SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Continuous Auditing TianliXie July 3rd, 2011 Section 1
What is Continuous Auditing (CA)?
ISACA: “the collection of audit evidence, by an auditor, on systems and transactions, on a continuous basis through a period” External Auditors: electronic audit evidence gathering process to render an opinion on fair presentation of financial statements (Rezaee et al) Internal Auditors: process to evaluate business processes and assess management’s monitoring process of the control and disclosure environment (Rezaeeet al)
Continuous Monitoring (CM) A tool for management  Automatic and continuous monitoring of: compliance of business processes and transactions against company rules, policies and objectives  effectiveness of internal controls Some techniques/procedures are similar CA and CM complement each other
CA’s advantages over traditional external auditing
Traditional  CA  Programming code:  @IF( SERV_YEARS  >= 5 .AND.   DAYS_ABSENT_ACTUAL   <= 30, 0.2* MON_SAL_DOLLAR ) Purchase Listing Item A $5,000  Item B $5,000    DL
Demand for CA
Demand for CA SOX Growing complexity of business transactions Trend towards continuous reporting (ie. MD&A, XBRL) Wide adoption of ERP systems and data warehouses More responsibilities for fraud detection
CA Implementation
1. Business case cost benefit analysis Hard to justify using ROI alone Recommended to develop specific cases where CA is value adding and cost saving
2. Client Pre-requisite Good control environment Good data integrity Understanding of company system and controls in place Senior executive and BOD support
3. Adoption Strategy prioritize the risk areas under each business process ROI, degree of risk and costs and benefits start with a less complex, high return and low cost project quick realization of benefits  gain support 4. Planning  scope and objectives resources and timeline  roles and responsibilities
5. Design and implementation establish the business rules, controls and analytical procedure benchmarks frequency of testing follow up procedures  6. Monitoring and communication results and benefits reported to stakeholders
CA software
Barriers to CA
Barriers to CA Cost constraint Hard to demonstrate benefits using ROI Lack of system integration (decentralized) Lack of data integrity and control environment Staff resistance
Current CA adoption and future outlook
Continuous auditing
Continuous auditing
Continuous auditing

Weitere ähnliche Inhalte

Was ist angesagt?

Analytical procedures presentation
Analytical procedures presentationAnalytical procedures presentation
Analytical procedures presentation
Darryl Woolley
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditing
Hardik Shah
 

Was ist angesagt? (20)

Audit reporting ISA 700
Audit reporting ISA 700Audit reporting ISA 700
Audit reporting ISA 700
 
Audit working papers
Audit working papersAudit working papers
Audit working papers
 
Auditing history
Auditing historyAuditing history
Auditing history
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Financial reporting
Financial reportingFinancial reporting
Financial reporting
 
Sarbanes Oxley Act, 2002
Sarbanes Oxley Act, 2002Sarbanes Oxley Act, 2002
Sarbanes Oxley Act, 2002
 
Chapter 2 -Rules and regulation- Audit & Assurance (F8)
Chapter 2 -Rules and regulation- Audit & Assurance (F8)Chapter 2 -Rules and regulation- Audit & Assurance (F8)
Chapter 2 -Rules and regulation- Audit & Assurance (F8)
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
Coso internal control integrated framework
Coso internal control   integrated frameworkCoso internal control   integrated framework
Coso internal control integrated framework
 
Audit presentation
Audit presentationAudit presentation
Audit presentation
 
Analytical procedures presentation
Analytical procedures presentationAnalytical procedures presentation
Analytical procedures presentation
 
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
 
AUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPT
AUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPTAUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPT
AUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPT
 
Chapter 2 internal control
Chapter 2 internal controlChapter 2 internal control
Chapter 2 internal control
 
Audit Evidence Presentation
Audit Evidence PresentationAudit Evidence Presentation
Audit Evidence Presentation
 
Internal audit
Internal auditInternal audit
Internal audit
 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self Assessment
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditing
 
Coso framework
Coso frameworkCoso framework
Coso framework
 
CAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesCAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit Techniques
 

Andere mochten auch

Type of auditing
Type of auditingType of auditing
Type of auditing
Dharmik
 
Verification audit
Verification auditVerification audit
Verification audit
Johan Hoberg
 
Comparitive analysis Companies Act and Companies Bill '10
Comparitive analysis  Companies Act and Companies Bill '10Comparitive analysis  Companies Act and Companies Bill '10
Comparitive analysis Companies Act and Companies Bill '10
Kirthi G
 
Auditing-definition & objective of auditing
Auditing-definition & objective of auditingAuditing-definition & objective of auditing
Auditing-definition & objective of auditing
Ravi kumar
 
Valuation of fixed assets
Valuation of fixed assetsValuation of fixed assets
Valuation of fixed assets
Kapil Chhabra
 
Bba ii auditing 12
Bba ii auditing 12Bba ii auditing 12
Bba ii auditing 12
nsbhoyar
 
Internal control system
Internal control systemInternal control system
Internal control system
Hina Varshney
 

Andere mochten auch (20)

Unit 2 Types of Auditing
Unit 2 Types of AuditingUnit 2 Types of Auditing
Unit 2 Types of Auditing
 
Type of auditing
Type of auditingType of auditing
Type of auditing
 
Verification audit
Verification auditVerification audit
Verification audit
 
Internal check
Internal checkInternal check
Internal check
 
Verification and valuation of assets and liabilities
Verification and valuation of assets and liabilitiesVerification and valuation of assets and liabilities
Verification and valuation of assets and liabilities
 
