SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
7/12/2013
1
THE IMPACT OF TECHNOLOGY
ON STANDARDS AND
DETECTING, PREVENTING AND
INVESTIGATING FRAUD
JIM KAPLAN CIA CFE
PRESIDENT AND FOUNDER
AUDITNET®
A Changing Landscape for Professionals
1© AuditNet® 2013
Agenda
 Introduction
 Technology Then and Now
 Standard Changes and Technology
 Evolution of Professional Networking
 Latest Technology Tools for Fraud Auditors
 Trends and the Future of Audit Technology for
Detecting and Investigating Fraud
2
© AuditNet® 2013
7/12/2013
2
Then and Now
3
© AuditNet® 2013
Auditors and Technology
 Early Adopters
 Innovators (into the new
from Latin
 Interested in new
methods & techniques
 Risk takers
 Forward thinking
 Gen X & Y
 Laggards
 Wait and see
 Cautious
 Hangs back
 Last group to try or
adopt a new product
 Dislike change
4
© AuditNet® 2013
7/12/2013
3
Standards Evolution
5
 1954 to the mid-1960s, the auditing profession was still auditing
around the computer – Why?
 1968, the American Institute of Certified Public Accountants (AICPA)
had the Big Eight (now the Big Four) accounting firms participate in
the development of EDP auditing.
 December 1974 SAP 3 The Effects of EDP on the Auditor's Study
and Evaluation of Internal Control
 1977 Electronic Data Processing Auditors Association (EDPAA)
published Control Objectives
 July 1984 SAS 48 The Effects of Computer Processing on the Audit
of Financial Statements
 June 2001 SAS 94, The Effect of Information Technology on the
Auditor’s Consideration of Internal Control in a Financial Statement
Audit.
© AuditNet® 2013
Standards and Regulatory Evolution
6
 SEC, Final Rule: Management’s Reports on Internal Control Over
Financial Reporting and Certification of Disclosure in Exchange Act
Periodic Reports
 PCAOB Auditing Standard No. 2, An Audit of Internal Control Over
Financial Reporting Performed In Conjunction With an Audit of
Financial Statements
 SAS 99, Consideration of Fraud in a Financial Statement Audit
 SAS 99 Exhibit, Management Antifraud Programs and Controls
 Committee of Sponsoring Organizations of the Treadway
Commission, Internal Control—Integrated Framework
 United States Sentencing Commission, Guidelines Manual
 2009 Internal Auditing and Fraud and GTAG 13: Fraud Prevention
and Detection in an Automated World
© AuditNet® 2013
7/12/2013
4
Computers, Auditors and CAATTs
 The Evolution of CAATTs 80’s
 Around
 Through
 With
 EDP/IT Auditors
 Mainframe
 Audit Software 90’s
 Data extraction and analysis
 IT and non IT Auditors
 Windows
 The Millenium
 Software for all phases (planning, fieldwork, GRC)
 Cloud computing
7
© AuditNet® 2013
Impact of Technology
 Computers and networks provide most of the
information needed for auditing
 Computer crime is increasing as fraudsters see
value in information as well as financial assets
 Auditors and fraud examiners must use the
computer as an auditing tool
 Auditors and fraud examiners must also use the
computer for audit administration
8
© AuditNet® 2013
7/12/2013
5
Impact of Technology
 What I did in my youth is hundreds of times
easier today. Technology breeds crime
9
© AuditNet® 2013
Impact of New Technology on the
Profession
 Professional Standards for
Certified Fraud Examiners
 IIA Professional Standards Fraud
and Technology
10
© AuditNet® 2013
7/12/2013
6
Certifications for Fraud Auditors
11
Initials Description Organization
CITP Certified Information Technology Professional (CITP AICPA
CFE Certified Fraud Examiner ACFE
CFF Certified in Financial Forensics AICPA
CAMS Certified Anti-Money Laundering Specialist ACALS
CFFA Certified Forensic Financial Analyst (NACVA)
CIFI Certified Insurance Fraud Investigator IASIU
CBCO Certified Bank Compliance Officer BAI
CISA Certified Information Systems Auditor ISACA
CIA Certified Internal Auditors CIA
CPA Certified Public Accountant AICPA
© AuditNet® 2013
New Technologies and their Impact
 Mobile computing
 The Cloud or Internet based services
 SaaS (application based)
