< Return to Video

Introduction To CISA | CISA Training Videos | Overview of CISA | ISACA CISA Introduction

  • 0:05 - 0:07
    We'll start with the CISA,
  • 0:07 - 0:10
    and I have a pretty good idea that, yes, you
  • 0:10 - 0:12
    guys come from diverse backgrounds--
  • 0:12 - 0:15
    some from finance, some from IT--and you
  • 0:15 - 0:15
    want to
  • 0:15 - 0:18
    do this training. That’s a very good
  • 0:18 - 0:19
    thing, especially
  • 0:19 - 0:21
    as we’re facing the situation where
  • 0:21 - 0:24
    the entire world, people are trying to
  • 0:24 - 0:27
    upskill themselves. And CISA is one of the
  • 0:27 - 0:27
    the
  • 0:27 - 0:30
    most valuable certifications you
  • 0:30 - 0:30
    have chosen
  • 0:30 - 0:34
    to upskill yourself. CISA has
  • 0:34 - 0:37
    not been very recently. It
  • 0:37 - 0:40
    was there since a long time, since
  • 0:40 - 0:41
    1990s.
  • 0:41 - 0:45
    Okay? Now, even in the 1990s, you know, our IT
  • 0:45 - 0:46
    systems weren’t
  • 0:46 - 0:49
    as prevalent, I would say.
  • 0:49 - 0:52
    But, however, since then...
  • 0:52 - 0:54
    However, by the year 2000,
  • 0:54 - 0:58
    moving into the 21st century, you know,
  • 0:58 - 0:59
    people started
  • 0:59 - 1:01
    using systems more. With that came a lot of risks
  • 1:01 - 1:02
    associated with
  • 1:02 - 1:05
    with those systems. Okay? Everyone
  • 1:05 - 1:07
    agreed that risks were present
  • 1:07 - 1:09
    and needed to be mitigated, you know.
  • 1:09 - 1:10
    That’s the reason,
  • 1:10 - 1:14
    you know, the board or the owners of
  • 1:14 - 1:14
    those systems,
  • 1:14 - 1:17
    the owners of organizations
  • 1:17 - 1:19
    using those systems,
  • 1:19 - 1:21
    wanted to implement certain controls in
  • 1:21 - 1:22
    place,
  • 1:22 - 1:25
    in terms of getting to know how the
  • 1:25 - 1:26
    systems are working, whether
  • 1:26 - 1:29
    those systems are working and to give
  • 1:29 - 1:31
    adequate value to the organization.
  • 1:31 - 1:33
    So that's the reason this
  • 1:33 - 1:34
    certification was
  • 1:34 - 1:37
    introduced. And auditing, which is one of
  • 1:37 - 1:39
    the important controls from the
  • 1:39 - 1:41
    board of directors
  • 1:41 - 1:43
    and organization owners point of view.
  • 1:43 - 1:45
    They introduced information systems
  • 1:45 - 1:48
    to be audited, you know, and for that
  • 1:48 - 1:49
    reason, there was a lack of resources
  • 1:49 - 1:50
    and there were a lack of
  • 1:50 - 1:53
    competencies in the market to understand
  • 1:53 - 1:54
    those systems and
  • 1:54 - 1:57
    understand the controls within those
  • 1:57 - 1:58
    systems--
  • 1:58 - 2:01
    whether they are working as,
  • 2:01 - 2:02
    you know, expected or
  • 2:02 - 2:04
    whether they're giving value to the
  • 2:04 - 2:06
    organizations as per the expectations of
  • 2:06 - 2:08
    what the stakeholders want.
  • 2:08 - 2:10
    So that's the reason the CISA
  • 2:10 - 2:12
    certification was introduced.
  • 2:12 - 2:16
    Gradually, it has become one
  • 2:16 - 2:18
    of the pioneering certifications in terms of
  • 2:18 - 2:19
    auditing.
  • 2:19 - 2:21
    I think pioneer, I would say it is the
  • 2:21 - 2:22
    only certification
  • 2:22 - 2:25
    which is recognized in the world in
  • 2:25 - 2:26
    terms of
  • 2:26 - 2:29
    information system auditing. No other
  • 2:29 - 2:30
    certification
  • 2:30 - 2:33
    and ISACA is the monopoly there. So no
  • 2:33 - 2:34
    one has beaten
  • 2:34 - 2:36
    ISACA there. Those knowledge base which
  • 2:36 - 2:38
    is there in ISACA
  • 2:38 - 2:40
    is found elsewhere, but combining all of
  • 2:40 - 2:41
    them together
  • 2:41 - 2:44
    and using it as a mechanism to upskill
  • 2:44 - 2:44
    people
  • 2:44 - 2:46
    is something, you know, fabulous, which
  • 2:46 - 2:48
    ISACA has done.
  • 2:48 - 2:51
    Now, just to introduce you to the ISACA
  • 2:51 - 2:53
    program: this is generally a five-day
  • 2:53 - 2:54
    course, okay,
  • 2:54 - 2:58
    in which, we cover the five areas
  • 2:58 - 3:00
    which the ISACA describes as the
  • 3:00 - 3:03
    domains. And so, I would be talking about
  • 3:03 - 3:03
    those
  • 3:03 - 3:05
    things, and I would like to have a very
  • 3:05 - 3:09
    interactive session along that
  • 3:09 - 3:11
    because it also covers
  • 3:11 - 3:14
    the knowledge part--the body of knowledge.
  • 3:14 - 3:15
    So it's not about,
  • 3:15 - 3:17
    you know, learning or it's not about, you
  • 3:17 - 3:20
    know, grasping things, or it's not about,
  • 3:20 - 3:22
    you know, knowing some terminologies. It's
  • 3:22 - 3:24
    also about understanding how those
  • 3:24 - 3:25
    terminologies
  • 3:25 - 3:28
    apply. For example, if we say
  • 3:28 - 3:31
    "risk," you know, I'm just taking an example
  • 3:31 - 3:32
    here. Risk. Now,
  • 3:32 - 3:36
    risk is any uncertainty
  • 3:36 - 3:38
    to the business operations--okay, any
  • 3:38 - 3:40
    uncertain event that could cause
  • 3:40 - 3:42
    disruption to an organization, you know,
  • 3:42 - 3:44
    any uncertain event
  • 3:44 - 3:47
    that could lead to our organization's
  • 3:47 - 3:48
    objectives
  • 3:48 - 3:50
    being impacted, you know, that is a risk. Okay?
  • 3:50 - 3:51
    So, you have to
  • 3:51 - 3:54
    not only understand the terminology.
  • 3:54 - 3:55
    That's the
  • 3:55 - 3:57
    basic definition of risk, but you
  • 3:57 - 3:58
    also see
  • 3:58 - 4:01
    how you can apply that in your
  • 4:01 - 4:02
    organization.
  • 4:02 - 4:05
    Okay? Look at the risk, any uncertain
  • 4:05 - 4:06
    events,
  • 4:06 - 4:08
    okay? What could be an uncertain events
  • 4:08 - 4:09
    to my organizations
  • 4:09 - 4:13
    and how those
  • 4:13 - 4:15
    uncertain events can affect my
  • 4:15 - 4:17
    organization's objectives?
  • 4:17 - 4:19
    Now, when I say "my organization," it
  • 4:19 - 4:20
    doesn't mean, you know, any
  • 4:20 - 4:22
    organization which you work for
  • 4:22 - 4:25
    means an organization which ISACA wants
  • 4:25 - 4:26
    you to think of.
  • 4:26 - 4:28
    As an organization, they would basically
  • 4:28 - 4:29
    want you to
  • 4:29 - 4:33
    apply those terminologies, those things
  • 4:33 - 4:36
    to an organization, and see what would
  • 4:36 - 4:36
    you
  • 4:36 - 4:40
    do to basically... what best step
  • 4:40 - 4:43
    you would take to address that issue. Okay? Now,
  • 4:43 - 4:45
    I won’t go into the details
  • 4:45 - 4:46
    of what kind of questions they ask
  • 4:46 - 4:49
    but honestly, the questions are asked as,
  • 4:49 - 4:51
    you know, just that the questions are
  • 4:51 - 4:53
    asking the most important,
  • 4:53 - 4:55
    the first thing which you do, the
  • 4:55 - 4:56
    primary
  • 4:56 - 4:58
    option you have, you know. So all the
  • 4:58 - 5:00
    options would be right
  • 5:00 - 5:02
    as per the question, but you have to
  • 5:02 - 5:03
    choose
  • 5:03 - 5:06
    the best option as per how
  • 5:06 - 5:09
    ISACA perceives the best option is. So, you
  • 5:09 - 5:10
    also have to
  • 5:10 - 5:13
    understand ISACA's perspective towards
  • 5:13 - 5:14
    that question on
  • 5:14 - 5:15
    how you can address that. Okay? That's the
  • 5:15 - 5:17
    reason we are understanding from ISACA's
  • 5:17 - 5:18
    perspective,
  • 5:18 - 5:22
    an organization's viewpoint.
  • 5:22 - 5:24
    Okay? And then, we would also have certain
  • 5:24 - 5:26
    activities which basically enables you
  • 5:26 - 5:28
    to understand those perspectives,
  • 5:28 - 5:30
    and there will be discussion
  • 5:30 - 5:32
    questions, there will be group
  • 5:32 - 5:33
    discussions,
  • 5:33 - 5:35
    in terms of case study. I would
  • 5:35 - 5:37
    try to...
  • 5:37 - 5:38
    Because when it's a classroom session,
  • 5:38 - 5:40
    the group discussions becomes very
  • 5:40 - 5:42
    interactive. I will try to
  • 5:42 - 5:44
    be as interactive as possible in the
  • 5:44 - 5:45
    group discussions.
  • 5:45 - 5:47
    Okay? Then, we would also take real-world
  • 5:47 - 5:48
    examples
  • 5:48 - 5:50
    of CISA's subject matter. It would...
  • 5:50 - 5:52
    The real-world examples could come from
  • 5:52 - 5:54
    my experiences, would come from your
  • 5:54 - 5:55
    experiences,
  • 5:55 - 5:59
    or also it can come from what ISACA
  • 5:59 - 6:01
    is putting up. Now, what are the benefits?
  • 6:01 - 6:03
    I've already told you it's the pioneer
  • 6:03 - 6:04
    certifications.
  • 6:04 - 6:07
    It gives you competitive edge, it helps
  • 6:07 - 6:08
    you to achieve
  • 6:08 - 6:10
    high professional standards when you go
  • 6:10 - 6:13
    to say that I have ISACA certification,
  • 6:13 - 6:15
    your CV speaks about your knowledge
  • 6:15 - 6:16
    and experience.
  • 6:16 - 6:20
    And it also quantifies and
  • 6:20 - 6:23
    markets your experience.
  • 6:23 - 6:26
    Okay? So we have people here with 18
  • 6:26 - 6:27
    years of experience,
  • 6:27 - 6:30
    you know, those people,
  • 6:30 - 6:34
    I would say, it's a leap,
  • 6:34 - 6:37
    you know, which you can take up by having
  • 6:37 - 6:39
    these certifications. So your 18 years of
  • 6:39 - 6:40
    experience can speak
  • 6:40 - 6:42
    even louder when you have this
  • 6:42 - 6:44
    certification with you.
  • 6:44 - 6:46
    So you would have, you know, I have
  • 6:46 - 6:47
    trained people from
  • 6:47 - 6:49
    4 to 5 years of experience to
  • 6:49 - 6:50
    28,
  • 6:50 - 6:53
    26, 30 years of experience also. And if
  • 6:53 - 6:56
    only the CISO position, you know,
  • 6:56 - 6:57
    they
  • 6:57 - 6:58
    were getting into CISO positions,
  • 6:58 - 7:00
    but they want to have the certification
  • 7:00 - 7:01
    before
  • 7:01 - 7:03
    getting to CISO position. Now, those
  • 7:03 - 7:05
    kind of people also have trained,
  • 7:05 - 7:07
    okay? And they were able to clear the
  • 7:07 - 7:08
    exams. So it
  • 7:08 - 7:11
    basically recognizes and you know marks
  • 7:11 - 7:12
    and...
  • 7:12 - 7:15
    recognizes your experience also, you know.
  • 7:15 - 7:17
    There you can leverage your experience
  • 7:17 - 7:18
    with this certification, then it also
  • 7:18 - 7:19
    increases
  • 7:19 - 7:22
    value to your organization. Okay? I was
  • 7:22 - 7:23
    selling,
  • 7:23 - 7:25
    you know, CISA certification was
  • 7:25 - 7:28
    introduced in 1978, okay?
  • 7:28 - 7:30
    But it got prominent in 1990s when you
  • 7:30 - 7:31
    have the
  • 7:31 - 7:34
    information systems in place, you know,
  • 7:34 - 7:35
    in the world.
  • 7:35 - 7:38
    Okay? So, there’s a new
  • 7:38 - 7:39
    version
  • 7:39 - 7:42
    of which came in 2019, okay, and we would
  • 7:42 - 7:42
    be
  • 7:42 - 7:45
    dealing with that version, okay? I have
  • 7:45 - 7:47
    been certified in the previous
  • 7:47 - 7:50
    version, which was the 2016 version.
  • 7:50 - 7:53
    Now, after, you know, three years,
  • 7:53 - 7:53
    ISACA,
  • 7:53 - 7:56
    they changed the organization.
  • 7:56 - 7:58
    ISACA changed some certain,
  • 7:58 - 8:00
    you know, structures, and we will
  • 8:00 - 8:02
    be doing the latest version, which is the
  • 8:02 - 8:03
    2019 version.
  • 8:03 - 8:05
    So, these are the five domains of
  • 8:05 - 8:07
    ISACA, okay?
  • 8:07 - 8:10
    If you see the five domains,
  • 8:10 - 8:13
    the first is the information system audit
  • 8:13 - 8:16
    process. Now, what does information
  • 8:16 - 8:17
    system audit mean?
  • 8:17 - 8:20
    What does audit mean? Audit means to
  • 8:20 - 8:22
    check and verify, right?
  • 8:22 - 8:23
    So, audit means to
  • 8:23 - 8:25
    check and verify whether the systems and
  • 8:25 - 8:28
    controls are working appropriately or not
  • 8:28 - 8:31
    or not. Okay? So we will look at how
  • 8:31 - 8:34
    you ensure the systems, you know,
  • 8:34 - 8:36
    are checked appropriately
  • 8:36 - 8:38
    in terms of auditing. We will also study
  • 8:38 - 8:40
    about the audit standards,
  • 8:40 - 8:43
    guidelines, and the code of ethics
  • 8:43 - 8:45
    when auditing information systems.
  • 8:45 - 8:46
    You will be
  • 8:46 - 8:49
    understanding the business processes
  • 8:49 - 8:51
    under audit because audit itself is a
  • 8:51 - 8:53
    project, you know. When you go for an
  • 8:53 - 8:54
    audit in an organization,
  • 8:54 - 8:56
    we have people from Deloitte, for example. It’s an
  • 8:56 - 8:57
    audit project
  • 8:57 - 9:00
    altogether for the organization. Okay? So,
  • 9:00 - 9:01
    how do you
  • 9:01 - 9:04
    plan an audit? How do
  • 9:04 - 9:04
    you conduct an
  • 9:04 - 9:08
    audit? How do you report
  • 9:08 - 9:11
    audit findings and communicate
  • 9:11 - 9:12
    with stakeholders?
  • 9:12 - 9:14
    And what are the post-audit activities?
  • 9:14 - 9:16
    All these topics will be
  • 9:16 - 9:17
    studied here.
  • 9:17 - 9:19
    Then we will also look at the types of
  • 9:19 - 9:20
    controls.
  • 9:20 - 9:23
    There's a specific concept of risk-based
  • 9:23 - 9:24
    auditing
  • 9:24 - 9:27
    in domain one. Okay? So, that would be
  • 9:27 - 9:28
    domain one.
  • 9:28 - 9:31
    In domain two, we will discuss the
  • 9:31 - 9:34
    governance and management of IT. You need to understand the
  • 9:34 - 9:35
    governance and management. So, you have to
  • 9:35 - 9:37
    understand the difference between the
  • 9:37 - 9:39
    governance and management here. We will see,
  • 9:39 - 9:41
    from a board of directors’
  • 9:41 - 9:42
    perspective,
  • 9:42 - 9:45
    what they want from the IT
  • 9:45 - 9:46
    infrastructure
  • 9:46 - 9:47
    of the organization, and you will also
  • 9:47 - 9:50
    understand from a CEO’s perspective--
  • 9:50 - 9:53
    how they enable IT
  • 9:53 - 9:55
    to add value to the organization.
  • 9:55 - 9:56
    Okay?
  • 9:56 - 9:57
    So, we’ll understand the difference
  • 9:57 - 9:59
    between governance and management,
  • 9:59 - 10:01
    and also understand where they meet
  • 10:01 - 10:02
    each other
  • 10:02 - 10:05
    and how the IT systems work. From an
  • 10:05 - 10:06
    auditor's
  • 10:06 - 10:09
    perspective, how do you check whether
  • 10:09 - 10:10
    IT
  • 10:10 - 10:13
    is providing value to the organization,
  • 10:13 - 10:14
    okay,
  • 10:14 - 10:16
    and whether we are realizing the
  • 10:16 - 10:17
    benefits of
  • 10:17 - 10:19
    IT in our organization? Then, in
  • 10:19 - 10:21
    domain three, we're going to talk about
  • 10:21 - 10:24
    information system acquisition,
  • 10:24 - 10:26
    development, and implementation.
  • 10:26 - 10:28
    In information system acquisitions, or
  • 10:28 - 10:31
    when you acquire new systems in the
  • 10:31 - 10:33
    organizations, when you buy
  • 10:33 - 10:36
    new systems, or you develop new systems,
  • 10:36 - 10:37
    or you implement those systems in the
  • 10:37 - 10:39
    organization,
  • 10:39 - 10:41
    from an auditor's perspective, how do you
  • 10:41 - 10:42
    ensure
  • 10:42 - 10:45
    that the steps for acquiring, developing,
  • 10:45 - 10:47
    and implementing the systems
  • 10:47 - 10:50
    are appropriately addressed
  • 10:50 - 10:53
    or not? And whether those systems which
  • 10:53 - 10:55
    are implemented,
  • 10:55 - 10:57
    are they basically implemented
  • 10:57 - 11:01
    effectively in the organization or not? Okay?
  • 11:01 - 11:03
    Then, we will talk about
  • 11:03 - 11:05
    operations and maintenance of
  • 11:05 - 11:07
    information systems. Once the system has been
  • 11:07 - 11:09
    acquired, developed,
  • 11:09 - 11:10
    and implemented in the organization,
  • 11:10 - 11:13
    now you also need to worry about how do
  • 11:13 - 11:14
    you maintain it?
  • 11:14 - 11:18
    How can that system continually
  • 11:18 - 11:20
    provide benefits to the
  • 11:20 - 11:22
    organization?
  • 11:22 - 11:24
    For that, you need maintenance
  • 11:24 - 11:26
    activities and business
  • 11:26 - 11:28
    resilience
  • 11:28 - 11:31
    to ensure that the system
  • 11:31 - 11:34
    is working appropriately until the end
  • 11:34 - 11:35
    of its life cycle.
  • 11:35 - 11:38
    Okay? Then, we will also talk about the protection
  • 11:38 - 11:39
    of information assets, which is very
  • 11:39 - 11:40
    important,
  • 11:40 - 11:43
    not only from a
  • 11:43 - 11:45
    regulatory and legal perspective.
  • 11:45 - 11:46
    Nowadays,
  • 11:46 - 11:50
    because that's where the higher focus is
  • 11:50 - 11:52
    in these days, because there are a lot of
  • 11:52 - 11:53
    regulations
  • 11:53 - 11:56
    in terms of banking, telecom, oil, and gas
  • 11:56 - 11:57
    sectors.
  • 11:57 - 11:59
    You know, there are a lot of regulations
  • 11:59 - 12:00
    in terms of protection of information
  • 12:00 - 12:02
    assets because
  • 12:02 - 12:05
    information security has now or
  • 12:05 - 12:07
    cybersecurity has now become an
  • 12:07 - 12:08
    important aspect,
  • 12:08 - 12:11
    even at a national level,
  • 12:11 - 12:14
    around the world. Okay? Every country in
  • 12:14 - 12:15
    the world
  • 12:15 - 12:17
    takes information security or cybersecurity
  • 12:17 - 12:18
    is a serious threat
  • 12:18 - 12:21
    towards their critical
  • 12:21 - 12:22
    infrastructure.
  • 12:22 - 12:25
    Okay? So we will also talk about
  • 12:25 - 12:28
    protection of those information assets.
  • 12:28 - 12:31
    You know, when you talk about
  • 12:31 - 12:32
    information assets,
  • 12:32 - 12:35
    we're talk about the confidential
  • 12:35 - 12:37
    information which the organizations have,
  • 12:37 - 12:40
    the secret and top-secret information which
  • 12:40 - 12:44
    the countries have, you know, at a
  • 12:44 - 12:46
    higher level or at a national level. So,
  • 12:46 - 12:48
    these are the five domains. Okay? Let me
  • 12:48 - 12:49
    also tell you about
  • 12:49 - 12:53
    the structure of the CISA
  • 12:53 - 12:56
    certification exam. So, now
  • 12:56 - 12:57
    this is called the domains. Okay?
  • 12:57 - 13:01
    Each domain
  • 13:01 - 13:04
    is divided or is, you know,
  • 13:04 - 13:08
    structured in a certain way. Okay?
  • 13:08 - 13:10
    So, we'll go through that structure. So every
  • 13:10 - 13:12
    domain would have task statements.
  • 13:12 - 13:14
    Okay? For example, in information system
  • 13:14 - 13:16
    auditing, what tasks do
  • 13:16 - 13:18
    we have in information system
  • 13:18 - 13:20
    auditing? You would have,
  • 13:20 - 13:23
    you know, driving a risk-based audit
  • 13:23 - 13:26
    strategy--how to make an audit strategy.
  • 13:26 - 13:28
    Okay? That is one task. Making
  • 13:28 - 13:29
    audit
  • 13:29 - 13:31
    strategies.
  • 13:31 - 13:33
    Then there’s the task of planning the audit,
  • 13:33 - 13:35
    there would be a task to
  • 13:35 - 13:37
    conducting the audit, there would be
  • 13:37 - 13:38
    a task to, you know,
  • 13:38 - 13:41
    communicating the audit results,
  • 13:41 - 13:43
    okay, and then there would be a task of
  • 13:43 - 13:45
    reporting the audit results, and
  • 13:45 - 13:47
    there would be a task of post-audit,
  • 13:47 - 13:50
    you know, what are the activities of post-audit.
  • 13:50 - 13:51
    Okay? So, this is how,
  • 13:51 - 13:52
    you know, every domain is being
  • 13:52 - 13:54
    structured. And then,
  • 13:54 - 13:56
    for doing those tasks, there would be
  • 13:56 - 13:58
    knowledge statements.
  • 13:58 - 13:59
    You know, for example, for conducting the
  • 13:59 - 14:01
    audit, you would require knowledge of
  • 14:01 - 14:03
    sampling. You require knowledge of
  • 14:03 - 14:06
    controls, and etc. Okay? So,
  • 14:06 - 14:07
    this is how
  • 14:07 - 14:10
    every domain has been divided. Okay?
  • 14:10 - 14:12
    And then there would be certain test
  • 14:12 - 14:14
    questions we would discuss that would
  • 14:14 - 14:16
    validate whether
  • 14:16 - 14:21
    you have understood the concepts
  • 14:21 - 14:23
    well enough. Also, as I said in the
  • 14:23 - 14:25
    beginning, there is a practical
  • 14:25 - 14:27
    knowledge part of it, which is how you apply those
  • 14:27 - 14:30
    tasks in an organization. This
  • 14:30 - 14:32
    organization is basically a
  • 14:32 - 14:34
    perceived organization,
  • 14:34 - 14:37
    from any perspective, and you
  • 14:37 - 14:38
    are the auditor.
  • 14:38 - 14:40
    Okay, so all the questions that would be
  • 14:40 - 14:41
    asked
  • 14:41 - 14:43
    in the exam are from an auditor's
  • 14:43 - 14:46
    perspective. So, being an auditor,
  • 14:46 - 14:49
    what would you do in this situation? So
  • 14:49 - 14:52
    the question would be very
  • 14:52 - 14:54
    situational, okay? If you are
  • 14:54 - 14:57
    given a scenario and you are
  • 14:57 - 14:58
    the auditor,
  • 14:58 - 15:01
    what would you choose to do
  • 15:01 - 15:03
    in that scenario? Okay, that's
  • 15:03 - 15:05
    how the questions would be framed.
  • 15:05 - 15:07
    Okay, so the application of general
  • 15:07 - 15:08
    concepts and standards--
  • 15:08 - 15:10
    to understand the application of general
  • 15:10 - 15:13
    concepts and standards is very important.
  • 15:13 - 15:14
    And all questions would be multiple
  • 15:14 - 15:16
    choice and designed
  • 15:16 - 15:18
    for one best answer. Okay? All the answers
  • 15:18 - 15:19
    would be right, but
  • 15:19 - 15:23
    you have to choose the one best answer. Now, the
  • 15:23 - 15:24
    catch here is that you may
  • 15:24 - 15:27
    think from your perspective that
  • 15:27 - 15:29
    this is not the best answer,
  • 15:29 - 15:32
    and I also contradict ISACA a lot
  • 15:32 - 15:35
    in terms of the best answers. I think
  • 15:35 - 15:36
    that
  • 15:36 - 15:39
    they are wrong in their perspective
  • 15:39 - 15:40
    of the best answer,
  • 15:40 - 15:43
    but I have to, right now, think that I
  • 15:43 - 15:45
    have to clear the exam,
  • 15:45 - 15:48
    not my own exam. So, I have to accept
  • 15:48 - 15:50
    their best answer,
  • 15:50 - 15:53
    okay, and make a thought process
  • 15:53 - 15:55
    such that I understand what their thought
  • 15:55 - 15:56
    process is,
  • 15:56 - 15:59
    you know. So, ISACA is trying to
  • 15:59 - 16:01
    create a thought process
  • 16:01 - 16:04
    for you, okay, and that's
  • 16:04 - 16:05
    something weird, but
  • 16:05 - 16:08
    that's how it is. Okay, so from the
  • 16:08 - 16:10
    beginning, you must
  • 16:10 - 16:13
    be aware of these things.
  • 16:13 - 16:15
    And this is what I'm speaking from my
  • 16:15 - 16:16
    experience.
  • 16:16 - 16:18
    People may have their
  • 16:18 - 16:19
    own experiences,
  • 16:19 - 16:22
    and so you will have your own
  • 16:22 - 16:24
    experience when you take your
  • 16:24 - 16:27
    exam, and hopefully, you will clear it.
  • 16:27 - 16:30
    Don't worry. Okay, you have to read each
  • 16:30 - 16:31
    question carefully and
  • 16:31 - 16:34
    eliminate known incorrect
  • 16:34 - 16:34
    answers.
  • 16:34 - 16:37
    Okay, and this is also my experience
  • 16:37 - 16:39
    and the experience of many others,
  • 16:39 - 16:41
    people's experience that you know. You
  • 16:41 - 16:43
    have to eliminate the wrong answers.
  • 16:43 - 16:46
    Don't go for the right answer too
  • 16:46 - 16:48
    quickly. If you find the right answer,
  • 16:48 - 16:51
    don't just say "yes." Okay? You have to
  • 16:51 - 16:52
    also
  • 16:52 - 16:55
    look at the other options and try
  • 16:55 - 16:57
    to eliminate them first.
