hospitality, transportation,
consumer products, manufacturing, health, broadcasting, business process outsourcing, consulting
Companies in all stages: mature Global 500, mid-size growth, early-stage and startup companies, not-forprofits
Responsible for international initiatives and technology management with multiple companies
Instrumental in 2 successful IPOs
Founder of multiple companies, including two profitable professional services businesses
 Today I advise companies on business and ICT strategy, major program
implementations, competency development, change management and other subjects
companies explore to maximize the competitive standing and value of the enterprise.

Special focus: strategic readiness, organizational health and sustainment, total supply chain, performance
management, turnarounds, rejuvenation efforts
 All of my engagements today require a strong background in international business,
Information Technology, business operations, compliance and risk management,
strategic planning, performance management, cross-cultural business and social
experience and travel.
3
A More Detailed Overview
 1 - The unique environment of colleges and universities and the environment we all share
 2 - The IT Value Proposition



Automation, Information, Communication, Collaboration
Routine performance and innovation
Performance and institutional sustainment
 3 - IT Governance





Integration, not alignment – team sport
Expectations, priorities and targets
Performance and organizational sustainment
Financial stewardship
Risk management and controls
 4 - What do CIOs do anyway?

Agenda and cross pressures
 5 - Friction and Dysfunction in IT Compliance Implementation


Risks – the infinite spectrum
IT control regimes
•
Integrating compliance into IT
 6 – A Roadmap to IT-Compliance Harmonization




Compliance as connective tissue, not a separate organ
Integration, not alignment
Implementing Practical Compliance
Where IT and Auditing need to collaborate the most today
4
1 - The Unique Environment of Colleges
and Universities Today
5
The 21st Century Economy
 Global & relentlessly competitive:
talent, products, customers, suppliers
 Fast & Unforgiving – time is the enemy
 Continuous innovations & imitations
– new products, new competitors, new
technologies, imitators everywhere
 Digital – information is replacing
physical goods
 Customers are in command
 Choice: access to global
information, access to peer
opinions
 Fluid loyalties
 Suppliers - Partners - Customers
 Results-driven
 Financial
 Other
Emerging global culture – the new
cosmopolitans
6
Management in the Global Reality
Management’s great task will be taking
strategic control of companies and
simultaneously decentralizing
operational control—loosening controls
without losing control.
 “Strategic Discontinuity,” McKinsey, 2002
7
Enterprise Purpose: Convert Assets to Goals
Assets
Value-Generating
Processes
Generate or Raise
Cash (Endowment,
Grants, Building
Projects…)
Ideas
Cash
Talent
(People)
Results
Enterprise Execution
Model
- Performance
- Health &
Sustainment
Graduates – stature
& market
acceptance
Attract Talent, Allies
and Partners
Facilities
Grow and
Strengthen the
Institution
Allies &
Partners
Build Brand Loyalty
8
Cash Results from Doing the Right Things Right
Management
Decisions
• Strategy
• Execution
planning
• Oversight &
monitoring
• Adjusting
•
•
•
•
What to sell
Where to sell
How to sell
How much to
sell
• Organizational
development
Activities /
Processes
• R&D
• Production
• Marketing
• Sales
• IT
• Finance
• Classes
• Research
Results
• Revenue
• Expenses
• Income
• Debt
• Stock
valuation
• Fundraising
• Grants
• Students
• Donors
• Businesses begin with assets and try to grow them over time
• Assets become sales
• Sales minus expenses become profits
• Profits become cash flow
• Cash flow becomes assets
• There’s no reason to grow the asset base except to generate higher revenue, more sales, etc.
• ICT must adopt the same attitude
• The purpose of IT assets is to grow revenue (effectiveness) and net income (efficiency
9
Globalization Has Enlarged the Enterprise
Focus & Risk Management Agenda















