Week Thirteen – Continuous Auditing/CAATs and QA/QC

Slides:



Advertisements
Similar presentations
Presented by: Diana Tai Ivan Chen Ronnie Lee Wilson Wong Chapter 11 DQ 35 CAAT.
Advertisements

Computer Assisted Audit Tools
C6 Databases.
ITAuditing Using GAS & CAATs
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Auditing Computer Systems
The Islamic University of Gaza
Computer Assisted Audit Techniques
4-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Materiality and Risk.
Pertemuan 7-8 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES.
eGovernance Under guidance of Dr. P.V. Kamesam IBM Research Lab New Delhi Ashish Gupta 3 rd Year B.Tech, Computer Science and Engg. IIT Delhi.
The Information Systems Audit Process
Implementation/Acceptance Testing / 1 Implementation and Acceptance Testing Physical Implementation Criteria: 1. Data availability 2. Data reliability.
Software Process and Product Metrics
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
Presentation Overview Background Accessing Retail Data Warehouse Using ACL Accessing ODBC Accounting Package Using ACL Accessing AS400 Using ACL Accessing.
ACL Solutions for Continuous Auditing and Monitoring John Verver CA, CISA, CMC Vice President, Professional Services & Product Strategy ACL Services Ltd.
Patch Management Strategy
Information Technology Audit
How Will Continuous Auditing and XBRL-GL Work Together to Provide Improved Business Value? Nigel J. R. Matthews, BASc, CA ACL Services Ltd.
Auditing Computerized Information Systems
Today’s Lecture application controls audit methodology.
SEC835 Database and Web application security Information Security Architecture.
CBS Data Analysis with CATT Tool – IDEA
Auditing Complex EDP Systems
IT Service Delivery And Support Week Eleven – Auditing Application Control IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Auditing Information Systems (AIS)
ACL Connections Chicago June 2, General Purpose Demonstrate ACL as part of a solution Demonstrate ACL as part of a solution Encourage other uses.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
FACILITATOR Prof. Dr. Mohammad Majid Mahmood Art of Leadership & Motivation HRM – 760 Lecture - 25.
AUDIT IN COMPUTERIZED ENVIRONMENT
1 Topic# 7 – Auditing with Technology Readings, Chapter 10 A – COMPUTERIZED AUDIT TOOLS –Electronic Spreadsheets –Automated Working Papers –Generalized.
University of Minnesota Internal\External Sales “The Internal Sales Review Process” An Overview of What Happens During the Review.
AUDIT SOFTWARE Chapter 16. Generalized Audit Software Off-the-shelf software that provides a means to gain access to and manipulate data maintained on.
Audit Evidence Process
Learning Objectives Understand the concepts of Information systems.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
TITLE Subtitle Using Data Analytics in Audits.
The Premier Test Lab Management Software
Business process management (BPM)
Software Quality Engineering
CIM Modeling for E&U - (Short Version)
Data Architecture World Class Operations - Impact Workshop.
Chapter 7: Computer Assisted Analytical Techniques
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
Auditing Information Technology
Chapter 7: Computer Assisted Analytical Techniques
Software Quality Engineering
TRANSACTION PROCESSING
Business process management (BPM)
Chapter 7: Computer Assisted Analytical Techniques
Auditing & Investigations I
Managing the IT Function
IS4550 Security Policies and Implementation
Week Twelve – QA/QC, Self-assessment and Audit IT Service Providers
Week Thirteen – CAATs & Continuous Auditing
MANAGING DATA RESOURCES
What a non-IT auditor needs to know about IT & IT controls
Types of CAATs Session 3.
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Data Analysis Tools Session 10.
Presentation transcript:

Week Thirteen – Continuous Auditing/CAATs and QA/QC IT Audit Process Prof. Liang Yao Week Thirteen – Continuous Auditing/CAATs and QA/QC IT Audit Process Prof. Liang Yao

What is CAATs? CAATs – “CAATs is the practice of using computers to automate the IT audit processes. CAATs normally includes using basic office productivity software such as spreadsheet, word processors and text editing programs and more advanced software packages involving use statistical analysis and business intelligence tools.”-Wikipedia IT Audit Process Prof. Liang Yao

Why Use CAATs? In absence of input documentation Need to access information/data Audit technology tools facilitate more granular analysis of data and help to determine the accuracy of the information Ability to testing full population – increase audit quality and compliance Improve efficiency and effectiveness of the audit process IT Audit Process Prof. Liang Yao

CAATs Capabilities Access data from different platforms Common data formatting File reorganization (formatting, attributes selecting, etc.) Data selection and query Statistical function (sampling, stratification, etc.) Arithmetical function (re-calculation) IT Audit Process Prof. Liang Yao

CAATs and Data Analytics High volumes of transactions Complex processes Distributed operations Unrelated applications and systems Advantage of Data Analytics via CAATs High level of accuracy Consistency via automation Real-time validation Proactive vs. Reactive Agile Audit Planning IT Audit Process Prof. Liang Yao

Precaution of Using CAATs Risks to consider: Data! (relevant, correct, data source, analysis) Accessing enterprise wide data Integrity of the data Faulty conclusions Selecting the right tools Skillset gaps and talent within IA IT Audit Process Prof. Liang Yao

Sample Data Source for CAATs Potential Data Sources for CAATs: Accounts Receivable Payroll Cash Disbursements Purchasing Sales General Ledger Work in Progress Loss Prevention Asset Management IT Audit Process Prof. Liang Yao

CAATs tool and IT audit Compliance tests for IS general controls Compliance tests for IA application controls Network and OS vulnerability assessments Penetration testing Application security testing and source code security scan IT Audit Process Prof. Liang Yao

CAATs Sample - ACL Definition:  ACL stands for "Audit Control Language". It was developed by ACL Services Ltd. based in Vancouver, British Columbia, Canada. ACL is a widely use CAATs tool. ACL Characters: Relatively easy to learn Ease of data extraction and manipulation Ability to access a wide variety of data files from different platforms Ability to integrate data with different format Ability to define fields and select from standard formats Menu-driven functionality for processing analysis commands Simplified query building and adjustments Logging features IT Audit Process Prof. Liang Yao

Continuous Monitoring and Auditing Definition of continuous monitoring and auditing Implementation CM and CA Leveraging CAATs Things to consider IT Audit Process Prof. Liang Yao

Continuous Monitoring and Auditing Definition: Continuous Monitoring: the processes that management puts in place to ensure that the policies, procedures ad business processes are operating effectively. – GTAG – Continuous Auditing Continuous Auditing: any method used by auditors to perform audit related activities on a more continues basis – GTAG – Continuous Auditing IT Audit Process Prof. Liang Yao

Continuous Monitoring and Auditing Implementation Define and develop audit methodology Risk focused Obtain management support Information sources Data access Deliverables – reports, memo, dashboard, metrics, etc. Impact to the audit planning IT Audit Process Prof. Liang Yao

Continuous Monitoring and Auditing Leveraging CAATs Traditional using of CAATs Team in IS Audits E.g. extract use list or system configurations New approach Leveraging CAATs for forward looking Transition from reactive CAATs to proactive CAATs IT Audit Process Prof. Liang Yao

Continuous Monitoring and Auditing Things to consider: Independent concerns Accuracy and understandable of deliverables e.g. control dashboards CATTs team/Auditors’ understanding of business lines, business process Audit resource impact Develop proficiencies and retain specialties Talent pool Training and education IT Audit Process Prof. Liang Yao