SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
3/25/2019
1
Data Analytics - 2
Analytics in the Audit
based on Data Analytics for
Internal Auditors
by Richard Cascarino
About Jim Kaplan, CIA, CFE
 President and Founder of AuditNet®,
the global resource for auditors (now
available on iOS, Android and
Windows devices)
 Auditor, Web Site Guru,
 Internet for Auditors Pioneer
 Recipient of the IIA’s 2007 Bradford
Cadmus Memorial Award.
 Author of “The Auditor’s Guide to
Internet Resources” 2nd Edition
Page 2
1
2
3/25/2019
2
About AuditNet® LLC
• AuditNet®, the global resource for auditors, is available on the
Web, iPad, iPhone, Windows and Android devices and features:
• Over 3,000 Reusable Templates, Audit Programs,
Questionnaires, and Control Matrices
• Training without Travel Webinars focusing on fraud, data
analytics, IT audit, and internal audit
• Audit guides, manuals, and books on audit basics and using
audit technology
• LinkedIn Networking Groups
• Monthly Newsletters with Expert Guest Columnists
• Surveys on timely topics for internal auditors
• NASBA Approved CPE Sponsor
Introductions
Page 3
The views expressed by the presenters do not necessarily represent
the views, positions, or opinions of AuditNet® LLC. These materials,
and the oral presentation accompanying them, are for educational
purposes only and do not constitute accounting or legal advice or
create an accountant-client relationship.
While AuditNet® makes every effort to ensure information is
accurate and complete, AuditNet® makes no representations,
guarantees, or warranties as to the accuracy or completeness of the
information provided via this presentation. AuditNet® specifically
disclaims all liability for any claims or damages that may result from
the information contained in this presentation, including any
websites maintained by third parties and linked to the AuditNet®
website.
Any mention of commercial products is for information only; it does
not imply recommendation or endorsement by AuditNet® LLC
3
4
3/25/2019
3
About Richard Cascarino, MBA,
CIA, CISM, CFE, CRMA
• Principal of Richard Cascarino &
Associates based in Colorado USA
• Over 28 years experience in IT audit
training and consultancy
• Past President of the Institute of
Internal Auditors in South Africa
• Member of ISACA
• Member of Association of Certified
Fraud Examiners
• Author of Data Analytics for Internal
Auditors
5
Today’s Agenda
 Conducting the Audit
 Audit Planning
 Determining Audit objectives
 Obtaining Information from IT Systems for Analysis
 Databases / Big Data
 The Download process
 Access to data
 Data verification
 Use of Computer Assisted Audit Techniques
 Test Techniques
 CAATs for Data Analysis
 Generalized Audit Software
 Audit Procedures
 CAAT Usage
Page 6
5
6
3/25/2019
4
Risk Analysis and Internal
Auditing
 Estimating the significance of the risk
 Assessing the likelihood or frequency of the risk
 Considering how the risk should be managed
 What actions need to be taken
 What controls need to be effected
 Preventative procedures - reduce the
significance or likelihood of the risk occurring
 Displacement procedures - offset the effect if
it does occur
 Risks are normally evaluated before the
mitigating effects of controls are considered
7
Risk Analysis and Internal
Auditing
 Estimating the significance of the risk
 Assessing the likelihood or frequency of the risk
 Considering how the risk should be managed
 What actions need to be taken
 What controls need to be effected
 Preventative procedures - reduce the
significance or likelihood of the risk occurring
 Displacement procedures - offset the effect if
it does occur
 Risks are normally evaluated before the
mitigating effects of controls are considered
8
7
8
3/25/2019
5
Several Ways of Defining
Risk
 Risk is the possibility of loss
 Risk is the probability of loss
 Risk expresses a possible loss over a specified
period of time
 Risk is the potential for realising unwanted,
negative consequences
 Risk measures the probability and severity of
adverse effects
 Risk is a function of the probability that an event
will occur and the consequence if it does
9
Other Ways of Seeing Risk
 Velocity
 Readiness/Preparedness
 Capacity
 Controllability
 Monitorability
 Interdependencies
 Frequency of occurrence
 Volatility
 Maturity
 Degree of confidence
9
10
3/25/2019
6
The One we Worry About -
Velocity
 Speed of onset
 How quickly does the risk descend upon us?
 Do we have much warning?
 Speed of impact
 Do we feel the effects right away, or does the
pain slowly increase?
 Does it spread and impact us in other ways;
e.g. reputation?
 Speed of reaction
 Even if we see it coming, do we have the agility
to timely react?
A Risk-based Planning Approach
 Typical audit scope issues:
 Audit frequency
Fixed frequency
Random frequencies
Conditional approach based on analytical review or risk analysis
 Audit intensity
Not always more time in the riskier areas
 Audit timing
Involves a variety of objectives and constraints
12
11
12
3/25/2019
7
Risk-based Audit Steps
 Define the audit universe of auditable units
 Identify the appropriate risk factors reflecting
management's' concerns
 Select an appropriate format for evaluating risk
factors
 Assess a concern index for each unit reflecting its
riskiness over several risk factors
 Based on the risk rating, assign an audit frequency
on a methodical and standardised basis
 Produce the audit coverage plan
13
Design of Audit Steps
 All risk evaluation designed to restrict audit work to
high-impact areas
 Better return on investment
 More defensible recommendations
 More saleable results
 Does not remove the need for actual audit work
 Generally audit testing falls into the categories:
 Do the controls work?
 Do they meet their control objectives?
 Are they efficient?
14
13
14
3/25/2019
8
Selecting Controls for Testing
15
