Issue 24 Quarter 1 2004 Hong Kong Chapter A Newsletter for Members About Chapter & International Events and Programmes F CUS Your award-winning Newsletter from your award-winning Chapter! Dear Members, Kung Hei Fat Choy! Wishing everyone a fantastic 2004 of good health, brilliant career and personal life! Time flies. We have approached another year of a new era. With the New Year ensuing, we shall put away the old hurts and look forward to the new year of hope. Dedication and hard work will bring miracles. Let us all work for these miracles to bring IS Audit, Controls and Assurance to a new height, and in turn bring prosperity to Hong Kong community and also rewards on the personal fronts. Susanna Chiu ISACA HK Chapter President Inside: President’s Update ....................... 1 President’s AGM message ........... 2 Conferences & Training Weeks .. 4 CISA & CISM exam information 4 Membership FAQs ....................... 5 Global membership statistics....... 5 CISA chapter members note ....... 5 Control objectives for Net Centric Technology .................................... 6 CISA earns largest bonus pay ..... 8 6 steps to improving IT governance .................................... 8 Article: Data mining and the auditor’s responsibility ................ 9 CobiT: Guidelines meld IT governance, Sarbanes-Oxley compliance .................................. 11 CobiT: Uruguay Central Bank adopts CobiT ............................... 11 Article: BCP testing considerations & best practices . 12 CISA review course .................... 15 IT agenda for 2004 and beyond As it is the start of the New Year of the Monkey, trend forecasting is the norm. I came across a magazine recently which published a forecast of the “Future Vision: IT’s Top Ten” which most likely will dominate the IT agenda in Asia in 2004 and beyond. Let’s take a look at the list for general reference purposes: 1. IT Spending 5. Enterprise suites 8. Storage systems 2. Internal Controls 6. Collaborative 9. Business 3. Outsourcing computing intelligence 4. Utility Computing 7. Security 10. Risk management It is encouraging to note that security, controls and assurance (which include audit and risk management) have been three standing trends for 2004. All these three are important elements towards IT Governance which itself has to be an important trend for not only Asia but also the world. In fact, controls, security and assurance have significant implications in all other trends for each trend to be effectively deployed. Therefore, IT Governance is no longer just a background shadow agenda, but an agenda to take the front stage. It has taken some years to come through but we have finally seen the light. Having said that, much work has to be done to bring IT Governance to its truly deserved status. ISACA will continue its pioneer role in bringing this agenda to the world stage. 2004 for the Chapter Last year ISACA (HK Chapter) has made achievements in building alliances with government bodies and the IT professional community, and to apply successfully for the IT Functional Constituency electoral status for our Chapter members. This year, whilst the Chapter will continue this liaison work to enhance the members’ network with other IT professional organisations, the Chapter will focus its liaison work with the members to build a closer community among the Chapter membership, and to develop a commune for members to exchange views and knowledge on the current and ensuing issues concerning IS audit, controls and security. Another focus will be HK Chapter’s role in establishing ISACA’s presence in China through promotion of the CISA/CISM examinations and educational seminars. All these development places tremendous demands on time and efforts of the Chapter’s leadership including both the Board of Directors and Committee Members, to organize various effective functions and activities for members. Who’s who................................... 18 1 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS However, this is not enough - more importantly we need participation from you as our members and to volunteer your time to assist in our event organization to put these goals into reality. We extend our open arms to you for your contribution in whatever capacity and magnitude. Let us all wish for a prosperous year of 2004, and a year of advancement in the development of IS audit, controls and security. Whilst staying in touch via emails and websites, our Board of Directors also look forward to the opportunity of meeting you in person during our monthly CPDs and various Chapter activities. Of course your advice and comments are always welcome! Best regards, Susanna Chiu President President’s AGM message An extract from Ms Susanna Chiu’s AGM message, detailing some of the Hong Kong Chapter’s achievements over the prior year. December 4, 2003 Membership Continuing the trend of the last few years, the Chapter’s membership continues to increase. As at the end of September 2003 the Chapter has 1,124 members, and has received the Growth Award in membership from ISACA International for 2002/03. Of the 150 chapters globally, this makes us the 2nd largest chapter globally in terms of membership after Korea, and we continue to grow especially with the accelerated interest expressed from our prospective members from Mainland China. Professional consulting The chapter is taking an increasing role in providing comments on legislation and standards. In 2002/03 the chapter was involved in the following activities: 1. Hong Kong IT Sector visit to the Party Leader in Beijing, October 2003 2. Represented on the Working Group of the IT Professionals Registration System in HK. 3. We are an active member of the IT Ethics working group run by the Hong Kong Independent Commission Against Corruption (ICAC) designing and promoting ethics standards for IT professionals, and sits on the Editorial Board of ICAC with other professional organizations to develop a management package for use by managers on integrity issues in an eworking environment. The title of the package is "Leveraging Information Technology - A Practical Guide on Ethical Management" which was published at the end of 2002. 4. We sit on the Advisory Committee of Sin Chung Kai in advising IT policies and regulations to the Government, and attend regular meetings of the Committee. Member and public communication Emails are a popular medium for informing members of chapter events as well as being a source of revenue for the chapter for advertising education events and job vacancies. We continue to maintain a web site, which is a useful source method for providing information to our members and the general public. It also provides some advertising income for us. We continue to establish alliances with professional organizations to co-organise workshops and support their activities. CISA This year was another successful year for our CISA Review Course. Due to an overwhelming demand, the course had to be split into two to accommodate over 90 participants. We received good feedback and it will continue to be held, providing the Chapter with an affordable CISA course but also as one of the chapter’s main source of revenue. There are participants from Mainland China in the Course. We had over 500 people sitting the CISA exam. The number is lower than last year due to SARS impact. Nevertheless, the rate is still high compared to other parts of the world. 