Вы находитесь на странице: 1из 76

OCTOBER 2016 INTERNALAUDITOR.

ORG
INTERNAL AUDITOR

COSO Framework at the Heart


of Boeing Internal Audit
Balancing Employer/Employee
OCTOBER 2016

Privacy Needs
A Coordinated Approach to
Compliance and Internal Audit
The Power of Rhetoric
NONFINANCIAL REPORTING

NONFINANCIAL
REPORTING
Internal audit is best positioned
to provide assurance and
insight on the overall health
of the organization.
When you have to be right

Has your current audit


management software left
you feeling marooned?

TeamMate can help.

Upgrade to TeamMates Audit


Management System this year and
receive one of the following:
free implementation services
one free year of TeamMate use
free TeamCloud hosting setup
one free TeamMate Analytics license
limitations apply

Get Help at
TeamMateSolutions.com/Help
Copyright 2016 Wolters Kluwer Financial Services, Inc. 10090
How do you
manage if
you arent
measuring?
Find out how our market-leading global risk
and internal audit practices look beyond
assurance to provide business insights and
help management anticipate risks.
ey.com/advisory

2015 EYGM Limited. All Rights Reserved. ED None


Are you part
of the 57%* ?
*% of companies where Internal Audit is
performing well at leveraging analytics and
technology

Source: PwC State of the Internal Audit Study, 2014-2016

Be Part of the Growing Trend


IDEA 10 makes it easy to analyze 100% of your data,
visualize patterns and discover anomalies so you can
share timely insights with your organization.

Learn how to get started with a data analytics program.


Visit casewareanalytics.com/57trend

IDEA is a registered trademark of CaseWare International Inc.

ad.indd 1 6/15/2016 3:29:11 PM


Celebrating 75 years of the IIA

october 2016Volumelxxiii: V

f e at u r e s
28 Cover Taking the Lead on Nonfinancial Reporting Internal audit is well-positioned to
examine how its organization reports on nonfinancial issues. By Arthur Piper

35 Audit Processes Take 49 A Unified Approach the work of any internal audi-
Flight The updated COSO to Compliance Businesses tor. By Murray D. Wolfe
Internal ControlIntegrated benefit from a proactive part-
Framework is at the heart of nership between internal audit
60 The Red Flags of Fraud
Internal auditors knowledge
Boeings internal audit work. and the compliance function.
of the business makes them
By Tim Boyle and By Jane Seago
Dennis Applegate ideal candidates to detect
54 The Power of Rhetoric unethical behaviors.
42 Privacy in the Work- Understanding the powers of By Norbert Tschakert,
place Organizations must find Belverd Needles Jr., and
persuasion and applying key Mark Holtzblatt
ways to accommodate employ- rhetorical skills can improve
ees personal technology use
while also meeting regulatory
and other requirements. Download the Ia app on the
By Parthiv Sheth, Khalid App Store and on Google Play!
Wasti, and A. Michael Smith

For the latest audit-related headlines visit InternalAuditor.org


Working in Concert to
Help You Perform

Internal Audit Foundation Composes the Latest Insights


and Knowledge
After four decades of serving the internal audit profession, The IIA Research Foundation has changed its
name to the Internal Audit Foundation. Our new name reflects the evolution of the profession and captures
the essence of why the Foundation exists, to:

Deliver timely, relevant thought leadership.

Provide educational products to empower internal auditors.

Fill the employment pipeline with qualified candidates.

Deliver tools and research to help boost career growth.

Whether youre an aspiring student or seasoned executive, all Foundation initiatives work together to help
you perform to your full potential.

Support your Foundation.


www.theiia.org/foundation

2016-0708

2016-0708 RF-Foundation Full Page Ad-Oct IA_FNL.indd 1 9/1/16 3:28 PM


Celebrating 75 years of the IIA

october 2016Volumelxxiii: V

D E P A R T M E N T S
PRACTICES INSIGHTS
13 Update CEOs are account- 66 Governance Perspectives
able for culture; financial Regulatory oversight of data
institutions are ill-equipped for security is on the increase.
compliance challenges; and
study ranks cyber awareness. 69 The Mind of Jacka
Auditors are only as good as
17 Back to Basics Present- their word.
ing recommendations is an art.
70 Eye on Business Environ-
20 ITAudit Auditors can mental, health, and safety risks
use big data to expand their exist in all organizations.
abilities.
72 In My Opinion Senior
7 Editors Note 22 Risk Watch Internal audit management is the ultimate line
is an auditable entity. of defense.
9 Reader Forum
25 Fraud Findings Fraud
has many faces.

O N L I N E InternalAuditor.org
Bashing the Boss Online Building on a Foundation
Even outside of the workplace, of Fraud Art Stewart looks at
employees need to be mindful the risks of programs meant
of what they say about the to aid minority- and women-
organization on social media owned businesses.
Top: Jirsak / shutterstock.com, Bottom: Ollyy / shutterstock.com

sitesand internal auditors


need to understand the poten- Reporting on Cyber
tial impact. Threats Internal audit should
reevaluate its criteria for
Worldwide Risk and reporting IT issues to the
Opportunity Watch former audit committee and senior
Australian Prime Minister executives.
cover: photo Illustration by Sean Yates,

Julia Gillard discuss geopoliti-


cal risk, the rise of Asia, and
challenges for multinational
organizations.

Internal Auditor ISSN 0020-5745 is published in February, April, June, August, October, and December. Yearly subscription rates: $75 in the United States and Canada, and $99 outside North America. No refunds on cancellations.
Editorial and advertising office: 247 Maitland Ave., Altamonte Springs, FL 32701-4201, U.S.A. Copyright 2016 The Institute of Internal Auditors Inc. Change of address notices and subscriptions should be directed to IIA Customer
Service, +1-407-937-1111. Periodicals postage paid in Altamonte Springs, Fla., and additional offices. POSTMASTER: Please send form 3579 to: Internal Auditor, 247 Maitland Ave., Altamonte Springs, FL 32701-4201, U.S.A. Canada Post
International: Publications Mail (Canadian Distribution) Sales Agreement number: 545880; GST registration number: R124590001. Opinions expressed in Internal Auditor may differ from policies and official statements of The
Institute of Internal Auditors and its committees and from opinions endorsed by authors employers or the editor of this journal. Internal Auditor does not attest to the originality of authors content.
Cybersecurity resilience
go beyond security to a
new level of readiness.
Access our latest article outlining the critical
components your organization needs for
a mature and effective cyber program.
crowehorwath.com/cyberresilience

Audit / Tax / Advisory / Risk / Performance Smart decisions. Lasting value.TM

In accordance with applicable professional standards, some firm services may not be available to attest clients.
2016 Crowe Horwath LLP, an independent member of Crowe Horwath International crowehorwath.com/disclosure RISK-17010-015C

RISK-17010-015C IIA Internal Auditor Magazine Ads.indd 1 8/8/2016 7:28:09 AM


Editors Note

Whats in a Name?

N
onfinancial reporting, integrated reporting, holistic reporting, or enhanced
reportingalthough theres no single, agreed-upon name for this type
of reporting (even among the editors of this magazine), stakeholders and
investors agree on the need for more comprehensive reporting that goes
beyond the financial health of the organization.
According to The IIA Global Perspectives and Insights report, Beyond the
Numbers: Internal Audits Role in Nonfinancial Reporting, this type of report-
ing fills the void by reporting quantitative and qualitative information that falls
outside the scope of mainstream financial statements. In this months cover story,
Taking the Lead on Nonfinancial Reporting, author Arthur Piper considers the
disclosure of nonfinancial information and the leading role internal audit can play
because of its knowledge of the organization.
The nonfinancial reporting movement appears to be slightly further along in
Europe than in other parts of the world. By December, governments across Europe
will need to have translated the European Unions 2014 Directive on nonfinancial
reporting into their national rule books. The directive requires organizations to
disclose information on environmental issues, social and employee-related mat-
ters, respect for human rights, and anti-corruption and bribery. And although the
terminology may not yet have caught on in the U.S., Jim Pelletier, The IIAs vice
president of Professional Solutions, points out in the cover story that internal audi-
tors who are taking a risk-based approach and are looking at the major objectives
of the organization are likely to be addressing nonfinancial areas.
Continuing with the reporting theme, but in another vein, Im excited to
report Internal Auditor has a new Fraud Findings contributing editor. Bryant
Richards, a member of The IIAs Publications Advisory Committee and the maga-
zines Editorial Advisory Board, is an associate professor of accounting and finance
at Nichols College in Dudley, Mass.Previously, he was the director of corporate
governance for the Mohegan Tribal Gaming Authority. Welcome, Bryant!

@AMillage on Twitter

october 2016 Internal Auditor 7


Help Your Organization
Identify the Risk of Fraud
Before Its Too Late

Raise the Red Flag


An Internal Auditors Guide to Detect and Prevent Fraud
The fraud curve can be treacherous. By applying the principles and practices in this book,
along with professional skepticism and a questioning mind, internal auditors will know
when to raise the red flag and what to do about it.

Your next case is just around the corner. Get the resource that will help you detect and
prevent fraud. Order your copy of Raise the Red Flag: An Internal Auditors Guide to
Detect and Prevent Fraud today.

Use Promo Code FRAUD16 to receive 10% off. Offer Expires Nov. 30, 2016.

Visit the www.theiia.org/bookstore today!

Member Price: US$57.59 / Nonmember Price: US$71.99


Visit www.theiia.org/bookstore

*Discount also applies to and PDF formats.

2016-1175

2016-1175 RF-Bookstore Raise the Red Flag IA Oct Ad_FNL.indd 1 9/1/16 3:40 PM
Reader Forum
WE WANT TO HEAR FROM YOU! Let us know what you think of this issue.
Reach us via email at editor@theiia.org. Letters may be edited for clarity and length.

I agree with Mike Jacka when he says, interests. His or her boss, the audit com-
auditors should talk with the data mittee, and investors-at-large naturally
owners to understand what is available, have conflicting interests with the pres-
how it is used, and how it relates to the sure of targets, competition, and so on.
processes under review. Sometimes ABDULKAREEM ALYOUSIF comments
this becomes a challenge because the on the Chambers on the Profession blog
post, When Internal Audit Finds Itself at the
data owners talk about how helpful Plaintiffs Table.
and value-added their processes are
without actually answering your ques- Conflicts of Interest
Data Fever tions. Therefore, receiving a data dump It is very important to have a policy for
Mike Jacka has correctly diagnosed the can be useful in performing basic tests conflicts of interest. Additionally, a single
disease affecting many who are hot for first (e.g., testing for missing fields, person should not be given authority
data analytics. Ready, aim, fire is still duplicates where unique values should to carry out a transaction from start to
the best approach. You need to know be, and double payments and receipts). finish. Segregation of duty, dual signa-
what you want to achieve before you Then more specific testing also can tory, and conflict of interest policies also
start developing analytics. So many be performed after a walkthrough is are important controls that need to be
feverishly rush to use the shiny new received from the data owner for one enforced at the entity level. Internal audit
tools, when what we should be doing entire data sample that outlines key should use data analytics to understand
first is asking: a) What are the risks that controls, or lack thereof. transactions that are normal and transac-
matter most to the organization and its OWAIS RIZVI comments on Mike Jackas tions that seem abnormal.
achievement of objectives? and b) How Do You Have Data Fever?
MANOJ AGARWAL comments on
can we assess the management of those James Baileys Fraud and Related-party
The CAE Challenge Transactions (June 2016).
risks? Analytics can be great, but only
if they are used when we are ready and We have a saying in Arabic that goes
can aim them at the risks that matter. something like, The notch is bigger Culture and Communication
than the patch. The CAE is faced with I agree that the governance, risk, and
NORMAN MARKS comments on Mike
Jackas Do You Have Data Fever? (Mind a real challenge and will continue to controls culture is a necessity in any
of Jacka, August 2016). be as long as he or she serves multiple company. But the implementation of

CONTRIBUTING EDITORS Sandra Kasahara, CIA, CPA David Weiss, CIA CONTA CT INFORMA TION
Mark Brinkley, CIA, CFSA, CRMA Michael Levy, CRMA, CISA, CISSP Scott White, CIA, CFSA, CRMA ADVERTISING
J. Michael Jacka, CIA, CPCU, CFE, CPA Merek Lipson, CIA Benito Ybarra, CIA
Steve Mar, CFSA, CISA
advertising@theiia.org
Thomas Luccock, CIA, CPA
Bryant Richards, CIA, CRMA +1-407-937-1109; fax +1-407-937-1101
Michael Marinaccio, CIA IIA PRESIDENT AND CEO
James Roth, PHD, CIA, CCSA, CRMA Norman Marks, CPA, CRMA Richard F. Chambers, CIA, SUBSCRIPTIONS, CHANGE OF ADDRESS, MISSING ISSUES
OCTOBER 2016 Paul J. Sobel, CIA, QIAL, CRMA Alyssa G. Martin, CPA QIAL, CGAP, CCSA, CRMA customerrelations@theiia.org
VOLUME LXXIII: V
Laura Soileau, CIA, CRMA Dennis McGuffie, CPA +1-407-937-1111; fax +1-407-937-1101
EDITOR IN CHIEF Stephen Minder, CIA IIA CHAIRMAN OF THE BOARD EDITORIAL
Anne Millage EDITORIAL ADVISORY BOARD Kenneth Mory, CIA, CPA, CISA, CRMA Angela Witzany, CIA, QIAL, CRMA David Salierno, david.salierno@theiia.org
Dennis Applegate, CIA, CPA, CMA, CFE Jack Murray, Jr., CBA, CRP +1-407-937-1233; fax +1-407-937-1101
MANAGING EDITOR Lal Balkaran, CIA, CGA, FCIS, FCMA Hans Nieuwlands, CIA, RA, CCSA, CGAP
PERMISSIONS AND REPRINTS
David Salierno Mark Brinkley, CIA, CFSA, CRMA Bryant Richards, CIA, CRMA editor@theiia.org
Adil Buhariwalla, CIA, CRMA, CFE, FCA Jeffrey Ridley, CIA, FCIS, FIIA +1-407-937-1232; fax +1-407-937-1101
ASSOCIATE MANAGING
EDITOR David Coderre, CPM Marshall Romney, PHD, CPA, CFE
WRITERS GUIDELINES
Michael Cox, FIIA(NZ), AT James Roth, PHD, CIA, CCSA
Tim McCollum InternalAuditor.org (click on Writers Guidelines)
Dominic Daher, JD, LLM Katherine Shamai, CIA, CA, CFE, CRMA
SENIOR EDITOR Haley Deniston, CPA Debora Shelton, CIA, CRMA
Kayla Flanders, CIA, CRMA Laura Soileau, CIA, CRMA Authorization to photocopy is granted to users registered with the
Shannon Steffee
James Fox, CIA, CFE Jerry Strawser, PHD, CPA Copyright Clearance Center (CCC) Transactional Reporting Service,
ART DIRECTION Peter Francis, CIA Glenn Sumners, PHD, CIA, CPA, CRMA provided that the current fee is paid directly to CCC, 222 Rosewood
Yacinski Design, LLC Michael Garvey, CIA Sonia Thomas, CRMA Dr., Danvers, MA 01923 USA; phone: +1-508-750-8400. Internal Audi-
Nancy Haig, CIA, CFE, CCSA, CRMA Stephen Tiley, CIA PUBLISHED BY THE tor cannot accept responsibility for claims made by its advertisers,
PRODUCTION MANAGER INSTITUTE OF INTERNAL although staff would like to hear from readers who have concerns
Daniel Helming, CIA, CPA Robert Venczel, CIA, CRMA, CISA
Gretchen Gorfine J. Michael Jacka, CIA, CPCU, CFE, CPA Curtis Verschoor, CIA, CPA, CFE AUDITORS INC. regarding advertisements that appear.

OCTOBER 2016 INTERNAL AUDITOR 9


ENGAGE AND CONNECT GLOBALLY
Gain a competitive edge with unique IIA advertising and sponsorship opportunities
as diverse as the 185,000 plus members in nearly 200 countries we serve.
Contact +1-407-937-1388 or sales@theiia.org for more information.

www.theiia.org/advertise
2016-1116

2016-1116 MKT-Adv Sponsorship Oct IA Ad-Full.indd 1 8/23/16 9:01 AM


Reader Forum

this culture will call for an important deliver. I think we should not just Whistleblower Protection
effort of communication, and for a limit ourselves to what we know we CAEs need whistleblower protection,
good dose of personal will from the can deliver, but actually push ourselves too. I also think CAEs should be incen-
board of directors. to deliver what our organization needs tivized, under federal law, for reporting
Priscille Kona comments on the and deserves. If that means we need truthful information regarding unethical
Chambers on the Profession blog post, to bring in outside specialist skills, and/or illegal behavior at both the state
If Strategy Is Cultures Breakfast, Then
or increase skills in-house, then we and federal levels. The IIA should fol-
Governance, Risk, and Controls Are Its
Appetizers. should do that. low Richard Chambers and unite our
I love the old joke: Why did the collective voice ensuring fair treatment
Limiting Ourselves auditor cross the road? Because thats for Richard Patton. The investigation
As internal audit teams, we should be what they did in the prior year work- into Patton should be fully disclosed to
able to answer the question, Why ing paper! It brings me to the audit- taxpayers. Let the facts speak.
am I here? or rather, What should business-impact-dilemma: How can zach zemenick comments on the
my organization be getting from someone who cant innovate for them- Chambers on the Profession blog post, Is
internal audit? Most peoples resumes selves advise others regarding innova- Houston Another Place Where Oversight
Goes to Die?
(including auditors) will tell you they tion and opportunity identification?
want to make a difference in their
job. Jacka points out that we just give annarie oosthuizen comments on
the From the Mind of Jacka blog post, Visit InternalAuditor.org
customers what they think they want, Does Internal Audit Kill Organizational for the latest blogs.
instead of what we know we can Innovation?

Apply Today and


Drive Your Save up to US$200
Career Forward Drive your career forward and save up
to US$200.* From Oct 131, The IIA is
waiving the application fee for the Certified
Government Auditing Professional credential.

Visit www.theiia.org/CGAP
for more information.

*Exclusions may apply. Please visit the CGAP website


for more information.

2016-1117

2016-1117 CERT-CGAP App Fee Half Pg Oct Ia Ad_1.indd 1 8/18/16 4:21 PM


october 2016 Internal Auditor 11
Our Light Is Always On,
Because Audit Never Sleeps
IIA Learning OnDemand Access Quality Training 24/7

Take your core to the next level with


self-paced, on-demand courses
focused on internal audit practice, data
analytics, fraud, ethics, GRC, and more.

Explore at www.theiia.org/ondemand

2016-0986

2016-0986 TRN-IIA Learning Oct IA Ad-FNL.indd 1 8/18/16 1:49 PM


Regulation hampers AML efforts Study ranks national cybersecurity
Governance expectations changing Intercompany accounting problems.

Update Enforcement
Activity Dips
The U.S. Securities and
Exchange Commission has
brought fewer enforce-
ment actions so far in fiscal
year 2016.

2015
actions Q1-3
555

Great Culture, Employees favor CEOs when


they are satisfied with their
Great CEO companys culture.