  • 16:57 - 16:59
    Okay, so if you think that this answer is
  • 16:59 - 17:00
    right,
  • 17:00 - 17:03
    just stick to it and try to eliminate the
  • 17:03 - 17:04
    other three
  • 17:04 - 17:07
    first. Eliminate means that you
  • 17:07 - 17:08
    should be very convinced that
  • 17:08 - 17:09
    the other three
  • 17:09 - 17:12
    answers are wrong. Okay, and you might
  • 17:12 - 17:14
    perceive that from the
  • 17:14 - 17:16
    other three
  • 17:16 - 17:18
    answers. There could be some contention
  • 17:18 - 17:19
    between
  • 17:19 - 17:21
    one or two of the answers, and then you
  • 17:21 - 17:22
    might,
  • 17:22 - 17:24
    you know, reduce the element of reuse in your
  • 17:24 - 17:26
    options for yourself.
  • 17:26 - 17:28
    Okay, for example, if you have four
  • 17:28 - 17:30
    options, try to eliminate
  • 17:30 - 17:32
    two first--those you think
  • 17:32 - 17:35
    absolutely cannot be the
  • 17:35 - 17:37
    answer. Then, you will
  • 17:37 - 17:38
    be stuck between the two remaining options.
  • 17:38 - 17:40
    This is where you will find yourself stuck with most of the
  • 17:40 - 17:41
    questions--
  • 17:41 - 17:45
    you will be stuck between two possible
  • 17:45 - 17:47
    answers. Okay, and then you have to
  • 17:47 - 17:49
    think from ISACA's perspective. Okay,
  • 17:49 - 17:51
    what would be the right answer
  • 17:51 - 17:53
    from what I have studied in the
  • 17:53 - 17:54
    training or what
  • 17:54 - 17:58
    I have read in the manual? Okay?
  • 17:58 - 18:01
    So, identify the key words. Make the
  • 18:01 - 18:02
    best choice possible as I said.
  • 18:02 - 18:05
    Identify the key words or phases in the
  • 18:05 - 18:06
    questions.
  • 18:06 - 18:09
    So I said, as I said earlier, most,
  • 18:09 - 18:12
    you know, these kind of
  • 18:12 - 18:14
    questions would be there.
  • 18:14 - 18:16
    So, identify the keywords or phrases in
  • 18:16 - 18:18
    the questions before selecting and
  • 18:18 - 18:19
    recording an answer.
  • 18:19 - 18:21
    Read the provided instructions carefully.
  • 18:21 - 18:23
    So there would be instructions
  • 18:23 - 18:26
    for you guys when you sit for the exams.
  • 18:26 - 18:27
    Skipping over these directions or
  • 18:27 - 18:30
    reading them too quickly could result
  • 18:30 - 18:31
    in missing important information and
  • 18:31 - 18:34
    possibly losing credit points.
  • 18:34 - 18:37
    This has happened with people
  • 18:37 - 18:40
    I know. Okay, and they had to please it
  • 18:40 - 18:41
    for the exams.
  • 18:41 - 18:43
    Okay, they sometimes, you know,
  • 18:43 - 18:44
    accidentally
  • 18:44 - 18:46
    end the exam when they’re
  • 18:46 - 18:48
    sitting, when you're sitting
  • 18:48 - 18:49
    accidentally,
  • 18:49 - 18:51
    you know, you don't read the
  • 18:51 - 18:52
    instructions properly,
  • 18:52 - 18:55
    and then they click on "end exam"
  • 18:55 - 18:56
    and end the exam
  • 18:56 - 18:58
    in the first or
  • 18:58 - 18:59
    second question. Okay,
  • 18:59 - 19:02
    and then it doesn’t resume
  • 19:02 - 19:04
    immediately. Okay, then you have to,
  • 19:04 - 19:07
    you know, somehow... because it's an
  • 19:07 - 19:08
    expensive exam,
  • 19:08 - 19:11
    you know, $750, it's not a
  • 19:11 - 19:14
    small amount of money. So, and then you
  • 19:14 - 19:15
    have to,
  • 19:15 - 19:18
    you know, sometimes ISACA gives the option
  • 19:18 - 19:19
    of
  • 19:19 - 19:21
    resetting, and sometimes they don’t. In either case,
  • 19:21 - 19:22
    you could lose that money.
  • 19:22 - 19:24
    Now, grading is based solely on the
  • 19:24 - 19:26
    number of questions answered correctly,
  • 19:26 - 19:26
    so there’s
  • 19:26 - 19:28
    no negative marking like we have for
  • 19:28 - 19:30
    CISSP exams.
  • 19:30 - 19:33
    Okay, at no negative marking. If
  • 19:33 - 19:34
    you mark an answer wrong, it counts as zero.
  • 19:34 - 19:37
    Okay, you are not minus. And it is also
  • 19:37 - 19:38
    the CISSP exams
  • 19:38 - 19:41
    in which if you have 150 questions and
  • 19:41 - 19:41
    if you
  • 19:41 - 19:44
    mark 80 questions right, it will
  • 19:44 - 19:45
    automatically finish.
  • 19:45 - 19:48
    You know, the CSI exam are
  • 19:48 - 19:49
    like that, but...
  • 19:49 - 19:51
    However, CSI exams will take you to 150
  • 19:51 - 19:52
    questions. You can
  • 19:52 - 19:55
    go back and forth, you know. And you know,
  • 19:55 - 19:57
    you can navigate to the
  • 19:57 - 19:58
    to the questions easily. So these are
  • 19:58 - 20:00
    somewhere for us.
  • 20:00 - 20:03
    The exam period is four hours, okay?
  • 20:03 - 20:06
    So around 1.5 minutes per question, and
  • 20:06 - 20:07
    that's
  • 20:07 - 20:10
    not, you know, less I would say. Okay, if
  • 20:10 - 20:10
    you
  • 20:10 - 20:13
    are thorough with the material. You would
  • 20:13 - 20:15
    answer in 30 seconds.
  • 20:15 - 20:19
    Okay. Okay, I would skip these rules
  • 20:19 - 20:21
    for you. I will go to the important one,
  • 20:21 - 20:23
    which is exam scoring.
  • 20:23 - 20:26
    So, a scale score is a,
  • 20:26 - 20:28
    is a conversion of the candidate's raw score
  • 20:28 - 20:31
    on the exam to a common scale.
  • 20:31 - 20:33
    Okay, so for example, if there are
  • 20:33 - 20:35
    32 questions in domain
  • 20:35 - 20:39
    one, so basically, it
  • 20:39 - 20:40
    will not give you...
  • 20:40 - 20:43
    Okay, 32 questions, 32 marks. Okay, so it
  • 20:43 - 20:44
    would be a,
  • 20:44 - 20:46
    you know, all the 32 questions would have
  • 20:46 - 20:47
    different marks.
  • 20:47 - 20:50
    Different marks. Okay, so everyone will
  • 20:50 - 20:51
    not be one mark each
  • 20:51 - 20:54
    like that. Okay, so 150 questions are
  • 20:54 - 20:55
    scaled
  • 20:55 - 20:59
    under 800. Okay? And you have to...
  • 20:59 - 21:02
    So it uses and report scores
  • 21:02 - 21:05
    on a common scale from 200 to 800. Okay,
  • 21:05 - 21:08
    no one gets less than 200.
  • 21:08 - 21:12
    Okay, no one gets more than 800, obviously.
  • 21:12 - 21:15
    Okay, so it's between 200 to 800.
  • 21:15 - 21:17
    Then, a candidate must receive a score of
  • 21:17 - 21:19
    450
  • 21:19 - 21:22
    or higher, you know. That's a minimum
  • 21:22 - 21:27
    score. I got 656
  • 21:27 - 21:30
    in the exam. Okay, and
  • 21:30 - 21:34
    one of the important domains, you know,
  • 21:34 - 21:36
    you have to pass all the domains. So,
  • 21:36 - 21:37
    you have to score
  • 21:37 - 21:41
    450 in all the domains. Okay, so it's
  • 21:41 - 21:41
    not if you,
  • 21:41 - 21:45
    even if you get a score of, for example,
  • 21:45 - 21:46
    600,
  • 21:46 - 21:49
    but you score less than 450 in any
  • 21:49 - 21:51
    of the domains,
  • 21:51 - 21:53
    then you have to repeat the exam. So
  • 21:53 - 21:54
    that's how
  • 21:54 - 21:57
    it is. Okay, you get the score
  • 21:57 - 21:59
    at the end of the exam, so it will give
  • 21:59 - 22:00
    you a very
  • 22:00 - 22:03
    little indication, you know, small
  • 22:03 - 22:04
    indication
  • 22:04 - 22:07
    to say pass. You know, it will flash on
  • 22:07 - 22:08
    your screen,
  • 22:08 - 22:11
    that says "you passed." Okay, and it would be
  • 22:11 - 22:11
    a very small,
  • 22:11 - 22:14
    you know, sentence written there, and
  • 22:14 - 22:15
    you will know that
  • 22:15 - 22:16
    you have passed. You will not get the
  • 22:16 - 22:19
    official result there, but you
  • 22:19 - 22:20
    can leave the center
  • 22:20 - 22:23
    if you have passed. Okay, so...
  • 22:23 - 22:26
    But official results come 10
  • 22:26 - 22:27
    days later,
  • 22:27 - 22:29
    and after those 10 days, you can apply for
  • 22:29 - 22:32
    the certification with your experience.
  • 22:32 - 22:34
    Okay, so there will be a score report,
  • 22:34 - 22:36
    okay, in which you will see
  • 22:36 - 22:38
    how much you have scored in each
  • 22:38 - 22:39
    domain. Okay,
  • 22:39 - 22:42
    so these are the steps for the user for
  • 22:42 - 22:44
    the certification. You need to
  • 22:44 - 22:46
    pass the exam first, and then you have to
  • 22:46 - 22:48
    submit the application with your
  • 22:48 - 22:49
    experience.
  • 22:49 - 22:51
    You have to kind of sign a
  • 22:51 - 22:52
    checklist
  • 22:52 - 22:56
    stating that you follow
  • 22:56 - 22:59
    the ISACA code of practices and ethics,
  • 22:59 - 23:02
    and you agree to comply with
  • 23:02 - 23:07
    the CPE (Continuous Professional Education) policy,
  • 23:07 - 23:10
    which is continuous professional education points. You must also
  • 23:10 - 23:12
    comply with information systems auditing
  • 23:12 - 23:13
    standards,
  • 23:13 - 23:16
    which ISACA publishes. Alright, let's
  • 23:16 - 23:18
    start with Domain One.
  • 23:18 - 23:20
    First and foremost, we have to
  • 23:20 - 23:21
    understand
  • 23:21 - 23:23
    the definition of information systems--
  • 23:23 - 23:25
    how we perceive
  • 23:25 - 23:26
    those information systems to be.
  • 23:26 - 23:28
    Information systems
  • 23:28 - 23:31
    include your laptop, your desktop,
  • 23:31 - 23:32
    your mobile phone,
  • 23:32 - 23:35
    and your servers. It's everything
  • 23:35 - 23:36
    around you in terms of digital technology.
  • 23:36 - 23:38
    Okay, so those are the information
  • 23:38 - 23:41
    systems. Now, when we look at information
  • 23:41 - 23:42
    systems, we're not looking at hardware
  • 23:42 - 23:43
    only.
  • 23:43 - 23:45
    Okay, we are also looking at the
  • 23:45 - 23:47
    processes around that hardware. For
  • 23:47 - 23:48
    example, your laptop--
  • 23:48 - 23:50
    you know, as simple as that--we have the
  • 23:50 - 23:51
    process of,
  • 23:51 - 23:55
    you know, antivirus updating
  • 23:55 - 23:56
    on the laptop, the
  • 23:56 - 23:58
    maintenance process
  • 23:58 - 24:00
    of the laptop, etc. Similarly, for servers,
  • 24:00 - 24:02
    you have backup, release
  • 24:02 - 24:04
    management, change management,
  • 24:04 - 24:07
    patch management, and
  • 24:07 - 24:10
    antivirus on the server. You know, all
  • 24:10 - 24:12
    those processes around the server
  • 24:12 - 24:14
    are also part of the information systems.
  • 24:14 - 24:16
    So, when we are auditing an information
  • 24:16 - 24:18
    system, we are not just auditing the hardware;
  • 24:18 - 24:20
    we are also auditing the processes
  • 24:20 - 24:21
    around that hardware.
  • 24:21 - 24:24
    Why we are auditing is because
  • 24:24 - 24:26
    there is a dependency of the business
  • 24:26 - 24:29
    on that system. Okay, that's the reason we
  • 24:29 - 24:30
    need to
  • 24:30 - 24:32
    have processes around it. When we talk
  • 24:32 - 24:34
    about information system auditing
  • 24:34 - 24:37
    practices, it encompasses the standards,
  • 24:37 - 24:39
    the principles, the methods, the
  • 24:39 - 24:41
    guidelines, and the techniques that an
  • 24:41 - 24:41
    auditor
  • 24:41 - 24:45
    uses to plan, execute, assess, and review
  • 24:45 - 24:46
    business or information systems and
  • 24:46 - 24:48
    related processes.
  • 24:48 - 24:51
    Okay, now as I said, information systems
  • 24:51 - 24:52
    definition is
  • 24:52 - 24:53
    very important for you to understand. You
  • 24:53 - 24:55
    also need to understand that there are
  • 24:55 - 24:56
    certain
  • 24:56 - 24:59
    governing mechanisms that have been
  • 24:59 - 25:00
    defined by the industry.
  • 25:00 - 25:02
    Okay, and these governing mechanisms
  • 25:02 - 25:05
    basically are the standards.
  • 25:05 - 25:09
    Okay, for example, if you see ISO 27001,
  • 25:09 - 25:12
    okay, which is a standard for information
  • 25:12 - 25:14
    security
  • 25:14 - 25:16
    management systems, okay, that
  • 25:16 - 25:19
    standard basically governs how
  • 25:19 - 25:20
    information
  • 25:20 - 25:23
    security shall be managed in an
  • 25:23 - 25:24
    organization.
  • 25:24 - 25:26
    Similarly, there are certain principles.
  • 25:26 - 25:28
    Similarly, there are certain methods.
  • 25:28 - 25:31
    There are certain guidelines, best
  • 25:31 - 25:33
    practices (which we also call
  • 25:33 - 25:35
    techniques) that the
  • 25:35 - 25:37
    auditor can use
  • 25:37 - 25:40
    to complete the audit
  • 25:40 - 25:41
    across
  • 25:41 - 25:43
    all the phases of auditing, okay,
  • 25:43 - 25:46
    which are planning, execution, assessment, and review.
  • 25:46 - 25:48
    As an auditor, you must have a thorough
  • 25:48 - 25:50
    understanding of the.
  • 25:50 - 25:52
    of the auditing processes. You should also
  • 25:52 - 25:54
    have an understanding
  • 25:54 - 25:57
    of the information system processes.
  • 25:57 - 25:59
    But what I said, like change management,
  • 25:59 - 26:00
    patch management,
  • 26:00 - 26:02
    etc. Whatever systems
  • 26:02 - 26:04
    you are dealing with, you should have an
  • 26:04 - 26:07
    understanding of those processes around
  • 26:07 - 26:08
    the information system. You
  • 26:08 - 26:09
    should also
  • 26:09 - 26:11
    understand the overall goal.
  • 26:11 - 26:13
    Ultimately, the benefit
  • 26:13 - 26:16
    of the information system is realized
  • 26:16 - 26:17
    by the business.
  • 26:17 - 26:19
    Okay, and it helps the business
  • 26:19 - 26:20
    achieve its own
  • 26:20 - 26:22
    objectives. Okay, and the business also
  • 26:22 - 26:23
    wants
  • 26:23 - 26:25
    certain controls in place to ensure that,
  • 26:25 - 26:27
    you know, those objectives are achieved
  • 26:27 - 26:28
    effectively
  • 26:28 - 26:31
    and efficiently. So, you should also
  • 26:31 - 26:33
    have an understanding of the controls.
  • 26:33 - 26:36
    Now, if I take an example, you know,
  • 26:36 - 26:38
    for example, the information system
  • 26:38 - 26:41
    we are talking about is a server. You
  • 26:41 - 26:42
    know, and in that...
  • 26:42 - 26:44
    From that server, the
  • 26:44 - 26:45
    processes around that
  • 26:45 - 26:47
    information system include backup
  • 26:47 - 26:48
    is important. You know,
  • 26:48 - 26:51
    making
  • 26:51 - 26:52
    changes to the server,
  • 26:52 - 26:54
    new releases, patch management, etc. You need to understand the
  • 26:54 - 26:56
    important processes
  • 26:56 - 26:59
    around that system. Okay, so you have
  • 26:59 - 27:00
    to understand how
  • 27:00 - 27:02
    these process around that, and then you
  • 27:02 - 27:03
    have to understand
  • 27:03 - 27:07
    how these processes would also have an
  • 27:07 - 27:07
    affect
  • 27:07 - 27:09
    on the business processes. Okay, for
  • 27:09 - 27:12
    example, that server is supporting an HR
  • 27:12 - 27:13
    function
  • 27:13 - 27:15
    in an organization, particularly in terms of payroll.
  • 27:15 - 27:16
    Okay.
  • 27:16 - 27:19
    Now, if there is a patch release
  • 27:19 - 27:21
    or patch management or a new
  • 27:21 - 27:23
    password release, or if there is a
  • 27:23 - 27:26
    change to
  • 27:26 - 27:27
    the server,
  • 27:27 - 27:30
    how will that affect my HR
  • 27:30 - 27:33
    payroll system in
  • 27:33 - 27:34
    the organization? Okay,
  • 27:34 - 27:37
    and you have to see what control
  • 27:37 - 27:38
    you can put in place
  • 27:38 - 27:41
    so that it doesn't affect my business.
  • 27:41 - 27:41
    Okay.
  • 27:41 - 27:44
    Now, change management itself
  • 27:44 - 27:45
    is a process. Okay?
  • 27:45 - 27:48
    Processes themselves are controls,
  • 27:48 - 27:52
    but how do I ensure
  • 27:52 - 27:56
    that the processes are in line
  • 27:56 - 27:59
    with my business objectives? Okay, so...
  • 27:59 - 28:00
    As an auditor, you
  • 28:00 - 28:02
    are there to check. You are there to
  • 28:02 - 28:04
    verify those processes--
  • 28:04 - 28:06
    whether
  • 28:06 - 28:08
    the controls in place
  • 28:08 - 28:11
    are working adequately and whether
  • 28:11 - 28:12
    those processes
  • 28:12 - 28:14
    continue to serve their business
  • 28:14 - 28:16
    objectives.
  • 28:16 - 28:19
    Any issues with those processes?
  • 28:19 - 28:19
    You know,
  • 28:19 - 28:21
    how I would, you know, as an
  • 28:21 - 28:23
    auditor, would
  • 28:23 - 28:25
    you try to verify those
  • 28:25 - 28:26
    things
  • 28:26 - 28:29
    through sampling,
  • 28:29 - 28:31
    you know, through various
  • 28:31 - 28:33
    other auditing techniques
  • 28:33 - 28:35
    to see whether, you know, the processes
  • 28:35 - 28:36
    and controls are
  • 28:36 - 28:38
    effectively working. So, what
  • 28:38 - 28:40
    we are trying
  • 28:40 - 28:42
    to see here is whether the business
  • 28:42 - 28:43
    processes and controls are designed
  • 28:43 - 28:46
    to achieve the organization's objectives
  • 28:46 - 28:47
    and protect
  • 28:47 - 28:50
    the organizational assets. Now, upon the
  • 28:50 - 28:52
    completion of this domain,
  • 28:52 - 28:54
    you would be
  • 28:54 - 28:57
    able to plan an audit. Okay, now audit, as
  • 28:57 - 28:58
    I said,
  • 28:58 - 29:01
    is a kind of project. Okay, the same
  • 29:01 - 29:03
    project management techniques
  • 29:03 - 29:05
    or the same project management
  • 29:05 - 29:06
    methodology
  • 29:06 - 29:09
    also works for an audit. Okay. So,
  • 29:09 - 29:11
    when you say
  • 29:11 - 29:13
    project management, you
  • 29:13 - 29:14
    have planning,
  • 29:14 - 29:16
    you’re planning
  • 29:16 - 29:18
    the implementation of that
  • 29:18 - 29:20
    project--in this case, the scheduling of that
  • 29:20 - 29:21
    project--and then
  • 29:21 - 29:25
    implementation and development, and then
  • 29:25 - 29:27
    post-implementation. Similarly, you have
  • 29:27 - 29:29
    planning the audit, conducting it (which is
  • 29:29 - 29:31
    your implementation),
  • 29:31 - 29:33
    communicating the audit progress,
  • 29:33 - 29:35
    conducting audit follow-ups,
  • 29:35 - 29:37
    and then evaluating the
  • 29:37 - 29:39
    management and monitoring of controls in
  • 29:39 - 29:42
    the auditing. You also utilize data
  • 29:42 - 29:44
    analytics tools to streamline audit
  • 29:44 - 29:44
    processes.
  • 29:44 - 29:47
    After that, you will have to
  • 29:47 - 29:49
    provide consulting services and guidance
  • 29:49 - 29:50
    to the organization to improve the
  • 29:50 - 29:52
    quality and control of the information
  • 29:52 - 29:54
    systems. Now, this is not part of the
  • 29:54 - 29:54
    audit,
  • 29:54 - 29:56
    but sometimes when we have an audit
  • 29:56 - 29:58
    called internal audit, you know,
  • 29:58 - 30:01
    your role is also something
  • 30:01 - 30:03
    related to consulting, where you
  • 30:03 - 30:05
    try to improve the internal
  • 30:05 - 30:07
    process. However, if you go for an
  • 30:07 - 30:09
    external audit, you don't do that.
  • 30:09 - 30:10
    Okay, you don’t provide consulting
  • 30:10 - 30:12
    services. Then, you also identify
  • 30:12 - 30:13
    opportunities for process improvements
  • 30:13 - 30:16
    in the organization's IT policies and
  • 30:16 - 30:18
    practices. These are some of the areas,
  • 30:18 - 30:20
    and there will be many more,
  • 30:20 - 30:22
    so this is not an exhaustive list.
  • 30:22 - 30:23
    These are some of the areas
  • 30:23 - 30:23
    where you,
  • 30:23 - 30:27
    as an auditor, should be aware. Now,
  • 30:27 - 30:27
    these are
  • 30:27 - 30:29
    the topics in this domain are divided
  • 30:29 - 30:32
    into two parts.
  • 30:32 - 30:35
    One is planning, and the second one
  • 30:35 - 30:38
    is execution. In the planning part, we
  • 30:38 - 30:39
    will study about
  • 30:39 - 30:42
    the audit standard guidelines, code of
  • 30:42 - 30:44
    ethics (as given by ISACA), and we
  • 30:44 - 30:46
    will understand the various business
  • 30:46 - 30:48
    processes in an organization. For example,
  • 30:48 - 30:49
    we are aware of
  • 30:49 - 30:52
    HR, finance, procurement,
  • 30:52 - 30:55
    you have the
  • 30:55 - 30:58
    physical security, the real
  • 30:58 - 31:00
    estate of the organization,
  • 31:00 - 31:02
    managing the administration of the
  • 31:02 - 31:03
    organization, and
  • 31:03 - 31:06
    the operations,
  • 31:06 - 31:08
    and etc.
  • 31:08 - 31:09
    We will study some of the common
  • 31:09 - 31:11
    processes in every organization.
  • 31:11 - 31:14
    You will also see the types of controls.
  • 31:14 - 31:17
    Now, what are controls? Controls are
  • 31:17 - 31:18
    there to mitigate the risk,
  • 31:18 - 31:20
    to mitigate the risk to the
  • 31:20 - 31:22
    business objectives. Then we will also
  • 31:22 - 31:23
    talk about a
  • 31:23 - 31:25
    very important principle of risk-based
  • 31:25 - 31:26
    audit planning.
  • 31:26 - 31:29
    Now, you must be aware that
  • 31:29 - 31:30
    in an
  • 31:30 - 31:32
    organization, resources are limited.
  • 31:32 - 31:34
    Every organization's resources are
  • 31:34 - 31:36
    limited. Okay, that's the fundamental
  • 31:36 - 31:37
    principle you need to understand.
  • 31:37 - 31:39
    And if you see the process, the resources
  • 31:39 - 31:41
    are limited. You have to align those
  • 31:41 - 31:43
    resources to the max...
  • 31:43 - 31:45
    to an area where there is a
  • 31:45 - 31:47
    maximum risk for an organization. Okay,
  • 31:47 - 31:49
    that's the reason we call it
  • 31:49 - 31:51
    risk-based audit planning. So, as an
  • 31:51 - 31:52
    auditor, I am limited;
  • 31:52 - 31:55
    I am a single person in the whole
  • 31:55 - 31:56
    organization.
  • 31:56 - 31:58
    My focus should be on core banking,
  • 31:58 - 32:01
    core applications, or core business
  • 32:01 - 32:02
    operations
  • 32:02 - 32:05
    rather than, maybe, HR.
  • 32:05 - 32:07
    That's the reason we look at the maximum
  • 32:07 - 32:09
    risk area of an organization and start
  • 32:09 - 32:11
    auditing from there.
  • 32:11 - 32:14
    Okay, so that the maximum risks
  • 32:14 - 32:17
    are addressed in an organization. So, this
  • 32:17 - 32:19
    is basically the risk-based audit
  • 32:19 - 32:19
    planning:
  • 32:19 - 32:22
    you plan audit based on the risk to the
  • 32:22 - 32:24
    organization. So, you go for high risk
  • 32:24 - 32:26
    first, and then medium, and then low.
  • 32:26 - 32:29
    Okay, and this is how every organization
  • 32:29 - 32:32
    works. Then, you have types of audits.
  • 32:32 - 32:33
    There are internal audits,
  • 32:33 - 32:36
    second-party audits, and third-party
  • 32:36 - 32:37
    audits.
  • 32:37 - 32:39
    Okay, we will see what arrangements we
  • 32:39 - 32:40
    have
  • 32:40 - 32:43
    in the various audits and also what
  • 32:43 - 32:44
    the difference is between an
  • 32:44 - 32:47
    audit and an assessment. Audits are
  • 32:47 - 32:50
    basically done
  • 32:50 - 32:52
    to verify things; assessments are
  • 32:52 - 32:54
    also done to verify things, but due to the
  • 32:54 - 32:55
    the
  • 32:55 - 32:57
    different arrangements in an audit and
  • 32:57 - 32:59
    assessment, your
  • 32:59 - 33:02
    communication changes. Okay, your
  • 33:02 - 33:06
    job responsibilities also change.
  • 33:06 - 33:08
    Okay, in the execution part, we will study
  • 33:08 - 33:09
    about
  • 33:09 - 33:12
    the project management of an audit. Okay.
  • 33:12 - 33:14
    As I’m continuously repeating from the
  • 33:14 - 33:16
    beginning, audit is a project,
  • 33:16 - 33:19
    right? We have to treat it as a project.
  • 33:19 - 33:20
    Okay, and then we will also look at
  • 33:20 - 33:22
    sampling methods.
  • 33:22 - 33:24
    Okay, we will try to look at the audit
  • 33:24 - 33:26
    evidence collection techniques. It's
  • 33:26 - 33:29
    very important because, as an auditor, by
  • 33:29 - 33:31
    principle, you should not give any
  • 33:31 - 33:33
    findings unless you have evidence
  • 33:33 - 33:34
    against it. Okay?
  • 33:34 - 33:37
    Then you have data analytics. Nowadays,
  • 33:37 - 33:40
    we are using systems
  • 33:40 - 33:42
    like banking
  • 33:42 - 33:44
    systems and, you know,
  • 33:44 - 33:46
    telecommunication systems
  • 33:46 - 33:48
    where you require data analytics
  • 33:48 - 33:50
    techniques to basically ensure
  • 33:50 - 33:53
    that the system is working effectively.
  • 33:53 - 33:54
    Okay.
  • 33:54 - 33:56
    So, we will study how auditing,
  • 33:56 - 33:57
    you know,
  • 33:57 - 33:59
    how data analytics helps auditing to
  • 33:59 - 34:00
    give better results.
  • 34:00 - 34:02
    Then, reporting and communication
  • 34:02 - 34:04
    techniques are very important.
  • 34:04 - 34:06
    Again, this would depend on the
  • 34:06 - 34:08
    reporting commission technique. It would
  • 34:08 - 34:09
    also depend on the arrangement of the
  • 34:09 - 34:10
    audit.
  • 34:10 - 34:12
    Okay, what kind of arrangement is it? Then
  • 34:12 - 34:14
    we'll talk about quality assurance and
  • 34:14 - 34:16
    improvement of the audit process.
  • 34:16 - 34:18
    Now, an audit also has a quality
  • 34:18 - 34:20
    department.
  • 34:20 - 34:22
    Generally, all auditing functions have a
  • 34:22 - 34:25
    quality department.
  • 34:25 - 34:28
    For example, if I give a finding as an
  • 34:28 - 34:29
    auditor,
  • 34:29 - 34:32
    the quality of that finding
  • 34:32 - 34:33
    would also be judged.
  • 34:33 - 34:36
    Okay? I wouldn't say judged basically;
  • 34:36 - 34:39
    I would say it would be assessed. Okay.
  • 34:39 - 34:41
    For example, what kind of evidence is
  • 34:41 - 34:44
    it? How has that evidence been captured?
  • 34:44 - 34:47
    How effective is that evidence in saying
  • 34:47 - 34:49
    that this particular finding can affect
  • 34:49 - 34:50
    the business?
  • 34:50 - 34:53
    All those parameters are basically
  • 34:53 - 34:54
    assessed.
  • 34:54 - 34:57
    Okay. Many auditing firms, for
  • 34:57 - 34:58
    example,
  • 34:58 - 35:01
    EY, Deloitte, PwC,
  • 35:01 - 35:04
    all these auditing firms have quality
  • 35:04 - 35:05
    departments
  • 35:05 - 35:08
    that verify this. Also, external
  • 35:08 - 35:09
    auditors.
  • 35:09 - 35:12
    Also, you know, sometimes, though not
  • 35:12 - 35:15
    very rigorously, look into,
  • 35:15 - 35:16
    look into
  • 35:16 - 35:18
    what kind of findings the auditor
  • 35:18 - 35:19
    gives.
  • 35:19 - 35:21
    And because we also have some
  • 35:21 - 35:23
    contentions when we are audited. If
  • 35:23 - 35:25
    the auditor gives a finding, we can raise
  • 35:25 - 35:26
    a question like, "Why did you give this
  • 35:26 - 35:27
    finding to me?"
  • 35:27 - 35:29
    You know, we can question them. They
  • 35:29 - 35:32
    should be able to answer those questions
  • 35:32 - 35:35
    appropriately to us. Okay, let's start
  • 35:35 - 35:38
    with the first topic, which is planning.
  • 35:38 - 35:41
    Okay, so what is an audit? An audit is
  • 35:41 - 35:42
    basically,
  • 35:42 - 35:46
    as I said, verifying. Another word for
  • 35:46 - 35:47
    auditing is verifying,
  • 35:47 - 35:49
    checking. Okay, so it's a formal
  • 35:49 - 35:51
    examination on testing or information
  • 35:51 - 35:53
    systems to determine whether
  • 35:53 - 35:56
    those systems are working as per the
  • 35:56 - 35:58
    applicable laws, regulations, contracts,
  • 35:58 - 36:00
    and industry guidelines.
  • 36:00 - 36:02
    Now, these compliances--laws,
  • 36:02 - 36:04
    regulations, contracts, and industry
  • 36:04 - 36:05
    guidelines--
  • 36:05 - 36:08
    depend on, again,
  • 36:08 - 36:09
    country to country,
  • 36:09 - 36:12
    industry to industry, supplier or
  • 36:12 - 36:14
    contractor to contractor,
  • 36:14 - 36:17
    third-party to third-party. Also,
  • 36:17 - 36:18
    regulations are typically set by
  • 36:18 - 36:20
    regulatory bodies.
  • 36:20 - 36:22
    So, it also depends on, again,
  • 36:22 - 36:24
    regulatory bodies for industries.
  • 36:24 - 36:27
    For example, there’s TRAI for India, RBI for
  • 36:27 - 36:28
    banking, TRAI
  • 36:28 - 36:31
    for telecom, RBI for banking, NPCI for
  • 36:31 - 36:32
    payment gateways,
  • 36:32 - 36:35
    IRDA for insurance. These bodies also have
  • 36:35 - 36:36
    certain
  • 36:36 - 36:38
    guidelines for the information systems.
  • 36:38 - 36:40
    So, information systems
  • 36:40 - 36:43
    have to comply with those guidelines or
  • 36:43 - 36:46
    regulations set by the regulatory
  • 36:46 - 36:47
    body.
  • 36:47 - 36:50
    Okay, so that is one thing you check. Okay.
  • 36:50 - 36:51
    Then, the other thing you check
  • 36:51 - 36:53
    is whether those comply with the
  • 36:53 - 36:54
    governance criteria
  • 36:54 - 36:57
    and relevant policies and procedures. Now,
  • 36:57 - 36:58
    you also
  • 36:58 - 36:59
    see that information should function
  • 36:59 - 37:01
    under--so, information
  • 37:01 - 37:04
    is owned by an organization. For example,
  • 37:04 - 37:06
    that information system has to work
  • 37:06 - 37:08
    according to the internal policies and
  • 37:08 - 37:09
    internal compliances
  • 37:09 - 37:11
    of an organization. Okay, if you,
  • 37:11 - 37:12
    for example,
  • 37:12 - 37:15
    take a server, it
  • 37:15 - 37:16
    should work according to the change
  • 37:16 - 37:18
    management process,
  • 37:18 - 37:20
    patch management process, and, you know,
  • 37:20 - 37:22
    backup process defined by the
  • 37:22 - 37:22
    organization.
  • 37:22 - 37:24
    Okay, so that is one thing you
  • 37:24 - 37:26
    check: whether it’s compliant with the
  • 37:26 - 37:28
    policies, compliant with the laws and
  • 37:28 - 37:29
    regulations,
  • 37:29 - 37:31
    and whether it is complying with the
  • 37:31 - 37:33
    internal policies and procedures of the
  • 37:33 - 37:34
    organization.
  • 37:34 - 37:36
    The third thing you check is whether
  • 37:36 - 37:38
    that information system
  • 37:38 - 37:41
    is compliant with the CIA
  • 37:41 - 37:44
    is resilient to the CIA--which is
  • 37:44 - 37:45
    Confidentiality, Integrity, and
  • 37:45 - 37:46
    Availability--
  • 37:46 - 37:48
    at an appropriate level. Now, what is
  • 37:48 - 37:50
    confidentiality? What is integrity?
  • 37:50 - 37:53
    And what is availability? Confidentiality
  • 37:53 - 37:54
    is basically
  • 37:54 - 37:57
    that the system doesn’t allow
  • 37:57 - 37:58
    unauthorized access.
  • 37:58 - 38:00
    Okay, you know, the system doesn't allow
  • 38:00 - 38:01
    unauthorized access.
  • 38:01 - 38:05
    Integrity means the system doesn’t allow
  • 38:05 - 38:08
    inadequate modification or unauthorized
  • 38:08 - 38:08
    modification. The
  • 38:08 - 38:10
    system doesn’t allow unauthorized
  • 38:10 - 38:12
    modification to data
  • 38:12 - 38:14
    or any other parameters of information
  • 38:14 - 38:16
    systems. The third
  • 38:16 - 38:18
    thing is availability, which means the
  • 38:18 - 38:19
    system
  • 38:19 - 38:22
    allows authorized people to work. For
  • 38:22 - 38:23
    example, if you're going to
  • 38:23 - 38:26
    want to create a ticket,
  • 38:26 - 38:27
    raise a ticket, you should be allowed to
  • 38:27 - 38:29
    do that. Okay, you want to,
  • 38:29 - 38:31
    for example, if you want to
  • 38:31 - 38:32
    access your emails,
  • 38:32 - 38:34
    as email is a very important
  • 38:34 - 38:37
    operation, you should be allowed
  • 38:37 - 38:39
    to operate your email because
  • 38:39 - 38:40
    you're authorized to do so.
  • 38:40 - 38:44
    Okay, so that’s also an important thing
  • 38:44 - 38:47
    to look at from an information
  • 38:47 - 38:48
    systems perspective.
  • 38:48 - 38:50
    So, confidentiality, integrity, and
  • 38:50 - 38:52
    availability should be maintained
  • 38:52 - 38:55
    in the information systems, and
  • 38:55 - 38:57
    we apply controls to reduce the
  • 38:57 - 38:59
    impact on the CIA.
  • 38:59 - 39:01
    Okay, so you should also test
  • 39:01 - 39:03
    the CIA parameters
  • 39:03 - 39:06
    of the system. Then, the fourth thing is whether
  • 39:06 - 39:07
    the efficient
  • 39:07 - 39:10
    and effective targets are met. Now,
  • 39:10 - 39:11
    efficiency
  • 39:11 - 39:13
    is something related to
  • 39:13 - 39:14
    cost. Okay. So,
  • 39:14 - 39:16
    IT operations are accomplished
  • 39:16 - 39:19
    efficiently, which means reducing costs.
  • 39:19 - 39:22
    Okay. Effectiveness means that they are
  • 39:22 - 39:24
    done effectively. For example, you have an
  • 39:24 - 39:25
    antivirus.
  • 39:25 - 39:27
    First and foremost, efficiency means the
  • 39:27 - 39:28
    cost of the antivirus should
  • 39:28 - 39:30
    not be too high according to
  • 39:30 - 39:31
    the organization.
  • 39:31 - 39:34
    Effectiveness means it should also prevent
  • 39:34 - 39:35
    viruses
  • 39:35 - 39:37
    and malware attacks on the
  • 39:37 - 39:38
    organization or
  • 39:38 - 39:40
    the system or the information system. Okay.
  • 39:40 - 39:43
    So, these are the four parameters
  • 39:43 - 39:45
    you need to look at when you are
  • 39:45 - 39:47
    verifying and checking information
  • 39:47 - 39:48
    systems.
  • 39:48 - 39:50
    The first thing is the compliance
  • 39:50 - 39:52
    with laws and regulations. The second is governance,
  • 39:52 - 39:55
    is about governance,
  • 39:55 - 39:58
    the compliance level, and the internal
  • 39:58 - 39:59
    policies and procedures.
  • 39:59 - 40:03
    Okay. The third thing is the impact on the CIA,
  • 40:03 - 40:04
    to the CIA.
  • 40:04 - 40:06
    And the fourth thing is about the efficient
  • 40:06 - 40:08
    and effective
  • 40:08 - 40:10
    operations of the information systems. So,
  • 40:10 - 40:12
    these are the four parameters you check
  • 40:12 - 40:13
    in the audit.
  • 40:13 - 40:16
    Okay, so the audit process has
  • 40:16 - 40:19
    three steps. One is planning
  • 40:19 - 40:20
    the audit,
  • 40:20 - 40:23
    then conducting the audit, and finally,
  • 40:23 - 40:25
    reporting and follow-up.
  • 40:25 - 40:28
    Okay, so we’ll discuss that. First and
  • 40:28 - 40:30
    foremost, you need to understand the
  • 40:30 - 40:34
    ISACA standards. There is an audit
  • 40:34 - 40:36
    standard by ISACA. I’ll go to the ISACA website.
  • 40:36 - 40:38
    I'll go to the website of ISACA
  • 40:38 - 40:41
    to show you where it is. If you check
  • 40:41 - 40:42
    the resources,
  • 40:42 - 40:46
    in the resources, you will
  • 40:46 - 40:49
    go to Frameworks, Standards, and
  • 40:49 - 40:54
    Models. Okay.
  • 40:54 - 40:57
    Okay, there is this process called ITAF,
  • 40:57 - 40:58
    which is the Information Technology
  • 40:58 - 41:01
    Assurance Framework.
  • 41:01 - 41:04
    Okay, this is a free standard.
  • 41:04 - 41:08
    Okay, you might download this.
  • 41:11 - 41:14
    Okay, so you have to select the language and
  • 41:14 - 41:15
    and download it.
  • 41:15 - 41:19
    Now, this is an important standard to
  • 41:19 - 41:22
    look at. Okay, it has been downloaded, and I
  • 41:22 - 41:23
    have that
  • 41:23 - 41:24
    with me.
  • 41:26 - 41:29
    Okay, so this is called ITAF,
  • 41:29 - 41:34
    which is your IT Assurance Framework.
  • 41:34 - 41:37
    Okay, and this talks about IS
  • 41:37 - 41:39
    audit and assurance, so this is a
  • 41:39 - 41:41
    standard, basically.
  • 41:41 - 41:44
    Okay. So,
  • 41:44 - 41:46
    first and foremost, the standard for IS
  • 41:46 - 41:48
    audit and assurance
  • 41:48 - 41:51
    is divided into three parts:
  • 41:51 - 41:54
    one is the general standard,
  • 41:54 - 41:56
    okay, and performance standard,
  • 41:56 - 41:59
    and reporting standard.
  • 41:59 - 42:03
    Okay, so in the general standard, it
  • 42:03 - 42:05
    talks about planning,
  • 42:05 - 42:07
    okay, there. Performance talks about
  • 42:07 - 42:08
    conducting the audit,
  • 42:08 - 42:12
    okay? And then, the reporting standard
  • 42:12 - 42:14
    talks about the third space, which is
  • 42:14 - 42:16
    reporting. Now,
  • 42:16 - 42:19
    how to apply this standard. There is
  • 42:19 - 42:20
    a certain guideline,
  • 42:20 - 42:22
    which has been defined. Now, the
  • 42:22 - 42:23
    guidelines is this one.
  • 42:23 - 42:25
    If you say, I saw it at assurance
  • 42:25 - 42:26
    guideline. Okay.
  • 42:26 - 42:29
    Now, basically, both of these, if you see
  • 42:29 - 42:31
    this is also audit charter. This is also
  • 42:31 - 42:32
    audit charter.
  • 42:32 - 42:35
    Here, if you see, talks about a very brief...
  • 42:35 - 42:38
    of what it is. Okay? This would... this
  • 42:38 - 42:40
    guideline will tell you how to implement
  • 42:40 - 42:41
    this audit charter
  • 42:41 - 42:44
    in the audit assurance guidelines. Then,
  • 42:44 - 42:45
    there is
  • 42:45 - 42:47
    tools and techniques in this particular
  • 42:47 - 42:49
    document. Okay? IS audit issues tools and
  • 42:49 - 42:51
    techniques. And then, there is
  • 42:51 - 42:54
    also professional ethics part
  • 42:54 - 42:56
    also there. In the tools and techniques,
  • 42:56 - 42:57
    there is also,
  • 42:57 - 42:59
    you know, professional
  • 42:59 - 43:01
    ethics and standards.
  • 43:01 - 43:04
    Now, coming back to the presentation,
  • 43:04 - 43:05
    what is this standard
  • 43:05 - 43:07
    about? ISACA's audit and
  • 43:07 - 43:09
    assurance standard defines mandatory
  • 43:09 - 43:10
    requirements
  • 43:10 - 43:13
    for IS auditing. Obviously, whenever
  • 43:13 - 43:14
    you .
  • 43:14 - 43:17
    see the word "standard," you must be aware
  • 43:17 - 43:18
    that it’s mandatory.
  • 43:18 - 43:20
    Okay, and how do you understand that it's
  • 43:20 - 43:23
    mandatory? Because the word "shall" is used
  • 43:23 - 43:24
    there. Okay, so if you see here
  • 43:24 - 43:28
    in the audit charter,
  • 43:28 - 43:30
    if you go to page number 12 quickly,
  • 43:30 - 43:32
    if you see the audit charter,
  • 43:32 - 43:37
    you'll see the word "shall" is used.
  • 43:37 - 43:41
    Let me show you. If you see,
  • 43:41 - 43:45
    the word "shall" is used. Okay.
  • 43:45 - 43:48
    So, if you see everywhere "shall" is used,
  • 43:48 - 43:49
    this is mandatory. When you say
  • 43:49 - 43:50
    "standard,"
  • 43:50 - 43:53
    this is mandatory. Okay, and when you go
  • 43:53 - 43:54
    to the guideline, go to
  • 43:54 - 43:56
    page number 40, go to page number 42
  • 43:56 - 43:58
    quickly,
  • 43:58 - 44:01
    and you'll see the audit charter. The word
  • 44:01 - 44:01
    "should"
  • 44:01 - 44:04
    is used. If you see here, the
  • 44:04 - 44:06
    purpose of this guideline is to assist, and
  • 44:06 - 44:07
    the ISO
  • 44:07 - 44:09
    should consider this guideline. Now, this
  • 44:09 - 44:10
    is a guideline. A
  • 44:10 - 44:13
    guideline is non-mandatory. A
  • 44:13 - 44:15
    standard is mandatory.
  • 44:15 - 44:18
    Okay, so this is one difference you must
  • 44:18 - 44:20
    understand. You will see this is
  • 44:20 - 44:22
    basically the guideline's purpose
  • 44:22 - 44:24
    and linkage to the standard. Okay, coming
  • 44:24 - 44:25
    back,
  • 44:25 - 44:27
    that’s the reason the
  • 44:27 - 44:29
    standard defines mandatory requirements
  • 44:29 - 44:30
    for
  • 44:30 - 44:33
    IS auditing, reporting, and informing.
  • 44:33 - 44:33
    Okay,
  • 44:33 - 44:36
    as an auditor, you must isolate
  • 44:36 - 44:38
    the minimum level of acceptable
  • 44:38 - 44:39
    performance required to meet the
  • 44:39 - 44:41
    professional responsibilities
  • 44:41 - 44:43
    set in the ISACA Code of Professional
  • 44:43 - 44:44
    Ethics. So,
  • 44:44 - 44:47
    you have to minimally practice the
  • 44:47 - 44:49
    standard.
  • 44:49 - 44:51
    Okay, that’s the reason I said reading
  • 44:51 - 44:53
    the standard is important
  • 44:53 - 44:55
    for you guys because that’s the minimum
  • 44:55 - 44:56
    requirement of an auditor.
  • 44:56 - 44:58
    Okay, yes, you can also read the guideline,
  • 44:58 - 45:00
    which will basically
  • 45:00 - 45:02
    help you implement that standard in
  • 45:02 - 45:04
    your job practices.
  • 45:04 - 45:06
    Okay. Now, then, management and other
  • 45:06 - 45:07
    interested parties have
  • 45:07 - 45:09
    professional expectations concerning the
  • 45:09 - 45:11
    work of practitioners.
  • 45:11 - 45:14
    Now, you also have to understand that as
  • 45:14 - 45:15
    an auditor,
  • 45:15 - 45:17
    you work with other experts in an
  • 45:17 - 45:18
    organization.
  • 45:18 - 45:22
    For example, an auditor,
  • 45:22 - 45:25
    you know, also works with IT people.
  • 45:25 - 45:28
    For IT, there are specific audits--
  • 45:28 - 45:30
    that’s what information system auditors
  • 45:30 - 45:32
    are. Then, there are
  • 45:32 - 45:34
    network people, network
  • 45:34 - 45:35
    audits,
  • 45:35 - 45:37
    software audits, and
  • 45:37 - 45:39
    then there are
  • 45:39 - 45:42
    information security audits. So, as
  • 45:42 - 45:43
    an auditor, whatever
  • 45:43 - 45:45
    your expertise is, you also work with
  • 45:45 - 45:46
    other auditors
  • 45:46 - 45:49
    or take the expertise of
  • 45:49 - 45:50
    other auditors
  • 45:50 - 45:53
    during your job. Okay,
  • 45:53 - 45:55
    so this particular standard also
  • 45:55 - 45:57
    talks about that--that’s how to take the
  • 45:57 - 46:00
    work of other practitioners in your
  • 46:00 - 46:02
    job, okay, in your auditing.
  • 46:02 - 46:05
    Okay, now, you
  • 46:05 - 46:08
    may not be a network expert. If you are not a network expert,
  • 46:08 - 46:09
    how would you audit a network?
  • 46:09 - 46:11
    You will take the expert’s
  • 46:11 - 46:14
    opinion--someone who has
  • 46:14 - 46:15
    expertise in the network field--
  • 46:15 - 46:18
    so you take their results to
  • 46:18 - 46:19
    basically
  • 46:19 - 46:22
    fulfill your auditing assignment. Okay.
  • 46:22 - 46:22
    So,
  • 46:22 - 46:24
    this particular standard also talks
  • 46:24 - 46:26
    about that. Then, it also
  • 46:26 - 46:28
    helps, basically, this is also a
  • 46:28 - 46:30
    requirement from CISA.
  • 46:30 - 46:32
    Okay. As a CISA designation holder, you must be
  • 46:32 - 46:33
    aware of the
  • 46:33 - 46:36
    requirements of this. Okay, so
  • 46:36 - 46:38
    holders of the CISA designation have
  • 46:38 - 46:39
    their professional
  • 46:39 - 46:42
    performance requirements, which is
  • 46:42 - 46:43
    something, which are
  • 46:43 - 46:45
    also mentioned here. If you want, I can
  • 46:45 - 46:46
    specifically go to
  • 46:46 - 46:49
    that document and tell you where it is
  • 46:49 - 46:49
    mentioned.
  • 46:49 - 46:52
    So, if you see here, you know, the
  • 46:52 - 46:54
    proficiency of an auditor
  • 46:54 - 46:57
    is also something that’s an important
  • 46:57 - 47:00
    parameter. Okay, now using the work of
  • 47:00 - 47:02
    other experts--that’s what I was talking
  • 47:02 - 47:03
    about.
  • 47:03 - 47:06
    Okay, 1206,
  • 47:06 - 47:10
    clause 1206 talks about
  • 47:10 - 47:12
    using the work of other experts. Now, I
  • 47:12 - 47:14
    will also go to the Code of Professional
  • 47:14 - 47:16
    Ethics.
  • 47:16 - 47:18
    So, these are the seven codes of
  • 47:18 - 47:20
    professional ethics,
  • 47:20 - 47:22
    which every auditor must be aware of.
  • 47:22 - 47:23
    That’s what
  • 47:23 - 47:25
    you also sign when you go for
  • 47:25 - 47:27
    certification after the exam.
  • 47:27 - 47:29
    Okay, these are the seven principles, I
  • 47:29 - 47:30
    would say,
  • 47:30 - 47:32
    or ethical statements that you must
  • 47:32 - 47:33
    comply with.
  • 47:33 - 47:36
    Okay, if you are found not adhering to
  • 47:36 - 47:38
    any of the seven principles,
  • 47:38 - 47:41
    there is a possibility of getting your
  • 47:41 - 47:42
    certification revoked.
  • 47:42 - 47:45
    There is also a disciplinary
  • 47:45 - 47:47
    process from ISACA
  • 47:47 - 47:50
    against the CISA certification. Okay, I
  • 47:50 - 47:50
    will go to that
  • 47:50 - 47:55
    later in the presentation as well.
  • 47:55 - 47:57
    Okay, I will move forward now. The
  • 47:57 - 47:58
    framework, which has
  • 47:58 - 48:02
    already been talked about--ITAF. Okay, ISACA’s
  • 48:02 - 48:04
    audit and assurance standards framework.
  • 48:04 - 48:06
    The framework of ISACA provides
  • 48:06 - 48:08
    national standard, provides the multiple
  • 48:08 - 48:10
    levels of documents. It talks about
  • 48:10 - 48:12
    the standard. Okay, I talked
  • 48:12 - 48:14
    about the guideline.
  • 48:14 - 48:16
    Okay, so the standard defines mandatory
  • 48:16 - 48:18
    requirements for IS audit assurance and
  • 48:18 - 48:19
    reporting.
  • 48:19 - 48:21
    Okay, then there are guidelines. I
  • 48:21 - 48:23
    told you that guidelines provide guidance in applying
  • 48:23 - 48:24
    the standard.
  • 48:24 - 48:27
    Okay, as an auditor, you should consider
  • 48:27 - 48:29
    them in determining how to achieve
  • 48:29 - 48:31
    and implement this particular
  • 48:31 - 48:32
    standard. Use
  • 48:32 - 48:35
    professional judgment here. Okay?
  • 48:35 - 48:35
    And their application,
  • 48:35 - 48:38
    okay? Now, professional judgment.
  • 48:38 - 48:40
    When the word "judgment" comes,
  • 48:40 - 48:43
    it is not mandatory. It is
  • 48:43 - 48:44
    discretionary, I would say.
  • 48:44 - 48:46
    Okay, when you say judgment, it
  • 48:46 - 48:48
    becomes discretionary. Okay, in their
  • 48:48 - 48:48
    application,
  • 48:48 - 48:51
    and you must be prepared to justify any departure
  • 48:51 - 48:52
    from the standard.
  • 48:52 - 48:54
    Okay, there is a possibility of
  • 48:54 - 48:56
    exceptions.
  • 48:56 - 48:58
    Okay, there is always a possibility of exceptions,
  • 48:58 - 49:00
    and then there has to be an
  • 49:00 - 49:01
    exception process around it
  • 49:01 - 49:05
    when you're applying that standard.
  • 49:05 - 49:07
    You must be able to justify those
  • 49:07 - 49:09
    exceptions from the standard as well. So, a
  • 49:09 - 49:11
    standard is not law.
  • 49:11 - 49:14
    Okay, so it’s not something that
  • 49:14 - 49:15
    you will be
  • 49:15 - 49:18
    persecuted for not following. Okay?
  • 49:18 - 49:18
    But
  • 49:18 - 49:21
    if you have an exception, you must justify it,
  • 49:21 - 49:24
    which is good for
  • 49:24 - 49:26
    the overall practice of auditing.
  • 49:26 - 49:29
    Then, there are tools and techniques
  • 49:29 - 49:32
    that provide examples of processes that
  • 49:32 - 49:34
    the IS auditor
  • 49:34 - 49:36
    might follow in an audit. Okay, and that’s
  • 49:36 - 49:37
    also
  • 49:37 - 49:39
    basically mentioned here. Tools and
  • 49:39 - 49:40
    techniques documents provide
  • 49:40 - 49:42
    information on how to meet the standard
  • 49:42 - 49:45
    when completing IS audit work,
  • 49:45 - 49:48
    but do not set the requirements. Okay,
  • 49:48 - 49:51
    and the requirements are again linked to
  • 49:51 - 49:54
    these standards. Okay. So, if you see, it
  • 49:54 - 49:55
    doesn't,
  • 49:55 - 49:56
    here it talks about mandatory
  • 49:56 - 49:59
    requirements, but these tools
  • 49:59 - 50:02
    do not set the requirements. Okay.
  • 50:02 - 50:06
    They never set the requirements. So, as I
  • 50:06 - 50:06
    said, the
  • 50:06 - 50:09
    general principles apply to the conduct of
  • 50:09 - 50:10
    all assignments. It's
  • 50:10 - 50:12
    applied to the conduct of all
  • 50:12 - 50:14
    assignments, and deal with ethics,
  • 50:14 - 50:17
    independence, objectivity, and
  • 50:17 - 50:20
    due care as well as knowledge, competency
  • 50:20 - 50:21
    and skill.
  • 50:21 - 50:23
    Okay, when you talk about performance, it
  • 50:23 - 50:24
    is about conducting.
  • 50:24 - 50:28
    Okay. It talks about planning,
  • 50:28 - 50:31
    supervision, scoping, risk, and materiality.
  • 50:31 - 50:33
    What is materiality, guys?
  • 50:33 - 50:35
    Materiality means the importance of the
  • 50:35 - 50:36
    effect
  • 50:36 - 50:39
    of that area. Okay, now,
  • 50:39 - 50:42
    whenever we look at materiality, we are
  • 50:42 - 50:43
    not looking at,
  • 50:43 - 50:46
    you know, it is basically the quality
  • 50:46 - 50:46
    of
  • 50:46 - 50:49
    the practice or the
  • 50:49 - 50:51
    transaction or the amount. For example,
  • 50:51 - 50:53
    for an organization,
  • 50:53 - 50:56
    a loss for a big organization like
  • 50:56 - 50:58
    PWC, a loss of one thousand dollars is
  • 50:58 - 51:02
    not material. Okay. But for them, a
  • 51:02 - 51:04
    one million dollar loss is
  • 51:04 - 51:06
    significant. Okay, so materiality is the
  • 51:06 - 51:08
    importance of that particular,
  • 51:08 - 51:11
    you know, loss or transaction. We
  • 51:11 - 51:13
    use this in auditing a lot because
  • 51:13 - 51:15
    we are trying to capture the
  • 51:15 - 51:16
    most significant
  • 51:16 - 51:19
    things first from an information
  • 51:19 - 51:20
    systems perspective.
  • 51:20 - 51:22
    Okay, for example, we're looking at the
  • 51:22 - 51:23
    most important application of an
  • 51:23 - 51:25
    organization,
  • 51:25 - 51:27
    which can affect their
  • 51:27 - 51:29
    business operations.
  • 51:29 - 51:31
    So, always look for the material
  • 51:31 - 51:32
    things. Always look for
  • 51:32 - 51:34
    the most important things for an
  • 51:34 - 51:35
    organization.
  • 51:35 - 51:38
    Okay, for example, if I go for a
  • 51:38 - 51:39
    bank or a bank audit,
  • 51:39 - 51:42
    I go in asking, "What is the card
  • 51:42 - 51:44
    doing?" You know,
  • 51:44 - 51:48
    I’m not looking at a CBC, a core banking
  • 51:48 - 51:51
    system (CBS); I’m looking at a process in
  • 51:51 - 51:52
    HR, for example,
  • 51:52 - 51:55
    which every bank has. But I
  • 51:55 - 51:56
    should be looking at
  • 51:56 - 51:58
    the most important thing, which is the CBS,
  • 51:58 - 52:00
    the core banking system.
  • 52:00 - 52:03
    Okay, so as an auditor, you look for
  • 52:03 - 52:04
    the most material things, the
  • 52:04 - 52:07
    most important things to the organization when
  • 52:07 - 52:08
    you are doing the audit.
  • 52:08 - 52:11
    Okay, so scoping, risk, and materiality.
  • 52:11 - 52:12
    Okay, the importance of that
  • 52:12 - 52:15
    area is very important. I hope
  • 52:15 - 52:18
    I was able to give that answer. Okay, and
  • 52:18 - 52:19
    then resources.
  • 52:19 - 52:22
    We also talk about
  • 52:22 - 52:24
    resources because, as I said,
  • 52:24 - 52:26
    every organization has limited resources.
  • 52:26 - 52:28
    So, how you utilize the resources to the
  • 52:28 - 52:29
    maximum extent is crucial.
  • 52:29 - 52:32
    Mobilization of the auditors, okay?
  • 52:32 - 52:34
    Mobilization of the auditors is also important--because
  • 52:34 - 52:36
    again, limited resources--you have to
  • 52:36 - 52:37
    mobilize
  • 52:37 - 52:39
    effectively, in terms of
  • 52:39 - 52:41
    logistics, etc.
  • 52:41 - 52:43
    Supervision: Supervision of the
  • 52:43 - 52:45
    auditors is very important
  • 52:45 - 52:47
    in terms of the
  • 52:47 - 52:48
    quality of the audit and
  • 52:48 - 52:51
    assignment management. Big auditing
  • 52:51 - 52:52
    firms like EY,
  • 52:52 - 52:55
    PwC, and Deloitte
  • 52:55 - 52:56
    understand this,
  • 52:56 - 52:58
    you know, in terms of assignment
  • 52:58 - 53:00
    management. We have audits
  • 53:00 - 53:03
    every year, we have civilian audits, we
  • 53:03 - 53:04
    have recertification
  • 53:04 - 53:07
    audits every three years, etc. All
  • 53:07 - 53:09
    that assignment management is also very
  • 53:09 - 53:11
    important. Then, audit and assurance
  • 53:11 - 53:11
    evidence.
  • 53:11 - 53:15
    Evidence collection, storing
  • 53:15 - 53:16
    those evidences,
  • 53:16 - 53:18
    proving the quality of the evidence--
  • 53:18 - 53:20
    everything is very important here. So,
  • 53:20 - 53:22
    in the performance category, we will look
  • 53:22 - 53:24
    at all those things.
  • 53:24 - 53:26
    Then, the third category is reporting.
  • 53:26 - 53:27
    Okay,
  • 53:27 - 53:29
    so these three categories among the
  • 53:29 - 53:31
    categories of standards and guidelines--
  • 53:31 - 53:34
    reporting is very important in terms of
  • 53:34 - 53:35
    types of reports,
  • 53:35 - 53:38
    means of communication, and the
  • 53:38 - 53:40
    information that is communicated.
  • 53:40 - 53:42
    All three are very important.
  • 53:42 - 53:45
    And reporting also, as I said earlier,
  • 53:45 - 53:48
    would depend on the type of arrangement
  • 53:48 - 53:49
    or the type of audit it is.
  • 53:49 - 53:52
    Auditory assurance guidelines: We
  • 53:52 - 53:53
    talked about
  • 53:53 - 53:56
    the standard. The guideline basically
  • 53:56 - 53:58
    helps you consider,
  • 53:58 - 54:00
    helps you to determine how to implement
  • 54:00 - 54:01
    these ISACA standards.
  • 54:01 - 54:04
    It also helps, as I said, by using professional
  • 54:04 - 54:05
    judgment in applying them. You should
  • 54:05 - 54:07
    be able to justify any departure from
  • 54:07 - 54:09
    ISACA or international standards.
  • 54:09 - 54:11
    Now, as we discussed, the Code of Professional
  • 54:11 - 54:13
    Ethics is very important,
  • 54:13 - 54:17
    and we must understand that these seven
  • 54:17 - 54:19
    principles must be followed. We will discuss these in detail.
  • 54:19 - 54:20
    So, these are the three, and
  • 54:20 - 54:22
    we have two more.
  • 54:22 - 54:24
    These are the total of seven codes of
  • 54:24 - 54:25
    professional ethics.
  • 54:25 - 54:26
    I would like to discuss them from the
  • 54:26 - 54:29
    standard itself because that
  • 54:29 - 54:32
    gives a more better perspective. Okay,
  • 54:32 - 54:33
    same here.
  • 54:33 - 54:35
    Now, ISACA's Code of Professional
  • 54:35 - 54:36
    Ethics is
  • 54:36 - 54:38
    for its members and certification
  • 54:38 - 54:40
    holders. So,
  • 54:40 - 54:42
    members and certification holders
  • 54:42 - 54:44
    shall support the implementation. So,
  • 54:44 - 54:47
    as an auditor, you are not there on
  • 54:47 - 54:49
    a fault-finding mission.
  • 54:49 - 54:52
    Okay, you are there to
  • 54:52 - 54:53
    verify and check,
  • 54:53 - 54:56
    show the faults, but ultimately, you are
  • 54:56 - 54:58
    there to help them implement
  • 54:58 - 55:00
    and encourage compliance,
  • 55:00 - 55:02
    compliance with the standards.
  • 55:02 - 55:03
    Okay, so you should support the
  • 55:03 - 55:05
    implementation of and encourage compliance
  • 55:05 - 55:06
    with appropriate standards and
  • 55:06 - 55:07
    procedures
  • 55:07 - 55:09
    for the effective governance and management
  • 55:09 - 55:10
    of information systems,
  • 55:10 - 55:13
    including audit control, security, and
  • 55:13 - 55:14
    risk management. Okay,
  • 55:14 - 55:17
    then the second is to perform duties
  • 55:17 - 55:18
    with objectivity.
  • 55:18 - 55:22
    Now, when you talk about objectivity,
  • 55:22 - 55:24
    you are also talking about materiality.
  • 55:24 - 55:25
    Okay. As I said,
  • 55:25 - 55:29
    objectivity means you are there to assess
  • 55:29 - 55:30
    certain things, and you should have the audit
  • 55:30 - 55:32
    objective in your mind.
  • 55:32 - 55:34
    For example, if I’m going for an
  • 55:34 - 55:36
    information security
  • 55:36 - 55:39
    audit, I must be sure of
  • 55:39 - 55:42
    what I’m checking. Okay, I should
  • 55:42 - 55:44
    have an audit objective that I
  • 55:44 - 55:46
    would be checking this particular
  • 55:46 - 55:48
    information system while looking for
  • 55:48 - 55:50
    these things. Okay. So from an objectivity
  • 55:50 - 55:51
    perspective,
  • 55:51 - 55:53
    you know you should perform your
  • 55:53 - 55:54
    duties. Okay.
  • 55:54 - 55:56
    Now, you might go for a network audit, and
  • 55:56 - 55:58
    you're looking for faults in the network. You
  • 55:58 - 56:00
    might go for a software audit, where you're
  • 56:00 - 56:01
    looking for
  • 56:01 - 56:03
    anomalies in the software. Okay. If you're
  • 56:03 - 56:04
    going for
  • 56:04 - 56:07
    a penetration audit or a VAPT (Vulnerability Assessment
  • 56:07 - 56:09
    and Penetration Testing), you're looking for
  • 56:09 - 56:12
    various anomalies in the system.
  • 56:12 - 56:14
    Okay, so the objective of the
  • 56:14 - 56:15
    audit should be clear.
  • 56:15 - 56:17
    Also, from the organization’s
  • 56:17 - 56:19
    perspective, it must be clear to
  • 56:19 - 56:22
    the person who has given you the
  • 56:22 - 56:23
    assignment.
  • 56:23 - 56:25
    What the stakeholder is trying to
  • 56:25 - 56:26
    achieve through this audit should be understood.
  • 56:26 - 56:29
    For example, many organizations do ISO
  • 56:29 - 56:31
    27001
  • 56:31 - 56:33
    to achieve tenders, for
  • 56:33 - 56:36
    brand reputation, or also
  • 56:36 - 56:39
    to ensure they are
  • 56:39 - 56:41
    are completed with according to
  • 56:41 - 56:42
    the
  • 56:42 - 56:45
    industry guidelines,
  • 56:45 - 56:47
    okay, etc. So the objectivity should be
  • 56:47 - 56:48
    very much
  • 56:48 - 56:50
    clear. Then, due diligence. Due diligence means
  • 56:50 - 56:52
    you have to be very careful
  • 56:52 - 56:54
    when you are doing the audit and when you
  • 56:54 - 56:56
    perform your duties.
  • 56:56 - 56:58
    You should not be influenced by
  • 56:58 - 57:00
    people. Due diligence is about
  • 57:00 - 57:01
    independence.
  • 57:01 - 57:03
    You should not be
  • 57:03 - 57:05
    influenced by people; you should not take
  • 57:05 - 57:08
    bribes, etc. Due diligence is
  • 57:08 - 57:09
    not only about
  • 57:09 - 57:12
    taking bribes but also about
  • 57:12 - 57:13
    not getting influenced
  • 57:13 - 57:17
    for any reason. Okay.
  • 57:17 - 57:19
    Then, professional care. Again, this is
  • 57:19 - 57:20
    also about
  • 57:20 - 57:23
    ensuring that
  • 57:23 - 57:25
    you are professional in your
  • 57:25 - 57:27
    approach, and also
  • 57:27 - 57:28
    that your work is in accordance with the
  • 57:28 - 57:30
    professional standards that have been
  • 57:30 - 57:33
    outlined in the standards document.
  • 57:33 - 57:35
    Always serve in the interest of the
  • 57:35 - 57:37
    stakeholders in a lawful manner,
  • 57:37 - 57:40
    while maintaining high standards of
  • 57:40 - 57:44
    conduct and character, not discrediting
  • 57:44 - 57:47
    their profession or association. Okay,
  • 57:47 - 57:50
    maintaining privacy and confidentiality is
  • 57:50 - 57:51
    very important.
  • 57:51 - 57:54
    Okay, you might be dealing with a lot of
  • 57:54 - 57:56
    confidential information of the
  • 57:56 - 57:56
    organization.
  • 57:56 - 58:00
    Okay, so you should always ensure confidentiality,
  • 58:00 - 58:04
    generally through NDAs, etc. However, I don’t believe
  • 58:04 - 58:06
    those are very effective mechanisms.
  • 58:06 - 58:08
    People may say they have an NDA with you,
  • 58:08 - 58:08
    but just because
  • 58:08 - 58:10
    someone should give you access to
  • 58:10 - 58:11
    all the information. An NDA is
  • 58:11 - 58:14
    not a good mechanism in an
  • 58:14 - 58:15
    organization.
  • 58:15 - 58:17
    Then, maintain competency in your
  • 58:17 - 58:18
    respective fields.
  • 58:18 - 58:20
    Okay, you are competing in information
  • 58:20 - 58:21
    security already.
  • 58:21 - 58:23
    You're competing in your network, so
  • 58:23 - 58:25
    always try to achieve expertise in
  • 58:25 - 58:26
    whatever area
  • 58:26 - 58:28
    you are working in, okay? And agree to
  • 58:28 - 58:30
    undertake only those activities that are
  • 58:30 - 58:32
    very important. Agree to undertake only
  • 58:32 - 58:34
    those activities that you can reasonably
  • 58:34 - 58:36
    expect to complete with the necessary skills,
  • 58:36 - 58:39
    knowledge, and competence. Now, I do not do
  • 58:39 - 58:41
    a network audit, I don't do a software
  • 58:41 - 58:43
    audit, I do not do,
  • 58:43 - 58:45
    you know, penetration testing audits, okay?
  • 58:45 - 58:46
    Or,
  • 58:46 - 58:48
    you know, availability audits, what we
  • 58:48 - 58:49
    call it as.
  • 58:49 - 58:52
    So, I do information security
  • 58:52 - 58:54
    audits from a compliance perspective. I'm a
  • 58:54 - 58:56
    compliance person, okay? I don't take
  • 58:56 - 58:57
    those assignments which I’m not
  • 58:57 - 58:58
    competent
  • 58:58 - 59:00
    enough for, okay? Because that would not
  • 59:00 - 59:01
    justify
  • 59:01 - 59:04
    my job. Then, inform the
  • 59:04 - 59:05
    appropriate parties of the results of
  • 59:05 - 59:07
    the work performed, including disclosure
  • 59:07 - 59:08
    of all
  • 59:08 - 59:11
    facts, if not disclosed, which may distort
  • 59:11 - 59:12
    the reporting of the results.
  • 59:12 - 59:14
    Then the last one is to support the
  • 59:14 - 59:16
    professional education of stakeholders,
  • 59:16 - 59:18
    enhancing their understanding of the
  • 59:18 - 59:20
    governance and management of enterprise
  • 59:20 - 59:22
    information systems technology, including
  • 59:22 - 59:23
    audit control, security, and risk
  • 59:23 - 59:24
    management.
  • 59:24 - 59:28
    Now, also, you are supporting the
  • 59:28 - 59:31
    stakeholders and increasing their
  • 59:31 - 59:32
    knowledge about their systems.
  • 59:32 - 59:35
    Now, stakeholders invest money in
  • 59:35 - 59:35
    their
  • 59:35 - 59:38
    systems, okay? They are asking you
  • 59:38 - 59:38
    also to
  • 59:38 - 59:41
    come and audit them, so you
  • 59:41 - 59:42
    should always,
  • 59:42 - 59:44
    you know, make them more aware of their
  • 59:44 - 59:46
    information systems. You should
  • 59:46 - 59:49
    also make them aware of the defaults
  • 59:49 - 59:50
    in their
  • 59:50 - 59:52
    information systems and how those faults
  • 59:52 - 59:54
    can affect their businesses.
  • 59:54 - 59:57
    Okay, so these are the seven, what we
  • 59:57 - 59:57
    call it,
  • 59:57 - 59:59
    as, you know, the code of professional
  • 59:59 - 60:01
    ethics that the auditor
  • 60:01 - 60:03
    must follow. Okay, we've gone through
  • 60:03 - 60:05
    these three
  • 60:05 - 60:08
    slides, getting to ITAF again. So, again,
  • 60:08 - 60:09
    this particular domain
  • 60:09 - 60:12
    itself is a description of ITAF.
  • 60:12 - 60:14
    Okay, so ITAF is a comprehensive and good
  • 60:14 - 60:16
    practice--setting framework model.
  • 60:16 - 60:18
    Okay, it establishes the standards, it
  • 60:18 - 60:20
    defines the terms and concepts,
  • 60:20 - 60:23
    concepts of IS assurance. Now, I have
  • 60:23 - 60:24
    not discussed this
  • 60:24 - 60:26
    term, which is "assurance," and I would like to
  • 60:26 - 60:28
    know what’s your perspective on
  • 60:28 - 60:30
    the word "assurance." How do we define
  • 60:30 - 60:31
    assurance? So,
  • 60:31 - 60:33
    assurance is basically a promise or a
  • 60:33 - 60:34
    guarantee
  • 60:34 - 60:36
    or a trust that we have in the system.
  • 60:36 - 60:38
    For example, if you're sitting on a
  • 60:38 - 60:39
    roller coaster,
  • 60:39 - 60:43
    and you are on a dangerous roller coaster,
  • 60:43 - 60:44
    you are actually
  • 60:44 - 60:46
    having assurance that you will come back
  • 60:46 - 60:47
    alive,
  • 60:47 - 60:49
    you know, from that. So, that's the reason
  • 60:49 - 60:50
    you're sitting on that.
  • 60:50 - 60:53
    Okay, so it's kind of a trust you have in
  • 60:53 - 60:54
    that
  • 60:54 - 60:57
    system, okay, that this would perform
  • 60:57 - 60:58
    as per the
  • 60:58 - 61:00
    standards, and you have
  • 61:00 - 61:02
    confidence in that system.
  • 61:02 - 61:04
    So, this is very important
  • 61:04 - 61:06
    when you talk about
  • 61:06 - 61:08
    air traffic control systems. You know,
  • 61:08 - 61:10
    you're sitting in an airplane,
  • 61:10 - 61:12
    and you are believing that the air
  • 61:12 - 61:14
    traffic control system
  • 61:14 - 61:16
    is working as per the proper
  • 61:16 - 61:17
    guidelines.
  • 61:17 - 61:19
    Okay, so that's how, you know,
  • 61:19 - 61:21
    sometimes it is that critical as well.
  • 61:21 - 61:24
    And also, sometimes, you know, it’s not
  • 61:24 - 61:26
    that much critical. You know, when you are
  • 61:26 - 61:28
    talking about, for example, banking, it is
  • 61:28 - 61:29
    critical. It is
  • 61:29 - 61:31
    for air traffic control. It is
  • 61:31 - 61:33
    critical for critical infrastructures.
  • 61:33 - 61:34
    All the critical
  • 61:34 - 61:36
    infrastructures, it is critical. But, for
  • 61:36 - 61:38
    example, for an organization, for a small
  • 61:38 - 61:40
    organization, it may not be that
  • 61:40 - 61:40
    critical.
  • 61:40 - 61:43
    Okay, so all that would depend on
  • 61:43 - 61:45
    the materiality
  • 61:45 - 61:47
    of the area. Okay, so this
  • 61:47 - 61:48
    particular,
  • 61:48 - 61:50
    so it provides… So, assurance is
  • 61:50 - 61:52
    that. So, I was just getting to the
  • 61:52 - 61:54
    definition only. I will come to the
  • 61:54 - 61:56
    dependencies and resilience part later
  • 61:56 - 61:58
    in the other domains as well. Then ITAF
  • 61:58 - 62:00
    also provides guidance and tools and
  • 62:00 - 62:02
    techniques on the planning, design,
  • 62:02 - 62:04
    conduct, and reporting of IS audit
  • 62:04 - 62:07
    and assurance assignments. So, audit is
  • 62:07 - 62:08
    basically a part of the
  • 62:08 - 62:11
    comment on audit. Audit is also a
  • 62:11 - 62:12
    mechanism
  • 62:12 - 62:14
    where we try to get a certain level of
  • 62:14 - 62:15
    assurance.
  • 62:15 - 62:18
    Okay, now, we don't get a guarantee from
  • 62:18 - 62:19
    the audit.
  • 62:19 - 62:22
    Okay, it doesn't say
  • 62:22 - 62:25
    that you have zero faults in a system.
  • 62:25 - 62:28
    Okay, audit is just one, you know,
  • 62:28 - 62:31
    kind of a level playing field assurance
  • 62:31 - 62:32
    perspective. Okay,
  • 62:32 - 62:34
    so audit is just a mechanism for getting
  • 62:34 - 62:35
    assurance.
  • 62:35 - 62:37
    Okay, then we go to business processes we
  • 62:37 - 62:38
    are aware of.
  • 62:38 - 62:40
    We’ll go through this quickly because we are
  • 62:40 - 62:42
    aware of the business processes.
  • 62:42 - 62:45
    But from an auditor’s perspective, when
  • 62:45 - 62:47
    you’re going for the audit, you must
  • 62:47 - 62:49
    do some
  • 62:49 - 62:51
    research in terms of
  • 62:51 - 62:52
    what kind of business processes that
  • 62:52 - 62:54
    organization
  • 62:54 - 62:57
    is dealing with, and if you get an
  • 62:57 - 62:58
    understanding of that
  • 62:58 - 63:00
    process, it would be easy for you to
  • 63:00 - 63:01
    audit that.
  • 63:01 - 63:03
    You may not have a
  • 63:03 - 63:04
    complete understanding; obviously, you
  • 63:04 - 63:05
    will interview people,
  • 63:05 - 63:07
    and then you would not have the complete
  • 63:07 - 63:08
    understanding. But,
  • 63:08 - 63:11
    for example, HR--what does HR do,
  • 63:11 - 63:12
    which is basically,
  • 63:12 - 63:14
    you know, hire people, talent management,
  • 63:14 - 63:15
    payroll,
  • 63:15 - 63:17
    training and development, etc.
  • 63:17 - 63:18
    So, you should be
  • 63:18 - 63:20
    aware of that. You should understand
  • 63:20 - 63:22
    and evaluate business processes.
  • 63:22 - 63:24
    Okay, test and evaluate operational
  • 63:24 - 63:25
    controls
  • 63:25 - 63:27
    there, and then identify the controls
  • 63:27 - 63:29
    such as policies, procedures, practices,
  • 63:29 - 63:31
    and organizational structures.
  • 63:31 - 63:33
    Okay, do you think organizational
  • 63:33 - 63:35
    structure is a control, and why do you
  • 63:35 - 63:36
    think organizational structure is a
  • 63:36 - 63:36
    control?
  • 63:36 - 63:40
    I… Policies are high-level intent of the
  • 63:40 - 63:41
    organizations.
  • 63:41 - 63:45
    Okay, procedures are also controls. Okay,
  • 63:45 - 63:47
    why procedures? The policies are very
  • 63:47 - 63:48
    important because
  • 63:48 - 63:51
    once the high-level intent is not there…
  • 63:51 - 63:53
    if the high-level intent is not there,
  • 63:53 - 63:54
    okay, for example, if an organization doesn’t
  • 63:54 - 63:57
    have an information security policy,
  • 63:57 - 63:59
    stakeholders are not endorsing
  • 63:59 - 64:01
    information security as an important
  • 64:01 - 64:04
    enabler to their organization, then you
  • 64:04 - 64:05
    cannot do anything. Okay, you will not
  • 64:05 - 64:06
    have any control. So,
  • 64:06 - 64:08
    first and foremost, policies are
  • 64:08 - 64:10
    important because those are the high-level
  • 64:10 - 64:11
    intent of the organization.
  • 64:11 - 64:13
    Then, procedures are important. Okay,
  • 64:13 - 64:15
    procedures will tell you the day-to-day,
  • 64:15 - 64:17
    you know, activities which you have to
  • 64:17 - 64:19
    perform, okay, and how to perform those
  • 64:19 - 64:21
    activities--basically step-by-step
  • 64:21 - 64:24
    directions. Okay, then you have
  • 64:24 - 64:24
    practices.
  • 64:24 - 64:27
    Now, practices are best practices. Now,
  • 64:27 - 64:30
    those are guidelines. Okay, those are like,
  • 64:30 - 64:30
    "This
  • 64:30 - 64:33
    is the best way to do it," okay?
  • 64:33 - 64:34
    Or,
  • 64:34 - 64:36
    "These are things that you must take care
  • 64:36 - 64:37
    of while doing it."
  • 64:37 - 64:40
    Okay? You may or may not take care
  • 64:40 - 64:41
    of that, but
  • 64:41 - 64:43
    those are helping. Then, organizational
  • 64:43 - 64:45
    structures are also control.
  • 64:45 - 64:46
    How do you think organizational
  • 64:46 - 64:48
    structure is a control? How does it help
  • 64:48 - 64:51
    as a control? For segregation of duties,
  • 64:51 - 64:53
    job descriptions are
  • 64:53 - 64:55
    segregated. Okay, so organizational
  • 64:55 - 64:57
    structure is a control because it helps
  • 64:57 - 64:58
    in decision-making.
  • 64:58 - 65:02
    Okay, so basically, organizational structures
  • 65:02 - 65:04
    have segregation of duties. So,
  • 65:04 - 65:06
    it is more important from that
  • 65:06 - 65:07
    perspective.
  • 65:07 - 65:10
    I mean, so this is like you are
  • 65:10 - 65:11
    defining a job description
  • 65:11 - 65:15
    of a person. Okay, based on the job,
  • 65:15 - 65:17
    he’s been assigned certain things. Okay,
  • 65:17 - 65:19
    and that control should be there that
  • 65:19 - 65:22
    there’s a maker and a checker.
  • 65:22 - 65:23
    Okay, that’s the reason organizational
  • 65:23 - 65:24
    structures are important. Okay, it would
  • 65:24 - 65:26
    reduce the risk. So,
  • 65:26 - 65:28
    I'm asking about when you talk about
  • 65:28 - 65:30
    controls, it is trying to reduce or
  • 65:30 - 65:31
    mitigate the risk.
  • 65:31 - 65:33
    Okay, so from a segregation of duties
  • 65:33 - 65:34
    perspective,
  • 65:34 - 65:36
    it is very important because segregation
  • 65:36 - 65:38
    of duties is a control
  • 65:38 - 65:41
    that basically reduces the
  • 65:41 - 65:45
    risk of any errors, faults, frauds,
  • 65:45 - 65:48
    etc. For this year, in this section, we
  • 65:48 - 65:50
    will also talk about the
  • 65:50 - 65:53
    internal audit function. Okay, internal
  • 65:53 - 65:55
    function in the sense that how an
  • 65:55 - 65:56
    internal
  • 65:56 - 65:57
    function is different from the
  • 65:57 - 65:59
    external audit, okay,
  • 65:59 - 66:01
    or the other functions, then management
  • 66:01 - 66:03
    of the IS audit function.
  • 66:03 - 66:06
    Okay, the planning of the audit,
  • 66:06 - 66:08
    effective laws and regulations of IS
  • 66:08 - 66:09
    audit planning,
  • 66:09 - 66:11
    business processes, applications, and so on.
