Since the spread of IT systems has made it a pre-requisite that auditors as well as management have the ability to examine high volumes of data and transaction in order to determine patterns and trends. In addition, the increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools.
While a variety of powerful tools are readily available today, the skills required to utilize such tools are not. Not only must the correct testing techniques be selected but the effective interpretation of outcomes presented by the software is essential in the drawing of appropriate conclusions based on the data analysis. This 6 webinar series, based on Richard Cascarino’s book “Data Analytics for Internal Auditors” covers these skills and techniques.
Webinar 3 Analytics Techniques
Conducting the Audit
Obtaining Information from IT Systems for Analysis
Use of Computer Assisted Audit Techniques
Analysis of Big Data
Results Analysis and Validation
Fraud Detection using Data Analysis
Root Cause Analysis
1) The document discusses continuous monitoring and auditing techniques using data analytics. It provides definitions and examples of continuous monitoring, auditing, and assurance.
2) Continuous monitoring involves ongoing management oversight of controls while continuous auditing involves independent testing by internal auditors. The relationship between the two is also discussed.
3) Implementing continuous monitoring and auditing can provide benefits like early detection of issues and fraud reduction but also faces challenges like obtaining the right data and tools.
The document provides information about Richard Cascarino and Jim Kaplan, who will be presenting on the topic of data analytics and internal auditing. It gives background on both presenters and their qualifications. It also provides an overview of the company AuditNet, which focuses on resources for auditors. The agenda for the upcoming presentation is outlined, including sections on analysis reporting, data visualization, and presentation.
This document provides an overview of data analytics and computer-assisted audit techniques (CAATs) for internal auditors. It discusses conducting the audit process, including planning, determining objectives, obtaining and verifying information from IT systems and databases. It also covers using CAATs for data analysis, test techniques, and audit procedures. The document describes challenges for auditors in obtaining data access, defining metrics, and minimizing system impact. Finally, it discusses various CAAT types and their usage, including sampling, parallel simulation, and snapshot techniques.
Since the spread of IT systems has made it a pre-requisite that auditors as well as management have the ability to examine high volumes of data and transaction in order to determine patterns and trends. In addition, the increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools.
While a variety of powerful tools are readily available today, the skills required to utilize such tools are not. Not only must the correct testing techniques be selected but the effective interpretation of outcomes presented by the software is essential in the drawing of appropriate conclusions based on the data analysis. This 6 webinar series, based on Richard Cascarino’s book “Data Analytics for Internal Auditors” covers these skills and techniques.
Webinar 5 Data Analytics Software 4/16/19
Excel and Data Analysis
ACL and Data Analysis
IDEA and Data Analysis
SAS and Data Analysis
This document provides guidance on using data analytics for internal auditing. It discusses key concepts like defining data analysis, getting data from various sources, choosing the right data analysis software, developing a data analysis methodology, and examples of data analytics techniques for analyzing journal entries and employee expenses. The document also covers best practices for critical success factors and infrastructure needed to support an effective data analytics program.
The IT Auditing Series is a series of 10 2-hour webinars.
The study program consists of 5 modules Basic and 5 modules Advanced spanning a broad range of topics and issues in the IT Auditing field. The emphasis in all webinars is therefore on practical aspects, of Internal Auditing.
The course content is based upon ISACA Framework which has been accepted world-wide as the basis of skills and competencies required for all IT Auditors.
This session covers risk analysis for auditors
Duplicate payments, duplicate vendors, and segregation of duties in accounts payable are still the top tests being run by auditors using analytics. They are simple, effective, and save money which always helps the business case for analytics. Further, vendor and related payments fraud is the #1 fraud (in volume) affecting all organizations – big and small, public and private, regardless of the industry and sector. Excel templates will be provided with admission to assist to complete all testing and visualizations using graphs. Further data request letters and analytic audit programs will be provided to “jump start” your audit efforts in the accounts payable and vendor management areas.
Specific learning objectives include:
o Run over 20….key, proactive error and fraud tests in the areas of the accounts payable, vendor masterfiles, and purchase order files, all in Excel.
o Map the report results to an audit program to produce an analytically-enabled audit program.
o Discover the top frauds and corruption schemes along with top cost efficiencies to enact within accounts payable reviews.
o Distinguish between the top major accounting systems used when extracting accounts payable and vendor masterfile data and obtain a standard data request to aid the extractions
o Complete a multiple perspective visualization review of your accounts payable data including time based, amount based, company/profit center based, enterer, etc.
These are the slides. If you would like the associated data files they are available for download after payment. Videos of these sessions are available for free.
Details contact Rich Lanza (rich@richlanza.com)
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringJim Kaplan CIA CFE
Keyword analytics is the process of using data analytics to find keywords in both structured and unstructured data for detecting fraud and compliance review anomalies. It can be used by auditors, accountants and lawyers. This presentation from the 2015 TeamMate User Conference presented the results of the AuditNet Keyword Survey with tools and a comprehensive list of more than 4,000 keywords, social media terms, terrorist keywords and more.
1) The document discusses continuous monitoring and auditing techniques using data analytics. It provides definitions and examples of continuous monitoring, auditing, and assurance.
2) Continuous monitoring involves ongoing management oversight of controls while continuous auditing involves independent testing by internal auditors. The relationship between the two is also discussed.
3) Implementing continuous monitoring and auditing can provide benefits like early detection of issues and fraud reduction but also faces challenges like obtaining the right data and tools.
The document provides information about Richard Cascarino and Jim Kaplan, who will be presenting on the topic of data analytics and internal auditing. It gives background on both presenters and their qualifications. It also provides an overview of the company AuditNet, which focuses on resources for auditors. The agenda for the upcoming presentation is outlined, including sections on analysis reporting, data visualization, and presentation.
This document provides an overview of data analytics and computer-assisted audit techniques (CAATs) for internal auditors. It discusses conducting the audit process, including planning, determining objectives, obtaining and verifying information from IT systems and databases. It also covers using CAATs for data analysis, test techniques, and audit procedures. The document describes challenges for auditors in obtaining data access, defining metrics, and minimizing system impact. Finally, it discusses various CAAT types and their usage, including sampling, parallel simulation, and snapshot techniques.
Since the spread of IT systems has made it a pre-requisite that auditors as well as management have the ability to examine high volumes of data and transaction in order to determine patterns and trends. In addition, the increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools.
While a variety of powerful tools are readily available today, the skills required to utilize such tools are not. Not only must the correct testing techniques be selected but the effective interpretation of outcomes presented by the software is essential in the drawing of appropriate conclusions based on the data analysis. This 6 webinar series, based on Richard Cascarino’s book “Data Analytics for Internal Auditors” covers these skills and techniques.
Webinar 5 Data Analytics Software 4/16/19
Excel and Data Analysis
ACL and Data Analysis
IDEA and Data Analysis
SAS and Data Analysis
This document provides guidance on using data analytics for internal auditing. It discusses key concepts like defining data analysis, getting data from various sources, choosing the right data analysis software, developing a data analysis methodology, and examples of data analytics techniques for analyzing journal entries and employee expenses. The document also covers best practices for critical success factors and infrastructure needed to support an effective data analytics program.
The IT Auditing Series is a series of 10 2-hour webinars.
The study program consists of 5 modules Basic and 5 modules Advanced spanning a broad range of topics and issues in the IT Auditing field. The emphasis in all webinars is therefore on practical aspects, of Internal Auditing.
The course content is based upon ISACA Framework which has been accepted world-wide as the basis of skills and competencies required for all IT Auditors.
This session covers risk analysis for auditors
Duplicate payments, duplicate vendors, and segregation of duties in accounts payable are still the top tests being run by auditors using analytics. They are simple, effective, and save money which always helps the business case for analytics. Further, vendor and related payments fraud is the #1 fraud (in volume) affecting all organizations – big and small, public and private, regardless of the industry and sector. Excel templates will be provided with admission to assist to complete all testing and visualizations using graphs. Further data request letters and analytic audit programs will be provided to “jump start” your audit efforts in the accounts payable and vendor management areas.
Specific learning objectives include:
o Run over 20….key, proactive error and fraud tests in the areas of the accounts payable, vendor masterfiles, and purchase order files, all in Excel.
o Map the report results to an audit program to produce an analytically-enabled audit program.
o Discover the top frauds and corruption schemes along with top cost efficiencies to enact within accounts payable reviews.
o Distinguish between the top major accounting systems used when extracting accounts payable and vendor masterfile data and obtain a standard data request to aid the extractions
o Complete a multiple perspective visualization review of your accounts payable data including time based, amount based, company/profit center based, enterer, etc.
