Auditing Agile in Agile Time Presentation - Handout Slides
Auditing Agile in Agile Time Presentation - Handout Slides
19 December 2017
WELCOME
• Audio is streamed over your computer Use the Papers tab to find the following:
• Dial in numbers and codes are on the left • PDF Copy of today’s presentation
1
12/19/2017
TODAY’S SPEAKER
AGENDA
WRAP UP
2
12/19/2017
3
12/19/2017
AGILE FOUNDATION
Agile was codified in 2001 with the Agile Manifesto, which is a set of
values for managing software development that include: individuals and
interactions over processes and tools, working software over
comprehensive documentation, customer collaboration over contract
negotiation, and responding to change over following a plan. 2
AGILE FOUNDATION
• Which specifies that Agile and adaptive approaches for linking people,
projects, and value.
4
12/19/2017
AGILE FOUNDATION
• Agile assumes that resources and time are fixed and scope is variable;
therefore it is value driven.
10
5
12/19/2017
AGILE METHODOLOGIES
• Scrum is the most widely used so that is the best example for COBIT5.
11
AGILE METHODOLOGIES
• The team gathers daily for a stand up meeting (15 min meeting) where
they answer three questions: what have you done yesterday, what will
you do today, and do you have any obstacles.
12
6
12/19/2017
AGILE METHODOLOGIES
13
AGILE METHODOLOGIES
• Burn down charts, task boards, planning boards and storyboards are
among the possibilities.
14
7
12/19/2017
AGILE METHODOLOGIES
• Agile teams are optimally sized with seven plus or minus two team
members.
15
AGILE TEAMS
• ScrumMasters are servant leaders that help remove daily obstacles.
• They own the vision of the product and represent the customer’s
interests.
16
8
12/19/2017
17
COMMON BARRIERS
• Common barriers to Agile adoption are culture, for example the ability
to change, resistance to change, and management support.7
• Agile approaches can help by obtaining user feedback faster but they
can still miss important requirements.
18
9
12/19/2017
19
20
10
12/19/2017
• This will provide ample time to validate the audit purpose with the
audit committee and stakeholders.
• Write an audit plan based on a risk control matrix and the dedicated
test plans.
21
• Plan to participate in the meetings as they are key information drivers regarding the
effectiveness of the program.
• Sprint Review has two parts: the demo when the developers show the work done to
the customers, end-users and management, and the Stakeholders Inspect-and-Adapt
process when you got the Sprint outcome approval and functional changes add-ons.
• Retrospective meeting gives you an overview on how the team is self-managed, how
people are engaged, lessons learned or process improvements.
22
11
12/19/2017
23
24
12
12/19/2017
• It represents risk in the form of potential rework, since there may still be
changes to items until those items have been accepted.
25
26
13
12/19/2017
27
• Specifically , during the Daily Scrum, through the Scrum Board, at Sprint
Planning meetings for scope, functional and business risks, at
Retrospectives for Process, Capacity, Non-Functional and Security Risks,
at Sprint Planning where risk supports Product Backlog prioritization.
• The Scrum Team (Scrum Master, Product Owner, Developers) are all
accountable.
28
14
12/19/2017
29
• Sprint validation is done by the Product Owner before Sprint Review only
at Scrum Team level.
30
15
12/19/2017
31
32
16
12/19/2017
33
• The ScrumMaster checks incidents to be sure they are in line with the
Scrum process.
34
17
12/19/2017
35
36
18
12/19/2017
IN CONCLUSION
The use of the COBIT5 framework in the audit process will help to identify risks and
ensure that key items in the process have the proper control and are not missed.
37
Questions?
38
19
12/19/2017
THIS TRAINING CONTENT (“CONTENT”) IS PROVIDED TO YOU WITHOUT WARRANTY, “AS IS” AND “WITH ALL
FAULTS.” ISACA MAKES NO REPRESENTATIONS OR WARRANTIES EXPRESS OR IMPLIED, INCLUDING
THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR PERFORMANCE, AND NON-
INFRINGEMENT, ALL OF WHICH ARE HEREBY EXPRESSLY DISCLAIMED.
YOU ASSUME THE ENTIRE RISK FOR USE OF THE CONTENT AND ACKNOWLEDGE THAT: ISACA HAS
DESIGNED THE CONTENT PRIMARILY AS AN EDUCATIONAL RESOURCE FOR IT PROFESSIONALS AND
THEREFORE THE CONTENT SHOULD NOT BE DEEMED EITHER TO SET FORTH ALL APPROPRIATE
PROCEDURES, TESTS, OR CONTROLS OR TO SUGGEST THAT OTHER PROCEDURES, TESTS, OR
CONTROLS THAT ARE NOT INCLUDED MAY NOT BE APPROPRIATE; ISACA DOES NOT CLAIM THAT USE OF
THE CONTENT WILL ASSURE A SUCCESSFUL OUTCOME AND YOU ARE RESPONSIBLE FOR APPLYING
PROFESSIONAL JUDGMENT TO THE SPECIFIC CIRCUMSTANCES PRESENTED TO DETERMINING THE
APPROPRIATE PROCEDURES, TESTS, OR CONTROLS.
Copyright © 2017 by the Information Systems Audit and Control Association, Inc. (ISACA). All rights reserved. This
webinar may not be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system, or
transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise).
39
THANK YOU
FOR ATTENDING THIS
WEBINAR
20