2 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS Awards/Achievements in the year HK Chapter was awarded the Best Chapter for large chapters (amongst all the large sized chapters internationally) HK Chapter was awarded the Fastest Growth in Membership Award Our website was honored the ‘Gold Award’ Our Chapter celebrated our 20th Anniversary in 2002, and, Our Chapter has successfully applied for the eligibility of our CISA members as voters in the 2004 IT Constituency Election. Seminars/Education Attendance at seminars continues to be satisfactory with members of the Chapters and other associations such as HKSA and HKCS present. At each of our seminars one attendee at random is presented with a $100 book voucher. Conference, programmes and monthly CPD seminars were organized as follows from Oct - Nov 2003: SUBJECT World Congress of Accountants 20th Birthday Cocktails and ISACA President Speech A voluntary recognition scheme for certification Business Continuous Planning ebXML IT Functional Constituency Election Briefing CISA/CISM Briefing SAP Audit Training Workshop Career Forum – “Creating a Niche in Your Career” CISA Review Courses (10 weeks) Wireless Lan Security eGovernment system: A practitioner’s perspective CISA, COBIT & Model Curriculum intro to Hong Kong Baptist University Telecom Fraud Cyber Ethics Day (Exhibition Booth) Participation as speaker in InfoSec Seminar Networking Hour with HKCS Electronics Eavesdropping A formalized approach to ISMS Update on Sarbanes-Oxley, XBRL Draft Code of Practice on Monitoring and Personal Data Privacy at Work Software Quality and Project Management Visit of HK IT Sector to Beijing IS-Summit SPEAKERS/ORGANISATIONS ISACA booth at the Exhibition Dr Robert Roussey, International President of ISACA DATE 18-21 Nov 2002 20 Nov 2002 Nov 2002 Mr Henry Ee Dr. David Cheung, HKU Hon. Sin Chung Kai, LegCo Barbara Tam/Michael Huen/ Susanna Chiu Mr Mike Ward, SAP Consultant Sponsored by Ambition. Speakers: Hon Sin Chung Kai, Michael Chan (DBS), John Barnes (KPMG), Paul Jackson (HK Police), Guy Days (Ambition), Susanna Chiu/Philip Ting (ISACA [HK Chapter]) ISACA Directors and invited speakers Mr John Lauderdale, PWC Mr Michael Yung, ESD Life Dec 2002 7 January 2003 16 January 2003 21-22 Feb 2003 25 March 2003 1 March – 31 May 2003 6 May 2003 3 June 2003 Raymond Chan 10 Jun 2003 Mr Robert Southworth, PCCW HK Police Mr Vincent Chan, ISACA ISACA & HKCS Mr Robert Southworth, PCCW Mr Dale Johnstone, PCCW Mr William Gee, ISACA Mr Tony Lam, PCO 24 Jun 2003 15 Jul 2003 17 Jul 2003 18 Jul 2003 22 Jul 2003 20 Aug 2003 23 Sep 2003 21 Oct 2003 Mr Raymond Tang, HKJC All IT Associations including ISACA (HK Chapter) ISACA co-organised with HKCS, HKPC, HKCERT, PISA & BSI 25 Nov 2003 28-30 Sep 2003 17-18 Nov 2003 Administration We have procured the services of Mega Business International Limited as our administrative support company and Grant Thornton as our auditors and secretarial support firm. Summary Overall the chapter is financially stable, has the support of a large membership, and is driven by a professional and now strengthened Board. With the Board’s leadership, the chapter will continue to promote and advance the profession in HK amongst professionals and the general public. 3 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS Conferences and Training Weeks An update on global ISACA conferences and training weeks 2004 GLOBAL EVENTS EDUCATIONAL EVENTS EuroCACS Zurich, Switzerland 21-24 March 2004 Web site: www.isaca.org/eurocacs2004 HK: Integrated Security Conference & Expo" on 17 &18 Feb on Level 6 HKCEC North America CACS Chicago, Illinois, USA 8-13 May 2004 Web site: www.isaca.org/nacacs2004 1-5 March 2004 Charlotte, North Carolina, USA International Conference Cambridge, Massachusetts, USA 27–30 June 2004 Web site: www.isaca.org/international2004 Network Security Conference Las Vegas, Nevada, USA 8-10 September 2004 Web site: www.isaca.org/nsc2004 Oceania CACS Melbourne, Victoria, Australia 6-8 October 2004 Latin America CACS Mérida, Yucatán, Mexico 24-27 October 2004 Web site: www.isaca.org/lacacs2004 IS Audit & Control Training Weeks 24-28 May 2004 Seattle,Washington, USA 28 June - 2 July 2004 Cambridge, Massachusetts, USA 20-24 September 2004 Amsterdam, Netherlands 27 September - 1 October 2004 Chicago, Illinois, USA 1-5 November 2004 Toronto, Ontario, Canada 6-10 December 2004 Atlanta, Georgia, USA Web site: www.isaca.org/trainwk Network Security Conference (Europe) November 2004 Budapest, Hungary Asia CACS Location and date TBD Check www.isaca.org/conferences for the most recent list of ISACA conferences and educational events. CISA and CISM Exam Information ** CISA and CISM certification exam early registration deadline fast approaching ** Register on or before 4 February and SAVE: Save US$80.00 by registering online (www.isaca.org/examreg) Save US$50.00 when you fax or mail your registration Key dates: Early registration deadline: 4 February 2004 Final registration deadline: 31 March 2004 Exams given worldwide on: 12 June 2004 Registration for the exam is extremely heavy near these dates. We strongly encourage you to register well in advance to avoid any delay. 4 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS Membership FAQs How do I renew my membership online? Logon to the web site using your personal access credentials, which were included with the 2004 invoice mailing. Upon login, you will be directed to MY ISACA, which includes a link to MY RENEWALS in the left margin. How do I notify ISACA of my new address, phone, etc.? Update your profile online by navigating to Members & Leaders, My ISACA, My Profile, Constituent Profile. You may also send changes via email to membership@isaca.org or by fax at +1.847.253.1443. Please also notify the Chapter Membership of the changes by emailing membership@isaca.org.hk, so that the affected changes are also updated in the chapter membership database immediately Are there any online discussion groups I can participate in? There are currently five listservs sponsored by ISACA, ITGI and ISACA chapters. There is a general topic listserv run by the Central Indiana chapter, a COBIT listserv, Information Security Manager Discussion Forum, and the IT Governance Discussion Forum. For information on subscribing to all listservs, refer to www.isaca.org. Global membership statistics MEMBERS FROM MORE THAN 100 COUNTRIES 45% US and Canada 25% Europe and Africa 23% Asia and Middle East 4% Australia and New Zealand 3% Central/South America ISACA MEMBERS BY TITLE 45% IS audit management and staff 15% CEO/CFO/CIO/Audit partner and director/security director 12% IS consultant 8% Information security management and staff 6% IS manager 14% Other ** CISA Chapter Members take note! ** As noted in the President’s AGM Message, your Hong Kong Chapter has successfully applied for the eligibility of our members as voters in the IT Constituency Election for 2004. At the request of the Electoral Office we will be contacting qualified CISA HK Chapter member candidates to obtain their Hong Kong ID numbers and to confirm their names. To assist the process, please ensure your contact details, including email address, are correct. Details of how you can update your profile are listed above under “Membership FAQs”. 5 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS Control Objectives for Net Centric Technology Introduction Since the introduction of window based net centric technology in 1985, there has been a paradigm shift. The significant difference in the net centric technology environment, compared with traditional computer processing, is that the traditional systems consider the location of hardware first, as well as the related software and data stored on the hardware. ISACF Development However, net centric technology considers the network as the primary concern. If hardware and facilities, which have capabilities of handling objects (software and data), are linked to this network, the actual location of the hardware is not considered a limitation. Rather the contents of information or objects are of significant importance. Today, many organisations are either planning initiatives, or have already migrated to a net centric technology environment for mission critical and mission sensitive systems. The implementation of net centric technology must be economical, effective and efficient with sufficient reliability and security, as well as meet the enterprises' managerial requirements. The success of Internet portal sales is generating another paradigm shift driving business to an Electronic Commerce (eCom) environment. eCom using Internet digital graphics capabilities and global network techniques is making significant inroads in businesses worldwide. According to a Cisco-Systems funded study from the University of Texas Graduate School of Business, the Internet