SlideShare a Scribd company logo
All
Software Asset Management
Operational & Capability Assessment
Audit Susceptibility Index™
www.it-tprm.com
TPRM Forum LLC Confidential © 2018 All Rights Reserved
Susceptibility Defined
Susceptibility is defined as ‘the state or fact of being
likely or liable to be influenced or harmed by a
particular thing’.
In the case of a software audit, Susceptibility is the
likely severity, disruption and extent of financial
exposure a firm may experience in the event a software
publisher issues a ‘Notice of Intent to Audit’ the
deployment of their software.
TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com 2
Software Asset Management (SAM) is a multi-
level, multi-discipline function intended to
reduce non-compliance risk of business critical
software assets.
Negotiating the reduction or elimination of
software audit findings, while valuable, is
NOT Software Asset Management.
Effective SAM requires careful orchestration,
monitoring and entitlement management of a
tangible asset. SAM encompasses successful
alignment of policy, procedures, controls,
procurement, IT and PMO processes with rapid
infraction identification. Properly executed,
SAM not only minimizes audit exposure, it
delivers efficiency of software investment.
Software Asset Management (SAM)
TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com 3
Software Market Landscape - 2020
TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com
In the past 5 years, software publishers have
demonstrated intent to offset growth challenges
with an increased focus on audit revenue. There
have been many contributors to this dynamic, but
at the core, publishers know the vast majority of
Fortune 2,000 firms have immature or non-existent
SAM capabilities.
Firms need to consider what actions are required
to limit this third party risk exposure. Actions to
consider include:
Clarity of Policy & Procedures
Appropriate Controls: Purchase thru Harvest
Establish dedicated SAM Organization
IT & PMO Process Alignment
Cloud Strategy & Implementation
Leverage proven Technology Platform
Non-conformance Escalation Procedure
Produce effective reporting
4
The Software Asset Management Audit
Susceptibility Index™ Assessment
Methodology addresses each of these core
areas.
TPRM Forum has created the SAM
‘Audit Susceptibility Index™’
Assessment Methodology to assist
organizations identify current
effectiveness of their SAM capability and
quickly chart a course for greater
maturity and productivity.
The SAM Audit Susceptibility Index™
(SAM-ASI) Assessment Methodology
features:
 Detailed Assessment across internal
environment.
 Assessment findings produce the Audit
Susceptibility Index™ which enables
development of the detailed ‘SAM Playbook’.
 The SAM Playbook contains detailed,
actionable recommendations, steps, calendar of
events and recommended sequencing in addition
of remedies for the most significant Areas of
Exposure (AoE).
SAM Audit Susceptibility Index™ Assessment Methodology
TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com 5
SAM Audit Susceptibility Index™
Execution
14-Sep-18
TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com
The SAM Audit Susceptibility Index™ (SAM-ASI)
Assessment Methodology features a rapid 4-5
week execution to produce detailed Playbooks
designed to drive maturity and overall SAM
capability.
Unlike software
development, SAM
operations need to achieve
Level 4 Maturity to materially
reduce audit exposure.
Assessment of Operational
Risk and Environment
Complexity enables
development of required
actions to reduce risk and
improve environment
dynamics to mature SAM
capability.SAM-ASI ™Assessment Methodology
delivers operational guidance to
produce mature SAM operations.
6
www
www.it-tprm.com
TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com 7

More Related Content

What's hot

third party risk management best practices
third party risk management best practicesthird party risk management best practices
third party risk management best practices
SALIH AHMED ISLAM
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
FitCEO, Inc. (FCI)
 
GRC 10 ONLINE TRAINING | GRC 12 Training
GRC 10 ONLINE TRAINING  |  GRC 12 TrainingGRC 10 ONLINE TRAINING  |  GRC 12 Training
GRC 10 ONLINE TRAINING | GRC 12 Training
grconlinetraining
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
Rick Lemieux
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
NICSA
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
Rishabh Software
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management Introduction
Naveen Grover
 
Erp programme assurance
Erp programme assuranceErp programme assurance
Erp programme assurance
Poonam pandey
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
3Sixty Insights
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
SALIH AHMED ISLAM
 
SAP grc
SAP grc SAP grc
SAP grc
smadhu29
 
Wajams Chemical Sdn Bhd
Wajams Chemical Sdn BhdWajams Chemical Sdn Bhd
Wajams Chemical Sdn Bhd
Parvin Anpalagan
 
SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)
SAP Latinoamérica
 
6 Ways to Ensure the Success of your Next Contractor Self Assessment
6 Ways to Ensure the Success of your Next Contractor Self Assessment6 Ways to Ensure the Success of your Next Contractor Self Assessment
6 Ways to Ensure the Success of your Next Contractor Self Assessment
Stacey Kramer
 
