Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit

Similar documents
Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%

Identity and Access Positioning of Paradgimo

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL

Privileged Administra0on Best Prac0ces :: September 1, 2015

BPO. Accerela*ng Revenue Enhancements Through Sales Support Services

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Project Por)olio Management

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

The Evolu*on of Service Management

Bank of America Security by Design. Derrick Barksdale Jason Gillam

FULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g

Informa.on Systems in Organiza.ons

Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv.

Big Data + Big Analytics Transforming the way you do business

Best Prac*ces in Corporate Card Expense Management May 2012

Everything You Need to Know about Cloud BI. Freek Kamst

Online Enrollment Op>ons - Sales Training Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Strategy and Architecture to Establish 'Smart Plants'

Digital Communication Agency

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

Project Management Success on SharePoint

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Driving Working Capital Op1miza1on from AP - rather than Treasury

Capitalize on your carbon management solu4on investment

Payments Cards and Mobile Consul3ng Overview 2013

DTCC Data Quality Survey Industry Report

FTC Data Security Standard

Fixed Scope Offering (FSO) for Oracle SRM

Council Monitoring & Assessment Program Development

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

NETWORK DEVICE SECURITY AUDITING

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.

Advanced Invoice Processing: One Step at a Time. Sam Abadir Solu.on Manager Accoun.ng Percep.ve So7ware

IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

IT Asset Management Best Practices Using RFID. Stephen Schwartz

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Discovering Computers Fundamentals, 2010 Edition. Living in a Digital World

Phone Systems Buyer s Guide

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management

GAME-CHANGING TRENDS IN SUPPLY CHAIN

Business Analysis Center of Excellence The Cornerstone of Business Transformation

Exchange of experience from a SuccessFactors LMS Implementa9on

The Right BI Tool for the Job in a non- SAP Applica9on Environment

Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank

An Econocom Group company. Your partner in the transi4on towards Mobile IT

UAB Cyber Security Ini1a1ve

How Predic+ve Opera+onal Performance Can Transform a Services Organiza+on

Adding Value to Automated Web Scans. Burp Suite and Beyond

IT Change Management Process Training

The Pros and Cons of Organiza2on

Integra(ng Data Analy(cs into a Risk- Based Audit Plan. Presented by: Andrew Simpson, MBA, Chief Operating Officer, CaseWare Analytics

Main Research Gaps in Cyber Security

CiviCRM Implementa/on Case Study

Oracle Solu?ons for Higher Educa?on

Armedia Capabili-es Brief Enterprise Content and Informa1on Management Professionals

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity

Five Factors Driving Businesses to Rethink EDI on IBM i

Complete End to End AP Automation: The benefits for your organization

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

The Real Score of Cloud

Welcome. HITRUST 2014 Conference April 22, 2014 HITRUST. Health Information Trust Alliance

ORION Retail Systems. Orion Digital Integration Inc. Point of Sale Reinvented for a Mobile World

Managed Services. An essen/al set of tools for today's businesses

Presenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant

CS 5150 So(ware Engineering System Architecture: Introduc<on

Agenda 3/7/ ERM Symposium March 14 16, Continuous Controls Monitoring. I. Changes In Corporate Environment

CS 4604: Introduc0on to Database Management Systems

Data Stream Algorithms in Storm and R. Radek Maciaszek

Introduc)on to the IoT- A methodology

Splunk for Networking and SDN

Office of Business and Financial Services. Department Budget Presenta0on

Intro to BI. Mul0- dimensional Analysis

WORKSHOP People Change Management Strategy

Mobile Payments World. Consul4ng Overview 2013

So#ware quality assurance - introduc4on. Dr Ana Magazinius

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS

Step Away from the Waterfall: You Really Can Use Agile on an ERP Project

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

World Around EPiServer Add-Ons

IT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic

Informa*on Management

Developing the Agile Mindset for Organiza7onal Agility. Shannon Ewan Managing

We are pleased to offer the following program to Woodstock Area Educators:

From Big Data to Value

Big Data, Open Data Personal Data? Navigate around the Mine Fields to Avoid Unintended Consequences. Ann Cavoukian, Ph.D.

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology

IMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS

EAI. Op'mizing your integra'on cost. Sunil Kumar Pandey Persistent Systems Ltd. Session: 20188

Developing a Full- Spectrum Security Training Program

How Do You Secure An Environment Without a Perimeter?