These are the slides. If you would like the associated data files they are available for download after payment. Videos of these sessions are available for free.
Details contact Rich Lanza (rich@richlanza.com)
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringJim Kaplan CIA CFE
Keyword analytics is the process of using data analytics to find keywords in both structured and unstructured data for detecting fraud and compliance review anomalies. It can be used by auditors, accountants and lawyers. This presentation from the 2015 TeamMate User Conference presented the results of the AuditNet Keyword Survey with tools and a comprehensive list of more than 4,000 keywords, social media terms, terrorist keywords and more.
This document contains information about conducting a root cause analysis, including an overview, framework, tools, and examples. It discusses why root cause analysis is important for problem prevention and issue resolution. The document provides a case study example and asks readers to identify potential root causes for deficiencies in an audit. It also lists some common categories and examples of root causes, such as corporate culture, customers, people, and processes. Tools mentioned for root cause analysis include SIPOC, flowcharting, fishbone diagrams, and the 5 whys technique.
The document discusses regulatory expectations around anti-money laundering (AML) compliance certification under New York banking law Part 504. It notes the law will apply to all state-chartered banks and non-bank financial institutions, and holds organizations responsible for ensuring their AML/sanctions screening programs comply with regulations. The document also discusses challenges around scalability, integration, and consistency in AML compliance programs, and proposes solutions like improved transaction monitoring, case management technology, and a "maturity level" perspective to drive operational efficiency amid heightened regulatory scrutiny.
While the majority of executives and internal audit leaders agree that data analytics is important, according to the 2016 IIA CBOK study, only 40% of respondents are using technology in audit methodology. Why the disconnect?
In this webinar, we will identify some of the common challenges associated with starting and continuing to use data analytics in your audit process. Easy-to-implement methods that help expand the use of data analytics and improve your audit coverage will also be presented.
Learning objectives
• Discuss ways to increase and expand the use of data analytics, including business and technology applications
• Identify the skills needed for successful use of data analytics
• Provide guidance on obtaining internal management support
• Offer tips on how to measure staff utilization and the effectiveness of analytics during audits
For information on our Webinars visit AuditNet.org (www.auditnet.org)
This document discusses key considerations for implementing an effective anti-money laundering (AML) and counter-terrorist financing (CFT) monitoring solution. It notes that only 29% of technology projects are successful and discusses how adopting an agile methodology can help, with 58% of small agile projects being successful. The document outlines factors for analysis, design, building, testing, and implementing an AML/CFT solution, including data, technology, process, monitoring capabilities, controls, and residency/cloud options. It emphasizes the importance of testing solutions for effectiveness and efficiency.
The document discusses various topics related to the evolving role of internal auditors and how they can leverage technology. It touches on how internal auditors can use risk-based approaches and continuous monitoring to develop dynamic audit plans. It also discusses the need for data analytics skills and understanding of IT systems. The interviews suggest internal auditors will need more specialized skills but also a strong business foundation. Predictive analytics may allow auditors to better predict risks and issues.
This presentation describes how to be a proactive information security practitioner. Emphasis is on managing by measurement, and IT and Business Alignment.
This document discusses the benefits of aligning IT and business risk management. Key benefits include better understanding technology risks, quantifying business impacts, more effective risk management, and improved collaboration between IT and business. The document also identifies challenges to alignment like complex existing environments and accelerated change. Signs of misalignment include technology risk reporting just for compliance and metrics expressed only in IT terms. Different types of misalignment are described. Case studies from large banks demonstrate approaches to improve alignment through mapping IT services to business services and better communication. Lessons learned emphasize defining requirements upfront and avoiding information overload.
The document summarizes a webinar on assessing compliance programs. It discusses why organizations conduct periodic assessments of their compliance programs, including regulator expectations, stakeholder expectations, and identifying risks and gaps. It also covers preparing for an assessment, including establishing goals and scope, collecting data through document reviews, surveys, interviews and focus groups. Finally, it discusses analyzing the data, reporting findings and recommendations, and generating an action plan to address recommendations. The overall purpose is to evaluate program effectiveness and identify areas for improvement.
The document outlines the requirements for a project governance system for Petronas. It discusses (1) the need for a system integrator to develop technologies that can integrate with existing systems, (2) the governance framework which includes 5 levels to provide oversight, monitoring, data analysis and reporting, and (3) how the system would allow Petronas to have full visibility into project data through dashboards, alerts, and reporting across the entire project lifecycle.
Looking at the Third Party Risk Assessment Lifecycle and where opportunities lay for improved efficiencies and scalability from the adoption of Managed Service offerings. What benefits can a Managed Service offering deliver to your Third Party risk Management program and process execution? Presented by Sean O'Brien, Director, DVV Solutions.
The document discusses the importance of aligning IT strategy with business strategy. It notes that a survey found this to be the top issue facing executives. Another study identified ensuring alignment and prioritizing IT investments according to business needs as the most important factors for business success. However, around half of respondents did not have a formal governance process for alignment. The document argues that ultimate responsibility for IT strategy should rest with business leadership, as IT exists to support the business, not as an end in itself. A lack of alignment can lead to higher costs, missed opportunities, and inability to achieve full business potential.
Re-imagining the art and science of auditing and fraud detection is coming to the forefront of risk management functions. What was seen as a “nice to have” a few years ago has become a “must have” as digital transformation and data surrounds all aspects of the organization.
Specific learning objectives include:
o See how analytics can maximize the annual audit plan and better ensure focus is placed on top organizational risks.
o Establish a framework to using analytics and automation across the entire audit lifecycle.
o Use the general ledger and revenue audit areas as a case study to provide a digital road map for analytics for detecting fraud (and errors) within the organization.
4 best practices_using finance applications for better process efficienciesKaizenlogcom
The document discusses the need for modern financial applications to improve process efficiencies and data accuracy for CFOs facing increasing demands. It outlines challenges such as legacy systems relying on manual data entry and inability to access timely and comprehensive data. The document then provides best practices for identifying financial applications including regularly assessing legacy systems, focusing on automation and integration, considering cloud-based systems, using single integrated systems, and automating the financial close process. Implementing appropriate applications can result in immediate impacts like accelerated ROI, greater productivity, improved reporting and analysis, stronger financial controls, and a more responsive finance team.
The document summarizes research into factors that influence employee non-compliance with information security policies. It outlines the research questions, identified factors from literature like lack of awareness and risk assessment, and describes a survey of PwC employees. The survey found negligence and incorrect risk assessment were major influences, while national culture and IT governance had less impact. Recommendations include improving security awareness training tailored to different age groups and having management actively support compliance.
The IT Auditing Series is a series of 10 2-hour webinars.
The study program consists of 5 modules Basic and 5 modules Advanced spanning a broad range of topics and issues in the IT Auditing field. The emphasis in all webinars is therefore on practical aspects, of Internal Auditing.
The course content is based upon ISACA Framework which has been accepted world-wide as the basis of skills and competencies required for all IT Auditors.
This webinar covered Fundamentals of IT Audit
Selecting the right data analysis tool for your audit function requires a risk based selection process. In this session you will learn how to select the best tool and more importantly integrate the process into your staff. The right approach minimizes the risk of selecting a product that might not fit your organization, which could impair your function as it sits underutilized or on the shelf. Finding the right issues quickly and timely improves the value of auditing and assists auditing to win more work.
Attending this webinar you will learn a step-by-step approach:
. How to select the software
. Build a short/long term on-boarding roadmap
. Realize the lost opportunity of not including all auditors (no auditor left behind)
Continuous auditing and monitoring (“continuous reviews”) has been discussed for decades but implemented in moderation based on recent surveys. It comes down to how much are data analytics integrated into our audit processes initially to then become continuous. If a high degree of integration exists, then there is probably a good amount of continuous reviews happening in the organization already.
However, most companies fall into the other camp and have not integrated analytics well enough or considered how to take full advantage of continuous reviews.
This course will explain culturally what audit departments must do to embrace continuous reviews and how that can be integrated with ACL Desktop software techniques. Sample files and scripts will be provided to get you started down the road to continuous reviews.
As regulatory changes sweep the globe, auditors, risk management, and compliance professionals are using more sophisticated tools, and methods.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
These slide accompany a video training presentation from AuditNet®. The video is available to view at http://bit.ly/1eBRLiZ (registration with AuditNet.tv required)
Learning Objectives:
Gain an appreciation, based on the attendee participants, of their successes and pitfalls when planning data analytics.
Understand some common approaches to overcoming obstacles to planning data analytics based on case studies from companies and survey attendees themselves.
Learn how planning analytics can be integrated into top audit areas.
