Audit of systems and processes

In today’s world, information systems and financial reporting processes are becoming increasingly complex, and users’ dependence on the information generated by these systems and processes is growing. In addition, new regulations adopted by a number of countries place great emphasis on the requirements for internal control systems, including, in many cases, requirements for an independent audit of the effectiveness of such systems.

Issues related to the organization, documentation and operation of control systems and procedures should be a constant focus of attention. This is critical to ensuring that information used for financial reporting and management decision-making purposes is presented in a reliable and timely manner.

  • You need assurance about the quality of information generated by your information systems
  • You need assistance in documenting or testing your internal control system and procedures in the area of financial reporting
  • You need an independent review of your internal control procedures, including identification of weaknesses and possible improvements
  • You use third-party financial information and need an independent audit of this information
  • You are implementing or have just completed the implementation of a new information system (e.g., SAP, Oracle, 1C and other ERP systems) and plan to analyze the systems and control procedures.

Within the framework of the Risk Analysis and Control and Internal Audit Services, we provide expertise in internal control systems, including control procedures in financial business processes, information systems management, and technology processes. These services are offered as part of an audit or as separate consulting projects:

  • Analysis and evaluation of financial and operational control procedures in information systems and business processes
  • Analysis and evaluation of control procedures ensuring database security
  • Analysis and evaluation of general IT control procedures
  • Analysis and evaluation of IT infrastructure security
  • Analysis and evaluation of information systems before and after implementation
  • Analysis and evaluation of project management before and after implementation
  • Analysis and evaluation of information security