Editor's Introduction - Edition 2, Q2, 2026

This edition of Internal Audit Review – A Practitioner’s Guide seeks to examine that relationship in depth. It brings together perspectives from experienced practitioners within our community, alongside fresh insights from emerging talent, including two of the top internal audit students from the University of Pretoria. Together, these contributions reflect both the depth of experience and the evolving thinking that will shape the future of our profession.

At its core, governance is about trust. It is about ensuring that organisations act with integrity, deliver on their objectives, and remain accountable to their stakeholders. Internal audit plays a vital role in sustaining that trust. By providing independent, objective assurance and insight, internal auditors help boards and audit committees understand whether governance arrangements are not only in place, but are effective, resilient, and responsive to risk.

However, the traditional view of this relationship—where governance is static and internal audit simply evaluates compliance—is no longer sufficient. Governance itself is evolving. Organisations are facing increasingly complex risk environments, driven by technological disruption, geopolitical uncertainty, regulatory pressure, and heightened stakeholder expectations. In this context, governance is no longer just about structures and policies; it is about behaviour, culture, decision-making, and adaptability.

This shift has profound implications for internal audit.

First, internal auditors must move beyond a narrow focus on controls and compliance. While these remain important, they are only one part of the governance ecosystem. Increasingly, internal audit is being called upon to assess the effectiveness of governance in a broader sense: how decisions are made, how risks are understood and managed, and whether organisational culture supports ethical and sustainable outcomes.

Second, the relationship between internal audit and those charged with governance must become more dynamic. Effective governance relies on timely, relevant, and forward-looking insight. Internal audit functions that position themselves as trusted advisors—while maintaining their independence—are better placed to influence governance outcomes. This requires strong communication, deep organisational understanding, and the confidence to challenge constructively.

Third, the nature of the risks facing organisations is changing, and governance must adapt accordingly. Few areas illustrate this more clearly than artificial intelligence. As organisations increasingly adopt AI technologies, questions of governance become both more critical and more complex. How are AI systems designed, implemented, and monitored? Who is accountable for their outcomes? How are risks such as bias, transparency, and ethical use addressed? Internal auditors have a crucial role to play in evaluating whether governance frameworks are keeping pace with these developments.

Similarly, culture has emerged as a central component of effective governance. Policies and procedures alone cannot ensure good governance if the underlying culture does not support ethical behaviour and sound decision-making. Assessing culture is inherently challenging—it is less tangible, less measurable, and often more sensitive than traditional audit areas. Yet it is precisely here that internal audit can add significant value, by providing insights into how culture is experienced across the organisation and how it influences risk and performance.

These emerging areas highlight a broader point: the future of the relationship between internal audit and governance will be defined by complexity and interdependence. Governance will increasingly need to address issues that are cross-cutting, rapidly evolving, and difficult to quantify. Internal audit, in turn, will need to develop new skills, methodologies, and perspectives to provide meaningful assurance in this environment.

This includes embracing data analytics and technology, not only as tools for auditing but as subjects of audit in their own right. It also involves developing greater expertise in areas such as behavioural risk, sustainability, and digital transformation. Perhaps most importantly, it requires a mindset shift—from retrospectively assessing what has happened, to proactively considering what could happen next.

The contributions in this edition reflect many of these themes. Practitioners from our LinkedIn community share their experiences of navigating the governance landscape in diverse organisational contexts. Their articles explore topics such as the role of internal audit in supporting board effectiveness, the challenges of auditing culture, and the practical realities of providing assurance over emerging risks.

Alongside these experienced voices, we are pleased to include contributions from two outstanding students from the University of Pretoria. Their perspectives offer a glimpse into the future of the profession—one that is intellectually curious, technologically aware, and attuned to the broader societal implications of governance. Their work reminds us that the next generation of internal auditors will not simply inherit existing practices; they will redefine them.

As editor, I am particularly encouraged by the diversity of thought represented in this edition. It underscores an important point: there is no single “right” way to approach the relationship between internal audit and governance. Organisations differ in their structures, cultures, and risk profiles, and internal audit functions must adapt accordingly. What matters is not rigid adherence to a model, but a clear understanding of purpose and a commitment to continuous improvement.

Looking ahead, the importance of strong governance—and of effective internal audit—will only increase. Stakeholders are demanding greater transparency, accountability, and assurance. Regulators are raising expectations. Technological change is accelerating. In this environment, organisations that fail to invest in governance do so at their peril.

