Download as pdf or txt
Download as pdf or txt
You are on page 1of 72

April 2015 iNTErNAlAUDiTOr.

OrG
internal auditor

Deciphering Digital Signatures


is Your Organization ACA
april 2015

Compliant?
The internal Auditor as
professional Skeptic
Minimizing Joint Venture risk
Small audit functionS

KnowleDge
sharing
Small audit functions can learn a lot
about best practices from their larger
counterparts, and vice versa.
Ms. Mona Hussain
Head of Internal Audit
Dubai World Trade Centre
United Arab Emirates

dwtc.com

“IDEA® has provided us with an all-in-one solution enabling


greater reliability and comprehensiveness of analysis and
results. Without doubt, through time saved during the
audit process alone, I can say that CaseWare IDEA has
produced a clear return on investment for our business.”

casewareanalytics.com | sales@caseware-idea.com
IDEA is a registered trademark of CaseWare International Inc.

IIA Advertisement.indd 1 2015-02-11 12:43:58


Relationships are built on many things...

Like having
partners involved
on your account.
Our clients experience the value of Crowe Horwath LLP
professionals who understand their business and offer
valuable insights relevant to the challenges they face.

The internal audit function can contribute more to an


organization than many realize. But if it is to be recognized
as an important strategic player, an organization’s
internal audit department must expand its role and
align its contributions with organizational objectives.

To learn more about how you can become a


strategic player, visit crowehorwath.com/risk and
download our article, “Making Internal Audit More
Strategic, More Valuable,” or contact Tony Klaich at
415.946.7447 or tony.klaich@crowehorwath.com.

Tony Klaich, Partner


Manufacturing and Distribution Risk Consulting Leader
San Francisco

Follow us.

Audit | Tax | Advisory | Risk | Performance The Unique Alternative to the Big Four ®

The governance, risk, and compliance management solutions from Crowe are endorsed by the American Bankers Association (ABA) through its subsidiary, the Corporation for American Banking.
The ABA endorsement of these solutions indicates they deliver high quality and meet performance standards, and offer the potential to improve your bank’s profitability and performance.

Crowe Horwath LLP is an independent member of Crowe Horwath International, a Swiss verein. Each member firm of Crowe Horwath International is a separate and independent legal entity. Crowe Horwath LLP and its affiliates
are not responsible or liable for any acts or omissions of Crowe Horwath International or any other member of Crowe Horwath International and specifically disclaim any and all responsibility or liability for acts or omissions of
Crowe Horwath International or any other Crowe Horwath International member. Accountancy services in Kansas and North Carolina are rendered by Crowe Chizek LLP, which is not a member of Crowe Horwath International.
© 2015 Crowe Horwath LLP RISK15001A6

RISK15001A6 Internal Auditor Mag Ad - April.indd 1 2/19/2015 6:06:39 AM


TeamMate ®
Ecosystem for Audit

Audit

Controls

Analytics

TeamMate Analytics - Data Analysis for Every Audit


TeamMate Analytics includes more than 150 audit tools and runs on top of Excel, allowing auditors
to easily perform powerful data analysis and deliver significant value without the need for extensive
training. TeamMate Analytics is a powerful standalone solution for any auditor, and is especially beneficial
to those using TeamMate already.

TeamMate’s Ecosystem for Audit offers comprehensive solutions for all of your organization’s audit, controls,
and data analytics requirements.

Start your free trial today at TeamMateSolutions.com/Trial

Copyright © 2015 Wolters Kluwer Financial Services, Inc. All Rights Reserved. 4014
April  2015   Volume lxxiI: iI

f e at u r e s
28 COVER Small Audit Functions, Big Ideas Audit departments of limited size can learn a lot
from their larger counterparts, but they have much to teach as well. Arthur Piper

35 Digital Signatures 47 Reinventing Internal is influenced greatly by the


Deciphered Internal auditors Audit Recent governance- skepticism exhibited. Rebekah
should assess the business related developments require A. Heath and Tim Staggs
processes and risks associated the profession to revisit some
with electronic signatures.   of its long-held paradigms. 57 Joint Venture/Joint
Shiva Hullavarad, Russell Tim J. Leech Exposure An effective joint
O’Hare, Ashok Roy venture governance strategy
52 Professional can ensure an appropriate
40 Untangling the ACA Skepticism The internal level of owner oversight and
A smart approach to U.S. auditor’s ability to approach minimize shared risks.  
Affordable Care Act compliance an engagement objectively Ben Arnold
begins with a comprehensive
risk assessment.  
Russell A. Jackson Visit the Apple App Store or Google
Play + download your Ia app TODAY!!

For the latest audit-related headlines visit InternalAuditor.org


Audit
Management
& Data Analysis
Software

Does this sound familiar?


■■ You spend most of your day managing spreadsheets, shared drives and email.

■■ You’d rather add value for your organization by showcasing material


improvement and risk mitigation opportunities – not chasing after tick marks
in e-documents.

■■ You’d love to easily report on strategic risks, recommendations, and remediation


statuses – anytime senior management or the board asks.

■■ You’d feel much more confident if your recommendations and findings can be
backed by quantifiable, data-based evidence.

Your audit management tool should do


much more than manage workpapers
ACL GRC is the only solution that integrates
robust data analytics with easy-to-use,
cloud-based audit management software.

Turn Analysis into Actionable Results - Anytime, Anywhere.


Watch the video on acl.com/a-better-way to see how it works in less than 2 minutes.
April  2015   Volume lxxiI: iI

D E P A R T M E N T S
PRACTICES 25 Fraud Findings A fake CFO
dupes an unsuspecting clerk.
13 UPDATE Fraudsters eye
mobile e-commerce; CFOs INSIGHTS
face reporting challenges;
and executives fail to make 62 Governance Perspectives
information security a priority. Organizations should facilitate
whistleblowing without fear.
17 Back to Basics Good
working relationships lead to 65 The Mind of Jacka Three
effective engagements. high-risk audits are often ignored.

20 ITAudit Data visualization 66 Eye on Business Experts


tools can be used to assess offer best practice advice for
7 Editor’s Note fraud risk. small audit functions.

9 Reader Feedback 22 Risk Watch Internal audit 68 In My Opinion A former


needs to consider the upside auditor takes a hindsight view  
of risk. of his time in the profession.

O N L I N E InternalAuditor.org
ACA Health Check Internal Transformational Change
auditors in the health- In an exclusive video, Tim
care industry share their Leech, author of “Reinventing
approaches to assessing risk Internal Audit” (page 47),
around the U.S. Affordable explains why the profession
Care Act. may need to revisit existing
paradigms.
Cyberrisk Top of Mind
Internal audit professionals say The Empty Boxes Scheme
management’s engagement Art Stewart discusses lessons
with cybersecurity correlates from the case of would-be
with the organization’s ability distributors who were conned
to manage information security into paying US$13 million for
risks, a new report says. nonexistent semiconductors.

Internal Auditor ISSN 0020-5745 is published in February, April, June, August, October, and December. Yearly subscription rates: $75 in the United States and Canada, and $99 outside North America. No refunds on cancellations.
Editorial and advertising office: 247 Maitland Ave., Altamonte Springs, FL 32701-4201, U.S.A. Copyright © 2015 The Institute of Internal Auditors Inc. Change of address notices and subscriptions should be directed to IIA Customer
Service, +1-407-937-1111. Periodicals postage paid in Altamonte Springs, Fla., and additional offices. POSTMASTER: Please send form 3579 to: Internal Auditor, 247 Maitland Ave., Altamonte Springs, FL 32701-4201, U.S.A. Canada Post
International: Publications Mail (Canadian Distribution) Sales Agreement number: 545880; GST registration number: R124590001. Opinions expressed in Internal Auditor may differ from policies and official statements of The
Institute of Internal Auditors and its committees and from opinions endorsed by authors’ employers or the editor of this journal. Internal Auditor does not attest to the originality of authors’ content.
Can you see what’s coming?
© 2014 Ernst & Young LLP. All Rights Reserved. ED None.

Change is inevitable. And it can happen


in the blink of an eye. EY’s Internal Audit
Services can work with you to prepare
for what you can see … and what you
can’t. Our insights and innovative mindset
can help you make the most of your
opportunities with the least amount of risk.

To find out more, visit ey.com.audit.


Editor’s Note

The Continuous Audit

I
n today’s ever-evolving business environment, it is clear that internal auditors
need to constantly align — and realign — their audit coverage to address emerg-
ing risks and avoid damaging surprises. But are audit functions up to the task?
The latest North American Pulse of Internal Audit report from The IIA’s
Audit Executive Center indicates they are — to an extent. More than half of
the 311 CAE and audit management level respondents to the Pulse survey say
internal audit’s biggest challenge in continuously assessing risks is its ability to
identify emerging risks and incorporate them into the audit plan. However,
nearly 90 percent of respondents say their audit planning is designed to be
responsive to changes in the organization’s risk profile.
To be sure, 61 percent of respondents say their audit functions have the
resources and expertise to assess risks continuously and analyze their potential
impact to the business model. However, audit functions are waging a battle for
talent, with 40 percent of those surveyed saying attracting and retaining talent is a
high or critical priority.
The need for both a broader and deeper understanding of critical business
issues comes across loud and clear in recent research by the ERM Initiative at
North Carolina State University. According to the study, 59 percent of senior
finance executives say the volume and complexity of risks facing their companies
have changed “extensively” or “mostly” in the last five years. And 65 percent say
their organization was caught off guard by at least one operational surprise “some-
what” or “extensively” during that time.
Continuous assessment of emerging risks can be more of a challenge for small
internal audit departments than for larger, better-resourced functions. In our cover
story, “Small Audit Functions, Big Ideas,” author Arthur Piper looks at the prac-
tices some small audit departments implement to ensure they provide comprehen-
sive, continual assessments of the risks facing the organization.
According to the Pulse report, geopolitical, macroeconomic, and cyber-related
risks will put enormous pressure on many internal audit functions to raise their
game. Given the significance of these emerging risks, it is imperative that internal
audit functions be able to assess risk on a continuous basis. As the authors of the
report state, “In today’s fast-paced operating environments, internal auditors need
to audit at the speed of risk.”

Anne Millage

April 2015 Internal Auditor 7


PREPARE TO PASS
THE CIA EXAM
®

With The IIA’s CIA Learning System . ®

With a busy and unpredictable schedule, finding the time to study for the Certified Internal Auditor® (CIA) exam can
be difficult. Stay focused and take advantage of your downtime with The IIA’s CIA Learning System.

Enjoy quality and convenience:


• Learn the entire global CIA exam syllabus in a concise • Create a customized SmartStudy™ plan based on your
and easy-to-understand format. strengths and weaknesses.
• Access your reading materials via your e-reader device. • Study on-the-go with mobile-optimized online tools.

To create your free study plan,


visit www.LearnCIA.com.
142007

2015_IIA_IA_Feb_ad_8x10_875_142007.indd 1 12/15/14 5:50 PM


Reader Feedback
WE WANT TO HEAR FROM YOU! Let us know what you think of this issue.
Reach us via email at editor@theiia.org. Letters may be edited for clarity and length.

required under its professional stan- Dyer’s “Working With External


dards, and risks of potentially even Auditors” (“Back to Basics,”
greater significance. February 2015).
— Nancy comments on Richard
Turpen and Haley Dyer’s We certainly agree with John that fee
“Working With External reduction is not the internal auditor’s
Auditors” (“Back to Basics,” primary objective. As we empha-
February 2015). sized in our article, internal audit
addresses organizational risks beyond
Working With External Audit I have doubts that today’s internal those normally of most concern to the
I agree that internal audit is wise to auditor is focusing on saving audit fees external auditors. Achieving collab-
collaborate and communicate with as a primary objective. Yes, they need orative value starts with the auditor
all stakeholders, including external to be aware of the external auditors’ discussions we described, but true
audit. Here is another perspective for plans, but hopefully they are instead collaboration begins when those com-
discussion: Wouldn’t it be wonderful if focused on major risks to the orga- munications grow into an ongoing
internal audit could rely on the work nization. The authors used the word exchange of risk information.
of external auditors? If internal audit “collaboration,” but I see the advice — Richard Turpen and Haley Dyer
could be certain that external audit was as being all about helping the external
performing the work it was engaged to auditors. I don’t see anything that
perform — ensuring the integrity the internal auditors are getting from The Art of Internal Audit
of financial statement reporting — the “collaboration.” In my opinion, CAEs should set the
internal audit could focus on the myr- — John Fraser comments on pace and encourage internal auditors to
iad other important responsibilities Richard Turpen and Haley be more creative and innovative in their

CONTRIBUTING EDITORS Gary Jordan, CIA, CRMA Sonia Thomas, CRMA CONTA CT INFORMA TION
Mark Brinkley, CIA, CFSA, CRMA Sandra Kasahara, CIA, CPA Stephen Tiley, CIA ADVERTISING
John Hall, CPA Eila Koivu, CIA, CCSA, CISA, CFE Robert Venczel, CIA, CRMA, CISA
J. Michael Jacka, CIA, CPCU, CFE, CPA
advertising@theiia.org
Robert Kuling, CIA, CRMA, CQA Curtis Verschoor, CIA, CPA, CFE
Steve Mar, CFSA, CISA +1-407-937-1109; fax +1-407-937-1101
Michael Levy, CRMA, CISA, CISSP David Weiss, CIA
James Roth, PHD, CIA, CCSA, CRMA Merek Lipson, CIA Scott White, CIA, CFSA, CRMA SUBSCRIPTIONS, CHANGE OF ADDRESS, MISSING ISSUES
APRIL 2015 Paul J. Sobel, CIA, QIAL, CRMA Thomas Luccock, CIA, CPA customerrelations@theiia.org
VOLUME LXXII: II
Laura Soileau, CIA, CRMA Michael Marinaccio, CIA IIA PRESIDENT AND CEO +1-407-937-1111; fax +1-407-937-1101
EDITOR IN CHIEF Norman Marks, CPA, CRMA Richard F. Chambers, CIA, EDITORIAL
Anne Millage EDITORIAL ADVISORY BOARD Alyssa G. Martin, CPA QIAL, CGAP, CCSA, CRMA David Salierno, david.salierno@theiia.org
Dennis Applegate, CIA, CPA, CMA, CFE Dennis McGuffie, CPA +1-407-937-1233; fax +1-407-937-1101
MANAGING EDITOR Lal Balkaran, CIA, CGA, FCIS, FCMA Stephen Minder, CIA IIA CHAIRMAN OF THE BOARD PERMISSIONS AND REPRINTS
David Salierno Mark Brinkley, CIA, CFSA, CRMA Kenneth Mory, CIA, CPA, CISA, CRMA Anton van Wyk, CIA, QIAL, CRMA editor@theiia.org
Adil Buhariwalla, CIA, CRMA, CFE, FCA Jack Murray, Jr., CBA, CRP +1-407-937-1232; fax +1-407-937-1101
ASSOCIATE MANAGING
EDITOR Daniel J. Clemens, CIA Hans Nieuwlands, CIA, RA, CCSA, CGAP
WRITER’S GUIDELINES
David Coderre, CPM Michael Plumly, CIA, CPA
Tim McCollum InternalAuditor.org (click on “Writer’s Guidelines”)
Michael Cox, FIIA(NZ), AT Sarah Purkeypile, CIA, CFSA
SENIOR EDITOR Dominic Daher, JD, LLM Jeffrey Ridley, CIA, FCIS, FIIA
James Fox, CIA, CFE Marshall Romney, PHD, CPA, CFE Authorization to photocopy is granted to users registered with the
Shannon Steffee
Peter Francis, CIA James Roth, PHD, CIA, CCSA Copyright Clearance Center (CCC) Transactional Reporting Service,
ART DIRECTION Michael Garvey, CIA Katherine Shamai, CIA, CA, CFE, CRMA provided that the current fee is paid directly to CCC, 222 Rosewood
Yacinski Design, LLC Nancy Haig, CIA, CFE, CCSA, CRMA Debora Shelton, CIA, CRMA Dr., Danvers, MA 01923 USA; phone: +1-508-750-8400. Internal Auditor
Daniel Helming, CIA, CPA Laura Soileau, CIA, CRMA PUBLISHED BY THE cannot accept responsibility for claims made by its advertisers, although
PRODUCTION MANAGER INSTITUTE OF INTERNAL staff would like to hear from readers who have concerns regarding
J. Michael Jacka, CIA, CPCU, CFE, CPA Jerry Strawser, PHD, CPA
Gretchen Gorfine Keith E. Johnson, CIA Glenn Sumners, PHD, CIA, CPA, CRMA AUDITORS INC. advertisements that appear.

APRIL 2015 INTERNAL AUDITOR 9


MetricStream

Unmanaged risk can topple


the delicate balance of your
organization

Navigate business risks & opportunities with


Risk-Intelligent Audits
MetricStream’s audit management solution helps organizations:
Align audit to the right set of business risks
Improve relevance, credibility and transparency of audits
Ensure optimal resource utilization and effectiveness
Simplify compliance with embedded regulatory content & standards
Drive efficiency & collaboration with an integrated audit system

Call Us: +1-650-620-2955


www.metricstream.com Email: audit@metricstream.com
Reader Feedback

jobs. Status quos should be challenged Hear No Evil there. It might be more reasonable to
in the process of internal auditing. As a profession, I think it’s important be in the early majority rather than an
— Augustine Inogbo comments on we increasingly look at “delicate top- early adopter so that, when one does
The Mind of Jacka blog post, ics” such as this. An underlying psy- study a new technology, there are some
“The Art of Internal Audit.” chological issue is that the issues you case studies and use analysis on which
are referring to can raise a degree of to base the decision. But that would
Managing Risk anxiety in the minds of audit commit- not involve emerging technologies, but
Risk management simply won’t work tee members. rather existing technologies. There is
well until the model defines what is “at — J. Paterson comments on the a risk, of course, in not being the first
risk” and provides that as context for Chambers on the Profession to market with a new technology. But
the program. Management sees and blog post, “Are There Things that risk is partially mitigated by also
manages purpose and objectives, not Audit Committees Would Rather not being the first to fail.
risk. So if we place risk in the context of Not Hear From Internal Audit?” — Richard Fowler comments on
what is already being managed, maybe the Marks on Governance blog
risk management will take on meaning Emerging Technologies post, “The Risk of Missing the
and value in the eyes of management. New technologies will emerge, we can Next New Technology.”
— Daninmo comments on the all be assured of that. But we can also
Marks on Governance blog be assured that, with rare exceptions, no
post, “New Report Confirms company will need to study, much less Visit InternalAuditor.org for
the Failure of Risk Management embrace, all new technologies. There the latest blogs
Practices.” must be a cost-benefit breakpoint in

Earn Today and Save Up to


US$200!
You want it. You need it. Now you can save money to get it. Earning your
Certified Financial Services Auditor® (CFSA®) professional credential from The
IIA can jump start your career and send it into overdrive.

Earning a professional credential from The IIA is the best way to demonstrate
your commitment to advancing in this competitive niche and communicating
your breadth of knowledge.

To help start your journey, The IIA is waiving the application fee, up to $200,

CFSA®
during the month of April.

Visit www.theiia.org/goto/CFSA for


more information and to apply today!
2015-5013

2015-5013 CERT-CFSA App Fee Waiver IA April Half.indd 1 3/3/15 10:47 AM


April 2015 Internal Auditor 11
Pentana Analytics
Automated Testing and
Continuous Monitoring
now available within Pentana!
EE
Powered by FR inar
b
We
Register Today at www.ideagenplc.com/pentana
Ideagen have worked together with audit analytics software developer, Arbutus Software, to create
the best of breed analytics solution to fully support your audit testing and to provide a continuous
monitoring solution. The results are directly uploaded to Ideagen’s audit and risk management
solution, Pentana, along with any supporting evidence!

If you use a different analytics tool, do not worry! We can integrate our audit management solution,
Pentana with other analytics tools also - enabling you to still benefit from automated testing and
continuous monitoring.
About Ideagen’s Pentana Solution
Pentana is a leading audit management solution, developed using the latest Microsoft technologies
to empower internal audit departments to save essential time, increase efficiencies and maximize
the power of collaborative working. It integrates all aspects of the audit cycle from annual planning
to detailed risk assessment and controls testing, through to action tracking and Audit Committee
reporting.
Key Benefits:
›› Implements a consistent methodology compliant with international risk and auditing standards
›› Simplifies global deployment with installation from a website and automatic updates downloaded
without user intervention
›› Optimizes performance for use over a wide range of network speeds as well as working off-line to
provide a true global working environment for GRC professionals
›› Pentana can equally be used for Enterprise Risk Management, SOX compliance, investigations,
Health and Safety or any application where risk assessment and centralized action tracking are
required
Don’t just take our word for it! Visit our website www.ideagenplc.com/pentana to discover first-
hand video case studies from our happy customers. Examples include, BBVA, BDO & Heineken.
CFOs’ stakeholder balancing act… Audit committees complain of overload…
Assessing reputation risk… IT questions executives’ cybersecurity priorities.

Update
CEOs Sound Off
Business leaders worldwide
describe the challenges they
face in an era of unprec-
edented change.

81% see mobile


technologies
as strategically
important

78% are concerned


about
overregulation

61% are worried


about
The High Cost mobile identity provider Telesign — surveyed
250 companies with average revenues of
cybersecurity

of Mobile US$2.54 billion. Among these firms, nearly

Commerce
half say they experienced between one and
24 overall fraud incidents in the past year, 51% plan strategic
alliances/joint
ventures over
while one-fourth indicated they experienced
Companies report that fraud is the next 12
between 25 and 250. For almost a third of months
chipping into a significant portion respondents, between 10 percent and 24 per-
of their mobile-based revenue. cent of the incidents were mobile-based.
39% are very con-
fident about

M
“With the shift to mobile e-commerce their com-
obile commerce fraud costs large well underway, we know that hackers and pany’s growth
and midsized businesses an aver- fraud are never far behind,” says Telesign prospects
age of US$92.3 million in revenue CEO Steve Jillings. He notes that respon-
annually, according to a recent dents expect mobile revenues to grow 47 per- Source: PricewaterhouseCoopers
survey. For some, the amount comprises a cent over the next few years. “This represents 18th Annual Global CEO Survey
revenue loss of up to 25 percent. a green field for fraud incidents if security
Mobile E-commerce: Friend or Foe? — a postures remain the same.”
J. Gold Associates research report sponsored Among mobile threats, respondents
by information security vendor RSA and indicate that device malware represents the

For the latest audit-related headlines follow us on Twitter @IaMag_IIA

April 2015 Internal Auditor 13


Practices/Update

largest risk to their business, followed by More than three-fourths rely on user names
e-wallet fraud and app store fraud. Fake and passwords, and just over half use device
mobile apps — apps masquerading as some- IDs. Moreover, 44 percent report using
thing else or embedded with malware — are challenge-based questions, while another
also ranked as one of the top mobile device 41 percent say they use IP recognition.
threats. Account takeover and password Biometrics was identified as an up-and-
guessing were cited, as well. coming priority, with nearly half citing it as
Survey respondents also shared the a type of authentication they will require in
type of mobile authentication they use. the future. — D. Salierno

Pressure Mounting
Diverse investors, regulatory requirements make it difficult for CFOs
52 % to satisfy the needs of all.

S
eventy percent of chief financial offi- report, says investors want to understand both
of CAEs and cers (CFOs) find it challenging to where the company is now and where it wants
internal audit balance the needs between corporate to be in the future. “They want more infor-
reporting requirements and stake- mation about strategy,” he says. “They want
directors holder demands, according to Connected to understand more about risks, and not nec-
in North America
consider identifying Reporting, a survey from EY’s Financial essarily just about the risks themselves, but
emerging risks to Accounting and Advisory Services (FAAS). about how they are being managed. These
be their biggest Of the 500 CFOs and heads of reporting risks are not only financial risks, they could
challenge for 2015. surveyed across Africa, the Americas, Asia- also include operational risk, cybersecurity,
Pacific, Europe, India, and the Middle East, and others, none of which you would expect

37 % 97 percent face challenges to improve report-


ing, which includes cost and time to produce
to find in a financial report.”
While regulatory requirements call for
say they reports. Only 20 percent of respondents say highly detailed reports with a high degree of
are just their current reporting is highly effective in
meeting external stakeholder needs.
data accuracy to fixed timetables, investors
may want more frequently accessible, short-
“moderately Neri Bukspan, EY’s financial reporting format information on key performance
confident” and disclosure leader, and a contributor to the indicators. — S. Steffee
in their ability to
assess risk on an
ongoing basis.

“In today’s operating


It’s a Tough Job
Audit committee members say their workload has grown and extends
environment, internal
auditors have a clear beyond their financial expertise.

E
mandate to identify and ven audit committee become more difficult. In Executive Director Dennis
address major risks on
a continual basis,” says members complain addition to their traditional Whalen says. “The risk envi-
IIA President and CEO of overwork, accord- financial reporting oversight ronment is clearly straining
Richard Chambers. ing to a survey by role, many audit commit- many audit committee agen-
KPMG’s Audit Committee tees now have some respon- das today.”
Institute (ACI). In the 2015 sibility over cybersecurity, Some audit committee
Source: The IIA Audit Executive
Center, 2015 Pulse of Internal Audit Global Audit Commit- technology, compliance, members are embracing the
tee Survey of 1,500 audit and operational risks, the new realities of their posi-
committee members, three- survey reports. tion. Survey respondents say
fourths say their oversight “The resounding mes- they want to devote more
duties take more time, sage is that the audit com- time on the committee’s
and half say the work has mittee can’t do it all,” ACI agenda to risk management

14 Internal Auditor April 2015


Practices/Update

processes, operational risk,


cybersecurity, and changing
preserving the company brand
technologies. Cybersecurity Internal audit should have a front seat in assessing the organization’s
and technology changes are reputational risk, says Sharon Grant, vice president of customer contact
among the risk areas for and former managing director at United Airlines.
which respondents say they
want better quality infor- As a long-time airline employee, what have you learned
mation, along with talent about addressing reputational risk? You must be quick to
management, growth and learn, admit mistakes, improve, and evolve. In today’s envi-
innovation, and potential ronment, every experience is lived, felt, and shared on social
disruptors to the company’s media. A high level of active engagement is needed to ensure
business model. Moreover, that if we make mistakes, we are quick to fix them. This is a
respondents say their interac- responsibility of everyone in the organization, and the account-
tion with the chief informa- ability for owning the management of these risks is important
tion and risk officers needs to preservation of the company’s brand. Internal audit can
the most improvement. serve a vital role in driving high accountability.
In a letter respond-
ing to a recent Wall Street What should internal auditors do to assess reputational
Journal article about audit risk? Maintain credibility by being completely objective. Foundationally, internal auditors
committee workloads, IIA should be continually advancing, broadening, and elevating their skills to understand the
President and CEO Richard threats the environment could have on reputation. Tactically, internal auditors should assess
Chambers acknowledged the the current risk management structure and evaluate the specificity by which risk to reputation
need for audit committee is built into the design of controls, as well, in the reporting of the effectiveness of business
members to take on addi- functions. Because of their objectivity, internal auditors are well-positioned to harness data
tional responsibilities. “Risks and analytics to add value to the reputational-risk assessment process.
evolve, and any audit com-
mittee that resists venturing
beyond its comfort zone
does a disservice to the orga-
Cyber Disconnect
nization and its sharehold-
CISOs say executives don’t make the resources needed
information security a priority.

O
ers,” he wrote. to meet information
Even so, many boards rganizations are failing to address security requirements,
are giving audit committees cybersecurity risks because chief and the same percentage say
some relief. The KPMG information security officers their organization complies with security
survey reports that 35 per- (CISOs) and senior management standards. Two-thirds report their organization
cent of organizations have aren’t on the same page about such threats, needs more qualified cybersecurity personnel
reassigned some of the audit says a Ponemon Institute study commis- to keep up with the growing risks. “Security
committee’s nonfinancial sioned by Raytheon. Seventy-eight percent leaders lack both funding and manpower to
oversight duties to the full of respondents to the Global Megatrends in adequately protect assets and infrastructure,”
board or to other commit- Cybersecurity 2015 survey say their orga- Ponemon Chairman Larry Ponemon says.
tees. Another 32 percent nization’s board hasn’t been briefed about The report details seven cybersecurity
of organizations may do its cybersecurity strategy within the past trends facing organizations. One key trend
so next year. “A lighter year, while two-thirds say top executives is that although three-fourths of survey
risk agenda for the audit haven’t made information security a priority. respondents say their organization’s senior
committee can translate Ponemon surveyed more than 1,000 CISOs leaders view cybersecurity as a necessary
into more time for quality and other senior IT leaders for the report. cost, rather than a competitive advantage,
discussions and a deeper That disconnect at the top is reflected a Ponemon panel of information security
understanding of the busi- in CISOs’ lack of confidence in their orga- experts predicts that executives will see it as
ness,” Whalen says. nization’s cybersecurity readiness. Less than a competitive advantage three years from
— T. McCollum half (47 percent) say their organization has now. — T. McCollum

April 2015 Internal Auditor 15


Are your insights creating an impact?
Deloitte differs in how we help you deliver uncommon business insight through internal audit.
How we seamlessly shape a tailored client experience through leading-edge technologies and
methodologies. How we lead through innovation to deliver internal audit results with more
accuracy, efficiency, and value. And most important, how we turn insight into foresight. Developing
and delivering ideas that are focused not just on any tomorrow, but on your tomorrow.

See where a new approach to internal audit can take you. See where insights lead.

Learn more about how Deloitte is enabling internal audit departments to gain efficiencies, reduce
hours and impact cost recovery for their organizations. Visit us at www.deloitte.com/us/iat.

As used in this document, “Deloitte” means Deloitte LLP and its subsidiaries. Please see www.deloitte.com/us/about for a
detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest
clients under the rules and regulations of public accounting.

Copyright © 2015 Deloitte Development LLC. All rights reserved.


Member of Deloitte Touche Tohmatsu Limited
Back to Basics
By Jared Soileau + Laura Soileau edited by James Roth

Building Rapport
Good working
relationships with
audit clients can

O
ensure effective
engagements. ne of the keys to a reviewing prior audit work- focusing on the next question
successful internal papers and financial state- to be asked can all limit an
audit is building ments, understanding auditor’s ability to interpret
rapport with the trends and key performance the information being com-
audit client. While there are metrics for the area being municated. To increase rap-
many tools and techniques audited, and understanding port with the client, internal
related to building rapport the regulatory environment auditors should approach
in the general sense, internal are all ways to demonstrate meetings, interviews, and
auditors can take actions an understanding of the other interactions with the
throughout the course of business. Auditors should goal of active listening. A
their audit procedures to consider discussing any first step in this process is
build relationships with questions they have about awareness of the barriers to
their clients that will aid the client’s business with active listening, and planning
in maximizing the success their management team in meetings with the intent of
of the internal audit func- advance of client interac- minimizing such barriers
tion. These actions include tions to address any areas of and limiting distractions. In
understanding the business, uncertainty. Less experienced some situations, this could
active listening, maintaining auditors also may consider include involving another
respect for the client’s time, including more experienced team member in the meeting
a problem-solving attitude, auditors in client meetings to take on the role of scribe.
and a partnering approach to based on the knowledge level The auditor may also con-
the relationship. of the auditor and the infor- sider paraphrasing what the
mation to be discussed. client said back to the client
Understanding the to ensure an accurate under-
Business Active Listening standing of process, concerns,
Audit clients often will have There are numerous barriers and information conveyed.
more respect for internal to listening that can prevent
auditors who demonstrate an auditors from truly under- Respect for the
understanding of the busi- standing the message being Client’s Time
ness or process that is being relayed by the client. For Like anyone else, audit clients
audited. Taking time to example, lack of interest, bias, typically have many demands
appropriately plan for client external or internal distrac- for their time. Demonstrat-
interactions, including tions, time constraints, and ing a respect for the client’s

Send Back to Basics article ideas to Laura Soileau at lsoileau@pncpa.com

April 2015 Internal Auditor 17


Incisive: A New Approach to Spreadsheets
New: Embrace spreadsheets
New: Know your spreadsheets are risk free
New: Collaborate with a spreadsheet audit trail

Unmatched Visibility • Exceptional Control • Ease of Use


Learn more about spreadsheet risk management at incisive.com

300 Santana Row, Suite 200, San Jose, CA 95128


©2015 Incisive Software Corporation. All rights reserved. 408.660.3090 | www.incisive.com
Practices/Back to Basics
To comment on this article,
email the author at jared.soileau@theiia.org

process, the auditor may


elements of rapport identify risks that were not

B
uilding an effective working relationship with clients can facilitate communica- considered in prior audits.
tion and help practitioners produce more meaningful audit results. Several key To maximize the effective-
actions, in particular, go a long way toward establishing client rapport. ness of the audit, auditors
should team with the client
to identify the most appro-
Understanding
the Business
priate solutions for any risks
or issues that are uncovered.

Partnering
Historically, internal audi-
Respecting the tors have had a negative
Partnering Client’s Time
reputation in some organi-
zations due to a “gotcha”
Rapport attitude. Further, in some
organizations internal audi-
tors have been seen as the
“police,” reporting back
to management all of the
Active Listening Problem Solving things that an operating
unit is doing wrong. Inter-
nal auditors have an oppor-
tunity to build rapport with,
and gain respect from, their
time through planning in advance of the audit process, proac- audit clients by developing a partnering approach to the
tive communication, advanced scheduling of meetings, arriv- relationship. This can include working hand-in-hand with
ing to meetings and other appointments on time, and keeping the client to truly understand the root causes behind any
to scheduled meeting times and agenda items (as applicable) issues identified and working toward recommendations that
will provide an opportunity for the internal auditor to further not only address the root cause but also consider the associ-
build rapport with his or her audit clients. Further, auditors ated benefits and costs. This can incorporate reporting to
should consider turning their cell phone ringer off and avoid upper management any best practices the client has imple-
looking at the phone during meetings with the client. In addi- mented within its organization and sharing best practices
tion, to the extent possible, auditors should confirm their that the auditor has seen within other operating units.
information request list is comprehensive to minimize the back
and forth with the client. Finally, the auditor should evalu- Adding Value
ate the form of communication to ensure it is not only best Building rapport with the audit client should not only make
suited to client preferences but that it is also the most effective the day-to-day audit process more enjoyable for the internal
method of communication to obtain necessary information. auditor and the client, but ideally, it also will lead to a more
This may involve having a conversation with the client at the successful internal audit function that will add maximum
outset of the audit to identify and understand the client’s com- value to clients. While these actions may appear to be com-
munication preferences. mon sense, keeping them front of mind during interactions
with the client should result in a more positive experience for
Problem-solving Attitude all parties involved in the audit process.
Auditors should approach each internal audit with a focus
on not only understanding the internal and external environ- Jared Soileau, CIA, CRMA, CISA, is an assistant professor
ment of the operating unit, but also with an intent to peel of accounting at Louisiana State University in Baton Rouge.
back the layers of the information gathered, including any Laura Soileau, CIA, CRMA, CPA, is an associate director
exceptions identified to understand the who, what, when, in Postlethwaite & Netterville’s Consulting Department in
where, why, and how behind the information. Through this Baton Rouge.

April 2015 Internal Auditor 19


ITAudit
By steve mar

Get A View into Suspicious Transactions


Data visualization
tools can help
internal auditors

T
dig deep to uncover
potential fraud. he U.S. Centers for phase of the risk assessment any false positives and mean-
Medicare and Med- identified several high-risk ingless data, as well as to
icaid Services’ June scenarios such as processing provide data that could be
2014 Report to Con- duplicate payments, pay- released for an initial analysis.
gress on Medicare’s Fraud ing invoices for the same
Prevention System (FPS) purchases, and submitting Creating Scripts
describes how the state-of- payments to false vendors. In The review team used its
the-art predictive analytics the second phase, the review initial analysis to review
system identified US$210 team deployed a data visu- and understand the expense
million in savings during its alization tool to the existing types, attributes, char-
second year of operation. data sets. acteristics, relationships,
The FPS’ ability to identify The first step involved definitions, and unique data
savings illustrates the power planning and setting specific properties, giving it comfort
of data analytics to detect project-review objectives. with the entire data popula-
suspicious transactions. The review team interviewed tion and ensuring any results
Internal audit can lever- key process stakeholders extracted from the total data
age analytics technologies to learn the financial pro- set reflected the true nature
to audit for similar transac- cess flow and studied the of the data. This analysis
tions within their organiza- database structure and data enabled the team to organize
tion. Data visualization is dictionary. For this specific the data for visualization.
an analytic tool that can database, the team collected Because the review team
allow auditors to rapidly 700,000 transactions for a lacked experience using the
interrogate an entire transac- 12-month period. data visualization tool, it
tion history or database to Once the review team contracted with a consult-
identify the most suspicious had loaded the transaction ing firm for guidance and
transactions to investigate. data into a data analytics soft- assistance in coding the visu-
ware tool, it began the time- alization scripts. The team
A Fraud Risk Tool consuming job of cleansing and consultants collaborated
The internal audit depart- and normalizing the data to to prepare the scripts, define
ment at one Fortune 500 support the project objec- the data attributes, and
company applied data visu- tives. The data came in four determine which flags to set
alization tools to a project different files and required as conditions to search and
to assess fraud risk. The first three iterations to eliminate identify transactions.

Send ITAudit article ideas to Steve Mar at steve_mar2003@msn.com

20 Internal Auditor April 2015


To comment on this article,
email the author at steve.mar@theiia.org

Employee Expense Visualization

O
ne of the most powerful data visualization applications is tracking employee expense claims. Internal auditors
can dive deeper into data by clicking on the high point in the chart to reveal detailed information about the
data point, including employee ID, name, transaction date, and the sum of the total expense.

The consulting firm took the review team’s objec- comfortable with collecting, normalizing, and analyzing the
tives and developed a set of scripts to capture certain data data, as well as with building and running the data visualiza-
attributes and characteristics for presentation purposes. tion and then turning over a read-only version for users to run
For example, the review team determined which transac- “what if ” scenarios and identify suspect transactions.
tion types represented risks that were higher than average.
Other attributes the review team wanted to analyze included Generating Solid Evidence
unusual transaction amounts, expenses submitted by termi- Data visualization can enable auditors to provide manage-
nated employees, and duplicate expenses, especially multiple ment with reports that illustrate suspicious transactions in
transactions made on the same day, for the same amount, real time. Instead of sifting through information manually or
and to the same vendor. The team also used the tool to iden- based on one characteristic, auditors can use data visualiza-
tify unusual high-dollar or volume transactions made by job tion to identify anomalies visually by looking for outliers
classification. For example, comparing a buyer who travels from expected results and focusing on transactions that have
frequently to a salesperson who stays in one location would multiple flagged characteristics. Displaying all the underlying
reveal drastically different spending patterns. transactions that make up a suspicious transaction gives inter-
nal auditors solid evidence to support the finding.
Visual Analysis The Fortune 500 company’s CAE notes that imple-
Using the visualization tool scripts, the review team gener- menting data visualization and predictive analysis should be
ated different reports and data representations. Easy-to-use internal audit’s ambition. In today’s world, mining data to
dialog boxes enabled staff members to request reports to establish “what happened” is interesting, but answering the
interrogate the underlying data. One of the most valuable question “why?” and being able to venture “what’s next” is
reports they generated showed the highest expense spend- more valuable.
ing by a single individual in a chart form (see “Employee
Expense Visualization” on this page). Steve Mar, CFSA, CISA, is the IT audit director for a U.S.
As part of the consulting firm’s deliverable, it provided specialty retailer.
documentation and trained the review team to take over Michelle Kha, CISA, and Tricia Hardie, audit principals,
scripting the data visualization tool. The team became more contributed to this article.

April 2015 Internal Auditor 21


Risk Watch
By Paul Sobel

What Must Go Right?


Internal auditors
should pay as much
attention to the

M
upside of risk as they
do to the downside. ost internal audi- aggregate effect of uncertain Framework (IPPF) currently
tors have some events and outcomes on is undergoing revisions,
experience identi- the achievement of objec- which will be released later
fying and assess- tives.” That means that an this year. One key element
ing risks. They are taught organization’s objectives of the updated IPPF will be
to ask questions of manage- are affected by uncertain the addition of a mission
ment or themselves, such events (which may be good for internal auditing. While
as “What can go wrong?” or bad), with uncertain out- the wording of that mission
and “What keeps you up comes (which may be desir- has yet to be finalized, it is
at night?” These are good able or undesirable), causing expected to emphasize that
questions to ask, but they uncertain effects on the internal auditing should
do not get to the full spec- objectives (which may be enhance and protect organi-
trum of risks that affect an favorable or unfavorable). zational value.
organization. As stakeholder Therefore, when Protecting organiza-
expectations continue to thinking about risk, one tional value is consistent
rise, auditors who want to needs to understand that with most current assurance
be seen as a strategic asset risk can have both posi- activities; that is, organi-
must start thinking like tive and negative effects. zational value is protected
management and recognize Positive and negative effects when internal audit pro-
that not all aspects of risk represent opposite sides vides assurance that risks
relate to negative events of the same coin. Internal are managed to an accept-
and outcomes. auditors should not limit able level, controls are
ISO 31000: 2009, Risk themselves to focusing on operating effectively, and
Management — Principles only the negative side of the organization is comply-
and Guidelines defines the coin. ing with laws and regula-
risk simply as the “effect of tions. Although this type
uncertainty on objectives.” Internal Audit’s Mission of assurance will continue
Enterprise Risk Management: Each internal audit func- to be valuable, it focuses
Achieving and Sustaining tion has its own charter, primarily on the negative
Success, published by The and many functions have consequences of risk.
IIA Research Foundation, articulated a unique mis- However, as the mis-
expands on that definition sion, as well. The Interna- sion implies, internal audit
by stating that risk is “the tional Professional Practices can do more than just

Send Risk Watch article ideas to Paul Sobel at paul.sobel@gapac.com

22 Internal Auditor April 2015


To comment on this article,
email the author at paul.sobel@theiia.org

provide assurance related to the downside of risk. The but also makes the project-prioritization process more
“enhance” part of the new IPPF mission indicates that complex. Instead of just focusing on projects designed to
internal auditors are in a position to provide assurance and evaluate whether residual risk is reduced to an acceptable
advice that support the long-term value-creation process. level, other value considerations must be examined, such as
This doesn’t mean internal auditors are making manage- whether a project can increase earnings, enhance cash flow,
ment decisions, such as approving the launch of a new improve the organization’s brand or reputation, enhance
product, changing product pricing, or expanding into new customer relations, and support the strategic direction of
the organization or a particular busi-
ness segment.
Granted, it is difficult to measure
By helping management embrace the the potential value created — it’s more
art than science. But the same can be
upside of risk, organizational success said about measuring the residual risk
can be accelerated. remaining after the organization has
applied controls or other risk mitiga-
tion activities.
When deciding which projects
markets. Rather, internal audit can enhance organizational to execute, internal audit leaders must consider the “value
value by helping management feel confident in taking on bet” for each project. This bet should consider the possible
more risk. This gets to the upside of risk embodied in ISO ways the project can help protect existing value as well as
3100’s definition of risk. enhance or enable future value creation. Striking the right
balance between the two requires discussion and agree-
Taking on More Risk ment with the audit committee and management. But a
In addition to asking the question, “What can go wrong good approach to making value bets, and then assessing
that can stop us from achieving our objectives?” it’s impor- the value derived after the project is completed, should
tant to ask, “What needs to go right to help us achieve our satisfy the needs and expectations of both the audit com-
objectives?” There are many different ways internal auditors mittee and management.
can support the key strategic decisions made by manage-
ment. For example, assurance and advice can help give Accelerating Organizational Success
management confidence that: The famous race car driver Mario Andretti once remarked
ɅɅ Processes can be expanded or modified to support the that brakes aren’t for slowing you down, but rather are for
production of a new product. allowing you to go faster. That sentiment applies to internal
ɅɅ Market information is current and accurate to support auditing, as well. Assurance and advice designed to focus
pricing decisions. on mitigating the downside of risk is still important, but
ɅɅ Understanding of anti-corruption and sovereign risks is that only tells management it can tap the breaks when
sufficient, and compliance training and awareness are ade- needed. By also helping management embrace the upside of
quate to support market expansion into a new country. risk, and understanding where it can go faster — and how
ɅɅ The upside and downside risks related to a potential much faster — organizational success can be accelerated.
acquisition are appropriately understood and consid- Striking a healthy balance in the audit plan between
ered in the go/no-go decision. upside and downside risks will help internal audit activities
ɅɅ Consumer data is adequate to identify shifting consumer be seen as strategically important to the organization. As
patterns, thus supporting key marketing decisions. a key part of the organization’s pit crew, internal audit can
ɅɅ Digital marketing capabilities are sufficient to expand help management know when to drive cautiously and when
ways in which the organization reaches out to existing to make a bold move and go for the lead. Internal audit can
and new customers. contribute to effective management of both the downside
ɅɅ Reports relied on to drive major plant outage and main- and upside of risk, asking both “What can go wrong?” as
tenance decisions are accurate, relevant, and timely. well as “What must go right?”
The shift in risk mind-set to expand risk assessment and
audit planning to include both upside and downside risks Paul Sobel, CIA, QIAL, CRMA, is vice president and CAE at
creates many new opportunities for internal audit projects, Georgia-Pacific LLC in Atlanta.

april 2015 Internal Auditor 23


Be more
in Baltimore
Whether you’re adding anti-fraud skills to your résumé
or learning advanced investigation techniques, you’ll
find the resources you need to become a more ef-
fective fraud fighter at the 26th Annual ACFE Global
Fraud Conference. Join more than 3,000 anti-fraud
professionals from around the world in Baltimore,
June 14-19, and experience for yourself why this is the
can’t-miss event for anti-fraud professionals.

“There is no better anti-fraud


training than the annual
ACFE conference.”
— Rick Panske, CFE, CPA, CFF
Oshkosh Corporation

Keynote Speakers Include:

Brian Krebs Leslie R. Caldwell James T. Reese Lesley Stahl


Investigative Journalist, Assistant Attorney General Author, Former FBI Co-Editor of
Krebs on Security Criminal Division, U.S. Criminal Profiler “60 Minutes”
Department of Justice

more insight more connections more impact

Register by March 25 to save $200!


FraudConference.com
Fraud Findings
By Alistair Beauprie edited by john hall

The “Fake President” Fraud


A fraudster dupes
an unsuspecting
employee by

T
impersonating a
company executive.
“ his is urgent,” “this
needs to remain
confidential,” and
The perpetrator emailed
Martin an invoice for
€612,000 (US$694,000)
indicating the amount and
purpose of the transfers, and
urged him to act quickly.
“I’m relying on you.” from a Moldovan com- Lemaire accessed the com-
These were the phrases that pany with details of a bank pany’s banking website from
the man on the other end of account in Moldova. Martin home and approved the
the phone repeated to Cath- had not heard of Evergreen transfers without asking for
erine Martin, an accounts doing any business in Mol- supporting documentation.
payable clerk in the Belgian dova, but as the orders came The following morning
branch of Evergreen Inc., a directly from “Durand,” in Toronto, Liz Bertrand,
Toronto-based company. she was not as suspicious as Evergreen’s controller, logged
Once she hung up, she cor- she might have ordinarily onto the company’s bank-
responded with the man via been. The email was flagged ing website as she did every
their personal email accounts, as important, and, while morning before the start of
per his instructions. the message had grammati- the workday. Between sips
Martin believed she was cal and spelling mistakes, of coffee, she noticed a series
speaking with Fraser Durand, it clearly explained that the of transfers to an account
the chief financial officer money was to be transferred in Moldova. As these trans-
(CFO) of their medium-sized immediately and payment fers had been initiated and
manufacturing company, was to be divided into incre- approved in Brussels, she
and that she was helping to ments of approximately called Martin. Martin told
resolve payment to a subcon- €15,000 (US$17,000). Bertrand that the transfers
tractor because Evergreen’s For the next few hours, had been done at the request
usual account was in over- Martin received several of Durand and provided the
draft. In truth, Durand had other calls from “Durand” invoice. Bertrand then spoke
no knowledge of this trans- inquiring about the trans- to Durand, and they quickly
action and had not spoken fer. Payment was delayed realized the company had
to anyone in the Belgium because Martin needed the been the victim of a fraud.
division in more than a week. approval of Michel Lemaire, Bertrand and Mar-
“Durand” was actually the her supervisor in Brussels. tin scrambled to call their
perpetrator of an increasingly Lemaire was out of the bank and halt or recall the
common deception known as office, so Martin contacted transfers, but it was too late:
the “fake president” fraud. him on his mobile phone, Transfers totaling €186,000

Send Fraud Findings article ideas to John Hall at john@johnhallspeaker.com

April 2015 Internal Auditor 25


IIA
Audit Group Membership
Join. Save. Succeed.

Strengthen your entire team


with an IIA Audit Group
membership. Organizations with
as few as two auditors can save.

“My entire team stays on top of industry issues


with IIA’s timely updates and position papers. We’re
invited to complimentary educational programs that
we can easily fit in our schedules because they’re
offered as webinars and podcasts or in person.”
Nicole Degnan
Chief Audit Executive
The Blackstone Group
New York, New York

To learn more about an IIA


Audit Group membership go to
2015-5010

www.theiia.org/goto/group.

2015-5010 MEM-AuditGroup April 2015 IA Ad.indd 1 3/9/15 2:21 PM


Practices/Fraud Findings
To comment on this article,
email the author at alistair.beauprie@theiia.org

(US$211,000) had been successfully sent to Moldova. The personal email accounts designed to spoof the details of the
Belgium office filed a police report and began to prepare an person the perpetrator is attempting to impersonate such
insurance claim. Ultimately, the perpetrator was able to suc- as “Fraser@gmail.com” is common. Alternatively, perpe-
cessfully withdraw the proceeds of the fraud and escape justice. trators may use email accounts designed to approximate
This fraud was successful for a variety of reasons. First, genuine corporate email accounts such as “CFO@com-
the perpetrator had done his homework by researching Ever- paany.com” (often with extra vowels or other small mis-
green thoroughly. Information about Evergreen executives spellings). Spelling and grammatical mistakes are another
was publicly displayed on the organization’s website, and red flag. Company or banking details in countries that are
known to be at risk for fraud or not
known to be areas where the company
does business are also indicators that
Social engineering is an increasingly the transaction may not be genuine.

powerful tool available to perpetrators. Finally, a sense of urgency from the


caller and a desire for confidentiality
and to circumvent controls are com-
mon in such schemes.
company promotional videos may have helped the perpetra-
tor to perfect Durand’s accent and mannerisms. Knowing Lessons Learned
details such as reporting lines, names, and titles of employees ɅɅ Employees should be educated about the “fake presi-
helps perpetrators avoid arousing suspicion. This practice is dent” fraud and similar schemes. Internal auditors can
known as social engineering, and it is an increasingly power- help by offering formal training that ensures employees
ful tool available to perpetrators in the digital era. are aware of the red flags and are encouraged to be
The second factor behind the perpetrator’s success was skeptical. Upper management should visibly buy into
his knowledge of corporate policy. He had an invoice on these efforts by publicly stating their approval, and
hand to justify the payment to a “subcontractor,” adding show potentially targeted employees that it is acceptable
legitimacy to the transaction, and asked for the payment to challenge suspicious requests for payment.
to be split into increments — a practice known as structur- ɅɅ Internal auditors can perform an internal controls review
ing. By splitting the amounts into smaller increments, the of the cash disbursement function in light of the “fake
perpetrator was able to avoid the usual authorization limits president” fraud. Payments should not be made to an
and approval process around cash disbursement. A perpetra- organization or bank account not already in the ven-
tor may not know the exact authorization limits, but may dor master file. Changes or additions should always be
specifically ask the target or simply guess at common limits approved by more than one employee and confirmed
for an employee based on his or her title. Perpetrators also with a known contact at the payee. Controls on approval
have been known to assume the identity of a genuine sup- limits should be adjusted to prevent the structuring of
plier or vendor, while providing the targeted employee with payments or transactions to pass beneath limits.
new, fraudulent banking details and asking him or her to ɅɅ Every company should have a financial authority limits
pay all unpaid invoices. Additionally, some perpetrators will policy that provides employees clear direction with
add legitimacy to their email communication by copying respect to the approval process. Internal auditors can
an unwitting external professional in email communica- perform a review to ensure that the policy is followed.
tions — perhaps a partner in a law or accounting firm. ɅɅ Employers should be aware of the information employ-
The biggest advantage that perpetrators of this fraud ees make public via social networking websites —
have is that it is easily repeatable with other companies. If especially LinkedIn. Formal training offered by the
discovered, a perpetrator will likely just hang up and move on internal audit department should cover the risks posed
to the next target. Perpetrators typically use a prepaid, dispos- by social media.
able mobile phone and operate out of jurisdictions with lax ɅɅ Internal auditors should consider reviewing information
enforcement, minimizing the chance of being caught. As the the firm makes public on its website, such as employee
dollar values involved in these schemes are high, perpetrators positions, email addresses, and phone numbers.
only need to be successful once to make it worth their while.
In this situation, the targeted employee did not notice, Alistair Beauprie, CPA, CA, CFE, is a senior accountant at
or failed to act upon, several red flags. The use of bogus EY in Montreal.

April 2015 Internal Auditor 27


knowledge sharing

W  hen Denis Bergevin stepped into


the role of deputy director in charge of the Internal Audit
Division at Caribbean Development Bank, Barbados, in
May 2014, he knew it would be a challenge. The bank had
already upgraded its risk management function and some
of its compliance activities. Now it wanted to achieve the
same with internal audit — a move fully supported by the
organization’s senior management.
“They had never had an experienced internal auditor
Arthur Piper at the helm of the department before,” he says. “They did
have a very solid charter, so that was my starting point — 
to sit down with them and explain to them what internal
audit should do.”
Audit But with a team of just four people — including Ber-
departments gevin — resources and time are tight. Not only that, but
for the past 40 years internal audit at the bank has focused
of limited size largely on compliance. One of his first moves was to ensure
can learn a lot that other compliance functions and management took on
that role to free up his team.
from their larger Communicating these changes to management has

counterparts, been key, says Bergevin, who has allocated two or three
days a month to this task. In addition, he has devoted
but they have about three of the past eight months to developing a list
of relevant audits as well as the criteria he will use for
much to teach audit selection. With limited resources, it is crucial to
as well. get the focus, depth, and duration of each audit right,
he says.
Modernizing a small function in this way depends
on taking the best practices larger audit functions use and
making them work in an alien environment — where peo-
ple and time are extremely limited. For Bergevin, working
at the bank is a world away from previous roles — includ-
ing more than seven years spent in Audit and Risk Man-
agement Services at the Canadian telecom giant Bell,
which at one time boasted a team of 135 internal audi-
tors. But he is optimistic that the practices he learned at

28 Internal Auditor April 2015


Small Audit
Functions
Big
April 2015
Ideas Internal Auditor 29
Small Audit Functions Big Ideas

Bell and elsewhere can be used to audit functions — including a stint as


transform his department. vice president of Internal Audit at the
Bergevin also says that the way global pharmaceutical company Astra-
small audit functions operate can pro- Zeneca — to develop a “lean approach”
vide useful lessons for larger functions. to internal auditing, which he says could
He says smaller departments eliminate help small functions concentrate on the
the narrow skill specialization of staff in fundamentals of best practice.
larger departments because every person Now a director of the consultancy
on his team has to be capable of taking Risk and Assurance Insights in Man-
on most audits. Auditors also have closer chester, U.K., and author of the book
contact with senior management, some- Lean Auditing: Driving Added Value and
thing that seldom occurs in a larger func- Efficiency in Internal Audit, Paterson says


tion. And, he says, auditors in smaller he believes in focusing rigorously on
teams develop better business acumen driving value and productivity. Key to
because they are close to the action.
A mistake that that strategy is developing close relation-
“In a small audit function, the inter- smaller audit ships with senior management and the
nal auditor who did the work is the one functions can function’s other stakeholders to ensure
presenting the findings to the highest make is to that the work performed has real value
level of the organization,” he says. “That hunker down, to them. In many ways, that is some-
helps the auditor build relationships and lose sight of thing small audit functions are as equally
understand how management thinks.” well-placed to achieve as their larger
Even if small audit functions
the broader counterparts, he says, because the head
often face larger hurdles, the truth is picture, and of audit is often the one performing the
that functions on both ends of the size focus only on work and talking directly to the clients.
spectrum have a lot to learn from each one major “Small audit functions need to be
other. Differences in the way small audit.” the most plugged in to management and
departments are funded and trained, smart at making choices about what to
and how they operate, offer fertile Charles Windeknecht do,” he says. “That’s key because when


suggestions for improvement for large they devote resources to something, it is
functions, and vice versa. always going to be a significant propor-
In a small tion of their budget, so effort has to be
audit function, Cutting the Waste directed at the right thing.”
the internal Because resources are constrained As well as ensuring that any other
auditor who in small audit functions, they have compliance and assurance functions
to be accurately and parsimoniously are producing quality work , he says the
did the work employed so that waste is reduced to a function’s job is to drive accountability
is the one minimum. That does not always hap- for management and fix its problems.
presenting pen, of course. Many small functions For example, he sees little point in audit-
the findings do not have the leadership, experience, ing a known issue unless management
to the highest and skills to implement such initia- has already started work on fixing it and
level of the tives. Many are stuck in a compliance the value from any audit work is clear.
rut. And many small function audit For example, audit’s value might come
organization.” executives are low down the business’ from helping to identify the root cause
Denis Bergevin leadership hierarchy, without authority of a problem, or to review the progress
to make the sort of sweeping, strategic management has made in fixing it.
changes that Bergevin is introducing. In addition, Paterson says assign-
But that does not mean they can- ment planning should, in most instances,
not adopt big function best practices if be approached like a mini-project, with
they remain focused and selective. James clear deadlines and a sense of the value
Paterson has used his experience at large that will be created. That can often entail

30 Internal Auditor April 2015


Visit our mobile app + InternalAuditor.org to
watch a video discussion of small-function best practices.

prioritizing the scope of the work and


being clear about what a helpful result A Matter of Size

M
might be. “This approach tries to avoid ost internal auditors work in small audit functions. In its State of
coming up with audit findings that are Internal Audit Survey 2012, Thomson Reuters estimated that
simply housekeeping points, or within 67 percent of functions have fewer than 10 people working in them
management’s risk appetite,” he says. and 80 percent have fewer than 20. But defining what constitutes a small
He adds that lean auditing can audit function can be tricky, according to David O’Regan, author of Strate-
encourage greater flexibility in assign- gies for Small Audit Shops, now in its second edition.
ment types. “A small audit function may “Whether one approaches this matter in either absolute or relative
be much more likely to generate value terms, it tends to be difficult to avoid a certain amount of ambiguity,” he
from, say, two 25-day assignments than says. “In absolute terms, an audit department that consists of one to three
from one 50-day assignment,” he says. auditors is certainly small in most circumstances, yet a 30-strong team
“If stakeholders want more on the issue might also be considered small in some contexts.”
after a 20- or 25-day assignment, you He says there are comparative metrics that can be useful in determin-
can then identify another specific area ing how small a function is in relation to its peers — for example, the ratio
to look at next, rather than just using up of the number of auditors to revenues or assets and the size of the audit
50 days in a scattergun way.” budget as a percentage of the organization’s total budget. “In the end, I
He admits that lean auditing think a definition is dependent on organizational and sector context, and it
requires much more planning and should take into account the head count, the levels of experience of indi-
information gathering at the beginning vidual auditors, and the amount of budgetary resources at the disposal of
of the process to identify the right areas the audit department,” he says.
of focus and the key areas where value
can be added. The upsides are that the
audit will often progress in a more pur-
poseful way and, when audit work is
produced, it has a far greater chance of “I shared the initial results with the Looking for Capacity
being valued by the client. chief financial officer,” he recalls. “The Windeknecht says one major challenge
assessment gave us a framework, some of running a small audit function is
Taking Time With Standards definable standards to work to, and a ensuring a high degree of collaboration
To small audit functions, compliance roadmap for us to improve in specific among team members and with the
with The IIA’s International Standards areas where we knew we could do bet- business owners. The challenge is more
for the Professional Practice of Internal ter.” He also says that it gave him an daunting with smaller teams, as there is
Auditing (Standards) may be seen as opportunity to educate senior manage- often only one person conducting each
prohibitively time-consuming. “The ment about the Standards and provide audit. “A mistake that smaller functions
main challenge that small functions transparency and honesty about the can make is to hunker down, lose sight
face on the Standards is finding the time function’s current performance. With- of the broader picture, and focus only
to take account of the different con- out taking the time to go through the on one major audit,” he says. “But IIA
stituencies you serve in the organization process, the function would have lacked members have set up some great net-
and determine where your focus needs direction and been less engaged with works to plug into and share knowledge
to be,” says Charles Windeknecht, vice senior management. and information in an informal and
president of Internal Audit at the global The 2015 head count for Atlas collaborative way, which can save a lot
airfreight business Atlas Air Worldwide Air’s internal audit department is eight of time.” He says that he has benefited
in Purchase, N.Y. full-time posts. So, Windeknecht knows numerous times from his participation
Bypassing this step is a false econ- from experience that performing a in the Airlines 4 America internal audit
omy. When he took over the reins at self-assessment can be tough while try- networking group, for example, and
Atlas Air more than seven years ago, ing to keep the function working. He local IIA chapters.
his first priority was to carry out a cur- says heads of audit at small functions Windeknecht says small firms often
rent state assessment against the Stan- can manage it by staying practical and have a surprising amount to offer their
dards to see how well internal audit organized, and by keeping the process as larger counterparts in terms of shar-
was performing. simple as possible. ing information in these networks. He

April 2015 Internal Auditor 31


Small Audit Functions Big Ideas

recently shared his function’s entire


quality assurance program with a
department five times larger than his
own, and he has also passed on advice
about how to update an audit charter to
another large function. “You can’t be shy
to reach out to the big functions and the
forums,” he says, “because you will find
the way you work is likely to be of inter-
est to them — it cuts both ways.”


One advantage small functions
have over their large counterparts is
their ability to be closer to management Go for one
and understand their needs thoroughly, process, one
which can make their processes practical tool, even just
and relevant to the industry they serve. a few features
“Large audit functions don’t always get within that
the pulse of their organization from the
perspective of its entrepreneurial spirit,
tool, so you
or from a strategic growth standpoint,” fully master
says Alyssa Martin, advisory partner what you are
at the independent accounting firm implementing.”
Weaver in Dallas. “Large functions
Mike Gowell
become a little bit more isolated from
the nerve center of the organization.”
She says this knowledge can make
smaller audit functions more nimble and
responsive to management plans and
better able to keep close to the business’
strategy. In addition, small audit teams,
when working well, tend to focus more


on making the business better, rather
than on compliance — a lesson large
Large audit functions could do well to learn, she says.
functions don’t Yet even the most plugged-in,
always get the highly focused small audit function
pulse of the can suffer from lack of capacity, some-
organization thing that is made worse because of
from the the limited range of staff that work
in such functions. “Every small func-
perspective tion is at the mercy of the background
of its and expertise of the individuals on the
entrepreneurial team,” Martin says. She says a team of
spirit.” three to five auditors is unlikely to have
the in-house expertise to cover every
Alyssa Martin
financial, operational, strategic, and IT
issue in depth. And while hiring staff
to deal with IT risk, for example, is a
problem for the entire profession, the

32 Internal Auditor April 2015


To comment on this article, email
the author at arthur.piper@theiia.org

budget needed to buy such expertise for 2013 — it found that small functions
a small function could be prohibitive. were 20 percent less likely to be
Martin says audit functions can using data analytic tools, and only
work with their peers in noncompetitive 35 percent of small functions said that
industries to plug some of that gap — a their IT budgets would increase (com-
practice common in larger organiza- pared to 42 percent overall). Smaller
tions. In the retail and banking sector, departments were using cheaper solu-
for example, she knows of CAEs who tions — such as Excel and Access — for
peer review noncompeting businesses in data analysis. But 28 percent of small
quality assessment exercises. It is a form audit function respondents said all
of skills bartering and exchange. staff members on their teams were
“Of course, you have to be sure “fully proficient” with their audit tech-
that from a strategic and intellectual nology tools, compared with only 18
property perspective those peers are percent of large-function respondents.
truly noncompetitive,” she says, “but it “We were surprised by the degree
can be a much better option than buy- of technology use by the small func-
ing that expertise on the high street.” tions,” says Mike Gowell, general man-
As a provider of cosourced inter- ager and vice president of TeamMate,
nal audit services, Martin supports an operating unit of Wolters. “Those
the idea of hiring skills where they are who can afford the technology and
needed — a strategy followed by audit acquire it want to wring a lot out of it.”
functions of all sizes. But she warns that He says small audit functions need
See on a per-hour basis, cosourced hours to take an incremental approach to their
“Eye on are always likely to be more expensive IT acquisition and training. “Go for
Business,” than those spent by in-house staff. one process, one tool, even just a few
page 66, for Recruiting in-house presents chal- features within that tool, so you fully
more on
small audit
lenges as well, and Martin urges heads master what you are implementing,” he
functions. of small functions to balance their needs says. This helps selling the benefits of IT
realistically: “I think you have some that spending to senior management, who
you know are going to be highly ambi- can see incremental improvements to
tious and critical thinking and you might the efficiency of audit work, he adds.
be able to keep them, from a retention
standpoint, for a year or two,” she says. Sharing knowledge
“You have others who you want to keep It would probably surprise some that
long-term, and they perform consistently with their limited resources, small func-
and have good auditing skills.” tions can teach their larger counterparts
lessons — but the very existence of those
Making the Most of IT constraints have lead to efficient prac-
While large audit functions have bigger tices that bigger departments would do
budgets for hiring staff, they also have well to emulate. Similarly, larger func-
more money to spend on audit software tions’ broader range of industry knowl-
tools and IT training. That means staff edge and up-to-date best practices can be
in small functions are most likely to be of great benefit to small function heads
trained on IT tools in-house, but that of audit and their staff. Sharing such
has had some surprising results. experiences and knowledge should be a
When the technology services priority for both groups of auditors.
company Wolters Kluwer Audit Risk
and Compliance conducted a survey Arthur Piper is a writer who specializes in
of nearly 300 small function internal corporate governance, internal audit, risk
auditors — Audit Technology Insights management, and technology.

April 2015 Internal Auditor 33


Data Designed
for Development

Imagine What You’ll GAIN Turning


Your Information Into Insights.
Do you want to know how your internal audit department measures up? The Global Audit Information
Network® (GAIN®) Benchmarking Tool allows you to benchmark your internal audit department easily,
affordably, and transparently. It lets you compare your audit department’s size, experience, and other
metrics against the averages of similar organizations in peer groups that YOU choose.

Find out how you compare with your peers with reliable data and metrics including:

■ Performance measures.

■ Organizational statistics.

■ Department staffing and costs.

■ Operational measures including audit life cycles.

■ Risk assessment and audit planning information.

■ Oversight including audit committee information.

No matter what your benchmarking needs are, the GAIN Benchmarking Tool has you covered. Your final
report will benchmark your organization with participants in 17 industries, more than 100 sub-industries,
and 42 countries, unlocking real answers to organizational questions.

Get Started Today!


2015-5022

Visit www.theiia.org/goto/GAIN

2015-5022 AEC-GAIN Ad April IA_FNL.indd 1 3/6/15 4:42 PM


technology

Digital Signatures
Deciphered
Shiva Hullavarad
Russell O’Hare
Ashok Roy

Internal auditors should


assess the business
processes and risks
associated with signing
documents digitally.
I n today’s digital business environment, internal
auditors have to assess the risk and security of large
volumes of digitally originated transactions and docu-
ments. Among the many methods, protocols, and
products for securing online transactions are digital
signatures. For example, the mortgage industry uses digital
signatures for approving real estate negotiations by affixing
them to price or contract changes until both parties agree
on terms and a price. Once they have reached an agree-
ment, the parties execute the title transfers with a notarized
ink signature.
Digital signatures improve efficiency, provide security
around transactions, and enhance collective approvals in a
fraction of the time compared to conventional ink signa-
tures. Nonetheless, there is always the danger and fear of
unauthorized or malicious use of digital signatures. Internal
auditors and organizations need to assess the level of risk
and to what extent the organization should secure its digital

April 2015 Internal Auditor 35


Digital Signatures Deciphered

signature platform. Moreover, auditors authentication to establish confidence


should consider the trade-off between in user identities that are electronically
the level of risk digital signatures pose presented to an information system.
and the level of authentication required Individual authentication is the process
to provide desired levels of assurance of establishing an accepted level of con-
while accepting them. fidence and assurance for an accepted
level of risk.
Proof of Authenticity There is a direct relationship
A digital signature is an electronic between the associated risk and the
sound, symbol, or process attached to complexity of authentication needed
or logically associated with a record to provide a higher degree of assur-
and executed by a person with the ance in the use of digital signatures.
intent to sign the record. In layman’s Higher levels of assurance need com-
terms, it is a person’s electronic expres- plex, multifactor authentication meth-
sion of agreement to the terms of a ods that, in turn, require a secure IT
particular document with the intent infrastructure and user training. This
to sign. A scanned or photographed correlation poses a trade-off challenge
image of a written signature does not to auditors and organizations willing
constitute a digital signature, as it is to accept digital signatures, thereby
analogous to affixing a rubber stamp compelling them to identify those
of the signature that can be duplicated business processes that require an
To comment or misused without the signer’s knowl- optimum level of authentication to
on this article, edge. Instead, digital signatures provide offset risks.
email the a secure encryption environment for Digital signatures are built on
author at the data associated with a signed docu- an encryption/decryption technology
shiva.hullavarad
@theiia.org
ment and verify the authenticity of a that a) collects evidence of the docu-
signed record. ment such as metadata and IP address,
To authorize transactions, digital b) verifies the identity of a signer and
signatures use a combination of content receiver, and c) provides an audit trail
capture, method of signing, data, and of the transactions. This technology
user authentication. They use electronic uses a public key infrastructure (PKI)

How Digital Signatures Work

D
igital signatures use private/public keys and hash results of the
original and destination documents. The digital representation or
summary of the document unique to a message origin-hash result
(OHR) is created by the hash function of the digital signature software.
In turn, this software uses the signer’s private key to transform the hash
result into a digital signature that is unique to the message. Upon receipt
of the document, the transmitted message computes a new destination-
hash result (DHR) by using the same hash function used to create the
digital signature. Using the corresponding public key and DHR, the receiv-
ing computer confirms whether the affixed digital signature was created
using the matching private key and whether both the OHR and DHR
match. If both the keys and hash results are a match and confirmed, the
validity of the message, signer, and receiver are verified.

36 Internal Auditor April 2015


81% of digital signature projects achieved return on investment
within , one year
according to the 2013 Digital Signatures survey by the Association for Information and Image Management.

Digital Signature Risk to Authentication

T
he chart below illustrates the digital signature risk-to-authentication model. This model
provides a semi-quantitative approach to assess the associated risk for a given level of
authentication used to provide a digital signature.

100

Level 0 Identity does not require authentication through trusted domain.


Level 1 Identity requires authentication through trusted domain (e.g., @edu).
75 Level 2 Identity requires single-factor authentication against trusted domain.
Level 3 Identity requires multistep or multifactor authentication.
Level 4 Identity verified by multifactor authentication and a biometric identifier.
Risk (%)

50

25

Trade-off Zone
Higher level of authentication reduces risk,
but typically takes longer to approve.

0 1 2 3 4
Level of authentication

in which the signer uses his or her platform is compromised, the digital desired level of trust for an electronic
private key to encrypt the document signature and PKI lose their authentic- transaction, as well as the authentic-
and the recipient uses the correspond- ity and validity. ity, integrity, and reliability of such
ing public key to decrypt it (see “How transactions. This can be accomplished
Digital Signatures Work” on page 36). The Risk–Assurance Trade-off through a quantitative risk assessment
A digital signature requires a signer “Digital Signature Risk to Authentica- for each transaction specific to a func-
to establish a certificate-based digital tion” on this page depicts the trajectory tional unit by estimating the risk and
ID, commonly enclosed in a token, for risk tolerance versus level of authen- the likelihood of occurrence. Use of the
smart card, or other physical device, to tication for a typical business process. SRA model can give internal auditors
provide a high level of authentication, The trajectory slope may vary with an understanding of internal controls
integrity, and security to the transac- the nature of the business process. For and security needed when their organi-
tion and the identity of the parties example, financial transactions, approv- zation implements digital signatures.
signing. The executor or signer is pre- als, or decisions generally have a higher The SRA model provides a semi-
sumed to be legally responsible for any degree of risk, based on their monetary quantitative approach to assessing
document signed with a private key. value, than administrative functions the risk associated with a given level
The important consideration such as leave requests. of authentication used to provide a
when assessing the risk for digital sig- The digital signature risk-to- digital signature. As a general rule,
natures is their provisioning through authentication (SRA) model depicted the higher the level of authentica-
e-mail communications, which makes in the chart provides a framework tion, the lower the likelihood that an
Internet security critical. If the e-mail for internal auditors to establish the incident, or breach, will occur and the

April 2015 Internal Auditor 37


Digital Signatures Deciphered

Authentication Levels

A
uthentication focuses on confirming the authenticity of the document and the validity of the signer based
on pre-established and verified credentials. This table shows the authentication levels, equivalent electronic
modes of authentication, and risk of compromise.