–Establish "prime" Controls for an Area
–Identify Controls covering several Areas
–Identify Stand-alone Controls
–Controls which provide Evidence
–Do NOT try to prove a Negative
Primary Areas of Concern
16
–Complex Systems cannot be re-created manually
–Many computer records are intelligible only to computers
–Most systems allow multiple access
–"Computers can be trusted"
–Disasters really mean Disaster
15
16
3/25/2019
9
Where to Start
 Establish audit objectives and requirements
 Gain executive-level support
 Ascertain degree to which management is
performing monitoring role
 Select appropriate technology solutions
 Identify information sources and gain access
 Understand business processes and identify
key controls and risks
 Build audit skill set
 Manage and report results
Big Data Definition
 No single standard definition…
“Big Data” is data whose scale, diversity, and
complexity require new architecture,
techniques, algorithms, and analytics to
manage it and extract value and hidden
knowledge from it…
18
17
18
3/25/2019
10
How much data?
 Google processes 20 PB a day (2008)
 Wayback Machine has 3 PB + 100
TB/month (3/2009)
 Facebook has 2.5 PB of user data + 15
TB/day (4/2009)
 eBay has 6.5 PB of user data + 50 TB/day
(5/2009)
 CERN’s Large Hydron Collider (LHC)
generates 15 PB a year
Type of Data
 Relational Data (Tables/Transaction/Legacy
Data)
 Text Data (Web)
 Semi-structured Data (XML)
 Graph Data
Social Network, Semantic Web (RDF), …
 Streaming Data
You can only scan the data once
19
20
3/25/2019
11
Characteristics of Big Data:
1-Scale (Volume)
 Data Volume
44x increase from 2009 2020
From 0.8 zettabytes to 35zb
 Data volume is increasing
exponentially
21
Exponential increase in
collected/generated data
Characteristics of Big Data:
2-Complexity (Varity)
 Various formats, types, and
structures
 Text, numerical, images, audio,
video, sequences, time series,
social media data, multi-dim
arrays, etc…
 Static data vs. streaming data
 A single application can be
generating/collecting many
types of data
22
To extract knowledge all these types of
data need to linked together
21
22
3/25/2019
12
Characteristics of Big Data:
3-Speed (Velocity)
 Data is begin generated fast and need to be
processed fast
 Online Data Analytics
 Late decisions  missing opportunities
 Examples
 E-Promotions: Based on your current location, your purchase
history, what you like  send promotions right now for store next to
you
 Healthcare monitoring: sensors monitoring your activities and body
 any abnormal measurements require immediate reaction
23
3 Vs of Big Data
 The “BIG” in big data isn’t just about volume
24
23
24
3/25/2019
13
The 4V’s
25
Big Data Usage
Transactional
•Fraud detection
•Financial services / stock
markets
Sub-Transactional
•Weblogs
•Social/online media
•Telecoms events
Non-Transactional
•Web pages, blogs etc
•Documents
•Physical events
•Application events
•Machine events
25
26
3/25/2019
14
Main Big Data Technologies
Hadoop NoSQL Databases Analytic Databases
Hadoop
•Low cost, reliable scale-
out architecture
•Distributed computing
Proven success in Fortune
500 companies
•Exploding interest
NoSQL Databases
•Huge horizontal scaling
and high availability
•Highly optimized for
retrieval and appending
•Types
• Document stores
• Key Value stores
• Graph databases
Analytic RDBMS
•Optimized for bulk-load and
fast aggregate query
workloads
•Types
• Column-oriented
• MPP (Massively
Parallel Processing)
• In-memory
Challenges for the Auditor
 How to efficiently and cost effectively sustain
controls assessment and testing efforts?
 How to know on a timely basis when control
deficiencies occur?
 How to quantify the impact of control
deficiencies?
 How to improve effectiveness of controls
 How to gain assurance over ongoing
effectiveness of controls
27
28
3/25/2019
15
Deficiencies of Traditional
Approach
 Retrospective view
analysis frequently occurs long after
transaction has taken place, too late for action
 Lack of timely visibility into control risks and
deficiencies
 Alternatively
Independently test all transactions for
compliance with controls at, or soon after, point
at which they occur
Not feasible with Big Data
Importing the Data
30
 Bring a copy to the audit machine
Copies can be reanalyzed later if need be
Live data moves on
You cannot corrupt live data working on a copy
 Bringing it into the audit software
Depends on the software
Most modern systems can import from a variety of data types
 What’s where in the data
Data layout is critical
May automatically extract the data layout from metadata (data
about the data)
ODBC databases
Excel layouts etc.
If the structure is flat you will need the file layout from IT (Make
sure it’s up-to-date)
29
30
3/25/2019
16
Acquiring the Data
31
If all you can get is the hard copy
 Can they print it to a file instead
Comma Delimited if possible
Fred Smith, Internal Audit,3/13/2011,
Individual data fields separated by commas
Easy for the software to identify individual fields
 If it’s a printout scan it
1 field of 120 characters for example
The audit software will allow you to define fields within the 120
characters
You can even define different layouts for different rows
Verifying the Data
32
You’ve got the data – now what?
 Make sure it’s what you asked for
Timeliness – does it reflect the right period?
Accuracy – is it the live data?
Completeness – is it all the data?
 It’s embarrassing to come to an adverse conclusion only to find you were
given the “wrong” file / layout etc.
 Its even worse if you came to a non-adverse conclusion
 Check against known
 Control totals
 Dates
 Transactions
 Never believe what the first printout tells you
31
32
3/25/2019
17
Challenges for the Auditor
 Obtaining appropriate data access
 Defining appropriate measurement metrics
 Setting appropriate thresholds for exceptions
reporting
 Developing appropriate metrics to prioritize
