SlideShare a Scribd company logo
4/27/2015
1
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
AuditNet® Training without Travel™
Audit Use of CAATs May 5 2015
Guest Presenter:
Richard Cascarino,
MBA, CIA, CISM, CFE
Richard Cascarino &
Associates
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Jim Kaplan CIA CFE
• President and Founder of
AuditNet®, the global resource
for auditors (now available on
Apple and Android and Windows
devices)
• Auditor, Web Site Guru,
• Internet for Auditors Pioneer
• Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
• Author of “The Auditor’s Guide
to Internet Resources” 2nd
Edition
4/27/2015
2
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Richard Cascarino MBA CIA CISM CFE
• Principal of Richard Cascarino &
Associates based in Colorado USA
• Over 30 years experience in IT
audit training and consultancy
• Past President of the Institute of
Internal Auditors in South Africa
• Member of ISACA
• Member of Association of Certified
Fraud Examiners
• Author of Auditor's Guide to IT
Auditing
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Webinar Housekeeping
• This webinar and its material are the property of AuditNet® and Richard Cascarino
and Associates. Unauthorized usage or recording of this webinar or any of its material
is strictly forbidden. We are recording the webinar and you will be provided with a link
access to that recording as detailed below. Downloading or otherwise duplicating the
webinar recording is expressly prohibited.
• Webinar recording link will be sent via email within 5-7 business days.
• NASBA rules require us to ask polling questions during the Webinar and CPE
certificates will be sent via email to those who answer ALL the polling questions
• The CPE certificates and link to the recording will be sent to the email address you
registered with in GTW. We are not responsible for delivery problems due to spam
filters, attachment restrictions or other controls in place for your email client.
• Submit questions via the chat box on your screen and we will answer them either
during or at the conclusion.
• After the Webinar is over you will have an opportunity to provide feedback. Please
complete the feedback questionnaire to help us continuously improve our Webinars
• If GTW stops working you may need to close and restart. You can always dial in and
listen and follow along with the handout.
4/27/2015
3
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Disclaimers
• The views expressed by the presenters do not necessarily represent the
views, positions, or opinions of AuditNet® or the presenters’ respective
organizations. These materials, and the oral presentation accompanying
them, are for educational purposes only and do not constitute accounting
or legal advice or create an accountant-client relationship.
• While AuditNet® makes every effort to ensure information is accurate and
complete, AuditNet® makes no representations, guarantees, or warranties
as to the accuracy or completeness of the informationprovided via this
presentation. AuditNet® specificallydisclaims all liability for any claims or
damages that may result from the informationcontained in this
presentation, including any websites maintained by third parties and
linked to the AuditNet® website
• Any mention of commercialproducts is for information only; it does not
imply recommendationor endorsement by AuditNet®
Today’s Agenda
• System testing techniques
• Computerized application systems
• Non-computerized systems
• CAAT types
• Source code review
• Use of Test Data
• Parallel Simulation
• Integrated Test Facilities
• Snapshot Techniques
• SCARF
• Retrieval Software
• Generalized Audit Software
• Specialized Audit Software
• Utility Software
• ACL
• IDEA
4/27/2015
4
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Testing of Computerized
Systems
7
What is a "System"
–Manual - pre-computer
–Computer Application
–Computer Environment
–Manual - post-computer
–Integrated Systems
All subject to control
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Manual – Pre-Computer
8
Business Control Objectives
Control normally exercised by:
–Supervision
–Authorization
–Authentication
–Procedures
4/27/2015
5
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Computer Applications
9
–Control objectives have not changed
–Control points may vary
–Controls themselves may be:
Computerized
Manual
–Effective / Efficient trade-off
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Application Controls
10
–Prime Areas
Recording, Classifying and Summarizing
Authorized Transactions
Updating Files
Reporting the results of processing
–Can data be relied upon? - Is it :
Complete
Accurate
Valid
4/27/2015
6
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Computer Environment
11
–Operating Environment
Operating System
Networking Software
Database Management Systems
–Control Environment
Operation Controls
Change Control
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Operations Controls
12
–Custodial Controls
Physical Site Controls
Operations Standards and Procedures
Library and File Controls
Backup / Restart Controls
Disaster Recovery Planning
4/27/2015
7
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Supervisory Controls
13
–Run Schedules
–Checklists
–Exception Reports
–Reconciliation Procedures
–Log Books
–Computer Logs
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Administrative Controls Cover
14
–Reliability of Information
–Timeliness
–Nature and type of Information
–Speed of Error Detection / Correction
–Appropriateness of Management
Decisions
4/27/2015
8
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Integrity Controls Include
15
–Implementation Controls
–Program Security Controls
–Computer Operation Controls
–Data File Security Controls
–System Software Controls
–Change Control
When Changes are made is Risk Controlled or Introduced?
Are Changes Authorized?
Are Authorized Changes Carried Out
Are Changes Controlled or Recorded?
Who Does the Changes?
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 1
4/27/2015
9
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Selecting Controls for Testing
17
–Establish "prime" Controls for an Area
–Identify Controls covering several Areas
–Identify Stand-alone Controls
–Controls which provide Evidence
–Do NOT try to prove a Negative
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Primary Areas of Concern
18
–Complex Systems cannot be re-created manually
–Many computer records are intelligible only to
computers
–Most systems allow multiple access
–"Computers can be trusted"
–Disasters really mean Disaster
4/27/2015
10
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Control Concepts and IT
19
–Extent of manual controls reduced
–Sources of data have shifted
–Transaction trails may be discontinuous
–Control points have migrated
–Opportunities for human judgment are less
–Documentation becomes critical
Lack of hard-copy audit trails
Continuity Control
Maintenance Control
–Data Custody Shifted
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Logical vs. Technical Controls
20
Logical Controls are :
–Business controls
–Functional in nature
–Either people or computer enforced
Technical controls are concerned with
technical complexities (e.g. parity
controls)
4/27/2015
11
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Automated Tools (CAATs)
21
Test Data Generators
Flowcharting Packages
Specialized Audit Software
Generalized Audit Software
Utility Programs
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Specialized Audit Software
22
Can accomplish any audit task but
–High development and maintenance cost
–Require specific I.S. skills
–Must be "verified" if not written by the auditor
–High degree of obsolescence
4/27/2015
12
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Generalized Audit Software
23
"Prefabricated" audit tests
Each use is a one-off
Auditor has direct control
Lower development cost
Fast to implement
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Application of GAS
24
Detective examination of files
Verification of processing controls
File interrogations
Management inquiries
4/27/2015
13
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 2
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Types of Audit Software
26
Program generators
Macro languages
Audit-specific tools
Data downloaders
Micro-based software
4/27/2015
14
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Hardware / Software
Compatibility (Desirable)
27
–Across manufacturers
–Across operating environments
–Across machine size
–Mainframe / mini / micro
There are some about
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Audit Software Functions
28
File access
Arithmetic operations
Logic operations
Record handling
Update
Output
Statistical Sampling
File comparison
Graphics
4/27/2015
15
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Determining the Appropriate
CAAT
29
Depends on the Audit Objective and
selected technique
Application Audit Techniques
Purposes
–1 To verify processing operation
–2 To verify the results of processing
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Areas of Control in IT Systems
30
–Application controls - unique to individual
user systems
–Systems development controls - assuring
systems are likely to fulfill objectives
–Physical controls - controlling operating
environment
–System integrity controls - securing the
logical environment
–A balance must be struck
4/27/2015
16
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 3
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
CAAT Types and Their Usage
32
–Application audit tools are not always CAATs
–"Any tangible aid that assists an auditor"
Tools to obtain information
Tools to evaluate controls
Tools to verify controls
Automated tools
4/27/2015
17
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Obtaining Information
33
–Interviews
–Questionnaires
–Analytical audit flowcharts
–Flowcharting software
–Documentation Review
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Control Evaluation
34
Application control matrix
–Components
–Concerns
Adequate
Inadequate
4/27/2015
18
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Cascarino Cube
35
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Control Verification
36
Audit around
Test data
Re-performance of key functions
Reprocess selected items
4/27/2015
19
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Source code review
–Requires programming skill
–Slow
–Expensive
–Boring
–Proves little
–May be useful for specialized review
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Confirmation of Results
38
e.g. Debtors certification
–Slow
–Uncertain
–Only shows up errors in your favor
–Very labor intensive
4/27/2015
20
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Test Data
39
–Selected to test both correct data and errors
–Require little technical background
but Lacks Objectivity
–Influenced by what is expected
–Assumes program tested is "LIVE" program
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Integrated Test Facility (ITF)
40
–Establishes a "dummy" entity
–Process data together with live data
–Excluded from live results
–Under the auditor's control but
–May result in system catastrophe
4/27/2015
21
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Advantages of an ITF
41
–Little technical training required
–Low processing cost
–Tests system as it routinely operates
–Understood by all involved
–Tests manual function as well as computer
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Disadvantages of an ITF
42
–ITF transactions must be removed before
they interfere with live totals
–High cost if live systems require
modification to implement
–Test data affects live files - danger of
destruction
–Difficult to identify all exception
conditions
–Quantity of test data will be limited
4/27/2015
22
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Snapshot Technique
43
–A form of transaction trail
–Identifiable inputs "tagged"
–Trail produced for all processing logic
–Useful in high-volume systems
–Used extensively by I.S. staff in testing
systems
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Sampling
44
–"Liars, Damned Liars and Statistics"
–A tool for audit quality control
–May be the only tool possible in a high-volume
system
–Not well understood by auditors
–At computer speeds 100% sampling may be
practicable
May not be desirable
4/27/2015
23
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Types of Stat Sampling e.g.
45
–Attributes Sampling
–Variables Sampling
–Systematic selection
–Random selection
–Stratified random selection
–Discovery sampling
–Stop-go sampling
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Parallel Simulation
46
Uses same input data
Uses same files
Uses different programs
From a different source
To produce the same results?
4/27/2015
24
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 4
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Common CAAT Problems
48
–Getting the wrong files
–Getting the wrong layout
–Documentation is out of date
–Prejudging results
Never believe what the first printout tells you
4/27/2015
25
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
In any Application System
49
–Try to identify the controls the user relies on
–Documentation is often misleading
–Not everything needs to be audited
–Program logic mirrors business logic
–You can always ask for help
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Industry-Related Software
50
–Audit procedures commonly available for:
Accounts receivable
Payroll
General ledger
Inventory
–May be customizable
–Industry-related audit software available for:
Insurance
Health care
Financial services
4/27/2015
26
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Industry- Related Drawbacks
51
–Requires
Conversion of input to standard
package layouts
Selection of appropriate parameters
A degree of IS skill for conversion
–Software itself normally
Cost-effective
Efficient
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Customized Audit Software
52
–To run in unique circumstances
–To perform unique audit tests
–To produce output in unique formats
–Expensive to develop
–Normally require a high level of IS skills
–May not tell you what you think they do
–May be the only viable solution
4/27/2015
27
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Information Retrieval Software
–Report writers and Query Languages
–Not specifically written for auditors
–Can perform many common audit routines
–Includes
Report writers
Program generators
4th generation languages
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Generalized Audit Software
54
–Designed specifically for auditors
–Potential uses
Examine records
Test calculations and make computations
Compare data on separate files
Select and print audit samples
Summarize or re-sequence data
Perform analyses
Compare audit data to other sources
4/27/2015
28
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Generalized Audit Software
Benefits
55
Handling of volumes
Output can be used for further computer
processing
Time to audit can be reduced
Auditor freed to spend time interpreting
results
Limited programming skills required
Audit reliance on IS staff reduced
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Generalized Audit Software
Limitations
56
Hardware and software environments may
be restrictive
Number of files handle able may be
restrictive
Types of record structures may not be
comprehensive
Number of computations may be limited
Number of reports per "pass" may be
restrictive
4/27/2015
29
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 5
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Excel as a CAAT
58
4/27/2015
30
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
ACL as a CAAT
59
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Idea as a CAAT
7
4/27/2015
31
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Importing the Data
61
 Bring a copy to the audit machine
Copies can be reanalyzed later if need be
Live data moves on
You cannot corrupt live data working on a copy
 Bringing it into the audit software
Depends on the software
Most modern systems can import from a variety of data types
 What’s where in the data
Data layout is critical
May automatically extract the data layout from metadata (data
about the data)
ODBC databases
Excel layouts etc.
If the structure is flat you will need the file layout from IT (Make
sure it’s up-to-date)
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Acquiring the Data
62
If all you can get is the hard copy
 Can they print it to a file instead
Comma Delimited if possible
Fred Smith, Internal Audit,3/13/2011,
Individual data fields separated by commas
Easy for the software to identify individual fields
 If it’s a printout scan it
1 field of 120 characters for example
The audit software will allow you to define fields within the 120
characters
You can even define different layouts for different rows
4/27/2015
32
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Acquiring the Data
63
You’ve got the data – now what?
 Make sure it’s what you asked for
Timeliness – does it reflect the right period?
Accuracy – is it the live data?
Completeness – is it all the data?
 It’s embarrassing to come to an adverse conclusion only to find you were
given the “wrong” file / layout etc.
 Its even worse if you came to a non-adverse conclusion
 Check against known
 Control totals
 Dates
 Transactions
 Never believe what the first printout tells you
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
From your Manual Audit
64
It seems to be the right data – now what?
 You know what you wanted to find
 You knew where the data resided
 Now you’ve got it
 Go ahead with the analysis you planned
 You have the answer
 NOW CHECK IT
 Remember – Never Believe What The First Printout
Tells You
Particularly if its what you want to believe
4/27/2015
33
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Acquiring the Data
65
Remember…
 Modern Audit Software can handle almost any data structure
Variable length block can still cause problems
 We can take it in any format (even pdf) IT has it in and
we’ll handle it from there
 Even if it’s on tape we can handle it with an appropriate
tape drive (on loan?)
 Once you’ve got the data you still have to
Run your tests
Interpret the results
Form your conclusions
Convince someone to do something (perhaps(
If it’s fraud, maintain the chain of custody
Provide expert testimony
 Ensure you have Strength in Depth
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 6
4/27/2015
34
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Questions?
• Any Questions?
Don’t be Shy!
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Coming Up Next
IT AUDIT BASIC
4. Auditing Contingency Planning May 7
5. IT Fraud and Countermeasures May 12
IT AUDIT ADVANCED
1. Advanced IT Audit Risk Analysis for Auditors May 14
2. Advanced IT Audit Securing the Internet May 19
3. Advanced IT Audit IT Security Reviews May 21
4. Advanced IT Audit PerformanceAuditing of the IT
Function May 26
5. Advanced IT Audit Managing the IT Audit Function May
28
4/27/2015
35
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Thank You!
Richard Cascarino, MBA, CIA, CISM, CFE
Richard Cascarino & Associates
970-291-1497
rcasc@rcascarino.com
Jim Kaplan
AuditNet LLC®
800-385-1625
www.auditnet.org
webinars@auditnet.org

