SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
IT ADVISORY
As the IT auditors arrives ….
InfoSecurity 2010
4 November 2010
ADVISORY
4 November 2010
As the IT Auditor arrives …
Understand the Purpose of the IT Audit
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 1
Se As the IT Auditor arrives …
Be aware of your own Attitude
Effectiveness and Efficiency of AuditEffectiveness and Efficiency of Audit
depend on behaviour
Client
Soft Controls
Auditor
Soft Controls
Audit Sponsor is leading by example
Involving stakeholders
Soft Controls
Seeking for Facts
Clearly in providing Judgment
Transparence, providing adequate Information
Be involved with Audit
C ea y p o d g Judg e t
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 2
As the IT Auditor arrives …
Consider the Auditor’s perspective
First line of
Defense
Second line
of Defense
Third line of
Defense
• Self-
assessment
by
operational
• Management
Assessment
• Audit
operational
staff
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 3
As the IT Auditor arrives …
Be specific regarding your expected maturity of IT
Cobit maturity levels
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 4
As the IT Auditor arrives …
Understand each Phase of the Audit
• Scope of Objects to be assessed
Risk-based
• Scope of Objects to be assessed
• Requirements to be applied
Compliance-
based
• Fact finding
based
• Evaluation of noted Deficiencies
Risk-based
• Evaluation of noted Deficiencies
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 5
As the IT Auditor arrives …
Risk-based scoping – Financial Reporting
AAccounts and disclosures Focus of financial audit Accou s a d d sc osu es
Entities
Business processes
Manual controls
Key controls
IT-dependent Manual controls
Automated controls
Generic ICT infrastructure
Application-specific ICT
Key application controls
IT management
processes
Focus of IT audit B
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 6
Generic ICT infrastructure Focus of IT audit
As the IT Auditor arrives …
Risk-based scoping – Assess an IT service
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 7
As the IT Auditor arrives …
Compliance-based fact-finding
Be aware that the auditor evaluates also your own (Continuous) Monitoring
Event
event
Deduction of
Event
Deduction of
events
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 8
As the IT Auditor arrives …
Risk-based evaluation Business
critical list of
Risk based
critical list of
Applications
Sensitivity
(CIA)
People
Soft controls
Risk-based
Selection of controls
(CIA)
Selection of
Controls
- Soft controls
Processes
-Three levels of defenseMonitoring
Compliance-based
monitoring
IT Environment
Technology
- Compliance monitoring
- Vulnerabilities monitoring
Incident detection
o to g
Analysis of Issues
IssueTracking
- Incident detection
Risk-based
evaluation and
follow-up
Follow-up
(improve or
accept)
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 9
9
As the IT Auditor arrives …
You can help to make it effective and efficient !
Consider how the IT Auditor can help you, to improve your IT environment
RegardingRegarding
People
ProcesesProceses
Technology
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 10
Questions
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 111
1
Contact details
Name  Ir Peter Kornelisse RE CISAName  Ir. Peter Kornelisse RE CISA
Position  Director, experienced with regard to Information Security and
Technology, having performed and coordinated many advisory services,
as well as compliance audits and security tests, since 1990.
Peter is globally responsible for security testing services at KPMG andPeter is globally responsible for security testing services at KPMG, and
mainly delivers IT audit support for Financial Audits, and Information
Protection and Business Continuity services in the Netherlands.
E-mail  kornelisse.peter@kpmg.nl
Telephone  +31 (0)6 – 53 165 596
© 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG
International, a Swiss cooperative. 121
2

Mais conteúdo relacionado

Mais procurados

Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Kroll
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10Ulf Mattsson
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-SocialNetIQ
 
09 blockchain-security-information-sharing
09 blockchain-security-information-sharing09 blockchain-security-information-sharing
09 blockchain-security-information-sharingChristos Laganas
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionGareth Niblett
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.iFour Technolab Pvt. Ltd.
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurityIndy Dh
 
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCWill O'Brien
 
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...willbitgo
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Marc Vael
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Tony Richardson CISSP
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 

Mais procurados (20)

Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
09 blockchain-security-information-sharing
09 blockchain-security-information-sharing09 blockchain-security-information-sharing
09 blockchain-security-information-sharing
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Cyber Safe Southwark
Cyber Safe SouthwarkCyber Safe Southwark
Cyber Safe Southwark
 
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
 
Legal Services
Legal ServicesLegal Services
Legal Services
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurity
 
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
 
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Meeting your information security obligations april 2012
Meeting your information security obligations april 2012
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 

Semelhante a Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht

Synergy Technology Services Corporate Profile - 28-01-2016
Synergy Technology Services Corporate Profile - 28-01-2016Synergy Technology Services Corporate Profile - 28-01-2016
Synergy Technology Services Corporate Profile - 28-01-2016BNI Exponential
 
