29
CRISC CGEIT CISM CISA 2013 Fall Conference – “Sail to Success” Best Prac:ces on Managing Risks of Outsourced Services Janis Parthun, Director, McGladrey, LLP Governance, Risk & Compliance – G33

BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

CRISC CGEIT CISM CISA 2013  Fall  Conference  –  “Sail  to  Success”  

Best  Prac:ces  on  Managing  Risks  of  Outsourced  Services  

Janis  Parthun,  Director,  McGladrey,  LLP  Governance,  Risk  &  Compliance  –  G33  

Page 2: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Introduc:on  

•  McGladrey  LLP  –  San  Francisco,  CA  •  Risk  Advisory  Services  –  3rd  Party/  Service  Organiza:on  Repor:ng  SME  

–  2013  COSO  Framework  SME  –  IT  Risk  Assessment,  COBIT  5  SME  

•  Prior  to  joining  McGladrey  LLP  –   Division  lead  for  Informa:on  Management  and  Technology  Assurance  (IMTA)  services  at  AICPA  

–   Consul:ng  Manager  for  Grant  Thornton  LLP  

2  

Janis  Parthun  CPA,  CISA  Phone:  415-­‐848-­‐5318  [email protected]  

Page 3: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Agenda  and  Objec:ves  

•  Types  of  outsourcing  •  Benefits  of  outsourcing  •  Risk  of  outsourcing  •  Due  diligence  and  commitment  considera:ons  •  Monitoring  performance  and  compliance  •  Example  scenario  

3  

Page 4: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Ques:ons  for  the  Audience  

•  Does  your  company  or  your  department  currently  rely  on  a  service  provider  to  perform  one  of  your  business  func:ons?  

•  Is  this  a  significant  or  relevant  func:on  for  your  company  or  department?  

4  

Page 5: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

10/10/15   5  

CRISC CGEIT CISM CISA 2013  Fall  Conference  –  “Sail  to  Success”  

TYPES  OF  OUTSOURCING  SERVICES  

5  

Page 6: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Outsourcing  Service  Examples  

•  Procurement  or  payment  func:on  •  Other  finance  func:ons  •  Payroll  func:on  •  HR  (pension  &  benefits)  func:on  •  IT  infrastructure  support  •  Document  management    •  Specialized/  advisory  services    – such  as  legal  or  accoun:ng/  tax  advice  

6  

Page 7: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Cloud  Compu:ng  Services  

7  

Type   Descrip8on*  

Sogware  as  a  Service  (SaaS)  

To  u:lize  the  service  provider’s  applica:ons  running  on  a  cloud  infrastructure  

Plaiorm  as  a  Service  (PaaS)  

To  deploy  onto  the  cloud  infrastructure  consumer-­‐created  or  acquired  applica:ons  created  using  programming  languages  and  tools  supported  by  the  service  provider  

Infrastructure  as  a  Service  (IaaS)  

To  provision  processing,  storage,  networks,  and  other  fundamental  compu:ng  resources  where  the  consumer  is  able  to  deploy  and  run  arbitrary  sogware  

*  Source:  Na,onal  Ins,tute  of  Standards  and  Technology  (NIST)  h:p://csrc.nist.gov/publica,ons/draAs/800-­‐145/DraA-­‐SP-­‐800-­‐145_cloud-­‐defini,on.pdf    

Page 8: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Outsourcing  Service  Example  

8  

Retail  Company  U

Financial  Reportin

gRe

venu

e  Generation

Inventory  Managem

ent

Point-­‐Of-­‐Sale  (POS)  System

Online  Sales  Application  B

Check  Clearing  System

Credit  Card  Processing  System

Retail  Sales  Audit  System

ERP  system  (GL,  AR,  AP)

Payment  Management  System  A

Bank  1

Bank  2

Merchandising  System

Purchasing  System

Distribution  Management  

System

Illustra:on  of  a  retail  clothing  company  leveraging  outsourcing  services    

Page 9: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

10/10/15   9  

CRISC CGEIT CISM CISA 2013  Fall  Conference  –  “Sail  to  Success”  

BENEFITS  OF  OUTSOURCING  BUSINESS  FUNCTIONS  

9  

Page 10: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Market  Indicators  to  Outsource    

•  Pressure  to  improve  opera:onal  costs  •  Leverage  experts  specialized  in  the  outsourced  service  offering  

•  Poten:al  availability  of  more  sophis:cated  resources  (such  as  the  latest  hardware  or  sogware)  

•  Availability  of  a  virtual  workforce  •  Meet  short  term  demands  or  needs  •  Lack  of  resources  to  support  a  process  or  func:on  

10  

Page 11: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Benefits  to  Outsourcing  

