Prof. Dr. Nick Gehrke Alexander Rühle



Similar documents
Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples

Auditing Application User Account Security and Identity Management with Data Analytics

Audit Compliance and Internal Audit Analysis for Dynamics

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

Creating a Vendor Heat Map using Data Analytics

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

OVERVIEW OF THE ISSUE

Continuous Monitoring and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes

Better Business Through Data Analysis & Monitoring

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

Continuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes

Risk Management in Role-based Applications Segregation of Duties in Oracle

Completing an Accounts Payable Audit With ACL (Aired on Feb 15)

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Worksoft Case Study 1

Feature. Multiagent Model for System User Access Rights Audit

The supporting information for audit/engagement procedures is part of the required Audit/Engagement Documentation (See Section ).

Auditing Applications. ISACA Seminar: February 10, 2012

Dan French Founder & CEO, Consider Solutions

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

AUDITING AND THE SAP ENVIRONMENT

Process Control Optimisation with SAP

IT Audit at UBS - a Fully Integrated Approach

xft invoice manager Automated Invoice Processing for SAP FI and MM

How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

Feature. Applications of Business Process Analytics and Mining for Internal Control. World

Reduce Audit Time Using Automation, By Example. Jay Gohil Senior Manager

Distribution: Sheryl L. Sculley, City Manager Erik Walsh, Deputy City Manager Ben Gorzell, Chief Financial Officer Charles N. Hood, Fire Chief Martha

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments

Audit Data Analytics. Bob Dohrer, IAASB Member and Working Group Chair. Miklos Vasarhelyi Phillip McCollough

ROADMAP TO SAP SECURITY

Certified Information Systems Auditor (CISA)

Numerous missing invoices, receipts, and purchase justifications.

[ COREY PEARSON. Driving Process Efficiency through SAP Business Workflow at Stanley John Hoover, Stanley Works Rajkishore Una, GyanSys Inc.

System Audit Framework

THE ABC S OF DATA ANALYTICS

Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6

Improving Offshore Supply Chain by Predictive Asset Management Making Smarter Business Decisions

Supply Chain Shared Services (SCSS)

2. A typical business process

Office of the City Auditor. Audit Report. AUDIT OF ACCOUNTS PAYABLE APPLICATION CONTROLS (Report No. A10-003) October 2, 2009.

Microsoft Confidential

RISK ADVISORY SERVICES CONSTRUCTION AUDIT SERVICES

UNCOVER WHAT S HIDDEN IN YOUR SAP ERP DATA TO HELP CUT COSTS AND RAISE COMPLIANCE

Continuous Monitoring: Match Your Business Needs with the Right Technique

Manage Customer Projects from Bid-to-Execution with SAP Commercial Project Management

Fraud Workshop Finding the truth in the transactions

SAP Gateway for Microsoft SAP AG or an SAP affiliate company. All rights reserved. I Copyright 2015 Microsoft Corporation. All rights reserved.

Using data analytics and continuous auditing for effective risk management

1. Introduction to the Automated Accounts Payable Development Process Flows of Purchase Orders, Goods Receipts and Invoice Queries...

Extended Warehouse Management - A 3PL Perspective. Max Spilker, Roberto Omiccioli (Westernacher)

Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study

Information Technology General Controls (ITGCs) 101

OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT

Continuous Auditing with Data Analytics

Things You Need in AP Automation

Reliable supply chain information at your fingertips.

The Information Systems Audit

Office of Public Affairs Business Process Audit Final Report

MNLARS Project Audit Checklist

AP Automation Checklist

Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution

Chapter 2. The Development of Enterprise Resource Planning Systems

Campbell s Journey to Invoice Automation. Joyce Couts, Manager, Business Payment Services Jeff Nowlin, Sr. Manager, Information Technology

KAREN E. RUSHING. Audit of Purchasing Card Program

Data Warehouse Management Final Audit Report Report Nr. 8/13 November 12, 2013

Introductie Agilos Enterprise Warehouse View The Audit-Data Warehouse: a data refinery Controls Warehouses Solution Warehouses

Fraud Prevention and Detection in a Manufacturing Environment

Comparison of Generalized Audit Software

Looking to. pass the exam. training is. America. (unauthorized. courseware) 5 Days. of Training. happy. first day. training) have a highh

Company information around the globe

OFFICE OF THE CITY AUDITOR

SAP Master Data Management

Oracle Role Manager. An Oracle White Paper Updated June 2009

Internal Audit Testing and Sampling Techniques. Chartered Institute of Internal Auditors May 2014

