SlideShare a Scribd company logo
1 of 25
Download to read offline
Robotic Powered Auditing (“RPA”)
Rich Lanza | Managing Director
Audit Innovation
© Grant Thornton LLP. All rights reserved.
About Jim Kaplan, CIA, CFE
 President and Founder of AuditNet®,
the global resource for auditors
(available on iOS, Android and
Windows devices)
 Auditor, Web Site Guru,
 Internet for Auditors Pioneer
 IIA Bradford Cadmus Memorial Award
Recipient
 Local Government Auditor’s Lifetime
Award
 Author of “The Auditor’s Guide to
Internet Resources” 2nd Edition
2
1
2
© Grant Thornton LLP. All rights reserved.
About AuditNet® LLC
• AuditNet®, the global resource for auditors, serves the global audit
community as the primary resource for Web-based auditing content. As the first online
audit portal, AuditNet® has been at the forefront of websites dedicated to promoting the
use of audit technology.
• Available on the Web, iPad, iPhone, Windows and Android devices and
features:
• Over 3,100 Reusable Templates, Audit Programs, Questionnaires, and
Control Matrices
• Webinars focusing on fraud, data analytics, IT audit, and internal audit
with free CPE for subscribers and site license users.
• Audit guides, manuals, and books on audit basics and using audit
technology
• LinkedIn Networking Groups
• Monthly Newsletters with Expert Guest Columnists
• Surveys on timely topics for internal auditors
Introductions
3
© Grant Thornton LLP. All rights reserved.
HOUSEKEEPING
This webinar and its material are the property of AuditNet® and its Webinar partners. Unauthorized usage or
recording of this webinar or any of its material is strictly forbidden.
• If you logged in with another individual’s confirmation email you will not receive CPE as the confirmation login is
linked to a specific individual
• This Webinar is not eligible for viewing in a group setting. You must be logged in with your unique join link.
• We are recording the webinar and you will be provided access to that recording after the webinar. Downloading
or otherwise duplicating the webinar recording is expressly prohibited.
• If you said you would like CPE you must attend the entire Webinar to receive CPE (no partial CPE will be
awarded).
• If you meet the criteria for earning CPE you will receive a link via email to download your certificate. The official
email for CPE will be issued via NoReply@gensend.io and it is important to white list this address. It is from this
email that your CPE credit will be sent. There is a processing fee to have your CPE credit regenerated post event.
• Submit questions via the chat box on your screen and we will answer them either during or at the conclusion.
• You must answer the survey questions after the Webinar or before downloading your certificate.
4
3
4
© Grant Thornton LLP. All rights reserved.
IMPORTANT INFORMATION
REGARDING CPE!
• ATTENDEES - If you attend the entire Webinar you will receive an email with the link to download
your CPE certificate. The official email for CPE will be issued via NoReply@gensend.io and it is
important to white list this address. It is from this email that your CPE credit will be sent. There is a
processing fee to have your CPE credit regenerated post event.
• We cannot manually generate a CPE certificate as these are handled by our 3rd party provider. We
highly recommend that you work with your IT department to identify and correct any email delivery
issues prior to attending the Webinar. Issues would include blocks or spam filters in your email
system or a firewall that will redirect or not allow delivery of this email from Gensend.io
• We are not responsible for any connection, audio or other computer related issues. You must have
pop-ups enabled on you computer otherwise you will not be able to answer the polling questions
which occur approximately every 20 minutes. We suggest that if you have any pressing issues to see
to that you do so immediately after a polling question.
• CPE for this event will be non-NASBA.
© Grant Thornton LLP. All rights reserved.
The views expressed by the presenters do not necessarily represent the views, positions, or opinions
of AuditNet® LLC. These materials, and the oral presentation accompanying them, are for educational
purposes only and do not constitute accounting or legal advice or create an accountant-client
relationship.
While AuditNet® makes every effort to ensure information is accurate and complete, AuditNet®
makes no representations, guarantees, or warranties as to the accuracy or completeness of the
information provided via this presentation. AuditNet® specifically disclaims all liability for any claims
or damages that may result from the information contained in this presentation, including any
websites maintained by third parties and linked to the AuditNet® website.
Any mention of commercial products is for information only; it does not imply recommendation or
endorsement by AuditNet® LLC
Disclaimer
5
6
© Grant Thornton LLP. All rights reserved.
Additional Disclaimer
This Grant Thornton LLP presentation is not a comprehensive analysis of the subject matters
covered and may include proposed guidance that is subject to change before it is issued in final
form. All relevant facts and circumstances, including the pertinent authoritative literature, need
to be considered to arrive at conclusions that comply with matters addressed in this
presentation. The views and interpretations expressed in the presentation are those of the
presenters and the presentation is not intended to provide accounting or other advice or
guidance with respect to the matters covered
For additional information on matters covered in this presentation, contact your Grant Thornton
LLP adviser
© Grant Thornton LLP. All rights reserved.
AuditNet® and cRisk Academy
• If you would like forever access to
this webinar recording
• If you are watching the recording,
and would like to obtain CPE
credit for this webinar
• Previous AuditNet® webinars are
also available on-demand for CPE
credit
http://criskacademy.com
http://ondemand.criskacademy.com
Use coupon code: 50OFF for a
discount on this webinar for one week
8
7
8
© Grant Thornton LLP. All rights reserved.
Richard B. Lanza, CPA, CFE, CGMA
• Managing Director in Innovation for Grant Thornton, LLP
• Over 25 years of ACL, Excel and other software usage
• Received the outstanding achievement in business award by the Association of
Certified Fraud Examiners for developing the publication Proactively Detecting
Fraud Using Computer Audit Reports as a research project for the IIA
• Recently was a contributing author of:
• Detecting Corruption with Analytics: A Roadmap – The International
Institute for Analytics
• Global Technology Audit Guide (GTAG #13) Fraud In An Automated
World – Institute Of Internal Auditors.
• Cost Recovery – Turning Your Accounts Payable Department Into A
Profit Center – Wiley And Sons.
• Data Analytics: A Roadmap for Expanding Capabilities (published 2018
in partnership with the IIA's Internal Audit Foundation)
• In 2015, discovered a new textual analytic technique using letters called the
Lanza Approach to Letter Analytics (LALA)TM
The views expressed by the
presenters do not necessarily
represent the views, positions, or
opinions of Grant Thornton, LLP.
These materials, and the oral
presentation accompanying
them, are for educational
purposes only and do not
constitute accounting or legal
advice or create an accountant-
client relationship.
rich.lanza@us.gt.com Richard B. Lanza, CPA, CFE, CGMA
9
© Grant Thornton LLP. All rights reserved.
1 Identify the top opportunities for robotic process automation in audit processes.
2 See where you can become a “citizen programmer”, building the bots in your business processes.
3 Walk through case studies of applied audit-focused RPA
Learning objectives
10
4 Consider the limitations and benefits of RPA into a total cost of ownership exercise.
9
10
© Grant Thornton LLP. All rights reserved.
Mankind's Fascination with Robots
Since the 1920's people have been fascinated by the idea of "robots"
• A quick scan of popular culture shows us just how interesting robots
and AI have been for the past century as subject matter.
11
© Grant Thornton LLP. All rights reserved.
Distrust of Technology
Audit report issued by Marwick, Mitchell & Co. based on their audit of Northern
Shoe Company, Duluth, Minnesota - February 5, 1908
The adding machine in its riper place is an excellent institution but when it is
resorted to on every occasion for the simple addition of two and two it becomes not
only useless but dangerous…….Apart altogether from the time wasted in this way,
the use of the machine which at first may be due to laziness on the part of the
employee becomes at length a necessity for it is a well-known fact that the constant
use of any mechanical calculator leads inevitably to trophy of the calculating faculty.
A man who cannot calculate nimbly and accurately is of very little use as a
bookkeeper. We would strongly advise that the adding machine be removed from
the office or its use very much restricted.
https://caats.ca/
12
11
12
© Grant Thornton LLP. All rights reserved.
Specific Tech Driving Modern Robotics
13
Machine
Learning
Algorithms
Facial
Recognition
Software
Predictive
Analytics
Natural
Language
Processing
3D Printing
Geotagging/GPS
location
The Internet of
Things
Optical
Character
Recognition
© Grant Thornton LLP. All rights reserved.
Ideal Attributes For Using Robotics
• Simple and Tedious (Process complexity is low)
• Repetitive (The process will be run numerous times in a given period)
• Relatively Static (The process does not change much over time)
• Beneficial to run on a schedule (continuously monitoring a control provides
additional benefits
• Costly to Perform Manually
14
13
14
© Grant Thornton LLP. All rights reserved.
"Robots" In The Context of Audit
• In the audit automation world, a "robot" is a digital
"worker" that performs a repetitive task
• These digital "bots" have been in use for years in other
industries (if you've ever interacted with a chat bot, or
Siri you've seen robotics tech in action).
• Some technologies that physical robots and AI rely on
can be useful (predictive models, machine learning
algorithms).
• Robots in audit can be automated controls, scripts than
run on a scheduler or combine either of these two items
with AI to do work more efficiently.
15
© Grant Thornton LLP. All rights reserved.
Value proposition
16
Why?
How?
People
Process
Technology
Insights
Efficiency
Analytics
Automation
A.I.
15
16
(Automated)
Audit Data Analytics
© Grant Thornton LLP. All rights reserved.
Analytics programs
18
IRP
Issuer risk profiling
• Predictive analytics
• Financial reporting fraud
• Restatement
• Material weakness
• Bankruptcy
• Governance concerns
• Litigation
FSP
Forensic support program
• Forensic & analytics expertise
applied to selected audits
• Fraud brainstorming
• Incremental / tailored
management inquiry
• Journal entry testing
• Tailored analytics
ADA
Audit data analytics
• Whole ledger analytics
• Transactional scoring
• Account combinations
• Numerical / digital
• Text / letter
• Semantic
17
18
© Grant Thornton LLP. All rights reserved.
Analyze
Report
Transform
Validate
System Specific Scripts
Ensures complete
& accurate client data
Extract
End-to-End automation
Whole Ledger Analytics
19
Auto Map and Tag
Calculated fields, entry types
Pre-Set Quality Tests
DR = CR, G/L
completeness testing
Scripted Analytics
100+ analytics organized
into four areas
Pre-Formatted Workpapers
Excel spreadsheets, Power BI,
mobile apps
Audit Team Interaction
Data + auditor expertise =
quality and insights
Assess and Enhance
190+ benchmarks for
insights and efficiency
Augment
Benchmark
© Grant Thornton LLP. All rights reserved.
Overcoming Data Challenges
• Normalizing data is 80% of the time (in the beginning)
• “By most accounts, 80 percent of the development effort in a big data project goes
into data integration and only 20 percent goes toward data analysis.” —Intel
Corporation
• Data is in every process
• It may not be ERP / It may be in your “Big Data”
• 90% of data is text
• Audit (Internal & External) is the best partner to get the data
• They are independent / Not proving the data is a scope limitation
• Tend to establish the most secure data warehouses
20
19
20
© Grant Thornton LLP. All rights reserved.
Automated Data Normalization
• Store procedures for data cleanup once
• Create a normalized set of data fields named by YOU
• Ensure data quality tests are run prior to analysis
• Automate these routine tasks to increase analyst’s time
• Enrich the data by organizing it by type codes
21
© Grant Thornton LLP. All rights reserved.
Automating Data E.T.L.
• All of the Company's data is captured in an SAP G/L
• Audit team had to budget almost 100 hours just on importing and combining
various report extracts
• Data analytics and innovation were introduced in the current year audit
• Data import process was reduced from 25 hours /quarter to only 2
hours/quarter
22
21
22
© Grant Thornton LLP. All rights reserved.
404: Training Data Not Found
• Robots are not perfect; and will fail, behave unexpectedly and trip
over their own feet (just like me from time to time).
• Robots will never replace auditors; but instead will make their jobs
easier and allow them more free time to innovate.
23
Image from the DARPA
Robotics Challenge
© Grant Thornton LLP. All rights reserved.
Whole ledger analytics:
transactional scoring
24
Top entries SCORE_RATIO INC_STMT_IMPACT BAL_SHEET_IMPACT Description Posting Date
1 0.338 (216,678.08) 216,678.08 To balance to subledger 12/31/2016
Abs.Income
StatementImpact
Risk Score Ratio
23
24
© Grant Thornton LLP. All rights reserved.
Other Analytics Solutions
25
ACCOUNTS PAYABLE
Performs control
analysis, proactive fraud
testing through vendor
risk ranking and cost
recovery detection for
the procure to pay
process.
75 SCRIPTS
REVENUE
Identifies revenue
transactions that
indicate a higher risk of
material misstatement
as well as control
analysis.
50 SCRIPTS
P-CARD
Identify risky P-Card
transactions and usage
behaviors.
30 SCRIPTS
TRAVEL & EXPENSE
Analyze travel and
expense data to identify
inappropriate or
suspicious employee
expenses, and manage
T&E efforts.
20 SCRIPTS
FCPA Third Party
Vendor
Risk-rank vendors by
elements of risk that
may result in a FCPA
violation, individual
vendor analysis and
predictive analytics to
predict transactions
costs by vendor.
25 SCRIPTS
Whole Ledger Analytics Dashboard
WB58
25
26
Slide 26
WB58 after this slide, insert trending by month and benchmarking toolkit slide from WLA summit training?
Wolohan, Brian, 5/13/2019
© Grant Thornton LLP. All rights reserved.
Audit evidence from external data
27
Sales Correlates with:
Client Website Traffic + App Usage
Account Openings Correlate with:
Web Search for Client Name + App Downloads
© Grant Thornton LLP. All rights reserved.
Benchmarking WLA for machine learning
• Journal Statistic Examples
• Average lines per journal
• % of journals posted by day
• Average income effect per journal
• User Statistic Examples
• Average entries per user per day
• % of manual to automated entries
• WLA Result Examples
• Entries and line items by WLA report (e.g., round dollar journals)
• Risk score average, median and standard deviation
28
27
28
Robotic Process
Automation
© Grant Thornton LLP. All rights reserved.
Process Characteristics for RPA
30
29
30
© Grant Thornton LLP. All rights reserved.
Example Target Functions and Process Areas
Revenue
Cycle
Information
Technology
Procure
to Pay
Order
to Cash
Record to
Report
Supply
Chain
Insurance
Authorization
Datacenter
Customer
Master
Gen. Acct. /
Close
Vendor
Master
CRM &
Customer
Service
Network
Operations
Sourcing /
Contract
Management
Reporting
Credit /
Contract
Demand
Management
Charge
Posting
Security
Admin.
PO Process
Order
Process
External
Reporting
Materials
Management
Training &
Development
Service Desk
Goods
Receipt
Treasury
Logistics /
Delivery
Capacity
Flow
Management
Write-offs
Desktop
Support
Invoice
Process
Billing / Disp.
Res.
Tax
Transport &
Logistics
Performance
Metrics
Database
Admin.
Collections
Payment
Process
FP & A
Carrier
Management
Cash PostingApplications
Cash
Application
Controllership T & E
Returns
Management
Functions (L1)
High level aggregations of
company functionality
Process Areas (L2)
Bundles of processes that belong
to the same area of responsibility
Industry-
Specific Ops
In addition to the cross-industry
functions listed at right, we find RPA
opportunities in industry-specific
processes such as loan servicing
(Banks), claims processing (Insurance),
rebates and tracings (Manufacturing),
etc.
Denials
Management
31
© Grant Thornton LLP. All rights reserved.
User Access Review Controls
Grant Thornton automated user access control testing for the following attributes:
• Whether access was approved by appropriate personnel
• Whether the approval occurred within the required time frame
• If the access is set to be revoked then the account is flagged for immediate attention and an alert is sent to the
control owner.
Human Resources Roles Validation
The clients control stated that HR personnel with access to modify payroll information must also have a role assigned
that prevents modification of their own payroll information. Grant Thornton automated this test to verify that all HR
personnel are restricted from modifying their own payroll fields.
SQL Database Backup Jobs
Grant Thornton automated a test to verify that SQL jobs are in place to backup SQL databases on a regularly
scheduled basis. This automated test also included tests for the following attributes:
• The backup jobs are configured to backup the full database per the backup requirements
• The backup alerts are set to notify personnel when a backup fails or is completed successfully
• The alerts are configured to notify appropriate personnel
Removal of Inactive SAP account access
Grant Thornton automated a test for inactive SAP account access that is greater than the Company's specified
threshold. Any account that has not accessed the system within this threshold is flagged for immediate attention and
an alert is sent to the control owner for access to be removed.
Control Automation Examples
32
31
32
© Grant Thornton LLP. All rights reserved.
33
Use Case Example
User access review approval testing
Business Benefits:
 Reduction in control testing time
 Increased assurance through test of control samples (can include 100%
population testing)
 Auditor capacity shifted to handle more complex tasks & exceptions
ICA
Business Issue:
 Control testing that is time consuming (hours) and
low value for management
Import the testing
population data Execute the test in R
Clean the data in either
MLS or R
The data gets
exported from MLS
into a SQL database
The data is
visualized in a
PowerBI report
API
Minimal human interaction
© Grant Thornton LLP. All rights reserved.
Changing the Nature of Risk Mgmt
Before Adjustments to Microsoft Control (user
access control):
• User access for SAP sampled at 25 users per
quarter, catching potential access issues every
three months
• Excessive time spent testing – 2 hours per
control per year
Automated control monitoring
using advance analytics –
efficient value protection
Sample based control testing -
basic risk management
Partial Assurance
Before
2 hours per control
Value Protection
After
<5 minutes per control
Manual Compliance Assessment Automated Compliance Monitoring
After Adjustments to Microsoft Control (user
access control):
• SAP user access tested at 100%, in real time
• Testing performed in seconds or minutes
• Microsoft responds to user access
problems in real time – as opposed to
quarterly
Pass / Fail
Control 1 Pass
Control 2 Pass
Control 3 Pass
Control 4 Fail
Control 5 Pass
Time savings of 95%+ per control
– from risk mitigation to value protection
Efficiency
Value Protection
Before
After
34
33
34
Robotic Powered
Auditing
© Grant Thornton LLP. All rights reserved.
Workflow automations
36
Example:
property, plant
and equipment
Performs audit procedures:
• Prepares fixed asset rollforward
• Reconciles to general ledger
• Recalculates depreciation expense
• Identifies most efficient selection approach
• Generates selection for test of details
Scans for notable activity:
• Disposals in ending sub ledger
• Additions disposed of in the same year
• Assets whose standard life deviates from the norm
35
36
© Grant Thornton LLP. All rights reserved.
Employee Benefit Plan Loans Analyser
Automating procedures over participant loans
Data Receipt and Ingestion
 Receive the loans detail report
from the Record Keeper
 Complete the "EBP Loans Tool
- Data Request Form"
 Analytics Team cleanses the
loan detail report and imports
into ACL.
Step one Step two
Fill Out the Dialog Box
 Data fields are input in
software dialog boxes
 Client specific variables are
input into dialogs (ie. each
participant in the Plan can
only have 2 loans).
Step three
Run the Script / Export Results
 Software script is run
 Non-compliant participant
loans are identified
 Dashboard in Excel acts as
the engagement team
workpaper.
Step four
Evaluate the Results
 Dashboard with notable items
 Investigation is performed and
results are documented.
37
© Grant Thornton LLP. All rights reserved.
Continuous automation
38
Example:
confirming
customer activity
and balances
Generated hundreds of confirmations in under 3 minutes
• Extracted each customer's transaction and balance detail
• Prepared and distributed e-mail confirmations
• Provided customers with one-click confirmation option
Processed responses automatically
• Electronically logged replies to confirmations
• Created automated workpapers
Bespoke automation
solution was designed,
developed, and deployed
in less than one week
37
38
People, Process and
Technology
© Grant Thornton LLP. All rights reserved.
Auditor of the future skillset
• Ability to reimagine the audit
• Data analytics mindset
 Asking the right questions
 Extracting, transforming and loading relevant data
 Applying appropriate data analytics techniques
 Interpreting and sharing the results with stakeholders
• Critical thinking (questioning mind, weighing evidence)
• Communication:
• Interaction with a team and with the client (asking the right question and listening)
• Writing – communication of facts and articulation of persuasive argument
• Ability to collaborate with people of different geographies and varying skill sets
• Selling new innovation / change management
40
39
40
© Grant Thornton LLP. All rights reserved.
Desired analytic-enabled auditor skills
• Analytics mindset
• Analytic technical skills
• Data management and acquisition
• Database modeling
• Tool development and programming
• Predictive modeling and statistics
• Other Skills
• IT project management
41
© Grant Thornton LLP. All rights reserved.
Robotic Process Automation Limitations
RPA cannot read any data that is non-electronic with unstructured inputs
• An example would be input such as paper invoices. In this case, RPA will only work with
a collection of other implemented technologies (such as OCR) required to make it digital
and structured.
RPA requires some form of static consistency
• For example, invoices may be received in different formats, with fields placed in different
areas. For a ‘Bot’ to be able to read an invoice, all supplier invoices must be received in
the same format with the same fields.
• Although robots can be trained by exception to read different fields, they cannot read
multiple different formats – unless these are all digital and configured separately.
42
41
42
© Grant Thornton LLP. All rights reserved.
Robotic Process Automation Limitations
RPA is not a cognitive computing solution
• It cannot learn from experience and therefore has a ‘shelf life’.
• As processes evolve – for example, through the introduction and use of other technologies
— they may become redundant and require changes.
• It is therefore wise for a company to examine the process prior to building a ‘Bot’. Applied
to a process that is inefficient and/or on the way out, that shelf life may be reduced to just a
year.
Applying RPA to an inefficient process will not fix it – "paving cowpaths"
• RPA is not a Business Process Management solution and does not bring an end-to-end
process view
• The same goes for out of date infrastructure – RPA will only mask the underlying issues.
• Clients should focus first on addressing the root causes of their process or technology
inefficiencies and then apply RPA to maximize the benefits.
43
© Grant Thornton LLP. All rights reserved.
Start with what you have
Your data can be a rich source
of insights and business
intelligence. Inexpensive tools
can be used to get started in
analyzing this data.
Ask for help.
There is no need to go it alone;
we love solving problems and
helping clients to
innovate. Having innovative
clients helps us to innovate and
create even more value. It’s a
virtuous cycle.
Lessons Learned
44
Demonstrate value
early and often.
Smaller wins can fund bigger
wins and help foster
institutional momentum.
43
44
© Grant Thornton LLP. All rights reserved.
Questions
45
© Grant Thornton LLP. All rights reserved.
AuditNet® and cRisk Academy
46
• If you would like forever access to
this webinar recording
• If you are watching the recording,
and would like to obtain CPE
credit for this webinar
• Previous AuditNet® webinars are
also available on-demand for CPE
credit
http://criskacademy.com
http://ondemand.criskacademy.com
Use coupon code: 50OFF for a
discount on this webinar for one week
45
46
© Grant Thornton LLP. All rights reserved.
Thank You!
47
Jim Kaplan
AuditNet® LLC
1-800-385-1625
Email: webinars@auditnet.org
www.auditnet.org
Richard B. Lanza, CPA, CFE, CGMA
Contact Information
D: +1 732 516 5527
M: +1 732 331 3494
Email: rich.lanza@us.gt.com
47

