30
Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic Advisory Group IT Governance Adviser Protiviti Audit Technology Conference London, 20/21 November 2007

Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

  • Upload
    vandung

  • View
    217

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Chairman’s Introduction and Keynote

Paul WilliamsChair ISACA/ITGI Strategic Advisory Group

IT Governance Adviser Protiviti

Audit Technology ConferenceLondon, 20/21 November 2007

Page 2: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Audit Technology Evolution

Page 3: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic
Page 4: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

An Historical Perspective

‘The modern computer can become an extremely capable assistant to both the general auditor and the

EDP auditor, by performing the repetitive, boring, labour intensive work of an audit with phenomenal speed and accuracy. With the introduction of computer languages that are easier to use for the non-programmer layman, the power of this assistant is available to anyone willing

to invest a modest amount of time to learn to communicate with the computer in a very structured,

non-flowery language.’

Joseph Pleier, EDP Auditor Journal, 1984

Page 5: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Mainframe to Mini

• Mainframe interrogations (from 1967)– Generalised - CARS, ASK360, Auditape,

PanAudit etc.– Utilities – FileTab, Easytrieve– Special Programs

• Test Data

Errrrr……..that was about it until………

Page 6: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Commodore Pet (1977)

Page 7: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

……the arrival of the PC

Or more specifically for auditors……..

Page 8: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Extract from Datawatch 1983‘A new portable (or almost portable) micro seemingly is announced every month and some audit firms reportedly are acquiring them in large numbers…….

Arthur Young (UK) has commenced its own field test based on the use of the IBM PC Micro. Much progress has been made in extracting data from client files and putting it into the IBM PC in one of three ways:

Physical diskette transportation

Link over telephone lines

Direct coupling of the PC with the client’s computer

Methods of manipulating the data have been developed but remain an area for further work.

The cost is £7,000 per unit. This may be the shape of things to come. In no time no auditor will be complete without his ‘breakout box’ or ‘fox box’. ‘

Page 9: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

First Laptop?

Page 10: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Changing Culture

Page 11: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Audit Technology Evolution

• PC Audit Retrieval Software

Page 12: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic
Page 13: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Audit Technology Evolution• PC Audit Retrieval Software• Flowcharting (Visio etc.)• Spreadsheets (from Visicalc through Supercalc and Lotus, to Excel)• Trial Balance Management and Accounts Production (Fast, Solution

6, Caseware etc.)• Word Processing (Wordstar, Word Perfect, Word)• Presentation Graphics (Harvard, Freelance, Powerpoint)• Audit File Management – the paperless audit?• Risk and Control Assessment• Security Analysers• Data Mining• Fraud Detection and Forensics• And then there were………..

Page 14: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic
Page 15: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Topics from 1996 ACE Conference• Introduction to the Internet• How to set up a www internet site (sic)• Spreadsheets as a planning tool• Audit working papers• Use of voice recognition• Document imaging• Using Lotus Notes• Automated checklists• Print report translators• Downloading data• Automating security audits • Homeworking• Audit automation – a thing of the past or a CSF for the

future?

Page 16: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

The Age of the Internet

Collaborative Working

Information Access 24/7 (eg KNet, Google etc.)

Email

But………Spam!

Personal Networking

eg. LinkedIn

Facebook

Viruses and other threats

What is the internet? Why is it hyped so much? Why have many companies banned its use? Will it catch on?

ACE Conference Brochure 1996

Page 17: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Other bad news!

Page 18: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Then along came……...

……and the world changed!

Page 19: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Then along came………….

Page 20: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

And…………

Page 21: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic
Page 22: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Welcome to the new world of regulation and compliance as

exemplified by the Sarbanes-Oxley Act

‘For every complex problem there is a solution that is neat, plausible and wrong.’H.L. Mencken US Journalist

‘Proof of the wisdom of this remark can be seen in the US legislative attempt to restore confidence in the system, the Sarbanes-Oxley Act of 2002, which is a mixture of the sensible, the hasty, and the ill-conceived.’Going Off The Rails, John Plender 2003

Page 23: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

….and a new emphasis

Audit Technology

Audit and ComplianceTechnology

Accelerated by SOX and software vendors identifying opportunity!

Page 24: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Continuous Monitoring: The Vision

Application

Database

Network

O/S

Business Systems

Supporting Riskand control matrix

ACTIVITY BRM RISK BRM RISK DEFINITION RISK POTENTIAL ROOT CAUSE IMPACT INFO. REQUESTS

Purchasing1. Cycle Time Elapsed time between the start and

completion of a business process (or activity within a process) is too long

because of redundant, unnecessary and irrelevant steps. Cycle time can be

measured for all operations, e.g., order entry, production, delivery, product

design, etc.

Requisition is not

completed and forwarded to purchasing in a timely

manner.