Level Signer’s Identity Electronic method Risk of compromise


Verification Description
0 Unknown Unknown domain email, suspicious email domains. High
1 Requires validation Organization employee directory generated user ID and Medium
with IT password or organization email.
2 Level 1 + single factor Organization email + digital signature (PKI). Low
3 Level 2 + double factor Organization email + digital signature + workflow. Lower
4 Level 3 + biometric Organization email + digital signature + workflow + approver. Lowest

lower the risk. Although the nature of business processes and the level of necessary to have a secure transmis-
the risk versus authentication curve severity, the assurance levels — which sion process that ensures a document
may be different for different busi- are a combination of authentica- signed through a digital signature is
ness processes, the pattern will tend tion and validation — as well as the not tampered with by a third person
to follow the path of reduced risks for trust levels must be established by and reaches the recipient in the form
higher authentication. Internal audi- the appropriate business-unit man- in which it left the signatory. Organi-
tors or management can develop a risk agement. To secure an electronically zations also need to determine which
chart based on the formula: Risk (R) = signed document as evidence, auditors business processes are not appropriate
Likelihood of occurrence of event (L) x should consider the risks associated for digital signatures, such as creating
Magnitude (M). with the signing process and with wills, testamentary results, and certain
To illustrate the formula, assume the significance of the information. types of contracts.
that one in 30 email accounts are Security must be approached with the Internal auditors and their orga-
hacked. Based on this assumption, the objective of managing potential risks nizations need to identify the various
risk can be calculated by assessing the and should be weighed against the level processes for which they plan to use
monetary magnitude of the effect of of authentication needed to achieve digital signatures, as well as perform
hacked emails on an organization. The the desired level of risk tolerance (see a comprehensive risk assessment of
trade-off zone depicted in the chart “Authentication Levels” on this page). those processes. The digital signature
provides an opportunity window to Internal auditors can use this risk to authentication model can help
secure the digital signature environ- model to assess the risk/assurance auditors assess the level of authenti-
ment to achieve the desired level of needed for digital signatures. Because cation suggested for a specific busi-
assurance, thereby enabling organiza- systems are imperfect, auditors should ness process to ensure it provides the
tions to identify those processes that consider the reliability of the informa- desired level of assurance.
require optimum levels of authentica- tion obtained through the digital sig-
tion to offset risks. nature validation process. For example, Shiva Hullavarad, PHD, is statewide
The key factor to consider in they should consider whether digital ECM/ERM System Administrator with the
implementing digital signatures is to signatures can enhance internal control University of Alaska System in Fairbanks.
identify the level of risk tolerance and over online sales orders by authenticat- Russell O’Hare, EDD, CRM, is chief
the associated risk for a business pro- ing the validity of customers. records officer with the University of
cess. Institutional risks may involve Alaska System.
financial, brand-value reputation, and Digital Assurance Ashok Roy, PHD, CIA, CFSA, CBA, is
other key administrative communica- As the Internet is an essential tool for vice president for finance and administra-
tion. Based on the various types of transmitting digital signatures, it is tion with the University of Alaska System.

38 Internal Auditor April 2015


We Are Proud to Be
Internal Auditors!
As internal auditors, we’re proud of our profession. So why not celebrate
and help the world understand what internal auditing is all about? It’s not
about accolades. It’s about awareness.

May is International Internal Audit Awareness Month, and The IIA is


encouraging members, chapters, and institutes around the globe to
spread the message of the value internal auditing brings to an organization Show the world you’re
and the business community.
proud to be an internal
Download The IIA’s updated Building Awareness Toolkit, featuring auditor with the 2015
creative ideas, tips, tools, and templates for promoting the profession
in May and throughout the year. International Internal
Mark your calendars for International Internal Audit Awareness
Audit Awareness Month
Month: May 2015! celebration icon!

www.theiia.org/goto/awareness

2015-5024

2015-5024 PR-Corp Communications April Ia Ad.indd 1 2/27/15 11:26 AM


Russell A. Jackson A smart approach to
Illustration by Doug Ross U.S. Affordable Care Act
compliance begins with
a comprehensive risk
assessment.

Untangling
the ACA

40 Internal Auditor April 2015


health care

J udging by what’s been


said about the U.S.
Patient Protection and
Affordable Care Act
(ACA), it’s no wonder it’s
been perceived as too com-
plex for any but the most
dedicated Washington, D.C., policy
experts to understand. Yes, the ACA is
dense. No, compliance won’t be easy.
And auditing readiness for compli-
ance — and compliance itself — won’t
be easy, either. But internal auditors
who’ve been through the fire say that
once you get an idea of your organiza-
being and focus your attention on other
risks that pose a bigger threat.
“It’s not as scary as you might
think,” reports Annette Schandl, senior
vice president of audit at CHAN
Healthcare, based in Clayton, Mo.,
a subsidiary of Crowe Horwath LLP.
“From an internal audit perspective,
management should have specialists in
place to implement the ACA. Once the
implementation is complete, internal
audit should perform testing of the pro-
cess.” Internal audit, she adds, needs to
have a seat at the table as ACA policies
and procedures are developed, to make
still auditing, no matter how Byzantine
the beast.
That’s not to diminish the frustra-
tion and confusion organizations are
experiencing in the face of something
that’s received so much scrutiny and
been the subject of so much com-
mentary. “It’s just too complicated,”
says Emily Friedman, an independent
health policy and ethics analyst based
in Chicago. “Even human resources
professionals are having problems
knowing what to do.”
Indeed, a recent report from
human resources (HR) and payroll
tion’s risk profile in relation to the act, sure the right controls are considered. consultant ADP shows that more than
you may be able to sit back for the time But the bottom line is this: Auditing is half of companies with at least 1,000

April 2015 Internal Auditor 41


Untangling the ACA

employees are unprepared to com- be difficult for most firms, but those
ply with all of the ACA’s regulatory firms’ internal auditors can accomplish
requirements. Key components of the their part in it by focusing on perform-
law that pose particular compliance ing tasks they are familiar with and not
problems, ADP says, include Exchange be daunted by the unfamiliarity of the
notices, penalties, and reporting entire act.
required to the U.S. Internal Revenue
Service — all areas that internal audit Risk Assessments
will likely need to help rank order by The trickiest part of compliance for
risk and then compliance, which they’ll Bellevue, Wash.-based Nordstrom was
need to assess. “anything related to the Cadillac tax,”
Additionally, many larger compa- notes Dominique Vincenti, vice presi-
nies are using benefits strategies that dent, internal audit and financial con-
shift more costs to employees in the trols. But she adds that the difficulty
wake of the excise tax on high-value was largely self-inflicted, because the
health plans that becomes effective company maintains both an HR and
in 2018; others are limiting hours for benefits department and a tax depart-
some employees to avoid the cover- ment, and “some of the taxes that the
age mandate. Employers now have to company had to deal with are managed
count “hours of service,” notes Jerry by the HR department and not the tax
Healy, employee benefits counsel for department.” Each thought the other
Keenan & Associates, in Torrance, was taking care of it, so no one was tak-
Calif., calling it “a new defined term ing care of it.
not commonly used for benefits.” As But a detailed risk assessment —
such, he adds, the term not only has which her department conducted

Even if the ACA presents areas new to


internal audit, the tasks auditors need
to perform in response are not.

to assimilate into the workforce and its specific to the ACA — turned up the
medical plans, but maybe also into col- fact that the management team had
lective bargaining agreements. Many not thought clearly in terms of roles
To comment firms don’t have the systems in place to and responsibilities and the tax impli-
on this article, track and report that new information. cations of the ACA. “We caught it very
email the Other items that need to be early,” she says now, “which allowed
author at addressed, he adds, include special us to highlight to management the
russell.jackson@
theiia.org
transition rules, communications to intricate complexities of the tax impli-
employees, U.S. Department of Labor cations and to get both departments at
audits of certain health plans, and the the table to agree on allocation of roles
Mental Health Parity and Addiction and responsibilities.”
Equity Act. Even if those are areas new She adds that, because of that
to internal auditors, the tasks internal detailed risk assessment, her team’s role
auditors need to perform in response in helping the department store chain
are not. Complying with the ACA will address the ACA is largely complete —

42 Internal Auditor April 2015


The Congressional Budget Office estimates US$8 billion in penalties will be
collected by the U.S. Internal Revenue Service from employers who misclassify full-time employees.

at least for now. “The ACA, like any senior vice president and general audi-
other law or other regulation we have tor at CareFirst BlueCross BlueShield in
to comply with, is part of this big Owings Mills, Md., involves “processes
compliance pool made up of a bunch and types of audits that are familiar to
of stuff,” she explains. “It’s no worse an internal auditor.” It requires analysis

Consider internal processes as well as


partners and vendors.
or better than the others. It’s one of of complex processes that many internal
many.” In fact, she states simply: “We auditors likely have never faced before.
feel at this point that the ACA doesn’t But while “you may not be accustomed
rise on any radar. It’s been very quiet.” to the complexity,” she adds, “you do
The company’s general counsel main- know how to initiate inquiries needed
tains compliance oversight responsibil- to assess risk. We worked very closely
ity. Vincenti meets with him twice a with the business to find the informa-
month to “see if anything is starting to tion needed.”
bubble up.” She says her company formed a
Sharon Gipson, vice president, health reform steering committee that
corporate audit, at Detroit-based Blue divided compliance into five tracks.


Cross Blue Shield of Michigan, agrees “We embedded an internal auditor
that a smart approach to ACA compli- in each one,” she says, “so that as the
ance starts with a comprehensive risk company developed compliance strate-
The ACA, like
assessment. “You need to understand gies, we understood them and could any other
what pieces of the ACA are applicable efficiently direct our audit activity.” law or other
to you and make some decisions about That’s critical, she emphasizes, “as the regulation
what to focus on,” she says. Essen- auditors cannot work in a vacuum. At we have to
tially, she advises considering not only the end of the day, we are in partner- comply with, is
internal processes, but partners and ship with the business to mitigate the
part of this big


vendors as well because, she notes, risk to the company. The ACA is too
“they can introduce as much compli- complex and too fast-moving. You can’t compliance
ance risk into your organization as you work in a silo and then show up to pool ... it’s You need to
can within the organization.” Then, of conduct an audit.” no worse or understand
course, you “lay out how to address the Carl Mowery, managing director, better than what pieces
higher-risk areas first,” she says. “Once compensation and benefits consulting the others.” of the ACA
you have an understanding of which at Grant Thornton LLP in Chicago, are applicable
portions of the ACA impact you and agrees that internal auditors won’t be Dominique Vincenti
how they’ve been implemented and are mystified at the specific tasks required
to you and
operating within your organization, to audit for ACA readiness and com- make some
you can focus your efforts.” pliance. “Conceptually, it’s the same decisions
thing,” he says. “If an internal audit about what to
Business as Usual department is accustomed to doing focus on.”
If that sounds a lot like what internal employee benefit audits, it’s similar to
Sharon Gipson
auditors do every day, that’s because those, but a little bit more detailed.” In
it is. Ensuring employer readiness and many benefits audits “some leeway can
compliance, says Gwendolyn Skillern, be had,” he adds, “but the ACA really

April 2015 Internal Auditor 43


Untangling the ACA

does not provide much flexibility, so behind with internal audits, giving
particular attention will have to be management time to implement each
paid to the details.” aspect,” Schandl says. “Try to have a
seat at the table throughout as manage-
Meeting Requirements ment plans its approach to each stage of
Many of the most challenging of the law.”
those details will arise as internal
auditors “really look at the controls Understand that ACA issues are
processes and procedures that have not only concerns of the HR or

The right approach to preparing for


the ACA should make auditing for
compliance fairly routine.

been implemented to determine who benefits departments. “We high-


is a full-time employee and track those lighted the importance of coordinated,
employees from the perspective of the regular communication between HR
reporting and record-keeping require- and benefits and the many other stake-
ments of the ACA,” Mowery adds. “If holders that need to be informed or
an organization does not have those consulted with,” Vincenti says. “An
controls processes in place when the objective of the risk assessment was
external auditors come, it may have to a robust inventory of all the implica-
record a contingent tax liability.” tions of the ACA, which helped in
Generally, there is a US$2,000 categorizing them by ownership.”


penalty per employee for not having
offered coverage to 70 percent of full- Be prepared to do battle with an
We worked time workers; that percentage rises unknown foe. “The most challeng-
closely with to 95 percent next year. “Part of the ing part is that you’re already into a
our legal and compliance process is understanding process and your guidance is still being
compliance who is a full-time employee and who is communicated,” Gipson points out.
not,” Mowery notes. “Be sure to look “As some of that guidance is final-
offices to at independent contractors as well as ized, you may have to go back and
ensure we leased employees.” Under the ACA, make adjustments. That’s a challenge
had a correct the common law standard is used to to internal audit and the compliance
understanding.” define who is an employee; a full-time team, both of which have to under-
employee works on average 30 or more stand the state that is and the state
Gwendolyn Skillern
hours a week. that could be.”
Some suggestions about what
internal audit departments can do now Find out what your resources are.
to make sure those and other require- “The first step is to talk to your HR
ments are met include: department or benefits function and
ask whether the organization uses a
Make sure you have a seat at the benefit information system that has an
planning table. “As the ACA is being ACA module,” Mowery says. “If the
rolled out, we follow several months answer is no, that raises a big red flag.

44 Internal Auditor April 2015


VISIT InternalAuditor.org’s “ACA Health Check” to learn more about
health-care industry auditors’ approach to the U.S. Affordable Care Act.

Get outside help when you need


it. “We have a number of cosource
internal audit relationships with the
big firms,” Skillern reports. “We used
them very strategically on complex
issues where we wanted the benefit
of their subject-matter expertise and
insight across multiple insurers.” One
example: There are many claims aggre-
gation and reporting requirements tied
to Centers for Medicare and Medicaid
Services technology. “We partnered
with a company that had auditors with
experience with that type of technol-
ogy,” she adds. “Internal audit shops
don’t have the resources to have every
type of expertise on staff.” Mowery
agrees: “I’d really recommend using
subject-matter experts at least in the
initial audits because of the highly
technical nature of the regulations. A
number of systems will be involved
If the answer is yes, the next question the appropriate processes, then allow in getting the reporting requirements
concerns a commitment by providers them four to six months to have it up together, including payroll and a ben-
to complete the necessary paperwork and running — and then test.” efits module, and you really need to
to comply with the law. Those are the understand the whole flow.”
kinds of things internal audit should be Pick your battles. “I would go where
concerned about.” the fire is burning,” Vincenti suggests, a smart approach
“meaning I would focus on anything The right approach to preparing for
Make sure you have a working that is coming up on a deadline. Then the ACA should make auditing for
understanding of what’s expected. trace your way back to identify the compliance fairly routine. “We’re not
“You have to have some basic under- owner of the process and do a quick involved right now,” Schandl notes.
standing of the regulations,” Skillern validation that everything is ready and “We’re talking about it. We’ll deter-
urges, “and any operational and finan- in place for things to go smoothly.” mine where the biggest concerns lie,
cial implications to your company if When all the deadlines have been perform a risk assessment and then
you don’t comply. When the business looked at, she advises conducting build an audit calendar around that.”
units have questions, you want to an intermediate “lessons learned” Vincenti is similarly sanguine. “It’s
ensure that the audit staff is knowl- reviewer with management. “Step back been a full year of execution under
edgeable.” You can’t just turn it over to for a minute and reassess your plan,” the ACA, and my team and I have
the insurance company. “We worked she says. not even gone to look at it,” she says.
closely with our legal and compliance “We haven’t heard anything.” Is she
offices,” Skillern adds, “to ensure we Be realistic about what you can surprised? Hardly. “A lot of the work
had a correct understanding.” accomplish. “Don’t try to swallow was done ahead of the game,” she says.
the whole thing in one bite,” Schandl “The ACA is not considered a high
Let management do its job first. explains. “If you have a team of audi- risk anymore. Believe me, I have so
“We haven’t discussed what to audit tors, break the ACA up into pieces many other things to do that pose big-
next,” Schandl reports. “We probably and give each person an area to be an ger risks.”
won’t consider any audits until the expert in rather than trying to tackle it
middle of calendar year 2016. We want all.” She notes that even as a CAE, she Russell A. Jackson is a freelance
to make sure management implements doesn’t know every aspect of the act. writer based in West Hollywood, Calif.

April 2015 Internal Auditor 45


A Global Look at IT Audit
Best Practices
There is no disputing technology’s role in business today as an enabler of virtually every
process and function. With this enablement and the advantages IT brings also come
global risks – security, cyberattacks, privacy issues, data breaches, governance, asset
management and much more. The critical question we ask is: Are IT audit practices keeping
pace in order to assess, monitor and mitigate critical risks coupled to a technology-
enabled business? This is what ISACA and Protiviti set out to determine in conducting
the fourth annual IT Audit Benchmarking Survey.

Download a copy at protiviti.com/itauditsurvey

© 2015 Protiviti Inc. An Equal Opportunity Employer M/F/Disabilty/Vet. Protiviti is not licensed or registered as a public accounting
firm and does not issue opinions on financial statements or offer attestation services. PRO-0215
Professional practice

F or at least the past decade, internal auditing has been in a state of growth
and progressive change. And while it has evolved and advanced signifi-
cantly, many practitioners nonetheless remain bound by some fundamental, con-
fining paradigms. These paradigms include:
ɅɅ Internal auditors plan, execute, and report results of point-in-time audits.
ɅɅ Internal auditors assess internal controls and report opinions on whether
they believe controls are effective.
ɅɅ Internal auditors report what they believe to be control deficiencies, material
weaknesses, significant deficiencies, or opportunities for improvement.
ɅɅ Direct-report auditing is the primary approach used globally. In a direct-
report engagement, the auditor evaluates the subject matter for which the
accountable party is responsible. The accountable party does not make a
written assertion on the subject matter.
ɅɅ The profession has been primarily supply-driven rather than demand-driven,
as boards and C-suites have often not specified their assurance needs — leav-
ing internal audit departments to form their own views regarding which
objectives/topics to focus on.
ɅɅ Internal audit often does not know, or require that management and boards
define, the type and amounts of residual risk the company and its board are
prepared to accept.

reinventing
internal audit
Tim J. Leech

Recent governance-related
developments require the profession to
revisit some of its long-held paradigms.

