When Data Visualizations and Data Imports Just Don’t Work – Importing data is a dirty job as can painting user final pictures with that data. This webinar will explore the dirty little secrets that ensure data is imported completely and accurately, as well as, painting scenarios when a visualization may not be the best approach to meeting an audit objective. Specific learning objectives include:
o Walk through case studies of “dirty” data and how to improve then using improved data requests and cleansing tools.
o Watch case study examples of top tests to validate data tables to ensure data quality.
o Discover a host of baseline tests and other baseline statistics to validate, understand and possibly extract key trends for review.
o Understand visualization and dashboard types along with their associated analytical strengths from an audit perspective.
o Identify situations where statistics may be more effective audit extractors than relying on the human eye to spot notable events.
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts.
FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.
White-Collar Crime Fighter Newsletter Subscribe Now at No Cost!
FraudResourceNet has made the premier Anti-Fraud newsletter, White-Collar Crime Fighter freely available to all. All this is required is to complete the registration form with your work email address!
The widely read newsletter, White-Collar Crime Fighter brings you expert strategies and actionable advice from the most prominent experts in the fraud-fighting business. Every two months you'll learn about the latest frauds, scams and schemes... and the newest and most effective fraud-fighting tools, techniques and technologies to put to work immediately to protect your organization.
When it comes to fraud, knowledge of the countless schemes, how they work and red flags to look for will help keep you, your organization and your clients safe.
At FraudResourceNet we understand this and take great pride in providing our FREE White Collar Crime Fighter newsletter -- filled with exclusive articles and tips to provide the knowledge you need.
Make sure you stay informed. Sign up for White Collar Crime Fighter newsletter and we’ll keep you up-to-date on special promos, training opportunities, and other news and offers from FraudResourceNet!
Signing up is easy and FREE. If you have not already subscribed to our newsletter, please sign up to get started!
Sign up for the White Collar Crime Fighter Newsletter (a $99 value ... now completely FREE)
Learn to Effectively Script in ACL – The Keys To Getting Started and Fully Au...Jim Kaplan CIA CFE
ACL Software is a powerful product yet many users are concerned it is difficult to start and therefore, may never effectively maximize the product. If you fall into this category or just want to learn from one of the top industry experts in ACL Software (over 20 years experience), this course will provide the key learning blocks to get started quickly auditing three top audit areas for data analytics.
This course will provide the key learning blocks to get started quickly auditing three top audit areas for data analytics. Through practical example across various audit areas, the attendee will walk away with an ability to import data, execute basic analytics in ACL and run over 100 ACL pre-made scripts (reports) provided in the course.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
ACL Software is a powerful product yet many users are concerned it is difficult to start and therefore, may never effectively maximize the product. If you fall into this category or just want to learn from one of the top industry experts in ACL Software (over 20 years experience), this course will provide the key learning blocks to get started quickly auditing three top audit areas for data analytics.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
The document provides an overview of ACL software products and services offered by DataConsulting Ltd. It outlines their expertise in data analytics, continuous auditing and controls monitoring. The presentation agenda includes an overview of ACL desktop and AX core products, sample applications, direct links for SAP and other ERP systems, and the AX exception product for continuous monitoring. Use cases and benefits of each product are described. Contact details are provided at the end.
Continuous auditing and monitoring (“continuous reviews”) has been discussed for decades but implemented in moderation based on recent surveys. It comes down to how much are data analytics integrated into our audit processes initially to then become continuous. If a high degree of integration exists, then there is probably a good amount of continuous reviews happening in the organization already.
However, most companies fall into the other camp and have not integrated analytics well enough or considered how to take full advantage of continuous reviews.
This course will explain culturally what audit departments must do to embrace continuous reviews and how that can be integrated with ACL Desktop software techniques. Sample files and scripts will be provided to get you started down the road to continuous reviews.
As regulatory changes sweep the globe, auditors, risk management, and compliance professionals are using more sophisticated tools, and methods.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
This presentation provides a brief overview of key features of T-CAAT Ent which is an add-in software to MS Excel. It can be used for Exporting Masters, Vouchers and Reports from Tally to MS Excel in a structured Format. it also has specific functions for assurance/compliance.
T-CAAT Pro is a software add-in for MS Excel that allows users to extract data from Tally accounting software into Excel in a structured format. It has over 35 functions to import masters, transactions, and reports from Tally with just a few clicks. This exported structured data can then be easily analyzed in Excel or other data analytics software. The software helps accounting and audit professionals supplement Tally's simplicity with Excel's powerful data analytics capabilities. It saves time by streamlining the process of getting Tally data into Excel for further review and analysis.
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques Jim Kaplan CIA CFE
Data analytics does not need to be difficult or time consuming to start and in this course, we will focus on the key learning blocks needed within Microsoft Excel to be an effective data analytic auditor or accountant.
As regulatory changes sweep the globe, auditors, risk management, and compliance professionals are using more sophisticated tools, and methods.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts.
FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.
White-Collar Crime Fighter Newsletter Subscribe Now at No Cost!
FraudResourceNet has made the premier Anti-Fraud newsletter, White-Collar Crime Fighter freely available to all. All this is required is to complete the registration form with your work email address!
The widely read newsletter, White-Collar Crime Fighter brings you expert strategies and actionable advice from the most prominent experts in the fraud-fighting business. Every two months you'll learn about the latest frauds, scams and schemes... and the newest and most effective fraud-fighting tools, techniques and technologies to put to work immediately to protect your organization.
When it comes to fraud, knowledge of the countless schemes, how they work and red flags to look for will help keep you, your organization and your clients safe.
At FraudResourceNet we understand this and take great pride in providing our FREE White Collar Crime Fighter newsletter -- filled with exclusive articles and tips to provide the knowledge you need.
Make sure you stay informed. Sign up for White Collar Crime Fighter newsletter and we’ll keep you up-to-date on special promos, training opportunities, and other news and offers from FraudResourceNet!
Signing up is easy and FREE. If you have not already subscribed to our newsletter, please sign up to get started!
Sign up for the White Collar Crime Fighter Newsletter (a $99 value ... now completely FREE)
Learn to Effectively Script in ACL – The Keys To Getting Started and Fully Au...Jim Kaplan CIA CFE
ACL Software is a powerful product yet many users are concerned it is difficult to start and therefore, may never effectively maximize the product. If you fall into this category or just want to learn from one of the top industry experts in ACL Software (over 20 years experience), this course will provide the key learning blocks to get started quickly auditing three top audit areas for data analytics.
This course will provide the key learning blocks to get started quickly auditing three top audit areas for data analytics. Through practical example across various audit areas, the attendee will walk away with an ability to import data, execute basic analytics in ACL and run over 100 ACL pre-made scripts (reports) provided in the course.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
ACL Software is a powerful product yet many users are concerned it is difficult to start and therefore, may never effectively maximize the product. If you fall into this category or just want to learn from one of the top industry experts in ACL Software (over 20 years experience), this course will provide the key learning blocks to get started quickly auditing three top audit areas for data analytics.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
The document provides an overview of ACL software products and services offered by DataConsulting Ltd. It outlines their expertise in data analytics, continuous auditing and controls monitoring. The presentation agenda includes an overview of ACL desktop and AX core products, sample applications, direct links for SAP and other ERP systems, and the AX exception product for continuous monitoring. Use cases and benefits of each product are described. Contact details are provided at the end.