is now one of the most pervasive, profitable and fastest growing industries in the U.S., rivaling the auto-mobile and telecommunications industries. It was recognised as absolutely essential to react to these fundamental shifts taking place, with a desire to formulate a generally accepted and comprehensive set of control objectives to use within the net centric technology environment. It is to address major parts of these concerns that the ISACF developed an "IT Governance Model". Within this model, ISACF has prepared Control Objectives for Net Centric Technology which focuses strongly on the Information Technology enablers, which allow the enterprise to be governed. These Control Objectives advise management, user and control and assurance professionals as to what controls may be necessary within their enterprise, and within the wider global communications environment in which it operates. ISACF recognises that the work of the Committee of Sponsoring Organisations of the Treadway Commission Report Internal Control Framework (COSO), has provided the basis for business process model and the model now put forward by extending the scope of coverage to the net centric technology environment. WHAT CAN CONTROL OBJECTIVES FOR NET CENTRIC TECHNOLOGY OFFER? Control Objectives offers a broad range of building blocks against which the control practices within your enterprise can be matched to determine the effectiveness of the control environment. These control objectives have been developed by an international team from ISACF, using the latest thinking and best emerging practices from major information and knowledge businesses. As such, they represent a major new knowledge resource to enterprises, as well as new avenues of practice in enterprise management, control assessment, risk management, and auditing. For example, a typical IT Governance model within an enterprise is generally comprised of business control objectives, organisational communication control objectives and IT control objectives. The IT control objectives must support the organisational communication control objectives, and the organisational communication control objectives must then support the business control objectives. Therefore, the IT control objectives relating to information services must support the business control objectives. Business Control Objectives cover: o Core business events activities (products, services, etc.) o Enterprise resources activities (human, facilities, etc.) Organisational Communication Control Objectives cover: o Planning activities (goals sharing) o Monitoring activities (current status sharing) o Knowledge management activities (knowledge sharing) o IT Control Objectives serve as a link to COBIT (ISACF's comprehensive Control Objectives for Information and related Technology environments) and IT resource activities Control Objectives for Net Centric Technology (CONCT) focuses on the following activities: o Intranet/Extranet/Internet (I/E/I) o Data Warehouses and OLTP (Online Transaction Processing system) 6 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS WHY READ THIS DOCUMENT? Control Objectives for Net Centric Technology (CONCT) provides well-structured ways of under-standing and assessing the very complex centric technology environment that exists. This provides management and IT control professionals a quick guide when addressing controls within this environment. Concepts and language of the latest developments are also used to assist users, firstly to familiarise themselves with the control objectives, and secondly to differentiate what is presented from the practices of the past. The concepts and language used are explained in the glossary section. Among the concepts covered are: Object Oriented Governance, Information Objects, Net Centric Technology DO CONTROL OBJECTIVES FOR NET CENTRIC TECHNOLOGY RELATE TO OTHER CONTROL MODELS ? Yes, however they pull best practices from other models, and then take a fresh look at what control in the total enterprise means. The control objectives offer a holistic approach - a true enterprise approach of greater substance and depth - as well as linkage to the best of other models. Control Objectives for Net Centric Technology represents a specific application of ISACF's COBIT Control Objectives for Information and related Technology for general IT resource control. COBIT itself has been harmonised with over 30 global professional standards. COBIT is consistent with the COSO, an internal control framework, developed by the Committee of Sponsoring Organisations of the Treadway Commission. Consequently, these new control objectives, introduced in this research, provide the IT means to enable the business of the enterprise to operate effectively in the net centric technology environment. HOW SHOULD THE IT GOVERNANCE MODEL FOR NET CENTRIC TECHNOLOGY BE USED? The IT Governance Model may be used as a framework for effective governance of a complex enterprise in a fast changing information technology environment. Regular monitoring of activities against an established IT Control Model is essential to ensure an enterprise's governance is proceeding as planned. To set up an appropriate IT Governance Model, the enterprise must first scope its business by mapping blocks of business activities (business processes) and related business resources/objects. This mapping will be used as the guide for assessing the business control and net centric technology environment. Second, the enterprise needs to assess its ability to govern its activities by analysing its information sharing activities (Organisational Communication Control) and the extent to which it shares its goal, status of its current information and status of its current knowledge base resources. The sharing activities cover not only business activities but also net centric technology activities. These assessments form the basis for the management of an enterprise to take corrective actions or redirect resources, as needed. Unless an IT Governance Model is introduced, an enterprise runs the risk of its IT and business objectives not being in alignment with its activities and use of resources. WHO SHOULD USE CONTROL OBJECTIVES FOR NET CENTRIC TECHNOLOGY? Executive management and all people who have roles and responsibilities for managing an Enterprise should use this model. Management, owners of business objects and processes, IT design professionals, and assurance, security and control professionals, are all likely to have roles and responsibilities in ensuring effective utilisation of net centric technology control within the enterprise. Emerging professionals such as information object designers, net security professionals and knowledge engineers will be key players in planning and implementing an effective IT Governance Model for Net Centric Technology. Refer www.isaca.org for more details. 7 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS CISA Certification Earns Largest Bonus Pay Sept 2003 Despite downward pressure on pay for information technology skills and certification, a report by Foote Partners, LLC indicates that premium pay for professionals holding the Certified Information Systems Auditor (CISA) certification increased by 25 percent during the past 12 months. Offered by the Information Systems Audit and Control Association (ISACA) since 1978, the Certified Information Systems Auditor (CISA) designation is a globally accepted standard of achievement in the IS audit, control and security field. The Foote Partners report confirms the value of earning a CISA designation. The 25 percent increase was the largest reported among the 55 certifications surveyed. In fact, according to the survey, overall, premium bonus pay for the certifications surveyed fell by nearly 6% over the past twelve months. CISA is among the exceptions. "This survey shows that CISA continues to be a valued certification, even during economically difficult times," said Ria Lucas, chair of the CISA Certification Board. "Earning the CISA designation helps assure a positive reputation as a qualified IS audit, control and security professional-and that reputation pays off in tangible compensation. CISA designation holders are skilled in good practice for IT and related risks and are also well positioned to take up opportunities in today's market place in a broader range of IT Governance roles." In 2003, a record number of candidates (11,900) registered for the CISA exam. This marked the 10th consecutive year that registrations have set a new record. The exam was administered in June at approximately 200 locations around the world and in 11 different languages. Information about CISA and the CISA exam is available at the ISACA website: www.isaca.org. The Foote Partners, LLC findings are published in the "Quarterly Hot Technical Skills and Certifications Pay Index." Additional information can be found at www.footepartners.com. Six Steps to Improving IT Governance 1. Match IT governance with corporate culture. For example, in an enterprise that relies on consensus building, IT governance should take a democratic approach. 