SlideShare a Scribd company logo
VALUE-ADDED IT AUDITING
MARC VAEL, BRUSSELS, MAY 2015
AGENDA
▪ What does IT audit mean to you?
▪ Traditional IT audit
▪ Top audit concerns of audit committees
▪ The way towards value-added IT audit
▪ Some predictions
▪ Questions
WHAT DOES IT
AUDIT MEAN
TO YOU?
Yes, you
Value-added it auditing
Value-added it auditing
TRADITIONAL IT
AUDIT
TYPES OF INFORMATION FOR AN IT AUDITOR
• Relevant information : relating to controls, tells the evaluator something meaningful about
the operation of the underlying controls or control component. Information that directly
confirms the operation of controls is most relevant.
• Reliable information : accurate, verifiable and from an objective source.
• Timely information : produced and used in a timeframe that makes it possible to prevent or
detect control deficiencies before they become material to an enterprise.
• Sufficient information : when evaluators have gathered enough of it to form a reasonable
conclusion. For information to be sufficient, however, it must first be suitable.
• Suitable information : relevant (i.e., fit for its intended purpose), reliable (i.e., accurate,
verifiable and from an objective source) and timely (i.e., produced and used in an
appropriate time frame) information.
TRADITIONAL IT AUDIT APPROACH
Identification of
Safeguards
Threat
Assessment
Asset
Identification
Vulnerability
Assessment
Risk
Determination
Reporting
Remediation
Planning
Proactive processes that
turn policies into awareness
programs, IT administration,
change management and
other activities.
Technologies needed to
provide the appropriate
protection and support
critical processes.
Management strategies for
IT and relevant policies,
standards, guidelines or
directives used to
communicate these
strategies to the
organization.
Reactive processes that
enable management to
measure how well policies
are implemented and
followed and when they
need to be changed.
TYPICAL IT AUDIT ENGAGEMENTS
A. General control examination or facility audit
B. Application audit
C. System development audit
D. Technical or special topic audit
IT CONTROLS
The plan of organization & the methods a business uses to
safeguard IT assets, provide accurate & reliable information, 