More Related Content

What's hot

Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
PCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionPCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionControlCase
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesSlideTeam
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeArianto Muditomo
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review ChecklistEberly Wilson
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 

What's hot (20)

Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
PCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionPCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed Introduction
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
Fraud detection analysis
Fraud detection analysis Fraud detection analysis
Fraud detection analysis
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 

Similar to Robotic Process Auditing

The Future of Auditing and Fraud Detection
The Future of Auditing and Fraud Detection The Future of Auditing and Fraud Detection
The Future of Auditing and Fraud Detection Jim Kaplan CIA CFE
 
Retrospective data analytics slides
Retrospective data analytics slidesRetrospective data analytics slides
Retrospective data analytics slidesJim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling Jim Kaplan CIA CFE
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel Jim Kaplan CIA CFE
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
Structuring your organization for success with data analytics
Structuring your organization for success with data analytics Structuring your organization for success with data analytics
Structuring your organization for success with data analytics Jim Kaplan CIA CFE
 
How to data mine your print reports
How to data mine your print reports How to data mine your print reports
How to data mine your print reports Jim Kaplan CIA CFE
 
Are You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATAre You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATJim Kaplan CIA CFE
 
Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?Jim Kaplan CIA CFE
 
Driving More Value With Automated Analytics
Driving More Value With Automated AnalyticsDriving More Value With Automated Analytics
Driving More Value With Automated AnalyticsJim Kaplan CIA CFE
 
Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!Jim Kaplan CIA CFE
 
How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program Jim Kaplan CIA CFE
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewJim Kaplan CIA CFE
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsJim Kaplan CIA CFE
 
Visualize audit sampling and fraud detection in excel
Visualize audit sampling and fraud detection in excelVisualize audit sampling and fraud detection in excel
Visualize audit sampling and fraud detection in excelJim Kaplan CIA CFE
 

Similar to Robotic Process Auditing (20)

The Future of Auditing and Fraud Detection
The Future of Auditing and Fraud Detection The Future of Auditing and Fraud Detection
The Future of Auditing and Fraud Detection
 
Retrospective data analytics slides
Retrospective data analytics slidesRetrospective data analytics slides
Retrospective data analytics slides
 
Future audit analytics
Future audit analyticsFuture audit analytics
Future audit analytics
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Structuring your organization for success with data analytics
Structuring your organization for success with data analytics Structuring your organization for success with data analytics
Structuring your organization for success with data analytics
 
How to data mine your print reports
How to data mine your print reports How to data mine your print reports
How to data mine your print reports
 
Are You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATAre You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAAT
 
Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?
 
Driving More Value With Automated Analytics
Driving More Value With Automated AnalyticsDriving More Value With Automated Analytics
Driving More Value With Automated Analytics
 
Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!
 
How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud review
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
IT Fraud and Countermeasures
IT Fraud and CountermeasuresIT Fraud and Countermeasures
IT Fraud and Countermeasures
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal Auditors
 
Visualize audit sampling and fraud detection in excel
Visualize audit sampling and fraud detection in excelVisualize audit sampling and fraud detection in excel
Visualize audit sampling and fraud detection in excel
 
Utilizing Technology to Design Efficient Law Firm Processes
Utilizing Technology to Design Efficient Law Firm ProcessesUtilizing Technology to Design Efficient Law Firm Processes
Utilizing Technology to Design Efficient Law Firm Processes
 

More from Jim Kaplan CIA CFE

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsJim Kaplan CIA CFE
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Jim Kaplan CIA CFE
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10Jim Kaplan CIA CFE
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal AuditorJim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10) Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10) Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Jim Kaplan CIA CFE
 

More from Jim Kaplan CIA CFE (20)

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Ethics for internal auditors
Ethics for internal auditorsEthics for internal auditors
Ethics for internal auditors
 
Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10) Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10)
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Ethics for Internal Auditors
Ethics for  Internal AuditorsEthics for  Internal Auditors
Ethics for Internal Auditors
 

Recently uploaded

Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknowmakika9823
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 

