![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB1lq0XIJOEN3lfSqg65NcaU9bqYTU5szpQNLYrGX8bp9hR2_qGTQV7ckrwwFYiF45ymzk6aAEUaoNXWrcQmELxeSGHM_BPN8Ge_8OX5LrL3NRWwbTVAE2TRIKIUnddtV3y2XOQxb3rw/s1600/risk.jpg)
COBIT
5 addresses ‘risk’ by providing specific guidelines for the effective
management of:
- Risk Management Process(es)
- Risk Scenarios
- How COBIT 5 enablers can be used to respond to unacceptable risk scenarios (Akkeren, 2015)
By
enabling a holistic approach in fraud risk assessments, it becomes essential for
businesses to understand information security as a set of related components
and not as an individual system because the system alone cannot deliver reliable
risk assessments (Harmer, 2014).
Today
many companies still face countless forms of fraud. I recently heard on the
news about the ASX-listed K&S Corporation involved in another corporate fraud scandal for the misappropriation of $7.1 million of funds. This surprised
me, as they did not learn their lesson after the first incident where
K&S has not properly applied
fraud risk assessments or considered addressing COBIT 5 for possible scenarios.
Organisations,
such as K&S, can minimise fraud by:
- Risk mitigation – implementing a number of IT controls
- Risk assessment procedures – steps for risk management, responding to scenarios
- Internal/External controls and reporting –fraud becomes trickier to conceal
- Segregation of duties – implementing two+ employees checking and signing off financial documents
- Staff education and awareness – adequate training provided for all staff about potential risk/fraud (see video below) (Crime and Misconduct Commission, 2005, p. 6 – 10).
References:
Akkeren, J. V.
(2015). AYB115 Governance Issues and Fraud: IT Governance and Management
Responsibility [Lecture Notes]. Retrieved from https://blackboard.qut.edu.au/webapps/blackboard/content/listContent.jsp?course_id=_116816_1&content_id=_5376704_1&mode=reset
Crime and
Misconduct Commission. (2005). Fraud and Corruption Control: Guidelines for
best practice, 1(1), 5 – 16.
Crime Bulletin.
(2009). Organised fraud in Queensland: A strategic assessment. Crime Bulletin Series, 10(1), 1 – 3.
Harmer, G. (2014).
Governance of Enterprise IT Based on
COBIT 5: A Management Guide (1st ed.). IT Governance Publishing.
Retrieved from http://www.ccc.qld.gov.au/research-and-publications/publications/prevention/fraud-and-corruption/fraud-and-corruption-control-guidelines-for-best-practice-1.pdf/download
No comments:
Post a Comment