The Future of Audit. AICPA s ASEC (Assurance Services Executive Committee)
|
|
|
- Adela McLaughlin
- 10 years ago
- Views:
Transcription
1 The Future of Audit Miklos A. Vasarhelyi Rutgers University - KPMG Professor of AIS AT&T Laboratories Senior Consultant AICPA s ASEC (Assurance Services Executive Committee) Aiming to modernize CPA services and to bring to the table additional services to be performed by accountants Past products WebTrust SysTrust WebTrust for Service Providers Current projects Common data cube Continuous assurance Future audit 2 1
2 Schemata of ASEC efforts The future of audit The traditional audit Corporate Data Cube Continuou s Assurance Audit Methods Principles & criteria XBRL and XBRL assurance Public domain audit apps New Assurance Products 3/2/ Red Book revisited Red Book was issued in 1999 by the CICA and AICPA Since that date both the IIA (GTAG # 3) and ISACA (2010) issued guidance for continuous assurance 3/2/
3 Continuous Assurance The time dimension The location dimension The human component Technology The advanced analytics evolution 3/2/ Time -Prolonged intense deterrence 6 3
4 Latency reduction Adapted from Vasarhelyi et al Location - remote audit The remote audit couples information and communication technology and data analytics to assess controls, gather evidence, and interact with clients 8 4
5 The remote audit Information and communication technologies Web conferencing and telework (Ellis et al, 1991; Hunton & Harmon, 2004; Campbell & McDonald, 2009) Electronic working papers (DeYoung, 1989; Bierstaker et al. 2001; Jans et al, 2010) Cloud computing Continuous evidence and analytics Documentation CAATs (Debreceny et al, 2005; Zhao et al, 2004; Javrin et al, 2008) Continuous auditing and continuous controls monitoring (Brown et al, 2007; Alles et al, 2006; Vasarhelyi & Halper, 1991; Hunton et al, 2008) 9 Human component -> Virtual teams Virtual teams are a collection of geographically distributed, functionally and/or culturally diverse entities that are linked by electronic forms of communication and rely on lateral, dynamic relationships for coordination. (Desanctis and Monge, 1999) Internal auditors collaborate and coordinate with team members 10 5
6 Technology Information and communication I. Introduction II.Remote Audit III.ICT ICT IV.Evidence & Anal. V. Conclusion The audit team already uses some ICT to enhance the audit Spreadsheets, macros, , laptop for storing data For remote audit, additional technology is needed Web conferencing & telework, electronic working papers, cloud computing Web conferencing & telework Ellis et al. 1991: Groupware: some issues and experiences -Overview of web conferencing, Hunton & Harmon 2004: A model for investigating telework in accounting - Model for addressing antecedents and outcomes of telecommuting. Campbell and McDonald (2009): Defining a conceptual framework for telework -Overview of and issues with telework application in accounting 11 Information and communication EWPs include evidence collected on demand by the auditor along with transaction-relevant data from automated systems Process mining can aid automatic development of EWP Dynamic dashboard Electronic working papers DeYoung1989: Hypertext challenges in the auditing domain- Workpapers mimicking the Web Bierstaker et al. 2001: The impact of information technology on the audit process-adoption of EWP by audit firms Janset al 2010: Process mining of event logs in auditing: opportunities and challenges -Discussion of process mining for auditing 12 6
7 Continuous evidence and analytics I. Introduction II.Remote Audit III.ICT IV.Evid Evid.. & Anal. V. Conclusion Documentation Can be a set of audit procedures, a spreadsheet of extracted information, a transcript from an interview, or a combination of these and other elements Ensures parties know their tasks Helps train new employees Creates a paper trail 13 Continuous evidence and analytics I. Introduction II.Remote Audit III.ICT IV.Evid Evid.. & Anal. V. Conclusion Procedure Onsite Methodology Remote Methodology Obtaining Audit Evidence Inspection of Records or Documents (e.g. authorization) Inspection of Tangible Assets (e.g. physical inventory count) Observation (e.g. watching someone complete a process) Inquiry (e.g. written or oral interviews) Analytical Procedures (e.g. scanning and statistics) Pull a sample of purchase orders and verify authorized signature exists and matches authority list Print a list of inventory, walk through warehouse, open boxes, etc. Sit with a worker and observe procedure Communicate electronically or in loco as part of traditional audit Extract data, scan for anomalies based on auditor judgment Evaluate entire purchase order population in ERP and verify POs passed through approval workflow and possess authorized user stamp Closed circuit television, scales, other metrics Use process mining to determine transactions that deviate from standard Monitor processes/controls. Automatically identify process owner when exceptions occur Filter real-time data through continuity equations, ratio analysis, 14 7
