What postings during weekend have to do with the fraud triangle

In this four-part series, I will introduce you to the risks and analysis options about the subject of “documents posted during weekend” in SAP systems. Without a doubt, documents posted during weekend are not unusual in many companies. But… Part I of the series: “FI documents posted during weekend” 1. What postings during weekend have […]

Getting serious: What are high incoming invoice amounts?

Part II of this series shows you how to use simple statistical considerations to determine which invoices from a vendor are exceptionally high and thus represent an statistical outlier. Part 2 of the series: “Very high incoming invoice amount” 1. Where Topmanagers should keep an eye on2. Getting serious: What are high incoming invoices?3. Analytics of high […]

Data Analytics where Topmanagers should keep an eye on

This four-part series deals with the analytics of very high incoming invoice amounts. In an audit of the purchasing process, you want to be quickly familiar with the risk-based transactions, because: high amounts of invoices = major potential risks. I will show you what is scientifically justified by high amounts of invoices and how to recognize them. With this […]

Advanced Analytics: What you should also know about SAP super users

The fourth and last part of the series “Operations done by super users” is called “Advanced SAP Analytics”. It is about dialog users who may be taken advantage of for batch inputs. In this blog article, I will show you how to illustrate and analyze the operations of SAP super users while using Excel, a Pivot […]

How to analyse the risk of super users in SAP with SQL

In today’s blog post we won’t analyse stamps for sure, but the risks of extensive administration rights on your SAP system. You will get to know, which kind of risks exist, how you can analyse them and which actions to take as a result. Part 2 of the series: “Operations done by super users” 1. How […]

How to avoid manipulations done by super users

In my four-part blog series, I will illustrate the risk of extensive access rights to SAP systems. You will find out what risks exist, how to analyze the risks and what actions to be taken. Part 1 of the series: “Operations done by super users” 1. How to avoid manipulations done by super users 2. How to analyse the risk […]

A complete guide to Professional Judgement…

…does not exist. But let’s have a look at data and process analytics that can be very useful in auditing this kind of processes. There is often the following problem: How can one pursue the numerous and extensive results in the first place? Is it necessary to investigate all cases of SAP data analytics? Often, there are […]

3 top indicators for auditing process plausibility

Finding implausible SAP processes and how to audit them will be explained in today’s blog post. Three cross process indicators are presented as examples. This way you can analyze SAP processes differing from your targeted processes. If several implausible SAP processes come together at some point, this kind of SAP cross process analytics get very interesting. Part 5 of the […]

What no one tells you about automatic analytics of SAP access protection

This blog post is about three interesting data indicators, that are analyzing your SAP access protection. Of course, this often involves the authorization system in SAP. Part 4 of the series: “The digital Audit for Cross Process Weaknesses” 1. How the digital audit for cross process weaknesses works2. Smart strategies to automatically audit master data and payments3. Quick […]

Quick Guide: Auditing principles of orderly bookkeeping

This blog post is about the overarching topic of auditing principles of orderly bookkeeping and storage of books, records and documents in electronic form as well as data access in SAP. In the following, three indicators targeting the compliance and correctness of accounting will be presented. Part 3 of the series: “The digital Audit for […]