
KnowledgeLeader Toolpack: Cost Management CPE Courses
As senior executives face more pressure to respond to rising costs and eroding profit margins, CFOs can remind their colleagues that they have more cost-optimizat...

Expense Reporting: Best Practices for Corporations
Generating revenue is typically the number one goal of any business. However, as the famous adage goes, “It costs money to make money.” To that end, any business ...

KnowledgeLeader's Top 10 Pages: May 2023
Entity-Level Controls: The Importance of Setting the Tone: This blog post explains the importance of entity-level controls and explores the COSO Framework. Enter...

New Content on KnowledgeLeader - 6/5/2023
Tools The following tools were published on KnowledgeLeader this week: Project Risk Management Audit Work Program This sample audit program provides the intern...

How a Quality Assessment Review Can Improve Your Internal Audit Process
According to standards set forth by the Institute of Internal Auditors (IIA), quality assessment review best practices should include an independent and external ...

New Content on KnowledgeLeader - 5/29/2023
Tools The following tools were published on KnowledgeLeader this week: Privacy Audit Work Program This tool contains two sample work programs that highlight ri...

Develop a Credit Card Information Policy to Mitigate Financial and Credit Risk
What Are Financial and Credit Risks? Financial risk and credit risk are related risks that should often be (and are) considered together but are not wholly inter...

KnowledgeLeader Toolpack: Data Analytics CPE Courses
The explosion in the use of digital channels and the data they produce have caused a corresponding rise in the use of data analytics across organizations. Despite...

New Content on KnowledgeLeader - 5/22/2023
Tools The following tools were published on KnowledgeLeader this week: Accounts Payable Audit Work Program Organizations can use the general best-practice step...

Strategic Risk: Management and Reporting
Business can't be done, and money can't be made without taking on risks. Risk is an inevitable fact of business life. Big things, like expanding internationally o...

KnowledgeLeader Toolpack: Agile CPE Courses
As businesses focus on digital transformation for speed and service, they tend to put more emphasis on individuals and interactions than processes and tools. In t...

New Content on KnowledgeLeader - 5/15/2023
Tools The following tools were published on KnowledgeLeader this week: IT Organization Audit Work Program This tool contains two work program samples that high...

Document Retention Policy Basics
We live and do business in a highly regulated, litigious society. It’s an inevitable but beneficial consequence of our pluralistic, capitalist system. In such a s...

New Content on KnowledgeLeader - 5/8/2023
Tools The following tools were published on KnowledgeLeader this week: IT and Business Risk Alignment Guide This sample tool can be used as a guide for understanding and assessing an organization’s ...
The Art of Balancing Costs and Profits: A Guide to Cost Management
Effective cost management is an essential factor for the success of any organization. For risk management and audit professionals, it is crucial to manage costs e...

KnowledgeLeader's Top 10 Pages: April 2023
Entity-Level Controls: The Importance of Setting the Tone: This blog post explains the importance of entity-level controls and explores the COSO Framework. Enter...

New Content on KnowledgeLeader - 5/1/2023
Tools The following tools were published on KnowledgeLeader this week: Accounts Receivable Policy: Cash Receipts This sample policy is designed to help companies correctly deal with and record cash r...
Risk Management Strategies: Using an RCM and Other Tools for Reporting and Disclosure
Maintaining transparency and accuracy in financial and operational reporting is critical to any company's compliance efforts. Two essential components of any comp...

KnowledgeLeader Toolpack: Digital Transformation CPE Courses
Digital transformation is not only about embracing the latest software tools and apps; it also raises the bar in the war for talent. Organizations that want to th...

New Content on KnowledgeLeader - 4/24/2023
Tools The following tools were published on KnowledgeLeader this week: Social Media Risks Guide Organizational social media use is rising and growing increasingly important from a risk management sta...
New Content on KnowledgeLeader - 4/17/2023
Tools The following tools were published on KnowledgeLeader this week: Debt Management Policy The purpose of this policy is to outline the proper method of acquiring loans and monitoring debt. In thi...
How to Approach Governance, Risk and Compliance
When viewed as a single corporate project or objective, governance, risk and compliance, often referred to by risk audit and accounting professionals as “GRC” for...

New Content on KnowledgeLeader - 4/10/2023
Tools The following tools were published on KnowledgeLeader this week: Shipping and Receiving Audit Work Program This document provides three sample audit work programs for the shipping and receiving...
Sarbanes-Oxley Section 302 Executive Certifications: The Importance of Maintaining Compliance
The beginning of the 21st century ushered in a new financial, commercial and industrial era. It was the beginning of the internet age. Powerful computer processor...