Continuous auditing and monitoring (“continuous reviews”) has been discussed for decades but implemented in moderation based on recent surveys. It comes down to how much are data analytics integrated into our audit processes initially to then become continuous. If a high degree of integration exists, then there is probably a good amount of continuous reviews happening in the organization already.
However, most companies fall into the other camp and have not integrated analytics well enough or considered how to take full advantage of continuous reviews.
This course will explain culturally what audit departments must do to embrace continuous reviews and how that can be integrated with ACL Desktop software techniques. Sample files and scripts will be provided to get you started down the road to continuous reviews.
As regulatory changes sweep the globe, auditors, risk management, and compliance professionals are using more sophisticated tools, and methods.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
This presentation provides a brief overview of key features of T-CAAT Ent which is an add-in software to MS Excel. It can be used for Exporting Masters, Vouchers and Reports from Tally to MS Excel in a structured Format. it also has specific functions for assurance/compliance.
T-CAAT Pro is a software add-in for MS Excel that allows users to extract data from Tally accounting software into Excel in a structured format. It has over 35 functions to import masters, transactions, and reports from Tally with just a few clicks. This exported structured data can then be easily analyzed in Excel or other data analytics software. The software helps accounting and audit professionals supplement Tally's simplicity with Excel's powerful data analytics capabilities. It saves time by streamlining the process of getting Tally data into Excel for further review and analysis.
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques Jim Kaplan CIA CFE
Data analytics does not need to be difficult or time consuming to start and in this course, we will focus on the key learning blocks needed within Microsoft Excel to be an effective data analytic auditor or accountant.
As regulatory changes sweep the globe, auditors, risk management, and compliance professionals are using more sophisticated tools, and methods.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
This document summarizes the agenda for the Twin Cities Eloqua User Group meeting on September 24, 2013. The agenda includes updates and announcements, discussions on campaign planning and QA processes, demonstrations of the String Manipulation cloud connector and Slideshare Embed app, and a session on analyzing data in Eloqua Insight. The document provides details on the topics that will be covered in each session.
Top 10 excel analytic tests to minimize fraud and process risksJim Kaplan CIA CFE
The document provides an overview of a webinar on the top 10 Excel analytic tests to minimize fraud and process risks. It discusses stratifying data, codifying data to run round numbers, identifying duplicate payments, calculating average days payable outstanding, conducting vendor background checks and geomapping, analyzing general ledger entries that don't net to zero, analyzing enterers and approvers, identifying the other side of revenue entries, applying Benford's Law and digital analysis, and using red flag and textual analytics. The webinar demonstrates how to automate audit steps into Excel analytics using a case study and applies the analytics across the audit lifecycle.
Duplicate payments, duplicate vendors, and segregation of duties in accounts payable are still the top tests being run by auditors using analytics. They are simple, effective, and save money which always helps the business case for analytics. Further, vendor and related payments fraud is the #1 fraud (in volume) affecting all organizations – big and small, public and private, regardless of the industry and sector. Excel templates will be provided with admission to assist to complete all testing and visualizations using graphs. Further data request letters and analytic audit programs will be provided to “jump start” your audit efforts in the accounts payable and vendor management areas.
Specific learning objectives include:
o Run over 20….key, proactive error and fraud tests in the areas of the accounts payable, vendor masterfiles, and purchase order files, all in Excel.
o Map the report results to an audit program to produce an analytically-enabled audit program.
o Discover the top frauds and corruption schemes along with top cost efficiencies to enact within accounts payable reviews.
o Distinguish between the top major accounting systems used when extracting accounts payable and vendor masterfile data and obtain a standard data request to aid the extractions
o Complete a multiple perspective visualization review of your accounts payable data including time based, amount based, company/profit center based, enterer, etc.
These are the slides. If you would like the associated data files they are available for download after payment. Videos of these sessions are available for free.
Details contact Rich Lanza (rich@richlanza.com)
Accelerate Self-Service Analytics with Data Virtualization and VisualizationDenodo
Watch full webinar here: https://bit.ly/39AhUB7
Enterprise organizations are shifting to self-service analytics as business users need real-time access to holistic and consistent views of data regardless of its location, source or type for arriving at critical decisions.
Data Virtualization and Data Visualization work together through a universal semantic layer. Learn how they enable self-service data discovery and improve performance of your reports and dashboards.
In this session, you will learn:
- Challenges faced by business users
- How data virtualization enables self-service analytics
- Use case and lessons from customer success
- Overview of the highlight features in Tableau
This document discusses the development of a B2B application development tool. It provides an overview of similar existing B2B tools and their features. It then outlines the functional and non-functional requirements for the project. The document estimates the project scope and effort using line of code estimation and function point analysis methods. It also provides details on the project schedule, resources, and risks.
Sai Charan Thotapalli interned at Priceline.com in their Customer Conversion team. As part of this internship, Sai analyzed customer order and conversion data using tools like SQL, Tableau, and presented findings to help improve performance. Sai's responsibilities included data collection, validation, analysis of metrics like orders and offers across platforms, and suggesting solutions to increase conversions. Through this experience, Sai gained skills in data analytics, reporting, and working in a business environment.
In this case study discussion formatted course with an already developed Graph template, you’ll learn how to translate unwieldy files of financial data into a single compact scattergraph, pie chart, or overlay—and then to pick out the key items that merit sampling and follow-up. Pivot Charts, multi-axis charts, data label issues, and other graph topics will all be discussed with a unique focus on the audit aspects of graphing.
Graphing is only one piece of this course and starting with Pivots Charts, Pivot Tables can be used to unearth almost any audit finding within seconds. A full discussion of the capabilities of Pivot Tables will be explored with sample data and audit situations.
As regulatory changes sweep the globe, auditors, risk management, and compliance professionals are using more sophisticated tools, and methods.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...Splunk
IT organizations are increasingly using machine data - including in DevOps practices - to get away from 'vanity metrics' and instead to generate 'metrics that matter'. These metrics provide visibility into the delivery of new application code and the business value of DevOps, to both IT and business stakeholders.
Machine data provides DevOps teams and others - including QA, secops, CxOs and LOB leaders - with meaningful and actionable metrics. This allows stakeholders to monitor, measure, and continuously improve the velocity and quality of code throughout the software lifecycle, from dev/test to customer-facing outcomes and business impact.
In this session Andi Mann, chief technology advocate at Splunk, will share core methodologies, interesting case studies, key success factors and 'gotcha' moments from real-world experience with mining machine data to produce 'metrics that matter' in a DevOps context.
Accelerate Self-Service Analytics with Data Virtualization and VisualizationDenodo
Watch full webinar here: https://bit.ly/3fpitC3
Enterprise organizations are shifting to self-service analytics as business users need real-time access to holistic and consistent views of data regardless of its location, source or type for arriving at critical decisions.
Data Virtualization and Data Visualization work together through a universal semantic layer. Learn how they enable self-service data discovery and improve performance of your reports and dashboards.
