Vous êtes sur la page 1sur 34

Re-inventing Internal

Controls in the
Digital Age
April 2019
Contents
1. Foreword: Vision of the Future 04

2. Executive Summary 05

3. Methodology 07

4. Integrated Control Framework 08

5. Key Technologies and Associated Risks 11

6. Key Risks 22

7. Stakeholder Impact 25

8. Challenges to Organisation Transformation 28

9. Conclusion 31

2 Re-inventing Internal Controls in the Digital Age


Acknowledgements

We would like to thank the following roundtable participants and interviewees for their knowledge
contributions and valuable insights:

Eric Ang, Senior Vice President, Group Compliance, United Overseas Bank Limited

Daniel Berenbaum, Vice President Finance, Group Compliance, Asia Pacific Chief Financial Officer, Globalfoundries

Dietrich Benjes, Vice President & General Manager APAC, Varonis Systems Ltd

Sudeep Chatterjee, Associate Vice President, Partnerships, MetricStream Inc

Kevin Fitzgerald, Regional Director, Asia, Xero

Anirban Kumar Ghosh, Asia Pacific Controller, Jones Lang La Salle

Rajeev Gupta, Regional Financial Controller, Avaya Singapore Pte Ltd

OoiLing Hon, Vice President Operations Finance Asia, Finance – FSAP, Four Seasons Hotels Ltd

Helen Kim, Head of Customer Sales, ALEX Solutions

James Lee, Director of Finance, Sofitel

Shawn Leong, Director, Handshakes

Lim Soon Hock, Managing Director, PLAN B ICAG, Adjunct Professor, National University of Singapore

Sarah Nabaa, Vice President, SE Asia & ANZ, VeChain.org

Vincent Lim, Chief Financial Officer - Asia Pacific, Datalogic

Rajendra Kumar Shreemal, Chief Financial Officer, QuEST Global Engineering

Cherie Sim, Regional Finance Manager, Owndays Co. Ltd

Joyce Tong, Director Finance & Procurement, Info-communications Media Development Authority

Wah Yee How, Deputy Director, Finance (Shared Services), Public Utilities Board

Andrew Watson, Regional Financial Controller, ASEAN ANZ, Association of Chartered Certified Accountants

Wong Kiew Kwong, Head of Internal Audit, SMRT Corporation Ltd

3 Re-inventing Internal Controls in the Digital Age


Foreword:
Vision of the Future

Companies put in place internal Some companies are using sensors In this report, we consider how
controls to safeguard assets, to monitor the quality of their contemporary technologies are
prevent fraud, verify financial manufacturing plants and operations. allowing improvements to business
records, monitor organisational Others have implemented distributed processes and control environments
performance and ensure efficient ledgers to track their supply chain to be realised.
and uninterrupted flow of business. from raw ingredients all the way
to end products. Robotic Process Referencing COSO’s1 integrated
Digital technologies are transforming Automation (RPA) is being used internal control framework,
traditional industries and business by finance and operations to we see how organisations are
models. They are also impacting automate controls and improve using predictive analytics and
common control procedures, the precision, whilst Artificial Intelligence experimenting with blockchain and
overall control environment, risk (AI) is allowing organisations to drones to strengthen their controls.
management and audit. continuously monitor and visualise However, introducing new
enterprise risks in real time and technologies comes with risks,
propose actions. particularly around cybersecurity
and data privacy. We show that it is
critical to balance innovation with
safety and security to mitigate
the risks.

1
The Committee of Sponsoring Organisations of the Treadway Commission (COSO) is a joint initiative to combat corporate fraud. It was established in the United States by five private sector
organisations, dedicated to guide executive management and governance entities on relevant aspects of organizational governance, business ethics, internal control, enterprise risk management,
fraud, and financial reporting. COSO has established a common internal control model against which companies and organisations may assess their control systems. COSO is supported by five
supporting organizations: the Institute of Management Accountants (IMA), the American Accounting Association (AAA), the American Institute of Certified Public Accountants (AICPA), the Institute
of Internal Auditors (IIA), and Financial Executives International (FEI)

4 Re-inventing Internal Controls in the Digital Age


Executive Summary

Key Findings 5. In the digital age, data 6. Continuous testing and


governance and control culture will monitoring of controls requires
1. Internal control concepts become more important as more interdisciplinary teams and skill
and principles, such as those in controls become embedded in sets of audit specialists (for testing
COSO’s Integrated Internal Control automated systems. Beyond this, controls), business process owners
Framework, will continue to be a level of professional skepticism (for overseeing their processes) and
applicable and relevant in the digital must remain to challenge the technical staff (for building
age. In fact, technology can make systems and be able to identify the technology enabled
internal controls even more effective, when the system could be wrong. control systems).
efficient and pervasive. The CFO and finance function
2. Even basic automation can plays a key role in both embedding
improve internal controls by a data-driven control culture and
instilling discipline in organising maintaining a skeptical mind-set.
and standardising processes.
However, a process and its controls

76%
must be designed appropriately
before automation is considered.
Automating a poor process is
counter-productive and may increase of CEOs believe data is critical/important to understand the risks
risk. Technology can also give to which the business is exposed, but only 22% feel their data is
rise to new risks that may not be comprehensive enough for this.
adequately addressed by current
internal control systems. Source: PwC’s 22nd Global CEO Survey 2019

3. Many organisations are already


deploying or exploring emerging
technologies for control tasks
or processes, for example, AI
for anomaly detection, or drone “As you would expect, the risk of human error
technology for inspections and aerial is high with manual processes. Additionally, you
surveillance (refer to page 14). In the don’t always achieve the level of transparency
future, we expect these technologies
to be used more widely for
that you would like. Many finance departments in
control purposes. Singapore are still working on Excel spreadsheets
4. When supply chains are
- even basic automation would significantly
connected to blockchain and the improve controls and transparency.
Internet of Things (IoT), controls
span across an entire ecosystem Daniel Berenbaum, Vice President Finance,


of companies and individuals Asia Pacific Chief Financial Officer, Global Foundries
interacting through technology. The
boundary between internal and
external controls will be blurred. As
a result, the concept of “internal’’
controls may have to be rethought
and revised accordingly.

5 Re-inventing Internal Controls in the Digital Age


Executive Summary

The world is buzzing with new


technologies. Organisations are
adapting their strategies and “JLL Property is a data company, so we have to
business models as new players
capture parts of traditional protect the data. As a Proptech company we can
value chains. Much focus has do valuations of a London property from our desks
been on the growth benefits of
technological innovation, but risk
in Singapore using IoT sensors. We put sensors in
and control functions are also our buildings and analyse the data remotely and
starting to derive benefits. In this continuously. We do not need to send our people
report, we share examples of
companies using technology to down to sites to physically check if anything
reinvent internal controls, while is faulty.
reducing risk and cost at the
same time. The latest technologies
companies use include: Anirban Kumar Ghosh, Asia Pacific Controller


Jones Lang LaSalle
• Cloud Computing – Near
limitless processing power
of cloud computing allows
powerful machine learning
algorithms to analyse all
transaction data and identify
anomalous activities.

• Robotic Process Automation


(RPA) – Software bots can run The use of these technologies will External bodies, such as auditors
certain processes and control create more data, raising concerns or regulators, will change the
activities with greater reliability around cyber and information way supervisory activities
and at lower cost than security risk, as well as fair, ethical are performed. This creates
human staff. and permissible use of data. an opportunity to collaborate
effectively, harmonise and
• Artificial Intelligence (AI) – Putting in place AI to augment or align assurance efforts among
Natural Language Processing replace human decision-making in stakeholders.
(NLP) algorithms (a form of a responsible way will require four
machine learning) can scan key components to be assessed –
large text documents and fairness, explainability, safety
check for values, accuracy and accountability.
and consistency with other
documents. Internal controls will impact
multiple stakeholders. Technology
• Drones – Unmanned vehicles will impact how management and
equipped with video cameras other lines of defence operate.
can be used to verify the Audit committees have a role to
quality and quantity of assets play in defining expectations, tone
in hard to reach locations, such and control culture. Traditionally
as tall buildings, construction seen as providing oversight, this
sites and out at sea. may also verge on accountability
for achieving a high level of
• Blockchain – A distributed precision on an organisation’s
ledger of cryptographically control environment.
secured transactions in a
supply chain network can
mitigate risks of unauthorised
alteration of records.

6 Re-inventing Internal Controls in the Digital Age


Executive Summary

The key challenge that


organisations must overcome
arises not from technology, but “I expect more companies to adopt technology,
from its adoption. Some people in
the organisation may resist change including data analytics, to enhance business
due to fear of being replaced, performance, risks management, controls and
others may not use the tools
effectively due to lack of skills or
governance but the speed of adoption is
training. A well thought through the challenge.
change programme, supported
and driven from the top, is critical
to transform control functions and
Wong Kiew Kwong, Head of Internal Audit


prepare them for the future. SMRT Corporation Ltd

Ultimately, organisations that


embrace change will not just
be able to manage risks more
effectively, but will experience
significant benefits to their growth
and bottom line.

Methodology
In order to better understand how
organisations have implemented
and operated internal controls
using new technologies and to
study their impact on stakeholders
(including CFOs, Auditors, Audit
committee members and others),
this research used a variety of
methods to gather feedback
and data.

A roundtable discussion was


conducted with CFOs in October
2018. An online survey was
distributed in December 2018
and January 2019. Concurrently,
interviews with CFOs, auditors
and others were conducted.
This was supplemented by
desktop research. The full list of
participants of the roundtable and
interviews can be found in the
Acknowledgements (page 3).

7 Re-inventing Internal Controls in the Digital Age


Integrated Control
Framework

Even with the advent of new Through the use of predictive


technologies, from cloud models on employee movement
computing to AI, COSO’s or behavioural analytics to identify
framework remains relevant candidates with the right cultural
and effective. The framework fit, companies are now enabling
recognises that technological strategic workforce planning with
innovation creates both greater sophistication. E.g. controls
opportunities and risks. can proactively address competency
retention. Singaporean bank, DBS,
Technology, used in the right uses analytics to predict with very
way, can enable organisations to high accuracy whether a sales
address COSO’s 17 principles person will quit over the next nine
The most widely recognised across five components months.
internal controls framework is more effectively.
the COSO framework, which was In a recent interview with
The COSO guidance further Strategy+Business3, Piyush Gupta
incepted in 1992. While it has
explains that, “The principles in CEO, DBS explained, “It [AI system]
been updated since then, the
the framework do not change with uses data science. We can track
fundamentals have not changed.
the application of technology. This basically everything that signals
COSO defines internal control
is not to say that technology does the employee’s engagement or
as follows:
not change the internal control disengagement: what time do they
“Internal control is a process, landscape. Certainly it affects come to work, how many times do
effected by an entity’s board of how an organisation designs, they access email. We send a list
directors, management, and other implements, and conducts internal to the managers and say, “We think
personnel, designed to provide control, considering the greater these are the people who are likely
reasonable assurance regarding the availability of information and the to quit in the next year,” and the
achievement of objectives relating use of automated procedures, but manager has the choice of whether
to operations, reporting and the same principles remain suitable to engage with the person ahead
compliance.” and relevant.” of time.”
This is evident in the first
component - Control Environment.
COSO breaks down the Control
Environment into five principles
which companies should apply
to deliver effective control. One
of these principles is, “The
organisation demonstrates a
commitment to attract, develop,
and retain competent individuals in
alignment with objectives.”

The well-known COSO cube2


defines five integrated components
across three categories of
objectives and different levels of
organisational structure.

2
https://www.coso.org/Documents/COSO-ICIF-11x17-Cube-Graphic.pdf
3
https://www.strategy-business.com/article/Transforming-a-Traditional-Bank-into-an-Agile-Market-Leader

8 Re-inventing Internal Controls in the Digital Age


Within the control environment
component, COSO also has a Figure 1: Dashboard for continuous monitoring of senior role KPIs
principle around accountability of
performance and internal controls.
In recent times, shareholders and
Organisations are using
communities have raised concerns
data analytics to track
around lack of accountability,
accountabilities assigned
which sparked regulators to step
to senior roles, and their
in to encourage and enforce
respective delegations.
accountability.
The metrics are used to
In response, organisations are
measure and track the
using data intelligence to provide
performance and activity
transparency and visibility into
against accountabilities
key accountability indicators and
and responsibilities.
tracking these quantitatively. This
gives real time transparency to
appropriate controls, delegation
and problem management and
even whether individuals are
exhibiting the right behaviours
and conduct.

Ultimately, the way organisations design and operate controls can


be disrupted with technology. Every layer of internal control is being
transformed, and modern day Governance Risk and Compliance (GRC)
technologies (e.g. Figure 2) are illustrations of how businesses are digitising
their entire approach to control governance, including culture and conduct.

9 Re-inventing Internal Controls in the Digital Age


Integrated Control Framework

Figure 2: MetricStream enables monitoring of entity-wide risks

Contemporary GRC solutions use technology to tie various components together. Some organisations use
platforms such as MetricStream to manage their enterprise governance, risk and compliance functions.
The process for enterprise Risk Assessment leverages MetricStream to provide a continuous view of risks
throughout the organisation. These are updated dynamically, allowing the company to respond, adapt and
remain agile. Through case management, frameworks of risk taxonomies and regulatory obligation & policy
repositories, the system helps the second line of defence to communicate and enforce control activities.
Monitoring of control activities is enabled through self-assessments and audit management capabilities. By
centralising and making available all the data, this helps the organisation achieve adequate information and
communication. Ultimately, GRC technology enables senior management to have clearer visibility of their risk
profile and internal control environment, achieving greater responsibility and accountability, and driving better
business performance.

10 Re-inventing Internal Controls in the Digital Age


Key Technologies and
Associated Risks

Technological advancement Internet of Things


impacts how organisations operate.
While the focus on transformation
is often prioritised on customer Robots Augmented reality
facing operations, companies are
starting to realise that in order to
have greater business resilience,
they must disrupt the organisation
(including internal controls)
pervasively.
Virtual
The core elements of people, Drones Reality
processes, technology and data 2020
thread through any activity. outlook
Addressing each of these within
an organisational culture that
supports innovation and creativity
is important for harnessing
emerging technologies.4

The following section explores how


modern technologies will impact
internal controls. 3D printing Blockchain

Artificial intelligence

Figure 3: PwC’s Essential Eight

PwC’s Essential Eight are technologies that every organisation should


consider to derive business impact and have strong commercial viability.

4
The Race for Relevance, Technology opportunities for the Source: https://www.pwc.com/gx/en/issues/technology/essential-eight-technologies.html
Finance Function, ACCA, 2017.

11 Re-inventing
Re-inventing Internal
Internal
Controls
Controls
in the
inDigital
the Digital 11
Age Age
Key Technologies and Associated Risks

Cloud Computing On a broader perspective, The general message is that


cybersecurity risks have increased organisations must be satisfied
Cloud computing is not considered due to the use of third party with their overall control
an emerging technology anymore, infrastructure and multiple data environment, even when using
but it is important to first consider centres, where applications and outsourced service providers
this as its use is so pervasive data reside. such as cloud: “MAS is amiable
globally. to financial institutions leveraging
Having the right controls over cloud-computing services. As in
It has become a business in excess the infrastructure, platform, any outsourcing arrangement,
of $250bn5 in 2018 with many applications and data is critical. institutions should perform
organisations adopting the use of Working together with the cloud due diligence as well as risk
cloud providers for their IT needs, provider to achieve this assessments relating to outsourcing
from infrastructure to platforms is necessary. and implement appropriate
and software. governance framework, processes
Some countries, such as China,
Heightened risks could arise impose strict laws over data and control measures to manage
through the use of hybrid cloud residency. In Singapore, the and mitigate risks associated with
technology. Organisations must financial services regulator, such engagements.” - MAS (2016)6
therefore implement appropriate Monetary Authority of Singapore In order to address trust issues
controls to strengthen their (MAS), uses a more pragmatic around hybrid and multi-cloud
IT environment. approach, requesting financial environments, every organisation
institutions to consider cloud usage needs to conduct risk and control
Many cloud providers have high from the perspective of Technology
standards of controls that can assessments in line with industry
Risk Management and standards, frameworks and best
be passed on to their customers, Outsourcing Guidelines.
e.g. control certifications and practices and take appropriate
attestations of their technology remedial measures.
control environment, along with Additional consideration may be
tools to help organisations deliver required to evaluate unforeseen
their internal control objectives. risks due to an organisation’s
Even with these in place, current lack of familiarity with
organisations still need to be technology.
accountable for their own controls
across hybrid and multi
cloud environments.

