SlideShare une entreprise Scribd logo
1  sur  21
Impact of data science in financial reporting
Emerging impact of audit and tax data analytics
James T Deiotte
Executive Director MPAc
Data Science Day
Halıcıoğlu Data Science Institute and Rady School of Management, UC San Diego
10 May 2019
Agenda
• Framing the role of accounting and tax professionals
• How big are the consequences
• What are digital assets
• The legal challenges
• Boardroom considerations
• Auditors role
• Final comments
The Infield Shift
This better
work!
Leveraging data platforms to raise quality of
analysis and affordability
Descriptive
• Insight based on past
information
• Fraud analysis
• Audit analytics
• Forensic analytics
• Related party transactions
and comparability
documentation
• Data (private/sensitive)
information, storage and
accessibility
Diagnostic
• Ability to examine the
cause of past events
• Analytics for M&A
• Transfer pricing
documentation and support
• Analysis of VAT throughput
charges and refundable
leakage
• Risk based assessment of
where data resides
Prescriptive
• Ability to identify best
option to choose from
• Unstructured data
• Managing large data
• Pricing
• Return on business
investment analytics
• Compliance focused
analytics
• Global tax management
• Transfer pricing
• Forensic application of
cyber theft or improper use
of data
Predictive
• Ability to understand future
possibilities by looking at
patterns and historical data
• Supply chain forecasting
• Consumer behavior
• Risk analysis
• Tax analytics
• Controversy management
and trends
• Risk on regulatory affect of
data restrictions and
improper use
Just
because
you can …
Should
you…
Just
because
you can …
Should
you…
WHAT ARE DIGITAL ASSETS
 How do you determine what is
your assets of value?
• Gain competitive advantage
(e.g. IP, strategy)
• Gain position of power for
exploitation (e.g.
ransomware)
• Cause harm (e.g.
automotive, industrial, grid,
military)
• Theft (e.g. counterfeit,
embezzlement)
• Gain disruptive power (e.g.
political, community)
Combining information and creating new
digital assets
THE LEGAL CHALLENGE
Always playing catch up!
How to protect the asset
• Apple taking action against Facebook and Google
– Reason – protecting privacy…
• Facebook was distributing a market-research app through a
program Apple intended only for developers.
• Apple’s retribution was swift and arguably disproportionate: It
temporarily shut off all of the developer iPhone apps at both
Facebook and Google, which has a similar research app.
• The move wreaked havoc at Facebook and disrupted work for
Google employees.
• Facebook’s practices regularly make a mockery of Apple’s efforts
to protect the privacy.
• Facebook users largely accept that Facebook is an ad-powered
data harvester, Apple must continue to earn users’ trust.
• The story isn’t over. Apple will continue to grit its teeth over
Facebook, and Facebook will continue to extract valuable
data from iPhone users.
See: https://www.wsj.com/articles/apples-cold-war-over-privacy-turns-hot-11549083606
Law is unable to keep
up with use (or lack of
use) of technology
enabled decisions
How to protect the use (or non-use) of data
BOARDROOM
CONSIDERATIONS
Setting the tone at the top
Your wake
up call …
about
internal
accounting
controls….
Data misuse is likely a greater risk and problem
• What is Data Misuse?
– Data misuse is the inappropriate use of data
as defined when the data was initially
collected.
– Misuse of information typically can be
governed by laws and corporate cybersecurity
policy.
• However, even with laws and policies in
place, the potential for data misuse is
growing.
– The most common perpetrators? Your
employees and third-party contractors, i.e.
insider threats.
– Insider threat incidents involving data misuse
have serious implications, not least of which is
the high monetary cost associated.
• Without the right people, processes, and
technology in place for insider threat
visibility, detection, investigation, and
prevention can be near impossible to
manage.
See: https://www.observeit.com/blog/importance-data-misuse-
prevention-and-detection/
Controls vs
technology
AUDITORS ROLE
Accountant’s role is still being defined and emerging
Big data – is shifting the balance of what drivers
enterprise value
• Enterprise value is built on a
foundation of capital
• Each form of capital requires
focus, nurturing and protection
to support enterprise growth
• A success in protecting one
form of capital and failure in
another, can still lead to overall
failure of the enterprise
Final comments and wrap up