FORUM ON TAX ADMINISTRATION

SAP ICR_002-Add-on (Tool-kit)

Updating Your Microsoft SQL Server 2005 Skills to SQL Server 2008

The Importance of IT Controls to Sarbanes-Oxley Compliance

Facts to Value. Transforming data into added value. Compact_ IT Advisory 3. Introduction

SAP Certified Application Associate - Procurement with SAP ERP 6.0 EHP4

Active Governance of Customer Data with Forms and Workflow Solutions Inderaj Sehmi Winshuttle

Making Automated Accounts Payable a Reality

Concepts in Enterprise Resource Planning. Chapter 5 Accounting in ERP Systems

Transcription:

Prof. Dr. Nick Gehrke Alexander Rühle

AGENDA 15:00 16:00 Session 1 1. Introducing Process Mining 2. Case #1: Financial Process Mining 3. Introducing the profiling methodology 4. Case #2: Financial Process Mining and Profiling 16:30 17:30 Session 2 5. Summary Session 1 6. Introducing Factor Analysis 7. Case #3: Financial Process Mining, Profiling, Factor Analysis 8. Summary of Key Challenges

0. INTRODUCING PROF. DR. NICK GEHRKE, CISA Prof. Dr. Nick Gehrke Diplom-Kaufmann Certified Tax Advisor Certified Information Systems Auditor ~10 years audit experience ~ 5 years Big 4 nick.gehrke@nordakademie.de Tel.: +49 (0) 173 25 02 699

0. INTRODUCING ALEXANDER RUEHLE, CISA Alexander Rühle Diplom-Kaufmann Certified Internal Auditor Certified Information Systems Auditor alexander.ruehle@sapliance.com Tel.: +49 (0) 172 44 92 971 sapliance, CEO and Co-founder Smart Audit, CEO and founder ~10 years audit experience ~ 5 years Big 4

1. INTRODUCING PROCESS MINING Process Mining establishes transparency for IT-based processes. Key advantages: objective quick analysis complete convenient

1. INTRODUCING PROCESS MINING 1. Process Mining takes existing data from ITsystems as a starting point 2. Extracts the different variations of the process 3. Automatically turns them into an understandable visualisation of the process

1. INTRODUCING PROCESS MINING How does Process Mining support auditors?

1. INTRODUCING PROCESS MINING Evolution of process audits (2012) Interview, Data Analysis, Sampling Process Mining, Data Analysis, Sampling Interview (Walkthrough), Sampling

1. INTRODUCING PROCESS MINING General Process Mining Challenges for Auditors 1. Data Aquisition 2. Data Security 3. Linking Process Data 4.Tool

CASE #1: FINANCIAL PROCESS MINING Research Project Virtual Accounting Worlds at University of Hamburg 2010-2013 Design of the Financial Process Mining Algorithm First prototype of sapliance mitigating the first challenges of process mining Predefined Data Data Encryption SAP Data extraction Automated Financial Process Mining

CASE #1: FINANCIAL PROCESS MINING How does the Financial Process Mining function? Standardized ERP System (SAP) SAP standard tables (Basis, FI, SD, MM) Automated reconstruction of SAP processes starting in the financial statements, end to end Every entry is explained by one or more sequences that lead to this entry Every sequence can be mapped to several accounts

CASE #1: FINANCIAL PROCESS MINING Reconstruction of actual sequences in the dataset

CASE #1: FINANCIAL PROCESS MINING Scenario 1 German customer Russian Entity Internal Audit Department Audit Objectives: 1. Understand actual business processes 2. How do processes explain the financial statements? 3. Identify abnormalities 4. Select specific samples based on abnormalities

CASE #1: FINANCIAL PROCESS MINING Disco Example

CASE #1: FINANCIAL PROCESS MINING Predefined Data Data Encryption SAP Data extraction Automated Financial Process Mining Export Data Import to Process Mining Tool Analyze Processes Select Samples Verify Samples in SAP Fieldwork Generalize Observation Report

CASE #1: FINANCIAL PROCESS MINING Lessons Learned 1. Reality is complex especially in SAP 2. Cognitive limitatations in analyzing graphs 3. Budget limitations lead to choice of either Reducing complexity Significant scope reduction 4. Process Mining has no substantive audit objective Full Scope Financial Process Mining + Audit Methodology

3. INTRODUCING THE PROFILING METHODOLOGY WHAT IS THE IDEAL OBJECT OF INVESTIGATION? Document User Vendor Customer Journal Entry

