SlideShare a Scribd company logo
1 of 1
Download to read offline
1ISACA JOURNAL Volume 5, 2015©2015 ISACA. All rights reserved. www.isaca.org
Former US President John F. Kennedy said, “The
Chinese use two brush strokes to write the word
‘crisis.’ One brush stroke stands for danger;
the other for opportunity. In a crisis, be aware
of the danger, but recognize the opportunity.”
Businesses recognize that they need to take
advantage of opportunities to keep growing.
And while risk is inevitable, some risk is too
great a danger when compared to its associated
opportunity, especially for small and midsized
enterprises (SMEs) that need to take a more
pragmatic approach to ensure they stay afloat in
today’s business environment. The risk associated
with the IT environment and applications is
particularly difficult to communicate
to the business as many of the related
concepts are not well understood
by those outside of the technology
realm. How can security professionals
evaluate the magnitude of risk and
communicate it appropriately to
businesses so that they can factor this
into their decision making?
IT Auditing and Application
Controls for Small and Mid-sized
Enterprises: Revenue, Expenditure,
Inventory, Payroll, and More offers
a practical approach to identify the
risk associated with the SME IT
environment and the likely applications and
controls deployed in an SME. The book is written
to help financial statement auditors understand
this risk, which can also help IT auditors
understand the appropriate language to use to
communicate risk appropriately to the business
so that it is understood.
The book is thorough and covers specific
operational and financial statement risk to different
cycles (e.g., revenue, expenditure, inventory,
payroll) to help explain cycle risk, controls and
the related application-level controls. It also
covers the IT audit and controls that emerged
from the Committee of Sponsoring Organizations
of the Treadway Commission (COSO) and the
Public Company Accounting Oversight Board
(PCAOB), and it overlays COSO with COBIT®
.
This is critical for those auditing IT or adhering
to the US Sarbanes-Oxley Act of 2002 (SOX) to
understand and be able to use. There is a section to
discuss, evaluate and present IT audit deficiencies
in language and terms that will facilitate a more
useful discussion with management and financial
statement auditors.
The book addresses spreadsheet and desktop
tools, their risk and top exposures. Any auditor
who has been working to ensure their company
complies with SOX or similar legislation in other
jurisdictions will have a significant interest in
helping management understand risk and ensure
the protection and reliability of
sensitive spreadsheet information.
The book concludes with a section
to discuss key reports, report
writing tools, and the related risk
and exposures.
This book provides a practical
approach to understanding the basics
of IT audit and application controls.
By using the language of businesses,
it helps to bridge the communication
gap between IT and management.
This book is recommended to any
professional new to IT audit or it
can also be used as a reference book
that covers the key basics required for SOX
legislation compliance for anyone who is involved
in conducting, reviewing or evaluating IT audit
work. Only once enterprises understand risk and
controls can they begin to evaluate opportunities
and help businesses make better decisions.
EDITOR’S NOTE
IT Auditing and Application Controls for
Small and Mid-sized Enterprises: Revenue,
Expenditure, Inventory, Payroll, and More
is available from the ISACA®
Bookstore. For
information, visit www.isaca.org/bookstore,
email bookstore@isaca.org or telephone
+1.847.660.5650.
Reviewed by A. Krista
Kivisild, CISA, CA, CPA,
who has had a diverse
career in audit while
working in government,
private companies and
public organizations. Kivisild
has experience in IT audit,
governance, compliance/
regulatory auditing, value-
for-money auditing and
operational auditing. She
has served as a volunteer
instructor, training not-
for-profit boards on board
governance concepts; has
worked with the Alberta
(Canada) Government Board
Development Program;
and has served as the
membership director and
CISA director for the ISACA
Winnipeg (Manitoba, Canada)
Chapter.
IT Auditing and Application Controls
for Small and Mid-sized Enterprises:
Revenue, Expenditure, Inventory, Payroll, and More
Do you have
something
to say about
this article?
Visit the Journal
pages of the ISACA
web site (www.isaca.
org/journal), find the
article and choose
the Comments tab to
share your thoughts.
Go directly to the article:
By Jason Wood, William Brown
and Harry Howe

More Related Content

Similar to IT Auditing for SMEs

Compliance & data security – the way we work
Compliance & data security – the way we workCompliance & data security – the way we work
Compliance & data security – the way we workPuneet Chopra
 
Career Opportunities Of a Chartered Accountants and Uses of IT in it
Career Opportunities Of a Chartered Accountants and Uses of IT in itCareer Opportunities Of a Chartered Accountants and Uses of IT in it
Career Opportunities Of a Chartered Accountants and Uses of IT in itDivyansh Jain
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Paul Hamilton
 
BusinessEthcsInSMEunderTheShelterOfCorporateGovern
BusinessEthcsInSMEunderTheShelterOfCorporateGovernBusinessEthcsInSMEunderTheShelterOfCorporateGovern
BusinessEthcsInSMEunderTheShelterOfCorporateGovernKashif Ali
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxhealdkathaleen
 
Failure deriving from underestimating risk management
 Failure deriving from underestimating risk management Failure deriving from underestimating risk management
Failure deriving from underestimating risk managementPECB
 
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016CBIZ, Inc.
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic SecurityChad Korosec
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016CBIZ, Inc.
 
Problems Of E-Commerce
Problems Of E-CommerceProblems Of E-Commerce
Problems Of E-CommerceTina Jordan
 
A Framework Of Competitive Intelligence
A Framework Of Competitive IntelligenceA Framework Of Competitive Intelligence
A Framework Of Competitive IntelligenceAmalfiCORE, LLC
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot SpotsRon Steinkamp
 
Chartered Accountant’s Role in an Enterprise Risk Management
Chartered Accountant’s Role in an Enterprise Risk ManagementChartered Accountant’s Role in an Enterprise Risk Management
Chartered Accountant’s Role in an Enterprise Risk ManagementCA. (Dr.) Rajkumar Adukia
 

Similar to IT Auditing for SMEs (20)

Compliance & data security – the way we work
Compliance & data security – the way we workCompliance & data security – the way we work
Compliance & data security – the way we work
 
Risk-informed innovation
Risk-informed innovation Risk-informed innovation
Risk-informed innovation
 
Compliance Risk Assessment
Compliance Risk AssessmentCompliance Risk Assessment
Compliance Risk Assessment
 
Career Opportunities Of a Chartered Accountants and Uses of IT in it
Career Opportunities Of a Chartered Accountants and Uses of IT in itCareer Opportunities Of a Chartered Accountants and Uses of IT in it
Career Opportunities Of a Chartered Accountants and Uses of IT in it
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Noise, Numbers and Cut-through: What is the future role of financial reporting?
Noise, Numbers and Cut-through: What is the future role of financial reporting?Noise, Numbers and Cut-through: What is the future role of financial reporting?
Noise, Numbers and Cut-through: What is the future role of financial reporting?
 
Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
BusinessEthcsInSMEunderTheShelterOfCorporateGovern
BusinessEthcsInSMEunderTheShelterOfCorporateGovernBusinessEthcsInSMEunderTheShelterOfCorporateGovern
BusinessEthcsInSMEunderTheShelterOfCorporateGovern
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
 
Failure deriving from underestimating risk management
 Failure deriving from underestimating risk management Failure deriving from underestimating risk management
Failure deriving from underestimating risk management
 
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016
 
Problems Of E-Commerce
Problems Of E-CommerceProblems Of E-Commerce
Problems Of E-Commerce
 
A Framework Of Competitive Intelligence
A Framework Of Competitive IntelligenceA Framework Of Competitive Intelligence
A Framework Of Competitive Intelligence
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots
 
ACFN vISO eBook
ACFN vISO eBookACFN vISO eBook
ACFN vISO eBook
 
Chartered Accountant’s Role in an Enterprise Risk Management
Chartered Accountant’s Role in an Enterprise Risk ManagementChartered Accountant’s Role in an Enterprise Risk Management
Chartered Accountant’s Role in an Enterprise Risk Management
 
The 10 recommended audit management solution providers, 2018
The 10 recommended audit management solution providers, 2018The 10 recommended audit management solution providers, 2018
The 10 recommended audit management solution providers, 2018
 

IT Auditing for SMEs

  • 1. 1ISACA JOURNAL Volume 5, 2015©2015 ISACA. All rights reserved. www.isaca.org Former US President John F. Kennedy said, “The Chinese use two brush strokes to write the word ‘crisis.’ One brush stroke stands for danger; the other for opportunity. In a crisis, be aware of the danger, but recognize the opportunity.” Businesses recognize that they need to take advantage of opportunities to keep growing. And while risk is inevitable, some risk is too great a danger when compared to its associated opportunity, especially for small and midsized enterprises (SMEs) that need to take a more pragmatic approach to ensure they stay afloat in today’s business environment. The risk associated with the IT environment and applications is particularly difficult to communicate to the business as many of the related concepts are not well understood by those outside of the technology realm. How can security professionals evaluate the magnitude of risk and communicate it appropriately to businesses so that they can factor this into their decision making? IT Auditing and Application Controls for Small and Mid-sized Enterprises: Revenue, Expenditure, Inventory, Payroll, and More offers a practical approach to identify the risk associated with the SME IT environment and the likely applications and controls deployed in an SME. The book is written to help financial statement auditors understand this risk, which can also help IT auditors understand the appropriate language to use to communicate risk appropriately to the business so that it is understood. The book is thorough and covers specific operational and financial statement risk to different cycles (e.g., revenue, expenditure, inventory, payroll) to help explain cycle risk, controls and the related application-level controls. It also covers the IT audit and controls that emerged from the Committee of Sponsoring Organizations of the Treadway Commission (COSO) and the Public Company Accounting Oversight Board (PCAOB), and it overlays COSO with COBIT® . This is critical for those auditing IT or adhering to the US Sarbanes-Oxley Act of 2002 (SOX) to understand and be able to use. There is a section to discuss, evaluate and present IT audit deficiencies in language and terms that will facilitate a more useful discussion with management and financial statement auditors. The book addresses spreadsheet and desktop tools, their risk and top exposures. Any auditor who has been working to ensure their company complies with SOX or similar legislation in other jurisdictions will have a significant interest in helping management understand risk and ensure the protection and reliability of sensitive spreadsheet information. The book concludes with a section to discuss key reports, report writing tools, and the related risk and exposures. This book provides a practical approach to understanding the basics of IT audit and application controls. By using the language of businesses, it helps to bridge the communication gap between IT and management. This book is recommended to any professional new to IT audit or it can also be used as a reference book that covers the key basics required for SOX legislation compliance for anyone who is involved in conducting, reviewing or evaluating IT audit work. Only once enterprises understand risk and controls can they begin to evaluate opportunities and help businesses make better decisions. EDITOR’S NOTE IT Auditing and Application Controls for Small and Mid-sized Enterprises: Revenue, Expenditure, Inventory, Payroll, and More is available from the ISACA® Bookstore. For information, visit www.isaca.org/bookstore, email bookstore@isaca.org or telephone +1.847.660.5650. Reviewed by A. Krista Kivisild, CISA, CA, CPA, who has had a diverse career in audit while working in government, private companies and public organizations. Kivisild has experience in IT audit, governance, compliance/ regulatory auditing, value- for-money auditing and operational auditing. She has served as a volunteer instructor, training not- for-profit boards on board governance concepts; has worked with the Alberta (Canada) Government Board Development Program; and has served as the membership director and CISA director for the ISACA Winnipeg (Manitoba, Canada) Chapter. IT Auditing and Application Controls for Small and Mid-sized Enterprises: Revenue, Expenditure, Inventory, Payroll, and More Do you have something to say about this article? Visit the Journal pages of the ISACA web site (www.isaca. org/journal), find the article and choose the Comments tab to share your thoughts. Go directly to the article: By Jason Wood, William Brown and Harry Howe