Innovation, Agility and Resilience - DNA of the fittest!
Strategy, AI, Digital transformation, Operational Resilience, Cyber Security, Process automation, Risk management and Compliance are your focus domains for value creation. AI supported disruption and geopolitical uncertainty - new reality. Agile organizations see all that as opportunities. People, Processes and Planet are changing at a faster pace as any time before. Sustainability, Artificial Intelligence and new business models are shaping the future. Without efficient utilization of "Digital" most businesses are at risk. Quick fix, systematic transformation or independent sparring partner to CX team - your call. We provide tailored Advisory Services for your Sustainable Growth.
Challenges of Auditing complex information systems, compliance requirements and the pressure from regulators resulted in a trend and the need for ongoing, regular and integrated auditing of organizations. Information technology is present in every organisation and for many it is the core pilar of current business models and is seen as enabler of sustainable business strategies and transformations.
Number of transactions and the influence of late detection of challenges in the domains of management, risks or compliance, demand the use of modern integrated approach in auditing information systems.
What it the best approach and solutions for integrated GRC management (Governance, Risk, Compliance) in SAP environments?
How to best understand and implement controls monitoring and auditing?
Business, Governments and individuals – we are all reminded daily of our dependence on information.
We must protect the value of some information because we classified it as Confidential and we allow only trusted parties to access it. In this case we focus on Confidentiality.
We must protect some information from unwanted or undetected change to ensure its Integrity because corrupt or changed information could result in risk or loss in business terms or even loss of life in health care environments.
We want to ensure information is available to us when we need it. In this case we focus on Availability. Organizations have Business Continuity and Disaster Recovery Plans in place and they have prepared them by doing Business Impact Assessment (BIA) where they assess their business needs via Recovery Time Objective (RTO) and Recovery Point Objective (RPO).
As noted above CIA – Confidentiality, Integrity and Availability are important attributes of information that we are typically using to address information security needs.
All of the above is more or less clear to information security professionals and even general public, however, there are still significant differences in maturity of organizations when implementing Information Security Governance and Enterprise Risk Management.
These are some of our recent observations from working on Information Security or Risk Management consulting and Audit engagements:
Organizations are addressing mostly Availability but are neglecting Integrity and some also Confidentiality.
Internal Information Security Professionals are overwhelmed with Information Security related events – only those who have SIEM systems in place and can detect events.
However, there are organisations which “don’t know that they don’t know” and may be exposed or already exploited.
The Board is not aware of true health of Information Security. There is lack of robust and consistent Information Security performance reporting.
There is lack of trust between Information Security professionals and the Board since Information Security Governance is not mature enough.
Information Technology Architecture is rapidly changing, however, it is poorly documented and as such does not provide the basis for the robust Information Asset Management which is an essential element of Information Security Management.
How can we protect or secure something if we don’t even know what Information Assets we have, where they are and how important they are for the organization.
Vulnerability management is slow and not efficient.
Still there are unsupported and obsolete systems in use which are known to pose a risk because they have known vulnerabilities.
Organizations are engaging managed security services providers, however, they are not always able to control their quality and performance.
System Admins have many tools and control mechanisms at their disposal, however, they do not have the time or knowledge to implement them.
There is high pressure from information security software and systems vendors on organizations as well as rapidly changing value propositions, licensing options and business models. Without robust IT Strategy and regular IT Architecture Scenario analysis it is very likely that vendors will have an upper hand.
Only some organizations are executing all Cyber Security Scenarios beyond tabletop walkthrough exercises.
Exit strategies are addressed formally (in regulated environments only) before entering into agreement as part of the risk assessment process, however, exit strategies are mostly forgotten and not tested during the course of cooperation.
This was just a sample we wanted to share but the list goes on and on.
So where do we go from here?
Every organization is unique, however, there are common Enterprise Risk and Information Security denominators related to Governance and Management. We didn’t comment on Enterprise Risk Management above, however, it is linked to Information Security.