  • 66:11 - 66:13
    Internal functions--so, as an auditor,
  • 66:13 - 66:16
    as an internal auditor,
  • 66:16 - 66:16
    you should
  • 66:16 - 66:19
    establish your audit charter first. Now,
  • 66:19 - 66:21
    what is an audit charter? An audit charter
  • 66:21 - 66:25
    talks about the responsibility, the
  • 66:25 - 66:26
    accountability, and
  • 66:26 - 66:29
    the scope of an audit, okay? And
  • 66:29 - 66:32
    it must be approved by the board of
  • 66:32 - 66:33
    directors and the audit committee.
  • 66:33 - 66:36
    Okay, so if we go to the audit charter
  • 66:36 - 66:37
    definition
  • 66:37 - 66:40
    in the Sarbanes-Oxley guideline or in
  • 66:40 - 66:43
    ITAF, you know, so if you see here,
  • 66:43 - 66:46
    in the audit charter, it talks about the
  • 66:46 - 66:48
    purpose.
  • 66:48 - 66:51
    Sorry, the audit charter talks about the
  • 66:51 - 66:54
    audit charter indicating the purpose,
  • 66:54 - 66:57
    the responsibility, authority, and
  • 66:57 - 66:58
    accountability.
  • 66:58 - 67:00
    Okay, so it has four things you have to
  • 67:00 - 67:01
    remember this
  • 67:01 - 67:03
    and maybe if you want to... Four things,
  • 67:03 - 67:04
    which is the purpose,
  • 67:04 - 67:06
    responsibility, authority, and
  • 67:06 - 67:08
    accountability. Okay, these are the four
  • 67:08 - 67:09
    things that
  • 67:09 - 67:11
    the audit charter must have. Okay, the
  • 67:11 - 67:13
    purpose of the audit,
  • 67:13 - 67:15
    the responsibility
  • 67:15 - 67:17
    of conducting that audit, the authority
  • 67:17 - 67:20
    (who initiated this audit or who
  • 67:20 - 67:22
    the audit results would be communicated
  • 67:22 - 67:22
    to),
  • 67:22 - 67:24
    and the accountability, okay? From a
  • 67:24 - 67:25
    downloaded function, it should be
  • 67:25 - 67:27
    established by the audit charter,
  • 67:27 - 67:29
    which has to be approved by the
  • 67:29 - 67:31
    board of directors and the audit
  • 67:31 - 67:32
    committee.
  • 67:32 - 67:36
    Now, sometimes the board of directors
  • 67:36 - 67:39
    also gets, you know, they have
  • 67:39 - 67:42
    another committee which
  • 67:42 - 67:43
    represents the audit.
  • 67:43 - 67:45
    Okay, that's what the audit committee is
  • 67:45 - 67:46
    about. Okay.
  • 67:46 - 67:48
    Now, the audit charter is an overarching
  • 67:48 - 67:50
    document that covers the entire scope of
  • 67:50 - 67:51
    audit activities in
  • 67:51 - 67:53
    an entity, while the engagement letter is
  • 67:53 - 67:55
    more focused on a particular audit
  • 67:55 - 67:55
    exercise.
  • 67:55 - 67:58
    Now, sometimes we have, you know, one
  • 67:58 - 67:59
    audit charter in which you have the
  • 67:59 - 68:00
    complete plan
  • 68:00 - 68:02
    of the audit of the whole organization,
  • 68:02 - 68:04
    whereas the engagement letter is
  • 68:04 - 68:07
    specific to a certain function. Okay, for
  • 68:07 - 68:08
    example, you're going for a network audit,
  • 68:08 - 68:10
    so there's an engagement you have done with,
  • 68:10 - 68:11
    say, EY. For example,
  • 68:11 - 68:14
    now you will sign an engagement letter
  • 68:14 - 68:15
    with that organization,
  • 68:15 - 68:18
    and it is basically focused. Okay, and you
  • 68:18 - 68:19
    have certain
  • 68:19 - 68:22
    time limits, etc. It’s more focused
  • 68:22 - 68:24
    on a particular audit exercise that is
  • 68:24 - 68:26
    sought to be initiated in an
  • 68:26 - 68:27
    organization with a specific objective
  • 68:27 - 68:29
    in mind. For example,
  • 68:29 - 68:31
    as I said, a network audit or
  • 68:31 - 68:33
    information security compliance audit,
  • 68:33 - 68:36
    etc. From the definition, this is
  • 68:36 - 68:38
    also clear here.
  • 68:38 - 68:40
    If you see, the charter should clarify
  • 68:40 - 68:41
    the
  • 68:41 - 68:43
    management’s responsibility and
  • 68:43 - 68:46
    objectives for delegation of authority
  • 68:46 - 68:48
    to the IS audit function. Okay, so the charter
  • 68:48 - 68:50
    should clearly state
  • 68:50 - 68:52
    the responsibility, the objectives or the
  • 68:52 - 68:53
    purpose, and
  • 68:53 - 68:56
    the authority of the audit function.
  • 68:56 - 68:58
    Why do you think the
  • 68:58 - 69:00
    auditors will also require authority
  • 69:00 - 69:02
    from the board of directors when asking
  • 69:02 - 69:05
    questions to,
  • 69:05 - 69:06
    you know, an area that the organization is
  • 69:06 - 69:09
    auditing? People may ask you,
  • 69:09 - 69:11
    “Who are you?” “Why do you ask
  • 69:11 - 69:12
    these questions?” etc.
  • 69:12 - 69:14
    Those are basic questions when you go
  • 69:14 - 69:16
    to interview anyone.
  • 69:16 - 69:18
    Okay, so the
  • 69:18 - 69:20
    audit charter is a document that you
  • 69:20 - 69:20
    can
  • 69:20 - 69:22
    show as a warrant, you know, that
  • 69:22 - 69:24
    you have the authority to
  • 69:24 - 69:27
    basically audit them, and this has
  • 69:27 - 69:28
    been
  • 69:28 - 69:31
    asked by the highest authority of
  • 69:31 - 69:32
    your organization, which is the board of
  • 69:32 - 69:33
    directors. That’s the reason the
  • 69:33 - 69:36
    charter has the authority as well, so
  • 69:36 - 69:36
    that
  • 69:36 - 69:39
    you have the senior management or top
  • 69:39 - 69:41
    management’s
  • 69:41 - 69:45
    approval on asking questions
  • 69:45 - 69:48
    to the area or to the function. Okay,
  • 69:48 - 69:49
    that’s the reason authority is very
  • 69:49 - 69:50
    important.
  • 69:50 - 69:52
    Now, management of the IS audit function--
  • 69:52 - 69:54
    managing or isolating functions should
  • 69:54 - 69:54
    ensure
  • 69:54 - 69:56
    value-added contributions to senior
  • 69:56 - 69:58
    management. Again, if they’re giving you the
  • 69:58 - 70:00
    authority
  • 70:00 - 70:03
    to audit, they also want, and they are
  • 70:03 - 70:04
    doing it for a reason,
  • 70:04 - 70:06
    that you would tell them the causes in their
  • 70:06 - 70:08
    organization, what areas
  • 70:08 - 70:09
    need improvement, and
  • 70:09 - 70:11
    how to improve. You are basically building upon
  • 70:11 - 70:12
    their assurance,
  • 70:12 - 70:14
    you're building their assurance on the
  • 70:14 - 70:16
    organization’s IT infrastructure.
  • 70:16 - 70:18
    Okay, so if you’re saying that, you know,
  • 70:18 - 70:19
    these are the
  • 70:19 - 70:22
    areas of improvement
  • 70:22 - 70:24
    in your organization, if you’re
  • 70:24 - 70:25
    giving them findings,
  • 70:25 - 70:28
    it will basically help them improve,
  • 70:28 - 70:31
    help them improve the overall operations
  • 70:31 - 70:32
    and
  • 70:32 - 70:34
    efficiency of their organization. Okay, so
  • 70:34 - 70:35
    as an auditor,
  • 70:35 - 70:36
    you should ensure value-added
  • 70:36 - 70:38
    contributions to senior
  • 70:38 - 70:40
    management in the efficient management
  • 70:40 - 70:41
    of IT
  • 70:41 - 70:42
    and the achievement of the business
  • 70:42 - 70:44
    operations. When you give them
  • 70:44 - 70:45
    findings,
  • 70:45 - 70:48
    they would act upon it, and
  • 70:48 - 70:49
    that would also help them to
  • 70:49 - 70:51
    achieve their business objectives
  • 70:51 - 70:52
    appropriately.
  • 70:52 - 70:54
    Okay, now the first step is planning. When
  • 70:54 - 70:56
    you're planning for an audit,
  • 70:56 - 70:58
    adequate planning is very
  • 70:58 - 71:00
    important. The Japanese
  • 71:00 - 71:01
    say that 70%
  • 71:01 - 71:04
    of the time you spend on planning. That’s
  • 71:04 - 71:05
    very important because
  • 71:05 - 71:08
    all the major--I'm doing an
  • 71:08 - 71:10
    implementation
  • 71:10 - 71:14
    assignment, and I know this very well,
  • 71:14 - 71:16
    deep from my heart, how important
  • 71:16 - 71:18
    the planning part is. The audit plan is
  • 71:18 - 71:20
    how important
  • 71:20 - 71:23
    it is. If you fail in planning properly,
  • 71:23 - 71:25
    you mess up the whole thing. Okay, so plan
  • 71:25 - 71:26
    an audit.
  • 71:26 - 71:28
    Following tasks must be completed: List
  • 71:28 - 71:30
    all the processes.
  • 71:30 - 71:32
    I mean, the scope has to be very clear
  • 71:32 - 71:33
    when you're
  • 71:33 - 71:35
    going for an audit. So you're listing all
  • 71:35 - 71:36
    processes,
  • 71:36 - 71:39
    you get the scope approved for the audit.
  • 71:39 - 71:39
    Okay,
  • 71:39 - 71:41
    then you evaluate each process by
  • 71:41 - 71:44
    performing a qualitative risk assessment.
  • 71:44 - 71:46
    Now, for example, I have four departments
  • 71:46 - 71:47
    to audit.
  • 71:47 - 71:49
    Okay, the scope is clear; I have four
  • 71:49 - 71:51
    departments.
  • 71:51 - 71:53
    Now, who to start with? That is also very,
  • 71:53 - 71:54
    very
  • 71:54 - 71:57
    important. Again,
  • 71:57 - 72:00
    the concept of materiality is very
  • 72:00 - 72:02
    important. So, you will do a qualitative
  • 72:02 - 72:04
    or a quantitative risk assessment. Now,
  • 72:04 - 72:06
    this risk assessment is not a risk
  • 72:06 - 72:08
    assessment that we do
  • 72:08 - 72:10
    for information security and
  • 72:10 - 72:12
    the detailed assessment we do.
  • 72:12 - 72:14
    This is a kind of,
  • 72:14 - 72:16
    kind of an assessment which is a
  • 72:16 - 72:17
    high-level assessment.
  • 72:17 - 72:20
    Okay, we are in which you understand, and you
  • 72:20 - 72:21
    try to understand which are the critical
  • 72:21 - 72:23
    areas of the organization.
  • 72:23 - 72:24
    Now, for example, you have four
  • 72:24 - 72:26
    applications to order. Now, if you say one,
  • 72:26 - 72:27
    two, three, four,
  • 72:27 - 72:29
    and you say, "Okay, how would you check
  • 72:29 - 72:31
    which application is important?" You look at the
  • 72:31 - 72:33
    number of users. Which applications do
  • 72:33 - 72:34
    you use? So, you will check the
  • 72:34 - 72:37
    number of users. This is easy for any
  • 72:37 - 72:38
    organization to give you.
  • 72:38 - 72:40
    Okay, and you will also do a risk
  • 72:40 - 72:42
    assessment on
  • 72:42 - 72:45
    the type of data that
  • 72:45 - 72:48
    the application is storing, how that
  • 72:48 - 72:48
    application
  • 72:48 - 72:50
    operates, and which processes that application
  • 72:50 - 72:51
    supports. You will assess which business
  • 72:51 - 72:54
    operations it is supporting. So,
  • 72:54 - 72:56
    this is a kind of high-level assessment
  • 72:56 - 73:00
    of risk you will do. Okay, so why
  • 73:00 - 73:00
    are you doing this?
  • 73:00 - 73:03
    Again, it's materiality.
  • 73:03 - 73:06
    You’re doing this to evaluate whether
  • 73:06 - 73:08
    you are trying to capture
  • 73:08 - 73:09
    the maximum risk in an
  • 73:09 - 73:11
    organization. So, evaluate each
  • 73:11 - 73:12
    process by performing a qualitative and
  • 73:12 - 73:13
    quantitative risk assessment. These
  • 73:13 - 73:15
    evaluations should be based on
  • 73:15 - 73:17
    objective criteria, like I just mentioned.
  • 73:17 - 73:19
    I gave you some examples of
  • 73:19 - 73:20
    objective criteria for
  • 73:20 - 73:22
    applications. Similarly, you can apply this
  • 73:22 - 73:26
    to business processes or
  • 73:26 - 73:28
    different departments as well, from a
  • 73:28 - 73:29
    high-level perspective.
  • 73:29 - 73:32
    Okay, etc., etc. So, then our goal is to
  • 73:32 - 73:35
    define the overall risk of each process,
  • 73:35 - 73:37
    and then construct an audit plan to
  • 73:37 - 73:39
    include all the processes that are rated
  • 73:39 - 73:40
    high.
  • 73:40 - 73:43
    This would represent the ideal
  • 73:43 - 73:45
    audit plan.
  • 73:45 - 73:49
    And that's what we call an audit-based
  • 73:49 - 73:53
    risk strategy or audit-based risk plan.
  • 73:53 - 73:55
    Okay, basically, we call it a strategy.
  • 73:55 - 73:57
    So, audit-based risk
  • 73:57 - 74:00
    strategy. Now, when to audit, that's also a
  • 74:00 - 74:01
    question.
  • 74:01 - 74:04
    Why we have this question is because,
  • 74:04 - 74:06
    again, this depends on the criticality of
  • 74:06 - 74:09
    the processes. So, there is short-term
  • 74:09 - 74:09
    audit and
  • 74:09 - 74:12
    there is long-term audit planning. Now, in
  • 74:12 - 74:13
    short-term audit planning,
  • 74:13 - 74:17
    you have short, frequent
  • 74:17 - 74:20
    audits, and the periodicity reduces. In
  • 74:20 - 74:22
    long-term audit planning,
  • 74:22 - 74:25
    you have a higher periodicity. Okay, so
  • 74:25 - 74:26
    short-term planning involves all the
  • 74:26 - 74:28
    audit issues that will be covered during
  • 74:28 - 74:30
    the year. For example, you have to
  • 74:30 - 74:32
    conduct
  • 74:32 - 74:34
    surveillance audits every year.
  • 74:34 - 74:36
    That is, every year. So that is the
  • 74:36 - 74:37
    short term.
  • 74:37 - 74:39
    Okay. The long-term plan takes into account
  • 74:39 - 74:41
    all the resolutions. For example, there’s
  • 74:41 - 74:42
    a
  • 74:42 - 74:45
    department
  • 74:45 - 74:48
    which is slowly improving.
  • 74:48 - 74:49
    Slowly improving this.
  • 74:49 - 74:51
    That department is not very
  • 74:51 - 74:54
    mature yet, so you might go for a long-term
  • 74:54 - 74:54
    audit here.
  • 74:54 - 74:56
    You are assessing some
  • 74:56 - 74:58
    areas of that department,
  • 74:58 - 75:00
    giving them time to
  • 75:00 - 75:02
    mature, and then auditing
  • 75:02 - 75:03
    other areas
  • 75:03 - 75:06
    of the department. Okay, similarly,
  • 75:06 - 75:06
    you know,
  • 75:06 - 75:09
    it's a phased approach
  • 75:09 - 75:10
    in long-term planning.
  • 75:10 - 75:12
    And that would also
  • 75:12 - 75:14
    depend on the IT strategic direction of
  • 75:14 - 75:16
    the organization.
  • 75:16 - 75:19
    Okay, for example, I was working
  • 75:19 - 75:22
    in a bank in the UAE,
  • 75:22 - 75:24
    and they had a new
  • 75:24 - 75:25
    area of banking.
  • 75:25 - 75:28
    For example, treasury.
  • 75:28 - 75:30
    Remember the name of that
  • 75:30 - 75:32
    area. But, for example, treasury. They were,
  • 75:32 - 75:34
    you know, trying to
  • 75:34 - 75:37
    have another area of business
  • 75:37 - 75:40
    for them. Now, that department has just
  • 75:40 - 75:40
    begun.
  • 75:40 - 75:43
    Okay. That area of business has just been
  • 75:43 - 75:44
    now
  • 75:44 - 75:46
    initiated. Obviously, they will not have
  • 75:46 - 75:47
    100% of the processes,
  • 75:47 - 75:49
    same processes that a bank
  • 75:49 - 75:51
    initially has. They are trying to have
  • 75:51 - 75:53
    one or two processes
  • 75:53 - 75:55
    in place for the new
  • 75:55 - 75:56
    customers,
  • 75:56 - 75:58
    and then they will mature,
  • 75:58 - 76:00
    maturity
  • 76:00 - 76:03
    over time. Okay. So, if I go on the
  • 76:03 - 76:04
    first day,
  • 76:04 - 76:07
    or maybe the first year,
  • 76:07 - 76:09
    and say, "Okay, show me all the
  • 76:09 - 76:11
    processes," and start finding faults in them,
  • 76:11 - 76:12
    you know,
  • 76:12 - 76:14
    it may not
  • 76:14 - 76:15
    be very much
  • 76:15 - 76:18
    fruitful for that particular area of
  • 76:18 - 76:18
    business.
  • 76:18 - 76:20
    Okay. You will have a
  • 76:20 - 76:22
    lot of findings that you cannot address those
  • 76:22 - 76:23
    findings immediately.
  • 76:23 - 76:26
    So, you will take a
  • 76:26 - 76:27
    long-term
  • 76:27 - 76:29
    approach. This depends on
  • 76:29 - 76:31
    the IT strategy version of the
  • 76:31 - 76:32
    organization.
  • 76:32 - 76:34
    Now, an audit can also be triggered when
  • 76:34 - 76:35
    there is a control issue. For example, if there’s
  • 76:35 - 76:37
    a new issue coming up or there are
  • 76:37 - 76:40
    a lot of incidents happening
  • 76:40 - 76:43
    in HR, such as
  • 76:43 - 76:45
    data breaches,
  • 76:45 - 76:47
    etc.,
  • 76:47 - 76:49
    if there are control issues,
  • 76:49 - 76:50
    the board of directors will take a decision.
  • 76:50 - 76:52
    Okay, now we must audit this HR
  • 76:52 - 76:54
    department.
  • 76:54 - 76:57
    Try to assess those gaps in
  • 76:57 - 76:59
    that department. Okay, so new control
  • 76:59 - 77:00
    issues can also trigger an audit.
  • 77:00 - 77:03
    Fraud can trigger the audit as well.
  • 77:03 - 77:06
    So, that could also happen.
  • 77:06 - 77:07
    Also, there's a change in the risk
  • 77:07 - 77:08
    environment.
  • 77:08 - 77:10
    You acquire a new organization, or
  • 77:10 - 77:12
    you merge, or
  • 77:12 - 77:14
    you have mergers and acquisitions.
  • 77:14 - 77:15
    Okay.
  • 77:15 - 77:17
    Now, that could also change, so the risk
  • 77:17 - 77:18
    environment has changed.
  • 77:18 - 77:21
    Okay. As I mentioned,
  • 77:21 - 77:22
    technology has changed.
  • 77:22 - 77:24
    Okay, all the business processes have
  • 77:24 - 77:25
    changed, you know,
  • 77:25 - 77:28
    drastically. That can also basically
  • 77:28 - 77:29
    trigger an audit.
  • 77:29 - 77:32
    Okay, so these are the steps for having
  • 77:32 - 77:32
    the audit.
  • 77:32 - 77:36
    Okay. Just quickly naming them: first
  • 77:36 - 77:36
    and foremost,
  • 77:36 - 77:38
    take an understanding of the business
  • 77:38 - 77:41
    process mission of that organization.
  • 77:41 - 77:42
    What is the mission? The mission is what the
  • 77:42 - 77:45
    operation does. For example, in banking,
  • 77:45 - 77:47
    the organization deals with money.
  • 77:47 - 77:49
    They
  • 77:49 - 77:51
    create accounts,
  • 77:51 - 77:53
    manage people's money, etc.
  • 77:53 - 77:55
    You should
  • 77:55 - 77:56
    understand the mission of the
  • 77:56 - 77:57
    organization.
  • 77:57 - 77:58
    Okay. You should understand the
  • 77:58 - 78:01
    objectives that
  • 78:01 - 78:04
    the top management has decided
  • 78:04 - 78:05
    should be the objectives.
  • 78:05 - 78:07
    You should understand the purpose of
  • 78:07 - 78:09
    that organization and how
  • 78:09 - 78:10
    it helps its
  • 78:10 - 78:13
    stakeholders. Basically, I
  • 78:13 - 78:15
    would not say stakeholders--
  • 78:15 - 78:16
    like customers, suppliers,
  • 78:16 - 78:19
    and internal employees. Okay, so that's
  • 78:19 - 78:22
    important. And the processes, okay? Then,
  • 78:22 - 78:24
    understanding the business environment
  • 78:24 - 78:25
    of the auditee.
  • 78:25 - 78:27
    What is already... basically, the
  • 78:27 - 78:29
    organization, you are auditing. You are
  • 78:29 - 78:30
    the auditor,
  • 78:30 - 78:32
    and the other organization is the auditee.
  • 78:32 - 78:34
    Okay, and then review.
  • 78:34 - 78:37
    Sometimes the auditee can also be another
  • 78:37 - 78:37
    party.
  • 78:37 - 78:40
    Okay. You must understand that the auditee
  • 78:40 - 78:42
    can be another organization
  • 78:42 - 78:44
    that is asking you to audit their
  • 78:44 - 78:46
    organization already, is
  • 78:46 - 78:48
    who has given you the assignment. Okay?
  • 78:48 - 78:50
    Then, review
  • 78:50 - 78:52
    prior work papers. Prior work
  • 78:52 - 78:54
    papers are basically a
  • 78:54 - 78:56
    kind of checklist. If you
  • 78:56 - 78:59
    have certain questions for the auditee
  • 78:59 - 79:02
    or auditing management, you ask
  • 79:02 - 79:03
    them certain questions or
  • 79:03 - 79:06
    request certain documentation
  • 79:06 - 79:07
    to understand
  • 79:07 - 79:09
    their organization. That is, basically,
  • 79:09 - 79:10
    review of work papers.
  • 79:10 - 79:14
    Then identify stated contents. Okay.
  • 79:14 - 79:16
    Now, the work papers are basically your
  • 79:16 - 79:18
    content policy,
  • 79:18 - 79:20
    standards required, guidelines, procedures,
  • 79:20 - 79:22
    and structure. You study them.
  • 79:22 - 79:24
    Okay, and then, you perform a risk
  • 79:24 - 79:26
    analysis to help design the audit
  • 79:26 - 79:27
    plan. Based on
  • 79:27 - 79:30
    the work papers and the organizational
  • 79:30 - 79:31
    structures, you will understand
  • 79:31 - 79:33
    what the various
  • 79:33 - 79:35
    important aspects of the organization
  • 79:35 - 79:37
    are. You perform a risk assessment or risk
  • 79:37 - 79:38
    analysis.
  • 79:38 - 79:40
    Then, you prepare an audit plan.
  • 79:40 - 79:42
    Based on the audit plan,
  • 79:42 - 79:45
    you will define the audit scope and
  • 79:45 - 79:47
    the audit objectives.
  • 79:47 - 79:51
    You develop the audit approach
  • 79:51 - 79:54
    and audit strategy. Then,
  • 79:54 - 79:57
    assign resources--the auditors--to
  • 79:57 - 79:58
    different areas.
  • 79:58 - 80:01
    Okay. And then, finally, you will address
  • 80:01 - 80:02
    the
  • 80:02 - 80:04
    engagement logistics. So, those are the
  • 80:04 - 80:06
    planning steps. Now,
  • 80:06 - 80:07
    after planning, you will move on to
  • 80:07 - 80:09
    conducting the audit. We will get to
  • 80:09 - 80:09
    that.
  • 80:09 - 80:11
    Okay, so the audit plan should take into
  • 80:11 - 80:13
    consideration the objectives of the
  • 80:13 - 80:14
    audit,
  • 80:14 - 80:18
    the relevance to the audit area,
  • 80:18 - 80:21
    its technology infrastructure, and business
  • 80:21 - 80:22
    strategy direction.
  • 80:22 - 80:26
    You should
  • 80:26 - 80:28
    have a better understanding, as I said, through
  • 80:28 - 80:30
    the work papers, which include your pattern
  • 80:30 - 80:30
    material,
  • 80:30 - 80:33
    publications, industry reports,
  • 80:33 - 80:35
    independent financial analysis reports,
  • 80:35 - 80:38
    etc. Now, reviewing prior audit reports:
  • 80:38 - 80:40
    as an auditor, you can also ask for prior
  • 80:40 - 80:41
    audit reports.
  • 80:41 - 80:43
    For example, if you're going
  • 80:43 - 80:45
    for a village audit, you can ask
  • 80:45 - 80:46
    for the previous year's international
  • 80:46 - 80:48
    report. Okay.
  • 80:48 - 80:50
    Reviewing the business and IT long-term
  • 80:50 - 80:51
    strategic plans:
  • 80:51 - 80:54
    materiality could be
  • 80:54 - 80:55
    just based on that. Okay.
  • 80:55 - 80:57
    Additional considerations: interview
  • 80:57 - 80:59
    key managers to
  • 80:59 - 81:01
    understand their business issues, key
  • 81:01 - 81:04
    regulations--75 specific regulations to
  • 81:04 - 81:06
    IT, for example. There are many regulations
  • 81:06 - 81:07
    nowadays, as we said
  • 81:07 - 81:10
    earlier, such as RBI
  • 81:10 - 81:14
    for banking, TRAI for telecom, NPCI for
  • 81:14 - 81:15
    payment gateways,
  • 81:15 - 81:18
    etc. The idea of IT functions or related
  • 81:18 - 81:20
    activities that have been outsourced is
  • 81:20 - 81:22
    very important in these times. Every
  • 81:22 - 81:23
    organization
  • 81:23 - 81:26
    has certain outsourcing or
  • 81:26 - 81:27
    third-party
  • 81:27 - 81:30
    collaborations. I was auditing a
  • 81:30 - 81:32
    repayment bank recently, and
  • 81:32 - 81:34
    every department has something that is
  • 81:34 - 81:36
    outsourced. For example, the creative
  • 81:36 - 81:37
    department,
  • 81:37 - 81:39
    the marketing
  • 81:39 - 81:40
    department, etc.,
  • 81:40 - 81:42
    you know, for campaign development--they
  • 81:42 - 81:44
    sign agreements with other
  • 81:44 - 81:46
    departments. Now, there's a lot of
  • 81:46 - 81:48
    exchange of confidential information
  • 81:48 - 81:49
    between
  • 81:49 - 81:52
    you and your third party, so these
  • 81:52 - 81:53
    kinds of arrangements also need to be
  • 81:53 - 81:55
    checked. What do you share with them?
  • 81:55 - 81:57
    Outsourcing is an important
  • 81:57 - 81:59
    just to...
  • 81:59 - 82:02
    To cut this short, outsourcing
  • 82:02 - 82:04
    is an important aspect that auditors
  • 82:04 - 82:04
    must
  • 82:04 - 82:07
    look into--what kind of arrangement
  • 82:07 - 82:09
    is there with the third party.