Risks
Some of the key risks that
organisations must address revolve
around data. Personal data is
protected by laws and regulations
in many countries, e.g., Singapore’s
Personal Data Protection Act
(PDPA) and the EU’s General Data
Protection Regulation (GDPR).

https://www.statista.com/statistics/477702/public-cloud-vendor-revenue-forecast/
5

http://www.mas.gov.sg/Singapore-Financial-Centre/Smart-Financial-Centre/FAQs/Regulations-and-Guidelines/2016/
6

Regulations-1.aspx

12 Re-inventing Internal Controls in the Digital Age


Key Technologies and Associated Risks

Amazon Web Services (AWS) shared responsibility security framework

When customers engage Amazon Web Services (AWS), responsibility for security is shared. Typically, AWS
assumes responsibility for “security of the cloud”, while customers are responsible for “security in the cloud.”
With this model, an organisation’s duties are made simpler as AWS takes on the onus of security for key
infrastructure and physical components.

Figure 3: AWS’s shared responsibility framework depicts the customer’s and AWS’s security responsibilities

Customer data
Customer
Platform applications, identity & access management

Responsibility for Operating system, network & firewall configuration


security “in” the cloud
Client-side data Server-side encryption Networking traffic
encryption & data (File system and/or data) protection (encryption,
integrity authentication integrity, identity)

Software
AWS
Compute Storage Database Networking

Responsibility for
security “of” the cloud Hardware/AWS global infrastructure

Regions Availability zones Edge locations

To assist customers with their own obligations, AWS provides services to allow customers to protect their data.
As organisations migrate and produce more data on AWS, they may look to rich analytics services such as
Amazon Macie for data security needs. Leveraging machine learning, Macie allows organisations to discover
the sensitive data that resides in their cloud instance. Once identified, the service is able to provide alerts to
customers if there are indicators that the data is being accessed or moved in an unusual fashion. The alerts can
then be sent for automated remediation and tracking in the customer’s security ticketing system. This can help
address risks around unauthorised access or data leaks in relation to Personally Identifiable Information (PII) and
Intellectual Property (IP).

Cloud service providers, such as AWS, provide assurance to their customers and other stakeholders via
attestations and certifications. Examples are SOC 1/2/3 (control reports) and ISO 27001 (security management
controls). Other methods of assurance, such as Singapore’s Outsourced Service Provider Audit Report (OSPAR),
go beyond SOC reports by referencing regulatory guidance on outsourcing. However, organisations must keep
in mind their own responsibilities, recognise that their own control environment should be suitably evaluated for
risks, and address these through independent audits. Furthermore, with tools (e.g. Real-time Insights on AWS)
to enable real-time auditing becoming increasingly available, risk profiles can be reduced, allowing controls to
become more preventative in nature rather than detective or point in time.

Source: https://aws.amazon.com/compliance/shared-responsibility-model/
https://aws.amazon.com/macie/

13 Re-inventing Internal Controls in the Digital Age


Key Technologies and Associated Risks

Stock takes using drones

Drones Drones are being used for car monitoring and stocktaking within
a railyard. This has traditionally been time consuming and labour
Drones are unmanned aerial
intensive, due to the vast amount of individual elements that can be
vehicles, which can be equipped
present. Today, autonomous drones can operate within a pre-defined
with a ground based controller and
area, equipped with scanners and cameras to identify particular
on-board cameras. Data captured,
cars with a real-time flight control system to prevent collisions. This
such as videos and images, can
solution is developed to autonomously detect damage to cars,
be transmitted back to the base for
significantly speeding up the inspection and stocktaking processes
analysis. The benefits include speed
and cutting the costs of operating and managing a rail fleet.
of image capture, ability to access
remote locations (e.g. out at sea), Stocktaking can be conducted in parallel to the maintenance
controlling health and safety risks of monitoring process. Precision can be increased by tagging assets
humans, and greater precision. with identifying labels, such as barcodes, transceivers or radio
frequency IDs. Allowing drones to scan and compare assets against
The construction industry has
a catalogue of data can identify changes, addressing risks such as
benefitted from drones in multiple
abnormalities or absences that could indicate theft.
areas of internal control. When large
assets are being constructed across
a vast area (either horizontally or
Source: Clarity from above: transport infrastructure: The commercial applications of drone
vertically), using drones can help technology in the road and rail sectors, PwC, Jan 2017
several control objectives:

• Reporting: Used to verify


existence, valuation and work in
progress of the developments. Shipping companies using drones for
• Compliance: Providing a compliance checks
bird’s eye view of a site allows
surveying to be done quickly to Increasingly, shipping companies are using drone technology to
check compliance with stringent replace the manual checks that their surveyors and ship inspectors
health and safety regulations. used to conduct. Capturing the images for the ships out at sea
• Operational objectives: Acting as enables the company to perform surveys and checks, such as,
a deterrent to workforce cutting analysing ship conditions, checking cargo’s conformance to
corners and to maintain a high contracts and export regulations, and in the co-ordination of the
quality of work. planned loading/discharging of commodities or containers at port.

In addition, some ports impose strict regulations, requiring ships to


Risks be “cleaned” before entering the ports, e.g. “biofouling” ships will
Drones can be subject to specific be imposed with penalties and ships are not allowed to enter such
risks given their aerial nature. ports to protect the sea waters. Tighter controls also benefit good
Aviation authorities and the industry actors by creating a fairer playing field.
need to develop complex air Drone inspections have provided benefits through greater human
traffic management systems for safety, precision ,and efficiency and the ability to share video and
preventing collisions. Cross border image with its customers, allowing enhanced level of service.
risks and flight paths must also be
addressed. Data privacy is a concern Other than strengthening the operational controls, this concurrently
given that drone operators collect addresses financial reporting controls by ensuring adequate cut-off,
a vast amount of data, including supported by the speed at which these measures can be translated
confidential or sensitive information back to financial figures at period end.
about property or behaviours.
Ownership and usage of such data Source: A global shipping services company
must be carefully addressed.

14 Re-inventing Internal Controls in the Digital Age


Key Technologies and Associated Risks “I believe that RPA will reduce the risk of human
errors in internal controls as well as lessen the
labour required for checking. Reducing human error
will also improve data accuracy substantially.”
Robotic Process Cherie Sim, Regional Finance Manager
Automation (RPA) Owndays Co. Ltd
Not to be confused with industrial
robots, Robotic Process Automation PwC estimates that 45% of work automated processes, expediting
(RPA) software is a powerful tool to activities can be automated, saving testing and risk compliance.
perform manual, time-consuming, $2 trillion in global workforce costs.7
rules-based office tasks at shorter This reduces errors, improves quality,
cycle times and lower costs than Using RPA allows organisations and compliance and customer
other automation solutions. RPA to digitise expensive, error prone satisfaction through reduced queries
replicates end user activities, manual processes and internal and complaints. RPA is being used
typically through a Graphical User controls. Every step in the process, by all lines of defence, from operating
Interface (GUI) that sits on top every activity performed and all controls such as reconciliations (first
of other front-end and back-end sources of data have a digital audit line) to testing controls either as a
applications. trail. By carefully planning control compliance function (second line) or
processes, a company can embed independently as Internal Audit
thresholds and guidelines into the (third line).

