135
results found in
12 ms
Page 9
of 14
Audit on the current management and supervision of information protection and cyber security in the financial sector
- Evaluation of management and supervision of information protection and cyber security in the financial sector - Evaluation of current state of security management system in the financial sector ... - Based on a sample of 10 public institutions and 9 financial institutions. ... Information Protection and cyber security in the financial sector ... SAI Korea reviewed 10 public and nine financial institutions. Their analysis shows how the lack of evaluation at management level can result in decrease of stakeholders' confidence or even ... in economic damage.
Full description
- Evaluation of management and supervision of information protection and cyber security in the financial sector - Evaluation of current state of security management system in the financial sector ... - Based on a sample of 10 public institutions and 9 financial institutions. ... Information Protection and cyber security in the financial sector ... SAI Korea reviewed 10 public and nine financial institutions. Their analysis shows how the lack of evaluation at management level can result in decrease of stakeholders' confidence or even ... in economic damage.
Full description
Board of Audit and Inspection of Korea
, issued in 2011
Risk cases: 2
VA ACQUISITION MANAGEMENT: Supply Chain Management and COVID-19 Response
Pandemic points up weaknesses of procurement solutions US Department of Veterans Affairs acquires hundreds of millions of dollars-worth of medical supplies each year. The Medical-Surgical Prime Vendor-Next Generation (MSPV-NG) is one of its key initiatives to modrnize its processes. GAO auditor pointed in their previous audits that the approach lacked an effective medical supply procurement strategy, clinician involvement, and reliable data systems. In time of the pandemic, the problem seems even more difficult to deal with.
Full description
Pandemic points up weaknesses of procurement solutions US Department of Veterans Affairs acquires hundreds of millions of dollars-worth of medical supplies each year. The Medical-Surgical Prime Vendor-Next Generation (MSPV-NG) is one of its key initiatives to modrnize its processes. GAO auditor pointed in their previous audits that the approach lacked an effective medical supply procurement strategy, clinician involvement, and reliable data systems. In time of the pandemic, the problem seems even more difficult to deal with.
Full description
US Government Accountability Office
, issued in 2019
Risk cases: 4
Opportunities Exist for SEC to Improve Its Controls over Financial Systems and Data
The SEC is responsible for enforcing securities laws, issuing rules and regulations that provide protection for investors, and helping to ensure that the securities markets are fair and honest ... . In carrying out its mission, the SEC relies on computerized information systems to collect, process, and store sensitive information, including financial data. Having effective information security controls ... in place is essential to protecting these systems and the information they contain. <br/> This report details weaknesses GAO identified in the information security program at SEC during its audit ... IT security basics under scrutiny ... Financial audit by US GAO was accompanied by an IT examination focused on information security measures in the Securities and Exchange Commission (SEC). GAO found that SEC’s systems could ... be compromised, because of risks jeopardizing the confidentiality, integrity, and availability of sensitive financial information.
Full description
The SEC is responsible for enforcing securities laws, issuing rules and regulations that provide protection for investors, and helping to ensure that the securities markets are fair and honest ... . In carrying out its mission, the SEC relies on computerized information systems to collect, process, and store sensitive information, including financial data. Having effective information security controls ... in place is essential to protecting these systems and the information they contain. <br/> This report details weaknesses GAO identified in the information security program at SEC during its audit ... IT security basics under scrutiny ... Financial audit by US GAO was accompanied by an IT examination focused on information security measures in the Securities and Exchange Commission (SEC). GAO found that SEC’s systems could ... be compromised, because of risks jeopardizing the confidentiality, integrity, and availability of sensitive financial information.