2. Align authority with relevant functions. For example, marketing execs should be able to discuss the implications of sales-force automation on sales operations. The original article is available from www.isaca.org. 3. Clarify roles and responsibilities. For each IT decision, specify who provides input, who makes the decision, who communicates the decision, and so on. 4. Integrate and adapt governance mechanisms. Structures and processes such as committees and task forces should be monitored and then adjusted as necessary. 5. Measure IT governance effectiveness. Governance should start by setting controls but move increasingly toward delivering business value. 6. Facilitate IT governance evolution. IT governance must evolve with the changing vision and strategy of the enterprise. For example, as you increase your ability to use technology for competitive advantage, IT decisions might increasingly involve business leaders. 8 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS Data Mining and the Auditor's Responsibility The beauty of the new system, from Mr. Morse's perspective, was that it enabled him to scrutinize the debit and credit side of transactions. By clicking on a number for an expense on a spreadsheet, he could follow it back to the original journal entry—such as an invoice for a purchase or expense report submitted by an employee, to see how it had been justified.... By the first week in June, Mr. Morse had turned up a total of $2 billion in questionable accounting entries. By Bob Denker, CISA, CIA, CFE The original article is available from www.isaca.org. Having found the evidence, the audit team was suddenly faced with how serious the implications of their endeavor really were. Mr. Morse, 41, was known for his ability to use technology to ferret out information. Mr. Morse grew increasingly concerned that others in the company would discover what he had learned and try to destroy the evidence, he says. With his own money he went out and bought a CD burner and copied all the incriminating data onto a CD-ROM. He told no one outside of internal audit what he had found. 1 Every internal audit officer should read the article from which the above quotation was cited. While not every audit staff can consist of diligent auditors like Gene Morse or his boss, Cynthia Cooper, vice president of audit at WorldCom, the auditors the staff does contain can be trained and educated to perform their audits in a similar, meticulous manner. It is easy to become complacent when one can boast of an audit staff consisting of a handful of CPAs, CISAs, CIAs and possibly a CFE. In addition, there may be a technical guru who has written a series of ACL batch routines, which is far from being sufficient. Having the expertise and knowing how, when and where to apply that knowledge are not the same. This article hopes to educate the IA department decision-makers on how best to use their limited resources. The biggest mistake many companies make is to entrust the audit software to a technical support staff. Senior management sees this as a cost saver by virtue of not having to train and support internal auditors to perform audit analysis routines themselves. Audit analysis software, such as ACL or IDEA, is best used as a sensitive analysis tool, i.e., continually tweaking the variables (the author supports the concept of continuous auditing but it will not be discussed in this article). While running batch routines is sufficient to validate prior assumptions, it will not replace the iterative analytical process. In addition, the auditor best learns about business rules and processes by taking a hands-on approach. The truth of the matter is, and many technical auditors will agree, the majority of extraordinary audit findings are accidental. As an example, several years ago the author of this article was performing an audit of a suspense account system and found no —material— suspense items. However, digging deeper into the suspense files, several hundred small-dollar items (some less than a dollar) were uncovered that were two years old or more. This discovery was made shortly after the accounts receivable (A/R) staff indicated that they reconcile most suspense items every two to three months. Had the audit been conducted in the more traditional manner, i.e., looking only for large monetary items, the problems with the A/R department never would have been uncovered. The problem with most audit departments is that they are locked into the traditional ways of performing audits. Yes, many chief audit officers have embraced analytical software, but they are merely tools and not the true paradigm shift in audit methodology that is required today. Audit departments must learn to think outside the box. Auditors should perform all of the analytics themselves, and they must be educated in fraud detection and introduced to data mining techniques. When the concept of data mining is brought up, audit managers cringe and argue that they cannot afford to employ statisticians. However, while there is data mining software that requires a statistician's level of expertise (such as IBM's Intelligent Miner), there also are products, such as WizRule from WizSoft Inc., that can be employed by most auditors who are acquainted with the fundamentals of Microsoft Office and who are curious as to why they obtained their audit results. What Is Data Mining? Data mining is the process of extracting knowledge hidden in large volumes of data. The data mining tools look for trends or anomalies without knowledge of the meaning of the data. Data anomalies are not necessarily the result of fraud, but can be the result of a range of different factors. In many cases they are caused by faulty data entry, where the user has typed in one value instead of another. Also, errors sometimes are the result of software or hardware malfunctions, resulting in corrupted data. Obviously, such errors can cause considerable damage, which cannot be 9 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS easily measured but which could be of serious proportions, resulting in direct loss of both income and reputation. In other cases, errors are made intentionally. Data Mining Applications While many of the applications of data mining concern market analysis and customer retention, there are numerous applications specifically for fraud detection and prevention. It should be emphasized that the user does not normally specify the fields to look for in the relationships; rather, the data mining program reads all of the data and determines if relationships do exist among data fields. In the case of WizRule, relationships can include any of the following: Formula rules If-then rules Spelling rules An example of a formula rule is: A = B * C Where: A = Total B = Quantity C = Unit price An example of an if-then rule is: If Customer is Summit and Item is Computer type A, then the price = 765. An example of a spelling rule is: The value Summit appears 52 times in the Customer field. There are two case(s) containing similar value(s), such as Sumit and Sumitt. These rules mainly are presented to reveal cases of misspelled names. A name is suspected as