<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>Risk Insights Blogcast (Spoken blog articles)</title>
		<link>https://riskinsightsblogcast.substack.com/podcast</link>
		<atom:link href="https://feeds.acast.com/public/shows/6401d7fffe3f500011e9f815" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>Risk Insights Pty. Ltd.</copyright>
		<itunes:keywords/>
		<itunes:author>Risk Insights</itunes:author>
		<itunes:subtitle>Risk Insights blog articles converted to audio form</itunes:subtitle>
		<itunes:summary><![CDATA[<p>Risk Insights blog articles converted to audio form </p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[<p>Risk Insights blog articles converted to audio form </p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Yusuf Moolla</itunes:name>
			<itunes:email>info+6401d7fffe3f500011e9f815@mg-eu.acast.com</itunes:email>
		</itunes:owner>
		<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
		<acast:showUrl>risk-insights-blogcast-spoken-blog-articles-1</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="6401ce64fd9182001176bbf3" slug="yusuf-moolla"><![CDATA[Yusuf Moolla]]></acast:network>
		<acast:importedFeed>https://api.substack.com/feed/podcast/1035351.rss</acast:importedFeed>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/show-cover.jpg"/>
			<image>
				<url>https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/show-cover.jpg</url>
				<link>https://riskinsightsblogcast.substack.com/podcast</link>
				<title>Risk Insights Blogcast (Spoken blog articles)</title>
			</image>
			<itunes:new-feed-url>https://feeds.acast.com/public/shows/6401d7fffe3f500011e9f815</itunes:new-feed-url>
		<item>
			<title>The Data-Confident Internal Auditor: Software</title>
			<itunes:title>The Data-Confident Internal Auditor: Software</itunes:title>
			<pubDate>Wed, 19 Jan 2022 19:00:00 GMT</pubDate>
			<itunes:duration>6:43</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-9920353/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-9920353</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/the-data-confident-internal-auditor-8b7</link>
			<acast:episodeId>6401d8064cfcac00119a9ddd</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDKO9FvXJW+REe1aWiEOp3+o]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9ddd.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.</p><p>The original article was published here: <a href="https://riskinsights.com.au/blog/data-confident-internal-auditor-software" rel="noopener noreferrer" target="_blank">https://riskinsights.com.au/blog/data-confident-internal-auditor-software</a></p><p>In this episode, we discuss software for using data in audit.</p><p>Links:&nbsp;</p><ul><li><a href="https://www.riskinsights.com.au/blog" rel="noopener noreferrer" target="_blank">Risk Insights Blog</a></li><li><a href="https://www.knime.com/" rel="noopener noreferrer" target="_blank">KNIME</a></li><li><a href="https://powerbi.microsoft.com/en-us/" rel="noopener noreferrer" target="_blank">Power BI</a></li></ul><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal" rel="noopener noreferrer" target="_blank">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/" rel="noopener noreferrer" target="_blank">data-confident.com</a>.&nbsp;</p><p>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance.&nbsp;</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.</p><p>The original article was published here: <a href="https://riskinsights.com.au/blog/data-confident-internal-auditor-software" rel="noopener noreferrer" target="_blank">https://riskinsights.com.au/blog/data-confident-internal-auditor-software</a></p><p>In this episode, we discuss software for using data in audit.</p><p>Links:&nbsp;</p><ul><li><a href="https://www.riskinsights.com.au/blog" rel="noopener noreferrer" target="_blank">Risk Insights Blog</a></li><li><a href="https://www.knime.com/" rel="noopener noreferrer" target="_blank">KNIME</a></li><li><a href="https://powerbi.microsoft.com/en-us/" rel="noopener noreferrer" target="_blank">Power BI</a></li></ul><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal" rel="noopener noreferrer" target="_blank">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/" rel="noopener noreferrer" target="_blank">data-confident.com</a>.&nbsp;</p><p>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance.&nbsp;</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Small datasets for audits: 5 ways to extract value</title>
			<itunes:title>Small datasets for audits: 5 ways to extract value</itunes:title>
			<pubDate>Wed, 12 Jan 2022 19:00:00 GMT</pubDate>
			<itunes:duration>12:20</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-9920004/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-9920004</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/small-datasets-for-audits-5-ways-13f</link>
			<acast:episodeId>6401d8064cfcac00119a9dde</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJahZKoBnF4wkrAladjxAAZ]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9dde.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.</p><p>The original article was published here: <a href="https://riskinsights.com.au/blog/small-data-5-ways-to-extract-value/" rel="noopener noreferrer" target="_blank">https://riskinsights.com.au/blog/small-data-5-ways-to-extract-value/</a>&nbsp;</p><p>In this episode, we discuss the use of small datasets for audits, and 5 ways that auditors can extract value from smaller sets of data.</p><p>Links:&nbsp;</p><ul><li><a href="https://www.riskinsights.com.au/blog" rel="noopener noreferrer" target="_blank">Risk Insights Blog</a></li><li>&nbsp;<a href="https://opendatahandbook.org/value-stories/en/saving-4-million-pounds-in-15-minutes/" rel="noopener noreferrer" target="_blank">The UK Government used open data to save £4m in 15 minutes</a></li></ul><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal" rel="noopener noreferrer" target="_blank">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/" rel="noopener noreferrer" target="_blank">data-confident.com</a>.&nbsp;</p><p>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance.&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.</p><p>The original article was published here: <a href="https://riskinsights.com.au/blog/small-data-5-ways-to-extract-value/" rel="noopener noreferrer" target="_blank">https://riskinsights.com.au/blog/small-data-5-ways-to-extract-value/</a>&nbsp;</p><p>In this episode, we discuss the use of small datasets for audits, and 5 ways that auditors can extract value from smaller sets of data.</p><p>Links:&nbsp;</p><ul><li><a href="https://www.riskinsights.com.au/blog" rel="noopener noreferrer" target="_blank">Risk Insights Blog</a></li><li>&nbsp;<a href="https://opendatahandbook.org/value-stories/en/saving-4-million-pounds-in-15-minutes/" rel="noopener noreferrer" target="_blank">The UK Government used open data to save £4m in 15 minutes</a></li></ul><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal" rel="noopener noreferrer" target="_blank">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/" rel="noopener noreferrer" target="_blank">data-confident.com</a>.&nbsp;</p><p>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance.&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>4 ways to approach the use of data: internal audit and performance audit</title>
			<itunes:title>4 ways to approach the use of data: internal audit and performance audit</itunes:title>
			<pubDate>Tue, 25 Aug 2020 08:00:00 GMT</pubDate>
			<itunes:duration>13:53</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-5139016/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-5139016</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/4-ways-to-approach-the-use-of-data-2f6</link>
			<acast:episodeId>6401d8064cfcac00119a9ddf</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDLJCb0W3M5rcnnp86R0YEyc]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9ddf.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog/4-audit-data-approaches">https://www.riskinsights.com.au/blog/4-audit-data-approaches</a><br/><br/>In this episode, we discuss four broad approaches to using data as part of audits.  These apply to both internal audit projects and performance audits.<br/><br/>Links: </p><ul><li><a href="https://www.riskinsights.com.au/blog">Risk Insights Blog</a></li><li><a href="https://www.ctdatacollaborative.org/map?type=ctdc">Counter-Trafficking Data Collaborative (CTDC)</a></li></ul><p><br/><em>Note: The original article contains an image and a visual.<br/>This audio version of the article includes a short explanation of each, but it would be easiest to see them in original form in the written version of the blog (link above).</em></p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog/4-audit-data-approaches">https://www.riskinsights.com.au/blog/4-audit-data-approaches</a><br/><br/>In this episode, we discuss four broad approaches to using data as part of audits.  These apply to both internal audit projects and performance audits.<br/><br/>Links: </p><ul><li><a href="https://www.riskinsights.com.au/blog">Risk Insights Blog</a></li><li><a href="https://www.ctdatacollaborative.org/map?type=ctdc">Counter-Trafficking Data Collaborative (CTDC)</a></li></ul><p><br/><em>Note: The original article contains an image and a visual.<br/>This audio version of the article includes a short explanation of each, but it would be easiest to see them in original form in the written version of the blog (link above).</em></p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Why you shouldn’t avoid efficiency audits, and how to tackle the objections</title>
			<itunes:title>Why you shouldn’t avoid efficiency audits, and how to tackle the objections</itunes:title>
			<pubDate>Sun, 28 Jun 2020 23:00:00 GMT</pubDate>
			<itunes:duration>12:50</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-4355006/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-4355006</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/why-you-shouldnt-avoid-efficiency-aa1</link>