 PaaS (end to end SDLC)
 IaaS (servers, storage, network)
12
© AuditNet® 2013
7/12/2013
7
Social Media
 Social Media Defined
 The good the bad
and the ugly
 What is the primary
risk?
13
© AuditNet® 2013
Technology as an Enabler
There is a wide array of specialized tools to
support and enhance the entire spectrum of
internal audit processes … for the most part
(auditors) are not taking advantage of them
Not surprisingly, survey participants predict that
technology will affect internal audit roles and
responsibilities more than any other business
trend.
PwC 2010 Study on the State of the internal audit profession
14
© AuditNet® 2013
7/12/2013
8
Audit Software
15
© AuditNet® 2013
Categories of Audit Software Technology
Automated
Issues
Tracking
Electronic
Work Papers
Risk
Assessment
Continuous
Controls
Monitoring
Anti Fraud
Software
GRC
Audit
Management
Software
Audit
Resource
Scheduling
Data
Analytics
16
© AuditNet® 2013
7/12/2013
9
Data Analysis for Auditors and CFE’s
Although internal auditors have been doing data analysis for
more than 25 years, it has only recently started to become
standard practice.
By our nature, most accountants and auditors are inclined to
stick with what has worked in the past, rather than reach
outside our comfort zone for an alternative that could help
us accomplish more.
Do you reach outside your comfort zone?
17
© AuditNet® 2013
New Tools New Approach
Technology advances require a change in the approach for
detecting and investigating fraud
Fraud risk analysis is now a required part of an auditors
responsibilities
Proactive approach to detecting fraud
Identifying risks early using audit software to detect
anomalies is no longer optional
Data analytic KSA’s now a basic facet of an auditor’s toolbox
18
© AuditNet® 2013
7/12/2013
10
Obstacles to Implementation
 Failure to plan for use
 Lack of an FRA methodology
 Skill set gap -
 Department size
 Cost implication
 Complexity of the software
 Resistance in training auditors
 Failure of software to meet audit departments needs
19
© AuditNet® 2013
Heard on the Street
Technology Initiatives considered having the most
impact (2012 AICPA Top Technology Issues)
1.Information security
2.Remote access
3.Control and use of mobile devices
4.Business process improvement with technology
5.Data retention policies and structure
6.Privacy policies and compliance
7.Staff and management training
8.Spreadsheet management
9.Overall data proliferation and control
10.Portals (vendor and client/customer)
20
© AuditNet® 2013
7/12/2013
11
New Tools for Fraud Examiners
21
© AuditNet® 2013
New Tools
 Sept, 2008….
 Any device, Any time, Any
where was born
 Users not interested in
security, they want to trust,
not to be trusted
 Any unprotected device
connected to both the
Internet & and company
LAN poses a security risk
22
© AuditNet® 2013
7/12/2013
12
Impact of Technology on Detecting
Fraud
 Proactive Fraud Detection
 Computer-aided fraud detection skills
 Data Extraction
 Scripting
 Analyzing Data
 Automation
 Data is the key to detecting fraud with technology
 Benford’s Law analysis using technology
 Continuous monitoring software suites
23
© AuditNet® 2013
Impact of Technology on Detecting
Fraud
 Digital Information Explosion (DIE) has created
greater opportunities for fraud examiners and
auditors.
 Asset recovery
 Anomalies in data through 100% analysis
 Examining digital information on mobile devices
 Using social media to profile fraudsters
 Social Network Analysis (SNA)
 Using data analytics to detect property and casualty
claims fraud
24
© AuditNet® 2013
7/12/2013
13
Audit Apps for iPhones/iPads
25
© AuditNet® 2013
Imagine the Possibilities
 Access your computer from remote locations
 Collaborate using tools from the road
 Access audit programs, work papers and more
from your mobile device
 Join Anti-Fraud Webinars and Webcasts for
training
 Conduct or participate in virtual meetings with
staff, clients etc.
26
© AuditNet® 2013
7/12/2013
14
Trends and their Impact
