Importance / Key Aspects of Spreadsheet Controls

Chris Mishler
Spreadsheets are used extensively throughout an organization to collect, analyze, and report on data used for financial reporting, financial planning & analysis, operations, and performance metrics. This webinar will help internal auditors at all levels, as well as spreadsheet owners within the business units, understand the scope of risks to consider. We will discuss how to work within your organization to ensure that practices are in place to:

-Identify the spreadsheets at greatest risk of error
-Identify the most likely candidates for fraud
-Mitigate the risks, and
-Implement a policy that can contribute to the development of more efficient and user-friendly spreadsheets.
Apr 25 2012
59 mins
Importance / Key Aspects of Spreadsheet Controls
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2855)
  • Upcoming (88)
  • Date
  • Rating
  • Views
  • You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?

    Please submit top-of-mind questions during the webinar registration process.

    CPE credits will be provided to qualifying attendees.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

    Join this webinar on Data Protection and learn about:
    • The key features of Data Protection and how it can provide you with the security you need
    • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
    • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
    • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Jack Madden converses with James Rendell to get the CA perspective on Enterprise Mobility Management’s (EMM) future potential. EMM must not for get BYOD but also go beyond it into Mobile App Management (MAM) and find ways to keep users personal information and employers information separated and find a way to embrace the Internet of Things.
  • Jack Madden discusses Enterprise Mobility with Arun Bhattacharya to get the CA perspective on the way it should be. This means going beyond BYOD and MDM, and embracing MAM, MEM, MCM, and IoT. For many companies, finding the balance between employers and users privacy and security has been a problematic issues.
  • Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.
    In this session we'll cover:
    What you need to know about the Heartbleed vulvnerability
    How to detect it using AlienVault USM
    How to investigate successful Heartbleed exploits
  • In this webcast we will show:
    1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    2. How you can identify your business exposure and what systems are vulnerable
    3. How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • Channel
  • Channel profile
Up Down
  • Auditing the Incident Response Program Recorded: Apr 23 2014 54 mins
    From political hacktivists to international cybercrime organizations, enterprise security has been under a barrage of attacks that run the gamut of complexity. Security breaches now seem inevitable even at organizations that invest heavily in their information security operations. With numerous recent examples of cybercriminals and malware penetrating corporate networks almost at will, the role of incident response teams has been thrust into the spotlight. In this presentation I will discuss the fundamentals of incident response planning and the critical role audit has in reviewing incident response plans, documentation and the plan testing process.
    At the end of this session:
    You will understand:
    -incident response
    -identify the different types of incidents
    -planning process
    -roles and responsibilities
    -team activation process
    -response process flows
    -response scenarios, and
    -auditing incident response
  • Target, Neiman Marcus, What Next? Recorded: Feb 26 2014 63 mins
    We all heard of the recent hacks of Target and Neiman Marcus. Millions of consumers were affected as their Personally Identifiable Information (PII) were stolen. This incident raised a reg flag for majority of the organizations. The question is being asked: What can we do to protect our environment from such an incident? And usually the auditor is asked if the organization is prepared to protect its PII.
    This webinar will identify the information each auditor must understand regarding PII and also list out the tasks each auditor must do to protect the PII.
  • The Board, The Auditor and BCP Recorded: Jan 22 2014 50 mins
    As a member of several corporate boards, Dr. Aggarwal is well aware of the responsibilities of being a board of directors member. One of the primary responsibilities, according to Tom Horton (“Directors & Boards” author), is to secure the future of the organization. According to Mr. Horton, the very survival of the organization depends on the ability of the board and management not only to cope with future events but to anticipate the impact those events will have on both the company and the industry as a whole.”
    According to Dr. Aggarwal, it is incumbent on directors to demand information and insight that will help them secure the future of the organization—which could be everything from the seemingly most innocuous moves by a competitor to the most threatening moves by a foreign nation potentate.
    Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) are a couple topics about which the directors should demand information and insight. When is the last time these two topics were discussed during your board meeting? You could have discussed the succession plan of a CEO as part of business continuity. But with BCP and DRP, we are implying the readiness of your organization in event of a natural or man-made disasters.
    In this webinar, Dr. Aggarwal will provide a series of ten questions which every board member must consider, and every internal auditor must be prepared to answer.
  • Apple’s iOS7 security features – must for every auditor Recorded: Oct 23 2013 52 mins
    Most of you are probably excited about the new release of Apple’s operating system, iOS7. This operating system not only has enhanced user features but has several cool security features. Jeff Ingalsbe will present the key security enhancements in iOS7 and identify those features which every auditor must know and understand.