Talent development: attract, recruit, retain, develop, place
Economics and Free Trade
Tradition, Sovereignty and Cultural Preservation
The Role of Information, Communications and Collaboration
Education, Opportunity and Participation
Population Shifts and Mass Migrations
Human Rights
Crime & Safety
Environmental Concerns and Pollution
Transborder Disease
Corporate Social Responsibility and the Digital Divide
Compliance
Corruption and Governance
Intellectual Property Rights
Representation and Participation
10
Colleges and Universities Face Additional Challenges
 Some are common to institutions; some are unique to educational institutions
 Further gradients of issues are by public/private, size, target curricula, etc.
 Just a few of the many Big questions:













What is the 21st century college and university value proposition?
Autonomy and centralization issues
What new programs or capabilities do we need?
Performance targets – what to measure, what to do with the results?
Customers and colleagues: Students, academics, administrators, other stakeholder
interests
How do we improve distance and continuing education?
How do IT technologies, applications and services change curricula, delivery methods,
target audience, student and prospective student expectations?
The special function of university research
Endowments , special gifts, programs and other fundraising
Talent management – faculty, administration
Community support
Peer standing among other colleges and universities
Mastering legal and regulatory mandates
11
College and University ICT Challenges




Centralized core systems and supporting infrastructure
Fragmented departmental and functional systems by discipline
High variability in governance policies and effectiveness
Non-standardized user technology
 PCs and laptops, smart phones, game consoles, sensors, video cameras…
 An “open” information culture – with information integrity and protection
 Inherent resistance to centralized authority
 Diverse investor (contributor/user) base with different objectives





Facility or discipline-specific gifts
Endowment
Student/parent payments
Industry/corporate gifts
Gifts in-kind
 Net net: mandates from on high will not achieve the objective of a controlled ICT
environment in a fragmented, decentralized institution
 Challenge: how to get critical mass on the compliance team
12
Institutions Balance Today with Tomorrow
Performance (today)
 Doing the work; working the plan
 The academic year cycle
 The financial cycle
 Fund raising campaigns
 Incremental improvements
 Security, applications
 Delivering on commitments
 Meeting deadlines
 Operations reliability and continuity
 Meeting goals and objectives
 Managing controls; conducting
compliance audits
Organizational Health
(tomorrow)
 Reinforcing desired culture
 Respect, curiosity, integrity, diversity,
excellence
 Strategic assessments
 Where do we want to be in the
future? When does the future begin?
 Planning
 New programs, facilities,
relationships, etc.
 Skills and competency improvements
(people)
 Job and organizational structure
reviews
 Building compliance and risk
management competencies
13
Where’s your Line between Performance &
Institutional Sustainment Initiatives
Performance:
What’s your institution's Optimal Golden
Mean?
Do you have a way to get there?
[Time, talent & treasure]
• Execution
• Operations
• Continuous
Improvement
• Monitoring
• Measuring
• Adjusting
• Controlling
Institutional Health & Sustainment:
• New Capabilities - dynamic compliance, resilient disaster recovery
• New Methods and Processes – administration, customer interaction
• New Subject Areas – performance management and reporting
• New Relationships – complementary; virtual institutions
•Strategic Planning & Investment - programs, facilities, faculty, locations
14
Innovation – the New – Is Hard to “Control”
Today
Legacy Systems: financial, email,
registration, Blackboard, payments,
grading, Internet access, etc.
Controls in place & audited
Today+
Emerging systems:
Social Networks, Smart
Phone apps, new
academic apps
Controls in development
Continuous
Future
Innovative Apps &
Services
The Wild Wild West
Process and Accountabilities to Develop & Oversee Controls
New and Enhanced Regulatory Regimes: Privacy, Intellectual Property Rights,
Security, Disclosure, Transparency, Statistical Mandates…
Therefore, to jump ahead, the competence to develop, operate and improve
controlled processes in a timely manner is MORE – MUCH MORE – important than
developing a protocol for any one regulatory regime. [ I know: easier said than
done…]
15
University Compliance Missions Are Inconsistent
 To support the University’s fundamental commitment to the highest standards of
ethics, education, integrity, lawful conduct, and responsible citizenship by complying
with all laws, regulations, and internal policies. This makes sense to me.
 Columbia University
 To reinforce and support a culture at UNT which builds compliance consciousness into
its daily activities and operations of the University and encourages each employee to
conduct UNT business with the highest standards of honesty and integrity. This makes
sense to me
 University of North Texas
 The mission of internal audit is to assess and monitor the university community in the
discharge of their oversight, management, and operating responsibilities in relation to
governance processes, the systems of internal controls, and compliance with laws,
regulations and University policies including those related to ethical conduct by
providing relevant, timely, independent, and objective assurance, advisory and
investigative services using a systematic, disciplined approach to evaluate risk and
improve the effectiveness of control and governance processes. Huh?
 - University of California system
16
2 – The ICT Value Proposition
17
Pervasive IT – Who’s In Charge? In Control?
 ICT today serves every aspect of institutional life, and numerous personal ones as well
 Universities have an exceptional Venn overlay of these two domains
 Transcends organizational boundaries – tremendous interaction with external
individuals and institutions
 Continues to permeate organizations at every level and scale
 Is encompassing more devices (Smart phones, object sensors, what’s next?)
 Includes all types of data (text, numbers, video, audio, all digitally translatable analog
data, real time, hyper-aggregated, images…)
 Includes both staged, asynchronous and real-time information events
 The proportion of IT activity that happens outside of IT continues to grow




