SlideShare a Scribd company logo
1 of 34
Proprietary & Confidential – Accretive Solutions, Inc.
How much is the changing regulatory landscape driving you to re-assess your third-
party relationships, including partnerships, suppliers, distributors, or other business?
1
The Changing Compliance Landscape
What are the biggest operational issues around managing compliance risks that you
face today?
66%
18% 17%
re-assess all to most
re-assess some re-assess none
47%
Monitoring third-parties
“Compliance Trends Survey 2013” Compliance Week and Deloitte.
Proprietary & Confidential – Accretive Solutions, Inc.
IT Compliance as a Growth Accelerator
Connecting Problems with Problem Solvers
WELCOME
Proprietary & Confidential – Accretive Solutions, Inc.
Webinar Features
3
Presentation Window
Use the buttons in the top-right of the
presentation window to maximize or
minimize a widget.
CPE CERTIFICATION
To qualify for CPE Credit you must
answer all of the polling questions
as well as fill out the CPE Evaluation.
Click this icon in the dock
to access the evaluation.
Q&A
If you have a question during the
presentation you may enter it here.
Resources
• Copy of Presentation
• Presenter Bios
Dock
Provides control of the on-screen
widgets.
Proprietary & Confidential – Accretive Solutions, Inc.
CPE Credit
4
Two requirements:
1) Answer 4 polling questions
throughout the presentation
2) Fill out the CPE Evaluation
anytime during the presentation
Click this icon to take Evaluation
Proprietary & Confidential – Accretive Solutions, Inc.
CPE Credit
5
Two requirements:
1) Answer 4 polling questions
throughout the presentation
2) Fill out the CPE Evaluation
anytime during the presentation
Proprietary & Confidential – Accretive Solutions, Inc.
CPE Credit
6
Two requirements:
1) Answer 4 polling questions
throughout the presentation
2) Fill out the CPE Evaluation
anytime during the presentation
Proprietary & Confidential – Accretive Solutions, Inc.
CPE Credit
7
YOUR NAME
Click this icon to print
CPE certificate
Proprietary & Confidential – Accretive Solutions, Inc.
Agenda
Overview: Insights on structuring a more strategic IT Compliance
organization. Deploying an integrated framework to address multiple
compliance requirements while mitigating risks and driving efficiencies.
Lessons From the Trenches:
 Sajeev Prelis
Practice Director of IT Strategy & Compliance, Accretive Solutions
 Gary Pennington
Southwest Practice Director, SSAE-16 Professionals
 Blake Holman
Senior Vice President, Chief Information Officer, Ryan, Inc.
CPE Evaluation
8
Proprietary & Confidential – Accretive Solutions, Inc.
Learning Objectives for this Webinar
 How an IT Compliance organization can be a catalyst for change
and a driver for growth
 Insights on how to positively contribute to the bottom line
 Practical examples of how an integrated framework impacts
organizations
9
Proprietary & Confidential – Accretive Solutions, Inc.
Sajeev Prelis
10
Practice Director of IT Strategy
and Compliance
Accretive Solutions
Proprietary & Confidential – Accretive Solutions, Inc.
The Changing Compliance Landscape
Old compliance environment
 IT an Afterthought
 Nice to have
 Differentiator
 Selling point
11
Current compliance environment
 IT an Integral Part
 Must have
 Expected
 Deal breaker
Proprietary & Confidential – Accretive Solutions, Inc.
Why Comply:
 Fulfills contractual obligations
 Provides a competitive advantage
 Secures a seat at the table
 Increases client confidence in internal controls
 Prevents audits/questionnaires throughout the year
 Increases investor confidence in internal controls
 Enhances internal operational control that would facilitate
controlled growth
…and, it’s the law!
12
The Changing Compliance Landscape
Proprietary & Confidential – Accretive Solutions, Inc.
 SSAE16 (SOC 1) - The Statement on Standards for Attestation
Engagements (SSAE) No. 16
 SOC 2 & 3 – Service Organization Control 2 & 3
 PCI DSS – Payment Card Industry Data Security Standard
 SOX – Sarbanes-Oxley 404
 HIPAA – Health Insurance Portability and Accountability Act
 ISO – International Organization for Standardization
 FCPA – Foreign Corrupt Practices Act
 FISMA – Federal Information Security Management Act
 FFIEC - The Federal Financial Institutions Examination Council
 ……….
13
The Changing Compliance Landscape
Proprietary & Confidential – Accretive Solutions, Inc.
Pain Points:
 Cost of multiple compliance assessments
 Direct monetary cost
 Opportunity cost of internal resource time
 Managing multiple service providers
 Hiring internal resources with skillsets to manage multiple efforts
 Maintaining multiple control lists
• Responding to multiple PBC lists
14
The Changing Compliance Landscape
Proprietary & Confidential – Accretive Solutions, Inc.
“Test once - comply with many” approach:
 Enable one test to cover multiple compliance initiatives
 Leverage common requirements across standards
 Aligns controls to cover multiple compliance initiatives
 Consolidates service providers
• Same team to test controls