promote & improve operational IT efficiency, and 

encourage adherence to prescribed IT management policies.
IT control procedure classifications:
1. Preventive / Detective / Corrective / Deterrent IT controls
2. General & Application IT controls
3. Administrative & Accounting IT controls
4. Input – Processing – Output IT controls
GENERAL IT OPERATIONS
1. Change Management
2. System Development Life Cycle (SDLC)
3. Problem & Incident management
4. Back-up and data recovery
5. Project Management
6. Continuity Planning (CBCP and DRP)
INFORMATION SYSTEMS
INDEPENDENT IT CONTROLS ON PERFORMANCE
To ensure that transactions are processed accurately are another
important control element.
Types of independent IT controls
–reconciliation of 2 independently maintained sets of records
–comparison of actual quantities with recorded amounts
–double-entry accounting (debits = credits)
–batch totals
INDEPENDENT IT CONTROLS ON PERFORMANCE
Types of independent IT controls
–batch totals:
5 types:
1 Financial total: sum of a euro field.
2 Hash total: sum of a field that would usually not be added.
3 Record count: number of documents processed by the IT system.
4 Line count: number of lines of data entered in the IT system.
5 Cross-footing: compares grand total of all rows with grand total of all
columns to check that they are equal in the IT system.
INDEPENDENT IT CONTROLS ON PERFORMANCE
Auditors must understand the following basic IT controls:
1 How transactions are initiated
2 How data are captured in machine-readable form or converted from source
documents
3 How computer files are accessed & updated
4 How data are processed to prepare information
5 How information is reported
All of these items make it possible to have an IT audit trail.
An IT audit trail exists when individual company transactions can be traced
end-to-end through the IT system.
TOP AUDIT
CONCERNS OF
AUDIT
COMMITTEES
Value-added it auditing
Value-added it auditing
7
Value-added it auditing
Value-added it auditing
7
Value-added it auditing
Value-added it auditing
8
27
THE WAY
TOWARDS
VALUE-ADDED IT
AUDIT
IT CONTROLS
• IT controls continue to increase in
importance to organisations
• Corporate reliance on IT increases
• Compliance requirements increase
• IT control deficiencies can have a significant
impact on any organisation
Value-added it auditing
PwC 2014 state of the internal audit profession study
PwC 2014 state of the internal audit profession study
PwC 2014 state of the internal audit profession study
PwC 2014 state of the internal audit profession study
VALUE PROPOSITION
Value-added it auditing
PwC 2014 state of the internal audit profession study
Value-added it auditing
www.isaca.org/cobit
IT AUDIT REPORT WRITING PHASES
TYPES OF IT AUDIT ENGAGEMENTS
Review
• provide limited assurance about an assertion.
• consists primarily of review work (less emphasis on testing).
• can be more process oriented, focusing on the appropriateness of the
tasks and activities that the audit entity performs and the associated
controls. The level of evidence that is gathered is less than in an audit,
and testing is generally limited or none is performed.
• do not include audit opinions. Conclusions may often be stated
negatively. Example: ‘Nothing came to our attention to indicate that the assertion is not
true’.
TYPES OF IT AUDIT ENGAGEMENTS
Examination
• Systematic process by which a competent, independent person
objectively obtains & evaluates evidence regarding assertions about
an entity or event, processes, operations or internal controls, for the
purpose of forming an opinion & providing a report on the degree to
which the assertions conform to an identified set of standards.
• Attestation process that provides the highest level of assurance about
an assertion that an IT auditor can provide.
• Gathering & evaluating sufficient, competent evidence and performing
appropriate tests and other procedures to form the opinion about an
assertion for presentation in an IT audit report.
TYPES OF IT AUDIT ENGAGEMENTS
Agreed-upon Procedures Engagement
Third party & IT auditor agree on specific procedures that will be performed
to obtain evidence on which the third party is willing to rely as a basis for a
conclusion. Agreed-upon level of evidence may be significantly limited or
extensive. The IT auditor may need to obtain a substantial amount of
evidence (in some cases, more than that is required for an IT audit).
The IT audit report should include a statement that sufficiency of
procedures is solely the responsibility of the responsible parties & a
disclaimer of responsibility for the sufficiency of those procedures. The
report relates only to the elements specified & does not extend beyond
them.
Value-added it auditing
CAATS
Computer programs & data 

that the IT auditor uses 

as part of audit procedures 

to process data of significance
contained in a computer system
CAATS USAGE
· Calculation checks: e.g. program gives total amount of individual entries in
purchases day book in a particular period. Auditor then agree this total amount to the
amount posted in purchases ledger control.
· Detecting system violation rule: e.g. program checks that no customer has
balance above specified credit limit.
· Detecting unreasonable items: programs checks that no customer has discount of
50% or sales ledger balance is more than the amount of sales made to that customer.
· New calculation & analysis: e.g. statistical analysis of inventory movements to
identify slow moving items.
· Selecting items for audit testing: e.g. obtaining a stratified sample of sales ledger
balances to be used as a basis for a circularization of debtors.
· Completeness checks: e.g. checking continuity of sales invoices to ensure they
are all accounted for.
CAATS ADVANTAGES
· Test programmed controls: in an IT accounting system, there are large volume of
transactions which the auditor will have to audit. The auditor will have to check if the
programmed controls are functioning correctly. The only effective way of testing
programmed controls is through CAAT.
· Test on large volume of data: CAAT enable auditors to test large amount of data
quickly & accurately and increase the confidence they have in their opinion.
· Test on source location of data: CAAT enables auditors to test the accounting
systems & its records at its source location rather than testing printouts of what they
believe to be a copy of those records.
· Cost effective: once set up CAAT are a cost effective way of obtaining audit evidence
year after year provided that the client does not change the accounting system.
· Comparison: allows results from using CAAT to be compared to traditional testing.
Where the two results agree this increase the overall audit confidence.
Value-added it auditing
7
7
7
7
Value-added it auditing
7
37
ISO15504
6
PA2.2 Work Product Management
PA2.1 Performance Management
Level 2 - Managed
PA1.1 Process PerformanceLevel 1 - Performed
Level 0 - Incomplete
PA3.2 Deployment
PA3.1 Definition
Level 3 - Established
PA4.2 Control
PA4.1 Measurement
Level 4 - Predictable
PA5.1 Innovation
PA5.2 Optimisation
Level 5 - Optimising
1
L
/
F
2
L
/
F
F
F
3
L
/
F
F
4
L
/
F
F
F
F
L
/
F
5
F
F
F
F
L/F = Largely or Fully F= Fully
Value-added it auditing
SOME
PREDICTIONS
59
PREDICTIONS INTRODUCTION
• Users want to be provided with more information about business
organisations, rather than less.
• Demands for information is driven by business clients, customers,
oversight authorities and legislatures:

audit plan can change in the middle of the current quarter and sometimes
even change on a day-to-day basis
• Trend: better, faster and more comprehensive reporting.
• Strong interest in independent assessment & reporting of
organisational compliance with laws & regulations.
Value-added it auditing
Value-added it auditing
PREDICTION: INTEGRATED REPORTING
Objective of integrated reporting = provide a more detailed picture of
the organisation’s efforts to: 

• Produce and sustain value

• Identify and manage risk

• Employ and develop human capital 

• Meet legal requirements

• Address corporate and social responsibility
Audit reports include more in-depth non-financial reporting.
Shift from solely lag indicators (as found in traditional reporting) to lead
or forward indicators with increased focus on management &
performance capabilities.
PREDICTION: USE OF TECHNOLOGY IN REPORTING
Demand is likely to increase for using technology to present audit
results in a manner that quickly enables recipients to focus on the key
points of the audit.
Auditing standards provide a foundation for the auditing profession to
develop and issue professional audit reports.
Considerations of increased use of technology in the reporting
process must be benchmarked against applicable auditing standards.
Value-added it auditing
Value-added it auditing
Value-added it auditing
Value-added it auditing
Value-added it auditing
CONTACT DETAILS
marc@vael.net
http://www.linkedin.com/in/marcvael
@marcvael
Marc Vael
CISA, CISM, CRISC, CGEIT, ITIL SM, Prince2 F, Guberna Certified Director
Chief Audit Executive
SMALS vzw
Fonsnylaan 20
1060 Brussel
+32 473 99 30 31

More Related Content

PPT
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
PPTX
Audit bab1 sem 6- Audit Approach
Nur Dalila Zamri
 
PPT
Auditing by CIS . Chapter 6
Sharah Ayumi
 
PDF
Computer Audit an Introductory
MNorazizi HM
 
PPTX
Chapter 6
Nur Dalila Zamri
 
PPTX
IT Audit For Non-IT Auditors
Ed Tobias
 
PDF
Internal Control
Salih Islam
 
PDF
Steps in it audit
kinjalmkothari92
 
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
Audit bab1 sem 6- Audit Approach
Nur Dalila Zamri
 
Auditing by CIS . Chapter 6
Sharah Ayumi
 
Computer Audit an Introductory
MNorazizi HM
 
Chapter 6
Nur Dalila Zamri
 
IT Audit For Non-IT Auditors
Ed Tobias
 
Internal Control
Salih Islam
 
Steps in it audit
kinjalmkothari92
 

What's hot (19)

PPSX
CIS Audit Lecture # 1
Cheng Olayvar
 
DOCX
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Shahzeb Pirzada
 
PPT
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Sharing Slides Training
 
PPTX
Computer-Assisted Audit Tools and Techniques
_supriadi
 
PDF
The Coming Age of Continuous Auditing
carlabrut
 
PPT
008.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PDF
Chapter 7
EasyStudy3
 
PDF
Presentation 11, Test of controls of the system, Workshop on System-based aud...
Support for Improvement in Governance and Management SIGMA
 
PPT
Database auditing models
ERSHUBHAM TIWARI
 
PPTX
03.2 application control
Mulyadi Yusuf
 
PPT
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
Rikesh Chaurasia
 
PPTX
Generalized audit-software
kzoe1996
 
PDF
Presentation 5, System based audit approach - what is it about?, Workshop on ...
Support for Improvement in Governance and Management SIGMA
 
