The Top 7 IT Project Risk Management Pitfalls

Risk management is the heart and soul of project management and failing to practice it in the right manner can have fatal consequences on IT projects – whether it is a CRM roll-out, business intelligence or even a nation-wide integration project. Proper risk planning can save the entire investment and increase the likelihood of project…

بتاريخ    الكاتب   في الأبواب  .

What Auditors Need to Know About Business Continuity

Business Continuity Management (BCM) is defined according to ISO 22301(2) as: “A holistic management process that identifies potential threats to an organization and the impacts to business operations that those threats, if realized, might cause, and which provides a framework for building organizational resilience with the capability for an effective response that safeguards the interests…

بتاريخ    الكاتب   في الأبواب  .

Conversations with Colleagues: Tariq Ajmal & Fadi Sidani

The Enterprise Risk Services Leader and the Information & Technology Risk Services Leader for Deloitte in the Middle East explain how technology is changing the face of the internal audit profession. In an exclusive interview, Internal Auditor – Middle East spoke to Fadi Sidani and Tariq Ajmal from Deloitte’s Enterprise Risk Services practice in the Middle East. Fadi is the Partner-In-Charge of Enterprise Risk Services…

بتاريخ    الكاتب   في الأبواب  .

A Primer on IT Governance

The risks of information technology (IT) are well known (or so they should be) to executive management, the board and internal auditors. These risks range from information security threats to the risk of investing in the wrong Enterprise Resource planning (ERP) solution, to the cost & time impact of not making proper requirement definitions and…

بتاريخ    الكاتب   في الأبواب  .

Governance, Risk and Compliance Technology

Improving risk management and financial performance by leveraging GRC technology The Need for GRC Economic volatility, shareholder demands and an increasingly competitive market landscape are forcing organizations to rethink their approach to governance and risk management. More and more, companies are realizing that the ability to manage risk has a very real impact on their…

بتاريخ    الكاتب   في الأبواب  .

BYOD Implementation Roadmap

Management and auditors need to ensure their organizations have a well-considered roadmap in place for connecting personal devices to corporate networks and data. While most individuals have two or more mobile devices they use daily (e.g. smart-phones, tablets, laptops), many organizations are grappling with the Bring-Your-Own-Device (BYOD) phenomenon. Technology advances mean individuals now often have…

بتاريخ    الكاتب   في الأبواب  .

Information Technology Strategy

While applications, infrastructure and general controls are commonly audited, a major area that is somewhat neglected is IT strategy The main ingredient of a successful organization is to have a clear and documented vision and strategy whereby every department and employee believes in that vision and drives towards achieving its goals and objectives. Every department…

بتاريخ    الكاتب   في الأبواب  .
Intelligence Driven Security

Intelligence-driven Security

Using big data analytics to power information security gives business environments the ability to find a “needle in a haystack” As IT evolves and becomes more advanced, the methods employed to carry out cyber attacks follow suit. This brings a significant change in the profile of cyber security risks. As such, organisations need to change the way they assess, prevent,…

بتاريخ    الكاتب   في الأبواب  .