 Mobile devices and wireless computing
 Smart devices and malware
 Cloud sourcing and computing – security, governance
and compliance
 Social media platform for communications
 Continuous risk and control assessment
 Reporting to the Board using SOTA technology
27
© AuditNet® 2013
Skill Set for Future Auditors
 Multi-disciplinary less accountants more
business oriented
 Critical thinking skills
 Strong communication skills
 Audit Technology oriented
28
© AuditNet® 2013
7/12/2013
15
The Impact of Technology Observations
Not surprisingly, survey participants predict that
technology will affect internal audit roles and
responsibilities more than any other business
trend.
High-performing internal audit functions maximize
the use of technology to enhance the efficiency,
effectiveness, and quality of operations.
PwC 2012 Study on the State of the internal audit profession
29
© AuditNet® 2013
AuditNet® Survey - 2012 State of Technology
Use by Auditors
Profile of Over 1,500 Responses
• 45% 5 or less auditors
• Technology tools used – mostly data analytics and
EWP
• Technology tools least used – monitoring (continuous
audit and fraud), GRC, risk compliance
• Only 17% feel that their auditors are technology
proficient
• Technology training primarily OJT
• 35% maintain an inventory of audit technology
tools
• More than half (54%) rated their department at the
informal use level (ad hoc or none at all) for audit
technology
• Less than 4% rated their department at the highest
maturity level
30
© AuditNet® 2013
7/12/2013
16
AuditNet® 10 Point Action Plan for Integrating
Technology in Audit
1. Conduct an inventory of audit technology tools
2. Provide training for all staff in use of audit
technology
3. Measure staff technology KSA
4. Build a business case for audit technology
5. Work with IT and Senior Management on cost
6. Hire auditors with technology skills
7. Find a technology champion and influencer
8. Establish an audit technology assessment
benchmark and update annually
9. Require the use of technology for all audit and
administrative tasks
10. Develop a succession plan so that audit software
does not become shelfware
31
© AuditNet® 2013
Strategic Fraud Detection Approach
32
© AuditNet® 2013
Source: Strategic Fraud Detection: A Technology-Based Model
Conan C. Albrecht W. Steve Albrecht
7/12/2013
17
Future Predictions
 Standards will mandate use of technology tools for
audit
 New generation of auditors must have the KSA to
utilize technology
 If auditors and audit departments do not adapt to
new technology they risk outsourcing
 Social networking will evolve to professional
networking
 Tools will become more intuitive
 Knowledge hubs for audit tool, techniques and
resources will consolidate and merge
33
© AuditNet® 2013
Audit Programs and Guides
 Auditor’s Guide to Cloud Computing - Security
Considerations.xls
 Cloud Matrix_Benefits & Risks.xls
 AuditNet® Guide to Social Networking
 AuditNet® Guide to Wireless Security
 Business Continuity Planning – A Diagnostic Tool
 Forensic Document Examination
 Data Analytics Enabled Audit Programs for Key Business
Processes
 AuditNet® is working to provide tools and resources to
keep pace with new technology!
34
© AuditNet® 2013
7/12/2013
18
Fraud Examiner Technology Resources
 ACFE Seminars, Books and Training
 Introduction to Digital Forensics
 Using Data Analytics to Detect Fraud
 Investigating on the Internet
 FraudResourceNet.com online training
 Audit Software – ACL, IDEA, Excel, ActiveData,
TopCAATs
 AuditNet® is working to provide tools and resources to
keep pace with new technology!
35
© AuditNet® 2013
Conclusion
 I hope that I have provided you
with some useful information
that will stimulate your thought
processes!
 Any questions?
36
© AuditNet® 2013
7/12/2013
19
Contact Information
If you haven’t been to AuditNet recently please
visit and see our new design and interface
Jim Kaplan CIA, CFE editor@auditnet.org
http://www.auditnet.org
37
© AuditNet® 2013