Outline an effective data request process to ensure complete and accurate extractions of data every time.
See how analytics can maximize the annual audit plan and better ensure focus is placed on organizational risk.
Building Continuous Auditing Capabilities utilizing CAATs and Data Analytics technologies. Overview , CA, DA, ACL, Audit Guidelines, Technology, Audit Innovation,
The document discusses internal audit's role in creating an RPA program, including as a user, consultant, and assurance provider of RPA. It outlines how internal audit can use RPA to automate audit tasks like data gathering, risk assessments, and controls testing. As a consultant, internal audit can identify opportunities for automation and help implement governance. As assurance, internal audit should focus on security risks, auditing the software development lifecycle, and managing organizational change for new RPA systems. Effective governance requires controls at the enterprise level and for the specific RPA program.
Presentation in ACL Connections in Atlanta - April 2013mcoello
This document outlines best practices for creating a sustainable analytics program, including operating as a centralized center of excellence, utilizing various analytic techniques, investing in documentation, obtaining data from multiple sources, building a toolbox of analytic capabilities, running a cost-efficient practice, standardizing scripts, leveraging external lists, promoting innovation, protecting data, forming strategic partnerships, and establishing a unique culture. It provides guidance on roles, processes, infrastructure, documentation, analytics techniques, data management, governance, and culture to transform the use of analytics.
This document contains information about conducting a root cause analysis, including an overview, framework, tools, and examples. It discusses why root cause analysis is important for problem prevention and issue resolution. The document provides a case study example and asks readers to identify potential root causes for deficiencies in an audit. It also lists some common categories and examples of root causes, such as corporate culture, customers, people, and processes. Tools mentioned for root cause analysis include SIPOC, flowcharting, fishbone diagrams, and the 5 whys technique.
The document discusses regulatory expectations around anti-money laundering (AML) compliance certification under New York banking law Part 504. It notes the law will apply to all state-chartered banks and non-bank financial institutions, and holds organizations responsible for ensuring their AML/sanctions screening programs comply with regulations. The document also discusses challenges around scalability, integration, and consistency in AML compliance programs, and proposes solutions like improved transaction monitoring, case management technology, and a "maturity level" perspective to drive operational efficiency amid heightened regulatory scrutiny.
While the majority of executives and internal audit leaders agree that data analytics is important, according to the 2016 IIA CBOK study, only 40% of respondents are using technology in audit methodology. Why the disconnect?
In this webinar, we will identify some of the common challenges associated with starting and continuing to use data analytics in your audit process. Easy-to-implement methods that help expand the use of data analytics and improve your audit coverage will also be presented.
Learning objectives
• Discuss ways to increase and expand the use of data analytics, including business and technology applications
• Identify the skills needed for successful use of data analytics
• Provide guidance on obtaining internal management support
• Offer tips on how to measure staff utilization and the effectiveness of analytics during audits
For information on our Webinars visit AuditNet.org (www.auditnet.org)
This document discusses key considerations for implementing an effective anti-money laundering (AML) and counter-terrorist financing (CFT) monitoring solution. It notes that only 29% of technology projects are successful and discusses how adopting an agile methodology can help, with 58% of small agile projects being successful. The document outlines factors for analysis, design, building, testing, and implementing an AML/CFT solution, including data, technology, process, monitoring capabilities, controls, and residency/cloud options. It emphasizes the importance of testing solutions for effectiveness and efficiency.
The document discusses various topics related to the evolving role of internal auditors and how they can leverage technology. It touches on how internal auditors can use risk-based approaches and continuous monitoring to develop dynamic audit plans. It also discusses the need for data analytics skills and understanding of IT systems. The interviews suggest internal auditors will need more specialized skills but also a strong business foundation. Predictive analytics may allow auditors to better predict risks and issues.
This presentation describes how to be a proactive information security practitioner. Emphasis is on managing by measurement, and IT and Business Alignment.
This document discusses the benefits of aligning IT and business risk management. Key benefits include better understanding technology risks, quantifying business impacts, more effective risk management, and improved collaboration between IT and business. The document also identifies challenges to alignment like complex existing environments and accelerated change. Signs of misalignment include technology risk reporting just for compliance and metrics expressed only in IT terms. Different types of misalignment are described. Case studies from large banks demonstrate approaches to improve alignment through mapping IT services to business services and better communication. Lessons learned emphasize defining requirements upfront and avoiding information overload.
The document summarizes a webinar on assessing compliance programs. It discusses why organizations conduct periodic assessments of their compliance programs, including regulator expectations, stakeholder expectations, and identifying risks and gaps. It also covers preparing for an assessment, including establishing goals and scope, collecting data through document reviews, surveys, interviews and focus groups. Finally, it discusses analyzing the data, reporting findings and recommendations, and generating an action plan to address recommendations. The overall purpose is to evaluate program effectiveness and identify areas for improvement.
The document outlines the requirements for a project governance system for Petronas. It discusses (1) the need for a system integrator to develop technologies that can integrate with existing systems, (2) the governance framework which includes 5 levels to provide oversight, monitoring, data analysis and reporting, and (3) how the system would allow Petronas to have full visibility into project data through dashboards, alerts, and reporting across the entire project lifecycle.
Looking at the Third Party Risk Assessment Lifecycle and where opportunities lay for improved efficiencies and scalability from the adoption of Managed Service offerings. What benefits can a Managed Service offering deliver to your Third Party risk Management program and process execution? Presented by Sean O'Brien, Director, DVV Solutions.
The document discusses the importance of aligning IT strategy with business strategy. It notes that a survey found this to be the top issue facing executives. Another study identified ensuring alignment and prioritizing IT investments according to business needs as the most important factors for business success. However, around half of respondents did not have a formal governance process for alignment. The document argues that ultimate responsibility for IT strategy should rest with business leadership, as IT exists to support the business, not as an end in itself. A lack of alignment can lead to higher costs, missed opportunities, and inability to achieve full business potential.
Re-imagining the art and science of auditing and fraud detection is coming to the forefront of risk management functions. What was seen as a “nice to have” a few years ago has become a “must have” as digital transformation and data surrounds all aspects of the organization.
Specific learning objectives include:
o See how analytics can maximize the annual audit plan and better ensure focus is placed on top organizational risks.
o Establish a framework to using analytics and automation across the entire audit lifecycle.
o Use the general ledger and revenue audit areas as a case study to provide a digital road map for analytics for detecting fraud (and errors) within the organization.
4 best practices_using finance applications for better process efficienciesKaizenlogcom
The document discusses the need for modern financial applications to improve process efficiencies and data accuracy for CFOs facing increasing demands. It outlines challenges such as legacy systems relying on manual data entry and inability to access timely and comprehensive data. The document then provides best practices for identifying financial applications including regularly assessing legacy systems, focusing on automation and integration, considering cloud-based systems, using single integrated systems, and automating the financial close process. Implementing appropriate applications can result in immediate impacts like accelerated ROI, greater productivity, improved reporting and analysis, stronger financial controls, and a more responsive finance team.
The document summarizes research into factors that influence employee non-compliance with information security policies. It outlines the research questions, identified factors from literature like lack of awareness and risk assessment, and describes a survey of PwC employees. The survey found negligence and incorrect risk assessment were major influences, while national culture and IT governance had less impact. Recommendations include improving security awareness training tailored to different age groups and having management actively support compliance.
The IT Auditing Series is a series of 10 2-hour webinars.
The study program consists of 5 modules Basic and 5 modules Advanced spanning a broad range of topics and issues in the IT Auditing field. The emphasis in all webinars is therefore on practical aspects, of Internal Auditing.
The course content is based upon ISACA Framework which has been accepted world-wide as the basis of skills and competencies required for all IT Auditors.
This webinar covered Fundamentals of IT Audit
Selecting the right data analysis tool for your audit function requires a risk based selection process. In this session you will learn how to select the best tool and more importantly integrate the process into your staff. The right approach minimizes the risk of selecting a product that might not fit your organization, which could impair your function as it sits underutilized or on the shelf. Finding the right issues quickly and timely improves the value of auditing and assists auditing to win more work.
Attending this webinar you will learn a step-by-step approach:
. How to select the software
. Build a short/long term on-boarding roadmap
. Realize the lost opportunity of not including all auditors (no auditor left behind)
Continuous auditing and monitoring (“continuous reviews”) has been discussed for decades but implemented in moderation based on recent surveys. It comes down to how much are data analytics integrated into our audit processes initially to then become continuous. If a high degree of integration exists, then there is probably a good amount of continuous reviews happening in the organization already.
However, most companies fall into the other camp and have not integrated analytics well enough or considered how to take full advantage of continuous reviews.