Contenu connexe

Tendances

The Promise of Digitalization: Unpacking the Effects of Big Data Volume, Vari...
The Promise of Digitalization: Unpacking the Effects of Big Data Volume, Vari...The Promise of Digitalization: Unpacking the Effects of Big Data Volume, Vari...
The Promise of Digitalization: Unpacking the Effects of Big Data Volume, Vari...
Ian McCarthy
 
The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They Fall
Trillium Software
 

Tendances (20)

Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
CTAM Making Analytics Actionable RJA FINAL
CTAM Making Analytics Actionable RJA FINALCTAM Making Analytics Actionable RJA FINAL
CTAM Making Analytics Actionable RJA FINAL
 
The Promise of Digitalization: Unpacking the Effects of Big Data Volume, Vari...
The Promise of Digitalization: Unpacking the Effects of Big Data Volume, Vari...The Promise of Digitalization: Unpacking the Effects of Big Data Volume, Vari...
The Promise of Digitalization: Unpacking the Effects of Big Data Volume, Vari...
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs One
 
Big data
Big dataBig data
Big data
 
IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012
 
information technology
information technologyinformation technology
information technology
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
 
The dawn of big data
The dawn of big dataThe dawn of big data
The dawn of big data
 
Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018
 
Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big Data
 
Hadoop Overview
Hadoop OverviewHadoop Overview
Hadoop Overview
 
Data Governance in a big data era
Data Governance in a big data eraData Governance in a big data era
Data Governance in a big data era
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
How technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficientHow technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficient
 
D2 d turning information into a competive asset - 23 jan 2014
D2 d   turning information into a competive asset - 23 jan 2014D2 d   turning information into a competive asset - 23 jan 2014
D2 d turning information into a competive asset - 23 jan 2014
 
The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They Fall
 
Big Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and ChallengesBig Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and Challenges
 

Similaire à Impact of data science in financial reporting

f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
Surendhar57
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptxANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
justineguadayo1104
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
emermell
 
The Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data ManagementThe Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data Management
DATAVERSITY
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
Emily2014
 

Similaire à Impact of data science in financial reporting (20)

Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
Overview of data mining
Overview of data miningOverview of data mining
Overview of data mining
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
Dark data
Dark dataDark data
Dark data
 
Dark data by Worapol Alex Pongpech
Dark data by Worapol Alex PongpechDark data by Worapol Alex Pongpech
Dark data by Worapol Alex Pongpech
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptxANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
The Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data ManagementThe Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data Management
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
ADV Slides: Data Curation for Artificial Intelligence Strategies
ADV Slides: Data Curation for Artificial Intelligence StrategiesADV Slides: Data Curation for Artificial Intelligence Strategies
ADV Slides: Data Curation for Artificial Intelligence Strategies
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 

Plus de James Deiotte

Video creating a harmonised african tax system cnbc africa
Video  creating a harmonised african tax system   cnbc africaVideo  creating a harmonised african tax system   cnbc africa
Video creating a harmonised african tax system cnbc africa
James Deiotte
 

Plus de James Deiotte (19)

Ucsd rady mpac flier 2020 10.20.2020
Ucsd rady mpac flier 2020 10.20.2020Ucsd rady mpac flier 2020 10.20.2020
Ucsd rady mpac flier 2020 10.20.2020
 
Security as a Strategy
Security as a Strategy Security as a Strategy
Security as a Strategy
 
Board Governance, Stakeholder Focus and Integrated Reporting
Board Governance, Stakeholder Focus and Integrated Reporting Board Governance, Stakeholder Focus and Integrated Reporting
Board Governance, Stakeholder Focus and Integrated Reporting
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa framework
 