C
orporate culture is the strongest fac- 70,000 U.S. employers that were collected
tor in employee ratings of their in its company review survey. Researchers
organizations CEOs, according to then looked at factors that might influence
What Makes a Great CEO?, a report CEO approval ratings, using data from
by Mill Valley, Calif.-based employment external sources on CEO pay, tenure, and 2016
and recruiting website Glassdoor. In fact, a company profitability. actions Q1-3
one-level increase in overall company ratings
on a five-star scalefrom three stars to four
Opinion of senior leadership, view of
career opportunities, and quality of com- 508
stars, for exampleraises CEO approval pensation and benefits are the cultural fac- Source: Cornerstone Research,
ratings in large, publicly listed companies tors that have the greatest impact on CEO analysis of enforcement actions
by nearly 37 percent, the report notes. In approval ratings. Among cultural factors, Identified at www.sec.gov
right, John T. Takai / shutterstock.com
Images: Top, Jirsak / shutterstock.com,

the eyes of many employees, CEOs are work-life balance is the exception, surpris-
ultimately held accountable for workplace inglyCEO approval is lower in organiza-
culture, the report observes. tions with high work-life balance.
The Glassdoor findings are based on Aside from company culture, CEOs
1.2 million CEO approval ratings for about of more profitable companies receive the

For the latest audit-related headlines follow us on Twitter @IaMag_IIA

october 2016 Internal Auditor 13


Practices/Update

highest approval ratings. Moreover, CEOs CEO pay has the greatest negative
who are company founders have higher impact on CEO approval, with the highest-
approval ratings than executives who were paid CEOs receiving the lowest approval rat-
promoted internally or hired externally. ings and the lowest paid receiving the highest
The highest-rated CEOs are in the real approval ratings. Even here, the data suggest
estate, construction, IT, and finance indus- that the negative effect of higher CEO pay
tries, while the lowest rated are in the on CEO approval ratings can be partly ame-
retail, manufacturing, transportation, and liorated if it is accompanied by great com-
mining sectors. pany culture. T. McCollum

Ill-equipped for Anti-money


19 % Laundering
of consumers Regulatory complexity has
would stop executives worried about
shopping at inadequate staff and resources.
a retailer

S
that has had a eventy-nine percent of 280 senior-
cybersecurity level executives of financial institu-
breach tions surveyed are moderately or
very concerned about enterprisewide Respondents say their AML programs

55 %
of senior IT
compliance and the integration of their anti-
money laundering (AML) programs, accord-
are challenged by staffing issues such as the
competitive job market, shortage of qualified
ing to a recent survey from financial services applicants, and restricted budgets.
executives at technology provider NextAngles. Challenges Nearly two-thirds of respondents
retailers have cited around AML programs include the expect their AML compliance spending
not invested in introduction of new regulations (77 percent) to increase by at least 5 percent within the
cybersecurity and staffing concerns (76 percent). next 18 months. Similar findings in Finan-
within the past The survey shows increasing anxiety cial Crimes Survey 2016, from Operational
12 months among financial institution executives that Risk magazine and BAE Systems, indicate
they are insufficiently staffed and equipped that 51 percent of the 204 respondents
Consumers are clearly for todays compliance challenges, Next- expect budgets to rise in the next three
demanding that their Angles CEO Mallinath Sengupta says. years. S. Steffee
information be protected,
and theyre going to let
their wallets do the
talking, says Mark Larson,
KPMGs national line of
Study Ranks Cyber Fourteen countries are
Images: Top, Spectral-Design / shutterstock.com,

business leader for Con- recognized for promoting


sumer Markets.
Aware Countries
right, Africa Studio / shutterstock.com

cybersecurity preparedness.

T
Source: KPMG, 2016 Consumer Loss
Barometer Report he U.S. ranks No. 1 on the Global Cybersecu- prepare for potential cyber-
among the most rity Index issued by ABI attacks and implement pro-
cyber aware coun- Research and the Interna- tection plans.
tries, according to a tional Telecommunication The compiled data iden-
recent study by cybersecurity Union. In addition to the tifies five indicators of cyber-
distributor Turrem Data. ranking, the study discusses security preparedness that
The rankings are based what countries can do to governments should look

14 Internal Auditor october 2016


VISIT InternalAuditor.org to view a
Practices/Update
video interview with Julia Gillard.

at to improve their nations


cyber awareness: legal mea- Transparency Offers Reassurance
sures, technical measures, Expectations about what good governance is changes over time, says
organizational measures, former Australian Prime Minister Julia Gillard.
capacity building, and coop-
eration. The study recognizes How important is good corporate governance to a
the U.S. for best practices strong national economy? Good corporate governance is
such as its Industrial Control vital to a strong national economy. Unless people can trans-
Systems Cyber Emergency parently see what is happening in an economy, they cant
Response Team (ICS-CERT) properly calibrate risks and opportunities. So around the
and Critical Infrastructure world we see patterns of investment going into economies
Protection Program. that have good governance and transparency and can offer
Canada ranks second people reassurance. Thats something that, as prime minister
because it requires federal in Australia, we were always very proud of. But its something
agencies to have an IT secu- youve got to keep building because norms and expectations
rity strategy and has seven about what good governance is changes over time.
institutions that promote
cybersecurity. Australia, Given Australias ties with Great Britain, how will the Brexit vote impact Australias
Malaysia, and Oman are trade? For Australia, the real implication of the Brexit vote is not so much a trade implication. Our
tied for third for having trade relationships are very diversified, and much of our trade is in our own region of the world,
computer crime and con- particularly with China, and with the U.S. The thing that is most flowing through Australian political
sumer protection opera- discourse about Brexit is the sign it sends that around the world there is a lot of disgruntlement
tions, relations with other with the impact of globalizationa lot of turning away from internationalismand, ultimately, that
national CERT agencies, could affect every nation on earth as people seem to be losing faith in global structures.
and cybersecurity strategies
and plans. Rounding out
the rankings are New Zea-
land, Norway, Brazil, Esto- Intercompany Accounting
nia, Germany, India, Japan,
South Korea, and the U.K. Falls Short
The study notes that
three countriesChina, A recent poll finds
Russia, and Switzer- coordination lacking among
landdid not make the organizational legal entities.

M
list because of their lack of
progress in building cyberse- ore than two-thirds of the 3,800
curity capacity. Switzerland, finance and accounting profes-
especially, was expected sionals polled by Deloitte say
to be ranked because it is their organizations are working
home to several important toward greater consistency in intercompany company. It can include sales of products
Images: right, alphaspirit / shutterstock.com

international organization accounting, but they havent yet achieved it. and services, fee sharing, cost allocations,
headquarters such as the Less than 10 percent indicate their organiza- royalties, and financing activities.
European Organisation for tion has a holistic accounting framework Intercompany accounting can become
Nuclear Research and the with efficient systems and communications a real challenge to those experiencing global
World Economic Forum. across critical functions. growth, mergers and acquisitions, and sup-
Such lack of cybersecurity Deloitte defines intercompany account- ply chain integration, says Kyle Cheney, a
preparedness is common in ing as processing and accounting for Deloitte Advisory partner. Disparate soft-
most countries, though, the internal financial activities and events that ware systems are respondents greatest inter-
report says. impact multiple legal entities within a company accounting issue. D. Salierno
Nicole Licourt

october 2016 Internal Auditor 15


SHOWCASE YOUR EXPERTISESTART BY REGISTERING FOR AN ISACA CERTIFICATION EXAM TODAY!

ISACA CERTIFICATIONS
SHOWCASE MY
EXPERIENCE AND SKILLS.
THEY HELPED ME
MOVE UP TO
MY CURRENT POSITION.
THOMAS BORTON, CISA, CISM, CRISC
DIRECTOR OF IT SECURITY AND COMPLIANCE, COST PLUS
SAN FRANCISCO, CALIFORNIA, USA
ISACA MEMBER SINCE 2004

Holding an ISACA certification validates your expertise,


increases your earning potential and expands your opportunities.
Register for an upcoming exam today!
Register at www.isaca.org/2016exams-IIA

UPCOMING CERTIFICATION EXAM

10 December 2016
Final Registration Deadline: 21 October 2016

Register online for a December exam to automatically save US $75! www.isaca.org/2016exams-IIA


Back to Basics
By Anupam Goradia edited by James Roth + Laura Soileau

The Art of Recommending


Internal auditors
walk a fine line
when presenting

O
recommendations
to management. ne of the ways reports provide recommen- organization (see Sources
internal audit adds dations to fix unacceptable of Recommendations on
value to the orga- scenarios because they are page 19). Internal sources of
nization is through easy to identify and are less recommendations are easier
the recommendations com- likely to be disputed by to locate; however, they
municated in internal audit the process owner. How- require a tactful approach
reports. But recommenda- ever, recommendations to as process owners may not
tions also can become a fix gaps in a process only be inclined to share unbi-
point of contention with take the process to where ased opinions with internal
management, as they may it is expected to be and not audit. External sources
suggest additional proce- where it could be. Internal may not be as easily acces-
dures for staff or offend audits value lies not only in siblean internal audit
management if not pre- providing solutions to exist- function should invest in
sented correctly. Therefore, ing issues but in instigating providing its staff with
auditors should take care to thought-provoking discus- access to research libraries
communicate with the vari- sions. Recommendations and professional networks
ous stakeholders how their also can include suggestions to facilitate access.
recommendations will help that will move the process It is a good practice
fix gaps and mitigate risks. or the department being to jot down recommenda-
The stakeholders will evalu- audited to the next level of tion ideas as soon as they
ate whether the recom- efficiency. When recom- come to mind, even though
mendations being provided mendations aimed at future they may not find a place
are worth the investment of improvements are included, in the final report. Even if
time and resources required internal audit reports internal audit testing does
to implement them (cost become a tool in shaping not result in a finding, the
vs. benefit). the strategic direction of the auditor may still recom-
department being audited. mend improvements to the
Recommendation Types current process.
Broadly, a recommendation Internal and
is either a suggestion to fix External Sources Documentation
an unacceptable scenario or An auditor should draw Internal audit should spend
a suggestion for improve- recommendations from sufficient time brainstorming
ment. Most internal audit both inside and outside the potential recommendations

Send Back to Basics article ideas to Laura Soileau at lsoileau@pncpa.com

october 2016 Internal Auditor 17


Evolution or irrelevance?
Internal Audit at a crossroads
Explore the findings of Deloittes 2016 Global
Chief Audit Executive Survey. With responses
from more than 1,200 heads of Internal Audit,
this is Deloittes most comprehensive global
examination of Internal Audit to date.

www.deloitte.com/globalcaesurvey

Copyright 2016 Deloitte Development LLC. All rights reserved.


Practices/Back to Basics
To comment on this article,
email the author at anupam.goradia@theiia.org

and choosing their wording carefully to ensure their audience


has complete understanding. Recommendations should be Sources of
written simply and should: Recommendations
Address the root cause if a control deficiency is the basis Internal
of the recommendation. Process owner walkthroughs.
Address the department rather than a specific person. Critical reading of documented procedures.
Include bullets or numbering if describing a process Practices followed by other departments or loca-
that has several steps. tions within the organization.
Include more than one way of resolving an issue iden- Prior internal audit reports on the area currently
tified in the observation, if possible. For example, being audited.
sometimes a short-term manual control is suggested Results of current testing.
as an immediate fix in addition to a recommended Recommendations in other internal audit projects.
automated control that will involve considerable time
to develop. External
Position the most important observation or risk first IIA research materials.
and the rest in descending order of risk. Other professional and industry literature.
Indicate a suggested priority of implementation based Networking with industry peers.
on the risk and the ease of implementation. Procedures followed by other organizations.
Indicate any repeat findings. If the recommendation Vendor-provided education on new technologies
needs to be modified, provide an updated recommen- and services related to the process being audited.
dation in the report.
Explain how the recommendation will mitigate the risk
in question.
List any recommendations separately that do not link dilutes internal audits objectivity and independence and
directly to an audit finding but seek to improve pro- becomes representative of managements opinions and
cesses, policies, or systems. concerns. It is internal audits prerogative to provide rec-
ommendations, regardless of whether management agrees
Management Feedback with them. Persuasive and open-minded discussions with
Recommendations will go nowhere if they are not valued process owners are important to achieving agreeable and
by management. Therefore, the process of obtaining man- implementable recommendations.
agement feedback on recommendations is critical to make
them practical. Ultimately, process owners may agree with A Complex Journey
the recommendation, agree with part of the recommenda- The journey of a potential suggestion to a recommenda-
tion, and agree in principle, but technological or personnel tion is complex and is influenced by every stakeholder and
resource constraints wont allow them to implement it. constraint in the audit processbe it the overall tone of
They also may choose to revisit the recommendation at a the organization toward change, its philosophy toward
future date as the risk is not imminent, or disagree with the internal audit, the scope of the internal audit, views of the
recommendation because of varying perceptions of risk or process owner, experience and exposure of internal audit
mitigating controls. staff, or available technology. However, an internal audi-
Management in the public sector could be averse to rec- tor must realize that every thought may add value to the
ommendations because of public exposure of their reports. organization and deserves consideration within the internal
Therefore, internal audit should clearly state in its reports if audit team. Internal audit departments should deliberate
the recommendations do not correspond to any errors but about the process and ask at the end of every audit: Does
are suggested improvements. More recommendations do it align with the organizations strategy and direction? Is it
not mean there were more faults with the process, and this up to par with what is seen elsewhere? What is its relevance
should be communicated to the process owners. today and in the future?
Management responses should be added to the recom-
mendations with identified action items and implementa- Anupam Goradia, CPA, CISA, CITP, is a senior manager
tion timelines whenever possible. Whatever managements in the Risk Advisory division at WithumSmith+Brown CPAs and
response, a recommendation should not be changed if it Consultants, New Brunswick, N.J.

october 2016 Internal Auditor 19


ITAudit
By Lorraine Lee edited by Steve Mar

Big Data and Internal Auditors


Todays data
analytics expand
auditors ability to

B
tap into all types
of information ig data has greatly discover and report on mean- analyze all of the transac-
expanded the ingful patterns and insights tions in an audit population.
generated by the
amount of informa- derived from large and Variety refers to the
organization. tion available to complex data sets through various types of data being
internal auditors. Organiza- the use of statistics and other generated, both struc-
tions now store an enormous types of quantitative analysis. tured and unstructured.
amount and variety of data, Audit analytic tools and data Ninety percent of data is
ranging from traditional visualization software, cou- unstructured, including
financial data associated with pled with the massive data text, photos, audios, videos,
sales and expenses to more storage capacity of data cen- click streams, and log files.
unstructured data associated ters, have created an oppor- Access to such a variety of
with video, weblogs, email, tunity for internal auditors to business documents can
and tweets. exploit an organizations data enable auditors to analyze
Data-savvy internal to improve the internal audit larger, nontraditional data
audit groups are mining functions performance. sets and perform more
this data to generate action- detailed analysis.
able insights and recom- The Four Vs of Big Data Velocity refers to the
mendations. For example, Big data has four specific increasing speed in which
the ability to analyze large attributes: volume, variety, the data is created, as well
data sets can enable internal velocity, and veracity. Vol- as the speed in which it can
auditors to examine all cash ume refers to the amount of be processed, stored, and
expenses, not just a sample, data available. According to analyzed. Greater velocity
and determine whether any IBM, the world is generat- enables continuous audit-
employees are consistently ing 2.5 exabytes (2.5 billion ing of audit evidence on a
submitting an inappropri- gigabytes) of data daily. The frequent, repeatable, and
ately high volume of cash most obvious impact this sustainable basis. Although
expenses. Another example vast amount of data has on the concept of continuous
would be reviewing the types the internal audit function auditing has been around for
and amounts of purchase is the capacity to greatly more than 20 years, the soft-
card transactions made by all improve audit coverage. ware and hardware associ-
departments for anomalies. Instead of selecting a lim- ated with big data is making
Data analytics makes ited sample of transactions continuous auditing a reality
it possible for auditors to to test, an auditor now can for internal audit groups.

Send ITAudit article ideas to Steve Mar at steve_mar2003@msn.com

20 Internal Auditor october 2016


To comment on this article,
email the author at lorraine.lee@theiia.org

Finally, veracity refers to the quality and trustworthiness ability to recruit and retain personnel with these skills
of the data to be relied on to draw accurate conclusions. The will be an important investment and strategic decision
volume, variety, and velocity of data is only useful if that data for organizations.
is correct, consistent, and complete. IT audit processes such Select the right tools. Traditional audit analytics focuses
as those associated with assurance in areas such as backup on analyzing structured data through tools like Micro-
and restore, disaster recovery planning, data storage, data soft Excel and Access. With big data and analytics,
security, and access control are critical in ensuring the verac- more powerful tools are available for data visualization,
ity of the organizations data. statistical analysis, and business intelligence. These tools
require additional training but can provide the mecha-
Visualizing Data nism for reaping the benefits of big data.
In addition to the Four Vs, internal auditors should consider Develop a road map. As part of the strategic planning
a fifth aspect of big data: visualization. Data visualizations are process, the internal audit function should build a two- to
presentations of data in a pictorial or graphical format that three-year road map outlining a planned approach for
enables decision-makers and auditors to view a visual repre- incorporating analytics into the current internal audit
sentation of the data. An effective visualization facilitates the processes. This plan will highlight the overall objectives
of analytics in the audit processes, as
well as the costs and benefits. While an
Data trends can provide insights into organization initially might focus on
data analysis to better understand past
the risks facing an organization. events, data analysis also can evolve to
predictive analytics, where data is used
to make predictions of future events.
understanding of difficult concepts or identifies new patterns With a road map, the objectives of analytics can be linked
or trends from the data. directly with the data maturity of the organization, as well
Recent advances in user-friendly data visualization soft- as with the internal audit functions objectives.
ware are enabling auditors to easily extract and analyze data
and create visualizations and storyboards from that data. This Tool for Transformation
helps auditors find and communicate meaning from the data. Following the four data analytics guidelines can potentially
In addition, visualization tools support the detailed analysis transform the internal audit function. By analyzing the orga-
of large, nontraditional data sets and provide the means for nizations data more strategically, auditors can better under-
internal auditors to more effectively communicate insights stand the organization and gain additional insights from the
from their organizations data. data. The data can be used for supporting the financial state-
ment audit, as well as improving efficiency within the organi-
Adding Analytics to Audits zation. For example, an auditor can examine 100 percent of
To incorporate data analytics in their internal audit opera- travel expense data to provide more evidence of the accuracy
tions, auditors should consider four guidelines. of the expense accounts, test for fraudulent transactions, and
Understand the data. Data can be an organizations test the relevant controls.
most important asset, and internal auditors should From a risk management perspective, data trends and
understand both the data that is currently available anomalies can provide insights into the risks facing an orga-
in the organization and the data that is not available. nization. An emerging area in risk management is the use of
This knowledge can help prioritize the types of analysis unstructured text analysis to examine large amounts of text-
appropriate to the organization and to internal audit. based artifacts, perhaps from social media sites, to detect word
Prioritize acquiring data analytics skills. Although every patterns that could indicate potential risks to an organization.
auditor does not have to be a data analytics special- Big data and data analytics provide an opportunity for
ist, every audit team should have at least one member internal auditors to perform truly data-driven audits. By pri-
who is data-focused and can spend a portion of his or oritizing data analytics, internal auditors can harness big data
her time on analytics. This person ideally should be and increase their overall value to the organization.
technology-savvy and interested in how analytics can
improve existing internal audit processes. Given the Lorraine Lee, PHD, CPA, CISA, is an associate professor of
demand in the marketplace for data analytics skills, the accounting at the University of North CarolinaWilmington.

october 2016 Internal Auditor 21


Risk Watch
By Paul Sobel

Is Internal Audit in
Your Audit Universe?
The activity should be
subject to the same

