COSO Compliance`s Impact on the Tech Sector

Transcription

COSO Compliance`s Impact on the Tech Sector
COSO Compliance's
Impact on the Tech Sector
August 21, 2013
Thank You Sponsors
MODERATOR
Scott McKay
Partner
Scott McKay
Partner & Practice Leader – Risk Advisory Services
 Certifications – CPA, CFE, CIA, CCSA
 Past Roles
 Cree – Corporate Controller and Director Corporate Audit
 McGladrey – Audit and Risk Advisory Manager, focusing on large public and private clients in
manufacturing, distribution, construction and gaming industry, along with some government and
university experience.
 Speaking Engagements
 AICPA Internal Control Task Force
 AICPA Business and Industry Conference – Risk Management and Internal Control Advisory Panel
 AICPA National CFO Conference – 2010 in Los Angeles
 AICPA Corporate Directors Conference – 2010 in New York
 Institute of Internal Auditors (IIA) Raleigh Chapter – Chief Audit Executive Roundtables
 North Carolina State University (NCSU) – ERM Post Graduate Lecturer
Risk Management vs. Compliance

Rule Book Approach – Risk management and control maturity
are often driven by regulatory compliance. However, being reactive
to regulation provides the wrong motive to manage risk and leads
to what we call “over-control” and wasting resources—people don’t
“buy in” and it’s not sustainable.

Wake up Morning! – Long-term success is predicated on behavior
change. Time spent helping people clearly see the risks to
achieving objectives leads to better-designed controls,
management “buy in” and sustainable processes. When risk
management makes sense, one of the de facto byproducts is
regulatory compliance.
Cherry Bekaert’s Definition of Risk
Probability of missing opportunities and objectives
or committing errors due to:
 Unseen Risk
 Unmanaged Risk
 Failed Controls
Growth, Risk, & Constraints
 Growth – the problem we all want to have but it puts
stress on most organization’s system of internal controls.
 #1 Risk Management Strategy – Controls
 Theory of Constraints….
 Insight – COSO is the emerging criteria that can be a
burden or an opportunity to enabling the Organization’s
growth.
COSO ~ What It Is…and Is Not
 COSO is not a regulation, mandate or compliance standard.
 COSO is the underlying criteria used by many to meet
regulatory requirements and internal control standards
(e.g. SOX, JSOX, ISOX, and SOC Reports).
 1985-1992: Framework focused on fraudulent financial
reporting.
 2002: Advent of SOX ~ COSO results in de facto standard
criteria.
COSO 2013 Highlights
Significant Increased Focus on Technology
 COSO “Principles” (17)
 Specifies suitable objectives
 Identifies and analyzes risk
 Assesses fraud risk
 Identifies and analyzes significant change
 Selects and develops general controls over technology
 Expanded Relationships and Globalization
 Transition period up to December 2014
WHY SHOULD I CARE?
 Dealing with the public sector, public companies or
considering going public?
 Meeting regulatory requirements e.g. SOX and still using “checkthe-box” approach
 Consider doing a gap assessment against the 17 COSO
Principles.
 If you are providing or receiving hosted services or
SaaS solutions.
 If you are a mid-sized or smaller private technology
company with less than 150 FTEs.
Panelist
Introductions
PANELIST
Rick Chilton
Director & CISO
Blue Cross and Blue Shield of North Carolina
PHOTO
of HQ
frominsurer
Kyle
+ North Carolina’s
largest
health
+ 3.7 million members
+
26,000 in-network providers
+ 4,000 employees
+ $5.7 billion revenue (2012)
+ Founded in 1933
13
13
Rick Chilton – CISO
+ 20 years of technology experience
+ Certified in Risk Information Systems Control
(CRISC)
+ Certified Information Systems Security
Professional (CISSP)
+ Vulnerability assessment, risk mitigation, security
engineering, security architecture, and
compliance.
14
PANELIST
Matt Cleaver
Sr. Director of Financial
Planning
Matt Cleaver, CPA
• Senior Director Financial Planning and Analysis at
Extreme Networks
• 14 Years Experience in Internal and External Audit and
Corporate Finance across many industries including Bio
Tech, Hi-Tech Manufacturing and Financial Services
16
© 2012 Extreme Networks, Inc. All rights reserved.
Extreme Networks - Leading Technology Innovator
Global, publicly traded company headquartered in San Jose, CA
Market leader in Ethernet Networking: >30M ports shipped
Focused on campus, data center, and mobile carrier markets
Largest office located in Morrisville, NC
Price/Performance
Leadership
Pioneer PacketRing Technology
First On-Switch
Programmability
First to Market
with 40G
First Cost
Effective Cloud
Scale 100G
1996
Pioneer Layer 2/3
Ethernet Switching
17
2013
Pioneer Ethernet
Quality of Service
Modular OS:
ExtremeXOS®
First VirtualizationAware Network
© 2012 Extreme Networks, Inc. All rights reserved.
Highest-Density,
Lowest Latency,
Lowest Power
Data Center Cost Savings
Solution Benefits: High Density and Price/Performance
18
(US) National Center for
Supercomputing Applications
Academia Sinica research
institution (Taiwan)
Challenge: Density,
performance, High Availability
Solution: BlackDiamond X8
Benefits: “Only switch that had
adequate port density for this
many high-speed connections
with oversubscription”
Challenge: Reliable network for
High Performance Computing
Solution: BlackDiamond 8810
Benefits: “Accomplishes both
our price-performance
requirements and our investment
protection goals”
© 2013 Extreme Networks, Inc. All rights reserved.
PANELIST
Greg Wehn
Risk & Assurance Manager
Greg Wehn
Risk & Security Manager
Administration, Security, and Risk Manager – Compliance Implementation
Services

