Cisa 2
Cisa 2
Cisa 2
Description:
The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. At the same time,
however, they have created significant, unprecedented risks to enterprises public, private, and governmental.
Computer security has, in turn, become much more important as organizations of all sizes utilize information systems security measures to avoid data tampering,
fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information. Such use of computer security is essential in minimizing the risk of
malicious attacks from individuals and groups.
To be effective in ensuring accountability, auditors must be able to evaluate information systems security and offer recommendations for reducing security risks to
an acceptable level.
Information System Auditing is primarily an examination of the system controls within an IT architecture -- which is the process of evaluating the suitability and
validity of an organization’s IT configurations, practices and operations. Information System Auditing has been developed to allow an enterprise to achieve goals
effectively and efficiently through assessing whether computer systems safeguard assets and maintain data integrity.
Auditors are concerned with four objectives: asset safeguards, data integrity, system effectiveness, system efficiency. One of the key issues of auditing is to identify
whether errors and irregularities will cause material losses. Auditing might also assess whether the processes followed have contributed or are contributing to any
ongoing losses. To assess these auditors need to collect evidence.
Description:
The combination of business changes (market demands), enterprise responses (in terms of IT-intensive organizational changes), and
technologies dispersed into business units, creates a need to explore how IT is most effectively and efficiently governed.
IT Governance may be defined as a framework for the ongoing leadership, organizational structures and business processes, standards and
compliance to these standards, which ensures that IT supports and enables the achievement of both IT and organizational strategies and
objectives.
IT portfolio management is a restricted collection of IT assets, plotted against investment strategies, which are tied to acceptable risk levels
designed to meet business objectives. This is achieved through a calculated, favorable mix (the proportion or variety of investments made in
each enterprise area), based on a postulation about future performance, (planned and deliberate development expectations of the enterprise).
The result is in taking advantage of the reward verses risk tradeoffs (guaranteeing that the identified IT investments provide the required
level of usefulness for the cost and risk involved) in maximizing the enterprise’s returns on its IT spend.
This session addresses the critical linkage between proactive IT governance and practical IT portfolio management.
Session Outline:
Risk and Compliance Audience Participation Activities
Introduction • Asset Based Risk Assessment
• Threat Modeling Attendees will be encouraged to actively participate
• Governance, Risk, Compliance
• Technical Audit in responding to questions posed regarding the
(GRC) • Dependency Modeling subject matter and presented.
• Gap Analysis
Governance Additional Resources To Be Provided (a.k.a.
• Governance Framework IT Governance Frameworks Take-aways)
• GRC Objectives • COBIT
• Why is GRC Needed? • ITIL Attendees will be provided with several articles
• What Does GRC Include? • COSO written by the presenter on the subject and several
• The GRC Challenge • CMMI industry whitepapers addressing the presentation
• Why Does GRC Matter?
Open Compliance & Ethics Group (OCEG) topic.
• What is OCEG?
IT Governance vs. Data Governance • OCEG Framework
• Why IT Governance?
• What is IT Governance? IT Portfolio Management
• IT Governance Objectives • IT Portfolio Assessment
• Benefits of IT Governance • Governing IT Activities
Description:
Managing software projects is difficult under the best circumstances. Organizations can improve chances of success by applying known
industry smart practices for software project management.
The system development life cycle (SDLC) is a common methodology for systems development in many organizations. This methodology
features distinctive phases, each of which records the progress of the systems analysis and design project. The potential for abuse,
inefficiencies, and the potential to deliver application systems, which do not meet the needs of the end-user, warrants the involvement of IT
and user management as well as the audit function in most all software development efforts.
This session will examine the basic elements of the SDLC process, and how the process of designing new systems has (and continues to)
evolve. Attendees will also discuss strategic system design methodologies, and how the auditor can be an effective change agent within
this process.
The session focuses on providing assurance that the practices for the acquisition, development, testing and implementation of information
systems meet the organization’s strategies and objectives.
• Interpret the requirements for PDLC application development from a base of confidence and understanding.
• Confidently advise management on specific controls necessary for successful application development.
• Find managing application development projects easier.
• Discuss with both end users and management, how successful systems are developed and maintained.
• Lay the foundation for successful application development projects, which includes planning the project, estimating the work, and
tracking progress.
• Discuss the Capability Maturity Model (CMM) as a model of management practices for improving the quality of software.
• Recognize that one of the goals of the PDLC approach is total quality assurance through process-related improvements throughout an
entire organization.
• Address the examination requirements for Domain 3 of the CISA exam.
Description:
While maintaining the operational status of information systems is a major function of all IT departments, information security is of just as
great a concern. The steps organizations take to protect information assets from compromise or danger is the core and purpose of the CIA
(Confidentiality, Integrity, and Availability) security model, and the basis for any organization’s information security program.