Bill Sieglein, Founder CSO Breakfast Club PLATINUM SPONSOR: SOLUTIONARY

Transcription:

Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit Presented to: ISACA and IIA Joint Mee/ng October 10, 2014 By

Outline Introduc.on The Evolving Role of Internal Audit The importance of Data Most Cost Effec.ve and Best prac.ces in Data Provisioning The next logical step - - CCM Most Cost Effec.ve and Best prac.ces in CCM

Rausch Advisory Services LLC. Internal Audit: SAS70/ISO Reviews Compliance Reviews Construc.on Audits Risk Mgt. Sarbanes Oxley (Including Automa.on) Data Analy.cs Con.nuous Controls Monitoring (CCM) PMO/Methodology Establishment and training De- provisioning Automa.on Informa/on Security: Informa.on Security Enterprise- wide Risk Assessment Business Con.nuity Management Vulnerability Assessments Social Engineering Network, Wireless and Web Applica.on Security Reviews Incident Analysis and Response Data Loss Preven.on Audi.ng and Implementa.on Interim Resource Management Security Awareness Training Finance & Accoun/ng: Close Accelera.on and Automa.on Budge.ng/FP&A - - System selec.on, Custom Solu.ons and applica.ons, and interim resources) Senior Staff Augmenta.on/Interim Execu.ves Custom Accoun.ng Applica.on development (in Excel, Access,.NET, SQL Server, Visual Basic and other technologies) Business Performance Improvement & Systems: PIVOT ( Profitability Improvement Via Op.mized Transac.ons ) Process Improvement, Quality, and Con.nuous Improvement Business Intelligence (Including KPI Metrics and linkage to strategy and incen.ve programs) Project Management Resources Custom Solu.ons in Time Capture, project tracking, Capex tracking Post Merger Integra.on (System Conversion and Realiza.on of Cost Synergies) Strategy Workshops and retreats Requirements Development and Systems Selec.ons Master Data Management and Centralized User ID Management Solu.ons 3

Evolving Role of Internal Audit Historic Mainstream CuOng- Edge Focus Audit en..es based on rota.onal plan Priori.ze audit en..es based on risk Focus on strategic, business, and process risk Perspec.ve Historic Historic Future Style Corporate police Father knows best Consultant and advisor Mandate Compliance with policies and procedures Assurance on financial control; compliance Business assurance Risk Focus Financial Financial plus Enterprise risks Tool Kit Compliance work programs Audit work programs for key processes; controls Risk frameworks, self- assessments Technology None Automated work papers Automated tes.ng and con.nuous monitoring Source: Deloice & Touche 4

Data Analy/cs is not just for IT Types 5

Where is the Data we need? Vast majority is in a database ERP systems GL s Other applica.ons Flat files 3rd party providers spreadsheets 6

What tool Can access all of these? SQL Server ETL / Data Provisioning Powerful Analy.cs Built in web server/ Repor.ng tool Job scheduler Email Alerts Powerful Flexible Scalable Easy to use Cost Effec.ve (Free) SQL Server Express with Advanced Services 7

SQL Server for Data Provisioning SSIS: Powerful, but not usually needed unless doing sophis.cated transforma.ons Linked Server: Virtual reference for use in Queries (think of it as a pointer to the data) Obtain Read Only Permissions to Source Run Simple Script to create linked Server Run queries to access data 8

SSIS Graphical Design 9

Crea/ng a Linked Server EXEC sp_addlinkedserver @server = '{Linked Server Name}',@srvproduct = '{System DSN Name}',@provider = 'MSDASQL',@datasrc = '{System DSN Name}' EXEC sp_addlinkedsrvlogin @rmtsrvname = '{Linked Server Name}',@useself = 'False',@locallogin = NULL,@rmtuser = '{Oracle User Name}',@rmtpassword = '{Oracle User Password}' 10

Querying with a Linked Server select * from [LinkedServerName]..SYSADM.PS_PAY_EARNINGS where PAY_END_DT >= DATEADD(dd, - 30, GETDATE()); GO 11