7
https://usblogs.pwc.com/emerging-technology/briefing-rpa/

RPA enabled processing


Current processing RPA enabled processing
Fallouts

Fallouts
Feedback

Automated processing
(RPA)

Straight through pass Straight through pass

High total cost of ownership due to high resource requirement Cost Potential reduction to ~10% of current costs

Typically days and hours Processing time Minutes and seconds

Typically 1-3% error rate and ROI of over 300% Quality Negligible error rate (<0.05%)

Limited scaling and flexability due to resource requirements and Scalability &
Provides scalability of solution
manual dependancies flexibility

Potential for impact to compliance due to manual nature of tasks Compliance High process compliance due to automated nature of processing

Staff focussed on low-value, iterative processing tasks Staff focus Staff focussed on handling value-added and complex tasks

Source: https://www.pwc.com/ca/en/industries/financial-services/insurance-speak-blog/rise-of-the-robots.html

Risks
Due to its relative ease of use, appropriately is important; erroneous will prevent the risk of automating a
controlling access to RPA software setup can quickly affect millions of poorly designed process.
and IT change management is key. transactions.
Many business users may treat it Finally, as RPA may be applied to a
as an End User Computing (EUC) These risks can all be managed subset of an end to end process, it is
element, which inherently may not within the usual IT controls if also important to evaluate the risks
have strong Software Development followed in a robust manner. Looking that may arise both downstream and
Life Cycle (SDLC) and IT general at what processes to automate upstream of the RPA application.
controls in place. Furthermore, goes beyond IT and organisations
should fundamentally consider the This may be overlooked when
as RPA can quickly process large organisations focus too much on the
volumes of transactions, ensuring it design of the underlying process
before applying the automation; this automated tasks in isolation.
has been set up and programmed
15 Re-inventing Internal Controls in the Digital Age
Key Technologies and Associated Risks

Artificial Machine
Intelligence Learning

Control Analytics and Artificial Intelligence


Deep
Learning
Figure 4: Types of Artificial Intelligence

Artificial Intelligence Machine Learning Deep Learning


A computer programme that does Ability to learn without being explicity Algorithms that extract complex
something smart; replicating human programmed representations in layers, emulating
logic and behaviour the human brain’s ability to observe,
analyse, learn and make decisions.

Supervised Learning: Technique for building predictive models from known input and labelled response data

Unsupervised Learning: Technique used to draw inferences from datasets consisting of input data without
labelled responses.

We typically distinguish three types of Organisations are using AI systems However, detection only happens
data analytics (in order of increasing to perform cognitive functions after the transaction has occurred.
complexity): (based on perception, reasoning, Contemporary methods based
learning and problem solving) and to on predictive analytics are able to
• Descriptive analytics summarises assist and augment human decision- generate alerts and block suspicious
and visualises what happened. making. In recent years, most of transactions in real time. Machine
• Predictive analytics anticipates the advances in AI have come learning algorithms have taken on a
what will happen. from the field of machine learning, more preventive and proactive role
in particular deep learning and in helping credit card institutions to
• Prescriptive analytics provides reinforcement learning. detect unseen/unknown types of
recommendations on fraud at early stages by analysing
what to do. The hospitality sector is one wider sets of data sources.
industry that uses AI and data
Many organisations are combining analytics extensively. Hotel chains
Risks
data analytics with automation to help operate globally and deal with
monitor their business. With the data millions of customer records and One key risk is the black box nature
of transactions captured becoming transactions. To protect customer of AI. Will an organisation be able to
the norm through Enterprise Resource data, such organisations are looking trust a computer to operate controls
Planning systems, real-time or to data analytics technologies to when it is not immediately visible
periodic monitoring can be used as continuously scan their systems, to or explainable how the machine
preventive and detective controls ensure they minimise threats and reaches its decisions? Technical
to avert risks. Richer sources of keep the systems up to date. approaches to produce transparency
data and Big Data technologies and to explain AI can be used to
are allowing more sophisticated Another risk in this sector is in the
“open up the black box”.
techniques, moving from analysing food & beverage operations, which
past performance towards predicting are particularly susceptible to frauds.
“You cannot take away the human
future risks. Continuous monitoring using data verifiability quality; only a human
AI systems enable predictive analytics allows patterns such can give the assurance.
methods for analytics, and aim as application of discounts, void
to derive insights from data and transactions and splitting of cheques
James Lee, Director of Finance
propose the best actions to take in to be identified and investigated
Sofitel
order to achieve a given goal. They early and proactively.
can learn to adapt their behaviour The banking sector is also a target
through analysing the effect on the for fraud. Credit card providers have
environment based on long been using analytics to detect
previous actions. suspicious activities, e.g. large
values of overseas transactions.
16 Re-inventing Internal Controls in the Digital Age
Key Technologies and Associated Risks

Predictive maintenance in the airline industry

Companies with large assets (e.g. trains or lifts) that need maintenance have traditionally relied on scheduled
maintenance activities to control risks of mis-functioning or malfunctioning. Modern techniques use device
sensors to collect continuous feeds of data relating to the assets and its environment.

Aviation companies, such as Singapore Airlines, employ predictive analytics to enhance their maintenance
controls, generating cost savings from preventing flight delays. American conglomerate, Honeywell, is working
with Singapore Airlines to deploy Internet of Things (IoT) devices which monitor a variety of components (e.g.
wheels and brakes) and systems (e.g. air-conditioning and pressurisation). Machine learning can help to identify
components that are likely to fail, alert maintenance personnel and prevent delays from happening.

“The airlines will not only receive better and more predictive maintenance services that will reduce mechanical
delays and cancellations, the use of connectivity and analytics will make flying more efficient and cost effective.”
- Brian Davis, Vice-President, Airlines, Asia Pacific & Aerospace Leader, Honeywell International

Source: https://www.straitstimes.com/business/companies-markets/honeywell-singapore-airlines-group-seal-3-long-term-deals-to-boost

Banks’ second line of defence leverages AI

United Overseas Bank (UOB) applies analytics in their compliance function to enhance its Anti-Money
Laundering (AML) surveillance.

The use of advanced data analytics within UOB’s AML framework has enabled the bank to identify risks that
may arise from triggers such as new sanctions faster and more accurately.

The bank is also using advanced analytics such as statistical programming languages and visual analytics
to determine targeted risk areas to better prioritise business reviews on potential high risk clients or
transactions. Transactions of concern that are identified from these reviews are fed back into the AI-driven
data analytics solutions to improve the way in which it identifies risks.

UOB plans to deepen the way in which it is using AI in compliance, such as exploring deep learning to
provide contextual analysis on news articles. These automated and intelligent searches can then feed into
the risk profiles of customers to enhance the Know Your Customer (KYC) process.

Source: United Overseas Bank

17 Re-inventing Internal Controls in the Digital Age


Key Technologies and Associated Risks

Blockchain
How it works

A verified Benefits Unknown


transaction
can involve Increased Complex
Someone transparency
The requested Validation cryptocurrency, technology
requests a
transaction transaction is The network of nodes contracts, records,
broadcast to a P2P or other information Accurate Regulatory
validates the transaction
network consisting tracking implications
and the user’s status using
of computers known known algorithms Once verified,
as nodes the transaction Permanent Implementation
is combined with ledger challenges
other transactions
to create a new
block of data for Cost Competing
The transaction The new block is then added to the existing the ledger reduction platforms
is complete blockchain, in a way that is permanent
and unalterable