Robotic Process Auditing

  • 1. Robotic Powered Auditing (“RPA”) Rich Lanza | Managing Director Audit Innovation © Grant Thornton LLP. All rights reserved. About Jim Kaplan, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors (available on iOS, Android and Windows devices)  Auditor, Web Site Guru,  Internet for Auditors Pioneer  IIA Bradford Cadmus Memorial Award Recipient  Local Government Auditor’s Lifetime Award  Author of “The Auditor’s Guide to Internet Resources” 2nd Edition 2 1 2
  • 2. © Grant Thornton LLP. All rights reserved. About AuditNet® LLC • AuditNet®, the global resource for auditors, serves the global audit community as the primary resource for Web-based auditing content. As the first online audit portal, AuditNet® has been at the forefront of websites dedicated to promoting the use of audit technology. • Available on the Web, iPad, iPhone, Windows and Android devices and features: • Over 3,100 Reusable Templates, Audit Programs, Questionnaires, and Control Matrices • Webinars focusing on fraud, data analytics, IT audit, and internal audit with free CPE for subscribers and site license users. • Audit guides, manuals, and books on audit basics and using audit technology • LinkedIn Networking Groups • Monthly Newsletters with Expert Guest Columnists • Surveys on timely topics for internal auditors Introductions 3 © Grant Thornton LLP. All rights reserved. HOUSEKEEPING This webinar and its material are the property of AuditNet® and its Webinar partners. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. • If you logged in with another individual’s confirmation email you will not receive CPE as the confirmation login is linked to a specific individual • This Webinar is not eligible for viewing in a group setting. You must be logged in with your unique join link. • We are recording the webinar and you will be provided access to that recording after the webinar. Downloading or otherwise duplicating the webinar recording is expressly prohibited. • If you said you would like CPE you must attend the entire Webinar to receive CPE (no partial CPE will be awarded). • If you meet the criteria for earning CPE you will receive a link via email to download your certificate. The official email for CPE will be issued via NoReply@gensend.io and it is important to white list this address. It is from this email that your CPE credit will be sent. There is a processing fee to have your CPE credit regenerated post event. • Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. • You must answer the survey questions after the Webinar or before downloading your certificate. 4 3 4
  • 3. © Grant Thornton LLP. All rights reserved. IMPORTANT INFORMATION REGARDING CPE! • ATTENDEES - If you attend the entire Webinar you will receive an email with the link to download your CPE certificate. The official email for CPE will be issued via NoReply@gensend.io and it is important to white list this address. It is from this email that your CPE credit will be sent. There is a processing fee to have your CPE credit regenerated post event. • We cannot manually generate a CPE certificate as these are handled by our 3rd party provider. We highly recommend that you work with your IT department to identify and correct any email delivery issues prior to attending the Webinar. Issues would include blocks or spam filters in your email system or a firewall that will redirect or not allow delivery of this email from Gensend.io • We are not responsible for any connection, audio or other computer related issues. You must have pop-ups enabled on you computer otherwise you will not be able to answer the polling questions which occur approximately every 20 minutes. We suggest that if you have any pressing issues to see to that you do so immediately after a polling question. • CPE for this event will be non-NASBA. © Grant Thornton LLP. All rights reserved. The views expressed by the presenters do not necessarily represent the views, positions, or opinions of AuditNet® LLC. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While AuditNet® makes every effort to ensure information is accurate and complete, AuditNet® makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. AuditNet® specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the AuditNet® website. Any mention of commercial products is for information only; it does not imply recommendation or endorsement by AuditNet® LLC Disclaimer 5 6
  • 4. © Grant Thornton LLP. All rights reserved. Additional Disclaimer This Grant Thornton LLP presentation is not a comprehensive analysis of the subject matters covered and may include proposed guidance that is subject to change before it is issued in final form. All relevant facts and circumstances, including the pertinent authoritative literature, need to be considered to arrive at conclusions that comply with matters addressed in this presentation. The views and interpretations expressed in the presentation are those of the presenters and the presentation is not intended to provide accounting or other advice or guidance with respect to the matters covered For additional information on matters covered in this presentation, contact your Grant Thornton LLP adviser © Grant Thornton LLP. All rights reserved. AuditNet® and cRisk Academy • If you would like forever access to this webinar recording • If you are watching the recording, and would like to obtain CPE credit for this webinar • Previous AuditNet® webinars are also available on-demand for CPE credit http://criskacademy.com http://ondemand.criskacademy.com Use coupon code: 50OFF for a discount on this webinar for one week 8 7 8
  • 5. © Grant Thornton LLP. All rights reserved. Richard B. Lanza, CPA, CFE, CGMA • Managing Director in Innovation for Grant Thornton, LLP • Over 25 years of ACL, Excel and other software usage • Received the outstanding achievement in business award by the Association of Certified Fraud Examiners for developing the publication Proactively Detecting Fraud Using Computer Audit Reports as a research project for the IIA • Recently was a contributing author of: • Detecting Corruption with Analytics: A Roadmap – The International Institute for Analytics • Global Technology Audit Guide (GTAG #13) Fraud In An Automated World – Institute Of Internal Auditors. • Cost Recovery – Turning Your Accounts Payable Department Into A Profit Center – Wiley And Sons. • Data Analytics: A Roadmap for Expanding Capabilities (published 2018 in partnership with the IIA's Internal Audit Foundation) • In 2015, discovered a new textual analytic technique using letters called the Lanza Approach to Letter Analytics (LALA)TM The views expressed by the presenters do not necessarily represent the views, positions, or opinions of Grant Thornton, LLP. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant- client relationship. rich.lanza@us.gt.com Richard B. Lanza, CPA, CFE, CGMA 9 © Grant Thornton LLP. All rights reserved. 1 Identify the top opportunities for robotic process automation in audit processes. 2 See where you can become a “citizen programmer”, building the bots in your business processes. 3 Walk through case studies of applied audit-focused RPA Learning objectives 10 4 Consider the limitations and benefits of RPA into a total cost of ownership exercise. 9 10
  • 6. © Grant Thornton LLP. All rights reserved. Mankind's Fascination with Robots Since the 1920's people have been fascinated by the idea of "robots" • A quick scan of popular culture shows us just how interesting robots and AI have been for the past century as subject matter. 11 © Grant Thornton LLP. All rights reserved. Distrust of Technology Audit report issued by Marwick, Mitchell & Co. based on their audit of Northern Shoe Company, Duluth, Minnesota - February 5, 1908 The adding machine in its riper place is an excellent institution but when it is resorted to on every occasion for the simple addition of two and two it becomes not only useless but dangerous…….Apart altogether from the time wasted in this way, the use of the machine which at first may be due to laziness on the part of the employee becomes at length a necessity for it is a well-known fact that the constant use of any mechanical calculator leads inevitably to trophy of the calculating faculty. A man who cannot calculate nimbly and accurately is of very little use as a bookkeeper. We would strongly advise that the adding machine be removed from the office or its use very much restricted. https://caats.ca/ 12 11 12