8 I. Introduction II.Remote Audit Continuous evidence and analytics III.ICT IV.Evid Evid.. & Anal. V. Conclusion Computer assisted auditing techniques (CAATs) facilitate evidence collection Data analysis software Network security evaluation software OS and DBMS security evaluation software and utilities Software and code testing tools Auditors see tools necessary only for fraud and special investigations Need for specialized training CAATs Debrecenyet al. 2005: CAAT acceptance low, varied in highlytechnical bank setting Zhao et al. 2004: Identify CAATs as a necessary step for continuous auditing Javrinet al. 2008: Auditor use of CAAT requires training and accessibility 15 I. Introduction II.Remote Audit Continuous evidence and analytics III.ICT IV.Evid Evid.. & Anal. V. Conclusion Continuous auditing is a formalization of audit procedures and automation of CAATs Continuous Data Audit + Continuous Controls Monitoring Controls monitoring Brown et al. 2007: Survey of continuous auditing and continuous monitoring research Alles et al. 2006: CCM pilot at Siemens Corporation Murthy 2004: Implementation for CCM in e- commerce Nelson 2004: CCM at Hospital Corporation of America Rose and Hirte1996: Carolina Power and Light Turoff et al. 2004: Homeland Security Vasarhelyi & Halper1991: Continuous online auditing at Bell Laboratories Hunton et al. 2008: Managers perception of CCM 16 8
9 Overall: Needs to Occur in the Future 1. Move from a traditional audit to an audit of the business process, incorporating technology Changing the audit model and using assurance for people to advise on business issues 2. Use continuous auditing to drive risk assessment and to prioritize to better audit by exceptions 3. Shift in how auditors spend their time as a result of audit automation Using more quantitative assessment, probability, and historical data 4. Use available techniques to better stream analytics The resources available for use will be able to reduce error and act as sensors for humans 17 SPECIFICALLY 18 9
10 Top Five Technologies to be Used in the Future 19 Technologies (cont.) Internet-based reporting Digital signatures and data integrity Continuous monitoring and auditing (real-time) Meta-database Forward looking information, not just historical XBRL Tagging all data, not just quantitative Report on components of financial statements 20 10
11 Relationship Between Internal and External Audit in the Future 21 Internal and External Audit (cont.) Internal audit More reliance placed on the work of internal audit as automation of control monitoring becomes more prevalent Make risk based assertions about the company More responsibility regarding assurance of quality data External audit Identified high risk areas remain responsibility of external audit Perform audit procedures on a real-time basis, so that data can be used concurrently by internal and external 22 11
12 Education Modifications to be Implemented in the Future 23 Education (cont.) IFRS Convergence with GAAP Principles-based standards introduced Non-financial information Framework for assurance Risk management Skills More analytical, IT, and overall business 24 12
13 IMPLICATIONS. 25 Internal audit is currently behind external audit, but will probably surpass external audit External audit is unlikely to delegate decision making to a model due to liability reasons Cycling through audit over the year, instead of only at year end Need to look at a global point of view Experiencing a technology pull, not a push Social issues remain that need to be overcome (i.e. HIPPA) regardless of technology Need to assure security and privacy Judgment comes with experience and knowledge, if more automation is used for tedious tasks then judgment can be used in more pressing issues 26 13
14 Conclusion I. Introduction II.Remote Audit III.ICT IV.Evid. & Anal. V. Conclusion
Update on AICPA Assurance Services Executive Committee Activities
Update on AICPA Assurance Services Executive Committee Activities Amy Pawlicki Director Business Reporting, Assurance & Advisory Services and XBRL AICPA Agenda ASEC overview Summary of work streams by
Audit Evidence. AU Section 326. Introduction. Concept of Audit Evidence AU 326.03
Audit Evidence 1859 AU Section 326 Audit Evidence (Supersedes SAS No. 31.) Source: SAS No. 106. See section 9326 for interpretations of this section. Effective for audits of financial statements for periods
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased
Application Testing: Not Just for IT Auditors. Insert Logo Here
Application Testing: Not Just for IT Auditors Huntington Ingalls Industries Who We Are Over a century designing, building, overhauling and repairing ships for the U.S. Navy, the U.S. Coast Guard and world
Agenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment
2011 ERM Symposium March 14 16, 2011 Continuous Controls Monitoring Futuristic Approach to Enterprise Risk Management Swissotel, Chicago, Chicago IL. Speakers: Syed M. Ali Alan Ash Sr. Audit Manager, Director
The Information Systems Audit
