• About us
  • GRC-ERM Software
  • Applications
    • Enterprise Risk Management
    • Business Continuity Planning
    • Regulatory Compliance Management
    • Cybersecurity Risk Management
    • Risk-Based Auditing 
    • Third-Party Risk Management
    • Environmental Social and corporate Governance 
    • Information Security Management
    • Strategic Planning Management
  • FAQ
  • Insights
    • Blogs
    • Podcasts
    • Webinars
    • White papers
  • Contact us
z horse
  • About us
  • GRC-ERM Software

      Governance

      Balanced Scorecard

      Plan Management

      RSP Management

      Management Indicators

      Risk

      Risk Management

      Asset Management

      Business Impact Analysis

      Cybersecurity

      Event Management

      Incident Management 

      Compliance

      Assesments 

      Findings

      Audits

  • Applications
    • Enterprise Risk Management
    • Business Continuity Planning
    • Regulatory Compliance Management
    • Cybersecurity Risk Management
    • Risk-Based Auditing 
    • Third-Party Risk Management
    • Environmental Social and corporate Governance 
    • Information Security Management
    • Strategic Planning Management
  • FAQ
  • Insights
    • Blogs
    • Podcasts
    • Webinars
    • White papers
  • Contact us

REQUEST A DEMO
z horse
  • About us
  • GRC-ERM Software

      Governance

      Balanced Scorecard

      Plan Management

      RSP Management

      Management Indicators

      Risk

      Risk Management

      Asset Management

      Business Impact Analysis

      Cybersecurity

      Event Management

      Incident Management 

      Compliance

      Assesments 

      Findings

      Audits

  • Applications
    • Enterprise Risk Management
    • Business Continuity Planning
    • Regulatory Compliance Management
    • Cybersecurity Risk Management
    • Risk-Based Auditing 
    • Third-Party Risk Management
    • Environmental Social and corporate Governance 
    • Information Security Management
    • Strategic Planning Management
  • FAQ
  • Insights
    • Blogs
    • Podcasts
    • Webinars
    • White papers
  • Contact us

REQUEST A DEMO
Risk Management

The Most Ignored Technology Risk

By Daniel Clark 

In conversations regarding risk, particularly technology risk, there has long been one risk ignored by all of us. Recently, bank regulators have been taking a hard look at this risk. In fact, one large bank received criticism and financial fines because of poorly managing this risk. So what do we call this risk that is common, prevalent in some companies and pretty much ignored by everyone? End User Computing Risk!

End User Computing Risk (EUC) is often defined as a system in which users are able to create and rely on work applications created outside of risk management oversight. In other words, risk exists in all organizations that use spreadsheets or databases that are not reviewed or managed by risk management departments.

While regulators in financial services will continue to highlight weaknesses when found this is not a risk that management needs to wait on external oversight to address. The risks are easy to understand and recognize and steps can be taken now to address those risks.

EUC RISK

The risks associated with EUC’s include:

  • Competing spreadsheets: departments often create their “own” spreadsheets that may compete with other departments for exposure and recognition.
  • Linkage errors: this occurs when spreadsheets or databases are linked to other like information spreadsheets that later can be used for board reporting or strategic decision-making.
  • Errors: mistakes within the spreadsheet itself whether in the assumptions, the formulas or the cells themselves. Worse, data itself may have errors because of integrity or accuracy concerns.
  • Version control processes may be weak or non-existent
  • Lack of documentation or audit trail making it impossible to determine how some formulas are designed and where data originates
  • It may seem to be a difficult task to address or establish the right controls with so many risks associated with EUC’s. That is not the case. Recent technical developments have resulted in state of the art technology that can help recognize and manage EUC risk. In addition to technology, management can implement the following to jump start EUC risk management:
  • Understand the EUC population! Completing a comprehensive inventory of spreadsheets, databases and desktop application used throughout the organization does this.
  • Risk rank the EUC inventory. Make sure to identify critical EUC’s and establish the proper oversight based on risk ranking.
  • Draft, approve and implement a comprehensive EUC policy.
  • Map out the impact of EUC’s in your organization so that management is aware of process and other risk linkages that are impacted by EUC’s.
  • Detail all critical EUC’s and ensure controls and commensurate with the risk associated with these EUC’s.

There is no reason for any financial services company to risk censure and fines because of EUC’s. For all those companies in other market segments, this is a great opportunity to learn from financial services and address these risks before they negatively impact your business.


How to assess the value of a GRC Tool
Previous Article
cybersecurity threats
The Emerging Role of the CISO
Next Article

z horse

Contact Us
[email protected]

(800) 519-9078

New Jersey

116 Village Boulevard, Suite 200
Princeton, NJ 08540
(800) 519-9078

  • Home
  • About us
  • Blog
  • Contact us
Youtube Twitter Linkedin
Copyright 2021 by Z-Horse
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT