Risk Considerations for Internal Audit



Similar documents
The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Cybersecurity The role of Internal Audit

Key Cyber Risks at the ERP Level

Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance

Third Party Risk Management 12 April 2012

Into the cybersecurity breach

Moving Forward with IT Governance and COBIT

U.S. CFO Program The Four Faces of the CFO Deloitte Touche Tohmatsu

Internal audit value optimization for insurance organizations

Big data The three-minute guide

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.

Italy. EY s Global Information Security Survey 2013

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

fs viewpoint

Does Providing Tax Services Impair Auditor Independence? Evidence from Assessing Tax Accrual Quality

Sustainability Analytics The three-minute guide

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

FCPA 10 Hallmarks Self- Assessment

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief

Compliance risk assessments The third ingredient in a world-class ethics and compliance program

Owning the Talent Pipeline: How Unified Platforms are Helping Companies Acquire, Retain and Manage Talent

RISK MANAGEMENt AND INtERNAL CONtROL

Auditing Outsourcing Arrangements

The digital grapevine Social media and the role of Internal Audit

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Metrics by design A practical approach to measuring internal audit performance

COMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS

KPMG Internal Audit: Top 10 considerations in 2015 for technology companies. kpmg.com

Managing cyber risks with insurance

Deloitte and SuccessFactors Workforce Analytics & Planning for Federal Government

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Enterprise Risk Management & Information Technology

Software Asset Management High Risk, High Reward

Security and Privacy Trends 2014

IPT 2015 Sales & Use Tax Symposium Indian Wells, CA. Tax Accrual Data Analytics Dashboards to Minimize Risk

Data analytics and workforce strategies New insights for performance improvement and tax efficiency

Cybersecurity and internal audit. August 15, 2014

Auto insurance telematics The three-minute guide

KNOW YOUR THIRD PARTY

Asset Management in the Cloud How to identify and manage Cloud based assets and services. September 19, 2014

Hedge fund launch considerations Reaching new boundaries. Investment Management

Privacy by Design Setting a new standard for privacy certification

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Developing Your Strategic Plan

Auto Insurance Telematics: Where the Data Meets the Road

Deloitte Analytics. Trusting big data: Perspective on data governance as a customer analytics investment

Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION

ERP Administrative Challenges Brian Jensen

Cyber security Building confidence in your digital future

Cyber intelligence exchange in business environment : a battle for trust and data

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks

VENDOR MANAGEMENT. General Overview

Journey to Cloud 10 Questions

Vendor Management Program Office Onshore or offshore?

Get More Out of Your Risk Assessment. Austin Chapter of the IIA

Analytics for Shared Services The three-minute guide

Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32

Governance, Risk, and Compliance (GRC) White Paper

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

Enabling HR service delivery

Our Service Offering to SASOL

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Balance Sheet Integrity The Utopian Close: Creating a low risk, highly effective financial close

Cyber Security Evolved

FFIEC Cybersecurity Assessment Tool

Essentials to Building a Winning Business Case for Tax Technology

White Paper on Financial Institution Vendor Management

Governance, Risk and Compliance Update & Hot Topics Pittsburgh Chapter IIA December 3, 2012

Mitigating and managing cyber risk: ten issues to consider

Forensic Services. Third Party Risks. March 2013

The Value of Vulnerability Management*

Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June

Managing the Shadow Cloud

Conducting due diligence and managing cybersecurity in medical technology investments

Third Party Approval & Risk Management

Defending against modern cyber threats

RSA enables rapid transformation of Identity and Access Governance processes

Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit

Blending Corporate Governance with. Information Security

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com

Service Organization Control (SOC) Reports

Impact of New Internal Control Frameworks

How To Transform It Risk Management

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

Transcription:

Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

Agenda Internal Audit: Call to continuing focus on value Risk considerations for internal audit Summary Open discussion / Q&A 1

Hot Topics in Internal Audit 2

The evolution of Internal Audit strategist and advisor/facilitator The IA function is moving to higher maturity levels Risk focus Enterprise Risks Governance Risk focus Rotational (Financial and Compliance) Governance Limited to No involvement Role Assurance on compliance with Policies/ Procedures Responsibility IA as Advisor/Facilitator Role Enterprise Risk Advisory Responsibility Consultative Approach External Assessment 3

Optimizing the internal audit function Protect enterprise value Financial, compliance and general IT risks Balance sheet orientation Exception reporting and problem identification Inherent risks and rotational coverage Internal audit s value proposition Enhance enterprise value Operational, organizational and strategic risks Risk Intelligence orientation Proactive reporting and solutions development Focus on emerging risks and trends Optimal balance protect/enhance Independent and objective assurance with value-added advice 4