New Content on KnowledgeLeader - 4/3/2023
Tools The following tools were published on KnowledgeLeader this week: Accounts Receivable/Collections Audit Work Program Collecting customer payments—like sales—requires constant attention. The comp...
Safeguarding Sensitive Data: Proactive Measures Against Cyber Threats
Data Security and Internal Controls In today’s digital age, breaches in data security from cyberattacks have become more prevalent and sophisticated, causing sig...

New Content on KnowledgeLeader - 3/27/2023
Tools The following tools were published on KnowledgeLeader this week: Control Self-Assessment Policy Self-assessment is an organized means of using the knowledge of those who are most familiar with ...
Maximizing Efficiency: Best Practices for Effective Audit Project Management
Audit Testing Needs Project Management For finance and audit professionals, project management is a core requirement for achieving effective results in audit tes...

New Content on KnowledgeLeader - 3/20/2023
Tools The following tools were published on KnowledgeLeader this week: Accounts Payable Policy This tool contains seven sample policies that outline procedures for documenting, recording and issuing ...
Internal Audit Administration: Get a Tune-Up
Internal audit administration can help organizations better understand and manage risks, make better decisions, and achieve their goals more effectively. Internal...

Integrating SOX Compliance Efforts for Optimal Results
Maintaining Control Corporate governance has become increasingly critical over the years, with organizations being assigned a growing responsibility to ensure th...

New Content on KnowledgeLeader - 3/13/2023
Tools The following tools were published on KnowledgeLeader this week: Risk Assessment Guide Every organization faces various risks from external and internal sources that must be assessed. This too...
Achieving High Customer Satisfaction: Processes and Procedures for Businesses
A question that companies regularly ponder: Why is customer satisfaction so important? Simply put, customers are the lifeblood of any business. Without customers,...

Updating Your Company’s Investments and Foreign Exchange Risk Management Strategy: Implement, Monitor, Review, Rinse and Repeat
As risk management and audit professionals are well aware, investments and foreign exchanges can present significant challenges for companies. In the wake of the ...

New Content on KnowledgeLeader - 3/6/2023
Tools The following tools were published on KnowledgeLeader this week: IT General Controls Audit Work Program Our IT General Controls Audit Work Program four sample work programs that provide general...
How to Transition to Continuous Auditing
If auditing critical business processes is a good thing, more auditing must be a better thing. That, at least, is the admittedly oversimplified thinking behind th...

How and Why to Audit Your Business Continuity Management Program
Any number of disasters can adversely affect an organization. There are natural disasters like floods or tornados; technology disasters, including computer crashe...

Vendor Management Best Practices
At its core, vendor management is relationship management. It’s all about the relationships an organization maintains (and benefits from) between itself and exter...

Self-Assessment Best Practices
Self-assessment is an organized means of using the knowledge of those who are most familiar with a topic, such as processes and controls. The self-assessment proc...

The Essentials of Project Management
Project management is the act of applying expert knowledge, skills, tools and techniques to project activities within an organization or business to meet or excee...

Performance Measurement Is More Important Than Ever
In today’s modern digital age, competition in business and industry is relentless. High-level organizational performance and consistent improvement are critical t...

Change Is Inevitable; Change Management Is Critical
There can be no continuing success in modern business without rapid organizational evolution. Technology, communication, regulation and the economy all move too f...

Ethics Program Best Practices
Well-written, well-disseminated ethics policies are essential aspects of modern business. Ethics are, in fact, the foundation of all policymaking decisions. This ...

Best Practices in Corporate Governance
Corporate governance has traditionally been viewed as that which the board of directors does when providing oversight on strategy, policy, performance and transpa...

Inventory and Materials Management Best Practices
Defining Inventory When one thinks of inventory, the physical items in storage or warehouse facilities may come to mind. Yet the term is much broader. Inventory...

Enterprise Resilience — the Delicate Balance of Growth and Risk
Risk at the Speed of Light There has never been a time when succeeding in business didn’t involve facing monumental challenges and taking great risks. It’s silly...

How to Produce a High-Quality Audit Report
Responsible companies need to maintain the critical attributes of accountability, consistency and transparency to uphold the confidence of investors, regulators, ...

Building a Robust Disaster Recovery Policy
Disaster recovery is the process of rapidly recovering business operations in the event of a business interruption. The disaster recovery team of an organization ...

Mastering the Credit and Collections Process
Credit and Collections Defined When defining credit and collections, it's best to begin with an understanding of accounts receivables, which is money owed to an ...

How Quality IT Audit Controls Can Protect Your IT Investments
A Substantial Investment The modern business enterprise can’t exist without the benefit of up-to-date information technology (IT), at least not as a competitive ...

Making the Most of Your Internal Audit Practice
Introduction If you are reading this article, you are likely in the internal audit (IA) profession or looking to refine your internal audit practice. Or perhaps ...

How IT Controls Enhance the Value of IT Assets
It is impossible to overstate the value of information technology (IT) to the world of businesses and industries today. IT facilitates and enhances communication ...

The Benefits of Agile Auditing
Agile Defined Agile is a methodology that focuses on maintaining flexibility and staying in touch with clients. It recognizes that the linear approach taken in t...

What Is IT Risk and How Should You Manage It?
What Is IT Risk? Information technology (IT) risk is any potential threat to business data, critical systems and business processes. It is the risk associated wi...

Segregation of Duties Is a Best Practice That Can’t Be Ignored
Checks and Balances The judicious segregation of key duties within a business is a fundamental principle of risk mitigation that should never be ignored or taken...

How to Ensure a Robust Compliance Policy
Introduction “Compliance” is defined as adherence to policies, plans, procedures, laws, regulations, contracts or other requirements within a company or organiza...

A Guide to Reviewing Your Organization’s Data Mining and Data Analytics Practices
In the realm of computer science, the term data mining is interchangeable with the term knowledge discovery in data (KDD), and for good reason. There’s a tremendo...

Organizational Risk Assessment — Performed the Right Way
Risk Assessment Defined Risk assessment is the identification and analysis of relevant risks to achieving objectives and forming a basis for determining how the ...

Internal Controls: Why You Need a Vigorous Policy
A Working Definition of Internal Controls For accounting, risk and audit, internal controls are a set of accounting best practices activities designed and implem...

The Importance of Best Practices in Goodwill Accounting
Goodwill: An Elusive but Valuable Asset Goodwill might be the most valuable asset on your company’s balance sheet. It might also be the most difficult to place a...

COSO: Step Up Your ERM, Integrated and Internal Controls
COSO is a framework used by businesses to establish a set of internal controls for integration into their business processes. This set of controls assures that an...

Successful Audit Planning Is a Critical First Step in the Audit Process
While it’s true that no internal audit will ever go exactly according to plan, it is also true that audit planning is a necessary and important part of the overal...

Building and Maintaining a Robust Enterprise Risk Management (ERM) Platform
The many ongoing risks that businesses face daily extend well beyond organizational risk and market risk to include a much longer set of risks that can be derived...

Human Resources Best Practices: Tools to Help Meet the Challenge
The Challenge Human resources (HR) professionals have a real and ongoing responsibility to the employees of the companies they serve. To the utmost extent possib...

Must-Have Tools for Accounts Receivable Risk Management
Getting to the Core of Accounts Receivable Accounts receivable (AR) refers to the proceeds or payments that a company will receive from its customers who have pu...

Risk Oversight: How to Be Aware of Emerging Business Risks
Given the dynamic environment, the audit committee should take a close look at the company’s risk profile at least annually. Ideally, this review should be suppor...

What You Need to Build Remarkable Partnerships With the IT Organization
The strength of the partnership between IT audit and the IT organization is a significant differentiator in the overall success of IT projects and IT audit effect...

Segregation of Duties: Key Facts You Need to Know
Segregation of duties (SoDs) is an important concept to internal control frameworks, financial reporting and regulatory compliance, including the Sarbanes-Oxley A...

How to Monitor Transaction Governance for Anti-Money Laundering
Expectations for transaction monitoring (TM) governance are quickly evolving due to the complexity of detection systems, the demand for additional operational ove...

How to Conduct an Up-to-Date Information Security Audit
The point of the article, of course, was that people must focus their attention in the correct places when considering what would most influence their quality of...

Important Roles You Need to Be Aware of During Enterprise Risk Management
The chief audit executive (CAE) and internal audit can play one or more of the following roles in conjunction with the implementation of enterprise risk managemen...

Five Components of the COSO Framework You Need to Know
WHAT DOES COSO STAND FOR? In 1992, the Committee of Sponsoring Organizations of the Treadway Commission (COSO) developed a COSO Framework for evaluating inter...