PDF
Auditing Systems Development
essbaih
 
PPTX
CONTROL AND AUDIT
Ros Dina
 
PPT
Introduction to it auditing
Damilola Mosaku
 
PPTX
Internal Audit Plan 2015
Mohammad Kashif
 
PDF
No Choice But to Comply - FATCA
Thinksoft Global
 
PDF
Fraud detection guide
CenapSerdarolu
 
CIS Audit Lecture # 1
Cheng Olayvar
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Shahzeb Pirzada
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Sharing Slides Training
 
Computer-Assisted Audit Tools and Techniques
_supriadi
 
The Coming Age of Continuous Auditing
carlabrut
 
008.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
Chapter 7
EasyStudy3
 
Presentation 11, Test of controls of the system, Workshop on System-based aud...
Support for Improvement in Governance and Management SIGMA
 
Database auditing models
ERSHUBHAM TIWARI
 
03.2 application control
Mulyadi Yusuf
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
Rikesh Chaurasia
 
Generalized audit-software
kzoe1996
 
Presentation 5, System based audit approach - what is it about?, Workshop on ...
Support for Improvement in Governance and Management SIGMA
 
Auditing Systems Development
essbaih
 
CONTROL AND AUDIT
Ros Dina
 
Introduction to it auditing
Damilola Mosaku
 
Internal Audit Plan 2015
Mohammad Kashif
 
No Choice But to Comply - FATCA
Thinksoft Global
 
Fraud detection guide
CenapSerdarolu
 
Ad

Similar to Value-added it auditing (20)

PPTX
Auditing in computerized environment.pptx
infantemiliya18
 
PPT
Computerized Environment
VadivelM9
 
PPT
Statement of Auditing Standard No.94.ppt
Olajide Kuku
 
PDF
Control and audit of information System (hendri eka saputra)
Hendri Eka Saputra
 
PPTX
CISA_WK_2.pptx
dotco
 
PDF
2016-06-08 FDA Inspection Readiness - Mikael Yde
mikaelyde
 
PPTX
Overview-of-an-IT-Audit-Lesson-1.pptx
JoshJaro
 
PPTX
CAAT ppt.pptx (Computer Asstt. Technique)
rkhasua004
 
PDF
Continous auditing and risk monitoring 9 23-09
Gaiani (CarnCorpAudit)
 
PPTX
Brief overview on Internal control (Audit)
Hisyam
 
PPTX
09.1 audit siklus penjualan dan penerimaan
Mulyadi Yusuf
 
PPTX
Audit presentation
Metafrique group
 
PDF
Chapter 7
EasyStudy3
 
PDF
Internal audit ratings guide
CenapSerdarolu
 
PPTX
Vikas Dutta Presentation at Rutgers CARLAB Nov 2012
Vikas Dutta, CISA, CIPP/IT, ISO 27001 LA
 
PDF
Audit ratings guide
CenapSerdarolu
 
PDF
Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...
NAFCU Services Corporation
 
PPT
1auditconcepts
Shubham Raj
 
PPT
BCMS-Internal-Auditor-Course-ppt [Autosaved].ppt
JustinNickaf3
 
PPTX
CISM_WK_2.pptx
dotco
 
Auditing in computerized environment.pptx
infantemiliya18
 
Computerized Environment
VadivelM9
 
Statement of Auditing Standard No.94.ppt
Olajide Kuku
 
Control and audit of information System (hendri eka saputra)
Hendri Eka Saputra
 
CISA_WK_2.pptx
dotco
 
2016-06-08 FDA Inspection Readiness - Mikael Yde
mikaelyde
 
Overview-of-an-IT-Audit-Lesson-1.pptx
JoshJaro
 
CAAT ppt.pptx (Computer Asstt. Technique)
rkhasua004
 
Continous auditing and risk monitoring 9 23-09
Gaiani (CarnCorpAudit)
 
Brief overview on Internal control (Audit)
Hisyam
 
09.1 audit siklus penjualan dan penerimaan
Mulyadi Yusuf
 
Audit presentation
Metafrique group
 
Chapter 7
EasyStudy3
 
Internal audit ratings guide
CenapSerdarolu
 
Vikas Dutta Presentation at Rutgers CARLAB Nov 2012
Vikas Dutta, CISA, CIPP/IT, ISO 27001 LA
 
Audit ratings guide
CenapSerdarolu
 
Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...
NAFCU Services Corporation
 