Blockchain is a decentralised The consensus mechanism can Although many prototypes have
ledger of all transactions across be adapted to the level of trust been built in the last ten years,
a peer-to-peer (P2P) network. It between participants. Banks, blockchain is still a few years away
allows participants to transact logistics, insurance and health care from widespread application at
with each other securely and firms have all built prototypes of scale. The technology struggles with
transparently without the need for private blockchains. inefficiencies, high energy costs for
a central authority. Blockchains mining, trust concerns and lack of
can be categorised based on the It is a common misinterpretation standardisation. Recent declines
permission model. to assume blockchain networks in investments and cryptocurrency
are “trustless” environments. prices have led to a certain (some
If anyone can read from and write While there is no trusted third might say well overdue) shake-up
to a blockchain, it is permissionless party certifying transactions and consolidation of the sector.
(public). If only particular users in permissionless blockchain
have reading and writing rights, networks, there is still a great deal However, as of early 2019 many
the blockchain is permissioned of trust needed to work within promising projects are moving
(private). Permissionless a blockchain network. One of ahead and interesting products are
blockchains have no central the biggest barriers to corporate being built for supply chain, trade
authority and everybody can blockchain adoption is the lack of finance, insurance, health care,
participate. There are economic trust in the technology, especially land registries, KYC, self-sovereign
incentives (typically earning around reliability, speed, security, identity and data sharing.
some type of cryptocurrency) scalability, interoperability and
to participate in the consensus regulatory oversight. If transactions are on blockchain,
mechanisms that secure the certain control activities (either within
network. In a permissionless From a regulatory compliance a company or in the entire ecosystem
blockchain, the ledger and full or audit perspective, blockchain of participants) will become easier.
transaction history are public. technology holds great promise. VeChain is a distributed business
Bitcoin, Litecoin, Ethereum, Rather than having to trust a ecosystem platform for logistics,
DASH, Ripple and Hyperledger central authority (e.g. government supply chain, product lifecycle and
are examples of popular public or bank), counterparties can data management. Using blockchain
blockchains. transact with each other directly technology allows VeChain to provide
via a decentralised ledger. Once transparency in supply chain and
Permissioned blockchains use a transaction is validated by in turn protects client brands and
the same distributed architecture all nodes through a consensus enables verification and traceability
as permissionless blockchains, mechanism and added to the of products.
but only selected participants are ledger, it cannot be altered without
allowed to record and/or read compromising the entire chain –
transactions on the ledger. it is permanent.
18 Re-inventing Internal Controls in the Digital Age
Key Technologies and Associated Risks

This addresses risks around These contracts, just like traditional No matter how secure the
product verifiability and integrity, business rules, are subject to errors blockchain technology is,
country of origin and transaction in coding and in interpreting organisations will have to carefully
lifecycle. It establishes trust in intended outcomes. consider who will have access to
industries such as food & beverage the data and encryption keys.
supply. Vintage wine, for instance, Furthermore, as with any
is a valuable asset and needs to be automated system, most failures
protected from tampering, diluting will occur at the hand-offs.
and counterfeit.

Risks
While blockchain technology in
itself is highly secure and reliable,
it does not provide account/
wallet security. Credential and
key management is crucial to
protecting digital assets stored on
the blockchain.

Smart contracts bridge the gap


between the physical world and the
digital world by encoding complex
business, financial and legal
arrangements onto the blockchain.

Wine traceability through blockchain

DNV GL is a company that has created a blockchain solution using VeChain. Wine bottles have a QR-Code,
allowing consumers to see the full history of the product and its journey from grape to bottle.

“My Story illuminates products and their supply chain for the benefit of consumers, who will have instant and
in-depth access to key product characteristics such as quality, authenticity, origin, ingredients, water and
energy consumption and more, all verified by DNV GL along the entire transformation process,”
says Luca Crisciotti, CEO of DNV GL – Business Assurance.

Crisciotti continued to explain that using My Story would allow stakeholders within the supply chain to gain
trust across various aspects, such as environmental and ethical considerations.

This is an example of how blockchain is providing trust at a consumer level. The story of the grape’s journey
has the added effect of creating uniqueness in the participating wine producers (at least initially) which may
have the ability to command premium prices in the market, generating impact throughout the value chain. If
successful, such technology could be valuable for industries subject to counterfeiting, with high applicability
to e-commerce marketplaces.

Source: https://www.dnvgl.com/news/dnv-gl-launches-my-story-the-blockchain-based-solution-to-tell-the-product-s-full-story-113549

19 Re-inventing Internal Controls in the Digital Age


Key Technologies and Associated Risks

Auditing a blockchain

Even though blockchain itself is designed to be tamper-resistant, it usually connects to peripheral layers
(e.g. data entry, access management or storage), which are subject to risk. Auditors traditionally inspect readily
available, historic data ledgers or audit trails; blockchain environments, however, are real-time and do not
include historic ledgers that allow for audit.

PwC’s “Blockchain Validation Solution” solves this by integrating a “read-only” node on the corporate
blockchain to monitor and log all transactions as they occur in order to apply appropriate controls and
continuous testing of all transactions. Transactions that meet specific criteria can be flagged for user review and
escalated as needed. Stakeholders can view customised reports via a dashboard.

1
Install a read-only mode
The solution establishes
Customise software a read-only node that is
connected to their blockchain
The software is set up to reflect
infrastructure, enabling it to
Assess risks and controls the company’s risk thresholds
“see” transactions as
and meet the needs of its different
Following the framework, they occur.
users. E.g. does the organisation
which covers six domains, the want to monitor all transactions
company considers questions or only a targeted sample? What
like how permission is granted information do internal audit teams
to the network and what need and which is appropriate for
type of encryption is used. business leaders? 6
The answers determine the
risk and control objectives
and testing parameters the
company requires to validate its
blockchain transactions.

Refine approach
4 5 As risk and control objectives
change, the company can
adjust the software settings to
meet its new requirements for
blockchain validation.

Log and test transactions Provide monitoring and


reporting
As transactions occur, the
software automatically logs Users view reports via customised
them and applies controls and dashboards, where they view validated
testing criteria. Transactions that transactions and exceptions. Flagged
meet certain criteria are flagged transactions can be documented or
as exceptions for user review. escalated, as needed.

20 Re-inventing Internal Controls in the Digital Age


Key Technologies and Associated Risks

Other key emerging technologies


There are many emerging technologies that can shape the future business
landscape. In addition to those discussed previously, let us share a few more.

Other emerging Application and benefits


technologies
Augmented Reality (AR) and Visualising data, such as building plans, on mobile devices or helmets helps construction
Virtual Reality (VR): AR bridges teams in the field understand how various systems and components fit together during
the digital and physical worlds, construction. AR can place a model of the structure directly into the view of a site in
providing a digital overlay to the real time, allowing workers to see the exact location, assembly instructions, materials
real world. VR is a fully computer information, warnings and other information associated with a project.
rendered three-dimensional
immersive experience. This makes the entire construction process easier and faster. By combining data
gathered through drones with AR capabilities, workers can get access to the most
current information about where and when to install the next piece of a structure or repair
a broken part. While AR can help construction teams, VR helps designers and architects
visualise a structure to see how everything will look. They can make instant changes
smoothly and see the effects immediately without risking delays or serious errors.

Internet of Things (IoT) describes More connected devices means more data to analyse, and this has provided
the network of physical objects commercial benefits in a range of industries. Examples include predictive maintenance
embedded with sensors, in the transport industry (see page 17) or precision farming techniques in agribusiness,
software, connectivity and where data on soil and weather forecast can help distribute water for irrigation precisely.
computing capability to collect,
exchange and act on data. However, there are risks associated with connected devices. Most devices are simple
Placing sensors on “Things” can sensors without strong security mechanisms in place. Hacking of connected devices
help to collect data about them is becoming reality. Vendor support may be lacking or unstable, especially if vendors
and their environment. operate in a niche area.

However, there are risks associated with connected devices. Most devices are simple
sensors, without strong security mechanisms in place. Hacking of connected devices
is becoming reality. Vendor support may be lacking or unstable, especially if vendors
operate in a niche area.

3D printing allows three- In the manufacturing industry, companies can better manage inventory by printing what
dimensional objects based on is needed “on demand”. In the medical domain, printing human parts can assist to
digital models by layering or provide prosthetic limbs, or creating personalised replicas of organs that can be used to
“printing” successive layers of simulate interactions with them for medical procedures. This can help mitigate risks of
materials. ineffective procedures within real life surgery.