For internal auditors, this presents both a challenge and an opportunity. The challenge is to remain relevant in a rapidly changing landscape, to develop new capabilities, and to engage meaningfully with complex and often ambiguous issues. The opportunity is to play a central role in shaping the future of governance, to provide insights that go beyond assurance, and to contribute to the long-term success and sustainability of organisations.

This edition is intended as a starting point for that conversation. It invites you, as practitioners, to reflect on your own role within the governance ecosystem, to consider how your work can add greater value, and to engage with the ideas and experiences of others in our community.

The relationship between internal audit and governance is not static. It is evolving, as it must. Our task is to ensure that it evolves in a way that strengthens both disciplines—and, ultimately, the organisations and stakeholders they serve.

Editor's Introduction - Edition 2, Q2, 2026

This edition of Internal Audit Review – A Practitioner’s Guide seeks to examine that relationship in depth. It brings together perspectives from experienced practitioners within our community, alongside fresh insights from emerging talent, including two of the top internal audit students from the University of Pretoria. Together, these contributions reflect both the depth of experience and the evolving thinking that will shape the future of our profession.

At its core, governance is about trust. It is about ensuring that organisations act with integrity, deliver on their objectives, and remain accountable to their stakeholders. Internal audit plays a vital role in sustaining that trust. By providing independent, objective assurance and insight, internal auditors help boards and audit committees understand whether governance arrangements are not only in place, but are effective, resilient, and responsive to risk.

However, the traditional view of this relationship—where governance is static and internal audit simply evaluates compliance—is no longer sufficient. Governance itself is evolving. Organisations are facing increasingly complex risk environments, driven by technological disruption, geopolitical uncertainty, regulatory pressure, and heightened stakeholder expectations. In this context, governance is no longer just about structures and policies; it is about behaviour, culture, decision-making, and adaptability.

This shift has profound implications for internal audit.

First, internal auditors must move beyond a narrow focus on controls and compliance. While these remain important, they are only one part of the governance ecosystem. Increasingly, internal audit is being called upon to assess the effectiveness of governance in a broader sense: how decisions are made, how risks are understood and managed, and whether organisational culture supports ethical and sustainable outcomes.

Second, the relationship between internal audit and those charged with governance must become more dynamic. Effective governance relies on timely, relevant, and forward-looking insight. Internal audit functions that position themselves as trusted advisors—while maintaining their independence—are better placed to influence governance outcomes. This requires strong communication, deep organisational understanding, and the confidence to challenge constructively.

Third, the nature of the risks facing organisations is changing, and governance must adapt accordingly. Few areas illustrate this more clearly than artificial intelligence. As organisations increasingly adopt AI technologies, questions of governance become both more critical and more complex. How are AI systems designed, implemented, and monitored? Who is accountable for their outcomes? How are risks such as bias, transparency, and ethical use addressed? Internal auditors have a crucial role to play in evaluating whether governance frameworks are keeping pace with these developments.

Similarly, culture has emerged as a central component of effective governance. Policies and procedures alone cannot ensure good governance if the underlying culture does not support ethical behaviour and sound decision-making. Assessing culture is inherently challenging—it is less tangible, less measurable, and often more sensitive than traditional audit areas. Yet it is precisely here that internal audit can add significant value, by providing insights into how culture is experienced across the organisation and how it influences risk and performance.

These emerging areas highlight a broader point: the future of the relationship between internal audit and governance will be defined by complexity and interdependence. Governance will increasingly need to address issues that are cross-cutting, rapidly evolving, and difficult to quantify. Internal audit, in turn, will need to develop new skills, methodologies, and perspectives to provide meaningful assurance in this environment.

This includes embracing data analytics and technology, not only as tools for auditing but as subjects of audit in their own right. It also involves developing greater expertise in areas such as behavioural risk, sustainability, and digital transformation. Perhaps most importantly, it requires a mindset shift—from retrospectively assessing what has happened, to proactively considering what could happen next.

The contributions in this edition reflect many of these themes. Practitioners from our LinkedIn community share their experiences of navigating the governance landscape in diverse organisational contexts. Their articles explore topics such as the role of internal audit in supporting board effectiveness, the challenges of auditing culture, and the practical realities of providing assurance over emerging risks.

Alongside these experienced voices, we are pleased to include contributions from two outstanding students from the University of Pretoria. Their perspectives offer a glimpse into the future of the profession—one that is intellectually curious, technologically aware, and attuned to the broader societal implications of governance. Their work reminds us that the next generation of internal auditors will not simply inherit existing practices; they will redefine them.

