Letter from the Editor – Fall 2024

Unintentionally, this issue has a theme of seeing things in a new light. Changes so subtle that they could be missed, but the trained auditor eye will take notice.

Consider the new ACUA logo and brand identity. My favorite part of the design is the shield, purposefully representing auditors as protectors of our institutions. The network symbol also reminds us that we are stronger when we network with each other, as when members share their knowledge by replying to ConnectACUA posts.

In this issue, ACUA’s Outstanding Professional Contributions award winner, John McDaniel, challenges us to review policies and procedures in a new light to improve clarity and remove barriers to compliance. Priya Sall invites you to practice your professional skepticism skills, and Anthony Thompson gives a sneak peek into the proposed first IIA Topical Requirement on Cybersecurity.

Rachel Flenner and William Aurich from the ACUA Sidelines Committee break down key auditable areas in athletics, and I am sharing ways to add value by auditing your campus space utilization. Sponsor Baker Tilly highlights their video series on higher education internal audit challenges and explains how to navigate the updated NIST CSF 2.0 cybersecurity framework.

Don’t forget, the new IIA Global Internal Audit Standards take effect on January 9, 2025, and the AAP committee has prepared self-assessment guidance to help you get ready.

As we ease into winter and the middle of our fiscal years, it’s a great time to absorb all of the changes, see our profession in a new light, and pour yourself a hot, pumpkin-spiced beverage while you take it all in.

Sincerely,

Kara Hefner, Editor

Research Security Resources and Best Practices

As stewards of federal funding, institutions of higher education must play a role in protecting the security and integrity of the research enterprise. Maintaining an open and collaborative research environment is critical to fostering research discoveries and innovations that benefit the United States and the world. Simultaneously, this open environment must be balanced by guardrails that protect intellectual capital and prevent deceptive practices, foreign government influence, theft of research data, and unwanted knowledge transfer. Over the past few years, federal agencies have issued multiple guidance documents intended to support ongoing efforts to keep international research collaboration both open and secure.

Federal Agency Guidance

In December 2019, the National Science Foundation (NSF) released a report by the independent science advisory group JASON titled “Fundamental Research Security.” The report identified the need for a robust, coordinated approach to strengthen the integrity and security of the United States research enterprise by highlighting threats to basic research posed by foreign governments, which have taken actions that violate the principles of scientific ethics and research integrity. On January 14, 2021, the National Security Presidential Memorandum-33 (NSPM-33) was issued, which directs a national response intended to improve research security efforts at federal agencies. Approximately one year later, on January 4, 2022, the Office of Science and Technology Policy (OSTP) issued “Guidance for Implementing NSPM-33 on National Security Strategy for United States Government Supported Research and Development” (NSPM-33 Guidance). The NSPM-33 Guidance aims to clarify requirements for federally funded researchers, set best practices at federal agencies to strengthen research security, and offers direction on five major areas of research security addressed by NSPM-33: disclosure requirements and standardization, digital persistent identifiers, consequences for disclosure requirement violations, information sharing, and research security programs at federally funded research institutions.
In March 2023, OSTP requested public comment on the “DRAFT Research Security Programs Standard Requirement” (Draft Memorandum), prepared by the Interagency Working Group on Research Security Programs. The requirement applies to any research organization whose component parts receive at least $50 million in Federal science and engineering support annually in the aggregate. As of March 2024, the final research security program requirements have not been published. However, as per the Draft Memorandum, covered research organizations will need to certify they maintain a research security program which meets the requirements for foreign travel security, research security training, cybersecurity, and export control training. Additionally, they must:

  • Maintain a description of the finalized research security program made available on a publicly accessible website, with descriptions of each requirement.
  • Designate and provide contact information for a research security point of contact.
  • Maintain clear response procedures to address reported allegations of research security non-compliance.
  • Report incidents of research security violations to the federal awarding agency or agencies.
  • Establish or maintain international travel policies for covered individuals engaged in federally funded research and development (R&D) who are traveling internationally for organizational business, teaching, conference attendance, research purposes, or who receive offers of sponsored travel for research or professional purposes.
  • Implement research security training as a component of research security programs.
  • Implement baseline safeguarding protocols and procedures for information systems used to store, transmit, and conduct federally funded R&D.
  • Provide training to relevant personnel on requirements and processes for reviewing foreign sponsors, collaborators, and partnerships, and for ensuring compliance with Federal export control requirements and restricted entities lists.

The National Institute of Standards and Technology (NIST) released further guidance in August 2023 entitled “Safeguarding International Science Research Security Framework,” which establishes a set of recommended best practices and a methodology for implementing a risk-balanced, institutional research security program that addresses the requirements of NSPM-33. Additionally, the NSF has developed resources to enhance research security practices and implement research security provisions of the CHIPS and Science Act of 2022, including:

  • Prohibition of malign foreign government talent recruitment programs where, beginning in May 2024, investigators submitting a proposal for NSF funding will need to certify that they are not part of such a program and the proposing institution will need to certify that they have a means to assess faculty participation in malign foreign government talent recruitment programs.
  • The development of research security training modules for covered personnel (i.e., What is Research Security, Disclosure, Manage and Mitigate Risk, and International Collaboration research security training modules) currently available for the research community to use based on their needs.
  • Establishment of a research security and integrity information sharing and analysis organization called SECURE to be operational by the end of calendar year 2024 that will develop tools and provide information and services to the research community.
  • Establishment of Research on Research Security (RORS) program, where NSF seeks to fund research that will identify attributes that distinguish research security from research integrity, improve understanding of research security risks, provide insight into methods for identifying and preventing research security violations, and develop methods to assess the potential impact of research security threats on the U.S. economy, national security, and the research enterprise.
  • The requirement for institutions of higher education that receive NSF funding to report foreign financial transactions, including contracts and gifts, totaling over $50,000 per year from foreign sources associated with countries of concern. The first report is due July 31, 2024.
  • Prohibition of NSF funding to universities with Confucius Institutes, effective in 2025.