Five Tips for Increasing Your Influence as an Auditor
Written by Ann Butera, president of The Whole Person Project, Inc. By definition, “influence” is the ability to get others to act on your suggestions wi...

How to Identify Remarkable Value in Data Analytics for Internal Audit
Internal auditors have weighed the benefits of data analytics software since the earliest versions of the technology began to surface nearly two decades ago. The...

Audit Committee Reporting: Important Practices and Examples You Need to Know
Chief audit executives may be comfortable that their approach to audit committee reporting has followed the same unwavering path for the past decade. But are th...

How to Remarkably Audit Your IT Initiatives
Changes to a company’s information technology (IT) environment, both information systems and the underlying platforms, are a source of significant operational ris...

COSO Integrated Control Framework: Important Changes You Need to Know
In January 2013, the updated version of the Committee of Sponsoring Organizations of the Treadway Commission Integrated Internal Control Framework went into effe...

Enterprise Risk Management: How to Effectively Raise the Bar
Everyone talks about the need for good risk management programs, but nobody seems to know how to audit them to ensure that they work. The people that bear respons...

Important Things You Need to Know When Traveling for Audits
Auditors often have the good fortune to go on audit assignments and client meetings throughout the U.S. and in many countries of the world. Some trips are specta...

Internal Audit: How to Guarantee an Increase in Performance
The internal audit function’s position within a company is unique. It provides its principal stakeholders (audit committee members and management) valuable and ob...

Ten Tips You Need to Know for Making High-Impact Presentations
In order to be a high-performing auditor, you must be able to deliver messages in a clear and compelling manner. From kickoff meetings and status reports to inte...

What You Need to Align IT Management With Business Priorities
The "Holy Grail" for IT has always been to be closely aligned with business efforts. For years, business has encouraged IT to focus on delivering business priorit...

Natural Disasters: How to Efficiently Leverage Lessons Learned
Perhaps no disaster in recent history has done more to show the need for strong business continuity and disaster recovery planning than the Japan earthquake and ...

What You Need to Integrate Risk in Your Business Planning Process
While strategy-setting defines an enterprise’s overall strategic direction, differentiating capabilities and required infrastructure, a business plan lays out ho...

Important Factors of Data Analytics You Need to Know
Auditors can use data analytics to avoid the massive waste spending that often goes hand-in-hand with hiring outside vendors and contractors. This technique does...

Five Essential Lines of Defense You Need to Know for Managing Risk
Organizations have learned many lessons over the years from specific financial crises. For example, if a chief executive ignores the warning signs posed by the...

Change Management Audits: Key Factors You Need to Know
Information technology is critical to the long-term success of most organizations. It is a key driver for the cost of operations, which tends to be a vital compo...

Business Continuity Programs: Important Information on How to Perform Audits You Need to Know
Ensuring that an organization can recover from disaster is a basic business requirement the board should explore regularly with management. Nowadays, leading org...

Disclosure Controls and Procedures: Key Facts You Need to Know
The SEC introduced “disclosure controls and procedures” as a new term in its initial August 29, 2002, release following the enactment of Sarbanes-Oxley. Disclosur...

How to Identify Gaps in Your IT Strategy Process
Everybody is talking about IT strategy these days. As IT managers, you’re faced with considerable pressure to communicate a comprehensive strategy, and show a cl...

Five Important Questions on How to Effectively Keep Pace With Change
We all know that change is inevitable, but what can an organization do to keep its strategies and risk management capabilities on the same course as the ever-cha...

Intelligence Automation: How to Get Started
Discussions of robotic process automation (RPA) and artificial intelligence (AI) tend to follow separate tracks. This has been a function of the way these technol...

External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologies. Within such business, the proper protection of conf...

How to Effectively Conduct Self-Assessment Meetings
Why are we meeting? What are the objectives of the self-assessment meeting? Defining the meeting objectives is the most important aspect of planning a self-as...

How to Determine the Most Effective Budgeting Process
A budget is a systematic method of allocating financial, physical and human resources to achieve strategic goals. Companies develop budgets in order to monitor pr...

Customer Service: Business Risks You Need to Know
The focus on customer relationship management (CRM), also known as customer care or customer service, has been growing steadily for the last few years. Companies...

Are You Properly Managing Cash Flow Risks?
Cash flow management is the mobilization of company funds, the investment of these funds to produce income and compensation of the banks that support the process....