Verification of Assets
Verification of AssetsVerification of Assets
Verification of Assets
 
Comparitive analysis Companies Act and Companies Bill '10
Comparitive analysis  Companies Act and Companies Bill '10Comparitive analysis  Companies Act and Companies Bill '10
Comparitive analysis Companies Act and Companies Bill '10
 
Verification of Assets
Verification of AssetsVerification of Assets
Verification of Assets
 
Auditing-definition & objective of auditing
Auditing-definition & objective of auditingAuditing-definition & objective of auditing
Auditing-definition & objective of auditing
 
Valuation of fixed assets
Valuation of fixed assetsValuation of fixed assets
Valuation of fixed assets
 
Types of audit
Types of auditTypes of audit
Types of audit
 
The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention
 
Presentation on vouching and verification
Presentation on vouching and verificationPresentation on vouching and verification
Presentation on vouching and verification
 
Bba ii auditing 12
Bba ii auditing 12Bba ii auditing 12
Bba ii auditing 12
 
Unit 1 Introduction to Auditing
Unit 1 Introduction to AuditingUnit 1 Introduction to Auditing
Unit 1 Introduction to Auditing
 
Company audit
Company auditCompany audit
Company audit
 
Audit programme
Audit programmeAudit programme
Audit programme
 
Company audit
Company auditCompany audit
Company audit
 
Chapter 13 ( valuation)
Chapter 13 ( valuation)Chapter 13 ( valuation)
Chapter 13 ( valuation)
 
Internal control system
Internal control systemInternal control system
Internal control system
 

Ähnlich wie Continuous auditing

Continuous Auditing
Continuous AuditingContinuous Auditing
Continuous Auditing
Tianli Xie
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
NCTechSymposium
 
Information Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessInformation Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your Business
Laura Perry
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
mbmobile
 
Telelogic Dashboard Presentation
Telelogic Dashboard PresentationTelelogic Dashboard Presentation
Telelogic Dashboard Presentation
Bill Duncan
 
It governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungIt governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yung
norsaidatul_akmar
 
Audit software highlights
Audit software highlightsAudit software highlights
Audit software highlights
sonisjs
 

Ähnlich wie Continuous auditing (20)

Continuous Auditing
Continuous AuditingContinuous Auditing
Continuous Auditing
 
Security audit
Security auditSecurity audit
Security audit
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.ppt
 
Measuring and Improving MP1.ppt
Measuring and Improving MP1.pptMeasuring and Improving MP1.ppt
Measuring and Improving MP1.ppt
 
It Governance Methodology Cox
It Governance Methodology CoxIt Governance Methodology Cox
It Governance Methodology Cox
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
An IT Governance program
An IT Governance programAn IT Governance program
An IT Governance program
 
Information Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessInformation Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your Business
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
1auditconcepts
1auditconcepts1auditconcepts
1auditconcepts
 
Agile in a highly regulated organization: part 2 2014
Agile in a highly regulated organization: part 2 2014Agile in a highly regulated organization: part 2 2014
Agile in a highly regulated organization: part 2 2014
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Telelogic Dashboard Presentation
Telelogic Dashboard PresentationTelelogic Dashboard Presentation
Telelogic Dashboard Presentation
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
 
It governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungIt governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yung
 
Government and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP SystemsGovernment and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP Systems
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
Audit software highlights
Audit software highlightsAudit software highlights
Audit software highlights
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Continuous auditing

  • 1. Continuous Auditing TianliXie July 3rd, 2011 Section 1
  • 2. What is Continuous Auditing (CA)?
  • 3. ISACA: “the collection of audit evidence, by an auditor, on systems and transactions, on a continuous basis through a period” External Auditors: electronic audit evidence gathering process to render an opinion on fair presentation of financial statements (Rezaee et al) Internal Auditors: process to evaluate business processes and assess management’s monitoring process of the control and disclosure environment (Rezaeeet al)
  • 4.
  • 5. Continuous Monitoring (CM) A tool for management Automatic and continuous monitoring of: compliance of business processes and transactions against company rules, policies and objectives effectiveness of internal controls Some techniques/procedures are similar CA and CM complement each other
  • 6. CA’s advantages over traditional external auditing
  • 7.
  • 8. Traditional CA Programming code: @IF( SERV_YEARS >= 5 .AND. DAYS_ABSENT_ACTUAL <= 30, 0.2* MON_SAL_DOLLAR ) Purchase Listing Item A $5,000 Item B $5,000 DL
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17. Demand for CA SOX Growing complexity of business transactions Trend towards continuous reporting (ie. MD&A, XBRL) Wide adoption of ERP systems and data warehouses More responsibilities for fraud detection
  • 19. 1. Business case cost benefit analysis Hard to justify using ROI alone Recommended to develop specific cases where CA is value adding and cost saving
  • 20. 2. Client Pre-requisite Good control environment Good data integrity Understanding of company system and controls in place Senior executive and BOD support
  • 21. 3. Adoption Strategy prioritize the risk areas under each business process ROI, degree of risk and costs and benefits start with a less complex, high return and low cost project quick realization of benefits  gain support 4. Planning scope and objectives resources and timeline roles and responsibilities
  • 22. 5. Design and implementation establish the business rules, controls and analytical procedure benchmarks frequency of testing follow up procedures 6. Monitoring and communication results and benefits reported to stakeholders
  • 25. Barriers to CA Cost constraint Hard to demonstrate benefits using ROI Lack of system integration (decentralized) Lack of data integrity and control environment Staff resistance
  • 26. Current CA adoption and future outlook