exceptions
 Minimizing impact on systems’ operational
performance
Source code review
–Requires programming skill
–Slow
–Expensive
–Boring
–Proves little
–May be useful for specialized review
33
34
3/25/2019
18
Confirmation of Results
35
e.g. Debtors certification
–Slow
–Uncertain
–Only shows up errors in your favor
–Very labor intensive
Test Data
36
–Selected to test both correct data and errors
–Require little technical background
but Lacks Objectivity
–Influenced by what is expected
–Assumes program tested is "LIVE" program
35
36
3/25/2019
19
Integrated Test Facility (ITF)
37
–Establishes a "dummy" entity
–Process data together with live data
–Excluded from live results
–Under the auditor's control but
–May result in system catastrophe
Advantages of an ITF
38
–Little technical training required
–Low processing cost
–Tests system as it routinely operates
–Understood by all involved
–Tests manual function as well as computer
37
38
3/25/2019
20
Disadvantages of an ITF
39
–ITF transactions must be removed before
they interfere with live totals
–High cost if live systems require modification
to implement
–Test data affects live files - danger of
destruction
–Difficult to identify all exception conditions
–Quantity of test data will be limited
Snapshot Technique
40
–A form of transaction trail
–Identifiable inputs "tagged"
–Trail produced for all processing logic
–Useful in high-volume systems
–Used extensively by I.S. staff in testing systems
39
40
3/25/2019
21
Sampling
41
–"Liars, Damned Liars and Statistics"
–A tool for audit quality control
–May be the only tool possible in a high-volume system
–Not well understood by auditors
–At computer speeds 100% sampling may be practicable
May not be desirable
Parallel Simulation
42
Uses same input data
Uses same files
Uses different programs
From a different source
To produce the same results?
41
42
3/25/2019
22
CAAT Types and Their Usage
43
–Application audit tools are not always CAATs
–"Any tangible aid that assists an auditor"
Tools to obtain information
Tools to evaluate controls
Tools to verify controls
Automated tools
Automated Tools (CAATs)
44
Test Data Generators
Flowcharting Packages
Specialized Audit Software
Generalized Audit Software
Utility Programs
43
44
3/25/2019
23
Specialized Audit Software
45
Can accomplish any audit task but
–High development and maintenance cost
–Require specific I.S. skills
–Must be "verified" if not written by the auditor
–High degree of obsolescence
Generalized Audit Software
46
"Prefabricated" audit tests
Each use is a one-off
Auditor has direct control
Lower development cost
Fast to implement
 IDEA
 ACL
 Arbutus Analyzer
45
46
3/25/2019
24
Application of GAS
47
Detective examination of files
Verification of processing controls
File interrogations
Management inquiries
Types of Audit Software
48
Program generators
Macro languages
Audit-specific tools
Data downloaders
Micro-based software
47
48
3/25/2019
25
Hardware / Software
Compatibility (Desirable)
49
–Across manufacturers
–Across operating environments
–Across machine size
–Mainframe / mini / micro
There are some about
Audit Software Functions
50
File access
Arithmetic operations
Logic operations
Record handling
Update
Output
Statistical Sampling
File comparison
Graphics
49
50
3/25/2019
26
Determining the Appropriate
CAAT
51
Depends on the Audit Objective and
selected technique
Application Audit Techniques
Purposes
–1 To verify processing operation
–2 To verify the results of processing
Common CAAT Problems
52
–Getting the wrong files
–Getting the wrong layout
–Documentation is out of date
–Prejudging results
Never believe what the first printout tells you
51
52
3/25/2019
27
In any Application System
53
–Try to identify the controls the user relies on
–Documentation is often misleading
–Not everything needs to be audited
–Program logic mirrors business logic
–You can always ask for help
Industry-Related Software
54
–Audit procedures commonly available for:
Accounts receivable
Payroll
General ledger
Inventory
–May be customizable
–Industry-related audit software available for:
Insurance
Health care
Financial services
53
54
3/25/2019
28
Industry- Related Drawbacks
55
–Requires
Conversion of input to standard package
layouts
Selection of appropriate parameters
A degree of IS skill for conversion
–Software itself normally
Cost-effective
Efficient
Customized Audit Software
56
–To run in unique circumstances
–To perform unique audit tests
–To produce output in unique formats
–Expensive to develop
–Normally require a high level of IS skills
–May not tell you what you think they do
–May be the only viable solution
55
56
3/25/2019
29
Information Retrieval Software
–Report writers and Query Languages
–Not specifically written for auditors
–Can perform many common audit routines
–Includes
Report writers
Program generators
4th generation languages
Excel as a CAAT
58
57
58
3/25/2019
30
ACL as a CAAT
59
Idea as a CAAT
7
59
60
3/25/2019
31
Questions?
Any Questions?
Don’t be Shy!
AuditNet® and cRisk Academy
If you would like
forever access to this
webinar recording
If you are watching
the recording, and
would like to obtain
CPE credit for this
webinar
Previous AuditNet®
webinars are also
available on-demand
for CPE credit
http://criskacademy.com
http://ondemand.criskacade
my.com
Use coupon code: 50OFF
for a discount on this
webinar for one week
61
62
3/25/2019
32
Data Analysis Webinar Series
 March 26 - Analytics Techniques
 April 2 - Analysis and Monitoring
 April 16 - Data Analytics Software
 April 23 - Using the Analysis
Thank You!
Jim Kaplan
AuditNet® LLC
1-800-385-1625
Email:info@auditnet.org
www.auditnet.org
Richard Cascarino & Associates
Cell: +1 970 819 7963
Tel +1 303 747 6087 (Skype Worldwide)
Tel: +1 970 367 5429
eMail: rcasc@rcascarino.com
Web: http://www.rcascarino.com
Skype: Richard.Cascarino
Page 64
63
64

