Information Technology Governance: Abainza - Centeno - Genotiva - Mercurio - Reyno
Information Technology Governance: Abainza - Centeno - Genotiva - Mercurio - Reyno
Information Technology Governance: Abainza - Centeno - Genotiva - Mercurio - Reyno
TECHNOLOGY
GOVERNANCE
ABAINZA . CENTENO . GENOTIVA . MERCURIO . REYNO
S R T L T L C Y MD I O V
P E N B C R U E I E A C G
C O M P U T E R
C E N T E R
O W E N R U A E O R G I S
A T S D B A P C M T K K N
D A T A B A S E
A G R N R A S L T I T S V
O C U T L E A D S A A M Y
N A T U R A L
D I S A S T E R
C H O R E G A O O I S E S
U T C T R N U W N R S V A
O U T S O U R C I N G
G T R G O N Y N I H B U O
F E A C I O N T P L O D M
I N F O R M A T I O N
T E C H N O L O G Y
OBJECTIVES
Understand the risks of incompatible functions
and how to structure IT function.
Be familiar with the controls and precautions
required to ensure the security of an
organization's computer facilities.
Understand the key elements of a disaster
recovery plan.
Be familiar with the benefits, risks, and audit
issues related to IT outsourcing.
IT GOVERNANCE
The management
and assessment
of IT resources.
IT GOVERNANCE
All stakeholders
must be active
participants in
key IT decisions.
IT GOVERNANCE CONTROLS
ORGANIZATIONAL STRUCTURE
CENTRALIZED DISTRIBUTED
APPROACH APPROACH
CENTRALIZED DATA
PROCESSING
IT
SERVICES PRODUCTION
DISTRIBUTION
DATA
INFORMATION
VP VP VP VP VP
MARKETNG FINANCE IT SERVICES ADMIN OPERATIONS
SYSTEMS
DATABASE DATA PROCESSING
DEVELOPMENT
ADMINISTRATOR MANAGER
MANAGER
DATA CONVERSION
transcribes transaction data from
hard-copy source documents into
computer input
DATA PROCESSING
COMPUTER OPERATIONS
DATA LIBRARY
DATA LIBRARY
DATA LIBRARIAN
controls access to the library
SYSTEM
DEVELOPMENT
& MAINTENANCE
SYSTEM
DEVELOPMENT
designs new systems to satisfy user’s needs
System Professionals
End Users
Stakeholders
SYSTEM
MAINTENANCE
takes charge after system development
COMPUTER
OPERATIONS
SEGREGATION OF
INCOMPATIBLE IT FUNCTIONS
DATABASE
ADMINISTRATION
OTHER
FUNCTIONS
SEGREGATION OF
INCOMPATIBLE IT FUNCTIONS
NEW SYTEMS
DEVELOPMENT
SYSTEM
MAINTENANCE
SEGREGATION OF
INCOMPATIBLE IT FUNCTIONS
SYSTEMS
DEVELOPMENT
SYSTEMS APPLICATIONS
ANALYSIS PROGRAMMING
works with users to codes the program
produce detailed designs according to design
of new systems specifications
SEGREGATION OF
INCOMPATIBLE IT FUNCTIONS
SYSTEMS
DEVELOPMENT
INADEQUATE DOCUMENTATION
SYSTEMS APPLICATIONS
ANALYSIS PROGRAMMING
PROGRAM FRAUD
works with users to codes the program
produce detailed designs according to design
of new systems specifications
SEGREGATION OF
INCOMPATIBLE IT FUNCTIONS
SYSTEMS
DEVELOPMENT
SYSTEMS SYSTEMS
DEVELOPMENT MAINTENANCE
SEGREGATION OF
INCOMPATIBLE IT FUNCTIONS
DISTRIBUTED DATABASE
CENTRALIZED
COMPUTER
SERVICES
DESTRUCTION
OF AUDIT TRAILS
INADEQUATE
RISKS SEGREGATION OF DUTIES
INEFFICEINT
USE OF RESOURCES
LACK OF
STANDARDS
COST BACK UP
REDUCTION FLEXIBILITY
ADVANTAGES
USER SERVICE
PERSONNEL REVIEW
SERVICES PROVIDED
SEGMENTATION POLICY
AUDIT PROCEDURES
CENTRALIZED IT FUNCTIONS
REVIEW CURRENT ORGANIZATIONAL CHART
AUDIT PROCEDURES
DISTRIBUTED IT FUNCTIONS
COMPUTER CENTER
PHYSICAL LOCATION
safe from human-made and natural disasters
located away from human traffic
not located on basements
CONSTRUCTION
singled story building with control access
utility and communication lines are underground
use air filtration systems and windows must be closed
ACCESS
limited access
Physical: Locked and secured doors, use of keycards and CCTVs
AIR CONDITIONING
temperature range from 70 to 75 degrees
Humidity: 50 percent
FIRE SUPPRESSION
most serious threat to a company
Implementation of fire suppression system is necessary
FAULT TOLERANCE
Redundant Arrays of Independent Disks (RAID)
uninterruptible power supplies
AUDIT PROCEDURES
Verify and test physical security controls
that are adequate to reasonably protect
organization from physical exposure.
CREATE A SPECIFY
DISATER COMMON BACKUP AND
RECOVERY FEATURES OFF-SITE
STORAGE
TEAM OF DRP
PROCEDURE
System = DRP
CREATE
DISASTER RECOVERY TEAM
Task Responsibility
DRP TEAM COORDINATOR VP OPERATIONS
Site Backup
Critical Application List
Software Backup
Data Backup
Backup Supplies, Documents, Documentation
Disaster Recovery Team
OUTSOURCING
THE IT FUNCTION
OUTSOURCING
Process by which an organization contracts with
another individual or company to get some of its
work done.
BENEFITS OF IT OUTSOURCING
FOCUS ON CORE
BUSINESS PERFORMANCE
INCREASE EFFICIENCY
SAVINGS/COST REDUCTION
SAVINGS/COST REDUCTION
INCREASE EFFICIENCY
Choosing an outsourcing company that
specializes in the process or service
you want them to carry out for you,
can help you achieve a more
productive, efficient service, often of
greater quality.
BENEFITS OF IT OUTSOURCING
FOCUS ON
CORE BUSINES PERFORMANCE
Network Management
Systems Operations
Server Maintenance
Help-desk Functions
SPECIFIC
IT ASSET
unique to a particular organization
System Development
Application Maintenance
Data Warehousing
TRANSACTION COST
ECONOMICS THEORY
RISKS INHERENT TO IT OUTSOURCING
FAILURE TO PERFORM
VENDOR EXPLOITATION
REDUCED SECURITY
Definitive standard by
which client
organizations’ auditors
AUDIT can gain knowledge
that controls at the
IMPLICATIONS third-party vendor are
of IT Outsourcing adequate to prevent or
(SAS 70) detect material errors
that could impact the
client’s financial
statements.
SAS 70 OVERVIEW
SAS 70 TYPE I REPORT SAS 70 TYPE II REPORT