• Retain tribal knowledge
• Deal with one point of contact
 Achieve reduction in overall assessment resources
for the environment
15
Alleviating the Compliance Burden
Proprietary & Confidential – Accretive Solutions, Inc.
Benefits:
 Promotes efficiency by reducing internal resource audit support
responsibilities and frees up time to concentrate on business
needs
 Reduces compliance cost if performed by one provider
 Simplifies identification of control gaps and unmitigated risks
 Streamlines policy and procedure and control updates
16
Alleviating the Compliance Burden
Proprietary & Confidential – Accretive Solutions, Inc.
Appoint internal champion who has executive support:
 Bring the different stakeholders and business units together
(IA, IT, Finance, Legal, Procurement)
 Identify geographic considerations
Reevaluate timing of reports:
 Movable vs. immovable compliance initiatives
 External stakeholder considerations
17
Implementation – Practical Considerations
Proprietary & Confidential – Accretive Solutions, Inc.
Choose the service provider:
 One provider
 Multiple vendors managed internally
Take it slow, include one compliance initiative at a time.
18
Implementation – Practical Considerations
Proprietary & Confidential – Accretive Solutions, Inc.
Southwest Practice Director
Gary Pennington
19
Proprietary & Confidential – Accretive Solutions, Inc.
SSAE 16 Professionals, LLP
 Licensed CPA firm with offices throughout the USA
 Registered with the PCAOB
 Specialized focus on SSAE 16 (SOC 1), SOC 2, & other IT
Compliance services
 Strategic alliance partner of Accretive Solutions
 Personnel comprised of former Big 4 and other large international
accounting firm personnel
20
Company Overview
Proprietary & Confidential – Accretive Solutions, Inc.
Password Control
21
PCI SSAE16 / SOC2&3 ISO 27001 SOX
8.2.4 - Change passwords
at least every 90 days
8.2.3 - Passwords must be
at least seven characters
long
8.1.6/8.1.7 - Lockout
threshold and duration
8.2.3 - Passwords must
contain both alphabetic
and numeric characters
8.2.5 - History of at least
four passwords
remembered
Security Principal 3.2.5
The internal network
domain is configured to
enforce the following
password requirements:
•Maximum Password Age
•Minimum Password
Length
•Invalid Password Lockout
•Complexity
•Password History
9.4.1 – Access to information
and application system
functions shall be restricted in
accordance with the access
control policy.
9.4.2 – Where required by the
access control policy, access to
systems and applications shall
be controlled by a secure log-
in procedure.
9.4.3 – Password management
systems shall be interactive
and shall ensure quality
passwords.
Applications and
systems are configured
to comply with
password parameters as
defined in the Safe
Computing Policy.
Practical Example – Compliance Consolidation
Proprietary & Confidential – Accretive Solutions, Inc.
22
PCI SSAE16 / SOC2&3 ISO 27001 SOX
9.1 - Controls to limit and
monitor physical access -
video cameras and/or access-
control mechanisms in place,
protected from tampering,
monitored/reviewed and
correlated with other entries,
and data stored for at least
three months.
9.3 - Visitors authorized,
distinguishable, badge
expiration controls.
9.4 - Visitor log
Security Principal 3.3.2
Physical access to the
onsite data center is
restricted to authorized
personnel.
11.1.1 – Security
perimeters shall be defined
and used to protect areas
that contain either
sensitive or critical
information and
information processing
facilities.
11.1.2 – Secure areas shall
be protected by
appropriate entry controls
to ensure that only
authorized personnel are
allowed access.
Physical access to the data
center is restricted to
authorized IT Operations
staff only.
Practical Example – Compliance Consolidation
Physical Access to Datacenter
Proprietary & Confidential – Accretive Solutions, Inc.
23
PCI SSAE16 / SOC2&3 ISO 27001 SOX
5.1 Deploy anti-virus software on all systems
commonly affected by malicious software (particularly
personal computers and servers).
5.1.1 Ensure that anti-virus programs are capable of
detecting, removing, and protecting against all known
types of malicious software.
5.1.2 For systems considered to be not commonly
affected by malicious software, perform periodic
evaluations to identify and evaluate evolving malware
threats in order to confirm whether such systems
continue to not require anti-virus software.
5.2 Ensure that all anti-virus mechanisms are
maintained as follows:
 Are kept current
 Perform periodic scans
 Generate audit logs which are retained per PCI
DSS Requirement 10.7
5.3 Ensure that anti-virus mechanisms are actively
running and cannot be disabled or altered by users,
unless specifically authorized by management on a
case-by-case basis for a limited time period.
3.5.1 - Anti-virus software
with up to date virus
signatures are used to
protect all Company network
devices. Scans are
performed on a daily basis.
3.5.2 -Anti-virus software
security updates are applied
based on automatic update
