IA Middle East
IA Middle East
IA Middle East
ME
The Journey to
Excellence in
Internal Audit
Dear Readers,
On behalf of the Board of Governors and Executive Committee, our Key Partners and
staff of the UAE Internal Auditors Association; let me wish you all Eid Mubarak.
We had a very eventful month of May – the International Audit Awareness Month. The
UAE IAA conducted several sessions advocating the internal audit profession. The UAE
Internal Auditors Association and the Institute of Chartered Accounts of India held the
3rd joint event in Abu Dhabi titled “Partners in Progress” which was attended by 400+
delegates. Awareness sessions were also conducted in several universities to initiate the
students towards the profession of internal audit.
The mega event in this month was the 3rd Internal Audit Government Forum which was
held under the Patronage of HH Sheikh Ahmed president of the Dubai Civil Aviation
Authority, CEO and chairman of the Emirates Group and chairman of Dubai World in
collaboration with the Dubai Aviation City Corporation (GIARA).
The International Conference 2018 is to be held in Dubai and all efforts are being made
to ensure that we break all yesteryear records. The UAE IAA invited the members of the
IIA Global to visit Dubai for discussions. The fruitful discussions ensured that we are
on the right track for a successful conference. All the major items were ticked with roles
and responsibilities defined. The end of discussions left both, the UAE IAA and The IIA
Global, well-satisfied and confident.
The 4th batch of HASAAD was conducted recently in Abu Dhabi. What was so unique
about this batch was the fact that it was the first batch of HASAAD conducted in Arabic.
This is an extremely significant achievement for us as it gives us the confidence to tap the
government sectors. The HASAAD program is an extremely important program for us as
it enables young aspiring UAE Nationals to come into the main stream of internal audit
profession. I congratulate the graduating students of the 4th HASAAD batch.
Summer holidays are round the corner and you all must have made your holiday plans. I
wish you a very joyous holiday and look forward to engaging with you on return.
Regards,
Audit
Controls
Analytics
To achieve new heights, finding the right balance of audit tools is essential. Only
TeamMate offers an integrated set of solutions that include the industry’s leading
audit management system, an innovative controls management system and
powerful data analytics.
Copyright © 2014 Wolters Kluwer Financial Services, Inc. All Rights Reserved. 3946
INTERNAL AUDITOR
MIDDLE EAST JUNE 2017 WWW.INTERNALAUDITOR.ME
F E ATU RES
16 COVER STORY: The Journey to Excellence in Internal Audit
What is The Roadmap to Initiating a Quality Assessment? by Ninad Pradhan
DE PARTMENTS
4 Reader Feedback 8 UAE-IAA Events 10 IT Audit
What are the common mistakes
6 Knowledge Update 27 Fraud Risk IT auditors make while audit-
What a Fraud Response Plan ing the Logical access area BY
Internal Audit’s Critical Role in
should contain Melhem Khoury
Cyber-security, Global Technology
BY David Clements
Audit Guide (GTAG): Understand-
ing and Auditing Big Data, Protiviti 31 Frosting Fundamen- 12 Risk management
Are Emerging Risks really differ-
Survey on Sarbanes-Oxley Compli- tals ent from Conventional Risks ?
ance 2017, Mining business in- What are the steps that are cov-
BY Porus Pavri
sights from the audit - Audit Value ered as part of the annual internal
Survey by Deloitte, 2017 State of audit planning process?
the Internal Audit Profession: Study BY Arif Zaman
by PWC
BY VISHAL THAKKAR
OR
D
MID
ensuring the addition of real value through audit responsibilities and priorities of corporate governance.
assignments. Innovation creates new opportunities for the establishment and
Critical Thinking: That is achieved by applying professional doubt, increases its competitiveness, and these opportunities must be managed
applying different tools and techniques to extract data and adopting in the same way of risks are managed to which the establishment is/
problem-solving techniques that help the internal auditor solve complex may be exposed to. Opportunities that cannot be well managed will
situations and propose solutions that ensure developing the functions turn into risks that might have been avoided, noting that “Collapse”
being audited. exists at the top of these risks as reported in the article. In my opinion,
if any competitive advantage is not accompanied by development and
Improvement and Innovation skills: When the internal auditor has such innovation, it will not remain an advantage on which the establishment
skills, this ensures his work as a key player of change and continuous can rely for maintaining its sustainability.
improvement which supports the establishment in achieving its
Innovation, renovation and creativity must be a top management
objectives by rendering them as part of the change management process priority, and since traditional and old methods are no longer useful,
within the establishment and adopting change by explaining benefits there must be innovative alternatives to develop, maintain and keep
and encouraging coworkers on the same. sustainability of the establishment to be an effective competitor in its
sector.
Mahmoud El Bagoury Alaa Abunbaba CPA, CIA, CRMA, CICP, MACC
Chief Internal Auditor for a group of commercial companies Head of Audit and Institutional Excellence
operating in the Middle East
IFA GROUP - The International Financial Advisors Company (IFA)
GRCA, CPIA, CICA, CERTIA, QIA - Kuwait
UAE Internal Audiors Association
ARABIC RE VIE W TE AM C O N TAC T IN FO RMATIO N
Qais Hamdan, CISA, CISM, PMP (Lead MARK ETIN G & SO C IAL MED IA
Member) Alaa Abu Nabaa, MACC, CIA, CRMA,
CPA, CICP
Khalid M. Alodhaibi, SOCPA
[email protected]
INTERNAL AUDITOR
Waleed Sweimeh, CIA
MIDDLE EAST
ADVERTIS IN G &
JUNE 2017 Noora Ayoob AD MIN IS TRATIO N
VOLUME 2017: 2 Saif Kaddourah, MBA Yasmine Abd El Aziz
Internal
Audit’s
Critical
Role in
Cyber-se-
curity
http://www.accountingweb.com/aa/auditing/ https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/
internal-audits-critical-role-in-cybersecurity Pages/GTAG-Understanding-and-Auditing-Big-Data.aspx
58%
SOX work continues to be viewed as having a positive effect: Overall, three out of four
organizations reported that their internal control over financial reporting structure has
improved as soon as they started complying with SOX.
https://www.protiviti.com/US-en/insights/sox-compliance-survey
New regulations
36%
percent of C-suite executives and 48 percent of audit committee members don’t have
processes in place to make better use of audit findings. According to 79 percent of
C-suite executives and 94 percent of audit committee members, increased transparency
of financial statement audits would improve performance of the company. About the
same percentage stated that financial statement audits reveal what their companies Financial challenges
34%
could do different or better.
Executives participated in the survey stated that they want information processing
of audits even further. They want audits to provide a wider range of strategic and
Technological challenges
operational insights that go beyond financial reporting. At the forefront: information
about spending patterns, assessment of how effective the company’s business processes
https://www.pwc.com/us/en/risk-
are and recommendations for improving operations.
assurance/sotp/2017-state-of-the-internal-
https://www2.deloitte.com/us/en/pages/audit/articles/audit-value-survey.html audit-profession-report.pdf
UAE IAA held its 18th Annual regional conference at Jumeirah who stated that UAE Internal Auditors Association is playing
Etihad Towers, Abu Dhabi from April 18 - 20, 2017 .The 2-days a key role in facilitating education of internal auditors in our
conference is the largest “Smart” meeting and a premier Internal country by offering an invaluable training and education to its
Audit event in the MENA region and was attended by over 700
almost 2,000 members and working effectively to increasing the
participants consisting of heads of organizations, experts and
number of Emirati auditors. Sheikh Nahyan had honored the key
professionals from internal auditing and various other industries
from the GCC countries and beyond. The conference was under note speaker Mr. Mohamed Jameel Al Ramahi, CEO Masdar and
the patronage of His Excellency Sheikh Nahayan Mabarak Al Mr. Hassan Al Mulla, President of IIA Qatar with the Lifetime
Nahayan, UAE Minister of Culture and Knowledge Development, Achievement Awards, at the conference.
