Emerging Technology Challenges and Solutions for Internal Audit and ComplianceDanny Miller, CISA, CGEIT, CRISC, ITIL, QSAPrincipal
TopicsCurrent Technology LandscapeEmerging TechnologyCloud computingMobile computingCybersecurityPotential IA ComplexitiesSolutionsWhat’s Next?
Current Technology LandscapeOn-premise hardware, software, and managementSupport may be on-shore, near-shore or off-shore
Current Technology Landscape (continued)Localized processes and controlsPrompt remediation when requiredClear data ownershipStraightforward compliance approach
Current Technology Landscape (continued)Challenges/benefitsIt's expensive and requires a lot of overheadDifficult to scale and react quicklySignificant embedded cost structureInflexible to meet business needEasier to maintain audit trail
Emerging Technology TrendsSpending on public IT cloud services will grow at more than five times the rate of the IT industry in 2011-2012Enterprise IT planners begin to include cloud-computing expertise in some of their job searches to be prepared for the projects of the short-term and mid-term futureHosted private clouds will outnumber internal clouds 3:1…But service providers have been incrementally ready. Cloud management and monitoring will fuel enterprise cloud adoption 32% of CIOs expect virtualization to be their top investment in 2011
Emerging TechnologyCloud computingSaas, PaaS, IaaS, DaaSMobile computingMobile platforms that are blurring the line between a hand-held and complex computingData analyticsMaster Data ManagementCybersecurityTrends
Emerging Technology Platforms (continued)Models of Cloud:Software as a Service(SaaS)
Software applications delivered over the Internet
Platform as a Service (PaaS)
Full or partial operating system/development environment delivered over the Internet
Infrastructure as a Service (IaaS)
Computer infrastructure delivered over the Internet
Desktop as a Service (DaaS)
Virtualization of desktop systems serving thin clients, delivered over the Internet or a private CloudTypes of CloudsPublic
Shared computer resources provided by an off-site third-party provider
Private
Dedicated computer resources provided by an off-site third-party or use of Cloud technologies on a private internal network
Hybrid
Consisting of multiple public and private CloudsEmerging Technology Platforms (continued)Public Cloud Private Cloud
Emerging Technology Platforms (continued)Cloud computing – Hybrid cloud
Emerging Technology Platforms (continued)Mobile computing
Emerging Technology Platforms (continued)Mobile computing is:WirelessUtilizes tablet platforms and smartphonesInternet-basedCommunication via 4G and WiFiScaled applications
Potential New IA ComplexityCloud computingAvailability & performanceBusiness continuityCybersecurityData encryptionPrivacy (especially in Healthcare & Life Sciences)
Potential New IA Complexity (continued)Cloud computing (continued)ComplianceFISMAHIPAASOXPCI DSS (card payments)EU Data Protection Directive, et al.
Potential New IA Complexity (continued)Mobile computingSecurity (physical and virtual)Data ownershipService interruption and recoveryData archivingAvailability
Potential New IA Complexity (continued)Mobile computingWiFi/4G securitySurveillance and access controlAvailabilityData ownership and recoveryAuditabilityBluetooth “hijacking”AIDC
SolutionsCloud computingDemand good security in the contract with providerHave a "return of data" plan at end of contractKnow where the data is and who has accessDeploy a layered security architectureAssess and inventory risksConduct annual security policy auditsDeploy and authenticate user credentialsEncrypt all stored data (P2P encryption)Actively manage passwords and segregation of dutiesImplement layered firewalls

2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)

  • 1.
    Emerging Technology Challengesand Solutions for Internal Audit and ComplianceDanny Miller, CISA, CGEIT, CRISC, ITIL, QSAPrincipal
  • 2.
    TopicsCurrent Technology LandscapeEmergingTechnologyCloud computingMobile computingCybersecurityPotential IA ComplexitiesSolutionsWhat’s Next?
  • 3.
    Current Technology LandscapeOn-premisehardware, software, and managementSupport may be on-shore, near-shore or off-shore
  • 4.
    Current Technology Landscape(continued)Localized processes and controlsPrompt remediation when requiredClear data ownershipStraightforward compliance approach
  • 5.
    Current Technology Landscape(continued)Challenges/benefitsIt's expensive and requires a lot of overheadDifficult to scale and react quicklySignificant embedded cost structureInflexible to meet business needEasier to maintain audit trail
  • 6.
    Emerging Technology TrendsSpendingon public IT cloud services will grow at more than five times the rate of the IT industry in 2011-2012Enterprise IT planners begin to include cloud-computing expertise in some of their job searches to be prepared for the projects of the short-term and mid-term futureHosted private clouds will outnumber internal clouds 3:1…But service providers have been incrementally ready. Cloud management and monitoring will fuel enterprise cloud adoption 32% of CIOs expect virtualization to be their top investment in 2011
  • 7.
    Emerging TechnologyCloud computingSaas,PaaS, IaaS, DaaSMobile computingMobile platforms that are blurring the line between a hand-held and complex computingData analyticsMaster Data ManagementCybersecurityTrends
  • 8.