11  

1.  Speed  2.  Efficiency  3.  Cost  savings  

•  Reasons  for  this  economy  of  scale:  •  Provider  has  on-­‐demand  and  scalable  technology  •  Provider  leverages  advances  in  technology  specifically  

for  the  func:on  &  skilled  resources/  exper:se  •  Provider  may  support  more  complex  and  changing  

business  opera:ons  and  may  be  cost  prohibi:ve  for  management  as  an  internal  investment  

Page 12: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

10/10/15   12  

CRISC CGEIT CISM CISA 2013  Fall  Conference  –  “Sail  to  Success”  

RISK  OF  OUTSOURCING  BUSINESS  FUNCTIONS  

12  

Page 13: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Breaches  Related  to  Service  Providers  

13  

Company   The  Breach   Reference  U.S.  Department  Of  Veterans  Affairs  

Personal  informa:on  for  ~  76  million  veterans  were  possibly  compromised  when  a  defec:ve  hard  drive  was  sent  for  repair  and  recycling  to  a  vendor  with  unencrypted  data  

hpp://abcnews.go.com/Technology/Media/10-­‐top-­‐data-­‐breaches-­‐decade/story?id=10905634&page=2    

Epsilon    (Email  Marke:ng    Provider)  

Intruders  accessed  one  of  its  email  servers  and  obtained  names  and  email  accounts  of  some  of  its  2,500  corporate  customers  

hpp://www.computerworld.com/s/ar:cle/9215527/FAQ_Epsilon_email_breach    

Amazon  Web  Services  (Provider)  

Mul:-­‐day  service  outage  slowed/  shut  down  a  large  number  of  prominent  Internet  businesses  

hpp://www.informa:onweek.com/news/cloud-­‐compu:ng/infrastructure/229402520        

Target   Source  of  the  Target  major  intrusion  apack  traces  back  to  network  creden:als  that  Target  had  issued  to  Fazio  Mechanical  (hea:ng  &  air  condi:oning  vendor)    Target  had  also  relied  on  its  data  security  monitoring  services  to  Trustwave  (service  provider)  at  the  :me    

hpp://krebsonsecurity.com/2014/02/email-­‐apack-­‐on-­‐vendor-­‐set-­‐up-­‐breach-­‐at-­‐target/      hpp://www.infoworld.com/d/security/security-­‐vendor-­‐trustwave-­‐named-­‐in-­‐target-­‐data-­‐breach-­‐suit-­‐239119    

Page 14: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Outsourcing  Risks  to  Consider  

14  

Risks:  

1.  Handling  and  processing  of  data    

2.  Security  and  access  3.  Availability  of  system  4.  Reten:on  of  data  5.  Other  possible  factors  

specific  to  your  business  

Page 15: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

User  Concerns  Associated  With    Outsourcing  Services  

•  When  users/  customers  of  a  service  provider’s  services  outsource  certain  tasks  and  func:ons,  many  of  the  risks  of  the  service  provider  become  risks  of  the  users/  customers.    

•  Due  diligence  is  necessary  in  order  to  manage  the  risks  and  address  any  stakeholder  concerns  

15  

Page 16: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

10/10/15   16  

CRISC CGEIT CISM CISA 2013  Fall  Conference  –  “Sail  to  Success”  

DUE  DILIGENCE  AND  COMMITMENT  CONSIDERATIONS  

16  

Page 17: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Monitoring  Performance  and  Compliance  of  Service  Providers  

•  Evaluate  knowledge  and  competencies  of  service  provider  

•  Consider  regulatory  and  opera:onal  compliance  obliga:ons  of  service  provider  

•  Posi:ve  financial  history  

17  

Page 18: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Commitment  Considera:ons  

•  Return  on  investment  (ROI)  for  leveraging  a  service  provider    

•  Service  offering  address  the  business  or  func:onal  needs  of  your  organiza:on    

18  

Page 19: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Commitment  Considera:ons  

•  Adequate  requirements  within  the  Service  Level  Agreement  (SLA)  or  contract    –  clear  and  concise  contractual  terms  –  include  standard  of  conduct  –  flexibility  within  the  agreement  –  problem  resolu:on  support  /  escala:on  procedures  

•  Designated  point  of  contact  within  the  organiza:on  to  be  accountable  for  the  service  provider  

19  

Page 20: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

10/10/15   20  

CRISC CGEIT CISM CISA 2013  Fall  Conference  –  “Sail  to  Success”  

MONITORING  PERFORMANCE  AND  COMPLIANCE  OF  SERVICE  PROVIDERS  

20  

Page 21: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Monitoring  Performance  

•  Establish  periodic  monitoring  procedures  against  expecta:ons  or  requirements    – Extent  may  depend  on  the  risk  associated  – Monitor  services  stated  in  a  service  level  agreement  (SLA)  -­‐  such  as  reliability,  performance  and  support  

21  

Page 22: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Obtain  an  Independent  Assessment  How  can  you  trust  and  have  confidence  in  the  3rd  party  rela:onships  you  form  or  contract?  