IT Risk Assessment
The devil lies in the details, IT risk evolved to provide support for building technology dependent environment. This
assessment and IT risk management, IT audit project plan. Further, financial entails identifying a risk such as denial
what detail differentiate them? With the auditors became more dependent on the of service attack and quantifying the
growth in the need of Information security outcome of the risk-based IT audits to probability of the risk happening.
substantiate their audit scope.
and risk management, the terms IT risk The best method to arrive to an
assessment and IT risk management could IT risk assessment is a component of acceptable risk value is to apply the
be confusing to most of executives dealing the IT audit process. Regardless of the
following equation:
with risk-based audits and compliance of framework and methodology used, it
focuses on identifying technical risks in a Risk = Asset x Vulnerability x Threat
the organization.
Assets are given a coefficient values based IT risk assessment benefits auditors and IT Risk assessment is the result of [IT
on a certain range. Any quantitative range reviewers in many ways essential to the risk management] less [IT risk treatment
used can be qualitatively mapped to the understanding of the IT environment.
options].
ranges of the other factors. The objective
Industry model is beneficial in providing
is to arrive to a risk rate mapped to a It is used to prioritize the review areas of
aid to contemplating the risks associated
tolerance scale, usually: High, Medium the IT environment. Below is an example
with a specific setup in a specific industry.
and Low. Although the usual practice
This is done using methods such as of how review can be executed based on
is to use same scale, the following table
brainstorming, which is a very effective IT risk assessment output. For a complete
illustrates an example of the different
technique following Osborn’s method.
options that can be used as different review, auditors have to examine the
In another sense, IT risks are not fixed
scales: details of the process in a substantial
in a stateless condition waiting to be
IT risk assessment is part of IT risk identified. IT risks are variable in nature manner. For a selected targeted review,
management, which entails treatment and comprise of vulnerabilities and auditors have to examine a targeted sample
plan. In IT risk assessment, the treatment associated threats. Identifying risks is a (60% or 70 %) of the details of the process.
options are unnecessary. The High, direct exercise when auditors consider the
For a random selection review, auditors
Medium and Low values are used as above equation.
have to examine a random sample of (30%
input for other tools, mainly IT audit The values of identified risks are called
to 40%) of the details of the process.
plan. IT auditors benefit from the IT risk
assessment in many ways that involve
understanding of the IT set up, an
overview of the structure of the IT, and IT Operations - High Risk Email and Storage - Connectivity, remote acces,
a snapshot of the risk areas of the IT. For (complete review) Medium Risk (selected and internet - Low Risk
targeted review) (random selection review)
these reasons, IT risk assessment should
January February March
be a prelude to audits and other review
Table 1: Sample Quarterly IT Audit Plan
initiatives of the IT environments.
inherent risk scores and they represent Finally, the IT audit plan needs to align
IT risk assessment methodology change the risks as naturally provided through to the overall internal audit plan. In
for different environments and different the initial risks identification process.
principle IT audit is part of the internal
industries, but the core objective is to Inherent risks have associated controls
audit operations. The IT audit output feeds
identify areas, with certain risk values, that are applied in a reactive manner to
the underlying asset. An example can be, to internal audit plan and provides input
where an intensive review should be
conducted. For a bank, for example, major password protection to a server, a locker to the internal audit planning process,
risks lie in operations and for a retail in to a network switch, or a review of a in which internal audit head plan for the
certain log. Subsequently, controls can be
POS. In that view, industry should also IT audits. Whether audits are performed
categorized as detective or preventive. As
be a factor in building the risk universe based on risk assessment or not, IT risk
much as preventive controls are preferable,
(the set of applicable risks), which help in assessment remains a necessity to pave the
they are expensive to implement. When
building an overall business operational
going through another round of risk way for IT auditors to perform their jobs.
understanding, when planning for risk
assessment exercise and considering In environment where risk assessment
based IT audits. existing control measures, we produce a
is conducted for all operations, IT risk
Most conspicuously, IT risk assessment is list of residual risks. Essentially, residual
assessment will align with the overall risk
a prerequisite to IT audit, mainly to reduce risks are the main factors in building a
the audit efforts where risk is low and to risk treatment plan or, in our initiative, assessment plan to create visibility to the
substantiate audit procedures where risk is in understanding the IT environment, in business operational and IT risks.
high. While it is unnecessary to implement provisioning for IT audits, and in planning
By Melhim Khoury Nicolas, Technology
a treatment options for the identified risks, review initiatives.
Consultant, MBA
The world is becoming an increasingly Chernobyl (1986), Toyota (2010), Nokia the absence of a reliable and effective (i)
riskier place for organizations of all types (2013), GM (2014), Yahoo (2016) ? Framework and (ii) System for managing
and sizes – whether in the private or public Emerging Risks.
sectors. Environments, 100-year old busi- Was there something common that was
missing in all these systems, which lead
ness models, social and political dynamics
to the infamous catastrophies ?
A Definition of Emerging
are being disrupted everywhere. A quick
look at some of the more recent corporate Risk :
disasters bears testimony to this. Yes, you guessed it right! They were NOT
managing the warning signs, the dan- Emerging Risk can be defined as a
And then, what about the Titanic (1912), ger signals on their horizons, owing to newly developing or changing risk, that
Catastrophe (& Estimated Cost) Why ? Because they did not foresee / understand / com-
municate…
2008 Global Financial Crisis (trillions of dollars) ...the gigantic risks inherent in the complex financial products that
were created, rated and regulated by the global financial institu-
tions, ratings agencies and regulators!
2010 Deepwater Horizon blow-out ($60bn) …the risks lurking under a culture of complacency and informa-
tion withholding, within a hugely complex operation!
2011 Fukushima nuclear reactor meltdown ($188bn) …the possibility of a tsunami in its disaster preparedness sce-
narios – because the last tsunami occurred over a 1000 years ago!
2012 Kodak bankruptcy …the fatal risks to their business model emerging slowly but
surely from the digital camera revolution!
2015 Volkswagen Emissions scandal ($40bn) …the risks brewing internally from a closed, dictatorial culture,
and a top-down “win-at-any-cost” mindset driven by the Chair-
man of the Board!
is extremely difficult to quantify, but 3: Changing social, economic or political strong mindset at all levels of the entity
nevertheless could have a major impact dynamics to deal with emerging risks and oppor-
on the achievement of your organization’s tunities by:
4: Untested technological advances
objectives.
5: Inadequate multi-directional communi- (a) establishing explicit incentives that
Are Emerging Risks really different from cation encourage horizon scanning
Conventional Risks ? If so, in what way?