This course will explain culturally what audit departments must do to embrace continuous reviews and how that can be integrated with ACL Desktop software techniques. Sample files and scripts will be provided to get you started down the road to continuous reviews.
As regulatory changes sweep the globe, auditors, risk management, and compliance professionals are using more sophisticated tools, and methods.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
These slide accompany a video training presentation from AuditNet®. The video is available to view at http://bit.ly/1eBRLiZ (registration with AuditNet.tv required)
Learning Objectives:
Gain an appreciation, based on the attendee participants, of their successes and pitfalls when planning data analytics.
Understand some common approaches to overcoming obstacles to planning data analytics based on case studies from companies and survey attendees themselves.
Learn how planning analytics can be integrated into top audit areas.
Outline an effective data request process to ensure complete and accurate extractions of data every time.
See how analytics can maximize the annual audit plan and better ensure focus is placed on organizational risk.
Building Continuous Auditing Capabilities utilizing CAATs and Data Analytics technologies. Overview , CA, DA, ACL, Audit Guidelines, Technology, Audit Innovation,
The document discusses internal audit's role in creating an RPA program, including as a user, consultant, and assurance provider of RPA. It outlines how internal audit can use RPA to automate audit tasks like data gathering, risk assessments, and controls testing. As a consultant, internal audit can identify opportunities for automation and help implement governance. As assurance, internal audit should focus on security risks, auditing the software development lifecycle, and managing organizational change for new RPA systems. Effective governance requires controls at the enterprise level and for the specific RPA program.
Presentation in ACL Connections in Atlanta - April 2013mcoello
This document outlines best practices for creating a sustainable analytics program, including operating as a centralized center of excellence, utilizing various analytic techniques, investing in documentation, obtaining data from multiple sources, building a toolbox of analytic capabilities, running a cost-efficient practice, standardizing scripts, leveraging external lists, promoting innovation, protecting data, forming strategic partnerships, and establishing a unique culture. It provides guidance on roles, processes, infrastructure, documentation, analytics techniques, data management, governance, and culture to transform the use of analytics.
Expert data analytics prove to be highly transformative when applied in context to corporate business strategies.
This webinar covers various approaches and strategies that will give you a detailed insight into planning and executing your Data Analytics projects.
The document discusses business intelligence and the decision making process. It defines business intelligence as using technology to gather, store, access and analyze data to help users make better decisions. This includes applications like decision support systems, reporting, online analytical processing, and data mining. It also discusses key concepts like data warehousing, OLTP vs OLAP, and the different layers of business intelligence including the presentation, data warehouse, and source layers.
What is Business intelligence
Core Capabilities of Business Intelligence
Elements of Business Intelligence
Why Companies opt for Business Intelligence
Benefits of Business Intelligence
User of Business Intelligence
Reports of Business Intelligence
Business Application in Extended Enterprise
Business Analytics
Golden Rules for Business Intelligence
5 Stages of Business Intelligence
Predictive Analytics to Discover Risk.
Organizations are seeking new ways to transform their rapidly growing data into insight that mitigates risks and unlocks new opportunities. However, using the traditional reporting tools to look for unusual patterns in large data sets is like finding a needle in a haystack.
The problem is not the resources, the personnel, or the data. It’s that many organizations simply don’t have the advanced analytics required to arrange the data, identify suspicious patterns and weaknesses; at least not fast enough. There’s too much data and not enough analytics!
We need a better way of knowing what the information means — of interpreting the data to discover an unknown business risk or opportunity as it happens or, even better, anticipate the next one. For most organizations, reducing transaction errors and misuse continues to be one of the largest untapped opportunities to manage costs, improve top-line revenue recognition, and ensure compliance with policies.
Join SafePaaS CEO Adil Khan as he discusses how to discover patterns in all types of structured and unstructured enterprise data, and use this insight to improve bottom line, significantly reduce cash leakage and post-audit recovery costs, improve revenue recognition timing, safeguard the integrity of financial statements, reduce the cost of internal and external audits, increase visibility into controls environment and mitigate exposure to fraud.
Leverage Sage Business Intelligence for Your OrganizationRKLeSolutions
This document summarizes Sage Enterprise Intelligence (SEI) business intelligence software. It discusses how SEI provides modern BI capabilities that are practical, powerful, and simple to use. It shifts the power of analytics from few users to many. The document outlines key drivers for real-time business insights and compares SEI features to Sage Intelligence. It provides examples of SEI helping customers in various industries improve processes, gain insights, and realize ROI.
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoescentralohioissa
This presentation is to provide IT departments who have not leveraged their own data analytics skills for increasing the efficiency and effectiveness of compliance efforts to implement very low-cost solutions while achieving high returns on investment. Focusing on understanding how audit performs testing should assist IT organizations in designing their own compliance testing. Multiple examples will be provided to demonstrate how unlocking the potential of small and/or unstructured data and focusing on data relationships will improve overall data integrity and provide quantifiable measures of operational effectiveness.
Gain New Insights by Analyzing Machine Logs using Machine Data Analytics and BigInsights.
Half of Fortune 500 companies experience more than 80 hours of system down time annually. Spread evenly over a year, that amounts to approximately 13 minutes every day. As a consumer, the thought of online bank operations being inaccessible so frequently is disturbing. As a business owner, when systems go down, all processes come to a stop. Work in progress is destroyed and failure to meet SLA’s and contractual obligations can result in expensive fees, adverse publicity, and loss of current and potential future customers. Ultimately the inability to provide a reliable and stable system results in loss of $$$’s. While the failure of these systems is inevitable, the ability to timely predict failures and intercept them before they occur is now a requirement.
A possible solution to the problem can be found is in the huge volumes of diagnostic big data generated at hardware, firmware, middleware, application, storage and management layers indicating failures or errors. Machine analysis and understanding of this data is becoming an important part of debugging, performance analysis, root cause analysis and business analysis. In addition to preventing outages, machine data analysis can also provide insights for fraud detection, customer retention and other important use cases.
Data Quality Management: Cleaner Data, Better Reportingaccenture
This document discusses Accenture's regulatory reporting framework and offerings around data quality management. It provides an overview of Accenture's high-performance financial reporting framework, which aims to consolidate frameworks, processes, and technology to create efficiencies across reporting functions. It also summarizes Accenture's regulatory reporting offerings, including data quality management, capability design, target operating models, and regulatory reporting vendor implementation support. Finally, it covers key aspects of data quality management, such as issue classification, management processes, governance structures, root cause analysis, and issue prioritization. The goal is to help financial institutions improve data quality, reporting accuracy and efficiency.
Architecting the Framework for Compliance & Risk Managementjadams6
Privacy and protection of personal information is a hot topic in data governance. However, the compliance challenge is in creating audit defensibility that ensures practices are compliant and performed in a way that is scalable, transparent, and defensible; thus creating “Audit Resilience.” Data practitioners often struggle with viewing the world from the auditor’s perspective. This presentation focuses on how to create the foundational governance framework supporting a data control model required to produce clean audit findings. These capabilities are critical in a world where due diligence and compliance with best practices are critical in addressing the impacts of security and privacy breaches. The companies in the news recently drive home these points.
Intro of Key Features of Soft CAAT Ent Softwarerafeq
This presentation provides a brief overview of SoftCAAT Ent with use cases. SoftCAAT Ent is a data analytics/BI software used by CAs and CXOs for Assurance, Compliance and Fraud Investigations.
EMA Presentation: Driving Business Value with Continuous Operational Intellig...ExtraHop Networks
In this presentation, EMA Vice President of Research Jim Frey and ExtraHop SVP Erik Giesa explain how IT organizations can derive real-time IT and business insights from their wire data, as well as the unique capabilities included in the fourth-generation ExtraHop platform that make this continuous operational intelligence possible. For more information, visit www.extrahop.com
The document provides an overview of a presentation on using financial analytics for performance management. It discusses trends in business intelligence and analytics, including the increasing involvement of CFOs and a focus on predictive rather than just historical analytics. It also outlines challenges around data management and describes frameworks for building an analytics support center. Finally, it discusses governance issues and provides examples of analytics tools and platforms from vendors like IBM, Oracle, SAP, and Teradata.
The document discusses how internal audit functions can leverage automation, AI, and other technologies to enhance their work. It begins with an overview of how the "audit of the future" may differ from today, with auditors receiving notifications of risks and using automation to complete testing. The rest of the document focuses on supporting technologies like robotic process automation and machine learning that can be used, providing examples. It also discusses how to implement these technologies in a real audit program and the typical progression to full automation. The key takeaways are that internal audit has had automation tools for years but is still in early stages for many, and the first steps to begin are to pick a starting point and define metrics before piloting changes.
