Conference Workshop Continuous Auditing: An Approach for Today Univ. of Salford, 5 December 20155 December 2015 Presented by Anton Bouwer www.acl.com.

Slides:



Advertisements
Similar presentations
AUDITING : AN OVERVIEW. Auditing defined It is a critical and systematic examination or review of accounting reports, documents, records, procedures and.
Advertisements

ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Towards a simpler and more efficient BR June 19, 2007 ICES-III Montréal (QC)
Chapter 1 Business Driven Technology
1 The Antecedents of Internal Auditors Adoption of Continuous Auditing Technology: Exploring UTAUT in an Organizational Context Ray Henrickson CAIT, CACISA.
Computer Assisted and Audit Tools and Techniques Drs. Haryono, Ak. M.Com & Dimas M. Widiantoro, SE., S.Kom., M.Sc. Pics from :
Auditors Have a Great Responsibility
Auditing Concepts.
1 NYU Benefits Defined Benefit Plan Administration Efficiency Solution for 2010 and beyond April 30, 2009.
Practical Issues of Implementing Continuous Assurance Systems Presented by John Verver CA, CISA, CMC to the 5 th Continuous Assurance Symposium November.
Monitoring Security With Standard SAP Tools Session Code 805 Sandi McKinney.
CAATTs for Data Extraction and Analysis
Continuous Auditing Technology Adoption in Leading Internal Audit Organizations Miklos A. Vasarhelyi Siripan Kuenkaikaew.
Understanding the Client and General Planning
Pertemuan 7-8 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Copyright © 2007 Advantica Inc. (USA Only) and Advantica Ltd. (Outside USA). All rights reserved by the respective owner. Benefits of an Integrated Compliance.
5-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 Audit Planning.
AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES.
Advanced Accounting Information Systems
Cash and Financial Investments. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Internal Control Over --Cash Receipts.
Presentation Overview Background Accessing Retail Data Warehouse Using ACL Accessing ODBC Accounting Package Using ACL Accessing AS400 Using ACL Accessing.
Auditing & Assurance Services, 6e
Welcome ISO9001:2000 Foundation Workshop.
Today’s Lecture application controls audit methodology.
Solution Overview for NIPDEC- CDAP July 15, 2005.
The Islamic University of Gaza
SAP GRC access ULg Pierre Blauwart – Project Manager HERUG BvD-it Confidential.
AUDITS What you should know - a campus perspective. Franz Lozano Director/Budget Officer (former Internal Auditor) San Francisco State University Academic.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
THE STUDY & EVALUATION OF INTERNAL CONTROL. Definition Professional Standards Data-Oriented  Small, simple systems  Weaker controls System-Oriented.
The Audit as a Management Tool Vermont State Auditor’s Office – April 2009.
Automated Statement of Accounts Project and Operational Guideline March 2011.
External Auditing in Difficult Settings John F S Muwanga FCCA, CPA(U) Auditor General, Uganda Regional Workshop Towards Auditing Effectiveness May
Continuous Auditing at Unibanco Washington Lopes
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
Centrix Solutions Inc. Western States Users Group Centrix Solutions Inc. ACH Risk.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 8: IT Auditing & Assurance, 2e, Hall & Singleton CAATTs for Data Extraction and Analysis.
Today’s Lecture Covers
BTS330: Business Requirements Analysis using OO Lecture 6: Systems.
AML Compliance Findings & Observations Wyn Clark U.S. Treasury.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Chapter 8 Auditing in an E-commerce Environment
A Subsidiary of Utilizing Technology in Fund Development Efforts.
Statement of Auditing Standard No. 94 The Effect of Information Technology on the Auditor’s Consideration of Internal Control in a Financial Statement.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Internal Controls For Municipalities Vermont State Auditor’s Office – August 2008.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Perrigo Global Change Control Case
MS Invoice E-Invoice Solution Overview March 2016.
Accounting systems design & evaluation 9434SB 18 March 2002.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Illinois Office of the Comptroller Financial Training Workshop 2016.
Accounting Information Systems: An Overview
Auditing Concepts.
IMPLEMENTATION STRUCTURE & EXPECTED OUTCOMES FOR RECOMMENDATION 16, 17, 18, 19 & 20 Oladele Adeoye.
Regular Payments First and Subsequent Payments
Auditing Information Technology
Systems Analysis and Design
Defining Internal Control
Principles of Auditing
Our New Integrated Business Management System [“IMS”]
Proof of concept 29 September 2010
Internal controls 01-Nov-2017.
Agenda Context of the BR Redesign Redesign Objectives Redesign changes
Presented by Anton Bouwer
(System Development Life Cycle)
Presentation transcript:

Conference Workshop Continuous Auditing: An Approach for Today Univ. of Salford, 5 December December 2015 Presented by Anton Bouwer

AGENDA  The “Phrase”  The “Distinction”  Approach for Today’s Requirements  Summary

Definition of Continuous Auditing  CONTINUOUS  Never ends  When cycle ends, next starts  AUDITING.  Access information  Know business  Verify info  Express/Report

Definition of Continuous Auditing  Can CA be possible without human interface?  Are we disrespecting the auditor?  Square peg, round hole?  Diluting the concept “audit”?  Legal issues? Ignore at own peril!

