© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Continuous Assurance Model.

Slides:



Advertisements
Similar presentations
Technology Applications in the Age of Integrity Integrity Forum 2006 Tony Murphy Vice President, Worldwide Sales ACL Services Ltd.
Advertisements

Anatomy of a Deal Paladion Baskar Natarajan, BCS Sales Specialist, HP Arghya Sinha, Sales Lead, Precision Infomatics Rajeev Hirennavar, Solution Architect,
Sodexo.com Group Internal Audit. page 2 helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Sarbanes-Oxley Compliance Process Automation
The TRUTH About SOX, Auditors & Oracle Applimation is the leading provider of Application Lifecycle Management solutions.
Forensic and Investigative Accounting
Global E-Business: How Businesses Use Information Systems
IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESS
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Anywhere Defect.
Best Practices for User Access Controls and Segregation of Duties Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.
Role of the IAAM Investment Strategy Team Investment Strategist Process Conduct Capital Markets Research and Analysis Identify Asset Classes Develop Return,
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Information Technology Audit
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Automatically control.
1 ©2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice ©2010 Hewlett-Packard Development.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. PCI Compliance & Technology.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Fresno County Employees’ Retirement Association Presentation to the Board of Retirement Yolanda Diaz, Vice President 3 December 2008.
ISMMMO, Antalya April Internal Audit, Best Practices Özlem Aykaç, CIA,CCSA CAE Coca-Cola İçecek.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Global Supplier Diversity.
©2011 HP Confidential1 ©2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice ©2011 Hewlett-Packard.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
U.S. Qualified Supplies 2.0 Partner Program
Key Performance Ideas Confidentialwww.keyperformanceideas.com Hyperion Planning, FDMEE, and HFM with eBusiness for Improved Operational Performance Visibility.
The Chicken or the Egg: A study of Risk Management and Strategic Planning Presented by Raven Henderson Raven Lane, LLC.
Overview:  Different controls in an organization  Relationship between IT controls & financial controls  The Mega Process Leads  Application of COBIT.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 10:00-11:00 AM Track.
IIA_Tampa_ Beth Breier, City of Tallahassee1 IT Auditing in the Small Audit Shop Beth Breier, CPA, CISA City of Tallahassee
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Access Control Personal.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. XP Appendix.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Fleet Service Responder.
Put your company logo here Confidential Data Upgrade from 8.x to 9.0.
Marketing Information Technology in Emerging Markets: Hewlett-Packard in Latin America.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential Level.
COPYRIGHT © 2008, BUSINESS OBJECTS S.A. GROWING AN ON-DEMAND BUSINESS, SIIA EUROPE 08 Mani Gill, VP of OnDemand.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Begin your journey to.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Big Data Directions Greg.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. FY13 Software IT Performance.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Continuous Monitoring and Gaining External Audit Reliance.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Getting to Blue Carpet.
HP Confidential, © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Recruitment.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
Information Security What every CFO needs to consider Joe Fracchia, CPA, CISA November 22, 2013.
Auditors’ Dilemma – reporting requirements on Internal Financial Controls under the Companies Act 2013 and Clause 49 of the Listing agreement V. Venkataramanan.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Chapter 1 Overview of the FI Module
From Data Analysis to Data Mining
Internal and external control in an automated environment
Corporate Overview 2017.
Global E-Business: How Businesses Use Information Systems
Information Technology Controls
Relationship Marketing and Customer Relationship Management (CRM)
ELEMENTARY BUSINESS PROCESS MODELING :
HP Networking OpenFlow in Action
Global E-Business: How Businesses Use Information Systems
2017 Administration and Finance Conference
Sarbanes-Oxley Act (404) An IT Viewpoint
An IT Viewpoint Darin Kreimeyer, Senior Manager Newel Linford, Manager
Internal controls Project support overview.
Information Technology Auditing
KEY INITIATIVE Internal Control and Technical Accounting
Presentation transcript:

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Continuous Assurance Model Brad Ames, CPA, CISA, CRMA Stephen Kozlowski, CPA November 9, 2013

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 2 Agenda Continuous Assurance Model Ongoing Risk Assessments Ongoing Control Assessments Integration with 3 Lines of Defense Illustrations Automated Application Controls Employee Expenses Manual Journal Entries Questions & Answers

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 3 Continuous Assurance Continuous Auditing by Internal Audit Ongoing Risk Assessment Ongoing Control Assessment Audit Testing of Continuous Monitoring Performed by Management Continuous Assurance Model

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 4 Continuous Auditing Ongoing Risk Assessment Identify and assess levels of risk to the achievement of business objectives. Considers a combination of financial and unstructured data Analyzing trends Correlating outliers Highlighting potential exposures

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 5 Continuous Auditing: Ongoing Control Assessment Assurance related to control objectives Considers the interrelationship of IT and manual control mix Automated controls are designed in the application IT general controls across the entity Manual business process controls Optimized by monitoring change to a baseline

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 6 Business Process Control Objectives Automated (Application) Controls Changes Security Incidents Outliers and Transactions IT General Controls: Database Operating System Network Define Control Objectives Authorization Completeness Accuracy Determine Key Controls Evaluate Baseline Condition of Controls (Still Active and Functioning) and Measure for Subsequent Changes Ongoing Control Assessments Leverage Interdependent Controls

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 7 CA Relationships to Third Line of Defense 3 rd line of Defense Assurance 2 nd Line of Defense Risk Management IT Operations, Business Applications, and Processes Changes, Security, Incidents, Outliers, Transactions and Unstructured Data Continuous Monitoring Continuous Auditing Continuous Assurance: Results of Continuous Monitoring and Continuous Auditing Process 1 st Line of Defense Operational Management Audit Testing of Continuous Monitoring

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 8 3 rd line of Defense Assurance 2 nd Line of Defense Risk Manageme nt IT Operations, Business Applications, and Processes Changes, Security, Incidents, Outliers, Transactions and Unstructured Data Optimize Continuous Auditing Continuous Assurance Results of Continuous Monitoring and Continuous Auditing Process 1 st Line of Defense Operationa l Manageme nt Audit Testing of Continuous Monitoring Transition Continuous Audit Techniques Continuous Monitoring Transition Continuous Audit Techniques to Second Line of Defense

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 9 Ongoing Control Assessment Illustration Application Controls Benchmark Report

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 10 Ongoing Control Assessment: Optimize by Benchmarking Automated Controls

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 11 Ongoing Risk Assessment: Gain a Better Perspective of Employee Expenses by Matching Card Service Reports

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 12 Ongoing Risk Assessment : Manual Journal Entries Cluster AnalysisGrid Analysis

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 13 Ongoing Risk Assessment: Manual Journal Entries Cluster Analysis

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 14 Dashboards: - LHJE - Fixed Assets - Contra Financial Solutions team, PPS Finance Business strategy Channel and Contra Practice area Finance and Compliance (SOX) team SAP KPI Tool SAS Server Automation of datasets FlashPRO Trident Aspen/Infominer Eclipse EDW VCI (Credit Inf.) HR data Vista/JDEdwards AssureNet/R.Net Emp Exp Mgt DSAS Database ACL AX Server Automated CA/CM solutions Special Pricing GL Contra Fixed Assets Channel CA/CM Application Architecture Wave 1 Wave 2 Audit Data Standards Major Source Data feeds

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP confidential. 15 Audit Data Standards

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Thank you Brad Ames Stephen Kozlowski