Similar to Data Analytics 3 Analytics Techniques (20)
Controls that are designed to mitigate the risk of fraud are not perfect. Enterprise software such as Oracle and SAP may have built-in controls, but they are limited in scope to the data and processes that the software "touches". The most successful fraudsters know how to exploit interfaces between different processes and systems. Furthermore, the typical fraud case persists for 14 months prior to detection*.
Deploying data analytics for continuous testing can overcome many of the limitations of traditional fraud detection. Timely and appropriate detection will help organizations mitigate the impact of frauds. Robust fraud detection systems will also act as powerful deterrents.
*ACFE Report to the Nations: 2020 Global Study on Occupational Fraud and Abuse
Learning Objectives
In this session we will raise awareness of the various types of frauds and how they can be detected using automated data analysis techniques.
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 10
• Handling data subject access requests (DSARs).
• The roles of controllers and processors, and the relationships between them.
• Transferring personal data outside the EU and the mechanisms for compliance.
• How to become GDPR compliant using a compliance gap assessment
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
Join this webinar for an introduction to the Touchstone Research for Internal Audit, an unprecedented, global research of internal audit, from Wolters Kluwer TeamMate. This session will review study approach and scope, key initial findings, a look at benchmarking, and a preview of future insights. Find out what nearly 1,000 internal audit and controls professionals have to say across about the current and future state of internal audit.
Learning Objectives:
Learn the objective of the Touchstone Research for Internal Audit
Understand how the Touchstone Maturity Model can benefit Internal Audit teams
Learn why the Touchstone Research Benchmarks for Internal Audit can be a planning tool
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 9
• Why and how to conduct a data mapping exercise.
• The rights of data subjects.
• Giving and withdrawing consent.
A recent survey report, Fraud in the Wake of COVID-19: Benchmark Report, prepared by the ACFE, explains that recent events have opened the door to increased pressure, reasonings and opportunities that can lead to occupational fraud. Across all classes of fraud schemes 68% of survey respondents reported increases in fraudulent activity as of May 2020 and 93%o reported they expect an increase in fraud over the next 12 months.
To guide auditors in running detective controls, join Mark Nigrini, West Virginia University Professor and author, and Jeffrey Sorensen, Industry Strategist, for an exclusive review of the fingerprints of fraud numbers. This two-person team will review seven categories of fraud numbers and will demonstrate how to identify these types of numbers using audit software.
In this informative and engaging presentation, attendees will:
● Learn the seven categories of fraud numbers
● Understand which categories are linked to specific types of schemes
● Optimize the steps needed to run the tests
● Interpret the results to identify audit targets
● Apply a second layer of steps to reduce the number of false positives
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 8
• The security of personal data.
• An organizational risk management framework.
• Legal requirements for a DPIA.
• How to conduct a DPIA with a DPIA tool.
How to get auditors performing basic analytics using excel Jim Kaplan CIA CFE
It has been said that the definition of crazy is doing the same thing over and over again and expecting a different result. If your audit analytics program is still not meeting your expectations, you are going to have to do something different to change that outcome. The biggest hurdle organizations need to overcome is getting auditors to think differently about what analytics is. Excel might not be the ultimate analytics tool for your organization but attend this webinar to see how you can use it as a catalyst for change throughout the audit team.
Learning Objectives
Learn non-technical skills auditors need to perform audit analytics
Learn commonly used Excel functions that can be applied to audit analytics
Learn how to get auditors started down a path of thinking about analytics vs automatically pulling samples
Learning about outliers and how to detect them in transactions of all types.
Learning Objectives: This webinar will explain the significance of outliers when testing transactions, whether they are vendor invoices, GL postings, or travel & entertainment expenses. Examples using Arbutus Analyzer will demonstrate the best analytics for identifying outliers.
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 14 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
This document provides an agenda and overview of a webinar on lessons learned from the General Data Protection Regulation (GDPR) and applying the GDPR's data protection principles. The webinar agenda includes discussing common data security failures, managing personal data breaches, and the seven data protection principles. It also provides background on the webinar presenter and introduces the company hosting the webinar, AuditNet.
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
Webinar Overview - A look at duplicates testing and the inherent value of fuzzy data matching.
Identifying fuzzy duplicates has never been easier. Arbutus Analyzer’s versatile functionality enables even new users to detect possible duplicate payments, vendors sharing similar addresses among themselves or with your organization’s employees, and counter parties who may be on government watch lists. Our webinar includes nine different scenarios with detailed descriptions of the tests and their results.
You'll learn about:
• Identifying possible risks
• How to deploy Analyzer commands and functions
Key Presenter:
Michael Kano, ACDA, Data Analytics Consultant, Arbutus Analytics
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 6
• The role of the data protection officer (DPO).
• What constitutes personal data.
• Accountability, the privacy compliance framework and a personal information management system (PIMS).
This document summarizes a webinar about using exploratory data analytics to focus an agile audit plan on emerging risks. It discusses dispelling common myths about data analytics and using an example of analyzing employee data to identify potential issues with gender and race pay disparities. The webinar promotes using analytics to enable control owners to conduct ongoing monitoring and shifting the audit's focus to confirming controls are appropriately designed and issues are addressed.
General Data Protection Regulation for Auditors 5 of 10Jim Kaplan CIA CFE
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 5
• Certification against GDPR
• The powers of supervisory authorities
• Lead supervisory authorities
• The role of the European Data Protection Board (EDPB)
From time-to-time internal auditors are faced with situations which call for them to make an ethical decision. In addition, they may, in the middle of auditing, come across circumstances which themselves appear to be violations of a corporate
code-of-conduct.
Several laws now specifically state that internal auditors, in terms of the act, will be bound by the IIA Code of Ethics.
This webinar explores the IIA Code of Ethics as it applies to everyday situations the auditor may encounter.
The module is designed to provide the participants with an in-depth knowledge of:
Ethics theory
The IIA Code of Ethics
Applicable areas within Internal Audit
Reporting of material facts
Corporate Codes of Conduct
Auditing Corporate Ethics
Webinar contents will include:
Classes of Ethics
The role of business
Employee ethics
Honesty, Objectivity and diligence
Conflicts of Interest
Reporting of Material Facts
Corporate Codes of Conduct
Corporate Social Responsibility
How analytics should be used in controls testing instead of sampling Jim Kaplan CIA CFE
Sampling has existed as a standard for controls testing since controls testing began. We’ve developed algorithms to tell us how many samples we should pull and how many errors we can have and still pass the control. We’ve even developed algorithms to tell us how many more samples we can test if the control didn’t pass the first time.
If your goal is simply to do the minimum to pass a SOX audit, then these behaviors should probably continue. If your goals also include really improving the operations of the organization to make it stronger then a more holistic approach is needed, such as analysis on 100% of the population, rather than a small sample.
Most controls analytics do not require a degree in data science, but they do require the controls team begin changing its behaviors. Join us to understand what it takes to begin this change, it’s not as challenging as you might think.
Learning Objectives
Understanding the advantages of analytics vs sampling
How to Identify controls where analytics can be applied
Real life examples of controls and their associated analytics
How to effect a change
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
Sampling has existed as a standard for controls testing since controls testing began. We’ve developed algorithms to tell us how many samples we should pull and how many errors we can have and still pass the control. We’ve even developed algorithms to tell us how many more samples we can test if the control didn’t pass the first time.
If your goal is simply to do the minimum to pass a SOX audit, then these behaviors should probably continue. If your goals also include really improving the operations of the organization to make it stronger then a more holistic approach is needed, such as analysis on 100% of the population, rather than a small sample.
Most controls analytics do not require a degree in data science, but they do require the controls team begin changing its behaviors. Join us to understand what it takes to begin this change, it’s not as challenging as you might think.
Learning Objectives
Understanding the advantages of analytics vs sampling
How to Identify controls where analytics can be applied
Real life examples of controls and their associated analytics
How to effect a change
This document provides an overview of data protection impact assessments (DPIAs) and the role of the data protection officer (DPO) under the General Data Protection Regulation (GDPR). It discusses when DPIAs are required, the DPIA process, how to identify and assess risks, select controls, and ensure continuous monitoring. It also outlines the DPO requirements, including the need for independence and expertise. The DPO is responsible for enabling compliance and fostering a data protection culture.