A
objective assurance t the start of a failing to get assurance on exploit risk to its advan-
as other valuable, recent presenta- internal audits effectiveness tageor monitoring some
tion, I asked a may diminish the organiza- aspect of those two.
risk-oriented group of internal tions overall risk manage- The International Pro-
functions. auditors to stand up if they ment effectiveness. fessional Practices Frame-
thought internal audit was works new mission for
of great value to their orga- The Audit Universe internal auditing includes
nizations. Not surprisingly, An audit universe is a list the phrase, to enhance
everyone in the room stood of all auditable entities in and protect organizational
up. I then asked them to an organization. An audit- value. That mission aligns
sit down if they thought able entity could be a loca- with the description of
it would be acceptable if tion, department, function, auditable entities. Most
internal audit underper- financial statement area, internal audit activities fol-
formed. Nobody sat down. compliance requirement, or low a risk-based approach,
Finally, I asked them to a multitude of other entities. which helps them deliver
sit down if they thought Including such an entity in on that mission. The Glos-
other corporate functions the audit universe is justified sary to the International
that were just as valuable if the entity has some role in Standards for the Professional
as internal audit should be creating or preserving value Practice of Internal Auditing
audited periodically. Every- for the organization. Stating (Standards) defines risk as
one sat down. it differently, an auditable The possibility of an event
The purpose of this entity has some role in man- occurring that will have an
exercise was to demonstrate aging one or more risks to impact on the achievement
that an internal audit activ- the achievement of organiza- of objectives.
ity, if truly delivering the tional objectives. If it cant be Therefore, any orga-
level of value it is capable tied to an objective and risk, nizational activity that
of delivering, should be it shouldnt be in the audit helps to reduce the impact
subject to an independent universe. The auditable enti- or likelihood of negative
review. Because internal tys role in managing those events (protect value) or
audit is an important part risks could be a form of risk increase the likelihood that
of an organizations pro- mitigation such as controls, objectives will be achieved
cesses to assess and monitor risk seekinghelping the (enhance value) should
risk management activities, organization take on or be included in the audit

Send Risk Watch article ideas to Paul Sobel at paul.sobel@gapac.com

22 Internal Auditor october 2016


To comment on this article,
email the author at paul.sobel@theiia.org

universe. This logic supports including the internal audit The criteria are the Standards and the Code of Ethics. Evi-
activity in the audit universe. dence is then gathered to support achievement of those objec-
tives and, more specifically, conformance with the principles
A Quality Assurance Review and requirements outlined in the Standards and Code of Eth-
The Glossary to the Standards defines assurance services as An ics. Finally, a report on the results of the assessment is issued
objective examination of evidence for the purpose of provid- to communicate the results of the assurance engagement.
ing an independent assessment on governance, risk manage- Theres one final requirement to truly make it an audit
ment, and control processes for the organization. Broadly, of the internal audit activity: an objective examination of
an assurance-focused audit typically involves: evidence. Self-assessments and other forms of review can be
Establishing one or more objectives for the audit such an important part of a quality assurance and improvement
as determining the accuracy of financial reporting or program, as outlined in the Standards. However, to live up to
certain recorded amounts, evaluating the adequacy of the level of other internal audits, a quality assurance review
internal controls, confirming compliance with laws and should be conducted by individuals who are objective, such
regulations, or assessing the effectiveness and efficiency as appropriately trained individuals from a peer company
of certain processes. or an outside service provider. This objective party should
Understanding criteria against which an examination report on internal audits conformance with the Standards to
can be made. For example, such criteria may be gen- the appropriate stakeholders. Once these final requirements
erally accepted accounting principles for a financial are met, the CAE can feel comfortable that an audit of the
reporting audit, regulations or policies for a compliance internal audit activity has been completed.
audit, or leading practices for a controls-focused or
operational audit. Dont Be Left Standing
Gathering evidence to support judgments and conclu- It should be clear that if an organizations internal audit activ-
sions as to how effectively the area being audited is achiev- ity is truly valued and plays an important governance role, it
ing those audit objectives and the associated criteria. meets the criteria for being an auditable entity that should be
Reporting on the results of the audit. included in an audit universe. Once internal audit is part of
The means to audit an internal audit activity is through a the audit universe, a risk-based approach should be applied to
quality assurance review. The interpretation to Standard determine how often it should be audited, although to comply
with the Standards, the audit should be
performed at least once every five years.
The CAE should provide an action plan The steps to perform such an
audit are well-documented in the qual-
to close gaps in performance. ity assurance review approach, which
aligns with internal audits assurance
service approach. Finally, the quality
1300: Quality Assurance and Improvement Program states, assurance report should be sent to key stakeholders, just like
A quality assurance and improvement program is designed any other audit report is. If there are gaps in performance,
to enable an evaluation of the internal audit activitys con- the CAE should provide an action plan to close those gaps to
formance with the Standards and an evaluation of whether internal audits key stakeholder, the audit committee.
internal auditors apply the Code of Ethics. The program This all seems logical and rooted in the Standards, yet
also assesses the efficiency and effectiveness of the internal only 42 percent of respondents to the 2015 Global Internal
audit activity and identifies opportunities for improvement. Audit Common Body of Knowledge Practitioner Survey
That interpretation provides the outline for conducting an indicate they conform with the 1300 series of the Standards
assurance review of the internal audit activity. The objectives related to a quality assurance and improvement program. Its
of a quality assurance review are to: up to all internal auditors to make sure that if theyre ever
Evaluate the internal audit activitys conformance with asked to stand up in a crowd if they think internal auditing is
the Standards. important, and then sit down if their internal audit activity is
Evaluate whether auditors apply the Code of Ethics. audited, they arent one of those who remain standing.
Assess the efficiency and effectiveness of the internal
audit activity. Paul Sobel, CIA, QIAL, CRMA, is vice president and CAE for
Identify opportunities for improvement. Georgia-Pacific LLC in Atlanta.

october 2016 Internal Auditor 23


Many Fortune 500 companies count on
The IIAs On-site Training to develop their
teams skills. Join them today!

Youre only as
good as your team.

You know you have a great internal audit team. Are they perfect? No. But they are there for you
day in, day out. When challenges arise, they have your back.

And now is your opportunity to have theirs. Thank them for their hard work and show them that
you are as committed to their professional development as they are. Because lets face it
when your team shines, you shine.

Are you ready to shine?

Contact us today and let us help develop your plan to enhance your teams performance through
in-house training. Our consultants will work with you to understand your business, your people,
and the learning outcomes you want to achieve.

+1-407-937-1388 GetTraining@theiia.org www.theiia.org/onsite


2016-0532

2016-0532 MKT-OST Update-June IA Ad.indd 1 4/19/16 11:02 AM


Fraud Findings
By Bryant Richards

Blurred Lines
Internal auditors
need to have the
skills and perspective

P
to deal with frauds
that dont match the eter Singer, the head The invoices were with their spouses. They
of a marketing being paid increasingly were so close that, when
standard villain story.
department at an late beginning several years Singers wife lost her job
event company, was earlier, when the budget for two years earlier, the vendor
retiring but agreed to stay this marketing service was representative offered her a
on for six months to transi- reduced by US$400,000. position at his firm.
tion the new department This was due to the belief As seemingly fraudulent
head. On day two of the that the vendors services events like this are investi-
transition, the incoming were less useful as the gated, internal auditors are
department head called the product became more estab- often quick to look for the
CAE and left a voicemail lished in the marketplace. motivations and benefits to
message saying something If the invoices had been the perpetrators. Although
odd was going on and urged paid timely, Singer would the situation unraveled with
him to take a look. have been over budget. The a lot of juicy, and often irrel-
During the investiga- invoices were never sent to evant, tidbits of information
tion, the CAE found that accounts payable, as Singer along the way, management
Singer purchased marketing asked the vendor to send the wanted internal audit to
services from a vendor to invoices directly to him. In focus on one question: Why
support revenue targets for addition, Singer never dis- did Singer do it?
a specific product. Although closed these commitments After hundreds of
that seemed reasonable, during the monthly finan- hours of research and sev-
the audit also revealed cial close process. eral hours of interviews,
that Singer was holding Singer sent emails internal audit was left with
US$500,000 in late invoices requesting that the vendor a troubling assessment of
from the vendor, a sig- reduce the amounts of the Singers behavior. He had
nificant amount to the com- invoices so that he could committed fraud. He lied to
pany. Some invoices were avoid additional approvals. the company about spend-
overdue by 18 months, well The vendor complied by ing money with the vendor
past the typical 45-day aver- splitting invoices. Singer also by making it appear that he
age pay cycle. The vendor developed a close personal was on budget, evidenced
representative sent numer- friendship with the vendor by the outstanding invoices.
ous emails to Singer com- representativethey would He was aware of these out-
plaining about the invoices. often go on trips together standing invoices, as they

Send Fraud Findings article ideas to Bryant Richards at bryant_richards@yahoo.com

october 2016 Internal Auditor 25


Practices/Fraud Findings

were piled up on his desk. He worked hard to circumvent invoices sent directly to accounts payable to avoid future
internal controls for authorizing and recording the invoices, errors. However, management paid the outstanding invoices
and the vendor representative conspired with him to cir- without confronting the vendor about its part in knowingly
cumvent company authorization limits. Because of this evading internal controls.
activity, the company had a US$500,000 debt for services it The absence of a clear-cut villain stealing from the
did not authorize, value, or want. company left management wondering what the concern
was about. As a result, management
sent a muddled message about what is
Internal auditors are often quick to look acceptable and missed an opportunity
to strengthen the companys defenses
for the motivations and benefits. against future fraud.
Fraud investigations are often the
most intriguing part of an internal
In the end, there was no direct and convincing way auditors job. You have villains, who break rules and selfishly
to prove that Singer received any benefit from the vendor. benefit to the detriment of the organization. Until someone
In the eyes of management, this made the behavior much catches on, that is.
less grievous and not quite fraud. Internal audit was able However, the reality is not always so clear cut. In
to convince management that Singer intentionally circum- fact, it could be argued that the villain situation is rare. In
vented internal controls to conceal the budget overrun, so many cases, a confused individual takes a few small steps
he was asked to leave a few months earlier than planned. across the line of good judgment and winds up entangled
Consequently, management changed the policy to have all in rationalizations and good intentions. As things progress,

ACHIEVE EXCELLENCE
ON THE CIA EXAM

With expert design, mobile study tools, and a variety


of study options, The IIAs CIA Learning System is the
only program you will need to excel on the Certified NEW!

Internal Auditor exam.

The IIAs CIA Learning System worked very well for me, To learn more and see how Bill Flahr
helping me achieve the third highest score on the CIA exam achieved CIA exam excellence, visit
in 2015. The keys to my success were establishing and
sticking to a realistic study schedule, and using the written
LearnCIA.com/excel.
materials, online quizzes and practice exams.

Bill Flahr, CPA, CA, CIA
Kurt Riedener Bronze Medalist 2015

2016_IIA_halfpage_ad_oct.indd 1 8/19/16 9:55 AM

26 INTERNAL AUDITOR OCTOBER 2016


Practices/Fraud Findings
To comment on this article,
email the author at bryant.richards@theiia.org

this person hears the chirping of his or her conscience fraudulent activity is often addressed by management
that something isnt right, but the warning is distant and based on the biases and perspectives associated with
the words are muffled. In the end, the employee is baffled each unique instance.
as to how his or her actions were perceived so negatively. Internal audit should use these situations to improve
The individual knows he or she could have done things the organizations fraud perspective. Fraud is often
better, but cant believe the situation is being taken so seri- interpreted and managed differently across organiza-
ously. Termination? Fraud? The employee is shocked by tions based on corporate culture and understanding
the possibility, and many times will utter the words, But of internal control. Although frustrating for those
I didnt steal. involved, managements lukewarm support may be
It is always difficult to see ordinary people fumble into the most valuable observation from this scenario. It is
bad situations. And organizations are not always prepared an indication that there is significant work to be done
to handle these situations, which leads them down a messy to improve internal control awareness at the top of
road of uncomfortable conversations, half measures, and the organization.
lackluster support. Internal audit has the expertise, perspective, skills, and
independence to lead in these situations. Expecting oth-
Lessons Learned ers to share a clear vision of murky fraud cases is not
Organizations need to establish a clear perspective always realistic.
on how they want to approach fraud and its many
faces. A strong fraud policy describes what the com- Bryant Richards, CIA, CRMA, CMA, is an associate
pany perceives as fraud and lays out the expectations professor of accounting and finance at Nichols College in
for investigation and resolution. Without a policy, Dudley, Mass.

NAVIGATING THE
AVENUES OF CYBER RISK
CYBER SECURITY DATA ANALYTICS
DATA PRIVACY AUDIT AND ADVISORY

sunera.com | 813.402.1208 | info@sunera.com

october 2016 Internal Auditor 27


integrated reporting

Taking
the
Lead
on Nonfinancial
Reporting

B
Internal audit is
well-positioned
to examine how
its organization
reports on
nonfinancial
issues.
y December, governments across Europe
will need to have translated the European Unions (EUs) 2014
Directive on nonfinancial reporting into their national rule
books. Formulated in response to the perceived short-termism
that contributed to the global economic and financial crisis in
2007, the rules mandate that Europes top 6,000 companies
Arthur Piper disclose in their annual report and accounts how they are dis-
Illustration by Sean Yates charging their social, environmental, and ethical duties.

28 Internal Auditor October 2016


october 2016
taking the lead on nonfinancial reporting

Disclosure of nonfinancial infor- movement to provide more compre- with management on how you organize
mation is vital for managing change hensive reporting on matters that do the whole governance process around
towards a sustainable global economy not fall under the financial reporting nonfinancial reporting, the roles and
by combining long-term profitability remit has gathered steam under a responsibilities needed, what kind of
with social justice and environmental range of titlessuch as integrated tools to deploy, and how you train your
protection, the 2014 Directive says. reporting, corporate social respon- people in the organization.
In this context, disclosure of nonfinan- sibility reporting, and sustainability In the beverage industry, one big
cial information helps the measuring, reportingbut thus far there is no challenge is how to reduce water usage.
monitoring, and managing of under- agreed-upon approach or methodol- To be able to develop a good strat-
takings performance and their impact ogy to capture these disparate topics egy and to set clear objectives for the
on society. under a single reporting framework coming three to four years, you have
Who benefits most from this or set of standards. to know where you are at this point
additional reporting burden? Nicolas in time, he says. You need accurate
Bernier-Abadwho is in charge of A More Serious Document data. You need good nonfinancial
seeing the rules come to fruition at European internal auditors who have reporting systems.
the European Commissions Direc- been involved in developing nonfinan- While the EU Directive is making
torate General of Financial Stability, cial reporting mechanisms tend to agree nonfinancial reporting the norm for
Financial Services, and Capital with Bernier-Abads assessment. While European companies like Carlsberg,
there has been less pressure in the U.S.
to go down this route, not least because
The Directive will be the biggest the Sarbanes-Oxley Act of 2002 focused
many businesses and their internal
compulsory reporting project of its kind. auditors on providing assurance primar-
ily around financial controls. But that
does not mean U.S. auditors are not
Markets Uniontold internal audi- the reports do give investors, environ- engaged in such projects.
tors at a recent event organized by the mental pressure groups, and others a Outside of the many U.S.-based
European Confederation of Institutes larger and more detailed window into multinational companies that are talk-
of Internal Auditing in Brussels that the business operations, management ing about this, the terminology really
nonfinancial reporting was pro- also wins. hasnt caught on here yet, says Jim
business. The aim is not to create a In general, if you look at the Pelletier, IIA vice president, Professional
new report, but to add content to the development of sustainability reports Solutions. Auditors who are taking a
existing management report regard- in companies, there is a move away risk-based approach and are looking
ing environmental and social obliga- from producing a marketing document at the major objectives of the orga-
tions, action to counter corruption and toward producing a much more nization are likely to be hitting these
and bribery, and in respect of human serious document where the company areastheyre just not calling it the
rights, he said. He added that for discloses how they perform in cer- same thing.
executives and boards to understand tain areas, says Mark Jongejan, vice Pelletier says the focus on non-
what is going on in their own organi- president, Group Internal Audit at the financial reporting also marks a turn
zations, these issues had to be spoken Danish brewer Carlsberg. away from providing assurance on the
about in the same way as one would Internal audit not only assesses traditional, historical performance
talk about profit and loss. the accuracy of the specific key per- of the company, to a view that looks
While an estimated 2,000 com- formance indicators to be disclosed ahead at the potential big risks that
panies in Europe already produce in the report but has helped build an could impact the organization. Given
and use such information, the new awareness within the company about the range and variety of risks that
Directive will set in motion the big- the relevance of this type of reporting. pose a threat today, it makes sense
gest compulsory reporting project of To be able to develop good strategies, that many of those are nonfinancial
its kind. It is likely to help standard- you need reliable data, he says. The in nature. In that sense, nonfinancial
ize what has been a growing trend internal audits we performed in this reporting is an acknowledgement that
globally during the past 10 years. The area have enabled us to have discussions risk-based auditing has a crucial role

30 Internal Auditor october 2016


TO COMMENT on this article,
EMAIL the author at arthur.piper@theiia.org

to play in the long-term success of Internal audit is positioned to


each organization. achieve this objective what he calls
integrated thinking because it can
INTEGRATED THINKING take a helicopter view of the entire orga-
Silvio de Girolamo, group chief inter- nization that could help it move from
nal audit and corporate social respon- dealing with its social reporting in an ad
sibility officer at the food and beverage hoc manner to something more holistic.
group Autogrill in Milan, Italy, is a But he also admits that not all CAEs
contributor to the 2015 IIA report, will be in a position to jump to this
Beyond the NumbersInternal Audits higher level of operation immediately.
Role in Nonfinancial Reporting. He Internal audits role depends


says in many organizations his own very much on the maturity level of the
included nonfinancial reporting has company in nonfinancial reporting,
proved its worth to management in he says. Internal auditors can per- The company
specific areas and has grown in stature form an advisory role or an assurance has to put
from this success. role or something in the middle. in place a
His experience at Autogrill mir- That can entail supporting manage- methodological
rors that of Jongejans at Carlsberg. ment in understanding which kinds of approach to
When you begin to measure what is reporting systems are going to be most
happening in these areas, you can start effective, helping it improve those
manage these
to manage those processes that you did systems, or providing assurance when areas, not just
not manage in the past and improve they are well-established. as a collection
on them, de Girolamo says. But there of individual
is an opportunity for internal audit to RISE TO THE problems, but


play a defining role in how nonfinancial COMPETENCY CHALLENGE
as something
reporting is to be developed because The role is not without its challenges.
of the lack of prescription on how it Auditors who The most important of these is filling
more
should be implemented. are taking a the competency gaps within internal integrated
Internal auditors can play a risk-based audit, itself, according to Mentes and intercon-
defining role by becoming change approach and Albayrak, audit coordinator at the nected.
agents within their businesses, he are looking Turkish conglomerate Anadolu Group
Silvio de Girolamo
says. He accepts the move into these and IIATurkey vice chairman.
areas is a challenge for internal audi-
at the major He says auditors have two kinds of
tors, given their traditional focus on objectives competency: process and content com-
financial controls, but is confident of the petencies. Internal auditors have the
that the profession can help promote organization right process competencies for effective
integrated thinking in the businesses are likely to be nonfinancial reporting, such as the abil-
they serve. hitting these ity to communicate with stakeholders,
We need to argue that the extensive knowledge of how to perform
company has to put in place a meth-
areas. an assurance engagement, and knowing
odological approach to manage these Jim Pelletier the International Standards for the Pro-
areas, not just as a collection of indi- fessional Practice of Internal Auditing,
vidual problems, but as something he says.
more integrated and interconnected, But there are differences in the
de Girolamo says. That involves a rec- way internal auditors need to apply
ognition of the importance of the orga- these competencies when it comes
nizations social role and impact, and a to nonfinancial data. While auditors
proactive way of seeking out effective have the information and knowledge
solutions that are good for both the about how to decide on materiality
company and its stakeholders. when it comes to financial controls,