November 25, 2009 e q 1 Institute of of Pakistan ICAP Auditorium, Karachi Sajid H. Khan Executive Director Technology and Security Risk Services e q 2 IS Environment Back Office Batch Apps MIS Online Integrated
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO
Data Analysis: The Cornerstone of Effective Internal Auditing. A CaseWare Analytics Research Report
Data Analysis: The Cornerstone of Effective Internal Auditing A CaseWare Analytics Research Report Contents Why Data Analysis Step 1: Foundation - Fix Any Cracks First Step 2: Risk - Where to Look Step
Qi Liu Rutgers Business School ISACA New York 2013
Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,
DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING. A CaseWare IDEA Research Report
DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING A CaseWare IDEA Research Report CaseWare IDEA Inc. is a privately held software development and marketing company, with offices in Toronto
Internal Audit Testing and Sampling Techniques. Chartered Institute of Internal Auditors May 2014
Internal Audit Testing and Sampling Techniques Chartered Institute of Internal Auditors May 2014 Controls Testing Slide 1 Testing Priorities Risk B1 Risk A1 Risk B2 Risk A2 Risk C2 Risk C1 Controls testing
IBM Cognos 8 Controller Financial consolidation, reporting and analytics drive performance and compliance
Data Sheet IBM Cognos 8 Controller Financial consolidation, reporting and analytics drive performance and compliance Overview Highlights: Provides all financial and management consolidation capabilities
INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS
INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
An Auditor s Guide to Data Analytics
An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade
Module 2 IS Assurance Services
Module 2 IS Assurance Services Chapter 2: IS Audit In Phases Phase 2: Part: 2 of 3 CA A.Rafeq 1 Chapter 2: Agenda Chapter 2: IS Audit in Phases Phase1: Plan Phase 2: Execute Phase 3: Report 2 Phase 2:
Innovations in Audit Technology: A Model of Continuous Audit Adoption
Journal of Applied Business and Economics Innovations in Audit Technology: A Model of Continuous Audit Adoption Joseph B. O Donnell Canisius College Investor confidence in the financial markets has been
Symantec Client Management Suite 7.6 powered by Altiris technology
Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often
THE AUDITOR S RESPONSES TO ASSESSED RISKS
SINGAPORE STANDARD ON AUDITING SSA 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS This revised Singapore Standard on Auditing (SSA) 330 supersedes SSA 330 The Auditor s Procedures in Response to Assessed
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud FEATURED FACULTY: Richard B. Lanza, CPA, CFE, CGMA, President of Cash Recovery Partners LLC 973-729-3944 [email protected]
Using data analytics and continuous auditing for effective risk management
Using data analytics and continuous auditing for effective risk management April 2014 Irakis Kanavaris Agenda Current trends Common terminology of Data Analytics and CA/CM KPMG approach & observations
The Impact of Enterprise Resource Planning (ERP) System on the Cost and Price of Auditing Auditor s Perspective
Journal of Modern Accounting and Auditing, ISSN 1548-6583 April 2013, Vol. 9, No. 4, 497-504 D DAVID PUBLISHING The Impact of Enterprise Resource Planning (ERP) System on the Cost and Price of Auditing
Close-Up on Cloud Security Audit
Close-Up on Cloud Security Audit Douglas W. Barbin 2014 BrightLine CPAs & Associates, Inc. All Rights Reserved 1 About Me Partner at BrightLine 17 years experience in security, assessments, forensics,
The Predictive Audit Framework
The International Journal of Digital Accounting Research Vol. 13, 2013, pp. 37 71 ISSN: 1577-8517 The Predictive Audit Framework Siripan Kuenkaikaew. Rutgers, The State University of New Jersey. USA [email protected]
How to gather and evaluate information
09 May 2016 How to gather and evaluate information Chartered Institute of Internal Auditors Information is central to the role of an internal auditor. Gathering and evaluating information is the basic
Webtrends Inc. Service Organization Controls (SOC) 3 SM Report on the SaaS Solutions Services System Relevant to Security
Webtrends Inc. Service Organization Controls (SOC) 3 SM Report on the SaaS Solutions Services System Relevant to Security For the Period January 1, 2015 through June 30, 2015 SOC 3 SM SOC 3 is a service
Social Innovation through Utilization of Big Data
Social Innovation through Utilization of Big Data Hitachi Review Vol. 62 (2013), No. 7 384 Shuntaro Hitomi Keiro Muro OVERVIEW: The analysis and utilization of large amounts of actual operational data
One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA)
One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA) Wei Chen, Jin-cheng Zhang, and Yu-quan Jiang Nanjing Audit University, Nanjing, Jiangsu 210029, China [email protected]
ACCOUNTING INFORMATION SYSTEMS
ACCOUNTING INFORMATION SYSTEMS Controls and Processes SECOND EDITION LESLIE TURIHIER WILEY MODULE 1 Introduction to AIS INTRODUCTION Defines business processes, AIS, and all foundational concepts.
