IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit - - PowerPoint PPT Presentation

it vendor due diligence
SMART_READER_LITE
LIVE PREVIEW

IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit - - PowerPoint PPT Presentation

IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system in the nation Largest healthcare


slide-1
SLIDE 1

IT Vendor Due Diligence

Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

slide-2
SLIDE 2

Carolinas HealthCare System (CHS)

  • Second largest not-for-profit healthcare system in the nation
  • Largest healthcare system in the Southeast
  • 40 hospitals, 11 nursing homes and over 900 outpatient

service locations

  • Over 2,300 employed physicians and nearly 400 residents;

More than 40,000 FTEs

  • Net operating revenue: $7.8 billion
  • AA-rated since 1983
slide-3
SLIDE 3

CHS Audit Services

Chief Audit Executive Reports to Chief Legal Counsel IT Audit Financial & Operational Audit Charlotte-area Hospitals Corporate Operations Regional NC, SC, GA Hospitals and Health Systems Physician Practices Joint Ventures Enterprise-wide 14 Computing Environments 1 Director 4 Auditors 1 Director 1 Manager 6 Auditors 1 Director 1 Manager 5 Auditors 2 Construction Auditors 1 Director 5 Auditors

slide-4
SLIDE 4

Agenda

  • Learning Objectives
  • Background on Healthcare Technology Regulation
  • Vendor Management Lifecycle
  • Due Diligence as a Focus Area
  • Risks and Control Objectives
  • Audit and Assessment Techniques
  • Connections to IT Investment Management & Cloud Computing
  • Questions
slide-5
SLIDE 5

Learning Objectives

  • Understand the key control objectives in the vendor due

diligence process and how they fit into the larger vendor management lifecycle.

  • Discuss initial questions that will help determine audit

strategy.

  • Explore the connection between vendor management

and IT investment management.

  • Touch on the importance of vendor due diligence

related to cloud computing strategy.

slide-6
SLIDE 6

In 2001, only 18% of providers have adopted EMRs

Healthcare Technology Regulation

HIPAA Privacy Rule compliance deadline HIPAA Security Rule compliance deadline OIG begins auditing CMS enforcement

  • f Security

Rule HITECH Act requires adoption of EMRs and includes Breach Notification Requirements Office for Civil Rights slow to start next phase of HIPAA Security compliance audits

2003 2005

Electronic Medical Record systems have been in existence for 30 years Late 1990’s HIPAA Legislation Drafted

2014

6

2009 2008

Healthcare begins to be plagued by breaches Concern over credit card breaches increases awareness of PCI requirements In 2013, 78% of providers have adopted EMRs

slide-7
SLIDE 7

Vendor Management Definitions

Vendor Management: The strategic process that is dedicated to management

  • f

vendor relationships so that value creation is maximized and risk to the enterprise is minimized.

~ISACA

Vendor Management Due Diligence: Third-party vendor due diligence is a process used to make an informed business decision concerning the selection of the appropriate vendor. Due diligence is the gathering and analysis of detailed information about possible vendors. As with all business decisions, there are some risks that cannot be eliminated but can be managed. The purpose of due diligence is to help choose the best third-party vendor relationship given the risks and abilities or services available, and then to negotiate, contract, implement, and monitor to mitigate any residual risks.

~ CUNA Due Diligence Task Force

slide-8
SLIDE 8

Vendor Management Lifecycle

slide-9
SLIDE 9

Strategy Questions

  • Do business line leaders know how to engage with IT to

ask for what they need?

  • Is IT strategy and business strategy aligned?
  • Does your organization maintain a record of the

vendors with which it does business?

  • Are all IT services and solutions procured through a

centralized process?

  • Does your organization have an established Project

Management Office?

  • Are processes for engaging with vendors documented?
  • Is there a separate process for evaluating IT vendor

companies prior to evaluating the solutions or services

  • ffered?
slide-10
SLIDE 10

Scope Selection

slide-11
SLIDE 11

Risks and Control Objectives

Risks Due Diligence Step Control Objectives Participants

Purchase IT services or solutions that do not meet the needs of the

  • rganization

Pay too much for services or solutions; Process does not comply with policies related to vendor diversity, value analysis, etc. Select vendors with reputation, financial, security, design, capacity

  • r service problems

Enter a contractual relationship with a vendor without having reasonable assurance that requirements will be met

Needs Assessment Request for Proposals Vendor Analysis Review and Approval

  • Need for a solution is

identified

  • Business requirements

are defined

  • Regulatory & Info

Security requirements are defined

  • Approvals to move

ahead with identifying a solution are obtained

  • Opportunity to bid is

presented to multiple vendors

  • Information is gathered

from vendors and analyzed

  • Best vendors are

accepted to move to the next step on the due diligence process

  • Risk assessment

(strategic, reputational,

  • perational, financial,

compliance…) is performed

  • Financial analysis is

performed

  • Capability to meet

business requirements is evaluated

  • Vendor selection is

made by authorized participants

  • Selection is reviewed

and approved by authorized leaders or committees

Selected Vendor Solution Moves to Implementation Phase

Business Unit Information Services IT Security IT Committees (approvals) Business Unit Information Services IT Security IT Committees (establish expectations for RFP) Business Unit Information Services IT Security IT Committees (verification) Business Unit Information Services IT Security IT Committees (approval)

slide-12
SLIDE 12

Testing Approach – Needs Assessment

  • Obtain access to the minutes from the prior 12

months of IT Steering Committee meetings

  • Select a sample of Business Line Leaders who

have presented projects for review

  • Interview the Leaders to understand the process

that they followed

  • Review project documentation to determine if

needs assessment was conducted

  • Interview IT personnel assigned to the project to

understand the process that they followed

  • Determine if regulatory and information security

requirements were defined and addressed

  • Look for documented approvals
slide-13
SLIDE 13

Testing Approach – Request for Proposals

  • Review project documentation to determine if the
  • pportunity to bid was presented to multiple

vendors

  • Interview IT personnel assigned to the project to

determine what information was requested from vendors in the Request for Proposals (RFP)

  • Determine if regulatory and information security

requirements were addressed in the RFP document

  • Review project documentation to see which

vendors responded to the RFP, examine the responses, and look for a comparative analysis of the responses

  • Look for documented justification for the vendors

accepted to move to the next step

slide-14
SLIDE 14

Testing Approach – Vendor Analysis

  • Find out if there is a security committee,

architectural review committee, and/or other

  • versight group(s) with responsibility for reviewing

vendor information prior to final selection

  • Review project documentation to determine if

vendor risk assessment was conducted

  • Determine if a financial analysis (business case)

was completed

  • Interview IT personnel to understand how they

were involved in making the determination that the vendor would be able to meet identified needs

slide-15
SLIDE 15

Testing Approach – Review and Approval

  • Interview the Business Line Leaders to understand

the process that they followed to make the final vendor selection

  • Review project documentation to determine if the

selection was reviewed and approved by authorized leaders or committees

slide-16
SLIDE 16

Results

  • Identified need for comprehensive, documented process

– All parties involved followed a process, but it differed from one project team to the next – None of the Business Line Leaders were familiar with the process – Documentation was inconsistent, project names shifted from start to finish, IT personnel handed projects off from phase to phase – IT personnel did not assert subject matter leadership to guide Business Line Leaders to make selections inclusive of IT strategy as well as business strategy

  • Found a loophole in a fundamental organizational policy

– If responsibility for all IT vendor relationships and IT solution management resides with IT, make sure the policy states it explicitly

slide-17
SLIDE 17

IT Investment Management Overview

IT-enabled investments will:

  • Be managed as a portfolio of investments
  • Include the full scope of activities required to achieve business value
  • Be managed through their full economic life cycle

Value delivery practices will:

  • Recognize there are different categories of investments that will be

evaluated and managed differently

  • Define and monitor key metrics and respond quickly to any changes
  • r deviations
  • Engage all stakeholders and assign appropriate accountability for

the delivery of capabilities and the realization of business benefits

  • Be continually monitored, evaluated and improved

~ISACA Val IT Guidance

slide-18
SLIDE 18

Cloud Computing Strategy

  • Cloud computing means that the computer hardware and software

we use is provided for us as a service by another company and is accessed over the Internet, rather than sitting on our desktops or somewhere inside our network.

  • The term "moving to the cloud" refers to an organization moving

away from a traditional capital expenditure model (buy dedicated hardware and depreciate it over a period of time) to an operating expense model (use a shared cloud infrastructure and pay as we use it). Strong vendor due diligence practices are critical to protecting the

  • rganization’s interests in this type of arrangement.
slide-19
SLIDE 19

Questions & Discussion

Jennifer.McGill@carolinashealthcare.org 704-512-5895