Perimeter
1/18/2013
02:35 PM
Connect Directly
RSS
E-Mail
50%
50%

Acing An Audit In 30 Minutes

Compliance audits don't have to be chaotic events

I asked a client in the insurance business about its recent audit. The president of the company told me that, once again, the audit went fine. Actually, it went better than fine. As usual, it aced the audit. Zero deficiencies, zero issues, zero problems. The auditors said it was the most organized office and easiest file review they had ever seen.

That was impressive, but the best part was yet to come. "How long did it take to prepare for the audit?" I asked. She said her staff spent about 30 minutes preparing for the auditors. Then she added that 15 minutes of that time was making sure the conference room and restrooms were tidy.

Yes, you read that right. Their audit prep time was half an hour.

Want to know how they do this every time? There's no real secret. This company's staff is focused on processes that properly support all necessary business tasks every day.

Security, compliance, documentation, and financial accountability are all built into its processes, not added on later. When there is a new problem that is not addressed with its processes, it doesn't simply address the problem; it learns from it and adjust its processes accordingly.

If a member of the staff encounters a new problem without a process to address it, then the employee brings it to management so a method can be developed to detect and/or address the problem next time.

The company's president told me new employees are either able to adapt to its problem-solving process and high-quality mind set, or they don't make it. In her words, "It's not personal; the process really works out who makes it here."

The president also realized early in the life of the business that a key to supporting processes was the appropriate technology. Instead of using off-the-shelf software, she invested in building custom software that matched her vision of compliant and efficient processes.

Was custom software expensive? Not over time. In fact, the company can now offer significantly more services than its competitors with half of the number of employees. Because the company's software was built with the end in mind, the technology makes audits a breeze, with all necessary data immediately available.

Unlike many organizations, this company never has to really do anything to get ready for an audit. The planning on appropriate and necessary processes, plus the professional discipline to follow the processes, makes them ready for an audit every day.

For this company, audits are not the test of completion and accuracy. It holds itself to that standard every day, through processes and culture. It is a system any organization can build and maintain. All it takes is forethought, adaptability, and discipline.

Glenn S. Phillips loves the company president he just wrote about. He is the president of Forte' Incorporated where he works with business leaders who want to leverage technology and understand the often hidden risks within. Glenn is the author of the book Nerd-to-English and you can find him on twitter at @NerdToEnglish. Glenn works with business leaders who want to leverage technology and understand the often hidden risks awaiting them. The Founder and Sr. Consultant of Forte' Incorporated, Glenn and his team work with business leaders to support growth, increase profits, and address ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2413
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.

CVE-2012-5244
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Banana Dance B.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) return, (2) display, (3) table, or (4) search parameter to functions/suggest.php; (5) the id parameter to functions/widgets.php, (6) the category parameter to...

CVE-2012-5694
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allow remote attackers to execute arbitrary SQL commands via the (1) agentPhNo, (2) controlPhNo, (3) agentURLPath, (4) agentControlKey, or (5) platformDD1 parameter to frameworkgui/attach2Agents.p...

CVE-2012-5695
Published: 2014-10-20
Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS m...

CVE-2012-5696
Published: 2014-10-20
Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 does not properly restrict access to frameworkgui/config, which allows remote attackers to obtain the plaintext database password via a direct request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.