~$35M in revenue as an outsourcing and professional services company for
pharmaceutical industry.

Industry leader in government programs and pricing outsourcing.

First outsourced firm to achieve SSAE16 SOC1.
Financial and IT Audit Senior – Various Firms
 8 years of Big 4 and Top Regional Firm experience. Specialized in healthcare and
financial industries as well as SAS70 engagements.
 Served large public and private clients in manufacturing, financial services, government,
and higher education experience.
Affiliations
 Pittsburgh Technology Council – SMB Compliance Roundtable Sponsor
 Pittsburgh Technology Council – SSAE 16 and AS5 Update
 Member – ISACA RTP Chapter
Managed Services
Managed IT Services – a la carte or bundled based on client needs:
 Managed Security Services (My role oversees this portion of the contracts)
 End User Services
 Managed Data Center
 Desktop Managed Services
 Service/Help Desk and Call Centers
 Technical and Maintenance Services
Managed Security Services
 Enterprise Access Controls – Enterprise Logical Access Execution
 Cyber Security Management
 Network Security and Monitoring
 Audit and compliance support services
Discussion
Does this apply to you or your company? Do you:
 Provide audited or reviewed financial statements?
 Use cloud-based or outsourced service vendors to
support your organization?
 Provide hosted or SaaS solutions to your customers?
Discussion
Talk about your company’s risk
management strategy and the compliance
framework (COSO, COBIT, ISO, etc.)
you utilize.
Discussion
Do you feel that regulation tends to drive
control maturity or more of business risk
approach?
Discussion
When considering a vendor for hosted
solutions or SaaS services, what
assurances or reporting do you require?
Discussion
When offering cloud-based services to your
customers, risks like Business Interruption,
Information Security and Information
Management Risk are considered. How do you
prioritize these, based on your customers and
how are the frameworks helping you manage
that risk.
Discussion
As a look ahead, do you think we need to
increase or decrease the standards over
technology services and solutions?
Tech Demo
Hard Drive Destruction Demo
Securely dispose of 5 HDs for FREE!
THANK YOU
nctechnology.org
PLEASE RECYCLE
YOUR NAME BADGES