misspelled if (a) it is similar to another name in his field, or (b) if the frequency of the first name is very low, while the frequency of the second name is very high. These are extremely significant findings in that many audit programs are based upon specific searches such as "Show me all of the open accounts in Cleveland." Individuals wishing to perpetrate a fraud and who can override edit routines could easily hide their activity by changing "Cleveland" to "Clevelland" and thus escape detection. Here is a short list of data mining applications that should gather the attention of the audit selection maker: 1. Human resources: Employees earning salaries inconsistent with their title; employees not availing themselves of benefit programs (perhaps to maintain as much anonymity as possible); employees whose household address matches an address from the vendor file; employees appearing more than once on umbrella security files 2. Financial applications: Structured transactions (clients who make cash/travelers check/money order contributions to annuities, single premium life insurance, mutual funds, etc.) in aggregate amounts that exceed the US $10,000 reporting threshold; clients making contributions to investment vehicles that are disproportionate to their income 3. Medical/dental applications: Patient substitutions; over-utilization of specific diagnoses inconsistent with the patient population; excessive number of patients traveling great distances to a provider (could indicate provider utilizing a postal drop site); provider open seven days a week for disproportionate number of non-emergency procedures (could indicate provider is filing false claims and is spreading out the submissions to divert suspicion) 4. Assistance in due diligence testing: By revealing the business rules, data mining tools can be used to train new auditors and, for new areas or new systems that are being audited for the first time, they are the ideal application to be used for due diligence testing. 5. Construction and purchasing: Payments made earlier than the contract specification date; invoices for large purchases made at the end of fiscal accounting period; price of goods inconsistent with industry costs With the introduction in the US of the Sarbanes-Oxley Act of 2002 and the implementation of HIPAA (Health Insurance Portability and Accountability Act of 1996), audit committees will not accept excuses from the audit department that it was unaware of major fraud occurrences. It is time to have the chief audit officer address the issue of an enlightened audit staff. Endnotes 1 Pulliam, Susan; Deborah Solomon; "Uncooking the Books—How Three Unlikely Sleuths Discovered Fraud at WorldCom," Wall Street Journal, 30 October 2002 Bob Denker, CISA, CIA, CFE is an independent audit consultant who specializes in teaching audit software and fraud investigation applications. He has more than 32 years of information systems experience, with 13 years in auditing and special investigations. In addition, he has taught courses in data analytics, fraud detection and fraud investigation. He is currently an adjunct professor of information systems at Baruch College of the City University of New York, USA. Denker may be contacted at profdenker@aol.com. 10 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS Guidelines Meld IT Governance, Sarbanes-Oxley Compliance The original article is available from www.isaca.org. Among the tools available to companies grappling with the SarbanesOxley Act are standardized frameworks for IT governance and accounting controls that can be used to link Sarbanes-Oxley documentation activities with corporate IT management procedures. For instance, the IT Governance Institute and the Information Systems Audit and Control Association, both of which are based in Rolling Meadows, Ill., publish a set of guidelines called Control Objectives for Information and Related Technologies. The six-volume set, known informally as Cobit, contains an IT governance model as well as management guidelines for determining how effectively a company controls IT and improvements that could be made. The two organizations released a third edition of Cobit in 2000. A majority of the documents are available for free download as an open standard at www.isaca.org/cobit.htm. Cobit can serve as an effective bridge between IT governance and Sarbanes-Oxley compliance efforts, said Pamela Fredericks, a senior security consultant at Forsythe Solutions Group Inc. in Skokie, Ill. "If an IT organization follows Cobit, they'll have the documentation to help the CFO comply with [Sarbanes-Oxley]," she said. Another framework that can be used to improve the quality of financial reporting has been developed by COSO, which is officially known as the Committee of Sponsoring Organizations of the Treadway Commission. The commission is named for James C. Treadway Jr., a former member of the Securities and Exchange Commission and the initial chairman of COSO. All COSO publications are available through the American Institute of Certified Public Accountants, which is based in New York and can be reached online at www.aicpa.org. COSO's framework focuses on internal accounting controls and is one of the original sources used to create the Cobit guidelines. Companies can apply the accounting tenets set out by COSO to help them achieve Sarbanes-Oxley compliance, Fredericks said. Uruguay Central Bank adopts Cobit for entire Uruguayan Financial Market Financial Intermediary Institutions - Requirements for the Administration of Information Technology Areas. Juan Pedro Cantera, Area Manager Banco Central del Uruguay - Secretaría de Gerencia General, J.P.Fabini 777 esq. Florida - CP 11100 - Montevideo, Uruguay The Superintendency of Financial Intermediary Institutions (Superintendencia de Instituciones de Intermediación Financiera) will evaluate such management system, considering the four domains described in COBIT. which are detailed as follows: This is to communicate to the Financial Intermediary Institutions, that, for the administration of the Information Technology Areas, a Management System must be adopted, which includes the best practices on the subject. For this purpose, these areas should consider as a guideline, the principles established in the COBIT. (Control Objectives for Information and Related Technology) reference framework provided by the Information Systems Audit and Control Foundation (ISACF) in the USA. 1. Planning and Organization - Covers strategic and tactic aspects and analyzes the way Information Technology contributes to the accomplishment of the business objectives. It also refers to the planning, communication and administration for attaining strategic objectives, placing emphasis in the coordination between upper management, Information Technology services' users and the Information Technology area. 2. Acquisition and Implementation - Covers the identification, development or acquisition of technological solutions and their consequent implementation and integration in the business process. It also covers change and maintenance of the existing systems, to guarantee the continuity of their life cycle. 3. Delivery and Support - It refers to the effective delivery or provision of services that are required for the Information Technology area, covering traditional systems operation, security, operations continuity, recovery and training aspects, as well as all the procedures and processes that are needed. 4. Monitoring - The Information Technology processes must be evaluated in a regular manner, to ensure the compliance of quality, security and control requirements. This domain covers the participation of internal and external audit, to guarantee the independence of the judgements and conclusions prepared by the Information Technology management, that are related to the controls performed over the processes. 