Inefficient processes,

manual transactions, lack of controls

Premium freight

charges, material shortages. Slow

reaction to changing customer demands

1. Process Maps,

Policies & Procedures

2. Efficiency The process is inefficient in satisfying valid customer requirements resulting in

higher than competitive costs, e.g., significant gaps are identified when the

cost of process activities is compared

with costs incurred by world class performers.

Preferred agreements or vendors with volume

discounts are not utilized

Inefficient processes, manual transactions, lack

of controls to ensure material is sourced from

preferred suppliers.

Buyers are not validating suggested sources of

supply as requested by the requisitioner

Excessive costs 2. Performance Measures (Cost,

Qual i ty, Time)

3. Data Integrity All of the risks associated with the

authorization, completeness and

accuracy of transactions as they are entered into, processed by, summarized

by and reported by the various application systems deployed by the organization.

Requisition not completed

accurately, requirements

not communicated accurately to purchasing

Lack of training,

processes not clearly

defined, no standardized forms/procedures

Delayed processing,

premium freight charges,

material shortages, excessive costs

3. Summary of IT

Systems, System Maps,

Systems Narratives

4. Employee Fraud

Fraudulent activities perpetrated by employees, customers, suppliers, agents,

brokers or third-party administrators against the organization for personal gain

(e.g., misappropriation of physical,

financial or information assets) expose the organization to financial loss.

Employee completes a requisition not approved

by the cost center manager

Inappropriate system access, lack of controls

and no segregation of duties. Purchasing not

validating requisition

authorization

Financial loss or unauthorized use of

physical, financial or information assets.

4. Business & Procurement Strategy

Requisitioning

Continuous Monitoring

Custom Scripts, Applimation,GRC, ICM, Logical Apps

Guardium, Lumigent

ESM, ECM

Tripwire

Policy Management

System

ControlsIntelligence TM

Repository

Change Management

• Service Desk/Help desk• Change Management• Testing and Release Mgmt

Copyright, Protiviti 2007

Page 25: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Finance GRC Management Software Magic Quadrant

challengers leaders

niche players visionaries

completeness of vision

abili

ty to

exe

cute

(From "Magic Quadrant for Finance Governance, Risk and Compliance Management Software, 2007," 1 February 2007)

As of January 2007

Paisley Consulting

OpenPagesIBMOracle

AxentisQumasProtivitiBWiseSAP

Movaris80-20 Software

CuraMethodware

CertusonProject

BI International

RuleBurst RVR SystemsAchiever Business Solutions

Note: onProject has been acquired by DoubleCheck; Certus has been acquired

by Securac

Page 26: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Compliance Technologies Hype Cycle

Technology Trigger

Peak ofInflated

ExpectationsTrough of

Disillusionment Slope of Enlightenment Plateau of Productivity

time

visibility

Years to mainstream adoption:less than 2 years 2 to 5 years 5 to 10 years

more than 10 years

obsoletebefore plateau

As of July 2007

Password Management

User Interfaces for Disabled Persons

User ProvisioningE-Mail Archiving

Records Management

Database Encryption

SOD for ERP

Finance GRCManagement

IT Change Management Tools

SIEM (Information Management)

Configuration Auditing

CPM and Financial Controls

Case Management

Role Managementfor Enterprises

Content Monitoring and Filteringand Data Loss Prevention

Identity AuditingForensic Tools

E-Discovery Software

Stronger Authentication Anti-Money -Laundering

IT GRCM

Digital SignatureControls Automation

and Monitoring

Spreadsheet Control

Copyright, Gartner 2007

Page 27: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Gartner Conclusions on Audit and Compliance Technology

ü Be proactive when putting controls in placeü Develop a good relationship with your auditorsü Strive for reasonable and appropriate controls to address reasonably

anticipated risksü Above all, put your organization in a defensible position against all

audiencesü Push back against unreasonable findingsü Negotiate from a position of power, not reactively and defensivelyü Technology is not the answer — it automates good processü Select reasonable and appropriate controls to address reasonably

anticipated riskü Investigate technologies as part of your strategic planning …

applicability will varyü Choose technology based on a good requirements analysis process

(stop asking us which technology you should buy)ü Technology is not the answer …

Page 28: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Conference Topics

Governance, Risk and Compliance Audit Workflow

XBRL Illicit Image Abuse Spreadsheet Risks Continuous Audit Direct Tax Audit

Electronic Discovery Fraud Detection

Page 29: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

If all else fails……..

Page 30: Chairman’s Introduction and Keynote - …home.btconnect.com/Auditware-System/downloads/paulwilliamskeyn…Chairman’s Introduction and Keynote Paul Williams Chair ISACA/ITGI Strategic

Chairman’s Introduction and Keynote

Paul WilliamsChair ISACA/ITGI Strategic Advisory Group

IT Governance Adviser Protiviti

Audit Technology ConferenceLondon, 20/21 November 2007