OIES Company Overview - Updated November 2015
OIES Company Overview - Updated November 2015OIES Company Overview - Updated November 2015
OIES Company Overview - Updated November 2015Francisco Maroto
 
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...Hugo van Hoogstraten
 
SAP_S4HANA_Compliance_and_Security_Webinar.pdf
SAP_S4HANA_Compliance_and_Security_Webinar.pdfSAP_S4HANA_Compliance_and_Security_Webinar.pdf
SAP_S4HANA_Compliance_and_Security_Webinar.pdfanandkumar558548
 
presentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdf
presentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdfpresentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdf
presentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdfSandeepMandal42
 
2020041 cv meindert keuning valor_en valor management
2020041 cv meindert keuning valor_en valor management2020041 cv meindert keuning valor_en valor management
2020041 cv meindert keuning valor_en valor managementmkeuning
 
Agency Presentation typovision GmbH
Agency Presentation typovision GmbHAgency Presentation typovision GmbH
Agency Presentation typovision GmbHtypovision GmbH
 
Transformatie door innovatie IGC Amsterdam
Transformatie door innovatie IGC AmsterdamTransformatie door innovatie IGC Amsterdam
Transformatie door innovatie IGC AmsterdamPiet van Vugt
 
Presentation n pulse-2015
Presentation n pulse-2015Presentation n pulse-2015
Presentation n pulse-2015Georg Panagos
 
Forensics: Regional trends in anti-corruption legislation and corporate best ...
Forensics: Regional trends in anti-corruption legislation and corporate best ...Forensics: Regional trends in anti-corruption legislation and corporate best ...
Forensics: Regional trends in anti-corruption legislation and corporate best ...IPPAI
 
OIES Short Overview 201509
OIES Short Overview 201509OIES Short Overview 201509
OIES Short Overview 201509Francisco Maroto
 
EBRC Trusted Partners at ICT Spring 2014
EBRC Trusted Partners at ICT Spring 2014EBRC Trusted Partners at ICT Spring 2014
EBRC Trusted Partners at ICT Spring 2014EBRC
 
IP Advantages LLC
IP Advantages LLCIP Advantages LLC
IP Advantages LLChyingli
 
Corporate presentation + infraestructure 2013 english
Corporate presentation + infraestructure 2013 englishCorporate presentation + infraestructure 2013 english
Corporate presentation + infraestructure 2013 englishAnyHelp International
 
Beta for business & technology research & innovation 2015
Beta for business & technology research & innovation   2015Beta for business & technology research & innovation   2015
Beta for business & technology research & innovation 2015Beta-Research.org
 

Semelhante a Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht (20)

Synergy Technology Services Corporate Profile - 28-01-2016
Synergy Technology Services Corporate Profile - 28-01-2016Synergy Technology Services Corporate Profile - 28-01-2016
Synergy Technology Services Corporate Profile - 28-01-2016
 
OIES Company Overview - Updated November 2015
OIES Company Overview - Updated November 2015OIES Company Overview - Updated November 2015
OIES Company Overview - Updated November 2015
 
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...
 
SAP_S4HANA_Compliance_and_Security_Webinar.pdf
SAP_S4HANA_Compliance_and_Security_Webinar.pdfSAP_S4HANA_Compliance_and_Security_Webinar.pdf
SAP_S4HANA_Compliance_and_Security_Webinar.pdf
 
CC14GMS
CC14GMSCC14GMS
CC14GMS
 
presentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdf
presentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdfpresentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdf
presentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdf
 
2020041 cv meindert keuning valor_en valor management
2020041 cv meindert keuning valor_en valor management2020041 cv meindert keuning valor_en valor management
2020041 cv meindert keuning valor_en valor management
 
Glotel
GlotelGlotel
Glotel
 
Agency Presentation typovision GmbH
Agency Presentation typovision GmbHAgency Presentation typovision GmbH
Agency Presentation typovision GmbH
 
Transformatie door innovatie IGC Amsterdam
Transformatie door innovatie IGC AmsterdamTransformatie door innovatie IGC Amsterdam
Transformatie door innovatie IGC Amsterdam
 
FinTech - Cafe Numerique
FinTech - Cafe Numerique FinTech - Cafe Numerique
FinTech - Cafe Numerique
 
Presentation n pulse-2015
Presentation n pulse-2015Presentation n pulse-2015
Presentation n pulse-2015
 
Forensics: Regional trends in anti-corruption legislation and corporate best ...
Forensics: Regional trends in anti-corruption legislation and corporate best ...Forensics: Regional trends in anti-corruption legislation and corporate best ...
Forensics: Regional trends in anti-corruption legislation and corporate best ...
 