1auditconcepts
Shubham Raj
 
BCMS-Internal-Auditor-Course-ppt [Autosaved].ppt
JustinNickaf3
 
CISM_WK_2.pptx
dotco
 
Ad

More from Marc Vael (20)

PDF
How secure are chat and webconf tools
Marc Vael
 
PDF
my experience as ciso
Marc Vael
 
PDF
Advantages of privacy by design in IoE
Marc Vael
 
PDF
Cybersecurity governance existing frameworks (nov 2015)
Marc Vael
 
PDF
Cybersecurity nexus vision
Marc Vael
 
PDF
ISACA Reporting relevant IT risks to stakeholders
Marc Vael
 
PDF
Cloud security lessons learned and audit
Marc Vael
 
PDF
ISACA Internet of Things open forum presentation
Marc Vael
 
PDF
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
Marc Vael
 
PDF
The value of big data analytics
Marc Vael
 
PDF
Social media risks and controls
Marc Vael
 
PDF
The view of auditor on cybercrime
Marc Vael
 
PDF
ISACA Mobile Payments Forum presentation
Marc Vael
 
PDF
Belgian Data Protection Commission's new audit programme
Marc Vael
 
PDF
ISACA Cloud Computing Risks
Marc Vael
 
PDF
Information security awareness (sept 2012) bis handout
Marc Vael
 
PPTX
ISACA smart security for smart devices
Marc Vael
 
PPTX
Securing big data (july 2012)
Marc Vael
 
PDF
Valuendo cyberwar and security (jan 2012) handout
Marc Vael
 
PDF
How to handle multilayered IT security today
Marc Vael
 
How secure are chat and webconf tools
Marc Vael
 
my experience as ciso
Marc Vael
 
Advantages of privacy by design in IoE
Marc Vael
 
Cybersecurity governance existing frameworks (nov 2015)
Marc Vael
 
Cybersecurity nexus vision
Marc Vael
 
ISACA Reporting relevant IT risks to stakeholders
Marc Vael
 
Cloud security lessons learned and audit
Marc Vael
 
ISACA Internet of Things open forum presentation
Marc Vael
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
Marc Vael
 
The value of big data analytics
Marc Vael
 
Social media risks and controls
Marc Vael
 
The view of auditor on cybercrime
Marc Vael
 
ISACA Mobile Payments Forum presentation
Marc Vael
 
Belgian Data Protection Commission's new audit programme
Marc Vael
 
ISACA Cloud Computing Risks
Marc Vael
 
Information security awareness (sept 2012) bis handout
Marc Vael
 
ISACA smart security for smart devices
Marc Vael
 
Securing big data (july 2012)
Marc Vael
 
Valuendo cyberwar and security (jan 2012) handout
Marc Vael
 
How to handle multilayered IT security today
Marc Vael
 

Recently uploaded (20)

PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Doc9.....................................
SofiaCollazos
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 