The Distinction MONITOR/REPORT  Monitoring & Reporting checks every transaction  One record at a time  Type = Control  Implemented FOR management AUDIT  Auditing is looking for & verifying exceptions  Independently  Comparing each record against expected norms  Audit efficiency: more than 1 record at a time  Type = Audit compliance or substantive

What is the PROBLEM? The only way to get CA to the masses (auditors):  Build bridge from today’s audit program to the SciFi CA system. Don’t start in 2010, start in  Ask auditors what they want & verify result (Majority rules). Remember budget!  Messing with age old principles  Lets learn from the E-Bubble & Y2K & Euro conversion!!! How big a part did we play in this? How much did we cost commerce?

Approach to CA Development  NOT Complex  NOT Technical  Audit approach & result (NOT contol)  Obtain top level buy-in & top level sponsor  One application at a time  Get specialist assistance

 Setting up the project  Perform detailed risk analysis  Link to risk measurement  Anticipate exceptions & develop specifications  Plan access to data  Plan the audit frequency and audit response  Setting up the project  Perform detailed risk analysis  Link to risk measurement  Anticipate exceptions & develop specifications  Plan access to data  Plan the audit frequency and audit response Implementing Continuous Auditing

 Develop and implement the continuous auditing application  Test & Acceptance  Maintenance and redesign  Post Implementation Review  Regular auditing of the continuous auditing application  Develop and implement the continuous auditing application  Test & Acceptance  Maintenance and redesign  Post Implementation Review  Regular auditing of the continuous auditing application Implementing Continuous Auditing

 What to measure?  Exceptions  Trends on statistics & ratios  Difficult to get data access  Auto update of audit database  Top-level sponsor  Slow death  What to measure?  Exceptions  Trends on statistics & ratios  Difficult to get data access  Auto update of audit database  Top-level sponsor  Slow death Pitfalls

 Audit independence Pitfalls DODONT Test compliance Substantiate accuracy Substantiate completeness Report on trends Detect Control Monitor Prevent

Case Study Background  Banking & finance entity  Strategic risk analysis identified reputational risk as very high due to impact  Management expect auditor to review risk on more regular basis

Case Study Solution  Measure (audit) risk  Report on risk measurement  Automate process  Schedule future audits and reporting frequency

Risk Measurement RiskControlAudit Procedure Type = Reputation Abuse of customer funds trough internal theft or fraud Staff are not allowed to transfer customer funds to their own accounts. Such transfers in excess of $ 1000 must be done by another employee. Access data containing information on: User ID Employee account To account From account Identify control exceptions

Develop Specifications ObjectiveMethodData Search transactions to find: Transfer of funds To employee account Captured by employee who owns account Amount bigger than $1000 Analyse each transaction and identify instances where the TO account equals the account number of the employee who captured the transaction Info needed can be found in two files Employee master Transaction master Both files contain the field EmpID which is the employee’s unique ID number in the company.

Technical Specifications AnalysisNotificationReporting 1. Access both files 2. Join files on EmpID and (Emp_Accnt to To_Accnt) 3. Join type MATCHED 4. Extract matches 5. Compute statistics on exceptions 6. Automate analysis 7. Schedule automated excecution 1. Determine if there are exceptions 2. NOTIFY auditor of exceptions 3. Attach exceptions 4. Automate notification 1. Extract statistical data to permanent file 2. Present file with results as trend analysis to management 3. Automate reporting

Efficient Data Access

Develop Application

Schedule Application

Real-time Notification

Audit Verification

Continuous Reporting

Continuous Audit Cycle Automated data download Automated scheduling Report Automated audit Audit Verification

Summary  Start at Risk Analysis  Do not forget 80:20  Prove benefits (£££)  Internal audit implement, external audit share benefits (Consulting opportunities - £££)  Wonderful trends!!!  Technical barriers are smallest problem  Risk can not be measured, managed?  Start at Risk Analysis  Do not forget 80:20  Prove benefits (£££)  Internal audit implement, external audit share benefits (Consulting opportunities - £££)  Wonderful trends!!!  Technical barriers are smallest problem  Risk can not be measured, managed?

Thank You