    Jeff Ingalsbe is an Assistant Professor, Department Chair, and Director of University of Detroit Mercy’s “Center for Cyber Security and Intelligence Studies.” Mr. Ingalsbe runs a state-of-the-art cyber security laboratory where students gain real world competencies through exploration of cyber security problems. Until recently, Mr. Ingalsbe managed the Information Technology Security Consulting Group at Ford Motor Company. He was involved in information security solutions for the enterprise, consumerization exploration, threat modeling efforts, and strategic security research. His BSEE and MSCIS degrees are from Michigan Technological University and the University of Detroit Mercy, respectively. He is currently working on a PhD Information Systems Engineering at the University of Michigan Dearborn.
  • Foreign Exchange Risk Management Webinar Recorded: Sep 25 2013 59 mins
    This webinar will cover the details of assessing and managing risks of changing currencies.
    Some of the major topics covered in this webinar will include:
    •Why Exchange Rates Change?
    •Changing Exchange Rates, Trade, and Investment
    •Corporate Impact of Exchanges Rate Changes
    •Determining Transactions, Translation, and Economic Exposures
    •Financial Hedging of Net Exchange Rate Risks
    •Operational Hedging of Net Exchange Rate Risks
    •Audit Considerations in Exchange Rate Risk Management
  • Developing World Class Process Maps Recorded: May 22 2013 64 mins
    Mapping process flows is critical to understanding, documenting, and improving your processes. Learn how to develop world-class business process maps that highlight automation, best practices, manual steps, task assignment, activities of internal partners and external vendors, and more while ensuring accurate documentation and key participant input. This session will demystify the complexity around process mapping and provide hands on tools and tips that you can begin using immediately.
  • Critical Success Factors and Integration Key Drivers Webinar Recorded: Feb 13 2013 64 mins
    Leveraging Analytics in IA – Critical Success Factors and Integration Key Drivers
    This webinar will assist participants in developing a roadmap to accelerate the integration of analytics within the internal audit function. During this webinar participants will learn how characteristics of their organization's strategic vision, business environment and technology impact the use of analytics. By understanding these characteristics, or critical success factors, internal audit can determine the type of analytic they should use to support various audits.
    During this webinar we will also discuss the types of audit evidence supported by different forms of analytics, and what internal audit should do to accelerate the integration of analytics into the audit when they work in an analytic "friendly" organization. We will also discuss techniques internal audit can use to help organizations develop good analytic practices and become analytic “friendly.”
  • 2013 and Beyond: Staying One Step Ahead of Reporting and Regulatory Changes Recorded: Jan 16 2013 56 mins
    The dynamic nature of accounting standards, filing rules and financial market regulations demands that you stay one step ahead of the changes. This presentation will provide an overview of accounting and compliance requirements with a focus on two elements of a myriad of critical items to consider in your financial reporting and internal audits for 2013 – the JOBS Act and Conflict Minerals.
    •JOBS Act: Establishes SEC requirements for emerging growth companies that makes it easier to raise capital and provides an IPO ‘on-ramp’ to phase in certain requirements.
    •Conflict Minerals Rule: Mandated by the Dodd-Frank Act with direct impact to half of all public companies including technology, automotive, and industrial products industries.
    Learn how these and other changes may impact your audit scope and work plans and why you must partner with your accounting organization to stay one step ahead.
  • Auditing the Management and Security of Smart Devices Webinar Recorded: Nov 14 2012 56 mins
    According to some of the industry experts, the security and management of smart devices like iPads, iPhones and Android phones are quickly becoming the weakest link in most organizations. The internal auditors would like to audit the management and security of these devices and are looking for a structured audit approach.
  • Data Loss Prevention Recorded: Jul 23 2012 45 mins
    The third webinar ion the series will focus on protecting the data which has been classified. This webinar will discuss the examples of how a DLP solution can assist in protecting and monitoring the classified data.
  • Information Security Series: Operationalizing the data classification program Recorded: Jun 18 2012 65 mins
    The second webinar in the series will focus on operationalizing the data classification program by rolling out the program to the different business units. This webinar will take an example of a software and show how the documents and folders can be classified (labeled).
  • Information Security Series: Data Classification Program Recorded: May 3 2012 50 mins
    The first webinar in the series will discuss the ingredients to define a data classification policy and expand operational procedures to assist data owners in classifying the data. This classification is the first step in identifying the “crown jewels” for an organization. Some of the topics covered by the webinar will include:

    - Data Classification Policy and examples

    - Process of classifying data (and examples on how to classify data)

    - Process of labeling classified data (Example of SharePoint for Microsoft classified documents)

    - Discussion of role of a data owner
  • Importance / Key Aspects of Spreadsheet Controls Recorded: Apr 25 2012 59 mins
    Spreadsheets are used extensively throughout an organization to collect, analyze, and report on data used for financial reporting, financial planning & analysis, operations, and performance metrics. This webinar will help internal auditors at all levels, as well as spreadsheet owners within the business units, understand the scope of risks to consider. We will discuss how to work within your organization to ensure that practices are in place to:

    -Identify the spreadsheets at greatest risk of error
    -Identify the most likely candidates for fraud
    -Mitigate the risks, and
    -Implement a policy that can contribute to the development of more efficient and user-friendly spreadsheets.
  • Transition from SAS-70 to the New SSAE-16 Recorded: Nov 10 2011 59 mins
    In 2010, the AICPA issued SSAE No. 16, Reporting on Controls at a Service Organization, which replaced SAS 70. Most organizations outsource certain tasks and functions to at least one service organization. Therefore, many risks of the service organization become risks of the user entity. SSAE 16 reports are intended to provide an objective evaluation of the effectiveness of controls at the service organization. Join us to discuss:
    * Why the change to SSAE16
    * Similarities & Differences between SAS70 & SSAE16
    * Impacts of the change to Internal Audit Organizations
    * Common pitfalls / value adds / best practices
    * Broad Standards (SSAE 16, SOC, AT101) and how they relate
Live Chapter meeting on internal auditing, risk management and control
Lively topics for new and seasoned internal auditors, students and others are presented montlhly between September and May.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Importance / Key Aspects of Spreadsheet Controls
  • Live at: Apr 25 2012 4:00 pm
  • Presented by: Chris Mishler
  • From:
Your email has been sent.
or close
You must be logged in to email this