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 12 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 3
• Data protection by design
• Securing personal data
• Reporting data breaches
Build applications with generative AI on Google CloudMárton Kodok
We will explore Vertex AI - Model Garden powered experiences, we are going to learn more about the integration of these generative AI APIs. We are going to see in action what the Gemini family of generative models are for developers to build and deploy AI-driven applications. Vertex AI includes a suite of foundation models, these are referred to as the PaLM and Gemini family of generative ai models, and they come in different versions. We are going to cover how to use via API to: - execute prompts in text and chat - cover multimodal use cases with image prompts. - finetune and distill to improve knowledge domains - run function calls with foundation models to optimize them for specific tasks. At the end of the session, developers will understand how to innovate with generative AI and develop apps using the generative ai industry trends.
Open Source Contributions to Postgres: The Basics POSETTE 2024ElizabethGarrettChri
Postgres is the most advanced open-source database in the world and it's supported by a community, not a single company. So how does this work? How does code actually get into Postgres? I recently had a patch submitted and committed and I want to share what I learned in that process. I’ll give you an overview of Postgres versions and how the underlying project codebase functions. I’ll also show you the process for submitting a patch and getting that tested and committed.
The Ipsos - AI - Monitor 2024 Report.pdfSocial Samosa
According to Ipsos AI Monitor's 2024 report, 65% Indians said that products and services using AI have profoundly changed their daily life in the past 3-5 years.
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...sameer shah
"Join us for STATATHON, a dynamic 2-day event dedicated to exploring statistical knowledge and its real-world applications. From theory to practice, participants engage in intensive learning sessions, workshops, and challenges, fostering a deeper understanding of statistical methodologies and their significance in various fields."
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeWalaa Eldin Moustafa
Dynamic policy enforcement is becoming an increasingly important topic in today’s world where data privacy and compliance is a top priority for companies, individuals, and regulators alike. In these slides, we discuss how LinkedIn implements a powerful dynamic policy enforcement engine, called ViewShift, and integrates it within its data lake. We show the query engine architecture and how catalog implementations can automatically route table resolutions to compliance-enforcing SQL views. Such views have a set of very interesting properties: (1) They are auto-generated from declarative data annotations. (2) They respect user-level consent and preferences (3) They are context-aware, encoding a different set of transformations for different use cases (4) They are portable; while the SQL logic is only implemented in one SQL dialect, it is accessible in all engines.
#SQL #Views #Privacy #Compliance #DataLake
End-to-end pipeline agility - Berlin Buzzwords 2024Lars Albertsson
We describe how we achieve high change agility in data engineering by eliminating the fear of breaking downstream data pipelines through end-to-end pipeline testing, and by using schema metaprogramming to safely eliminate boilerplate involved in changes that affect whole pipelines.
A quick poll on agility in changing pipelines from end to end indicated a huge span in capabilities. For the question "How long time does it take for all downstream pipelines to be adapted to an upstream change," the median response was 6 months, but some respondents could do it in less than a day. When quantitative data engineering differences between the best and worst are measured, the span is often 100x-1000x, sometimes even more.
A long time ago, we suffered at Spotify from fear of changing pipelines due to not knowing what the impact might be downstream. We made plans for a technical solution to test pipelines end-to-end to mitigate that fear, but the effort failed for cultural reasons. We eventually solved this challenge, but in a different context. In this presentation we will describe how we test full pipelines effectively by manipulating workflow orchestration, which enables us to make changes in pipelines without fear of breaking downstream.
Making schema changes that affect many jobs also involves a lot of toil and boilerplate. Using schema-on-read mitigates some of it, but has drawbacks since it makes it more difficult to detect errors early. We will describe how we have rejected this tradeoff by applying schema metaprogramming, eliminating boilerplate but keeping the protection of static typing, thereby further improving agility to quickly modify data pipelines without fear.
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Kaxil Naik
Navigating today's data landscape isn't just about managing workflows; it's about strategically propelling your business forward. Apache Airflow has stood out as the benchmark in this arena, driving data orchestration forward since its early days. As we dive into the complexities of our current data-rich environment, where the sheer volume of information and its timely, accurate processing are crucial for AI and ML applications, the role of Airflow has never been more critical.
In my journey as the Senior Engineering Director and a pivotal member of Apache Airflow's Project Management Committee (PMC), I've witnessed Airflow transform data handling, making agility and insight the norm in an ever-evolving digital space. At Astronomer, our collaboration with leading AI & ML teams worldwide has not only tested but also proven Airflow's mettle in delivering data reliably and efficiently—data that now powers not just insights but core business functions.
This session is a deep dive into the essence of Airflow's success. We'll trace its evolution from a budding project to the backbone of data orchestration it is today, constantly adapting to meet the next wave of data challenges, including those brought on by Generative AI. It's this forward-thinking adaptability that keeps Airflow at the forefront of innovation, ready for whatever comes next.
The ever-growing demands of AI and ML applications have ushered in an era where sophisticated data management isn't a luxury—it's a necessity. Airflow's innate flexibility and scalability are what makes it indispensable in managing the intricate workflows of today, especially those involving Large Language Models (LLMs).
This talk isn't just a rundown of Airflow's features; it's about harnessing these capabilities to turn your data workflows into a strategic asset. Together, we'll explore how Airflow remains at the cutting edge of data orchestration, ensuring your organization is not just keeping pace but setting the pace in a data-driven future.
Session in https://budapestdata.hu/2024/04/kaxil-naik-astronomer-io/ | https://dataml24.sessionize.com/session/667627
1. 3/27/2019
1
Data Analytics - 3
Analytics Techniques
based on Data Analytics for
Internal Auditors
by Richard Cascarino
About Jim Kaplan, CIA, CFE
President and Founder of AuditNet®,
the global resource for auditors (now
available on iOS, Android and
Windows devices)
Auditor, Web Site Guru,
Internet for Auditors Pioneer
Recipient of the IIA’s 2007 Bradford
Cadmus Memorial Award.
Author of “The Auditor’s Guide to
Internet Resources” 2nd Edition
Page 2
1
2
2. 3/27/2019
2
About AuditNet® LLC
• AuditNet®, the global resource for auditors, is available on the
Web, iPad, iPhone, Windows and Android devices and features:
• Over 3,000 Reusable Templates, Audit Programs,
Questionnaires, and Control Matrices
• Training without Travel Webinars focusing on fraud, data
analytics, IT audit, and internal audit
• Audit guides, manuals, and books on audit basics and using
audit technology
• LinkedIn Networking Groups
• Monthly Newsletters with Expert Guest Columnists
• Surveys on timely topics for internal auditors
• NASBA Approved CPE Sponsor
Introductions
Page 3
The views expressed by the presenters do not necessarily represent
the views, positions, or opinions of AuditNet® LLC. These materials,
and the oral presentation accompanying them, are for educational
purposes only and do not constitute accounting or legal advice or
create an accountant-client relationship.
While AuditNet® makes every effort to ensure information is
accurate and complete, AuditNet® makes no representations,
guarantees, or warranties as to the accuracy or completeness of the
information provided via this presentation. AuditNet® specifically
disclaims all liability for any claims or damages that may result from
the information contained in this presentation, including any
websites maintained by third parties and linked to the AuditNet®
website.
Any mention of commercial products is for information only; it does
not imply recommendation or endorsement by AuditNet® LLC
3
4
3. 3/27/2019
3
About Richard Cascarino, MBA,
CIA, CISM, CFE, CRMA
• Principal of Richard Cascarino &
Associates based in Colorado USA
• Over 28 years experience in IT audit
training and consultancy
• Past President of the Institute of
Internal Auditors in South Africa
• Member of ISACA
• Member of Association of Certified
Fraud Examiners
• Author of Data Analytics for Internal
Auditors
5
Today’s Agenda
Analysis of Big Data
Big Data Structures
OLAP
Statistical Analysis and Big Data
Results Analysis and Validation
Substantive Analytical Procedures
Validation
Questionnaire Analysis and Likert Scales
Statistical Reliability Analysis
Fraud Detection using Data Analysis
Red Flags and Indicators
Nature of Computer Fraud
Seeking Fraud Evidence
Planning the Fraud Analysis
Common mistakes in Forensic Analysis
Root Cause Analysis
Page 6
5
6
4. 3/27/2019
4
Apache Hadoop
Hadoop Common - contains libraries and utilities
needed by other Hadoop modules
Hadoop Distributed File System (HDFS) - a distributed
file-system that stores data on commodity machines,
providing very high aggregate bandwidth across the
cluster.
Hadoop YARN - a resource-management platform
responsible for managing compute resources in clusters
and using them for scheduling of users' applications.
Hadoop MapReduce - a programming model for large
scale data processing.