6: Perverse incentives (b) removing any perverse incentives
All risks by definition arise from uncer- that discourage horizon scanning
tainty. When a Risk Manager creates a Risk I would strongly recommend all risk and
Profile, a conventional risk has several internal audit professionals reading this (c) encouraging the bottom-up flow of
dimensions of uncertainty, such as (1) article to visit www.irgc.org to gain a better contrarian views that challenge the
likelihood (2) frequency (3) timing (4) im- understanding of the above, and more, status quo, the reporting of unusual
pact, (5) velocity as in the speed at which factors. events, the avoidance of “group think”
the risk could manifest itself, (6) vulner-
ability/readiness as in how prepared your Governance Framework 3. The “Training” layer requires the Board
organization is to respond to the risk, and
Having gained a high level understanding and senior management to establish
(7) duration of impact.
of the definition of Emerging Risk and the training programs that teach staff and
Now, an Emerging Risk has the exact same Contributing Circumstances, let us now executives at all levels on how to:
dimensions of uncertainty, BUT you could turn our attention to what constitutes the
( a) undertake horizon scanning
say that the degree of uncertainty is multi- Governance Framework for managing your
plied by a factor of say 10 or even 100 – this Emerging Risks. ( b) communicate clearly about poten-
is the basic difference in a nutshell ! tial emerging risks
The Governance Framework comprises 3
Some implications of this are: layers: ( c) work in teams to improve under-
standing of, and response to, emerging
i) a risk which is emerging today, may 1. Strategy & Roles
risks
become a conventional risk after a
2. Culture
period of time, as we get more and
more knowledge about its risk profile 3. Training
The 5-step Emerging Risk
through research, analysis, etc…., and Identification & Manage-
as the uncertainty around the above 7 1. The “Strategy & Roles” layer requires ment System
dimensions diminishes. the Board and senior management to:
And finally, let us introduce the iterative
ii) w
hat might be a current risk for Organ- (a) f ormulate and embed the Emerging system that functions within the Govern-
ization A, may still be an emerging risk Risk strategy into the overall organi- ance Framework, and which will help you
for Organization B. zational strategy identify and manage your Emerging Risks
and Opportunities
(b) c larify the roles and responsibilities
Contributing Circum- of the various actors in the manage- STEP 1 – Early Warnings:
stances ment of Emerging Risks – the Board, • DETECT signals on the horizon and
Senior Management, Risk Managers, EXPLORE possible future situations that
What are the broad categories of cir- Line Managers, Internal and External may represent an Emerging Risk in the
cumstances which give rise to Emerging Auditors, and Regulatory Authori- short & medium term
Risks ? ties. But, the most important role in • CREATE A RISK PROFILE of these
the Governance Framework is that signals and situations
Once you understand these ‘contribut-
of the Emerging Risk Coordinator, • FILTER & PRIORITIZE the list of Early
ing circumstances’, you will look for these
who acts like the glue that binds the Warnings to carry forward into Step 2
circumstances on your entity’s horizon,
various interested parties together. • Regularly update the above filtered list
helping you identify your emerging risks
His overarching aim is to ensure that
better ! STEP 2 - Scenarios
emerging risks and opportunities are
handled effectively and efficiently • DEVELOP comprehensive set of scenar-
Here’s a short list to set you thinking:
to help the organization achieve its ios for each Early Warning coming from
1: Complex systems objectives. Step 1, including those Scenarios relating
to “low-probability-catastrophic impact”
2: Closely interconnected system compo- 2. The “Culture” layer requires the Board events (“Black-Swan” events)
nents and senior management to establish a • Regularly update the above scenarios
Note: Scenarios under Emerging Risks vs Conventional Risks In Conventional Risk • IDENTIFY Windows of Opportunity
Management, only those Scenarios which are considered probable today, and have a during which the risk management
probability attached to them, preferably based on past experience, are used in the Risk option can be applied, Failure Thresh-
Analysis. We do not consider events that might occur based on possible, though not
olds after which it will be impossible to
probable, scenarios ! For instance, risk analysis of non-nuclear infrastructure does not
normally consider the probability of a plane crashing into the infrastructure. effectively manage the emerging risk, and
Acceptability Thresholds below which
On the other hand, Scenario building for Emerging Risks Management considers all
it will not be necessary to manage the
risk events that might happen in future AND all possible combinations of risk events,
EVEN IF no reliable probability estimates are available. emerging risk
Let’s say, in a piping system in a factory, 50% of the pipes are more than 10 STEP 4 – Implementation
years old, and the rest are between 0-10 years old. Up until now, no problems • Establish internal and external commu-
have been detected in the new pipes.
nication channels
However, after reading an article in the IIA UAE magazine about Emerging • Allocate resources
Risks, the Risk Manager and the Factory Manager in consultation with the • Clearly define roles, responsibilities and
Maintenance Manager and the ERC, find that, in the summer months, owing
to excessive heat in the rear of the factory, all pipes experience a certain degree incentives
of expansion. If the temperature climbs even 1º beyond NNº, the stress in the • Ensure adequate authority in line with
piping system could cause multiple domino-style ruptures throughout the responsibility for implementation
piping system in the factory, with consequent chemical spillage, a major explo-
sion if the inflammable storage tanks in the factory compound were caught in STEP 5 – Monitoring
the midst of the spill, severe damage to the office building in the adjacent plot,
along with loss of life and property. This risk has never materialized in the • Monitor how emerging risks and oppor-
past, and there is no available probability distribution for this risk event.
tunities are unfolding
The Risk Manager and the Factory Manager however realize how negligent
they have been till now, by not considering such scenarios in their earlier risk • Review relevance and performance of
assessments, and have vowed to carry on the good work in all their risk assess- decisions made and options chosen
ments from now on.
• Update the risk management options
STEP 3 – Decisions the entity’s objectives, if left unmanaged
• Involve external experts to assess how the
• DECIDE which Scenarios to follow • IDENTIFY & EVALUATE possible risk
through for managing the related Emerg- management options [Refer Note below] process is doing
ing Risk – based on which scenarios have for each Scenario relating to a given
the highest impact on the achievement of emerging risk Conclusion
Globally, stakeholders are pressurizing
Note: Risk Management Options boards and managements to enhance
their organisations’ ability to look into
1. A
ct on the Contributing Circumstances, try to influence them in order to mitigate
the future, to pick up signs of trouble and
the emerging risk
address them BEFORE they manifest
2. Avoid the emerging risk totally themselves in the form of events. If you, as
3. R
educe (i) your organisation’s exposure to the emerging risk, by reducing the a Risk or Audit professional do not want a
exposed assets, businesses or processes, or (ii) your organisation’s vulnerability by “Titanic” moment on your CV, I strongly
developing resilience. Resilience is defined as the ability to withstand shocks and recommend you stir your organization out
return to normal operations in reasonable time.
of its slumber, and kick-start the establish-
4. R
aise your organisation’s risk tolerance limits in line with its higher risk appetite, by ment of a framework and a system for
setting aside more funds to cover potential losses, or by transferring part of the risk
managing your Emerging Risks !
to a third party.