Contenu connexe

Tendances

Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionRishabh Software
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
Risk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling TechniquesRisk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling TechniquesManoj Agarwal
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and complianceMagdalena Matell
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyNICSA
 
Data Quality Management: Cleaner Data, Better Reporting
Data Quality Management: Cleaner Data, Better ReportingData Quality Management: Cleaner Data, Better Reporting
Data Quality Management: Cleaner Data, Better Reportingaccenture
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...himalya sharma
 
Building a business impact analysis (bia) process a hands on blueprint
Building a business impact analysis (bia) process a hands on blueprintBuilding a business impact analysis (bia) process a hands on blueprint
Building a business impact analysis (bia) process a hands on blueprintluweinet
 
Regulatory Reporting Dashboard
Regulatory Reporting DashboardRegulatory Reporting Dashboard
Regulatory Reporting Dashboardaccenture
 
Ppt on risk based internal audit
Ppt on risk based internal auditPpt on risk based internal audit
Ppt on risk based internal auditAmitaMistry2
 
Digital Evolution in B2B Marketing: Google/CEB Study
Digital Evolution in B2B Marketing: Google/CEB StudyDigital Evolution in B2B Marketing: Google/CEB Study
Digital Evolution in B2B Marketing: Google/CEB StudyMark Treacy
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITShivamSharma909
 
Measuring Success - Security KPIs
Measuring Success - Security KPIsMeasuring Success - Security KPIs
Measuring Success - Security KPIsH Contrex
 
Managing with KPI's and KRI's
Managing with KPI's and KRI's Managing with KPI's and KRI's
Managing with KPI's and KRI's Andrew Smart
 

Tendances (20)

ITSM-ISMS
ITSM-ISMSITSM-ISMS
ITSM-ISMS
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
KRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & ITKRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & IT
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
Risk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling TechniquesRisk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling Techniques
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Data Quality Management: Cleaner Data, Better Reporting
Data Quality Management: Cleaner Data, Better ReportingData Quality Management: Cleaner Data, Better Reporting
Data Quality Management: Cleaner Data, Better Reporting
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
 
