SlideShare a Scribd company logo
Moving up the Maturity Curve toward more Continuous Controls and Continuous Risk Assessment Joe Oringel Don Sparks, Audimation Charlotte NC March 31, 2009 ,[object Object]
Opening thoughts on Continuous Auditing ,[object Object],[object Object],[object Object],[object Object],[object Object],GRC thought leadership, practically applied © 2008 Visual Risk IQ and Vonya Global - All Rights Reserved
What does Wall Street guidance look like? How are economic conditions affecting you? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The IIA’s GTAG was published in 2005 Where are we now? Level-setting / Review of Industry Guidance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved
Relationship between Continuous Auditing, Monitoring, and Assurance ,[object Object],[object Object],[object Object],[object Object],Level-setting / Review of Industry Guidance ,[object Object],[object Object],[object Object]
Evolution from CAATS to CA to CM CAATs Continuous Auditing Continuous Monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Level-setting / Review of Industry Guidance Internal Audit Business
Continuous Auditing is a hot topic for today’s    Audit leader - but what is Continuous? Continuous auditing and continuous monitoring become “right time” when the timing and frequency of evaluation matches business requirements. What frequency is right for your revenue transactions?  Supply chain? ** Source:  2006 State of the Internal Auditing Profession  Copyright  PricewaterhouseCoopers LLP  2006 Continuous auditing / continuous monitoring programs Today’s continuous auditing frequency Market View of Continuous Auditing Visual Risk IQ is a leader in Continuous Auditing and Monitoring © 2007 Visual Risk IQ, LLC, All Rights Reserved
What is “continual risk assessment” and how   does it relate to continuous auditing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Continual risk assessment
Implementing continuous auditing across an internal audit methodology is not just about technology… Enterprise Audit Projects The audit process Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Technology Technology
… it’s about a model that acknowledges the impact of People, Audit Process and Governance also. Enterprise Audit Projects The audit process Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved People Technology Governance Audit process People Technology Governance Audit process
A basic continuous auditing maturity model The audit process – a maturity model approach Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Basic practices Level 2 practices Better practices Continuous auditing People Staff has some basic data literacy.  Knows how to ask IT for information. Some IT- and data-specific specialists are accessible, either in-house or as consultants Audit staff and leaders are IT- and data-literate.  Little distinction between IT audit and financial / operational audit people No need for ad hoc data acquisition - CA and CCM systems are well-integrated into finance and operations Technology Basic data capture and analysis using MS-Office or ERP Query tools.  Heavy reliance on Corporate IT Some re-usable scripts exists and are used on-demand for relevant audit projects Scripts are stored, scheduled, and run at appropriate intervals Continuous auditing and monitoring technologies contribute to all audit steps Governance Business is reactive to requests from Internal Audit and usually helps in a timely way.  Audit can access data directly  IT consults with IA prior to making system changes that are known to affect IA.  Data driven early warning / risk alerts include both business and controls / audit implications.  Audit methodology Risk assessments are conducted annually Risk assessments are conducted more frequently than annually Risk assessments consider objective and subjective data.  Gaps between objective and subjective assessments are highlighted  Risk alerts are embedded into the IA methodology and drive specific responses real-time
Moving up the curve can rarely done    in large steps The audit process – a maturity model approach Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Basic practices Level 2 practices Better practices Continuous auditing People Staff has some basic data literacy.  Knows how to ask IT for information. Some IT- and data-specific specialists are accessible, either in-house or as consultants Audit staff and leaders are IT- and data-literate.  Little distinction between IT audit and financial / operational audit people No need for ad hoc data acquisition - CA and CCM systems are well-integrated into finance and operations Technology Basic data capture and analysis using MS-Office or ERP Query tools.  Heavy reliance on Corporate IT Some re-usable scripts exists and are used on-demand for relevant audit projects Scripts are stored, scheduled, and run at appropriate intervals Continuous auditing and monitoring technologies contribute to all audit steps Governance Business is reactive to requests from Internal Audit and usually helps in a timely way.  Audit can access data directly  IT consults with IA prior to making system changes that are known to affect IA.  Data driven early warning / risk alerts include both business and controls / audit implications.  Audit methodology Risk assessments are conducted annually Risk assessments are conducted more frequently than annually Risk assessments consider objective and subjective data.  Gaps between objective and subjective assessments are highlighted  Risk alerts are embedded into the IA methodology and drive specific responses real-time
Risk assessment should be the new    centerpiece for the audit process Enterprise Audit Projects Risk Assessment Planning & Scoping Execution Planning & Scoping Execution Planning Planning & Scoping Execution Reporting Reporting Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Continual risk assessment
Visual reporting can help with Continual Risk Assessment and Continuous Controls Monitoring Corporate Data Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Continual risk assessment
Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Continual risk assessment  What are other leading companies doing?
What are other leading companies doing? Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Continual risk assessment
Presentation to the Triad Chapter of the IIAVisual Risk IQ is a leader in Continuous Auditing and Monitoring © 2007 Visual Risk IQ, LLC, All Rights Reserved Regularly updated outlier dashboards can    serve as a key top-level report for CRA / CCM Continual risk assessment
Another Client Example Individualized per division with drill-down capability… Continual risk assessment
Another Client Example, continued … turning data into meaningful information. Continual risk assessment
A good continuous controls monitoring platform The Platform Data Locker Reasoning & Analytics Engine Risk and Performance Checks Platform Data & Logs Visual Reporting / User Interface Systems of Record Workflow Engine Extract & Mapping Rules Workflow & Platform Configuration Extract, Map & Load Common Data Models Knowledge Maintenance Interface What does this look like at best in class companies? Visual Risk IQ is a leader in Continuous Auditing and Monitoring © 2007 Visual Risk IQ, LLC, All Rights Reserved
What can we do on Monday? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Takeaways
Joe Oringel  (704) 752-6403 [email_address]   Don Sparks 713-327-1877 [email_address] www.visualriskiq.com www.audimation.com Thank you!  For more information or discussion, please contact Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved
Visual Risk IQ Points of distinction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved

More Related Content

What's hot

Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isaca
pooshu
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guide
CenapSerdarolu
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
ERSHUBHAM TIWARI
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
Ed Tobias
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
Donald E. Hester
 
Audit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit ApproachAudit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit Approach
Nur Dalila Zamri
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
Damilola Mosaku
 
008.itsecurity bcp v1
008.itsecurity bcp v1008.itsecurity bcp v1
008.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
Audit ratings guide
Audit ratings guideAudit ratings guide
Audit ratings guide
CenapSerdarolu
 
Sap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftSap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoft
PennonSoft
 
Internal audit test type guide
Internal audit test type guideInternal audit test type guide
Internal audit test type guide
CenapSerdarolu
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
Ahmed Abdul Hamed
 
Key considerations for your internal audit plan
Key considerations for your internal audit planKey considerations for your internal audit plan
Key considerations for your internal audit plan
essbaih
 
Risk Assessment For Internal Auditors
Risk Assessment For Internal AuditorsRisk Assessment For Internal Auditors
Risk Assessment For Internal Auditors
minkhollow
 
Fraud detection guide
Fraud detection guideFraud detection guide
Fraud detection guide
CenapSerdarolu
 
Seg dutieschecklist
Seg dutieschecklistSeg dutieschecklist
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
Rajeswaran Muthu Venkatachalam
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2
Yasir Khan
 
Implementing Robust AML/CFT Monitoring Solutions
Implementing Robust AML/CFT Monitoring SolutionsImplementing Robust AML/CFT Monitoring Solutions
Implementing Robust AML/CFT Monitoring Solutions
Francois Combrinck CBAP
 

What's hot (19)

Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isaca
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guide
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
 
Audit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit ApproachAudit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit Approach
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
008.itsecurity bcp v1
008.itsecurity bcp v1008.itsecurity bcp v1
008.itsecurity bcp v1
 
Audit ratings guide
Audit ratings guideAudit ratings guide
Audit ratings guide
 
Sap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftSap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoft
 
Internal audit test type guide
Internal audit test type guideInternal audit test type guide
Internal audit test type guide
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
Key considerations for your internal audit plan
Key considerations for your internal audit planKey considerations for your internal audit plan
Key considerations for your internal audit plan
 
Risk Assessment For Internal Auditors
Risk Assessment For Internal AuditorsRisk Assessment For Internal Auditors
Risk Assessment For Internal Auditors
 
Fraud detection guide
Fraud detection guideFraud detection guide
Fraud detection guide
 
Seg dutieschecklist
Seg dutieschecklistSeg dutieschecklist
Seg dutieschecklist
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2
 
Implementing Robust AML/CFT Monitoring Solutions
Implementing Robust AML/CFT Monitoring SolutionsImplementing Robust AML/CFT Monitoring Solutions
Implementing Robust AML/CFT Monitoring Solutions
 

Similar to Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only

eob_dec14.artok
eob_dec14.artokeob_dec14.artok
eob_dec14.artok
Andrew Simpson
 
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk IqFinding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Joe Oringel
 
Ignorance Is Risk
Ignorance Is RiskIgnorance Is Risk
Ignorance Is Risk
Jeromie Jackson
 