Research Security Best Practices

As research focused institutions of higher education await the final research security program requirements, institutions should assess their current processes against the research security provisions and guidelines outlined in the aforementioned documents and implement best practices to strengthen and protect the security and integrity of the research enterprise. The Subcommittee on Research Security under the National Science & Technology Council Joint Committee on the Research Environment recommends the following practices for research institutions to effectively address threats to research security and integrity:

  • Demonstrate robust leadership and oversight that conveys the importance of research security and integrity.
  • Ensure an organizational approach to research security where responsibilities for research security span across the organization.
  • Establish research security and integrity working groups and task forces to develop and implement policies and practices.
  • Establish and operate a comprehensive research security program that includes elements of cyber security, foreign travel security, insider threat awareness and education, and export control training.
  • Establish and administer organizational policies regarding conflicts of interest, conflicts of commitment, and disclosure.
  • Require disclosure to the organization of all information necessary to identify and assess potential conflicts of interest and commitment, including affiliations and employment with outside entities, other support and current or pending participation in, or applications to, programs sponsored by foreign governments, including foreign government-sponsored talent recruitment programs.
  • Ensure compliance with requirements for reporting foreign gifts and contracts.
  • Provide researchers with responsible conduct of research training.
  • Promote awareness of circumstances and behaviors that may pose risk to research security and integrity.
  • Establish procedures to monitor for noncompliance with organizational policies.
  • Establish a centralized review and approval process for evaluating formal research partnerships.
  • Establish a risk-based security process for foreign travel review and guidance.
  • Develop and deploy requirements for vetting and securely hosting foreign visitors.
  • Identify and implement measures to improve data security, internal breach prevention, and incident response processes.

Internal Audit Approach to Mitigate Research Security Risks

Internal audit functions within research focused institutions of higher education can help improve the organization’s research security posture by providing management and the board with independent and objective assurance on governance, risk management, and controls pertaining to research security. This includes assessing the overall effectiveness of the institution’s research security program to ensure compliance with all applicable federal laws, regulations, rules, and directives. Focus areas for internal audit may include:

  • Assessing organizational culture and tone at the top relative to research security priorities and directives.
  • Reviewing the results of risk assessments performed to assess the sensitivity of the institution’s research, including risks of theft, espionage, or foreign influence.
  • Evaluating the institution’s research security program against the NIST Safeguarding International Science Research Security Framework.
  • Comparing conflict of interest and commitment disclosures for key personnel to investigator certification questionnaire responses obtained during the proposal submission process to identify undisclosed appointments or affiliations with foreign institutions.
  • Assessing compliance with institutional policies (i.e., foreign travel, other support, export controls, visitors, intellectual property, or code of conduct).
  • Assessing compliance with institutional training requirements (i.e., conflict of interest and commitment, responsible conduct of research, export controls, electronic device security, research security, disclosure, risk mitigation, and international collaboration)
  • Conducting searches of open-source information to identify any key risk indicators for research associate appointments, including participation in a foreign talent or malign foreign talent recruitment program.
  • Reviewing research data handling, storage, and protection practices to ensure compliance with encryption protocols, data protection regulations, and privacy requirements.
  • Assessing compliance with reporting requirements for foreign gifts and contracts.
  • Evaluating the sufficiency of the institution’s incident response plan, communication protocols, and recovery procedures.

Council on Governmental Relations

In addition to guidance provided by federal agencies, the Council on Governmental Relations (COGR), an association of research universities, affiliated medical centers, and independent research institutes, has developed a Science and Security webpage to provide resources and analysis to assist member institutions in navigating requirements in this area. The webpage provides links to statues, regulations, and other sources of legal requirements related to science and security, including links to federal research agency policy and guidance. Two recently updated COGR publications contain useful information regarding federal research security requirements:

Final Thought

As the timeline for issuance of final research security program requirements is uncertain, research focused institutions of higher education should continue to engage with institutional leaders to determine how the new requirements may impact current processes and procedures and ensure appropriate steps are taken to protect the security and integrity of the research they conduct.

Letter from the Editor

Hello ACUA Members!
It’s April and spring is here! The flowers are blooming, the Carolina pine pollen is dropping, and we are enjoying the mild weather outdoors before the cicadas hatch en masse. April is also national volunteer month. It’s a great reminder to give back to your communities, whether on a professional or personal level. Volunteering has been on the decline, especially since the pandemic. The top reasons people are not volunteering is because they feel they do not have the time or cannot find meaningful assignments, but those fears can be eased by finding the right opportunities.

Our ACUA community has many volunteer committee openings right now, from historian to nominating committee, DEI leadership to standards and best practices. I’ve read that the number one reason people volunteer is because they’re asked, so let this be your invitation to try an ACUA committee. Complete the call for volunteers form in our new Committee Updates feature.

This is a great time to recognize the contributions of volunteers, like our fantastic C&U Journal team. I would like to thank Olga Polikarpova (University of Alaska) for serving as Deputy Editor before her departure from higher education. Former copy editor Tyler Morgan (Mississippi State University) volunteered to move into the Deputy Editor role and even penned his first article on improving workpaper documentation. I also wish to thank our copy editors for proofreading submitted articles, often on very short notice, sharing their writing talents: Susan Edinger (University of Toledo), Erica Smith and Amy Wilegus (both University of Tennessee), and newcomer Julee Otter (Oregon State University). If you would like to join our team, email editor@acua.org.

Every article this issue was written by an ACUA member volunteering their time to share their insight on emerging topics with their peers. Natalie Harrison (Rutgers) is a double volunteer this issue, contributing two must-read articles on DEI and tips for new internal auditors. From Qatar University, Saumy Thomas shares critical emerging risks in higher education and Carl Canlas (Church of Jesus Christ of Latter-day Saints) defines the agile auditing process. Beth Harry (Johns Hopkins) provides an in-depth look at research security best practices.

Volunteering is a great way to develop valuable skills, boost our well-being, and make a tangible impact in our community. Maybe we need to dig a bit deeper to find the right opportunities, like those cicadas did 13 and 17 years ago.

Sincerely,
Kara Hefner, Editor

Letter from the President

Happy Spring, ACUA! I hope that everyone is packing away their cold-weather gear (depending on where you are in the country) and getting ready for flowers and sunshine. Personally, I love Spring. To me it represents new beginnings and fresh opportunities. So, in the spirit of Spring, if you have always wondered about volunteering but haven’t been sure where to begin, now is the time! A few weeks ago, ACUA sent out a “Call for Volunteers,” which listed over a dozen current volunteer opportunities. Take time to complete the survey here and a volunteer leader will be in touch with you!

On June 4th we will hold our annual business meeting. This will be held virtually and is open to all active ACUA members. Various leaders from across the organization will provide valuable updates on items such as:

  • State of ACUA
  • Financial Updates
  • Conference Trends

There will also be some exciting announcements, so be sure to attend if you are able! The presentation will be posted on ConnectACUA in the weeks following the meeting, should you not be able to attend.

Lastly, I’d like to thank our Professional Education Committee (PEC) for their tireless efforts to provide exceptionally relevant content to our members. Their work behind the scenes continues all year long, and that includes working with our management company to not only plan upcoming conferences, but also be thinking about future conferences. That said, I am excited to share that at the recommendation of PEC, we have finalized negotiations to host AuditCon 2025 in Louisville, Kentucky! Whether you prefer baseball bats or Derby hats, mark your calendar for September 14-19, 2025, for an in-person conference that is not to be missed. 

I hope everyone has a fantastic summer. I’ll look forward to seeing many of you in Atlanta, Georgia for AuditCon 2024 in September!

Marion Candrea, Boston University
ACUA President

Agile Auditing: Three Pillars for Effective Implementation

With the changing landscape of both internal and external audit environments, industry researchers are eager to suggest that the traditional waterfall approach to conducting audits needs to be adjusted to make way for a more flexible, responsive, transparent, and engaged audit process. G.L. Joshi belives agile auditing, when implemented effectively, can “elevate the performance and value of internal audits.” Agile auditing is based on the principles and values from agile methodologies used extensively in software development. It consists of focusing on individuals and interactions, working products and services, customer collaboration, and responding to change.

This methodology adapts to focus on the needs of the stakeholders, expedite audit cycles, reduce effort and time, and create less unnecessary documentation. Liz Berger, former Director at Protiviti, explained that as an alternative to the traditional and sequential waterfall process, agile auditing does not necessarily change what auditors do, but how an audit is done. Agile auditing can offer opportunities to evolve auditing with the times. Agile auditing’s application to audit, risk, and compliance, and effective implementation relies on three pillars: risk-based audits, stakeholder management, and agile ceremonies.

agile auditing tree
Figure 1. Three Pillars of Agile Auditing: risk-based audits, stakeholder management, and agile ceremonies

Risk-Based Audits

A crucial step for internal auditors is to prioritize and audit the highest risk to the organization. Auditors need to focus on the areas most likely to impact the organization’s business objectives. Effective audits result from the application of key aspects in risk-based auditing including risk identification and assessment, risk-based audit plan, testing and evaluation, and reporting and communication.

Spiros Alexiou explained in an ISACA article that agile models involve the bare minimum required documentation, making the process more streamlined. This, in turn, gives the auditors an opportunity to focus on the “insights, risks, and opportunities that stakeholders need,” according to Galvanize (now Diligent). Joshi also emphasized that agile auditing enables auditors to become more flexible and adaptive as they are able to check their progress in short intervals instead of waiting until the whole audit process has been completed, thus increasing value and risk-specific insights. When applied to higher education audits, for example, an agile audit can improve risk management practices across the institution. Agile audit practices can enable colleges and universities to identify, assess, and mitigate risks more effectively, safeguarding the institution’s assets, reputation, and compliance with regulatory requirements.

Stakeholder Management

There is an art and a science in managing both internal and external audit stakeholders. Identification and prioritization of impacted stakeholders is an important step. The level of stakeholder influence and interest in the audit process can influence the success or failure of an audit. Hence, it is important to manage expectations proactively by fostering collaboration and engagement. There needs to be a clear and timely communication channel tailored to each stakeholder’s specific needs and information level. Most importantly, auditors need to invest time in building and maintaining positive relationships with key stakeholders using skills such as regular engagement, professionalism, and empathy when addressing stakeholder concerns.

For agile auditing to be implemented successfully, KPMG cites the vision must be shared by top management and leadership, auditors, and clients. DBS, the largest bank in Singapore and Southeast Asia, was one of the early adopters of agile auditing. According to DBS, the secret to their success implementation was the supportive tone from management across the board, auditors who fully immersed themselves in the methodology, and clients who were knowledgeable of agile auditing, which allowed for close collaboration. As a result, the DBS Internal Audit team was able to boost the number and gravity of the risks they found, which improved the level of audit assurance they were able to provide to their stakeholders. In the bigger scheme, the process does not really change, but auditors become more equipped and knowledgeable about where to look harder.

Agile Ceremonies

The ceremonies within agile auditing facilitate effective communication, collaboration, and planning within Agile Teams. The four main Agile ceremonies are: Sprint Planning, Daily Stand-up, Sprint Review and Sprint Retrospective/Lessons Learned.

  • Sprint Planning’s goal is to prioritize the highest risks, define the scope for the upcoming schedule/sprint and requires audit teams to estimate the work according to their personal velocity and bandwidth.
  • Daily Stand-ups help the audit team identify roadblocks and adjust plans as needed. Each team member focuses on three main questions: what I worked on yesterday, what will I work on today, and what roadblocks prevent me from completing assigned audit work.
  • Sprint Review showcases the completed work and gathers feedback for completed audit workpapers and reports. This allows the audit management team to strategize and define the next audit work to be completed.
  • Sprint Retrospective allows the team to identify areas for improvement and agree on action items for implementation in the next sprint.

KPMG describes how a global banking institution implemented agile auditing by doing organizing daily stand-up meetings within the audit teams. This allowed them to evaluate whether the execution and performance corresponded with planning. These daily stand-up meetings gave the teams an opportunity to check for bottlenecks, assess prioritization, and provide feedback. They also organized a bi-weekly “market place” where sprint reviews were evaluated and discussed with all the teams involved so they could review the total audit plan’s progress and provide mutual feedback.

Agile auditing is more than the ceremonies, as it also must work hand-in-hand with risk-based audits and effective stakeholder management. Success in agile auditing requires an agile mindset, dedicated to continuous improvement.

References

Joshi, P. L. (2021). A review of agile internal auditing: Retrospective and prospective. International Journal of Smart Business and Technology, 9(2), 13 – 32.
KPMG. (2020, October). Agile internal audit. White paper on working Agile within internal audit functions. https://assets.kpmg.com/content/dam/kpmg/cn/pdf/en/2020/10/agile-internal-audit-white-paper-on-working-agile-within-internal-audit-functions-part-2.pdf
Deloitte. (2017). Becoming agile: A guide to elevating internal audit’s performance and value. https://www2.deloitte.com/content/dam/Deloitte/uk/Documents/finance/deloitte-uk-understanding-agile-ia.pdf
Berger, L. (2020, January 2020). Agile internal audit: How to audit at the speed of risk. Protiviti. https://blog.protiviti.com/2020/01/27/agile-internal-audit-how-to-audit-at-the-speed-of-risk/
Galvanize. (2019, April 23). An overview of agile auditing. Galvanize. https://www.wegalvanize.com/audit/an-overview-of-agile-auditing/#:~:text=The%20main%20difference%20between%20agile,work%2C%20and%20increased%20collaboration).
Alexiou, S. (2017). Agile audit. ISACA Journal (2), 27 – 35. https://www.isaca.org/resources/isaca-journal/issues/2017/volume-2/agile-audit

ACUA Committee Updates

Join ACUA in making a positive impact! We are looking for dedicated individuals to volunteer and contribute their skills to the organization. Whether you have experience in community outreach, research and analytics, or digital marketing, your passion and commitment is needed. If you’re interested in becoming an ACUA volunteer, please review the current volunteer openings and complete the ACUA Call for Volunteers survey.

Communications Committee

  • The Connect ACUA forum has many communities that focus on small shops, data analytics, AutoAudit users, Workday ERP, athletics, and more. Click on the “communities” tab and join a group for tailored questions and answers.

Diversity and Inclusive Leadership Committee

  • The committee recently sent a survey to ACUA members regarding DEI and kindly request that you complete the survey.

Membership/Mentorship Program

  • The ACUA mentorship program is seeking new mentors and mentees to share university auditing career guidance and support. This program is open to all members of any size audit shop. To inquire about the program or get matched with a mentor/mentee please contact program director Earl Jackson at earl.jackson@unc.edu

Professional Education Committee

  • The 2024 ACUA AuditCon Conference will be held in-person September 15-19, 2024, at the Westin Peachtree in Atlanta, GA.
  • The 2025 ACUA AuditCon will be in Louisville, KY on September 14-19, 2025

Standards & Best Practice Committee

Auditing & Accounting Principles Subcommittee

  • The IIA released the new Global Internal Audit Standards on January 9, 2024. While they do not take into effect until January 9, 2025, the IIA is encouraging early adoption.
  • The first IIA Topical Requirement on Cybersecurity has been released in draft format and is open to public comments until July 3, 2024. Read the draft and provide your comments.

Kick Starter Subcommittee

  • Three new kick starters have recently dropped:
    • Travel Expense Review by Toni Stephens, The University of Texas at Dallas, in December 2023
    • Banner User Access by Annette Alboreo, Kent State University, in January 2024
    • Student Free Speech and Expression Events by John Winn, University of South Carolina, in March 2024

Virtual Learning Subcommittee

  • Upcoming webinars:
    • Fort Hill will discuss Subcontractor Bidding Process: Contract Controls and Auditing on June 20, 2024.

How Did ACUA Begin?

The Association of College and University Auditor’s currently serves over 500 institutions of higher education in the United States, Canada, and abroad. Our members include schools of all sizes: from community colleges to large university systems, both public and private. Membership has grown tremendously over the past 76 years, when thirteen charter universities decided to share their professional knowledge with each other. ACUA Historian Toni Stephens explains how it all began:

On February 24, 1958, Fred Vorsanger from Purdue and Stanley Smith from the University of Illinois circulated the idea of forming a group to meet and discuss mutual audit issues to the other Big Ten schools of the time. The idea quickly spread, and the inaugural meeting of ACUA was held at the LaSalle Hotel in Chicago on Monday April 7, 1958. Lasting from 9:00am until 3:00pm, the meeting focused on reviews of internal audit reports in different areas of operation. Smith would become the first ACUA President.
Eleven people from the following eight Big Ten schools attended.

  • University of Illinois
  • University of Indiana
  • University of Michigan
  • Michigan State University
  • University of Minnesota
  • Northwestern University
  • Ohio State University
  • Purdue University

Though they did not attend the first meeting, the following schools became part of the thirteen charter members of ACUA:

  • University of Chicago
  • Iowa State University of Science and Technology
  • University of Notre Dame
  • Southern Illinois University
  • University of Wisconsin

Shortly after the initial meetings, ACUA reached out to additional universities to join the group. In the last issue of the C&U Journal, the historian was looking for the oldest university membership certificate. No certificates from the original thirteen charter universities have been identified. The University of Mississippi still lays claim to displaying the oldest membership certificate from when they joined on September 10, 1959, just one year after the ACUA’s formation. Congratulations Ole Miss!

Earliest ACUA member certificate on record.

Tips for New Internal Auditors

Starting a new job can be both exhilarating and daunting at first, and starting a new job as an internal auditor is no different. Internal audit is a unique and continuously evolving profession where internal auditors play a critical role in an organization’s operations and corporate governance. Internal auditors use their experience and knowledge of laws, regulations, and organizational policies to examine and analyze an organization’s financials and identify potential occurrences of noncompliance, fund misappropriation, and other risks to the organization. Becoming an internal auditor is rewarding and has a great opportunity for professional development and advancement. Here is what new internal auditors should do to be successful in their career.

Seek a mentor

All internal auditors, whether this is your first year as an internal auditor or you have over 25 years of auditing experience, can benefit from having a mentor. Mentors help internal auditors understand their profession and career opportunities. It is important to find a suitable mentor who has more industry experience, shares similar values or goals, and is someone you admire. The right mentor should be your biggest ally and have a passion for teaching while allowing you to be your own advocate.

Learn and understand the basics of internal auditing and how to conduct an audit

To begin in this field, you must learn the standards that govern the process. The IIA Standards on performance explain the processes for planning, performing, reporting, and following up on audit engagements. The sooner you become familiar with these concepts, the faster you will be able to understand and apply this knowledge for developing and performing internal audits.

Relax and stay calm

When starting a new job, internal auditors tend to put an immense amount of pressure on themselves to be perfect. Internal audit is known for having a steep learning curve, so new auditors should take a deep breath, relax, and know that you are not alone. There will be other auditors, managers, and directors to help you learn your department’s procedures and answer any questions you may have.

Know your limits and when to ask for help

One of the hardest things for new internal auditors to learn is when to speak up and ask for help. Auditing is very technical, and it is highly unlikely that a new internal auditor will be a compliance, accounting, or fraud expert overnight. Do not spend hours trying to figure things out on your own. Rather, seek guidance from a more experienced colleague who can help you. Knowing your limits and knowing when to ask for help can save you time and reduce frustration and misunderstandings.

Be eager to learn and develop new skills

As an internal auditor, you analyze a variety of processes and interact with all levels of employees and subject matter experts. Do not be afraid to ask questions that will help you understand what you are auditing. As time goes on and you gain more experience, you will learn that internal audit is about striking a balance between understanding the big picture and focusing on the small details. Having a good knowledge of your organization’s policies, procedures, and risks will make you a standout internal auditor.