OIES Short Overview 201509
OIES Short Overview 201509OIES Short Overview 201509
OIES Short Overview 201509
 
EBRC Trusted Partners at ICT Spring 2014
EBRC Trusted Partners at ICT Spring 2014EBRC Trusted Partners at ICT Spring 2014
EBRC Trusted Partners at ICT Spring 2014
 
IP Advantages LLC
IP Advantages LLCIP Advantages LLC
IP Advantages LLC
 
Corporate presentation + infraestructure 2013 english
Corporate presentation + infraestructure 2013 englishCorporate presentation + infraestructure 2013 english
Corporate presentation + infraestructure 2013 english
 
Digitization Strategies in Corporate Banking von Brigitte Ross
Digitization Strategies in Corporate Banking von Brigitte RossDigitization Strategies in Corporate Banking von Brigitte Ross
Digitization Strategies in Corporate Banking von Brigitte Ross
 
Beta for business & technology research & innovation 2015
Beta for business & technology research & innovation   2015Beta for business & technology research & innovation   2015
Beta for business & technology research & innovation 2015
 
Oliver James Insurance
Oliver James InsuranceOliver James Insurance
Oliver James Insurance
 

Mais de Infosecurity2010

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Infosecurity2010
 
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud - Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud - Infosecurity2010
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Infosecurity2010
 
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Infosecurity2010
 
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtRuud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrechtStefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrechtInfosecurity2010
 
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtEric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs UtrechtKoen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs UtrechtInfosecurity2010
 
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtJeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtAuke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtHelmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtPaul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtInfosecurity2010
 

Mais de Infosecurity2010 (12)

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud - Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
 
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
 
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtRuud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrechtStefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
 
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtEric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs UtrechtKoen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
 
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtJeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtAuke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtHelmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtPaul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
 

Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht

  • 1. IT ADVISORY As the IT auditors arrives …. InfoSecurity 2010 4 November 2010 ADVISORY 4 November 2010
  • 2. As the IT Auditor arrives … Understand the Purpose of the IT Audit © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 1
  • 3. Se As the IT Auditor arrives … Be aware of your own Attitude Effectiveness and Efficiency of AuditEffectiveness and Efficiency of Audit depend on behaviour Client Soft Controls Auditor Soft Controls Audit Sponsor is leading by example Involving stakeholders Soft Controls Seeking for Facts Clearly in providing Judgment Transparence, providing adequate Information Be involved with Audit C ea y p o d g Judg e t © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 2
  • 4. As the IT Auditor arrives … Consider the Auditor’s perspective First line of Defense Second line of Defense Third line of Defense • Self- assessment by operational • Management Assessment • Audit operational staff © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 3
  • 5. As the IT Auditor arrives … Be specific regarding your expected maturity of IT Cobit maturity levels © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 4
  • 6. As the IT Auditor arrives … Understand each Phase of the Audit • Scope of Objects to be assessed Risk-based • Scope of Objects to be assessed • Requirements to be applied Compliance- based • Fact finding based • Evaluation of noted Deficiencies Risk-based • Evaluation of noted Deficiencies © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 5
  • 7. As the IT Auditor arrives … Risk-based scoping – Financial Reporting AAccounts and disclosures Focus of financial audit Accou s a d d sc osu es Entities Business processes Manual controls Key controls IT-dependent Manual controls Automated controls Generic ICT infrastructure Application-specific ICT Key application controls IT management processes Focus of IT audit B © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 6 Generic ICT infrastructure Focus of IT audit
  • 8. As the IT Auditor arrives … Risk-based scoping – Assess an IT service © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 7
  • 9. As the IT Auditor arrives … Compliance-based fact-finding Be aware that the auditor evaluates also your own (Continuous) Monitoring Event event Deduction of Event Deduction of events © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 8
  • 10. As the IT Auditor arrives … Risk-based evaluation Business critical list of Risk based critical list of Applications Sensitivity (CIA) People Soft controls Risk-based Selection of controls (CIA) Selection of Controls - Soft controls Processes -Three levels of defenseMonitoring Compliance-based monitoring IT Environment Technology - Compliance monitoring - Vulnerabilities monitoring Incident detection o to g Analysis of Issues IssueTracking - Incident detection Risk-based evaluation and follow-up Follow-up (improve or accept) © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 9 9
  • 11. As the IT Auditor arrives … You can help to make it effective and efficient ! Consider how the IT Auditor can help you, to improve your IT environment RegardingRegarding People ProcesesProceses Technology © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 10
  • 12. Questions © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 111 1
  • 13. Contact details Name  Ir Peter Kornelisse RE CISAName  Ir. Peter Kornelisse RE CISA Position  Director, experienced with regard to Information Security and Technology, having performed and coordinated many advisory services, as well as compliance audits and security tests, since 1990. Peter is globally responsible for security testing services at KPMG andPeter is globally responsible for security testing services at KPMG, and mainly delivers IT audit support for Financial Audits, and Information Protection and Business Continuity services in the Netherlands. E-mail  kornelisse.peter@kpmg.nl Telephone  +31 (0)6 – 53 165 596 © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 121 2