			<acast:episodeId>6401d8064cfcac00119a9de0</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJ7l6Koj4VV3klUKSXu7Ajl]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9de0.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/efficiency-audits">https://www.riskinsights.com.au/blog-1/efficiency-audits</a><br/><br/>In this episode, we discuss why auditors should include efficiency audits and how to tackle the common objections to conducting efficiency audits.<br/><br/><em>Note: The original article contains an Auditviz (a data visualization).  <br/>This audio version of the article includes a short explanation of the graph, but it would be easiest to see the graph in its original form in the written version of the blog (link above).</em></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/efficiency-audits">https://www.riskinsights.com.au/blog-1/efficiency-audits</a><br/><br/>In this episode, we discuss why auditors should include efficiency audits and how to tackle the common objections to conducting efficiency audits.<br/><br/><em>Note: The original article contains an Auditviz (a data visualization).  <br/>This audio version of the article includes a short explanation of the graph, but it would be easiest to see the graph in its original form in the written version of the blog (link above).</em></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>A broader perspective on how auditors can use data for efficiency</title>
			<itunes:title>A broader perspective on how auditors can use data for efficiency</itunes:title>
			<pubDate>Wed, 03 Jun 2020 12:00:00 GMT</pubDate>
			<itunes:duration>12:42</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-4026323/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-4026323</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/a-broader-perspective-on-how-auditors-5b8</link>
			<acast:episodeId>6401d8064cfcac00119a9de1</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJgVWJstKFmRh/UNbvIAbIu]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9de1.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/data-for-efficiency-in-audit">https://www.riskinsights.com.au/blog-1/data-for-efficiency-in-audit</a><br/><br/>In this episode, we discuss how auditors could use data to achieve four separate sets of efficiency outcomes.  For the audit team and for their organizations and stakeholders.<br/><br/><em>Note: This article contains an Auditviz (a data visualization). For this audio version of the article, we will provide a short explanation of the graph, but it would be easiest to see the graph in its original form in the written version of the blog (link above).<br/></em><br/></p><p>Other links mentioned in the article:</p><ul><li><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-5">share intel and data among the team</a></li><li><a href="https://www.riskinsights.com.au/blog-1/going-beyond-the-initial-remedial-action">going beyond the initial remedial action</a></li></ul><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/data-for-efficiency-in-audit">https://www.riskinsights.com.au/blog-1/data-for-efficiency-in-audit</a><br/><br/>In this episode, we discuss how auditors could use data to achieve four separate sets of efficiency outcomes.  For the audit team and for their organizations and stakeholders.<br/><br/><em>Note: This article contains an Auditviz (a data visualization). For this audio version of the article, we will provide a short explanation of the graph, but it would be easiest to see the graph in its original form in the written version of the blog (link above).<br/></em><br/></p><p>Other links mentioned in the article:</p><ul><li><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-5">share intel and data among the team</a></li><li><a href="https://www.riskinsights.com.au/blog-1/going-beyond-the-initial-remedial-action">going beyond the initial remedial action</a></li></ul><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Crisis as an opportunity to reset strategic assurance priorities</title>
			<itunes:title>Crisis as an opportunity to reset strategic assurance priorities</itunes:title>
			<pubDate>Fri, 17 Apr 2020 08:00:00 GMT</pubDate>
			<itunes:duration>5:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-3393958/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-3393958</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/crisis-as-an-opportunity-to-reset-c8d</link>
			<acast:episodeId>6401d8064cfcac00119a9de2</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJN/3EV0IL8zl/1lpKT72vs]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9de2.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/crisis-as-an-opportunity-to-reset-strategic-assurance-priorities">https://www.riskinsights.com.au/blog-1/crisis-as-an-opportunity-to-reset-strategic-assurance-priorities</a><br/><br/>In this episode, we discuss how crises present new challenges and opportunities for assurance leaders.<br/><br/></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/crisis-as-an-opportunity-to-reset-strategic-assurance-priorities">https://www.riskinsights.com.au/blog-1/crisis-as-an-opportunity-to-reset-strategic-assurance-priorities</a><br/><br/>In this episode, we discuss how crises present new challenges and opportunities for assurance leaders.<br/><br/></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Principle 3: Maximizing benefits - data and analytics governance within Internal Audit</title>
			<itunes:title>Principle 3: Maximizing benefits - data and analytics governance within Internal Audit</itunes:title>
			<pubDate>Thu, 26 Mar 2020 13:00:00 GMT</pubDate>
			<itunes:duration>6:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-3130561/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-3130561</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/principle-3-maximizing-benefits-data-90d</link>
			<acast:episodeId>6401d8064cfcac00119a9de3</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJ1l4hBk0bMrB19KfJdTz2N]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9de3.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-5">https://www.riskinsights.com.au/blog-1/audit-data-governance-5</a><br/><br/>In this episode, we discuss principle 3: Maximizing benefits - data and analytics within Internal Audit.<br/><br/>Links in the article:</p><p>1.   Why you need to govern the use of data, within the I.A. team, in a <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance">different way</a>.</p><p>2.   Why we must share data, that is collected or used for audits, with the <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-2">whole audit team</a>.</p><p>3.   Principle 1: <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-3">Security and open access</a>.</p><p>4.   Principle 2: <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-4">Quality</a>.</p><p>5.   <a href="https://www.riskinsights.com.au/blog-1/5-assurance-analytics-challenges">5 core assurance analytics challenges</a></p><p>6.   &quot;false positives&quot; approach in <a href="https://www.riskinsights.com.au/blog-1/audit-analytics-reducing-noise-false-positives">this article.</a></p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-5">https://www.riskinsights.com.au/blog-1/audit-data-governance-5</a><br/><br/>In this episode, we discuss principle 3: Maximizing benefits - data and analytics within Internal Audit.<br/><br/>Links in the article:</p><p>1.   Why you need to govern the use of data, within the I.A. team, in a <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance">different way</a>.</p><p>2.   Why we must share data, that is collected or used for audits, with the <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-2">whole audit team</a>.</p><p>3.   Principle 1: <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-3">Security and open access</a>.</p><p>4.   Principle 2: <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-4">Quality</a>.</p><p>5.   <a href="https://www.riskinsights.com.au/blog-1/5-assurance-analytics-challenges">5 core assurance analytics challenges</a></p><p>6.   &quot;false positives&quot; approach in <a href="https://www.riskinsights.com.au/blog-1/audit-analytics-reducing-noise-false-positives">this article.</a></p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Principle 2 – Quality - for data and analytics governance within the IA function (DGIA#4)</title>
			<itunes:title>Principle 2 – Quality - for data and analytics governance within the IA function (DGIA#4)</itunes:title>
			<pubDate>Mon, 02 Mar 2020 03:00:00 GMT</pubDate>
			<itunes:duration>6:31</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2888530/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2888530</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/principle-2-quality-for-data-and-f69</link>
			<acast:episodeId>6401d8064cfcac00119a9de4</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDIhybGn4njJEOZpwHz7FEmy]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9de4.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-4">https://www.riskinsights.com.au/blog-1/audit-data-governance-4</a><br/><br/>In this episode, we discuss principle #2 – Quality - for data and analytics governance within the Internal Audit function.<br/><br/>Links in the article:</p><p>1.    Why the use of data within the IA team (e.g., for audits) <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance">should be specifically, and differently, governed.</a> </p><p>2.    A point of view about keeping access to data - that is collected or used by the audit team - <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-2">open to the whole audit team</a>, where appropriate.</p><p>3.    The <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-3">3 key principles</a> and principle 1 in detail.</p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-4">https://www.riskinsights.com.au/blog-1/audit-data-governance-4</a><br/><br/>In this episode, we discuss principle #2 – Quality - for data and analytics governance within the Internal Audit function.<br/><br/>Links in the article:</p><p>1.    Why the use of data within the IA team (e.g., for audits) <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance">should be specifically, and differently, governed.</a> </p><p>2.    A point of view about keeping access to data - that is collected or used by the audit team - <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-2">open to the whole audit team</a>, where appropriate.</p><p>3.    The <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-3">3 key principles</a> and principle 1 in detail.</p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>3 key principles for data and analytics governance within IA (DGIA #3)</title>
			<itunes:title>3 key principles for data and analytics governance within IA (DGIA #3)</itunes:title>
			<pubDate>Sun, 16 Feb 2020 18:00:00 GMT</pubDate>
			<itunes:duration>7:00</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2733916/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2733916</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/3-key-principles-for-data-and-analytics-1ce</link>
