Risk
management is a major component of IT Governance set to protect against fraud,
bribery and corruption. Due to the increasing use of IT in all organisations, IT
Governance must continuously evolve to manage the increasing need for higher
risk management (Pasquini & Galie, 2013) . Accurate IT
governance should have the ability to identify, monitor and report on the level
at which IT risks are managed along with how much they need to be managed (von Solms, 2005) .
HR managers
can implement fraud prevention strategies such as top-down control and trust-building
practices into their organisation, however these strategies do not address
every aspect of fraud, like opportunity (Niehoff & Paul, 2000) . HR managers along
with the use of IT Governance can effectively implement controls within an
organisation to prevent fraud.COBIT 5 provides
guidance through enablers to contribute to the overall governance and
management of risk. Processes identify and support the function and management
of risks while information flows and organisational structures are required to
control and manage the risk (ISACA, 2013) .
HR managers can implement fraud prevention strategies such as top-down control and trust-building practices into their organisation, however these strategies do not address every aspect of fraud, like opportunity
Figure 1: COBIT 5 Enablers |
A real-world example of using COBIT 5 for risk management occurred in the US. A regional grocery chain was experiencing rapid growth, therefore distributed products out to stores through a warehouse which also contained head offices and IT resources. They identified an IT organisational risk and choose to use COBIT 5 due to its clear and concise framework for identifying, controlling and managing risk. COBIT 5 is trusted by their IT professionals in the strategy, security and risk areas
References
ISACA. (2013). Cobit 5 for risk. Retrieved from ISACA: http://www.isaca.org/COBIT/Documents/COBIT-5-for-Risk-Preview_res_eng_0913.pdfISACA. (2013). COBIT Case Study: Risk Assessment Management Using COBIT 5. Retrieved from ISACA: http://www.isaca.org/Knowledge-Center/cobit/Pages/COBIT-Case-Study-Risk-Assessment-Management-Using-COBIT-5.aspx
Niehoff, B. P., & Paul, R. J. (2000). Causes of employee theft and strategies that HR managers can use for prevention. John Wiley & Sons, Inc,.
Pasquini, A., & Galiè, E. (2013). COBIT 5 and the Process Capability Model. Improvements Provided for IT Governance Process. In Proceedings of FIKUSZ’13 Symposium for Young Researchers (pp. 67-76).
von Solms, S. B. (2005). Information Security Governance–compliance management vs operational management. Computers & Security, 24(6), 443-447.
Comments
Post a Comment