Gan Subramaniam, CISA, CISM, CCNA, CCSA, CIA, CISSP, ISO 27001 LA, SSCP
We invite you to send your information systems audit, control and security questions to:
HelpSource Q&AISACA Journal3701 Algonquin Road, Suite 1010Rolling Meadows, IL 60008 USAEmail: email@example.com
My employer recently bought one of our competitors, and integration between the two entities is occurring now. One of the key challenges is that the two entities use completely different and incompatible IT systems. Our audit team has been assigned the task of auditing the integration project and reporting to the leadership on the effectiveness of the approach used for integration. The business objective is to combine the positives from both systems into one. One of the major drivers behind the purchase was that the IT systems of the competitor were far superior to ours and were providing them an edge in terms of customer service delivery.
Can you help me with a quick checklist that I can use for my work?
Whenever an acquisition happens, the target organisation feels vulnerable in terms of continued use of its systems and processes. There is a lot of cultural integration that needs to take place. Setting aside all those issues, let us try to develop a checklist that you may use to audit the IT systems integration project. As always, please note that this list is indicative only, and not exhaustive:
Once this list is available, the rest of the work is relatively simple, though not easy. (Simple and easy may sound synonymous, but, in reality, they are not!) The next steps are:
Gan Subramaniam, CISA, CISM, CCNA, CCSA, CIA, CISSP, ISO 27001 LA, SSCPis the global IT security lead for a management consulting, technology services and outsourcing company’s global delivery network. Previously, he served as head of IT security group compliance and monitoring at a Big Four professional services firm. With more than 16 years of experience in IT development, IS audit and information security, Subramaniam’s previous work includes heading the information security and risk functions at a top UK-based business process owner (BPO). His previous employers include Ernst & Young, UK; Thomas Cook (India); and Hindustan Petroleum Corp., India. As an international conference speaker, he has chaired and spoken at a number of conferences around the world.
Enjoying this article? To read the most current ISACA Journal articles, become a member or subscribe to the Journal.
The ISACA Journal is published by ISACA. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscription to the ISACA Journal.
Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance Institute® and their committees, and from opinions endorsed by authors’ employers, or the editors of this Journal. ISACA Journal does not attest to the originality of authors’ content.
© 2011 ISACA. All rights reserved.
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, MA 01970, to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited.