Book description
The complete guide to internal auditing for the modern worldBrink's Modern Internal Auditing: A Common Body of Knowledge, Eighth Edition covers the fundamental information that you need to make your role as internal auditor effective, efficient, and accurate. Originally written by one of the founders of internal auditing, Vic Brink and now fully updated and revised by internal controls and IT specialist, Robert Moeller, this new edition reflects the latest industry changes and legal revisions. This comprehensive resource has long been—and will continue to be—a critical reference for both new and seasoned internal auditors alike. Through the information provided in this inclusive text, you explore how to maximize your impact on your company by creating higher standards of professional conduct and greater protection against inefficiency, misconduct, illegal activity, and fraud.
A key feature of this book is a detailed description of an internal audit Common Body of Knowledge (CBOK), key governance; risk and compliance topics that all internal auditors need to know and understand. There are informative discussions on how to plan and perform internal audits including the information technology (IT) security and control issues that impact all enterprises today. Modern internal auditing is presented as a standard-setting branch of business that elevates professional conduct and protects entities against fraud, misconduct, illegal activity, inefficiency, and other issues that could detract from success.
- Contribute to your company's productivity and responsible resource allocation through targeted auditing practices
- Ensure that internal control procedures are in place, are working, and are leveraged as needed to support your company's performance
- Access fully-updated information regarding the latest changes in the internal audit industry
- Rely upon a trusted reference for insight into key topics regarding the internal audit field
Brink's Modern Internal Auditing: A Common Body of Knowledge, Eighth Editionpresents the comprehensive collection of information that internal auditors rely on to remain effective in their role.
Table of contents
- Preface
- Part 1: Foundations of Modern Internal Auditing
-
Part 2: Importance of Internal Controls
-
Chapter 3: The COSO Internal Control Framework
- 3.1 Understanding Internal Controls
- 3.2 Revised COSO Framework Business and Operating Environment Changes
- 3.3 The Revised COSO Internal Control Framework
- 3.4 COSO Internal Control Principles
- 3.5 COSO Internal Control Components: The Control Environment
- 3.6 COSO Internal Control Components: Risk Assessment
- 3.7 COSO Internal Control Components: Internal Control Activities
- 3.8 COSO Internal Control Components: Information and Communication
- 3.9 COSO Internal Control Components: Monitoring Activities
- 3.10 The COSO Framework’s Other Dimensions
-
Chapter 4: The 17 COSO Internal Control Principles
- 4.1 COSO Internal Control Framework Principles
- 4.2 Control Environment Principle 1: Integrity and Ethical Values
- 4.3 Control Environment Principle 2: Role of the Board of Directors
- 4.4 Control Environment Principle 3: Authority and Responsibility Needs
- 4.5 Control Environment Principle 4: Commitment to a Competent Workforce
- 4.6 Control Environment Principle 5: Holding People Accountable
- 4.7 Risk Assessment Principle 6: Specifying Appropriate Objectives
- 4.8 Risk Assessment Principle 7: Identifying and Analyzing Risks
- 4.9 Risk Assessment Principle 8: Evaluating Fraud Risks
- 4.10 Risk Assessment Principle 9: Identifying Changes Affecting Internal Controls
- 4.11 Control Activities Principle 10: Selecting Control Activities That Mitigate Risks
- 4.12 Control Activities Principle 11: Selecting and Developing Technology Controls
- 4.13 Control Activities Principle 12: Policies and Procedures
- 4.14 Information and Communication Principle 13: Using Relevant, Quality Information
- 4.15 Information and Communication Principle 14: Internal Communications
- 4.16 Information and Communication Principle 15: External Communications
- 4.17 Monitoring Principle 16: Internal Control Evaluations
- 4.18 Monitoring Principle 17: Communicating Internal Control Deficiencies
- Note
- Chapter 5: Sarbanes-Oxley (SOx) and Beyond
-
Chapter 6: COBIT and Other ISACA Guidance
- 6.1 Introduction to COBIT
- 6.2 COBIT Framework
- 6.3 Principle 1: Meeting Stakeholder Needs
- 6.4 Principle 2: Covering the Enterprise End to End
- 6.5 Principle 3: A Single Integrated Framework
- 6.6 Principle 4: Enabling a Holistic Approach
- 6.7 Principle 5: Separating Governance from Management
- 6.8 Using COBIT to Assess Internal Controls
- 6.9 Mapping COBIT to COSO Internal Controls
- Notes
- Chapter 7: Enterprise Risk Management: COSO ERM
-
Chapter 3: The COSO Internal Control Framework
-
Part 3: Planning and Performing Internal Audits
-
Chapter 8: Performing Effective Internal Audits
- 8.1 Initiating and Launching an Internal Audit
- 8.2 Organizing and Planning Internal Audits
- 8.3 Internal Audit Preparatory Activities
- 8.4 Starting the Internal Audit
- 8.5 Developing and Preparing Audit Programs
- 8.6 Performing the Internal Audit
- 8.7 Wrapping Up the Field Engagement Internal Audit
- 8.8 Performing an Individual Internal Audit
- Chapter 9: Standards for the Professional Practice of Internal Auditing
-
Chapter 10: Testing, Assessing, and Evaluating Audit Evidence
- 10.1 Gathering Appropriate Audit Evidence
- 10.2 Audit Assessment and Evaluation Techniques
- 10.3 Internal Audit Judgmental Sampling
- 10.4 Statistical Audit Sampling: An Introduction
- 10.5 Developing a Statistical Sampling Plan
- 10.6 Audit Sampling Approaches
- 10.7 Attributes Sampling Audit Example
- 10.8 Attributes Sampling Advantages and Limitations
- 10.9 Monetary Unit Sampling
- 10.10 Other Audit Sampling Techniques
- 10.11 Making Efficient and Effective Use of Audit Sampling
- Notes
-
Chapter 11: Continuous Auditing and Computer-Assisted Audit Techniques
- 11.1 Implementing Continuous Assurance Auditing
- 11.2 ACL, NetSuite, BusinessObjects, and Other Continuous Assurance Systems
- 11.3 Benefits of CAA
- 11.4 Computer-Assisted Audit Tools and Techniques
- 11.5 Determining the Need for CAATTs
- 11.6 Steps to Building Effective CAATTs
- 11.7 Importance of Using CAATTs for Audit Evidence Gathering
- 11.8 XBRL: The Internet-Based Extensible Marking Language
- Notes
- Chapter 12: Control Self-Assessments and Internal Audit Benchmarking
-
Chapter 13: Areas to Audit: Establishing an Audit Universe and Audit Programs
- 13.1 Defining the Scope and Objectives of the Internal Audit Universe
- 13.2 Assessing Internal Audit Capabilities and Objectives
- 13.3 Audit Universe Time and Resource Limitations
- 13.4 “Selling” an Audit Universe Concept to the Audit Committee and Management
- 13.5 Assembling Audit Programs: Audit Universe Key Components
- 13.6 Audit Universe and Program Maintenance
-
Chapter 8: Performing Effective Internal Audits
-
Part 4: Organizing and Managing Internal Audit Activities
- Chapter 14: Charters and Building the Internal Audit Function
-
Chapter 15: Managing the Internal Audit Universe and Key Competencies
- 15.1 Auditing in the Weeds: Problems with Reviews of Nonmainstream Audit Areas
- 15.2 Importance of an Audit Universe Schedule: What Is Right or Wrong
- 15.3 Importance of Internal Audit Key Competencies
- 15.4 Importance of Internal Audit Risk Management
- 15.5 Internal Auditor Interview Skills
- 15.6 Internal Audit Analytical and Testing Skills Competencies
- 15.7 Internal Auditor Documentation Skills
- 15.8 Recommending Results and Corrective Actions
- 15.9 Internal Auditor Negotiation Skills
- 15.10 An Internal Auditor Commitment to Learning
- 15.11 Importance of Internal Auditor Core Competencies
-
Chapter 16: Planning Audits and Understanding Project Management
- 16.1 The Project Management Process
- 16.2 PMBOK: The Project Management Book of Knowledge
- 16.3 PMBOK Program and Portfolio Management
- 16.4 Planning an Internal Audit
- 16.5 Understanding the Environment: Planning and Launching an Internal Audit
- 16.6 Audit Planning: Documenting and Understanding the Internal Control Environment
- 16.7 Performing Appropriate Internal Audit Procedures and Wrapping Up the Audit
- 16.8 Project Management Best Practices and Internal Audit
- Note
- Chapter 17: Documenting Audit Results through Process Modeling and Workpapers
-
Chapter 18: Reporting Internal Audit Results
- 18.1 The Audit Report Framework
- 18.2 Purposes and Types of Internal Audit Reports
- 18.3 Published Audit Reports
- 18.4 Alternative Audit Report Formats
- 18.5 Internal Audit Reporting Cycle
- 18.6 Internal Audit Communications Problems and Opportunities
- 18.7 Audit Reports and Understanding People in Internal Auditing
-
Part 5: Impact of Information Systems on Internal Auditing
-
Chapter 19: ITIL® Best Practices, the IT Infrastructure, and General Controls
- 19.1 Importance of IT General Controls
- 19.2 Client-Server and Small Systems General IT Controls
- 19.3 Client-Server Computer Systems
- 19.4 Small Systems Operations Internal Controls
- 19.5 Auditing IT General Controls for Small IT Systems
- 19.6 Mainframe Legacy System Components and Controls
- 19.7 Internal Control Reviews of Classic Mainframe or Legacy IT Systems
- 19.8 Legacy of Large System General Control Reviews
- 19.9 ITIL® Service Support and Delivery IT Infrastructure Best Practices
- 19.10 Service Delivery Best Practices
- 19.11 Auditing IT Infrastructure Management
- 19.12 Internal Auditor CBOK Needs for IT General Controls
- Notes
- Chapter 20: BYOD Practices and Social Media Internal Audit Issues
-
Chapter 21: Big Data and Enterprise Content Management
- 21.1 Big Data Overview
- 21.2 Big Data Governance, Risk, and Compliance Issues
- 21.3 Big Data Management, Hadoop, and Security Issues
- 21.4 Compliance Monitoring and Big Data Analytics
- 21.5 Internal Auditing in a Big Data Environment
- 21.6 Enterprise Content Management Internal Controls
- 21.7 Auditing Enterprise Content Management Processes
- Notes
-
Chapter 22: Reviewing Application and Software Management Controls
- 22.1 IT Application Components
- 22.2 Selecting Applications for Internal Audit Reviews
- 22.3 Preliminary Steps to Performing Application Controls Reviews
- 22.4 Completing the IT Application Controls Audit
- 22.5 Application Review Example: Client-Server Budgeting System
- 22.6 Auditing Applications under Development
- 22.7 Importance of Reviewing IT Application Controls
- Notes
-
Chapter 23: Cybersecurity, Hacking Risks, and Privacy Controls
- 23.1 Hacking and IT Network Security Fundamentals
- 23.2 Data Security Concepts
- 23.3 Importance of IT Passwords
- 23.4 Viruses and Malicious Program Code
- 23.5 System Firewall Controls
- 23.6 Social Engineering IT Risks
- 23.7 IT Systems Privacy Concerns
- 23.8 The NIST Cybersecurity Framework
- 23.9 Auditing IT Security and Privacy
- 23.10 PCI DSS Fundamentals
- 23.11 Security and Privacy in the Internal Audit Department
- 23.12 Internal Audit’s Privacy and Cybersecurity Roles
-
Chapter 24: Business Continuity and Disaster Recovery Planning
- 24.1 IT Disaster and Business Continuity Planning Today
- 24.2 Auditing Business Continuity Planning Processes
- 24.3 Building the IT Business Continuity Plan
- 24.4 Business Continuity Planning and Service Level Agreements
- 24.5 Auditing Business Continuity Plans
- 24.6 Business Continuity Planning Going Forward
- Notes
-
Chapter 19: ITIL® Best Practices, the IT Infrastructure, and General Controls
-
Part 6: Internal Audit and Enterprise Governance
-
Chapter 25: Board Audit Committee Communications
- 25.1 Role of the Audit Committee
- 25.2 Audit Committee Organization and Charters
- 25.3 Audit Committee’s Financial Expert and Internal Audit
- 25.4 Audit Committee Responsibilities for Internal Audit
- 25.5 Audit Committee Review and Action on Significant Audit Findings
- 25.6 Audit Committee and Its External Auditors
- 25.7 Whistleblower Programs and Codes of Conduct
- 25.8 Other Audit Committee Roles
- Note
-
Chapter 26: Ethics and Whistleblower Programs
- 26.1 Enterprise Ethics, Compliance, and Governance
- 26.2 Ethics First Steps: Developing a Mission Statement
- 26.3 Understanding the Ethics Risk Environment
- 26.4 Summarizing Ethics Survey Results: Do We Have a Problem?
- 26.5 Enterprise Codes of Conduct
- 26.6 Whistleblower and Hotline Functions
- 26.7 Auditing the Enterprise’s Ethics Functions
- 26.8 Improving Corporate Governance Practices
- Notes
-
Chapter 27: Fraud Detection and Prevention
- 27.1 Understanding and Recognizing Fraud
- 27.2 Red Flags: Fraud Detection Signs for Internal Auditors
- 27.3 Public Accounting’s Role in Fraud Detection
- 27.4 IIA Standards for Detecting and Investigating Fraud
- 27.5 Fraud Investigations for Internal Auditors
- 27.6 Information Technology Fraud Prevention Processes
- 27.7 Fraud Detection and the Internal Auditor
- Notes
- Chapter 28: Internal Audit GRC Approaches and Other Compliance Requirements
-
Chapter 25: Board Audit Committee Communications
-
Part 7: The Professional Internal Auditor
-
Chapter 29: Professional Certifications: CIA, CISA, and More
- 29.1 Certified Internal Auditor Responsibilities and Requirements
- 29.2 Beyond the CIA: Other IIA Certifications
- 29.3 Importance of the CIA Specialty Certification Examinations
- 29.4 Certified Information Systems Auditor
- 29.5 Certified Information Security Manager
- 29.6 Certified in the Governance of Enterprise IT
- 29.7 Certified in Risk and Information Systems Control
- 29.8 Certified Fraud Examiner
- 29.9 Certified Information Systems Security Professional
- 29.10 ASQ Internal Audit Certifications
- 29.11 Other Internal Auditor Certifications
- Chapter 30: The Modern Internal Auditor as an Enterprise Consultant
-
Chapter 29: Professional Certifications: CIA, CISA, and More
-
Part 8: The Other Sides of Auditing: Professional Convergence
-
Chapter 31: Quality Assurance Auditing and ASQ Standards
- 31.1 Duties and Responsibilities of ASQ Quality Auditors
- 31.2 Role of the Quality Auditor
- 31.3 Performing ASQ Quality Audits
- 31.4 Quality Assurance Reviews of the Internal Audit Function
- 31.5 Launching the Internal Audit Quality Assurance Review
- 31.6 Reporting the Results of an Internal Audit Quality Assurance Review
- 31.7 Future Directions for Quality Assurance Auditing
- Chapter 32: Six Sigma and Lean Techniques for Internal Audit
- Chapter 33: ISO and Worldwide Internal Audit Standards
-
Chapter 34: A CBOK for the Modern Internal Auditor
- 34.1 Part One: Foundations of Internal Auditing CBOK Requirements
- 34.2 Part Two: Importance of Internal Controls CBOK Requirements
- 34.3 Part Three: Planning and Performing Internal Audit CBOK Requirements
- 34.4 Part Four: Organizing and Managing Internal Audit Activities CBOK Requirements
- 34.5 Part Five: Impact of IT on Internal Auditing CBOK Requirements
- 34.6 Part Six: Internal Audit and Enterprise Governance CBOK Requirements
- 34.7 Part Seven: Internal Auditor PROFESSIONAL CBOK Requirements
- 34.8 Part Eight: The Other Sides of INTERNAL Auditing: Professional Convergence CBOK Requirements
- 34.9 A CBOK for the Modern Internal Auditor
- Notes
-
Chapter 31: Quality Assurance Auditing and ASQ Standards
- About the Author
- Index
- EULA
Product information
- Title: Brink's Modern Internal Auditing
- Author(s):
- Release date: January 2016
- Publisher(s): Wiley
- ISBN: 9781119016984
You might also like
book
Rethinking Information Technology Asset Management
This book is intended for business leaders and IT executives who are tired of missed budget …
book
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure …
book
General Aviation Aircraft Design
Find the right answer the first time with this useful handbook of preliminary aircraft design. Written …
book
Radar Trends to Watch: August 2023
Read about the latest developments on O'Reilly Media's Radar.