Consumer devices – iPhone, Blackberry, Xbox, Playstation
Social networking – Facebook, online games, Twitter, Foursquare
Embedded systems – device sensors and controllers, cars
Non-IT business functions - every enterprise function has some “independent” IT, whether
they admit it or not (think Excel)
 Consider everything your faculty and students are doing with Information,
Communications and Collaboration tools today? What’s coming tomorrow?
 Content, devices, communications channels, users, collaborators, intelligent agents
18
The ICT Value-Building Cycle
Plan
Execute
Assess
Move On
Environment
Business
Strategy Differentiators
Enabling
Initiatives &
Execution
IT
Governance,
Portfolio
Management
& Alignment
Priorities,
Projects &
Service
Levels
Assess
Delivery
Measurement
Operations
Vision &
Mission
Performance
Managemen
t - Measures
& Targets
Capabilities &
Competencies
Adjust & Adapt –
Flexibility & Resilience
Issue: What are the decision rights, accountabilities, responsibilities
and metrics for each component and the overall cycle? Hint: no
answers = no controls = ineffective risk management
19
Four Sources of New IT Value
Improve
Decision
Making
Internal Informing
External Informing
Provide information to improve
Operational decisions
Embed information into
Products and services
Reshaping
Optimizing
Improve
Process
Improve or transform internal
Processes through technology
Change how customers and
Partners interact with the
Enterprise and its
Products / services
Source: The Real Business of IT, Hunter & Westerman , Harvard Business Press 2009
20
The IT Value Proposition
 Information, communications and collaboration
 Automation of existing work












Blackboard
Accounting: AP, AR, GL, Asset Management
Funds management
Grants administration
Research
Admissions
Financial aid
Payment
Improvement and optimization
Innovation (new, unknown, speculative, experimental)
External integration
Risk management (assets, security, data, services continuity, liability)
21
3 – ICT Governance
GETTING A RETURN ON YOUR ICT
INVESTMENTS
22
ICT Governance
 Governance is the process of ensuring that an institutions
financial investments yield the desired returns and are “well
managed”
 A subset of the overall institutional governance function
• Strategy (direction), institutional integration and oversight
• Priorities and investments
• Focus on projects, performance (overall operations) and sustainment
 Integration, not alignment – a team sport
 Expectations, priorities and targets
 Setting expectations, priorities and targets
 Focused, at heart, on ensuring that the enterprise receives an
appropriate return for the money and other resources invested in
IT
 Financial stewardship
 Balancing performance with organizational sustainment
 Integrating strategy, operations and IT
23
Governance: Analysis, Decision, Follow-through
Strategy,
Competencies,
Expectations,
ICT Structure –
“On the Org”
[CobiT]
Enablers:
- Clear accountabilities
- Shared purpose & goals
- Smooth collaboration
- Measures & targets
- Org sustainment
-
Monitoring
and
Measurement
Portfolio
Management,
Priorities
[Balanced
Scorecard]
“In the Org”
Operations
[ITIL]
Project
Delivery
[Project
Management
Office; CMMI]
24
Risk Management is Integral to IT Governance
 Internal control is a process
 Not a department, organization or function – a genuine team sport
 There is no ultimate destination or rest for the weary
 It focuses in an ideal world on insuring that the institution is being managed
and operated in reasonable accord (not a perfect world) with regard to:





Effectiveness (right things) and efficiency (right level of resources)
Integrity and reliability of reporting – not just financial
Compliance with a growing list of laws and regulations
Being able to deliver priority projects and services
Being able to keep services running (continuity) or to recover from a disaster
 This makes well-managed risk management and compliance a key enabler
of institutional processes – IT and other – that operate to move the
enterprise towards its goals
25
ICT Governance Cross Currents
Goal: Achieving, maintaining and improving strategic and operational integration
among all internal and external entities and stakeholders to deliver value and improve
enterprise health and sustainability
Strategy & Integration:
Setting & Managing
Direction
Governance:
Oversight & Risk
Management
Priorities and
Delivery
Foundation
• Strategy and opportunity
management
• Core competencies
• Management
• Talent management
• CobiT, ITIL, CMMI,
Balanced Scorecard
Focus
• Continuously scan the
environment, find
opportunities & make
adjustments
• Set priorities and
targets
• Oversee progress
• Keep business in
sync
• Delivery excellence
(CMMI)
• Operations
excellence (ITIL)
• Solutions
identification (what)
• Enterprise
architecture (how)
• Project delivery
• Increase enterprise value
• Outcomes
assessment
(Balanced scorecard)
• Delivering &
demonstrating IT
value
• Continuous
enhancements
• Innovative leaps
Finish
• Frontline IT
• Collaboration &
teamwork across
distance and cultures
The IT Agenda
• Global core
competencies
• Attract and retain
talent
• Reliable operations
26
IT Investment Profiles
“Rethinking IT
Strategy,”
McKinsey,
Aug 2006
27
ICT Portfolio Allocations
IT Strategy
& Alignment
Technology
Selection &
Implementa
CIO
tion
IT
Operations,
Support &
Continuity
Source: Based on Gartner Group, 2004
Talent & Career
Management
Organizational
Health
Projects
Core
Competencies
ICT Structure
Investment
Allocations
(Capex & Opex)
Bus-Tech
Architecture
Risk
Management
Measures
& Targets
Business
Technology
Projects
Innovation
Competitive
Parity or
Advantage
Service Levels
Operations
Capacity
Planning
28
ICT’s Role Is Changing
August 2006, Trends “Is There A Career Future In Enterprise IT?”
29
4 – What do CIOs Do Anyway?
30
CIO Career Growth Stages
Source: “CIO Success Factors,” TechExecs, Nov 2009
31
The CIO’s Universe
Stakeholders &
Business Partners
General &
Business
Environment
ICT
Environment
ICT Competencies,
Processes & Staff
Emerging &
Future
Technologies
Strategy
Governance
Integration & Alignment
Portfolio
Mgmt
ICT
Environment
Compliance & Risk Mgmt
Architecture
Measures & Targets
Financial Mgmt
Projects
Enterprise
Environment
ICT Infrastructure & Operations
32
The CIO Meta-Agenda
 Shaping and Meeting Enterprise Expectations – a translation layer
between institutional needs and technology capabilities and
talents
 Providing reliable and effective IT services
 Planning: Insight and Foresight
 Doing the right things the right way
•
•
•
•
Operations – running what is already in place
Projects – delivering extended, enhanced or innovative improvements
Institution building / organizational health
Financial and compliance stewardship / risk management
 Communicating value: the iceberg report
 Building and reinforcing a High Performance culture
 Net net: provide more value, continuously improve and
extending IT into new areas to increase value/benefit provided for
investment made
33
Sample ICT Agenda Items Today
Item
Performance
Organizational Health
Innovation & Enhancement
Reduce % of Ops spending
Develop strong Operations
processes & innovation
processes
Integrate with paying customers
Transaction integration
Customer conversations
End-to-end business process
mastery – adding business
capabilities
Improve operational results
Strengthen resilience, flexibility,
external relationships, etc.
Actionable information
Predictive analytics &
performance monitoring
Strategic planning and
adjustments
Green Computing
Reduce energy consumption;
recycling responsibly
Culture of thrift and conscious
spending
Architecture & Technology
Integration
Cloud computing, virtualization,
mobile, social, etc.
Flexible & rapidly adaptive
infrastructure & services
Decide what’s important and
concur on expectations with the
leadership team
Short-term priority setting &
targets
Longer term capabilities
Integration architecture
Process optimization
New opportunities with external
partners; faster initiatives
34
A BRIEF ASIDE ON CONTROLS AND
CONTROLLED ENVIRONMENTS…
35
Compliance Regimes