OCTOBER 2016 INTERNAL AUDITOR 31


TAKING THE LEAD ON NONFINANCIAL REPORTING

for example, the issue of materiality audits could not pick up on how
for nonfinancial controls also entails changes to its working practices were
reaching out to stakeholders. impacting the business.
Internal auditors need to under- Developing good listening skills
stand what information is relevant to and creating an atmosphere with the
the business key stakeholders, and right level of intimacy and trust was key.
understand what is significant to them If there is not enough trust, it is diffi-
and how much it matters, Albayrak cult to get people to share their opinions
says. Unlike deciding materiality on and feelings, she says. Communicating


financial controls, this involves exercis- the audit findings with those involved
ing a much greater degree of profes- also needed to be handled with sensitiv-
sional judgment. ity because people need to feel they have The most
Decisions on materiality over been listened to and their concerns have
nonfinancial reporting issues should be been taken seriously.
important
systematic, transparent, and account- She says the audits have given thing is
able. That means when management managers a much clearer picture of that we are
or stakeholders ask about your methods how their work fits into and impacts now having
or systems of determining materiality, the wider ministry. It also has helped conversations
you have a system in place and can give the audit team provide advice on how in the
a comprehensive answer to that ques- processes can be improved and how
tion, he says. things can be done better. The most
organization
That requires a more outward- important thing is that we are now hav- that are very
good and are


looking approach one that entails ing conversations in the organization
internal auditors reaching out to their that are very good and are leading to leading to real
stakeholders and engaging in commu- [Internal real change, she says. change.
nication. For auditors who have been auditors] While communication is key,
focused largely on financial controls, need to Albayrak says, the biggest challenge in Tea Enting-Beijering
that could be a big shift in emphasis. filling internal audits competency gap
Nonfinancial reporting requires audi-
establish the is in what he calls content competency.
tors to understand the finer points of information In nonfinancial reporting, youll have
communication. When it comes to on which environmental issues, ethical issues, non-
working on issues such as culture, audi- to provide economic issues, and sometimes macro-
tors are asking people to share their assurance, but economic issues that form the content of
opinions and feelings rather than we cant have the report you are working on, he says.
merely collating facts and figures, says It isnt possible for an internal auditor
Tea Enting-Beijering, one of several
competency to know everything. We need to estab-
CAEs within the Netherlands Central on the content lish the information on which to provide
Governmental Audit Services director- of all areas. assurance, but we cant have competency
ate within the Ministry of Finance. on the content of all areas.
Mentes Albayrak
When we started our nonfi- Albayraks solution is similar to
nancial auditing project, we selected de Girolamos: Provide integrated
auditors who already had strong com- assurance, or combined assurance, by
munication skills, and we invested in creating a multidisciplinary team of
more education for them, says Enting- experts from across the organization
Beijering, who is CAE for the Ministry and beyond. If no party has the full
of Infrastructure and Environment. She spectrum of competencies required
selected a handful of people out of the to provide assurance on nonfinancial
600 auditors on the team. Her objec- reporting, then the various parties
tive was to look at the organizations involved in this assurance process
culture because the standard financial should be coordinated effectively.

32 INTERNAL AUDITOR OCTOBER 2016


32% of CBOK respondents organizations have combined assurance activities, notes the
Internal Audit Foundations Combined Assurance: One Language, One Voice, One View report.

Internal auditors are best posi- Sarbanes-Oxley Act of 2002, covering information with a higher level of accu-
tioned to provide that coordination, internal control over external financial racy and integrity, and try to eliminate
he says. We have the process compe- reporting. But all forms of reporting the manual production of this informa-
tencies, we have the general outline of are a specific control objective area in tion, he advises.
what content competencies are needed, the COSO framework, Hirth says,
and we have a general knowledge from and that reporting is defined as being Conquer the Big Stuff
the work in our own organizations internal, external, financial, and nonfi- There are likely to be a few sticking
about what environmental, human nancial reporting. points to audit involvement in nonfi-
resources, social, and ethical issues the The aim is to create a consistent nancial reporting, particularly defen-
business faces. approach and common language for siveness among those people preparing
That gives internal audit the ability evaluating all forms of internal control the reports, as they may never have had
to form an effective, multidisciplinary and all forms of reporting, he says. That their work challenged or audited in the
team, coordinate that team, and get requires CAEs who are implementing past. Deal with this professionally, but
the input needed from management, nonfinancial reporting to start at the dont back down if the information is
or external consultants, to ensure all of
the relevant technical content goes into
the process. A 2015 paper, Combined
Assurance: One Language, One Voice,
People preparing nonfinancial reports
One View, written by Sam Huibers and
published by the Internal Audit Foun-
may never have had their work audited.
dations Global Internal Audit Common
Body of Knowledge (CBOK) research top. Get management and, as needed, truly important, Hirth says. In addi-
project, outlines how this approach board and audit committee buy-in and tion, there may be a lack of controls
can bring disparate parties together to agreement that validating this nonfinan- related to the reporting involved, and
provide a single statement on assurance cial reporting is valuable, desired, and internal audits main role in that case is
that unites their perspectives. But while makes sense against other priorities and to identify the important gaps. Theres
two out of three European organiza- resource constraintssome companies a danger of doing work on informa-
tions taking part in the 2015 CBOK have a lot of resources, others have very tion that doesnt really matter, he says.
practitioner survey said they were aware little, he advises. Dont chase the little stuff. Chase and
of this approach, just over half (53 per- Next, identify the most critical, conquer the big stuff.
cent) of North American respondents important nonfinancial reporting that The need to boost their skills,
said they werebelow the 59 percent should be validated and audited. This competencies, and even head count in
global average. means that there will likely end up this area is a huge challenge ahead for
being lots of nonfinancial reporting the profession. In addition to creating
Create a Consistent Approach that doesnt make the cutat least for audit departments that are more risk-
The headline figures emerging from now, Hirth says. Determine which based, forward-looking, and willing to
the CBOK study may be more a mat- internal and external information falls reach out to stakeholders, they also will
ter of semantics. Just as some U.S. into scope. For example, internal have to work more collaboratively than
internal auditors are engaging in many reporting on diversity or employee eval- ever to succeed.
of the areas that in Europe go under uations may be important and external Worried? De Girolamo isnt. He
the heading of nonfinancial reporting, reporting on sustainability or corporate thinks nonfinancial reporting will be
so does The Committee of Sponsor- social responsibility may also be just as the next catalyst to grow both the stat-
ing Organizations of the Treadway important. CAEs need to include all of ure and size of the internal audit profes-
Commissions (COSOs) 2013 Internal those critical areas in their plan. sion. Its a big challenge for sure, but
ControlIntegrated Framework provide Finally, he says, internal audit one internal audit is more than ready to
support for those working in this needs to involve and engage the first meet, he says.
area, says COSO Chairman Robert line of defense processes and people
Hirth. Every U.S. stock exchange- who produce the reporting informa- Arthur Piper is a U.K.-based writer who
listed company uses the framework tion. Also, look at how you can lever- specializes in corporate governance, inter-
to comply with Section 404 of the age information systems to generate the nal audit, risk management, and technology.

october 2016 Internal Auditor 33


I N T E R N A L AU D I TO R

BE THE
FUTURE
Win a US$1,000 Scholarship

Internal Auditor magazine wants to help with your education.


We are offering six US$1,000 scholarships throughout the year to undergraduate and
graduate students around the world. Download the scholarship application and apply
today at www.InternalAuditor.org/Scholarships

2016-0443

2016-0443 MKT-Scholarship-June Full Page IA Ad-FNL.indd 1 4/19/16 10:48 AM


internal control
Copyright boeing

Audit
processes
take flight
The updated COSO
T he Committee of Sponsor-
ing Organizations of the
Treadway Commissions
(COSOs) revised Internal
ControlIntegrated Frame-
work offers internal audit
departments an opportunity to take a
fresh look at their processes for evaluat-
ing internal control. For the internal
audit function at The Boeing Co., the
release of the 2013 update has been the
catalyst for adding more discipline and
Internal ControlIntegrated structure to its work.
The updated frameworks most
Framework is at the heart of significant new development is that
Boeings internal audit work. it codifies 17 guiding principles that
articulate the concepts underlying the
five control components described in
the original version: control environ-
ment, risk assessment, control activi-
Tim Boyle ties, information and communication,
Dennis Applegate and monitoring activities. Moreover, it
adds 77 explicit points of focus spread

october 2016 Internal Auditor 35


audit processes take flight

across those principles to assist users components, but they adapted them design assessment phase and what
in understanding the structure of a to Boeings environment (see COSO was tested in the operational assess-
well-designed and effective internal Evaluation Considerations for Audi- ment phase, including the conclusions
control system. The framework now tors on page 38). This guidance has reached for each component. It also
also requires organizations to use the driven a consistent implementation mirrors certain aspects of the tradi-
principles to assess the effectiveness of the 2013 framework, making it tional risk and control matrix that
of internal control, although it allows relevant and value-added to both audi- should be familiar to most internal
management to determine the suitabil- tors and clients, alike. Moreover, the auditors. This extended risk control
ity of the points of focus. criteria have compelled audit testing matrix (E-RCM) is a required audit
COSOs revised internal control of all COSO control components for workpaper for each process objective
framework became its authoritative sufficiency, not just control activities. in Boeings internal audit protocol
framework at the end of 2014. By Auditors tend to focus the bulk of their and provides audit management a
2015, Boeing Corporate Audit had control testing on the COSO control point of departure in due diligence
updated its audit process, ensuring activities component because it is the reviews of the audit work performed,
that its internal auditors consistently component traditionally containing a quality assurance step designed
tested each control component and the preponderance of controls at the to comply with IIA Standard 1311:
exercised sound judgment in deter- process-level. However, giving audit Internal Assessments.
mining whether all five components attention to all COSO components In the preliminary survey phase
were present and functioning, and provides a more comprehensive evalu- of the audit, the E-RCM serves two
operating together, as articulated in the ation of significant risk, better serving key purposes. First, it shows the align-
2013 framework. client management. ment of process controls to the related
Because the 2013 framework COSO control component. Second, it
Principles-based Approach cautions that the use of principles or allows the internal auditor to document
Boeing develops and executes a risk- points of focus are not meant to imply potential control gaps and to indicate
based audit plan aligned with key busi- a checklist, Boeings Corporate Audit whether the alignment of controls pro-
ness objectives. As a manufacturer of staff is trained and empowered to vides sufficient risk coverage.
commercial and defense aerospace prod- exercise judgment in determining the In the fieldwork phase, auditors
ucts, its audit plan primarily focuses nature and extent to which the criteria document the testing of the defined
on operational objectives such as the are applied. Yet they must take care controls for design and operating
development of new airplane designs, to keep the focus always on inherent effectiveness in separate columns of the
management of suppliersinclud- risk. The guidance on COSO princi- E-RCM. Such documentation provides
ing procurement of major parts and ples and points of focus, coupled with support for the auditors opinion on
assemblies such as engines and landing the endorsed audit evidence, form the discrete controls and how those
gearand the production and testing the criteria that assist the companys controls may or may not support the
of commercial and military aircraft. internal auditors in assessing whether components as being present, function-
Such audits are generally not focused at the components of internal control ing, and operating together.
the entity level, but rather on processes are present, functioning, and operat- Moreover, every audit requires a
at the division, plant, product line, or ing jointly. detailed process flowchart. Confirmed
functional level. For that reason, assess- with client management, the flowchart
ing all 17 principles on every audit Audit Documentation details the movement of activities and
would not add value for most audit cli- To back the new COSO-based documents through the process, and
ents. Instead, Boeings internal auditors approach, Boeing Corporate Audit identifies key control points requiring
apply a subset of the COSO principles developed a condensed and integrated audit examination. Many audit profes-
tailored to ensure that audit adds value audit template for documenting all sionals use process flowcharts to define
on all engagements. relevant facts and data used to evalu- and document their understanding of
Audit management and staff ate each COSO control component. the audit subject. The same purpose is
brainstormed and documented the It includes the guidance from the served in Boeings COSO-based audit
new COSO-based audit criteria using COSO Evaluation Considerations process, though the process flowchart
the principles and points of focus and requires auditors to document has taken on an extra dimension as the
supporting the five COSO control what was evaluated in the control initial basis for the E-RCM.

36 Internal Auditor october 2016


96% of companies reviewed in fiscal year 2015 have adopted the 2013 COSO
Internal ControlIntegrated Framework, according to an analysis by Audit Analytics and Protiviti.

The key elements of the revised Operating effectiveness testing.


audit process, as reflected in the Documents the results of audit
E-RCM, are: tests of control operation,
Process objective. Derived from emphasizing the use of audit
relevant company policies and sampling techniques to deter-
procedures, industry standards, mine whether the controls are
or other business goals and con- functioning as designed.
firmed with client management Conclusion. Summarizes the
before an audit begins. auditors determination of
COSO components. Each dis- whether each of the five com-
crete control to be assessed as ponents is present, functioning,
part of the audit is grouped
with the component to which
it is most closely aligned. The
results of the control assessment
The updated audit process provided an
are then used to support the
evaluation if that component is
opportunity for increased discipline in
present and functioning in sup-
port of the process objective. If
defining processes, risks, and controls.
no specific controls are associ-
ated with a component, then and operating together as a unit
the component is still evaluated to provide reasonable assurance
through inquiry, observation, of achieving process objectives.
and inspection, as needed.
Inherent risk. Documents nega- Three Key Elements
tive events and their effects on Although the elements of business pro-
achieving the predetermined cesses, risks, and controls have been a
process objective in the absence focus of Boeings internal audit work for
of management controls. many years, the updated audit process
Controls. Describe the attri- provided an opportunity for increased
butes of each risk-mitigating discipline in the definition and align-
control, including who is ment of these three key elements.
responsible for the control, how
and when control execution is Process Objectives In Boeings
accomplished, what is involved revised audit process, auditors issue
in executing the control, and an opinion to client management on
why it is important. whether the COSO control compo-
Control design assessment. Doc- nents are present, functioning, and
uments how each control was operating together in support of the
assessed for design effective- stated process objective, pursuant to the
ness, the results of that testing, 2013 framework. Typically, a process
which of the various controls objective will fall entirely within opera-
are key, and whether those con- tions, reporting, or compliancethe
trols are present to achieve the basic objective categories defined by
objective. This control testing, COSObut occasionally it may cover
along with the process-level more than one COSO objective.
evaluation, supports the overall The E-RCM documentation sup-
opinion on whether the COSO ports each assessment by component
components are present and and provides a clear line of sight from
working together. continued on page 40

october 2016 Internal Auditor 37


To comment on this article,
audit processes take flight email the authors at tim.boyle@theiia.org

COSO Evaluation Considerations for Auditors


Control Environment stakeholders represented and is the frequency ade-

1 Are the responsibilities, accountabilities, and authori-


ties (RAA) established and communicated effectively
quate to help with risk mitigation?

through policies, procedures, or other methods to sup-


port process and control objectives?
Are control performers responsibilities aligned with
2 Are process objectives defined specifically enough to
support identification of inherent risk events?

authority or accountability? Potential Audit Evidence to Support Conclusions


Are organizational responsibilities identified (e.g., Inspect process objective definitions to evaluate
charter and structure) and people assigned to whether objectives are stated specifically enough
achieve the process objectives and key deliverables? to support risk identification (this may not be docu-
Is there segregation of duties to mitigate misrepre- mented, so use inquiry as needed).

3
sentation or misstatement of operations (fraud risk)?
Are inherent risk events identified and assessed?
Potential Audit Evidence to Support Conclusions Are internal or external business changes (e.g.,
Inspect organizational charts/charters and confirm regulatory, funding, market, business growth or
that current job responsibilities are aligned with rel- reduction, and system changes) considered within
evant process objectives. the risk assessment?
Is the risk assessment occurring frequently enough to

2 Do control performers have sufficient competencies


to execute controls?
Do they understand the risk and objective of

capture these changes?
Have key stakeholders been identified and are they
involved in the risk assessment?
the control? Are nonconformances or negative trends captured and
Does the control performer have the experience/ evaluated for inclusion in the risk assessment?
training necessary to execute the control? Are potential fraud risks (financial or nonfinancial) identi-
fied and evaluated (e.g., a nonfinancial fraud risk such
Potential Audit Evidence to Support Conclusions as metrics that are intentionally misrepresented to hide
Evaluate results of control testing (as applicable) poor performance or risk (reported as yellow; when they
where competence is an attribute. are red))?
Are risk tolerances established, (e.g., a 2 percent error

3 Are management actions and priorities consistent


with stated objectives, RAA, and Boeing values?
rate for manufacturing defects).

Potential Audit Evidence to Support Conclusions


Potential Audit Evidence to Support Conclusions Inspect identified risks for completeness of events (this
Evaluate whether management actions align with may not be documented, so use inquiry as needed).
supporting process objectives (i.e., demonstrated Inspect metrics for negative trends and inclusion in risk
allocation of resources, priorities are managed to assessment for systemic issues.
stated objectives, and corrective actions are taken).

Risk Assessment 4 Has management determined appropriate risk


response (i.e., accept, avoid, reduce, or share)? (See

1 Is a risk assessment occurring on a regular basis for


the process? It could be formal or informal, but it
should be happening in some form by management.
Control Activities.)

Potential Audit Evidence to Support Conclusions


Inspect control implementation as documented in poli-
Potential Audit Evidence to Support Conclusions cies and procedures, business process instructions, desk
Attend meetings to observe where risks are identi- instructions, or other methods to evaluate whether iden-
fied, monitored, and actions are taken. Are tified risks are adequately responded to with controls.

38 Internal Auditor october 2016


COSO-based internal control systems can meet the challenges of an ever-changing business
and regulatory environment, notes Adding Value With COSO from the Internal Audit Foundation.

Control Activities Is documentation sufficient to match the level of

1 Are the controls designed and operating effectively to


achieve their objectives, to mitigate the risks, and sup-
port the process objective?
risk and complexity of control?
Is there data identified to support monitoring of
control performance?
Control testing of attributes using statistically rel- Are there open channels of communication both
evant samples will be the primary way to evaluate top-down and bottom-up?
control activities.
Potential Audit Evidence to Support Conclusions
Potential Audit Evidence to Support Conclusions Inspect information and communication of other
Control test results will be the most influential data relevant information (i.e., business/process objec-
for conclusion. tive statements, command media, change noti-
fications, and metrics) and assess whether it is

2 Based on the evaluation of risk events inherent to the


process, have corresponding controls been identified?
(See Risk Assessment.)
disseminated to relevant stakeholders (i.e., control
performers, process owners, and management/
customers/suppliers). (See Control Environment.)
Are there enough controls developed and implemented Inspect process documentation to evaluate
to mitigate the risks in the process (i.e., preventive, adequacy to support consistent execution by
detective, manual, general computing controls, and IT the control performers. (See Control Activities.)
dependent as needed)? Inspect controls for associated information
used to monitor and evaluate whether there is
Potential Audit Evidence to Support Conclusions sufficient and reliable information and commu-
Inspect process guidance where controls are defined, nication to identify failures timely.
such as relevant command media, desktop proce-
dures, manuals, and monitoring. Do they align with Monitoring Activities
identified risks?
1 Does effective monitoring of the internal controls of
the process exist?