timelines.
12.2.1 Detection,
prevention and recovery
controls to protect against
malware shall be
implemented, combined
with appropriate user
awareness.
Virus protection software at
the Network/Gateway level
is configured to scan and
filter the incoming and
outgoing network traffic
(Email, HTTP, FTP and other
messaging) for real-time
detection and quarantine of
malicious code.
Practical Example – Anti-virus Protection
Proprietary & Confidential – Accretive Solutions, Inc.
Map controls:
 Identify control overlap
 Force adherence to the stricter control
 Standardize sample selection methodology
 Acquire applications that map multiple standards
 Good in theory, but not always practical
 Good starting point, but need experienced personnel to
properly execute
 Not always compatible with SSAE 16 since a standardized set of
controls has not been created by the AICPA
24
Implementation – Practical Considerations
Proprietary & Confidential – Accretive Solutions, Inc.
Additional potential efficiency:
Flexibility of control activities in SOC 1 and SOC 2 audits enables the
overlay of other compliance frameworks, including:
 PCI
 ISO
 HIPAA
 NIST
 Cloud Controls Matrix
25
Implementation – Practical Considerations
Proprietary & Confidential – Accretive Solutions, Inc.
Blake Holman
26
Senior Vice President,
Chief Information Officer
Proprietary & Confidential – Accretive Solutions, Inc.
Ryan, LLC
 Global tax services firm founded in 1991
 The largest indirect tax practice in North America and the seventh
largest corporate tax practice in the United States
 Offices in 70 cities across 12 countries
 Provides a comprehensive range of state, local, federal, and
international tax advisory and consulting services, including:
• Audit defense
• Tax recovery
• Credits and Incentives
• Tax process improvement and automation
• Tax appeals
• Tax compliance
• Strategic planning
27
Company Overview
Proprietary & Confidential – Accretive Solutions, Inc.
 Tax recovery work involving credit card transactions (PCI)
 Tax compliance services work (SAS70 and now SSAE16)
• Sales and Use Tax compliance services
• Property Tax compliance services
28
IT Compliance Situation
Proprietary & Confidential – Accretive Solutions, Inc.
Security Questionnaires
are cumbersome
29
Challenges
Audits
Costly and time consuming
(and they can consume you, if you let them!)
Proprietary & Confidential – Accretive Solutions, Inc.
 IT controls are conceptually and fundamentally the same
 Differences in controls often have to do with the level of rigor you
employ in satisfying the controls
 Poor planning results in burning lots and lots of employee and
auditor hours that can simply be avoided
 IT compliance doesn’t have to be hard
 Most security questionnaires are similar, though there are some
exceptions
30
Lessons Learned
Proprietary & Confidential – Accretive Solutions, Inc.
 Line up the strictest standards and controls that you have to comply,
and set your program from those
 Decide when you want to be doing audits
 Try to get one provider to do as much of your audit work for you as
you can to gain economies of scale
• The IT Controls scale VERY well
 Work with your auditor to streamline the process
 Don’t release security information without a mutual NDA
 Save the answers to security questionnaires
 Prepare a security position document, if you can – it may help
streamline inquiries
31
Takeaways
Proprietary & Confidential – Accretive Solutions, Inc.
 1 annual PCI audit
 2 annual SSAE16 audits
 PCI controls govern vast majority of the IT controls work
 Kick off in early September, fieldwork in October/November and
reports produced in December
 Result – focused audit efforts, fieldwork is done once for all three
audits, and the IT controls reporting for SSAE16 is leveraged for both
reports, enabling many other benefits, including being:
• Cost effective
• Scalable
• Improved profit margin for the firm
32
At Ryan
Proprietary & Confidential – Accretive Solutions, Inc.
Moving towards a more strategic IT Compliance organization and deploying
an integrated framework to address multiple compliance requirements will:
 Drive sales / revenue by:
• Providing a competitive advantage and securing a seat at the table
• Increasing client and investor confidence in internal controls
• Enhancing internal operational control to facilitate growth
 Increase bottom line by:
• Reducing compliance costs
• Freeing up staff audit support time to concentrate on business
needs
33
Wrap Up
Proprietary & Confidential – Accretive Solutions, Inc.
34
REMINDER
You must fill out the CPE Evaluation for credit.
UPCOMING WEBINARS
Latest SEC Initiatives and Impacts Relating to Accounting and Audit Practices
Techniques to avoid having financial reports flagged for investigation by the SEC
Cloud Security
Understanding key security implications of the migration of software to the cloud,
both as a seller and a user of cloud technologies.
Organizational Change Management
Locking down big hidden costs of Company Change
Thank You