Continous auditing and risk monitoring 9 23-09
Continous auditing and risk monitoring  9 23-09Continous auditing and risk monitoring  9 23-09
Continous auditing and risk monitoring 9 23-09
Gaiani (CarnCorpAudit)
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
Jim Kaplan CIA CFE
 
Rhd + Visual Risk Iq Presentation On Continuous Auditing District Conferenc...
Rhd + Visual Risk Iq Presentation On Continuous Auditing   District Conferenc...Rhd + Visual Risk Iq Presentation On Continuous Auditing   District Conferenc...
Rhd + Visual Risk Iq Presentation On Continuous Auditing District Conferenc...
Joe Oringel
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
Prashant Jain
 
Staff Accountability.pptx
Staff Accountability.pptxStaff Accountability.pptx
Staff Accountability.pptx
AbhijitSamant6
 
Auditing
AuditingAuditing
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurance
wisnu wardhana, i nyoman
 
PBI 9/15/PBI/2007
PBI 9/15/PBI/2007PBI 9/15/PBI/2007
PBI 9/15/PBI/2007
presidenri
 
Internal Audit Considerations in Creating an RPA Program
Internal Audit Considerations in Creating an RPA ProgramInternal Audit Considerations in Creating an RPA Program
Internal Audit Considerations in Creating an RPA Program
Auxis Consulting & Outsourcing
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
Security Executive Council
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
Tommy Seah
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_Intindolo
John Intindolo
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
Rishabh Software
 
It governance
It governanceIt governance
It Governance Methodology Cox
It Governance Methodology CoxIt Governance Methodology Cox
It Governance Methodology Cox
William Cox MBA, QPM, CSM, PMP, CPHIMS
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
Kaloyan Krastev
 
Gail Gillis Resume vMarch 2015
Gail Gillis Resume vMarch 2015Gail Gillis Resume vMarch 2015
Gail Gillis Resume vMarch 2015
Gail Gillis
 

Similar to Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only (20)

eob_dec14.artok
eob_dec14.artokeob_dec14.artok
eob_dec14.artok
 
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk IqFinding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
 
Ignorance Is Risk
Ignorance Is RiskIgnorance Is Risk
Ignorance Is Risk
 
Continous auditing and risk monitoring 9 23-09
Continous auditing and risk monitoring  9 23-09Continous auditing and risk monitoring  9 23-09
Continous auditing and risk monitoring 9 23-09
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
 
Rhd + Visual Risk Iq Presentation On Continuous Auditing District Conferenc...
Rhd + Visual Risk Iq Presentation On Continuous Auditing   District Conferenc...Rhd + Visual Risk Iq Presentation On Continuous Auditing   District Conferenc...
Rhd + Visual Risk Iq Presentation On Continuous Auditing District Conferenc...
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
 
Staff Accountability.pptx
Staff Accountability.pptxStaff Accountability.pptx
Staff Accountability.pptx
 
Auditing
AuditingAuditing
Auditing
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurance
 
PBI 9/15/PBI/2007
PBI 9/15/PBI/2007PBI 9/15/PBI/2007
PBI 9/15/PBI/2007
 
Internal Audit Considerations in Creating an RPA Program
Internal Audit Considerations in Creating an RPA ProgramInternal Audit Considerations in Creating an RPA Program
Internal Audit Considerations in Creating an RPA Program
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_Intindolo
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
 
