Technology Audit
Jon Coughlin
About PNC/Numbers
Who am I
PNC Tools
Toss Up
CISA Prep
CIO Organization
100

Used to determine scope coverage

What is the scope calculator?

100

When Jon is thirsty, this is his beverage of choice

What is coffee?

100

15222



What is the zip code for the Headquarters in Pennsylvania?

100

This person is on a billboard for Phil’s Inn in Port Clinton 

Who is Molly Carte?

100

This is PNC's enterprise identity management system that automatically manages users' access privileges.

What is OIM.

100

This policy exists to set guidance and expectations around PNC's processes for managing the risks of significant disruptive events to business activities

What is the Enterprise Business Continuity Policy?

100

This is the name for the concept of having more than one person required within a process to complete a task in order to limit the likelihood of fraud and error

What is Segregation of duties / Separation of duties?

100

These individuals provide front line risk management function and report to the CIO of the LOB.

Who are the Performance Managers?

200

What does ISACA stand for? 

What is Information Systems Audit and Control Association

200

Jon’s gardening skills are limited to production of this type of vegetable that makes a great condiment and can be used on almost all types of food

What are hot peppers?

200

40 states

What is the number of states employees are located in?

200

This person has traveled to 9 different countries

Who is Sam Conley? 

200

This application houses the inherent risk assessment for applications.

What is the Archer Risk Assessment Module?

200

This term describes the level of  risk intrinsic to the business before considering the effects of controls.

What is Inherent Risk?

200

This framework, created by ISACA for IT management and governance, is the de factor standard within the industry for knowledge on technology risks and controls.

What is COBIT (Control Objectives for Information and Related Technologies)?

200

This person is responsible for the technical aspect of the application such as databases, server, process IDs, etc.

Who is an ASM?

300

Number of Technology Audit Teams at PNC

What is 6?


  • Project

  • CAATS/DA

  • Application

  • Security/Infrastructure

  • Fraud/Physical

  • Issues

300

This is the technology that Jon worked on during his first job post-college and is considered to be his favorite.

What is the mainframe?

300

Name 3 of the 5 ILead Standards

What is:

Includes Intentionally

Develops the Best

Lives the Values

Enables Change

Achieves Results

300

These individuals have ran a marathon.

Who is Beth Kane and Jon Coughlin

300

Application that holds contractor information (e.g. “XX-“ IDs) and replaces the former CIDB (Contractor Information Database).

What is Beeline

300

This law requires financial institutions to explain how they share and protect their customers' private information and is the primarily driver of many of PNC's security control programs related to protection of Personally Identifiable Information.

What is the Gramm-Leach-Bliley Act (GLBA)?

300

This term describes the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

What is social engineering?

300

This person hails from Sri Lanka, joined PNC in 2017, and filled the role formerly held by Sherry Ducarme.

Who is Charaka Kithulegoda? Also accepted: Who is the Retail CIO?

 

400

This meeting is used to discuss scope and audit findings with the AGAs, SAMs and Technology Directors.

What is the Strategic Planning Meeting?

400

In December Jon added two of this type of pet to his family.

What are kittens?  (Named – Boomerang and Keyser Soze)

400

380 billion

What is the number of assets?

400

I am a 2008 Dormont Community Day Hot Dog Eating Champion

Who is Jason Wiltfeuer?

400

This is source code repository and version management tool.  

What is GIT?

400

This term describes the possibility that an auditor's conclusion based on a sample is different from that reached if the entire population were subject to audit procedure.  This can be avoided by testing 100% of a population.

What is Sampling risk?

400

This is the security concept for limiting access rights for users to the bare minimum permissions they need to perform their work

What is the principal of least privilege?

400

This portion of the MIS organization is dedicated to ensuring the stability of the application and its supporting infrastructure by proactively managing technology resources and reactively responding to incidents by restoring technology capabilities to support business requirements.  

What is Run the Bank?

500

This Audit Engagement focuses on the Sterling File Gateway System, MQSeries, NDM, Control Center System, Ster and EFX.

What is the Data Transmission Audit?

500

Jon's favorite punctuation - This punctuation, also commonly referred to as the serial comma, is used when connecting a series of three or more terms. 

What is the oxford comma?

500

9000

What is the number of ATM's PNC has

500

This person has had an arrest warrant out on him/her for failing to appear for a court date’

Who is Tony Chin?

500

The intermediary application takes source code and builds it into lower level environments (e.g. test, QA).  It also archives old build artifacts.  

What is Jenkins?

500

This term describes an attitude that includes a questioning mind, being alert to conditions which may indicate possible misstatement due to error or fraud, and a critical assessment of audit evidence. This mindset is a core capability in the most effective auditors.

What is Professional Skeptisim?

500

A full backup occurs when a complete archive is made of every file. Alternatively, this term is used to describe the type of data backup procedure performed with only changes to files are captured within the backup process.

What are differential backups?

500

These are the 5 MIS CIOs reporting to Steve Van Wyk

Who is Monty Bedi, Christine Johns, Ganesh Krishnan, Matt White and Charaka Kithulegoda  

600

Number of people on the Application Audit team with certifications.  

Per Archer - What is 10 (Jason, Jon, Jordana, Akash, Kali, Michelle, Molly, Mark, Ben, Beth)

M
e
n
u