responsibility on the shoulders of the Chief The QAs can be called for by either the • Determination that the internal audit
Audit Executive (CAE) to fulfil the needs Chairperson of the AC or the CAE. activity adds value and improves the
and expectations of the stakeholders; whilst There are no statistics, but, experience organization’s operations
complying to their own professional ethics has shown that when the AC calls for the
It provides the IA departments to delve
through conformance to the Standards.” QAs, there is usually some lack of trust or
into the minds of their stakeholders
deliverables between them and the CAE
Compliance and conformance alone and gauge their level of trust in the IA
with such assessments ending up on the
fail to leverage the power of a Quality department and its functioning. The
“not favorable” side of the assessment
Assessment. independent nature of the external assessor
scale as against when the CAE calls for
also provides for an opportunity to ask
Quality Assurance and Improvement the assessment. CAE’s may well wish to
certain questions which can be used for
Program (QAIP) consider this point and “stick their neck
out” and call for QAs on their department further probing to provide further value
The QAIP has 2 elements which need to added service. The CAE gets a holistic
– of course with adequate preparation
be collectively addressed to conform to picture of what is happening around him/
and planning as the outcome of the
Standards 1300. her without ruffling too many feathers.
assessments requires to be communicated
1. Internal Assessment; and to the Board/AC. The QA assessors take care of those
uncomfortable questions.
2. External Assessment A quality assessment, or QA, evaluates
the compliance with the Standards, the Think for a minute how many times the
Many IA departments demonstrate phone rings for a CAE or an email with
definition of internal auditing, the Code
the adherence to the IA plan and
of Ethics, the internal audit & audit a request – sometimes an urgent one –
department budget as their KPIs.
committee charters, the organization’s requesting for help in either a certain
However, internal assessments
governance, risk and control assessment review or in some investigation. The
also require to perform on-going
and the use of successful practices. number of consulting activities can be
assessments which can include
work-paper review, staff performance So who audits the auditors? When an an indicator of how much value-added
evaluation, auditee satisfaction surveys, IA department undergoes a QA, it can resource the IA department is considered
monitoring of KPIs, Actual v-s Budget, proudly say that they too have been by the organization’s management. With
etc. IA departments also require to assessed. The rating mechanism of a the level of such engagements rising the
perform periodic self-assessments. QA can be either “General Conforms”, perceived value that the IA department
(Note: this is not an exhaustive list). “Partially Conforms” or “Does Not is adding is definitely proportionate. As
Conform”.
External assessments must be they say – a voice but no vote at on the
conducted once every 5 years by a management table.
qualified and independent assessor
QA scope
from outside the organization and
reported to the Audit Committee Typically, a QA scope covers Benefits of a QA
(AC). And this is one point many IA
•C
onformance with the Standards CBOK surveys have revealed that the top
department overlook, especially those
who are large conglomerates. Whilst & the Code of Ethics & the IA’s 5 reasons for investing in a QAIP are
there are no defined qualifications charter, plan, policies, procedures
1. Identifying areas for improvement
which an assessor should have, and applicable laws & regulatory
they should largely demonstrate requirements 2. Full conformance to the Standards
competency in two areas: The
• Th
e expectations of the IA as 3. B
ring systematic, disciplined
understanding of the IPPF and the
expressed by the board, executive approach
external assessment process.
management and operational 4. I ncrease credibility within the
The Roadmap to Initiating a Quality management organization
Assessment
• Th
e integration of the IA into the 5. A
nticipate, meet and/or exceed
The UAE Internal Auditors Association
governance process, including the stakeholder’s expectations
(UAE IAA), ensures that its assessors
relationships between and among the
have undergone the QA course offered Further, the survey concludes that,
by the IIA and have a certain minimum key groups involved in the process
when compared to other internal audit
experience without which they are not •T
ools and techniques departments, those that conform to the
considered for the engagements. The
•M
ix of knowledge, experience and quality standards:
UAE IAA adopts the IIA’s proven and
documented methodology – The Quality disciplines within the staff, including • Were more likely to have complete
Assessment Manual. the focus on process improvement and unrestricted access to
information as appropriate for the conducted independently. The Chief who understands the QA process. And
performance of audit activities Audit Executive (CAE) is able to lay attending a training session for a QA
emphasis on the expectations spelt course will prove beneficial.
• Made more use of technology in
out.
internal audit processes The QA cannot be done in isolation
6. The CAE can use this opportunity from the audit committee and hence it is
• Used a wider variety of resources to
to lay emphasis and focus on the imperative to appraise them of the exercise
develop audit plans
IPPF and raise the awareness of The and the credentials of the team engaged
• Were more likely to have Standard amongst the management.
to conduct the same. Having the audit
documented procedures in an
7. Overall, the reputation of committee on board is vital.
internal audit manual
organization is enhanced. This, due
Historical data is proof that when a QA
• Received more hours of training and to the fact that nothing and no one
were more likely to have formalised in that organization is immune and is called by the CAE, the chances of a
training programmes is subjected to audit. It is a sign of a successful QA are significantly higher than
mature organization which is willing when called for by an audit committee. So,
• Served organisations with more prepare well, and go for it. Do not wait for
to learn and improve.
highly developed risk management
your audit committee to instruct you on
processes
this one.
• Were more likely to report that
Quote 1
funding for the internal audit
function was “completely sufficient”. “Thanks to the IAA UAE Team for the
Conducting a Quality Assessment great efforts exerted during the quality
exercise offers the internal audit activity assurance review done for our department.
several benefits. The Audit team was very professional,
systematic and helped us towards further
1. It offers an opportunity to
improving our quality performance,
benchmarked against other IA
professionalism and use of best practices.
departments. The Global Audit
Itwas a great experience indeed!!”
Information Network (GAIN) is also
a good tool to use. Tamer Said Ali, Deputy Chief Internal
2. The conducting of the QA is in itself Auditor, Obeikan Investment Group
adherence to full conformance to Quote 2
The Standards. This permits the IA
activity (if the assessment results How to be Successful in a QA? “Let me express my appreciation to
permits so) to insert the statement excellent work done during the quality
QAs require tremendous commitment
“This audit is conducted in assessment review you’ve recently
from each and every staff of the IA
conformance with ………..” within completed for our internal audit
department. It calls for commitment
its audit report and can also state department. It was a fruitful exercise
to quality (Mission/Vision/Values/
that the department itself conforms and we welcome the improvement
Goals/Objectives/KPIs), drafting of
with the requirements of the IPPF. opportunities highlighted to enhance
policies and procedures, demonstrating
3. This lends credibility to the IA continual improvement, monitoring the quality and performance of the
activity and increases the perceived and reviewing mechanisms and their department.I assure you that your value-
value of the activity within the subsequent reporting to the Board/AC – as added recommendations will be acted
organization. a minimum. Conducting periodic internal upon fully and promptly. May I also take
assessment, plugging the identified gaps, this opportunity to thank you and your
4. The typical question of “Who audits
and a formal documentation of the QAIP team for the professional approach and
the auditors?” also gets answered.
is a large step forward. courtesy displayed by the team”
The IA activity being subjected to
the assessment which is conducted ConclusionThe Next Steps? Beelall Ramdianee, Vice President –
by independent assessors lends Internal Audit, Dubai International
It is quite certain that the benefits from
credibility to its activities.
a Quality Assessment far outweigh Financial Centre
5. QAs also give an opportunity than not going for it. But this also calls
to meet or exceed stakeholder for good preparation at all levels with NINAD PRADHAN, CRMA, MBA, PGDC-
expectations as a result of the the department hierarchy. To begin, SM, BSc Senior Consultant & Trainer at UAE
interviews and surveys which are it is important to have a project leader IAA
Profiling cyber-
criminals
Since the middle ages era, the definition of crime has been
limited to types of crimes committed in the physical world. In
the same way, theories aimed at explaining crime including
the Conflict Theory, the Theory of Social Control, and others,
have defined crime within the confines of the physical world.