Hadoop Core Components
Hadoop Distributed File System (HDFS)
Massive redundant storage across a
commodity cluster
MapReduce
Map: distribute a computational problem
across a cluster
Reduce: Master node collects the
answers to all the sub-problems and
combines them
Many distros available
7
8
5. 3/27/2019
5
Hadoop & Databases
Deficiencies of Traditional
Approach
Retrospective view
analysis frequently occurs long after transaction has
taken place, too late for action
Lack of timely visibility into control risks and
deficiencies
Alternatively
Independently test all transactions for compliance with
controls at, or soon after, point at which they occur
Not feasible with Big Data
9
10
6. 3/27/2019
6
Control Objectives
Haven’t Changed
Accuracy
Authorization
Completeness
Validity
Efficiency and Effectiveness
Segregation of Duties
Regulatory Compliance
Continuous Auditing can
be used for
Continuous control assessment
Identification of control deficiencies
Identification of fraud, waste, abuse
Continuous risk assessment
Examination of consistency of processes
Development of enterprise audit plan
Support to individual audits
Follow-up on audit recommendations
11
12
7. 3/27/2019
7
Required to Audit /Examine
Identify the control objectives for each business process
area
Establish tests that, using transactional data analysis, will
validate the achievement of each control objective
Establish tests that will identify suspect transactions, using
transactional profiling techniques
Subject all transactions to a test bed of interrogations on a
regular, timely basis
Identify all transactions that fail the metrics
Notify the appropriate personnel
Investigate any discrepancies and, as appropriate,
Correct the transactions
Correct the control problem
Required of Continuous
Auditing
Able to access and normalize disparate data from across the
enterprise
Offer comprehensive range of tests to effectively address
control objectives
Provide flexibility of tests as control opportunities change
Provide timely testing of data and reporting of results
Handle large transactional volumes with no negative impact
on operational system performance
Provide variable parameters for tests
Provide for alert notifications
Maintain security and integrity of tests and results
13
14
8. 3/27/2019
8
Challenges for the Auditor /
Examiner
Obtaining appropriate data access
Defining appropriate measurement metrics
Setting appropriate thresholds for exceptions
reporting
Developing appropriate metrics to prioritize
exceptions
Minimizing impact on systems’ operational
performance
Where to Start
Establish audit objectives and requirements
Gain executive-level support
Ascertain degree to which management is
performing monitoring role
Select appropriate technology solutions
Identify information sources and gain access
Understand business processes and identify
key controls and risks
Build audit skill set
Manage and report results
15
16
9. 3/27/2019
9
Implement Repetitive Scripts
Timing
Extensive front-end work required
Monitoring of system changes
Alarm based intervention
Defining the appropriate metrics
Automated interim work
Continuous confirmation
Detailed testing only when exceptions noted
17
18
10. 3/27/2019
10
OLAP Conceptual Data Model
Goal of OLAP is to support ad-hoc querying for the
business analyst
Business analysts are familiar with spreadsheets
Extend spreadsheet analysis model to work with
warehouse data
Multidimensional view of data is the foundation of
OLAP
OLAP
Data Warehouse vs. Data Marts
20
CS 336
Enterprise warehouse: collects all information about subjects
(customers,products,sales,assets, personnel) that span
the entire organization
Requires extensive business modeling (may take years to design and
build)
Data Marts: Departmental subsets that focus on selected
subjects
Marketing data mart: customer, product, sales
Faster roll out, but complex integration in the long run
Virtual warehouse: views over operational dbs
Materialize sel. summary views for efficient query processing
Easy to build but require excess capability on operat. db servers
19
20
11. 3/27/2019
11
On-Line Transaction Processing (OLTP):
technology used to perform updates on operational
or transactional systems (e.g., point of sale
systems)
On-Line Analytical Processing (OLAP):
technology used to perform complex analysis of
the data in a data warehouse
OLAP is a category of software technology that enables
analysts, managers, and executives to gain insight into data
through fast, consistent, interactive access to a wide variety of
possible views of information that has been transformed from
raw data to reflect the dimensionality of the enterprise as
understood by the user. [source: OLAP Council:
www.olapcouncil.org]
OLTP vs. OLAP
OLTP vs. OLAP
Clerk, IT Professional
Day to day operations
Application-oriented (E-R
based)
Current, Isolated
Detailed, Flat relational
Structured, Repetitive
Short, Simple transaction
Read/write
Index/hash on prim. Key
Tens
Thousands
100 MB-GB
Trans. throughput
Knowledge worker
Decision support
Subject-oriented (Star,
snowflake)
Historical, Consolidated
Summarized, Multidimensional
Ad hoc
Complex query
Read Mostly
Lots of Scans
Millions
Hundreds
100GB-TB
Query throughput, response
User
Function
DB Design
Data
View
Usage
Unit of work
Access
Operations
# Records accessed
#Users
Db size
Metric
OLTP OLAP
Source: Datta, GT
21
22
12. 3/27/2019
12
Approaches to OLAP
Servers
Multidimensional OLAP (MOLAP)
Array-based storage structures
Direct access to array data structures
Example: Essbase (Arbor)
Relational OLAP (ROLAP)
Relational and Specialized Relational DBMS to store and
manage warehouse data
OLAP middleware to support missing pieces
Optimize for each DBMS backend
Aggregation Navigation Logic
Additional tools and services
Example: Microstrategy, MetaCube (Informix)
The Complete Decision Support
System
24
Information Sources Data Warehouse
Server
(Tier 1)
OLAP Servers
(Tier 2)
Clients
(Tier 3)
Operational
DB’s
Semistructured
Sources
extract
transform
load
refresh
etc.
Data Marts
Data
Warehouse
e.g., MOLAP
e.g., ROLAP
serve
Analysis
Query/Reporting
Data Mining
serve
serve
23
24
13. 3/27/2019
13
Tools: Warehouse Servers
The RDBMS dominates:
Oracle 8i/9i
IBM DB2
Microsoft SQL Server
Informix (IBM)
Red Brick Warehouse (Informix/IBM)
NCR Teradata
Sybase…
Tools: OLAP Servers
Support multidimensional OLAP queries
Often characterized by how the underlying data stored
Relational OLAP (ROLAP) Servers
Data stored in relational tables
Examples: Microstrategy Intelligence Server, MetaCube
(Informix/IBM)
Multidimensional OLAP (MOLAP) Servers
Data stored in array-based structures
Examples: Hyperion Essbase, Fusion (Information Builders)
Hybrid OLAP (HOLAP)
Examples: PowerPlay (Cognos), Brio, Microsoft Analysis
Services, Oracle Advanced Analytic Services
25
26
14. 3/27/2019
14
Statistical Analysis
Big Data and Analytics is generally thought to be about:
Business Intelligence and Analytics
Computational Science
But also includes:
Demographic Analysis
Geointelligence: Spatial Analysis
The Grand Challenges in Science
Medicine: Processing 3-D hyperspectral high resolution images for
diagnostics, genomic research, Proteonomics, etc.
Media Analysis: Processing text, audio, video, imagery
And much, much more …..
Advanced Analytics
Go beyond data mining and statistical processing methods
encompass logic-based methods, qualitative analytics, and non-
statistical quantitative methods.
Diverse set of techniques that require new software
architectures and application frameworks to solve complex
problems.
New metrics focus on the contributions of the value of the
analysis as a holistic result are required to assess and
evaluate the outcomes of advanced analytics.
28
27
28
15. 3/27/2019
15
Types of Analytics
Descriptive: A set of techniques for reviewing and examining the data
set(s) to understand the data and analyze business performance.
Diagnostic: A set of techniques for determine what has happened and
why
Predictive: A set of techniques that analyze current and historical data to
determine what is most likely to (not) happen
Prescriptive: A set of techniques for computationally developing and
analyzing alternatives that can become courses of action – either tactical
or strategic – that may discover the unexpected
Decisive: A set of techniques for visualizing information and
recommending courses of action to facilitate human decision-making when
presented with a set of alternatives.