Internal Audit Maturity & Value Continuum Where is your IA function now, and where do you want to be in the future? Attribute Basic High Value Organization / People Processes / Methodologies Competency Financial Financial and Operational Governance No Involvement Limited Involvement Charter/Role Financial Controls and Compliance with Policy/ Procedures Financial Controls and Operational Effectiveness Risk Focus Financial and Compliance Financial and Operational Methods Reports SOX Controls and Compliance Checklists Minor Financial and Compliance Issues Process and Controls Internal Audit Programs Process and Operational Improvements Financial, Operational and Strategic Internal Audit as Advisor/ Facilitator Business Controls and Risk Advisor Enterprise Risks (Strategic, Operational, Financial, and Regulatory Risk) Risk Intelligence Frameworks Proactive Risk and Trends Analysis and Dynamic Reporting Stakeholder / Technology Style Corporate Police/Reporter Consultative Trusted Advisor Perspective Historic/Reactive Current Proactive/Future Technology Limited Automated Work Papers Data Analysis and Continuous Auditing/Monitoring 5

Shift from assurance provider to strategist and facilitator of risk management Achieving strategic performance in these four areas enables internal audit to serve as more of a strategist attending more to those tasks demanding strategic thinking and less to those that are purely transactional in nature Focus Area Risk Focus Flexibility Effectiveness Efficiency Description IA focuses on enterprise risks strategic, operational, financial, and regulatory and takes a proactive and forward-thinking focus. IA assists the organization in keeping its risk and reward picture in balance by taking a holistic approach to the management of risks across the enterprise IA has the leadership, skills and experience to be proactive to changing business strategies and market conditions IA enhances the organization s governance, risk management, and controls processes IA identifies opportunities in a collaborative and consultative manner before they become costs or issues. This includes timely reporting and forward-thinking and proactive solutions. IA also aligns and/or coordinates with other assessment and compliance related activities. IA leverages use of technology, including data analysis and continuous monitoring techniques 6

Accelerating internal audit Supplementing your internal audit methodology with accelerators that allow you to more efficiently and effectively identify and realize the tangible and intangible benefits from your internal audit activities Accelerating the identification and handling of emerging risks IA Accelerator Examples Use of IA Diagnostics, or specialized audit programs specifically designed to quickly address emerging risks such as vulnerability management, data privacy, COBIT capabilities and maturity, extended enterprise, etc. and help quickly identify issues that may require further attention or consultation Accelerating your response to regulatory, stakeholder, and marketplace drivers Deployment of a risk catalog that allows business units to develop and maintain risk and control profiles for each of their core business systems, including processes, applications, and infrastructure Accelerating the execution of audits and the transfer of knowledge to new team members Leveraging of Internal Audit starter programs for testing specific business and IT processes and systems, supplemented by common scope documents, common risks, etc. Accelerating the use of data analytics for greater efficiencies and effectiveness in audit execution Use of testing tools containing the forms, templates, and scripts needed for common data analytics performed on a business cycle i.e., expense Accelerating project management to better plan, integrate, and manage the project to meet expectations within scope, cost, and time Leveraging project management templates, such as an IA Project Management Dashboard for reporting project information; Onboarding tools to quickly familiarize new team members; Project Wrap-up Checklists for more consistent and complete wrap up of IA projects in line with the IA function s protocols; etc. 7

Risk Considerations for Internal Audit

What is Risk? Risk is the potential for failure (i.e., loss, harm or the suboptimization of gain) to achieve the organization s mission and strategic objectives. Failure is an unacceptable difference between actual and expected performance. Risk may be caused by an event (or series of events) that can adversely affect the achievement of the mission and strategic objectives. Organizations should strive to: protect the value of its existing assets, and create new or future value in order to support its mission and strategic objectives Internal Audit plays a key role in assisting organizations in governance and risk management. 9

Third Party Relationships Risks associated with the Extended Enterprise : Supply chain risks (sourcing, supplier business interruptions) Contract risk and compliance Foreign Corrupt Practices Act risk considerations (e.g. distributors, third-party agents) Data security and privacy 10

Corporate Responsibility / Compliance Increased focus on areas that impact the organization s reputation and brand/image: Corporate governance Environmental, health and safety issues Regulatory requirements (e.g. Conflict Minerals) HR compliance issues 11

Impact of Globalization of Operations With opportunities presented by globalization, attendant risks arise: Global mobility (e.g. expatriate programs, talent management) Customs Import-Export Foreign Corrupt Practices Act (other similar regulations - e.g. UK Anti-Bribery) Compliance with local laws and regulations Data privacy (cross border laws and regulations) 12