Building a business impact analysis (bia) process a hands on blueprint
Building a business impact analysis (bia) process a hands on blueprintBuilding a business impact analysis (bia) process a hands on blueprint
Building a business impact analysis (bia) process a hands on blueprint
 
Regulatory Reporting Dashboard
Regulatory Reporting DashboardRegulatory Reporting Dashboard
Regulatory Reporting Dashboard
 
Ppt on risk based internal audit
Ppt on risk based internal auditPpt on risk based internal audit
Ppt on risk based internal audit
 
Digital Evolution in B2B Marketing: Google/CEB Study
Digital Evolution in B2B Marketing: Google/CEB StudyDigital Evolution in B2B Marketing: Google/CEB Study
Digital Evolution in B2B Marketing: Google/CEB Study
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
Measuring Success - Security KPIs
Measuring Success - Security KPIsMeasuring Success - Security KPIs
Measuring Success - Security KPIs
 
Managing with KPI's and KRI's
Managing with KPI's and KRI's Managing with KPI's and KRI's
Managing with KPI's and KRI's
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 

Similaire à Data analytics 2 analytics in the audit slides

Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringJim Kaplan CIA CFE
 
Data analytics software selection and implementation
Data analytics software selection and implementationData analytics software selection and implementation
Data analytics software selection and implementationJim Kaplan CIA CFE
 
Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Jim Kaplan CIA CFE
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Merging forensics w data analytics
Merging forensics w data analyticsMerging forensics w data analytics
Merging forensics w data analyticschris75308
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrainInfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSShivamSharma909
 
Key considerations for your internal audit plan
Key considerations for your internal audit planKey considerations for your internal audit plan
Key considerations for your internal audit planessbaih
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual cisoMichael Ball
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingTory Quinton
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSathishKumar960827
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1ControlCase
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementIvanti
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataKayla Catron
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataBluelock
 
Test beyond the obvious- Root Cause Analysis
Test beyond the obvious- Root Cause AnalysisTest beyond the obvious- Root Cause Analysis
Test beyond the obvious- Root Cause AnalysisPractiTest
 

Similaire à Data analytics 2 analytics in the audit slides (20)

Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
 
Data analytics software selection and implementation
Data analytics software selection and implementationData analytics software selection and implementation
Data analytics software selection and implementation
 
Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
 
IT Fraud and Countermeasures
IT Fraud and CountermeasuresIT Fraud and Countermeasures
IT Fraud and Countermeasures
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Merging forensics w data analytics
Merging forensics w data analyticsMerging forensics w data analytics
Merging forensics w data analytics
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
Key considerations for your internal audit plan
Key considerations for your internal audit planKey considerations for your internal audit plan
Key considerations for your internal audit plan
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual ciso
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Test beyond the obvious- Root Cause Analysis
Test beyond the obvious- Root Cause AnalysisTest beyond the obvious- Root Cause Analysis
Test beyond the obvious- Root Cause Analysis
 

Plus de Jim Kaplan CIA CFE

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsJim Kaplan CIA CFE
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) Jim Kaplan CIA CFE
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Jim Kaplan CIA CFE
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Jim Kaplan CIA CFE
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10Jim Kaplan CIA CFE
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal AuditorJim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 

Plus de Jim Kaplan CIA CFE (20)

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Ethics for internal auditors
Ethics for internal auditorsEthics for internal auditors
Ethics for internal auditors
 

Dernier

Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024Timothy Spann
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 

Dernier (20)

Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 

Data analytics 2 analytics in the audit slides

  • 1. 3/25/2019 1 Data Analytics - 2 Analytics in the Audit based on Data Analytics for Internal Auditors by Richard Cascarino About Jim Kaplan, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors (now available on iOS, Android and Windows devices)  Auditor, Web Site Guru,  Internet for Auditors Pioneer  Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.  Author of “The Auditor’s Guide to Internet Resources” 2nd Edition Page 2 1 2
  • 2. 3/25/2019 2 About AuditNet® LLC • AuditNet®, the global resource for auditors, is available on the Web, iPad, iPhone, Windows and Android devices and features: • Over 3,000 Reusable Templates, Audit Programs, Questionnaires, and Control Matrices • Training without Travel Webinars focusing on fraud, data analytics, IT audit, and internal audit • Audit guides, manuals, and books on audit basics and using audit technology • LinkedIn Networking Groups • Monthly Newsletters with Expert Guest Columnists • Surveys on timely topics for internal auditors • NASBA Approved CPE Sponsor Introductions Page 3 The views expressed by the presenters do not necessarily represent the views, positions, or opinions of AuditNet® LLC. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While AuditNet® makes every effort to ensure information is accurate and complete, AuditNet® makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. AuditNet® specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the AuditNet® website. Any mention of commercial products is for information only; it does not imply recommendation or endorsement by AuditNet® LLC 3 4
  • 3. 3/25/2019 3 About Richard Cascarino, MBA, CIA, CISM, CFE, CRMA • Principal of Richard Cascarino & Associates based in Colorado USA • Over 28 years experience in IT audit training and consultancy • Past President of the Institute of Internal Auditors in South Africa • Member of ISACA • Member of Association of Certified Fraud Examiners • Author of Data Analytics for Internal Auditors 5 Today’s Agenda  Conducting the Audit  Audit Planning  Determining Audit objectives  Obtaining Information from IT Systems for Analysis  Databases / Big Data  The Download process  Access to data  Data verification  Use of Computer Assisted Audit Techniques  Test Techniques  CAATs for Data Analysis  Generalized Audit Software  Audit Procedures  CAAT Usage Page 6 5 6
  • 4. 3/25/2019 4 Risk Analysis and Internal Auditing  Estimating the significance of the risk  Assessing the likelihood or frequency of the risk  Considering how the risk should be managed  What actions need to be taken  What controls need to be effected  Preventative procedures - reduce the significance or likelihood of the risk occurring  Displacement procedures - offset the effect if it does occur  Risks are normally evaluated before the mitigating effects of controls are considered 7 Risk Analysis and Internal Auditing  Estimating the significance of the risk  Assessing the likelihood or frequency of the risk  Considering how the risk should be managed  What actions need to be taken  What controls need to be effected  Preventative procedures - reduce the significance or likelihood of the risk occurring  Displacement procedures - offset the effect if it does occur  Risks are normally evaluated before the mitigating effects of controls are considered 8 7 8
  • 5. 3/25/2019 5 Several Ways of Defining Risk  Risk is the possibility of loss  Risk is the probability of loss  Risk expresses a possible loss over a specified period of time  Risk is the potential for realising unwanted, negative consequences  Risk measures the probability and severity of adverse effects  Risk is a function of the probability that an event will occur and the consequence if it does 9 Other Ways of Seeing Risk  Velocity  Readiness/Preparedness  Capacity  Controllability  Monitorability  Interdependencies  Frequency of occurrence  Volatility  Maturity  Degree of confidence 9 10
  • 6. 3/25/2019 6 The One we Worry About - Velocity  Speed of onset  How quickly does the risk descend upon us?  Do we have much warning?  Speed of impact  Do we feel the effects right away, or does the pain slowly increase?  Does it spread and impact us in other ways; e.g. reputation?  Speed of reaction  Even if we see it coming, do we have the agility to timely react? A Risk-based Planning Approach  Typical audit scope issues:  Audit frequency Fixed frequency Random frequencies Conditional approach based on analytical review or risk analysis  Audit intensity Not always more time in the riskier areas  Audit timing Involves a variety of objectives and constraints 12 11 12
  • 7. 3/25/2019 7 Risk-based Audit Steps  Define the audit universe of auditable units  Identify the appropriate risk factors reflecting management's' concerns  Select an appropriate format for evaluating risk factors  Assess a concern index for each unit reflecting its riskiness over several risk factors  Based on the risk rating, assign an audit frequency on a methodical and standardised basis  Produce the audit coverage plan 13 Design of Audit Steps  All risk evaluation designed to restrict audit work to high-impact areas  Better return on investment  More defensible recommendations  More saleable results  Does not remove the need for actual audit work  Generally audit testing falls into the categories:  Do the controls work?  Do they meet their control objectives?  Are they efficient? 14 13 14
  • 8. 3/25/2019 8 Selecting Controls for Testing 15 –Establish "prime" Controls for an Area –Identify Controls covering several Areas –Identify Stand-alone Controls –Controls which provide Evidence –Do NOT try to prove a Negative Primary Areas of Concern 16 –Complex Systems cannot be re-created manually –Many computer records are intelligible only to computers –Most systems allow multiple access –"Computers can be trusted" –Disasters really mean Disaster 15 16