Value-added it auditing

  • 1. VALUE-ADDED IT AUDITING MARC VAEL, BRUSSELS, MAY 2015
  • 2. AGENDA ▪ What does IT audit mean to you? ▪ Traditional IT audit ▪ Top audit concerns of audit committees ▪ The way towards value-added IT audit ▪ Some predictions ▪ Questions
  • 3. WHAT DOES IT AUDIT MEAN TO YOU?
  • 8. TYPES OF INFORMATION FOR AN IT AUDITOR • Relevant information : relating to controls, tells the evaluator something meaningful about the operation of the underlying controls or control component. Information that directly confirms the operation of controls is most relevant. • Reliable information : accurate, verifiable and from an objective source. • Timely information : produced and used in a timeframe that makes it possible to prevent or detect control deficiencies before they become material to an enterprise. • Sufficient information : when evaluators have gathered enough of it to form a reasonable conclusion. For information to be sufficient, however, it must first be suitable. • Suitable information : relevant (i.e., fit for its intended purpose), reliable (i.e., accurate, verifiable and from an objective source) and timely (i.e., produced and used in an appropriate time frame) information.
  • 9. TRADITIONAL IT AUDIT APPROACH Identification of Safeguards Threat Assessment Asset Identification Vulnerability Assessment Risk Determination Reporting Remediation Planning Proactive processes that turn policies into awareness programs, IT administration, change management and other activities. Technologies needed to provide the appropriate protection and support critical processes. Management strategies for IT and relevant policies, standards, guidelines or directives used to communicate these strategies to the organization. Reactive processes that enable management to measure how well policies are implemented and followed and when they need to be changed.
  • 10. TYPICAL IT AUDIT ENGAGEMENTS A. General control examination or facility audit B. Application audit C. System development audit D. Technical or special topic audit
  • 11. IT CONTROLS The plan of organization & the methods a business uses to safeguard IT assets, provide accurate & reliable information, 
 promote & improve operational IT efficiency, and 
 encourage adherence to prescribed IT management policies. IT control procedure classifications: 1. Preventive / Detective / Corrective / Deterrent IT controls 2. General & Application IT controls 3. Administrative & Accounting IT controls 4. Input – Processing – Output IT controls
  • 12. GENERAL IT OPERATIONS 1. Change Management 2. System Development Life Cycle (SDLC) 3. Problem & Incident management 4. Back-up and data recovery 5. Project Management 6. Continuity Planning (CBCP and DRP)
  • 14. INDEPENDENT IT CONTROLS ON PERFORMANCE To ensure that transactions are processed accurately are another important control element. Types of independent IT controls –reconciliation of 2 independently maintained sets of records –comparison of actual quantities with recorded amounts –double-entry accounting (debits = credits) –batch totals
  • 15. INDEPENDENT IT CONTROLS ON PERFORMANCE Types of independent IT controls –batch totals: 5 types: 1 Financial total: sum of a euro field. 2 Hash total: sum of a field that would usually not be added. 3 Record count: number of documents processed by the IT system. 4 Line count: number of lines of data entered in the IT system. 5 Cross-footing: compares grand total of all rows with grand total of all columns to check that they are equal in the IT system.
  • 16. INDEPENDENT IT CONTROLS ON PERFORMANCE Auditors must understand the following basic IT controls: 1 How transactions are initiated 2 How data are captured in machine-readable form or converted from source documents 3 How computer files are accessed & updated 4 How data are processed to prepare information 5 How information is reported All of these items make it possible to have an IT audit trail. An IT audit trail exists when individual company transactions can be traced end-to-end through the IT system.
  • 20. 7
  • 23. 7
  • 26. 8
  • 27. 27
  • 29. IT CONTROLS • IT controls continue to increase in importance to organisations • Corporate reliance on IT increases • Compliance requirements increase • IT control deficiencies can have a significant impact on any organisation
  • 31. PwC 2014 state of the internal audit profession study
  • 32. PwC 2014 state of the internal audit profession study
  • 33. PwC 2014 state of the internal audit profession study
  • 34. PwC 2014 state of the internal audit profession study
  • 37. PwC 2014 state of the internal audit profession study
  • 40. IT AUDIT REPORT WRITING PHASES
  • 41. TYPES OF IT AUDIT ENGAGEMENTS Review • provide limited assurance about an assertion. • consists primarily of review work (less emphasis on testing). • can be more process oriented, focusing on the appropriateness of the tasks and activities that the audit entity performs and the associated controls. The level of evidence that is gathered is less than in an audit, and testing is generally limited or none is performed. • do not include audit opinions. Conclusions may often be stated negatively. Example: ‘Nothing came to our attention to indicate that the assertion is not true’.