3 Are controls defined, documented, and communicated


(e.g., command media, desktop procedures, manuals,
and training)? (See Information & Communication.)
Are metrics in alignment with objectives, risk tol-
erance levels, and controls?
Are out-of-tolerance conditions consistently iden-
tified (i.e., red and yellow criteria; or methods of
Potential Audit Evidence to Support Conclusions effectiveness identified)?
Inspect control documentation and communication Are corrective/preventive actions identified,
to control performers for sufficiency. Factors to con- approved, and tracked to completion?
sider for level of documentation include complexity of
controls, significance of risks, number of control per- Potential Audit Evidence to Support Conclusions
formers, and turnover expected. Lack of documenta- Inspect metrics in use to evaluate whether they
tion may or may not be a deficiency. are aligned to the key objectives and risks, and
that there are clear criteria for identifying unac-
Information & Communication ceptable conditions.

1 For affected stakeholders, is information identified,


validated, documented, communicated, and reviewed to
achieve process objectives such that control performers 2 Are metrics validated and communicated to relevant
stakeholders? (See Information & Communication.)
can execute consistently (i.e., process steps, process RAA,
control RAA, control definitions and objectives, changes to Potential Audit Evidence to Support Conclusions
relevant policies, procedures, risks, and new initiatives)? Inquire and inspect how metrics are validated and
(See Monitoring Activities.) communicated to stakeholders.

october 2016 Internal Auditor 39


VISIT InternalAuditor.org to view the extended risk
control matrix, risk definitions, and control model
audit processes take flight used by Boeings Corporate Audit department.

continued from page 37 assessment procedure. Despite their The internal control compo-
subjectivity, these risk concepts become nents were determined to not
the process objective through the risks, meaningful to the audit client when be present.
controls, tests performed, and data used modeled into a heat map. Each deficiency is documented in a
for the final assessment. The structured finding that then requires a corrective
nature of the revised audit process also The Control Model To ensure con- action by management. The rationale
helps ensure that the auditor judgment sistency in ascribing a particular for any adverse opinion and the impact
exercised in rendering an opinion about control to a given component, Boe- of significant process errors or omis-
the control components is informed ing Corporate Audit established a sions are detailed in the accompanying
by relevant audit facts and data. Con- control model based on the concepts audit report.
centrating an audit on process-specific contained in the 2013 COSO frame-
objectives improves auditor focus and work. The control model defines 28 Tangible Results
efficiency, enhances client understand- specific types of controls segmented Since adopting this model with an
ing, and helps guard against scope creep. by COSO components that may be emphasis on inherent risk, Boeings
More importantly, it avoids overstating present in each process, irrespective internal auditors have increasingly
the final audit opinion, limiting it to the of the process objective. Some of targeted control design improvements
scope of the process objective and what these control types may cover more for management attention, resulting
was actually tested. than one component. For example, in a 61 percent increase in the number
review performance metrics may of audit findings related to control
Assessment of Inherent Risk The address the control activities compo- design. Such findings tend to provide
2013 COSO framework contains a nent if the metrics pertain to man- more value to audit clients because they
more detailed conceptual analysis of agement supervision or address the improve the quality of the overall inter-
inherent risk, control risk, and risk monitoring component if the metrics nal control system rather than improve
tolerance than the prior version. In pertain to reviews of the internal the execution of specific controls within
response to this new COSO emphasis, control system. These criteria have a system that is poorly designed.
Boeing Corporate Audit has increased helped internal auditors identify rel- The documented process improve-
its focus on auditor understanding of evant controls and classify them by ments at Boeing support the proposi-
risk management concepts and the the control component prescribed in tion that COSO-based auditing yields
appropriate exercise of auditor judg- the model. This has resulted in more an effective audit result. Specifically,
ment when determining the nature consistent control definition and testing all five COSO control com-
and extent of inherent risk. In rolling COSO alignment. ponents and related principles using a
out the COSO-based audit process, consistent baseline of COSO criteria
Boeing further emphasized not only Auditor Opinions and control types provides a solid
the need to identify inherent risk in Once the audit and supporting foundation for determining the level of
all audits but to avoid conflating this E-RCM documentation have been assurance provided for the objectives
risk with control risk, a distinction completed and approved, Boeing Cor- being evaluated.
that the new COSO framework also porate Audit summarizes the evaluation Adopting a COSO-based approach
has addressed. of each control component and issues to internal auditing has aligned the
Boeing uses a COSO-inspired to the client an overall opinion about Boeing Corporate Audit process with
risk model in auditor training. The the health of the internal control sys- a key professional standard. While the
model contains abbreviated versions tem governing the process. Three kinds path to adoption is not easily navigated,
of the COSO definitions for inher- of opinions are possible: internal audit departments willing to
ent, control, and residual risks, and The internal control compo- make the journey will be rewarded by
a simple equation to show the cor- nents were determined to be more thorough audit coverage.
responding risk relationships to client present and functioning, even
management. Auditor understanding though some low-impact audit Tim Boyle, CIA, PE, is senior audit
of client managements risk tolerance findings may be present. manager at The Boeing Co. in Seattle.
also has assumed greater importance in The internal control compo- Dennis Applegate, CIA, CPA,
the new COSO framework, and that nents were determined to be CMA, CFE, is an adjunct professor at
requirement has been built into the risk present but not functioning. Seattle University.

40 Internal Auditor october 2016


Latest Guidance Released
From The IIA!
Free Downloads for IIA Members!

As part of The IIAs International Professional Practices Framework (IPPF), Implementation Guidance
assists internal auditors in applying the Standards and Supplemental Guidance provides detailed processes
and procedures for internal audit practitioners.

Implementation Guides
Implementation Guide 1010: Recognition of the Definition of Internal Auditing, the Code of Ethics,
and the Standards in the Internal Audit Charter
Implementation Guide 2500: Monitoring Progress
Implementation Guide 2600: Communicating the Acceptance of Risks
Implementation Guide: 1100 Series Independence and Objectivity

Supplemental Guidance Interested in becoming


Global Technology Audit Guide (GTAG) a Global Guidance
Contributor? Visit the
Auditing Smart Devices: An Internal Auditors Guide to Understanding
and Auditing Smart Devices website to learn more
Cybersecurity: A Practitioners Guide to Assessing Cybersecurity Risk about our Volunteer
Global Guidance
Contributor Program.
*Nonmembers may purchase IIA Standards and Guidance publications online through The IIA Bookstore.

Visit www.theiia.org/newguidance to
download new guidance from The IIA.

2016-1078

2016-1078 PROF-Guidance Oct Full Page Ad_6.indd 1 9/6/16 12:35 PM


Privacy in
the workplace
Organizations must find ways to accommodate
employees personal technology use while also
D
meeting regulatory and other requirements.
42 INTERNAL AUDITOR OCTOBER 2016
EMPLOYEE PRIVACY

D
igital technology has changed workplace behavior and
expectations for both employees and their employers.
The ubiquitous use of smartphones and other devices,
company issued and personal, places communications
and data management continually at users fingertips.
Internet use alters the traditional dimensions of employ- Parthiv Sheth
ees work flexibility requirements and need for expres- Khalid Wasti
sion, as well as employers need to monitor employees A. Michael Smith
online activity.
Employee concerns have been amplified by the ever- Illustration by Doug Ross
evolving technologies and data collection methods that
can seem personally intrusive. Any privacy expectations
employees may have are being curtailed by privacy poli-
cies, privacy pop-up screens during computer log-ins,
background checks, and other workplace measures. At the
Illustrationsame time, governments
by Doug Ross worldwide have issued regulatory
guidance to address privacy issues, but guidance often
falls short when it comes to balancing employers needs to

OCTOBER 2016 INTERNAL AUDITOR 43


privacy in the workplace

and privacy risksup from 25 per-


cent in 2015. Employees remain one
Evolving privacy expectations are of the most-cited sources of compro-
mise, with 34 percent of respondents
changing where employees, and their citing current employees as sources of
security incidents and 29 percent say-
employers, draw the line. ing former employees were sources.
Organizations have legitimate reasons
for wanting to keep tabs on employee
monitor and employees expectations data, but employees also want some
of privacy. Both noncompliance with measure of protection from prying
regulations and balancing privacy eyes. Evolving expectations on both
needs represent major concerns. sides are changing where employees,
Of respondents to Pricewater- and their employers, draw the line.
houseCooperss (PwCs) Global State Internal auditors tasked with examin-
of Information Security Survey 2016, ing privacy in the organization should
32 percent of security professionals say know where the risks lie, and what
their board members review security requirements their clients may face.

Global Privacy Laws and Regulations

O
rganizations need to care- considerations, new avenues for data- personally identifiable information
fully consider the privacy- subject complaint escalation, and (PII) as any information about a living
related legal requirements further limitations on government individual that could identify the indi-
that apply to areas in which they access to personal data. Employers vidual by name, date of birth, or other
do business. A subset of some must decide whether to participate in description contained in such informa-
of the main laws and regulations the new data transfer framework or tion. The act imposes data protection
affecting privacy worldwide may be use an alternative method to establish requirements on PII, including secur-
helpful for internal auditors looking adequacy. More importantly, the deci- ing prior consents from individuals
to assess the potential risks. sion about a data transfer method before exchanging or disclosing PII to
must be viewed in consideration of the third parties. The act was amended in
EUU.S. Privacy Shield was General Data Protection Regulationa September 2015 to require organiza-
approved in July 2016in the much larger compliance obligation for tions that employ Japanese citizens
form of a data transfer framework U.S. companies that profile or collect to comply with the cross-border
between the U.S. and EU member data from EU citizens. exchange requirements for PII before
statesto replace the defunct Safe September 2017.
Harbor agreement after intense U.S. Securities and Exchange Com-
negotiations between the U.S. missions Regulation Fair Disclosure Australian Privacy Act and Austra-
Department of Commerce and the requires its issuers to disclose mate- lian Privacy Principles affect public
European Commission. At first rial information to the general public and private entities in Australia as well
blush, the Privacy Shield seems to in a broad and nonexclusive manner. as overseas businesses that manage
resemble Safe Harbor, but closer Registrants, therefore, must safe- the employee personal information
inspection reveals that it introduces guard such information from inappro- of Australian citizens. The act and the
increased compliance complexities priate access and disclosure, in part principles specify requirements for
for U.S. businesses. The framework through monitoring activities. active maintenance and notification
includes stricter requirements for of privacy policy and for extending
enrolling and monitoring, addi- Japanese Act on the Protection liability, including the imposition of
tional third-party risk management of Personal Information defines fines, to overseas businesses in cases

44 Internal Auditor october 2016


Read Bashing the Boss Online on InternalAuditor.org to learn about privacy issues
surrounding employee use of social media.

Drivers of cost-effectively recruit, manage, and they believe those mechanisms make
Privacy Disruptions retain talent. Employees have a need them more productive.
Historically, employee monitoring has to be heard and to contribute, and As employees use these devices
been limited to checking internet and they use internal messaging boards with greater frequency, and as they
email usage. Today, digital disruption and social media sites to do that. Most become increasingly responsible for the
trends powered by mobile devices, organizations do not even realize how data they hold in their cloud accounts,
social media, analytics, big data, and much data is being collected and ana- trust becomes a more significant fac-
the Internet of Things have opened lyzedand exposing them to legal tor. For instance, whos responsible if
up a host of additional channels for and compliance risks. cloud data gets stolen or a device gets
employee activity. Plus, increased hacked? If disabling software is installed
competition has fueled mergers and Employee Expectations With the to protect the employer, what is that
acquisitions, as well as use of offshor- rise of a constantly mobile and fluid employers responsibility for any per-
ing models and reliance on third par- workforce and the consumerization sonal information that gets lost? If the
ties, resulting in constantly changing of technology, trust is essential in the company comes under investigation by
privacy expectations in the workplace. digital world. More and more employ- the authorities, would personal devices
Organizations are also starting to apply ees expect to use their own devices and and data have to be handed over?
data analytics to better match people applications at work, as well as cloud Employees might be more inclined
to jobs and to more efficiently and services theyre familiar with, because to use wearable technology such as a
smart watch if the information col-
lected were leveraged for managing
work hours or stress levels. They may
of breaches that result in the loss of confers regulatory authority over trade personal data for flexible working
an Australian citizens PII. any business that offers products hours, free health screening, and fitness
or services in the EU and over any incentives and approach data shar-
U.S. National Labor Relations Act business that tracks and stores EU ing more openly if the information is
protects the rights of employees to citizen data, as well as the author- anonymized and shared at an aggregate
organize and bargain collectively with ity to fine violating companies level. Wearable technology, GPS track-
their employers and to engage in other up to 4 percent of their annual ing devices, radio frequency devices,
protected concerted activity. Employ- global revenues. New compliance and video cameras deployed in mobile
ers are prohibited from restricting requirements include an appointed workforces have great potential to track
employees from acting together, with privacy officer, privacy by design employee movement and productivity,
or without union, to address work and default in products and ser- but at the same time, each individual
conditions that affect their personal vices, the right to be forgotten, will have a personal limit to what is
lives. The provisions extend to conver- additional privacy impact assess- considered shareable.
sations carried out in personal email ments, and complete inventories
accounts and social media sites. of personal data and third-party Employer Expectations and Drivers
data processors. Employers concerns generally center
General Data Protection Regula- on the need to protect themselves
tion (GDPR) for EU members was U.S. E-Government Act of 2002 from loss of confidential informa-
officially adopted by the European requires that a federal agency tion, shield against cyber threats, and
Commission in April 2016 and goes conduct a privacy impact assess- comply with laws and regulations.
into effect in May 2018 after a two- ment before developing or procur- Those needs require that employers
year transition period. The GDPR ing an IT system or a project that monitor employee communications
strengthens European data protec- collects, maintains, or disseminates on company-issued computers, cell
tion laws, giving EU citizens greater PII about members of the public. phones, tablets, and social media sites.
say in how their digital information The act also sets forth uniform Employers also need to collect personal
gets collected and managed. This confidentiality protection require- information, such as Social Security
complete overhaul of EU privacy ments regarding such data. numbers and health-related informa-
tion, to provide health and compensa-
tion benefits. Companies are expected

october 2016 Internal Auditor 45


privacy in the workplace

to act reasonably regarding their posses- societies, and regulations as such have
sion of that personal information and not kept pace with changing technologi-
to respect employees rights to privacy. cal advancements. Each country has a
E-discovery tools are now more com- multifaceted legal framework in place to
monly deployed to investigate suspi- govern that countrys employers globally
cious behavior, and so are data loss (see Global Privacy Laws and Regula-
prevention tools to monitor network tions on pages 44-45 for examples).
traffic and secure computers.
Audit Considerations
Regulatory Landscape Regula- Organizations should consider taking
tory developments in recent years a holistic approach to managing pri-
have focused mainly on the types of vacy in the workplace. Moreover, their
data that should be protected, such privacy framework should be agile
as personally identifiable information enough to accommodate changing
(PII), health information, financial regulations. Internal auditors should
information, and certain demographic evaluate the framework and other areas
information such as income and union of privacy management to gauge the
representation. Employees in the U.S. effectiveness of organizational efforts
have minimal expectations of privacy and overall governance.
To comment compared with their counterparts
on this article,
in Europe and Japan, where privacy Governance Framework Internal
email the
author at parthiv. expectations are absolute and supersede audit should evaluate the organizations
sheth@theiia.org most other laws and regulations despite governance framework, if one exists, to
varying from country to country. verify whether roles and responsibili-
Employee rights are protected by ties for managing privacy have been
privacy laws such as the Constitutions identified. An adequate framework will
Fourth Amendment, the Electronic incorporate not only a chief informa-
tion security officer or chief risk officer
but also cross-functional partnerships
Organizations should take a holistic across departments and geographies.
Auditors should make sure that man-
approach to managing privacy in agement defines a strategic vision and
framework, if one does not exist, while
the workplace. ensuring it meets current and long-term
business objectives.

Communications Privacy Act, and Privacy Risk and Compliance Execu-


the Health Insurance Portability and tion of a privacy risk and compliance
Accountability Act (HIPAA) in the U.S. assessment is an essential step in evaluat-
and various European Union (EU) data ing if the organization has translated
protection laws in EU member states. its strategic vision and framework into
However, outside of specific data privacy practical implementation. This step
laws such as HIPAA, interpretations of entails a gap assessment of applicable
those laws and regulations are based on laws and regulations within all geogra-
reasonable expectations of privacy and phies, as well as the discovery and data
refer to both an employees expecta- flow mapping of data elements that are
tion and an employers implementation stored, transmitted, or transferred either
of privacy policies in the workplace. on organizational networks or on hard
Certainly, reasonable expectation can copies. Internal audit should execute
be interpreted differently by different such assessments periodically and

46 Internal Auditor october 2016


Approximately 70% of privacy professionals say complying with the General Data Protection
Regulation will require additional budget, according to Baker & McKenzies Preparing for New Privacy Regimes.

Sound Privacy Program


An effective privacy strategy comprises numerous practices. Organizations that manage pri-
vacy well typically feature several components in their approach:
An organizational view of what privacy means.
An understanding of how privacy and data protection fit into the organizations overall busi-
ness strategy.
Complete knowledge of what data is held, where it is, and who has access to it.
A clear understanding of data ownership and of circumstances under which data is pro-
tected and under which it is not.
Understanding and management of the risks introduced to the data by third parties.
Data governance that ensures data is being used for the purpose that the organization has
committed to, and nothing more.
A privacy model with agility in mind, given the ever-changing privacy landscape.
Thorough familiarity with legal obligations in the U.S. and abroad, and tracking of develop-
ments in regulatory enforcement actions and case law.

perform a risk assessment on a more Training and Awareness When poli- beyond the next 24 hours. Internal
frequent basis to evaluate the impact of cies set the tone of data protection man- auditors should ensure that the business
organizational and regulatory changes. agement and guidance, employees and has incident management and response
third parties should be trained in their capabilities that align with best practices
Policies, Processes, and Controls roles and responsibilities. Training and and overall business objectives.
Auditors should be proactive in guid- awareness should be adaptive to meet
ing management to develop newor specific needs at every level: executives, A Matter of Trust
enhance existingpolicies, pro- management personnel, human resources Trust in the digital age can be difficult
cesses, and controls by incorporating personnel, supervisors, IT staff, and so for employers to navigate because its
privacy-by-design (i.e., embedding on. Auditors can advise management on closely intertwined with risk, security,
privacy into the design specifications the development of such programs and and privacy. Nothing is hidden in the
of technologies, business practices, then periodically assess employee partici- digital world; the views and opinions of
and physical infrastructures). They pation to gauge training compliance. former and current employees are avail-
should, for example, evaluate the pri- able for everyone to see, and employees
vacy impacts of new products, third Monitoring and Response Monitoring expect a clear explanation of what they
parties, mergers and acquisitions, the environment to ensure compliance are contributing and how theyre to be
systems, and technologies; and when with privacy regulations is not just about rewarded for it. For these reasons, ongo-
the organization enters new markets, deploying e-discovery and other tools ing trust levels must be built between
auditors should make sure controls are over the network. It requires ongoing employers and employees by way of
in place to manage privacy require- communication and periodic reporting transparency in their day-to-day interac-
ments. Controls around investigations across departments and geographies to tions, and a mutual interest in balanc-
of employee behavior on an organiza- help identify and isolate privacy con- ing both parties priorities.
tions networks and computer systems cerns timely. However, organizations
should be in place and evaluated by with over-the-top monitoring practices Parthiv Sheth is a director in PwCs
auditors periodically. These controls could encounter incidents or privacy cri- Risk Assurance practice in New York.
might include using e-discovery tools ses with no warnings, resulting in their Khalid Wasti, cia, cpa, cisa, citp,
aimed at validating internal approv- reacting reflexively. In their haste, deci- is a partner in PwCs Internal Technology
als, clearly articulating the purposes sion makers could fail to consider who Audit Solutions practice in New York.
for monitoring that are proportionate should be in the room making decisions, A. Michael Smith, cpa, cisa, cissp,
to the investigation underway, and how emerging issues should be priori- is a national partner in PwCs Internal Tech-
involving lawyers when necessary. tized, and how to think strategically nology Audit Solutions practice in the U.S.

october 2016 Internal Auditor 47


Audit Management Software

No Gimmicks

No Metaphors

No Ridiculous Claims

No Clichs

Just Brilliant Software.