LANDESK ITAM Review Tools Day Presentation 2015
LANDESK ITAM Review Tools Day Presentation 2015LANDESK ITAM Review Tools Day Presentation 2015
LANDESK ITAM Review Tools Day Presentation 2015
Martin Thompson
 
Re-shaping Assurance
Re-shaping AssuranceRe-shaping Assurance
Re-shaping Assurance
Paul Wenman
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
AuditBot SAP Security Audit
 
Continuous Monitoring Webinar Aviva Spectrum
Continuous Monitoring Webinar Aviva SpectrumContinuous Monitoring Webinar Aviva Spectrum
Continuous Monitoring Webinar Aviva Spectrum
Aviva Spectrum™
 
The Vision, Highlights and Implementation Benefits of GRC STACK
The Vision, Highlights and Implementation Benefits of GRC STACKThe Vision, Highlights and Implementation Benefits of GRC STACK
The Vision, Highlights and Implementation Benefits of GRC STACK
GRC Stack Pvt. Ltd,
 
The prominence of it lifecycle assurance
The prominence of it lifecycle assuranceThe prominence of it lifecycle assurance
The prominence of it lifecycle assurance
Maveric Systems
 

What's hot (20)

third party risk management best practices
third party risk management best practicesthird party risk management best practices
third party risk management best practices
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
GRC 10 ONLINE TRAINING | GRC 12 Training
GRC 10 ONLINE TRAINING  |  GRC 12 TrainingGRC 10 ONLINE TRAINING  |  GRC 12 Training
GRC 10 ONLINE TRAINING | GRC 12 Training
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management Introduction
 
Erp programme assurance
Erp programme assuranceErp programme assurance
Erp programme assurance
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
 
SAP grc
SAP grc SAP grc
SAP grc
 
Wajams Chemical Sdn Bhd
Wajams Chemical Sdn BhdWajams Chemical Sdn Bhd
Wajams Chemical Sdn Bhd
 
SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)
 
6 Ways to Ensure the Success of your Next Contractor Self Assessment
6 Ways to Ensure the Success of your Next Contractor Self Assessment6 Ways to Ensure the Success of your Next Contractor Self Assessment
6 Ways to Ensure the Success of your Next Contractor Self Assessment
 
LANDESK ITAM Review Tools Day Presentation 2015
LANDESK ITAM Review Tools Day Presentation 2015LANDESK ITAM Review Tools Day Presentation 2015
LANDESK ITAM Review Tools Day Presentation 2015
 
Re-shaping Assurance
Re-shaping AssuranceRe-shaping Assurance
Re-shaping Assurance
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
 
Continuous Monitoring Webinar Aviva Spectrum
Continuous Monitoring Webinar Aviva SpectrumContinuous Monitoring Webinar Aviva Spectrum
Continuous Monitoring Webinar Aviva Spectrum
 
The Vision, Highlights and Implementation Benefits of GRC STACK
The Vision, Highlights and Implementation Benefits of GRC STACKThe Vision, Highlights and Implementation Benefits of GRC STACK
The Vision, Highlights and Implementation Benefits of GRC STACK
 
The prominence of it lifecycle assurance
The prominence of it lifecycle assuranceThe prominence of it lifecycle assurance
The prominence of it lifecycle assurance
 

Similar to SAM Susceptibility Index Assessment v1

Erm talking points
Erm talking pointsErm talking points
Erm talking points
EnterpriseGRC Solutions, Inc.
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
Pandiya Rajan
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
EnterpriseGRC Solutions, Inc.
 
Software Asset Management I Best Practices I NuggetHub
Software Asset Management I Best Practices I NuggetHubSoftware Asset Management I Best Practices I NuggetHub
Software Asset Management I Best Practices I NuggetHub
RichardNowack
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
icomply
 
Automated Regulatory Compliance Management
Automated Regulatory Compliance ManagementAutomated Regulatory Compliance Management
Automated Regulatory Compliance Management
Adeel159
 
How to Reduce Risk in FinTech Operations
How to Reduce Risk in FinTech OperationsHow to Reduce Risk in FinTech Operations
How to Reduce Risk in FinTech Operations
360factors
 
StratexSystems_270115
StratexSystems_270115StratexSystems_270115
StratexSystems_270115
Andrew Smart
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
SathishKumar960827
 
NACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
NACD Directorship_Sept-Oct 2016_Director Advisory_EisnerNACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
NACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
Lena Licata
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
PECB
 
task 1
task 1task 1
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management Advisory
Mohit Madan
 
Applying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_effortsApplying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_efforts
Subhajit Bhuiya
 
Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...
Flexera
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Corporater
 
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
IBM Sverige
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq Hanaysha
Hanaysha
 
Risk View - InfoSec intro
Risk View - InfoSec introRisk View - InfoSec intro
Risk View - InfoSec intro
cswinney
 
