You are on page 1of 6

AIS 5131 - Managing Information and ● Objective setting, objective attainment,

Technology and monitoring performance


● Purpose: help build trust, transparency,
Chapter 1 - IT Governance and IT Strategy and accountability for fostering
long-term investment, financial stability,
Topics Covered - Chapter 1 Part A and business integrity
● Introduction - Ex. Enron - does not have trust,
● IT Governance and Strategy transparency, and accountability
● Enterprise Governance of Information and - Corporate social responsibility,
Technology (EGIT) subsidies,
● Good Practices for EGIT - SDGs - part of companies to be
● Audit’s Role in EGIT more inclusive

Introduction: Corporate Governance Framework


IT Governance: ● Purpose: (1) reduce inaccurate financial
● Not an isolated discipline reporting, and (2) provide greater
● Integral part transparency and accountability
● Strategic direction, objectives, ● Government regulations: (a) require a
management of risks, and use of senior management to sign-off internal
resources controls, and (b) include an assessment
○ When we speak of strategy – on the internal controls over financial
long term reports
○ Governance - whole company
○ Risk - uncertainty, danger, - SOX of 2002 - regulations on publicly
negative - opposite: certainty traded companies
○ You need to properly manage - Listed under US-SEC - under ng
risk SOX
● Setting of objectives, measure - Section 302 - disclosure controls
performance, benchmark against - CEO - pinakamataas
objectives, move forward or change na executive
direction - CFO - IT
○ You always start with objectives
○ You compare your performance ❖ SOX SEC 302 - CEO and CFO should
with objectives attest the accuracy and reliability of the
○ Move forward - naachieve mo financial information of the company
yung objective
○ Change direction - di mo - SOX SEC 404 - include an assessment
naachieve yung objective on the internal controls over financial
reports
IT Governance and IT Strategy ➢ Controls, testing, assessing
● Corporate governance practices: be ➢ The company should test and
implemented for ethical issues, decision look at the design
making and overall practices; ➢ Important aspect: have an
● Who is responsible for governance? independent external auditor to
BOD check the internal controls
● IT governance: consists of leadership
and organizational structures and ❖ SOX SEC 404 - companies should
processes annually assess and test their internal
controls; independent external auditor
- Control - an activity to address the risk should inspect the internal controls
- Proper risk management - implement
good controls ❖ SOX SEC 406 - pertains to the code of
ethics to senior financial officers
Corporate Governance
● Management, BOD, shareholders, and Components of Enterprise Governance
stakeholders Framework

1
- CISA - made by ISACA
- Framework for manual controls -
COSO (Committee Of
Sponsoring Organizations of the
Treadway Commission)

● COBIT framework makes a clear


distinction between governance and
Enterprise Governance of Information and management, as follows:
Technology (EGIT) ○ Governance: ensures
● EGIT: system in which all stakeholders stakeholder needs, conditions
provide input to IT-decision making and options are evaluated;
process prioritization and decision
● EGIT: responsibility of the BOD and making; monitoring of
executive management; “Stewardship” performance and compliance
of IT resources ○ Management: plans, builds,
● Management: implement systems and runs and monitors activities to
IT controls achieve objectives
● EGIT’s purpose: direct IT endeavors to
ensure: ❖ Governance - under the responsibility of
○ (1) alignment of IT with the BOD (chairperson)
enterprise objectives, and ❖ Management - under the responsibility of
○ (2) achievement of promised the executive management (CEO)
benefits
● IT must exploit opportunities and Effective Enterprise Governance
maximize benefits ● Individual and group expertise
● IT resources must be used responsible ● Before: IT is enabler; Now: IT is integral
and IT-related risks must be managed part
properly ● Alignment of IT and enterprise
objectives: a critical success factor;
❖ All Stakeholders cannot simply be seen as either IT
1. BOD management or IT specialist operations;
2. Senior management ● IT needs guidance and supervision from
3. Internal customers the senior management and oversight
4. Departments from BOD
● Key element: alignment of business and
Processes/Practices in Implementing an EGIT IT to achieve business value
Framework ● 2 issues: 1) IT delivers value to the
a) IT resource management: maintaining business (strategic alignment) and 2) IT
inventory IT resources and risk risk is managed (accountability)
management process
b) Performance measurement: ensuring IT Good Practices for EGIT
resources perform as expected to deliver ● Purpose of an IT Governance System:
value, and identification of risks early on satisfy stakeholder needs and generate
c) Compliance management: implementing value
processes that address legal and ● Value: balance of benefits, risk and
regulatory policies and contractual resources
compliance requirements
Factors which made EGIT significant:
Governance vs. Management a. Demand of business managers and BOD
● ISACA: Information Systems Audit and for better return from IT investments
Control Association b. Increasing level of IT expenditure
● COBIT: Control Objectives for Information c. Need to meet regulatory requirements
and Related Technology for IT controls in areas such as in privacy
- Parang debit and credit yung and financial reporting, and in specific
ISACA and COBIT sectors