			<acast:episodeId>6401d8064cfcac00119a9de5</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJq6+zzQmx5bZwNC1Nl19ND]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9de5.jpg"/>
			<description><![CDATA[<p>3 key principles for Data and analytics Governance within Internal Audit (DGIA).<br/>A core set of guidelines that we, as internal audit professionals, can check ourselves against in planning for and using data and analytics.<br/><br/>This is an audio version of <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-3">this blog article</a> - the 3rd in the DGIA (Data and analytics Governance within Internal Audit) series.<br/> <br/><b>LINKS</b></p><ul><li><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-3">This article (the original written version)</a></li><li><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-1">The first article in the DGIA series</a></li><li><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-2">The second article in the DGIA series</a></li><li><a href="https://na.theiia.org/standards-guidance/mandatory-guidance/Pages/Core-Principles-for-the-Professional-Practice-of-Internal-Auditing.aspx.">The Core Principles for the Professional Practice of Internal Auditing, as articulated by the Institute of Internal Auditors. Accessed here, at the time of publication of this article</a></li></ul><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>3 key principles for Data and analytics Governance within Internal Audit (DGIA).<br/>A core set of guidelines that we, as internal audit professionals, can check ourselves against in planning for and using data and analytics.<br/><br/>This is an audio version of <a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-3">this blog article</a> - the 3rd in the DGIA (Data and analytics Governance within Internal Audit) series.<br/> <br/><b>LINKS</b></p><ul><li><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-3">This article (the original written version)</a></li><li><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-1">The first article in the DGIA series</a></li><li><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-2">The second article in the DGIA series</a></li><li><a href="https://na.theiia.org/standards-guidance/mandatory-guidance/Pages/Core-Principles-for-the-Professional-Practice-of-Internal-Auditing.aspx.">The Core Principles for the Professional Practice of Internal Auditing, as articulated by the Institute of Internal Auditors. Accessed here, at the time of publication of this article</a></li></ul><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Are you augmenting your team (value, satisfaction) or just automating your processes (cost)</title>
			<itunes:title>Are you augmenting your team (value, satisfaction) or just automating your processes (cost)</itunes:title>
			<pubDate>Wed, 05 Feb 2020 19:00:00 GMT</pubDate>
			<itunes:duration>4:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2631166/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2631166</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/are-you-augmenting-your-team-value-717</link>
			<acast:episodeId>6401d8064cfcac00119a9de6</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDKXow0SLwGHDFSOh9j6dz9H]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9de6.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/augment-team-vs-automate-process">https://www.riskinsights.com.au/blog-1/augment-team-vs-automate-process</a><br/><br/>In this episode, we explore what internal auditors need to consider when automating for audit purposes and when involved in audit activities related to the business adoption of automation.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/augment-team-vs-automate-process">https://www.riskinsights.com.au/blog-1/augment-team-vs-automate-process</a><br/><br/>In this episode, we explore what internal auditors need to consider when automating for audit purposes and when involved in audit activities related to the business adoption of automation.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Why performance audits (and performance focused internal audits) are critical to creating and sustaining Public Value</title>
			<itunes:title>Why performance audits (and performance focused internal audits) are critical to creating and sustaining Public Value</itunes:title>
			<pubDate>Tue, 04 Feb 2020 19:00:00 GMT</pubDate>
			<itunes:duration>6:02</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2636044/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2636044</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/why-performance-audits-and-performance-d62</link>
			<acast:episodeId>6401d8064cfcac00119a9de7</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDKnmK4UIXWZwPJFutgVPtNK]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9de7.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/performance-audits-creating-sustaining-public-value">https://www.riskinsights.com.au/blog-1/performance-audits-creating-sustaining-public-value</a></p><p>In this episode, we explore the role that performance auditors and internal auditors play in sustaining public value.<br/><br/>This article is for:                             </p><ul><li><b>Performance Auditors,</b> to help explore their critical role in sustaining Public Value.</li><li><b>Internal Auditors,</b> in conducting performance audits (i.e., assessing economy and efficiency within their organisations).</li></ul><p>Links and resources mentioned in the article:</p><ul><li><em>Creating Public Value: Strategic Management in Government</em>, Mark Moore, 1995, Harvard University Press</li><li>Use of community voting on projects - Victoria’s <a href="https://pickmyproject.vic.gov.au/successful-projects"><b><em>Pick my Project</em></b></a></li><li>Public involvement in program design - Auckland’s <a href="https://www.aucklandco-lab.nz/"><b><em>Co-design lab</em></b></a></li><li>Ongoing refinement of proposed new public services - the UK’s <a href="https://openpolicy.blog.gov.uk/"><b><em>Policy Lab</em></b></a></li></ul> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/performance-audits-creating-sustaining-public-value">https://www.riskinsights.com.au/blog-1/performance-audits-creating-sustaining-public-value</a></p><p>In this episode, we explore the role that performance auditors and internal auditors play in sustaining public value.<br/><br/>This article is for:                             </p><ul><li><b>Performance Auditors,</b> to help explore their critical role in sustaining Public Value.</li><li><b>Internal Auditors,</b> in conducting performance audits (i.e., assessing economy and efficiency within their organisations).</li></ul><p>Links and resources mentioned in the article:</p><ul><li><em>Creating Public Value: Strategic Management in Government</em>, Mark Moore, 1995, Harvard University Press</li><li>Use of community voting on projects - Victoria’s <a href="https://pickmyproject.vic.gov.au/successful-projects"><b><em>Pick my Project</em></b></a></li><li>Public involvement in program design - Auckland’s <a href="https://www.aucklandco-lab.nz/"><b><em>Co-design lab</em></b></a></li><li>Ongoing refinement of proposed new public services - the UK’s <a href="https://openpolicy.blog.gov.uk/"><b><em>Policy Lab</em></b></a></li></ul> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Data warehouse (DW) projects - as an auditor, have you been asked to get involved in a big bang DW project?</title>
			<itunes:title>Data warehouse (DW) projects - as an auditor, have you been asked to get involved in a big bang DW project?</itunes:title>
			<pubDate>Mon, 03 Feb 2020 19:00:00 GMT</pubDate>
			<itunes:duration>3:41</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2624968/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2624968</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/data-warehouse-dw-projects-as-an-743</link>
			<acast:episodeId>6401d8064cfcac00119a9de8</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDIihKVq+gilO+Cri1Oa/4Xw]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9de8.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.</p><p>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/big-bang-data-warehouse-projects">https://www.riskinsights.com.au/blog-1/big-bang-data-warehouse-projects</a></p><p><br/>In this episode, we explore what internal auditors need to consider regarding big bang data warehouse projects.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.</p><p>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/big-bang-data-warehouse-projects">https://www.riskinsights.com.au/blog-1/big-bang-data-warehouse-projects</a></p><p><br/>In this episode, we explore what internal auditors need to consider regarding big bang data warehouse projects.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Controlling access to data within the audit team – open or closed? (DGIA #2)</title>
			<itunes:title>Controlling access to data within the audit team – open or closed? (DGIA #2)</itunes:title>
			<pubDate>Mon, 03 Feb 2020 05:00:00 GMT</pubDate>
			<itunes:duration>6:43</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2643160/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2643160</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/controlling-access-to-data-within-90c</link>
			<acast:episodeId>6401d8064cfcac00119a9de9</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDICE1utA1ersIMU6XVO9d/o]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9de9.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-2">https://www.riskinsights.com.au/blog-1/audit-data-governance-2</a><br/><br/>In this episode, we discuss control over access to data within the audit team – that is, should you open data access up to the whole audit team or restrict access based on need.<br/><br/>This is the 2nd article in the DGIA (Data and analytics Governance within Internal Audit) series.<br/><br/>Link in the article: <a href="https://www.riskinsights.com.au/blog-1/openaccess">“More access to data to reduce risk and enhance business decisions”</a></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance-2">https://www.riskinsights.com.au/blog-1/audit-data-governance-2</a><br/><br/>In this episode, we discuss control over access to data within the audit team – that is, should you open data access up to the whole audit team or restrict access based on need.<br/><br/>This is the 2nd article in the DGIA (Data and analytics Governance within Internal Audit) series.<br/><br/>Link in the article: <a href="https://www.riskinsights.com.au/blog-1/openaccess">“More access to data to reduce risk and enhance business decisions”</a></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Corruption agencies and Investigators can cost-effectively use data to generate deep insights</title>