  • 82:09 - 82:11
    Lastly, when considering organization facilities,
  • 82:11 - 82:13
    we conduct a walkthrough. We
  • 82:13 - 82:15
    call it a "walkthrough."
  • 82:16 - 82:17
    You know, this is an important aspect
  • 82:17 - 82:19
    when we look at the physical security of an
  • 82:19 - 82:21
    organization, particularly
  • 82:21 - 82:24
    in terms of information security. We
  • 82:24 - 82:25
    go and tour the facility of the
  • 82:25 - 82:28
    organization, trying to assess the awareness
  • 82:28 - 82:28
    of the people.
  • 82:28 - 82:31
    We try to assess what kind of
  • 82:31 - 82:33
    controls they have
  • 82:33 - 82:35
    in terms of physical security, etc., and
  • 82:35 - 82:37
    physical and environmental security.
  • 82:37 - 82:39
    Okay, also, touring the
  • 82:39 - 82:41
    organization's facility will give you an
  • 82:41 - 82:43
    insight into the culture
  • 82:43 - 82:46
    of the organization sometimes. Okay? So,
  • 82:46 - 82:48
    as an auditor, you must
  • 82:48 - 82:49
    also match available audit resources,
  • 82:49 - 82:51
    such as staff, with
  • 82:51 - 82:52
    the tasks defined in the audit plan. Since
  • 82:52 - 82:54
    you have limited resources and
  • 82:54 - 82:55
    certain auditors,
  • 82:55 - 82:59
    you will have,
  • 82:59 - 83:01
    you know, tasks will be assigned to the various
  • 83:01 - 83:02
    auditors
  • 83:02 - 83:04
    according to the audit plan. Now, certain
  • 83:04 - 83:06
    laws and regulations
  • 83:06 - 83:08
    we were discussing earlier, such as
  • 83:08 - 83:09
    ISPs,
  • 83:09 - 83:11
    banks, and internal service providers, are
  • 83:11 - 83:13
    closely regulated.
  • 83:13 - 83:15
    These legal regulations may pertain to
  • 83:15 - 83:16
    financial, operational, and isolated
  • 83:16 - 83:18
    functions. There are legal,
  • 83:18 - 83:21
    financial, or general SOX
  • 83:21 - 83:22
    compliance,
  • 83:22 - 83:24
    you know. That is basically financial
  • 83:24 - 83:25
    regulation, particularly
  • 83:25 - 83:28
    for U.S. companies.
  • 83:28 - 83:31
    Many companies working
  • 83:31 - 83:32
    globally
  • 83:32 - 83:35
    must be SOX compliant, so you need to
  • 83:35 - 83:37
    consider that as well. And then,
  • 83:37 - 83:39
    operational regulations exist,
  • 83:39 - 83:42
    such as RBI, BCI.
  • 83:42 - 83:44
    These are operational regulations.
  • 83:44 - 83:46
    Then, there are isolated function
  • 83:46 - 83:48
    regulations. For example,
  • 83:48 - 83:51
    RBI requires that every
  • 83:51 - 83:53
    year you get audited by a CISA
  • 83:53 - 83:54
    and submit the CSI
  • 83:54 - 83:56
    report to the RBI,
  • 83:56 - 83:58
    whether it is the Bank of India or not. So,
  • 83:58 - 83:59
    that kind of
  • 83:59 - 84:02
    regulation exists as well. You must
  • 84:02 - 84:03
    submit audit reports
  • 84:03 - 84:06
    to the regulatory body
  • 84:06 - 84:09
    every year as they demand. Sometimes, they
  • 84:09 - 84:11
    may not want it every year, but
  • 84:11 - 84:13
    they will demand an audit and then
  • 84:13 - 84:15
    they will ask for a report.
  • 84:15 - 84:17
    Okay. Now, there are two areas of concern
  • 84:17 - 84:19
    that impact the audit scope
  • 84:19 - 84:20
    and objectives. One is the legal requirement
  • 84:20 - 84:22
    based on the audit, as I said, which
  • 84:22 - 84:24
    I gave you an example of. Then, there are
  • 84:24 - 84:26
    legal
  • 84:26 - 84:27
    concerns based on the audit,
  • 84:27 - 84:30
    and systems, data management, reporting,
  • 84:30 - 84:31
    etc. Now...
  • 84:31 - 84:33
    The audit role in compliance is to
  • 84:33 - 84:34
    determine the organization’s level of
  • 84:34 - 84:36
    compliance. The auditor must identify--
  • 84:36 - 84:39
    the auditor must identify those
  • 84:39 - 84:40
    those government or other relevant
  • 84:40 - 84:43
    external requirements. However,
  • 84:43 - 84:45
    it's not the responsibility of the auditor
  • 84:45 - 84:46
    to basically
  • 84:46 - 84:48
    look at the various regulations,
  • 84:48 - 84:50
    because that's the job of the compliance department
  • 84:50 - 84:52
    within the organization.
  • 84:52 - 84:55
    For example, if I am in telecom, I
  • 84:55 - 84:56
    should be aware of
  • 84:56 - 84:58
    the various telecom regulations
  • 84:58 - 84:59
    I need to follow.
  • 84:59 - 85:02
    So, you will gather those regulations and ensure
  • 85:02 - 85:03
    you are aware of the
  • 85:03 - 85:05
    regulations.
  • 85:05 - 85:08
    Then, you will also assess whether the organization is maintaining
  • 85:08 - 85:09
    the level of compliance.
  • 85:09 - 85:12
    The organization is maintaining. Okay, so
  • 85:12 - 85:12
    basically,
  • 85:12 - 85:15
    the auditor should request a legal plan, a
  • 85:15 - 85:16
    compliance plan,
  • 85:16 - 85:18
    or a process SOP
  • 85:18 - 85:20
    document
  • 85:20 - 85:21
    which the organization maintains to
  • 85:21 - 85:23
    ensure compliance with all
  • 85:23 - 85:25
    regulations
  • 85:25 - 85:27
    and external requirements.
  • 85:27 - 85:29
    The auditor basically will check whether
  • 85:29 - 85:30
    they are fulfilling that.
  • 85:30 - 85:32
    Now, the auditor may question the
  • 85:32 - 85:33
    compliance plan itself.
  • 85:33 - 85:36
    In this case,
  • 85:36 - 85:38
    say that if the compliance plan is
  • 85:38 - 85:38
    not
  • 85:38 - 85:41
    adequate, then
  • 85:41 - 85:43
    obviously the compliance level
  • 85:43 - 85:46
    is very doubtful.
  • 85:46 - 85:47
    As an auditor, you must
  • 85:47 - 85:50
    also assess both the
  • 85:50 - 85:52
    compliance plan of the organization as
  • 85:52 - 85:54
    well as the level of compliance.
  • 85:54 - 85:56
    Okay. Next, identify those government or
  • 85:56 - 85:57
    other relevant
  • 85:57 - 85:59
    requirements dealing with electronic
  • 85:59 - 86:01
    data, personal data, copyrights, e-commerce,
  • 86:01 - 86:03
    e-signatures, etc.
  • 86:03 - 86:05
    Computer system practices and
  • 86:05 - 86:06
    controls must also be considered. For example,
  • 86:06 - 86:10
    we have the IT Act of 2008 for this. Then, consider the
  • 86:10 - 86:12
    manner in which computer programs and
  • 86:12 - 86:12
    data
  • 86:12 - 86:15
    are stored. Many countries have retention
  • 86:15 - 86:16
    policies.
  • 86:16 - 86:18
    For example, in India, the retention
  • 86:18 - 86:20
    policy is
  • 86:20 - 86:23
    seven years for logs,
  • 86:23 - 86:26
    so you need to find out
  • 86:26 - 86:28
    what kind of
  • 86:28 - 86:29
    retention requirements exist.
  • 86:29 - 86:32
    Okay, and you have to follow that. And
  • 86:32 - 86:34
    every country has its own.
  • 86:34 - 86:35
    Okay. Then, consider the organization or the
  • 86:35 - 86:38
    activities of the IT services.
  • 86:38 - 86:40
    Okay, then you have the IS audits as well.
  • 86:40 - 86:42
    You also have IS audits to look at. You must assess the
  • 86:42 - 86:44
    requirements for IS audits.
  • 86:44 - 86:46
    For example, if you are maintaining
  • 86:46 - 86:48
    an ISO 27001 certification,
  • 86:48 - 86:50
    you must go every year.
  • 86:50 - 86:51
    Go for a
  • 86:51 - 86:54
    surveillance audit every year and go for a
  • 86:54 - 86:56
    re-certification audit.
  • 86:56 - 86:57
    You need to see what kind of
  • 86:57 - 86:59
    arrangement is in place and
  • 86:59 - 87:01
    what kind of audit cycles the
  • 87:01 - 87:03
    organization requires.
  • 87:03 - 87:05
    If you don't conduct a surveillance audit, you
  • 87:05 - 87:07
    know, your certification
  • 87:07 - 87:10
    is invalid for ISO 27001
  • 87:10 - 87:13
    or any of the ISO. Basically, now I
  • 87:13 - 87:14
    have outlined the steps for determining
  • 87:14 - 87:16
    organizational compliance. So you must
  • 87:16 - 87:18
    document the applicable laws, as I said.
  • 87:18 - 87:19
    Every organization documents the
  • 87:19 - 87:21
    applicable laws and regulations.
  • 87:21 - 87:24
    Okay, then assess whether the management
  • 87:24 - 87:26
    and IT function have considered them.
  • 87:26 - 87:28
    Okay, consider the relevant external
  • 87:28 - 87:29
    requirements in their plans.
  • 87:29 - 87:32
    Okay, now external requirements are
  • 87:32 - 87:34
    contractual obligations sometimes.
  • 87:34 - 87:36
    You have contractual obligations
  • 87:36 - 87:38
    towards a third party, mostly
  • 87:38 - 87:40
    towards the customer.
  • 87:40 - 87:42
    Those are towards the customer.
  • 87:42 - 87:45
    You are an organization in telecom, and
  • 87:45 - 87:46
    you have certain
  • 87:46 - 87:49
    requirements towards,
  • 87:49 - 87:50
    for example, providing
  • 87:50 - 87:53
    telecom products. You have specific
  • 87:53 - 87:54
    requirements regarding the availability of
  • 87:54 - 87:57
    that product for that customer
  • 87:57 - 87:59
    in terms of services, such as the service
  • 87:59 - 88:01
    level agreement. So, you must also assess
  • 88:01 - 88:02
    what the relevant external
  • 88:02 - 88:04
    requirements are there.
  • 88:04 - 88:06
    Okay. Then, obviously,
  • 88:06 - 88:08
    self-requirements in their plans, policies,
  • 88:08 - 88:10
    standards, procedures, as well as business
  • 88:10 - 88:11
    application features.
  • 88:11 - 88:13
    So that's what I said in the service
  • 88:13 - 88:15
    level agreements.
  • 88:15 - 88:17
    Then, review the internal IT department
  • 88:17 - 88:18
    function activity document that
  • 88:18 - 88:20
    addresses adherence to
  • 88:20 - 88:23
    the laws applicable to the industry.
  • 88:23 - 88:25
    Determine adherence to the procedures
  • 88:25 - 88:26
    that address these requirements,
  • 88:26 - 88:29
    and then because the procedures
  • 88:29 - 88:30
    should support the laws and
  • 88:30 - 88:33
    obligations. So, if the procedure
  • 88:33 - 88:34
    says
  • 88:34 - 88:37
    for example,
  • 88:37 - 88:39
    says that backup
  • 88:39 - 88:42
    should be conducted,
  • 88:42 - 88:44
    but the law says you
  • 88:44 - 88:46
    should have a backup of seven years,
  • 88:46 - 88:48
    but you should have a retention of seven
  • 88:48 - 88:50
    years. Okay, the law says that you have a
  • 88:50 - 88:51
    retention of seven years.
  • 88:51 - 88:53
    But you don’t have a backup mechanism
  • 88:53 - 88:55
    based on that, or
  • 88:55 - 88:56
    you delete the data every three
  • 88:56 - 88:58
    years. Delete the backup every
  • 88:58 - 88:59
    three years.
  • 88:59 - 89:02
    Then, your procedures should...
  • 89:02 - 89:04
    The backup procedure should basically
  • 89:04 - 89:05
    support your retention
  • 89:05 - 89:08
    policy or the retention
  • 89:08 - 89:11
    law of that country. Okay, then determine
  • 89:11 - 89:13
    if there are procedures in place to
  • 89:13 - 89:14
    ensure contracts or
  • 89:14 - 89:15
    agreements with external IT service
  • 89:15 - 89:17
    providers reflect any legal requirements
  • 89:17 - 89:19
    related to responsibilities.
  • 89:19 - 89:21
    Now, sometimes what happens is
  • 89:21 - 89:23
    that you have a contractual obligation
  • 89:23 - 89:26
    to maintain the certificate,
  • 89:26 - 89:28
    such as ISO, or you have to maintain PCI
  • 89:28 - 89:29
    DSS
  • 89:29 - 89:31
    (Payment Card Industry Data Security
  • 89:31 - 89:32
    Standards).
  • 89:32 - 89:34
    Okay, so you also have to check
  • 89:34 - 89:36
    whether those
  • 89:36 - 89:39
    external IT service providers,
  • 89:39 - 89:41
    you know, combine it with the
  • 89:41 - 89:43
    legal requirement.
  • 89:43 - 89:45
    Okay, let me give you an example. For
  • 89:45 - 89:46
    example, if
  • 89:46 - 89:49
    you're a telecom provider... If you're a
  • 89:49 - 89:50
    telecom provider,
  • 89:50 - 89:53
    you must follow the
  • 89:53 - 89:54
    regulatory guidelines
  • 89:54 - 89:57
    for a particular license in
  • 89:57 - 89:58
    telecom. For example, you
  • 89:58 - 90:01
    require an ISO 27001 certificate.
  • 90:01 - 90:03
    If you are a wallet
  • 90:03 - 90:05
    provider like
  • 90:05 - 90:08
    Paytm,
  • 90:08 - 90:11
    you must follow the NPCI guidelines,
  • 90:11 - 90:11
    okay,
  • 90:11 - 90:15
    and you also need to
  • 90:15 - 90:18
    comply. So, it becomes
  • 90:18 - 90:21
    a legal requirement for you
  • 90:21 - 90:22
    is bound because
  • 90:22 - 90:25
    PCI is a statutory organization.
  • 90:25 - 90:26
    Which is bound by
  • 90:26 - 90:29
    the government of India, and
  • 90:29 - 90:30
    then it becomes a law
  • 90:30 - 90:32
    or a legal requirement for an
  • 90:32 - 90:33
    organization. It’s...
  • 90:33 - 90:35
    So, it becomes a legal requirement for
  • 90:35 - 90:36
    them to fulfill
  • 90:36 - 90:39
    now. Okay, it is not just a
  • 90:39 - 90:41
    non-statutory requirement for them; it's
  • 90:41 - 90:44
    a statutory requirement for them to
  • 90:44 - 90:44
    fulfill.
  • 90:44 - 90:48
    Okay. Now, we’ll further move on to
  • 90:48 - 90:50
    business processes,
  • 90:50 - 90:53
    applications, and controls. In an
  • 90:53 - 90:55
    integrated application environment, our
  • 90:55 - 90:57
    controls are embedded and designed into
  • 90:57 - 90:57
    the
  • 90:57 - 91:00
    business applications. As
  • 91:00 - 91:02
    you are aware, we use, for
  • 91:02 - 91:03
    example,
  • 91:03 - 91:05
    banking applications like C,
  • 91:05 - 91:07
    and for banking sectors, we
  • 91:07 - 91:08
    use systems
  • 91:08 - 91:11
    like Oracle,
  • 91:11 - 91:11
    for example.
  • 91:11 - 91:14
    in telecom, for various,
  • 91:14 - 91:18
    you know, or we use SAP systems
  • 91:18 - 91:20
    in our organizations. These are
  • 91:20 - 91:22
    basically very
  • 91:22 - 91:25
    integrated application environments
  • 91:25 - 91:27
    in an organization. They have
  • 91:27 - 91:29
    multiple supports...
  • 91:29 - 91:32
    But there are multiple supports and
  • 91:32 - 91:34
    there are multiple processes around that
  • 91:34 - 91:35
    application.
  • 91:35 - 91:38
    Okay, and they're supporting basically
  • 91:38 - 91:38
    the multiple
  • 91:38 - 91:41
    departments in an organization at the
  • 91:41 - 91:42
    same time.
  • 91:42 - 91:44
    Okay, so you must understand there are certain
  • 91:44 - 91:46
    controls and assurance levels
  • 91:46 - 91:50
    that the organizations must
  • 91:50 - 91:53
    adhere to. Okay. For that reason,
  • 91:53 - 91:53
    there are
  • 91:53 - 91:56
    assurance levels that are
  • 91:56 - 91:57
    defined.
  • 91:57 - 92:00
    For example, SAP is used by multiple
  • 92:00 - 92:02
    departments for multiple
  • 92:02 - 92:06
    purposes and
  • 92:06 - 92:07
    for multiple processes in that
  • 92:07 - 92:09
    department.
  • 92:09 - 92:12
    Okay, so you must understand that there
  • 92:12 - 92:15
    are certain controls in which we place
  • 92:15 - 92:16
    to
  • 92:16 - 92:19
    provide assurance to that activity.
  • 92:19 - 92:22
    So, these controls are for providing
  • 92:22 - 92:24
    those assurances. You need to have
  • 92:24 - 92:26
    adequate controls. So, these are three
  • 92:26 - 92:27
    controls,
  • 92:27 - 92:30
    you know, that can be embedded in the
  • 92:30 - 92:32
    bigger application.
  • 92:32 - 92:35
    Okay, so you are providing
  • 92:35 - 92:36
    adequate...
  • 92:36 - 92:38
    You are providing adequate risk
  • 92:38 - 92:40
    mitigation.
  • 92:40 - 92:42
    Okay, now three types of controls are
  • 92:42 - 92:43
    management controls,
  • 92:43 - 92:46
    program controls, and manual
  • 92:46 - 92:46
    controls.
  • 92:46 - 92:49
    Okay. To effectively audit business
  • 92:49 - 92:51
    application systems, the auditor must
  • 92:51 - 92:53
    obtain a clear understanding of the
  • 92:53 - 92:53
    applications
  • 92:53 - 92:56
    under review. Also, when you are
  • 92:56 - 92:58
    reviewing the application,
  • 92:58 - 93:00
    as an auditor,
  • 93:00 - 93:01
    you are checking the adequacy of it.
  • 93:01 - 93:04
    The adequacy of... Okay, now there are
  • 93:04 - 93:06
    different types of applications.
  • 93:06 - 93:09
    For example, an e-commerce application,
  • 93:09 - 93:11
    which is a larger application
  • 93:11 - 93:12
    with multiple
  • 93:12 - 93:14
    processes. You have electronic data
  • 93:14 - 93:16
    interchange (EDI).
  • 93:16 - 93:19
    Okay, now electronic data
  • 93:19 - 93:20
    interchange is basically,
  • 93:20 - 93:24
    you know, SCADA systems
  • 93:24 - 93:27
    or systems that provide
  • 93:27 - 93:28
    inputs to another system.
  • 93:28 - 93:30
    Okay, that kind of electronic data
  • 93:30 - 93:31
    interchanges. Now, these
  • 93:31 - 93:34
    electronic data interchanges is basically
  • 93:34 - 93:35
    sometimes
  • 93:35 - 93:39
    enter organizations, inter-departments,
  • 93:39 - 93:42
    etc. Okay, then, there are email systems,
  • 93:42 - 93:44
    point-of-sale (POS) systems which is
  • 93:44 - 93:46
    basically used in retail.
