FinTech Vol 1 I 1

Page 1

INR 70,000

FEATURES

TRENDS

OPNIONS

SURVEYS

DISCUSSIONS

LAUNCHES

New ISACA COSO Framework Guide Just Released

Enterprise Mobility is Shifting Financial Services CIOs to a New Model of IT

A new ICASA guide released indicates how the latest versions of the COSO Internal Control—Integrated Framework and COBIT relate to each other. This will help professionals who use both frameworks to create business value for enterprises in all industries and geographies. “Relating the COSO Internal Control— Integrated Framework and COBIT” looks at the updated COSO framework, which now includes a stronger emphasis on information technology, and examines the related COBIT 5 components. The paper outlines COBIT 5’s relationship to specific COSO principles and matches the relevant COBIT 5 framework content with the associated COSO framework concept. COSO’s internal control framework helps management, boards of directors and others with their duties regarding

internal control. COBIT is used by enterprises worldwide to effectively govern and manage their information and technology. Recently, COBIT was included as an informative reference in the new US Cybersecurity Framework developed by NIST. “With the updates in the last couple of years of both COBIT and the COSO framework, many enterprises have been asking if the two are still complementary,” said Steven Babb, CGEIT, CRISC, ITIL, chair of the ISACA Framework Committee. “This paper answers that question with a resounding yes, and shows exactly how the two relate. By using both together, organizations can be confident that they are following proven guidance on assessing and improving their internal control practices within an effective governance structure.”

SPOTLIGHT ON SECURITY

Some Amazing Little Companies to Watch

“If you were to find a defect in Windows 8, then that defect probably exists backwards to other Windows versions,” note McAfee’s Adam Wosotowsky. “People can look at those patches and think, ‘What were they patching? I bet this same problem exists in XP, but it’s not patched because they’re no longer patching it.’ The security of an operating system drops off a cliff when support ends.” As Microsoft prepares to cut off support for Windows XP, hackers are sharpening their knives in anticipation of carving up the operating system’s carcass. Web predators will pounce on XP 10 minutes after Microsoft pulls the support plug on the software, predicted one former military computer specialist and network engineer. Indeed, it appears that information highwaymen are stockpiling ammunition for a series of assaults on the operating system.

Companies spend millions on advertising, and most of the money they spend is largely wasted. Services like Google and Facebook have benefited because advertisers couldn’t determine where the value was. Kvantum could shift large amounts of revenue to where it could do more good - possibly away from Google and Facebook.

Financial Services are keeping up with the rapid adoption of new mobile devices and focusing on enduser productivity and convenience.A new study “The Changing Mobile Landscape in Financial Services,” mobile is presenting operational, governance, and timeto-market challenges that traditional IT approaches were not designed to address.The study surveyed over 400 IT professionals from financial services companies across all major sectors of the industry, including banking, insurance, and brokerage. According to the study, 50 % respondents expects that majority of employees will be using business email and apps on mobile devices in the next 12 months. Adoption of BYOD will also grow, with the percentage of personally owned smartphones and tablets in the organisation expected to increase from 40 percent to 49 percent in the same time period. Its also expected that use of BlackBerry in financial services will loose almost onethird of its market share over the next year with decrease to 30 percent from 44 percent. However, only 38 percent of CIOs are confident that they can address the risks posed by smartphones and tablets. This gap is not surprising, because these platforms are not always well understood by IT leadership, though this is certainly changing. New risks will emerge for mobile, but many of the traditional vectors of data loss are mitigated by the sandboxed security architectures of mobile operating systems. At the same time, more than 50 percent of respondents believe their mobile strategy is either deficient or not aligned with IT and business priorities. Although financial services organizations are rapidly expanding their mobile investments, there is a substantial disconnect between IT and the line-of-business on mobile priorities. As part of the ability to maintain an effective mobile strategy over time, respondents rank agility and preparedness for change as the most important factor in a successful mobile strategy...

Clock Counting Down on Windows XP Support

Contd...on pg 5

INR 175,000

Develop your brand value...Share your experiences on www.fspro.in - the financial services knowledge sharing portal.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.