2. The Scenario
End users creating complicated spreadsheets out there
– Financial statements
– Marketing plans
Important decision making processes based on
spreadsheets
Not IT controlled, just end user things
No test, lots of risk and lack of control
3. The Issue
"Nothing within the technology environment has a greater chance of
directly causing financial statements to be materially misstated than
spreadsheets......
Furthermore, no technology is less-controlled than spreadsheets.”
Source: Comments to CIO of top 5 global bank by Microsoft Executive
5. CFO’s Questions
Who is responsible?
How many of these spreadsheets do we have, where are they,
who has access to them?
Which ones contain error or fraud?
How do we prevent this from happening again?
Addressing these questions is what the new features in Office 2013
are about…
6.
7. Gartner is a registered trademark of Gartner, Inc. or its affiliates.
Resolution 4: Decide Which Information Will Matter
CEO Advisory: Chief Executive Information and Technology Resolutions, 2013 (1 February 2013) G00246797
8. Office 2013 Spreadsheet Control tools help Mitigate Risk,
Improve Compliance, and Drive Productivity Gains
Logic
Inspection
Version
Control
Access
Control
Change
Control
Uncontrolled
EUCs
Controlled
EUCs
…
Steps To Mitigate Spreadsheet & EUC Risk
9. Microsoft Confidential.
Spreadsheet Compare (Office Professional Plus 2013 only)
Compare spreadsheets side-by-side to identify and categorize their differences
Database Compare (Office Professional Plus 2013 only)
Compare Access databases side-by-side
Spreadsheet Inquire (Office Professional Plus 2013 only, Excel add-in)
Analyze, document, understand and diagnose spreadsheet
Discovery and Risk Assessment (SharePoint Server 2013 ECAL)
Assess and categorize spreadsheets and databases based on relevance, materiality and business
impact
Audit and Control Management Server (SharePoint Server 2013 ECAL)
Non-intrusive auditing of changes made to Excel spreadsheets and Access databases
Spreadsheet Control Tools In Office 2013
10. Inventory Risk Assessment Control Optimization Reporting
Reporting Services / BI Tools
Discovery
and Risk
Assessment
Audit and
Control
Management
Server
Spreadsheet
Compare /
Database
Compare
Spreadsheet
Inquire
Best Practices, Domain Expertise, World Class Support
Microsoft System
15. Security, Risk, and Value
How do you organize the hours of your day?
Role Where Most Our Customers Are Today
Accountant 61%
Protector 24%
Business Leader 15%
Role Where Most Our
Customers Are Today
Where Most Companies
Would Like To Be
Accountant 61% 28%
Protector 24% 29%
Business Leader 15% 43%
Cloud Computing for Finance: Evaluating Security, Risk, and Value Webinar - Intacct
Current Activities:
• Send emails asking for information
• Copy and paste information from several sources
• Prepare reports to management
Aspired Activities:
• Advice their peers on room for savings
• New opportunity and risks
• Brainstorming on what can be done to maximize the value for the company
16. State of Current Financial Solutions
Effectiveness Gap
Cloud Computing for Finance: Evaluating Security, Risk, and Value Webinar - Intacct
17. Be 100% Compliant with Office 2013
It lets you securely share information with your CPA firm advisors and auditors in real-time
Reduces fees – they don’t need to come on-site to do their work
Better advice – they can more easily be proactive since they have your most current
information
Start elevating the conversations (from “we are missing these invoices” to “here are best
practices that we have seen in your industry”) and improve their pay for the buck transforming
them in advisers.
Cloud Computing for Finance: Evaluating Security, Risk, and Value Webinar - Intacct
24. •Open
•Change
•Save
User
•Review Changes
•Compare to last
period
•Check for errors, fraud
Reviewer
•Same as Reviewer
•Electronic Signature
Approver
• Review changes using
• Audit Trail
• Spreadsheet/Access Compare
Audit And Control Management Server
Review & Approval
25. File Shares
SharePoint
File Shares
Event
Compare
New Version
Previous Version
Alerts
Workflow
Archive Version
(File Shares Only)
ACM Database
Continuous
Discovery and Risk
Assessment
Audit Trail,
Version History
in a Browser
Office users
ACM Server Architecture
The new kinds and qualities of information available from sensors and analytics are set to explode as the second half of the Information Age accelerates (see Figure 5). Thinking about what those new
kinds of information will be and how to exploit them ahead of or better than competitors, will be pivotal to business success.