Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
32 results found in 10 ms Page 1 of 4
Coordinated Audit on Information Technology Governance
IT governance needs awareness and SAIs' support The OLACEFS auditors found that the greatest challenge for the SAIs is to raise the awareness of the audit institutions about the importance of IT governance and the benefits that could be obtained by improving its degree of maturity. The audit was conducted by 11 SAIs and coordinated by TCU of Brasil. They concluded: 'It is important, even urgent, to invest resources to implement or enhance: the IT committees; the IT planning process; strategic IT planning; monitoring the IT contracting process; the business continuity plan; the designation of a responsible person or unit to manage security information; a risk management process; an asset inventory process; an information security committee; and a policy for access control.'
Full description
Latin American andCaribbean Organization of Supreme Audit Institutions , issued in 2015
Risk cases: 5
WannaCry Cyber Attack and the NHS
Why the British NHS became a victim of WannaCry The NAO's investigation points at the problem of insufficient powers of the cybersecurity coordinator across the health organisation. As a result no remedial actions were taken, and the cyber attack succeeded thanks to neglected precautions.
Full description
National Audit Office , issued in 2017
Risk cases: 3
Does the state administration effectively use the stored information?
State administration could use the accumulated information more effectively Latvian auditors found that government institutions have a good cooperation in the area of data use, but there are still several areas wherein a person still has to perform the function of a 'courier'. Many channels of data exchange and distribution used in state administration create a fragmented and complicated environment for maintenance of ICT, while responsible ministry does not become actively involved and does not coordinate cooperation of institutions.
Full description
State Audit Office of the Republic of Latvia , issued in 2017
Risk cases: 4
Open Data Trend Report 2015
How to activate the open data policy The Dutch SAI looks for ways to improve open data practice in the Netherlands. They point at experience of two leading countries: UK and US, and advise to: prepare a concrete action plan, to increase number of mandatory published data, to develop government-wide data inventory and to put open data to work.
Full description
Netherlands Court of Audits , issued in 2015
Risk cases: 4
Public access point to the Polish e-Administration
Coordinated audit series (46 auditees) focused on a web solution applied to give an easy access to Government e-services (the project planned to be completed in 2013) The audit was performed in 2008 ... and public report issued in March 2009. Primary goal of th presentation was intended to illustrate the use of 'e-Government Algorithm' elaborated by EUROSAI IT Working Group in 2005. One of issues mede better ... known by the audit was 'Project Frameworks vs Public Procurement'. ... ... Buyer, provider and methodologies need a balance ... Presentation based on a vast audit by Polish SAI which subject was of big network project aiming to provide one access point to Government and Selfgovernments services. The presentation illustrates ... old EUROSAI IT Wg 'Algorithm approach' and focuses on procurement systemic problems.
Full description
Supreme Audit Office of Poland , issued in 2008
Risk cases: 3
Digitisation of municipal services
The purpose of digitisation is to increase the quality and efficiency of public services. It is a goal to make online services the norm for public administration's communication with citizens ... and the private sector. The municipal sector is a significant provider of public services, and digitisation of municipal services is therefore essential for achieving this goal.<br/>The audit surveyed the status ... , assessed the significance of and possible obstacles to digitisation of municipal services. The audit examined how the Ministry of Local Government and Modernisation's use of policy instruments contributes ... ... Municipalities have not digitised their services to any extent ... , that municipalities need a substantial support to execute this demanding task. To provide them with help, the central government has to coordinate own efforts first. ... Digitisation increases the quality and efficiency of public services and municipal sector is a significant provider of public services. Report of Riksrevisjonen of Norway shows however
Full description
Office of the Auditor General of Norway , issued in 2016
Risk cases: 2
Report to the Public AccountsCommittee on mitigation of cyber attacks
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark , issued in 2013
Risk cases: 3
Cyber Attacks: Securing Agencies’ICT Systems
of sensitive personal information. Unauthorised access through electronic means, also known as cyber intrusions, can result from the actions of outside individuals or organisations. Individuals operating from ... Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
Open Government Data - Are all exceptions to the principle of cost-free access and reuse legitimate?
secretariat for government modernisation (Secrétariat General pour la Modernisation de l'Action Publique - SGMAP), in conjunction with the Minister with responsibility for the budget, to "assess the business ... The United Kingdom, a country seen, like the United States, as a pioneer in open public data, has estimated at £6.8bn (€7,9bn) the revenue in 2010 and 2011 generated for British society by open ... public data, of which £5bn (€5.8bn) is profit. As an example, a start-up has highlighted the existence of areas in which massive savings can be made by analysing prescriptions of patented drugs ... ... Open data strategy should decide the costs problem ... French Cour des comptes presents analysis on implementation of the open data practice across the administration. Massive savings are expected, when public access to large amounts of highquality data ... is made easy. France is among the pioneers and countries making the most rapid progress in this domain. Charges for the reuse of the public information has been identified as the main problem.
Full description
Cour des comptes , issued in 2013
Risk cases: 1
Has Public Administration Used All Opportunities for Efficient Management of ICT Infrastructure?
Efficient Management of ICT Infrastructure Centralised management of ICT services and infrastructure would allow the institutions to optimise in long run their resources – financial, human, material and technical. However, we observed during the audit that the move towards ICT centralisation and single data centres has ceased. The different ministries and even the institutions subordinated to the same ministry do not cooperate sufficiently with each other regarding the ICT management, maintenance, and infrastructure placement. They rather choose to maintain their own, sometimes even several, data centres.
Full description
State Audit Office of the Republic of Latvia , issued in 2019
Risk cases: 3
32 results found. Page 1 of 4 next