11 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS Business Continuity Plan Testing: Considerations and Best Practices An ever-growing number of organizations have invested heavily in business continuity management since 11 September 2001. They now face the daunting task of validating the plans created by their organizations and training their recovery personnel to use the new documents. Having never organized or conducted a business continuity test (or exercise), new business continuity management (BCM) coordinators are looking for guidance regarding the best and most costeffective process to validate plan content. This article captures thoughts, observations and industry best practices regarding plan testing. By Brian Zawada, CISA, CBCP Why Test? The original article is available from www.isaca.org. Company X has a highly developed business continuity management process. Every six months, the organization exercises this capability in the form of a combination "table top exercise" and disaster simulation. The investment in time is fairly high—the disaster simulation involves a ruptured onsite chemical tank, caused by a vehicle accident. (Previously totaled vehicles from a local junkyard are brought onsite to add realism.) Select executive managers speak to the media (who are invited weeks in advance), local emergency management agencies participate, and key customer contact information is verified. Why such elaborate measures? Company X wants to showcase its investment and instill confidence in the public, employees and customers. After all, Company X is prepared to handle an emergency response and recover key production processes. Management views its business continuity capability as a market differentiator, and the goodwill generated by this very visible test is a form of ROI—the public is happy with its responsible neighbor, employees feel secure their company is protecting them, and key customers recognize their supplier will be around to serve their needs, despite a disaster. In addition to instilling confidence in all stakeholders, tests are valuable given that they are typically the most realistic training event possible. Also, as regulatory bodies in a growing number of industries levy business continuity requirements, tests become a requirement as well. Regulations in the financial services, insurance, energy and healthcare industries, to name a few, mandate business continuity testing. However, the most important and valuable aspect of business continuity testing is the validation of documentation and processes. Process recovery procedures, manual workarounds, server build procedures, resource listings and call trees cannot be counted on until tested and proven complete and accurate in a test environment. Different Types of Tests Conducting the same test twice a year will lead quickly to stagnant outcomes and bored participants. Therefore, it is important to mix it up. This section highlights the kinds of tests available for an organization, as the well as the implications associated with each. Regardless of the type of test employed, actual data should be incorporated and real-world conditions simulated whenever possible. Additionally, the test scenario should be developed based on the results from the risk assessment. A likely risk to which the organization may be vulnerable should be chosen. Start small if the organization is new to BCP testing. As the business continuity process matures, the size and complexity of the test should be increased. 12 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS Test Type Description and Implications Section 1.01 desk check (e.g., boardroom style or table-top testing) Assemble recovery team members and walk through the plan using test scenarios and a series of test scripts. Table-top testing is the safest to do, but the least useful because recovery strategies are not really tested or operationalized. Visualizing the business continuity plan (BCP) in action is part of the development process, but the value is limited. A more in-depth simulation will provide a stronger understanding of how the response teams work together, as well as a sense of the time needed for recovery and restoration activities. Simulation (e.g., full-scale Simulate a disaster and determine how well the plan responds to the specific event in the interdependency testing operational environment. This method may be the most costly testing method and also the and walk-throughs) most dangerous to the business, if not isolated properly. Procedure verification test Limited in scope to a specific process or business unit, procedure verification testing (e.g., business function evaluates the logic of a specific procedure to determine if a deficiency exists through a testing) combination of desk checks and simulations. This approach is useful following an isolated business continuity test failure. Communications Communication is a key component of a BCM process. Test the accuracy and completeness of the organization's employee call tree, customer contact information channels and critical supplier/vendor/business partner contact information as part of a table-top exercise or simulation, or potentially as a stand-alone activity. IT environment (systems and application) walkthroughs Conduct an announced or unannounced disaster simulation and execute documented system recovery procedures. The primary objective—verify critical systems and backup data can be evaluated based on a specific timeline and documented application interdependencies. This scenario exercises "active-active" and "active-backup" IT continuity models. Business continuity coordinators also have a responsibility to be original and capture the interest of test participants. For example, one coordinator operates his tests like a Monopoly game, using chance cards to insert anticipated variables into the test process. Others insert a bit of realism by randomly selecting personnel to sit out and observe tests to see how the rest of the team reacts. These are just a few ideas to add realism and keep exercises interesting. Before Testing As with any other business activity, the business continuity test will be successful only if planned appropriately. Test scenarios, objectives, assumptions and evaluation criteria should be formally developed and published prior to test execution. Test scenarios and scripts are most realistic if based on the results from the organization's risk assessment. Successful organizations have discovered that management sign-off on the test plan leads to increased business unit support and attention to detail. Artificialities should be minimized. Ensuring that the appropriate personnel participate in the test is critically important. Plan testing is a form of BCM training, and the development of recovery team members with deep skills and experiences is an essential outcome. The corollary also is true—organizations should identify not only primary recovery team members, but also alternates, second alternates, third alternates and so on. These backup personnel should be trained, and must be familiar with recovery procedures. Business continuity coordinators must strike a balance. Both breadth and depth of recovery skills are important to a successful recovery effort. The final pre-test consideration is the process to manage the test and collect data—team feedback, required amendments and planning gaps. A range of test management issues, including start times, stop times, coordination between business units, and observers, should be considered. Business continuity coordinators must identify the process and personnel to observe the test and capture the results in line with the metrics established prior to test execution. Frequency How often should organizations test their business continuity plans? BCM experts answer in one way—as often as possible. Management expectations, test objectives, the maturity of the planning process and system/process criticality are all factors when deciding how often to test. The majority of organizations test business continuity processes one or two times a year; however, this can be increased by such factors as: Changes in business processes 13 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS Changes in technology Change in BCM team membership Anticipated events which may result in a potential business interruption Organizations also may choose to conduct