Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Impact of data science in financial reporting
1. Impact of data science in financial reporting
Emerging impact of audit and tax data analytics
James T Deiotte
Executive Director MPAc
Data Science Day
Halıcıoğlu Data Science Institute and Rady School of Management, UC San Diego
10 May 2019
2. Agenda
• Framing the role of accounting and tax professionals
• How big are the consequences
• What are digital assets
• The legal challenges
• Boardroom considerations
• Auditors role
• Final comments
4. Leveraging data platforms to raise quality of
analysis and affordability
Descriptive
• Insight based on past
information
• Fraud analysis
• Audit analytics
• Forensic analytics
• Related party transactions
and comparability
documentation
• Data (private/sensitive)
information, storage and
accessibility
Diagnostic
• Ability to examine the
cause of past events
• Analytics for M&A
• Transfer pricing
documentation and support
• Analysis of VAT throughput
charges and refundable
leakage
• Risk based assessment of
where data resides
Prescriptive
• Ability to identify best
option to choose from
• Unstructured data
• Managing large data
• Pricing
• Return on business
investment analytics
• Compliance focused
analytics
• Global tax management
• Transfer pricing
• Forensic application of
cyber theft or improper use
of data
Predictive
• Ability to understand future
possibilities by looking at
patterns and historical data
• Supply chain forecasting
• Consumer behavior
• Risk analysis
• Tax analytics
• Controversy management
and trends
• Risk on regulatory affect of
data restrictions and
improper use
10. How do you determine what is
your assets of value?
• Gain competitive advantage
(e.g. IP, strategy)
• Gain position of power for
exploitation (e.g.
ransomware)
• Cause harm (e.g.
automotive, industrial, grid,
military)
• Theft (e.g. counterfeit,
embezzlement)
• Gain disruptive power (e.g.
political, community)
13. How to protect the asset
• Apple taking action against Facebook and Google
– Reason – protecting privacy…
• Facebook was distributing a market-research app through a
program Apple intended only for developers.
• Apple’s retribution was swift and arguably disproportionate: It
temporarily shut off all of the developer iPhone apps at both
Facebook and Google, which has a similar research app.
• The move wreaked havoc at Facebook and disrupted work for
Google employees.
• Facebook’s practices regularly make a mockery of Apple’s efforts
to protect the privacy.
• Facebook users largely accept that Facebook is an ad-powered
data harvester, Apple must continue to earn users’ trust.
• The story isn’t over. Apple will continue to grit its teeth over
Facebook, and Facebook will continue to extract valuable
data from iPhone users.
See: https://www.wsj.com/articles/apples-cold-war-over-privacy-turns-hot-11549083606
14. Law is unable to keep
up with use (or lack of
use) of technology
enabled decisions
How to protect the use (or non-use) of data
18. Data misuse is likely a greater risk and problem
• What is Data Misuse?
– Data misuse is the inappropriate use of data
as defined when the data was initially
collected.
– Misuse of information typically can be
governed by laws and corporate cybersecurity
policy.
• However, even with laws and policies in
place, the potential for data misuse is
growing.
– The most common perpetrators? Your
employees and third-party contractors, i.e.
insider threats.
– Insider threat incidents involving data misuse
have serious implications, not least of which is
the high monetary cost associated.
• Without the right people, processes, and
technology in place for insider threat
visibility, detection, investigation, and
prevention can be near impossible to
manage.
See: https://www.observeit.com/blog/importance-data-misuse-
prevention-and-detection/
Controls vs
technology
20. Big data – is shifting the balance of what drivers
enterprise value
• Enterprise value is built on a
foundation of capital
• Each form of capital requires
focus, nurturing and protection
to support enterprise growth
• A success in protecting one
form of capital and failure in
another, can still lead to overall
failure of the enterprise
Primary revenue source was not from data – yet based on impact of breach – data was clearly a high value asset to someone elseQuestion to the panel
How are you (or your clients) identifying high valued assets – who may use your data for other uses you have not even thought of?
CISO - Do you use information governance to know where your critical value data resides?
How do you segregate assets that contain such critical value data?
Breach impact – was this breach worse for Equifax or Ashley Madison (the enterprise – versus the impacted customers)
Testing
Last time that company ran an exercise to test how human behavior interacts with current security plan?
Ransomware - how challenging is it to prove a negative result (e.g., nothing happened)
Health and Human Services – mere presence is equal to an incident
Response
Are you using third parties to physically/digitally track company assets using open-source intelligence?
Is Company effectively monitoring possible vulnerabilities or even monitoring company to even understand where there are possible vulnerabilities?
Defined top most important firm assets and developed process/system to regularly think/meet about the risks associated with such assets?
Are employees working around security to get their jobs done?
All decision making within an organization involves balancing of focus and investment in six forms of capital
Where CISOs in the past may have been focused on the protection and sharing of intellectual capital, manufacturing, financial, human – natural and social/relationship may be newer areas of focus going forward.
Jim will open up for a few seconds – final remarks from the panel
Jim will thank the panel and reinforce a point or two related to the two days of conference