In this session, you will learn:
- Challenges faced by business users
- How data virtualization enables self-service analytics
- Use case and lessons from customer success
- Overview of the highlight features in Tableau
Using Microsoft Excel in Your Next Internal and External Audit - Learning The...Jim Kaplan CIA CFE
The document provides information about a webinar on using Microsoft Excel in audits. It discusses how Excel can be used as audit software to perform data analysis and identify potential issues. The webinar will demonstrate how to use pivot tables and visualizations in Excel to analyze spending trends, detect outliers, and identify anomalies. It will also discuss using text analysis and key word searches to identify red flags and using sampling techniques in Excel. The overall goal is to help auditors leverage technology to improve the efficiency and effectiveness of their work.
As many industries, banking is undergoing a fundamental change because of the software revolution. No longer are banks competing only on interest rates and having the best traders, these days customer experience and having the best engineers are the focus. In this changing world, banks compete with new start-ups, the so-called Fintechs, and with large platform organisations such as Google, Facebook and Apple. At ING, we believe that staying ahead of the game means changing how we interact with our customers, no longer a traditional model of waiting for the customers to come to the bank through our website or apps, but to actively reach out to the customer with information that is relevant to him or her in order to make their financial life frictionless. Many of these changes are driven by reacting to all events that are relevant to the customer, and using streaming analytics to be able to reach out to the customer in milliseconds after the event occurs. Apache Flink is key for ING to achieve this. This presentation addresses how ING approaches the challenge, the role that Apache Flink plays, and the consequences regulations have on how we work with Open Source in general, and with Apache Flink (and data Artisans) in particular. This keynote takes place at Kino 3.
This document provides an overview and comparison of SaaS (Software as a Service) vs on-premise business intelligence (BI) solutions. It discusses the history and components of cloud computing including infrastructure, platforms, and software as a service. Examples are given of both on-premise and SaaS BI solutions. Considerations for choosing between the options include security, data volumes, customization needs, integration requirements, and desire for competitive advantage. Both approaches have ongoing costs associated with support and maintenance.
Intro of Key Features of Auto eCAAT Ent Softwarerafeq
This presentation provides a brief overview of Auto eCAAT Ent with use cases. Auto eCAAT Ent is a Data Analytics/BI software specially designed for automating analytics in the assignments of Assurance, Compliance and Fraud Investigations.
Case Study: How Caixa Econômica in Brazil Uses IBM® Rational® Insight and Per...Paulo Lacerda
This document summarizes Caixa Econômica Federal's use of IBM Rational Insight for performance measurement and oversight of outsourced software development. Key points:
1) Caixa needed visibility and metrics across distributed development units to support business decisions and compare outsourced software factories.
2) Rational Insight was deployed to extract and consolidate metrics from various tools into executive dashboards measuring factories, teams, projects, and KPIs over time.
3) Caixa now has automated, real-time performance measurement across the organization with a single point of access for metrics and reports. This supports improved software development decision making.
Timothy Ho from Deloitte discusses seven technologies driving change in finance: cloud, robotics, cognitive computing, in-memory computing, blockchain, advanced analytics, and core modernization. The roles of finance are changing from operator and steward to also include strategist and catalyst. Automation in finance can range from basic monitoring to fully automated processes. Robotic process automation can perform repetitive tasks across systems. Risk analytics uses predictive modeling to identify risks. Cognitive technologies like natural language generation can automate decision support. Getting started requires establishing a digital leadership team and piloting solutions quickly.
Data-Driven DevOps: Improve Velocity and Quality of Software Delivery with Me...Splunk
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical.
This session will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful feedback on DevOps processes to all stakeholders. Learn from real-life examples how to use the data generated throughout application delivery to continuously identify, measure, and improve deployment speed, code quality, process efficiency, outsourcing value, security coverage, audit success, customer satisfaction, and business alignment.
The future of audit outlines the vision of Pieter de Kok regarding the future of audit. Process mining, data-analytics, open data, big data, predictive assurance, cloud, gamification. Coney developed the EYE of Audit Disruption.
Snezana Sahter and Madhu Chetuparambil gave a presentation on Intuit's journey from a monolithic architecture to microservices for their Financial Data Platform. They outlined the signs that indicated their architecture was becoming a monolith, discussed their target microservices architecture and the benefits it provides. They described their multi-phase execution journey, including defining the phases, having quarterly milestones, and learning from challenges along the way.
Building a Real-Time Security Application Using Log Data and Machine Learning...Sri Ambati
Building a Real-Time Security Application Using Log Data and Machine Learning- Karthik Aaravabhoomi
- Powered by the open source machine learning software H2O.ai. Contributors welcome at: https://github.com/h2oai
- To view videos on H2O open source machine learning software, go to: https://www.youtube.com/user/0xdata
Controls that are designed to mitigate the risk of fraud are not perfect. Enterprise software such as Oracle and SAP may have built-in controls, but they are limited in scope to the data and processes that the software "touches". The most successful fraudsters know how to exploit interfaces between different processes and systems. Furthermore, the typical fraud case persists for 14 months prior to detection*.
Deploying data analytics for continuous testing can overcome many of the limitations of traditional fraud detection. Timely and appropriate detection will help organizations mitigate the impact of frauds. Robust fraud detection systems will also act as powerful deterrents.
*ACFE Report to the Nations: 2020 Global Study on Occupational Fraud and Abuse
Learning Objectives
In this session we will raise awareness of the various types of frauds and how they can be detected using automated data analysis techniques.
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 10
• Handling data subject access requests (DSARs).
• The roles of controllers and processors, and the relationships between them.
• Transferring personal data outside the EU and the mechanisms for compliance.
• How to become GDPR compliant using a compliance gap assessment
More Related Content
Similar to When Data Visualizations and Data Imports Just Don’t Work
This document summarizes the agenda for the Twin Cities Eloqua User Group meeting on September 24, 2013. The agenda includes updates and announcements, discussions on campaign planning and QA processes, demonstrations of the String Manipulation cloud connector and Slideshare Embed app, and a session on analyzing data in Eloqua Insight. The document provides details on the topics that will be covered in each session.
Top 10 excel analytic tests to minimize fraud and process risksJim Kaplan CIA CFE
The document provides an overview of a webinar on the top 10 Excel analytic tests to minimize fraud and process risks. It discusses stratifying data, codifying data to run round numbers, identifying duplicate payments, calculating average days payable outstanding, conducting vendor background checks and geomapping, analyzing general ledger entries that don't net to zero, analyzing enterers and approvers, identifying the other side of revenue entries, applying Benford's Law and digital analysis, and using red flag and textual analytics. The webinar demonstrates how to automate audit steps into Excel analytics using a case study and applies the analytics across the audit lifecycle.
Duplicate payments, duplicate vendors, and segregation of duties in accounts payable are still the top tests being run by auditors using analytics. They are simple, effective, and save money which always helps the business case for analytics. Further, vendor and related payments fraud is the #1 fraud (in volume) affecting all organizations – big and small, public and private, regardless of the industry and sector. Excel templates will be provided with admission to assist to complete all testing and visualizations using graphs. Further data request letters and analytic audit programs will be provided to “jump start” your audit efforts in the accounts payable and vendor management areas.
Specific learning objectives include:
o Run over 20….key, proactive error and fraud tests in the areas of the accounts payable, vendor masterfiles, and purchase order files, all in Excel.
o Map the report results to an audit program to produce an analytically-enabled audit program.
o Discover the top frauds and corruption schemes along with top cost efficiencies to enact within accounts payable reviews.
o Distinguish between the top major accounting systems used when extracting accounts payable and vendor masterfile data and obtain a standard data request to aid the extractions
o Complete a multiple perspective visualization review of your accounts payable data including time based, amount based, company/profit center based, enterer, etc.