  • 9. 3/25/2019 9 Where to Start  Establish audit objectives and requirements  Gain executive-level support  Ascertain degree to which management is performing monitoring role  Select appropriate technology solutions  Identify information sources and gain access  Understand business processes and identify key controls and risks  Build audit skill set  Manage and report results Big Data Definition  No single standard definition… “Big Data” is data whose scale, diversity, and complexity require new architecture, techniques, algorithms, and analytics to manage it and extract value and hidden knowledge from it… 18 17 18
  • 10. 3/25/2019 10 How much data?  Google processes 20 PB a day (2008)  Wayback Machine has 3 PB + 100 TB/month (3/2009)  Facebook has 2.5 PB of user data + 15 TB/day (4/2009)  eBay has 6.5 PB of user data + 50 TB/day (5/2009)  CERN’s Large Hydron Collider (LHC) generates 15 PB a year Type of Data  Relational Data (Tables/Transaction/Legacy Data)  Text Data (Web)  Semi-structured Data (XML)  Graph Data Social Network, Semantic Web (RDF), …  Streaming Data You can only scan the data once 19 20
  • 11. 3/25/2019 11 Characteristics of Big Data: 1-Scale (Volume)  Data Volume 44x increase from 2009 2020 From 0.8 zettabytes to 35zb  Data volume is increasing exponentially 21 Exponential increase in collected/generated data Characteristics of Big Data: 2-Complexity (Varity)  Various formats, types, and structures  Text, numerical, images, audio, video, sequences, time series, social media data, multi-dim arrays, etc…  Static data vs. streaming data  A single application can be generating/collecting many types of data 22 To extract knowledge all these types of data need to linked together 21 22
  • 12. 3/25/2019 12 Characteristics of Big Data: 3-Speed (Velocity)  Data is begin generated fast and need to be processed fast  Online Data Analytics  Late decisions  missing opportunities  Examples  E-Promotions: Based on your current location, your purchase history, what you like  send promotions right now for store next to you  Healthcare monitoring: sensors monitoring your activities and body  any abnormal measurements require immediate reaction 23 3 Vs of Big Data  The “BIG” in big data isn’t just about volume 24 23 24
  • 13. 3/25/2019 13 The 4V’s 25 Big Data Usage Transactional •Fraud detection •Financial services / stock markets Sub-Transactional •Weblogs •Social/online media •Telecoms events Non-Transactional •Web pages, blogs etc •Documents •Physical events •Application events •Machine events 25 26
  • 14. 3/25/2019 14 Main Big Data Technologies Hadoop NoSQL Databases Analytic Databases Hadoop •Low cost, reliable scale- out architecture •Distributed computing Proven success in Fortune 500 companies •Exploding interest NoSQL Databases •Huge horizontal scaling and high availability •Highly optimized for retrieval and appending •Types • Document stores • Key Value stores • Graph databases Analytic RDBMS •Optimized for bulk-load and fast aggregate query workloads •Types • Column-oriented • MPP (Massively Parallel Processing) • In-memory Challenges for the Auditor  How to efficiently and cost effectively sustain controls assessment and testing efforts?  How to know on a timely basis when control deficiencies occur?  How to quantify the impact of control deficiencies?  How to improve effectiveness of controls  How to gain assurance over ongoing effectiveness of controls 27 28
  • 15. 3/25/2019 15 Deficiencies of Traditional Approach  Retrospective view analysis frequently occurs long after transaction has taken place, too late for action  Lack of timely visibility into control risks and deficiencies  Alternatively Independently test all transactions for compliance with controls at, or soon after, point at which they occur Not feasible with Big Data Importing the Data 30  Bring a copy to the audit machine Copies can be reanalyzed later if need be Live data moves on You cannot corrupt live data working on a copy  Bringing it into the audit software Depends on the software Most modern systems can import from a variety of data types  What’s where in the data Data layout is critical May automatically extract the data layout from metadata (data about the data) ODBC databases Excel layouts etc. If the structure is flat you will need the file layout from IT (Make sure it’s up-to-date) 29 30
  • 16. 3/25/2019 16 Acquiring the Data 31 If all you can get is the hard copy  Can they print it to a file instead Comma Delimited if possible Fred Smith, Internal Audit,3/13/2011, Individual data fields separated by commas Easy for the software to identify individual fields  If it’s a printout scan it 1 field of 120 characters for example The audit software will allow you to define fields within the 120 characters You can even define different layouts for different rows Verifying the Data 32 You’ve got the data – now what?  Make sure it’s what you asked for Timeliness – does it reflect the right period? Accuracy – is it the live data? Completeness – is it all the data?  It’s embarrassing to come to an adverse conclusion only to find you were given the “wrong” file / layout etc.  Its even worse if you came to a non-adverse conclusion  Check against known  Control totals  Dates  Transactions  Never believe what the first printout tells you 31 32
  • 17. 3/25/2019 17 Challenges for the Auditor  Obtaining appropriate data access  Defining appropriate measurement metrics  Setting appropriate thresholds for exceptions reporting  Developing appropriate metrics to prioritize exceptions  Minimizing impact on systems’ operational performance Source code review –Requires programming skill –Slow –Expensive –Boring –Proves little –May be useful for specialized review 33 34