Challenges faced by transformational leaders in Africa
Challenges faced by transformational leaders in Africa Challenges faced by transformational leaders in Africa
Challenges faced by transformational leaders in Africa
 
Cleveland state university honors presentation
Cleveland state university honors presentationCleveland state university honors presentation
Cleveland state university honors presentation
 
Video creating a harmonised african tax system cnbc africa
Video  creating a harmonised african tax system   cnbc africaVideo  creating a harmonised african tax system   cnbc africa
Video creating a harmonised african tax system cnbc africa
 
Investment in Poland and support programs
Investment in Poland and support programsInvestment in Poland and support programs
Investment in Poland and support programs
 
Taxes in South Africa
Taxes in South AfricaTaxes in South Africa
Taxes in South Africa
 
AICPA Conference - Doing Business in the EU
AICPA Conference - Doing Business in the EU AICPA Conference - Doing Business in the EU
AICPA Conference - Doing Business in the EU
 
EY Africa REIT workshop
EY Africa REIT workshop EY Africa REIT workshop
EY Africa REIT workshop
 
Why there’s underinvestment in Africa
Why there’s underinvestment in AfricaWhy there’s underinvestment in Africa
Why there’s underinvestment in Africa
 
Tax Talk Magazine
Tax Talk MagazineTax Talk Magazine
Tax Talk Magazine
 
E2 Detroit Conference - Starting your business and managing your capital
E2 Detroit Conference - Starting your business and managing your capitalE2 Detroit Conference - Starting your business and managing your capital
E2 Detroit Conference - Starting your business and managing your capital
 
Student conference presentation at Sun City, South Africa
Student conference presentation at Sun City, South Africa Student conference presentation at Sun City, South Africa
Student conference presentation at Sun City, South Africa
 
Creating transformation and value through restructuring EY Africa Tax Confere...
Creating transformation and value through restructuring EY Africa Tax Confere...Creating transformation and value through restructuring EY Africa Tax Confere...
Creating transformation and value through restructuring EY Africa Tax Confere...
 
Building a better working world in africa through entrepreneurship africa tax...
Building a better working world in africa through entrepreneurship africa tax...Building a better working world in africa through entrepreneurship africa tax...
Building a better working world in africa through entrepreneurship africa tax...
 
Wharton School - Overview of Sub Saharan Tax
Wharton School - Overview of Sub Saharan TaxWharton School - Overview of Sub Saharan Tax
Wharton School - Overview of Sub Saharan Tax
 
Doing business in new EU countries
Doing business in new EU countriesDoing business in new EU countries
Doing business in new EU countries
 

Dernier

Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
amitlee9823
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
amitlee9823
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
amitlee9823
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
gajnagarg
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
karishmasinghjnh
 
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
gajnagarg
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
amitlee9823
 

Dernier (20)

VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
 
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning Approach
 
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
 
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 

Impact of data science in financial reporting

  • 1. Impact of data science in financial reporting Emerging impact of audit and tax data analytics James T Deiotte Executive Director MPAc Data Science Day Halıcıoğlu Data Science Institute and Rady School of Management, UC San Diego 10 May 2019
  • 2. Agenda • Framing the role of accounting and tax professionals • How big are the consequences • What are digital assets • The legal challenges • Boardroom considerations • Auditors role • Final comments
  • 3. The Infield Shift This better work!
  • 4. Leveraging data platforms to raise quality of analysis and affordability Descriptive • Insight based on past information • Fraud analysis • Audit analytics • Forensic analytics • Related party transactions and comparability documentation • Data (private/sensitive) information, storage and accessibility Diagnostic • Ability to examine the cause of past events • Analytics for M&A • Transfer pricing documentation and support • Analysis of VAT throughput charges and refundable leakage • Risk based assessment of where data resides Prescriptive • Ability to identify best option to choose from • Unstructured data • Managing large data • Pricing • Return on business investment analytics • Compliance focused analytics • Global tax management • Transfer pricing • Forensic application of cyber theft or improper use of data Predictive • Ability to understand future possibilities by looking at patterns and historical data • Supply chain forecasting • Consumer behavior • Risk analysis • Tax analytics • Controversy management and trends • Risk on regulatory affect of data restrictions and improper use
  • 10.  How do you determine what is your assets of value? • Gain competitive advantage (e.g. IP, strategy) • Gain position of power for exploitation (e.g. ransomware) • Cause harm (e.g. automotive, industrial, grid, military) • Theft (e.g. counterfeit, embezzlement) • Gain disruptive power (e.g. political, community)
  • 11. Combining information and creating new digital assets
  • 12. THE LEGAL CHALLENGE Always playing catch up!
  • 13. How to protect the asset • Apple taking action against Facebook and Google – Reason – protecting privacy… • Facebook was distributing a market-research app through a program Apple intended only for developers. • Apple’s retribution was swift and arguably disproportionate: It temporarily shut off all of the developer iPhone apps at both Facebook and Google, which has a similar research app. • The move wreaked havoc at Facebook and disrupted work for Google employees. • Facebook’s practices regularly make a mockery of Apple’s efforts to protect the privacy. • Facebook users largely accept that Facebook is an ad-powered data harvester, Apple must continue to earn users’ trust. • The story isn’t over. Apple will continue to grit its teeth over Facebook, and Facebook will continue to extract valuable data from iPhone users. See: https://www.wsj.com/articles/apples-cold-war-over-privacy-turns-hot-11549083606
  • 14. Law is unable to keep up with use (or lack of use) of technology enabled decisions How to protect the use (or non-use) of data
  • 16.
  • 17. Your wake up call … about internal accounting controls….
  • 18. Data misuse is likely a greater risk and problem • What is Data Misuse? – Data misuse is the inappropriate use of data as defined when the data was initially collected. – Misuse of information typically can be governed by laws and corporate cybersecurity policy. • However, even with laws and policies in place, the potential for data misuse is growing. – The most common perpetrators? Your employees and third-party contractors, i.e. insider threats. – Insider threat incidents involving data misuse have serious implications, not least of which is the high monetary cost associated. • Without the right people, processes, and technology in place for insider threat visibility, detection, investigation, and prevention can be near impossible to manage. See: https://www.observeit.com/blog/importance-data-misuse- prevention-and-detection/ Controls vs technology
  • 19. AUDITORS ROLE Accountant’s role is still being defined and emerging
  • 20. Big data – is shifting the balance of what drivers enterprise value • Enterprise value is built on a foundation of capital • Each form of capital requires focus, nurturing and protection to support enterprise growth • A success in protecting one form of capital and failure in another, can still lead to overall failure of the enterprise

Notes de l'éditeur

  1. Primary revenue source was not from data – yet based on impact of breach – data was clearly a high value asset to someone else Question to the panel How are you (or your clients) identifying high valued assets – who may use your data for other uses you have not even thought of? CISO - Do you use information governance to know where your critical value data resides? How do you segregate assets that contain such critical value data? Breach impact – was this breach worse for Equifax or Ashley Madison (the enterprise – versus the impacted customers) Testing Last time that company ran an exercise to test how human behavior interacts with current security plan? Ransomware - how challenging is it to prove a negative result (e.g., nothing happened) Health and Human Services – mere presence is equal to an incident Response Are you using third parties to physically/digitally track company assets using open-source intelligence? Is Company effectively monitoring possible vulnerabilities or even monitoring company to even understand where there are possible vulnerabilities? Defined top most important firm assets and developed process/system to regularly think/meet about the risks associated with such assets? Are employees working around security to get their jobs done?
  2. All decision making within an organization involves balancing of focus and investment in six forms of capital Where CISOs in the past may have been focused on the protection and sharing of intellectual capital, manufacturing, financial, human – natural and social/relationship may be newer areas of focus going forward.
  3. Jim will open up for a few seconds – final remarks from the panel Jim will thank the panel and reinforce a point or two related to the two days of conference