An Auditor s Guide to Data Analytics



Similar documents
Data analysis for Internal Audit

Our Data Analytics Journey, Methodology, and More. September 15, 2015

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution

Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

by: Scott Baranowski, CIA

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

Advanced Data Analytics, the Fraudsters Worst Enemy

P-Card Fraud Controls. Introduction

THE ABC S OF DATA ANALYTICS

Agenda 3/7/ ERM Symposium March 14 16, Continuous Controls Monitoring. I. Changes In Corporate Environment

Better Business Through Data Analysis & Monitoring

Continuous Auditing with Data Analytics

Continuous Controls Monitoring ISACA, Houston Chapter. August 17, 2006

Why is Internal Audit so Hard?

T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud

Fraud Workshop Finding the truth in the transactions

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

Data Analytics For the Restaurant Industry

Leveraging Big Data to Mitigate Health Care Fraud Risk

Using Data Analytics to Detect Fraud

Data & Analytics in Internal Audit. January 13, 2015

Microsoft Confidential

Data Mining: Unlocking the Intelligence in Your Data. Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP

Accounts Payable Best Practices

Invoice Number Vendor Number Amount A $1, A $1,035.71

Leverage T echnology: Move Your Business Forward

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP Copyright 2015 Edward S.

GENERAL PAYROLL CONTROLS Dates in scope:

Florida A & M University

GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments

Procurement Card. Procedures Manual

Integrating Data Analytics into Internal Audit

Reduce Audit Time Using Automation, By Example. Jay Gohil Senior Manager

Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics

Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

Moving your enterprise systems to the cloud? What do you need to know to manage the risks? Jamie Levitt, Director

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

How To Manage A Pom.Net Account Book

AUDITING AND THE SAP ENVIRONMENT

Data Analytics in Internal Audit. Elizabeth Dunkerley

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Purchasing Card Policies and Procedure Manual

EFFICIENTLY RUN YOUR OPERATIONS. Accounts Receivable Track individual clients, organizations, and funding sources separately.

Comparison of Generalized Audit Software

Welcome to the topic on purchasing items.

City of Berkeley. Accounts Payable Audit

Accelerating Your Cash Flow

PURCHASING CARD - POLICY AND PROCEDURES SLIPPERY ROCK UNIVERSITY OF PENNSYLVANIA PA STATE SYSTEM OF HIGHER EDUCATION

Procurement Card Policy and Procedures Manual

Fraud Detection & Data Analytics

Purchasing Card (P-Card) Policy and Procedure Frequently Asked Questions

Completing an Accounts Payable Audit With ACL (Aired on Feb 15)

Internal Controls, Fraud Detection and ERP

The Power of Risk, Compliance & Security Management in SAP S/4HANA

AP 571 PURCHASING CARD COMMERCIAL CREDIT CARD PROGRAM

Continuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes

Welcome to the topic on managing delivery issues with Goods Receipt POs.

Accounts Payable. Best Practices: Existing Control: Control Gap: Controls Evaluation and Gap Analysis. Purchasing

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

It all Starts with the Invoice

2015 Travel and Expense Management Report

Strengthening Controls in 2013: The Order-to-Cash Cycle

Internal Control Deliverables. For. System Development Projects

Step Up to Microsoft Dynamics GP

Continuous Monitoring and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes

Business Intelligence Inquiry Dashboard Job Aid

Continuous Monitoring: Match Your Business Needs with the Right Technique

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

SUBSIDIARY LEDGER MANAGEMENT AND INTERNAL CONTROLS

Accounts Payable Outsourcing Audit April 2014

Data Analytics: Continuous Controls Monitoring & Predictive Analytics

Table of Contents. Transmittal Letter Executive Summary Background Objectives and Approach Issues Matrix...

T&E Spend Analysis Report

B Resource Guide: Implementing Financial Controls

OVERVIEW OF THE ISSUE

MultiSite Suite: Inspections, Inventory, Purchase Requisitions and Purchase Orders. Overview

INTERNAL ACCOUNTING CONTROLS CHECKLIST FOR NTMA CHAPTERS

Charleston Southern University Procurement Card (P-card) User Guide

PART 10 COMPUTER SYSTEMS

Internal Audit Practice Guide

Module 1: EXPENSE REPORT OVERVIEW AND BASIC SETUP

MD AOC Project Introduction to PeopleSoft

How to Secure Your SharePoint Deployment

IPPF Practice Guide. Auditing Application Controls

Agency Insight: EE1 Business Processes, Assets, and Projects October 9, 2014

Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls

CORPORATE PURCHASING CARD User Guidelines

Transcription:

An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1

Today s Agenda Data Analytics the Basics Tools of the Trade Big Data Continuous Auditing Case Study Benford s Law Tools Perspective Internal Audit Focal Points May 11, 2013 2