Department of Audit and Compliance. Quality Self-Assessment
Department of Audit and Compliance Quality Self-Assessment November 2014 CONTENTS EXECUTIVE SUMMARY... 2 PURPOSE OF SELF-ASSESSMENT... 4 SELF-ASSESSMENT SCOPE OF WORK... 4 RESULTS OF SELF-ASSESSMENT WORK...
Staying a Step Ahead CBOK. Michael P. Cangemi. Internal Audit s Use of Technology. The Global Internal Audit Common Body of Knowledge.
Staying a Step Ahead Internal Audit s Use of Technology TECHNOLOGY Closer Look Michael P. Cangemi CBOK The Global Internal Audit Common Body of Knowledge Sponsored by About CBOK SURVEY FACTS Respondents
The Relationships between Computer Auditing Activity and. Performance
2015 International Workshop on Computer Auditing Education 1 The Relationships between Computer Auditing Activity and Performance Tung-Hsien Wu, Feng Chia University, Taiwan, [email protected] Abstract
Shared Service System Audits: What User Management and Auditors Need to Know
Shared Service System Audits: What User Management and Auditors Need to Know JFMIP May 2014 Presented by: Robert Dacey GAO Session Objectives Properly using SSAE 16 service organization audit reports Revisions
IBM Cognos Controller
IBM Cognos Controller Accurate, auditable close, consolidation and reporting in a solution managed by the office of finance Highlights Provides all close, consolidation and reporting capabilities Automates
Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014
Electronic Audit Evidence (EAE) and Application Controls Tulsa ISACA Chapter December 11, 2014 Agenda Recent IT-related PCAOB inspection themes: Internal control over financial reporting Multi-location
1/21/2014. Agenda. Audit Testing. The Basics of Internal Auditing January 23-24, 2014
The Basics of Internal Auditing January 23-24, 2014 Kim Mills Director of Auditing Agenda To identify the different types of audit tests and discuss the purpose for each type. IIA Standard 2320 Internal
Product Brief. Intacct Financials & Accounting. Intacct General Ledger
Product Brief Intacct Financials & Accounting Intacct Financials and Accounting includes Intacct General Ledger, Intacct Accounts Receivable, Intacct Accounts Payable, Intacct Cash Management and Intacct
Quick Guide: Selecting ICT Tools for your Business
Quick Guide: Selecting ICT Tools for your Business This Quick Guide is one of a series of information products targeted at small to medium sized businesses. It is designed to help businesses better understand,
Corporate Performance Management Framework
Version 1.0 Copyright 2004 Answerport, Inc. Table of Contents Table of Contents... 2 Conceptual Overview... 3 Conceptual Overview Diagram... 4 The Foundation... 4 Analytic Presentation Layer... 5 Reports...