Strategies aimed at dealing with criminal activities have been
limited in their scope when defining crime within the context of
the physical world. However, the growth of information systems,
ICT, mass media, and increased interconnectivity, facilitated
by the internet, has revealed a new and unique form of crime: characteristics and behavioral patterns shared by criminals.
the digital world crime. These types of crimes present several Inductive profiling is also theory-driven and based on the available
challenges including legal, geographic, and web barriers, as well cases of crime. Inductive profiling relies on information collected
as the anonymity of the internet. The environment in which these through interviews with offenders, and this forms the foundation
crimes occur also pose a challenge to crime specialists. These for investigators’ profiles. Again, the inductive profile technique
challenges have created the need to identify and modify techniques involves hypothesis (formalized operational definitions) for
used to combat crime committed in the physical world, such testing, and coding of data to allow for statistical analysis.
as criminal profiling with a view to making them applicable to
e-crimes. This paper discusses the possibility of penetrating these Applicability of these techniques has been possible in crimes
barriers by applying the modified version of criminal profiling committed in the physical world. However, applicability of these
techniques to e-crimes. techniques to deal with crimes committed in the digital world
is still debatable. It has been argued that criminal profiling is an
The concept of crime has expanded beyond the immature, but promising, science. Perhaps this may explain that
physical world to the global digital world. little attention has been given to such technique by both academics
and practitioners. In the digital world, forensic psychologists
have knowledge about the law, criminology and psychology. This
Profiling Cyber Criminals in the physical world can be used to better understand technological aspects relating
to crime, in order to develop cyber-criminal profiles. As such,
Since the 1970s, experts within the Behavioral Science Unit they are required to take an interdisciplinary approach when
(BSU) of the FBI have been helping federal, state and local law
dealing with cyber crimes. Unfortunately, highlighted issues of
enforcement agencies investigate violent crimes. This practice was
tractability, geography, law and anonymity makes it difficult for
initiated through offender profiling, with a view to understanding
forensic psychologists to collect information about criminals and
personality and behavioral traits of perpetrators. It started as
cyber-crimes (Tompsett, Marshall, and Semmens, 2005). Again,
an analytical technique for identifying the characteristics of
most cyber-crimes go either unnoticed or unreported, and hence
the offender, based on examination of crime scenes and crime
go unpunished. Importantly, it is possible to draw some parallels
dynamics, and continued developing over the years as a tool to
help investigators narrow a suspect pool (Alison et al, 2010). between non-cyber-crimes and cyber crimes. It is also possible to
Offender profiling was offered within the BSU as an analytical tool develop a profile from the existing techniques that can be used for
and a product of training programs. law enforcement.
•C
rimes driven by emotional reasons (ie, cyber-stalking). The four-step approach is:
•C
rimes committed and driven by sexual impulses (ie, • Victimology.
paedophiles). • Motive identification.
•C
rimes known to be less dangerous, such as sharing software • Identifying offender characteristics.
by individuals, or sharing copyrighted movies (Shinder, • Forensically analyzing digital evidence.
2010).
The second step is motive identification – what is the reason for Conclusion
the crime?
The techniques and tools discussed in this paper are worth testing
Victimology and motive leads to the third step – identifying in practical scenarios. It is believed that if cyber-criminal profiling
offender characteristics. Several topologies and ways to classify is used effectively, the issue of cyber-crime may be reduced as more
cyber-criminals based on offender motives have been introduced offenders could be brought to justice. Considering the current
(Rogers, 2006). However, changes in criminal behavior with the trend of increasing rates of cyber-crimes, it would be important
evolving technological environment necessitate modification of
for academics and practitioners to collaborate. These practices may
existing schemes. Other studies have suggested that crime can
be addictive, and in the cyber world, criminals become addicted be useful for law enforcement officers, as it may help them gather
to the internet and computers (Nykodym et al, 2008). It is also legally valid and binding evidence in order to take appropriate
argued this addiction, aided by various opportunities including the actions against these cyber-criminals.
access and availability of the internet and computers, and fueled by Cyber-criminal profiling is a tool which could bring
criminal motives, could facilitate the making of a cyber-criminal.
This understanding may be used in analyzing the modus operandi more offenders to justice.
of cyber-criminal.
Modus operandi reflects criminal character (Lickiewicz, 2011). References
For instance, a cyber-criminal may destroy information by using
a virus that is attached to an e-mail, while another may hack Alison, L., Goodwill, A., Almond, Louise, Heuvel, C. and Winter,
into a computer system by attacking the server with a view to J. (2010) Pragmatic solutions to offender profiling and behavior
stealing information. This suggests that one’s technical expertise investigative advice. Legal and criminological psychology, 15, 115-
helps him or her to understand the behavior of a cyber-criminal. 132.
A cyber-criminal may be required to have a level of technical
efficacy successfully penetrate a sophisticated and secure network Kirwan, G., and Power, A. (2013). Cybercrime: Psychology of
(Kirwan and Power, 2013). On the other hand, ‘script kiddie’ may cybercrime. Dublin: Dun Laoghaire Institute of Art, Design and
use an already developed program to attack a computer system. It Technology.
is worth noting that human elements, such as social engineering
skills, possessed by some professional cyber-criminals should Kwan, L., Ray, P. and Stephens, G. (2008). Towards a Methodology
not be disregarded. This is because cyber-criminals with average for Profiling Cyber Criminals. IEEE Computer Society.
technical skills can participate in a crime by employing simple Proceedings of the 41st Hawaii International Conference on
techniques of subtle psychological manipulations and friendly System Sciences.
persuasion. Kirwan and Power (2013) affirm that technical skills
and other skills, including social skills and motives, determine the Lickiewicz, J. (2011). Cyber Crime psychology-proposal of an
modus operandi of a cyber-offender. offender psychological profile. Problems of forensic sciences, 2(3):
Step four of the deductive cyber-profiling technique involves 239-252.
forensically analyzing digital evidence. Digital forensics are Nykodym, N., Ariss, S. and Kurtz, K. (2008) ‘Computer addiction
important, because it is the means through which a cyber- and cyber crime’. Journal of Leadership, Accountability and Ethics,
criminal profiler can trace the offender in the event there is no
35: 55-59.
physical evidence (Kwan, Ray and Stephens, 2008). In the view of
Lickiewicz (2011), not all criminals are traceable, as one of three Rogers, M. K. (2006) ‘A two-dimensional circumplex approach to
cyber-criminals manages to remove or modify the audit trail by the development of a hacker taxonomy’. Digital Investigation, 3 (2):
wiping their traceable digital footprints. The four-step approach 97-102.
suggested is an iterative process. New information regarding the
offender, motive, victim and forensic evidence could be revealed Shinder, D. (2010) Profiling and categorizing cybercriminals.