  • 18. 3/25/2019 18 Confirmation of Results 35 e.g. Debtors certification –Slow –Uncertain –Only shows up errors in your favor –Very labor intensive Test Data 36 –Selected to test both correct data and errors –Require little technical background but Lacks Objectivity –Influenced by what is expected –Assumes program tested is "LIVE" program 35 36
  • 19. 3/25/2019 19 Integrated Test Facility (ITF) 37 –Establishes a "dummy" entity –Process data together with live data –Excluded from live results –Under the auditor's control but –May result in system catastrophe Advantages of an ITF 38 –Little technical training required –Low processing cost –Tests system as it routinely operates –Understood by all involved –Tests manual function as well as computer 37 38
  • 20. 3/25/2019 20 Disadvantages of an ITF 39 –ITF transactions must be removed before they interfere with live totals –High cost if live systems require modification to implement –Test data affects live files - danger of destruction –Difficult to identify all exception conditions –Quantity of test data will be limited Snapshot Technique 40 –A form of transaction trail –Identifiable inputs "tagged" –Trail produced for all processing logic –Useful in high-volume systems –Used extensively by I.S. staff in testing systems 39 40
  • 21. 3/25/2019 21 Sampling 41 –"Liars, Damned Liars and Statistics" –A tool for audit quality control –May be the only tool possible in a high-volume system –Not well understood by auditors –At computer speeds 100% sampling may be practicable May not be desirable Parallel Simulation 42 Uses same input data Uses same files Uses different programs From a different source To produce the same results? 41 42
  • 22. 3/25/2019 22 CAAT Types and Their Usage 43 –Application audit tools are not always CAATs –"Any tangible aid that assists an auditor" Tools to obtain information Tools to evaluate controls Tools to verify controls Automated tools Automated Tools (CAATs) 44 Test Data Generators Flowcharting Packages Specialized Audit Software Generalized Audit Software Utility Programs 43 44
  • 23. 3/25/2019 23 Specialized Audit Software 45 Can accomplish any audit task but –High development and maintenance cost –Require specific I.S. skills –Must be "verified" if not written by the auditor –High degree of obsolescence Generalized Audit Software 46 "Prefabricated" audit tests Each use is a one-off Auditor has direct control Lower development cost Fast to implement  IDEA  ACL  Arbutus Analyzer 45 46
  • 24. 3/25/2019 24 Application of GAS 47 Detective examination of files Verification of processing controls File interrogations Management inquiries Types of Audit Software 48 Program generators Macro languages Audit-specific tools Data downloaders Micro-based software 47 48
  • 25. 3/25/2019 25 Hardware / Software Compatibility (Desirable) 49 –Across manufacturers –Across operating environments –Across machine size –Mainframe / mini / micro There are some about Audit Software Functions 50 File access Arithmetic operations Logic operations Record handling Update Output Statistical Sampling File comparison Graphics 49 50
  • 26. 3/25/2019 26 Determining the Appropriate CAAT 51 Depends on the Audit Objective and selected technique Application Audit Techniques Purposes –1 To verify processing operation –2 To verify the results of processing Common CAAT Problems 52 –Getting the wrong files –Getting the wrong layout –Documentation is out of date –Prejudging results Never believe what the first printout tells you 51 52
  • 27. 3/25/2019 27 In any Application System 53 –Try to identify the controls the user relies on –Documentation is often misleading –Not everything needs to be audited –Program logic mirrors business logic –You can always ask for help Industry-Related Software 54 –Audit procedures commonly available for: Accounts receivable Payroll General ledger Inventory –May be customizable –Industry-related audit software available for: Insurance Health care Financial services 53 54
  • 28. 3/25/2019 28 Industry- Related Drawbacks 55 –Requires Conversion of input to standard package layouts Selection of appropriate parameters A degree of IS skill for conversion –Software itself normally Cost-effective Efficient Customized Audit Software 56 –To run in unique circumstances –To perform unique audit tests –To produce output in unique formats –Expensive to develop –Normally require a high level of IS skills –May not tell you what you think they do –May be the only viable solution 55 56
  • 29. 3/25/2019 29 Information Retrieval Software –Report writers and Query Languages –Not specifically written for auditors –Can perform many common audit routines –Includes Report writers Program generators 4th generation languages Excel as a CAAT 58 57 58
  • 30. 3/25/2019 30 ACL as a CAAT 59 Idea as a CAAT 7 59 60
  • 31. 3/25/2019 31 Questions? Any Questions? Don’t be Shy! AuditNet® and cRisk Academy If you would like forever access to this webinar recording If you are watching the recording, and would like to obtain CPE credit for this webinar Previous AuditNet® webinars are also available on-demand for CPE credit http://criskacademy.com http://ondemand.criskacade my.com Use coupon code: 50OFF for a discount on this webinar for one week 61 62
  • 32. 3/25/2019 32 Data Analysis Webinar Series  March 26 - Analytics Techniques  April 2 - Analysis and Monitoring  April 16 - Data Analytics Software  April 23 - Using the Analysis Thank You! Jim Kaplan AuditNet® LLC 1-800-385-1625 Email:info@auditnet.org www.auditnet.org Richard Cascarino & Associates Cell: +1 970 819 7963 Tel +1 303 747 6087 (Skype Worldwide) Tel: +1 970 367 5429 eMail: rcasc@rcascarino.com Web: http://www.rcascarino.com Skype: Richard.Cascarino Page 64 63 64