We will be happy to help you diagnose and improve the maturity of your Enterprise Risk and Information Security efforts or work with you on continuously raising the bar on the never ending journey to resilient, sustainable and agile organisation.
“Digital transformation” was for the last few years or still is the buzz word “for profit” organization could not neglect. New job titles and positions were created and there was a slight shift of “internal power” in favour of the initiatives and programs that were delivering platforms that could enable digital transformation.
Only the best organizations are making an extra effort to evaluate the quality of these initiatives.
Why would this step be important?
As with any hype the speed of change and the varieties of business models in different organisations mean that one size does not fit all.
Are you squeezing the maximum value of your data?
What are additional opportunities and risks?
Is your governance model fit for your digitally transformed organisation?
How well will your change management program roadmap take advantage of Artificial Intelligence?
Privacy is one of the domains of information management that is causing a lot of headackes to any entity that is collecting, using or processing personal information. Recent events related to data breach at giants like Yahoo are demonstrating that even organizations with vast amount of resources have challenges remaining compliant.
EU is moving forward in implementation of EU requirement related to privacy that can expose an organization to penalty of up to 20M EUR or 4% of annual turnover.
The General Data Protection Regulation (GDPR)(Regulation (EU) 2016/679)
Even simple actions like storing your client data on your phone can present a significant risk from compliance perspective if not managed propplerly.
How good are your privacy practices? We can help you via a diagnostic review that will discover the gaps. We can help you with the design and execution of the privacy compliance remediation. Please contact us.
Chief Information Officer is valuable commodity. Just recently we have received a few requests to help identify or “Head hunt” a suitable candidate.
After discussing with the clients we have learned that motives in these organisations were different.
One organisation and its CEO has a firm belief that their ERP system needs to be replaced and that the organization needs a new CIO to make that happen.
The other wants to have CIO that not only runs after the latest and greatest in IT but has also the sence for ROI, costs, strategy and internal controls in IT.
It seems like the CEOs of these organisations have realised that the future potential for value creation sits in the intangible resources of these organisations – key people and information technology.
The question remains what have their existing CIOs done wrong or what they did not do? How could a CIO ensure he/she is doing the right thing? How could a CIO be a true value creator for an organisation?
We are addressing challenge via our diagnostic reviews of your IT functions. We will be happy to assist. Please contact us.
Absolute compliance can have significant impact on business. Compliance with laws and external regulations is perhaps more important than internal compliance in domains with less impact on business performance.
Example: If you choose to park your car on your bosses parking space might be a challenge for you personally however in most cases such an act would have minimum impact on business performance of an organization observed. In this case you have made a decision to break the rule. Was the benefit of having a few minutes extra since your bosses parking lot is way closer to your desk than yours, bigger than risk your action exposed you to, remains unknown in this scenario. We don’t know your boss, we don’t know compliance tolerance levels and we don’t know the culture of your organization.
To be on a safe side perhaps taking a bus would be the right approach or getting there earlier.
Compliance with laws and regulations is a must. Some organisations are worried about their compliance because they are using business models or resources that are perhaps not regulated yet.
Managing compliance risks may be complex especially in regulated industries such as financial, insurance and pharma.
Diagnostic review of your compliance maturity level might help your organisation in identifying opportunities for achieving an optimal compliance level for your organisation. Please get in touch!
While innovation is vital for sustainability, risk management will prevent surprises and help your organization to operate within acceptable risk apetite. It is very important to establish common understanding of what your risk appetite is between all key stakeholders. Organizations success can be distorted if it is not put in the context of the risk exposure.
Top performance of your organization is your goal.
We see our mission in assisting you to achieve your goals.
Corporate Governance
Governance and leadership are vital to success of any organization.
We listen, learn and contribute to your organization in line with the target culture of your organization.
Risk Management
Your risk intelligence will provide opportunities within your risk appetite.
We help you build a risk management framework and suggest best practices.
Compliance
The most mature and risk intelligent organizations put compliance in the perspective of carefully calculated risk.
We help organizations achieve their target compliance levels.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptRead More
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.