TECHNOLOGY RISK SERVICE OFFERING

Technology Service Offerings

Approach and Methodology

Our systems and technology audit process is consistent with our overall audit approach in that it uses
a top-down process that starts with understanding of key Management controls and identifying critical
risk areas. Most systems and technology audit procedures take place in the following areas based on
the needs of the engagement team

Critical Applications

  • IT DRP Controls
  • IT Strategy Planning
  • IT Steering Committee
  • Policies and Procedures
  • SDLC & Change Management
  • Access Controls
  • Backup and Contingency Planning

Technical Infrastructure

  • Problem & Incident Management
  • Operating System Controls
  • Database Security Controls
  • Data Centre Physical Controls
  • Data Centre Environmental Controls
  • IT Org Chant

System & Process Changes

  • Security Controls (e.g. Password, Auditing)
  • Data Encryption

Business Continuity Management

Holistic management process that identifies potential threats to an organization and the impacts to business operations those threats, if realized, might cause, and which provides a framework for building organizational resilience with the capability of an effective response that safeguards the interests of its key stakeholders, reputation, brand and value-creating activities.