Weitere ähnliche Inhalte

Was ist angesagt?

Lexcomply - Compliance Management Solutions
Lexcomply - Compliance Management SolutionsLexcomply - Compliance Management Solutions
Lexcomply - Compliance Management SolutionsLexComply
 
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringLeveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringJim Kaplan CIA CFE
 
2013 audit net guide to audit planning
2013 audit net guide to audit planning2013 audit net guide to audit planning
2013 audit net guide to audit planningJim Kaplan CIA CFE
 
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Jim Kaplan CIA CFE
 
20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv220150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2Jim Kaplan CIA CFE
 
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...Jim Kaplan CIA CFE
 
ITAM Best Practices - Knowledge14
ITAM Best Practices - Knowledge14ITAM Best Practices - Knowledge14
ITAM Best Practices - Knowledge14Martin Thompson
 
IT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in HealthcareIT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in HealthcareCA Technologies
 
Internal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & CultureInternal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & CultureJim Kaplan CIA CFE
 
Iso 22301 la training
Iso 22301 la trainingIso 22301 la training
Iso 22301 la trainingInfosecTrain
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Businessshira koper
 
Benefits of Software Asset Management
Benefits of Software Asset ManagementBenefits of Software Asset Management
Benefits of Software Asset ManagementIskandar Ahmat
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimePrecisely
 
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016Martin Thompson
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services PresentationScott Gombar
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesEnterprise Management Associates
 
SOC 2: Build Trust and Confidence
SOC 2: Build Trust and ConfidenceSOC 2: Build Trust and Confidence
SOC 2: Build Trust and ConfidenceSchellman & Company
 

Was ist angesagt? (20)

Lexcomply - Compliance Management Solutions
Lexcomply - Compliance Management SolutionsLexcomply - Compliance Management Solutions
Lexcomply - Compliance Management Solutions
 
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringLeveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
 
2013 audit net guide to audit planning
2013 audit net guide to audit planning2013 audit net guide to audit planning
2013 audit net guide to audit planning
 
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
 
20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv220150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2
 
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
 
ITAM Best Practices - Knowledge14
ITAM Best Practices - Knowledge14ITAM Best Practices - Knowledge14
ITAM Best Practices - Knowledge14
 
IT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in HealthcareIT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in Healthcare
 
Internal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & CultureInternal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & Culture
 
Iso 22301 la training
Iso 22301 la trainingIso 22301 la training
Iso 22301 la training
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
 
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity CurveAsset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
 
Benefits of Software Asset Management
Benefits of Software Asset ManagementBenefits of Software Asset Management
Benefits of Software Asset Management
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and Downtime
 
SOC 2 and You
SOC 2 and YouSOC 2 and You
SOC 2 and You
 
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
 
SOC 2: Build Trust and Confidence
SOC 2: Build Trust and ConfidenceSOC 2: Build Trust and Confidence
SOC 2: Build Trust and Confidence
 

Ähnlich wie Acfe williamsburg 2013 jmk

Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deckSusanna Harper
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
Project quality management
Project quality management Project quality management
Project quality management MweeneMweemba1
 
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...IRJET Journal
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryCompTIA
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Clouditalia Telecomunicazioni
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryCompTIA
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Les technologies disruptives de demain | une étude de KPMG
Les technologies disruptives de demain | une étude de KPMGLes technologies disruptives de demain | une étude de KPMG
Les technologies disruptives de demain | une étude de KPMGOpenYnnov
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefVisal Thach
 

Ähnlich wie Acfe williamsburg 2013 jmk (20)

Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Project quality management
Project quality management Project quality management
Project quality management
 
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
A Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception TechnologyA Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception Technology
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Les technologies disruptives de demain | une étude de KPMG
Les technologies disruptives de demain | une étude de KPMGLes technologies disruptives de demain | une étude de KPMG
Les technologies disruptives de demain | une étude de KPMG
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 