As editor, I am particularly encouraged by the diversity of thought represented in this edition. It underscores an important point: there is no single “right” way to approach the relationship between internal audit and governance. Organisations differ in their structures, cultures, and risk profiles, and internal audit functions must adapt accordingly. What matters is not rigid adherence to a model, but a clear understanding of purpose and a commitment to continuous improvement.

Looking ahead, the importance of strong governance—and of effective internal audit—will only increase. Stakeholders are demanding greater transparency, accountability, and assurance. Regulators are raising expectations. Technological change is accelerating. In this environment, organisations that fail to invest in governance do so at their peril.

For internal auditors, this presents both a challenge and an opportunity. The challenge is to remain relevant in a rapidly changing landscape, to develop new capabilities, and to engage meaningfully with complex and often ambiguous issues. The opportunity is to play a central role in shaping the future of governance, to provide insights that go beyond assurance, and to contribute to the long-term success and sustainability of organisations.

This edition is intended as a starting point for that conversation. It invites you, as practitioners, to reflect on your own role within the governance ecosystem, to consider how your work can add greater value, and to engage with the ideas and experiences of others in our community.

The relationship between internal audit and governance is not static. It is evolving, as it must. Our task is to ensure that it evolves in a way that strengthens both disciplines—and, ultimately, the organisations and stakeholders they serve.

Cultivating Governance: The role of Internal Audit

Governance Gaps in Complex Organizations

As organizations expand, responsibilities become distributed across business units, shared services, technology platforms, and specialized risk functions. Decision rights may be documented, and reporting lines may appear clear on paper, yet ambiguity often emerges at operational transition points, especially where responsibilities shift between teams, systems, or governance layers.

The Gardener of Governance emphasizes the importance of clarity in roles and the ongoing reinforcement of oversight mechanisms. Governance retains its strength when authority, responsibility, and consequence remain aligned. When that alignment begins to drift, gaps tend to develop gradually rather than dramatically, highlighting the importance of continuous observation and evaluation.

 

Digitization adds further complexity. Automation enhances efficiency and consistency, while exception handling and override authority frequently sit outside core workflows. The boundary between automated control and human intervention therefore becomes an important governance touchpoint. It is at these intersections, between system and operator, between first line and oversight function, that accountability can blur.

Over time, incremental ambiguity accumulates. Sustained attention to governance coherence becomes essential in preventing risk concentration across these boundaries.


Internal Audit’s Governance Contribution

Internal Audit traditionally provides assurance over risk management and internal control; viewed through a governance perspective, its contribution extends into evaluating how accountability operates across the enterprise.

Through its reviews, Internal Audit examines whether decision rights align with operational responsibility, whether risk ownership corresponds to authority, and whether escalation pathways translate issues into timely action. This role aligns closely with the stewardship themes highlighted in The Gardener of Governance, which frames governance as a discipline requiring reinforcement and recalibration as conditions change.

Because Internal Audit operates across organizational silos, it can identify patterns that may remain invisible within individual functions. It sees how policies translate into behavior, how committees influence outcomes, and how governance forums drive, or fail to drive, corrective action. In doing so, Internal Audit provides boards and executive leadership with insight into governance effectiveness, offering a perspective that integrates structure, behavior, and consequence.

 

 Structuring the Internal Audit Review Scope to Reflect Governance Priorities

If Internal Audit contributes to governance cultivation, its review scopes must reflect governance dynamics as well as process mechanics. A governance informed scope deliberately incorporates accountability architecture into its design.

Internal Audit enhances governance by designing review scopes that integrate governance considerations with operational testing.

1.     Define Governance Boundaries Explicitly

Governance boundaries should be defined alongside process boundaries. Scoping conversations benefit from identifying which committees review outcomes, where key decisions are ratified, and who holds ultimate accountability for remediation. This approach connects transactional testing with oversight structures and ensures that governance touchpoints form part of the review narrative.

2.     Identify Accountability Transition Points

Accountability transition points warrant focused attention. Responsibility frequently shifts from automated control to manual intervention, from first line execution to oversight functions, and from issue identification to executive action. Evaluating how these handovers occur in practice provides meaningful insight into governance clarity.

3.     Evaluate Escalation Pathways

Escalation pathways merit examination as dynamic mechanisms rather than static documentation. Clear thresholds, timely decisions, and disciplined tracking of corrective actions reveal governance discipline in operation. Observing how issues progress through governance channels allows Internal Audit to assess whether oversight generates consequence.

