E-mails

48
E-mails

description

E-mails. Karen Evans, national director of the U.S. Cyber Challenge and former Office of Management and Budget administrator. Auditor Responsibility?. Audit Committee Power. - PowerPoint PPT Presentation

Transcript of E-mails

Page 1: E-mails

E-mails

Page 2: E-mails
Page 3: E-mails

Karen Evans, national director of the U.S. Cyber Challenge and former Office of Management and Budget administrator

Auditor Responsibility?

Page 4: E-mails

Audit Committee Power"The things that senior leadership does respond to

are GAO reports [and] IG reports, and in private industry the audit committee is the most powerful on any board,”

Cybersecurity is "now being brought into the audit committee because that's what leadership looks at – they look at the results of an audit,"

(http://fcw.com/Articles/2013/10/10/cybersecurity-audits-secret-ingredient.aspx?Page=1)

Page 5: E-mails

Sarbanes OxleyInformation Technology Weaknesses

Page 6: E-mails

Background QuestionsWhat is SOX?

How/Why did it come about? What are SOX requirements?

Which if any rely on or are related to IT controls?

Page 7: E-mails

The effect of IT controls on financial reportingGrant, Miller & Alali (2008)

Page 8: E-mails

Grant, Miller & Alali (2008)Article Overview

Page 9: E-mails

What Standards does paper use for support? How are these standards used? What do they say (not say) about IT controls?

SAS 94 “The nature and character of an entity’s use of technology in its information

system affects the entity’s overall internal control structure” SOX PCAOB AS #5

an IC deficiency occurs when the design or operation of the control does not allow management or employees, in the normal course of performing their assigned functions, to prevent or detect misstatements on a timely basis

IT general controls could have an effect on the operating effectiveness of other controls and requires auditors to provide an opinion on the effectiveness of internal controls over financial reporting. General Controls – Insure Proper Operations Application Controls – Processing & Storage of Information

Page 10: E-mails

SOX 302What are the requirements?

The signing officers have reviewed the report

The report does not contain any material untrue statements or material omission or be considered misleading

The financial statements and related information fairly present the financial condition and the results in all material respects

The signing officers are responsible for internal controls and have evaluated these internal controls within the previous ninety days and have reported on their findings

A list of all deficiencies in the internal controls and information on any fraud that involves employees who are involved with internal activities

Any significant changes in internal controls or related factors that could have a negative impact on the internal controls

Page 11: E-mails

SOX 404404 (a)

Management statement of responsibility over Internal Controls &

Assessment of Internal Controls

404 (b)

Auditors must attest and report on managements assessment

Report Material Weaknesses in Internal Control and Remediation Plan

What are/define MW’s?

Most Companies use COSO as Internal Control Framework

Page 12: E-mails

Section 409Issuers are required to disclose to the public, on an urgent basis, information on material changes in their financial condition or operations.

Page 13: E-mails

Section 802all audit or review papers must be maintained for a period of 5 years

How are audit/review papers maintained in 2012?

Page 14: E-mails

What IT deficiencies did the paper look at?IT deficiencies include controls related to

software programs program implementations segregation of duties associated with access to

computer accounting or financial reporting records problems with access to electronic data and programs

What other controls might be important for accounting/auditing?

Why weren’t they investigated?

Page 15: E-mails

FindingsIT Deficiency ranked 6th among all MWs (20% so 1 in 5)

IT Deficiency -> Internal Control deficiency

IT Deficiency -> accounting errors (Why?)

revenue recognition

receivables, investments, and cash issues

inventory, vendor, and cost of sales issues

financial statement, footnote, US GAAP, and segment disclosures issues

IT Deficiency -> Higher Audit Fees

Page 16: E-mails

SOX 404 Reported Internal Control Weaknesses: A Test of COSO Framework Components and Information TechnologyKlamm and Watson (2009)

Page 17: E-mails

Klamm and Watson (2009)Article Overview?

Page 18: E-mails

OverviewExamined IT and non-IT Controls Material Weaknesses with respect to COSO Components

Material Weaknesses were mapped to a specific COSO component

Control EnvironmentRisk AssessmentControl ActivitiesInformation and CommunicationMonitoring

IT Vs. non-IT MWsWhat is your assessment of the IT MW’s?

Page 19: E-mails

COSO ComponentsControl environment

Foundation

Sets tone of the firm

integrity, ethical values, competence, philosophy, and operating style of the firm’s managers and employees

Risk assessment

identification, analysis, and management of (operating, economic, industry, regulatory) risks that may prevent a firm from achieving its objectives

Management implements control activities

segregation of duties, approvals, reviews, reconciliations, and authorizations

Information & Communication

timely capture and dissemination of pertinent information on internal and external events

communication among and between management, employees, suppliers, and customers

Monitoring

continual evaluation of the other components’ effectiveness.

