Soumettre la recherche
Mettre en ligne
Acfe williamsburg 2013 jmk
•
0 j'aime
•
556 vues
Jim Kaplan CIA CFE
Suivre
Presentation on the impact of technology on fraud detection and professional standards
Lire moins
Lire la suite
Technologie
Business
Signaler
Partager
Signaler
Partager
1 sur 19
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Technology ahia 2012 jmk
Technology ahia 2012 jmk
Jim Kaplan CIA CFE
It12015
It12015
Jim Kaplan CIA CFE
Connections 2013 change your thinking - integrating analytics into the audit ...
Connections 2013 change your thinking - integrating analytics into the audit ...
Jim Kaplan CIA CFE
20141203 akjk
20141203 akjk
Jim Kaplan CIA CFE
It52015 slides
It52015 slides
Jim Kaplan CIA CFE
It32015 slides
It32015 slides
Jim Kaplan CIA CFE
It42015 slides
It42015 slides
Jim Kaplan CIA CFE
It22015 slides
It22015 slides
Jim Kaplan CIA CFE
Recommandé
Technology ahia 2012 jmk
Technology ahia 2012 jmk
Jim Kaplan CIA CFE
It12015
It12015
Jim Kaplan CIA CFE
Connections 2013 change your thinking - integrating analytics into the audit ...
Connections 2013 change your thinking - integrating analytics into the audit ...
Jim Kaplan CIA CFE
20141203 akjk
20141203 akjk
Jim Kaplan CIA CFE
It52015 slides
It52015 slides
Jim Kaplan CIA CFE
It32015 slides
It32015 slides
Jim Kaplan CIA CFE
It42015 slides
It42015 slides
Jim Kaplan CIA CFE
It22015 slides
It22015 slides
Jim Kaplan CIA CFE
Lexcomply - Compliance Management Solutions
Lexcomply - Compliance Management Solutions
LexComply
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Jim Kaplan CIA CFE
2013 audit net guide to audit planning
2013 audit net guide to audit planning
Jim Kaplan CIA CFE
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Jim Kaplan CIA CFE
20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2
Jim Kaplan CIA CFE
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Jim Kaplan CIA CFE
ITAM Best Practices - Knowledge14
ITAM Best Practices - Knowledge14
Martin Thompson
IT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in Healthcare
CA Technologies
Internal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & Culture
Jim Kaplan CIA CFE
Iso 22301 la training
Iso 22301 la training
InfosecTrain
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
EnergySec
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
shira koper
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
Information Services Group (ISG)
Benefits of Software Asset Management
Benefits of Software Asset Management
Iskandar Ahmat
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and Downtime
Precisely
SOC 2 and You
SOC 2 and You
Schellman & Company
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
Martin Thompson
Managed Services Presentation
Managed Services Presentation
Scott Gombar
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
Enterprise Management Associates
SOC 2: Build Trust and Confidence
SOC 2: Build Trust and Confidence
Schellman & Company
Thinking out of the toolbox full deck
Thinking out of the toolbox full deck
Susanna Harper
Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
Contenu connexe
Tendances
Lexcomply - Compliance Management Solutions
Lexcomply - Compliance Management Solutions
LexComply
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Jim Kaplan CIA CFE
2013 audit net guide to audit planning
2013 audit net guide to audit planning
Jim Kaplan CIA CFE
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Jim Kaplan CIA CFE
20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2
Jim Kaplan CIA CFE
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Jim Kaplan CIA CFE
ITAM Best Practices - Knowledge14
ITAM Best Practices - Knowledge14
Martin Thompson
IT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in Healthcare
CA Technologies
Internal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & Culture
Jim Kaplan CIA CFE
Iso 22301 la training
Iso 22301 la training
InfosecTrain
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
EnergySec
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
shira koper
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
Information Services Group (ISG)
Benefits of Software Asset Management
Benefits of Software Asset Management
Iskandar Ahmat
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and Downtime
Precisely
SOC 2 and You
SOC 2 and You
Schellman & Company
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
Martin Thompson
Managed Services Presentation
Managed Services Presentation
Scott Gombar
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
Enterprise Management Associates
SOC 2: Build Trust and Confidence
SOC 2: Build Trust and Confidence
Schellman & Company
Tendances
(20)
Lexcomply - Compliance Management Solutions
Lexcomply - Compliance Management Solutions
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
2013 audit net guide to audit planning
2013 audit net guide to audit planning
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
ITAM Best Practices - Knowledge14
ITAM Best Practices - Knowledge14
IT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in Healthcare
Internal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & Culture
Iso 22301 la training
Iso 22301 la training
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
Benefits of Software Asset Management
Benefits of Software Asset Management
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and Downtime
SOC 2 and You
SOC 2 and You
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
Managed Services Presentation
Managed Services Presentation
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
SOC 2: Build Trust and Confidence
SOC 2: Build Trust and Confidence
Similaire à Acfe williamsburg 2013 jmk
Thinking out of the toolbox full deck
Thinking out of the toolbox full deck
Susanna Harper
Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
Scott Mongeau
Project quality management
Project quality management
MweeneMweemba1
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET Journal