2
● Monitoring, analysis and evaluation of
❖ Basel accords - banking regulation metrics: require an independent and
agreements to ensure that financial balanced view for qualitative
institutions have enough capital on assessment and qualitative
account to absorb unexpected losses improvement
❖ European Union (EU) General Data
Protection Regulation (GDPR) - aims to ❖ Audit improves the:
regulate the processing of personal data ➢ Quality
of the European Union (EU) Citizens ➢ Effectiveness
➢ Equivalent ng data privacy act ❖ Of the IT Governance initiatives
sa’tin
● Auditing at the highest level of the
d. Selection of service providers and enterprise; crossing divisional,
management of service outsourcing and functional or departmental boundaries
acquisition ● The IS auditor should confirm that the
e. IT Governance initiatives: adoption of terms of references state the:
control frameworks and good practices ○ a) Scope of work
to help monitor and improve critical IT ○ b) Reporting line to be used
activities ○ c) IS auditor’s right to access
f. Need to optimize costs information
- Standardized approach - less
cost ❖ Terms of references
g. Acceptance of well-regarded a) Scope (functional areas and
frameworks issues to be covered)
h. Need to assess performance against b) Reporting line (EGIT issues
generally accepted standards should be identified to the
highest level of the organization)
● Integration with governance: Evaluate, c) IS auditor’s right to access
direct and monitor processes information (within the
● Evaluation, direction, and monitoring of: organization and from TP
○ 1) Conformance and service providers)
performance
○ 2) The system of internal ● Organizational status and skill sets of
controls the IS auditor: should be considered for
○ 3) Compliance with external appropriateness; if found insufficient,
requirements consider third party to perform audit
● Aspects related to EGIT that need to be
Audit’s Role in EGIT assessed:
● Establishment of internal controls: ○ 1. Alignment of enterprise
ensures good practices governance and EGIT
● Good practices: guide to use resources ○ 2. Alignment of IT function
● Measurement and reporting of results: with the enterprise’s mission,
provide input to the cyclical revision and vision, values, objectives and
maintenance of controls strategies
● IT is also governed by good practices ○ 3. Achievement of performance
which ensure that IT supports the objectives
business objectives, delivers value, uses ○ 4. Legal, environmental,
resources responsibly, manages risk information quality, fiduciary,
appropriately and measures performance security and privacy
requirements
● Audit: has very important role ○ 5. Control environment
● Audit: provides recommendations to ○ 6. Inherent risk within the IS
senior management to help improve the environment
IT governance initiatives ○ 7. IT investment/expenditure
● Audit: helps ensure compliance

3
Topics Covered – Chapter 1 Part B c. Set of standards for each policy
● Information Security Governance d. Security organizational structure
● Effective Information Security Governance e. Monitoring processes
● Information Systems Strategy
● Strategic Planning Effective Information Security Governance
● Information security governance: one of
Information Security Governance the highest levels of focused activity; its
● Strategic direction: defined by business specific drivers are:
goals and objectives ○ confidentiality, integrity and
● Information security: support business availability (CIA) of information
activities to be of value ○ continuity of services
● Information security governance ○ protection of information assets
○ Subset of corporate governance ● Security has become a significant
○ Provides strategic direction for governance issue as a result of: global
security activities networking, rapid technological innovation
○ Ensures achievement of and change, increased dependence on IT,
objectives; increased sophistication of threat agents
○ Ensures information security risk and exploits, and an extension of the
is appropriately managed and enterprise beyond its traditional
enterprise information resources boundaries.
are used responsibly ● Negligence of information security:
diminish capacity to mitigate risk and take
● According to the US National Institute of advantage of opportunities
Standards and Technology (NIST) Special ● BOD and CEOs: accountable and
Publication 800-100, Information Security responsible
Handbook: A Guide for Managers: ● CEO:
● Information security governance can be ○ Accountable to the BOD for
defined as the process of establishing and information security governance
maintaining a framework and supporting ○ Responsible for its discharge
management structure and processes to through the executive
provide assurance that information management and the
security strategies are aligned with and organization and resources
support business objectives, are under his/her charge
consistent with applicable laws and ● Senior management: should come from
regulations through adherence to policies varied operations and staff functions; to
and internal controls, and provide ensure fair representation
assignment of responsibility, all in an effort ● Purpose: minimize leaning toward a
to manage risk. specific business priority or technology
overhead or security concerns
Information Security Governance Framework ● The board-level committee approving
● Thru establishment and maintenance of a security policies may include:
framework ○ Directors
● Framework: ○ CEO
○ Guide for comprehensive ○ Chief Operating Officer (COO)
information security program ○ Chief Financial Officer (CFO)
○ Basis for cost-effective ○ Chief Risk Officer (CRO)
information security program ○ Chief Information Officer (CIO)
● Information security program: provides ○ Chief Technology Officer (CTO)
assurance that information assets are ○ Head of Human Resources (HR)
given protection commensurate with their ○ Chief of Audit
value or the risk poses to the organization ○ Chief Compliance officer (CCO)
○ Legal
Elements of An Information Security ● Policy approval: consensus
Governance Framework ● Information: key resource
a. Security strategy ● Technology: important from the time
b. Security policies information is created until destroyed