Page 20: E-mails

FindingsWeak Control Environment is related to other weaknesses in COSO components

Weak Monitoring is related to weak risk assessment and control activities

Financial Statement reliability is affected by the number of weak COSO components

IT related MW’s are associated with a greater amount of non-IT related MW’s

IT related MW’s are related with:

More misstatements

Greater overall number of MWs

Page 21: E-mails

Information Security and Sarbanes-Oxley Compliance: An Exploratory StudyWallace, Lin, and Cefaratti (2011)

Page 22: E-mails

Wallace, Lin, and Cefaratti (2011)Article Overview?

Page 23: E-mails

FrameworksWhat frameworks did this article mention as possible IT security frameworks to consider?

COSO

Model for controlling and managing Internal Control

COBIT

IT Governance / NOT IT Security Specifically

What needs Controls

ISO

Specific IT Security Controls

How To

Page 24: E-mails

ISO1. Security Policy

2. Organizational Security

3. Asset Classification and Control

4. Personnel Security

5. Physical and Environmental Security

6. Communications and Operations Management

7. Access Control

8. Systems Development and Maintenance

9. Business Continuity Management

10.Compliance

In all there are 124 recommended IT controls

Page 25: E-mails
Page 26: E-mails

What did the research find?

Page 27: E-mails

FindingsWhat is the Extent that ISO controls are in place?

Most Common:Controls such as deploying antivirus software and authenticating remote users accessing the network

Least CommonProtecting equipment from unauthorized access and tracking the location of removable computer media

Page 28: E-mails

“Not Sure” ResponsesCPA’s selected “not sure” more frequently than non-CPA’s

CISA’s selected “not sure” less frequently than non-CISA’s

Certified Information Systems Auditor

What Is ISO Category 8? 9?

Page 29: E-mails

TrainingAuditors with IT Training

35 more controls were likely to be implemented

IT employees participate in SOX Compliance

55 more controls were likely to be implemented

IT personnel received SOX compliance training

65 more controls were likely to be implemented

Page 30: E-mails

IT internal control weaknesses and firm performance: An organizational liability lensStoel & Muhanna (2011)

Page 31: E-mails

Stoel and Muhanna (2011)Article Overview

Page 32: E-mails

Internal ControlSEC definition:

policies and procedures for the recording of transactions and maintenance of financial records

Since modern enterprises are heavily dependent on integrated computer- based systems

“internal control over financial reporting” process regulated by the SEC must include controls over the accounting and management process as well as over the organizational IT infrastructure and systems.

Statement of Auditing Standards No. 94 (SAS 94) affirmed that the nature and characteristics of a company's use of information technology affect the company's internal control over financial reporting and requiring auditors to consider information technology as an integral part of overall internal controls (AICPA 2001).

Therefore, SOX requires review of Accounting Internal Control as well as IT controls

Page 33: E-mails

IT ControlsPertain specifically to IT systems, processes and infrastructure

used to capture, process and record raw transactional data corresponding to economic events

as well as support the preparation of financial reports

Encompass the management, operational, and technical safeguards or countermeasures prescribed for the firm's information systems to protect the

Confidentiality

Integrity

Availability

of those systems and their information

What framework does this definition come from?

When examining a companies IC – which framework do companies use? Which are prescribed?

What does PCAOB AS #2 say about IT controls?

Page 34: E-mails

OverviewWhat is the business value of IT Controls?

What is the relationship between IT Quality and ROA?

IT Control MW’s -> Lower ROA (Why?)What were the ROA for the 3 segments examined in this study?

Page 35: E-mails

The consequences of Internal Control Weaknesses on Management Information Systems: The Case of SOX Internal Control Reports

Li, Peters, Richardson, Watson, 2012

Page 36: E-mails

Li, Peters, Richardson & Watson (2012)Article Overview

Page 37: E-mails

What do the researchers assert?Quality of financial reporting system output.

In what form? how is quality being operationalized? What can impact quality?

Page 38: E-mails

IT ControlsHow are these determined?How are they coded?How did the authors categorize them?

1. Data Processing Integrity2. Systems Access and Security3. System Structure and Usage

Page 39: E-mails

FindingsWhat did they find?

Page 40: E-mails

A content Analysis of auditors reports on IT internal control weaknesses... (Boritz, Hayes, and Lim, 2013)

Page 41: E-mails

What is this about?Why did they do it?

Page 42: E-mails
Page 43: E-mails
Page 44: E-mails
Page 45: E-mails
Page 46: E-mails
Page 47: E-mails

What did they find?Are any of these categories correlated with each

other? If so what might be an explanation?

Page 48: E-mails

What didn’t they find?Or what keywords might you expect that didn’t turn

up or turned up infrequently?What might this mean?Can it be fixed?