These are the slides. If you would like the associated data files they are available for download after payment. Videos of these sessions are available for free.
Details contact Rich Lanza (rich@richlanza.com)
Accelerate Self-Service Analytics with Data Virtualization and VisualizationDenodo
Watch full webinar here: https://bit.ly/39AhUB7
Enterprise organizations are shifting to self-service analytics as business users need real-time access to holistic and consistent views of data regardless of its location, source or type for arriving at critical decisions.
Data Virtualization and Data Visualization work together through a universal semantic layer. Learn how they enable self-service data discovery and improve performance of your reports and dashboards.
In this session, you will learn:
- Challenges faced by business users
- How data virtualization enables self-service analytics
- Use case and lessons from customer success
- Overview of the highlight features in Tableau
This document discusses the development of a B2B application development tool. It provides an overview of similar existing B2B tools and their features. It then outlines the functional and non-functional requirements for the project. The document estimates the project scope and effort using line of code estimation and function point analysis methods. It also provides details on the project schedule, resources, and risks.
Sai Charan Thotapalli interned at Priceline.com in their Customer Conversion team. As part of this internship, Sai analyzed customer order and conversion data using tools like SQL, Tableau, and presented findings to help improve performance. Sai's responsibilities included data collection, validation, analysis of metrics like orders and offers across platforms, and suggesting solutions to increase conversions. Through this experience, Sai gained skills in data analytics, reporting, and working in a business environment.
In this case study discussion formatted course with an already developed Graph template, you’ll learn how to translate unwieldy files of financial data into a single compact scattergraph, pie chart, or overlay—and then to pick out the key items that merit sampling and follow-up. Pivot Charts, multi-axis charts, data label issues, and other graph topics will all be discussed with a unique focus on the audit aspects of graphing.
Graphing is only one piece of this course and starting with Pivots Charts, Pivot Tables can be used to unearth almost any audit finding within seconds. A full discussion of the capabilities of Pivot Tables will be explored with sample data and audit situations.
As regulatory changes sweep the globe, auditors, risk management, and compliance professionals are using more sophisticated tools, and methods.
Using a live/video training library approach, we help companies of all sizes use audit and assurance software to improve business intelligence, increase efficiencies, identify fraud, test controls, and bottom line savings.
AuditNet and Cash Recovery Partners Webinar recording available at auditsoftwarevideos.com and AuditNet.tv (registration required) Recording free to view.
Sample Data Files for All Courses are available for $49
To purchase access to all sample data files, Excel macros and ACL scripts associated with the free training visit AuditSoftwareVideos.
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...Splunk
IT organizations are increasingly using machine data - including in DevOps practices - to get away from 'vanity metrics' and instead to generate 'metrics that matter'. These metrics provide visibility into the delivery of new application code and the business value of DevOps, to both IT and business stakeholders.
Machine data provides DevOps teams and others - including QA, secops, CxOs and LOB leaders - with meaningful and actionable metrics. This allows stakeholders to monitor, measure, and continuously improve the velocity and quality of code throughout the software lifecycle, from dev/test to customer-facing outcomes and business impact.
In this session Andi Mann, chief technology advocate at Splunk, will share core methodologies, interesting case studies, key success factors and 'gotcha' moments from real-world experience with mining machine data to produce 'metrics that matter' in a DevOps context.
Accelerate Self-Service Analytics with Data Virtualization and VisualizationDenodo
Watch full webinar here: https://bit.ly/3fpitC3
Enterprise organizations are shifting to self-service analytics as business users need real-time access to holistic and consistent views of data regardless of its location, source or type for arriving at critical decisions.
Data Virtualization and Data Visualization work together through a universal semantic layer. Learn how they enable self-service data discovery and improve performance of your reports and dashboards.
In this session, you will learn:
- Challenges faced by business users
- How data virtualization enables self-service analytics
- Use case and lessons from customer success
- Overview of the highlight features in Tableau
Using Microsoft Excel in Your Next Internal and External Audit - Learning The...Jim Kaplan CIA CFE
The document provides information about a webinar on using Microsoft Excel in audits. It discusses how Excel can be used as audit software to perform data analysis and identify potential issues. The webinar will demonstrate how to use pivot tables and visualizations in Excel to analyze spending trends, detect outliers, and identify anomalies. It will also discuss using text analysis and key word searches to identify red flags and using sampling techniques in Excel. The overall goal is to help auditors leverage technology to improve the efficiency and effectiveness of their work.
As many industries, banking is undergoing a fundamental change because of the software revolution. No longer are banks competing only on interest rates and having the best traders, these days customer experience and having the best engineers are the focus. In this changing world, banks compete with new start-ups, the so-called Fintechs, and with large platform organisations such as Google, Facebook and Apple. At ING, we believe that staying ahead of the game means changing how we interact with our customers, no longer a traditional model of waiting for the customers to come to the bank through our website or apps, but to actively reach out to the customer with information that is relevant to him or her in order to make their financial life frictionless. Many of these changes are driven by reacting to all events that are relevant to the customer, and using streaming analytics to be able to reach out to the customer in milliseconds after the event occurs. Apache Flink is key for ING to achieve this. This presentation addresses how ING approaches the challenge, the role that Apache Flink plays, and the consequences regulations have on how we work with Open Source in general, and with Apache Flink (and data Artisans) in particular. This keynote takes place at Kino 3.
This document provides an overview and comparison of SaaS (Software as a Service) vs on-premise business intelligence (BI) solutions. It discusses the history and components of cloud computing including infrastructure, platforms, and software as a service. Examples are given of both on-premise and SaaS BI solutions. Considerations for choosing between the options include security, data volumes, customization needs, integration requirements, and desire for competitive advantage. Both approaches have ongoing costs associated with support and maintenance.
Intro of Key Features of Auto eCAAT Ent Softwarerafeq
This presentation provides a brief overview of Auto eCAAT Ent with use cases. Auto eCAAT Ent is a Data Analytics/BI software specially designed for automating analytics in the assignments of Assurance, Compliance and Fraud Investigations.
Case Study: How Caixa Econômica in Brazil Uses IBM® Rational® Insight and Per...Paulo Lacerda
This document summarizes Caixa Econômica Federal's use of IBM Rational Insight for performance measurement and oversight of outsourced software development. Key points:
1) Caixa needed visibility and metrics across distributed development units to support business decisions and compare outsourced software factories.
2) Rational Insight was deployed to extract and consolidate metrics from various tools into executive dashboards measuring factories, teams, projects, and KPIs over time.
3) Caixa now has automated, real-time performance measurement across the organization with a single point of access for metrics and reports. This supports improved software development decision making.
Timothy Ho from Deloitte discusses seven technologies driving change in finance: cloud, robotics, cognitive computing, in-memory computing, blockchain, advanced analytics, and core modernization. The roles of finance are changing from operator and steward to also include strategist and catalyst. Automation in finance can range from basic monitoring to fully automated processes. Robotic process automation can perform repetitive tasks across systems. Risk analytics uses predictive modeling to identify risks. Cognitive technologies like natural language generation can automate decision support. Getting started requires establishing a digital leadership team and piloting solutions quickly.