How to Identify Important Components of SOC Report Evaluation
There are distinct differences between SOC 1 and SOC 2 reports, but these reports also certainly overlap. For example, the security principle in a SOC 2 report r...

How to Keep Your Organization’s Policies Up to Date
Defined policies and procedures play an integral role in efficient and effective company operations. They are also key to the company’s internal control environme...

What Are the Benefits and Risks Associated With Data Integrity?
Data integrity is the assurance that information can only be accessed or modified by those authorized to access the system. Measures taken to ensure integrity in...

Project Management: Business Risks and Best Practices You Need to Know
Project management is generally associated with the ability to apply expert knowledge, skills, tools and techniques to project activities in order to meet or exce...

In The Spotlight: Your Accounts Payable Process
The accounts payable process is all about how a company pays its bills. For most companies, accounts payable begins with receiving an invoice and ends with issuin...

How to Optimize Effective Audit Planning
Audit planning sets the tone for the audit. If audit planning hasn't been done well, it can make the entire audit much more difficult. You should be answering fou...

How to Easily Revamp Risk Culture in the Digital Age
How many directors can name a chief risk officer who has advised them and the executive team that the organization is too risk-averse? In the digital age, not eno...

How Are You Monitoring Your Project Management Risk?
Project management risk is significant because of its lasting implications. By definition, a project is a “temporary endeavor undertaken to create a unique produc...

How Important is Due Diligence to the M&A Process?
There are several key phases of the mergers and acquisitions (M&A) process: Growth/Portfolio strategy Due diligence Integration planning Integration execu...

How to Successfully Optimize Your BCM Program
Business continuity management (BCM) is the development of strategies, plans and actions that provide protection or alternative modes of operation for activities ...

Six Tips on How to Implement a Strong Ethics Program
Do your customers trust and believe in your company? Do you trust and believe your employees? Do your employees trust and believe in you? Trust and transparenc...

How to Effectively Audit Fixed Assets
Auditing fixed assets is extremely important to ensure that accounting for capital assets and depreciation is in compliance with management’s objectives. Knowled...

IT Governance Opportunities in the Age of Digitalization
Sustaining an effective business model in the face of digital disruption requires a strong foundation of IT governance able to scale and adapt to modern enterpris...

How to Assess Your View of Future Risks
Given the complexity of the business environment, executives need to be careful to avoid overconfidence that can be bred by an expressed or implied “official” vie...

Traditional Risk Assessment Approaches Have Limited Value
Developing risk maps, heat maps and risk rankings based on subjective assessments of the severity of impact of potential future events and their likelihood of occ...

How Quick Is Your Financial Close Process?
"Close the books" is a process that a corporation uses to reconcile, consolidate and report financial information on a periodic basis. Each company defines closin...

Audit Committee: How to Maximize Your Evaluation
Every audit committee should assess the effectiveness of the organization’s internal audit function at least annually, if not throughout the year. The critical ro...

The Best Way to Formulate and Execute Audit Procedures
Once a company forms an internal audit function, completes the risk assessment process and develops an internal audit plan that is responsive to the risk assessme...

When Was the Last Time You Reviewed Your Purchasing Process?
The process of purchasing materials and supplies comprises procedures and activities to acquire goods in the correct quantity and in a timely manner. The process ...

Is Your Strategy Focused on Digital Transformation?
The digital revolution currently taking place is transforming our world. Over the next few years, many organizations will need to undertake radical change program...

Audit Committee: Importance to the Board of Directors
What should the audit committee’s relationship be with an organization’s board of directors, compensation committee, disclosure committee, and nominating and governance committee? The audit committee i...
How to Achieve Remarkable Value From Internal Audit in the Digital Age
In a world of rapid change on almost every front at which organizations must adapt and grow or risk decline and their ultimate demise, everybody faces the same reality — either continuously improve thei...
Internal Audit: Auditing Standards You Need to Be Aware Of
Auditing Standards for Internal Audit The Institute of Internal Auditors (IIA) promulgates the International Professional Practices Framework (IPPF) which includes Mandatory Guidance and Recommended Gu...
Ten Important Roles of the Audit Committee in Internal Audit
Ten Important Roles of the Audit Committee in Internal Audit Although the exact nature, charter, scope and reporting lines of internal audit may vary between companies, the audit committee plays a key ...
Social Media Risk: What it Means to Your Risk Profile
Social Media Risk: What it Means to Your Risk Profile Social media platforms and applications have been implemented rapidly by most organizations over the past decade. New ways to utilize social media ...
Compliance: How to Position for Ultimate Effectiveness
Positioning Compliance for Effectiveness Positioning the compliance function for effectiveness is a matter of first defining the roles executive management and the board want the function to play. An u...
A Compliance Perspective to Risk Assessment
Making Your Risk Assessments Count: A Compliance Perspective to Risk Assessment The traditional approach for assessing compliance risks focuses on the severity of impact and likelihood of occurrences, ...
An Operational Perspective to Risk Assessment
Making Your Risk Assessments Count: An Operational Perspective to Risk Assessment Operational assessment is often directed to assessing performance against quality, time, innovation and cost targets to...
Consider the Distinguishing Characteristics of Risk
Making Your Risk Assessments Count: Consider the Distinguishing Characteristics of Risk Traditional risk assessment approaches don’t often address the unique ris...