4.     Align Scope with Board Level Risk Themes

Alignment with board level risk themes enhances strategic coherence. When audit scopes reflect priorities such as cyber resilience, regulatory exposure, operational continuity, or financial integrity, they reinforce the connection between governance oversight and operational review activity.

5.     Assess Governance Under Pressure

Governance assessment gains depth when viewed through the lens of organizational response under pressure. Examining how prior incidents were handled, how emergency decision rights were exercised, and how accountability was maintained during disruption offers valuable perspective on governance sustainability.

 

From Assurance to Stewardship

The gardening metaphor provides a useful lens for understanding governance maturity. Growth is continuous, and complexity expands as organizations evolve. Sustained cultivation preserves alignment between authority, responsibility, and oversight.

Organizational transformation, whether through digital integration, restructuring, or expansion, inevitably reshapes accountability frameworks. Periodic evaluation of these frameworks strengthens resilience and reinforces governance coherence.

Internal Audit contributes to this process by bringing visibility to areas where authority and responsibility diverge, highlighting concentrated risk at transition points, and assessing whether governance mechanisms translate deliberation into action. Through thoughtful scoping and systemic evaluation, it supports the conditions under which governance flourishes.


Conclusion

Governance represents an evolving system of accountability, decision making, and oversight that must adapt alongside organizational complexity. Structure establishes foundations; disciplined attention sustains effectiveness.

The Gardener of Governance underscores the importance of cultivation and stewardship within this evolving landscape Internal Audit supports that cultivation by examining how governance operates across complex, interdependent environments and by structuring its reviews to reflect accountability clarity, escalation effectiveness, and strategic alignment.

Through this governance centered lens, Internal Audit strengthens organizational resilience and sustains the integrity of oversight mechanisms that underpin long term performance.

 

Apr 10, 2026

4 min read

Co-Engineer Operational Resilience: Implementers and Internal Auditors

In many organizations, “risk-based governance” has become synonymous with prioritizing artifacts. Leaders review top risks and key controls. Audit tests assess control effectiveness. Evidence is collected. Findings are issued. The cycle repeats.

Meanwhile, operational failures persist. Modern digital enterprises adapt under pressure. Systems behave differently during peak demand. Suppliers' performance characteristics shift. Incentives distort behavior. Change pipelines compress. What appears stable under normal conditions can degrade rapidly under stress.

After disruptions, organizations can often explain what happened. The more complex question is whether they possessed credible evidence beforehand that would have justified confidence or prompted corrective action.

Adding more artifacts does not close this gap. Increasing audit frequency does not close it. The gap closes only when assurance becomes a disciplined linkage among intent, outcomes, and operational evidence at critical boundaries.

Why Traditional Risk-Based Governance Drifts Toward Artifacts

Artifact drift happens for structural reasons.

First, artifacts scale. Policies, mappings, and attestations are easier to collect and store than operational evidence under pressure.

Second, incentives favor explainability. Governance forums reward clarity and completeness. Evidence that reveals uncertainty is uncomfortable. Over time, narrative confidence replaces tested confidence.

Third, audit cycles are retrospective. Independence and resource constraints encourage validation of what exists rather than shaping how assurance is generated. This protects objectivity but can reduce relevance in fast-changing environments.

None of this implies traditional methods are wrong. It means they are incomplete. Organizations need a complementary approach that keeps governance aligned with performance without compromising audit independence.

DVMS as an Operating Overlay

DVMS does not replace frameworks. It overlays them. It helps organizations test whether they can create, protect, and deliver digital value in a resilient manner.

In canonical order, DVMS demonstrates competence through seven capabilities: Govern, Assure, Plan, Design, Change, Execute, and Innovate. The overlay does not prescribe a structure. It asks whether capability outcomes are achieved.

For internal audit, this matters. DVMS provides a neutral lens for evaluating whether the organizational operating system can reliably achieve its intent. Audit need not enforce frameworks. It can assess whether evidence supports confidence in capability performance.

QO-QM Trees: Designing Assurance Instead of Collecting Metrics

Assurance fails when outcomes and measures are incoherent.

QO-QM (Question Outcome and Question Metric) translates leadership claims into measurable, testable structures. It is not a one-to-one pairing between the outcome and the metric. It is a tree.