April 2015 Internal Auditor 47


Reinventing internal audit

ɅɅ Many internal audit departments global financial crisis, the Group of core concepts it promotes are relevant
have not assessed and reported on Twenty, an assembly of representatives to all sectors.
risks to the organization’s top stra- from the world’s largest economies,
tegic/value-creation objectives, or created a new international regulatory Adoption of FSB Guidance Regula-
the effectiveness of its overall risk advisory body — the Financial Stabil- tors around the world have started to
management framework. Accord- ity Board (FSB). The board currently enact regulations that reflect key FSB
ing to Enhancing Value Through includes government officials and recommendations — particularly the
Collaboration, an IIA Pulse of the
Profession report, internal auditors
surveyed dedicated a mere 8 per-
cent of resources to their company’s The revised Corporate Governance Code
strategic objectives in 2014.
The profession’s long-established prac- positions responsibility for risk oversight
tices have generally been viewed as ade-
quate — even good to excellent — but
squarely with boards of directors.
their relevance to today’s stakeholders
has begun to diminish. A shifting gov-
ernance landscape places the profession’s financial sector and securities regula- need to assign primary responsibility
traditional methods in jeopardy and tors from around the world. With for risk management and reporting to
points to the need for radical change. As unprecedented speed, it has formu- management; and risk appetite and
stakeholder expectations evolve, internal lated and disseminated paradigm-shift tolerance oversight to boards. The
audit must revisit existing paradigms and guidance that could effectively spur revised U.K. Corporate Governance
rapidly adjust to maintain its relevance. the reengineering of corporate gover- Code, issued in September 2014,
nance globally. provides one of the most notable
Global Developments Among the FSB’s most sig- illustrations of this activity. It posi-
Key developments over the last several nificant contributions to date is a tions responsibility for risk oversight
years have significant implications November 2013 guide for national squarely with boards of directors; calls
for boards, senior management, and, regulators, companies, and auditors on management to design, implement,
in particular, internal auditing. The titled Principles for an Effective Risk and maintain effective risk governance
changes they’ve brought span across Appetite Framework. The guide’s frameworks; and asks boards to seek
industries and geographical boundaries, authors define new and bold propos- independent assurance that manage-
and are far-reaching in scope. als for management, boards, and ment has designed, implemented, and
internal auditors. Details of the role maintained effective risk governance
Increased Board Risk Responsibil- proposed for internal auditors are frameworks. Other countries that
ity Following the 2008 global financial shown in “FSB’s Guidance for Inter- want to improve the integrity of their
crisis, commissions were convened nal Audit” on page 48. In essence, the capital markets are expected to follow
around the world to help understand FSB calls on practitioners to transi- the U.K.’s lead.
what had gone wrong and prevent desta- tion from providing point-in-time,
bilizing events in the future. From these direct-report, subjective opinions Reduced Audit Client Satisfaction
efforts, consensus emerged that boards on control effectiveness for a small As these regulator-driven develop-
and, to a lesser degree, regulators, had percentage of an entity’s risk uni- ments gain traction globally, Pricewa-
not adequately discharged their duty to verse to reporting on the reliability terhouseCoopers’ 2014 State of the
oversee what is increasingly being called and effectiveness of an organization’s Internal Audit Profession Study paints
management’s “risk appetite and toler- entire risk appetite framework. The a picture of a significant decline in
ance.” Consequently, board responsibility scope of reporting would include board and senior management satis-
for overseeing management’s risk appetite the reliability of enterprise risk sta- faction with traditional, direct-report
and tolerance has risen significantly. tus reports provided to the board by internal audit services. One of the
senior management. Although the report’s most disturbing findings is
Creation of the Financial Stability FSB framework was aimed primarily that half of senior management and
Board Shortly after the onset of the at the financial services industry, the nearly 28 percent of board members

48 Internal Auditor April 2015


Visit our mobile app + InternalAuditor.org
to watch the author discuss changes facing internal audit.

FSB’s Guidance for Internal Audit

I
n its Principles for an Effective Risk Appetite Framework, the Financial Sta-
bility Board proposes specific responsibilities for internal audit and other
independent assessors. The framework states that internal audit should:
»» Routinely include assessments of the risk assessment framework (RAF)
on an institutionwide basis as well as on an individual business line and
legal entity basis.
»» Identify whether breaches in risk limits are being appropriately identi-
fied, escalated, and reported, and report on the implementation of the
RAF to the board and senior management as appropriate.
»» Independently assess the design and effectiveness of the RAF periodi-
cally, as well as its alignment with supervisory expectations.
»» Assess the effectiveness of the implementation of the RAF, including
linkage to organizational culture, as well as strategic and business plan-
ning, compensation, and decision-making processes.
»» Assess the design and effectiveness of risk measurement techniques
and [management information systems] used to monitor the institu-
tion’s risk profile in relation to its risk appetite.
»» Report any material deficiencies in the RAF and on alignment (or other-
wise) of risk appetite and risk profile with risk culture to the board and
senior management timely.
»» Evaluate the need to supplement its own independent assessment with
expertise from third parties to provide a comprehensive independent
view of the effectiveness of the RAF.

say internal auditing adds less than Risk Reporting The FSB has defined
“significant value” to their organiza- roles for the board, senior manage-
tion. Moreover, only 49 percent of ment, and internal audit that call
senior management and 64 percent of for a fundamental accountability
board members say internal auditing shift — a shift that would require
is delivering on expectations. management to continuously assess
and report upward on risk status.
Implications for Moreover, it would require internal
Internal Auditing audit to help management build and
The changes described are causing regu- maintain systems for this purpose, To comment
on this article,
lators, boards, and senior executives to as well as assess and report opinions email the
reconsider and reshape what they want to the board on how well manage- author at
and expect from internal audit. What ment is discharging its assigned risk tim.leech@
once constituted fine, even laudable governance responsibilities. This theiia.org
deliverables from internal audit in the new paradigm requires fundamental
minds of many boards, C-level execu- shifts in existing internal audit edu-
tives, and regulators is being reshaped cational resources. The IIA modified
by increasing expectations that internal its Performance Standard 2120: Risk
audit play a key role in helping boards Management in 2010 specifically to
demonstrably oversee management’s risk provide support for the shift, and
appetite and tolerance. in 2012 it also began offering the

April 2015 Internal Auditor 49


Reinventing internal audit

Certification in Risk Management the global push to hold boards and the assessment of traditional internal con-
Assurance designation globally. C-suite more accountable for overseeing trols dimension on which internal audit
Internal audit departments that management’s risk appetite/tolerance. has historically focused. More impor-
aren’t doing so already need to evolve tantly, internal auditors need to continu-
beyond the business of performing New Competencies If internal ously assess and report on whether the
traditional, point-in-time, direct-report auditors are to assume the type of current residual risk status related to key
audits and providing subjective opinions
on “control effectiveness” for a small
percentage of their organization’s total
risk universe. Instead, they need to The internal audit profession needs to
focus substantially more resources on
providing assurance to boards that senior reinvent itself to satisfy key customers —
management is creating and maintaining
what is increasingly being referred to as
particularly board members.
an effective risk appetite framework.

Educating the Board Regulatory, responsibilities defined by the FSB, strategic and foundational objectives is
director, senior management, and the Financial Reporting Council, and currently within the board and senior
common law expectations are likely to other national regulators that elect to management’s risk appetite and toler-
evolve at varying speeds and intensity follow the U.K.’s lead, they must retool ance — assuming internal audit has been
in different countries. Not all senior their knowledge and skills. Instead of provided with enough information from
management and board members have emphasizing opinions on control effec- the board and C-suite to take on this
been actively following the evolu- tiveness, internal auditors must be able task. Internal audit can also play a key
tion of these expectations, and not all to assess and report on the reliability of role in alerting boards to risk acceptance
national regulators — including the management’s risk appetite framework, situations that warrant active discussion
U.S. Securities and Exchange Com- including CEO/management reports to with senior management and the board.
mission — have codified risk gover- the board on enterprise retained/resid-
nance expectations with the clarity and ual risk status. Making this transition The Need for Change
simplicity of the 2014 U.K. Corporate involves learning the type of vocabulary Quantum change in the current inter-
Governance Code to spur the needed defined by the FSB in its Principles for nal audit paradigm will be needed to
transition. Moreover, not all CEOs an Effective Risk Appetite Framework address shifting client and regulatory
and chief financial officers are likely guidance and the International Organi- demands. And while human nature
to welcome direct responsibility for zation for Standardization’s ISO 31000 is to resist radical change in favor of
creating and maintaining effective risk and ISO Guide 73. smaller, more incremental steps, meet-
appetite frameworks and providing Internal auditors should also ing these demands will require internal
formal and candid reports on enter- monitor closely the enterprise risk man- audit to adapt quickly. The well-
prise residual/retained risk status to agement framework update currently known adage “necessity is the mother
their boards — especially those outside under development by The Commit- of invention” applies well to current
the financial services industry, on tee of Sponsoring Organizations of circumstances: The internal audit pro-
which the FSB framework is focused. the Treadway Commission (COSO), fession needs to reinvent itself to satisfy
Some CEOs may be particularly scheduled for completion in late 2016. key customers — particularly board
upset with the FSB recommendation One of COSO’s stated reasons for the members. Change of this magnitude
that internal audit report to boards on update is to respond to escalating risk constitutes no small task to be sure, but
the reliability of the organization’s risk governance reporting requirements. it’s imperative for ensuring the future of
appetite frameworks and, especially, Auditors will also need to gain the the profession.
CEO/senior management reports to knowledge and skills required to identify
the board on enterprise risk status. the organization’s full range of risks and Tim J. Leech, CIA, CCSA, CRSA,
Nonetheless, internal audit needs to risk treatments linked to key objectives, FCPA, is managing director at Risk Over-
ensure boards and senior management and obtain a picture of residual risk sta- sight Solutions Inc. in Oakville, Ontario,
are aware of these developments and tus — as opposed to the much narrower and Sarasota, Fla.

50 Internal Auditor April 2015


Enterprise Risk Services CEO/CFO Certification Services Internal Audit Services
Corporate Governance Technology Risk Services Business Resilience Services

CYBER SECURITY
Are You Protected?
From big data to outsourcing and services provided
in the cloud, today’s connected and global networks
present complex challenges for IT and security
professionals to manage. You recognize that
traditional models of protecting your perimeter
network systems are no longer sufficient, but may
not know where to turn for the best solutions.

MNP delivers tailored and risk-based cyber security


programs to help you continuously monitor your
organization, protect your services and information
and ensure you can recover from a breach.
With the right strategies, you can rest assured
your stakeholder confidence, data integrity and
reputation are protected.

How effective is your cyber security operation?

Trac Bo, Technology Risk Leader


trac.bo@mnp.ca or 403.537.8396
objectivity

Professional
Skepticism
Skepticism has a big
influence on an internal
auditor’s ability to approach
an engagement objectively.

C
Rebekah A. Heath
Tim Staggs

rucial to an internal auditor’s ability to with the organization. Professional skepticism is a key element
complete any audit successfully is his or her of objectivity. Like most skills auditors should seek to cultivate,
ability to demonstrate objectivity in both the ability to approach each audit engagement with the appro-
the approach to and performance of the priate degree of professional skepticism must be intentionally
engagement. Yet this may be the most dif- nurtured through education and practice.
ficult ability to develop and maintain, par-
ticularly because most internal auditors are Viewpoints on Skepticism
employees of the organizations they audit. This potential for Standard 1100: Independence and Objectivity of The IIA’s
bias remains true even when organizations rely on outsourced International Standards for the Professional Practice of Internal
service providers to perform internal audit responsibilities. Auditing (Standards) refers to objectivity as “an unbiased
To provide an organization’s management and board of mental attitude” that “requires that internal auditors do not
directors with an audit product that meets their expectations subordinate their judgment on audit matters to others.” Saw-
for quality, internal auditors must be able to exercise profes- yer’s Guide for Internal Auditors, 6th edition, echoes this defi-
sional judgment free from the interference that can sometimes nition by stating that objectivity “is the impartial, unbiased
result from their employee — or service provider — relationship attitude that all internal auditors must have in performing

52 Internal Auditor April 2015


Month 2015 Internal Auditor 53
Professional Skepticism

their work.” Yet maintaining such an Under a presumptive doubt view,


attitude, while performing engagement auditors possessing a high level of pro-
responsibilities effectively, is no easy fessional skepticism are more likely to
task, and it depends on the develop- doubt the sufficiency of evidence that
ment of numerous related skills such as would normally be viewed as appro-
critical thinking, self-evaluation, and priately supporting the audit objective.
interpersonal communication. Such auditors will tend to collect more
The definitions in the Standards evidence, which may result in a less
and Sawyer’s view professional skepti- efficient audit.
cism as being neutral with regard to an As reliance on the work of internal
individual’s approach to auditing. In this audit by external parties grows, internal

Internal auditors should be prepared to


defend their level of objectivity.

view the internal auditor neither assumes auditors should note that regulators
that management is dishonest nor appear to take the presumptive doubt
assumes unquestioned honesty — he or perspective of professional skepticism.
she simply has a questioning mind and Regulators typically cite professional
critically assesses audit evidence. This skepticism as a missing ingredient in the
“neutrality” view of professional skepti- auditor’s objectivity whenever an exter-
cism anticipates that auditors are able to nal audit failure has occurred. The U.S.
separate themselves from those external Securities and Exchange Commission
and internal biases that could negatively often has identified a lack of professional
affect their ability to evaluate the audit skepticism as a primary contributing
evidence objectively. However, this view factor to the circumstances involved in
often leaves unanswered questions about enforcement cases, as well as in malprac-
how auditors can determine when they tice claims against external auditors.
have effectively exercised skepticism in Likewise, law enforcement agen-
their audit approach or how to measure cies tend to refer to external audit stan-
the possible effect on the evaluation of dards in fraud cases. With this in mind,
audit evidence whenever they have not. internal auditors should be prepared to
On the other hand, standards that address, or defend, their level of objectiv-
focus on fraud, such as U.S. Public ity in completing an audit that is to be
Company Accounting Oversight Board relied on by others or that is the basis of
To comment standard AU Section 316A, Consid- an external investigation. To do so, inter-
on this article, eration of Fraud in a Financial State- nal auditors must be able to understand,
email the ment Audit, take a forensic-audit view identify, and approach such engagements
author at
rebekah.heath@
of professional skepticism in which with an appropriate level of skepticism.
theiia.org auditors have an attitude of “presump-
tive doubt” and assume some level of A Skepticism Continuum
dishonesty by management, unless the Professors Stephen Glover and Douglas
evidence indicates otherwise. For inter- Prawitt of Brigham Young University
nal auditors, such an approach may be propose a different view on the exercise
applicable when considering the possi- of professional skepticism in a 2013
bility of fraud in all types of audits. publication from the Center for Audit

54 Internal Auditor april 2015


49% of respondents say their board and management practice tactful skepticism in
their respective roles, but 30% disagree, according to a January 2015 IIA Tone at the Top poll.

those instances where no fraud indica-


Divergence and Convergence tors exist, no errors are detected, rou-

P
rofessors David Plumlee and Brett Rixom of the University of Utah, tine processes requiring little judgment
and Andrew Rosman of the University of Connecticut, view profes- are examined, and the audit evidence
sional skepticism not as a trait or mind-set, but rather as a is consistent with the initial risk assess-
diagnostic-reasoning process that is found in the problem-identification ment, regardless of the area of risk
and structuring phases of creative problem-solving. In a 2011 study being audited. Likewise, less persuasive
funded by the Center for Audit Quality, the researchers found that evidence would be required for those
providing online training to senior auditors that taught them to reason assertions of lower risk. This frees audi-
diagnostically improved their ability to be professionally skeptical. Spe- tors to focus the bulk of their efforts
cifically, the auditors were given less than persuasive evidence and were on high-risk areas where there logically
asked to use divergent thinking followed by convergent thinking when should be greater doubt.
evaluating the evidence.
Divergent thinking requires auditors to generate explanations for Enhancing Skepticism
evidence or circumstances they identify as unusual without a concerted Skepticism is both a personality trait
effort to ensure that each explanation is logically valid. Once they have and a state of mind. Personal traits
produced a complete set of explanations, auditors use convergent think- that contribute to the auditor’s abil-
ing to systematically assess the plausibility of each of them. Plumlee and ity to exercise appropriate professional
his colleagues found that divergent thinking training increased both the skepticism include a questioning mind,
number and quality of explanations generated for an unusual situation. In the ability to analyze and critically
addition, those senior auditors trained in both divergent and convergent evaluate, problem-solving ability, ethi-
thinking were more likely to generate and ultimately choose the correct cal and moral reasoning, a willingness
explanation compared to those who did not receive the full training. to suspend judgment, and a tendency
The researchers hypothesized that the typical mode of generating to search for knowledge, according to
explanations involves a continuous examination of possible explanations a 2010 article by Baylor University
known as “consistency checking.” Moreover, they posited that auditors accounting professor Kathy Hurtt,
who were trained to apply a sequence of divergent thinking followed by “Development of a Scale to Measure
convergent thinking will not resort to “consistency checking.” Decision- Professional Skepticism.” Three addi-
makers spontaneously engage in consistency checking when they evalu- tional abilities ensure that an individu-
ate explanations as they occur, eliminating some based on superficial al’s skeptical mind-set will translate into
consideration. Training in both types of thinking led individuals, during actions: interpersonal understanding,
the divergent phase, to consciously keep explanations they generated for a sense of autonomy, and confidence
later evaluation during the convergent thinking phase of the diagnostic- based in self-esteem. Interpersonal
reasoning process. understanding considers human
biases when analyzing evidence, while
autonomy and self-esteem pertain to the
courage to stand up to the pressures of
Quality’s Global Public Policy Com- and all the way to complete doubt. others and draw one’s own conclusions.
mittee, which comprises the six largest The appropriate level of skepticism to In practice, academic research has
public accounting firms. In Enhancing apply is initially determined only after shown that audit students and practic-
Auditor Professional Skepticism, they a careful and rigorous risk assessment. ing auditors do not differ in their overall
advise auditors to approach each engage- However, Glover and Prawitt stress that levels of skepticism, which is consistent
ment using a “professional skepticism to ensure an appropriate level of profes- with the theory that skepticism is a rela-
continuum” where the appropriate level sional skepticism is consistently applied tively stable personality trait. Develop-
of skepticism depends on the risk char- to collecting and evaluating all audit ing their creative problem-solving skills
acteristics of the area under audit. evidence, the auditor should continue is one way auditors can increase their
On this continuum, the level of to reevaluate that initial determination level of skepticism (see “Divergence and
professional skepticism moves from throughout the engagement. Convergence” on this page).
something less than complete trust, to a In using the continuum approach, Encouraging a skeptical mind-set
neutral mind-set, to presumptive doubt, less persuasive evidence is required for may be as simple as providing fraud