  • 42. TYPES OF IT AUDIT ENGAGEMENTS Examination • Systematic process by which a competent, independent person objectively obtains & evaluates evidence regarding assertions about an entity or event, processes, operations or internal controls, for the purpose of forming an opinion & providing a report on the degree to which the assertions conform to an identified set of standards. • Attestation process that provides the highest level of assurance about an assertion that an IT auditor can provide. • Gathering & evaluating sufficient, competent evidence and performing appropriate tests and other procedures to form the opinion about an assertion for presentation in an IT audit report.
  • 43. TYPES OF IT AUDIT ENGAGEMENTS Agreed-upon Procedures Engagement Third party & IT auditor agree on specific procedures that will be performed to obtain evidence on which the third party is willing to rely as a basis for a conclusion. Agreed-upon level of evidence may be significantly limited or extensive. The IT auditor may need to obtain a substantial amount of evidence (in some cases, more than that is required for an IT audit). The IT audit report should include a statement that sufficiency of procedures is solely the responsibility of the responsible parties & a disclaimer of responsibility for the sufficiency of those procedures. The report relates only to the elements specified & does not extend beyond them.
  • 45. CAATS Computer programs & data 
 that the IT auditor uses 
 as part of audit procedures 
 to process data of significance contained in a computer system
  • 46. CAATS USAGE · Calculation checks: e.g. program gives total amount of individual entries in purchases day book in a particular period. Auditor then agree this total amount to the amount posted in purchases ledger control. · Detecting system violation rule: e.g. program checks that no customer has balance above specified credit limit. · Detecting unreasonable items: programs checks that no customer has discount of 50% or sales ledger balance is more than the amount of sales made to that customer. · New calculation & analysis: e.g. statistical analysis of inventory movements to identify slow moving items. · Selecting items for audit testing: e.g. obtaining a stratified sample of sales ledger balances to be used as a basis for a circularization of debtors. · Completeness checks: e.g. checking continuity of sales invoices to ensure they are all accounted for.
  • 47. CAATS ADVANTAGES · Test programmed controls: in an IT accounting system, there are large volume of transactions which the auditor will have to audit. The auditor will have to check if the programmed controls are functioning correctly. The only effective way of testing programmed controls is through CAAT. · Test on large volume of data: CAAT enable auditors to test large amount of data quickly & accurately and increase the confidence they have in their opinion. · Test on source location of data: CAAT enables auditors to test the accounting systems & its records at its source location rather than testing printouts of what they believe to be a copy of those records. · Cost effective: once set up CAAT are a cost effective way of obtaining audit evidence year after year provided that the client does not change the accounting system. · Comparison: allows results from using CAAT to be compared to traditional testing. Where the two results agree this increase the overall audit confidence.
  • 49. 7
  • 50. 7
  • 51. 7
  • 52. 7
  • 54. 7
  • 55. 37
  • 57. PA2.2 Work Product Management PA2.1 Performance Management Level 2 - Managed PA1.1 Process PerformanceLevel 1 - Performed Level 0 - Incomplete PA3.2 Deployment PA3.1 Definition Level 3 - Established PA4.2 Control PA4.1 Measurement Level 4 - Predictable PA5.1 Innovation PA5.2 Optimisation Level 5 - Optimising 1 L / F 2 L / F F F 3 L / F F 4 L / F F F F L / F 5 F F F F L/F = Largely or Fully F= Fully
  • 60. PREDICTIONS INTRODUCTION • Users want to be provided with more information about business organisations, rather than less. • Demands for information is driven by business clients, customers, oversight authorities and legislatures:
 audit plan can change in the middle of the current quarter and sometimes even change on a day-to-day basis • Trend: better, faster and more comprehensive reporting. • Strong interest in independent assessment & reporting of organisational compliance with laws & regulations.
  • 63. PREDICTION: INTEGRATED REPORTING Objective of integrated reporting = provide a more detailed picture of the organisation’s efforts to: 
 • Produce and sustain value
 • Identify and manage risk
 • Employ and develop human capital 
 • Meet legal requirements
 • Address corporate and social responsibility Audit reports include more in-depth non-financial reporting. Shift from solely lag indicators (as found in traditional reporting) to lead or forward indicators with increased focus on management & performance capabilities.
  • 64. PREDICTION: USE OF TECHNOLOGY IN REPORTING Demand is likely to increase for using technology to present audit results in a manner that quickly enables recipients to focus on the key points of the audit. Auditing standards provide a foundation for the auditing profession to develop and issue professional audit reports. Considerations of increased use of technology in the reporting process must be benchmarked against applicable auditing standards.
  • 70. CONTACT DETAILS [email protected] http://www.linkedin.com/in/marcvael @marcvael Marc Vael CISA, CISM, CRISC, CGEIT, ITIL SM, Prince2 F, Guberna Certified Director Chief Audit Executive SMALS vzw Fonsnylaan 20 1060 Brussel +32 473 99 30 31