30
Analytics and Assertions
Assertions
Existence or Occurrence
Completeness
Rights & Obligations
Valuation or Allocation
Presentation & Disclosure
29
30
16. 3/27/2019
16
31
Substantive Tests
Tests of details
Transactions
Balances
Analytical tests
32
Analytical Procedures
Evaluations of financial information made by
a study of plausible relationships among both
financial and nonfinancial data
SAS No. 56
31
32
17. 3/27/2019
17
33
Tests of Details VS. Analytical
Tests
Comparisons
Tests of details tests all 5 assertions but
analytical procedures do not support existence or
rights & obligations
Analytical procedures are high level tests
Tests of details lead to conclusions about
aggregated data but analytical procedures test
aggregated data
GBW 8th ed., Ch. 6
Types of Analytical Procedures
Trend analysis
Ratio analysis
Activity ratios
Profitability ratios
Liquidity ratios
Solvency ratios
Modeling
Statistical tests, i.e., regression
33
34
18. 3/27/2019
18
Data Validation
Process by which the auditor verifies the
accuracy and completeness of information
obtained or derived prior to analysis
Inconsistencies identified at this stage need
to be examined and, where appropriate,
corrected prior to the actual analysis taking
place
35
Validation may be done by
Data Type Validation
Format checking
Length checking
Existence checks
Range checks
Cross-reference verification
Referential integrity validation
Check digit validation
Data Cardinality
Hash checking
Data field uniqueness validation
36
35
36
19. 3/27/2019
19
Questionnaire Analysis and
Likert Scales
37
Likert
commonly associated with interval data
The difference between +2 and +1 is the same
as the difference between +1 and 0)
Although the response levels have relative
position they are not interval scales and cannot
be treated as such from a statistical standpoint
Average of Strongly Agree and Agree cannot be
said to be Agree and ½
38
37
38
20. 3/27/2019
20
Statistical Reliability
Whether it produces identical results in
repeated applications
Stability
Ensuring consistent results with repeated measurement on the same scale
Equivalence
Determining how much error was introduced by different investigators or different
samples
Internal Consistency
Considers the consistency or homogeneity among the items of an instrument
External Validity measures the ability to be
generalised
39
Internal Validity
Content or Face Validity
determines whether the measuring instrument provides
adequate coverage of the topic
Criterion-related Validity
determines the success of the measures used for
empirical estimating purposes
Construct Validity
both Convergent and Discriminant involve comparison to
previously assessed results
Measured by: Cronbach’s alpha (or coefficient
alpha)
40
39
40
21. 3/27/2019
21
“Fraud and deceit abound in
these days more than in
former times”.
SIR EDWARD COKE Twyne's Case (1602)
Occupational Fraud and Abuse
Asset
Misappropriations
Corruption
Fraudulent
Statements
Conflicts
of Interest
Bribery
Illegal
Gratuities
Economic
Extortion
Inventory &
All Other Assets
Cash
Nonfinancial
Financial
41
42
22. 3/27/2019
22
Jargon
Skimming: Taking funds before they are recorded into company records
Cash Larceny: Taking funds (e.g., check) that company recorded as going
to another party
Lapping: Theft is covered with another person’s check (and so on)
Check Tampering: Forged or altered check for gain
Shell Company: Payments made to fake company
Payroll Manipulation: Ghost employees, falsified hours, understated
leave/vacation time
Fraudulent Write-off: Useful assets written off as junk
Collusion: Two or more employees or employee & vendor defraud together
False Shipping Orders or Missing/Defective Receiving Record: Inventory
theft
43
Nature of Computer Fraud
Trojan Horse / Logic Bombs / Trap Doors
Use of Unauthorized Coding
Salami Techniques
A small amount from everyone
Viruses
Mainframe as well as Micro
Sabotage and Industrial Espionage
Degrading Systems Performance
Leaking Confidential Information
Management Fraud
Cooked Books
44
43
44
23. 3/27/2019
23
Fraud Example
45
Dummy 1 Dummy 5Dummy 2 Dummy 3 Dummy 4
Customer
Account
Aus UK Switz HK USA
Timescale
Over 15 years
Discovered by accident
+/- $ 300m
Multiple Country
Multiple Banks
Using a variety of IT
46
45
46
27. 3/27/2019
27
IT Forensic Jargon
Evidence media
The original media to be investigated
Target media
the media duplicated onto
Restored image
copy of the forensic image restored to its original bootable form
Native operating system
the OS used on the restored image
Live analysis
analysis conducted on the actual evidence media
Offline analysis
analysis conducted using the target media or restored image
53
Forensic Analysis
Physical Analysis
String search DOS-based StringSearch - http://www.maresware.com
Search and extract
eg $4A $46 $49 $46 $00 $01 is start of a JPEG file
http://www.wotsit.org
File slack and free space extraction
http://www.nti.com
Logical Analysis
Logical File space
Slack space
Unallocated space
54
53
54
28. 3/27/2019
28
Computer Evidence...
...is like any other evidence, it must be:
admissible
authentic
accurate
complete
convincing to juries
Computer Evidence...
authentic
can we explicitly link files, data to specific
individuals and events?
access control
logging, audit logs
collateral evidence
crypto-based authentication
55
56
29. 3/27/2019
29
Computer Evidence...
accurate
reliability of computer process not data content
can we explain how an exhibit came into being?
what does the computer system do?
what are its inputs?
what are the internal processes?
what are the controls?
58
Authentication
Must offer evidence “sufficient to support a finding that the [computer
record or other evidence] in question is what its proponent claims.”
Degree of authentication does not vary simply because a record
happens to be (or has been at one point) in electronic form
Challenges to authenticity
Were the records altered, manipulated or damaged after they were
created?
Courts are skeptical of unsupported claims or alteration
Reliability of the computer program that generated the records
Program routinely relied upon in the normal course of business
Identity of the author of the records
Corroborate with circumstantial evidence
57
58
30. 3/27/2019
30
59
Hearsay Problems
Computer records may or may not be “hearsay
evidence”
Contents of records with assertions attributed to a third
party and presented as evidence may be considered
hearsay
Documents written by a person and produced by the computer
Computer generated records where humans were not
involved in any way (i.e., internally generated by the
computer) are not hearsay
Logs
The Business Records Rule
“Records of regularly conducted activity. A memorandum, report,
record, or data compilation, in any form, of acts, events, conditions,
opinions, or diagnoses, made at or near the time by, or from
information transmitted by, a person with knowledge, if kept in the
course of a regularly conducted business activity, and if it was the
regular practice of that business activity to make the memorandum,
report, record, or data compilation, all as shown by the testimony of
the custodian or other qualified witness, or by certification that
complies with Rule 902(11),Rule 902(12), or a statute permitting
certification, unless the source of information or the method or
circumstances of preparation indicate lack of trustworthiness.”
-- Fed. R. Evid. 803(6)
60
59
60
31. 3/27/2019
31
Common Mistakes
Ensure that proper documentation is maintained of
all processes carried out in the execution of the
analysis
Failing to control the digital
Altering date and time stamps on evidence systems
before recording them
Using un-trusted commands and tools
Accidentally overwriting evidence when installing
audit interrogation tools
Termination of rogue processes prematurely
61
“It’s just a non-transaction.
It’s an error. It’s a back office
glitch. Don’t worry about it!”
JAMES BAX (BARINGS BANK)
61
62
32. 3/27/2019
32
Root Cause Analysis
The fishbone diagram (Ishikawa Diagram)
63
Root Cause Analysis
Process mapping
each step of a process is mapped out so that problem
areas/bottlenecks in the process can be identified and improved.
The five why’s
asking the question why something has happened five times – each
times drilling down further to get to the root cause of the problem.
Tree diagrams
in which the auditor will state the problem with causes listed as
branches to the right of the problem. Causes continue to be clarified
drawing additional branches to the right until each branch reaches its
logical end.
64
63
64
33. 3/27/2019
33
Root Cause Analysis
Event and causal factor analysis
An extended version of the Ishikawa diagram
used for multifaceted problems or for the analysis of long and
complex causal factor chains
Pareto analysis
named after the Italian economist Vilfredo Pareto (1907)
described the unequal wealth of the country in terms that 20% of
the population owned 80% of the resources
Change analysis
used when a problem is obscure, typically a single occurrence, and
focuses on those items in the environment which have changed since
the non-problematic state
65
Questions?
Any Questions?
Don’t be Shy!
65
66
34. 3/27/2019
34
AuditNet® and cRisk Academy
If you would like
forever access to this
webinar recording
If you are watching
the recording, and
would like to obtain
CPE credit for this
webinar
Previous AuditNet®
webinars are also
available on-demand
for CPE credit
http://criskacademy.com
http://ondemand.criskacade
my.com
Use coupon code: 50OFF
for a discount on this
webinar for one week
Thank You!
Jim Kaplan
AuditNet® LLC
1-800-385-1625
Email:info@auditnet.org
www.auditnet.org
Follow Me on Twitter for Special Offers - @auditnet
Join my LinkedIn Group –
https://www.linkedin.com/groups/44252/
Like my Facebook business page
https://www.facebook.com/pg/AuditNetLLC
Richard Cascarino & Associates
Cell: +1 970 819 7963
Tel +1 303 747 6087 (Skype Worldwide)
Tel: +1 970 367 5429
eMail: rcasc@rcascarino.com
Web: http://www.rcascarino.com
Skype: Richard.Cascarino
Page 68
67
68