1 / 48

E-mails

E-mails. Karen Evans, national director of the U.S. Cyber Challenge and former Office of Management and Budget administrator. Auditor Responsibility?. Audit Committee Power.

tod
Download Presentation

E-mails

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. E-mails

  2. Karen Evans, national director of the U.S. Cyber Challenge and former Office of Management and Budget administrator Auditor Responsibility?

  3. Audit Committee Power "The things that senior leadership does respond to are GAO reports [and] IG reports, and in private industry the audit committee is the most powerful on any board,” Cybersecurity is "now being brought into the audit committee because that's what leadership looks at – they look at the results of an audit," (http://fcw.com/Articles/2013/10/10/cybersecurity-audits-secret-ingredient.aspx?Page=1)

  4. Sarbanes Oxley Information Technology Weaknesses

  5. Background Questions • What is SOX? • How/Why did it come about? • What are SOX requirements? • Which if any rely on or are related to IT controls?

  6. The effect of IT controls on financial reportingGrant, Miller & Alali (2008)

  7. Grant, Miller & Alali (2008) Article Overview

  8. What Standards does paper use for support? • How are these standards used? What do they say (not say) about IT controls? • SAS 94 • “The nature and character of an entity’s use of technology in its information system affects the entity’s overall internal control structure” • SOX • PCAOB AS #5 • an IC deficiency occurs when the design or operation of the control does not allow management or employees, in the normal course of performing their assigned functions, to prevent or detect misstatements on a timely basis • IT general controls could have an effect on the operating effectiveness of other controls and requires auditors to provide an opinion on the effectiveness of internal controls over financial reporting. • General Controls – Insure Proper Operations • Application Controls – Processing & Storage of Information

  9. SOX 302 • What are the requirements? • The signing officers have reviewed the report • The report does not contain any material untrue statements or material omission or be considered misleading • The financial statements and related information fairly present the financial condition and the results in all material respects • The signing officers are responsible for internal controls and have evaluated these internal controls within the previous ninety days and have reported on their findings • A list of all deficiencies in the internal controls and information on any fraud that involves employees who are involved with internal activities • Any significant changes in internal controls or related factors that could have a negative impact on the internal controls

  10. SOX 404 • 404 (a) • Management statement of responsibility over Internal Controls & • Assessment of Internal Controls • 404 (b) • Auditors must attest and report on managements assessment • Report Material Weaknesses in Internal Control and Remediation Plan • What are/define MW’s? • Most Companies use COSO as Internal Control Framework

  11. Section 409 • Issuers are required to disclose to the public, on an urgent basis, information on material changes in their financial condition or operations.

  12. Section 802 • all audit or review papers must be maintained for a period of 5 years • How are audit/review papers maintained in 2012?

  13. What IT deficiencies did the paper look at? • IT deficiencies include controls related to • software programs • program implementations • segregation of duties associated with access to computer accounting or financial reporting records • problems with access to electronic data and programs • What other controls might be important for accounting/auditing? • Why weren’t they investigated?

  14. Findings • IT Deficiency ranked 6th among all MWs (20% so 1 in 5) • IT Deficiency -> Internal Control deficiency • IT Deficiency -> accounting errors (Why?) • revenue recognition • receivables, investments, and cash issues • inventory, vendor, and cost of sales issues • financial statement, footnote, US GAAP, and segment disclosures issues • IT Deficiency -> Higher Audit Fees

  15. SOX 404 Reported Internal Control Weaknesses: A Test of COSO Framework Components and Information TechnologyKlamm and Watson (2009)

  16. Klamm and Watson (2009) Article Overview?

  17. Overview • Examined IT and non-IT Controls Material Weaknesses with respect to COSO Components • Material Weaknesses were mapped to a specific COSO component • Control Environment • Risk Assessment • Control Activities • Information and Communication • Monitoring • IT Vs. non-IT MWs • What is your assessment of the IT MW’s?

  18. COSO Components • Control environment • Foundation • Sets tone of the firm • integrity, ethical values, competence, philosophy, and operating style of the firm’s managers and employees • Risk assessment • identification, analysis, and management of (operating, economic, industry, regulatory) risks that may prevent a firm from achieving its objectives • Management implements control activities • segregation of duties, approvals, reviews, reconciliations, and authorizations • Information & Communication • timely capture and dissemination of pertinent information on internal and external events • communication among and between management, employees, suppliers, and customers • Monitoring • continual evaluation of the other components’ effectiveness.