Where to Look for Digital Risk
Many auditors are asking themselves the same legitimate question: With so much happening, where do we start? Advancements in technology and data have been so rapid in recent years that long-standing or...
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by adding tools and processes on top of their established operations. It’s important for these orga...
What You Need to Know About Robotic Process Automation
Are You Familiar With Robotic Process Automation? Robotic process automation (RPA) has been gaining traction as an efficient way to automate labor-intensive and repetitive tasks across a variety of bus...
How to Evaluate Your Corporate Culture
Starting the Process to Evaluate Culture Internal auditors often talk about the “tone at the top” – the idea that corporate culture begins with the example set by senior management. But while conduct ...
How to Develop an Effective Code of Conduct
Executives often cite an ability to adapt to change as the most important factor for success in today’s dynamic business environment; however, there is another equally important factor: an unwavering co...
What is the Internet of Things?
The internet of things (IoT) is an environment in which “things” – objects, animals or people – are given unique identifiers on the internet and are able to transfer data over a network without the need...
Second Line of Defense: What Needs to Be Present
What is the Second Line of Defense? Essential to effective risk management, the lines-of-defense model is implicit in COSO’s internal control framework through the control environment, control, activit...
What You Need to Know About GDPR Compliance
Are You Familiar With GDPR? The General Data Protection Regulation (GDPR) became effective May 25, 2018, and introduced strict rules for the protection of the personal data of EU citizens. GDPR expande...
Exploring the Big Picture of IT Risk Assessment
Most, if not all, business transactions executed today touch the information technology (IT) environment at some point in their lifecycle. As organizations plan for the next calendar year, it’s logical ...
Improving the Close-the-Books Process
An effective business process is built on a set of well-defined and clearly stated business objectives. These key objectives articulate the ideal performance resu...

Intellectual Property: Risks You Need to Know
Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to businesses, given their increased aggressiveness toward intellectual property (IP) theft. These, an...
Communicating With Shareholders: What You Need to Know
Communicating with shareholders is about capital – the ability to access either equity or debt at the lowest possible cost. By understanding investor motivation a...

Audit Committee: How to Develop a Strong Self-Assessment Process
The audit committee of the board of directors helps the board fulfill its responsibilities to the company and its current and potential shareholders, the investme...