  • 93:46 - 93:47
    There are multiple processes in it, the
  • 93:47 - 93:49
    cost you have billing section your
  • 93:49 - 93:51
    purchase your purchase return your
  • 93:51 - 93:52
    procurement
  • 93:52 - 93:55
    etc etc then you have electronic banking
  • 93:55 - 93:56
    electronic finance
  • 93:56 - 93:59
    then you have payment systems electronic
  • 93:59 - 94:00
    funds transfer
  • 94:00 - 94:04
    eft or atms supply chain management
  • 94:04 - 94:07
    purchase accounting systems integrated
  • 94:07 - 94:09
    manufacturing systems ics
  • 94:09 - 94:11
    your inter ah industrial control systems
  • 94:11 - 94:12
    like uh
  • 94:12 - 94:15
    air traffic control scada etc
  • 94:15 - 94:18
    iterative voice response systems okay
  • 94:18 - 94:21
    generally if you see ivr we know when we
  • 94:21 - 94:22
    call a support
  • 94:22 - 94:24
    support test uh it goes to ivr so that
  • 94:24 - 94:26
    kind of systems are there the image
  • 94:26 - 94:27
    processing systems
  • 94:27 - 94:30
    ai dss and customer relationship
  • 94:30 - 94:31
    management
  • 94:31 - 94:34
    okay moving on to uh using the services
  • 94:34 - 94:34
    of
  • 94:34 - 94:36
    other auditors okay now using service
  • 94:36 - 94:38
    order again experts
  • 94:38 - 94:41
    uh basically or maybe auditors
  • 94:41 - 94:44
    in the same in the sense of
  • 94:45 - 94:46
    maybe you're auditing a third party and
  • 94:46 - 94:48
    that third party
  • 94:48 - 94:50
    is getting us at uh getting audited by
  • 94:50 - 94:51
    another third party who you are
  • 94:51 - 94:52
    believing to
  • 94:52 - 94:55
    be let me give you an example here for
  • 94:55 - 94:56
    example i am
  • 94:56 - 95:01
    uh i am a i am a bank okay
  • 95:01 - 95:04
    and i have been i am a bank and
  • 95:04 - 95:08
    pwc is working uh is auditing me
  • 95:08 - 95:12
    okay i have asked the pwc sorry
  • 95:12 - 95:14
    if i am a bank i have asked a pwc to
  • 95:14 - 95:17
    audit my third party
  • 95:17 - 95:20
    okay this is arrangement okay i have
  • 95:20 - 95:21
    partnered
  • 95:21 - 95:24
    i have given a job to pwc to audit a
  • 95:24 - 95:25
    third party
  • 95:25 - 95:29
    for me okay the auditor the the customer
  • 95:29 - 95:34
    or the customer wants to come and uh
  • 95:34 - 95:37
    my customer wants to look at the reports
  • 95:37 - 95:39
    that uh you know that how my bank is
  • 95:39 - 95:40
    performing
  • 95:40 - 95:43
    okay so now i would be uh i
  • 95:43 - 95:45
    i am showing a pwc report of the third
  • 95:45 - 95:47
    party okay subcontracting
  • 95:47 - 95:49
    so from a customer perspective i want to
  • 95:49 - 95:51
    look at how a bank is complying
  • 95:51 - 95:54
    how how much bank suppliers are also so
  • 95:54 - 95:57
    my bank shares customer information with
  • 95:57 - 95:59
    also the suppliers
  • 95:59 - 96:01
    okay so my bank would also always say
  • 96:01 - 96:03
    that i am protecting our information but
  • 96:03 - 96:04
    my information is not with the bank
  • 96:04 - 96:07
    my information is with the information
  • 96:07 - 96:08
    with the
  • 96:08 - 96:11
    third party of a bank okay so this kind
  • 96:11 - 96:13
    of arrangement it is okay
  • 96:13 - 96:16
    now should i believe uh my bank's report
  • 96:16 - 96:19
    or should i believe the pwc report here
  • 96:19 - 96:21
    so basically uh what i'm saying is i'm a
  • 96:21 - 96:22
    bank
  • 96:22 - 96:25
    okay and my customer wants to
  • 96:25 - 96:27
    look at how i'm you know protecting its
  • 96:27 - 96:28
    information
  • 96:28 - 96:30
    okay but as a bank i'm also sharing the
  • 96:30 - 96:32
    customer's information with the third
  • 96:32 - 96:32
    party
  • 96:32 - 96:35
    okay i've asked the pwc to audit that
  • 96:35 - 96:36
    third party okay who's storing that
  • 96:36 - 96:37
    information
  • 96:37 - 96:39
    shall the customer believe the bank's
  • 96:39 - 96:42
    report or the pwc's report could not
  • 96:42 - 96:43
    trust the
  • 96:43 - 96:46
    bank's report okay because the bank is
  • 96:46 - 96:46
    my
  • 96:46 - 96:48
    bank will always say that i am
  • 96:48 - 96:50
    protecting the information right i would
  • 96:50 - 96:52
    trust a third party
  • 96:52 - 96:54
    it's a pwc report as a customer i'm
  • 96:54 - 96:55
    auditing a bank
  • 96:55 - 96:57
    and i ask bank who are you sharing that
  • 96:57 - 96:58
    my information with
  • 96:58 - 97:01
    bank would say i am i am sharing the
  • 97:01 - 97:01
    information
  • 97:01 - 97:04
    with the with a supplier or a vendor
  • 97:04 - 97:05
    okay
  • 97:05 - 97:08
    now how do you ensure that the supplier
  • 97:08 - 97:10
    is protecting my information
  • 97:10 - 97:12
    okay so bank would say i am getting it
  • 97:12 - 97:13
    uh
  • 97:13 - 97:16
    getting the supply getting the supplier
  • 97:16 - 97:20
    audited by pwc every year and that's how
  • 97:20 - 97:23
    it is been protected yes i would not
  • 97:23 - 97:24
    believe what
  • 97:24 - 97:26
    bank would say i would believe the pwc
  • 97:26 - 97:27
    report
  • 97:27 - 97:29
    it says that my information is protected
  • 97:29 - 97:30
    by the third party
  • 97:30 - 97:33
    okay so that's how you know you
  • 97:33 - 97:34
    understand
  • 97:34 - 97:37
    i use the services of you know that
  • 97:37 - 97:39
    that's how you basically use the
  • 97:39 - 97:42
    services of other auditors and experts
  • 97:42 - 97:45
    okay and other auditors basically
  • 97:45 - 97:47
    okay you you look at their reports you
  • 97:47 - 97:49
    substantiate your uh
  • 97:49 - 97:51
    substantiate your findings uh based on
  • 97:51 - 97:53
    the on the reports
  • 97:53 - 97:55
    okay so when when using external and
  • 97:55 - 97:57
    outside experts consider the following
  • 97:57 - 97:59
    restrictions on outsourcing as i said i
  • 97:59 - 98:00
    discussed the outsourcing because that's
  • 98:00 - 98:02
    the most important
  • 98:02 - 98:04
    aspect when when talk about using the
  • 98:04 - 98:06
    services of other auditors
  • 98:06 - 98:08
    okay restrictions on outsourcing audit
  • 98:08 - 98:10
    security services provided by laws and
  • 98:10 - 98:10
    regulations
  • 98:10 - 98:12
    audit charter or contractual
  • 98:12 - 98:14
    stipulations okay
  • 98:14 - 98:17
    uh impact on overall specific ice audit
  • 98:17 - 98:18
    objectives
  • 98:18 - 98:20
    okay that uh these kind of arrangements
  • 98:20 - 98:22
    can also have impact on your audit
  • 98:22 - 98:23
    objectives
  • 98:23 - 98:25
    okay impact on audit risk and
  • 98:25 - 98:27
    professional liability
  • 98:27 - 98:30
    okay now there's a lot of in a lot of
  • 98:30 - 98:32
    agreements in terms of independence in
  • 98:32 - 98:33
    the organizations
  • 98:33 - 98:36
    and it's a very big kind of confusing
  • 98:36 - 98:36
    zone uh
  • 98:36 - 98:39
    for many organizations uh in in terms of
  • 98:39 - 98:42
    independence okay for example pwc is
  • 98:42 - 98:44
    also working for some uh some
  • 98:44 - 98:47
    for that organization and it is not
  • 98:47 - 98:48
    allowed to audit
  • 98:48 - 98:51
    for example in india pwc is not allowed
  • 98:51 - 98:53
    to do financial audit
  • 98:53 - 98:54
    okay due to some certain frauds happen
  • 98:54 - 98:57
    you know three years back
  • 98:57 - 99:00
    okay so so that kind of all that kind of
  • 99:00 - 99:03
    liability is also there okay then
  • 99:03 - 99:04
    independent objectivity of other
  • 99:04 - 99:06
    auditors and experts so independence is
  • 99:06 - 99:07
    one of the
  • 99:07 - 99:10
    important aspects for the auditors and
  • 99:10 - 99:11
    experts
  • 99:11 - 99:13
    professional competence qualification
  • 99:13 - 99:14
    and experience scope of
  • 99:14 - 99:16
    work proposed to be outsourced and
  • 99:16 - 99:19
    approached then supervisory and audit
  • 99:19 - 99:20
    management
  • 99:20 - 99:23
    controls okay so these are things that
  • 99:23 - 99:24
    we should be considered
  • 99:24 - 99:27
    auditing while uh taking the services
  • 99:27 - 99:30
    from the uh operators and experts now
  • 99:30 - 99:32
    this is a quick activity which i want to
  • 99:32 - 99:35
    uh do with you now you have been
  • 99:35 - 99:37
    assigned to an integrated audit what is
  • 99:37 - 99:40
    an integrated audit indicator you are
  • 99:40 - 99:43
    is basically just to cut short uh the
  • 99:43 - 99:43
    discussion
  • 99:43 - 99:46
    uh integer already when you're auditing
  • 99:46 - 99:49
    multiple areas people sorry multiple
  • 99:49 - 99:52
    not areas but multiple uh what you call
  • 99:52 - 99:53
    it
  • 99:53 - 99:55
    objectives basically for example you're
  • 99:55 - 99:57
    all you're doing a quality audit
  • 99:57 - 100:00
    combining with information security uh
  • 100:00 - 100:00
    audit
  • 100:00 - 100:03
    okay that's an indicator audit okay or
  • 100:03 - 100:04
    you're doing an information security
  • 100:04 - 100:06
    audit combining it with the operations
  • 100:06 - 100:06
    audit
  • 100:06 - 100:08
    okay that's an indicator order so you
  • 100:08 - 100:10
    have been assigned to an integrated
  • 100:10 - 100:10
    audit
  • 100:10 - 100:13
    finance business ops areas no uh so
  • 100:13 - 100:15
    that's not integrated audit so that
  • 100:15 - 100:15
    that's
  • 100:15 - 100:18
    basically that's not what indicator
  • 100:18 - 100:19
    integrator audit is you're doing uh
  • 100:19 - 100:20
    doing two
  • 100:20 - 100:22
    audit uh you're checking for two two
  • 100:22 - 100:24
    different audit criterias
  • 100:24 - 100:26
    okay an audit criteria is for example
  • 100:26 - 100:28
    quality information security
  • 100:28 - 100:30
    operations finance okay so you're
  • 100:30 - 100:32
    looking at the uh
  • 100:32 - 100:34
    the quality quality of the system you're
  • 100:34 - 100:35
    also looking at the
  • 100:35 - 100:37
    information security of the system
  • 100:37 - 100:38
    you're also looking at the operational
  • 100:38 - 100:40
    effectiveness of the system
  • 100:40 - 100:41
    and also you're looking at the finances
  • 100:41 - 100:43
    of that financial uh
  • 100:43 - 100:46
    uh effectiveness of that system so
  • 100:46 - 100:46
    that's
  • 100:46 - 100:48
    four things together that's our uh
  • 100:48 - 100:50
    integrated product yeah so you have been
  • 100:50 - 100:51
    assigned
  • 100:51 - 100:52
    to an indicator audit of a payroll
  • 100:52 - 100:54
    process and need to plan the
  • 100:54 - 100:56
    itu audit portion of the and need to
  • 100:56 - 100:58
    plan the it audit portion of the
  • 100:58 - 100:59
    engagement okay
  • 100:59 - 101:01
    what is the most important business
  • 101:01 - 101:03
    process area that you need to
  • 101:03 - 101:05
    consider in a payroll so to help you
  • 101:05 - 101:08
    perform the audit would it be better to
  • 101:08 - 101:10
    know the isolated budget or to know the
  • 101:10 - 101:12
    cio and cfo risk profile for the payroll
  • 101:12 - 101:13
    process
  • 101:13 - 101:15
    so what is the most important business
  • 101:15 - 101:17
    process area that you need to consider
  • 101:17 - 101:17
    here
  • 101:17 - 101:20
    now this is a question for you guys okay
  • 101:20 - 101:22
    so due to resource constraints of ii for
  • 101:22 - 101:24
    a team the audit plan as originally
  • 101:24 - 101:27
    approved cannot be completed
  • 101:27 - 101:28
    assuming that the situation is
  • 101:28 - 101:30
    communicated in the audit report
  • 101:30 - 101:32
    which course of action is most
  • 101:32 - 101:34
    acceptable okay
  • 101:34 - 101:36
    so you will focus on auditing high risk
  • 101:36 - 101:37
    areas
  • 101:37 - 101:40
    okay because of the resource crunch okay
  • 101:40 - 101:44
    coming to the next question
  • 101:44 - 101:46
    this is true so you verify the software
  • 101:46 - 101:47
    and use uh
  • 101:47 - 101:50
    through testing first okay now this
  • 101:50 - 101:50
    would be the
  • 101:50 - 101:53
    uh this would we'll try to complete this
  • 101:53 - 101:55
    section which is the types of controls
  • 101:55 - 101:56
    and this is a very easy sections
  • 101:56 - 101:58
    so basically there are different types
  • 101:58 - 102:01
    of controls in which you try to
  • 102:01 - 102:05
    manage the risk okay risk
  • 102:05 - 102:08
    risk transfers okay and
  • 102:08 - 102:10
    risk avoidance now avoidance is
  • 102:10 - 102:12
    different from elimination
  • 102:12 - 102:15
    risk avoidance is basically uh
  • 102:15 - 102:17
    when we don't take the risk okay for
  • 102:17 - 102:19
    example there's a business unit
  • 102:19 - 102:22
    which is not working properly okay and
  • 102:22 - 102:22
    there's a lot of
  • 102:22 - 102:25
    business risk to it you just you know uh
  • 102:25 - 102:26
    put a
  • 102:26 - 102:29
    uh put in a shut that business okay that
  • 102:29 - 102:31
    is for avoiding the risk for example i'm
  • 102:31 - 102:33
    going from point a to point b
  • 102:33 - 102:35
    i'm going to um find it to point b
  • 102:35 - 102:36
    through a car
  • 102:36 - 102:39
    and i see a risk of you know
  • 102:39 - 102:42
    the rain that the rain can happen okay
  • 102:42 - 102:44
    so i'm not going at all
  • 102:44 - 102:46
    that is called the risk avoidance okay
  • 102:46 - 102:47
    accepting the risk
  • 102:47 - 102:50
    is that you are going there okay and
  • 102:50 - 102:52
    whatever rain comes i would take the
  • 102:52 - 102:53
    proper controls
  • 102:53 - 102:55
    but i would go okay that is called
  • 102:55 - 102:56
    acceptance mitigating means you are
  • 102:56 - 102:58
    taking proper controls in place
  • 102:58 - 103:01
    okay and then you are accepting it okay
  • 103:01 - 103:01
    then
  • 103:01 - 103:03
    what we have the third option is risk
  • 103:03 - 103:05
    transfer okay now there is no
  • 103:05 - 103:08
    transfer option here okay but generally
  • 103:08 - 103:09
    insurance or
  • 103:09 - 103:12
    other things are there or outsourcing
  • 103:12 - 103:14
    things you know where we transfer the
  • 103:14 - 103:16
    risk to another party
  • 103:16 - 103:19
    okay so controls are there to basically
  • 103:19 - 103:20
    minimize the
  • 103:20 - 103:24
    risk okay to maintain the risk so every
  • 103:24 - 103:24
    organization
  • 103:24 - 103:27
    has controls in place okay ineffective
  • 103:27 - 103:28
    controls
  • 103:28 - 103:32
    that is one that prevents uh it detects
  • 103:32 - 103:35
    and contains okay or reduces the
  • 103:35 - 103:39
    impact okay and bc reducing the impact
  • 103:39 - 103:41
    of that particular risk event
  • 103:41 - 103:44
    okay so it prevents so controls prevent
  • 103:44 - 103:45
    it detects
  • 103:45 - 103:48
    and it contains or reduces the impact
  • 103:48 - 103:48
    and also
  • 103:48 - 103:50
    uh there are certain controls which
  • 103:50 - 103:52
    helps in recovery okay
  • 103:52 - 103:54
    now we'll come to those examples uh on a
  • 103:54 - 103:56
    later stage in this particular area
  • 103:56 - 103:59
    in the domain but it is very important
  • 103:59 - 104:00
    to develop
  • 104:00 - 104:03
    monitor uh implement design
  • 104:03 - 104:06
    the information systems controls okay in
  • 104:06 - 104:07
    place too
  • 104:07 - 104:10
    basically okay now controls
  • 104:10 - 104:12
    as we discussed earlier could be
  • 104:12 - 104:15
    policies if you remember we discussed
  • 104:15 - 104:17
    the controls it would be policies
  • 104:17 - 104:19
    could be procedures could be practices
  • 104:19 - 104:21
    could be organizational structures
  • 104:21 - 104:23
    okay so that four things you have to
  • 104:23 - 104:25
    remember could be policies procedures
  • 104:25 - 104:26
    practices are structures
  • 104:26 - 104:29
    that are implemented to reduce the
  • 104:29 - 104:32
    risk to the organization okay coming to
  • 104:32 - 104:33
    uh
  • 104:33 - 104:36
    internal controls are normally composed
  • 104:36 - 104:37
    of policies procedures practical
  • 104:37 - 104:39
    structures as i said that are
  • 104:39 - 104:41
    implemented to reduce the risk
  • 104:41 - 104:43
    to the organization okay internal
  • 104:43 - 104:45
    control should address
  • 104:45 - 104:47
    what should be achieved and what should
  • 104:47 - 104:48
    be avoided
  • 104:48 - 104:51
    now they are preventive as i said
  • 104:51 - 104:53
    earlier preventive detective
  • 104:53 - 104:55
    corrective controls now prevented these
  • 104:55 - 104:57
    are some of the examples here
  • 104:57 - 104:59
    and the preventive controls always
  • 104:59 - 105:00
    detect they can
  • 105:00 - 105:02
    detect the problem before they arrive
  • 105:02 - 105:04
    okay before they arise
  • 105:04 - 105:06
    they monitor both operations and inputs
  • 105:06 - 105:08
    okay attempt to predict problems
  • 105:08 - 105:11
    before they occur okay prevent an error
  • 105:11 - 105:14
    omission act of occurring okay
  • 105:14 - 105:16
    segregation of duties for example okay
  • 105:16 - 105:18
    it's a preventive control
  • 105:18 - 105:20
    okay which basically detects errors
  • 105:20 - 105:22
    prevents frauds
  • 105:22 - 105:25
    etc then control access to physical
  • 105:25 - 105:26
    facilities
  • 105:26 - 105:29
    control access to physical facilities
  • 105:29 - 105:30
    for example you have
  • 105:30 - 105:32
    acs access control systems for physical
  • 105:32 - 105:33
    security okay
  • 105:33 - 105:36
    you use well-designed documents uh for
  • 105:36 - 105:38
    printing you have input validations etc
  • 105:38 - 105:41
    in an application that's also a part uh
  • 105:41 - 105:42
    that's also an example of preventive
  • 105:42 - 105:44
    control detective control
  • 105:44 - 105:47
    cctv which basically only detects
  • 105:47 - 105:48
    reports the occurrence of an error
  • 105:48 - 105:50
    or mission or malicious act then you
  • 105:50 - 105:52
    have corrective control which basically
  • 105:52 - 105:55
    post detection uh you know it also
  • 105:55 - 105:58
    uh correct correctly the things okay so
  • 105:58 - 106:00
    it minimizes the impact of a threat
  • 106:00 - 106:02
    remedy problems discovered by detective
  • 106:02 - 106:03
    controls
  • 106:03 - 106:05
    identifies the cause of problem of a
  • 106:05 - 106:06
    problem
  • 106:06 - 106:09
    okay correct errors arising from a
  • 106:09 - 106:11
    problem modify the processing systems to
  • 106:11 - 106:13
    minimize the future reference of the
  • 106:13 - 106:15
    problem okay so these are the different
  • 106:15 - 106:16
    control
  • 106:16 - 106:18
    types then we have the control
  • 106:18 - 106:21
    objectives and control measures
  • 106:21 - 106:25
    now control objective is basically very
  • 106:25 - 106:26
    simple to understand
  • 106:26 - 106:29
    okay every control has an objective uh
  • 106:29 - 106:30
    to
  • 106:30 - 106:33
    to prevent and then there could be uh so
  • 106:33 - 106:35
    first and foremost we don't define the
  • 106:35 - 106:37
    control first and formal we define the
  • 106:37 - 106:39
    control objectives for example what do
  • 106:39 - 106:40
    we want to protect
  • 106:40 - 106:43
    us from based on the control objective
  • 106:43 - 106:44
    you apply the control measure
  • 106:44 - 106:46
    okay so first and foremost you have to
  • 106:46 - 106:48
    define the control objective what do you
  • 106:48 - 106:51
    want to achieve from that control
  • 106:51 - 106:54
    what do you want to achieve okay or what
  • 106:54 - 106:55
    risk you are to mitigate
  • 106:55 - 106:57
    that would from the wrist there would be
  • 106:57 - 106:59
    a control objective
  • 106:59 - 107:01
    and from the control objective there
  • 107:01 - 107:02
    would be a control
  • 107:02 - 107:05
    okay for example a control objective can
  • 107:05 - 107:07
    be malware protection okay i want to
  • 107:07 - 107:09
    protect my systems from malware
  • 107:09 - 107:12
    now to achieve that control objective i
  • 107:12 - 107:13
    would
  • 107:13 - 107:16
    apply control i would apply antivirus i
  • 107:16 - 107:16
    would apply
  • 107:16 - 107:20
    you know patches okay i would i would do
  • 107:20 - 107:22
    uh you know penetration testing of my
  • 107:22 - 107:24
    system all these are
  • 107:24 - 107:28
    you know controls to achieve that okay
  • 107:28 - 107:29
    so control objective is basically
  • 107:29 - 107:32
    defined as an objective of one or more
  • 107:32 - 107:33
    operational areas
  • 107:33 - 107:36
    okay uh to be achieved in order to
  • 107:36 - 107:38
    contribute to the fulfillment of
  • 107:38 - 107:40
    strategic goals of the company
  • 107:40 - 107:43
    okay now strategy goal of the company
  • 107:43 - 107:44
    could be related to
  • 107:44 - 107:46
    also related to your risk which is the
  • 107:46 - 107:49
    high level risk of the organization
  • 107:49 - 107:52
    and how that risk is basically helps uh
  • 107:52 - 107:54
    mitigating of that risk will basically
  • 107:54 - 107:56
    help your business objectives
  • 107:56 - 107:59
    to be achieved efficiently okay so that
  • 107:59 - 107:59
    is the
  • 107:59 - 108:02
    that is the control objective uh so okay
  • 108:02 - 108:03
    so that is
  • 108:03 - 108:05
    the control objective is such a goal
  • 108:05 - 108:07
    that is especially related to the
  • 108:07 - 108:08
    strategy of the company okay
  • 108:08 - 108:11
    then control objectives are basically uh
  • 108:11 - 108:13
    you know they are statements
  • 108:13 - 108:15
    okay they are not basically control
  • 108:15 - 108:17
    their statements what we want to achieve
  • 108:17 - 108:18
    okay always remember that control
  • 108:18 - 108:20
    objectives are statements
  • 108:20 - 108:23
    of the desired result um you know or the
  • 108:23 - 108:24
    purpose to be achieved
  • 108:24 - 108:27
    by implementing that particular control
  • 108:27 - 108:29
    okay now this control can be any
  • 108:29 - 108:30
    procedure
  • 108:30 - 108:32
    any policies any other structure or
  • 108:32 - 108:33
    impacts
  • 108:33 - 108:37
    okay now control objectives apply to all
  • 108:37 - 108:38
    controls
  • 108:38 - 108:40
    okay so so for example if you have a
  • 108:40 - 108:42
    control objective as i was telling you
  • 108:42 - 108:44
    uh malware protection okay you should
  • 108:44 - 108:46
    have a controlled measure okay an
  • 108:46 - 108:48
    activity contributing to the
  • 108:48 - 108:51
    fulfillment of a control objectives both
  • 108:51 - 108:52
    the control objective and control
  • 108:52 - 108:52
    measure
  • 108:52 - 108:55
    serves the decomposition of strategic
  • 108:55 - 108:56
    level goals
  • 108:56 - 108:58
    into such a lower level goals and
  • 108:58 - 108:59
    activities
  • 108:59 - 109:01
    that can be assigned as tasks to the
  • 109:01 - 109:02
    staff
  • 109:02 - 109:05
    okay for example a procedure okay so
  • 109:05 - 109:07
    this assignment can take a form of a
  • 109:07 - 109:08
    role description
  • 109:08 - 109:11
    in a job description
  • 109:11 - 109:14
    okay i hope that the two definitions are
  • 109:14 - 109:14
    clear
  • 109:14 - 109:16
    in terms of control objective and
  • 109:16 - 109:18
    control measure or we generally call it
  • 109:18 - 109:19
    as control
  • 109:19 - 109:21
    okay so the next slide which is control
  • 109:21 - 109:23
    objective as i said
  • 109:23 - 109:25
    is a statement of the desired result
  • 109:25 - 109:27
    that is we achieve by implementing the
  • 109:27 - 109:29
    controls around the information systems
  • 109:29 - 109:31
    can comprise of policy procedure
  • 109:31 - 109:32
    practice operation structures
  • 109:32 - 109:34
    designed to provide reasonable assurance
  • 109:34 - 109:35
    that the business
  • 109:35 - 109:38
    objectives will be achieved and
  • 109:38 - 109:40
    undesired events will be prevented
  • 109:40 - 109:41
    detected or
  • 109:41 - 109:43
    correct now these are some of the uh
  • 109:43 - 109:45
    control objectives that can be applied
  • 109:45 - 109:46
    to the information systems
  • 109:46 - 109:50
    okay now if i would uh you know take few
  • 109:50 - 109:51
    of them i
  • 109:51 - 109:55
    you know uh in in here so safeguarding
  • 109:55 - 109:56
    assets i think this is a control
  • 109:56 - 109:58
    objective with every organization would
  • 109:58 - 110:00
    have protecting the information assets
  • 110:00 - 110:02
    then if you have an hclc software
  • 110:02 - 110:03
    development in your organization so you
  • 110:03 - 110:05
    will see it you will say that okay
  • 110:05 - 110:07
    the processor should be established in
  • 110:07 - 110:09
    place and operating shall
  • 110:09 - 110:12
    operate effectively okay and
  • 110:12 - 110:15
    if you have uh if you're using os you
  • 110:15 - 110:18
    will say that okay integrity of the os
  • 110:18 - 110:19
    environment should be maintained
  • 110:19 - 110:21
    integrity of uh sensitive and critical
  • 110:21 - 110:23
    application systems environment
  • 110:23 - 110:25
    should be maintained but these are some
  • 110:25 - 110:27
    of the objectives that are common to an
  • 110:27 - 110:28
    organization
  • 110:28 - 110:30
    okay in terms of for example if you come
  • 110:30 - 110:32
    down to slas
  • 110:32 - 110:34
    should meet the service level agreements
  • 110:34 - 110:36
    and contract terms and conditions to
  • 110:36 - 110:37
    ensure national assets are properly
  • 110:37 - 110:39
    protected and meet the operational goals
  • 110:39 - 110:40
    and objectives
  • 110:40 - 110:42
    so but when you're looking at control
  • 110:42 - 110:43
    objectives you must also
  • 110:43 - 110:46
    you know take into consideration how
  • 110:46 - 110:48
    this control objective
  • 110:48 - 110:50
    is linked to my business objectives as
  • 110:50 - 110:52
    well
  • 110:52 - 110:54
    okay and how it is it is giving value to
  • 110:54 - 110:55
    the to my
  • 110:55 - 110:58
    uh organization okay so and as an
  • 110:58 - 110:59
    auditor you should also see that you
  • 110:59 - 111:01
    know from how this particular control
  • 111:01 - 111:02
    objective is serving the business
  • 111:02 - 111:03
    objective
  • 111:03 - 111:06
    and how how this control objective is
  • 111:06 - 111:08
    achieved through various controls in the
  • 111:08 - 111:09
    organization
  • 111:09 - 111:11
    at the same time now there's so many
  • 111:11 - 111:12
    general controls
  • 111:12 - 111:16
    uh every organization has these general
  • 111:16 - 111:17
    controls uh
  • 111:17 - 111:18
    now internal accounting control that
  • 111:18 - 111:21
    concerns safeguarding of assets
  • 111:21 - 111:23
    and reliability of its financial
  • 111:23 - 111:24
    information uh
  • 111:24 - 111:26
    operational controls that concern
  • 111:26 - 111:27
    day-to-day operations okay there are
  • 111:27 - 111:29
    administrative controls
  • 111:29 - 111:30
    uh which talks about operational
  • 111:30 - 111:32
    efficiency in terms of
  • 111:32 - 111:36
    cost in a functional area and enhance
  • 111:36 - 111:37
    the management policies internal
  • 111:37 - 111:38
    management policies
  • 111:38 - 111:40
    uh organizational security policies and
  • 111:40 - 111:43
    procedures to ensure proper usage of
  • 111:43 - 111:45
    assets we have overall policies
  • 111:45 - 111:47
    for the design and use of adequate
  • 111:47 - 111:48
    documents and records
  • 111:48 - 111:52
    access and use procedures and practices
  • 111:52 - 111:53
    physical and logical security policies
  • 111:53 - 111:55
    for all facilities so these are some of
  • 111:55 - 111:56
    the general controls which every
  • 111:56 - 111:57
    organization has
  • 111:57 - 112:00
    then there are specific ies specific
  • 112:00 - 112:01
    controls
  • 112:01 - 112:04
    okay information specific controls now
  • 112:04 - 112:06
    each general control can be transferred
  • 112:06 - 112:10
    into a more you know in detail
  • 112:10 - 112:12
    specific information system control okay
  • 112:12 - 112:13
    for example
  • 112:13 - 112:15
    here if i ask you administrative
  • 112:15 - 112:17
    controls concern the operational
  • 112:17 - 112:19
    efficiency in a functional area
  • 112:19 - 112:23
    okay or if i talk about uh you know
  • 112:23 - 112:25
    reliability of financial information
  • 112:25 - 112:26
    okay if you take this example
  • 112:26 - 112:27
    reliability
  • 112:27 - 112:29
    a safeguarding of assets and reliability
  • 112:29 - 112:30
    of financial rupees
  • 112:30 - 112:32
    what do you think is the information
  • 112:32 - 112:34
    system specific
  • 112:34 - 112:36
    control uh what uh would be for
  • 112:36 - 112:38
    safeguarding of assets
  • 112:38 - 112:41
    you have information security management
  • 112:41 - 112:42
    system
  • 112:42 - 112:43
    okay so each general control can be
  • 112:43 - 112:45
    translated into is specific controls the
  • 112:45 - 112:47
    isotopes should understand the is
  • 112:47 - 112:49
    control and how to apply them in
  • 112:49 - 112:50
    planning the audit
  • 112:50 - 112:52
    okay so you can do a based on the