LabArchives Electronic Lab Notebook:
Electronic Lab Notebook: Cloud platform to manage research workflow & data Support Data Management Plans Annotate and prove discovery Secure compliance Improve compliance with your data management plans,
Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS
INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge
Extraction of SAP Data for Audit & Compliance
Extraction of SAP Data for Audit & Compliance LiveCompare Case Study David Barkhausen 20 November 2012 Contents Key Learning Points British American Tobacco Overview Audit Challenges Addressing The Challenges
AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives
AUD105-2nd Edition Auditor s Guide to IT - 20 hours Objectives More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types
IT Tools for SMEs and Business Innovation
Purpose This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help SMEs better understand, and take advantage of, new information
In recent years, information technology (IT) used by firms,
Copyright 2003 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. Impact of SAS No. 94 on Computer Audit Techniques By M. Virginia Cerullo, CPA, CIA, CFE, and Michael
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
ORACLE SOCIAL ENGAGEMENT AND MONITORING CLOUD SERVICE
ORACLE SOCIAL ENGAGEMENT AND MONITORING CLOUD SERVICE KEY FEATURES Global social media, web, and news feed data Market-leading listening quality Automatic categorization Configurable dashboards, drill-down
Independent Accountants Report
KPMG LLP 1601 Market Street Philadelphia, PA 19103-2499 Independent Accountants Report To the Management of Unisys Corporation: We have examined the assertion by the management of Unisys Corporation (
Continuous auditing: the audit of the future
Zabihollah Rezaee Professor of Accounting, Middle Tennessee State University, Murfreesboro, Tennessee, USA Rick Elam Reynolds Professor of Accountancy, University of Mississippi, Oxford, Mississippi, USA
Using Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Gerard M. Zack, CFE, CPA, CIA, CCEP Introduction to Data Analytics CPE Instructions Course Objectives How data analytics can be used to detect fraud Different tools
How To Audit A Financial Statement
INTERNATIONAL STANDARD ON 400 RISK ASSESSMENTS AND INTERNAL CONTROL (This Standard is effective, but will be withdrawn when ISA 315 and 330 become effective) * CONTENTS Paragraph Introduction... 1-10 Inherent
Frequently asked questions: SOC 2 and 3
1. Is the licensing requirement for a SOC 2 or 3 different than for a SOC 1? SOC reports are attestation reports issued in accordance with AICPA standards. Therefore, licensing requirements are the same
SESSION 3 AUDIT PLANNING
SESSION 3 AUDIT PLANNING Learning Objectives: identify and explain the need for planning an audit identify and describe the contents of the overall audit strategy and the audit plan explain the difference
Impact of Computer-Assisted Audit Techniques on Sarbanes-Oxley Act Sections 404 and 409. Scarlett Choi ACC 626
Impact of Computer-Assisted Audit Techniques on Sarbanes-Oxley Act Sections 404 and 409 Scarlett Choi ACC 626 INTRODUCTION In order to restore the declining investors confidence in the capital markets
3. Current Auditing Computerized Tools
- 17-3. Current Auditing Computerized Tools 3.1. Objective and Structure The objective of this chapter is to provide information about technological tools and techniques currently used by auditors. Section
HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015
HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015 Effective for audits of financial statements for periods beginning on or after 15 December 2009 Hong Kong Standard on Auditing 500
FINANCIALS CLOUD. Justin Ossola Financial Solutions Consultant Oracle Applications Copyright 2013, Oracle and/or its affiliates. All rights reserved.