while in an investigation proceeds. Retrieved on 6th July 2016 from http://www.techrepublic.com/
As for inductive profiling methods, they can be applied alongside blog/security/profiling-and-categorizing-cybercriminals/4069.
the deductive techniques described above, to help deal with cyber- Tompsett, E.C., Marshall, A.M., and Semmens, C.N. (2005).
crimes. For example, statistical analysis data studying demographic
Cyberprofiling: Offender Profiling and Geographic Profiling of
characteristics and behavioral patterns shared by criminals, and
breaches in cyber-security, could be employed to identify criminal Crime on the Internet. Computer Network Forensics Research
attack trends such as motive for attack, type of victims who are Workshop.
likely to be targeted, and most common modes of attack used by
cyber-criminals. This may help to identify serial offenders, and Fadi Abu Zuhri, (MSc, ITSM, CGEIT, CISM, CFE, CISA, CISSP,
other cases with similar modus operandi. PMP)
(CAE) or the internal audit resources are Audit and the Second Line of Defense” provide assurance services where they had
required to report on specific assignments which addresses the specific cases where previously performed consulting services,
to the reorganization committee which BoD/business owners ask CAEs to assume provided the nature of the consulting did
might consists of current or future responsibilities for risk management, not impair objectivity. This means that
management employees. The impairment compliance, and other governance internal audit functions will need robust
of independence might also result from functions. processes to assess requests for consulting
performing some compliance and risk engagements to help prevent independence
As per the practice guide, the CAE should issues in future audit plans.
management activities which are subject to
ensure the following before and during
internal audit reviews in the future.
assuming such responsibilities: Conclusion
Considering the factors mentioned above,
•D
iscussion of risks with management Organizational changes might not always
there are clearly some risks associated be in the favor of the employees and
with assuming second line of defense and the BoD/business owners.
this usually creates more pressure and
responsibilities temporarily. The CAE is •A
cceptance and ownership of risks by discomfort for the available resources.
required to report such risks to the audit management. Internal auditors are usually one of the
committee/BoD before acceptance of most impacted resources as they are
assigned responsibilities •C
lear definition and assignment of
required to assume more responsibilities.
roles for each activity where second
Adding Value in Difficult Times line of defense activities overlap with In addition to the reorganization programs,
third line of defense activities. internal auditors might be asked to assume
The internal audit resources should
plan their work in a smart and effective second line of defense responsibilities due
•P
eriodic independent assessment of to many reasons including, but not be
manner to add the maximum value to the
internal audit’s second line of defense limited to, the following:
reorganization efforts while maintaining
the highest possible level of independence roles and responsibilities.
• BoD/business owners do not
and objectivity. Such activities might The practice guide has also specified some understand or appropriately value the
include, but not be limited to, the of the activities that the internal audit importance of an independent and
following: objective third line of defense.
should avoid in such cases which include:
•E
fficiency reviews that focus on
• S etting the risk appetite, owning or • Internal audit has the necessary skill
cost optimization in which internal
managing risks. set or relevant expertise for specific
auditors review previous practices
risk management and/or compliance
in various business departments
•A
ssuming responsibilities for activities.
and recommend improvements that
will decrease costs or/and increase accounting, business development,
• The organization is small and
efficiencies. and any other first line of defense
cannot support distinct control and
functions.
•L
iquidity assessment reviews that assurance functions.
highlight potential gaps in cash flow •A
ssuming accountability for Internal auditors might have two options
for management action given that risk management or governance when it comes to assuming second line
most reorganization efforts involve processes. of defense activities which are either
major debt restructuring and cash
•P
roviding assurance on second line to quite the job in order to protect
flow difficulties which require close
of defense activities performed by their independence or to accept such
attention by the reorganization
responsibilities with a strategy of how to
committee. internal audit.
achieve the required objectives with a clear
•P
rocess gap analysis reviews that The practice guide above was subsequently transition plan to relieve internal audit
help reorganization committee to followed with a new IIA Standard which from such responsibilities in the future.
conduct proper process reengineering is Standard 1112 “Chief Audit Executive
exercises. There is a good saying to remember in
Roles Beyond Internal Auditing”. The new this regard. It says “I can’t change the
•L
imited ad-hoc assignments IIA Standard specified certain safeguards direction of the wind, but I can adjust
or investigations that assist to address the impairments resulted from my sails to always reach my destination”.
reorganization committee to reach assuming responsibilities that fall outside It is extremely important for internal
certain conclusions on various the internal auditing which include auditors to be mentally prepared for such
organizational matters. circumstances, especially in the current
periodic evaluation of reporting lines and
IIA Response developing alternative processes to obtain economic conditions, which will help them
assurance related to the areas of additional perform and excel without unnecessary
As a response to the increasing pressure hard feelings.
responsibility.
on the internal audit resources to perform
second line of defense activities, the Another sensible change in IIA standards Ehab R. Saif, CMA, CIA, CFE a Head of
Institute of Internal Auditors (IIA) has was introduced in Standard 1130.A3 Internal Audit at a private holding company in
issued a practice guide called “Internal which allowed internal audit resources to Abu Dhabi.
Despite the fact that data analytics and Businesses need broad-spectrum audit internal audit and enhance its value. The
Computer Assisted Audit Techniques processes that extend beyond reviewing the survey also cited the increasing relevance
(CAAT) have been a part of auditing for obvious. Auditors should adopt forward- of cutting-edge technologies such as
nearly thirty years, many organizations are looking IA approaches, and should be able artificial intelligence, cognitive computing,
still struggling with the implementation of to provide deeper and valuable insights on and visual analytics.
effective data analytics to enhance internal strategy, execution, emerging risks, and
Is skill-gap a concern?
audit quality and effectiveness. hidden opportunities.
More than half of CAEs (57%) who
Increasing complexities of risks and The 2016 Deloitte Global Chief Audit
participated in the survey expressed their
incessant emergence of disruptive Executive Survey that polled more than
intense dissatisfaction about inadequate
technologies are demanding substantial 1200 CAEs from 29 countries and a diverse
skills and insufficient expertise of audit
change in internal audit processes. range of industries, reaffirms the growing
teams.
need to conduct analytics-based auditing.
In today’s world of constant disruption, More than a three quarter of the CAEs When left unaddressed, these skill gaps will
internal audit should evolve into a (79%) recommend the need for digital weaken auditors’ capabilities to deliver on
dynamic and future-oriented function. disruption and innovation to transform changing stakeholder expectations.
Stakeholders expect more forward- to work seamlessly with large data sets • Process more information than
looking analysis to uncover risks and of any size or type, and discover savvy reading numbers
hidden opportunities.Gone are the days insights without having to write codes or
• Discover insights using spatial
of static audit reports and analysis of learn programming languages.
relationships, colors, and textures
sample data.
Key advantages of using self-service • Make data accessible to a broader
The Deloitte survey also cites risk analytics tools: Explore your data and audience and provide users with a
anticipation (39%) and data analytics (34%) create ad-hoc reports without IT skills rich and engaging experience
as the two groundbreaking innovations
that are most likely to impact internal •E
asy access to any source data There are many reasons why auditing
audit within the next five years. Changing •G
uided analysis - Faster answers to is ripe for self-service analytics and
business landscapes, technological complex questions visualization driven transformation. There
advancements, and proliferation of data is more data to examine within limited
have brought forth the imminent need to • I ntuitive drag-and-drop interface to time availability. Most financial and
leverage analytics and data visualization create and share interactive reports. operational transactions are moving online,
to increase the impact, influence, and •N
atural language processing to and the number of variables, outliers,
effectiveness of internal audit. respond to complex queries trends, and patterns to identify and analyze
continue to increase each day.