More Related Content

What's hot

20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv220150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2
Jim Kaplan CIA CFE
 
It22015 slides
It22015 slidesIt22015 slides
It22015 slides
Jim Kaplan CIA CFE
 
Sure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data AnalyticsSure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data Analytics
Jim Kaplan CIA CFE
 
What's the Difference between GRC and Combined Assurance?
What's the Difference between GRC and Combined Assurance?What's the Difference between GRC and Combined Assurance?
What's the Difference between GRC and Combined Assurance?
Jim Kaplan CIA CFE
 
The Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data AnalyticsThe Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data Analytics
Jim Kaplan CIA CFE
 
Internal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & CultureInternal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & Culture
Jim Kaplan CIA CFE
 
Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
Jim Kaplan CIA CFE
 
Acfe williamsburg 2013 jmk
Acfe williamsburg 2013 jmkAcfe williamsburg 2013 jmk
Acfe williamsburg 2013 jmk
Jim Kaplan CIA CFE
 
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringLeveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Jim Kaplan CIA CFE
 
How ERM and audit work together, a combined assurance approach
How ERM and audit work together, a combined assurance approach How ERM and audit work together, a combined assurance approach
How ERM and audit work together, a combined assurance approach
Jim Kaplan CIA CFE
 
Fieldwork Webinar
Fieldwork WebinarFieldwork Webinar
Fieldwork Webinar
Jim Kaplan CIA CFE
 
IT Fraud and Countermeasures
IT Fraud and CountermeasuresIT Fraud and Countermeasures
IT Fraud and Countermeasures
Jim Kaplan CIA CFE
 
Technology development: What is audit's role?
Technology development: What is audit's role?Technology development: What is audit's role?
Technology development: What is audit's role?
Jim Kaplan CIA CFE
 
IT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsIT Fraud Series: Data Analytics
IT Fraud Series: Data Analytics
Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
Jim Kaplan CIA CFE
 
Are You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATAre You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAAT
Jim Kaplan CIA CFE
 
Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!
Jim Kaplan CIA CFE
 
2013 audit net guide to audit planning
2013 audit net guide to audit planning2013 audit net guide to audit planning
2013 audit net guide to audit planning
Jim Kaplan CIA CFE
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
Jim Kaplan CIA CFE
 
Agile auditing for financial services
Agile auditing for financial services  Agile auditing for financial services
Agile auditing for financial services
Jim Kaplan CIA CFE
 

What's hot (20)

20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv220150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2
 
It22015 slides
It22015 slidesIt22015 slides
It22015 slides
 
Sure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data AnalyticsSure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data Analytics
 
What's the Difference between GRC and Combined Assurance?
What's the Difference between GRC and Combined Assurance?What's the Difference between GRC and Combined Assurance?
What's the Difference between GRC and Combined Assurance?
 
The Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data AnalyticsThe Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data Analytics
 
Internal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & CultureInternal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & Culture
 
Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
Acfe williamsburg 2013 jmk
Acfe williamsburg 2013 jmkAcfe williamsburg 2013 jmk
Acfe williamsburg 2013 jmk
 
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringLeveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
 
How ERM and audit work together, a combined assurance approach
How ERM and audit work together, a combined assurance approach How ERM and audit work together, a combined assurance approach
How ERM and audit work together, a combined assurance approach
 
Fieldwork Webinar
Fieldwork WebinarFieldwork Webinar
Fieldwork Webinar
 
IT Fraud and Countermeasures
IT Fraud and CountermeasuresIT Fraud and Countermeasures
IT Fraud and Countermeasures
 
Technology development: What is audit's role?
Technology development: What is audit's role?Technology development: What is audit's role?
Technology development: What is audit's role?
 
IT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsIT Fraud Series: Data Analytics
IT Fraud Series: Data Analytics
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
Are You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATAre You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAAT
 
Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!
 
2013 audit net guide to audit planning
2013 audit net guide to audit planning2013 audit net guide to audit planning
2013 audit net guide to audit planning
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Agile auditing for financial services
Agile auditing for financial services  Agile auditing for financial services
Agile auditing for financial services
 

Similar to It32015 slides

Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & GrowRapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
MAXfocus
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
Jim Kaplan CIA CFE
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
EnergySec
 
Future audit analytics
Future audit analyticsFuture audit analytics
Future audit analytics
Jim Kaplan CIA CFE
 
Structuring your organization for success with data analytics
Structuring your organization for success with data analytics Structuring your organization for success with data analytics
Structuring your organization for success with data analytics
Jim Kaplan CIA CFE
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
Jim Kaplan CIA CFE
 
Retrospective data analytics slides
Retrospective data analytics slidesRetrospective data analytics slides
Retrospective data analytics slides
Jim Kaplan CIA CFE
 
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdf
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdfTest Automation using UiPath Test Suite - Developer Circle Part-1.pdf
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdf
Diana Gray, MBA
 
PureApp Presentation
PureApp PresentationPureApp Presentation
PureApp Presentation
Prolifics
 