more tests or exercises if operations are decentralized across multiple locations. Additionally, some business continuity coordinators choose to conduct testing in stages given the size of their IT infrastructure, the size of the business or their relative inexperience with BCM testing. Others want to rotate as many people as possible through the training experience, given the valuable benefits. Regulatory requirements also may influence the number of tests performed annually. Regardless of how many tests are conducted each year, they should be scheduled in advance to ensure maximum participation. A progressive, incremental schedule that includes a timetable of events should be developed. Common Pitfalls Common pitfalls experienced by organizations testing business continuity processes have been discussed throughout this article. To summarize, here are a few of the common issues: Testing an ad-hoc business continuity process—Many organizations attempt to test an undocumented business continuity process. Testing a professional's improvisation skill may lead to a false sense of security and ultimate failure during an actual business interruption. Time must be taken to document the business continuity process and then test it. Addressing only IT disaster recovery planning (DRP) or business recovery planning (BRP)—Fortunately, the number of organizations focusing solely on IT disaster recovery plan testing (i.e., recovering systems offsite) is shrinking as integrated business and IT testing becomes more common. Failure to establish test objectives—The scope of the test and areas where the organization may be uncomfortable with its present BCM capability should be charted. Failure to do so may lead to gaps in planning and a recovery strategy that fails to meet business objectives. Failure to follow documented procedures—The most common pitfall experienced by organizations is a failure to follow documented procedures for response, recovery and restoration. Testing is a time to validate these procedures. Even for the most experienced recovery team members, this process is critical given that the least experienced person may be the one who uses the BCP for recovery purposes. Static test types and scenarios—The quality and quantity of test participation will quickly diminish if the business continuity coordinator uses the same test type and same test scenario year after year. Not only that, management will lack the confidence that the BCM process can address multiple threat scenarios. This may be avoided by investing in the development of varied testing scenarios and the use of multiple test types to generate interest and build a sense of confidence in the planning process. Surprise tests should be conducted when possible, taking into account financial and safety implications. The wrong players—The BCM test should include personnel identified in the business continuity plans. Recovery teams with deep skill sets should be developed, but experienced backup personnel should be available. The use of backup recovery personnel as observers to improve their awareness and breadth of experience should be considered. Additionally, executive management should continue to run day-to-day business operations, but focus on their recovery procedures on a non-interference basis if identified in the plan. The missing pieces—Not only do the best, most successful business continuity tests eliminate artificialities, they also address as many critical business components as possible. As part of the test scope, the following should be considered: o Obtain and test data (and hard-copy records) stored offsite. o Evaluate vendor performance and service level agreements. o Involve governmental entities during the test, as appropriate. o Verify the accuracy and completeness of the organization's crisis communications process, to include call tree and customer contact lists. Publicize successes—As the continuity planning process matures, testing successes will multiply. In today's business environment, a proven, successful business continuity management process is a differentiator. Investors, customers and employees should be informed of successes, as well as media. Be proactive with offers to be a case study. Another option is to send the business continuity coordinator to a trade show as a featured speaker. Take advantage of the investment. 14 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS What Should Happen After the Test? Now that the test is over, what's next? Before everyone leaves, have a quick meeting and facilitate a brainstorming session. What went well? What could be done differently? Try to have as many people involved as possible—one person's idea will spur others. Document the results of the test. Did the organization meet objectives? What should be done differently during the next test? Capturing results will improve the plan and future testing. Test results should be formally critiqued at a later date will the existing business continuity process meet business objectives and customer expectations? And perhaps most important, communicate test results to management after all, management is ultimately responsible for the continuity of critical business processes. Plan inadequacies should be identified and action items and track remediation activities should be assigned. During the next test, the test scenario should touch on untested or previously "broken" components of the business continuity process. For plan components resulting in recovery failure (or potential recovery failure), immediate retesting should be considered. Finally, the organization's general counsel should be consulted to ensure test documentation is retained in the proper format and for the correct length of time to avoid potential litigation. Conclusion A business continuity plan is not complete until it is tested. Untested business continuity plans cannot be relied upon following a business interruption or disaster. A formal BCM testing process provides management, customers, suppliers and employees with the assurance that the plan will work as documented. An effective test can have many things go wrong. The organization should not be afraid to make these mistakes, identify them and then correct each in a logical manner reflecting business objectives. Keep in mind: it is best to make the mistakes before the actual business interruption takes place. Brian Zawada, CISA, CBCP is a senior manager at Protiviti (www.protiviti.com), which helps clients identify, measure and manage operational and technology-related risks they face within their industries and throughout their systems and processes. He specializes in the development and implementation of BCM solutions nationwide. Brian can be reached at brian.zawada@protiviti.com. 2004 Certified Information Systems Auditor (CISA) Hong Kong Review Course The CISA examination is an international accredited programme administered by ISACA, first in 1981. The accreditation is held by professional from many different disciplines including finance and accounts, computer auditing, financial auditing and IT. Each year the ISACA holds the CISA examination in more than 70 countries (over 180 locations worldwide and in eleven languages) for persons wishing to be professionally certified as information systems auditors. The 2004 CISA examination, which consists of 200 multiple-choice questions and is administered during a four-hour session, will be held on 12th June 2004. A 10-week CISA Review Course organized by the ISACA (Hong Kong Chapter) is scheduled to commence on 6 March 2004 for candidates who need assistance in preparing for the CISA examination. The CISA Review Course fee is HK$2,200 for ISACA members, HK$3,000 for Hong Kong Society of Accountants (HKSA) and Hong Kong Computer Society (HKCS) members, and HK$3,800 for non-members. Some study aid materials may be provided but will not include the CISA Review Manual. Course participants are advised to purchase the manual through the Hong Kong Chapter at discounted price – HK$ 820 for ISACA/ HKSA/ HKCS members and HK$ 980 for non-members. 