Analytics Adoption Challenges • I nteractive visualizations and
Visual analytics is the fastest way to analyze
Even after 30 years of inception of data personalized dashboards to identify
and understand structured or unstructured
analytics, many auditors continue to adopt patterns and trends
data of any size, without IT assistance.
conventional internal audit methods and •F
ast to deploy and easy to manage Visual technologies help speed up and
lag in technology adoption. Wondering improve decision making with heat maps,
why? Here are some of the reasons: •A
ll-encompassing data analysis
bubble charts, and interactive dashboards
anywhere and available anytime that are easy for C-suite executive, non-
1. Skills gap
technical business users, and stakeholders
2. Insufficient IT support to understand.
2. Mobile Analytics – Audit insights on
3. Difficulty to manage and manipulate Everything gets better when you can
the go
data do it yourself, right? Self-service audit
Regardless of the size of an organization analytics and visualization too are not
4. Increasing requests for ad-hoc
analysis and one-off reports or availability of data, it takes weeks to different.
prepare and present comprehensive audit
5. Difficulty in dealing with the basic Benefits of self-service analytics in
reports. The numbers are usually saved Internal Audit
aspects of data management and
offline as large files or copied to multiple
governance • Analytics for everyone: Everyone in
slides for boardroom meetings.
Can technology disruption be a savior? an IA Team can perform analytics
Mobile data analytics enables a concise and build audit dashboards – It’s a
Advancements in technology are and easily accessible digital avatar of audit cultural shift
fundamentally changing the nature of the
reports and dynamic dashboards that can • Greater insights – Transform audit,
audit and improving its effectiveness and
be accessed on mobile devices to interact increase audit quality, and create
relevance. Here are a few game-changing
technology solutions that auditors can and proactively monitor the business more impact
harness effectively to enhance the way they information on the go.
• Increased coverage – Identify more
work with data: risks and opportunities
Despite recent surveys pointing to fraud impact the course and/or outcome of a expected occurrence and banks employ
being on the increase in instances of full investigation and may even make it or sophisticated processes and technology
fraud, the discovery of a suspected fraud break it. to prevent and detect such occurrences.
within any organisation is not an everyday Most organisations have controls in The bigger problem occurs when fraud
occurrence for most people and initial place to prevent and detect fraud being has been committed from within. Apart
reactions may include shock and surprise. committed against them from outside from the cost involved, there is always
However, action taken in the first few hours the organisation. In the banking industry some collateral damage caused including
and days after discovery will significantly in particular, external fraud is an loss of reputation, brand damage and
reduced employee morale. Seniority of the the matter which became public knowledge This is particularly important in
suspect is also a factor, the more senior the was only a small part of a much larger organisations or business units with a close
employee, the more serious the damage. conspiracy between a number of employees working environment, where there may be
History shows that , in the absence of any and suppliers. By failing to keep the matter a strong temptation to simply question an
structured response plan, the amount of confidential, the company management employee as soon as suspicion is raised.
time and effort it takes for management to enabled the conspirators to destroy
It is also important to be aware that larger
respond, particularly in the initial weeks, is incriminating records, electronic data scale frauds are often international in
excessive and severely impacts the normal and to dispose of stolen property which nature. Therefore, any fraud contingency
business activity of the organisation. When rendered any future investigation a limited planning must include measures for
a potential fraud is first discovered, the exercise. The identities of the suspects investigation and taking legal and
following few hours or days can be very were not confirmed, which means that the investigative action across jurisdictions.
confusing and stressful if the organisation
company may still employ people who are In addition, most frauds involve the
is unprepared.
actively seeking ways to defraud it. use of a computer at some stage in the
planning or execution of the fraud.
This is particularly evident in today’s
In the absence of a Fraud The purpose of a Fraud environment, when the majority of white
Response Plan, experience Response Plan is to ensure collar employees are allocated a computer
has shown that managers that incidents are handled
by their employer. Business is conducted
by computer and correspondence
handle the same problem in a systematic and normally involves acomputer through the
in different ways efficient manner, not only widespread use of corporate email. The
pervasive involvement of the computer
to conclude a successful into most facets of corporate life means
Sometimes this can have with disastrous investigation, but also to that electronic evidence is often vital to
investigating corporate fraud. Obtaining
consequences such as destroying the show that the organisation that electronic piece of evidence is a
evidentiary value of information and acted in a prudent and specialist skill which should be discussed
evidence by inappropriate handling
processes, inadvertently tipping off the
lawful manner. And and with your forensic specialists.
suspect and, enabling them to destroy that it does not tolerate Initial actions are crucial to the eventual
outcome of an investigation and, if a proper
incriminating evidence, failing to keep fraud. strategy is put in place and adhered to, the
the matter confidential and taking extent of fraudulent activity can usually
inappropriate action caused by having be assessed and action taken to resolve the
insufficient information. The Fraud Response Plan should outline
matter successfully. This usually means
how far an individual line manager should obtaining sufficient evidence to dismiss
For example, In a recent fraud incident go in collecting initial information before errant staff and to commence civil and/
that occurred in a UAE organisation, the invoking the Response Plan. The key is to or criminal proceedings against those
suspect was in charge of procurement provide the line manager with an effective concerned involved in the fraud, or claims
for the organisation, but it had been framework to resolve concerns, rather against insurers, if so desired.
discovered and it came to light that he than leave such resolution to individual
also operated a supply and contracting initiative.
company which had been paid in excess Initial responsibility designation
of 3 million dirhams by his employer’s
Fraud investigation is by necessity, a
company, all ordered and authorised by Initial Action
confidential task and is a sensitive matter
the suspect. After discovery, he was made
It is important to remember that when for the vast majority of organisations.
aware of the issue but was allowed to
fraud is first suspected, the matter may It is vital that all allegations of fraud are
remain in his position for another month,
well be more serious than it may initially treated seriously and that responsibility
during which time he destroyed a large
appear. This is because fraudsters rarely for handling fraud incidents is assigned
number of incriminating documents.
restrict their activities to only one modus to a senior, trusted individual or group of
In an incident which occurred in another operandi or method. Therefore, every individuals. In many organisations, this
Middle East country, it became widely effort should be made to obtain as much responsibility is handed to a corporate
known throughout the organisation that a information as possible before anyone is security advisor, internal audit manager
fraud had been uncovered. Unfortunately, questioned, confronted or interviewed. or risk management director. In other
organisations, the responsibility is shared Receipt and initial assessment of 4. Maintain confidentiality (only inform
between members of senior management suspicion, allegation or ‘tip off ’ those people who need to know about
or an audit committee and the the suspected act). Unwarranted
Fraud investigations are often initiated
organisation’s human resources personnel disclosure can seriously damage
after an allegation or a tip-off (often
and corporate lawyers are involved from potential successful investigations. Do
anonymous) is received. This will usually
not confront the suspect.
a very early pointthe. Fraud incident be sourced from inside the organisation,
management responsibility is an important although external tip-offs are not 5. Write out in full the suspected act or
role and those chosen to administer uncommon. Many fraud incidents are wrongdoing including:
the role must the have appropriate legal initially discovered by accident, perhaps
• What is alleged to have occurred
and management level to authority to as a result of an audit, job change or
resignation. Very few frauds are discovered • Who is alleged to have committed
investigate actions toand co-ordinate the
as part of a deliberate attempt to uncover the act
organisation’s overall response to fraud
fraud, as very few organisations implement • Is the activity continuing
incidents. a proactive fraud detection program.