A root outcome expresses a leadership claim. For example, “We can maintain critical service outcomes during disruption.” That root decomposes into branch outcomes that represent boundary behaviors. Each branch is supported by observable metrics tied to evidence sources and sampling routines.

The tree provides traceability. Metrics that do not support a branch do not belong in governance assurance, even if they are useful locally.

For audit, QO-QM trees clarify sufficiency. Evidence is evaluated not as isolated data but as structured support for a claim. Assurance shifts from validating artifacts to assessing whether the measurement design supports justified confidence.

Fit for Purpose and Fit for Use

Two complementary lenses strengthen assurance.

Fit for purpose asks whether the capability is designed appropriately. Are governance patterns, controls, and decision rights aligned to intent?

Fit for use asks whether the capability works under real conditions, under time pressure, with imperfect information.

Organizations often achieve one without the other. Policies may be well designed yet degrade in practice. Teams may develop effective workarounds that succeed locally but cannot scale or be governed.

DVMS-informed assurance must address both lenses. QO-QM trees enable this distinction. Upper branches often reflect expectations for fit-for-purpose design. Lower branches reveal fit-for-use behavior under operational stress.

Assurance becomes stronger when the connection is explicit.

The Implementer–Auditor Pairing Model

This model does not blur roles. It clarifies them.

The Implementer

Implementers design workflows, operate systems, configure controls, and manage dependencies. Their success metrics emphasize delivery and availability. Their risk is local optimization, improving a domain while cross-boundary risk accumulates.

The Auditor

Internal auditors evaluate whether governance and controls are effective. Their success metrics emphasize independence and credibility. Their risk is artifact focus, verifying what is easiest to inspect rather than what matters most under stress.

The Pairing Principle

In the pairing model, implementers and auditors co-engineer the QO-QM tree for a high-consequence boundary. Implementers propose metrics and instrumentation. Auditors challenge sufficiency, sampling integrity, and resistance to gaming.

Management remains responsible for operations. Audit retains independent evaluation authority. The benefit is profound. Evidence becomes a byproduct of work rather than an afterthought. Audit shifts from downstream inspector to assurance design partner. Leadership receives relevant, timely confidence grounded in performance evidence.

A Practical Six-Step Workflow

This workflow integrates into existing forums. No new bureaucracy is required.

1. Select a critical boundary and define a resilience claim.
Choose a boundary where failure has material consequences. Define the claim in testable language, such as “We can recover the service within X under Y conditions.”

2. Build the top of the QO-QM tree together.
Define the root outcome and two to four branch outcomes representing real behaviors. Auditors add value by asking what must be true and how it would be known.

3. Define metrics and evidence sources.
Implementers propose telemetry, logs, test results, incident patterns, and supplier signals. Auditors evaluate integrity and gaming resistance.

4. Agree on evidence quality criteria.
Specify sampling methods, tolerances, timeliness, and escalation triggers. Define how anomalies are handled. This prevents dashboard theater.

5. Embed assurance into existing routines.
Use operations reviews, change reviews, incident reviews, and risk forums. Review one branch at a time. The objective is decision, not reporting.

6. Close the loop.
Evidence drives change. Resample to validate improvement. Without resampling, assurance remains narrative. With it, governance becomes demonstrable.

What Changes for Internal Audit

The pairing model implies several shifts.

Audit planning becomes boundary-driven rather than solely framework-driven. High-consequence boundaries are prioritized.

Audit becomes evidence-literate. Evaluating telemetry, sampling methods, and behavior-driving metrics becomes as essential as validating documentation.

Audit reporting becomes decision-relevant. Findings tied to QO-QM branches clearly indicate which outcomes are at risk and why.

Independence remains intact through clear role separation. Audit helps define evidence sufficiency but does not operate controls. Audit retains the right to independently challenge and validate evidence streams.

Independence and Guardrails

Concerns about independence are legitimate if roles blur.

Guardrails include role clarity, transparency about audit involvement in evidence design, and formal retention of independent validation authority.

The pairing model is most appropriate for high-consequence boundaries where the quality of evidence materially affects leadership decisions. Lower-risk areas may remain suited to traditional audit approaches.

Properly structured, the model strengthens independence by improving the credibility of evidence.

What Leadership Gains

When implementers and auditors co-engineer assurance through DVMS and QO-QM, leadership gains tangible benefits.

Drift becomes visible earlier because evidence is collected during operations. Trade-offs become clearer because outcomes and tolerances are explicit. Accountability improves because boundary stewardship is defined. Resilience becomes measurable because recovery and learning loops are validated rather than assumed.