Developing Budgets: What You Need to Know
In a previous blog on Managing Mergers and Acquisitions KPIs, we discussed what exactly key performance indicators are: “KPIs are generally defined as quantifiable measures used to evaluate the success...
Key Performance Measures for Improving the Internal Audit Process
An effective business process is built on a set of well-defined and clearly stated business objectives. These key objectives articulate the ideal performance results that the company expects from that p...
What is Cloud Computing?
What is Cloud Computing? Cloud computing is defined as the use of a collection of services, applications, information and infrastructure composed of pools of computer, network, information and storage ...
Currency Risk: The Purpose and Risk of Money
What Is Money? People may say that “money is the root of all evil,” but is it? It may be best to point out that the original quote is better expressed as, “for the love of money is the root of all evi...
What is IT Audit?
It is common to find organizations investing more and more resources – money, time, staff, etc. – these days in technology. Consider a relatively small retail company, for example, that’s focusing on ex...
How to Get Your Accounts Payable Process to Work for You
One of our leading practices to consider for your accounts payable process is to develop strategic business alliances with suppliers and involve them in developing better ways to process accounts payabl...
What Is Internal Auditing?
What Is Internal Auditing? About Internal Audit The internal audit profession, through The Institute of Internal Auditors (IIA), has continued to redefine itself as business risk and organizational c...
Six Successful Warehouse and Storage Strategies You Need to Know
There are two main goals that companies with leading practices strive to achieve in the warehousing process: to provide value-added services such as product customization and to move those products thro...
The Art of Internal Audit Reporting: Direct Impact and Clarity
Internal audit (IA) reporting may be the biggest challenge in the audit process next to scheduling the audit itself and implementing recommendations in today’s complex and competitive corporate environm...
Self Assessment: Launching Here and Soaring Beyond
First Step: Use Self-Assessment Within the Internal Audit Department The first and simplest way to use the self-assessment process is to use it in determining your own internal audit function strateg...
How to Manage Your Lender Relationships
Is The Treasury Function Ensuring Superior Financial Services for Your Company? The treasury function at a company bears responsibility for managing financial transactions, safeguarding deposits, ear...
Measure Cost-of-Quality to Improve Product Quality
Total quality management requires commitment and persistence. Quality will always have a cost, but many companies are demonstrating that investments in quality always provide returns. Cost-of-quality re...
Best Practices for Developing Strong Public Relations
Are you using strong strategic communication processes that build great relationships between your organization and the public? Public relations has gained importance and visibility in the recent years...
How to Monitor and Manage Legal and Ethical Issues
Globalization, technology and expanding economic development have propelled business to a leading role in shaping the course of human events. With that influence comes a greater sense of responsibility...
What is Sourcing Risk?
Outsourcing has become a keystone of major business operations to the point that it’s almost a given that large companies will move certain expensive business processes and labor-intensive activities to...
Guide to Records Management
Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving records. From creation to disposition, records in electronic recordkeeping systems may now util...
What is IT Performance Risk?
Performance is defined as the throughput of business transactions compared to user needs, expectations or requirements. IT performance risk is the risk that a company’s IT infrastructure will be unable...
The Three Components of a Successful Systems Design
What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term design as used here refers to the entire scope of a project. A business system design is a collec...
How to Build an Effective Business Process
Key Performance Measures Improving the Process An effective business process is built on a set of well-defined and clearly-stated business objectives. These key objectives articulate the ideal performa...
How Does Opportunity Risk Apply to Financial Business Processes?
Opportunity risk occurs whenever there’s a possibility that a better opportunity may become available after having committed to an irreversible decision. We all experience opportunity risk at its most ...
Five Keys to Managing Relations With the Board of Directors
For directors to make meaningful contributions in their oversight of management, they need to understand the business environment within which the company operate...

How Can Human Resources Risk Be Managed?
“All of the blame and none of the praise” This was how one Human Resource professional described their job in a forum on tech recruiting recently. Human Resource...