• Where did it occur
As part of their overall fraud control plan, The checklist shown below highlights
organisations should assign responsibility initial actions to be taken taken /(or • What is the value of the loss or
for fraud incident management to an avoided) upon the discovery of fraud or potential loss
appropriate person(s) as a precursor to tip-off. • Who knows of the activity
adopting an incident management plan. At the conclusion of this stage, a decision 6. Identify all documentary and other
Consideration should also be given to must be made as to whether the allegation evidence connected to the activity
the appropriate level of involvement by or suspicion warrants investigation or is • Invoices
corporate lawyers and human resource implausible or vexatious. However, this
personnel at appropriate levels is essential. decision must be made carefully. If an • Contracts
allegation cannot be quickly dismissed as • Purchase orders
false, further action should be taken.
Fraud Response Team • Cheques
Internal
Audit
Planning
-The Value-
Adding
Phase
One would think that the most important step of the internal audit There is a common belief that the annual audit planning process
process is conducting the audit. Experience and research shows is time-consuming and costly, when in reality all internal auditors
otherwise, since there is a long and rigorous process to arrive at agree that the benefits exceed by far the cost and time spent on it.
the audit execution phase. This takes me to our point of discussion As per a famous saying, “By failing to prepare, you are preparing to
in this article, which is that the most important step in the process fail”. In the following points, I will share with you the details of the
is the planning phase. The whole internal audit process is heavily steps that are covered as part of the annual internal audit planning
reliant on proper planning taking place.
process.
The Chief Audit Executive (CAE) must effectively manage the
internal audit activity to ensure it adds value to the organization1. Step 1. Audit Universe
Value can be added to the organization and its stakeholders Before embarking on the risk assessment, it is important to
when internal audit considers strategies, objectives, and risks to break down the organization into auditable areas. This should
enhance governance, risk management, and control processes and include all the businesses, regions and functions that make up the
objectively provides relevant assurance on how effective they are
organization in a systematic order. And it could be done through
functioning. These aspects normally come up during the annual
planning phase of the internal audit process. any of the following approaches:
input of senior management and the board • Any other input from the internet e.g. The formalized audit plan would be
must be considered in this process3. knowledge leader, board executive, etc. presented to the Board Audit Committee
for review and recommendations. Input
The risk assessment is the most challenging In carrying out the risk assessment there
stage in the annual planning process. The are certain standard requirements that from senior management and the Board
first element that needs to be assessed the IAD must take into consideration. must be considered in this process8.
by the auditor, is the organization’s risk The risk assessment must be documented, IAD should identify the pervasive audit
maturity. the Internal Auditors must have sufficient needs requested by the Board or senior
knowledge to evaluate risk of fraud4 management and take them into account,
Risk Mature Organization: if the
and key information technology risks5. based on the available resources and the
organization clearly has three lines of
defense for the management of risks, Moreover, the Internal Audit activity must Internal Auditors’ professional judgment.
controls, compliance, fraud, quality, then evaluate the effectiveness and contribute to The Chief Audit Executive must also
input needs to be collected from all these the improvement of the risk management communicate the impact of resource
functions as part of the risk assessment processes6. limitations9 if any.
process.
The annual audit plan could vary as per
In a risk mature organization these Step 3. Alignment of Risks with the
the organization’s needs and requirements.
functions are operating as intended. Strategic Goals and Objectives
Moreover, they have a defined risk appetite The IPPF only specify certain criteria and
(the amount of risk an organization is The IAD must be alert to the significant guidelines for the annual planning process,
willing to accept to achieve its objectives), risks that might affect objectives, which sets the minimum requirement for
risk registers (detailing business risks) and operations, or resources7. the annual audit planning process. Some
a robust ethical framework in place, to organizations add audits based on criteria
Once the IAD has identified business
strengthen the overall control environment. other than risk. Such criteria might include
risks, these should be aligned with the
Risk Immature Organization: if none organization’s strategic goals and objectives areas subject to change, mandatory audits
of the aforementioned lines of defense and must be assessed in terms of their or audits requested by management. The
are specified, then a more detailed risk probability of occurring (likelihood) and steps highlighted above could be used as a
assessment needs to be conducted, since
consequences (impact), to arrive at an guide to facilitate the annual audit planning
the IAD would not have the points of
reference to rely on in the collection of overall rating. There are many ways to rate process.
risk-related information. risks, either qualitatively (High, Medium
The IAD’s credibility and value are
or Low), or through quantitatively, through
In this situation, which is applicable to enhanced when they are proactive and
the assignment of an overall grade to each
many organizations, it is recommended risk (residual risk). their evaluations offer new insights and
that the IAD collect risk input from each consider future impact. The purpose
functional head. There are several tools Step 4. Risks Prioritization of audit planning is to make the IAD
that can be used in this process, such as more effective in contributing to the
surveys/questionnaires, holding meetings/ Based on the rating, most of the high improvement of the organization’s
interviews, reviewing management reports, risks and a few medium risks would be governance, risk management, and control
etc. prioritized. We also include some medium process, through the use of a systematic,
and low risks, since there is a certain level disciplined, and risk based approach10.
The IAD needs to record all the key risks of subjectivity involved in risk assessment,
and map them against each auditable area which is determined by the IAD based on
in the audit universe. professional judgement. 1.International Standards for the Professional Practice
of Internal Auditing – 2000 - Managing the Internal
Despite the risk maturity of the Audit Activity
organization, the IAD is also expected to Step 5. Formalize Internal Audit Plan 2. International Standards for the Professional Practice
review other sources of information, such of Internal Auditing – 2010 – Planning
Once the previous phases are complete, 3.International Standards for the Professional Practice of
as:
then the IAD has a clear idea of the Internal Auditing 2010.A1 – Planning
• Industry/Sector Risks risky areas that are of importance to the 4.2010.A2 – Proficiency
5.1210.A3 – Proficiency
• External Factor (Internal Auditors can organization and its management. Based 6. 2120 – Risk Management
use techniques like PEST, SWOT) on that, the process to formalize the 7. 1220.A3 – Due Professional Care
8. 2010.A1- Planning
Annual Internal Audit Plan would start.
• Compliance/Regulation Risks 9. 2020 - Communication and Approval
It could sometimes cover a span of more 10. 2100 - Nature of Work
• Previous Internal Audit Reports than one year. The plan would specify
• Management reports from 2nd line of which areas will be audited during the year, Arif Zaman is a Group Internal Audit
defense such as risk function, compliance detailing the execution period/s (normally Manager, ACCA, CIA, CPA, CISA, CFE, CCSA,
function, fraud function reports, etc. on a quarterly basis). CRMA, CRBA and CGA.