Sharpen your communication skills

Although communication skills are essential in any job, internal audit requires developing two key skill sets: effective writing and effective interviewing. An internal auditor’s writing should be objective and clear, making compelling arguments that present your audit results effectively. For successful interviews, internal auditors must be prepared, ask the right questions, listen, take good notes, and confirm their understanding of the processes and controls being audited. It is also extremely important that the interview is not one-sided but flows naturally from both sides.

Be a sponge by listening and absorbing all the information

As an internal auditor, you will have the opportunity to interact with, and learn from, all levels of employees, including interns, associates, managers, VPs, and directors. You can learn something from everyone you encounter, so be open-minded and receptive. Take note of the valuable skills others possess, such as communication, organization, leadership, and networking skills and learn from them.

Volunteer and get involved in areas outside of your comfort zone

New internal auditors are usually assigned to a variety of different audit engagements before they begin to specialize in certain areas or become subject matter experts. Learn as much as possible from your different engagements, and volunteer to be put on engagements that are not so glamorous, ones you know nothing about, or topics you want to learn more about. By exploring different assignments, you may find a preference for a particular area and may have the opportunity to work with a subject matter expert. If you volunteer to get involved in areas you are unfamiliar with, management and others will take notice of the effort. Your passion may be hidden somewhere you would have not explored if you did not push yourself.

Join a professional network or organization

Consider joining networks or organizations that support and cater to your interests, professional growth, and development. These groups usually offer members training opportunities to help you enhance your skills and stay current on auditing news and publications. Becoming a member of network groups or organizations can also help you grow your professional network and learn about other career opportunities.

Enjoy the experience

You are only a new internal auditor for a brief time. The beginning of your internal audit experience should be embraced because there is no other time in your auditing career when so much knowledge is obtained in such a short period. In addition to the new experiences and learning curve, new auditors are exposed to a vast array of unique individuals with wonderful backgrounds and experiences. Embrace the relationships you develop and the things you learn along the way. But most importantly, enjoy the journey!

On the Merits of Subtraction, a Discussion of Audit Documentation

Time spent on one task is time we cannot spend on other tasks; this is the law of opportunity cost. As internal auditors with limited time and an almost infinite supply of things that demand our attention, it is imperative that we prioritize efficient time management practices. Audit documentation practices may often be overlooked but can account for a significant amount of time spent on each engagement. Excessive audit documentation does not add value to the engagement and expends valuable time that could alternatively be used to expand audit coverage and increase effectiveness. This article encourages auditors to review their current practices and look for ways to reduce excessive audit documentation.

First Horse, Then Cart

Before diving into a project to get rid of unnecessary audit documentation, it is important first to understand the primary purpose of audit documentation, along with the documentation requirements stipulated in the IIA’s Global Internal Audit Standards. Fortunately, the section addressing audit documentation in the most-recent Standards (released on January 9, 2024) is a relatively brief two pages, and the language is not overly prescriptive, which should allow internal audit shops flexibility when implementing their individual documentation practices. The Standards provide the primary purpose of audit documentation and define the target audience with Standard 14.6:

“Internal auditors must document information and evidence to support the engagement results. The analyses, evaluations, and supporting information relevant to an engagement must be documented such that an informed, prudent internal auditor, or similarly informed and competent person, could repeat the work and derive the same engagement results.”

The key takeaways here are that documentation should always focus on supporting the conclusions of the engagement, and that documentation can be structured in a way that assumes a large degree of competence on the individuals who rely on the documentation (e.g., workpaper reviewers). If documentation does not support the engagement results, then it likely is not necessary and should be omitted from the workpapers. The Standards make it clear that the documentation can be tailored to a highly competent audience. Since a highly competent audience can be expected to more easily read between the lines, auditors may be able to significantly reduce the amount of detail included in the workpapers and thereby save lots of time for both the preparer and reviewer.

For those who comply with the IIA’s Standards, it is mandatory that their audit documentation practices meet or exceed the requirements. However, any additional time auditors spend on exceeding the Standards’ requirements is time that cannot be spent addressing other important audit priorities. While it may make sense for audit documentation to occasionally be more robust than that prescribed by the Standards, auditors would be wise to periodically assess their documentation procedures and determine where the fat can be trimmed.

The remainder of this article provides concrete examples for auditors to consider when examining their audit documentation protocols.

Just Say No to Redundancies

Documenting something on more than one workpaper at least doubles the work for both the preparer and reviewer. Therefore, much time and effort can be reduced by simply looking for redundancies in workpapers.

A good place to start is audit findings, since these may often be documented in multiple locations, including supporting source documentation, testing workpapers, audit programs, audit software widgets, etc. It may be sufficient to document audit findings in only one location, such as in an audit program or findings summary document. Remember that auditors should only include enough documentation so that a competent auditor could replicate their results. For a simpler finding or one that occurs frequently in many audits, a competent auditor might easily be able to reach the same conclusion with merely a brief reference to the finding in the audit program. Limiting redundant finding references will also make things go much more smoothly if the review process results in the modification, consolidation, or elimination of audit findings, as fewer workpapers will need to be modified.

Listing the full names and titles of individuals in multiple workpapers also adds extra time. While it does not take long to type out an individual’s full name and title, the time will really add up if names and titles of multiple individuals are listed on multiple workpapers. A simple hack is to use a name and titles index workpaper or organizational chart. This will allow the reviewer to reference a single workpaper to determine relevant employee titles, and preparers will not have to wonder whether they have already defined an employee’s title in documents where employees are mentioned multiple times, such as in process narratives.