Find out more at www.mkinsight.com


Trusted by Companies, Governments and Individuals Worldwide.
compliance

A Unified Businesses benefit

Approach to
from a proactive
partnership
between internal
audit and the
Compliance compliance
function.

I
n todays world, virtually every organization is subject to some sort of
regulation. Consequently, virtually every organization has some struc-
ture in place to ensure ongoing compliance with those regulations. And
for good reason: Failure to comply can result in financial penalties, pos-
sible jail time for executives, and significant reputational damage.
In small organizations, the compliance function may consist of just
one personperhaps handling compliance on the side. Large organiza-
tions are more likely to have a full-fledged compliance function, often
set up as a compliance and ethics department, usually under the legal
umbrella. In very large organizations, the compliance and ethics pro-
grams may be separated because of the workload required of each.
But regardless of the company structure, any organization that is not coor-
dinating its internal audit and compliance functions is missing a beat. When
internal audit ensures the compliance program has a strong structure, the com-
pliance department can ensure the business has a strong program that mitigates
business risk, says Cecelia Jefferson, an attorney and compliance professional in
Jane Seago Amelia Island, Fla. A former director of alcohol, tobacco, and firearm compliance
for Walmart U.S., Jefferson skimps no words in describing the critical role internal
audit plays in compliance. Once the compliance department understands the years
business goals, it will design any changes or upgrades needed to ensure the business
remains compliant. Internal audit should be included in these discussions.
Understanding the business objectives, and how the compliance department
plans to assist the business in achieving them, helps internal audit determine
where, how, and how often to provide support. Identifying those questions is rela-
tively straightforward. Answering them in the most effective way, especially in the
face of competing demands on resources, can be tricky.

Internal Audit and the Compliance Function


There are probably as many ways for internal audit to perform its role in com-
pliance as there are internal audit and compliance functions worldwide. One
approach is for internal audit to engage with compliance on two levels, which

october 2016 Internal Auditor 49


a unified approach to compliance

Nancy Haig, director of internal audit compliance issues across the organiza-
and compliance at a global consult- tion, helping guide the compliance
ing firm headquartered in New York, function to focus on high-risk areas,
calls macro and micro. At the and assessing and providing an opinion
macro level, internal audit examines on the maturity of the organizations
the effectiveness of the organizations regulatory risk management process.
compliance program. Internal audit These efforts are paying off, says John,
needs to discover how the compliance who reports a downward trend in sig-
function is getting its information, nificant compliance audit findings.
Haig explains. Is it doing regular scans Debbie Shelton, director of IT
of the environment? Is it getting quali- security and compliance at LG&E
tative and quantitative input across the and KU Energy LLC in Louisville,
board? Is it calculating the residual risk Ky., offers a slightly different approach
in all compliance areas? to the types of engagement between
At the micro level, internal audit internal audit and compliance. With
drills down on selected risks the com- a detailed understanding of the orga-
pliance function has identified as pri- nizations compliance risk assessment,
orities. If the compliance function has internal audit can first focus on the


done a risk assessment, it may be pos- foundations of the assessment, she
sible to leverage it; if not, internal audit explains. This leaves responsibility for
Internal may need to perform one. Mitigation the assessment where it belongsin
audit needs plans are only as good as the risk assess- the businesswith internal audit
to discover ment on which they are built. adding assurance that the assessment


how the Naohiro Mouri, executive corpo- methodology is sound or raising ques-
compliance One of the key
rate officer and chief internal auditor tions about levels of residual risk that
function is at AIG Japan Holdings in Tokyo, also appear to be in excess of the approved
objectives of takes a two-pronged approach. We risk appetite. She further notes that
getting its internal audit audit compliance in itself, as a separate internal audit should be delving into
information. as articulated audit engagement, but we also look at the assumptions that are made and doc-
compliance risk that is embedded in umented within the assessment model,
Nancy Haig in our charter the processes of the business units as we how the assumptions are communi-
is to assist do our regular audits of them. cated, and whether all those inputting
the directors The internal audit charter is critical into the model understand the assump-
to discharge in defining internal audits role in com- tions in the same way.
their duties in pliance. One of the key objectives of At the second level of Sheltons
ensuring that internal audit as articulated in our char- approach, which occurs once the foun-
ter is to assist the directors to discharge dation has been determined to be sound,
the relevant their duties in ensuring that the relevant internal audit can focus on the actual
compliance compliance and risk management entries by examining issues such as how
and risk processes are in place, notes Jenitha the organization ensures completeness,
management John, CAE at FirstRand Bank in Johan- whether a requirement-by-requirement
processes are nesburg, South Africa. In her bank, accountability document is provided to
in place. the internal audit function performs all those involved in the assessment, and
compliance audits to assess whether how those with accountability ensure
Jenitha John there are adequate and effective controls updates are made timely.
in place for the organization to comply Approaches differ by company, but
with relevant legislation and to ensure all are aimed at securing positive out-
ethical business conduct. Internal audit comes. Greg Jordan, senior vice presi-
follows up on control gaps by monitor- dent and CAE at Nationwide Insurance
ing remediation, identifying thematic in Columbus, Ohio, describes a tangible

50 Internal Auditor october 2016


81% of 150 compliance officers agree that compliance will need to optimize
operations to
manage more complex risks with tighter resources, according to Accentures 2016 Compliance Risk Study.

Basics of Auditing Compliance


The following terms and concepts are sure to play into internal audits
compliance activities:
Inherent riskThe risk level or exposure without considering the
actions that management has taken or might take (e.g., implementing
controls); often falls into one or more of four categories: legal, finan-
cial, business, and reputational.
Residual riskThe remaining risk after management has implemented
a risk response.
Compliance riskThe threat posed to an organizations financial,
organizational, or reputational standing resulting from violations of


laws, regulations, codes of conduct, or organizational standards of
practice. Shelton defines compliance risk in broad categories: assess-
ment risk, access risk, people risk, response/recovery risk, evidence
Speak with
suitability and retention risk, and change management and segre- subject matter
gation of duties risk. Specific examples of compliance risk include experts in
worker safety regulations for manufacturers; amount of margin the company.


allowed for investment accounts; managing crisis and remediation Seek docu-
while defending the organization and its executives/board members
mentation
against legal enforcement; levels of commission to sales agents; and We rely on [the outlining
banking legislation relating to customer identification and verifica-
tion, financial advice, and lending.
compliance why key
Pertinent standardsAccording to Haig, her go-to standards when departments] compliance
dealing with compliance are IIA Standard 2110: Governance and Stan- judgment decisions were
dard 2120: Risk Management. Also see Standard 2050: Coordination. rather than made.
making
compliance Debbie Shelton

benefit of the expanded role internal when internal auditors find issues in
decisions
audit plays in compliance in his com- their audits that indicate a regulatory ourselves
pany: Internal audit staff is rotating out breach, and if that breach is signifi- and reporting
of internal audit into the compliance cant enough, they ask the compliance to the
department, and compliance profession- function to report it to the regulators. regulators.
als are moving into internal audit. Roll They are the experts in this area, he
the clock back a few years, he says. explains. We rely on their judgment Naohiro Mouri
That sort of career path didnt exist. rather than making compliance deci-
sions ourselves and reporting to the
Building a Partnership regulators.
Working together effectively requires Jordan notes a similar activity
a strong commitment to collaboration within Nationwide. We have a regula-
and partnership. Both internal audit tory assessment distribution process we
and compliance must share a focus on audit regularly, he says. It monitors
best practices, cooperative effort, and regulatory activity that affects our busi-
information sharing. ness units, what changes these regulatory
Mouris internal audit team relies activities entail, what dates the changes
on the compliance department to pro- become applicable, and which business
vide education on changes in regula- units are affected and need to receive
tions that might generate new risks or information to incorporate into their
reporting requirements. For their part, business plans. Compliance tracks the

october 2016 Internal Auditor 51


a unified approach to compliance

regulations and internal audit under- Its not all a matter of meetings,
stands the key compliance-related risks. however; technology plays a role in
Shelton proposes that collabora- facilitating collaboration, as well. John
tion center on identifying all compli- notes the need for formal combined
ance requirements and reviewing an assurance platforms that drive ongoing
existing risk assessment of requirements and consistent engagement between
or collectively completing one. She internal audit and compliance. One of
further suggests, Use the author- the key levers to drive this collaboration
ity each organization has in engaging is eGRC technology, which improves
participants in the audit. Speak with visibility of the organizations compli-
subject matter experts in the company. ance risk profile. Johns organization
Seek documentation outlining why key is currently implementing an eGRC
compliance decisions were made. platform across governance functions,


Collaboration may best be accom- including compliance, to drive holistic
plished by simply talking to each other. compliance risk management.
Internal Haig describes an effective monthly
auditors meeting at one of her previous employ- Leveraging the Compliance
ers, in which the CEO and the heads Risk Assessment
served as a of internal audit, compliance, and legal One of the most common areas of
second set of discussed emerging risks, trends, and cooperation and coordination between
eyes to ensure mitigation plans. Similarly, in her prior internal audit and compliance focuses


we were role at Walmart, Jefferson led a consor- on internal audits use of the com-
appropriately We talk with
tium of business stakeholders, including pliance risk assessment done by the
identifying general
compliance and internal audit, which compliance department, as either
met on a weekly basis to discuss activity stand-alone output or as a contribu-
and mitigating counsel and within the compliance program.The tion to the organizations enterprise
all risks and compliance internal auditors, Jefferson says, served risk assessment. Given that most
the proposed during regular as a second set of eyes to ensure we were organizations operate under time and
solutions did audit planning appropriately identifying and mitigating resource constraints, getting multiple
not create for each
all risks and the proposed solutions did uses out of a single work product is
problems engagement,
not create problems for the program or advantageous. But, due diligence must
other stakeholders. be done. In this context, that means
for the to make sure Jordan conducts his own frequent before relying on the compliance
program or nothing of a meetings with his counterpartsthe departments compliance risk assess-
stakeholders. regulatory chief compliance officer and the chief ment, internal audit must review that
risk officerand engages in a monthly risk assessment for effectiveness and to
Cecelia Jefferson nature has meeting between internal audit and the ensure that the compliance function
changed that compliance department in which they has done, in Haigs words, an effec-
would affect review any changes in the organizations tive job.
the audit. risk landscape and inform each other of Assessing the risk assessments
pertinent upcoming activities. We talk effectiveness starts with asking perti-
Greg Jordan with general counsel and compliance nent questions about the frequency of
during regular audit planning for each update, the sources of the information,
engagement, to make sure nothing of the extent of coverage of regulatory
a regulatory nature has changed that risks, the amount of engagement with
would affect the audit, he adds. We and involvement of the legal depart-
also invite compliance to our internal ment, the prioritization of risks based
audit status meetings and, when there is on the residual risk assessment, the
an issue of regulatory impact, to closing evaluation of controls to manage and
conferences with audit clients. mitigate specific risks, the alignment

52 Internal Auditor october 2016


To comment on this article,
email the author at jane.seago@theiia.org

effectiveness of controls in place


Elements of a Compliance Program to mitigate risks identified.
Compliance program elements may include: Risk reporting processes
Policies and procedures. to ensure that a clear and
Narratives and control documentation. complete risk profile of the
Risk, responsibility, and compliance matrixes. organization is reported and
Metrics, such as degree of employee knowledge/awareness of compli- monitored appropriately.
ance risks and benchmarks of peer organizations.
A framework that lays out the organizations compliance risk land- True Partners
scape and organizes it into risk domains, and a methodology that con- Regardless of how engagement
templates both objective and subjective ways to assess those risks. between internal audit and compli-
Root cause analysis process. ance occurs, there is broad support for
Communication plans for internal and external audiences. ensuring that this engagement does
Training plans focused on key compliance risk areas. happen. Internal audit can actively
Testing plans. drive combined assurance in the
Monitoring processes. organization by collaborating with
Consistent enforcement, plus escalation and response plans in the the compliance and risk management
event of violations. functions in performing audits. This
collaboration improves the coverage of
compliance risk assurance and reduces
duplication of effort.
between the results and the organiza- complete assessment of compli- And, ultimately, internal audit has
tional risk appetite, and the degree to ance risk in the organization. an innate need to become involved in
which irregular findings are investi- She elaborates, This includes assessing compliance. According to The
gated and controls added as needed. an evaluation of governance IIAs International Professional Practices
In addition, it may be useful to con- committees, frameworks, senior Framework, the mission of internal
sider whether someone outside the management (risk owners) sign- audit is to enhance and protect orga-
compliance department can pick up off on the regulatory universe/ nizational value by providing risk-based
the departments workpapers and see risk assessment, and consider- and objective assurance, advice, and
how the compliance staff came to its ation of the involvement and insight. In other words, understand-
conclusions relative to frequency and influence of the compliance ing, evaluating, and mitigating risk
magnitude of risk. function in the industrys regu- are internal audits purpose. For many
Shelton proposes another test that latory landscape. organizations, there are few, if any, risks
would be well-suited for organizations The adequacy and effectiveness more significantin financial and
in which several groups or depart- of the compliance risk resources, reputational termsthan failure to
ments have processes for compliance including the level of skills comply with existing regulations. Inter-
assessments. Internal audit can assess within the compliance function. nal audit cannot fully achieve its mis-
whether consolidating best practices into Identification, measure- sion if it does not include compliance
an organizational program might be of ment, and risk mitigation for in its remit.
benefit and, if so, makeand possibly high-risk legislation as per In my company, compliance and
facilitatethat recommendation. the regulatory universe. This internal audit are true partners in risk
John explains that her companys includes assessing whether management, Jordan says. Our view-
assessment of the effectiveness of com- sufficient key risk indica- point is that its better for everyone if
pliance risk assessments is based on a tors have been formulated to we can work together to reduce our reg-
regulatory risk management maturity monitor risks and continually ulatory burden. We focus on achieving
model. Specifically, she notes certain strengthening the compliance the benefits for the business and doing
elements she calls fundamental to com- control environment. the right things by the stakeholders.
pliance risk assessment effectiveness: Risk monitoring plans to make
The governance and strategy in sure that first and second lines of Jane Seago is a business and technical
place to drive the consistent and defense ensure the adequacy and writer in Tulsa, Okla.

october 2016 Internal Auditor 53


communication

Understanding persuade is key to the success of their


work. Even a beginning auditor quickly
the powers of realizes that presenting evidence col-
persuasion and lected during fieldwork merely as a suc-
cession of facts often doesnt convince
applying key clients to take action. To capture stake-

rhetorical skills holders attention, and elicit a response,


auditors need to possess a degree of
can improve rhetorical skill.
Although rhetoric is a complex
the work of any subject that can take years of study to

I
internal auditor. master, the basic principles are rela-
tively easy to grasp. Understanding
these principles and applying them to
the practice of internal auditing can
Murray D. Wolfe help internal auditors get their mes-
sages heardand acted upon.
nternal auditors are for-
tunate to have robust The Trivium
professional standards to Rhetoric refers to the use of language
help guide and inform the to persuade and instruct. Through the
performance of their work. Middle Ages, European universities
One of the main pillars taught rhetoric to beginning students
of these standards, of course, is the as one of three foundational topics
need to remain independent from known as the trivium. Logic and gram-
the organization so that audits can be mar, the other two foundational topics,
conducted without bias. Independence refer to the mechanics of thought and
helps better position auditors to iden- analysis, and the mechanics of lan-
tify solutions to key problems, and guage, respectively.
it prevents them from taking direct Internal auditors essentially follow
action to implement those solutions. the trivium in their work. After gather-
Within the ambit of their pro- ing evidence through fieldwork, they
fessional requirements, practitioners apply logic to analyze evidence and
can only persuade others to act. And identify problems and solutions. They
while persuasion may not be a formal also use grammatical rules to structure
requirement for auditors, the ability to text within reports and memoranda.

54 Internal Auditor october 2016


the POWER
of rhetoric

Applying the trivium requires a


balanced approach too much focus
on the mechanics can lead to ineffec-
tive communication. Internal auditors
need to consider all three trivium com-
ponents evenly and avoid the common
trap of collecting too much evidence
or performing too much analysis in
the belief that it will help strengthen
their reports.
Although most individuals learn
grammar early in life and are taught to
analyze evidence in college, seldom do
students receive direct education on
rhetoric except perhaps through an
undergraduate class in English or phi-
losophy. Even then, instruction typi-
cally lacks specific focus on business
writing or internal audit reports. More-
over, a large portion of internal audi-
tors are accountants trained to focus
on numbers-based financial informa-
tion. Yet in practice, most auditors are
required to devote a great deal of time
and effort to work that demands skill- Trivium
Rhetoric
ful application of the written word.
For this reason, many practitioners can
benefit from additional guidance on
PHOTO: PANOS KARAS / SHUTTERSTOCK

how to apply key principles of rhetoric


Rhetor
to their work. ic
Triangleal

ARISTOTLES TRIANGLE
The Greek philosopher Aristotle,
considered the father of rhetoric
by many scholars, defined three key
components of rhetoric the speech

OCTOBER 2016
the power of rhetoric

itself (text), the speaker delivering the Audience matrix (page 59), based on and internal audit, what you
speech (author), and those who listen an accounts payable audit example, can produce, and the level of service
to the speech (audience). Collectively, help identify key audience members. or advice you provide?
these components form the Rhetorical Is there a way to take advantage
Triangle. For internal auditors, the tri- The Written Text Once engagement of their positive assumptions?
angles three points equate to the report fieldwork has been completed, the What can you do to overcome
or memoranda, the engagement lead, authors compose a written report con- their negative assumptions?
and clients or stakeholders. taining the results of the audit work. Do you create the expectation
All three of the rhetorical triangle The report represents perhaps the most that what you produce and the
components are interrelated, and they important communication from the level of service or advice you
are essential to the success of internal audit process, and the best chance to provide will be exceptional?
audit consulting or assurance work. get managements attention. Are you using all available
Each should be considered before any marketing channels to create an
engagement and kept in mind through- Three Types of Appeals impression of excellence?
out the engagement life cycleespe- When crafting the audit report, three Are you managing all your
cially during the reporting process. separate but interrelated rhetorical processes to ensure that you
appeals, originally defined by Aristo- regularly meet, and sometimes
The Author Although the engagement tle, need to be considered and applied: exceed, expectations?
lead would be considered the primary ethos, logos, and pathos. The need to consider ethos begins
author, each of the engagement team long before the start of the engage-
members plays a supporting role by Ethos is an appeal to the audiences ment. Ethos is supported by the struc-
authoring observations and recom- perception of the honesty, authority, ture and governance of the internal
mendations that are then compiled and expertise of the author. Closely audit function as well as by the selec-
into an integrated report. The draft related to reputation, ethos is tion of team membersincluding
alignment between the type of engage-
ments to be performed and the teams
The need to consider ethos begins long qualifications, education, and training.
Ethos appeal is also established by
before the start of the engagement. choosing to comply with audit stan-
dards and other professional require-
ments to demonstrate a high level
reviewer also has a role to play, ensur- established when the audience deter- of credibility, build trust, and gain a
ing that the final report meets the mines that the author is qualified, favorable reputation.
internal audit functions standards and trustworthy, and believable. Because
fulfills the purpose defined in the plan- the term ethics derives from ethos, Logos appeals to the audiences sense
ning document. Authors Within an adhering to The IIAs Code of Ethics of logic, encompassing factors such
Engagement, on page 58, summarizes supports this appeal. as the reason and analysis used, the
the typical authors, using an accounts Speaker and business consultant underlying meaning communicated,
payable audit as an example. Harry Beckwiths book, Unthinking: and the supporting facts and figures
The Surprising Forces Behind What presented. The written documents
The Audience The intended audi- We Buy, discusses how key market- visual appealdiagrams, charts, and
ence should be considered with each ing principles linked to the drivers of other elementsas well as how the
engagement. Audience members are human behavior fit within a general information is organized, presented,
not homogeneouseach will have rhetorical framework. Several questions and structured, also factor into logos.
different perspectives and expectations. adapted from the books Unthinking In his book, Beckwith notes the
For this reason, internal auditors need Marketers Checklist can help internal importance of story to convey mean-
to consult with them and consider auditors determine how well they fulfill ing, and how from the time were born
their perspectives before the engage- the ethos appeal: we learn about the world around us
ment begins. Using the Responsibil- What assumptions does your through narratives. This aspect of logos
ity Assignments for the Engagement audience likely make about you continues to be important throughout

56 Internal Auditor october 2016


21% of stakeholders say that internal audit does not communicate which organizational
risks/activities arent covered by the audit plan, according to The IIAs Six Audit Committee Imperatives report.