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
CompTIA
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
CompTIA
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Clouditalia Telecomunicazioni
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
CompTIA
A Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception Technology
Enterprise Management Associates
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
CompTIA
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
Les technologies disruptives de demain | une étude de KPMG
Les technologies disruptives de demain | une étude de KPMG
OpenYnnov
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
SolarWinds
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
DImension Data
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
Visal Thach
Similaire à Acfe williamsburg 2013 jmk
(20)
Thinking out of the toolbox full deck
Thinking out of the toolbox full deck
Aalto cyber-10.4.18
Aalto cyber-10.4.18
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
Project quality management
Project quality management
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
A Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception Technology
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
Les technologies disruptives de demain | une étude de KPMG
Les technologies disruptives de demain | une étude de KPMG
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
Plus de Jim Kaplan CIA CFE
Enhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
Jim Kaplan CIA CFE
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
Jim Kaplan CIA CFE
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Jim Kaplan CIA CFE
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
Jim Kaplan CIA CFE
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
Jim Kaplan CIA CFE
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
Jim Kaplan CIA CFE
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
Jim Kaplan CIA CFE
Tracking down outliers
Tracking down outliers
Jim Kaplan CIA CFE
CyberSecurity Update Slides
CyberSecurity Update Slides
Jim Kaplan CIA CFE
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Jim Kaplan CIA CFE
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
Jim Kaplan CIA CFE
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
Jim Kaplan CIA CFE
Focused agile audit planning using analytics
Focused agile audit planning using analytics
Jim Kaplan CIA CFE
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
Jim Kaplan CIA CFE
Ethics and the Internal Auditor
Ethics and the Internal Auditor
Jim Kaplan CIA CFE
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
Jim Kaplan CIA CFE
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
Jim Kaplan CIA CFE
GDPR Series Session 4
GDPR Series Session 4
Jim Kaplan CIA CFE
Cybersecurity Slides
Cybersecurity Slides
Jim Kaplan CIA CFE
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
Jim Kaplan CIA CFE
Plus de Jim Kaplan CIA CFE
(20)
Enhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
Tracking down outliers
Tracking down outliers
CyberSecurity Update Slides
CyberSecurity Update Slides
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
Focused agile audit planning using analytics
Focused agile audit planning using analytics
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
Ethics and the Internal Auditor
Ethics and the Internal Auditor
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
GDPR Series Session 4
GDPR Series Session 4
Cybersecurity Slides
Cybersecurity Slides
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
Dernier
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Roshan Dwivedi
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Dernier
(20)
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Acfe williamsburg 2013 jmk
1.
7/12/2013 1 THE IMPACT OF
TECHNOLOGY ON STANDARDS AND DETECTING, PREVENTING AND INVESTIGATING FRAUD JIM KAPLAN CIA CFE PRESIDENT AND FOUNDER AUDITNET® A Changing Landscape for Professionals 1© AuditNet® 2013 Agenda Introduction Technology Then and Now Standard Changes and Technology Evolution of Professional Networking Latest Technology Tools for Fraud Auditors Trends and the Future of Audit Technology for Detecting and Investigating Fraud 2 © AuditNet® 2013
2.
7/12/2013 2 Then and Now 3 ©
AuditNet® 2013 Auditors and Technology Early Adopters Innovators (into the new from Latin Interested in new methods & techniques Risk takers Forward thinking Gen X & Y Laggards Wait and see Cautious Hangs back Last group to try or adopt a new product Dislike change 4 © AuditNet® 2013
3.
7/12/2013 3 Standards Evolution 5 1954
to the mid-1960s, the auditing profession was still auditing around the computer – Why? 1968, the American Institute of Certified Public Accountants (AICPA) had the Big Eight (now the Big Four) accounting firms participate in the development of EDP auditing. December 1974 SAP 3 The Effects of EDP on the Auditor's Study and Evaluation of Internal Control 1977 Electronic Data Processing Auditors Association (EDPAA) published Control Objectives July 1984 SAS 48 The Effects of Computer Processing on the Audit of Financial Statements June 2001 SAS 94, The Effect of Information Technology on the Auditor’s Consideration of Internal Control in a Financial Statement Audit. © AuditNet® 2013 Standards and Regulatory Evolution 6 SEC, Final Rule: Management’s Reports on Internal Control Over Financial Reporting and Certification of Disclosure in Exchange Act Periodic Reports PCAOB Auditing Standard No. 2, An Audit of Internal Control Over Financial Reporting Performed In Conjunction With an Audit of Financial Statements SAS 99, Consideration of Fraud in a Financial Statement Audit SAS 99 Exhibit, Management Antifraud Programs and Controls Committee of Sponsoring Organizations of the Treadway Commission, Internal Control—Integrated Framework United States Sentencing Commission, Guidelines Manual 2009 Internal Auditing and Fraud and GTAG 13: Fraud Prevention and Detection in an Automated World © AuditNet® 2013
4.