SB1386 (California privacy breech disclosure
law)
Internal & proprietary regimes
FERC/NRC (Energy)
FERPA – Controls on student grade and other
personal information
Jeanne Cleary Act (1990) – campus crimes
disclosure
FISMA – Federal Information Security Act
PCI – Payment Card Industry control
objectives
Access – systems access controls
Sarbanes Oxley (SEC, PCAOB, COSO,
CobiT, ITIL)
SAS 70 – external service provider control
regime
Graham-Leach-Bliley – Consumer information
privacy safeguards
HIPAA – Protection of personal health
information











SysTrust & WebTrust – AICPA assessment of
IT risks and opportunities – can substitute for
a Sox audit
Government Accountability Office
Securities and Exchange Commission
NIST – National Institute of Standards and
Technology
ISO 27000 – Security techniques
Office of Thrift Supervision
ITIL – Information Technology Infrastructure
Library
FIPS 140-1 & 140 2 – Federal standards for
cryptographic software implementation
CMMI – Capabilities Maturity Model
Integration
GAAP/FASB – Generally Accepted
Accounting Principles / Financial Accounting
Standards Board
IFRS / IASB (International Accounting
Standards Board) – convergence projects
with FASB underway
Source: Students enrolled in EMIS 7360 Executive program, May 2008
36
The Purposes of Controls
 Safeguarding assets – essentially the cash-to-result value chain
 Checking the accuracy, integrity and reliability of operational and
financial data
 Promoting operational efficiency through rigorous process definition,
measurement, assessment and continuous improvement
 Encouraging and ensuring that official policies and procedures are
followed
 Demonstrating legal compliance by contemporaneous, current process,
role and proof-of-adherence documentation
37
Look at the Regulatory Storm We All Face
Missing:
• PCI
• FERPA
• Security breech
reporting (CA SB
1386)
• CA SB 25 re
SSN use
•Graham Leach
Bliley
• DMCA
• CAN-SPAN
• Fed Privacy Act
1974 – RMP-8
• Electronic Gov
Act of 2002
• OMP Circular
A-130
• NIST security
standards – FIPS
200, 800-53A
• Cyber Security
R&D Act
38
Relationship of Control Regimes
COCO
COSO
COBIT
ITIL
Strategy
Finance
Applications
Operations
University control regimes are derived from frameworks originally
developed for businesses and need tweaking to fit comfortably.
39
COSO Enterprise Risk Management Model
Graphical Representation
Monitoring
Information
&
Communication
Control
Activities
Information
&
Communication
Risk
Assessment
Control
Environment
40
The COSO ERM Framework

Entity objectives can be
viewed in the context of four
categories





Strategic
Operations
Reporting
Compliance
ERM considers activities at
all levels of the organization



Enterprise-level
Division or subsidiary
Business unit processes
Source: COSO Enterprise Risk Management Framework; Draft Version, July 2003
41
Internal Environment










Risk Management Philosophy
Risk Culture
Board of Directors
Integrity and Ethical Values
Commitment to Competence
Management’s Philosophy and Operating Style
Risk Appetite
Organizational Structure
Assignment of Authority and Responsibility
Human Resource Policies and Practices
42
Internal Auditors’ ERM Responsibilities per COSO
 Do not have primary responsibility for establishing or
maintaining ERM
 Play an important role in monitoring ERM
 Regarding the ERM process - assist management and the
Board or Audit Committee by:
 Monitoring - Examining
 Evaluating – Reporting On
 Recommending improvements
CIO comment: ICT needs assistance too.
43
ICT Vulnerabilities Are Increasing
 Scale (Pervasive IT) creates complexity; complexity
generates opportunities to breech security
 Security is a moving target
 Security is a people issue, not a “technical” issue
 Complexity of Software and “open” development
philosophy
 Microsoft windows & most major league applications
 Linux / Open source
 Macintosh (yes, Macintosh)
 New processing:




Wireless devices; open wireless connections
Unencrypted environment
Web based processing-immature security
More send/receive devices (Smart phones)
 Decentralized infrastructures / physical and logical
access control complexity
44
Follow the Frameworks – Minimize “Roll
Your Own” Controls
The policies, procedures, practices, and organizational
structures that are designed to provide reasonable
assurance that business objectives will be achieved and
that undesired events will be prevented, detected and
corrected.
*
* [formerly known as the Information Systems Audit and Control
Association and, prior to that, the EDP Auditors Association]
45
Control Frameworks and ICT
 Control Environment – as much the culture of integrity and
ethics as the official policies and procedures. Roles and
responsibilities.
 Risk Assessment – internal and external; controllable
(prevent) and uncontrollable (anticipate and recover);
observe and report only
 Control Activities – policies and procedures that transparently
ensure that management directives are carried out
 Information and Communication – includes all information
being controlled. Includes ensuring that everyone knows their
role and responsibility.
 Monitoring – timely assessment of adherence and
effectiveness of controls
46
CobiT Processes by Domain
Monitoring
Delivery &
Support
Planning &
Organization
Acquisition &
Implementation
47
Integrated CobiT Schematic
48
The 34 Defined CobiT Processes
1
2
3
4
49
The 7 CobiT Principles
50
Elements of a Controlled ICT Environment
 Defined and effective governance
 Defined & executed change management & systems implementation
process
 Software controls – configuration management
 Hardware access & asset controls
 Computer operations controls
 Data security: access, CRUD, password management, storage, retention,
recovery
 Administrative control (new and exiting employees, etc.)
 Balancing high availability and widespread use with security & integrity
 Policy-based, not technology-based control environment
51
5 - Friction and Dysfunction in IT
Compliance Implementation
52
Risks – the infinite spectrum
 Every ICT manager lives somewhat in fear of outages and
disruptions
 Who defines risks and who assigns the cost of addressing risks?
 Who pays? What doesn’t happen because of risk management
expenditures?
 What gets taken off the ICT plate because of compliance? (Hint:
not much, if anything)
 Real risk management versus mandated risk management
 Random versus controlled activity – process definition and
discipline versus mandate meeting
 Expected versus actual outcomes – measures and targets defined
in advance
 Multi-perspective verification – evidence versus anecdotes
53
Sources of Auditor-ICT Conflict: a Sampler
 These may apply more to commercial businesses than colleges and
universities but some all-too-common sore points include:
 Surprise, surprise – Gomer Pyle, repeatedly
 Showing up with a deliverable and a deadline with no prior relationship
 Mandating a regime-specific set of controls to meet a deadline
 Asking for a control to be documented multiple ways
 Assuming CIOs have never thought of this stuff before (security, privacy,
data integrity…)
 Criticizing the ICT program without offering specific suggestions on how to
design, implement or improve a control
 Priority stuffing (10 pounds of sugar in a 5 pound bag…)
 Leveraging senior management or the external auditor against ICT without
developing a clear understanding with ICT of any problems
 Expecting ICT to allocate labor to the mandate with no support for who
pays the bill
 Blaming ICT for whatever goes wrong
54
6 – A Roadmap to IT-Compliance
Harmonization
55
Compliance as connective tissue,
not a separate organ
 The Compliance Challenge: Making
performance and compliance complimentary
(Let’s skip the synergy thing…)
56
IT and Auditing Share Mutual Compliance Challenges
Today
 IT demand is shifting towards mobile and social services
 Objective: obtain any information or communicate with anyone via
any channel, anytime, anywhere
 Technologies: iPhone, Blackberry, netbooks, pervasive wireless
 Applications: Facebook, Twitter, Linkedin,….
 Challenges:
 Standards – security is often a matter of technology currency as well as
programmatic actions. How to allocate budget for technology refreshes?
 Privacy of personal information – e.g., unencrypted public wireless;
lost or stolen devices
 Security and retention of confidential data – what IP is in that email
attachment?
 Inappropriate behavior or postings on social networking sites (things
that impugn your institution’s reputation or enable someone to
cause harm to another, for instance)
57
Integration, not alignment
 Compliance – like information and communications – has to be part of
core institutional processes to be effective
 Built-in quality versus post-incident inspection
 Compliance and IT share the need for an enterprise – and extraenterprise – perspective
 Both require some formal oversight group to bring expertise and
attention – not a pickup band of departmental assignees
58
The Compliance Challenge
 Making performance and compliance complimentary
 Getting IT Work Done
 Doing the right things the right way
• Operations
• Projects
• Organizational health
 Implementing Compliance Regimes
 Compliance and Risk Management Roles
• The lineup
• Responsibilities and accountabilities
• Team work, collaboration and productivity
 Defining and refining processes and practices
 Training and incentives
 Performance management and feedback
 Overhead, Co-existence or Leverage?
 Synthesizing Compliance and ICT Goals
59
We need to overcome our professional vocabularies
PSTN
DNS
IP
EA
HTTPS
NTFS
FTP
GSM
CMMi
Extreme Programming
CSS
Ocxx
ACL
SATA
SSL
LDAP
DFD
API
Peering
SMTP
LAMP
PHP
OSPF
Risk Assessment
Attest
Segregation of Duties
Control Risk
FERPA
Footnotes
Materiality
Significant
Controls
Confirmation
Reperformance
Substantive Tests
HIPAA
PCI
Monitoring
Year
Fraud
Reasonable Assurance
Unqualified Report
Independence
PCAOB
AICPA
Enrollment
Applicants
Transcript
Financial Aid
Registrar
Major
Academic Advisor
Syllabus
Convocation
Endowment
Trusts and Gifts
Transfer
Intern
Distance Learning
Postgraduate
SAT
Credit Unit
Tuition
Withdrawal Deadline
Incomplete
Plagiarism
Wait List
Year
60
CobiT Processes by Domain
Monitoring
Delivery &
Support
Planning &
Organization
Acquisition &
Implementation
61
Process Categories
Process Management
Organizational Process Focus
Organizational Process Definition
Organizational Training
Organizational Process Performance
Organizational Innovation and
Deployment
Engineering
Requirements Development
Requirements Management
Technical Solution
Product Integration
Validation
Verification
Project Management
Project Monitoring and Control
Project Planning
Supplier Agreement Management
Integrated Project Management
Risk Management
Quantitative Project Management
Support
Configuration Management
Measurement and Analysis
Process and Product Quality Assurance
Decision Analysis Resolution
Causal Analysis and Resolution
62
CMM: Maturity Levels
5. Optimizing. Continuous process
improvement.
4. Managed. Detailed measures of
the software process and
product quality are collected.
3. Defined. Management and
engineering activities are
documented, standardized,
institutionalized.
2. Repeatable. Basic project
management tracks cost,
schedule, and functionality.
Successes can be repeated
for similar projects.
1. Initial. Ad hoc. Success depends
on individual effort and
heroics.
63
Compliance Regimes Overlap with ICT Processes
Regime>>
IT Implications
PCI
HIPPA SAS70
FERPA
Sox 404
FIPS
Governance
X
X
X
X
X
X
Project
Management
X
X
X
X
X
X
Security & Access
Control
X
X
X
X
X
X
Data Integrity
X
X
X
X
X
X
Business
Continuity
X
X
X
X
X
X
Patch
Management
X
X
X
X
X
X
Change Control
X
X
X
X
X
X
Monitoring &
Measuring
X
X
X
X
X
X
Operations SLAs
X
X
X
X
X
X
Friction Point: ICT needs to control an overall process; not
build a process to accommodate an individual mandate
64
The Special Case of ICT Operations and ITIL
 IT Infrastructure
Library, Office of
Government
Commerce, UK
 Focus:
 Service Delivery
 People
 Process
 Technology
 Service Support
Many compliance issues manifest
themselves in ITSM (IT Service
Management) although the root
cause is often way upstream.
 Service Level
Management
 Availability Management
 Capacity Management
 IT Service Continuity
Management