Amplifying Appeals: Accounts Payable Audit

P
utting the appeals into practice requires a focused, concerted effort. Using a hypo-
thetical accounts payable audit, the examples below demonstrate use of the rhetorical
appeals as well as the engagement teams roles and responsibilities.

Enhancing Ethos Ensure the engagement lead has undergone training specific to accounts
payable, preferably as a designated accountant, and also possesses experience either work-
ing within the accounts payable department or auditing the area as a practicing internal
auditor (or even as part of an external audit of the financial statements). The entire engage-
ment team needs to be sufficiently qualifiedas demonstrated through a combination of
education, certifications, and experience. Moreover, each team member should be listed in
the planning document, along with his or her qualifications, and introduced during the open-
ing meeting. When team members possess an internal audit-specific designation, it implies
they are required to comply with a clearly defined code of professional ethics, thereby con-
tributing to the ethos appeal.

Maximizing Logos As part of the planning process, internal auditors should perform ade-
quate research before starting accounts payable fieldwork. Research can include the review
of internal information (e.g., previous accounts payable reports; recent examples of issues
related to accounts payable), as well as external benchmarking information and practical
models and frameworks relevant to accounts payable.
The engagement plan and approach should align with the scope and purpose of the
accounts payable audit, as described in the planning document. The audit report should
convey a strong impression of thoroughness and appropriate follow-through, supported by
an adequate understanding of the function and its relationship to business operations. The
report should be written following a standard template, defined protocols (including a style
guide), and examples of past audit reports.
From a structural perspective, the audit report should be reviewed and edited by the
CAE, and perhaps other audit team members, to minimize errors before issuance. The
To comment
review should ensure that observations are adequately supported by relevant evidence, on this article,
recommendations are practicable, and the information presented is both clear and con- email the
cise. In addition, the process should include a checklist of review items such as data author at murray.
accuracy within tables, consistent use of terms, definition and consistent use of acro- wolfe@theiia.org
nyms, correct spelling and grammar, consistent use of fonts, and correct titles and spell-
ing of names.

Optimizing Pathos Auditors should devote adequate attention to key accounts payable
staff during fieldwork to understand and acknowledge the pressures they face daily, as well
as the effect of any recent changes or emerging areas of risk. Accounts payable is a down-
stream function that serves as the last bastion of control before cash leaves an organiza-
tion, and it is often blamed for the consequences of actions by upstream employees or
functions. Auditors should keep this potential for finger-pointing in mind throughout the
engagement and consider the effect it may have on accounts payable employees. Moreover,
recognizing the good work done by accounts payable staff to catch and correct invoice
errors before paying vendors, as well acknowledging any information internal audit obtains
through accounts payable for identifying upstream risk areas, can help establish an effec-
tive relationship.

october 2016 Internal Auditor 57


the power of rhetoric

our lives. Beckwith also points out self-contained short story that conveys
that we experience the world through key messages to the audience. The struc-
our senses, particularly our eyes. He ture and format of the report, together
emphasizes that design and visual with its textual content and visual ele-
attractiveness are key to engaging an ments, also support the logos appeal.
audience comprising visual animals. Like ethos, the logos appeal is
Beckwith uses several questions fulfilled long before an individual
to assess the design and presentation engagement begins. It starts with
of material. Two of these questions, the rational, periodic assessment and
which focus on simplicity, may be use- identification of high-risk areas requir-
ful for internal auditors: ing internal audits attention, resulting
Is what you are presenting easy in development of the strategic and
to understand? annual audit plans. Auditors then
Is your design simple and undertake engagements, executing
beautiful? steps to collect valid and relevant evi-
Auditors need for logos is addressed dence to justify conclusions and make
by their written reports executive meaningful recommendations.

Pathos is an appeal to the audiences


Pathos focuses on the audiences emotions, either positive (joy, excite-
ment, hopefulness) or negative (anger,
irrational modes of response. sadness). It is used to establish compas-
sion or empathy. Unlike logos, pathos
focuses on the audiences irrational
summary, detailed observations, and modes of response.
recommendations, as well as appendi- Aristotle maintained that pathos
ces with secondary information that was the strongest and most reliable
can be used to further instruct the form of persuasion. Pathos can be espe-
audience. The report describes the driv- cially powerful when it is used well and
ers and overall purpose of the engage- connects with the audiences underlying
ment, findings, and proposed solutions. values and perspective. Used incorrectly,
Ultimately, from a rhetorical stand- however, pathos can distort or detract
point, auditors try to tell a convincing, from the impact of factual evidence.

Authors Within an Engagement


Example:
Role Responsibility Accounts Payable Audit

Primary Draft and distribute the planning documents as well as Engagement Lead:
the engagement report, based on support provided by Senior Auditor
the engagement team.

Secondary Execute assigned portions according to the engage- Engagement Team:


ment plan, identifying observations and drafting Auditors
recommendations. Technical Experts

Reviewer Ensure that expectations within the planning docu- CAE


ment are fulfilled and discussed within the report.

58 Internal Auditor october 2016


Use of dynamic visualization tools for internal audit communication is expected to increase
from 7 percent to 35 percent in the next 3 to 5 years, according to Deloittes Evolution or Irrelevance study.

Responsibility Assignments for the Engagement Audience


Example:
Component Role Accounts Payable Audit

Responsible Leader in charge of the primary area being audited, Corporate Controller
usually at the vice president or director level. Director, Accounts Payable

Accountable Executive team member, responsible for the area at Chief Financial Officer
the highest level of management.

Consulted Leaders in charge of areas dependent on or affected Supply Chain Management


by the area being audited, but secondary to it, at the Operations Management
vice president, director, and manager levels.

Informed Interested in the results of the engagement, but Executive Team


not directly concerned with the area being audited Audit Committee
except at the highest level. External Auditors

Several questions adapted from also be mindful of their overall tone Human Nature
Beckwiths guidance can be used to and word selection, and ensure they All three elements of rhetorical appeals
evaluate how well a message appeals balance negative and positive com- play an important role in commu-
to pathos: mentsgiving credit where credit nication. And while none should be
Does your message appeal is due. neglected, auditors should pay particu-
strongly to emotions, or is it To some extent, pathos is inter- lar attention to pathos. As Beckwith
merely rational? dependent on ethos and logos: Nega- observes, During our decision making,
Have you identified the emo- tive results can be reduced somewhat the organ that processes our data sits
tional forces that drive people by the positive effect of the other two on the sidelines while our feelings do
to accept your observations and appeals. For example, audience mem- the work. When our feelings reach their
recommendations and those bers are more likely to accept bad decision, they summon our brains to
that might drive them away? news from someone they trust and come in and draft the rationale, a task it
Is your message presented respect, and who they know has fol- does so well that it manages to convince
optimistically? Is it adequately lowed a rational, structured approach us that its rightand that it was in
focused on achieving good to the engagement. But at the same charge the whole time.
outcomes and balanced with time, ethos and logos can be offset by The dominance of feelings over
avoiding bad ones? negative pathos. Distributing audit reason is part of human nature, and
Is your report story-based? Are results before stakeholders have had a internal auditors should consider this
you telling the story well? Is chance to review them, for instance, when planning and executing engage-
it authentic and honest? Will could potentially be detrimental ments and reporting the results. By
it resonate emotionally with to internal audits reputation and doing so, auditors can help ensure audi-
your audience? trustworthiness. Preferred practice ences accept their message and make
Auditors should walk a mile in some- generally consists of holding regular recommended improvements, ulti-
one elses shoes and look for ways to meetings with stakeholders over the mately promoting the functions success
better understand the audiences per- course of the engagement, maintain- and that of the clients it serves.
spective. Attention to pathos can help ing transparency, and providing stake-
support not only audit objectives, holders an opportunity to refute audit Murray D. Wolfe, CRMA, is direc-
but the overarching goal of creating a findings or provide evidence that tor, Internal Audit, at a large agricultural
win-win solution. Auditors should counters internal audits observations. cooperative in Calgary, Alberta.

october 2016 Internal Auditor 59


fraud

The red flags o


Internal auditors knowledge
of the business makes them ideal
candidates to detect unethical
behaviors.

Norbert Tschakert
Belverd Needles Jr.
Mark Holtzblatt

I n its 2016 Report to the Nations on Occu-


pational Fraud and Abuse, the Association of
Certified Fraud Examiners (ACFE) estimates
that organizations lose 5 percent of revenues in
any given year to fraud, resulting in an estimated
fraud loss of US$3.7 trillion worldwide. It is
important to realize that fraud directly affects a
companys bottom line. For instance, a US$100,000 fraud
case in a company with a 10 percent profit margin would
require an additional US$1 million in revenues to make up
for the loss.
The longer a fraud goes on, the greater the financial
damage to the organization. The findings from the ACFE
Photo: Ljupco Smokovski / shutterstock

report also indicate that the median loss and median dura-
tion of fraud schemes are lower when theyre uncovered
through active detection methods, such as surveillance and
monitoring and active management review, than when
detected via passive methods, like accidental discovery or
confession. By improving their ability to recognize fraud
red flags, internal auditors can better safeguard company

60 Internal Auditor october 2016


s of Fraud
assets, reduce inefficiencies and litigation risk, and aid in
satisfying increasing regulatory scrutiny.

Risk Factors and fraud types


Internal auditors should consider a red flags analysis cus-
tomized to the risks and circumstances of their organiza-
tion. Red flags do not necessarily indicate a fraud is taking
placethey constitute warning signs that it could occur.
Red flags exist for many types of fraud, illegal acts,
corruption, and other circumstances harmful to the organi-
zation, but employee or financial statement red flags are com-
mon in most types of frauds.

Financial Statement Fraud This type of fraud may involve


misstating or omitting amounts or disclosures in financial
statements. Financial statement fraud has been connected
to restatements of financial figures; disclosure of internal
control deficiencies; U.S. Securities and Exchange Commis-
sion Accounting and Auditing Enforcement Releases; auditor
and law office changes; significant litigation, especially with

october 2016 Internal Auditor 61


the red flags of fraud

stakeholders; related-party transactions; Scanning for unusual or unex-


rapid turnover of key employees; a pected balances or transactions in
complex business structure; problems account balances, listings of trans-
with regulatory agencies; declining sales actions, and journals, or any last-
and profits; loss of market share; and minute, senior-level management
insufficient liquidity. journal entries.
The primary motivation for Inappropriate revenue recognition rep-
financial statement fraud is personal resents a significant percentage of finan-
enrichment through stock-based or cial statement fraud. By using analytical
performance-based compensation. This procedures, unexpected relationships
can include attempts to avoid adverse among revenue, costs of goods sold,
events, such as missing Wall Street accounts receivable, cash flow from
expectations or violating covenant operations, and industry and competi-
tor information can be brought to light
for further investigation. Extensible
business reporting language increasingly
Employee fraud is the most common facilitates some of these tasks, enabling

type of fraud, but it exhibits the automatic ratio and trend analysis, or
benchmarking against competitors.
smallest damage amount per case. Behavioral red flags linked to man-
agement fraud include inconsistent,
evasive, vague, or implausible responses
to internal auditor inquiries. To then
agreements. More altruistic consider- direct the same questions to different
ations also exist (saving the company levels of employees may bring such
from bankruptcy and employees from fraud to light.
unemployment), but are less common.
The internal audit function can Employee Fraud This fraud is com-
analyze financial statements to uncover mitted against the organization for
red flags related to financial statement which the perpetrator works. While it
fraud through procedures such as: is the most frequent type of fraud, it
Examining the relationship of exhibits the smallest damage amount
present-year account balances with per case. Some examples include:
nonfinancial information (e.g., Employee theft of cash in the
inventory vs. warehouse capacity or form of unrecorded sales can be
production vs. production capacity). indicated by gaps in prenumbered
Comparative analysis of account documents (invoices), lower than
balances from the current year expected revenue in a particular
to balances of prior years and to location, lower-than-expected rev-
expected results from the firms enue when a particular employee
forecasts and budgets. is working, and differences
Assessment of the relative amounts between customer and company
of this years account balances records. Warning signs relating
to other present-year balances to to employee theft of noncash
ascertain whether they conform to assets include inventory short-
patterns of predictability based on age, missing work tools, altered
the firms history. documentation such as shipping
A comparative analysis of documents, and unsupported
account balances and ratios to journal entries to inventory or
industry benchmarks. asset accounts.

62 Internal Auditor october 2016


Employee expense reimburse-
ment fraud warning signs include Behavioral Red Flags

W
expenses exceeding budget or his- hat makes a person decide to commit fraud? Criminologist Don-
torical amounts, multiple receipts ald Cresseys fraud triangle theory outlines three contributing
from the same vendor, travel factorsperceived pressure, perceived opportunity, and rational-
expenses not being reviewed, and ization. When an individual is feeling pressure, sees an opportunity, and
expense reports with no detail. can rationalize his or her actions, fraud is more likely to occur. The fraud
Payroll fraud may be indi- triangle describes the accidental fraudster who is led to unethical con-
cated by inadequate segregation duct more through circumstances than existing intent. For the predator
of duties, a higher number of fraudster, often associated with antisocial personality disorders, opportu-
employees paid than employees nity alone may be enough to consider engaging in fraud.
actually working, former employ- In its 2016 Report to the Nations on Occupational Fraud and Abuse, the
ees still on payroll, invented or Association of Certified Fraud Examiners identified behavioral red flags
real ghost employees on pay- that many fraud perpetrators exhibit:
roll, or inadequate supervision of Living beyond ones means.
employee work time. Financial difficulties.
Kickback scheme red flags An unusually close association with a vendor or customer.
include increasing prices, larger- Control issues or an unwillingness to share duties.
than-normal order quantities, Wheeler-dealer attitude involving shrewd or unscrupulous behavior.
decreasing quality, increased Irritability, suspiciousness, and defensiveness.
purchases from a favored vendor Addiction problems.
while decreasing purchases from Refusal to take vacations.
other vendors, use of an unap- Complaining about their lack of authority.
proved vendor, complaints from Excessive gambling.
unsuccessful vendors, and quality Increased smoking.
complaints from customers. Making up excuses for missing documentation or shortages and find-
Additional areas of concern for ing scapegoats.
employee fraud include misuse of Most offenders are under increased stress, as they fear detection. This
corporate assets, conflicts of interest, stress triggers changes in behavior, so the red flag is the change rather
fraudulent disbursements, bribery, than a particular behavior. Besides personal enrichment, a negative work
economic extortion, and illegal gratu- environment and employee dissatisfaction are common reasons for
ities. Lifestyle symptoms, as well as tips employee fraud as employees attempt to get back at their employers.
and complaints, are among the best
indicators of these types of frauds (see
Behavioral Red Flags on this page).
The ACFE also identifies common Technology and
fraud perpetrator characteristics. Most Anti-fraud Training
perpetrators wait to learn about the Business knowledge frequently is a
companys internal control, so signifi- prerequisite for identifying red flags.
cant fraud activity only starts after about Risks are often unique to the organiza-
a year of tenure with the organization. tion, and techniques to identify them
The likelihood of fraud is highest when include brainstorming, flowcharting, To comment
on this article,
the perpetrator is under the greatest questionnaires, continuous monitoring, email the
amount of stress (e.g., paying their and data analysis. author at norbert.
mortgage or tuition for their children) Red flags help narrow the scope tschakert
and has increased authority in the of information that internal auditors @theiia.org
organization. The perpetrators level of must review manually. For instance,
authority is correlated to the size of the not every processed payment can be
fraud, and males instigate more signifi- reviewed each month. Data analytics
cant fraud cases than females. can help identify payments that do

october 2016 Internal Auditor 63


Trust Your Quality
to the Experts

Build confidence with your stakeholders through a solid Quality Assurance and Improvement
Program (QAIP). Look to IIA Quality Services expert practitioners to provide:

Insightful external quality assessment services.

On-time solutions and successful practice suggestions based on extensive field experience.

Enhanced credibility with a future-focused QAIP.

IIA Quality Services, LLC provides


you the tools, expertise, and
services to support your QAIP.
www.theiia.org/quality
2016-0529

2016-0529 QAL-June IA Quality Ad_FNL.indd 1 4/18/16 1:00 PM


Median losses are twice as much for victim organizations that lack anti-fraud
controls, according to the ACFEs 2016 Report to the Nations on Occupational Fraud and Abuse.

not adhere to the expected flow and control environment, earlier detection expensive investigations that could
enable an internal auditor to deal with of fraud, and deterrence of future fraud. lead to reputational damage. Because
a much more manageable data set for Anti-fraud training can allow a com- of their knowledge of the organiza-
further review. pany to progress from passive to proac- tion, internal auditors are in a unique
Analyzing red flags applicable to tive and organized when looking for red position to detect fraud early and
the organization and incorporating flags. Often, lower-level employees do help avoid or mitigate any fallout by
them into the accounting information not share knowledge about questionable supporting managements efforts to
system (AIS) for continuous moni- transactions without being encouraged establish a culture that embraces hon-
toring to set off automatic alerts has through such training. esty, ethics, and integrity.
vast potential for many organizations,
including small- to medium-sized The Importance of Norbert Tschakert, PHD, CIA,
organizations that are dispropor- Early Detection CPA, CFE, is the Gassett-Schiller 83
tionately affected by fraud. AIS log Fraud investigators often state that Associate Professor of Accounting at
files can be used to identify which there are no small frauds, only frauds Salem State University in Salem, Mass.
employee has made what changes at that are caught early as perpetra- Belverd Needles Jr., PHD, CPA,
what point in time. tors rarely stop and will continue to CMA, GCMA, is the EY Distinguished
Anti-fraud training also teaches exploit a successful scheme. As recov- Professor of Accountancy at DePaul Uni-
employees to recognize red flags, rein- erability is often difficult, prevention versity in Chicago.
forces company policies, and explains and early detection are critical to Mark Holtzblatt, PHD, CPA, is
steps that should be taken once red flags prevent frauds from growing and to an associate professor of accounting at
are identified. The result is an improved avoid time-intensive, disruptive, and Cleveland State University.