How To Minimize Customer Fraud Risk
Fraud is the intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right. In the business community, the ultimate goal of fraud is to gain mo...
What is Process Accounts Receivable, Credit and Collections?
In recent blog posts, we’ve discussed KPIs for various processes and even gave a concise description of what they are (see Guide to Managing Mergers and Acquisitions KPIs). In this post, we’ll be lookin...
What is Organizational Alignment Risk?
What is Organizational Alignment Risk? "Organizational alignment" is defined as conscious and systematic coordination and alignment of three powerful and interrelated driving forces: organizational str...
What is Transaction Authenticity?
What Is Transaction Authenticity? "Transaction authenticity" can be defined as the authentication of a party’s (individual, organization) identity, to ensure that pending transactions and contractual a...
Guide to Managing Mergers and Acquisitions KPIs
Few things can be as fraught with stress and complication for top executives and business owners as evaluating mergers and acquisitions. Some mergers are consummated to capitalize on new geographic or d...
What is Strategic Forecasting?
Budgeting is a systematic process for: Expressing future plans in formal quantitative terms Allocating resources to achieve strategic goals Monitoring progress toward goals Controlling spending Pre...
What is Financial Instrument Risk?
What is Financial Instrument Risk? Buyers and sellers may enter into sub-optimal financial or commodity instrument structures that have been standardized for efficient electronic trading. Conversely, b...
Settlement Risk: Using Key Performance Indicators to Mitigate Exposure
Settlement risk, in its simplest form, is the risk that one party won’t hold up their end in a transaction. There are several reasons this can occur, including time delay, system failure or default, and...
Process Alignment Risk Key Performance Indicators Guide
What Is Process Alignment Risk? This is the risk that the business processes within a company may not be appropriately aligned with its corporate strategy, resulting in the inability of the organizatio...
Fraud Detection Red Flags
Corporate fraud, employee theft, insurance scams/workers compensation fraud, employer fraud, forgery/falsified documents and even money laundering are all examples of fraud. Nobody likes to think it’s h...
Risk Assessment Maps and Prioritizing Business Processes
Risk assessment helps identify and document critical business processes and the internal controls within each process. Combined with facilitated management meetings, this approach can help gain companyw...
Do You Have Adequate Documentation for Your Business Processes?
Good process documentation doesn’t just describe how things work—it tells a story of an organization’s modus operandi (MO). As with any storytelling, you might sit down to document your process and enco...
Guide to the State of Data Analytics
What is Data Analytics? Data analytics is the practice of embedding insight into operations to drive business strategy and performance. What Does this Mean? With the tools already existing in CRM, E...
A Guide to Self-Assessment Value Proposition
Self-assessment is a process through which an organization utilizes its internal knowledge to identify and assess uncertainties and the extent to which current practices are sufficient and appropriate t...
Comparing U.S. Sarbanes-Oxley with C-SOX (Bill 198) and J-SOX (FIE)
As a result of the infamous Enron and WorldCom scandals, the U.S. reacted with strict guidelines to re-establish confidence in the financial market. Commonly referred to as the Sarbanes-Oxley Act, or “S...
Guide to Risk and Risk Reporting
Business risk is the level of exposure to uncertainties that the enterprise must understand and effectively manage as it achieves its objectives and creates value. It is not just about threats; there is...
Is Your Financial Close and Reporting Process Too Manual?
Most organizations continue to invest a significant number of hours every month in a particular set of activities related to calculating, manipulating and validating critical financial reporting data us...
Guide to Managing Large-Scale Business Projects
It seems like everybody is wearing a lot more hats these days and finance leaders are no exception. Of course, this means that they are finding it increasingly difficult to balance the multitude of resp...
Close-the-Books Guide: Reduce Financial Close Risk
A fast, close-the-books process provides multiple benefits for the finance function and for the company. First, a fast close process creates more time for finance professionals to focus on strategic act...
Inventory Management Sample Process Interview Questions
This extensive list of questions can be asked during an interview for an inventory audit. Purchasing Can I have a copy of your policies and procedures? Can I have a copy of your organizational chart...
Electronic Discovery Risks, Challenges and Procedures
Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data for the purpose of using it as evidence in a legal case. This is obviously a hot topic right...
Signs Your Organization Needs Business Intelligence Solutions
|Busi*ness In*tel”li*gence|, n. - the capacity to acquire and apply business knowledge, the act or state of knowing about your business; to understand and profit from experience; the internal developmen...
Business Intelligence Competency Centers Overview and Guide
The objectives of a business intelligence competency center (BICC) are to provide the organization with better control over operational and financial reporting, reduce reporting costs, improve consisten...
What Is Internal Audit’s Role in Cybersecurity?
Corporations are always thinking about how to protect assets. A few of the white-collar crimes companies must consider include hacking/intrusions (cyber vulnerability), insider/outsider trading (converg...
COSO ERM Framework: Key Facts You Need to Know
When initiating the project to update its enterprise risk management (ERM) framework, COSO saw opportunities to achieve clarity on several fronts. The updated framework recognizes the increasing importa...
How to Define Risk Management Goals and Objectives in Your Organization
Risk oversight and risk management are high priorities on the agenda of most organizations. Here are popular KnowledgeLeader tools that focus on risk management: Enterprise Risk Management Audit Repo...
How to Mitigate Risks Using Effective Business Continuity Planning
Thorough business continuity plans help organizations minimize the risks of a disaster and restore vital business functions without significant detrimental effects. This blog post examines the fundamen...
What is Design Risk and What Risks are Associated With System Design?
To “design” is to create, fashion, execute, or construct according to plan. The term design as used here refers to the entire scope of a project. A business system design is a collection of design docu...
Risks Associated with Data Integrity and Management Best Practices
Failure to manage data integrity risk can have the following impact: Authorization, completeness, and accuracy of transactions may be incorrect as they are entered, processed, summarized, and reporte...
Cyber Risk: Major Challenges You Need to Know
Cybersecurity is likely to remain center stage as a top risk as companies continue to expand their reliance on digital technologies to transform customer experien...

How to Efficiently Create Agile Risk Management Solutions
Many organizations have failed to keep pace with changing trends in risk and compliance. Resource allocation for many risk and compliance initiatives implemented ...