Take your code and quality to the next level by Serena Software
Take your code and quality to the next level by Serena SoftwareTake your code and quality to the next level by Serena Software
Take your code and quality to the next level by Serena Software
Serena Software
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
ControlCase
 
Don't wait until CQC tells you there's a problem
Don't wait until CQC tells you there's a problemDon't wait until CQC tells you there's a problem
Don't wait until CQC tells you there's a problem
Robert Anderson
 
Data analytics software selection and implementation
Data analytics software selection and implementationData analytics software selection and implementation
Data analytics software selection and implementation
Jim Kaplan CIA CFE
 
Performance Testing of Large-scale Systems- Impetus Webinar
Performance Testing of Large-scale Systems- Impetus WebinarPerformance Testing of Large-scale Systems- Impetus Webinar
Performance Testing of Large-scale Systems- Impetus Webinar
Impetus Technologies
 
Audit analytics and the agile auditor
Audit analytics and the agile auditorAudit analytics and the agile auditor
Audit analytics and the agile auditor
Jim Kaplan CIA CFE
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
Oracle
 
Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...
Oracle
 
Delivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. BetterDelivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. Better
Prolifics
 
Abidance Cip Presentation
Abidance Cip PresentationAbidance Cip Presentation
Abidance Cip Presentation
jamesholler
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
ControlCase
 

Similar to It32015 slides (20)

Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & GrowRapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Future audit analytics
Future audit analyticsFuture audit analytics
Future audit analytics
 
Structuring your organization for success with data analytics
Structuring your organization for success with data analytics Structuring your organization for success with data analytics
Structuring your organization for success with data analytics
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Retrospective data analytics slides
Retrospective data analytics slidesRetrospective data analytics slides
Retrospective data analytics slides
 
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdf
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdfTest Automation using UiPath Test Suite - Developer Circle Part-1.pdf
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdf
 
PureApp Presentation
PureApp PresentationPureApp Presentation
PureApp Presentation
 
Take your code and quality to the next level by Serena Software
Take your code and quality to the next level by Serena SoftwareTake your code and quality to the next level by Serena Software
Take your code and quality to the next level by Serena Software
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
Don't wait until CQC tells you there's a problem
Don't wait until CQC tells you there's a problemDon't wait until CQC tells you there's a problem
Don't wait until CQC tells you there's a problem
 
Data analytics software selection and implementation
Data analytics software selection and implementationData analytics software selection and implementation
Data analytics software selection and implementation
 
Performance Testing of Large-scale Systems- Impetus Webinar
Performance Testing of Large-scale Systems- Impetus WebinarPerformance Testing of Large-scale Systems- Impetus Webinar
Performance Testing of Large-scale Systems- Impetus Webinar
 
Audit analytics and the agile auditor
Audit analytics and the agile auditorAudit analytics and the agile auditor
Audit analytics and the agile auditor
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
 
Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...
 
Delivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. BetterDelivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. Better
 
Abidance Cip Presentation
Abidance Cip PresentationAbidance Cip Presentation
Abidance Cip Presentation
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 

More from Jim Kaplan CIA CFE

Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Jim Kaplan CIA CFE
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
Jim Kaplan CIA CFE
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
Jim Kaplan CIA CFE
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
Jim Kaplan CIA CFE
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Jim Kaplan CIA CFE
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
Jim Kaplan CIA CFE
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
Jim Kaplan CIA CFE
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
Jim Kaplan CIA CFE
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
Jim Kaplan CIA CFE
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
Jim Kaplan CIA CFE
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
Jim Kaplan CIA CFE
 
Ethics for internal auditors
Ethics for internal auditorsEthics for internal auditors
Ethics for internal auditors
Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10) Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10)
Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Jim Kaplan CIA CFE
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 

More from Jim Kaplan CIA CFE (20)

Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Ethics for internal auditors
Ethics for internal auditorsEthics for internal auditors
Ethics for internal auditors
 
Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10) Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10)
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