Technology and its impact is


profound and presents a plethora “There will be 20.4 billion connected things by
of possibilities. All technologies
discussed will come with risks related 2020. Total spending on endpoints and services
to the data proliferation, hacking and will reach almost $3 trillion in 2020.”
responsible use.

Organisations must consider these Source: Gartner (January 2017)


risks as they adopt technologies.
Some risks can even be mitigated by
using technology itself.
21 Re-inventing Internal Controls in the Digital Age
Key Risks

Cyber and Information


Security
Earlier, we shared some of the Cyber and information security
risks related to each emerging is recognised as a board level
technology. An overarching risk, and accountability is on the
concern is cyber and information business to protect it. However,
security. Data that is created the technologies that can expose
through digitisation is invariably organisations to the risks can also
at risk of being hacked, accessed be used to address these risks.
by criminals, lost or exposed to
unauthorised users, both internally
and externally.

AI and automation to strengthen cyber controls

Security breaches can result in significant monetary loss and even greater reputational damage. Many
organisations allow files and folders to be shared across their organisation. As a result, users have far more
access to data than needed to perform their jobs. Embedding strong controls over sensitive data is critical to
prevent data theft by outside attackers or even malicious insiders. One health insurance provider has used
Varonis, a data security platform, to pass a time-sensitive audit by remediating over 850,000 exposed folders
using automation. In a highly regulated environment with sensitive patient data, technology solutions such as
Varonis DatAlert can be used to surface alerts to suspicious activity on file servers. The platform uses machine
learning to continuously monitor and analyse behavioural patterns to files and data, and define when a user
is acting suspiciously, including comparing their activities against their peers, their normal working hours and
their individual typical behaviours.

Figure 5: Varonis DatAlert uses machine learning to spot unusual activity to sensitive files to address cyber and
information security risks

Source: Varonis (https://www.varonis.com/products/datalert/)

22 Re-inventing Internal Controls in the Digital Age


Key Risks

Responsible AI
Before humans can fully embrace Fairness: In the context of AI,

76% AI, they need to know whether it


can be trusted. In recent years,
concerns have grown over
fairness typically refers to the
minimisation of bias. Bias is a
prejudice for or against something
of CEOs are most concerned how AI could impact privacy, or somebody that may result in
with the potential for bias and cybersecurity, employment, unfair decisions. Since AI systems
lack of transparency when it inequality and the environment. are designed by humans, it is
comes to AI adoption Conventional technologies (e.g., possible that humans inject
autopilots or industrial robots) run their biases into them, e.g. via
Source: PwC’s CEO Pulse Survey 2017
on software that is deterministic the collection of training data.
and therefore predictable. Companies should check datasets
and models for bias and put in
Every technology needs to be Trust is built through testing, place suitable bias mitigation
used responsibly and ethically. auditing, documentation and methods.
AI is no exception. AI systems other means. AI systems, on the
augment human decision making other hand, are intrinsically non- This will reduce the risk of AI-
and continuously learn from their deterministic. As the AI agent assisted decisions putting certain
interactions with humans and interacts with the environment and individuals or groups of individuals
the environment. In the future, learns, its behaviour evolves. How at a disadvantage.
AI systems will likely act more then can AI be trusted?
autonomously, making complex
decisions that previously required
human judgement.

Bias in AI policing systems

Several cases of apparent biases observed in real world AI systems have been reported. New Scientista
reported on the Correctional Offender Management Profiling for Alternative Sanctions (COMPAS) software,
which is a decision support tool widely used in the US that leverages AI based algorithms to predict the
likelihood of a criminal reoffending. In May 2016, the US news organisation, ProPublica, reported that
COMPAS is racially biased. According to the analysis, the system overestimates the risk of recidivism for
black defendants and underestimates it for white defendants.

In the UK, several police force have been similarly using AI for identifying future offenders. One system
aggregates multiple data feeds as indicators of predicting a re-offender. One particular feature used as data
input is the postal code. This has been criticised as re-enforcing existing biases or prejudices in the policing
and judicial systems. The continuous re-training, or machine learning, from biased data can further enhance
these prejudices.

As reported in Wiredb, Andrew Wooff, criminology lecturer at Edinburgh Napier University, said:

“You could see a situation where you are amplifying existing patterns of offending, if the police are responding
to forecasts of high risk postcode areas.”

Source: ahttps://www.newscientist.com/article/2166207-discriminating-algorithms-5-times-ai-showed-prejudice/
b
https://www.wired.co.uk/article/police-ai-uk-durham-hart-checkpoint-algorithm-edit

23 Re-inventing Internal Controls in the Digital Age


Key Risks

Explainability: Consumers want Answering these questions focuses security of critical systems.
to understand how AI models on improvements in the outputs
arrive at decisions, especially if rather than on AI logic. Security and robustness of AI can
those decisions impact their own be improved through rigorous
lives. However, implementing Safety and Security: Fair and model validation, performance
explainability is non-trivial. There explainable AI systems might still benchmarking and continuous
is a natural trade-off between be unsafe to use. Safe AI models monitoring of decision making.
explainability and accuracy of incorporate societal norms, policies
and regulations that correspond Accountability and controls:
AI models. The development of Companies need to establish
interpretable algorithms that are to established safe behaviours.
Adversarial attacks (e.g. malicious enterprise-wide accountability for
able to explain their rationale, AI applications and consistency
strengths, weaknesses and likely actors influencing the behaviour
of an AI model through altered of operations. This encompasses
future behaviour is currently a top both internal accountability
priority of both technology firms input datasets) can undermine the
(e.g. model governance and
and research institutes. approval authorities) and external
Finance professionals, accountability (towards individuals
Figure 6: What it means to look and groups who request
accountants and particularly inside AI’s black box
auditors need to be able to information on the inputs
understand and explain Explainability for AI decision making).
results. Instead of trying Understanding reasoning Controls over AI
to explain AI, others behind each decision
should cover input
have taken approaches data, algorithms,
to focus on results processes and
Transparency Provability
rather than the “how.” reporting frameworks.
Banks have adopted
Understanding of AI model Mathematical certainty Continuous testing
decision making behind decisions
AML systems that and monitoring of
have traditionally controls requires
flagged suspicious interdisciplinary teams
transactions through and skill sets of audit
rules, such as sources specialists, business
of transactions, values process managers and
etc. While testing modern technical staff. Ultimately,
AI systems, one method has AI-driven decision making
been to compare the outputs will have to be auditable and
of backtesting and considering traceable, particularly in critical
the accuracy through questions contexts or situations.
such as: The entire process that leads to
• Does the AI system produce AI-driven decisions needs to be
the same valid alerts that the documented. This can already be
rule based system did? achieved today. Over the next few
years, internal control departments
• Does the AI system generate and external audit firms will
any additional valid alerts that develop more sophisticated audit
the rule based system did not? methodologies and mechanisms
for AI systems.
• Does the AI system omit false
alerts that the rule based
system included?

24 Re-inventing Internal Controls in the Digital Age


Stakeholder Impact

Stakeholder Impact They also have the necessary Furthermore, does the IA function
mind-set of embedding controls have the right skillset to audit
We have explored the impact of key to help meet organisational emerging technologies such as AI
technologies on controls as well as objectives. and blockchain to address these
some of the key risks. Stakeholders new risks?
will be affected in different ways One key challenge lies in the
within an organisation. willingness and appetite for Secondly, how can the IA
change. Accountants often have function become a proponent
Finance Functions - The finance a tendency to want to see things of technology? Besides being
function of the future will use in hardcopy, even where there consistent with how the enterprise
technology to enhance quality is automation in place. Trusting is undergoing transformation, it
of processes and controls. systems and AI will need a different must also disrupt its traditional
Automation of tasks will allow the mind-set. This might come more ways of testing controls and
finance team to focus on value naturally to the younger and providing assurance. A focus on
adding activities to partner the technology-savvy generation that is technology in isolation will not be
business. The CFO and finance about to enter the workforce. successful. Leading IA functions
function plays a key role in are using technology to lead a
embedding the control culture Internal Audit (IA) - Internal Audit revolution in the way they approach
and environment throughout functions must see emerging the entire audit life-cycle.
the organisation. Other than the technology from two perspectives.
financial and reporting controls, Firstly, as the business adopts Having the appropriate people
finance functions have the ability technology in their controls delivery model and embedding
to work across the organisation organisation-wide, it has to the right processes within the
in value creation and enhancing consider new or heightened risks audit programme will accelerate
performance. that this may present and how they the transformation agenda; which
can provide assurance against impacts and benefits the
these risks. entire organisation.

