| Preface | |
| Introduction | |
| Motivation | |
| Organizational Risk Management | |
| Risk Assessment Process | |
| Risk Management at the Board Level | |
| Importance of Proper Risk Management | |
| Purpose of this Book | |
| Organization of this Book | |
| Summary | |
| Notes | |
| The State of the Art | |
| COSO and Other Control Frameworks | |
| An Introduction to Risk | |
| Introduction | |
| Definition of Risk | |
| Risk Management Strategy | |
| Scope of a Risk Management Engagement | |
| Economics of Risk Management | |
| Influences in Risk Assessments | |
| Summary | |
| Recognized Control Frameworks | |
| COSO and COSO-ERM | |
| Introduction | |
| Control Frameworks and Professional Standards | |
| Managing Risk and Internal Control | |
| Holistic Risk Assessments and Erm | |
| Organizational Risks | |
| The Coso-Erm Framework | |
| Summary | |
| Notes | |
| Other Control Frameworks | |
| Introduction | |
| Summary | |
| Notes | |
| Qualitative Control Concepts | |
| What is Control? | |
| What Can Go Wrong / Causes of Exposures | |
| Effects of Computers/Automationon Problems | |
| The System of Internal Control | |
| Control Assessment | |
| Understand the System | |
| List the Potential Problems | |
| Estimate the Inherent Risk of Each Problem | |
| Segregate Controls and Fundamental Activities | |
| Classify the Controls | |
| Functions of Controls | |
| Assess the Effectiveness of Controls | |
| Assess the Adequacy of Control Over Each Problem | |
| Appraise Adverse Consequences That Result | |
| The Control Evaluation Matrix | |
| How Much Control is Enough / too Much? | |
| Notes | |
| Core Concepts | |
| Quantitative Assessment | |
| Inter-Related Systems | |
| Documentation | |
| The Assessment Process | |
| Monitoring | |
| Quantitative Control Relationships | |
| Introduction | |
| Systems Control Functions | |
| Preliminary Risk & Potential Incidents | |
| Anyone Can Build A Model... | |
| Precision of Results | |
| Sensitivity of Results | |
| Summary | |
| Notes | |
| Inter-dependent Systems | |
| Interdependencies | |
| Hierarchy of Systems | |
| Knowledge Framework | |
| Documentation | |
| Objective | |
| Elements of Control Documentation | |
| Common Documentation Formats | |
| Documentation Tools | |
| Notes | |
| The Process for Assessing Internal Control | |
| How Does This Fit into COSO? | |
| System Assessments Steps | |
| Summary | |
| Notes | |
| Monitoring Internal Controls | |
| COSO Monitoring Guidance | |
| The Control Environment | |
| Potential Monitoring Problems | |
| Controls over Controls to Assure Effective Monitoring | |
| Assessing the Monitoring Function Under COSO | |
| Notes | |
| Assessments of Selected Systems | |
| Accounting Policies and Procedures | |
| Business Cycle Applications | |
| General and Infrastructure Systems | |
| Trusted System Providers | |
| Spreadsheet Applications | |
| Fraud | |
| Accounting Policies and Procedures | |
| The Accounting Environment | |
| Conversion from GAAP to IFRS | |
| What Can Go Wrong with Accounting Policies and Procedures? | |
| Reliance on Application Systems | |
| Controls Over Accounting Policy Selection and Application | |
| Notes | |
| Business Process Applications | |
| Purpose | |
| Application Components, Structure, and Architecture | |
| What Can Go Wrong With Applications? | |
| Typical Application Controls | |
| Application Assessment Model | |
| General and Infrastructure Systems | |
| The Environment | |
| CobiT for Control of IT | |
| What Can Go Wrong With General Systems? | |
| Controls Over General Systems | |
| Trusted System Providers | |
| The Environment | |
| How Much to Trust Trusted Systems? | |
| Provider Problems | |
| Internal Controls Over Trusted Systems | |
| Trusted Provider Assessment Model | |
| Spreadsheet Applications | |
| The Environment | |
| Applications of Spreadsheets | |
| What Can Go Wrong with Spreadsheet Applications | |
| e.Spreadsheet Controls | |
| Spreadsheet Model | |
| Notes | |
| Fraud | |
| The Environment | |
| How to Commit Financial Statement Fraud | |
| Occupational Fraud Model | |
| External Fraud | |
| Computer security example model | |
| Notes | |
| Governance | |
| Uniform Accounting | |
| Reporting on Internal Control | |
| Internal Audit Roles | |
| What is An Audit Committee to Do? | |
| Reporting on Internal Control | |
| The Environment | |
| Perception of Risk | |
| Results of Modeling | |
| Summary | |
| Notes | |
| What is An Audit Committee to Do? | |
| The Environment | |
| Sarbanes-Oxley Specifications for the Audit Committee | |
| Internal Audit | |
| Audit Committee Structure | |
| Reports and Presentations to the Audit Committee and Board | |
| Summary | |
| Review and Acceptance of Assessments | |
| Introduction | |
| Summary Description of the Assessment Model | |
| Basic Modeling Concept | |
| Question Points in an Assessment Review | |
| Appendix | |
| Internal Control Sections of the Sarbanes-Oxley Act | |
| "Sec. 301. Public Company Audit Committees | |
| Sec 404. Management Assessment of Internal Controls | |
| Sec. 407. Disclosure of Audit Committee Financial Expert | |
| Index | |
| Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.