			<itunes:title>Corruption agencies and Investigators can cost-effectively use data to generate deep insights</itunes:title>
			<pubDate>Thu, 30 Jan 2020 19:00:00 GMT</pubDate>
			<itunes:duration>3:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2583994/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2583994</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/corruption-agencies-and-investigators-d87</link>
			<acast:episodeId>6401d8064cfcac00119a9dea</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDLJaiITjCnwwWJaX/fn/si+]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9dea.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.</p><p>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/investigators-and-corruption-agencies-can-cost-effectively-generate-deep-insights-from-data">https://www.riskinsights.com.au/blog-1/investigators-and-corruption-agencies-can-cost-effectively-generate-deep-insights-from-data</a></p><p>In this episode, we explore how corruption agencies and Investigators can cost-effectively use data to generate deep insights.</p><p>Links mentioned in the article:</p><ul><li><a href="https://www.nsw.ipaa.org.au/2018NationalInvestigationSymposium">Nov 2018 National Investigations Symposium (NIS)</a> in Sydney.</li><li>machine learning can help <a href="https://www.riskinsights.com.au/blog-1/post/3-internal-audit-analytics-reducing-noise-and-false-positives-a-contemporary-approach-part-1">reduce false positives</a>.</li><li>4 years of financial data from <a href="http://qcd.hpw.qld.gov.au/Pages/AwardedContracts.aspx">here</a>.</li><li>Crime and Corruption Commission (Queensland, Australia) <a href="https://www.ccc.qld.gov.au/corruption/corruption-allegations-data-dashboard">corruption allegations dashboard</a>.</li></ul> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.</p><p>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/investigators-and-corruption-agencies-can-cost-effectively-generate-deep-insights-from-data">https://www.riskinsights.com.au/blog-1/investigators-and-corruption-agencies-can-cost-effectively-generate-deep-insights-from-data</a></p><p>In this episode, we explore how corruption agencies and Investigators can cost-effectively use data to generate deep insights.</p><p>Links mentioned in the article:</p><ul><li><a href="https://www.nsw.ipaa.org.au/2018NationalInvestigationSymposium">Nov 2018 National Investigations Symposium (NIS)</a> in Sydney.</li><li>machine learning can help <a href="https://www.riskinsights.com.au/blog-1/post/3-internal-audit-analytics-reducing-noise-and-false-positives-a-contemporary-approach-part-1">reduce false positives</a>.</li><li>4 years of financial data from <a href="http://qcd.hpw.qld.gov.au/Pages/AwardedContracts.aspx">here</a>.</li><li>Crime and Corruption Commission (Queensland, Australia) <a href="https://www.ccc.qld.gov.au/corruption/corruption-allegations-data-dashboard">corruption allegations dashboard</a>.</li></ul> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Five common organisational factors that lead to successful performance of integrity and oversight agencies</title>
			<itunes:title>Five common organisational factors that lead to successful performance of integrity and oversight agencies</itunes:title>
			<pubDate>Wed, 29 Jan 2020 19:00:00 GMT</pubDate>
			<itunes:duration>3:34</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2578159/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2578159</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/five-common-organisational-factors-ffa</link>
			<acast:episodeId>6401d8064cfcac00119a9deb</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDK2C1K3RymSEYtEovGjB9pC]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9deb.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/integrity-and-oversight-agencies-dna">https://www.riskinsights.com.au/blog-1/integrity-and-oversight-agencies-dna</a></p><p>In this episode, we outline five common organisational factors that lead to successful performance of integrity and oversight agencies.</p><p>Mentioned in this article:</p><ul><li>Integrity agencies: This includes, among others, anti-corruption agencies, auditors-general, ombudsmen, integrity and public sector standards commissions.</li><li><a href="https://twitter.com/APSACC">Australian Public Sector Anti-Corruption Conference</a> (on twitter)</li></ul> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/integrity-and-oversight-agencies-dna">https://www.riskinsights.com.au/blog-1/integrity-and-oversight-agencies-dna</a></p><p>In this episode, we outline five common organisational factors that lead to successful performance of integrity and oversight agencies.</p><p>Mentioned in this article:</p><ul><li>Integrity agencies: This includes, among others, anti-corruption agencies, auditors-general, ombudsmen, integrity and public sector standards commissions.</li><li><a href="https://twitter.com/APSACC">Australian Public Sector Anti-Corruption Conference</a> (on twitter)</li></ul> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Key organisational characteristics in determining overall fraud risk profiles (the fraud merry-go-round: can you stay off?)</title>
			<itunes:title>Key organisational characteristics in determining overall fraud risk profiles (the fraud merry-go-round: can you stay off?)</itunes:title>
			<pubDate>Tue, 28 Jan 2020 19:00:00 GMT</pubDate>
			<itunes:duration>2:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2576806/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2576806</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/key-organisational-characteristics-a5e</link>
			<acast:episodeId>6401d8064cfcac00119a9dec</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDKixFwLxS4vTtA5aRgrHzNv]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9dec.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/the-fraud-merry-go-round">https://www.riskinsights.com.au/blog-1/the-fraud-merry-go-round</a><br/><br/>In this episode, we briefly outline key organisational characteristics in determining overall fraud risk profiles.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/the-fraud-merry-go-round">https://www.riskinsights.com.au/blog-1/the-fraud-merry-go-round</a><br/><br/>In this episode, we briefly outline key organisational characteristics in determining overall fraud risk profiles.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Agility in Internal Auditing - Part 2 (of 2)</title>
			<itunes:title>Agility in Internal Auditing - Part 2 (of 2)</itunes:title>
			<pubDate>Mon, 27 Jan 2020 19:00:00 GMT</pubDate>
			<itunes:duration>4:12</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2578840/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2578840</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/agility-in-internal-auditing-part-a12</link>
			<acast:episodeId>6401d8064cfcac00119a9ded</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDITNRHcBeAbmdd2zOw14iPR]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9ded.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/> <br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/agile-internal-audit-part2">https://www.riskinsights.com.au/blog-1/agile-internal-audit-part2</a><br/> <br/> In this episode, we explore how internal audit can operate in tandem with other business units. That is, adopting similar project delivery approaches to deliver audits that are focused on outcomes for the customer, increasing value.  This is part two of a two-part episode.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/> <br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/agile-internal-audit-part2">https://www.riskinsights.com.au/blog-1/agile-internal-audit-part2</a><br/> <br/> In this episode, we explore how internal audit can operate in tandem with other business units. That is, adopting similar project delivery approaches to deliver audits that are focused on outcomes for the customer, increasing value.  This is part two of a two-part episode.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Agility in Internal Auditing - Part 1 (of 2)</title>
			<itunes:title>Agility in Internal Auditing - Part 1 (of 2)</itunes:title>
			<pubDate>Sun, 26 Jan 2020 19:00:00 GMT</pubDate>
			<itunes:duration>4:34</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2578762/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2578762</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/agility-in-internal-auditing-part-600</link>
			<acast:episodeId>6401d8064cfcac00119a9dee</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJ/i7u9z3xZJcJhhNuXfMVC]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9dee.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/> <br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/agile-internal-audit-part1">https://www.riskinsights.com.au/blog-1/agile-internal-audit-part1</a><br/> <br/> In this episode, we explore how internal audit can operate in tandem with other business units. That is, adopting similar project delivery approaches to deliver audits that are focused on outcomes for the customer, increasing value.  <br/><br/>This is part one of a two-part episode.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/> <br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/agile-internal-audit-part1">https://www.riskinsights.com.au/blog-1/agile-internal-audit-part1</a><br/> <br/> In this episode, we explore how internal audit can operate in tandem with other business units. That is, adopting similar project delivery approaches to deliver audits that are focused on outcomes for the customer, increasing value.  <br/><br/>This is part one of a two-part episode.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Repeatable analytics (a.k.a. continuous controls monitoring) - is it internal audit's job?]]></title>
			<itunes:title><![CDATA[Repeatable analytics (a.k.a. continuous controls monitoring) - is it internal audit's job?]]></itunes:title>
			<pubDate>Thu, 23 Jan 2020 20:00:00 GMT</pubDate>
			<itunes:duration>2:53</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2566213/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2566213</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/repeatable-analytics-aka-continuous-948</link>