    Emerging Technology Platforms(continued)Models of Cloud:Software as a Service(SaaS)
  • 9.
  • 10.
    Platform as aService (PaaS)
  • 11.
    Full or partialoperating system/development environment delivered over the Internet
  • 12.
    Infrastructure as aService (IaaS)
  • 13.
  • 14.
    Desktop as aService (DaaS)
  • 15.
    Virtualization of desktopsystems serving thin clients, delivered over the Internet or a private CloudTypes of CloudsPublic
  • 16.
    Shared computer resourcesprovided by an off-site third-party provider
  • 17.
  • 18.
    Dedicated computer resourcesprovided by an off-site third-party or use of Cloud technologies on a private internal network
  • 19.
  • 20.
    Consisting of multiplepublic and private CloudsEmerging Technology Platforms (continued)Public Cloud Private Cloud
  • 21.
    Emerging Technology Platforms(continued)Cloud computing – Hybrid cloud
  • 22.
    Emerging Technology Platforms(continued)Mobile computing
  • 23.
    Emerging Technology Platforms(continued)Mobile computing is:WirelessUtilizes tablet platforms and smartphonesInternet-basedCommunication via 4G and WiFiScaled applications
  • 24.
    Potential New IAComplexityCloud computingAvailability & performanceBusiness continuityCybersecurityData encryptionPrivacy (especially in Healthcare & Life Sciences)
  • 25.
    Potential New IAComplexity (continued)Cloud computing (continued)ComplianceFISMAHIPAASOXPCI DSS (card payments)EU Data Protection Directive, et al.
  • 26.
    Potential New IAComplexity (continued)Mobile computingSecurity (physical and virtual)Data ownershipService interruption and recoveryData archivingAvailability
  • 27.
    Potential New IAComplexity (continued)Mobile computingWiFi/4G securitySurveillance and access controlAvailabilityData ownership and recoveryAuditabilityBluetooth “hijacking”AIDC
  • 28.
    SolutionsCloud computingDemand goodsecurity in the contract with providerHave a "return of data" plan at end of contractKnow where the data is and who has accessDeploy a layered security architectureAssess and inventory risksConduct annual security policy auditsDeploy and authenticate user credentialsEncrypt all stored data (P2P encryption)Actively manage passwords and segregation of dutiesImplement layered firewalls
  • 29.
    Solutions (continued)Mobile computingEncryptall WiFi accessClarify data ownershipImplement service interruption planDisable Bluetooth communicationsDeploy device specific security softwareEncrypt all communications
  • 30.
    What’s Next?Distributed computing(the Cloud)Cybersecurity & Privacy focusVirtualizationAdvanced IA toolsAnalyticsProvenance enginesEnhanced hardware firewallsAdvanced encryption technologyNew data segregation and security standardsSecure digital communicationsStandards such as ITIL, COBIT and PCI are integrating and are now complimentary
  • 31.
    What’s Next? (PCIData Security Standards v2.0)
  • 32.
    What’s Next? (PCIData Security Standards v2.0)
  • 33.
    What’s Next? (PCIData Security Standards v2.0)
  • 34.
    What’s Next? (EnterpriseMaster Data Management) Companies are awash in data, but which data is the right data to use? Data grows by 50%+ each year.
  • 35.
    Company leadership needs"one version of the truth" on dashboards, reports and in analytical datasets.
  • 36.
    Internal Audit andCompliance departments should be concerned about controls, availability, integrity and quality of data.
  • 37.
  • 38.
    Data and informationare valuable corporate assets and should be treated as such
  • 39.
    Data must bemanaged carefully and should have quality, integrity, security and availability addressed.What’s Next? (Enterprise Master Data Management)MDM is the management of an institution’s fundamental data that is shared across multiple business units, everything from project budgets to donor contacts to employee contact information. You can think of master data as all of the enterprise data (people, places, things and activities) that the institution needs to conduct its business. The goal of MDM, consequently, is to ensure the accuracy, consistency and availability of this data to the various business users.We believe that all organizations would benefit greatly from creating a strategy for MDM and implementing an MDM program in light of its current state and an organization's future data and information needs.
  • 40.
    What’s Next? (EnterpriseMaster Data Management)Table 1: Scope of Data Management
  • 41.
    What’s Next? (DataGovernance Activities)Establish institutional data standards
  • 42.
  • 43.
    Implement necessarychanges to data standards and policies
  • 44.
    Communicate actionsto the organization as appropriate
  • 45.
    Ensure accountabilityof institutional data policies and standards
  • 46.
    Escalate issuesto Governance Team as necessaryQuestions?
  • 47.
    Emerging Technology Challengesfor Internal Audit and ComplianceDanny Miller, CISA, CGEIT, CRISC, ITIL, QSANational Solutions Lead – CybersecurityRegional Solutions Lead – Business ConsultingPrincipal, Grant Thornton LLPDanny.Miller@us.gt.comhttp://grantthornton.com/