Full description
General Accountability Office
, issued in 2016
Risk cases: 5
Cyber Attacks: Securing Agencies’ICT Systems
Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office
, issued in 2014
Risk cases: 3
Cyber security of border controls operated by Dutch border guards at Amsterdam Schiphol Airport
Airport prepares for cyber attacks Who does not know the Amsterdam Airport? As put by the Netherlands Court of Audits: the IT systems used for border controls at the Schiphol Airport are in the midst of a process of rapid development. The auditors reviewed the process and pointed at necessity of formal certification and better mechanism of information analysis. The report picutres also the organisation of the controls - must read for all frequent fliers
Full description
Airport prepares for cyber attacks Who does not know the Amsterdam Airport? As put by the Netherlands Court of Audits: the IT systems used for border controls at the Schiphol Airport are in the midst of a process of rapid development. The auditors reviewed the process and pointed at necessity of formal certification and better mechanism of information analysis. The report picutres also the organisation of the controls - must read for all frequent fliers
Full description
Netherlands Court of Audits
, issued in 2020
Risk cases: 8
RURAL BROADBAND DEPLOYMENT: Improved Consistency with Leading Practices Could Enhance Management of Loan and Grant Programs
Green Book can help in broadband development US GAO applied its COSO based Green Book to review consistency of support programs for rural information infrastructure.
Full description
Green Book can help in broadband development US GAO applied its COSO based Green Book to review consistency of support programs for rural information infrastructure.
Full description
US Government Accountability Office
, issued in 2017
Risk cases: 7
Whether Disclosure of the Public Sector Data Is Ensured
Strategy more important than declarations Why open data are so dificult to become reality? Lithuania possesses the elements required to disclose data but lacks a strategic approach. The report by SAI Lithuania reviews all critical elements of this problem. Most of them look like a pattern reproduced by other countries. And one important thing: the SAI Lithuania opened their own data - exactly on the day of publication of the audit report!
Full description
Strategy more important than declarations Why open data are so dificult to become reality? Lithuania possesses the elements required to disclose data but lacks a strategic approach. The report by SAI Lithuania reviews all critical elements of this problem. Most of them look like a pattern reproduced by other countries. And one important thing: the SAI Lithuania opened their own data - exactly on the day of publication of the audit report!
Full description
National Audit Office of the Republic of Lithuania
, issued in 2016
Risk cases: 9
General and Creation Control of the Information Systems of the Ministry of Foreign Affairs
The objective of the audit was to assess general and creation control of the information systems of the Ministry of Foreign Affairs. Since the beginning of 2009, the Ministry of Foreign Affairs has ... achieved considerable progress in the management of the information systems. The auditors reviewed and assessed all key elements of the process. ... Overview of problems - area by area ... SAI Lithuania looked into all critical elements of a Ministry's information system, starting from IT architecture, through information security to automation of data processing.
Full description
The objective of the audit was to assess general and creation control of the information systems of the Ministry of Foreign Affairs. Since the beginning of 2009, the Ministry of Foreign Affairs has ... achieved considerable progress in the management of the information systems. The auditors reviewed and assessed all key elements of the process. ... Overview of problems - area by area ... SAI Lithuania looked into all critical elements of a Ministry's information system, starting from IT architecture, through information security to automation of data processing.
Full description
National Audit Office of the Republic of Lithuania
, issued in 2013
Risk cases: 4
Correlations between the operational risks of companies in the majority ownership of local governments and the financial situation of the local governments
Risks related to local governments-owned companies The Hungarian SAI analysed four risk areas, taking 19 aspects and the specificities of Hungary’s settlement patterns into consideration. The four areas defined were the following: performance of public tasks, exercise of proprietary rights, financial stability of local governments, and short and medium-term stability of the financial management of companies.
Full description
Risks related to local governments-owned companies The Hungarian SAI analysed four risk areas, taking 19 aspects and the specificities of Hungary’s settlement patterns into consideration. The four areas defined were the following: performance of public tasks, exercise of proprietary rights, financial stability of local governments, and short and medium-term stability of the financial management of companies.
Full description
State Audit Office of Hungary
, issued in 2017
Risk cases: 1
Immigrant students and the effectiveness of basic education
Data analysis in education SAI Finland performed independent analysis to find out real situation regarding immigrant students' education. They found that despite more positive attitude than in case of native students, the immigrants' performance and education outcomes need more support.
Full description
Data analysis in education SAI Finland performed independent analysis to find out real situation regarding immigrant students' education. They found that despite more positive attitude than in case of native students, the immigrants' performance and education outcomes need more support.
Full description
National Audit Office of Finland
, issued in 2015
Risk cases: 3