April 2015 Internal Auditor 55


Professional Skepticism

training or training in the appropriate appropriately skeptical. They should


use of Glover and Prawitt’s continuum. observe the interview as a nonpartici-
Several activities provide starting points pant, drawing their own conclusions.
for enhancing the professional skepti- Afterwards, auditors should debrief the
cism of an internal audit team. interviewer to learn his or her conclu-
sions and compare them to their own,
evaluating whether any significant dif-
ferences were the result of the degree of
Skepticism affects internal auditors’ skepticism employed.
ability to make sound judgments. Post-audit Peer Reviews Inter-
nal auditors should ask colleagues to
review their work on a recent audit that
Improve Critical Thinking Training involved a substantial degree of judg-
and other activities designed specifically ment or tested their objectivity. Such
to strengthen critical-thinking skills peers should challenge them to defend
can have a positive effect on an audi- the type and volume of evidence accu-
tor’s ability to approach audit evidence mulated during the engagement. Then
with more skepticism. There are many auditors and their peers should evaluate
resources available to develop such skills. whether the evidence supported the
conclusions, in light of the audit objec-
Self-evaluate Objectivity IIA Stan- tives, and the auditors demonstrated an
dard 1120: Individual Objectivity calls appropriate degree of skepticism.
on internal auditors to “have an impar-
tial, unbiased attitude and avoid any Influencing Judgment
conflict of interest.” One way to gauge Ultimately, an internal auditor’s ability
potential conflicts of interest is to have to maintain objectivity through the use
team members identify relationships of professional skepticism affects his or
and other influences, such as friendships her ability to make sound judgments.
with associates in the area under audit, But as important as skepticism is, it is
that potentially could have a negative only one of the factors that influence
effect on their objectivity. Audit lead- professional judgment, alongside audit
ers should evaluate the level in which and industry expertise.
these influences could affect auditors’ As internal auditors begin their
judgment, then identify ways to coun- next engagement, they should consider
ter them. The IIA Research Founda- how their view of professional skepti-
tion report, Behavioral Dimensions of cism will ultimately affect their evalua-
Internal Auditing: A Practical Guide to tion of the audit evidence. They should
Professional Relationships in Internal take time to document their thought
Auditing, can be helpful in evaluating process and its effect on that evaluation.
professional relationships. Moreover, they should keep in mind
that a competent auditor is a skeptical
Involve Auditors Outside the auditor.
Engagement Team When possible,
internal auditors should invite a mem- Rebekah A. Heath, PHD, CIA, CPA, is
ber of the audit group who is not on assistant professor of accounting at Middle
the current engagement team to inter- Tennessee State University in Murfreesboro.
view an individual, if they believe their Tim Staggs, CIA, is vice president of
personal relationship with that person internal audit and compliance with Health-
may negatively affect their ability to be care Realty in Nashville.

56 Internal Auditor april 2015


risk management

An effective governance strategy can


ensure an appropriate level of owner
oversight and minimize shared risks.

Joint Venture / Joint


Exposure

A
Ben Arnold s the phrase suggests, a joint venture is a business agreement
between two or more parties that choose to enter into a part-
nership for profit. But it also means joint exposure to adverse
consequences and potentially significant exposure to the own-
ers’ objectives, particularly from a strategic, financial, and
reputational perspective.
Even with less than 50 percent ownership or control,
the parent company can be subject to liability if there is
actual knowledge or deliberate ignorance of any inappropri-
ate conduct. There have been numerous cases where owners have been impacted
by actions within a joint venture or subsidiaries. In February 2015, the U.S.
Securities and Exchange Commission (SEC) fined Goodyear Tire & Rubber Co.
US$16 million after alleging its subsidiaries in Kenya and Angola bribed govern-
ment officials, employees of private companies, and government-owned entities
to obtain sales. The bribes were recorded as legitimate expenses in the books from
2007–2011, a violation of the U.S. Foreign Corrupt Practices Act (FCPA). Good-
year’s self-reporting and cooperation in the investigation resulted in a less severe
fine. In a 2011 case, London-based multinational alcoholic beverages company
Diageo also was fined US$16 million by the SEC because its subsidiaries in India,
South Korea, and Thailand bribed foreign government officials to gain sales and
tax benefits.
In addition to financial considerations resulting from poor joint venture gov-
ernance, evidence has indicated that other consequences, particularly reputational
and license to operate, can have more significant impacts on the owner. Generally,

April 2015 Internal Auditor 57


Joint Venture/joint exposure

the perceived largest severe impact thought between the relevant owner Risk Management
would be to corporate reputation, audit departments/risk teams and joint A typical, nonoperated owner chal-
rather than legal, financial, and regula- venture teams, if applicable. lenge is ensuring that risk management
tory impacts. With a vast range of joint venture within the joint venture is effective.
The role of internal audit and structures and operations across several Effective risk management will depend
risk management is vital to support industries (including the owner directly on the nature of the joint venture rela-
management in the development operating the joint venture on behalf tionship, including level of influence,
and ongoing monitoring of the joint of the owners or the joint venture hav- ownership/management control, and
venture governance framework. ing its own operating and management the owner’s appetite for control moni-
Joint venture owners’ audit strategy structure), the owner’s implementation toring and risk management.
and risk management processes will of an effective governance process can Regardless of the chosen approach,
require high coordination and strategic be challenging. the minimum requirement is an effective

The Case of TSKJ

T
SKJ was a joint venture formed by the U.S.’s M.W. Kellogg Co. (later became KBR),
France’s Technip, Japan’s JGC, and Italy’s Snamprogetti. The joint venture company won
four contracts worth more than US$6 billion between 1995 and 2004 to design and build
liquefied natural gas facilities on Bonny Island, Nigeria. None of the participants had a majority
stake in the joint venture.
TSKJ used agents to bribe Nigerian government officials. The U.S. Department of Justice
(DOJ) proved that TSKJ paid about US$132 million to a Gibraltar corporation controlled by Lon-
don lawyer Jeffrey Tesler and more than US$50 million to a Japanese trading company, with
the intention of using the money for bribes.
The DOJ and U.S. Securities and Exchange Commission (SEC) declared that each joint ven-
ture partner had culpable knowledge because senior executives from each company, including
some who were serving on the TSKJ steering committee, participated in meetings in which the
bribery of Nigerian government officials was discussed. The executives authorized payments to
secure contracts for the company.
Together, the four multinational corporations and the Japanese trading company paid
a combined US$1.7 billion in civil and criminal sanctions in 2010 for the decade-long bribery
scheme. These include:
»» Snamprogetti and its parent company ENI agreed to pay US$365 million to resolve charges
related to the U.S. Foreign Corrupt Practices Act (FCPA) for Snamprogetti’s role. The finan-
cial penalties included a US$240 million criminal fine to the DOJ and US$125 million in dis-
gorgement to the SEC.
»» Technip resolved FCPA-related charges with the DOJ and SEC for US$338 million, including
a US$240 million criminal penalty and US$98 million in disgorgement.
»» Consortium leader KBR and its former parent Halliburton paid US$579 million to settle
FCPA-related charges, including a US$402 million criminal penalty and US$177 million
in disgorgement.
Nonfinancial impacts in this case included reputational damage and criminal charges against
current and past joint venture parent employees. In addition, KBR’s FCPA violations impacted
successor liability after Halliburton acquired KBR in 1998 (it later sold KBR in 2007). These
were based on book and record violations and Halliburton’s lack of post-acquisition vigilance.
On the financial side, the FCPA and U.K. Bribery Act investigations also affected share price
and capitalization.

58 Internal Auditor April 2015


68% of respondents expect their companies’ joint venture activity to increase over the
next five years, according to a 2014 McKinsey & Co. survey of C-level and senior executives.

risk and control monitoring process words, is the joint venture a financial should consider risk awareness and
by both the owners and operators. investment, does the owner have “skin control monitoring at the joint
The joint venture operator may have in the game,” or are there additional venture level.
implemented a formal risk man- nonfinancial consequences or financial ɅɅ Risk culture. Will the organiza-
agement program, including risk impacts greater than the investment tional culture within the existing
analysis, control assessments, and value if things go wrong? Potential joint venture governance process
monitoring; however, the minimum consequences surrounding a financial support effective risk manage-
requirements should include imple- investment are generally limited to ment? Key enablers or indicators
menting a risk-proportional risk financial exposure; however, if the joint can include tone at the top, com-
munication between joint venture
and owners, and creation of risk
Is the strategy achievable, considering or governance committees.
ɅɅ Commercial sensitivity (anti-
the relative risk maturity of all parties? trust). Will the provision of infor-
mation between the joint venture
and owners align with anti-trust
management process by both the venture is more than a mere financial requirements? What are the con-
owner and operators, which will give investment, additional consequences trols in place to ensure that the
owners an adequate comfort level such as reputational, community, envi- joint venture and owners appro-
over the joint venture. ronmental, and strategic risk impacts priately maintain commercially
Embedding a risk management may materialize. sensitive information?
process allows the owner to structure Some key points for management, ɅɅ Continuous control monitoring
governance processes and understand internal audit, and risk management to and provision of information.
the risk exposures and control effec- consider when determining governance Regardless of the strategy selected,
tiveness relating to joint venture opera- strategy include: the control monitoring performed
tions. In addition, monitoring risk ɅɅ Risk process. Is an effective risk by the owner should be designed
management processes and connecting management process in place (and to ensure the provision of timely
joint venture risks can provide owners in larger organizational settings, and accurate data. Ideally, the
with necessary insight into the poten- does the process include a dedi- control design and feedback will
tial for exposure. cated risk management team)? Is allow the risk and control owner
The implementation and ongo- the risk process aligned with the to understand whether the control
ing monitoring of a risk management owner’s process or best practice? is about to fail (i.e., leading indi-
process will depend on several factors. ɅɅ The availability and maturity cator) rather than following a con-
A key aspect is the area of ownership of risk monitoring information. trol failure (i.e., lagging indicator).
control versus influence. Existing tools The ability to obtain and analyze
and methods are used to determine information provided by the joint a Joint Venture case study
control for legal and financial reporting venture will depend on influ- Given the realization of joint expo-
purposes (e.g., greater than 50 per- ence (e.g., strength of relation- sure, the implementation of a risk-
cent joint venture ownership would ships between the joint venture proportional risk and audit process
normally indicate control); however, and owners) or the embedding will enable the owner to gain adequate
risk exposure in joint ventures should of monitoring and information comfort over joint venture operations.
be managed based on the breadth and provisions within it (e.g., formal The process to develop the strategy
areas of risk impact. requirements included in agree- from inception was explored by fic-
ments for governance and provi- tional Company XYZ.
Exposure Level sion of information). Company XYZ is a 50/50 owned
A critical aspect of joint venture gov- ɅɅ The risk maturity of both owner joint venture. Both joint venture part-
ernance is determining the level of and joint venture. Is the strategy ners are industry owner-operators with
exposure that joint venture operations achievable, considering the rela- separate management and operational
may have on the achievement of the tive risk maturity of all parties? structures. The joint venture board
owner’s strategic objectives. In other The risk management framework includes representatives of the owners

April 2015 Internal Auditor 59


Joint Venture/joint exposure

and members from the joint venture number of operational risks within
company management team. owner No. 1’s profile.
While legal and accounting inter-
pretations of the joint venture structure Option 2
indicate that owner No. 1 does not ɅɅ The joint venture company’s mate-
control operations at the company, rial risks are individually assessed
significant risk exposures to owner No. and included directly from owner
1 were identified during the board gov- No. 1’s perspective within the estab-
ernance process. During a risk strategy lished risk management process.
session, two options were identified ɅɅ The risk ratings will be decided

Joint ventures can cause significant


exposure to the owner’s objectives.
to implement a risk-proportional risk based on work completed by the
management process. joint venture entity, but can be
different depending on the effec-
Option 1 tiveness of owner No. 1’s control
ɅɅ The joint venture maintains the or perspective.
risk profile and communicates it ɅɅ Owner No. 1’s operational manage-
to owner No. 1 periodically. The ment governance hierarchy is the
company completes control moni- primary owner of risk and control.
toring through internal processes. The advantages of this option are an
ɅɅ Company XYZ risks included accurate reflection of the joint venture
in owner No. 1’s risk profile are (owner) risk profile, appropriate gov-
based on percentage of ownership ernance and accountability residing
and impact. No specific risk mon- with owner No. 1’s risk and control
itoring is performed or formalized owners, and the ability to enhance a
by owner No. 1. balanced control-monitoring process.
ɅɅ Generally, the financial impact of The disadvantages, however, could
risks is to be calculated based on include initial increased efforts to
owner No. 1’s equity ownership develop and embed the risk process
(50 percent), and other impacts and supporting internal control and
(reputational; health, safety, envi- governance frameworks.
To comment ronment; and legal) are included Following review and consulta-
on this article, at 100 percent. tion by all stakeholders, owner No. 1
email the The advantages to this arrangement are identified Option 2 as the preferred risk
author at ben. fewer dedicated resources with a focus management process. However, this
arnold@theiia.org
on the joint venture company risk approach required the identification
management process and reliance on and formation of the risk profile, with
existing processes. However, the disad- consideration of several key factors.
vantages are the lack of ownership and
risk monitoring performed by owner Ownership Given the absence of exist-
No. 1, the risk profile not necessarily ing defined risk management roles with
representing owner No. 1’s view or owner No. 1, decisions around risk
assessment, and the inclusion of a high and control ownership were informed

60 Internal Auditor April 2015


51% of CEOs plan to enter into new strategic alliances or joint ventures
over the next
year, up from 44% in 2014, according to PricewaterhouseCoopers’ 2015 annual Global CEO Survey.

based on the existing governance struc- tracking, and event monitoring. These alignment on the audit approach and
ture and oversight from owner No. 1. metrics will be incorporated within the inspections is critical. Internal audit
Through the risk management process, risk and control documentation to ensure will need to decide about timing, coor-
the level of governance and oversight correct focus by the owners. dination, and co-participation, and
would be generally formalized and important areas of audit scoping and
enhanced by detailing owner No. 1’s Risk Documentation and Criteria criteria will need to be decided. The
risk and control responsibilities. Risk documentation must be developed owner and joint venture should deter-
to reflect the minimum requirements mine whether the audits will be mea-
Risk Profile The risk events within the for the intended monitoring that owner sured against joint venture procedures,
owner’s risk profile can be articulated in No.1 performs. An example of risk owner’s procedures, or best practice.
several ways and need to be consistent monitoring criteria for the two different Ideally, these will be aligned; however,
with the remainder of the risk profile types of risk could include: when there are differences, there needs
to ensure a consistent and comparable ɅɅ 1:1 Risk. Operational monitoring to be consultation among joint venture
process. Generally, the owner’s risk pro- directly related to the risk, includ- and owner’s management and gover-
file for the joint venture could include ing assessment ratings, perfor- nance teams on the agreed reference
a blend of: mance metrics, and remediation points for appropriate risk manage-
ɅɅ 1:1 Risk. Significant risks that or issues tracking; and oversight of ment and control monitoring.
might coexist on the joint venture key risk and control performance
risk profile require both owner and through the joint venture’s risk Lessen Exposure
joint venture control monitoring and critical control owners. Joint ventures can cause significant
due to the implication of the risk ɅɅ Consolidated Risk. Periodic exposure and adverse consequences
and impacts. review (a minimum of every six to the owner’s objectives, even with
ɅɅ Consolidated Risk. Owner risks months) of the overall joint venture the absence of owner control. Imple-
that consolidate or merge subordi- risk management program/pro- menting a risk-proportional risk
nate joint venture-identified risks cess by a nominated risk or audit management process will maximize
will reflect the appropriate risk professional. Ongoing monitoring the opportunity to achieve both joint
elements, but allow the ability to of joint venture risk management venture and owner strategic objectives.
focus the owner control monitor- action tracking (e.g., remediation Risk management and internal audit
ing on joint venture governance tasks or audit findings) related to should be active in joint venture gov-
and monitoring, rather than on potential failure of causes for owner ernance, from thought leadership and
the more detailed control monitor- No. 1’s risks. support during governance strategy
ing in 1:1 risk. development to control monitoring,
Provision of Information Concur- execution of joint venture audits, and
Performance Metrics The perfor- rent strategies should be considered to follow-up.
mance metrics developed for the own- obtain the necessary data for owners’ Developing the right audit and
er’s risk will likely be different from the control information and monitoring risk process will include thought and
joint venture risk metrics, so different needs. By formalizing monitoring by definition around the correct risk and
strategies will need to be used. Typi- owner No. 1, new and more frequent exposures from the owner’s perspec-
cally, the metrics from the owner’s per- information flows may be necessary tive and the implementation of risk
spective will be at a higher level than with mechanisms in place to ensure performance criteria and monitoring.
the joint venture operational controls, that information provided is timely Ongoing, continuous monitoring
with a focus on monitoring and joint and accurate. A key consideration throughout the process, supported by
venture oversight. One example of is that any information provided risk and audit, will be vital in ensuring
owner metrics could involve perform- between the joint venture and owners, that owners have an appropriate level of
ing periodic review of the joint venture especially commercially sensitive infor- oversight and, ultimately, comfort over
operations risk management process. mation, is in accordance with relevant joint venture operations.
However, the joint venture operations anti-trust regulations.
metrics could involve monitoring Ben Arnold, CIA, CA, CFE, CGAP, is
directly related to the risk, such as rat- Audit Approach/Verification Before principal of risk and governance for BHP
ings, critical control performance, action implementation, obtaining owner Billiton Iron Ore in Perth, Australia.