			<acast:episodeId>6401d8064cfcac00119a9def</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDIX7gSrf9uewO5Kzka1c2k8]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9def.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.</p><p>The original article was published here: <br/><a href="https://www.riskinsights.com.au/blog-1/ccm-internal-audit-3lod">https://www.riskinsights.com.au/blog-1/ccm-internal-audit-3lod</a></p><p>In this episode, we consider whether audit functions should be responsible for continuous controls monitoring.</p><p>Links mentioned in the article:</p><ul><li><a href="https://global.theiia.org/standards-guidance/recommended-guidance/Pages/The-Three-Lines-of-Defense-in-Effective-Risk-Management-and-Control.aspx">IIA position paper on 3LOD</a></li><li><a href="http://deloitte.wsj.com/cfo/2018/05/04/fighting-fraud-by-integrating-data-driven-analytics-with-forensics/">Deloitte article on fighting fraud</a></li></ul> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.</p><p>The original article was published here: <br/><a href="https://www.riskinsights.com.au/blog-1/ccm-internal-audit-3lod">https://www.riskinsights.com.au/blog-1/ccm-internal-audit-3lod</a></p><p>In this episode, we consider whether audit functions should be responsible for continuous controls monitoring.</p><p>Links mentioned in the article:</p><ul><li><a href="https://global.theiia.org/standards-guidance/recommended-guidance/Pages/The-Three-Lines-of-Defense-in-Effective-Risk-Management-and-Control.aspx">IIA position paper on 3LOD</a></li><li><a href="http://deloitte.wsj.com/cfo/2018/05/04/fighting-fraud-by-integrating-data-driven-analytics-with-forensics/">Deloitte article on fighting fraud</a></li></ul> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Assurance analytics goes beyond basic rules-based analysis (i.e. beyond simple CAATs)</title>
			<itunes:title>Assurance analytics goes beyond basic rules-based analysis (i.e. beyond simple CAATs)</itunes:title>
			<pubDate>Tue, 21 Jan 2020 07:00:00 GMT</pubDate>
			<itunes:duration>3:09</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2565637/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2565637</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/assurance-analytics-goes-beyond-basic-de5</link>
			<acast:episodeId>6401d8064cfcac00119a9df0</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJQf4kV5kzS27niV/VpMCND]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9df0.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/> <br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-analytics-beyond-basic-rules">https://www.riskinsights.com.au/blog-1/audit-analytics-beyond-basic-rules</a><br/> <br/> In this episode, we briefly discuss how assurance analytics goes beyond basic rules.</p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/> <br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-analytics-beyond-basic-rules">https://www.riskinsights.com.au/blog-1/audit-analytics-beyond-basic-rules</a><br/> <br/> In this episode, we briefly discuss how assurance analytics goes beyond basic rules.</p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Going beyond the initial remedial action</title>
			<itunes:title>Going beyond the initial remedial action</itunes:title>
			<pubDate>Fri, 17 Jan 2020 02:00:00 GMT</pubDate>
			<itunes:duration>4:51</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2488723/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2488723</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/going-beyond-the-initial-remedial-8d2</link>
			<acast:episodeId>6401d8064cfcac00119a9df1</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDL8qmIhOZGJb4dcMRjWCEj+]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9df1.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/> <br/> The original article was published here:<br/> <a href="https://www.riskinsights.com.au/blog-1/going-beyond-the-initial-remedial-action">https://www.riskinsights.com.au/blog-1/going-beyond-the-initial-remedial-action</a><br/> <br/> In this episode, we explore a common flaw in designing audit remediation actions.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/> <br/> The original article was published here:<br/> <a href="https://www.riskinsights.com.au/blog-1/going-beyond-the-initial-remedial-action">https://www.riskinsights.com.au/blog-1/going-beyond-the-initial-remedial-action</a><br/> <br/> In this episode, we explore a common flaw in designing audit remediation actions.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Is risk management creating more risk in how you manage & use data?]]></title>
			<itunes:title><![CDATA[Is risk management creating more risk in how you manage & use data?]]></itunes:title>
			<pubDate>Thu, 16 Jan 2020 02:00:00 GMT</pubDate>
			<itunes:duration>6:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2488695/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2488695</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/is-risk-management-creating-more-95a</link>
			<acast:episodeId>6401d8064cfcac00119a9df2</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDLtCXcfeI6w0tCmOeOXAcDS]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9df2.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/risk-management-creating-risk">https://www.riskinsights.com.au/blog-1/risk-management-creating-risk</a><br/><br/>In this episode, we explore how poor risk management can result in more risk than it attempts to reduce.<br/><br/>Links mentioned in this episode:</p><ol><li><a href="https://www.riskinsights.com.au/blog-1/inadvertent-privacy-breaches">The article in which we spoke about a PIA that did not consider all the risks and created a false sense of security</a></li><li><a href="https://www.riskinsights.com.au/blog-1/openaccess">The article in which we outlined how a flaw in risk-thinking can increase risk by reducing efficiency and effectiveness</a></li><li><a href="https://www.riskinsights.com.au/blog-1/going-beyond-the-initial-remedial-action">The article in which we looked at how to use the results of audits to reduce risk, rather than just ticking a box.</a></li></ol> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/risk-management-creating-risk">https://www.riskinsights.com.au/blog-1/risk-management-creating-risk</a><br/><br/>In this episode, we explore how poor risk management can result in more risk than it attempts to reduce.<br/><br/>Links mentioned in this episode:</p><ol><li><a href="https://www.riskinsights.com.au/blog-1/inadvertent-privacy-breaches">The article in which we spoke about a PIA that did not consider all the risks and created a false sense of security</a></li><li><a href="https://www.riskinsights.com.au/blog-1/openaccess">The article in which we outlined how a flaw in risk-thinking can increase risk by reducing efficiency and effectiveness</a></li><li><a href="https://www.riskinsights.com.au/blog-1/going-beyond-the-initial-remedial-action">The article in which we looked at how to use the results of audits to reduce risk, rather than just ticking a box.</a></li></ol> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Protect against inadvertent privacy breaches</title>
			<itunes:title>Protect against inadvertent privacy breaches</itunes:title>
			<pubDate>Wed, 15 Jan 2020 02:00:00 GMT</pubDate>
			<itunes:duration>5:37</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2488405/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2488405</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/protect-against-inadvertent-privacy-827</link>
			<acast:episodeId>6401d8064cfcac00119a9df3</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDIu3BlGtlfND2ADeVlPNVTI]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9df3.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/> <br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/inadvertent-privacy-breaches">https://www.riskinsights.com.au/blog-1/inadvertent-privacy-breaches</a><br/> <br/> In this episode, we explore inadvertent privacy breaches.</p><p> </p><p><b>Links mentioned in the article:</b></p><ol><li>The travel card data privacy breach was <a href="https://www.abc.net.au/news/2019-08-15/myki-data-spill-breaches-privacy-for-millions-of-users/11416616">reported on in this article in August 2019</a></li><li><a href="https://www.sciencedaily.com/releases/2019/07/190723110523.htm">The article in Science Daily</a>  that says &quot;Re-identifying anonymised data is how journalists exposed Donald Trump&apos;s 1985-94 tax returns in May 2019&quot;</li><li><a href="https://www.theguardian.com/technology/2019/jul/23/anonymised-data-never-be-anonymous-enough-study-finds">The article in The Guardian</a> that says &quot;anonymising data is practically impossible for any complex dataset&quot;</li><li>OVIC wrote about the investigation <a href="https://ovic.vic.gov.au/blog/myki-incident-lessons-for-organisations/">in this blog article</a></li><li>Other false senses of security created by risk management in <a href="https://www.riskinsights.com.au/blog-1/risk-management-creating-risk">this separate blog article</a></li><li>The <a href="https://data61.csiro.au/en/Our-Work/Safety-and-Security/Privacy-Preservation/De-identification-Decision-Making-Framework">De-Identification Decision-Making Framework </a></li><li>The <a href="https://iapp.org/resources/article/a-guide-to-data-governance-for-privacy-confidentiality-and-compliance/">Microsoft Guide to Data Governance for Privacy, Confidentiality, and Compliance</a></li><li><a href="https://medium.com/uber-security-privacy/differential-privacy-open-source-7892c82c42b6">Uber: open source project for differential privacy</a></li><li><a href="https://developers.googleblog.com/2019/09/enabling-developers-and-organizations.html">Google: open source version of their differential privacy library</a></li></ol> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/> <br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/inadvertent-privacy-breaches">https://www.riskinsights.com.au/blog-1/inadvertent-privacy-breaches</a><br/> <br/> In this episode, we explore inadvertent privacy breaches.</p><p> </p><p><b>Links mentioned in the article:</b></p><ol><li>The travel card data privacy breach was <a href="https://www.abc.net.au/news/2019-08-15/myki-data-spill-breaches-privacy-for-millions-of-users/11416616">reported on in this article in August 2019</a></li><li><a href="https://www.sciencedaily.com/releases/2019/07/190723110523.htm">The article in Science Daily</a>  that says &quot;Re-identifying anonymised data is how journalists exposed Donald Trump&apos;s 1985-94 tax returns in May 2019&quot;</li><li><a href="https://www.theguardian.com/technology/2019/jul/23/anonymised-data-never-be-anonymous-enough-study-finds">The article in The Guardian</a> that says &quot;anonymising data is practically impossible for any complex dataset&quot;</li><li>OVIC wrote about the investigation <a href="https://ovic.vic.gov.au/blog/myki-incident-lessons-for-organisations/">in this blog article</a></li><li>Other false senses of security created by risk management in <a href="https://www.riskinsights.com.au/blog-1/risk-management-creating-risk">this separate blog article</a></li><li>The <a href="https://data61.csiro.au/en/Our-Work/Safety-and-Security/Privacy-Preservation/De-identification-Decision-Making-Framework">De-Identification Decision-Making Framework </a></li><li>The <a href="https://iapp.org/resources/article/a-guide-to-data-governance-for-privacy-confidentiality-and-compliance/">Microsoft Guide to Data Governance for Privacy, Confidentiality, and Compliance</a></li><li><a href="https://medium.com/uber-security-privacy/differential-privacy-open-source-7892c82c42b6">Uber: open source project for differential privacy</a></li><li><a href="https://developers.googleblog.com/2019/09/enabling-developers-and-organizations.html">Google: open source version of their differential privacy library</a></li></ol> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Emerging Risks - Artificial Intelligence</title>