More Related Content

What's hot

Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...PECB
 
Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isacapooshu
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Agile in a highly regulated organization: part 2 2014
Agile in a highly regulated organization: part 2 2014Agile in a highly regulated organization: part 2 2014
Agile in a highly regulated organization: part 2 2014Tami Flowers
 
Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Smart ERP Solutions, Inc.
 
Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policyiasaglobal
 
Module 1 bc and dr fundamentals student slides ver 1.0
Module 1 bc and dr fundamentals   student slides ver 1.0Module 1 bc and dr fundamentals   student slides ver 1.0
Module 1 bc and dr fundamentals student slides ver 1.0Aladdin Dandis
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerEnclaveSecurity
 
Module 3 business continuity student slides ver 1.0
Module 3 business continuity   student slides ver 1.0Module 3 business continuity   student slides ver 1.0
Module 3 business continuity student slides ver 1.0Aladdin Dandis
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014Tami Flowers
 
Busines Continuity And Compliance
Busines Continuity And ComplianceBusines Continuity And Compliance
Busines Continuity And Compliancesalamali
 
Business Continuity Management Culture at NCBC
 Business Continuity Management Culture at NCBC Business Continuity Management Culture at NCBC
Business Continuity Management Culture at NCBCContinuity and Resilience
 
Case study: Why you need ISO/IEC 20000 to ensure success?
Case study: Why you need ISO/IEC 20000 to ensure success?Case study: Why you need ISO/IEC 20000 to ensure success?
Case study: Why you need ISO/IEC 20000 to ensure success?PECB
 
GRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance ExecutiveGRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance ExecutiveMax Neira Schliemann
 
5 Perspectives of ISO/IEC 27001 Certification from a Relying Party
5 Perspectives of ISO/IEC 27001 Certification from a Relying Party5 Perspectives of ISO/IEC 27001 Certification from a Relying Party
5 Perspectives of ISO/IEC 27001 Certification from a Relying PartyPECB
 

What's hot (20)

Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
 
Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isaca
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Agile in a highly regulated organization: part 2 2014
Agile in a highly regulated organization: part 2 2014Agile in a highly regulated organization: part 2 2014
Agile in a highly regulated organization: part 2 2014
 
Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23
 
Ey segregation of_duties
Ey segregation of_dutiesEy segregation of_duties
Ey segregation of_duties
 
Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policy
 
ryke-brochure-ver 1
ryke-brochure-ver 1ryke-brochure-ver 1
ryke-brochure-ver 1
 
Module 1 bc and dr fundamentals student slides ver 1.0
Module 1 bc and dr fundamentals   student slides ver 1.0Module 1 bc and dr fundamentals   student slides ver 1.0
Module 1 bc and dr fundamentals student slides ver 1.0
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Module 3 business continuity student slides ver 1.0
Module 3 business continuity   student slides ver 1.0Module 3 business continuity   student slides ver 1.0
Module 3 business continuity student slides ver 1.0
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014
 
Busines Continuity And Compliance
Busines Continuity And ComplianceBusines Continuity And Compliance
Busines Continuity And Compliance
 