Use Process Narratives Strategically – and Sparingly!

Usage of narrative structure has many benefits. In a recent interview with popular podcaster Lex Fridman, former Amazon CEO Jeff Bezos recounted how Amazon meetings often begin with executives reading a six-page, narratively structured memo on the topic at hand, in contrast to the conventional meeting structured around the ubiquitous PowerPoint presentation. Bezos points out a significant drawback of using tools like PowerPoint when discussing complex topics:

“[A] problem with PowerPoint[s], they’re often just bullet points. And you can hide a lot of sloppy thinking behind bullet points. When you have to write in complete sentences with narrative structure, it’s really hard to hide sloppy thinking. So…it forces the author to be at their best, and so you’re getting…their best thinking and then you don’t have to spend a lot of time trying to tease that thinking out of the person.”

Many of us can relate to Bezos’ mention of hiding sloppy thinking when broadly summarizing a topic. In contrast, having to elaborate our thoughts using a narrative format often blatantly reveals this sloppy thinking and prompts us to dig further and ask additional questions. Often the result is a much more solid understanding of the subject area than we would have otherwise had if we had not been writing with a narrative structure. In internal audit where auditors must quickly get up to speed on a multitude of complex topics, using narrative memos can clearly be a beneficial tool to help them better understand the audit area and increase the effectiveness of audits. This may especially be the case when dealing with more complex topics that demand extremely lucid analysis, so auditors should not necessarily shy away from using narrative memos when it is appropriate.

That said, it is important to consider the downsides of using narrative memos so that they do not become a drag on productivity and efficiency. While the benefits of narrative memos are vast, there is no such thing as a free lunch, and the substantial time it takes to prepare and review narrative memos must be weighed against these benefits. In that same interview, Bezos was quick to point out the significant costs of preparing the six-page narrative memos:

“It’s hard to write a six-page memo. A good six-page memo might take two weeks to write. You have to write it, you have to rewrite it, you have to edit it, you have to talk to people about it.”

Bezos’ description of the challenges of writing a good narrative memo will not come as a surprise to anyone who has had to write a memo on a complex audit topic. With that in mind, auditors should carefully weigh the pros of using the narrative format with the fact that using it may add substantial time to the audit. Consideration should be given to both the complexity of the topic or process to be covered, along with its importance as support for the overall audit conclusions. If the topic or process scores low on both criteria — that is, if it is a relatively simple topic or process and is not critical for support of important audit conclusions — then consider whether it can be more efficiently summarized via another medium, such as covering it in an audit program step or with a basic process map.

If the narrative format ultimately is used, though, reviewers should not hesitate to give constructive feedback to audit staff who include too much irrelevant information. This feedback will ensure that audit staff always have management’s priority for conciseness at top of mind.

An Audit is Not a Criminal Trial

To be convicted of a crime in the U.S., one must be proven guilty beyond a reasonable doubt. Not so for audit findings, especially in internal audit. While audit documentation should clearly demonstrate how conclusions were determined, it is not always necessary to consider all possible alternatives and defenses to identified issues. This is especially the case when issues have been discussed with management as they have been uncovered and everyone agrees with the findings. It is also important to remember that internal auditors typically prioritize a proactive focus in their engagements. Auditors need to identify which processes and controls are broken so that they can be fixed, not because they want to point fingers and demonize employees for their past mistakes. Often, more time should be spent working with management to ensure they implement audit recommendations that mitigate risks identified during the audit than on documenting evidence for audit findings.

The Little Things

Be on the lookout for small inefficiencies that may add up. For instance, if multiple auditors rely on the same procedures, consider developing a standard tick mark legend that can be copied and pasted into each audit, rather than having auditors manually create one for each individual audit. Watch for over-referencing or over-ticking, considering whether a prudent auditor could follow the workpapers without the extra work. Consider annotating the first document in a large sample as a guide for finding the information in the rest of the sample. Ensure auditors are not spending too much time on PDFs with excessive highlighting, boxing, and linking that does not actually make it easier for that competent reviewer to understand the work performed. While it may be tempting for reviewers to ignore the little things to avoid seeming pedantic, keep in mind that these things add up. This is especially true if internal audit shops are in the habit of always adding rather than subtracting.

Addition by Subtraction

In his 2021 book, “Subtract: The Untapped Science of Less,” author Leidy Klotz points out the human tendency to add things rather than subtract. While addition is often necessary and useful, we often fail to consider subtraction as an option, even in cases when it may be more apt. Klotz makes it clear that he is not prioritizing one over the other, but notes that since we so often fail to consider subtraction as an option, there is much “untapped potential” to be gained by simplifying. If auditors only focus on what they can add to enhance their documentation, they might be missing easy improvements. Do not ignore that low hanging fruit! Consider which audit documentation can be subtracted to make audits more efficient and effective.

Emerging Risks of Higher Education that Auditors Need to Know

Higher education institutions play a vital role in an individual’s intellectual development as well as reshaping societal progress by offering advanced knowledge and skillsets that foster critical thinking and contributions to research and innovation. Serving as centers for academic and cultural exchange, higher education institutions are looked up to as catalysts for positive changes in the job market and drivers of humankind.
 
