IDEA Workshop: 7:30 AM - 12 Noon
ACL Workshop: 1:30 AM - 5:30 PM
Participants in this full day hands-on workshop will use two data analysis and data mining softwares that are industry standard in accounting and auditing. The pre lunch session focuses on the use of IDEA® Data Analysis Software. The post lunch session focuses on the use of ACL (Audit Command Language). The emphasis is on advanced topics in both IDEA and ACL for audit, fraud detection, data analysis and data mining. Participants can register for either or both workshops.
Each session is conducted by nationally renowned experts in their respective fields. The IDEA workshop is led by Don Sparks who is the Vice President of Audimation Services. The ACL workshop is led by Opher Jackson who is a Principal with Ernst & Young in the Risk & Advisory Services.
You will gain an understanding of the most effective data mining tests for finding fraud and error in many different operational and financial areas. Special focus will be on audit of accounts receivable transactions. For example, in this session participants will learn the critical information necessary to identify side-deals or under-the table agreements, evaluate the profitability of a product, conduct tests for identifying false sales, find leaks between the point-of sale, billing, and collection, use data mining and the five-step approach to fraud detection to exceed the requirements of SAS 99, learn fundamental concepts to isolate high-risk transactions with little effort, understand ways in which accountants manipulate adjustment/reconciliation spreadsheets, detect duplicate entries, and seek patterns of unusual activity just before/after the books have closed. This comprehensive hands-on workshop will emphasize both accounting and technology issues in fraud detection and will have an applied focus.
Academics can use the knowledge acquired from the workshop for both teaching and research. Professionals can use the knowledge to implement both IDEA and ACL in their accounting and financial reporting systems. Participants will leave with a proven set of tests that they can use to locate fraud the very next day.
As fraud detection tools both IDEA and ACL can import, join, analyze, sample, and extract data files from almost any source, mainframe to PC, right on user's desktop. IDEA and ACL do not require users to be technical specialists. Instead, use of a combination of key function wizards, Windows® standard features like Right Click and Drag and Drop, extensive HTML-based Help, and a carefully designed user interface helps users to easily incorporate both IDEA and ACL into fraud detection and audit processes.
Space is limited for the workshop. Registration will be done on a first-come basis. Therefore, please register early.
This session profiles the current state of financial and other white collar crimes. The speaker will discuss emerging trends in risks, threats and vulnerabilities to information assets of organizations, especially with growing proliferation and advancements in computers and technology. Preventive and detective mechanisms to reduce those risks and threats will be highlighted. Participants will learn of the regulatory efforts in this area with a special and detailed coverage of forensic accounting and auditing issues.
This session will focus on the evolution of Identity and Access Management (IAM) from a niche security issue to an enterprise issue that most organizations now face. The discussion will include the early drivers of IAM, the current and emerging trends, and the predictions of what is on the horizon for tomorrow. The speaker will examine major components of IAM and the necessary business integration, process change and technology deployments that may be required for a successful IAM solution. Participants will also learn a practical approach to define and implement an enterprise identity management solution that provides a good balance of risk mitigation while delivering business value earlier than normally obtained in the implementation process.
With the increase in outsourced operations, the auditor's need to rely upon third party audit reports is at an all time high. This session will focus on assessing a service auditor's report (also known as SAS70). Topics that will be covered in this session include the format/content of a SAS70 audit and report, adequacy of control objectives, analyzing control design and operations, user control considerations and drawing conclusions from SAS70 reports.
This session will discuss the impact of ERP application configuration on financial controls. Using examples from the financial modules of SAP and Oracle, speakers will illustrate the methodology of how ERP controls should be evaluated. Once an organization has defined its application controls appropriately, it is important for it to design and implement a strategy to monitor who can change these controls and under what circumstances. The speakers will highlight how application controls can more effectively replace manual, internal process controls, leading to tighter, more efficient business processes and reduced testing costs attributable to Sarbanes Oxley and related compliance efforts. Finally, the speakers will also provide an overview of tools available to monitor and test the effectiveness of application controls in ERP systems.