  • 112:52 - 112:54
    general control you can also
  • 112:54 - 112:56
    you know address information you can
  • 112:56 - 112:58
    drop down to the system specific
  • 112:58 - 112:59
    controls
  • 112:59 - 113:01
    ice control procedures include strategy
  • 113:01 - 113:02
    and direction of id function
  • 113:02 - 113:04
    general general organization management
  • 113:04 - 113:06
    of the id function
  • 113:06 - 113:08
    access to it resources including data
  • 113:08 - 113:09
    and programs so
  • 113:09 - 113:11
    someone talked about transactions data
  • 113:11 - 113:13
    obviously you can assess
  • 113:13 - 113:16
    look at how the access to it resources
  • 113:16 - 113:18
    including data and programs
  • 113:18 - 113:20
    then system development methodologies
  • 113:20 - 113:22
    and change control
  • 113:22 - 113:23
    okay these are some of the specific
  • 113:23 - 113:26
    areas the organization can
  • 113:26 - 113:28
    apply the controls then there are
  • 113:28 - 113:29
    operational procedures the system
  • 113:29 - 113:31
    programming and technical support
  • 113:31 - 113:32
    functions there's
  • 113:32 - 113:34
    quality assurance procedures and there
  • 113:34 - 113:37
    is physical access controls procedures
  • 113:37 - 113:38
    okay there is business continuity
  • 113:38 - 113:40
    planning the asset recovery controls
  • 113:40 - 113:42
    network and communications controls
  • 113:42 - 113:44
    database administration controls
  • 113:44 - 113:46
    okay and that's the reason we have if
  • 113:46 - 113:47
    you want to look at network and
  • 113:47 - 113:49
    communication controls there's a network
  • 113:49 - 113:50
    audit that
  • 113:50 - 113:52
    has performed in many organization
  • 113:52 - 113:54
    database audit is is another area
  • 113:54 - 113:56
    where you also look at the database
  • 113:56 - 113:57
    administration
  • 113:57 - 114:00
    okay very important many organizations
  • 114:00 - 114:04
    okay their data is critical
  • 114:04 - 114:07
    okay specifically banks if you say so
  • 114:07 - 114:10
    the administration of the database is
  • 114:10 - 114:11
    something very critical
  • 114:11 - 114:14
    then protection and detective mechanism
  • 114:14 - 114:16
    against international attacks which is
  • 114:16 - 114:18
    your penetration testing vulnerability
  • 114:18 - 114:20
    assessment etc
  • 114:20 - 114:22
    okay we will do the risk-based audit
  • 114:22 - 114:24
    planning
  • 114:24 - 114:27
    okay so now uh this is just a repetition
  • 114:27 - 114:29
    of what we have already
  • 114:29 - 114:32
    talked about a lot just go through it
  • 114:32 - 114:34
    but you need to understand uh you know
  • 114:34 - 114:35
    here
  • 114:35 - 114:38
    is the nature of business okay nature of
  • 114:38 - 114:38
    business
  • 114:38 - 114:40
    the auditor must understand when you
  • 114:40 - 114:42
    talk about risk which order the monitor
  • 114:42 - 114:43
    must understand
  • 114:43 - 114:45
    nature of business order can identify
  • 114:45 - 114:47
    and categorize the types of risks
  • 114:47 - 114:50
    that will be better to determine the you
  • 114:50 - 114:51
    know kind of
  • 114:51 - 114:53
    risk model or approach of conducting the
  • 114:53 - 114:54
    order okay for example if you are in a
  • 114:54 - 114:55
    bank
  • 114:55 - 114:58
    or a telecom or for oil and gas the risk
  • 114:58 - 114:59
    would change
  • 114:59 - 115:02
    okay based on the risk of particular
  • 115:02 - 115:05
    industry you would you should be able to
  • 115:05 - 115:06
    that should be your
  • 115:06 - 115:08
    model you know you should prepare your
  • 115:08 - 115:10
    model based on the type of industry
  • 115:10 - 115:13
    okay for example if you're doing an
  • 115:13 - 115:14
    audit of a nuclear power plant
  • 115:14 - 115:18
    okay now your perspective would change
  • 115:18 - 115:20
    okay and if you're doing for a bank
  • 115:20 - 115:22
    there is perspective should change
  • 115:22 - 115:24
    okay so it so you should be uh you
  • 115:24 - 115:26
    should understand the nature of business
  • 115:26 - 115:29
    based on those uh based on the nature of
  • 115:29 - 115:29
    business you should
  • 115:29 - 115:32
    apply the auditing practice okay so
  • 115:32 - 115:34
    knowledge of the business industry is
  • 115:34 - 115:35
    very most important thing
  • 115:35 - 115:38
    gather information and plan take prior
  • 115:38 - 115:39
    audit results
  • 115:39 - 115:41
    if possible okay if you are doing a
  • 115:41 - 115:43
    first-time order then it's not possible
  • 115:43 - 115:45
    the decent financial information
  • 115:45 - 115:48
    of that organization because that is
  • 115:48 - 115:51
    important in terms of materiality
  • 115:51 - 115:53
    okay for an organization maybe a
  • 115:53 - 115:55
    thousand dollar loss
  • 115:55 - 115:59
    is nothing and then inherent risk
  • 115:59 - 116:00
    assessment now uh
  • 116:00 - 116:02
    okay so you're also looking at inherent
  • 116:02 - 116:04
    risk there so you are looking at
  • 116:04 - 116:07
    risks now inherent risk is basically
  • 116:07 - 116:08
    risk without control for example there
  • 116:08 - 116:10
    is i'm giving a very lame example for
  • 116:10 - 116:12
    example there's a building and i would
  • 116:12 - 116:14
    say uh that this building can
  • 116:14 - 116:17
    catch fire okay this building we can
  • 116:17 - 116:19
    have earthquake here
  • 116:19 - 116:22
    um and etc etc okay
  • 116:22 - 116:25
    it is flood prone okay i am not looking
  • 116:25 - 116:27
    at the controls right now i am looking
  • 116:27 - 116:28
    at the inherent risk to that building
  • 116:28 - 116:31
    okay now i can have fire extinguishers i
  • 116:31 - 116:32
    can have
  • 116:32 - 116:35
    uh water detector systems i can have
  • 116:35 - 116:36
    earthquake resistance
  • 116:36 - 116:38
    uh etc but i'm not looking at i'm not
  • 116:38 - 116:40
    factoring in those things i'm just
  • 116:40 - 116:42
    looking at a from a high level
  • 116:42 - 116:44
    perspective what could be the risk to
  • 116:44 - 116:45
    the
  • 116:45 - 116:47
    to my uh to my organization now the
  • 116:47 - 116:49
    benefit of doing that is
  • 116:49 - 116:53
    that you would cover the all the risks
  • 116:53 - 116:54
    okay you are covering a lot of ground
  • 116:54 - 116:56
    there you're not factoring in the
  • 116:56 - 116:58
    controls you're covering lot of ground
  • 116:58 - 117:00
    uh ground during during your assessment
  • 117:00 - 117:02
    okay you are factoring in fire
  • 117:02 - 117:04
    factoring an earthquake you're factoring
  • 117:04 - 117:07
    in flood uh you're factoring in a theft
  • 117:07 - 117:10
    okay and but if you factor in the
  • 117:10 - 117:11
    controls
  • 117:11 - 117:13
    for example you say that there's a
  • 117:13 - 117:14
    there's earthquake uh
  • 117:14 - 117:16
    resistance now you're not factoring the
  • 117:16 - 117:18
    earthquake you're only you're you're
  • 117:18 - 117:19
    you're not putting that earthquake as a
  • 117:19 - 117:22
    part of your risk okay you might reduce
  • 117:22 - 117:23
    the risk
  • 117:23 - 117:25
    once you factor in the controls okay so
  • 117:25 - 117:26
    always
  • 117:26 - 117:29
    look at the inherent risk not the risk
  • 117:29 - 117:31
    which is after the controls
  • 117:31 - 117:33
    okay as an auditor you should always
  • 117:33 - 117:35
    look for inherent risk not the risk
  • 117:35 - 117:38
    after implementation of the controls
  • 117:38 - 117:38
    okay
  • 117:38 - 117:42
    uh i hope uh inherent risk is clear to
  • 117:42 - 117:42
    you guys
  • 117:42 - 117:45
    i'm not in the in head let me repeat
  • 117:45 - 117:46
    that because that's an important
  • 117:46 - 117:49
    concept in terms of csa exams is
  • 117:49 - 117:51
    concerned inherent risk is
  • 117:51 - 117:53
    risk without factoring in the controls
  • 117:53 - 117:54
    for example
  • 117:54 - 117:56
    you know i am going from point a to
  • 117:56 - 117:58
    point b i am not looking at
  • 117:58 - 118:01
    any controls uh that can be applied here
  • 118:01 - 118:02
    okay i'm just
  • 118:02 - 118:04
    saying okay if i go from point a to
  • 118:04 - 118:05
    point b i can
  • 118:05 - 118:08
    my target can get punctured uh
  • 118:08 - 118:12
    i can meet an accident uh you know
  • 118:12 - 118:14
    a rain can come so these are the
  • 118:14 - 118:15
    inherent risk
  • 118:15 - 118:17
    which i'm factoring in i'm not saying
  • 118:17 - 118:18
    that okay i'm wearing a
  • 118:18 - 118:21
    input or i have i will
  • 118:21 - 118:24
    follow their traffic control uh you know
  • 118:24 - 118:25
    i will follow
  • 118:25 - 118:27
    if you know in terms of meeting accident
  • 118:27 - 118:28
    i would follow all the rules
  • 118:28 - 118:30
    except i'm not factoring anything okay
  • 118:30 - 118:32
    so we are looking at for my own
  • 118:32 - 118:33
    infrastructure you are looking at
  • 118:33 - 118:36
    a risk without factoring in the controls
  • 118:36 - 118:38
    then obtain understanding and internal
  • 118:38 - 118:40
    controls now you are factoring in the
  • 118:40 - 118:41
    controls you are seeing
  • 118:41 - 118:43
    okay now these are the risk inherent to
  • 118:43 - 118:44
    the organization
  • 118:44 - 118:48
    now i would look at the controls okay i
  • 118:48 - 118:48
    will look
  • 118:48 - 118:51
    at the control environment okay very
  • 118:51 - 118:53
    important in terms of control
  • 118:53 - 118:55
    okay uh i will look at the control
  • 118:55 - 118:56
    procedures
  • 118:56 - 118:59
    i will look at the detection risk
  • 118:59 - 119:00
    assessment
  • 119:00 - 119:03
    control risk assessment equate total
  • 119:03 - 119:04
    risks
  • 119:04 - 119:09
    okay and then perform compliance tests
  • 119:09 - 119:11
    okay identify key controls to be tested
  • 119:11 - 119:12
    okay
  • 119:12 - 119:14
    now once you know the controls are there
  • 119:14 - 119:16
    now you will perform the
  • 119:16 - 119:18
    compliance test okay you perform the
  • 119:18 - 119:21
    test of those controls perform the test
  • 119:21 - 119:22
    on reliability
  • 119:22 - 119:24
    risk prevention and errors to the
  • 119:24 - 119:25
    organization policies and procedures
  • 119:25 - 119:27
    then you also perform the substantive
  • 119:27 - 119:30
    test now compliance test is just yes or
  • 119:30 - 119:30
    no
  • 119:30 - 119:32
    okay for example you have a you have
  • 119:32 - 119:34
    access control system yes or no you have
  • 119:34 - 119:34
    a
  • 119:34 - 119:36
    you have a security guard yes or no so
  • 119:36 - 119:38
    that's a compliances
  • 119:38 - 119:39
    but when you do a performance
  • 119:39 - 119:42
    substantive test you basically do
  • 119:42 - 119:44
    analytic procedures
  • 119:44 - 119:46
    okay for example access control systems
  • 119:46 - 119:47
    you will see that okay
  • 119:47 - 119:50
    has the people who left the organization
  • 119:50 - 119:52
    you know have they been deleted from the
  • 119:52 - 119:54
    access control systems
  • 119:54 - 119:56
    have those uh deleted the people who
  • 119:56 - 119:58
    have left the organization have they
  • 119:58 - 119:58
    accessed
  • 119:58 - 120:01
    the systems uh after they exit okay
  • 120:01 - 120:02
    that's kind of a
  • 120:02 - 120:05
    you know analytical uh another approach
  • 120:05 - 120:06
    to
  • 120:06 - 120:09
    uh you know a one one step ahead
  • 120:09 - 120:10
    you know in depth to those uh
  • 120:10 - 120:13
    compliances okay so you apply entity
  • 120:13 - 120:14
    procedures you do a detailed test of
  • 120:14 - 120:16
    account balances
  • 120:16 - 120:18
    other substantive audit procedures now
  • 120:18 - 120:19
    these are used
  • 120:19 - 120:22
    in uh basically in banking for example
  • 120:22 - 120:24
    you say that a person has
  • 120:24 - 120:26
    made a transaction whether the bank
  • 120:26 - 120:27
    account has
  • 120:27 - 120:30
    uh you know um whether the bank
  • 120:30 - 120:32
    whether the you know right-hand side is
  • 120:32 - 120:34
    equal to the left-hand side so you send
  • 120:34 - 120:35
    the money to someone
  • 120:35 - 120:37
    your account balance should should get
  • 120:37 - 120:38
    down the account balance of the other
  • 120:38 - 120:39
    person should get up
  • 120:39 - 120:42
    you know so and now this this basically
  • 120:42 - 120:44
    this is a substantive test you perform
  • 120:44 - 120:47
    uh to ensure that the uh integrity of
  • 120:47 - 120:47
    that
  • 120:47 - 120:49
    transaction okay to ensure it integrity
  • 120:49 - 120:50
    of that transaction
  • 120:50 - 120:53
    okay it's kind of make a checkup or you
  • 120:53 - 120:55
    know in a balance sheet you have a left
  • 120:55 - 120:56
    hand side equal to the
  • 120:56 - 120:59
    right hand side etc kind of procedures
  • 120:59 - 121:02
    which you apply so so it's you you check
  • 121:02 - 121:03
    the logic of that
  • 121:03 - 121:06
    transaction okay then you conclude the
  • 121:06 - 121:06
    audit
  • 121:06 - 121:10
    okay in terms of recommendations
  • 121:10 - 121:13
    and write the audit report okay so these
  • 121:13 - 121:14
    are the
  • 121:14 - 121:17
    risk-based audit planning technique okay
  • 121:17 - 121:18
    and these are things that may
  • 121:18 - 121:22
    they may impact the audit approach okay
  • 121:22 - 121:26
    audit risk and materiality
  • 121:26 - 121:29
    as i said inherent risk i explained you
  • 121:29 - 121:30
    earlier
  • 121:30 - 121:33
    uh as it relates to the ordered risk it
  • 121:33 - 121:35
    it the risk level or exposure of the
  • 121:35 - 121:37
    process entity to be audited without
  • 121:37 - 121:38
    considering the
  • 121:38 - 121:40
    controls that the management has
  • 121:40 - 121:42
    implemented enhanced risk exists
  • 121:42 - 121:44
    independent of an audit
  • 121:44 - 121:47
    and can occur because the nature of the
  • 121:47 - 121:50
    business okay as i said building a
  • 121:50 - 121:52
    building earthquake can happen
  • 121:52 - 121:55
    you know fire can occur okay flood can
  • 121:55 - 121:57
    happen so this is the inherent risk now
  • 121:57 - 121:59
    controlled risk is basically the
  • 121:59 - 122:01
    risk that a material error exists that
  • 122:01 - 122:03
    would not be prevented detected
  • 122:03 - 122:06
    on a timely basis by a system of
  • 122:06 - 122:07
    internal controls
  • 122:07 - 122:10
    so control risk if even if the control
  • 122:10 - 122:11
    is present there's chances that the
  • 122:11 - 122:13
    control may miss
  • 122:13 - 122:16
    the risk okay for example control risk
  • 122:16 - 122:17
    associated with manual reviews of
  • 122:17 - 122:18
    computer locks
  • 122:18 - 122:21
    okay if you do if you're doing a manual
  • 122:21 - 122:22
    review of a computer log which is
  • 122:22 - 122:25
    thousands in number okay uh there's a
  • 122:25 - 122:27
    high probability that
  • 122:27 - 122:30
    you would miss miss the information okay
  • 122:30 - 122:32
    so the control risk considered with
  • 122:32 - 122:33
    computerized data validation process
  • 122:33 - 122:34
    procedure
  • 122:34 - 122:36
    is ordinarily low if the processor
  • 122:36 - 122:38
    consistently
  • 122:38 - 122:40
    applied then there is a detection risk
  • 122:40 - 122:42
    again the risk that the material errors
  • 122:42 - 122:43
    or mis-statement that have
  • 122:43 - 122:45
    occurred will not be detected by the
  • 122:45 - 122:48
    isolator now there is a possibility
  • 122:48 - 122:50
    because audit is not a guarantee it's
  • 122:50 - 122:51
    assurance okay
  • 122:51 - 122:54
    so there's a possibility that as an
  • 122:54 - 122:56
    auditor we failed to identify news
  • 122:56 - 122:59
    we failed to detect risk in the system
  • 122:59 - 123:00
    okay and that
  • 123:00 - 123:03
    happens you know we are human beings and
  • 123:03 - 123:04
    this has happened uh
  • 123:04 - 123:06
    many organization that the auditor
  • 123:06 - 123:07
    failed to
  • 123:07 - 123:10
    detect errors and that that error was
  • 123:10 - 123:12
    there for a very long time and then one
  • 123:12 - 123:14
    auditor came
  • 123:14 - 123:17
    from uh and he detected the error and
  • 123:17 - 123:19
    then he looked at the previous reports
  • 123:19 - 123:21
    also the error was missed
  • 123:21 - 123:23
    you know etc etc so there's a detection
  • 123:23 - 123:24
    risk also
  • 123:24 - 123:26
    from an auditor's perspective then the
  • 123:26 - 123:28
    overall audit risk is also there okay
  • 123:28 - 123:29
    now the overall audit risk is the
  • 123:29 - 123:31
    probability that the information or
  • 123:31 - 123:33
    financial reports may contain metal
  • 123:33 - 123:35
    errors and the auditor may not detect
  • 123:35 - 123:38
    an error that has occurred okay and now
  • 123:38 - 123:42
    the uh now the uh so to our auditor is
  • 123:42 - 123:43
    cased by the auditor
  • 123:43 - 123:46
    or editor can also fail to detect an
  • 123:46 - 123:48
    error okay that has occurred okay now
  • 123:48 - 123:50
    there uh okay sorry
  • 123:50 - 123:52
    so the the difference between uh
  • 123:52 - 123:53
    detection risk and order auditors you
  • 123:53 - 123:55
    must understand
  • 123:55 - 123:56
    the detection risk is there the
  • 123:56 - 123:59
    materials errors or mis-statements that
  • 123:59 - 124:00
    have occurred will not be detected by
  • 124:00 - 124:02
    the isolator
  • 124:02 - 124:04
    okay similarly you know the overall
  • 124:04 - 124:07
    audit risk is that the material errors
  • 124:07 - 124:09
    order may not detect an error that has
  • 124:09 - 124:10
    occurred so it is almost
  • 124:10 - 124:13
    um you know a similar definition what we
  • 124:13 - 124:15
    have for detection and overall
  • 124:15 - 124:18
    risk okay now the the objective uh
  • 124:18 - 124:20
    in formulating the audit approach is to
  • 124:20 - 124:22
    limit the audit risk
  • 124:22 - 124:24
    okay uh in the area under scrutiny so
  • 124:24 - 124:25
    that the overall
  • 124:25 - 124:28
    risk is at a sufficiently low level and
  • 124:28 - 124:31
    at the completion of the examination
  • 124:31 - 124:32
    okay
  • 124:32 - 124:34
    coming to risk assessment risk
  • 124:34 - 124:36
    assessment we know uh basically the
  • 124:36 - 124:37
    auditor
  • 124:37 - 124:39
    a risk assessment basically assists the
  • 124:39 - 124:40
    auditor in identifying the high risk
  • 124:40 - 124:41
    areas
  • 124:41 - 124:43
    and also it helps in evaluation of
  • 124:43 - 124:44
    controls now
  • 124:44 - 124:46
    risk assessment to identify quantify
  • 124:46 - 124:47
    prioritize risks
  • 124:47 - 124:51
    be against criteria for its acceptance
  • 124:51 - 124:52
    objectives relevant to the organization
  • 124:52 - 124:55
    always remember that risk assessment
  • 124:55 - 124:58
    should be able to assess based
  • 124:58 - 125:02
    on a criteria okay for me
  • 125:02 - 125:03
    organizations have different criterias
  • 125:03 - 125:06
    okay every organization has to define
  • 125:06 - 125:09
    the criteria on on basis of what they
  • 125:09 - 125:10
    want to consider
  • 125:10 - 125:13
    uh this risk okay every organization
  • 125:13 - 125:15
    would have different criterias
  • 125:15 - 125:18
    okay for acceptance okay now for me
  • 125:18 - 125:21
    as i said again one thousand dollar loss
  • 125:21 - 125:24
    is very much but for a big organization
  • 125:24 - 125:27
    uh it's it's it's nothing okay so
  • 125:27 - 125:31
    based on that level okay uh you would
  • 125:31 - 125:32
    say
  • 125:32 - 125:34
    is it high medium low okay and an
  • 125:34 - 125:36
    organization has to decide whether it
  • 125:36 - 125:37
    would
  • 125:37 - 125:39
    accept the low medium low risks or
  • 125:39 - 125:41
    medium risk or
  • 125:41 - 125:43
    it will also accept the high risk areas
  • 125:43 - 125:45
    okay that the organization has today and
  • 125:45 - 125:46
    it also depends on nature of the
  • 125:46 - 125:48
    organization for example a nuclear power
  • 125:48 - 125:49
    plant
  • 125:49 - 125:52
    even a low risk it would be very much
  • 125:52 - 125:54
    for an organization for example a
  • 125:54 - 125:57
    library even a libraries organization
  • 125:57 - 126:00
    but for for them you know that that risk
  • 126:00 - 126:01
    may not be that much
  • 126:01 - 126:04
    okay they would only consider high risks
  • 126:04 - 126:06
    to the to them so
  • 126:06 - 126:07
    it would depend on the nature of
  • 126:07 - 126:10
    business and also also okay it supports
  • 126:10 - 126:10
    uh
  • 126:10 - 126:11
    now risk assessment support the
  • 126:11 - 126:13
    risk-based order decision making
  • 126:13 - 126:15
    as we have already studied about based
  • 126:15 - 126:16
    auditing
  • 126:16 - 126:19
    principles so it supports the decision
  • 126:19 - 126:21
    making by considering variables such as
  • 126:21 - 126:22
    technical complexity
  • 126:22 - 126:24
    level of control procedures in place
  • 126:24 - 126:26
    okay for example there
  • 126:26 - 126:28
    is an area where a lot of controls are
  • 126:28 - 126:31
    present and the risk is
  • 126:31 - 126:34
    less material okay you may want to
  • 126:34 - 126:36
    consider it as a low risk area
  • 126:36 - 126:39
    okay the level of financial loss uh also
  • 126:39 - 126:40
    uh
  • 126:40 - 126:42
    is something which you should be
  • 126:42 - 126:44
    considered okay for example if there is
  • 126:44 - 126:46
    materializes
  • 126:46 - 126:49
    in a risk is uh triggered you know
  • 126:49 - 126:53
    our risk is is
  • 126:53 - 126:55
    basically materialized that happens you
  • 126:55 - 126:57
    know a risk event
  • 126:57 - 126:59
    in reality happens what would be the
  • 126:59 - 127:00
    financial loss
  • 127:00 - 127:03
    okay generally many organizations uh use
  • 127:03 - 127:06
    this financial loss as a criteria okay
  • 127:06 - 127:07
    in terms of
  • 127:07 - 127:09
    uh you know high medium low or maybe
  • 127:09 - 127:10
    sometimes organizations say that if
  • 127:10 - 127:11
    their
  • 127:11 - 127:14
    risk is less than one million then it
  • 127:14 - 127:15
    would be
  • 127:15 - 127:17
    accepted if it is more than one million
  • 127:17 - 127:18
    would be
  • 127:18 - 127:21
    um you know mitigated okay or a
  • 127:21 - 127:22
    management decision needs to be
  • 127:22 - 127:24
    needs to be taken so it can we can also
  • 127:24 - 127:26
    define a financial loss figure
  • 127:26 - 127:28
    against that now there are multiple risk
  • 127:28 - 127:30
    responses as i said risking mitigation
  • 127:30 - 127:32
    is to reduce the risk
  • 127:32 - 127:34
    appropriate controls accept the risk in
  • 127:34 - 127:36
    terms of knowing it
  • 127:36 - 127:38
    okay knowingly objectively not taking
  • 127:38 - 127:39
    action
  • 127:39 - 127:41
    because sometimes for example obviously
  • 127:41 - 127:42
    there's too much
  • 127:42 - 127:45
    cost to accept the uh too much cost to
  • 127:45 - 127:46
    basically mitigate it
  • 127:46 - 127:48
    that's not how their business is there
  • 127:48 - 127:49
    there's no financial
  • 127:49 - 127:52
    support there you know i will give you
  • 127:52 - 127:54
    acceptance the example here then the
  • 127:54 - 127:56
    risk avoidance is basically
  • 127:56 - 127:58
    not doing that activity at all you're
  • 127:58 - 128:00
    not allowing action that would cause the
  • 128:00 - 128:01
    risk to occur
  • 128:01 - 128:03
    okay for example i'm i give you an
  • 128:03 - 128:04
    example of
  • 128:04 - 128:06
    you know going from one place to another
  • 128:06 - 128:08
    he says if i see that there has to be
  • 128:08 - 128:10
    there's a rain that would come you know
  • 128:10 - 128:12
    i foresee a rain
  • 128:12 - 128:14
    you know i don't go so that is avoiding
  • 128:14 - 128:15
    the risk okay
  • 128:15 - 128:18
    then risk transfer is sharing and
  • 128:18 - 128:19
    transferring this
  • 128:19 - 128:20
    risk to the other party now risk
  • 128:20 - 128:23
    transfer has to be very much you know a
  • 128:23 - 128:23
    decision
  • 128:23 - 128:25
    that the management has taken with very
  • 128:25 - 128:28
    cautious cautiously because uh
  • 128:28 - 128:29
    now when you're transferring the risk
  • 128:29 - 128:30
    you are not transferring the
  • 128:30 - 128:31
    responsibility
  • 128:31 - 128:34
    of the risk occurrence means uh for
  • 128:34 - 128:36
    example you're taking insurance
  • 128:36 - 128:40
    for a fire now your your
  • 128:40 - 128:44
    fire you know happened now you have you
  • 128:44 - 128:45
    have only looked at the financial
  • 128:45 - 128:48
    aspect of that risk but again if you you
  • 128:48 - 128:49
    see that how
  • 128:49 - 128:52
    your employees are suffering how your
  • 128:52 - 128:53
    suppliers are suffering how your
  • 128:53 - 128:54
    customers are suffering
  • 128:54 - 128:56
    again that responsibility is on you it's
  • 128:56 - 128:58
    not on the insurance provider to look at
  • 128:58 - 128:59
    so you are
  • 128:59 - 129:01
    basically not transferring the entire
  • 129:01 - 129:02
    risk you are just
  • 129:02 - 129:04
    transferring the financial aspect of
  • 129:04 - 129:06
    that risk to the insurance company
  • 129:06 - 129:10
    okay now in terms of risk acceptance uh
  • 129:10 - 129:13
    very much important is look at uh
  • 129:13 - 129:15
    deliberately not taking action okay you
  • 129:15 - 129:16
    are not taking action
  • 129:16 - 129:20
    because cost of that control to be
  • 129:20 - 129:22
    to be put in place for example i went to
  • 129:22 - 129:23
    an audit where
  • 129:23 - 129:25
    it was a it was a house i went for an
  • 129:25 - 129:26
    icici bank
  • 129:26 - 129:29
    audit and it was just a simple house you
  • 129:29 - 129:30
    know
  • 129:30 - 129:33
    and there were two systems there it's a
  • 129:33 - 129:34
    third party
  • 129:34 - 129:36
    of an icsa bank okay there were two
  • 129:36 - 129:38
    systems and only
  • 129:38 - 129:40
    uh one employee was there and uh one
  • 129:40 - 129:41
    employee was on leave
  • 129:41 - 129:43
    now what they're doing is bank is
  • 129:43 - 129:45
    sending them a form
  • 129:45 - 129:47
    for their club membership okay they're
  • 129:47 - 129:49
    they're typing in the club membership
  • 129:49 - 129:50
    they're scanning the document and
  • 129:50 - 129:52
    there's they're sending it back to the
  • 129:52 - 129:52
    bank
  • 129:52 - 129:55
    okay so it's a manual form which comes
  • 129:55 - 129:56
    to the third party
  • 129:56 - 129:58
    third party types in do the data entry
  • 129:58 - 130:00
    of that form
  • 130:00 - 130:02
    scans that form and send it to the bank
  • 130:02 - 130:03
    again
  • 130:03 - 130:06
    send it to the bank okay now this is a
  • 130:06 - 130:07
    small organization they are dealing with
  • 130:07 - 130:10
    pi information of the bank customers
  • 130:10 - 130:14
    okay now what i see here is that
  • 130:14 - 130:16
    now i ask them to have an antivirus ask
  • 130:16 - 130:18
    them these are 100
  • 130:18 - 130:20
    these are the controls that each be in
  • 130:20 - 130:22
    place you don't have these controls
  • 130:22 - 130:23
    you have you're using your personal
  • 130:23 - 130:26
    systems for storing bank information you
  • 130:26 - 130:28
    don't have antivirus
  • 130:28 - 130:31
    i gave the list of findings there so he
  • 130:31 - 130:33
    said i get 10 rupees to form
  • 130:33 - 130:35
    to fill this form each form okay do you
  • 130:35 - 130:36
    want to have
  • 130:36 - 130:39
    do you want to apply this control
  • 130:39 - 130:42
    for 10 rupees uh which i get from i
  • 130:42 - 130:45
    don't want business from icc max that's
  • 130:45 - 130:46
    what he said to me so i said
  • 130:46 - 130:48
    that's how it is you know you accept the
  • 130:48 - 130:51
    risk knowingly and objectively
  • 130:51 - 130:53
    not taking action okay but again the
  • 130:53 - 130:55
    risk is to the bank
  • 130:55 - 130:57
    okay now this has been transferred to
  • 130:57 - 130:58
    him but again he's not
  • 130:58 - 131:01
    he he's not able to properly handle that
  • 131:01 - 131:02
    okay
  • 131:02 - 131:03
    now i don't know what happened i gave
  • 131:03 - 131:05
    that report to them i don't know what
  • 131:05 - 131:07
    whether the business is still with that
  • 131:07 - 131:09
    uh third party or not or whether you
  • 131:09 - 131:10
    know
  • 131:10 - 131:12
    these situations can happen so your risk
  • 131:12 - 131:13
    response option should be
  • 131:13 - 131:16
    very much in line with the option very
  • 131:16 - 131:16
    carefully
  • 131:16 - 131:18
    any organization should take that option
  • 131:18 - 131:20
    very carefully
  • 131:20 - 131:24
    okay thank you guys thank you very much
Title:
Introduction To CISA | CISA Training Videos | Overview of CISA | ISACA CISA Introduction
Description:

more » « less
Video Language:
English
Duration:
02:11:23

English subtitles

Revisions Compare revisions