Reading in Flat Files - - KNVV Customer Master_ main declare @FileOK INT declare @sql nvarchar(max); exec xp_fileexist '\\SQLPRD08\S$\SAP_Source_Files\Pending_Uploads \KNVV.txt',@FileOK OUTPUT IF (@FileOK = 1) Begin - - Clear old data from prior day: if object_id('sarbox_automation.dbo.knvv') is not null drop table SARBOX_AUTOMATION.dbo.KNVV - - repull master table: set @sql = N'SELECT * into SARBOX_AUTOMATION.dbo.KNVV FROM OPENROWSET(''Microsoft.ACE.OLEDB.12.0'', ''Text; HDR=Yes; Database=\\SQLPRD08\S$\SAP_Source_Files \Pending_Uploads;FMT=Delimited( )'', ''SELECT * FROM KNVV.txt'')'; execute sp_executesql @sql; End go 12

Reading in Spreadsheet Data use CCM truncate table EarnCodesToInclude5_1 BULK INSERT dbo.earncodestoinclude5_1 FROM '\\eu-securefile.eu.emory.edu\finadmin\iad\iad- Share\CCMSAUDIT\Uploads\Earnings Codes\5.1 EARNINGS CODES TO INCLUDE.txt' WITH ( FIRSTROW = 2, FIELDTERMINATOR = '\t', ROWTERMINATOR = '\n' ); Go 13

Data Provisioning Model Centralized Model Self Service Model Auditor Data IT or Power User 14

New COSO Emphasis on CCM/Analy/cs Principle 16: Ongoing Evalua/ons: Technology offers an opportunity to use computerized monitoring, which has a very high standard of objec.vity (once programmed and tested) and allows for efficient review of large volumes of data at a low cost. Advances in automated ac.vi.es have made con.nuous monitoring computer applica.ons available, and these should be considered when selec.ng ongoing evalua.ons.

What is CCM? The use of a combina/on of monitoring sofware and defined business rules to detect, prevent, and monitor the opera/ng effec/veness of internal controls. Key aiributes of CCM/Best of Breed: 100% of transac.ons reviewed, not just a sample Tested in near real.me as they occur Fully automated Robust repor.ng capabili.es Excep.ons history is maintained for meta analysis Tracking and resolu.on is built in Passive alerts and no.fica.ons are built in

Evolving Audit Departments TRADITIONAL)AUDIT) Reac%ve' CCM) Proac%ve' Costly' Cost'Effec%ve' Date'Informa%on' Less'than'100%'of' Transac%ons' Real=Time' Comprehensive'='100%''of' Transac%ons'

Components of CCM Source Systems GL Reports & Dashboards AP AR Sta.s.cal and Analy.cal Rou.nes Con.nuously Performed on Data Excep.ons Iden.fied Repor.ng Tool Excep.on Management Interface HR Other Replica.on Or ETL Replicated Data For Analysis Email Alerts Invoice A123 from Acme Solu.ons in the amount of $543.21 may be a duplicate of invoice 123-1 in the amount of $543.21Dated 4-14- 2010 from Acme Inc. 18 18

Examples of CCM Algorithms Alert when SOD is violated (vs periodic tes.ng) Automated T&E/P- Card fraud detec.on (vs cost of human reviewers) Master File Tampering (Payables, Payroll, etc.) Prevent Revenue Leakage Access Cer.fica.ons/Central User ID Mgt 19

Daily No/fica/on of Process Status

Excep/on No/fica/ons Via Email

Repor/ng

Edit Mode

Management Repor/ng

Use Itera/ve Approach Iden.fy high risk areas Iden.fy processes that touch these areas Iden.fy systems involved in these processes Iden.fy transac.onal records and associated tables involved in those processes Iden.fy how a transac.on failure would manifest Develop Analy.cal algorithms to recognize 25

Download the PIVOT White Paper hip://www.rauschadvisory.com 26

Careers in Data Analy/cs Big Data is transforming businesses Technology is capturing data at speeds and volumes never even imaginable Accountants, Auditors and CPAs are well- posi.oned to take a leadership role in helping to use Big Data to help the organiza.on achieve business objec.ves Big Data has created a huge demand for professionals with analy.cal exper.se You can have a big impact on your organiza.on and your career

QUESTIONS CONTACT INFORMATION Wylie Roberts, C.P.A.: 404-218- 6892 wroberts@rauschadvisory.com Michael Lisenby: 404-404- 705-6768 mlisenby@rauschadvisory.com hcp://www.rauschadvisory.com