Mehr von Jim Kaplan CIA CFE

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsJim Kaplan CIA CFE
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) Jim Kaplan CIA CFE
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Jim Kaplan CIA CFE
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Jim Kaplan CIA CFE
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10Jim Kaplan CIA CFE
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal AuditorJim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 

Mehr von Jim Kaplan CIA CFE (20)

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 

Kürzlich hochgeladen

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Acfe williamsburg 2013 jmk

  • 1. 7/12/2013 1 THE IMPACT OF TECHNOLOGY ON STANDARDS AND DETECTING, PREVENTING AND INVESTIGATING FRAUD JIM KAPLAN CIA CFE PRESIDENT AND FOUNDER AUDITNET® A Changing Landscape for Professionals 1© AuditNet® 2013 Agenda  Introduction  Technology Then and Now  Standard Changes and Technology  Evolution of Professional Networking  Latest Technology Tools for Fraud Auditors  Trends and the Future of Audit Technology for Detecting and Investigating Fraud 2 © AuditNet® 2013
  • 2. 7/12/2013 2 Then and Now 3 © AuditNet® 2013 Auditors and Technology  Early Adopters  Innovators (into the new from Latin  Interested in new methods & techniques  Risk takers  Forward thinking  Gen X & Y  Laggards  Wait and see  Cautious  Hangs back  Last group to try or adopt a new product  Dislike change 4 © AuditNet® 2013
  • 3. 7/12/2013 3 Standards Evolution 5  1954 to the mid-1960s, the auditing profession was still auditing around the computer – Why?  1968, the American Institute of Certified Public Accountants (AICPA) had the Big Eight (now the Big Four) accounting firms participate in the development of EDP auditing.  December 1974 SAP 3 The Effects of EDP on the Auditor's Study and Evaluation of Internal Control  1977 Electronic Data Processing Auditors Association (EDPAA) published Control Objectives  July 1984 SAS 48 The Effects of Computer Processing on the Audit of Financial Statements  June 2001 SAS 94, The Effect of Information Technology on the Auditor’s Consideration of Internal Control in a Financial Statement Audit. © AuditNet® 2013 Standards and Regulatory Evolution 6  SEC, Final Rule: Management’s Reports on Internal Control Over Financial Reporting and Certification of Disclosure in Exchange Act Periodic Reports  PCAOB Auditing Standard No. 2, An Audit of Internal Control Over Financial Reporting Performed In Conjunction With an Audit of Financial Statements  SAS 99, Consideration of Fraud in a Financial Statement Audit  SAS 99 Exhibit, Management Antifraud Programs and Controls  Committee of Sponsoring Organizations of the Treadway Commission, Internal Control—Integrated Framework  United States Sentencing Commission, Guidelines Manual  2009 Internal Auditing and Fraud and GTAG 13: Fraud Prevention and Detection in an Automated World © AuditNet® 2013
  • 4. 7/12/2013 4 Computers, Auditors and CAATTs  The Evolution of CAATTs 80’s  Around  Through  With  EDP/IT Auditors  Mainframe  Audit Software 90’s  Data extraction and analysis  IT and non IT Auditors  Windows  The Millenium  Software for all phases (planning, fieldwork, GRC)  Cloud computing 7 © AuditNet® 2013 Impact of Technology  Computers and networks provide most of the information needed for auditing  Computer crime is increasing as fraudsters see value in information as well as financial assets  Auditors and fraud examiners must use the computer as an auditing tool  Auditors and fraud examiners must also use the computer for audit administration 8 © AuditNet® 2013
  • 5. 7/12/2013 5 Impact of Technology  What I did in my youth is hundreds of times easier today. Technology breeds crime 9 © AuditNet® 2013 Impact of New Technology on the Profession  Professional Standards for Certified Fraud Examiners  IIA Professional Standards Fraud and Technology 10 © AuditNet® 2013