April 2015 Internal Auditor 61


Governance Perspectives
By Mark Brinkley

The Serious Tone of Whistleblowing


Organizations should
be structured to
enable reporting of

T
wrongdoing without
fear of reprisal. he U.S. Securities to protect against additional A 2014 benchmark
and Exchange Com- fines and penalties. report prepared by NAVEX
mission (SEC) issued The SEC report notes Global notes the median
its 2014 Annual that more than 40 percent of number of days to close
Report to Congress on the those who received monetary an internal whistleblower
Dodd-Frank Whistleblower awards were either current or case increased from 30 to
Program in November past employees of the orga- 36 days. The longer the
2014. The report indicates nization they were reporting. corporate investigation, the
last year was “historic” Of this 40 percent, more more likely it is there will
regarding the number of than 80 percent had raised be more reports.
reports, resulting in a ban- their concern via an internal Often, the investigator
ner year for whistleblower reporting channel before will pose additional inqui-
awards. In 2014, the SEC’s reporting to the SEC. ries regarding the situation.
Office of the Whistleblower Creating an ethical cul- Increasing awareness of the
received 3,620 tips, up from ture requires diligence around need for the whistleblower to
3,001 in 2012 and 3,238 in communication, training, respond timely to follow-up
2013. Countries with the and reinforcement. Compli- questions is becoming appar-
most reports include Austra- ance teams must not waste ent. Improving corporate
lia, Canada, China, India, this training effort with slow training practices and aware-
the U.K., and the U.S. or nonexistent follow-up on ness of the follow-up compo-
Internal auditors should reports. The Office of the nent is critical.
pay attention to this report Whistleblower responds to In June 2014, the SEC
to help further corporate questions within 24 hours. brought its first enforcement
governance practices. Gov- Organizational policies action against an employer
ernance processes should should mirror this practice. who retaliated against a whis-
not only promote report- Tracking the progress, tleblower. In this case, the
ing internally, but ensure timeliness, quality, and out- whistleblower was demoted,
strong follow-up with the comes of reports must be and the person’s scope of
reporters. Furthermore, if a part of any investigation. An authority was reduced; how-
report does reach the SEC open channel of communica- ever, compensation was not
whistleblower program, the tion with the whistleblower affected. The SEC fine was
organization should envelop is key to a timely conclusion in excess of US$2 million.
the employee with support of the investigation. Addressing employee anxiety,

Read more on Governance visit the “Marks on Governance” blog at InternalAuditor.org/norman-marks

62 Internal Auditor April 2015


To comment on this article,
email the author at mark.brinkley@theiia.org

as well as training employees to recognize it, must be a prior- ɅɅ Ensure all staff clearly understand their duty to report
ity. Recognizing acts of retaliation, such as sudden, clustered, and provide assurance of the no-retaliation policy.
or improperly documented disciplinary actions, is critical. ɅɅ Reinforce that message through culture change driven
The SEC is making it clear that the company is not to by periodic policy reviews and informal discussions
interfere with an employee’s ability to report alleged wrong- at team meetings. This may require tools and talking
doing. The chief of the Office of the Whistleblower has points to ensure consistency in message. The key is
publicly said that the SEC is “looking for the first big case redundancy through repetitive messaging.
here.” Review of severance policies and agreements should ɅɅ Train leaders on how to receive even slight reports or
be the first step in ensuring compliance with this enforce- rumors with assurance that whistleblowers are valued.
ment practice. These agreements often have penalties for any ɅɅ Test the reporting process to ensure its efficacy. The
negative comments by the terminated employee. test should ensure expediency of the investigation, that
It takes courage to report potentially serious violations by reporting metrics are well-defined and consistently
an individual’s co-workers or senior management. Whistle- reported, that retaliation is not tolerated, that training
blowing, at a minimum, can have an emotional impact on the supports this pillar, and that all reporters are respected.
reporter. At worst, it can lead to the whistleblower’s firing, sus- Whether the organization is small or large, local or multina-
pension, or seclusion, as well as suspicion that creates factions tional, public or private, the culture of governance is driven
within the organization. Regular, at least annual, mandatory by each employee. Ensure your organization has the correct
training regarding the organization’s whistleblower and non- structure to enable whistleblowers to report wrongdoing.
retaliation policy should be conducted. Awareness is critical.
It is time for internal audit to enhance corporate aware- Mark Brinkley, CIA, CFSA, CRMA, is the director of grants
ness efforts and practices: at the Kauffman Foundation in Kansas City, Mo.

You think outside the box.


You find new and innovative ways
to conquer today’s ever-changing
audit challenges.
You are tomorrow’s leader.
There’s no better way to demonstrate your
qualifications to your stakeholders and peers
than with The IIA’s Qualification in Internal Audit
Leadership™ (QIAL™) professional credential.

The QIAL is the only qualification program that


identifies, assesses, and develops core skills linked
SHOW THEM YOU ARE to audit leadership success. It caters to CIAs and

TOMORROW’S LEADER, TODAY. CAEs who are already strong performers and have
the potential for greater leadership.

Visit www.globaliia.org/QIAL today and


show them who you really are...a leader!
2015-5026

April 2015 Internal Auditor 63


Many Fortune 500 companies count on
The IIA’s On-site Training to develop their
team’s skills. Join them today!

You’re only as
good as your team.

You know you have a great internal audit team. Are they perfect? No. But they are there for you —
day in, day out. When challenges arise, they have your back.

And now is your opportunity to have theirs. Thank them for their hard work and show them that
you are as committed to their professional development as they are. Because let’s face it —
when your team shines, you shine.

Are you ready to shine?

Contact us today and let us help develop your plan to enhance your team’s performance through
in-house training. Our consultants will work with you to understand your business, your people,
and the learning outcomes you want to achieve.

+1-407-937-1388 ■ GetTraining@theiia.org ■ www.theiia.org/onsite


2015-5023

2015-5023 TRN-OnSite Thank Your Team April IA Ad.indd 1 2/26/15 4:41 PM


Insights/The Mind of Jacka
To comment on this article,
email the author at michael.jacka@theiia.org

By J. Michael Jacka

Three High-risk Audits


you may be ignoring

A
Auditors seem n auditor walks into audit seldom explores cer- assurance that this resource is
to avoid certain a bar. He tells the tain areas that impact those protected and developed.
owner, “I am here risks significantly.
areas of concern,
to help you. What Marketing Where does all
even when clients are your biggest risks; what Ethics Across organiza- the money go? For most
specifically draw keeps you up at night?” The tions and industries, ethics organizations, anywhere from
attention to them. owner replies, “My biggest is foundational to risk and 5 to 15 percent of revenue is
risk is that bartenders may control frameworks, and it spent on marketing activities.
serve underage drinkers. is at the core of reputation. Some audit functions have
This represents a significant Even the fallout from epi- made forays into this area by
compliance, financial, and sodes like the 2010 BP oil performing reviews of adver-
reputational risk for my spill in the Gulf of Mexico tising — often doing little
bar.” The auditor, pleasantly was as much about perceived more than making sure pay-
surprised to hear such a ethical lapses as it was the ments match the bills. But
knowledgeable owner, says, spill itself. Yet few auditors there is a lot more to market-
“Thanks — I really appreci- even consider the impact of ing than just the ads. Upon
ate the input. So, let’s start ethics in individual audits. review, auditors will encoun-
with an inventory count.” And while ethics is hard to ter unfamiliar concepts and
It doesn’t take much define and hard to test, dif- jargon that may confuse
effort to learn what our cli- ficulty should never be the more than confirm. But this
ents consider their biggest cause for us to ignore a risk. isn’t a reason to shy away
risks. However, we seem to from an area that significantly
avoid certain areas — even Human Resources Depend- impacts the money spent
when clients express specific ing on an organization’s on the organization’s brand
concern about them. One structure, human resources and reputation.
reason may be that we have can oversee everything from If I am wrong — if you
not made the connection hiring to development to per- have taken the plunge and
between the risks and the sonnel policies to anything are creating impactful results
process. But it also might be else that touches on human in these areas — please let
that we find the process hard beings. To complicate mat- me know. But I think most
to define, we don’t think it is ters, human resource depart- auditors are still living in
part of our audit universe, or ments are not accustomed to denial, fear, ignorance, or a
we’re just a little afraid to go being reviewed and may be little bit of all three.
into unknown territory. somewhat protective of the
There are three risk sensitive information they J. Michael Jacka, CIA,
areas our clients consistently handle. But the most impor- CPCU, CFE, CPA, is cofounder
rate as significant: reputa- tant resource of any organiza- and chief creative pilot for
tion, human capital, and tion is its people, and we have Flying Pig Audit, Consulting, and
money. Nonetheless, internal a responsibility to provide Training Services in Phoenix.

Read Mike Jacka’s blog visit internalauditor.org/mike-jacka

April 2015 Internal Auditor 65


Eye on Business

The Functional Small Audit Department


With the right
approach, these
functions can
provide as much
value as their larger How do you define a small Kastenschmidt The risk mitigation, or an inabil-
audit function? biggest risks include: ity to handle all key risks.
counterparts.
Watts Typically, small ɅɅ Developing audit plans There is only so much band-
audit functions have fewer that reflect the internal width to cover all needs.
than six auditors, limited audit team’s capabilities The second area is
or no use of technology — rather than the organi- skills and experience. To
such as a GRC tool or data zation’s business risks. meet the ever-changing risk
analytics technology — and ɅɅ Unintentionally pro- landscape, internal audi-
no full-time or limited spe- viding a false sense tors must keep their skills
cialty skills. of security by under- and expertise current with
Kastenschmidt While auditing relative to training and knowledge
head count is one indica- the level of comfort of industry best practices.
Robert
Kastenschmidt
tor, a small audit function that the audit func- This is not easy to do with
National Leader is more accurately defined tion communicates to limited resources.
Risk Advisory Services relative to the size of its stakeholders. Third is being relevant
McGladrey LLP
mission. A function is ɅɅ Failing to clearly in the organization. Many
“small” for its organiza- articulate the intended times, internal auditors are
tion if it struggles with role of internal audit not viewed as having the
its ability to identify and within the organiza- strategic-thinking ability
adequately address relevant tion, thus diluting necessary to be included in
risks. In my mind, the audit’s impact by key management decisions.
audit function includes all trying to meet unde- As such, internal audit is
of the resources controlled fined — and often con- not included in strategic or
by the CAE, including flicting — stakeholder major initiative discussions,
William Watts both internal staff and expectations with very and often it is relegated to
Partner in Charge external resources. limited resources. a back-office position.
Business Risk Services
Crowe Horwath LLP Watts Usually three areas
In light of their size, what pose the greatest challenge How can small audit func-
are the biggest risks to small internal audit func- tions use their limited
small audit functions face tions. The first area is foot- staff resources to be
in providing adequate print or capacity. Getting more effective?
coverage/service to their risk coverage with limited Watts The internal audit
stakeholders? resources can create gaps in function needs to work

Read more on today’s business issues follow @IaMag_IIA on Twitter

66 Internal Auditor April 2015


To comment on this article,
email the author at editor@theiia.org

closely with senior management and the audit committee Watts While automated workpaper solutions and data
to ensure its mandate is aligned with the organization’s analysis tools can help improve the efficiency and effec-
strategy and objectives. Small internal audit functions tiveness of any size internal audit function, the use of
need to think about how others in the organization can technology should be considered in line with the audit
help mitigate risk. For example, the internal audit func- function’s goals and plans. Internal auditors need to look
tion should spend time educating process and compliance for ways to align technology where they lack skills and
people in risk identification and mitigation to help fortify experience, but without jeopardizing risk management at
risk management. This will help alleviate the pressure on the organization. Technology cannot do the thinking for
the internal audit function being the last and only line of internal audit.
defense. By helping to spread the risk management bur-
den across the organization, internal audit can balance its What role does communication play in the success of
resources and skills to higher risks and more value-added the small audit function?
risk-focused areas. Watts Communication to and aligning with all stake-
Kastenschmidt Internal audit needs to work collab- holders is very important. This begins with the organiza-
oratively within the organization. Audit doesn’t need to tion’s vision and strategic objectives and should flow down
execute the work for it to be valuable to the risk manage- to each audit professional. This is the way to ensure that
ment objectives of an organization. Rather, it needs to even the smallest audit function stays relevant and valued
understand the various risk management activities happen- by the organization. The audit function should proactively
ing within the organization and paint a complete picture initiate risk management updates throughout the organi-
for stakeholders of how those various efforts work together zation and follow up to ensure all are doing their share in
to adequately manage and monitor risk. defending against risk.
The small internal audit function also needs to spend Kastenschmidt Without a clear understanding of why
sufficient time on the risk assessment to ensure it is audit- an audit is being conducted, what was discovered, how
ing the right areas, and then spend considerable time up those observations could impact the business, and what
front defining the scope and approach of the audit, itself. choices management has to address them, an audit is of
It is far better to have a well-planned audit for which the limited value. Even if tremendous audit work was con-
expectations are clear than to prematurely charge into an ducted, if it doesn’t have an impact on its intended audi-
area only to discover that success hadn’t been defined and ence, it was a failure. Auditors should be among the most
thus can’t be achieved. refined communicators in the entity.

How can small functions use technology cost effectively? What are some other best practices small audit func-
Kastenschmidt Small audit functions should select tions can reasonably adopt?
tools appropriate for the size and skill of the environment Kastenschmidt The internal auditors should actively
and be purposeful in integrating their capabilities into network with industry peers to learn and apply leading
the risk management approach. Consistently maximizing practices more quickly. They should actively network
the use of a less powerful tool is far superior to constantly within the organization to raise the profile of internal
struggling with unneeded functionality of unnecessarily audit, identify potential subject matter experts to integrate
robust technology. into future audits, and stay abreast of changing risks in
The auditors should not become frustrated midway the organization that may warrant changes to the existing
through the technology journey — becoming proficient audit plan.
in tool usage is time consuming. Too many small audit Watts Auditors in these small functions should become
departments stop short of fully integrating a tool into involved with The IIA. Not only are The Institute’s pro-
their delivery approach and thus incur much of the cost fessional standards and practice advisories among many
but realize little of the sustainable benefit associated with resources offered, local chapter meetings offer a great way
a technology investment. Small internal audit functions to connect with other internal audit professionals and gain
should move forward only with those technology initia- valuable education.
tives that they are committed to sustainably transforming In addition, small audit functions should leverage
their approach. Audit functions should stay away from continuous control monitoring, use data analytics, lean on
those that have a high likelihood of becoming a hobby business for experts such as guest auditors, and use busi-
versus a mission. ness partners to supplement specialization.

April 2015 Internal Auditor 67


Insights/In My Opinion
To comment on this article,
email the author at john.giannetti@theiia.org

By John A. Giannetti

If I Only Knew Then


What I Know Now

T
A former internal he time I spent work- meetings about processes, or Identifying potential con-
auditor shares what, ing in internal audit about important new initia- cerns beyond the financial
left an indelible mark tives, and insert themselves. statements is often where
in hindsight, he
on my career. During Sometimes the individuals practitioners add value that
would have done the 10 years I spent in the leading those meetings don’t can keep the organization
differently while in profession, I developed a new have the full picture like from running afoul of regu-
the profession. audit department, helped it internal auditors do. lators. Especially as organiza-
grow from a small centralized Obtaining the right tions grow and expand into
function to a global activ- information frequently new countries or jurisdic-
ity, traveled to many places, hinges on talking to the right tions, significant risks can
and had the opportunity to people. In many instances, be overlooked, as laws may
meet people from around auditors spend much of their differ among countries or
the world. Unfortunately, I time discussing controls and states. Auditors should take
never realized then how nar- procedures with manage- the time to research com-
row internal audit’s view of ment — often comprising sea- plexities that similar organi-
the organization can be or soned veterans and, in some zations are facing — simple
the extent to which informa- cases, former auditors. They online searches often reveal
tion is often filtered before know the questions internal valuable information.
an audit team gets to exam- audit will ask, and they know Opportunities to add
ine it. Had I only attended the answers auditors want to value exist everywhere in
meetings that I wasn’t hear. For this reason, internal organizations, but in many
invited to, spent more time auditors should also talk cases internal auditors are too
talking to the individuals to the employees perform- busy trying to complete the
actually doing the work, or ing the day-to-day tasks. present tasks at hand, clear
invested additional resources These individuals have direct review notes, or write man-
looking beyond the financial insight on how processes agement reports. They need
statements, I would have are working and what could to make time to find those
added a lot more value. make them more efficient. opportunities. Auditors don’t
Meetings often hold Auditors should speak to the need to leave the profession
the key to organizational employees one-on-one, form and come to these realizations
decision-making. Most com- relationships with them, and via hindsight — they can start
panies today use Outlook or let them know that internal making changes, and adding
a similar tool for conference- audit wants to make their job value, right now.
room booking, where each more efficient for the good of
meeting’s focus is identified the organization as a whole. John A. Giannetti, CPA,
on a master schedule. I am Lastly, auditors should CGMA, CITP, is director, Tax
not suggesting internal audi- spend more time on activities Accounting and Reporting,
tors sit in on annual reviews, that don’t involve the organi- at Health Care REIT Inc. in
but they can easily locate zation’s financial statements. Toledo, Ohio.

Read more opinions on the profession visit our blogs at InternalAuditor.org

68 Internal Auditor April 2015


100+
Speakers From Around the Globe
65+
Sessions in 10 Educational Tracks
2,000+
Attendees from 100+ Countries

Mountains of Change…
Oceans of Opportunities

Join audit professionals from globally recognized and Fortune 500 organizations at the 74th annual
IIA International Conference, July 5–8, 2015, in beautiful Vancouver, BC, Canada.

Confirmed Keynote Speakers

Theresa Payton
Founder, Fortalice, LLC
Former White House Chief Information Officer

Yuwa Hedrick-Wong, Ph.D.


Distinguished Visiting Professor, University of British Columbia
Global Economic Advisor, MasterCard Worldwide

Conference delegates enjoy special discounts on accommodations at convenient downtown Vancouver hotels.
Book your accommodations when you register for the conference and receive up to CAD$200 in savings.

Earn up to 18 CPE.
2015-5033

Visit ic.globaliia.org to register today!

2015-5033 VC-Vancounver April IA Ad.indd 1 2/27/15 3:34 PM


2015 TeamMate®
User Forum
Experience unique networking opportunities, exciting social events,
and content-filled learning sessions that empower auditors and
provide audit departments with a technological edge.

September 27-30, San Antonio, Texas


The Early Bird Gets the Worm
Register by May 31 and save 15%
www.TeamMateUserForum.com

Copyright © 2015 Wolters Kluwer Financial Services, Inc. 4024

You might also like