Use Case: Internal Controls System

Alyne provides tailored Control Sets for both Internal Controls System and an Enterprise Risk Management to help organisations confidently achieve good corporate governance and to quickly assess levels of maturity.

Introduction

Good governance of an enterprise has two core tools at its disposal - an Internal Controls System (ICS) and an Enterprise Risk Management (ERM) System. Ideally these two systems are also fully integrated - creating a Plan-Do-Check-Act (PDCA) cycle for corporate governance. These requirements are not new for most enterprises, however the solutions in place may be approaching the end of their life cycles with many emerging new requirements. Many Alyne customers leverage our Software as a Service (SaaS) both for ICS and ERM use cases and we have observed some common challenges and success factors. 

Common Challenges

  • Extensive Control Framework
    Many organisations manage control frameworks with hundreds or even thousands of controls making it essentially unmanageable. Multiple iterations with many stakeholders created a framework with high redundancy on various levels of detail. This will fail both in management cost and control effectiveness.
     
  • Abstract Controls
    Taking standards, laws and regulations and generating controls based on abstract requirements often create abstract controls that do not provide sufficient guidance to the organisation.

  • Low Awareness
    Especially corporate governance related frameworks may suffer from the “ivory tower syndrome” in which only a small group of people are aware of the controls and fail to gain traction and awareness in the organisation. Broadening the audience is essential for the ICS to be effective. 

Success Factors

  • M-A-U-S Controls
    Define your controls to be Measurable (evidence can quantify effectiveness), Atomic (only defines one aspect), Understandable (written in language understood by recipients) and  Specific (defines a clear rule).

  • Targeted Control Set
    Define your set of controls to achieve a specific objective such as comply with certain standards or reduce fraud potential in process X. Be clear about the objective and do not simply add controls for completeness sake.

  • Consolidate Governance
    Especially with corporate governance it is important to gain synergies from other control frameworks such as IT governance, ISMS, data privacy, sustainability and others in order to avoid duplication of effort for the business.
ZurückWeiter
Karl Viertel

Related Posts

Tackling The Surge In Information Security Incidents

Ransomware attacks in 2021 have become more sophisticated and disruptive than they have ever been. With this increase, it is imperative for business leaders to build up comprehensive defense against information security attacks by leveraging both mandatory and voluntary standards. In this article, Alyne Senior Consultant, Maximilian Millitzer elaborates on what business leaders should do to enable a quicker response, in the event of an information security incident.
Weiterlesen

Gearing Towards Greater Cyber Security Maturity in the Automotive Sector

The automotive industry is moving full speed ahead towards the software defined car and regulations and standards such as UN R155 and ISO/SAE 21434 have made it mandatory for businesses in the automotive industry to be compliant with cyber security management. Learn about Product Security Organisation Framework (PROOF), developed by Escrypt ad KPMG in partnership with Alyne's technology, and get the details on the upcoming workshop at escar (The world's leading automotive cyber security conference).
Weiterlesen

Tightened Cyber Security Awareness Training To Combat Heightened Attempts

October is Cybersecurity Awareness Month. This 2021, Co-founder of Alyne, Stefan Sulistyo shares how Alyne goes beyond the notion of being in compliance with various security awareness requirements to strengthen our collective digital ecosystem – especially during remote working, and the recent acquisition of Alyne by Mitratech – two events which have heightened cyber and phishing attempts across the business.
Weiterlesen