  • 6. 7/12/2013 6 Certifications for Fraud Auditors 11 Initials Description Organization CITP Certified Information Technology Professional (CITP AICPA CFE Certified Fraud Examiner ACFE CFF Certified in Financial Forensics AICPA CAMS Certified Anti-Money Laundering Specialist ACALS CFFA Certified Forensic Financial Analyst (NACVA) CIFI Certified Insurance Fraud Investigator IASIU CBCO Certified Bank Compliance Officer BAI CISA Certified Information Systems Auditor ISACA CIA Certified Internal Auditors CIA CPA Certified Public Accountant AICPA © AuditNet® 2013 New Technologies and their Impact  Mobile computing  The Cloud or Internet based services  SaaS (application based)  PaaS (end to end SDLC)  IaaS (servers, storage, network) 12 © AuditNet® 2013
  • 7. 7/12/2013 7 Social Media  Social Media Defined  The good the bad and the ugly  What is the primary risk? 13 © AuditNet® 2013 Technology as an Enabler There is a wide array of specialized tools to support and enhance the entire spectrum of internal audit processes … for the most part (auditors) are not taking advantage of them Not surprisingly, survey participants predict that technology will affect internal audit roles and responsibilities more than any other business trend. PwC 2010 Study on the State of the internal audit profession 14 © AuditNet® 2013
  • 8. 7/12/2013 8 Audit Software 15 © AuditNet® 2013 Categories of Audit Software Technology Automated Issues Tracking Electronic Work Papers Risk Assessment Continuous Controls Monitoring Anti Fraud Software GRC Audit Management Software Audit Resource Scheduling Data Analytics 16 © AuditNet® 2013
  • 9. 7/12/2013 9 Data Analysis for Auditors and CFE’s Although internal auditors have been doing data analysis for more than 25 years, it has only recently started to become standard practice. By our nature, most accountants and auditors are inclined to stick with what has worked in the past, rather than reach outside our comfort zone for an alternative that could help us accomplish more. Do you reach outside your comfort zone? 17 © AuditNet® 2013 New Tools New Approach Technology advances require a change in the approach for detecting and investigating fraud Fraud risk analysis is now a required part of an auditors responsibilities Proactive approach to detecting fraud Identifying risks early using audit software to detect anomalies is no longer optional Data analytic KSA’s now a basic facet of an auditor’s toolbox 18 © AuditNet® 2013
  • 10. 7/12/2013 10 Obstacles to Implementation  Failure to plan for use  Lack of an FRA methodology  Skill set gap -  Department size  Cost implication  Complexity of the software  Resistance in training auditors  Failure of software to meet audit departments needs 19 © AuditNet® 2013 Heard on the Street Technology Initiatives considered having the most impact (2012 AICPA Top Technology Issues) 1.Information security 2.Remote access 3.Control and use of mobile devices 4.Business process improvement with technology 5.Data retention policies and structure 6.Privacy policies and compliance 7.Staff and management training 8.Spreadsheet management 9.Overall data proliferation and control 10.Portals (vendor and client/customer) 20 © AuditNet® 2013
  • 11. 7/12/2013 11 New Tools for Fraud Examiners 21 © AuditNet® 2013 New Tools  Sept, 2008….  Any device, Any time, Any where was born  Users not interested in security, they want to trust, not to be trusted  Any unprotected device connected to both the Internet & and company LAN poses a security risk 22 © AuditNet® 2013
  • 12. 7/12/2013 12 Impact of Technology on Detecting Fraud  Proactive Fraud Detection  Computer-aided fraud detection skills  Data Extraction  Scripting  Analyzing Data  Automation  Data is the key to detecting fraud with technology  Benford’s Law analysis using technology  Continuous monitoring software suites 23 © AuditNet® 2013 Impact of Technology on Detecting Fraud  Digital Information Explosion (DIE) has created greater opportunities for fraud examiners and auditors.  Asset recovery  Anomalies in data through 100% analysis  Examining digital information on mobile devices  Using social media to profile fraudsters  Social Network Analysis (SNA)  Using data analytics to detect property and casualty claims fraud 24 © AuditNet® 2013
  • 13. 7/12/2013 13 Audit Apps for iPhones/iPads 25 © AuditNet® 2013 Imagine the Possibilities  Access your computer from remote locations  Collaborate using tools from the road  Access audit programs, work papers and more from your mobile device  Join Anti-Fraud Webinars and Webcasts for training  Conduct or participate in virtual meetings with staff, clients etc. 26 © AuditNet® 2013