It32015 slides

  • 1. 4/27/2015 1 Copyright © 2014 AuditNet® and Richard Cascarino & Associates AuditNet® Training without Travel™ Audit Use of CAATs May 5 2015 Guest Presenter: Richard Cascarino, MBA, CIA, CISM, CFE Richard Cascarino & Associates Copyright © 2014 AuditNet® and Richard Cascarino & Associates Jim Kaplan CIA CFE • President and Founder of AuditNet®, the global resource for auditors (now available on Apple and Android and Windows devices) • Auditor, Web Site Guru, • Internet for Auditors Pioneer • Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award. • Author of “The Auditor’s Guide to Internet Resources” 2nd Edition
  • 2. 4/27/2015 2 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Richard Cascarino MBA CIA CISM CFE • Principal of Richard Cascarino & Associates based in Colorado USA • Over 30 years experience in IT audit training and consultancy • Past President of the Institute of Internal Auditors in South Africa • Member of ISACA • Member of Association of Certified Fraud Examiners • Author of Auditor's Guide to IT Auditing Copyright © 2014 AuditNet® and Richard Cascarino & Associates Webinar Housekeeping • This webinar and its material are the property of AuditNet® and Richard Cascarino and Associates. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We are recording the webinar and you will be provided with a link access to that recording as detailed below. Downloading or otherwise duplicating the webinar recording is expressly prohibited. • Webinar recording link will be sent via email within 5-7 business days. • NASBA rules require us to ask polling questions during the Webinar and CPE certificates will be sent via email to those who answer ALL the polling questions • The CPE certificates and link to the recording will be sent to the email address you registered with in GTW. We are not responsible for delivery problems due to spam filters, attachment restrictions or other controls in place for your email client. • Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. • After the Webinar is over you will have an opportunity to provide feedback. Please complete the feedback questionnaire to help us continuously improve our Webinars • If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout.
  • 3. 4/27/2015 3 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Disclaimers • The views expressed by the presenters do not necessarily represent the views, positions, or opinions of AuditNet® or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. • While AuditNet® makes every effort to ensure information is accurate and complete, AuditNet® makes no representations, guarantees, or warranties as to the accuracy or completeness of the informationprovided via this presentation. AuditNet® specificallydisclaims all liability for any claims or damages that may result from the informationcontained in this presentation, including any websites maintained by third parties and linked to the AuditNet® website • Any mention of commercialproducts is for information only; it does not imply recommendationor endorsement by AuditNet® Today’s Agenda • System testing techniques • Computerized application systems • Non-computerized systems • CAAT types • Source code review • Use of Test Data • Parallel Simulation • Integrated Test Facilities • Snapshot Techniques • SCARF • Retrieval Software • Generalized Audit Software • Specialized Audit Software • Utility Software • ACL • IDEA
  • 4. 4/27/2015 4 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Testing of Computerized Systems 7 What is a "System" –Manual - pre-computer –Computer Application –Computer Environment –Manual - post-computer –Integrated Systems All subject to control Copyright © 2014 AuditNet® and Richard Cascarino & Associates Manual – Pre-Computer 8 Business Control Objectives Control normally exercised by: –Supervision –Authorization –Authentication –Procedures
  • 5. 4/27/2015 5 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Computer Applications 9 –Control objectives have not changed –Control points may vary –Controls themselves may be: Computerized Manual –Effective / Efficient trade-off Copyright © 2014 AuditNet® and Richard Cascarino & Associates Application Controls 10 –Prime Areas Recording, Classifying and Summarizing Authorized Transactions Updating Files Reporting the results of processing –Can data be relied upon? - Is it : Complete Accurate Valid
  • 6. 4/27/2015 6 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Computer Environment 11 –Operating Environment Operating System Networking Software Database Management Systems –Control Environment Operation Controls Change Control Copyright © 2014 AuditNet® and Richard Cascarino & Associates Operations Controls 12 –Custodial Controls Physical Site Controls Operations Standards and Procedures Library and File Controls Backup / Restart Controls Disaster Recovery Planning
  • 7. 4/27/2015 7 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Supervisory Controls 13 –Run Schedules –Checklists –Exception Reports –Reconciliation Procedures –Log Books –Computer Logs Copyright © 2014 AuditNet® and Richard Cascarino & Associates Administrative Controls Cover 14 –Reliability of Information –Timeliness –Nature and type of Information –Speed of Error Detection / Correction –Appropriateness of Management Decisions
  • 8. 4/27/2015 8 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Integrity Controls Include 15 –Implementation Controls –Program Security Controls –Computer Operation Controls –Data File Security Controls –System Software Controls –Change Control When Changes are made is Risk Controlled or Introduced? Are Changes Authorized? Are Authorized Changes Carried Out Are Changes Controlled or Recorded? Who Does the Changes? Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 1
  • 9. 4/27/2015 9 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Selecting Controls for Testing 17 –Establish "prime" Controls for an Area –Identify Controls covering several Areas –Identify Stand-alone Controls –Controls which provide Evidence –Do NOT try to prove a Negative Copyright © 2014 AuditNet® and Richard Cascarino & Associates Primary Areas of Concern 18 –Complex Systems cannot be re-created manually –Many computer records are intelligible only to computers –Most systems allow multiple access –"Computers can be trusted" –Disasters really mean Disaster