Data Analytics the Basics May 11, 2013 3

What is Data Analytics? Data analytics is defined as the process of inspecting, cleaning, transforming, and modeling data with the goal of highlighting useful information, suggesting conclusions, and supporting decision making. -Various sources Data analytics is an analytical process by which insights are extracted from operational, financial, and other forms of electronic data internal or external to the organization. These insights can be historical, realtime, or predictive and can also be risk-focused (e.g., controls effectiveness, fraud, waste, abuse, policy/regulatory noncompliance) or performance focused (e.g., increased sales, decreased costs, improved profitability) and frequently provide the how? and why? answers to the initial what? questions frequently found in the information initially extracted from the data. -KPMG May 11, 2013 4

Not a New Concept Late 1980s generalized auditing software companies form ACL, 1987 Caseware, 1988 Charles Carslaw, Applying Benford s Law to Accounting, 1988 Continuous Process Auditing System, AT&T Bell Laboratories, 1989 May 11, 2013 5

Common Data Types and Data Structures Data is generally organized into files or tables A table can be thought of as a two dimensional matrix of data Each row represents a single record Each column represents a data field Each data column, or field, may have a different data type Data types determine how data is interpreted, and also what data format is considered valid For example, data can be a date, a number, or plain text Invalid data in a table is often a sign of some other problem Often, each record in a table may have a unique identifier, like an employee, customer, or transaction ID When one table uses this identifier to reference records in another table, this is called a relational database Relational databases are a very useful way to organize data Many databases are built using some kind of relational database format May 11, 2013 6

Methodology Plan Acquire & Understand Analyze Validate Report May 11, 2013 7

Data Analytics Tools May 11, 2013 8

Desired Features in Analysis Tools Able to handle large data sets efficiently Wide array of analytical and statistical functions and procedures Programmability Logging of procedures performed on data Ability to easily re-run analysis with minor changes May 11, 2013 9

Types of Tools Spreadsheet software Databases Desktop software (Microsoft Access) Server-based (SQL/Oracle) Generalized auditing software ACL IDEA Other tools SAS SPSS Apache Hadoop May 11, 2013 10

Generalized Auditing Software What is it? Generalized auditing software (e.g., ACL and IDEA) tools are simple, powerful database tools with features designed for an auditor. Read only does not modify source data Audit log all commands are traceable and repeatable Scripting for automated or repetitive audits Powerful data connectivity can access almost any data, even text-based reports and flat files May 11, 2013 11

Tools of the Trade May 11, 2013 12

Continuous Auditing May 11, 2013 13

Continuous Auditing Defined Continuous auditing is any method used by auditors to perform auditrelated activities on a more continuous or continual basis. It is the continuum of activities ranging from continuous control assessment to continuous risk assessment all activities on the control-risk continuum. -The IIA, GTAG 3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment Continuous controls auditing using automated tools is one of the methods of continuous auditing Set frequency daily, weekly, monthly, etc. May 11, 2013 14

Case Study ACL CCM technology (now replaced by Audit Exchange) ACL as the implementation partner Six modules: GL, P2P, Payroll, T&E, PCard and O2C Multiple data sources (both in-house and third-party): SAP, ADP, Concur, American Express Mostly automated but some manual downloads of source data Focus on both master and transactional data Fraud detection, control deficiencies, data issues May 11, 2013 15

Implementation Project Requirements and design specifications workshops with ACL, business process owners, IT and audit Build ACL Testing ACL and audit Training administrator and end user Go-live Continuous controls auditing program May 11, 2013 16

Examples of Analytics General Ledger (24 tests) Critical data fields Unauthorized journal entry (JE) JEs by unauthorized users Duplicate JEs (same account/amount, same JE number/amount) Split JEs (single JE/multiple accounts, multiple JEs/single account) Segregation of duties (park vs. post, post vs. create account) Dormant accounts Even dollar JEs Suspicious keyword in JE description Duplicate GL accounts based on the account description May 11, 2013 17

Examples of Analytics Purchase to Pay (29 tests) Critical data fields (vendor master, requisition, purchase order (PO) Split requisitions and POs Stale requisitions and POs Segregation of duties (requisitioner vs. approver, purchaser vs. receiver, requisition approver vs. PO approver, purchaser vs. vendor master administrator, purchaser vs. AP clerk) PO date after invoice date Invoice number sequence Goods received quantity vs. invoice quantity Employee and vendor matches by name and by address Duplicate vendors (by name, address, bank account number) Duplicate purchases (same vendor same invoice number, same amount same GL account) May 11, 2013 18

Examples of Analytics Payroll (29 tests) Critical data fields (payroll master file) Duplicate employees (same bank account or address) Employee status not matching the termination date Exempt hours worked vs. standard hours Non-exempt hours worked vs. expected hours Hours worked vs. hours paid Employee start date after paycheck date Terminations within 14 days of hire Invalid pay rates (actual/calculated vs. master file) Excessive gross pay 401k annual contribution limit, catch-up contribution limit and catch-up age limit Job record deletions (data corrections not using effective date) May 11, 2013 19