			<itunes:title>Emerging Risks - Artificial Intelligence</itunes:title>
			<pubDate>Tue, 14 Jan 2020 11:00:00 GMT</pubDate>
			<itunes:duration>4:37</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2444831/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2444831</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/emerging-risks-artificial-intelligence-cea</link>
			<acast:episodeId>6401d8064cfcac00119a9df4</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDK/oUGMWBiy9fKpihnoqyS0]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9df4.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/emerging-risks-artificial-intelligence">https://www.riskinsights.com.au/blog-1/emerging-risks-artificial-intelligence</a><br/><br/>In this episode, we explore artificial intelligence, and how to manage the risks associated with AI opportunities.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/emerging-risks-artificial-intelligence">https://www.riskinsights.com.au/blog-1/emerging-risks-artificial-intelligence</a><br/><br/>In this episode, we explore artificial intelligence, and how to manage the risks associated with AI opportunities.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Do you focus on your customer when thinking about risks?</title>
			<itunes:title>Do you focus on your customer when thinking about risks?</itunes:title>
			<pubDate>Sun, 12 Jan 2020 22:00:00 GMT</pubDate>
			<itunes:duration>2:54</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2444807/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2444807</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/do-you-focus-on-your-customer-when-811</link>
			<acast:episodeId>6401d8064cfcac00119a9df5</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDIt10D76ZDaeOF5WetCKd43]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9df5.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/post/outside_in_risk_management_part1">https://www.riskinsights.com.au/blog-1/post/outside_in_risk_management_part1</a><br/><br/>In this episode, we explore customer focus as it applies to risk management.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/post/outside_in_risk_management_part1">https://www.riskinsights.com.au/blog-1/post/outside_in_risk_management_part1</a><br/><br/>In this episode, we explore customer focus as it applies to risk management.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[3 open source myths that might be inhibiting your team's progress]]></title>
			<itunes:title><![CDATA[3 open source myths that might be inhibiting your team's progress]]></itunes:title>
			<pubDate>Fri, 10 Jan 2020 04:00:00 GMT</pubDate>
			<itunes:duration>3:05</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2444786/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2444786</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/3-open-source-myths-that-might-be-be8</link>
			<acast:episodeId>6401d8064cfcac00119a9df6</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDIWVSmiMx2XoC/QiDLmDkAG]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9df6.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/post/3-open-source-myths-that-might-be-inhibiting-your-team-s-progress">https://www.riskinsights.com.au/blog-1/post/3-open-source-myths-that-might-be-inhibiting-your-team-s-progress</a><br/><br/>In this episode, we explore 3 open source myths that might be inhibiting your team&apos;s progress.</p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/post/3-open-source-myths-that-might-be-inhibiting-your-team-s-progress">https://www.riskinsights.com.au/blog-1/post/3-open-source-myths-that-might-be-inhibiting-your-team-s-progress</a><br/><br/>In this episode, we explore 3 open source myths that might be inhibiting your team&apos;s progress.</p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>3rd party risk management - do you consider customer experience?</title>
			<itunes:title>3rd party risk management - do you consider customer experience?</itunes:title>
			<pubDate>Thu, 09 Jan 2020 05:00:00 GMT</pubDate>
			<itunes:duration>2:37</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2444735/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2444735</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/3rd-party-risk-management-do-you-351</link>
			<acast:episodeId>6401d8064cfcac00119a9df7</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDLrxE+pTn/o6n2FfPVCcvJj]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9df7.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/post/3rd-party-risk-management-do-you-consider-customer-experience">https://www.riskinsights.com.au/blog-1/post/3rd-party-risk-management-do-you-consider-customer-experience</a><br/><br/>In this article, we explore the need to consider customer experience in managing third party risks. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/post/3rd-party-risk-management-do-you-consider-customer-experience">https://www.riskinsights.com.au/blog-1/post/3rd-party-risk-management-do-you-consider-customer-experience</a><br/><br/>In this article, we explore the need to consider customer experience in managing third party risks. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>How to reduce noise and minimise false positives when conducting assurance analytics (internal audit, performance audit)</title>
			<itunes:title>How to reduce noise and minimise false positives when conducting assurance analytics (internal audit, performance audit)</itunes:title>
			<pubDate>Mon, 06 Jan 2020 04:00:00 GMT</pubDate>
			<itunes:duration>8:11</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2417120/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2417120</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/how-to-reduce-noise-and-minimise-c99</link>
			<acast:episodeId>6401d8064cfcac00119a9df8</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDKauXTVjWQV2NIVnijVQBVM]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9df8.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-analytics-reducing-noise-false-positives">https://www.riskinsights.com.au/blog-1/audit-analytics-reducing-noise-false-positives</a><br/><br/>In this article, we explore an alternate approach to dealing with false positives that result from internal audit analytics. </p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-analytics-reducing-noise-false-positives">https://www.riskinsights.com.au/blog-1/audit-analytics-reducing-noise-false-positives</a><br/><br/>In this article, we explore an alternate approach to dealing with false positives that result from internal audit analytics. </p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Can you survive the damage caused by a spreadsheet model error?</title>
			<itunes:title>Can you survive the damage caused by a spreadsheet model error?</itunes:title>
			<pubDate>Fri, 03 Jan 2020 09:00:00 GMT</pubDate>
			<itunes:duration>2:48</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2399354/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2399354</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/can-you-survive-the-damage-caused-194</link>
			<acast:episodeId>6401d8064cfcac00119a9df9</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJH4ZurGFsWzi0QjoMkZVe7]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9df9.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/survive-the-damage-caused-by-a-spreadsheet-model-error">https://www.riskinsights.com.au/blog-1/survive-the-damage-caused-by-a-spreadsheet-model-error<br/></a><br/>In this episode, we explore three ways to reduce the risk of spreadsheet error.<br/><br/>Spreadsheets are often used for modelling and analysis, largely because they are easy to use and highly flexible. This has been the case for decades.<br/><br/>But what happens when a simple error like cutting-and-pasting the wrong formula, or omitting data in a calculation, ends up costing you thousands or even millions of dollars?<br/><br/>To build for sustainability and to reduce the number of inadvertent human errors, especially for large and complex models, you can reduce the risk of error.<br/><br/>But how do you do that?<br/><br/><b>Review</b><br/><br/>A minimum of 2 types of Quality assurance reviews for each model:<br/><br/>i) A technical peer review (ideally by someone who has not been involved in the development of your model) to review and evaluate the accuracy of the formulae, calculations and code.<br/><br/>ii) A business user review, (by someone who understands the purpose of the model and the underlying business rules), to determine whether the model is working as it is supposed to - functionally.<br/><br/><b>Protect</b><br/><br/>If you continue to use the spreadsheet model, lock the calculation cells.<br/><br/>This provides a layer of protection from unexpected changes; however, it does not necessarily prevent other users from unlocking the cells.<br/><br/><br/><b>Change platform</b><br/><br/>Moving the model to an analytics platform allows you to enter your variable inputs through an interface (e.g. Excel, web form, visualisation tool) which can rerun the model on the fly (behind the scenes) and produce the scenario results.