The exponential speed of change in technology has caused disruption across many industries; and impacted entire corporate systems including production, management, and governance. This fast pace of change will bring many benefits, but it will also present many known and unknown risks. If managed well, they have the potential to give rise to innovation that will drive economic growth and social impact. If not handled appropriately, such as the rising threat of cyber attacks, they could derail these benefits. Businesses that embrace these developments, anticipate challenges, and deal with them in a strategic way are more likely to prosper, while those that do not will more likely fall behind and into non-existence.

At the core of today's highly connected global economy, the high velocity of information technology change requires organizations to know how to strategically leverage technology. However, it is incumbent upon management to have the proper response in the form of controls to combat the ever-changing risks presented by these technological advancements. Our guidance and expertise as an IT auditor and subject matter expert support you to achieve these control objectives.

 

GRC Design & Implementation

Robust GRC platforms that facilitate vital GRC strategies require well-planned and executed implementations. However, the process of implementing innovative GRC platforms in an integrated and synchronized manner is sometimes mismanaged or poorly aligned with your business objectives - leading to pain points that can be crippling to the success of your project. Some businesses are just starting out and looking to move away from manual, spreadsheet-based approaches to more sophisticated automated solutions, others have gone down the software road already, but have not had the success they hoped for. Either way, the project can seem daunting, but the business's need to achieve time to value is real.

 

Information Technology Audit

Today very few companies are able to attract, hire and retain the internal audit resources they require on a full-time basis. As a result, it is virtually impossible for many organizations to fully execute their risk-based audit plans on a year-to-year basis. We have significant experience and proven solutions to help organizations perform a myriad of information technology (IT) audits and assessments.  We supply the knowledge and utilize the best  "tools of the trade" to automate and execute internal audit plans in an efficient manner at a reduced cost.

 

 

Application Controls Consulting

Our professionals follow a proven methodology for application control audits based on the Institute of Internal Auditors (IIA) Global Technology Audit Guide (GTAG). Following such guidance provides additional assurance that the required application controls are configured correctly and will perform consistently as intended by management. In addition, we document logical security and general controls with an auditor's perspective and experience. The following services are a sample of the ERP application control audits we perform on a regular basis.

  • User access Segregation of Duties / User Access Security Auditing (Application, OS, and Database)
  • Automated (Configurable) Application Controls Consulting and Testing.
  • ERP Application Security and Control Design/Optimization – identify risks, identify indicators of control inefficiency, over-reliance on manual controls, and design and deploy a control optimization strategy with management and IT.
  • "Pre and Post" application implementation System Development Lifecycle Consulting and Audits.

 

Information Technology Risk Assessments

IT risk assessments are one of the most vital elements of the Enterprise Risk Management (ERM) process of any organization of any size. Through risk identification and documentation, an organization can better determine the extent of potential losses and the likelihood they will occur based on management’s tolerance of risk and risk response in the form of controls. Our experienced, credentialed IT consultants and auditors have engaged in a significant number of IT risk assessments by utilizing a blend of interviews, surveys, and other techniques to determine the areas with the highest IT risks.

 

 

Business Continuity and Disaster Recovery

Compu-Netics works hand-in-hand with and supports your organization in the development, implementation, maintenance, and testing of Business Continuity Plans (BCP) and Disaster Recovery (DR) Plans. These services include such components as risk assessments, business impact analysis (BIA), plan development and documentation, tabletop testing exercises, quarterly or annual full testing, and results assessments.

 

 

Federal Financial Institutions Examination Council (FFIEC)

The FFIEC requires banking and non-traditional lender regulatory bodies (OCC, FDIC, NCUA, FRB, and CFPB) periodic audits of the information technology (IT) control environment in order to ensure these regulated organizations adhere to the appropriate set of FFIEC guidelines. IT controls should be well designed and operating effectively. Compu-Netics has significant experience in performing these IT audits and assessments, particularly with community banks. Typically, IT audits will cover the following:

  • Information Technology General Computer Controls
  • eBanking
  • Information Security Program Development and Assessment
  • GLBA Program Development and Assessments
  • Vendor Management Program Development and Assessments
  • Internal Network Security Reviews
  • External Network Security Reviews
  • Social Engineering
  • Information Technology (IT) Risk Assessments
Print | Sitemap
IT Compliance Services by Compu-Netics, LLC - All Rights Reserved © 2006-2022