Risk View Info Sec Intro 3.4.10
Risk View   Info Sec Intro 3.4.10Risk View   Info Sec Intro 3.4.10
Risk View Info Sec Intro 3.4.10
cswinney
 

Similar to SAM Susceptibility Index Assessment v1 (20)

Erm talking points
Erm talking pointsErm talking points
Erm talking points
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
 
Software Asset Management I Best Practices I NuggetHub
Software Asset Management I Best Practices I NuggetHubSoftware Asset Management I Best Practices I NuggetHub
Software Asset Management I Best Practices I NuggetHub
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
Automated Regulatory Compliance Management
Automated Regulatory Compliance ManagementAutomated Regulatory Compliance Management
Automated Regulatory Compliance Management
 
How to Reduce Risk in FinTech Operations
How to Reduce Risk in FinTech OperationsHow to Reduce Risk in FinTech Operations
How to Reduce Risk in FinTech Operations
 
StratexSystems_270115
StratexSystems_270115StratexSystems_270115
StratexSystems_270115
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
NACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
NACD Directorship_Sept-Oct 2016_Director Advisory_EisnerNACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
NACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
task 1
task 1task 1
task 1
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management Advisory
 
Applying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_effortsApplying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_efforts
 
Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
 
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq Hanaysha
 
Risk View - InfoSec intro
Risk View - InfoSec introRisk View - InfoSec intro
Risk View - InfoSec intro
 
Risk View Info Sec Intro 3.4.10
Risk View   Info Sec Intro 3.4.10Risk View   Info Sec Intro 3.4.10
Risk View Info Sec Intro 3.4.10
 

Recently uploaded

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

SAM Susceptibility Index Assessment v1

  • 1. All Software Asset Management Operational & Capability Assessment Audit Susceptibility Index™ www.it-tprm.com TPRM Forum LLC Confidential © 2018 All Rights Reserved
  • 2. Susceptibility Defined Susceptibility is defined as ‘the state or fact of being likely or liable to be influenced or harmed by a particular thing’. In the case of a software audit, Susceptibility is the likely severity, disruption and extent of financial exposure a firm may experience in the event a software publisher issues a ‘Notice of Intent to Audit’ the deployment of their software. TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com 2
  • 3. Software Asset Management (SAM) is a multi- level, multi-discipline function intended to reduce non-compliance risk of business critical software assets. Negotiating the reduction or elimination of software audit findings, while valuable, is NOT Software Asset Management. Effective SAM requires careful orchestration, monitoring and entitlement management of a tangible asset. SAM encompasses successful alignment of policy, procedures, controls, procurement, IT and PMO processes with rapid infraction identification. Properly executed, SAM not only minimizes audit exposure, it delivers efficiency of software investment. Software Asset Management (SAM) TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com 3
  • 4. Software Market Landscape - 2020 TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com In the past 5 years, software publishers have demonstrated intent to offset growth challenges with an increased focus on audit revenue. There have been many contributors to this dynamic, but at the core, publishers know the vast majority of Fortune 2,000 firms have immature or non-existent SAM capabilities. Firms need to consider what actions are required to limit this third party risk exposure. Actions to consider include: Clarity of Policy & Procedures Appropriate Controls: Purchase thru Harvest Establish dedicated SAM Organization IT & PMO Process Alignment Cloud Strategy & Implementation Leverage proven Technology Platform Non-conformance Escalation Procedure Produce effective reporting 4 The Software Asset Management Audit Susceptibility Index™ Assessment Methodology addresses each of these core areas.
  • 5. TPRM Forum has created the SAM ‘Audit Susceptibility Index™’ Assessment Methodology to assist organizations identify current effectiveness of their SAM capability and quickly chart a course for greater maturity and productivity. The SAM Audit Susceptibility Index™ (SAM-ASI) Assessment Methodology features:  Detailed Assessment across internal environment.  Assessment findings produce the Audit Susceptibility Index™ which enables development of the detailed ‘SAM Playbook’.  The SAM Playbook contains detailed, actionable recommendations, steps, calendar of events and recommended sequencing in addition of remedies for the most significant Areas of Exposure (AoE). SAM Audit Susceptibility Index™ Assessment Methodology TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com 5
  • 6. SAM Audit Susceptibility Index™ Execution 14-Sep-18 TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com The SAM Audit Susceptibility Index™ (SAM-ASI) Assessment Methodology features a rapid 4-5 week execution to produce detailed Playbooks designed to drive maturity and overall SAM capability. Unlike software development, SAM operations need to achieve Level 4 Maturity to materially reduce audit exposure. Assessment of Operational Risk and Environment Complexity enables development of required actions to reduce risk and improve environment dynamics to mature SAM capability.SAM-ASI ™Assessment Methodology delivers operational guidance to produce mature SAM operations. 6
  • 7. www www.it-tprm.com TPRM Forum LLC Confidential © 2018 All Rights Reserved www.it-tprm.com 7