<br/><br/>With this approach, the model can be used more broadly, with reduced risk of change to the underlying formulae / algorithms.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/survive-the-damage-caused-by-a-spreadsheet-model-error">https://www.riskinsights.com.au/blog-1/survive-the-damage-caused-by-a-spreadsheet-model-error<br/></a><br/>In this episode, we explore three ways to reduce the risk of spreadsheet error.<br/><br/>Spreadsheets are often used for modelling and analysis, largely because they are easy to use and highly flexible. This has been the case for decades.<br/><br/>But what happens when a simple error like cutting-and-pasting the wrong formula, or omitting data in a calculation, ends up costing you thousands or even millions of dollars?<br/><br/>To build for sustainability and to reduce the number of inadvertent human errors, especially for large and complex models, you can reduce the risk of error.<br/><br/>But how do you do that?<br/><br/><b>Review</b><br/><br/>A minimum of 2 types of Quality assurance reviews for each model:<br/><br/>i) A technical peer review (ideally by someone who has not been involved in the development of your model) to review and evaluate the accuracy of the formulae, calculations and code.<br/><br/>ii) A business user review, (by someone who understands the purpose of the model and the underlying business rules), to determine whether the model is working as it is supposed to - functionally.<br/><br/><b>Protect</b><br/><br/>If you continue to use the spreadsheet model, lock the calculation cells.<br/><br/>This provides a layer of protection from unexpected changes; however, it does not necessarily prevent other users from unlocking the cells.<br/><br/><br/><b>Change platform</b><br/><br/>Moving the model to an analytics platform allows you to enter your variable inputs through an interface (e.g. Excel, web form, visualisation tool) which can rerun the model on the fly (behind the scenes) and produce the scenario results.<br/><br/>With this approach, the model can be used more broadly, with reduced risk of change to the underlying formulae / algorithms.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Three newer supply chain risks</title>
			<itunes:title>Three newer supply chain risks</itunes:title>
			<pubDate>Wed, 18 Dec 2019 12:00:00 GMT</pubDate>
			<itunes:duration>5:08</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2308070/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2308070</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/three-newer-supply-chain-risks-fc8</link>
			<acast:episodeId>6401d8064cfcac00119a9dfa</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDLRdIfYVA1ol35T/z3MUFPa]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9dfa.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/supply-chain-risks">www.riskinsights.com.au/blog-1/supply-chain-risks</a><br/><br/>In this episode, we explore three newer supply chain risks – two that relate to being associated with questionable suppliers, and a third that relates to fraud.<br/><br/>The symantec guidance: <a href="https://www.symantec.com/blogs/threat-intelligence/bec-scams-trends-and-themes-2019">Business email compromise</a><br/><br/></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/supply-chain-risks">www.riskinsights.com.au/blog-1/supply-chain-risks</a><br/><br/>In this episode, we explore three newer supply chain risks – two that relate to being associated with questionable suppliers, and a third that relates to fraud.<br/><br/>The symantec guidance: <a href="https://www.symantec.com/blogs/threat-intelligence/bec-scams-trends-and-themes-2019">Business email compromise</a><br/><br/></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>More access to data to reduce risk and enable better decisions</title>
			<itunes:title>More access to data to reduce risk and enable better decisions</itunes:title>
			<pubDate>Tue, 17 Dec 2019 11:00:00 GMT</pubDate>
			<itunes:duration>5:06</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2300246/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2300246</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/more-access-to-data-to-reduce-risk-1e7</link>
			<acast:episodeId>6401d8064cfcac00119a9dfb</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDIyFCtPZ9yCAfPYrZ1DmdZo]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9dfb.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/openaccess">https://www.riskinsights.com.au/blog-1/openaccess</a><br/><br/><br/><b>More access to data to reduce risk and enable better decisions<br/><br/></b>Controls are usually put in place to reduce risk.</p><p>Like user access controls to reduce data integrity risk.</p><p>But what if your access controls are actually <a href="https://www.riskinsights.com.au/blog-1/openaccess?utm_source=hs_email&amp;utm_medium=email&amp;_hsenc=p2ANqtz-_vArCDegk5ujhiGCy1AhMfeUabnTJKLllfHkWBiYuVK-x15PSV4o0T-jXwjBqYn6ukOPML">increasing risk</a>?</p><p>This can happen - particularly if there is no distinction made between systems of record (like ERPs) and systems of intelligence (like data warehouses).</p><p><a href="https://www.riskinsights.com.au/blog-1/openaccess?utm_source=hs_email&amp;utm_medium=email&amp;_hsenc=p2ANqtz-_vArCDegk5ujhiGCy1AhMfeUabnTJKLllfHkWBiYuVK-x15PSV4o0T-jXwjBqYn6ukOPML">In this article, we discuss an alternate approach</a>.</p><p><br/><br/><br/><br/></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/openaccess">https://www.riskinsights.com.au/blog-1/openaccess</a><br/><br/><br/><b>More access to data to reduce risk and enable better decisions<br/><br/></b>Controls are usually put in place to reduce risk.</p><p>Like user access controls to reduce data integrity risk.</p><p>But what if your access controls are actually <a href="https://www.riskinsights.com.au/blog-1/openaccess?utm_source=hs_email&amp;utm_medium=email&amp;_hsenc=p2ANqtz-_vArCDegk5ujhiGCy1AhMfeUabnTJKLllfHkWBiYuVK-x15PSV4o0T-jXwjBqYn6ukOPML">increasing risk</a>?</p><p>This can happen - particularly if there is no distinction made between systems of record (like ERPs) and systems of intelligence (like data warehouses).</p><p><a href="https://www.riskinsights.com.au/blog-1/openaccess?utm_source=hs_email&amp;utm_medium=email&amp;_hsenc=p2ANqtz-_vArCDegk5ujhiGCy1AhMfeUabnTJKLllfHkWBiYuVK-x15PSV4o0T-jXwjBqYn6ukOPML">In this article, we discuss an alternate approach</a>.</p><p><br/><br/><br/><br/></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>SAS70 certification and other common SOC report myths</title>
			<itunes:title>SAS70 certification and other common SOC report myths</itunes:title>
			<pubDate>Tue, 17 Dec 2019 07:00:00 GMT</pubDate>
			<itunes:duration>5:54</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2299457/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2299457</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/sas70-certification-and-other-common-57b</link>
			<acast:episodeId>6401d8064cfcac00119a9dfc</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJyPxjBot+MrMRmYHKDGxEt]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9dfc.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/5-assurance-analytics-challenges">https://www.riskinsights.com.au/blog-1/sas70-certification-and-other-soc-report-myths</a><br/><br/><b>SAS70 certification and other common SOC report myths</b><br/><br/>If you use or plan to use a cloud/SaaS/hosted solution, how do you ensure that the service provider is protecting your systems and data?</p><p>Rely on their SAS70 reports, right?</p><p>Not quite.</p><p>In this article, we explain why this is not the right answer and explore a few other common myths.</p><p><b>Background</b></p><p>System and Organization Controls (SOC) reports used to be conducted in accordance with &quot;SAS70&quot; in the US.</p><p>A few years ago, SAS70 was replaced by:</p><ul><li>In the US: SSAE18, now replaced by SSAE18.</li><li>Globally: ISAE3402.</li><li>In Australia: ASAE3402.</li></ul><p>For audits that are conducted in accordance with these standards, a SOC report is produced.</p><p><b>SOC 1 Myths</b></p><p><b>1. Certification or compliance - </b>Myth: The outsourced service provider is certified or compliant. </p><p><b>2. Qualified Opinions - </b>Myth: A qualified SOC report is the same as qualified financials, which is bad. </p><p><b>3. Use of SOC 1 reports - </b>Myth: The reports can be used to determine the level of control over all IT risks.</p><p><br/></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/5-assurance-analytics-challenges">https://www.riskinsights.com.au/blog-1/sas70-certification-and-other-soc-report-myths</a><br/><br/><b>SAS70 certification and other common SOC report myths</b><br/><br/>If you use or plan to use a cloud/SaaS/hosted solution, how do you ensure that the service provider is protecting your systems and data?</p><p>Rely on their SAS70 reports, right?</p><p>Not quite.</p><p>In this article, we explain why this is not the right answer and explore a few other common myths.</p><p><b>Background</b></p><p>System and Organization Controls (SOC) reports used to be conducted in accordance with &quot;SAS70&quot; in the US.</p><p>A few years ago, SAS70 was replaced by:</p><ul><li>In the US: SSAE18, now replaced by SSAE18.</li><li>Globally: ISAE3402.</li><li>In Australia: ASAE3402.</li></ul><p>For audits that are conducted in accordance with these standards, a SOC report is produced.</p><p><b>SOC 1 Myths</b></p><p><b>1. Certification or compliance - </b>Myth: The outsourced service provider is certified or compliant. </p><p><b>2. Qualified Opinions - </b>Myth: A qualified SOC report is the same as qualified financials, which is bad. </p><p><b>3. Use of SOC 1 reports - </b>Myth: The reports can be used to determine the level of control over all IT risks.</p><p><br/></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Five data in audit challenges to tackle</title>
			<itunes:title>Five data in audit challenges to tackle</itunes:title>
			<pubDate>Sun, 15 Dec 2019 09:00:00 GMT</pubDate>
			<itunes:duration>4:42</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2284988/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2284988</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/five-data-in-audit-challenges-to-6cb</link>