Business Continuity Management Culture at NCBC
 Business Continuity Management Culture at NCBC Business Continuity Management Culture at NCBC
Business Continuity Management Culture at NCBC
 
Seg dutieschecklist
Seg dutieschecklistSeg dutieschecklist
Seg dutieschecklist
 
Erm talking points
Erm talking pointsErm talking points
Erm talking points
 
Case study: Why you need ISO/IEC 20000 to ensure success?
Case study: Why you need ISO/IEC 20000 to ensure success?Case study: Why you need ISO/IEC 20000 to ensure success?
Case study: Why you need ISO/IEC 20000 to ensure success?
 
GRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance ExecutiveGRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance Executive
 
5 Perspectives of ISO/IEC 27001 Certification from a Relying Party
5 Perspectives of ISO/IEC 27001 Certification from a Relying Party5 Perspectives of ISO/IEC 27001 Certification from a Relying Party
5 Perspectives of ISO/IEC 27001 Certification from a Relying Party
 

Similar to IT Compliance: Shifting from Cost Center to Profit Center

Brainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA eventBrainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA eventBrainwave GRC
 
Continous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCContinous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCGraeme Hein
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEeAuditor Audits & Inspections
 
Qumas Collaboration to Innovation Quality QMS PIMS 2014
Qumas Collaboration to Innovation Quality QMS PIMS 2014Qumas Collaboration to Innovation Quality QMS PIMS 2014
Qumas Collaboration to Innovation Quality QMS PIMS 2014GBX Summits
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Build a business case for compliance March 2022
Build a business case for compliance March 2022Build a business case for compliance March 2022
Build a business case for compliance March 2022Nimonik
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeBrenda Majewski
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsOracle
 
Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Oracle
 
Hi600ch07_text_slides
Hi600ch07_text_slidesHi600ch07_text_slides
Hi600ch07_text_slidesljmcneill33
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringEmma Kelly
 
How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud SureCloud
 
Building a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platformBuilding a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platformProcessMAP Corporation
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
A Modern Finance Case Study – Cloud or On-Premise
A Modern Finance Case Study – Cloud or On-PremiseA Modern Finance Case Study – Cloud or On-Premise
A Modern Finance Case Study – Cloud or On-PremiseProphix Software
 
Adaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyAdaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyRob Johnston, MBA
 
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...D. Scott Clark
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013Nidhi Gupta
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013Nidhi Gupta
 

Similar to IT Compliance: Shifting from Cost Center to Profit Center (20)

Brainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA eventBrainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA event
 
Continous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCContinous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRC
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
 
Qumas Collaboration to Innovation Quality QMS PIMS 2014
Qumas Collaboration to Innovation Quality QMS PIMS 2014Qumas Collaboration to Innovation Quality QMS PIMS 2014
Qumas Collaboration to Innovation Quality QMS PIMS 2014
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Build a business case for compliance March 2022
Build a business case for compliance March 2022Build a business case for compliance March 2022
Build a business case for compliance March 2022
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
 
Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...
 
Hi600ch07_text_slides
Hi600ch07_text_slidesHi600ch07_text_slides
Hi600ch07_text_slides
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls Monitoring
 
How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud
 
Building a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platformBuilding a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platform
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
A Modern Finance Case Study – Cloud or On-Premise
A Modern Finance Case Study – Cloud or On-PremiseA Modern Finance Case Study – Cloud or On-Premise
A Modern Finance Case Study – Cloud or On-Premise
 
Adaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyAdaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_study
 