Incident Management
Problem Management
Change Management
Configuration
Management
 Release Management
65
The V3 Lifecycle
Governance Methods
St
a
s
ow
n
K
l
ed
ge
&
ill
Sk
Continual Service
Improvement
CMMI
T op
ics
Service
Design
SOX
Certified
Training
ISO/IEC
17799
ISO/IEC
19770
Co
Sc
a
lab
ilit
y
Service
Transition
n
Im tinu
pr al
ov S
em erv
en ice
t
alty
Spe
ci
ITIL
on
cti
du
ice
erv
l S nt
ua eme
in
nt rov
Co Imp
ro
nt
M_o_R
eI
tiv
cu
COBIT
e
Ex
SOA
Templates
Service
Operation
ISO/IEC
20000
ies
Service
Strategies
PMBOK
PRINCE2
nm
en
t
d
Stu
Six Sigma
Al
ig
se
eTOM
rd
s
Ca
TOGAF
nd
a
St
ud
y
ins
ic
Qu
Ai
ds
kW
Qualifications
66
Collaborate on the Basics of Effective Controls
 Authority and responsibility – clear, communicated and
documented
 Authorization of transactions - documented
 Adequate accounting records - a good audit trail
 Segregation of duties
 Independent verifications
 Limited access and physical protection of assets