Figure 7: Internal Audit functions need to reimagine their entire operating model to accelerate their
technology transformation

‘Arrested’ evolution How do we ignite a revolution?

Function Objective driven Team supported Audit integrated Organisation-wide impact

Tech Tech
Tech Tech

Tech Process People Process People Process People Process

Audit programme Audit programme

Function focus Transformation focus

Internal Audit functions need to reimagine their entire operating model to accelerate their technology transformation

Source: PwC: Revolution, not evolution - Breaking through internal audit analytics’ arrested development (2018)

25 Re-inventing Internal Controls in the Digital Age


Stakeholder Impact

IA functions that are relatively a truly digital and analytics driven smart contracts, auditors can focus
advanced in their use of data approach not achievable within the on these IT domains to obtain
analytics have managed to build confines of cost limitations. assurance over financial reporting
continuous auditing systems. objectives. However, approaches
These are enabled if data analytics External Auditors - External may need to be specialised; two or
tests can be built into scripts. auditors can rely on the controls three decades ago audits required
When a process is established that management has in place, SAP specialists, today they may
to automate the extraction and in addition to doing their own need blockchain expertise.
transformation of the data from testing, to gain assurance over
source systems and loaded into financial balances. Auditors often In addition to knowing the
the scripts, the audit tests can rely on IT systems and controls, overarching IT control environment,
easily be re-run on a regular and a company’s use of new they must also ensure that they
or continuous basis. Some IA technologies does not change are adequately skilled to test
functions have successfully handed the fundamental risks over an IT the design and operation of
over these processes to the first control environment. However, the automated elements of the
or second lines of defence. If such risks have increased due to more controls. This will require in-depth
systems reside with the business, pervasive use of technologies and knowledge of the technologies
they can be considered continuous the ways in which they are used. to provide suitable levels of
monitoring controls whose design assurance.
For auditors, the key IT control
can benefit from an IA functions’ domains are around development, Even where companies have not
control mind-set. security, change management and fully adopted modern technologies,
Audit Committees - Audit operations. In companies ranging independent audits can be
Committees have a requirement to from those with SAP automated performed using the technology
oversee and assist management in controls in place, to those where that the auditor brings. Audit tools
their internal control environment. they leverage blockchain for their are becoming sophisticated, e.g.
By seeing how organisations using drones and AI. These provide
change and influence their control benefits in the level of assurance
culture and behaviours, they can that can be attained, leading to
play a positive part in instituting a higher quality audit and greater
change for organisations that are efficiencies in execution.
slower to move. However, they are
another set of key stakeholders
who need to have the right
knowledge and mind-set to be
successful. Audit Committees are
generally open to innovation and
change, but being removed from
the business may lead them to
underestimate the real feasibility
and challenges faced.

One Singapore based organisation


experienced challenges to meet
their Audit Committee’s directive
for an analytics driven approach
to control monitoring. It was
challenging to repurpose legacy
systems that were built decades
ago on manual processes and
system records with limited data
analytics capabilities. This made

26 Re-inventing Internal Controls in the Digital Age


Stakeholder Impact

External auditors using technology for their audits

PwC is using technology to transform the way it conducts audits globally. Auditors embed data analytics
systems powered by machine learning to identify anomalies in data that are used as a basis for manual
investigation. Being able to interrogate 100% of an organisation’s journal or transaction data allows auditors
to focus on transactions that exhibit unusual patterns of behaviour, versus traditional methods which relied
on random sample testing. The AI element means that the algorithms identify the unusual patterns rather than
relying on humans to analyse and identify suspicious activities.

PwC is using drones to perform stock counts to attest to inventory balances reported in a company’s financial
statements. In one example, a drone captured over 300 images of a coal reserve at one of the UK’s last
remaining coal-fired power stations Aberthaw in South Wales, owned by RWE, one of Europe’s largest energy
firms. The images from the drone were used to create a ‘digital twin’ of the coal pile in order to measure its
volume. The value of the coal was then calculated with more than 99% accuracy based on that
volume measurement.

Figure 8: “The ‘digital twin’ created of one of the coal heaps which shows the points measured by the drone”

Regulators - Regulators are also Guidelines, 2013). The MAS has As regulators often collect filings
starting to embrace digitisation. also made regulatory sandboxes and receive data from multiple
Many are not strictly defining available, allowing organisations companies within their respective
what can or cannot be done by to experiment and innovate, industries, being able to attest
organisations and instead are while containing risks through the to data quality and analyse large
encouraging the fostering of inclusion of specific safeguards amounts of data has traditionally
innovation in a safe way. The to contain legal and regulatory been a challenge. Regulators
Monetary Authority of Singapore impacts. are using Natural Language
(MAS), for instance, has issued Processing and machine learning
guidance on how organisations Similar to IA functions, regulators to be able to efficiently sift through
can use technology safely in are also embracing technology for large volumes of data, check for
the Financial Services industry supervisory purposes. accuracy and perform analytics.
(Technology Risk Management

27 Re-inventing Internal Controls in the Digital Age


Challenges to Organisation
Transformation

“Technology alone will not bring the desired control in the organisation.
Ultimately, if you want any technology to have impact on the organisation,
it depends upon how well it has been embraced by the company’s
management. The human element of culture is going to play a larger role in a
future technology-driven organisation.

Rajeev Gupta, Regional Financial Controller


Avaya Singapore Pte Ltd

Organisational Culture - Emerging people develop and flourish. These people will play pivotal roles
technologies have fundamentally Despite all the talk about in how organisations develop,
changed the way man and machine automation and AI, companies compete, create and innovate.
work together, creating new that want to succeed need to In a future organisation where
roles, bringing new conflicts and focus on harnessing the talents technology and humans coexist
redefining trust. of the workers who would not be and collaborate, human skills such
replaced by automation as creativity, empathy and ethics
Companies therefore need to anytime soon. will be more important than ever.
focus on the human experience,
consider employee and customer
interactions and invest in creating
a culture of technology innovation
and adoption. Creating better
human experiences is critical to
raising the “Digital Quotient”. Yet,
customers, employees and culture
continue to get less attention than
strategy and technology, slowing
down the assimilation of
emerging technologies.

Lack of digital skills is typically


named as one of the most
important barriers to getting results
from investments in emerging
technologies. However, capabilities
for the workforce of the future go
beyond just teaching hard skills;
organisations also need to create
an environment that will help

28 Re-inventing Internal Controls in the Digital Age


Challenges to Organisation Transformation

“At UOB, we harness technology to enhance our customer experience and


to drive our operational performance. For example, the use of AI in regulatory
technology enables us to augment our ability to identify more accurately AML
risks. Our targeted approach of identifying where technology can help us to be
more effective and efficient enables us to achieve real-life benefits to internal
and external stakeholders.

Eric Ang, Senior Vice President, Group Compliance


United Overseas Bank Limited

Systems and Data - Organisations Others are monetising their • Data can be enriched. Existing
often realise that a barrier to data own data. Marketplaces are corporate data can be used
analytics lies with the data itself, being developed to allow for “feature engineering.” This
both in its availability and its organisations to buy and sell creates new fields that can be
quality. Organisations that are not corporate data assets. used for analytics. E.g. a new
ready cited the absence of data feature could be “time taken
rich systems within their business • Manual records can be to pay an invoice,” which is
processes as a key challenge. Some digitised. AI techniques derived from existing data of
believe that an Enterprise Resource include Optical Character “invoice pay date” and “invoice
Planning (ERP) system will make Recognition (OCR) for digitising due date.” Using this newly
them ready. However, with a bit of manual records and Natural created field, organisations can
creative thinking, there are methods Language Processing (NLP) for improve their cash flow through
to create and enrich data faster than understanding the context of better management of early
implementing an ERP: language within a document. and late payments or receipts.
Through this, certain key
• Data can be acquired from fields can be captured from
external sources. Some data unstructured text documents.
companies are providing
analytics outputs as a service.