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

IT Compliance: Shifting from Cost Center to Profit Center

  • 1. Proprietary & Confidential – Accretive Solutions, Inc. How much is the changing regulatory landscape driving you to re-assess your third- party relationships, including partnerships, suppliers, distributors, or other business? 1 The Changing Compliance Landscape What are the biggest operational issues around managing compliance risks that you face today? 66% 18% 17% re-assess all to most re-assess some re-assess none 47% Monitoring third-parties “Compliance Trends Survey 2013” Compliance Week and Deloitte.
  • 2. Proprietary & Confidential – Accretive Solutions, Inc. IT Compliance as a Growth Accelerator Connecting Problems with Problem Solvers WELCOME
  • 3. Proprietary & Confidential – Accretive Solutions, Inc. Webinar Features 3 Presentation Window Use the buttons in the top-right of the presentation window to maximize or minimize a widget. CPE CERTIFICATION To qualify for CPE Credit you must answer all of the polling questions as well as fill out the CPE Evaluation. Click this icon in the dock to access the evaluation. Q&A If you have a question during the presentation you may enter it here. Resources • Copy of Presentation • Presenter Bios Dock Provides control of the on-screen widgets.
  • 4. Proprietary & Confidential – Accretive Solutions, Inc. CPE Credit 4 Two requirements: 1) Answer 4 polling questions throughout the presentation 2) Fill out the CPE Evaluation anytime during the presentation Click this icon to take Evaluation
  • 5. Proprietary & Confidential – Accretive Solutions, Inc. CPE Credit 5 Two requirements: 1) Answer 4 polling questions throughout the presentation 2) Fill out the CPE Evaluation anytime during the presentation
  • 6. Proprietary & Confidential – Accretive Solutions, Inc. CPE Credit 6 Two requirements: 1) Answer 4 polling questions throughout the presentation 2) Fill out the CPE Evaluation anytime during the presentation
  • 7. Proprietary & Confidential – Accretive Solutions, Inc. CPE Credit 7 YOUR NAME Click this icon to print CPE certificate
  • 8. Proprietary & Confidential – Accretive Solutions, Inc. Agenda Overview: Insights on structuring a more strategic IT Compliance organization. Deploying an integrated framework to address multiple compliance requirements while mitigating risks and driving efficiencies. Lessons From the Trenches:  Sajeev Prelis Practice Director of IT Strategy & Compliance, Accretive Solutions  Gary Pennington Southwest Practice Director, SSAE-16 Professionals  Blake Holman Senior Vice President, Chief Information Officer, Ryan, Inc. CPE Evaluation 8
  • 9. Proprietary & Confidential – Accretive Solutions, Inc. Learning Objectives for this Webinar  How an IT Compliance organization can be a catalyst for change and a driver for growth  Insights on how to positively contribute to the bottom line  Practical examples of how an integrated framework impacts organizations 9
  • 10. Proprietary & Confidential – Accretive Solutions, Inc. Sajeev Prelis 10 Practice Director of IT Strategy and Compliance Accretive Solutions
  • 11. Proprietary & Confidential – Accretive Solutions, Inc. The Changing Compliance Landscape Old compliance environment  IT an Afterthought  Nice to have  Differentiator  Selling point 11 Current compliance environment  IT an Integral Part  Must have  Expected  Deal breaker
  • 12. Proprietary & Confidential – Accretive Solutions, Inc. Why Comply:  Fulfills contractual obligations  Provides a competitive advantage  Secures a seat at the table  Increases client confidence in internal controls  Prevents audits/questionnaires throughout the year  Increases investor confidence in internal controls  Enhances internal operational control that would facilitate controlled growth …and, it’s the law! 12 The Changing Compliance Landscape
  • 13. Proprietary & Confidential – Accretive Solutions, Inc.  SSAE16 (SOC 1) - The Statement on Standards for Attestation Engagements (SSAE) No. 16  SOC 2 & 3 – Service Organization Control 2 & 3  PCI DSS – Payment Card Industry Data Security Standard  SOX – Sarbanes-Oxley 404  HIPAA – Health Insurance Portability and Accountability Act  ISO – International Organization for Standardization  FCPA – Foreign Corrupt Practices Act  FISMA – Federal Information Security Management Act  FFIEC - The Federal Financial Institutions Examination Council  ………. 13 The Changing Compliance Landscape
  • 14. Proprietary & Confidential – Accretive Solutions, Inc. Pain Points:  Cost of multiple compliance assessments  Direct monetary cost  Opportunity cost of internal resource time  Managing multiple service providers  Hiring internal resources with skillsets to manage multiple efforts  Maintaining multiple control lists • Responding to multiple PBC lists 14 The Changing Compliance Landscape