  • 10. 4/27/2015 10 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Control Concepts and IT 19 –Extent of manual controls reduced –Sources of data have shifted –Transaction trails may be discontinuous –Control points have migrated –Opportunities for human judgment are less –Documentation becomes critical Lack of hard-copy audit trails Continuity Control Maintenance Control –Data Custody Shifted Copyright © 2014 AuditNet® and Richard Cascarino & Associates Logical vs. Technical Controls 20 Logical Controls are : –Business controls –Functional in nature –Either people or computer enforced Technical controls are concerned with technical complexities (e.g. parity controls)
  • 11. 4/27/2015 11 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Automated Tools (CAATs) 21 Test Data Generators Flowcharting Packages Specialized Audit Software Generalized Audit Software Utility Programs Copyright © 2014 AuditNet® and Richard Cascarino & Associates Specialized Audit Software 22 Can accomplish any audit task but –High development and maintenance cost –Require specific I.S. skills –Must be "verified" if not written by the auditor –High degree of obsolescence
  • 12. 4/27/2015 12 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Generalized Audit Software 23 "Prefabricated" audit tests Each use is a one-off Auditor has direct control Lower development cost Fast to implement Copyright © 2014 AuditNet® and Richard Cascarino & Associates Application of GAS 24 Detective examination of files Verification of processing controls File interrogations Management inquiries
  • 13. 4/27/2015 13 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 2 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Types of Audit Software 26 Program generators Macro languages Audit-specific tools Data downloaders Micro-based software
  • 14. 4/27/2015 14 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Hardware / Software Compatibility (Desirable) 27 –Across manufacturers –Across operating environments –Across machine size –Mainframe / mini / micro There are some about Copyright © 2014 AuditNet® and Richard Cascarino & Associates Audit Software Functions 28 File access Arithmetic operations Logic operations Record handling Update Output Statistical Sampling File comparison Graphics
  • 15. 4/27/2015 15 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Determining the Appropriate CAAT 29 Depends on the Audit Objective and selected technique Application Audit Techniques Purposes –1 To verify processing operation –2 To verify the results of processing Copyright © 2014 AuditNet® and Richard Cascarino & Associates Areas of Control in IT Systems 30 –Application controls - unique to individual user systems –Systems development controls - assuring systems are likely to fulfill objectives –Physical controls - controlling operating environment –System integrity controls - securing the logical environment –A balance must be struck
  • 16. 4/27/2015 16 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 3 Copyright © 2014 AuditNet® and Richard Cascarino & Associates CAAT Types and Their Usage 32 –Application audit tools are not always CAATs –"Any tangible aid that assists an auditor" Tools to obtain information Tools to evaluate controls Tools to verify controls Automated tools
  • 17. 4/27/2015 17 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Obtaining Information 33 –Interviews –Questionnaires –Analytical audit flowcharts –Flowcharting software –Documentation Review Copyright © 2014 AuditNet® and Richard Cascarino & Associates Control Evaluation 34 Application control matrix –Components –Concerns Adequate Inadequate
  • 18. 4/27/2015 18 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Cascarino Cube 35 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Control Verification 36 Audit around Test data Re-performance of key functions Reprocess selected items
  • 19. 4/27/2015 19 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Source code review –Requires programming skill –Slow –Expensive –Boring –Proves little –May be useful for specialized review Copyright © 2014 AuditNet® and Richard Cascarino & Associates Confirmation of Results 38 e.g. Debtors certification –Slow –Uncertain –Only shows up errors in your favor –Very labor intensive
  • 20. 4/27/2015 20 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Test Data 39 –Selected to test both correct data and errors –Require little technical background but Lacks Objectivity –Influenced by what is expected –Assumes program tested is "LIVE" program Copyright © 2014 AuditNet® and Richard Cascarino & Associates Integrated Test Facility (ITF) 40 –Establishes a "dummy" entity –Process data together with live data –Excluded from live results –Under the auditor's control but –May result in system catastrophe
  • 21. 4/27/2015 21 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Advantages of an ITF 41 –Little technical training required –Low processing cost –Tests system as it routinely operates –Understood by all involved –Tests manual function as well as computer Copyright © 2014 AuditNet® and Richard Cascarino & Associates Disadvantages of an ITF 42 –ITF transactions must be removed before they interfere with live totals –High cost if live systems require modification to implement –Test data affects live files - danger of destruction –Difficult to identify all exception conditions –Quantity of test data will be limited
  • 22. 4/27/2015 22 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Snapshot Technique 43 –A form of transaction trail –Identifiable inputs "tagged" –Trail produced for all processing logic –Useful in high-volume systems –Used extensively by I.S. staff in testing systems Copyright © 2014 AuditNet® and Richard Cascarino & Associates Sampling 44 –"Liars, Damned Liars and Statistics" –A tool for audit quality control –May be the only tool possible in a high-volume system –Not well understood by auditors –At computer speeds 100% sampling may be practicable May not be desirable
  • 23. 4/27/2015 23 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Types of Stat Sampling e.g. 45 –Attributes Sampling –Variables Sampling –Systematic selection –Random selection –Stratified random selection –Discovery sampling –Stop-go sampling Copyright © 2014 AuditNet® and Richard Cascarino & Associates Parallel Simulation 46 Uses same input data Uses same files Uses different programs From a different source To produce the same results?
  • 24. 4/27/2015 24 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 4 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Common CAAT Problems 48 –Getting the wrong files –Getting the wrong layout –Documentation is out of date –Prejudging results Never believe what the first printout tells you