Data mining and relationship checking to detect procurement risks

Singapore-based company Handshakes provides data to companies to help them with their relationship
checks valuable for KYC risks, credit checks, bid rigging etc. They use data mining techniques on
unstructured data, including company registries, news repositories and corporate emails to generate
interactive network maps of people and entities.

As reported in The Business Times, Handshakes was used to analyse relationships in government bidding
processes. It identified four cases where there were relationships between tenderers of the same jobs. Such
relationships included common directors and shareholders, as well as common company secretaries and
registered addresses.

Source: https://www.businesstimes.com.sg/government-economy/linked-firms-vying-for-same-public-contracts

29 Re-inventing Internal Controls in the Digital Age


Challenges to Organisation Transformation

Poor data quality can be a • Maintain good quality data right down to measuring the
hindrance to analytics when going forward quality of critical data fields
companies realise that the output Data governance procedures on a continuous basis.
of the analytics does not make are put in place to treat data as
sense because the inputs were an asset and enable analytics To oversee the governance
incorrect. Companies must address going forward. process, companies are
this from two angles: increasingly setting up Chief
Organisations must approach Data Officer (CDO) functions as
• Cleanse the historic data data governance holistically, they realise this is a complex
A data cleaning exercise on looking at who is accountable task.
past transaction data will allow and who owns the data,
it to be used for meaningful
analytics.

This is both for descriptive “The question is who owns the data, and who
(backward-looking) and controls it? We need to define who has oversight
predictive (forward-looking)
analytics.
of the data, how it’s stored and how it’s cleaned
before we can rely on it for our control activities.
Past data can be used as
training data to train machine
algorithms to be able to predict Andrew Watson, Regional Financial Controller, ASEAN ANZ


or forecast into the future.
Association of Chartered Certified Accountants

Tracing data lineage through AI

Effective and strategic Data Governance can empower business users to optimise data value through
AI applications. Alex Solutions (“Alex”) is a Data Governance solution that can help organisations find,
understand, manage and use their own disparate data sources. Alex provides out-of-the-box capabilities to
capture end-to-end data lineage, while discovering the locations of sensitive data and personally identifiable
information and understanding usage and access behaviour. Australia’s largest telecommunications provider
used Alex to greatly accelerate its strategic enterprise data management programme that had originally
required large volumes of time consuming manual data asset analysis. Alex automatically identified and
classified key data assets, analysed their relationships and impacts, thereby reducing the effort required to
map data asset lineage, impact analysis and data asset classification by up to 90%.

30 Re-inventing Internal Controls in the Digital Age


Conclusion

85%
of CEOs agree that AI will significantly change the way they do business in the next five years.

Source: PwC’s 22nd Global CEO survey 2019

There is no doubt that technology Established risks around Besides addressing risks,
can enhance the quality, rigour system development, change organisations must consider how
and efficiency of internal controls. management, access and to use technology responsibly and
Organisations must consider how security still applies, but some ethically, particularly in a future
to embed technology into the of them are made more critical in which machines will act more
control framework in a safe way, by data proliferation and privacy autonomously.
while taking into consideration the considerations.
risks that arise with the use They will face many challenges
of technology. along the way, with organisational
culture being a key one. Tone from
the top will be critical to guide this
journey successfully.

“There is no turning back on the use of technology and those who do not invest
will lose out. People and companies who use technology will be smarter than
those who do not, and we are looking at the next internet revolution driven by
AI, blockchain and data analytics. We are looking at an epochal development
in not just management controls, but also how businesses are run. It is only
limited by how fast humans can act.

Lim Soon Hock, Managing Director, PLAN B ICAG, Adjunct Professor


National University of Singapore

31 Re-inventing Internal Controls in the Digital Age


For more information, please visit For more information, please visit For more information, please visit
www.pwc.com/sg https://www.accaglobal.com/sg https://www.insead.edu

Creating value for our clients, people ACCA (the Association of Chartered The INSEAD Emerging Markets
and communities is at the heart of Certified Accountants) is the global Institute (EMI) is a leading think tank
PwC. With a common purpose to build body for professional accountants. for the creation and dissemination
trust in society and solve important We aim to offer business-relevant, of credible and timely information
problems, we are a network of firms first-choice qualifications to people on issues related to business
in 158 countries with more than of application, ability and ambition management, economic development
250,000 people who are committed around the world who seek a rewarding and social progress in the emerging
to delivering quality in assurance, career in accountancy, finance and economies.
advisory and tax services. Our highly management.
qualified, experienced professionals This includes the development of
help organisations solve their business Founded in 1904, ACCA has cutting edge pedagogical materials,
issues as well as identify and maximise consistently held unique core values: research publications and data sets.
the opportunities they seek. Our opportunity, diversity, innovation,
integrity and accountability. EMI creates knowledge through
industry specialisation allows us to
research and disseminates it for
co-create solutions with our clients for
We believe that accountants bring practical application by the individuals,
their sector of interest.
value to economies in all stages of organizations and governments who
PwC Singapore has been recognised development. We aim to develop seek to leverage the opportunities
as Best in Audit Services (CFO capacity in the profession and offered by these dynamic economies.
Innovation Awards 2018, 2017, 2015); encourage the adoption of consistent Based at the Asia campus in
People & Talent Award (Biennial global standards. Our values are Singapore, and set up in partnership
Singapore Accountancy Awards aligned to the needs of employers with the Economic Development Board
2018); Graduate Employer of the Year in all sectors and we ensure that, of Singapore, the Emerging Markets
(Singapore’s 100 Leading Graduate through our qualifications, we prepare Institute reflects the changing focus
Employers Award 2011-2017); Best accountants for business. We work of global growth and emphasises
Practice Award (Biennial Singapore to open up the profession to people INSEAD’s commitment to the region.
Accountancy Awards 2016, 2015); of all backgrounds and remove
and Best Tax Advisory (HFM Awards artificial barriers to entry, ensuring that INSEAD’s three campuses in
Asia 2015). our qualifications and their delivery Fontainebleau, Singapore and
meet the diverse needs of trainee Abu Dhabi provide the unique
PwC refers to the PwC network and/or professionals and their employers. advantage ofgeographical proximity
one or more of its member firms, each to emerging countries across the globe.
of which is a separate legal entity. We support our 208,000 members and
503,000 students in 179 countries,
helping them to develop successful
careers in accounting and business,
with the skills required by employers.
We work through a network of 104
offices and centres and more than
7,300 Approved Employers worldwide,
who provide high standards of
employee learning and development.

Through our public interest remit,


we promote appropriate regulation
of accounting and conduct relevant
research to ensure accountancy
continues to grow in reputation and
influence.

32 Re-inventing Internal Controls in the Digital Age


Contacts

Mark Jansen Joseph Alfred


PwC | Data & Analytics Leader ACCA | Head of Policy and Technical
mark.jansen@sg.pwc.com joseph.alfred@accaglobal.com

Andre Tan Pauline Javani


PwC | Data & Analytics Director ACCA | Partnership Manager - Employers
andre.tan@sg.pwc.com pauline.javani@accaglobal.com

Andreas Deppeler Vinika Devasar Rao


PwC | Data & Analytics Director INSEAD | Executive Director,
andreas.deppeler@sg.pwc.com Emerging Markets Institute
vinika.rao@insead.edu

33 Re-inventing Internal Controls in the Digital Age


© 2019 ACCA, INSEAD EMI and PricewaterhouseCoopers Risk Services Pte. Ltd. All rights reserved. This
content is for general information purposes only, and should not be used as a substitute for consultation
with professional advisors.

Vous aimerez peut-être aussi