Data-Driven DevOps: Improve Velocity and Quality of Software Delivery with Me...Splunk
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical.
This session will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful feedback on DevOps processes to all stakeholders. Learn from real-life examples how to use the data generated throughout application delivery to continuously identify, measure, and improve deployment speed, code quality, process efficiency, outsourcing value, security coverage, audit success, customer satisfaction, and business alignment.
The future of audit outlines the vision of Pieter de Kok regarding the future of audit. Process mining, data-analytics, open data, big data, predictive assurance, cloud, gamification. Coney developed the EYE of Audit Disruption.
Snezana Sahter and Madhu Chetuparambil gave a presentation on Intuit's journey from a monolithic architecture to microservices for their Financial Data Platform. They outlined the signs that indicated their architecture was becoming a monolith, discussed their target microservices architecture and the benefits it provides. They described their multi-phase execution journey, including defining the phases, having quarterly milestones, and learning from challenges along the way.
Building a Real-Time Security Application Using Log Data and Machine Learning...Sri Ambati
Building a Real-Time Security Application Using Log Data and Machine Learning- Karthik Aaravabhoomi
- Powered by the open source machine learning software H2O.ai. Contributors welcome at: https://github.com/h2oai
- To view videos on H2O open source machine learning software, go to: https://www.youtube.com/user/0xdata
Similar to When Data Visualizations and Data Imports Just Don’t Work (20)
Controls that are designed to mitigate the risk of fraud are not perfect. Enterprise software such as Oracle and SAP may have built-in controls, but they are limited in scope to the data and processes that the software "touches". The most successful fraudsters know how to exploit interfaces between different processes and systems. Furthermore, the typical fraud case persists for 14 months prior to detection*.
Deploying data analytics for continuous testing can overcome many of the limitations of traditional fraud detection. Timely and appropriate detection will help organizations mitigate the impact of frauds. Robust fraud detection systems will also act as powerful deterrents.
*ACFE Report to the Nations: 2020 Global Study on Occupational Fraud and Abuse
Learning Objectives
In this session we will raise awareness of the various types of frauds and how they can be detected using automated data analysis techniques.
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 10
• Handling data subject access requests (DSARs).
• The roles of controllers and processors, and the relationships between them.
• Transferring personal data outside the EU and the mechanisms for compliance.
• How to become GDPR compliant using a compliance gap assessment
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
Join this webinar for an introduction to the Touchstone Research for Internal Audit, an unprecedented, global research of internal audit, from Wolters Kluwer TeamMate. This session will review study approach and scope, key initial findings, a look at benchmarking, and a preview of future insights. Find out what nearly 1,000 internal audit and controls professionals have to say across about the current and future state of internal audit.
Learning Objectives:
Learn the objective of the Touchstone Research for Internal Audit
Understand how the Touchstone Maturity Model can benefit Internal Audit teams
Learn why the Touchstone Research Benchmarks for Internal Audit can be a planning tool
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 9
• Why and how to conduct a data mapping exercise.
• The rights of data subjects.
• Giving and withdrawing consent.
A recent survey report, Fraud in the Wake of COVID-19: Benchmark Report, prepared by the ACFE, explains that recent events have opened the door to increased pressure, reasonings and opportunities that can lead to occupational fraud. Across all classes of fraud schemes 68% of survey respondents reported increases in fraudulent activity as of May 2020 and 93%o reported they expect an increase in fraud over the next 12 months.
To guide auditors in running detective controls, join Mark Nigrini, West Virginia University Professor and author, and Jeffrey Sorensen, Industry Strategist, for an exclusive review of the fingerprints of fraud numbers. This two-person team will review seven categories of fraud numbers and will demonstrate how to identify these types of numbers using audit software.
In this informative and engaging presentation, attendees will:
● Learn the seven categories of fraud numbers
● Understand which categories are linked to specific types of schemes
● Optimize the steps needed to run the tests
● Interpret the results to identify audit targets
● Apply a second layer of steps to reduce the number of false positives
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 8
• The security of personal data.
• An organizational risk management framework.
• Legal requirements for a DPIA.
• How to conduct a DPIA with a DPIA tool.
How to get auditors performing basic analytics using excel Jim Kaplan CIA CFE
It has been said that the definition of crazy is doing the same thing over and over again and expecting a different result. If your audit analytics program is still not meeting your expectations, you are going to have to do something different to change that outcome. The biggest hurdle organizations need to overcome is getting auditors to think differently about what analytics is. Excel might not be the ultimate analytics tool for your organization but attend this webinar to see how you can use it as a catalyst for change throughout the audit team.
Learning Objectives
Learn non-technical skills auditors need to perform audit analytics
Learn commonly used Excel functions that can be applied to audit analytics
Learn how to get auditors started down a path of thinking about analytics vs automatically pulling samples
Learning about outliers and how to detect them in transactions of all types.
Learning Objectives: This webinar will explain the significance of outliers when testing transactions, whether they are vendor invoices, GL postings, or travel & entertainment expenses. Examples using Arbutus Analyzer will demonstrate the best analytics for identifying outliers.
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 14 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
This document provides an agenda and overview of a webinar on lessons learned from the General Data Protection Regulation (GDPR) and applying the GDPR's data protection principles. The webinar agenda includes discussing common data security failures, managing personal data breaches, and the seven data protection principles. It also provides background on the webinar presenter and introduces the company hosting the webinar, AuditNet.
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
Webinar Overview - A look at duplicates testing and the inherent value of fuzzy data matching.
Identifying fuzzy duplicates has never been easier. Arbutus Analyzer’s versatile functionality enables even new users to detect possible duplicate payments, vendors sharing similar addresses among themselves or with your organization’s employees, and counter parties who may be on government watch lists. Our webinar includes nine different scenarios with detailed descriptions of the tests and their results.
You'll learn about:
• Identifying possible risks
• How to deploy Analyzer commands and functions
Key Presenter:
Michael Kano, ACDA, Data Analytics Consultant, Arbutus Analytics
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 6
• The role of the data protection officer (DPO).
• What constitutes personal data.
• Accountability, the privacy compliance framework and a personal information management system (PIMS).
This document summarizes a webinar about using exploratory data analytics to focus an agile audit plan on emerging risks. It discusses dispelling common myths about data analytics and using an example of analyzing employee data to identify potential issues with gender and race pay disparities. The webinar promotes using analytics to enable control owners to conduct ongoing monitoring and shifting the audit's focus to confirming controls are appropriately designed and issues are addressed.
General Data Protection Regulation for Auditors 5 of 10Jim Kaplan CIA CFE
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 5
• Certification against GDPR
• The powers of supervisory authorities
• Lead supervisory authorities
• The role of the European Data Protection Board (EDPB)
From time-to-time internal auditors are faced with situations which call for them to make an ethical decision. In addition, they may, in the middle of auditing, come across circumstances which themselves appear to be violations of a corporate
code-of-conduct.
Several laws now specifically state that internal auditors, in terms of the act, will be bound by the IIA Code of Ethics.
This webinar explores the IIA Code of Ethics as it applies to everyday situations the auditor may encounter.