  • 7. © Grant Thornton LLP. All rights reserved. Specific Tech Driving Modern Robotics 13 Machine Learning Algorithms Facial Recognition Software Predictive Analytics Natural Language Processing 3D Printing Geotagging/GPS location The Internet of Things Optical Character Recognition © Grant Thornton LLP. All rights reserved. Ideal Attributes For Using Robotics • Simple and Tedious (Process complexity is low) • Repetitive (The process will be run numerous times in a given period) • Relatively Static (The process does not change much over time) • Beneficial to run on a schedule (continuously monitoring a control provides additional benefits • Costly to Perform Manually 14 13 14
  • 8. © Grant Thornton LLP. All rights reserved. "Robots" In The Context of Audit • In the audit automation world, a "robot" is a digital "worker" that performs a repetitive task • These digital "bots" have been in use for years in other industries (if you've ever interacted with a chat bot, or Siri you've seen robotics tech in action). • Some technologies that physical robots and AI rely on can be useful (predictive models, machine learning algorithms). • Robots in audit can be automated controls, scripts than run on a scheduler or combine either of these two items with AI to do work more efficiently. 15 © Grant Thornton LLP. All rights reserved. Value proposition 16 Why? How? People Process Technology Insights Efficiency Analytics Automation A.I. 15 16
  • 9. (Automated) Audit Data Analytics © Grant Thornton LLP. All rights reserved. Analytics programs 18 IRP Issuer risk profiling • Predictive analytics • Financial reporting fraud • Restatement • Material weakness • Bankruptcy • Governance concerns • Litigation FSP Forensic support program • Forensic & analytics expertise applied to selected audits • Fraud brainstorming • Incremental / tailored management inquiry • Journal entry testing • Tailored analytics ADA Audit data analytics • Whole ledger analytics • Transactional scoring • Account combinations • Numerical / digital • Text / letter • Semantic 17 18
  • 10. © Grant Thornton LLP. All rights reserved. Analyze Report Transform Validate System Specific Scripts Ensures complete & accurate client data Extract End-to-End automation Whole Ledger Analytics 19 Auto Map and Tag Calculated fields, entry types Pre-Set Quality Tests DR = CR, G/L completeness testing Scripted Analytics 100+ analytics organized into four areas Pre-Formatted Workpapers Excel spreadsheets, Power BI, mobile apps Audit Team Interaction Data + auditor expertise = quality and insights Assess and Enhance 190+ benchmarks for insights and efficiency Augment Benchmark © Grant Thornton LLP. All rights reserved. Overcoming Data Challenges • Normalizing data is 80% of the time (in the beginning) • “By most accounts, 80 percent of the development effort in a big data project goes into data integration and only 20 percent goes toward data analysis.” —Intel Corporation • Data is in every process • It may not be ERP / It may be in your “Big Data” • 90% of data is text • Audit (Internal & External) is the best partner to get the data • They are independent / Not proving the data is a scope limitation • Tend to establish the most secure data warehouses 20 19 20
  • 11. © Grant Thornton LLP. All rights reserved. Automated Data Normalization • Store procedures for data cleanup once • Create a normalized set of data fields named by YOU • Ensure data quality tests are run prior to analysis • Automate these routine tasks to increase analyst’s time • Enrich the data by organizing it by type codes 21 © Grant Thornton LLP. All rights reserved. Automating Data E.T.L. • All of the Company's data is captured in an SAP G/L • Audit team had to budget almost 100 hours just on importing and combining various report extracts • Data analytics and innovation were introduced in the current year audit • Data import process was reduced from 25 hours /quarter to only 2 hours/quarter 22 21 22
  • 12. © Grant Thornton LLP. All rights reserved. 404: Training Data Not Found • Robots are not perfect; and will fail, behave unexpectedly and trip over their own feet (just like me from time to time). • Robots will never replace auditors; but instead will make their jobs easier and allow them more free time to innovate. 23 Image from the DARPA Robotics Challenge © Grant Thornton LLP. All rights reserved. Whole ledger analytics: transactional scoring 24 Top entries SCORE_RATIO INC_STMT_IMPACT BAL_SHEET_IMPACT Description Posting Date 1 0.338 (216,678.08) 216,678.08 To balance to subledger 12/31/2016 Abs.Income StatementImpact Risk Score Ratio 23 24
  • 13. © Grant Thornton LLP. All rights reserved. Other Analytics Solutions 25 ACCOUNTS PAYABLE Performs control analysis, proactive fraud testing through vendor risk ranking and cost recovery detection for the procure to pay process. 75 SCRIPTS REVENUE Identifies revenue transactions that indicate a higher risk of material misstatement as well as control analysis. 50 SCRIPTS P-CARD Identify risky P-Card transactions and usage behaviors. 30 SCRIPTS TRAVEL & EXPENSE Analyze travel and expense data to identify inappropriate or suspicious employee expenses, and manage T&E efforts. 20 SCRIPTS FCPA Third Party Vendor Risk-rank vendors by elements of risk that may result in a FCPA violation, individual vendor analysis and predictive analytics to predict transactions costs by vendor. 25 SCRIPTS Whole Ledger Analytics Dashboard WB58 25 26
  • 14. Slide 26 WB58 after this slide, insert trending by month and benchmarking toolkit slide from WLA summit training? Wolohan, Brian, 5/13/2019
  • 15. © Grant Thornton LLP. All rights reserved. Audit evidence from external data 27 Sales Correlates with: Client Website Traffic + App Usage Account Openings Correlate with: Web Search for Client Name + App Downloads © Grant Thornton LLP. All rights reserved. Benchmarking WLA for machine learning • Journal Statistic Examples • Average lines per journal • % of journals posted by day • Average income effect per journal • User Statistic Examples • Average entries per user per day • % of manual to automated entries • WLA Result Examples • Entries and line items by WLA report (e.g., round dollar journals) • Risk score average, median and standard deviation 28 27 28
  • 16. Robotic Process Automation © Grant Thornton LLP. All rights reserved. Process Characteristics for RPA 30 29 30
  • 17. © Grant Thornton LLP. All rights reserved. Example Target Functions and Process Areas Revenue Cycle Information Technology Procure to Pay Order to Cash Record to Report Supply Chain Insurance Authorization Datacenter Customer Master Gen. Acct. / Close Vendor Master CRM & Customer Service Network Operations Sourcing / Contract Management Reporting Credit / Contract Demand Management Charge Posting Security Admin. PO Process Order Process External Reporting Materials Management Training & Development Service Desk Goods Receipt Treasury Logistics / Delivery Capacity Flow Management Write-offs Desktop Support Invoice Process Billing / Disp. Res. Tax Transport & Logistics Performance Metrics Database Admin. Collections Payment Process FP & A Carrier Management Cash PostingApplications Cash Application Controllership T & E Returns Management Functions (L1) High level aggregations of company functionality Process Areas (L2) Bundles of processes that belong to the same area of responsibility Industry- Specific Ops In addition to the cross-industry functions listed at right, we find RPA opportunities in industry-specific processes such as loan servicing (Banks), claims processing (Insurance), rebates and tracings (Manufacturing), etc. Denials Management 31 © Grant Thornton LLP. All rights reserved. User Access Review Controls Grant Thornton automated user access control testing for the following attributes: • Whether access was approved by appropriate personnel • Whether the approval occurred within the required time frame • If the access is set to be revoked then the account is flagged for immediate attention and an alert is sent to the control owner. Human Resources Roles Validation The clients control stated that HR personnel with access to modify payroll information must also have a role assigned that prevents modification of their own payroll information. Grant Thornton automated this test to verify that all HR personnel are restricted from modifying their own payroll fields. SQL Database Backup Jobs Grant Thornton automated a test to verify that SQL jobs are in place to backup SQL databases on a regularly scheduled basis. This automated test also included tests for the following attributes: • The backup jobs are configured to backup the full database per the backup requirements • The backup alerts are set to notify personnel when a backup fails or is completed successfully • The alerts are configured to notify appropriate personnel Removal of Inactive SAP account access Grant Thornton automated a test for inactive SAP account access that is greater than the Company's specified threshold. Any account that has not accessed the system within this threshold is flagged for immediate attention and an alert is sent to the control owner for access to be removed. Control Automation Examples 32 31 32