Physical
Electronic
Virtual
 Cosign and co-deliver the defining documents
67
Complexity
 Complexity is built in; don’t add your own
 Complexity is as much organizational as technical
 Unnecessary technical complexity challenges timeliness,
functionality and performance as long as it persists
 Changes must be made within the “changeability index” of
your institution
 Scale: optimization or a true re-engineering
• Materiality of the changes – risk quotient





Readiness – management, process, education, communications
Openness and willingness of the culture to change
Skill and history – prior projects and risk management efforts
Persistence – the willingness to stay on task until it is right
Leadership more than management
 Plan B
68
Key Ingredients of the Success Recipe (1)
 ICT is inseparable from the enterprise – integration, not alignment
 Build on-going relationships; don’t make compliance the basis of creating
relationships
 Auditor-ICT co-responsibility
 Clear responsibilities and accountabilities
 On-going programs, not projects
 Rely on control frameworks where possible to reduce the time necessary
to define and implement regimes
 Select and tailor the regime – CobiT, ITIL, etc. – to fit your circumstances
 Simplify ICT: Leverage compliance to make ICT more efficient
 Lower unit costs, fewer labor specialties, less manual labor, etc.
 Engineer and manage processes; don’t organize
around individual regimes
 Build-in, don’t bolt-on measures through design and refinement
69
Key Ingredients of the Success Recipe (2)
 Collaborate on defining and seeking funding for automated
tools and any other resources necessary to leverage efficiency
efforts and controls
 Backup/recovery, patch management, intrusion detection, access
management, employee hire/termination, logging…
 Spend each dollar once and track pay-offs
 Standardize reporting and evidentiary documentation
 Hold regular “unofficial” compliance meetings
 Project reviews
 Upcoming regulation
 Network with other institutions – auditors and ICT together
 Work together to improve ICT governance effectiveness
70
Triangulate to Succeed Mutually
“The Powers that Be”
Auditor /
Compliance Authorities
CIO /
IT Authorities
71
A Final Word
 We know that more and more compliance measures are
heading towards all of us – let’s get ready
 Compliance implementations and controls are tremendous
opportunities for institution building, teamwork, operational
improvements (performance) and greater transparency
 Compliance is a team sport and everyone on the team has to
feel valued and know their role and responsibilities.
 Make compliance-ICT relationships and integration a regular
part of your work cycle
 Synthesis can generate triple wins – for your institutions, for
Audit and for ICT.
72
Thank You.
COMMENTS, Q & A
73
Download