BROADEN YOUR
Your Solution to Effective
VIEW ON Internal Audit, Compliance and ERM
Internal Audits Emerging A flexible and fully integrated web-based solution for Enterprise Risk Management, Audit
Management, Resource scheduling, Work Papers, Questionnaires, Issue Tracking and extensive
Risks, Hottest Topics, and KPI/MI reporting. Web interface works with PC, laptop, iPad and other smart devices enabling the
Leading Practices From whole organization to participate in the issue management and assurance processes.

Subject Matter Experts

Log on to AuditChannel.org
to Watch Now!

Over 350 standard reports, charts, dashboards and scorecards are provided. The system includes
an end-user reporting tool and configurable KPI/MI options.
Proactively alerts and prompts all stakeholders with the key information required to objectively
assess the effectiveness of the assurance framework.

Integrated
a single integrated yet modular relational database

Individual
configured and customized to meet your organization and users exact needs
Intuitive
easy to use system which evolves and grows with you
2016-0709

Innovative
improving your methodology, efficiency, delivery and profile

www.magiquegalileo.com
+1 212 220 6709 (USA) +44 (0)20 3753 5535 (UK)

2016-0709 MKT-Audit
october 2016Channel 1/4 IA Aug Ad_FNL.indd 1 7/15/16 10:04 AM Internal Auditor 65
Governance Perspectives
By Matt Suozzo edited by Mark Brinkley

Anticipating Information
Security Regulation
As threats and data
breaches become

A
more common, nyone who keeps up industries. Recent enforce- space and put many organi-
so will regulatory with current events ment activities by U.S. bodies zations on notice.
oversight. couldnt miss the such as the Securities and Most organizations
almost constant Exchange Commission and likely have some form of
stream of articles about orga- Consumer Financial Protec- security controls and pro-
nizations, of all types and tion Bureau (CFPB) appear cesses in place, but those
sizes, that have experienced to be signs of things to come. might not always measure up
security breaches resulting For example, in March to current industry accepted
in the exposure of customer 2016, the CFPB assessed its best practices. There are cer-
information. Regulatory bod- first data security-related fine tain processes and controls
ies and government agencies against an online payment that organizations in any
have taken notice, as well, platform. The CFPB stated industry should consider
and have increased their that the organization mis- in anticipation of increased
efforts to enforce existing represented its controls and regulatory scrutiny.
security guidelines, improve practices around data secu-
guidance while increasing rity, assessed a US$100,000 Establish a Security Risk
expectations, and develop penalty, and required that the Assessment Process The
new requirements and objec- organization address its secu- risk assessment is the basis
tives. U.S. organizations in rity practices. According to for building and implement-
the banking, health-care, and CFPB Director Richard Cor- ing sound information secu-
government sectors have long dray, With data breaches rity processes and controls.
faced security-related regula- becoming commonplace The traditional approach
tory requirements through and more consumers using to information security has
the Gramm-Leach Bliley Act, these online payment sys- been compliance- or rule-
the Health Insurance Porta- tems, the risk to consumers based. Taking a risk-based
bility and Accountability Act, is growing. It is crucial that approach is more effective for
and the Federal Information companies put systems in anticipating where regulatory
Security Management Act place to protect this informa- controls are heading. If orga-
(FISMA). As threats evolve tion and accurately inform nizations do not adequately
and data breaches become consumers about their data assess their risks, how can
more commonplace, regula- security practices. This was they ensure security controls
tory oversight and enforce- the CFPBs first enforcement are implemented to protect
ment is spreading to other action in the data security their most critical assets?

Read more on Governance visit the Marks on Governance blog at InternalAuditor.org/norman-marks

66 Internal Auditor october 2016


To comment on this article,
email the author at matt.suozzo@theiia.org

There are many different approaches to performing a An organization can spend unlimited resources on
security risk assessment. Usually, organizations will develop the most cutting-edge security technology, but if it can be
an inventory of their assets, catalog where sensitive data bypassed by an employee accidentally providing credentials
resides, and identify potential threats. Each asset is assigned or compromising a workstation by clicking on a malicious
an inherent risk score based on the criticality of the data that email link, then it is all for naught. Implementing an employee
is accessible from it. Next, organizations identify the poten- security awareness program is paramount to the success of a
tial avenues for an individual or organization with malicious security program. Employees should be educated, tested, and
intent to gain access to the highest risk assets. The organiza- continuously reminded about current security threats and best
tion then identifies what controls or processes are in place to practices to minimize the effectiveness of social engineering.
mitigate the identified threats. Where gaps in controls exist,
the organization evaluates the cost/benefit of either imple- Validate the Control Environment Upon implementa-
menting new mitigating controls or processes or changing tion of the security program and its supporting processes and
existing practices to remedy the issue. controls, organizations should develop a process to periodically
With the ever-changing landscape of security technol- assess and validate the control environment. Most organiza-
ogy, regulatory requirements, threats, and vulnerabilities, the tions with an internet presence are being scanned and assessed
security risk assessment should be performed regularly, and by attackers, either manually or via automated scanning, daily.
as necessary, based on significant changes to the organization. Organizations should strive to stay one step ahead by perform-
Most organizations perform assessments either annually or ing their own assessments, which often include automated
semi-annually, depending on industry and risk tolerance. The vulnerability scanning and penetration testing.
risk assessment should be repeatable and well-documented to Nontechnical controls such as policy, procedure, and
allow for consistent reporting of results and comparison over risk assessment processes also should be assessed periodically
time. The results of the risk assessment should be documented to determine whether they are being performed in accor-
and communicated to management and other stakeholders dance with the established security program. It is common
(e.g., legal, compliance) to aid in decision making. for processes to be defined and then fall behind due to fac-
tors such as changes in leadership or competing priorities.
Develop/Enhance the Information Security Program By performing validation activities, an organization can
For organizations that want to anticipate future regulatory demonstrate that it has established an effective security pro-
requirements, adopting an industry accepted security stan- gram and that it also regularly reviews its environment to
dard is a solid foundation upon which to build. Frameworks ensure it stays abreast of changes in the security landscape.
include ISO 27001, U.S. National Institute of Standards
and Technology (NIST) Cybersecurity Framework, FISMA, Organizations may be preparing for security requirements
various aspects of COBIT, and the IT Infrastructure Library, that have not yet been defined. By performing a security risk
among others. One size does not fit all. For example, if an assessment, adopting an industry accepted security framework,
organization adopts NIST 800-53 as a framework, which is and implementing and validating the effectiveness of secu-
comprehensive and applicable to most government agencies, rity controls, an organization can position itself to not only
all of the requirements may not be reasonably implemented decrease the risk for itself and its customers, but also minimize
based on the organizations risk profile. Organizations should the impact of new legislation and regulatory requirements.
evaluate the framework of choice and map controls to the Organizations should monitor the ever-changing security
existing environment. Where there are gaps, management threat and regulatory landscape and attempt to anticipate
should evaluate the risk exposure and determine action plans any processes or controls that are not currently part of their
in alignment with risk tolerance and overall objectives. program. Also, organizations should monitor the laws in the
Once the necessary information security controls have states and countries in which they operate, or in which they
been identified, and potentially implemented, the organization intend to expand, to ensure that guidelines are understood
should either document or update its security program. This and implemented in the security program. When it comes to
document serves as the foundation of information security information security, both from a regulatory compliance and a
processes and practices throughout the organization, and most technical control perspective, it is more effective to stay ahead
likely would be one of the first documents a regulatory body of the curve than to work from behind it.
would request. The document should describe the governance
structure, including policies, and various controls and pro- Matt Suozzo is an associate director in Protivitis IT
cesses that help mitigate security related risks. Consulting and Internal Audit practices in Overland Park, Kan.

october 2016 Internal Auditor 67


Insights/The Mind of Jacka
To comment on this article,
email the author at michael.jacka@theiia.org

By J. Michael Jacka

Keep Your Promises

R
Internal auditors ecently, I saw a sign are aspirational; promises (if will periodic updates be
are only as good in a hotel elevator your word actually means cancelled? You say you will
that said, Your satis- anything) are immutable. use my time efficiently, but
as their word.
faction is more than Take, for example, how many times will my
a goal, its a promise. It was the date the report will be staff and I answer the same
just one in a slew of apho- issued. How often is the questions and provide the
risms that seem to permeate final report actually issued same information?
todays customer-focused on the date agreed upon In my former role, my
environment. However, this at the outset of the audit? team provided the audit
one caught my eye because it Does it often occur on a customer with a document
made an interesting distinc- revised date? Maybe the that specified, among other
tiongoals versus promises. testing takes longer than items, the background, time
Consider some of the anticipated, or the client frame, and scope of the
stated (and unstated) goals goes on vacation, or certain upcoming audit. Externally
internal auditors establish interviewees are unavailable, it was called the Terms of
with customers. At the or more report rewrites are Condition. Within my
outset of an engagement we required than expected, or group we called it our con-
talk to them about what we (fill in the blank with your tract. It represented a bind-
will accomplish, what we favorite reason/excuse). ing agreement with, and
need from them, and what Besides, the customer is promise to, our customer.
they can expect in return. often consulted and every- Internal auditors are
Generally, the discussion one agrees on the revised only as good as their word.
results in goals like provid- schedule, right? And it is a slippery path
ing immediate updates on Im sorry, but poor to begin saying there are
issues and concerns, get- planning is not a viable extenuating circumstances
ting the customers input excuse for going back on that mean we can go back
throughout the process, and a promise. And if every on that word. Something
using the customers time audit engagement includes as simple as a report issu-
efficiently. It also usually breaking a promise as ance date can be the start of
results in specific timelines simple as the date of final that slide, and it should be
for the ongoing completion report issuance, what is the viewed as a serious breach
of the engagement. customer to think about of commitment.
However, we underes- all those other promises?
timate the significance of You say there will be open J. Michael Jacka, CIA,
this customer interaction if communication, but how CPCU, CFE, CPA, is
we think of the agreed items often will I be surprised by cofounder and chief creative
as simply goals. They are something? You say you pilot for Flying Pig Audit,
promisesand this is not will keep me advised on Consulting, and Training
a trivial distinction. Goals progress, but how often Services in Phoenix.

Read Mike Jackas blog visit InternalAuditor.org/mike-jacka

october 2016 Internal Auditor 69


Eye on Business

Not just a manufacturer risk


Environmental, health and safety
(EH&S) risks can be found in every
type of organization.

Are there EH&S risks environmental and safety will cause a system to reset.
that are applicable to all regulations apply. Spent Other intertwined risks
organizations? fluorescent light bulbs include undefined expecta-
ANDERSON EH&S risks are regulated as universal tions, lack of knowledge,
are there; auditors just have waste. Fire suppression and misaligned incentives.
to open their eyes. Health systems that use halon are EH&S compliance risk
and safety affect every regulated, as are inspec- is absolutely tied to all of
company with employees tions and testing of fire these risks and all other
whether it is travel safety, extinguishers. Something operational risks.
internal building climate, as basic as a fire hose has ANDERSON While EH&S
or carpal tunnel syndrome. multiple construction, stor- matters are often covered by
The challenge is to make age, inspection, and test laws, rules, and regulations,
Scott Rois, CPEA sure internal audit considers requirements. this doesnt mean EH&S
Member the broad range of EH&S risks are only compliance-
IIA EHS Advisory Board
risks during its ongoing Are most EH&S risks related. Many risks are a
risk assessment. The audi- compliance-related and combination of operational,
tor cant assume there are independent of other financial, strategic, and com-
no high EH&S risks just risks? pliance. For example, the risk
because the organization ROIS If you ask EH&S of poor discipline in operat-
isnt a manufacturer of dan- professionals about risk, ing a manufacturing process
gerous products. they will initially talk about can generate waste. Waste is
ROIS Any commercial their compliance footprint. expensive and represents an
enterprise has EH&S risks. But if you ask about man- operating risk. Waste also
Large air-conditioning agement of change, theyll can be a hazardous material,
Doug Anderson,
CIA, CRMA systems on buildings must quickly agree that change meaning it is now a compli-
Managing Director be tested and repairs docu- is a real and ubiquitous ance risk. Ensuring waste is
IIA CAE Solutions mented. Backup genera- risk. One of the most com- reduced accomplishes both
tors are usually fueled by mon changes is personnel an operational and com-
underground storage tanks turnover; it can arise from pliance objective. Similar
subject to multiple require- either external business connections exist between
ments. Modern computer disruptions or internal compliance and reputational
systems have battery organic growth. In either risks or compliance and
backup systems where both case, personnel changes financial reporting risks.

Read more on todays business issues follow @IaMag_IIA on Twitter

70 Internal Auditor october 2016


To comment on this article,
email the author at editor@theiia.org

How do you assess the importance of EH&S risks? internal auditing, there are the well-recognized International
ANDERSON Like many risks, EH&S-related risks can be Standards for the Professional Practice of Internal Auditing,
complex. Assessing their importance will often require but the standards specific to EH&S auditors are not as
more than a simplistic understanding of the amount and well known. Some of the differences in the way EH&S
likelihood of fines that could be levied by a governmental audits are conducted may come from the differences in
agency if a regulation is violated. The first stepbeyond standards. Other differences likely come from different
identifying the EH&S riskis holistically considering regulatory environments and stakeholders. However,
the risks impact to the organization. EH&S risks fre- regardless of how practice has developed over the years,
quently impact operational, reputational, compliance, the fundamentals are the sameassurance and advice
and even strategic objectives. For each of these impacts, provided through objective, data-driven analysis and
the auditor should consider the nature and extent of the insight. Adherence to a set of widely recognized standards
impact along with other characteristics that define the helps all auditors perform better, and I would hope as the
riskfor example, velocity on onset and longevity of EH&S audit and internal audit communities come closer
impact. Of course, the importance of EH&S matters to together, we will all adhere more closely to standards and
the overall success of the business would likely be para- improve our performance.
mount, but other impacts can add up.
ROIS An EH&S failure can affect the environment, safety, Is EH&S audit part of the second or third line of
product quality, and product stewardship. An EH&S failure defense in an organization?
can also go beyond regulatory requirements and affect brand ANDERSON I have mostly seen situations where EH&S
image and company reputation. The most successful EH&S audit was a part of the second line of defense. As part of
programs are integrated with overall operating programs that line, these EH&S audit functions had significant
that combine common elements. Common and baseline levels of expertise, but it can be challenging for them to
controls like training, inspections, monitoring, and audits maintain both the appearance and reality of independence.
can address many of the same root causes. So EH&S risk When the EH&S auditors rotate through this function
is not separate from other risks and can cause or be caused from the areas they are auditing, or report directly to the
by those other types of risks. Success comes when the risks people they are auditingsometimes explicitly, but maybe
and controls are considered thoughtfully and systems are implicitlyat a minimum, the appearance of indepen-
designed to address the total risk. dence is challenged. EH&S audit in the second line can
be extremely beneficial to an organization. Being able to
Is auditing EH&S risk management different from deliver EH&S expertise throughout the organization from
other auditing? an EH&S audit function can be invaluable. However,
ROIS It is not different from other management system every organization needs to ensure that EH&S-related risks
audits, but it is very different from a compliance audit. are included in the scope of a third line of defense func-
Like all audits of management systems, it requires expe- tioninternal auditso independent assurance can be
rienced and knowledgeable auditors. All mature audit delivered to the board and executive management.
programs move from compliance, to management systems, ROIS That is the exact question raised by the U.S. Envi-
and ultimately focus on risk. When internal audit consid- ronmental Protection Agency (EPA) in its recently pro-
ers risk management, auditors need to address questions posed rule changes to the Risk Management Program
that are more nuanced, like leadership commitment, rules. The EPA proposed exalting auditor independence
employee involvement, incentives, risk identification, (third line of defense) over all other attributes, including
knowledge sharing, and management of change. While internal expertise. In that case, the Auditing Roundtable
there are yes/no questions in a management systems audit, (now merged with The IIA as the EHS Audit Center)
they call for subjective judgments by a skilled and experi- argued that both were possible as long as some administra-
enced audit team. tive controls were in place. Change and regulatory com-
ANDERSON Internal auditing is a profession with clear plexity mandate periodic review by subject matter experts.
disciplines and attributes that impact its success. In that way, External auditors also see different risks than operating
EH&S auditing is not unique. In addition, most auditors personnel, and they see risks differently. That said, there is
use common methods of obtaining information and analyz- a balance point between true independence and leveraging
ing it. The differences most likely fall into documentation expertise. The balance in each organization will be based
and reporting, and these can be significant differences. For on the specific needs of that organization.

october 2016 Internal Auditor 71


Insights/In My Opinion
To comment on this article,
email the author at chris.dogas@theiia.org

By Chris Dogas

The Ultimate Line of Defense

T
Senior management he Three Lines of company-level controls are Its role and influence are
should formally Defense model for routinely handled at the high- manifested in areas such as
risk oversight and est organizational level. Exam- balancing the demand for
occupy an overarching
controlwhich ples include setting operating productivity, growth, and
position of risk identifies operational man- objectives and targets, approv- bottom-line results with
oversight and agement as the first line, risk ing strategic plans, and sign- the need for a steady moral
control. and compliance functions as ing off on financial and tax compass and sound ethi-
the second line, and inter- filings. Senior managements cal practices; making senior
nal audit as the thirdhas involvement in these mecha- leader hiring decisions; and
received considerable atten- nisms is integral to overall establishing the structure of
tion over the last few years. control effectiveness. organizational reward systems.
And while much of that Corporate culture and To serve as an effective
attention has been positive, tone at the top, also areas of contributor, senior manage-
the model is by no means a senior management responsi- ment needs to play an active
perfect solution. In fact, one bility, maintain an important role in governance, risk, and
flaw in particular stands out: relationship to internal con- control. The Three Lines
Senior management, while trolsif the culture and tone of Defense model therefore
assigned oversight responsi- are weak, the internal control appears incomplete without
bility for the three lines, does structure will likely be ineffec- formal inclusion of senior
not itself occupy a line of tive. Senior management, of management as one of its
defense. Yet company officers course, sets the tone at the top dedicated lines. Assigning
actively own and operate and plays a large part in estab- senior management as the
several key controls, shape lishing a healthy culture. For ultimate line of defense
organizational culture, influ- these areas to function well, will strengthen the models
ence the control structure, senior management must not effectiveness and task senior
establish corporate gover- only possess the highest level management with formal
nance, and may be held liable of diligence, duty of care, and control ownership. It will
by regulators for financial ethics, but it must also project also help internal auditors
fraud and ineffective compli- exemplary leadership. and other assurance provid-
ance programs. The senior Senior managements role ers ask tough questions and
management team should is also paramount in achieving engage in more qualitative
not only occupy a defense effective governance. By way conversations on governance,
line, it should be considered of organizational configura- risk, and control.
the ultimate line of defense. tion and correct resource
Through its positioning allocation, it needs to establish Chris Dogas, CRMA,
and specific activities, senior sufficient checks and balances CPA, CFE, is head of
management plays an essen- and appropriate independence finance transformation and
tial role in the organizations to foster transparency and compliance for a large global
internal controls. Indeed, objective decision-making. company in Boston.

Read more opinions on the profession visit our Voices section at InternalAuditor.org

72 Internal Auditor october 2016


Theres a
Center For You
Stay ahead of the
curve on the issues
that matter most to you
and your stakeholders.

Learn more at
www.theiia.org/SpecialtyCenters
2016-0776

2016-0776 MEM-Centers Integrated Aug IA Ad-5.indd 1 6/21/16 1:51 PM


When you have to be right

TeamMate

Auditing Culture - A Red Flag Approach


Is auditing culture just another risk factor
in a governance audit, or could it be seen
as the basis for the entire audit plan?

Read Our Latest Report at


TeamMateSolutions.com/RedFlag
Copyright 2016 Wolters Kluwer Financial Services, Inc. 10091

Вам также может понравиться