In recent times, higher education has been exposed to various emerging risks. Due to the nature of these risks, each one requires a concentrated approach for review. In this article, we investigate the following key risks that higher education auditors need to be aware of.

Impact of Digitalization

The rapid pace of technology advancements requires higher education institutions to stay abreast of digital trends that result in universities increasingly relying on digital infrastructure and the need to manage vast amounts of student data. Technology integration, if hindered at varying infrastructure levels can contribute to a digital divide for higher education institutions. Auditors need to evaluate the adequacy of the technology landscape of the institutions for information flow effectiveness and utilization of emerging technologies such as generative AI, blockchain, and cloud computing. Furthermore, protecting sensitive student data, research information, and financial records is crucial. Regular assessment of cybersecurity measures, incident reporting, response plans, and compliance with the data protection law should be performed. A robust data governance practice and institution data safeguarding protocol is paramount.

Shifts in Job Market Dynamics

Technological advancements, particularly in the fields of automation, biotechnology, and renewable energy, pose both opportunities and challenges for higher education. Even though these innovations offer potential for groundbreaking research and education programs, higher education institutions must adapt curricula to meet evolving industry demands, ensuring that the graduates possess relevant skills. They also need to collaborate with industry partners to align education with the evolving job markets. As auditors, we need to be able to evaluate the effectiveness of the academic program review process established in the institution for regular curriculum updates. To mitigate this risk, we need to incorporate periodic reviews focused on fostering critical thinking and adaptability of curricula.

Impact of Global Events and Climate Changes

The unpredictability around the unfolding of global events such as the recent pandemic, geopolitical tensions, economic downturns, and environmental changes like extreme weather events, can affect the institution’s infrastructure and disrupt the delivery of academic activities. Auditors should periodically assess institutional resilience and the adequacy of contingency plans to mitigate the effects of such unforeseen global events.

Diversity, Equity, and Inclusion

Higher education institutions are judged for the diversity, equity, and inclusion of students and faculty from all norms, posing reputational risks related to gender disparities and the preservation of cultural identity. Ensuring equal access to higher education for all socioeconomic groups and genders requires tailored strategies addressing cultural disparities. Auditors need to assess the effectiveness and adherence of inclusion policies and practices established in the institution. Periodic reviews of recruitment, admissions, and support services for inclusivity should be performed as well.

Funding and Financial Sustainability

In recent times, most higher education institutions have faced funding and financial struggles. Reduced government funding, uncertainties around tuition fees, and economic fluctuations, coupled with fewer private investments through research grants, limit the financial stability of universities, affecting academic program offerings and student services. Auditors need to evaluate the creditability and financial position of the institution through additional revenue creation assessment and accounts receivable reviews to identify any funding opportunities.

Social and Political Shifts

Social and political dynamics prevalent within the state also contribute to risks such as ideological divides on campuses, affecting academic freedom and fostering an environment where diverse perspectives may face challenges. Geopolitical complexities within a region may also affect the ease of establishing and maintaining international partnerships, which could limit the flow of talent and ideas. Furthermore, issues related to campus safety, including instances of violence and harassment, pose ongoing concerns. Auditors need to identify these risks and conduct institutional governance reviews to strike a balance between government priorities and maintaining the strategic plans of the university.

Demographic Changes and Internationalization of Institutions

Shifts in population demographics, such as changes in age distribution of students, diverse student profiles, socio-economic disparities, underrepresentation of certain demographics, and expansion of online education facilities provided by institutions require adjustments to educational approach and mode of delivery. Auditors need to evaluate the adequacy of internal controls prevalent around academic integrity, data privacy in virtual classrooms, and quality assurance mechanisms for academic programs offered by the institution. For higher education institutions with a global footprint, auditors should assess the risks associated with international collaborations, branch campus operations, and compliance with federal and state regulatory requirements governing student aid, accreditation, and financial reporting in the region of operations. In addition, the well-being of students, particularly mental health wellness, is a growing concern. Auditors need to assess the awareness of the importance of well-being in academic settings, the adequacy of student recreational programs, and the infrastructure available in the institution to ensure that adequate student support is provided in handling the pressures of academic life, social challenges, and transitions to the university.

Institutional Governance and Tone at the Top

An institution’s control culture is well determined by the Tone at the Top of the respective institution. A robust governance structure is crucial for ensuring ethical conduct and maintaining public trust. Auditors should periodically evaluate the effectiveness of internal controls, whistleblower mechanisms, and the effectiveness of the ethical policies practiced in the institution. The emphasis on metrics, institutional rankings, and performance indicators can create pressures on institutions to meet specific criteria, causing institutions to compromise on academic ethical standard practices followed in the institution. Balancing quality assurance with the need for diverse educational offerings and navigating changes in global dynamics are continual challenges for the institution that need to be assessed by auditors.
 
In conclusion, higher education faces multidimensional risks such as cybersecurity threats, regulatory compliance, geopolitical tensions, data integrity, job market dynamics, technological advancements, privacy, inclusion and diversity, and demographic student shifts that may disrupt academic activities, hinder international collaborations and lead to migration of students and faculty. As higher education institution auditors, the evolving risk magnitude requires us to stay informed, conduct thorough risk assessments, and collaborate to ensure institutional resilience through a proactive adaptive approach.