  • 25. 4/27/2015 25 Copyright © 2014 AuditNet® and Richard Cascarino & Associates In any Application System 49 –Try to identify the controls the user relies on –Documentation is often misleading –Not everything needs to be audited –Program logic mirrors business logic –You can always ask for help Copyright © 2014 AuditNet® and Richard Cascarino & Associates Industry-Related Software 50 –Audit procedures commonly available for: Accounts receivable Payroll General ledger Inventory –May be customizable –Industry-related audit software available for: Insurance Health care Financial services
  • 26. 4/27/2015 26 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Industry- Related Drawbacks 51 –Requires Conversion of input to standard package layouts Selection of appropriate parameters A degree of IS skill for conversion –Software itself normally Cost-effective Efficient Copyright © 2014 AuditNet® and Richard Cascarino & Associates Customized Audit Software 52 –To run in unique circumstances –To perform unique audit tests –To produce output in unique formats –Expensive to develop –Normally require a high level of IS skills –May not tell you what you think they do –May be the only viable solution
  • 27. 4/27/2015 27 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Information Retrieval Software –Report writers and Query Languages –Not specifically written for auditors –Can perform many common audit routines –Includes Report writers Program generators 4th generation languages Copyright © 2014 AuditNet® and Richard Cascarino & Associates Generalized Audit Software 54 –Designed specifically for auditors –Potential uses Examine records Test calculations and make computations Compare data on separate files Select and print audit samples Summarize or re-sequence data Perform analyses Compare audit data to other sources
  • 28. 4/27/2015 28 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Generalized Audit Software Benefits 55 Handling of volumes Output can be used for further computer processing Time to audit can be reduced Auditor freed to spend time interpreting results Limited programming skills required Audit reliance on IS staff reduced Copyright © 2014 AuditNet® and Richard Cascarino & Associates Generalized Audit Software Limitations 56 Hardware and software environments may be restrictive Number of files handle able may be restrictive Types of record structures may not be comprehensive Number of computations may be limited Number of reports per "pass" may be restrictive
  • 29. 4/27/2015 29 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 5 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Excel as a CAAT 58
  • 30. 4/27/2015 30 Copyright © 2014 AuditNet® and Richard Cascarino & Associates ACL as a CAAT 59 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Idea as a CAAT 7
  • 31. 4/27/2015 31 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Importing the Data 61  Bring a copy to the audit machine Copies can be reanalyzed later if need be Live data moves on You cannot corrupt live data working on a copy  Bringing it into the audit software Depends on the software Most modern systems can import from a variety of data types  What’s where in the data Data layout is critical May automatically extract the data layout from metadata (data about the data) ODBC databases Excel layouts etc. If the structure is flat you will need the file layout from IT (Make sure it’s up-to-date) Copyright © 2014 AuditNet® and Richard Cascarino & Associates Acquiring the Data 62 If all you can get is the hard copy  Can they print it to a file instead Comma Delimited if possible Fred Smith, Internal Audit,3/13/2011, Individual data fields separated by commas Easy for the software to identify individual fields  If it’s a printout scan it 1 field of 120 characters for example The audit software will allow you to define fields within the 120 characters You can even define different layouts for different rows
  • 32. 4/27/2015 32 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Acquiring the Data 63 You’ve got the data – now what?  Make sure it’s what you asked for Timeliness – does it reflect the right period? Accuracy – is it the live data? Completeness – is it all the data?  It’s embarrassing to come to an adverse conclusion only to find you were given the “wrong” file / layout etc.  Its even worse if you came to a non-adverse conclusion  Check against known  Control totals  Dates  Transactions  Never believe what the first printout tells you Copyright © 2014 AuditNet® and Richard Cascarino & Associates From your Manual Audit 64 It seems to be the right data – now what?  You know what you wanted to find  You knew where the data resided  Now you’ve got it  Go ahead with the analysis you planned  You have the answer  NOW CHECK IT  Remember – Never Believe What The First Printout Tells You Particularly if its what you want to believe
  • 33. 4/27/2015 33 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Acquiring the Data 65 Remember…  Modern Audit Software can handle almost any data structure Variable length block can still cause problems  We can take it in any format (even pdf) IT has it in and we’ll handle it from there  Even if it’s on tape we can handle it with an appropriate tape drive (on loan?)  Once you’ve got the data you still have to Run your tests Interpret the results Form your conclusions Convince someone to do something (perhaps( If it’s fraud, maintain the chain of custody Provide expert testimony  Ensure you have Strength in Depth Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 6
  • 34. 4/27/2015 34 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Questions? • Any Questions? Don’t be Shy! Copyright © 2014 AuditNet® and Richard Cascarino & Associates Coming Up Next IT AUDIT BASIC 4. Auditing Contingency Planning May 7 5. IT Fraud and Countermeasures May 12 IT AUDIT ADVANCED 1. Advanced IT Audit Risk Analysis for Auditors May 14 2. Advanced IT Audit Securing the Internet May 19 3. Advanced IT Audit IT Security Reviews May 21 4. Advanced IT Audit PerformanceAuditing of the IT Function May 26 5. Advanced IT Audit Managing the IT Audit Function May 28
  • 35. 4/27/2015 35 Copyright © 2014 AuditNet® and Richard Cascarino & Associates Thank You! Richard Cascarino, MBA, CIA, CISM, CFE Richard Cascarino & Associates 970-291-1497 rcasc@rcascarino.com Jim Kaplan AuditNet LLC® 800-385-1625 www.auditnet.org webinars@auditnet.org