3. INTRODUCING THE PROFILING METHODOLOGY WHAT IS THE IDEAL OBJECT OF INVESTIGATION? Document User Vendor Customer Journal Entry THE SEQUENCE IS THE IDEAL OBJECT OF INVESTIGATION

3. INTRODUCING THE PROFILING METHODOLOGY Objectives 1. Audit methodology to evaluate sequences 2. Reducing false positives 3. Auditors should spend their time with reviewing the significant sequences first 4. Audit objectives: 1. Compliance and Correctness 2. Identify Saving Opportunities 3. Review of Process Standardisation 4. Restricted Access

3. INTRODUCING THE PROFILING METHODOLOGY How does the Profiling methodology function? Definition of indicators per audit objective (>130) 1. Compliance and Correctness e.g Postings vendor to vendor 2. Saving Opportunities e.g Duplicate payments 3. Process Standardization e.g. Changes to purchase orders after invoice received 4. Restricted Access e.g. Segregation of Duties

3. INTRODUCING THE PROFILING METHODOLOGY Audit of every sequence! This sequence is prominent because Administror booked Invoice Paid on a weekend Vendor without payment terms Invoice is marked as potential duplicate payment Vendor payment bank account differs from bank account in vendor master file

3. INTRODUCING THE PROFILING METHODOLOGY All business processes are audited by all indicators.

CASE #2: FINANCIAL PROCESS MINING AND PROFILING Scenario 2 German customer Wind Energy Internal Audit Department Audit Objectives: 1. Evaluate procurement processes 2. Audit of user access

CASE #2: FINANCIAL PROCESS MINING AND PROFILING Live demo audit report

CASE #2: FINANCIAL PROCESS MINING AND PROFILING Predefined Data Data Encryption SAP Data extraction Automated Financial Process Mining Export Data Import to Process Mining Tool Analyze Processes Select Samples Verify Samples in SAP Fieldwork Generalize Observation Report

CASE #2: FINANCIAL PROCESS MINING AND PROFILING Lessons Learned 1. Auditors needs an interest in detailed data 2. Although there is a reduction of false positives, there still is a lot of data to review 3. Auditors tend to analyse the report by reviewing isolated indicator instead of combining critical indicator 4. Auditor is not supported in identifying general design issues of underlying data. Full Scope Financial Process Mining + Audit Methodology + Factor Analysis

5. SUMMARY SESSION 1

6. INTRODUCING FACTOR ANALYSIS Objectives 1. Present the auditor with those indicator combinations that best explain the data set. 2. Define a target (end point) to the data audit. 3. Guide the auditor through the audit, beginning to end.

6. INTRODUCING FACTOR ANALYSIS Difference between Profiling and Factor Analysis Profiling Factor Analysis

6. INTRODUCING FACTOR ANALYSIS What is an (explanatory) factor analysis? 1. Data reduction technique (we have too much variables) 2. A component / factor is a set of latent variables that originally explain the data set (calculate less but more meanigful factors than variables) 3. A component / factor consists of a linear combination of the variables 4. Goal is to present relationships among variables Which factors best explain the dataset?

6. INTRODUCING FACTOR ANALYSIS General Example

6. INTRODUCING FACTOR ANALYSIS The sample items = Cities

6. INTRODUCING FACTOR ANALYSIS The variables: 25 offence categories

6. INTRODUCING FACTOR ANALYSIS The analysis: Extract the Components / factors

6. INTRODUCING FACTOR ANALYSIS The Interpretation of components / factors Give them a name according to the interpretation

6. INTRODUCING FACTOR ANALYSIS And now? What has the crime study to do with process audits? Only the statistical method! Artifact is / are not but is /are Sample items Cities Process sequences Variables Offence Categories Compliance indicators in process instances Components / factors Crime patterns Process weakness patterns

6. INTRODUCING FACTOR ANALYSIS

6. INTRODUCING FACTOR ANALYSIS The resulting data matrix Case No Indicator A Indicator B Indicator C 1 1 1 0 2 0 0 1 3 1 1 0

CASE #3: FINANCIAL PROCESS MINING, PROFILING, FACTOR ANALYSIS DEMO CASE

CASE #3: FINANCIAL PROCESS MINING, PROFILING, FACTOR ANALYSIS Predefined Data Data Encryption SAP Data extraction Automated Financial Process Mining Export Data Import to Process Mining Tool Analyze Processes Select Samples Verify Samples in SAP Fieldwork Generalize Observation Report

7. SUMMARY OF KEY CHALLENGES