The module is designed to provide the participants with an in-depth knowledge of:
Ethics theory
The IIA Code of Ethics
Applicable areas within Internal Audit
Reporting of material facts
Corporate Codes of Conduct
Auditing Corporate Ethics
Webinar contents will include:
Classes of Ethics
The role of business
Employee ethics
Honesty, Objectivity and diligence
Conflicts of Interest
Reporting of Material Facts
Corporate Codes of Conduct
Corporate Social Responsibility
How analytics should be used in controls testing instead of sampling Jim Kaplan CIA CFE
Sampling has existed as a standard for controls testing since controls testing began. We’ve developed algorithms to tell us how many samples we should pull and how many errors we can have and still pass the control. We’ve even developed algorithms to tell us how many more samples we can test if the control didn’t pass the first time.
If your goal is simply to do the minimum to pass a SOX audit, then these behaviors should probably continue. If your goals also include really improving the operations of the organization to make it stronger then a more holistic approach is needed, such as analysis on 100% of the population, rather than a small sample.
Most controls analytics do not require a degree in data science, but they do require the controls team begin changing its behaviors. Join us to understand what it takes to begin this change, it’s not as challenging as you might think.
Learning Objectives
Understanding the advantages of analytics vs sampling
How to Identify controls where analytics can be applied
Real life examples of controls and their associated analytics
How to effect a change
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
Sampling has existed as a standard for controls testing since controls testing began. We’ve developed algorithms to tell us how many samples we should pull and how many errors we can have and still pass the control. We’ve even developed algorithms to tell us how many more samples we can test if the control didn’t pass the first time.
If your goal is simply to do the minimum to pass a SOX audit, then these behaviors should probably continue. If your goals also include really improving the operations of the organization to make it stronger then a more holistic approach is needed, such as analysis on 100% of the population, rather than a small sample.
Most controls analytics do not require a degree in data science, but they do require the controls team begin changing its behaviors. Join us to understand what it takes to begin this change, it’s not as challenging as you might think.
Learning Objectives
Understanding the advantages of analytics vs sampling
How to Identify controls where analytics can be applied
Real life examples of controls and their associated analytics
How to effect a change
This document provides an overview of data protection impact assessments (DPIAs) and the role of the data protection officer (DPO) under the General Data Protection Regulation (GDPR). It discusses when DPIAs are required, the DPIA process, how to identify and assess risks, select controls, and ensure continuous monitoring. It also outlines the DPO requirements, including the need for independence and expertise. The DPO is responsible for enabling compliance and fostering a data protection culture.
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 12 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 3
• Data protection by design
• Securing personal data
• Reporting data breaches
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...Social Samosa
The Modern Marketing Reckoner (MMR) is a comprehensive resource packed with POVs from 60+ industry leaders on how AI is transforming the 4 key pillars of marketing – product, place, price and promotions.
Natural Language Processing (NLP), RAG and its applications .pptxfkyes25
1. In the realm of Natural Language Processing (NLP), knowledge-intensive tasks such as question answering, fact verification, and open-domain dialogue generation require the integration of vast and up-to-date information. Traditional neural models, though powerful, struggle with encoding all necessary knowledge within their parameters, leading to limitations in generalization and scalability. The paper "Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks" introduces RAG (Retrieval-Augmented Generation), a novel framework that synergizes retrieval mechanisms with generative models, enhancing performance by dynamically incorporating external knowledge during inference.
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...sameer shah
"Join us for STATATHON, a dynamic 2-day event dedicated to exploring statistical knowledge and its real-world applications. From theory to practice, participants engage in intensive learning sessions, workshops, and challenges, fostering a deeper understanding of statistical methodologies and their significance in various fields."
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
The Ipsos - AI - Monitor 2024 Report.pdfSocial Samosa
According to Ipsos AI Monitor's 2024 report, 65% Indians said that products and services using AI have profoundly changed their daily life in the past 3-5 years.
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeWalaa Eldin Moustafa
Dynamic policy enforcement is becoming an increasingly important topic in today’s world where data privacy and compliance is a top priority for companies, individuals, and regulators alike. In these slides, we discuss how LinkedIn implements a powerful dynamic policy enforcement engine, called ViewShift, and integrates it within its data lake. We show the query engine architecture and how catalog implementations can automatically route table resolutions to compliance-enforcing SQL views. Such views have a set of very interesting properties: (1) They are auto-generated from declarative data annotations. (2) They respect user-level consent and preferences (3) They are context-aware, encoding a different set of transformations for different use cases (4) They are portable; while the SQL logic is only implemented in one SQL dialect, it is accessible in all engines.
#SQL #Views #Privacy #Compliance #DataLake
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
When Data Visualizations and Data Imports Just Don’t Work
1. When Data Visualizations and
Data Imports Just Don’t Work
Slide 0
About Jim Kaplan, CIA, CFE
President and Founder of AuditNet®,
the global resource for auditors
(available on iOS, Android and
Windows devices)
Auditor, Web Site Guru,
Internet for Auditors Pioneer
IIA Bradford Cadmus Memorial
Award Recipient
Local Government Auditor’s Lifetime
Award
Author of “The Auditor’s Guide to
Internet Resources” 2nd Edition
1
0
1
2. About AuditNet® LLC
• AuditNet®, the global resource for auditors, serves the global audit
community as the primary resource for Web-based auditing content. As the first online
audit portal, AuditNet® has been at the forefront of websites dedicated to promoting the
use of audit technology.
• Available on the Web, iPad, iPhone, Windows and Android devices and
features:
• Over 2,900 Reusable Templates, Audit Programs, Questionnaires, and
Control Matrices
• Webinars focusing on fraud, data analytics, IT audit, and internal audit
with free CPE for subscribers and site license users.
• Audit guides, manuals, and books on audit basics and using audit
technology
• LinkedIn Networking Groups
• Monthly Newsletters with Expert Guest Columnists
• Surveys on timely topics for internal auditors
Introductions
2
The views expressed by the presenters do not necessarily represent the views,
positions, or opinions of AuditNet® LLC. These materials, and the oral
presentation accompanying them, are for educational purposes only and do not
constitute accounting or legal advice or create an accountant-client relationship.
While AuditNet® makes every effort to ensure information is accurate and
complete, AuditNet® makes no representations, guarantees, or warranties as to
the accuracy or completeness of the information provided via this presentation.
AuditNet® specifically disclaims all liability for any claims or damages that may
result from the information contained in this presentation, including any websites
maintained by third parties and linked to the AuditNet® website.
Any mention of commercial products is for information only; it does not imply
recommendation or endorsement by AuditNet® LLC
3
2
3
3. AuditNet® and cRisk Academy
If you would like forever access
to this webinar recording
If you are watching the
recording, and would like to
obtain CPE credit for this
webinar
Previous AuditNet® webinars
are also available on-demand for
CPE credit
http://criskacademy.com
http://ondemand.criskacademy.com
Use coupon code: 50OFF for a
discount on this webinar for one week
4
Richard B. Lanza, CPA, CFE, CGMA
• Managing Director in Innovation for Grant Thornton, LLP
• Over 25 years of ACL, Excel and other software usage
• Received the outstanding achievement in business award by the
Association of Certified Fraud Examiners for developing the publication
Proactively Detecting Fraud Using Computer Audit Reports as a
research project for the IIA
• Recently was a contributing author of:
• Detecting Corruption with Analytics: A Roadmap – The
International Institute for Analytics
• Global Technology Audit Guide (GTAG #13) Fraud In An
Automated World – Institute Of Internal Auditors.