Examples of Analytics Travel and Entertainment/Purchasing Card (30 + 32 tests) Critical data fields (cardholder master, expense, etc.) Invalid cardholder (no matching employee or terminated employee) Duplicate cardholders (by employee ID or address) Suspicious MCC Suspicious keyword in the transaction description Declined and disputed transactions Split purchases Duplicate purchases (same merchant same amount) New cardholder watch list/cardholder watch list Ghost card activities Even/small dollar amount transactions Weekend and holiday transactions Potential duplicate reimbursements: gas with mileage or PCard with an AP purchase Spending limits on transactions (lavish hotel stays, dinners, etc.) May 11, 2013 20

Examples of Analytics Order to Cash (46 tests) Critical data fields (customer master, sales order, etc.) Duplicate customers (on name or address) Credit limits vs. orders Segregation of duties (order entry vs. customer master, order entry vs. product master) Unauthorized/excessive commissions Delivery quantity vs. sales order quantity Shipment/sales order/price change by an unauthorized employee Cash receipt vs. invoice amount Shipment without a sales order Days sales outstanding May 11, 2013 21

Benefits and Costs/Risk Benefits Automation = saving time Trending of transactions Red flags Master data issues Control culture (you are being watched) SOX, FCPA and other regulatory requirements Costs/Risks Investment Time for review, follow-up and communication of results to management Insufficient understanding of source data (can result in many false positives) Lack of buy-in by management May 11, 2013 22

Big Data May 11, 2013 23

Big Data What is Big Data? Voluminous amounts of structured and unstructured data Structured currently identifiable by user; e.g., database Unstructured does not fit easily into traditional relational systems; e.g., email, word processing documents, multimedia, video, PDF files, spreadsheets, social media Defined in terms of petabytes and exabytes Ever more powerful information technology now allows consumers to carry gigabytes in their pockets and businesses to organize and analyze data on a scale never seen before. People s willingness to use the new electronic tools to communicate and share information about themselves means that even the most advanced companies are only scratching the surface of the behavioral patterns these troves of data can potentially reveal Source: The Financial Times May 11, 2013 24

Shift in Data Sources Structured Unstructured Product Name Data Type Nullable? PRODUCT_ID VARCHAR NO CATEGORY VARCHAR NO LIST_PRICE DECIMAL NO The challenge is: Approximately 75-90% of data is unstructured (while IT is built for structured data) Unstructured data is growing at nearly 10x the rate of structured data Less than 5% of unstructured data is proactively managed May 11, 2013 25

The Four Vs of Big Data Volume Amount of data generated or must be ingested, analyzed, and managed to enable business decisions Velocity Variety Veracity Speed at which data is produced and changed; the speed at which data must be received, processed and understood Both structured and unstructured data generated by a wide range of sources The quality and accuracy of received data May 11, 2013 26

A ZETABYTE IS ONE MILLION PETABYTES! May 11, 2013 27

Forces Impacting Utilization of Big Data Scalability Quality vs. Quantity Integration Deployment Analytics Technology Data Structured vs. Unstructured Internal vs. External Technology Programming, Infrastructure, Cloud Computing, Integration Talent & Skill Sets Governance & Privacy Who What Data Generation Architecture, Modeling, Extraction Analytics Where How May 11, 2013 28

Benford s Law May 11, 2013 29

What is Benford s Law? Mathematical theory of leading digits. Leading digits are distributed in a specific, non-uniform way. Simon Newcomb, 1881 Described theoretical frequency that is Benford s Law Frank Benford, 1938 Numbers starting with 1, 2, or 3 are more common in nature than those with initial digits 4 9. Charles Carslaw, 1988 Conducts study of tabulated income numbers Concludes that management actively rounds up income numbers so that they look better Mark Nigrini, 2000 Digital Analysis Using Benford s Law May 11, 2013 30

Benford s Curve Source: ISACA Website May 11, 2013 31

Benford s Law Data Set Criteria Major Digital Tests Adjusting the Curve Reporting Practical Application May 11, 2013 32

Benford s Law Resources ISACA Understanding and Applying Benford s Law: http://www.isaca.org/journal/past-issues/2011/volume- 3/Pages/Understanding-and-Applying-Benfords-Law.aspx IIA Putting Benford s Law to Work: http://www.theiia.org/intauditor/itaudit/archives/2008/february/puttingbenfords-law-to-work/ Applying Benford s Law in Excel: http://www.theiia.org/intauditor/media/files/step-bystep_instructions_for_using_benford's_law[1].pdf Mark J. Nigrini, Ph.D., Digital Analysis Using Benford s Law May 11, 2013 33

Questions?

Natasha DeKroon Duke University Health System natasa.dekroon@duke.edu 919-620-5031 Brian Karp Experis, Risk Advisory Services brian.karp@experis.com 303-956-5398 May 11, 2013 35