  • 14. 7/12/2013 14 Trends and their Impact  Mobile devices and wireless computing  Smart devices and malware  Cloud sourcing and computing – security, governance and compliance  Social media platform for communications  Continuous risk and control assessment  Reporting to the Board using SOTA technology 27 © AuditNet® 2013 Skill Set for Future Auditors  Multi-disciplinary less accountants more business oriented  Critical thinking skills  Strong communication skills  Audit Technology oriented 28 © AuditNet® 2013
  • 15. 7/12/2013 15 The Impact of Technology Observations Not surprisingly, survey participants predict that technology will affect internal audit roles and responsibilities more than any other business trend. High-performing internal audit functions maximize the use of technology to enhance the efficiency, effectiveness, and quality of operations. PwC 2012 Study on the State of the internal audit profession 29 © AuditNet® 2013 AuditNet® Survey - 2012 State of Technology Use by Auditors Profile of Over 1,500 Responses • 45% 5 or less auditors • Technology tools used – mostly data analytics and EWP • Technology tools least used – monitoring (continuous audit and fraud), GRC, risk compliance • Only 17% feel that their auditors are technology proficient • Technology training primarily OJT • 35% maintain an inventory of audit technology tools • More than half (54%) rated their department at the informal use level (ad hoc or none at all) for audit technology • Less than 4% rated their department at the highest maturity level 30 © AuditNet® 2013
  • 16. 7/12/2013 16 AuditNet® 10 Point Action Plan for Integrating Technology in Audit 1. Conduct an inventory of audit technology tools 2. Provide training for all staff in use of audit technology 3. Measure staff technology KSA 4. Build a business case for audit technology 5. Work with IT and Senior Management on cost 6. Hire auditors with technology skills 7. Find a technology champion and influencer 8. Establish an audit technology assessment benchmark and update annually 9. Require the use of technology for all audit and administrative tasks 10. Develop a succession plan so that audit software does not become shelfware 31 © AuditNet® 2013 Strategic Fraud Detection Approach 32 © AuditNet® 2013 Source: Strategic Fraud Detection: A Technology-Based Model Conan C. Albrecht W. Steve Albrecht
  • 17. 7/12/2013 17 Future Predictions  Standards will mandate use of technology tools for audit  New generation of auditors must have the KSA to utilize technology  If auditors and audit departments do not adapt to new technology they risk outsourcing  Social networking will evolve to professional networking  Tools will become more intuitive  Knowledge hubs for audit tool, techniques and resources will consolidate and merge 33 © AuditNet® 2013 Audit Programs and Guides  Auditor’s Guide to Cloud Computing - Security Considerations.xls  Cloud Matrix_Benefits & Risks.xls  AuditNet® Guide to Social Networking  AuditNet® Guide to Wireless Security  Business Continuity Planning – A Diagnostic Tool  Forensic Document Examination  Data Analytics Enabled Audit Programs for Key Business Processes  AuditNet® is working to provide tools and resources to keep pace with new technology! 34 © AuditNet® 2013
  • 18. 7/12/2013 18 Fraud Examiner Technology Resources  ACFE Seminars, Books and Training  Introduction to Digital Forensics  Using Data Analytics to Detect Fraud  Investigating on the Internet  FraudResourceNet.com online training  Audit Software – ACL, IDEA, Excel, ActiveData, TopCAATs  AuditNet® is working to provide tools and resources to keep pace with new technology! 35 © AuditNet® 2013 Conclusion  I hope that I have provided you with some useful information that will stimulate your thought processes!  Any questions? 36 © AuditNet® 2013
  • 19. 7/12/2013 19 Contact Information If you haven’t been to AuditNet recently please visit and see our new design and interface Jim Kaplan CIA, CFE editor@auditnet.org http://www.auditnet.org 37 © AuditNet® 2013