4
● IT: pervasive; in enterprises and in social, ○ 2. Measurement process to
public and business environments identify shortcomings and
● Because IT has become pervasive, provide feedback
enterprises now strive to: ○ 3. Independent assurance
○ a. Maintain high-quality
information b) Resource Management
○ b. Generate business value from ● Efficient and effective use of information
IT-enabled investments security knowledge and infrastructure
○ c. Achieve operational ● To be considered:
excellence 1. Ensure knowledge is captured
○ d. Maintain IT-related risk at an and available
acceptable level 2. Document security processes
○ e. Optimize the cost of IT and practices
services and technology 3. Develop security architecture(s)
○ f. Comply with relevant laws,
regulations, contractual c) Process Integration
agreements and policies ● Focus: integration of management
● Protection efforts: currently focused on the assurance processes for security
information system rather than the ● Security activities: fragmented and
information itself segmented in silos with different reporting
● Above approach: narrow, to accomplish structures
the needed security ● Process integration: improve overall
● Information security: broader view; data, security and operational efficiencies
as well as the information and knowledge
based on them, must be protected Information Systems Strategy
● Applicable situations: data are shared ● Information systems: crucial for
easily over the Internet enterprises
● Protection efforts: both on the process ○ Crucial in the support,
and information resulting from the process sustainability, and the growth of
● Major trends globally: outsourcing and enterprises
cloud computing ● Before: minimal involvement of governing
● Information security coverage: extend boards and senior management
beyond geographic boundary of the executives on IS strategy; decisions left to
enterprise’s premises functional management
● Basic outcomes of effective information ● Now: above approach no longer
security governance include: acceptable due to dependency on IS for
○ Strategic alignment operations and growth
○ Risk management ● Internal and external threats: IS
○ Compliance resource abuse, cybercrime, fraud, and
○ Value delivery errors and omissions
● IS strategic processes: integral
● Basic outcomes are enabled through the components; provide assurance that goals
development of: and objectives will be attained for
○ a) Performance Measurement competitive advantage
○ b) Resource Management
○ c) Process Integration Strategic Planning
● Strategic planning: long-term direction on
a) Performance Measurement IT to improve business processes
● Measurement, monitoring and reporting; ● Factors to consider in strategic planning
ensure that SMART objectives are include:
achieved ○ identifying IT solutions to
● To be accomplished: address problems and
○ 1. Set of metrics aligned with opportunities
strategic objectives ○ developing action plans

5
● Enterprises should ensure plans are
aligned and consistent with the goals and
objectives
● IT department management, IT steering
committee, Strategy committee: play a
key role in the development and
implementation of the plans
● Effective IS strategic planning involves a
consideration of:
○ Enterprise’s requirements for
information systems,
○ IT’s capacity to deliver new
functionality
● Determining requirements for information
systems involves:
○ Consideration of the strategic
intentions
○ How these intentions translate
into objectives and initiatives
○ IT capabilities to support
objectives and initiatives
● Existing system’s portfolio: be reviewed in
terms of functional fit, cost and risk
● Assessing IT’s capacity to deliver:
involves review of the technical IT
infrastructure and key support processes
to determine whether expansion or
improvement is necessary
● Strategic planning process:
○ Encompass the delivery of new
systems and technology
○ Consider return on investment
(ROI) on existing IT and the
decommissioning of legacy
systems
● Strategic IT plan: balance cost of
maintaining existing systems against the
cost of new systems

IS Auditors
1) Should pay attention to the importance of
IS strategic planning
2) Must importance to strategic planning
process or planning framework
3) Should consider how the CIO or senior IT
management is involved in the creation of
the overall business strategy

You might also like