  • 15. Proprietary & Confidential – Accretive Solutions, Inc. “Test once - comply with many” approach:  Enable one test to cover multiple compliance initiatives  Leverage common requirements across standards  Aligns controls to cover multiple compliance initiatives  Consolidates service providers • Same team to test controls • Retain tribal knowledge • Deal with one point of contact  Achieve reduction in overall assessment resources for the environment 15 Alleviating the Compliance Burden
  • 16. Proprietary & Confidential – Accretive Solutions, Inc. Benefits:  Promotes efficiency by reducing internal resource audit support responsibilities and frees up time to concentrate on business needs  Reduces compliance cost if performed by one provider  Simplifies identification of control gaps and unmitigated risks  Streamlines policy and procedure and control updates 16 Alleviating the Compliance Burden
  • 17. Proprietary & Confidential – Accretive Solutions, Inc. Appoint internal champion who has executive support:  Bring the different stakeholders and business units together (IA, IT, Finance, Legal, Procurement)  Identify geographic considerations Reevaluate timing of reports:  Movable vs. immovable compliance initiatives  External stakeholder considerations 17 Implementation – Practical Considerations
  • 18. Proprietary & Confidential – Accretive Solutions, Inc. Choose the service provider:  One provider  Multiple vendors managed internally Take it slow, include one compliance initiative at a time. 18 Implementation – Practical Considerations
  • 19. Proprietary & Confidential – Accretive Solutions, Inc. Southwest Practice Director Gary Pennington 19
  • 20. Proprietary & Confidential – Accretive Solutions, Inc. SSAE 16 Professionals, LLP  Licensed CPA firm with offices throughout the USA  Registered with the PCAOB  Specialized focus on SSAE 16 (SOC 1), SOC 2, & other IT Compliance services  Strategic alliance partner of Accretive Solutions  Personnel comprised of former Big 4 and other large international accounting firm personnel 20 Company Overview
  • 21. Proprietary & Confidential – Accretive Solutions, Inc. Password Control 21 PCI SSAE16 / SOC2&3 ISO 27001 SOX 8.2.4 - Change passwords at least every 90 days 8.2.3 - Passwords must be at least seven characters long 8.1.6/8.1.7 - Lockout threshold and duration 8.2.3 - Passwords must contain both alphabetic and numeric characters 8.2.5 - History of at least four passwords remembered Security Principal 3.2.5 The internal network domain is configured to enforce the following password requirements: •Maximum Password Age •Minimum Password Length •Invalid Password Lockout •Complexity •Password History 9.4.1 – Access to information and application system functions shall be restricted in accordance with the access control policy. 9.4.2 – Where required by the access control policy, access to systems and applications shall be controlled by a secure log- in procedure. 9.4.3 – Password management systems shall be interactive and shall ensure quality passwords. Applications and systems are configured to comply with password parameters as defined in the Safe Computing Policy. Practical Example – Compliance Consolidation
  • 22. Proprietary & Confidential – Accretive Solutions, Inc. 22 PCI SSAE16 / SOC2&3 ISO 27001 SOX 9.1 - Controls to limit and monitor physical access - video cameras and/or access- control mechanisms in place, protected from tampering, monitored/reviewed and correlated with other entries, and data stored for at least three months. 9.3 - Visitors authorized, distinguishable, badge expiration controls. 9.4 - Visitor log Security Principal 3.3.2 Physical access to the onsite data center is restricted to authorized personnel. 11.1.1 – Security perimeters shall be defined and used to protect areas that contain either sensitive or critical information and information processing facilities. 11.1.2 – Secure areas shall be protected by appropriate entry controls to ensure that only authorized personnel are allowed access. Physical access to the data center is restricted to authorized IT Operations staff only. Practical Example – Compliance Consolidation Physical Access to Datacenter
  • 23. Proprietary & Confidential – Accretive Solutions, Inc. 23 PCI SSAE16 / SOC2&3 ISO 27001 SOX 5.1 Deploy anti-virus software on all systems commonly affected by malicious software (particularly personal computers and servers). 5.1.1 Ensure that anti-virus programs are capable of detecting, removing, and protecting against all known types of malicious software. 5.1.2 For systems considered to be not commonly affected by malicious software, perform periodic evaluations to identify and evaluate evolving malware threats in order to confirm whether such systems continue to not require anti-virus software. 5.2 Ensure that all anti-virus mechanisms are maintained as follows:  Are kept current  Perform periodic scans  Generate audit logs which are retained per PCI DSS Requirement 10.7 5.3 Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifically authorized by management on a case-by-case basis for a limited time period. 3.5.1 - Anti-virus software with up to date virus signatures are used to protect all Company network devices. Scans are performed on a daily basis. 3.5.2 -Anti-virus software security updates are applied based on automatic update timelines. 12.2.1 Detection, prevention and recovery controls to protect against malware shall be implemented, combined with appropriate user awareness. Virus protection software at the Network/Gateway level is configured to scan and filter the incoming and outgoing network traffic (Email, HTTP, FTP and other messaging) for real-time detection and quarantine of malicious code. Practical Example – Anti-virus Protection