  19. Findings • Weak Control Environment is related to other weaknesses in COSO components • Weak Monitoring is related to weak risk assessment and control activities • Financial Statement reliability is affected by the number of weak COSO components • IT related MW’s are associated with a greater amount of non-IT related MW’s • IT related MW’s are related with: • More misstatements • Greater overall number of MWs

  20. Information Security and Sarbanes-Oxley Compliance: An Exploratory StudyWallace, Lin, and Cefaratti (2011)

  21. Wallace, Lin, and Cefaratti (2011) Article Overview?

  22. Frameworks • What frameworks did this article mention as possible IT security frameworks to consider? • COSO • Model for controlling and managing Internal Control • COBIT • IT Governance / NOT IT Security Specifically • What needs Controls • ISO • Specific IT Security Controls • How To

  23. ISO • Security Policy • Organizational Security • Asset Classification and Control • Personnel Security • Physical and Environmental Security • Communications and Operations Management • Access Control • Systems Development and Maintenance • Business Continuity Management • Compliance • In all there are 124 recommended IT controls

  24. What did the research find?

  25. Findings • What is the Extent that ISO controls are in place? • Most Common: • Controls such as deploying antivirus software and authenticating remote users accessing the network • Least Common • Protecting equipment from unauthorized access and tracking the location of removable computer media

  26. “Not Sure” Responses • CPA’s selected “not sure” more frequently than non-CPA’s • CISA’s selected “not sure” less frequently than non-CISA’s • Certified Information Systems Auditor • What Is ISO Category 8? 9?

  27. Training • Auditors with IT Training • 35 more controls were likely to be implemented • IT employees participate in SOX Compliance • 55 more controls were likely to be implemented • IT personnel received SOX compliance training • 65 more controls were likely to be implemented

  28. IT internal control weaknesses and firm performance: An organizational liability lensStoel & Muhanna (2011)

  29. Stoel and Muhanna (2011) Article Overview

  30. Internal Control • SEC definition: • policies and procedures for the recording of transactions and maintenance of financial records • Since modern enterprises are heavily dependent on integrated computer- based systems • “internal control over financial reporting” process regulated by the SEC must include controls over the accounting and management process as well as over the organizational IT infrastructure and systems. • Statement of Auditing Standards No. 94 (SAS 94) affirmed that the nature and characteristics of a company's use of information technology affect the company's internal control over financial reporting and requiring auditors to consider information technology as an integral part of overall internal controls (AICPA 2001). • Therefore, SOX requires review of Accounting Internal Control as well as IT controls

  31. IT Controls • Pertain specifically to IT systems, processes and infrastructure • used to capture, process and record raw transactional data corresponding to economic events • as well as support the preparation of financial reports • Encompass the management, operational, and technical safeguards or countermeasures prescribed for the firm's information systems to protect the • Confidentiality • Integrity • Availability • of those systems and their information • What framework does this definition come from? • When examining a companies IC – which framework do companies use? Which are prescribed? • What does PCAOB AS #2 say about IT controls?

  32. Overview • What is the business value of IT Controls? • What is the relationship between IT Quality and ROA? • IT Control MW’s -> Lower ROA (Why?) • What were the ROA for the 3 segments examined in this study?

  33. The consequences of Internal Control Weaknesses on Management Information Systems: The Case of SOX Internal Control Reports Li, Peters, Richardson, Watson, 2012

  34. Li, Peters, Richardson & Watson (2012) Article Overview

  35. What do the researchers assert? • Quality of financial reporting system output. • In what form? how is quality being operationalized? • What can impact quality?

  36. IT Controls • How are these determined? • How are they coded? • How did the authors categorize them? • Data Processing Integrity • Systems Access and Security • System Structure and Usage

  37. Findings What did they find?

  38. A content Analysis of auditors reports on IT internal control weaknesses... (Boritz, Hayes, and Lim, 2013)

  39. What is this about? Why did they do it?

  40. What did they find? • Are any of these categories correlated with each other? • If so what might be an explanation?

  41. What didn’t they find? Or what keywords might you expect that didn’t turn up or turned up infrequently? What might this mean? Can it be fixed?

More Related