It governance
It governanceIt governance
It governance
 
It Governance Methodology Cox
It Governance Methodology CoxIt Governance Methodology Cox
It Governance Methodology Cox
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
Gail Gillis Resume vMarch 2015
Gail Gillis Resume vMarch 2015Gail Gillis Resume vMarch 2015
Gail Gillis Resume vMarch 2015
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Continuous Auditing is a hot topic for today’s Audit leader - but what is Continuous? Continuous auditing and continuous monitoring become “right time” when the timing and frequency of evaluation matches business requirements. What frequency is right for your revenue transactions? Supply chain? ** Source: 2006 State of the Internal Auditing Profession Copyright PricewaterhouseCoopers LLP 2006 Continuous auditing / continuous monitoring programs Today’s continuous auditing frequency Market View of Continuous Auditing Visual Risk IQ is a leader in Continuous Auditing and Monitoring © 2007 Visual Risk IQ, LLC, All Rights Reserved
  • 8.
  • 9. Implementing continuous auditing across an internal audit methodology is not just about technology… Enterprise Audit Projects The audit process Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Technology Technology
  • 10. … it’s about a model that acknowledges the impact of People, Audit Process and Governance also. Enterprise Audit Projects The audit process Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved People Technology Governance Audit process People Technology Governance Audit process
  • 11. A basic continuous auditing maturity model The audit process – a maturity model approach Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Basic practices Level 2 practices Better practices Continuous auditing People Staff has some basic data literacy. Knows how to ask IT for information. Some IT- and data-specific specialists are accessible, either in-house or as consultants Audit staff and leaders are IT- and data-literate. Little distinction between IT audit and financial / operational audit people No need for ad hoc data acquisition - CA and CCM systems are well-integrated into finance and operations Technology Basic data capture and analysis using MS-Office or ERP Query tools. Heavy reliance on Corporate IT Some re-usable scripts exists and are used on-demand for relevant audit projects Scripts are stored, scheduled, and run at appropriate intervals Continuous auditing and monitoring technologies contribute to all audit steps Governance Business is reactive to requests from Internal Audit and usually helps in a timely way. Audit can access data directly IT consults with IA prior to making system changes that are known to affect IA. Data driven early warning / risk alerts include both business and controls / audit implications. Audit methodology Risk assessments are conducted annually Risk assessments are conducted more frequently than annually Risk assessments consider objective and subjective data. Gaps between objective and subjective assessments are highlighted Risk alerts are embedded into the IA methodology and drive specific responses real-time
  • 12. Moving up the curve can rarely done in large steps The audit process – a maturity model approach Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Basic practices Level 2 practices Better practices Continuous auditing People Staff has some basic data literacy. Knows how to ask IT for information. Some IT- and data-specific specialists are accessible, either in-house or as consultants Audit staff and leaders are IT- and data-literate. Little distinction between IT audit and financial / operational audit people No need for ad hoc data acquisition - CA and CCM systems are well-integrated into finance and operations Technology Basic data capture and analysis using MS-Office or ERP Query tools. Heavy reliance on Corporate IT Some re-usable scripts exists and are used on-demand for relevant audit projects Scripts are stored, scheduled, and run at appropriate intervals Continuous auditing and monitoring technologies contribute to all audit steps Governance Business is reactive to requests from Internal Audit and usually helps in a timely way. Audit can access data directly IT consults with IA prior to making system changes that are known to affect IA. Data driven early warning / risk alerts include both business and controls / audit implications. Audit methodology Risk assessments are conducted annually Risk assessments are conducted more frequently than annually Risk assessments consider objective and subjective data. Gaps between objective and subjective assessments are highlighted Risk alerts are embedded into the IA methodology and drive specific responses real-time
  • 13. Risk assessment should be the new centerpiece for the audit process Enterprise Audit Projects Risk Assessment Planning & Scoping Execution Planning & Scoping Execution Planning Planning & Scoping Execution Reporting Reporting Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Continual risk assessment
  • 14. Visual reporting can help with Continual Risk Assessment and Continuous Controls Monitoring Corporate Data Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Continual risk assessment
  • 15. Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Continual risk assessment What are other leading companies doing?
  • 16. What are other leading companies doing? Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved Continual risk assessment
  • 17. Presentation to the Triad Chapter of the IIAVisual Risk IQ is a leader in Continuous Auditing and Monitoring © 2007 Visual Risk IQ, LLC, All Rights Reserved Regularly updated outlier dashboards can serve as a key top-level report for CRA / CCM Continual risk assessment
  • 18. Another Client Example Individualized per division with drill-down capability… Continual risk assessment
  • 19. Another Client Example, continued … turning data into meaningful information. Continual risk assessment
  • 20. A good continuous controls monitoring platform The Platform Data Locker Reasoning & Analytics Engine Risk and Performance Checks Platform Data & Logs Visual Reporting / User Interface Systems of Record Workflow Engine Extract & Mapping Rules Workflow & Platform Configuration Extract, Map & Load Common Data Models Knowledge Maintenance Interface What does this look like at best in class companies? Visual Risk IQ is a leader in Continuous Auditing and Monitoring © 2007 Visual Risk IQ, LLC, All Rights Reserved
  • 21.
  • 22. Joe Oringel (704) 752-6403 [email_address] Don Sparks 713-327-1877 [email_address] www.visualriskiq.com www.audimation.com Thank you! For more information or discussion, please contact Visual Risk IQ – GRC thought leadership, practically applied © 2008 Visual Risk IQ, LLC, All Rights Reserved
  • 23.

Editor's Notes

  1. Objectives today - CPE. No cost CPE, introduction to our respective firms as a credible partner / thought leader in the audit, GRC, and ERM space. Relatively young firms coming together for this event in Chicago. We’re not staffing firms - we’re advisory firms. So sharing what we know and how we’ve helped others is in our DNA. None of us know as much as all of us knows, so this morning is about sharing experiences. Observation is that CA / CM is often seen as hard to get started. But our experience is that if you’re not trying to build Rome in a day, there are some pretty valuable, low cost construction projects available to you. Let’s start a dialog, and see where it takes us.