FINANCIALS CLOUD 1 Justin Ossola Financial Solutions Consultant Oracle Applications Solutions Consultant ERP/Financials Cloud U.S. Naval Academy (BS); Georgetown University (MBA) ERP Implementation Experience
CORE CONCEPTS OF. Thirteenth Edition. Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada
CORE CONCEPTS OF Accounting Information Systems Thirteenth Edition Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada Jacob M. Rose, Ph D. Trustee Professor Department
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
Focused on your goals SERVICES AND SUPPORT CAPABILITIES OVERVIEW
Focused on your goals SERVICES AND SUPPORT CAPABILITIES OVERVIEW Laboratories today face complex scientific and business challenges that require the support of a true service partner a service partner
GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management
GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and
Reduce Audit Time Using Automation, By Example. Jay Gohil Senior Manager
Reduce Audit Time Using Automation, By Example Jay Gohil Senior Manager Today s Session Speaker Bio: Jay Gohil, Protiviti Jay is a Senior Manager in the ERP Services practice in Atlanta. In the past seven
How To Audit A Company
INTERNATIONAL STANDARD ON AUDITING 315 IDENTIFYING AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT THROUGH UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT (Effective for audits of financial statements for
Better Business Analytics with Powerful Business Intelligence Tools
Better Business Analytics with Powerful Business Intelligence Tools Business Intelligence Defined There are many interpretations of what BI (Business Intelligence) really is and the benefits that it can
ORACLE QUALITY ORACLE DATA SHEET KEY FEATURES
ORACLE QUALITY KEY FEATURES Enterprise wide Quality Data Repository In-process Quality Integrated with manufacturing, logistics, maintenance and service modules in the Oracle E-Business Suite. Analysis
Continuous Controls Monitoring ISACA, Houston Chapter. August 17, 2006
Continuous Controls Monitoring ISACA, Houston Chapter August 17, 2006 Purpose of Discussion Understand impact of Continuous Controls Monitoring (CCM) on the Information Systems Audit community To perform
QAD Business Intelligence
QAD Business Intelligence QAD Business Intelligence (QAD BI) unifies data from multiple sources across the enterprise and provides a complete solution that enables key enterprise decision makers to access,
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young
Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Learning Objectives Understand how data analysis can impact/improve business Understand typical data analysis challenges Understand the various
EVERYTHING THAT MATTERS IN ADVANCED ANALYTICS
EVERYTHING THAT MATTERS IN ADVANCED ANALYTICS Marcia Kaufman, Principal Analyst, Hurwitz & Associates Dan Kirsch, Senior Analyst, Hurwitz & Associates Steve Stover, Sr. Director, Product Management, Predixion
Operating System Migration
Operating System Migration 1 (7) Table of Contents 1. Executive Summary... 3 2. Challenges In Operating System Migrations... 3 3. Remote Migration With Miradore... 5 4. Conclusion... 7 2 (7) 1. EXECUTIVE
UNCOVER WHAT S HIDDEN IN YOUR SAP ERP DATA TO HELP CUT COSTS AND RAISE COMPLIANCE
UNCOVER WHAT S HIDDEN IN YOUR SAP ERP DATA TO HELP CUT COSTS AND RAISE COMPLIANCE UNCOVER WHAT S HIDDEN IN YOUR SAP ERP DATA TO HELP CUT COSTS AND RAISE COMPLIANCE Leverage the pre-packaged expertise in
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Whitepaper. GL Consolidation. Published on: August 2011 Author: Sivasankar. Hexaware Technologies. All rights reserved. www.hexaware.
Published on: August 2011 Author: Sivasankar Hexaware Technologies. All rights reserved. Table of Contents 1. General Ledger Consolidation - Making The Right Moves 2. Problem Statement / Concerns 3. Solutions
Accounting, M.S. About the Program. Admission Requirements and Deadlines. Program Requirements. Contacts. Department Web Address:
Accounting, M.S. 1 Accounting, M.S. FOX SCHOOL OF BUSINESS AND MANAGEMENT (http://www.fox.temple.edu) About the Program Areas of Specialization: An optional concentration in Corporate Accounting is offered.
Boosting Airport Non-Aeronautical Revenues
Boosting Airport Non-Aeronautical Revenues Collection of Sales Data INVOICE Contract Management Revenue & Billing Performance Analysis www.concessionaireanalyzer.com Non-aeronautical sector revenues are
Contents. xv xvii xxi. Case Studies Preface Acknowledgments
Contents Case Studies Preface Acknowledgments xv xvii xxi CHAPTER 1 CAATTs History 1 The New Audit Environment 2 The Age of Information Technology 3 Decentralization of Technology 3 Absence of the Paper
AIS Audit Support by Simulation and Simulation Criteria Definition
Research Article AIS Audit Support by Simulation and Simulation Criteria Definition Muhannad Akram Ahmad Department of Accounting Information System, Irbid National University, Irbid Jordan [email protected]
Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology
Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology Key findings from the survey include: while audit software tools have been available
Business Process Management & Workflow Solutions
Business Process Management & Workflow Solutions Connecting People to Process, Data & Activities TouchstoneBPM enables organisations of all proportions, in a multitude of disciplines, the capability to
Auditing Applications. ISACA Seminar: February 10, 2012
Auditing Applications ISACA Seminar: February 10, 2012 Planning Objectives Mapping Controls Functionality Tests Complications Financial Assertions Tools Reporting AGENDA 2 PLANNING Consideration / understanding