15 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS Provisional timetable Introduction, distribution of course details Process and Content areas review Saturday See below Saturdays 12:00-3:00p.m. or 3:30 –6:30p.m. Wrap-up session and mock test Saturday See above 06 – Mar – 2004 13 – Mar – 2004 20 – Mar – 2004 27 – Mar – 2004 03 – Apr – 2004 24 – Apr – 2004 08 – May – 2004 15 – May – 2004 22 – May – 2004 29 – May – 2004 It is important for you to attend the first day of the course on 6 March in order to obtain the final timetable of the review course and study materials. The course on Saturday 6 March 2004 will be held at: Ernst & Young Training Centre 4/F, Hutchison House 10 Harcourt Road Central, Hong Kong The date, time, venue and instructors of the above sessions would be subject to change at the discretion of the Board of ISACA (Hong Kong Chapter). Enrolment The enrolment form is printed on the next page. For further details, please contact our CISA Coordinators, Michael Huen at 2238-7270 (email: cisa@isaca.org.hk) Barbara Tam at 2848 6603 (email: cisa@isaca.org.hk) or visit our website at www.isaca.org.hk The deadline for enrollment is Friday 27 February 2004. Since seats are limited, enrollment is on first-come-firstserved basis. For information on how to become a member of the Association, please contact our Membership Director, Jean Wang (email: membership@isaca.org.hk). Course Payment Method All cheques should be crossed and payable to “The Information Systems Audit & Control Association (HK Chapter) Limited” and send it together with the enrollment form to the following address no later than Friday 27 February 2004 GPO Box 3247 Hong Kong Payment Policy: 1. 2. 3. 4. 5. 16 Acceptance of the enrollment is subject to clearance of the cheque. The receipt would be provided on the first day of the course. The payment is not refundable after the commencement of the course. All registrants who fail to attend some or all classes after the commencement of the course are liable for the entire payment. The ISACA (Hong Kong Chapter) reserves the right to reject the enrollment or amend any details of the course. Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS 2004 CISA Review Course Enrollment Form Date : 6 March 2004 – 29 May 2004 Time : 12:00 noon – 3:00 p.m. or 3:30 p.m. – 6:30 p.m. (Tentative) Venue : Ernst & Young Training Centre, 4/F, Hutchison House, Central Course Fee : ISACA Members: HKSA/HKCS Members: Non Members: Study Material : (Optional) 2004 CISA Review Manual: ISACA or HKSA/HKCS Members: HK$ Non Members: HK$ HK$ 2,200 HK$ 3,000 HK$ 3,800 820 980 Yes, I will enroll in the CISA Review Course Name : ISACA/HKCS/HKSA Member No. : Phone Number : Company: Fax Number : Email Address : Address : Accounting/Finance Auditing IT Auditing IT/IS Gen. Management Others Preferred Session: 12:00 – 3:00 3:30– 6:30 ISACA Member Review Manual HKSA/HKCS Member Review Manual Non Member Review Manual Fee HK$ 2,200 HK$ 820 HK$ 3,000 HK$ 820 HK$ 3,800 HK$ 980 Current Profession: Total (HK$) - QTY X X X X X X Cheque Number - I agree with the terms and conditions as stated on this enrollment form. Signature: 17 Date: Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS ISACA Hong Kong Chapter Committee Composition 2004 – Directors & Committee Members Board of Directors Position President Name Organisation Address Telephone Fax Susanna Chiu DVN (Holdings) Ltd DVN (Holdings) Ltd Room 1304-05, China Resources Building 26 Harbour Road Wanchai, HK 2585 7310 2151 9771 Global Risk Management Solutions PricewaterhouseCoopers Guangzhou c/- 81012801 c/- 81012802 Technology & Security Risk Services Ernst & Young 10/F Tower 2, The Gateway 25-27 Canton Road Kowloon, Hong Kong 2629 3751 2118 4142 Global Risk Management Solutions Pricewaterhouse Coopers 33/F Cheung Kong Centre 2 Queen’s Road, Central, Hong Kong 2289 2719 2297 0101 Internal Audit Morgan Stanley Asia Ltd 30/F, Three Exchange Square Central, Hong Kong 2848 6647 3407 5288 Hong Kong Housing Society Dragon Centre 23 Wun Sha Street Tai Hang, Hong Kong 2894-3383 2882-2033 Group Internal Audit Hospital Authority 147B Argyle Street Kowloon 2300 6750 2199 9691 LG Philip c/- 81012801 c/- 81012802 Internal Audit Morgan Stanley Asia Ltd 30/F, Three Exchange Square Central, Hong Kong 2848 6603 3407-5145 Deloitte & Touche Enterprise Risk Services Ltd 26/F Wing On Centre, 111 Connaught Road Central Hong Kong 2238 7270 2541 7101 Internal Audit Morgan Stanley Asia Ltd 30/F, Three Exchange Square Central, Hong Kong 2848 6720 3407-5287 ESD Services Limited General Manager - Technology & Operations 19/F, One HarbourFront, 18 Tak Fung Street, Hung Hom, Kowloon 2128 9801 2189 7448 Email: president@isaca.org.hk Vice President William Gee PricewaterhouseCoopers Email: vice-president@isaca.org.hk Secretary Vincent Chan Ernst & Young Email: secretary@isaca.org.hk Treasurer Kenneth Wong PricewaterhouseCoopers Email: treasurer@isaca.org.hk Immediate PastPresident Pierre Herbst Morgan Stanley Email: ipp@isaca.org.hk Chapter Coordination and Membership Director Jean Wang Relationship Director Raymond Chan Hong Kong Housing Society Email: membership@isaca.org.hk Hospital Authority Email: relationship@isaca.org.hk Education & Programme Director Daniel Ng CISA Coordinator Barbara Tam LG Philip Email: education@isaca.org.hk Morgan Stanley Email: cisa@isaca.org.hk CISA Coordinator Michael Huen Deloitte & Touche Enterprise Risk Services Ltd Email:cisa@isaca.org.hk Publicity Director Philip Ting Morgan Stanley Email: publicity@isaca.org.hk Director webmaster Michael Yung ESD Services Limited Email : webmaster@isaca.org.hk 18 Issue 24, Quarter 1 2004 ISACA Hong Kong – FOCUS ISACA Hong Kong Chapter Committee Composition 2004 – Directors & Committee Members Board of Directors Position China Affairs Director Name Organisation Address Telephone Fax Samuel Sinn Ernst & Young Ernst & Young Level 16, Tower E3 The Towers, Oriental Plaza No. 1 East Chang An Ave. Dong Cheng District Beijing, China 100738 +86-106524-6688 ext 3310 +86-108518-8298 Management Solutions & Enterprise Risk Services Deloitte Touche Tohmatsu 26/F, Wing On Centre 111 Connaught Road Central, Hong Kong 2852 6507 2541 7101 Hong Kong Productivity Council 2788 5865 2190 9765 Global Risk Management Solutions 33rd Floor Cheung Kong Center 2 Queen's Road Central Hong Kong 2289-2921 2297-0101 IT audit Division Bank of China (Hong Kong) Limited Unit A, 43/F Bank of China Tower, 1 Garden Road, Hong Kong 2826 6888 2545 6621 C/- ISACA Hong Kong Chapter GPO Box 3247 Central, Hong Kong c/- 81012801 c/- 81012802 Global Risk Management Solutions 33rd Floor Cheung Kong Center 2 Queen's Road Central Hong Kong 2289 2926 2297 0101 Email: china-liaison@isaca.org.hk China Affairs Director Peter Koo Deloitte Touche Tohmatsu Email: publicity@isaca.org.hk Director Patrick Li Hong Kong Productivity Council Email: PLi@hkpc.org Hospitality Director Paul Tsoi PricewaterhouseCoopers E-mail: hospitality@isaca.org.hk Committee Members Committee Simon Chan Bank of China Email: smchan@bochk.com Committee Epsilon Ip Committee John Lauderdale Pricewaterhouse Coopers Email: john.Lauderdale@hk.pwc.com Office Address Details Hong Kong Chapter GPO Box 3247, Hong Kong Telephone : (852) 8101-2801 Facsimile : (852) 8101-2802 Internet homepage: http://www.isaca.org.hk F CUS Publishing Details Focus is published periodically and distributed to all Hong Kong Chapter members. A copy is also available for viewing at www.isaca.org.hk. International Office 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL 60008-3105 USA Advertising rates for full page, half page, and per-word (classified) are available. Rates for advertising on our web site are also available. To advertise or write an article for the newsletter, please contact the editor, Pierre Herbst, or any of the Committee. Telephone : 1-847-253-1545 Facsimile : 1-847-253-1443 Email : membership@isaca.org Internet homepage: http://www.isaca.org Focus is provided for informational purposes only. The views and opinions contained in this newsletter are solely those of its authors, and do not necessarily represent or reflect the views or opinions of the ISACA HK Chapter. 19 Issue 24, Quarter 1 2004