Download - Live Process Audit Monitoring

Transcript
Page 1: Live Process Audit Monitoring

Downstream Systems Impacted

UNAUDITED ANOMALOUS

EVENTS

HISTORICAL INFORMATION PROCESSING

SECURITY PROCESSES

SYMANTEC

RIVERBED

CISCO

MICROSOFT

Cybersecurity

Risk/Fraud/AML

Loss of Public Infrastructure

Loss of Defence

Virus Infection

DATA PROCESSING

INFORMATION CAPTURE

Quality Assurance

Packaging

Accounting

Mail Room

Manufacturing

Digitization

Systems

0110000111011

NETWORK/MIDDLEWARE

TRANSPORT/INTEGRATION BUS

Live Process Audit Decision-Zone Inc.

CORPORATE BUSINESS PROCESS DOCUMENTED MAPS

NETWORK/MIDDLEWARE LIVE AUDITED NORMALEVENT

LIVE AUDITED

ANOMALOUSEVENT

TRANSPORT/INTEGRATION BUS

LIVE UNAUDITED

EVENT

LIVE AUDITED

EVENT

Downstream Systems Protected

LIVE INFORMATION PROCESSING

LIVE SECURITY PROCESSES

Protection Against Cybersecurity

Threats

Protection Against Risk/Fraud/AML

Threats

Infrastructure Protected

Defense Protected

Protection Against Virus Infection

Threats

LIVE PROTECTION

INFORMATION CAPTURE

Quality Assurance

Packaging

Accounting

Mail Room

Manufacturing

Digitization

Systems

0110000111011

SYMANTEC

RIVERBED

CISCO

MICROSOFT

Page 2: Live Process Audit Monitoring

INFORMATICS MANAGEMENT MODEL

ACTIVITIESJOB ROLES

Accounting Mail Room Manufacturing

BUSINESS PROCESSES

BUSINESS PROCESSES ARE END TO END INSTRUCTIONS DEFINED IN WORKFLOW DIAGRAMS, PROCESS MAPS, STATE CHARTS, FLOWCHARTS OR OTHER DOCUMENTS ON HOW A SET OF INDEPENDENT ACTIVITIES MUST PERFORM THEIR JOBS IN TERMS OF THE CONDITIONS, TIME & SEQUENCES FOR BUILDING A WIDGET.

INDEPENDENT ACTIVITIES

PROCESS AUTOMATION

Accounting

Mail RoomAUTOMATED DATA ENTRY

ACTIVITY

PROCESS AUTOMATION IS AN APPLICATION THAT COMBINIES TWO OR MORE ACTIVITIES TO GENERATE A SINGLE AUTOMATED ACTIVITY

SECURITY PROCESS

SECURITY PROCESSES ARE APPLICATIONS THAT AUTOMATE THE DEFINED PROCESSES AND RULES FOR THE ENFORCEMENT OF ACTIVITIES WITHIN THE BUSINESS PROCESS.

PROCESS AUDIT

PROCESS AUDIT APPLICATIONS VALIDATE EACH INDEPENDANT ACTIVITY LIVE USING THE BUSINESS PROCESS DOCUMENT INSTRUCTIONS. INVALID ACTIVITIES CAN TRIGGER SECURITY PROCESSES APPLICATIONS TO ENFORCE THE INVALID ACTIVITY LIVE