  • 24. Proprietary & Confidential – Accretive Solutions, Inc. Map controls:  Identify control overlap  Force adherence to the stricter control  Standardize sample selection methodology  Acquire applications that map multiple standards  Good in theory, but not always practical  Good starting point, but need experienced personnel to properly execute  Not always compatible with SSAE 16 since a standardized set of controls has not been created by the AICPA 24 Implementation – Practical Considerations
  • 25. Proprietary & Confidential – Accretive Solutions, Inc. Additional potential efficiency: Flexibility of control activities in SOC 1 and SOC 2 audits enables the overlay of other compliance frameworks, including:  PCI  ISO  HIPAA  NIST  Cloud Controls Matrix 25 Implementation – Practical Considerations
  • 26. Proprietary & Confidential – Accretive Solutions, Inc. Blake Holman 26 Senior Vice President, Chief Information Officer
  • 27. Proprietary & Confidential – Accretive Solutions, Inc. Ryan, LLC  Global tax services firm founded in 1991  The largest indirect tax practice in North America and the seventh largest corporate tax practice in the United States  Offices in 70 cities across 12 countries  Provides a comprehensive range of state, local, federal, and international tax advisory and consulting services, including: • Audit defense • Tax recovery • Credits and Incentives • Tax process improvement and automation • Tax appeals • Tax compliance • Strategic planning 27 Company Overview
  • 28. Proprietary & Confidential – Accretive Solutions, Inc.  Tax recovery work involving credit card transactions (PCI)  Tax compliance services work (SAS70 and now SSAE16) • Sales and Use Tax compliance services • Property Tax compliance services 28 IT Compliance Situation
  • 29. Proprietary & Confidential – Accretive Solutions, Inc. Security Questionnaires are cumbersome 29 Challenges Audits Costly and time consuming (and they can consume you, if you let them!)
  • 30. Proprietary & Confidential – Accretive Solutions, Inc.  IT controls are conceptually and fundamentally the same  Differences in controls often have to do with the level of rigor you employ in satisfying the controls  Poor planning results in burning lots and lots of employee and auditor hours that can simply be avoided  IT compliance doesn’t have to be hard  Most security questionnaires are similar, though there are some exceptions 30 Lessons Learned
  • 31. Proprietary & Confidential – Accretive Solutions, Inc.  Line up the strictest standards and controls that you have to comply, and set your program from those  Decide when you want to be doing audits  Try to get one provider to do as much of your audit work for you as you can to gain economies of scale • The IT Controls scale VERY well  Work with your auditor to streamline the process  Don’t release security information without a mutual NDA  Save the answers to security questionnaires  Prepare a security position document, if you can – it may help streamline inquiries 31 Takeaways
  • 32. Proprietary & Confidential – Accretive Solutions, Inc.  1 annual PCI audit  2 annual SSAE16 audits  PCI controls govern vast majority of the IT controls work  Kick off in early September, fieldwork in October/November and reports produced in December  Result – focused audit efforts, fieldwork is done once for all three audits, and the IT controls reporting for SSAE16 is leveraged for both reports, enabling many other benefits, including being: • Cost effective • Scalable • Improved profit margin for the firm 32 At Ryan
  • 33. Proprietary & Confidential – Accretive Solutions, Inc. Moving towards a more strategic IT Compliance organization and deploying an integrated framework to address multiple compliance requirements will:  Drive sales / revenue by: • Providing a competitive advantage and securing a seat at the table • Increasing client and investor confidence in internal controls • Enhancing internal operational control to facilitate growth  Increase bottom line by: • Reducing compliance costs • Freeing up staff audit support time to concentrate on business needs 33 Wrap Up
  • 34. Proprietary & Confidential – Accretive Solutions, Inc. 34 REMINDER You must fill out the CPE Evaluation for credit. UPCOMING WEBINARS Latest SEC Initiatives and Impacts Relating to Accounting and Audit Practices Techniques to avoid having financial reports flagged for investigation by the SEC Cloud Security Understanding key security implications of the migration of software to the cloud, both as a seller and a user of cloud technologies. Organizational Change Management Locking down big hidden costs of Company Change Thank You