• Cost Recovery – Turning Your Accounts Payable Department
Into A Profit Center – Wiley And Sons.
• Data Analytics: A Roadmap for Expanding Capabilities
(published 2018 in partnership with the IIA's Internal Audit
Foundation)
• In 2015, discovered a new textual analytic technique using letters
called the Lanza Approach to Letter Analytics (LALA)TM
5
The views expressed by the
presenters do not necessarily
represent the views, positions, or
opinions of Grant Thornton, LLP.
These materials, and the oral
presentation accompanyingthem,
are for educational purposes only
and do not constitute accounting
or legal advice or create an
accountant-client relationship.
rich.lanza@us.gt.com
4
5
4. Today’s Agenda
Walk through case studies of “dirty” data and how to improve then
using improved data requests and cleansing tools.
Watch case study examples of top tests to validate data tables to
ensure data quality.
Discover a host of baseline tests and other baseline statistics to
validate, understand and possibly extract key trends for review.
Understand visualization and dashboard types along with their
associated analytical strengths from an audit perspective.
Identify situations where statistics may be more effective audit
extractors than relying on the human eye to spot notable events.
6
Our perspective on the technology landscape
Source: Adapted from Forrester – Create A Road Map For A Real-Time, Agile, Self-Service Data Platform (Nov. 2017); Grant Thornton Analysis
7
So Much Time, / So Little Technology
Scratch That and Reverse It!
6
7
5. Overcoming Data Challenges
Normalizing data is 80% of the time (in the beginning)
“By most accounts, 80 percent of the development effort in a big data project
goes into data integration and only 20 percent goes toward data analysis.” —
Intel Corporation
Data is in every process
It may not be ERP / It may be in your “Big Data”
90% of data is text
Audit (Internal & External) is the best partner to get the data
They are independent / Not proving the data is a scope limitation
Tend to establish the most secure data warehouses
8
Completely Requesting Data
Slide 9
8
9
6. Quick Process to Running
Data
1. Know your audit objectives
2. Align reports to the objectives
3. Use past reports to model /refine reports
4. Set data requirements based on reports
5. Obtain, validate, and normalize data
6. Edit scripts for data needs
7. Run reports and document results
Page 10
Audit Objectives and
Questions
11
10
11
8. Importing Various Data
Slide 14
Data Table Types (Sample)
ASCII Text
Unicode Text
EBCIDIC (IBM)
Mainframe (Cobol)
Microsoft (Excel, Access, SQL)
Quickbooks and QBO
PDF Files
Page 15
14
15
9. Data Import Exercise
Importing Various File Types
Fixed Length Fields
Delimited - Tab / CSV (Variable)
Excel (Variable)
Report (Multiple Record Fixed)
Page 16
Data Field Definition Flowchart
Is it a
date?
Do you add or
subtract the
field?
Define as a
date format
Divide by 100 or
multiply by .01
Yes
Yes
Define as a
character format
Define as a
Numeric format
Are there any
decimal places?
Yes
No
No No
Page 17
16
17
10. Unicode Considerations
Readable in Excel
Where to select the Unicode:
Page 18
PDF Conversion Options
• Free Online PDF to Excel Converter: http://www.pdftoexcelonline.com
• ABBYY PDF Transformer: http://pdftransformer.abbyy.com
• PDF2XL: http://www.cogniview.com
• Able2Extract PDF Conversion: http://www.able2extract.com
• Import Wizard: http://www.beside.com
• PDF Converter: http://www.pdfconverter.com
• Monarch: http://www.datawatch.com – Most popular, ease of use, powerful,
• Free Beta - http://www.informationactive.com/videos/misc/PrintFileScraper
Page 19
18
19
11. Free Quick Books Converter
http://bit.ly/1bm0nyT
Page 20
Working With Difficult Data
Slide 21
20
21
12. Text Editors
Combining Tables
PAID FILE
Copy of PAID FILE
Cleaning Tables
Tabs, Delimiters, Titles, Etc.
• (Visualize Spaces in EditPadPro)
– www.editpadpro.com
– http://notepad-plus-plus.org/
Page 22
Text Functions
Page 23
LEFT()
With a determined set of characters in a set string, the first character
is returned from, the left of the cell
LEN()
Identifies the number of characters in a set and returns that as a
number in the cell
LOWER()
UPPER()
Lower case letters substitute upper case letters (reverse for upper)
MID()
Identifies characters in a set based on a start position and number of
characters which is determined by the user
PROPER()
Capitalizes the first letter of each character and the remaining are
lowercase
RIGHT()
Pulls the last set of character from a set and the number of character
is set by the user
TEXT()
Returns the text version of a number with a specified number format
(i.e., =TEXT(C999,"0.00") will convert 12345 into a text version of
12345.00)
TRIM()
Keeps single spaces only between words and removes all other
spaces
22
23
13. Text Functions
Page 24
CONCATENATE()
Combines numerous strings to one stream (You can also
use the & character to combine/merge/join fields)
REPT()
Repeats a character as many times as the user wants i.e. :
=REPT (“J”,10) wll lead to ‘JJJJJJJJJJ
CHAR()
Identifies a character with a number which is presented in
the cell.This number then can be used to convert other
CHAR to the number translate code from other sources
(i.e., CHAR(127) is a nonprintable character and CHAR(9)
is a tab)
CLEAN() From a text string, it removes the nonprintable characters
SUBSTITUTE()
Works to substitute characters such as carriage returns or
other characters with blanks or valid characters for data
processing.
Date and Time Functions
Page 25
DATE() A date is created with a year, month, and day (i.e. : 2015,10,7)
DAY() By pointing to a specific field the function identifies the day
HOUR()
Identifies a hour in a time field which is set to military time (0:00-
23:00 hrs.)
MINUTE() Identifies the minutes in a time field which is set at 0-59
MONTH() Identifies the month in a time field which is set as 1=January
NOW() Sets to the actual current date and time
TODAY() Sets to the actual date
24
25
14. Date and Time Functions
Page 26
NETWORKS ()
Identifies the ACTUAL Network days in a whole number from start to
finish dates. (weekends and holidays are excluded unless specified)
SECOND() Identifies seconds in a time field ie:0-59
WEEKDAY()
Identifies a day during a specified week in a specific timeframe.
1=Sunday
WEEKUM() Identifies a specific week number in the calendar year
YEAR() Identifies a year with a specific number i.e: 1900-9999
Normalizing a Data File /
Looking for Simple Duplication
Identifies simple duplication in left 8 characters of a field
Page 27
26
27
15. Validating Data to Avoid
Garbage In = Garbage Out
Slide 28
Sample Data Validation – Accounts
Payable Other Questions
Make a checklist (to make sure you follow it):
Statistical analysis (totals, strata, high / low)
Agreement to batch totals, sample data and hardcopies is critical
Better to do it now instead of after the analysis
Page 29
28
29
16. Factors That
Increase Complexity / Errors
Formulas
Nested IF formulas
Populated cells
Labels
Blank cells
Cells with formula errors
Text fields that should be numeric
Hidden worksheets and cells
External links
Page 30
Automating Data Imports
31
30
31
17. Process Characteristics for RPA
32
Automating Data ETL
• All of the Company's data is captured in an SAP G/L
• Audit team had to budget almost 100 hours just on
importing and combining various report extracts
• Data analytics and innovation were introduced in the
current year audit
• Data import process was reduced from 25 hours
/quarter to only 2 hours/quarter
33
32
33
18. Automated Data Normalization
• Store procedures for data cleanup once
• Create a normalized set of data fields named by YOU
• Ensure data quality tests are run prior to analysis
• Automate these routine tasks to increase analyst’s time
• Enrich the data by organizing it by type codes
34
Automated Data Normalization
and Validation
Data Mapping to
Common Fields Are
Converted to Final
Data Spec Using
ACL Scripts
Page 35
34
35
19. Robotic Process Automation Limitations
36
RPA cannot read any data that is non-electronic with unstructured inputs
• An example would be input such as paper invoices. In this case, RPA will only work with a collection of other implemented
technologies (such as OCR) required to make it digital and structured.
