Você está na página 1de 3

Copyright © 2004 Information Systems Audit and Control Association. All rights reserved. www.isaca.org.

A Wake Up Call to All Information


Security and Audit Executives:
Become Business-relevant
By Patrick Taylor

Fraud—A Growing Problem


C
hief information security officers (CISOs) and chief
audit executives are feeling plenty of heat in today’s While Internet-related hacks make the headlines for
corporate environment. Both are at the center of new, disrupting business and putting personal information at risk,
highly visible US legislation that includes the Sarbanes-Oxley internal fraud remains the dirty little secret for many
Act, Patriot Act, Gramm-Leach-Bliley Act and Health businesses. For this reason, enterprises have historically
Insurance Portability and Accountability Act (HIPAA). focused on perimeter defenses, such as network firewalls and
While preventing and detecting losses, both positions are virtual private networks, to keep unauthorized outsiders from
expected to protect the corporate officers from ending up in accessing internal systems. However, industry reports
jail. And finally, both are considered “overhead” cost and their demonstrate the huge financial losses inflicted by fraud.
budgets tend to end up on the corporate cutting-room floor. In its 2003 study of global economic crime,
Talk about a no-glory, high-stress position with all risk and PricewaterhouseCoopers surveyed 3,600 organizations and
no reward. Under these elements, most CISOs and chief audit found that the average company lost US $2.2 million to fraud.
executives keep one eye on their job and the other on their According to the survey, all industries were affected, with
“career dissipation light.” more than 30 percent of respondents reporting fraud.1 The
Most CISOs and chief audit executives have dreamt about PricewaterhouseCoopers survey also cited fraud’s impact on
becoming “business-relevant” by finding a true and “reputation, brand image and staff morale” as more damaging
measurable return on investment—to stand shoulder-to- than the actual financial loss. In its 2004 Report to the Nation,
shoulder with business unit executives and claim a traceable the Association of Certified Fraud Examiners reported that the
portion of the bottom line. That is what they want and that is average company loses 6 percent of total revenue to fraud
why they need to protect their budgets and, in some cases, every year.2
their careers. Unfortunately, automated business systems are frequently a
In the midst of the increasing pressure from regulations, facilitator of fraud. As users become more familiar with a
CISOs and chief audit executives face new risks from system over time, they figure out the logic behind it and learn
enterprise rollout of business software packages, such as SAP, how to beat the system for their benefit. These “business
PeopleSoft and Oracle. While the built-in controls within these hackers” are now able to game the system. Systems-based
business systems are designed to prevent fraud and errors, the fraudulent schemes can include:
implementation of these controls is counterproductive and has • False (or “ghost”) vendors who invoice the organization
not been effective in combating fraud. • Ghost employees on the payroll
In this complex environment, business process integrity • Accounts payable tampering to redirect payments
monitoring offers the potential to identify fraud and payment • Fabricated commissions
errors as they occur, to prevent financial leakage before money • Fictitious invoices, refunds or expense claims from valid
leaves the enterprise. Finally, CISOs and audit executives vendors, customers or employees
possess the means to deliver a hard return on investment and Most enterprises do not have to look far to find examples of
measurable results to the bottom line. potential fraud in their business. Traditional fraud detection
looks for vendors with billing addresses similar to those of
New Systems Create Risk employees. However, an employee can target a valid vendor by
The advent of enterprise resource planning (ERP) changing the vendor’s mailing address just before the batch
applications, in addition to e-commerce-driven solutions, has print run of checks. After checks are printed, the employee
streamlined many business processes, reduced overhead and then goes back into the system to reenter the original valid
created new productivity gains in the way business is address. When dealing with employees who figure out that
conducted. However, by eliminating a paper trail and they can go into the system to cover their tracks, the evidence
increasing the number of users accessing corporate systems, of fraud is now transient.
the Information Age has opened the door for insider deceit, Authorized insiders often circumvent internal controls to
theft and fraud. bypass inefficient processes. While this flexibility can boost
While these efficiencies are too great to go back to the old productivity, it also opens the door for fraud and errors by
days of “approved” stamps and paper files, businesses and risk overriding proper approvals and potentially creating duplicate
managers must find a new means to replicate the function of accounts or introducing systems-based errors.
the long-replaced control department that once sifted through Misuse and abuse of the system often create an opportunity
invoices, purchase orders and payment vouchers to make sure for other, less moral insiders to commit fraud. For example, if
that all the numbers matched up. an employee sees that an invoice is paid twice or a single

INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 6, 2004


invoice is booked twice, he then recognizes the opportunity to systems that are most frequently the target or source of fraud
commit fraud by routing the second payment for personal benefit. or errors—accounts payable and payroll.
The opportunity to commit fraud has also increased. The However, the same technologies and applications are easily
number of transactions per employee has increased extended to monitor the integrity of other business processes,
dramatically with automated systems. As businesses share such as order to cash and financial reporting.
more information with vendors, suppliers and contractors by The accuracy, effectiveness and success of business process
linking their systems, fraud has the potential to pervade an integrity monitoring depend upon four main elements:
enterprise in unforeseen places. With the number of • Continually updated primary data from all relevant financial
transactions rising, internal auditors cannot keep pace by systems
relying upon sampling-based audits. • A universal ontology for analysis of common information
The June 2002 Gartner report, Moving to Transaction Incident across multiple financial systems
Monitoring for IS Security,” sums up the insider risk by stating: • Independent analysis that simulates the tests and knowledge
base of auditors and fraud examiners
Historically, hackers have not really been a problem. The • Alerts that allow auditors to track down precise instances of
major threat comes from technology-minded insiders who financial leakage and reports that document transaction
have knowledge about processes, business system integrity
customizations and technologies. Insiders such as current
employees, recently terminated employees, subcontractors and Primary Data and Continuous Updates
consultants are significantly more dangerous than outsiders. Because business systems allow for information to be altered
with little documentation of what actually transpired, common
Any individual familiar with internal business processes account payable schemes can involve the changing of a mailing
represents a significant threat. Most instances of computer address or routing number just before payments are made and
crime involve insiders abusing processes and circumventing then changing the information back shortly after. Business
control measures to take money or cause damage. In some process integrity monitoring must continually pull information
business environments, such as ERP or CRM, 95 percent of directly from the various financial applications, independent of
fraud comes from insiders or internal users with access to the financial systems, to detect the temporary changes.
key data transactions.3 Primary data are essential for business process integrity
monitoring to detect this elementary scheme. Primary data
System Controls—The First Line of Defense refer to the lowest level of business activity—not bits and
To identify and prevent fraud, enterprises are increasingly bytes, but rather the underlying results.
reliant upon the built-in controls of their ERP applications. For While comprehensive data acquisition provides the
example, segregation of duties can protect a company by foundation, a business process integrity monitoring system is
enforcing a control rule that does not allow the same person to irrelevant if the data acquisition process disrupts the accepted
approve an invoice and a related payment voucher. business practices for appropriate transactions. Data acquisition
While these control functions can be incredibly detailed, must be practical. It cannot introduce an extra load that
maintaining and updating the control functions are often significantly degrades overall performance of the business
overlooked, because they are considered a heavy burden for system. Furthermore, a business process integrity monitoring
which no one has time. Keeping up with new users, system’s data acquisition must not lower the reliability of the
eliminating old users and adding new roles for existing users business system.
can be a daunting task. In many cases, these control functions
are never implemented properly due to their complexity and Universal Ontology
need for understanding of all business processes. As business process integrity monitoring collects information,
While internal auditors often identify vulnerabilities within it must organize that data into a useful format that can be
a business system, their recommendations for more stringent analyzed. The acquired data must be processed into a unified
system controls are in many cases overruled because of direct schema or universal ontology, which allows heterogeneous data
costs of implementing and maintaining those controls or from multiple data sources to be analyzed on a one-to-one basis.
because they introduce unwelcome inefficiencies. This ontology is essential for business process integrity
monitoring to leverage its reasoning and analysis across
Business Process Integrity Monitoring— multiple business systems. Business process integrity
From Concept to Implementation monitoring should be applied across all business systems,
While the Information Age has increased the opportunity including:
for fraud (and for deceitful employees to cover their tracks), • Legacy software applications customized for the specific
enterprises are now recognizing their need for an independent enterprise
review of individual business transactions. In essence, • Enterprise resource planning applications, such as SAP,
businesses need an automated control department to audit PeopleSoft, J.D. Edwards or Oracle
human judgment without adding overhead. • Customer relationship management modules within the ERP
While the concepts of continuous audit have been around system or separate applications, such as Siebel, Goldmine or
for more than a decade, technological limitations stood in the Salesforce.com
way of practical solutions. Recent advancements of enterprise A February 2004 survey from the Hackett Group, an
financial applications, networking technology and software Atlanta-based research firm, highlighted the importance of a
analysis create an opportunity to increase financial universal ontology. The Hackett Group study concluded that
transparency. Solutions for business process integrity the average US $1 billion company operates 48 separate
monitoring leverage these advances to focus on financial financial systems and manages 2.7 ERP systems.4

INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 6, 2004


Independent Analysis Automated monitoring and analysis reduces the time
The analysis of business process integrity monitoring must required to identify anomalies among business processes.
be based on a series of tests that auditors or fraud examiners Security personnel and auditors then have more time to focus
would apply if they were evaluating the integrity of the on analysis and long-term correction of the identified
transaction. Inherently, this process is nearly impossible with anomalies, which empowers CISOs and audit executives to
simple, rules-based audit tools that test for threshold violations. contribute greater value to the business. With an increased
However, advanced computer analysis for business process transparency and visibility into financial operations, business
integrity monitoring can be tuned to: process integrity monitoring provides the means for businesses
• Make temporal comparisons—This is the ability to reason to identify inefficient and ineffective components within
about current and historical information, including the current business processes.
and previous states of a transaction, a vendor or an employee.
• Identify a level confidence—How likely is something to have Conclusion
occurred? Some tests can increase or decrease the confidence As technology continues to streamline internal business
assigned by other tests. processes, enterprises should continue to evaluate how these
• Determine an impact—Similar to confidence, analysis efficiencies might create vulnerabilities and opportunities for
should calculate and assign an impact to an event or fraud and errors. Armed with business process integrity
irregularity. monitoring, the CISO and chief audit executive can finally get
• Adjust alerts incrementally—With continual updates, a seat at the big table—the one reserved for those linked to
analysis should be incremental, whereby an irregularity that positive fluctuations in the bottom line. Finally, “overhead
initially looks moderately confident may later increase or managers” have a reason to smile.
decrease in confidence (and impact) as additional
transactions are considered. Endnotes
• Correlate multiple events and transactions—Trends and 1
Economic Crime Survey 2003, PricewaterhouseCoopers,
patterns should be identified from individual events and 2003, p. 3
transactions, each of which individually might seem 2
2004 Report to the Nation on Occupational Fraud and Abuse,
innocuous. Association of Certified Fraud Examiners, 2004, p. iii
3
Van Mien, A. Dang; J. Green-Armytage; Moving to
Benefits of Business Process Transaction Incident Monitoring for IS Security, Gartner,
Integrity Monitoring 19 June 2002, p. 22
CISOs and audit executives can achieve immediate value 4
Enterprises Ignore IT in Compliance Efforts, The Hackett
from business process integrity monitoring by preventing Group, February 2004
financial loss, easing the burden of internal controls and
empowering businesses to continually improve their operations. Patrick Taylor
Business process integrity monitoring identifies anomalies is a leader in the convergence of controls monitoring,
that would have otherwise gone undetected in manual, sample- information security and the implementation of technology to
based or retrospective audits. However, business process boost corporate governance. As CEO of Oversight Technologies,
integrity monitoring can also reduce financial leakage and he is responsible for understanding customer needs for business
unnecessary losses from ever happening by quickly identifying process integrity monitoring and making sure those needs are
any anomaly and empowering businesses to act before assets met in Oversight’s product development. As a respected
leave their possession. Businesses can then take action and information security industry insider who served in various
prevent the error or fraud from recurring. Business process product management and strategic marketing roles with Internet
integrity monitoring identifies the root cause of the problem, Security Systems and Symantec, Taylor is a frequent speaker at
which then empowers a CISO or audit executive to correct the conferences. In addition to his previous experience with ISS and
underlying breakdown that allowed the anomaly to occur. Symantec, Taylor has worked in leading roles with ORACLE,
Business process integrity monitoring can also act as a Red Brick Systems, GO, Air2Web and Fast-Talk.
detective control that eliminates the need for excessive
restrictive controls. Enterprises can greatly reduce their overall
cost of maintaining controls while monitoring the effectiveness
of their documented controls for compliance requirements.

Information Systems Control Journal, formerly the IS Audit & Control Journal, is published by the Information Systems Audit and Control Association, Inc.. Membership in the association, a voluntary
organization of persons interested in information systems (IS) auditing, control and security, entitles one to receive an annual subscription to the Information Systems Control Journal.

Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of the Information Systems Audit
and Control Association and/or the IT Governance Institute® and their committees, and from opinions endorsed by authors' employers, or the editors of this Journal. Information Systems Control Journal
does not attest to the originality of authors' content.

© Copyright 2003 by Information Systems Audit and Control Association Inc., formerly the EDP Auditors Association. All rights reserved. ISCATM Information Systems Control AssociationTM

Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the
association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles
owned by the Information Systems Audit and Control Association Inc., for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume,
and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the
association or the copyright owner is expressly prohibited.

www.isaca.org

INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 6, 2004

Você também pode gostar