1.  Monitor  through  obtaining  an  independent  assessment  over  the  service  provider’s  internal  controls  

2.  Apesta:on  reports  provide  details  to  user  management  and  with  the  informa:on  they  need  about  the  service  organiza:on’s  controls  to  help  assess  and  address  the  risks  associated  with  the  outsourced  service  

3.  Mul:ple  op:ons  to  consider  and  request  for  

22  

Page 23: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

3rd  Party  Repor:ng  Op:ons  

23  

SOC  1  Report   SOC  2  Report   SOC  3  Report  

Purpose   Reports  on  controls  for  F/S  audits  

Reports  on  controls  related  to  compliance  or  opera:ons  

Reports  on  controls  related  to  compliance  or  opera:ons  

Objec:ve   Processes  with  F/S  impact  

Trust  Services  Principles  &  Criteria  

Standard   SSAE16  –  Service  Auditor  Guidance  

AT  101   AT  101    

Use   Restricted  use  report   Generally  a  restricted  use  report  

General  use  report    (with  a  public  seal)  

Extent  of  Report  

Type  I  Report  –  Test  of  control  design,  or        (as  of  a  specific  date)  Type  II  Report  –  Test  of  Opera:ng  effec:veness          (throughout  a  specified  period)  

Service  Organiza:on  Control  Repor:ng:  

Page 24: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

Trust  Services  Principles  &  Criteria  Security  •  The  system  is  protected  against  

unauthorized  access  (both  physical  and  logical).    

Availability    •  The  system  is  available  for  

opera:on  and  use  as  commiped  or  agreed.    

Processing  integrity  •  System  processing  is  complete,  

accurate,  :mely  and  authorized.    

Confiden8ality    •  Informa:on  designated  as  

confiden:al  is  protected  as  commiped  or  agreed.    

Privacy    •  Personal  informa:on  is  collected,  

used,  retained,  disclosed  and  disposed  of  in  conformity  with  the  commitments  in  the  en:ty’s  privacy  no:ce,  and  with  criteria  set  forth  in  Generally  Accepted  Privacy  Principles  (GAPP)  issued  by  the  AICPA  and  Canadian  Ins:tute  of  Chartered  Accountants.    

24  

Page 25: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

10/10/15   25  

CRISC CGEIT CISM CISA 2013  Fall  Conference  –  “Sail  to  Success”  

EXAMPLE  SCENARIO  

25  

Page 26: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Retail  Company  U  

26  

•  Company  U  (user)  is  a  retail  clothing  company  with  retail  stores  all  over  the  country.    The  company  leverages  a  service  provider  to  allow  on-­‐line  purchasing  for  customers.    Inventory  is  purchased  from  various  vendors,  and  a  warehouse  is  available  to  receive  and  ship  the  inventory.    Accoun:ng  is  performed  using  an  in-­‐house  system,  but  the  company  leverages  a  service  provider  to  manage  vendor  payments.    

Page 27: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Outsourcing  Service  Example  

27  

Retail  Company  U

Financial  Reportin

gRe

venu

e  Generation

Inventory  Managem

ent

Point-­‐Of-­‐Sale  (POS)  System

Online  Sales  Application  B

Check  Clearing  System

Credit  Card  Processing  System

Retail  Sales  Audit  System

ERP  system  (GL,  AR,  AP)

Payment  Management  System  A

Bank  1

Bank  2

Merchandising  System

Purchasing  System

Distribution  Management  

System

Illustra:on  of  a  retail  clothing  company  leveraging  outsourcing  services    

Page 28: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

2015  Fall  Conference  –  “CyberSizeIT”  November  9  –  11,  2015  

 

Resources  

1.  COSO:  2013  Internal  Control–Integrated  Framework  –  www.coso.org      

2.  AICPA  Brochure:    Service  Organiza:on  Controls  –  Managing  Risks  by  Obtaining  a  Service  Auditor’s  Report  –  www.aicpa.org/SOC      

28  

Page 29: BestPrac:ces%on%Managing%Risks%of% …CRISC CGEIT CISM 2013%Fall%Conference%–“Sail%to%Success”% CISA BestPrac:ces%on%Managing%Risks%of% Outsourced%Services% Janis%Parthun,%Director,%McGladrey,%LLP

10/10/15   29  

CRISC CGEIT CISM CISA 2013  Fall  Conference  –  “Sail  to  Success”  

THANK  YOU!  

29