Foreign Corrupt Practices Act Considerations for an effective compliance program: Code of conduct and compliance policies and procedures Risk assessments Training and continuing advice Incentives and disciplinary measures Third party due diligence and payments Confidential reporting and internal investigation Continuous improvement: periodic testing and review Mergers and acquisitions: pre-acquisition due diligence and postacquisition integration 13

Business Process Effectiveness and Efficiency With continuing focus on efficiency and effectiveness of operations, internal audit may be asked to review business processes beyond finance and compliance, such as: Post-merger integration Capital expenditure tracking and monitoring (e.g. ROI, project management) Research and development (time-to-market considerations) Expense analysis and cost savings ideas 14

IT Governance As the IIA Professional Standards call for Internal Audit involvement in the assessment of IT Governance, internal auditors are being asked to evaluate the following: Evaluate IT s role in sustaining and extending the organization s strategies and objectives Review performance measures and goals Monitor IT project progress and results 15

Data Privacy The increase in customer and employee concerns over personal information and sensitive data have introduced new risks: Reputational, regulatory and operational risks Understanding the flow of personally identifiable information (PII) from initiation to destruction How is PII acquired How it is used Where is PII stored Who has access to PII How is PII disposed 16

Cyber Security Cyber threats are a relatively new and constantly evolving source of risks, such as: Ability to quickly find and contain compromised devices Lack of capability to identify, contain, analyze, and remediate compromised devices Information provided by sources is often outdated, high level, and not actionable 17

Cloud Computing Internal Audit is being asked to evaluate how businesses purchase, deploy, and support IT services Understand cloud computing strategies employed Determine how the use of cloud services may impact and change IT and business risks Assess vendors and cloud providers 18

Mobile Device Security Enabling mobility presents challenges by increasing data protection, operational, legal and regulatory risks, such as: No concrete regulatory requirements developed for mobile applications Increasing risk and liability associated with breaches No control on the mobile device in the case of bring your own device (BYOD) scenario Heightened awareness and concerns about privacy 19

Business Continuity Management & Disaster Recovery Planning The increased threat of disasters and spiraling cost of business disruptions have forced organizations to reevaluate Business Continuity and Disaster Recovery risks: Inability to respond to any type of unexpected disaster event, putting personnel, facilities, and finances at great risk Ability to remain competitive and even viable in a worst-case disaster scenario Increasing business uncertainty and marketplace volatility Huge dependence on IT for business and increasingly complex IT architecture Complex globalization (global operations) and business expansion Increasing regulatory landscape Supply chain resilience 20

End User Computing (EUC) The use of financial reporting related spreadsheets, report writers and personal databases have introduced new risks: Spreadsheets and other EUCs have proliferated through the environment Regulators, auditors, and management may have a heightened concern about the ability to rely on data from EUCs Errors in EUCs may cause significant issues, including restatements 21

Social Media A number of recent incidents on social networks have exposed businesses to unforeseen risks that have damaged brand equity Loss of Control The voice of the customer is amplified and companies no longer control the message or topic Confidential Information Use of social media sites enables users to circumvent company controls, opening up the potential to violate communication policies and posing security and privacy risks, with potential legal and regulatory ramifications Productivity Loss How to change a potentially major distraction for employees into a means to drive collaboration among co-workers 22

Software Asset Management (SAM) Software purchases typically make up a significant part of a company s capital spending, yet the full impact of the software license agreements and contracts are rarely understood Internal Audit is becoming involved in the execution of SAM operational audits Internal Audit is involved in reviewing the purchase, installation, movement, and disposal of software assets 23

Data Analytics Organizations are starting to employ the power of data analytics to enhance the audit process Internal Audit can provide insights to the business by developing deeper understanding of business risks and controls effectiveness, industry trends, and continuous controls monitoring capabilities Helps Internal Audit to substantiate or quantify conclusions in the absence of Cold, Hard facts Helps Internal Audit to do more with less 24

Summary

Summary IA s role and importance has changed considerably over the past few years Changing regulatory, technological and economic landscape Globalization and the risks of the extended enterprise Risk events and events of corporate wrong-doing Evolving expectations of Audit Committees and Management More than ever, IA is considered integral to a company s control environment and risk management process. IA is constantly at the forefront to provide value-added and relevant analyses of an organization s internal control structure, performance and productivity, governance and management of risks. IA has a great opportunity to continue to enhance its value and be an active player in providing assurance and advisory support to management and the Audit Committee. 26

Questions?

Contacts Cecile Galvez, Director cegalvez@deloitte.com Cell: (312) 731-8029 Traci Mizoguchi, Senior Manager trmizoguchi@deloitte.com Cell: (617) 605-4752 28

This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. Member of Deloitte Touche Tohmatsu Limited