			<acast:episodeId>6401d8064cfcac00119a9dfd</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJt69MiKbNzk0EsoXHkajuH]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9dfd.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/5-data-in-audit-challenges">https://www.riskinsights.com.au/blog-1/5-data-in-audit-challenges</a><br/><br/><b>Five data in audit challenges, and how you can overcome these:</b></p><ol><li>Access to data – you can&apos;t get all the data, or you can&apos;t get it quickly enough.</li><li>Low value – the analysis doesn&apos;t provide new insights.</li><li>False positives – results are overwhelmingly noisy, distracting your focus.</li><li>Superficiality – the results are not deep enough to properly understand and refine the problems or to provide opportunities for improvement.</li><li>Timing – the results are not available in time for reporting/concluding.</li></ol><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/5-data-in-audit-challenges">https://www.riskinsights.com.au/blog-1/5-data-in-audit-challenges</a><br/><br/><b>Five data in audit challenges, and how you can overcome these:</b></p><ol><li>Access to data – you can&apos;t get all the data, or you can&apos;t get it quickly enough.</li><li>Low value – the analysis doesn&apos;t provide new insights.</li><li>False positives – results are overwhelmingly noisy, distracting your focus.</li><li>Superficiality – the results are not deep enough to properly understand and refine the problems or to provide opportunities for improvement.</li><li>Timing – the results are not available in time for reporting/concluding.</li></ol><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Audit analytics software - what you need and what to consider in selecting them</title>
			<itunes:title>Audit analytics software - what you need and what to consider in selecting them</itunes:title>
			<pubDate>Sun, 15 Dec 2019 00:00:00 GMT</pubDate>
			<itunes:duration>4:12</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2283896/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2283896</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/audit-analytics-software-what-you-229</link>
			<acast:episodeId>6401d8064cfcac00119a9dfe</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDK6PFIwGm2vSClIvaitzklh]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9dfe.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/> <br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/3-analytics-software-sets-for-your-team-and-3-selection-advice-considerations">https://www.riskinsights.com.au/blog-1/3-analytics-software-sets-for-your-team-and-3-selection-advice-considerations</a><br/> <br/>In this episode, we outline the 3 types of data and analytics software that audit teams should have access to, at a minimum. We also explore 3 questions to ask if you are obtaining external advice regarding software selection.</p><p>Link mentioned in the article: <a href="https://www.asap-utilities.com/">ASAP Utilities</a> – an excel add-in.</p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/> <br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/3-analytics-software-sets-for-your-team-and-3-selection-advice-considerations">https://www.riskinsights.com.au/blog-1/3-analytics-software-sets-for-your-team-and-3-selection-advice-considerations</a><br/> <br/>In this episode, we outline the 3 types of data and analytics software that audit teams should have access to, at a minimum. We also explore 3 questions to ask if you are obtaining external advice regarding software selection.</p><p>Link mentioned in the article: <a href="https://www.asap-utilities.com/">ASAP Utilities</a> – an excel add-in.</p><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Why internal auditors and performance auditors need to consider adopting a specific approach to managing the data used on audits (DGIA #1)</title>
			<itunes:title>Why internal auditors and performance auditors need to consider adopting a specific approach to managing the data used on audits (DGIA #1)</itunes:title>
			<pubDate>Sat, 14 Dec 2019 12:00:00 GMT</pubDate>
			<itunes:duration>7:04</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2281664/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2281664</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/why-internal-auditors-and-performance-847</link>
			<acast:episodeId>6401d8064cfcac00119a9dff</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDJjkRV/jHwLUuCC+VUDHLdD]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9dff.jpg"/>
			<description><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance">https://www.riskinsights.com.au/blog-1/audit-data-governance</a><br/><br/>It explains, using a case study, why internal auditors and performance auditors need to consider adopting a specific approach to managing the data used on audits.<br/><br/>This is the 1st article in the DGIA (Data and analytics Governance within Internal Audit) series.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/audit-data-governance">https://www.riskinsights.com.au/blog-1/audit-data-governance</a><br/><br/>It explains, using a case study, why internal auditors and performance auditors need to consider adopting a specific approach to managing the data used on audits.<br/><br/>This is the 1st article in the DGIA (Data and analytics Governance within Internal Audit) series.</p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Why auditors are increasingly using complaints data</title>
			<itunes:title>Why auditors are increasingly using complaints data</itunes:title>
			<pubDate>Sat, 14 Dec 2019 11:00:00 GMT</pubDate>
			<itunes:duration>9:00</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6401d7fffe3f500011e9f815/e/Buzzsprout-2281724/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">Buzzsprout-2281724</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://riskinsightsblogcast.substack.com/p/why-auditors-are-increasingly-using-625</link>
			<acast:episodeId>6401d8064cfcac00119a9e00</acast:episodeId>
			<acast:showId>6401d7fffe3f500011e9f815</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrmIyS41aNvxTW5vBj/5yNnaiYsKgSK6LzhuuntRyUONZ61BzO1GGavkB2ld9p8DGDL8DACZM0DLpKmmtggFwkik]]></acast:settings>
			<itunes:image href="https://assets.pippa.io/shows/6401d7fffe3f500011e9f815/6401d8064cfcac00119a9e00.jpg"/>
			<description><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/complaints-data-audit">https://www.riskinsights.com.au/blog-1/complaints-data-audit</a><br/><br/><b>Why are auditors increasingly using complaints data?</b></p><p>Most auditors that use complaints data are interested in one or more of these three key benefits:</p><ol><li>Customer complaints can provide an alternate perspective for a range of audits e.g., identifying revenue leakage like in the example above, triangulating customer requests that had not been acted on, highlighting control gaps.</li><li>Understanding complaints data enables audit to help management improve the complaints process e.g., how complaints are reported on. </li><li>Exploring the complaints data enables audit to identify strategy achievement blockers – presuming that the strategy focuses largely on customers. For example, your complaints data may point to previously unidentified problems in how services are delivered.</li></ol><p> In this article we explore:</p><ul><li>the historical problem with using complaints data and why this is no longer a challenge</li><li>what the data typically looks like – understanding complaints data</li><li>another use case (triangulating customer requests that had not been acted on)</li></ul><p>What the article doesn’t cover:</p><ul><li> The third benefit above (strategy achievement blockers) – this is an interesting angle, but we’ll leave it for a future article</li><li>Complaints data that is recorded manually e.g., handwritten notes in a physical file.  This is not impossible to analyse but converting the physical data to electronic data is a separate topic.  The solutions in this article assume that the data is already in electronic form.</li></ul><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This is an audio version of a blog article.<br/><br/>The original article was published here:<br/><a href="https://www.riskinsights.com.au/blog-1/complaints-data-audit">https://www.riskinsights.com.au/blog-1/complaints-data-audit</a><br/><br/><b>Why are auditors increasingly using complaints data?</b></p><p>Most auditors that use complaints data are interested in one or more of these three key benefits:</p><ol><li>Customer complaints can provide an alternate perspective for a range of audits e.g., identifying revenue leakage like in the example above, triangulating customer requests that had not been acted on, highlighting control gaps.</li><li>Understanding complaints data enables audit to help management improve the complaints process e.g., how complaints are reported on. </li><li>Exploring the complaints data enables audit to identify strategy achievement blockers – presuming that the strategy focuses largely on customers. For example, your complaints data may point to previously unidentified problems in how services are delivered.</li></ol><p> In this article we explore:</p><ul><li>the historical problem with using complaints data and why this is no longer a challenge</li><li>what the data typically looks like – understanding complaints data</li><li>another use case (triangulating customer requests that had not been acted on)</li></ul><p>What the article doesn’t cover:</p><ul><li> The third benefit above (strategy achievement blockers) – this is an interesting angle, but we’ll leave it for a future article</li><li>Complaints data that is recorded manually e.g., handwritten notes in a physical file.  This is not impossible to analyse but converting the physical data to electronic data is a separate topic.  The solutions in this article assume that the data is already in electronic form.</li></ul><p>For more advice on analyzing data for audits, you can find <a href="https://geni.us/DataConfidentInternal">The Data-Confident Internal Auditor on Amazon</a>, with bonus resources available at <a href="https://www.data-confident.com/">data-confident.com</a>. <br/>The book aims to demystify the use of data in internal audits through practical, step-by-step guidance. </p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://riskinsightsblogcast.substack.com?utm_medium=podcast&#38;utm_campaign=CTA_1">riskinsightsblogcast.substack.com</a><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Business"/>
		<itunes:category text="Business">
			<itunes:category text="Management"/>
		</itunes:category>
    </channel>
</rss>