7/12/2013 4 Computers, Auditors and
CAATTs The Evolution of CAATTs 80’s Around Through With EDP/IT Auditors Mainframe Audit Software 90’s Data extraction and analysis IT and non IT Auditors Windows The Millenium Software for all phases (planning, fieldwork, GRC) Cloud computing 7 © AuditNet® 2013 Impact of Technology Computers and networks provide most of the information needed for auditing Computer crime is increasing as fraudsters see value in information as well as financial assets Auditors and fraud examiners must use the computer as an auditing tool Auditors and fraud examiners must also use the computer for audit administration 8 © AuditNet® 2013
5.
7/12/2013 5 Impact of Technology
What I did in my youth is hundreds of times easier today. Technology breeds crime 9 © AuditNet® 2013 Impact of New Technology on the Profession Professional Standards for Certified Fraud Examiners IIA Professional Standards Fraud and Technology 10 © AuditNet® 2013
6.
7/12/2013 6 Certifications for Fraud
Auditors 11 Initials Description Organization CITP Certified Information Technology Professional (CITP AICPA CFE Certified Fraud Examiner ACFE CFF Certified in Financial Forensics AICPA CAMS Certified Anti-Money Laundering Specialist ACALS CFFA Certified Forensic Financial Analyst (NACVA) CIFI Certified Insurance Fraud Investigator IASIU CBCO Certified Bank Compliance Officer BAI CISA Certified Information Systems Auditor ISACA CIA Certified Internal Auditors CIA CPA Certified Public Accountant AICPA © AuditNet® 2013 New Technologies and their Impact Mobile computing The Cloud or Internet based services SaaS (application based) PaaS (end to end SDLC) IaaS (servers, storage, network) 12 © AuditNet® 2013
7.
7/12/2013 7 Social Media Social
Media Defined The good the bad and the ugly What is the primary risk? 13 © AuditNet® 2013 Technology as an Enabler There is a wide array of specialized tools to support and enhance the entire spectrum of internal audit processes … for the most part (auditors) are not taking advantage of them Not surprisingly, survey participants predict that technology will affect internal audit roles and responsibilities more than any other business trend. PwC 2010 Study on the State of the internal audit profession 14 © AuditNet® 2013
8.
7/12/2013 8 Audit Software 15 © AuditNet®
2013 Categories of Audit Software Technology Automated Issues Tracking Electronic Work Papers Risk Assessment Continuous Controls Monitoring Anti Fraud Software GRC Audit Management Software Audit Resource Scheduling Data Analytics 16 © AuditNet® 2013
9.
7/12/2013 9 Data Analysis for
Auditors and CFE’s Although internal auditors have been doing data analysis for more than 25 years, it has only recently started to become standard practice. By our nature, most accountants and auditors are inclined to stick with what has worked in the past, rather than reach outside our comfort zone for an alternative that could help us accomplish more. Do you reach outside your comfort zone? 17 © AuditNet® 2013 New Tools New Approach Technology advances require a change in the approach for detecting and investigating fraud Fraud risk analysis is now a required part of an auditors responsibilities Proactive approach to detecting fraud Identifying risks early using audit software to detect anomalies is no longer optional Data analytic KSA’s now a basic facet of an auditor’s toolbox 18 © AuditNet® 2013
10.
7/12/2013 10 Obstacles to Implementation
Failure to plan for use Lack of an FRA methodology Skill set gap - Department size Cost implication Complexity of the software Resistance in training auditors Failure of software to meet audit departments needs 19 © AuditNet® 2013 Heard on the Street Technology Initiatives considered having the most impact (2012 AICPA Top Technology Issues) 1.Information security 2.Remote access 3.Control and use of mobile devices 4.Business process improvement with technology 5.Data retention policies and structure 6.Privacy policies and compliance 7.Staff and management training 8.Spreadsheet management 9.Overall data proliferation and control 10.Portals (vendor and client/customer) 20 © AuditNet® 2013
11.
7/12/2013 11 New Tools for
Fraud Examiners 21 © AuditNet® 2013 New Tools Sept, 2008…. Any device, Any time, Any where was born Users not interested in security, they want to trust, not to be trusted Any unprotected device connected to both the Internet & and company LAN poses a security risk 22 © AuditNet® 2013
12.
