/
Pressure Cooker:  Access Controls in New and Existing ERP Systems Pressure Cooker:  Access Controls in New and Existing ERP Systems

Pressure Cooker: Access Controls in New and Existing ERP Systems - PowerPoint Presentation

widengillette
widengillette . @widengillette
Follow
343 views
Uploaded On 2020-06-24

Pressure Cooker: Access Controls in New and Existing ERP Systems - PPT Presentation

Overview Introduction A story of contrasts Motivations Lifecycle Stage Time Motivations UA Classification of Financial Audit Findings Control deficiency control does not prevent or detect misstatements on a timely basis ID: 786193

lifecycle control access pcc control lifecycle pcc access stage motivations information security timeline controls deficiencies arizona combination significant approach

Share:

Link:

Embed:

Download Presentation from below link

Download The PPT/PDF document "Pressure Cooker: Access Controls in New..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Pressure Cooker:

Access Controls in New and Existing ERP Systems

Slide2

Overview

Introduction: A story of contrasts

Motivations

Lifecycle Stage

Time

Slide3

Motivations (UA)

Classification of Financial Audit Findings

:

Control deficiency:

control does not prevent or detect misstatements on a timely basis.

Significant Deficiency:

one or a

combination

of control deficiencies. Written finding. Report to federal agencies.

Material Weakness:

one or a combination o

f significant deficiencies, resulting in more than a remote likelihood of misstatement of financials. Serious concern to Regents.

Slide4

Motivation (UA)

Slide5

Motivations (PCC)

Banner

implemented in 1999

Variety of high risk issues

Two pronged approach:

Long term planning

Security culture

Slide6

Lifecycle (UA)

Slide7

Lifecycle stage (UA)

Slide8

Auditor Access and Data (UA)

Slide9

Access Control (UA)

Slide10

Change Control (UA)

Slide11

Change Control (UA)

Slide12

Lifecycle Stage (PCC)

Slide13

Lifecycle Stage (PCC)

Slide14

Timeline (UA)

Slide15

Timeline (UA)

Slide16

Timeline (UA) - what worked

Focus preparation on major controls

Pre-validation of control processes

Prepare documentation in advance for auditor

Ensure a team approach

Know where and how to get information

Share out knowledge quickly to teams to begin improvements

Develop rapport with auditors

Be helpful, timely, check in on needs

Keep them in scope while providing access

Learn the standards they use to measure controls

Represent best of what UA is doing and keep a good perspective

Slide17

Time (PCC)

Slide18

Conclusion

Cathy Bates

Univ. Information Security Off.

University of Arizona

cbates@email.arizona.edu

520-626-2399

Brian Basgen

Information Security Officer

Pima Community College

bbasgen@pima.edu

520-206-4873