  • 18. © Grant Thornton LLP. All rights reserved. 33 Use Case Example User access review approval testing Business Benefits:  Reduction in control testing time  Increased assurance through test of control samples (can include 100% population testing)  Auditor capacity shifted to handle more complex tasks & exceptions ICA Business Issue:  Control testing that is time consuming (hours) and low value for management Import the testing population data Execute the test in R Clean the data in either MLS or R The data gets exported from MLS into a SQL database The data is visualized in a PowerBI report API Minimal human interaction © Grant Thornton LLP. All rights reserved. Changing the Nature of Risk Mgmt Before Adjustments to Microsoft Control (user access control): • User access for SAP sampled at 25 users per quarter, catching potential access issues every three months • Excessive time spent testing – 2 hours per control per year Automated control monitoring using advance analytics – efficient value protection Sample based control testing - basic risk management Partial Assurance Before 2 hours per control Value Protection After <5 minutes per control Manual Compliance Assessment Automated Compliance Monitoring After Adjustments to Microsoft Control (user access control): • SAP user access tested at 100%, in real time • Testing performed in seconds or minutes • Microsoft responds to user access problems in real time – as opposed to quarterly Pass / Fail Control 1 Pass Control 2 Pass Control 3 Pass Control 4 Fail Control 5 Pass Time savings of 95%+ per control – from risk mitigation to value protection Efficiency Value Protection Before After 34 33 34
  • 19. Robotic Powered Auditing © Grant Thornton LLP. All rights reserved. Workflow automations 36 Example: property, plant and equipment Performs audit procedures: • Prepares fixed asset rollforward • Reconciles to general ledger • Recalculates depreciation expense • Identifies most efficient selection approach • Generates selection for test of details Scans for notable activity: • Disposals in ending sub ledger • Additions disposed of in the same year • Assets whose standard life deviates from the norm 35 36
  • 20. © Grant Thornton LLP. All rights reserved. Employee Benefit Plan Loans Analyser Automating procedures over participant loans Data Receipt and Ingestion  Receive the loans detail report from the Record Keeper  Complete the "EBP Loans Tool - Data Request Form"  Analytics Team cleanses the loan detail report and imports into ACL. Step one Step two Fill Out the Dialog Box  Data fields are input in software dialog boxes  Client specific variables are input into dialogs (ie. each participant in the Plan can only have 2 loans). Step three Run the Script / Export Results  Software script is run  Non-compliant participant loans are identified  Dashboard in Excel acts as the engagement team workpaper. Step four Evaluate the Results  Dashboard with notable items  Investigation is performed and results are documented. 37 © Grant Thornton LLP. All rights reserved. Continuous automation 38 Example: confirming customer activity and balances Generated hundreds of confirmations in under 3 minutes • Extracted each customer's transaction and balance detail • Prepared and distributed e-mail confirmations • Provided customers with one-click confirmation option Processed responses automatically • Electronically logged replies to confirmations • Created automated workpapers Bespoke automation solution was designed, developed, and deployed in less than one week 37 38
  • 21. People, Process and Technology © Grant Thornton LLP. All rights reserved. Auditor of the future skillset • Ability to reimagine the audit • Data analytics mindset  Asking the right questions  Extracting, transforming and loading relevant data  Applying appropriate data analytics techniques  Interpreting and sharing the results with stakeholders • Critical thinking (questioning mind, weighing evidence) • Communication: • Interaction with a team and with the client (asking the right question and listening) • Writing – communication of facts and articulation of persuasive argument • Ability to collaborate with people of different geographies and varying skill sets • Selling new innovation / change management 40 39 40
  • 22. © Grant Thornton LLP. All rights reserved. Desired analytic-enabled auditor skills • Analytics mindset • Analytic technical skills • Data management and acquisition • Database modeling • Tool development and programming • Predictive modeling and statistics • Other Skills • IT project management 41 © Grant Thornton LLP. All rights reserved. Robotic Process Automation Limitations RPA cannot read any data that is non-electronic with unstructured inputs • An example would be input such as paper invoices. In this case, RPA will only work with a collection of other implemented technologies (such as OCR) required to make it digital and structured. RPA requires some form of static consistency • For example, invoices may be received in different formats, with fields placed in different areas. For a ‘Bot’ to be able to read an invoice, all supplier invoices must be received in the same format with the same fields. • Although robots can be trained by exception to read different fields, they cannot read multiple different formats – unless these are all digital and configured separately. 42 41 42
  • 23. © Grant Thornton LLP. All rights reserved. Robotic Process Automation Limitations RPA is not a cognitive computing solution • It cannot learn from experience and therefore has a ‘shelf life’. • As processes evolve – for example, through the introduction and use of other technologies — they may become redundant and require changes. • It is therefore wise for a company to examine the process prior to building a ‘Bot’. Applied to a process that is inefficient and/or on the way out, that shelf life may be reduced to just a year. Applying RPA to an inefficient process will not fix it – "paving cowpaths" • RPA is not a Business Process Management solution and does not bring an end-to-end process view • The same goes for out of date infrastructure – RPA will only mask the underlying issues. • Clients should focus first on addressing the root causes of their process or technology inefficiencies and then apply RPA to maximize the benefits. 43 © Grant Thornton LLP. All rights reserved. Start with what you have Your data can be a rich source of insights and business intelligence. Inexpensive tools can be used to get started in analyzing this data. Ask for help. There is no need to go it alone; we love solving problems and helping clients to innovate. Having innovative clients helps us to innovate and create even more value. It’s a virtuous cycle. Lessons Learned 44 Demonstrate value early and often. Smaller wins can fund bigger wins and help foster institutional momentum. 43 44
  • 24. © Grant Thornton LLP. All rights reserved. Questions 45 © Grant Thornton LLP. All rights reserved. AuditNet® and cRisk Academy 46 • If you would like forever access to this webinar recording • If you are watching the recording, and would like to obtain CPE credit for this webinar • Previous AuditNet® webinars are also available on-demand for CPE credit http://criskacademy.com http://ondemand.criskacademy.com Use coupon code: 50OFF for a discount on this webinar for one week 45 46
  • 25. © Grant Thornton LLP. All rights reserved. Thank You! 47 Jim Kaplan AuditNet® LLC 1-800-385-1625 Email: webinars@auditnet.org www.auditnet.org Richard B. Lanza, CPA, CFE, CGMA Contact Information D: +1 732 516 5527 M: +1 732 331 3494 Email: rich.lanza@us.gt.com 47