7/12/2013 12 Impact of Technology
on Detecting Fraud Proactive Fraud Detection Computer-aided fraud detection skills Data Extraction Scripting Analyzing Data Automation Data is the key to detecting fraud with technology Benford’s Law analysis using technology Continuous monitoring software suites 23 © AuditNet® 2013 Impact of Technology on Detecting Fraud Digital Information Explosion (DIE) has created greater opportunities for fraud examiners and auditors. Asset recovery Anomalies in data through 100% analysis Examining digital information on mobile devices Using social media to profile fraudsters Social Network Analysis (SNA) Using data analytics to detect property and casualty claims fraud 24 © AuditNet® 2013
13.
7/12/2013 13 Audit Apps for
iPhones/iPads 25 © AuditNet® 2013 Imagine the Possibilities Access your computer from remote locations Collaborate using tools from the road Access audit programs, work papers and more from your mobile device Join Anti-Fraud Webinars and Webcasts for training Conduct or participate in virtual meetings with staff, clients etc. 26 © AuditNet® 2013
14.
7/12/2013 14 Trends and their
Impact Mobile devices and wireless computing Smart devices and malware Cloud sourcing and computing – security, governance and compliance Social media platform for communications Continuous risk and control assessment Reporting to the Board using SOTA technology 27 © AuditNet® 2013 Skill Set for Future Auditors Multi-disciplinary less accountants more business oriented Critical thinking skills Strong communication skills Audit Technology oriented 28 © AuditNet® 2013
15.
7/12/2013 15 The Impact of
Technology Observations Not surprisingly, survey participants predict that technology will affect internal audit roles and responsibilities more than any other business trend. High-performing internal audit functions maximize the use of technology to enhance the efficiency, effectiveness, and quality of operations. PwC 2012 Study on the State of the internal audit profession 29 © AuditNet® 2013 AuditNet® Survey - 2012 State of Technology Use by Auditors Profile of Over 1,500 Responses • 45% 5 or less auditors • Technology tools used – mostly data analytics and EWP • Technology tools least used – monitoring (continuous audit and fraud), GRC, risk compliance • Only 17% feel that their auditors are technology proficient • Technology training primarily OJT • 35% maintain an inventory of audit technology tools • More than half (54%) rated their department at the informal use level (ad hoc or none at all) for audit technology • Less than 4% rated their department at the highest maturity level 30 © AuditNet® 2013
16.
7/12/2013 16 AuditNet® 10 Point
Action Plan for Integrating Technology in Audit 1. Conduct an inventory of audit technology tools 2. Provide training for all staff in use of audit technology 3. Measure staff technology KSA 4. Build a business case for audit technology 5. Work with IT and Senior Management on cost 6. Hire auditors with technology skills 7. Find a technology champion and influencer 8. Establish an audit technology assessment benchmark and update annually 9. Require the use of technology for all audit and administrative tasks 10. Develop a succession plan so that audit software does not become shelfware 31 © AuditNet® 2013 Strategic Fraud Detection Approach 32 © AuditNet® 2013 Source: Strategic Fraud Detection: A Technology-Based Model Conan C. Albrecht W. Steve Albrecht
17.
7/12/2013 17 Future Predictions Standards
will mandate use of technology tools for audit New generation of auditors must have the KSA to utilize technology If auditors and audit departments do not adapt to new technology they risk outsourcing Social networking will evolve to professional networking Tools will become more intuitive Knowledge hubs for audit tool, techniques and resources will consolidate and merge 33 © AuditNet® 2013 Audit Programs and Guides Auditor’s Guide to Cloud Computing - Security Considerations.xls Cloud Matrix_Benefits & Risks.xls AuditNet® Guide to Social Networking AuditNet® Guide to Wireless Security Business Continuity Planning – A Diagnostic Tool Forensic Document Examination Data Analytics Enabled Audit Programs for Key Business Processes AuditNet® is working to provide tools and resources to keep pace with new technology! 34 © AuditNet® 2013
18.
7/12/2013 18 Fraud Examiner Technology
Resources ACFE Seminars, Books and Training Introduction to Digital Forensics Using Data Analytics to Detect Fraud Investigating on the Internet FraudResourceNet.com online training Audit Software – ACL, IDEA, Excel, ActiveData, TopCAATs AuditNet® is working to provide tools and resources to keep pace with new technology! 35 © AuditNet® 2013 Conclusion I hope that I have provided you with some useful information that will stimulate your thought processes! Any questions? 36 © AuditNet® 2013
19.
7/12/2013 19 Contact Information If you
haven’t been to AuditNet recently please visit and see our new design and interface Jim Kaplan CIA, CFE editor@auditnet.org http://www.auditnet.org 37 © AuditNet® 2013
Télécharger maintenant