RPA requires some form of static consistency
• For example, invoices may be received in different formats, with fields placed in different areas. For a ‘Bot’ to be able to read an
invoice, all supplier invoices must be received in the same format with the same fields.
• Although robots can be trained by exception to read different fields, they cannot read multiple different formats – unless these are
all digital and configured separately.
RPA is not a cognitive computing solution
• It cannot learn from experience and therefore has a ‘shelf life’.
• As processes evolve – for example, through the introduction and use of other technologies — they may become redundant and
require changes.
• It is therefore wise for a company to examine the process prior to building a ‘Bot’. Applied to a process that is inefficient and/or on
the way out, that shelf life may be reduced to just a year.
Applying RPA to a broken and inefficient process will not fix it – "paving cowpaths"
• RPA is not a Business Process Management solution and does not bring an end-to-end process view
• The same goes for out of date infrastructure – RPA will only mask the underlying issues.
• Clients should focus first on addressing the root causes of their process or technology inefficiencies and then apply RPA to
maximize the benefits.
Data extends beyond
accounting systems
37
Structured Data
Accounting records
Sub ledger details
Monthly performance
measures
Unstructured DataUnstructured Data
Documents (Excel, PDF)
Emails
Network Logs
External DataExternal Data
Geomap Service
OFAC, SAM.Gov Watch
Lists
IRS Tax ID Match
36
37
20. The Value of Visualizations
38
Data analytics defined – AICPA
"The science and art of discovering and analyzing
patterns, identifying anomalies, and extracting
other useful information in data underlying or related
to the subject matter of an audit through analysis,
modeling, and visualization for the purpose of
planning or performing the audit".
39
38
39
21. Exploratory vs. Confirmatory
40
Exploratory analytics Confirmatory analytics
Bottom-up and inductive Top-down and deductive
What does the data suggest is happening? Is the subject matter consistent with my model
On what assertions should we focus? Are there deviations that are individually
significant or that form a pattern?
Most useful in audit planning Most useful with substantive or controls
assurance
Dashboards, Dashbaords,
Dashboards – Oh My
41
Visualizations
40
41
22. When Visualizations Work
Trending Revenue
Store sales were expected to decrease year over year
One store closed
One store had 2.3% increase overall (but that tells only
part of the story)
42
Visualizations Video: https://youtu.be/l70miMymW90
Social Network Analysis
43
42
43
23. How is SNA useful?
Influencers
• The classic use case for SNA is analyzing the connections between people
on Social Networking websites ( Facebook, Twitter, LinkedIn)
Fraud
• SNA can be used to gain a better understanding of fraud
• Connections of individuals can be examined for potential collusion
• Ringleaders can be discovered quickly
• Connections between known fraud records and nonfraud records
can give auditors/investigators new leads to follow
44
The Limits of Visualizations
45
44
45
24. 46
Audit procedures Data Analytic approach
Recalculation Using robotic process automation to check the mathematical
accuracy of documents and records
Reperformance The continuous reperformance and testing on a 100 percent basis
(i.e. account reconciliations)
Analytical
procedures
Focused and precise analytics utilized during the planning,
substantive and concluding phases of the audit that analyze the
plausibility and predictability of a given relationship and identify
differences that could give rise to a potential misstatement (i.e.
regression, volatility)
Confirmation Obtaining a information from a third party to test a specific condition
Inspection Utilizing the process of mining event logs to inspect and corroborate
the accuracy of information
Analytics to Obtain Audit Evidence
Transactional Risk Scoring
47
46
47
25. New Functions To Learn
Page 48
Focus on 2 and 3 Std
Deviations
Consider Sampling
“Strata of Z”
Math Functions
Page 49
VALUE() A number is given to identify a string now as a number
ISNA()
Returns true if the formula leads to a NA solution – This is
normally combined with IF so =IF(ISNA(C3/D3),0,(D3/D3))
AVERAGE() Is the mean of a range of cells set in the average function
MEDIAN()
Provides the middle number between the largest set value of
numbers and the lowest value of numbers
MAX() Provides the top value in a set of values
MIN() Provides the lowest value in a set of values
STDEV() Calculates the standard deviation for a range of numbers
48
49
26. Math Functions
Page 50
ABS() Turns a negative or positive number into a positive number
MOD()
Determines whether a number is round to a divisor set by the
user (i.e. : divisor equals 1000 and all numbers where MOD() are
=0 would be round to 1000)
ROUND() Sets a number to a specified decimal place
Journal Entry Stratification
In this case, 15 of the 65
largest journal entries
make up 94% of the net
income effect
Millions of journal entries
can be compressed into a
single view.
Each of these items can
be further explored by
location, segment, and
entry process/employee.
51
50
51
27. Compressing the G/L Sequences
52
EXAMPLE DATA:
1,000 Journal Entries of:
• Debit: A/R
• Credit: Revenue
The account combination is then summarized into 1 unique account sequence:
Sequence Occurrences DR CR
ACCSEQ_1 1,000 A/R Revenue
Limits of Word Clouds
Predictive Analytic Times
Slide 53
http://bit.ly/1W0CAZO
52
53
28. The First and Last Letters
Tell the Story
• It deosn't mttaer in waht oredr the ltteers in a wrod
are, the olny iprmoetnt tihng is taht the frist and lsat
ltteer be at the rghit pclae.
54
Unstructured Text and Letter Analytics
“The Benford’s Law of Words”
55
• Same words tend to occur year over
year
• Changes may indicate some change
in the client that could affect risk
assessment
54
55
30. Adding Labels to a Scatter
http://bit.ly/1K02UKW - Video on the scatter macro
http://bit.ly/1GbzM1S - Macro for running the scatter
Page 58
59
http://gt-us.co/2I2EK8f
Questions?
58
59
31. AuditNet® and cRisk Academy
If you would like forever access
to this webinar recording
If you are watching the
recording, and would like to
obtain CPE credit for this
webinar
Previous AuditNet® webinars
are also available on-demand for
CPE credit
http://criskacademy.com
http://ondemand.criskacademy.com
Use coupon code: 50OFF for a
discount on this webinar for one week
60
Thank You!
Jim Kaplan
AuditNet® LLC
1-800-385-1625
Email: webinars@auditnet.org
www.auditnet.org
Richard B. Lanza, CPA, CFE, CGMA
Contact Information
D: +1 732 516 5527
M: +1 732 331 3494
Email: rich.lanza@us.gt.com
61
60
61