All information systems are ultimately judged by their ability to provide continuous operations for the network services they support.
Installed technology needs ongoing maintenance and support, or it will not remain functional for long.
IT support services cover a range of services providing assistance with computer hardware, software, network or other. IT support services
attempt to help the user solve specific problems with a product or a service, whereas IT maintenance services help your company prevent
problems with your hardware, software, network and security.
Business applications require ongoing maintenance and support for their underlying infrastructure, which makes managing support contracts
a crucial part of the overall IT and business management functions. Support and maintenance contract information must be readily available
for planning and budgeting purposes— and especially in cases of emergencies. This helps reduce business risks associated with application
support, capacity provisioning, and any other ongoing infrastructure issues.
This session focuses on those activities directly related to the operation, maintenance and support of information systems.
• Identify service level management practices and the components within a service level agreement
• Recognize appropriate software licensing and inventory practices
• Document sound database administration practices
• Identify proper change, configuration, release and patch management practices
• Address the development, maintenance and testing of disaster recovery plans
• Assess Business Impact Analysis (BIA) related to disaster recovery planning
• Evaluate capacity planning and related monitoring tools and techniques
• Recognize key business recovery objectives and metrics
• Address the examination requirements for Domain 4 of the CISA exam.
Description:
Ensuring the integrity and confidentiality of information and the associated timely availability of systems to authorized users is the
cornerstone of an effective system of internal controls to protect an organization’s information assets.
Information is among an organization’s more valuable assets and management relies upon information to support its business activities.
The quality of preservation and retention of such information is key to an organization’s ability to provide services to its customers and
stakeholders.
Therefore, the security of an organization’s information and of the technology that facilitates its use is a responsibility shared by all
personnel. Any user who has been authorized to access the organization’s information has an obligation to preserve and protect these
information assets in a consistent and reliable manner.
Controls provide the necessary physical and procedural safeguards to accomplish such obligations. The establishment and management of
such controls enable information to be shared while ensuring protection of that information and its associated systems.
Management, together with internal workforce and external third parties, is responsible for ensuring that appropriate controls are in place to
maintain the objectives of confidentiality, integrity, and availability for the organization’s information.
Compliance with applicable legislative and regulatory mandates is key elements of an organization’s information asset protection program.
Thus, compliance that all information is processed, maintained and disposed of in accordance with all relevant federal and state laws, rules,
and regulations, is paramount.
The focus of this session will be to examine, in depth, the process, procedures, and methods used to protect an organization’s information
assets.
• Evaluate the techniques for the design, implementation, and monitoring of security controls, including security awareness programs
• Assess logical access controls for the identification, authentication and restriction of users to authorized functions and data
• Determine the configuration, implementation, operation and maintenance of network security controls
• Identify network and Internet security devices, protocols, and techniques
• Examine information system attack methods and techniques, including detection tools and control techniques (e.g., malware, virus
detection, spyware)
• Apprise security testing techniques (e.g., intrusion testing, vulnerability scanning)
• Evaluate risks and controls associated with data leakage
• Assess encryption-related methodologies including, public key infrastructure (PKI) components and digital signature techniques
• Determine risks and controls for voice communications security (e.g., PBX, VoIP) along with mobile & wireless devices
• Examine the evidence preservation techniques and processes followed in forensics investigations (e.g., IT, process, chain of custody)
• Recognize the processes and procedures used to store, retrieve, transport and dispose of confidential information assets
• Address the examination requirements for Domain 5 of the CISA exam.
Albert J. Marcella Jr. is an internationally recognized public speaker, researcher, workshop and seminar leader
with over 30 years of experience in IT audit, security and assessing internal controls, and an author of numerous
articles and 32 books on various IT, audit and security related subjects.
Dr. Marcella’s book Cyber Forensics: Collecting, Examining, and Preserving Electronic Evidence An
Auditor’s Field Manual, second edition, focuses on issues, tools, and control techniques designed to assist audit,
law enforcement, and info security professionals in the successful investigation of illegal activities perpetrated
through the use of information technology.
Professor Marcella is a tenured, full-professor at Webster University in Saint Louis, MO, where he is responsible for teaching
information technology management courses in the University’s graduate and doctoral programs.
Dr. Marcella is the Institute of Internal Auditors Leon R. Radde Educator of the Year, 2000, Award recipient. Dr. Marcella has
taught IT audit seminar courses for the Institute of Internal Auditors (IIA), continues to teach for the Information Systems Audit
and Control Association (ISACA), and has been recognized by the IIA as a Distinguished Adjunct Faculty Member.
DR. MARCELLA HAS EARNED THE FOLLOWING U.S. UNIVERSITY ACADEMIC CREDENTIALS:
log in to www.invension-i.com
Abdul Qadeer
Email. qadeer.h@invension-i.com