Governance credibility increases. Confidence is grounded in demonstrated performance rather than in the presence of artifacts. That is governing through assurance.

The Future of Internal Audit

Operational environments are changing faster, dependencies are deeper, and resilience expectations are higher. In that context, an audit’s value increases when it helps the organization build justified confidence through evidence.

DVMS provides the overlay linking intent to capability. QO-QM trees provide the discipline linking claims to measurable outcomes. The implementer–auditor pairing model operationalizes assurance without compromising independence.

This is not a call for audit to become management. It is a call for audit and management to co-engineer assurance so governance becomes demonstrable, defensible, and adaptive. In dynamic systems, resilience is not declared. It is evidenced.


Apr 10, 2026

6 min read

How Internal Auditors Can Use the DVMS Approach to Strengthen Cyber Risk Scoping and Testing

Those activities remain necessary, but they are no longer sufficient. The real question facing internal audit today is not whether controls exist, but whether the organization’s digital work system can reliably create, protect, and deliver value under normal and stressed conditions.


The Digital Value Management System (DVMS) offers an approach that enables internal auditors to scope and test digital programs in alignment with how value and risk are produced in the organization.

Starting With the CPD Model: Create, Protect, Deliver

At the heart of DVMS is the CPD Model: Create, Protect, Deliver. Every digital initiative, including cybersecurity, ITSM, GRC, AI, and transformation programs, exists to support one or more of these three value-producing motions.

·       Create refers to innovation, growth, and the development of new capabilities.

·       Protect ensures value is safeguarded against threats, volatility, and failure.

·       Deliver ensures value is reliably produced and consumed as intended.

For internal auditors, CPD becomes a powerful lens for scoping. Rather than beginning with a framework checklist, auditors can start by asking:

·       What value is this program intended to create, protect, or deliver?

·       How does leadership define success?

·       Where does imbalance across CPD create systemic risk?

Cybersecurity, for example, often overemphasizes Protect at the expense of Create and Deliver. Internal audit can reveal whether protection mechanisms unintentionally constrain innovation or operational flow, or whether delivery pressures erode protective discipline. This CPD imbalance frequently exposes risk concentrations that control catalogs do not reveal. Scoping through CPD ensures the audit begins with the inseparability of value and risk, not with control enumeration.

Using the MVC Capability Overlay to Structure Scope

The DVMS Minimum Viable Capabilities (MVC) provide the operational overlay that translates CPD intent into execution.

·       Govern establishes direction, decision rights, and accountability.

·       Assure validates the reliability of the outcomes with credible evidence.

·       Plan and Design shape how value will be produced.

·       Change and Execute operationalize intent.

·       Innovate ensures adaptive capacity in dynamic environments.

These capabilities represent the organizational system required to sustain digital value production. Internal auditors provide a structured approach to scoping and segmenting testing. Instead of auditing “cybersecurity controls” as a monolith, internal auditors can ask:

·       Where in the MVC sequence is risk most concentrated?

·       Is governance intent clearly articulated and operationalized?

·       Does the Assure capability generate reliable evidence tied to outcomes?

·       Are Plan and Design producing resilient workflows?

·       Can Change and Execute perform under stress?

·       Does Innovate adapt based on learning?

This capability-based scoping often reveals that failures attributed to “control breakdowns” are actually design flaws, governance ambiguity, or weak assurance logic. By mapping audit scope to MVC, the internal audit evaluates the system rather than isolated components.

Reframing Assurance Through QO-QM Logic

In DVMS, assurance is not the accumulation of dashboards and artifacts. It is the disciplined validation of outcome reliability through Question Outcome and Question Metric logic.

A Question Outcome defines what leadership must know to determine whether value is being created, protected, or delivered.
A Question Metric defines the measurable indicator that answers that question.

Internal auditors can leverage QO-QM to evaluate whether the organization’s Assure capability is structurally sound. For example:

·       What outcome is leadership attempting to assure?

·       What question must be answered to validate that outcome?

·       What metric provides reliable evidence?

·       Is the metric complete, accurate, and decision-useful?

·       Is the evidence traceable to execution?

Many organizations generate extensive data, but cannot clearly articulate the outcome questions those metrics answer. When QO-QM linkage is weak, assurance becomes performative rather than substantive.

Internal audit can test whether assurance evidence supports board-level decision-making or merely serves to populate reports. This shift elevates audit from control validation to outcome validation.

Scoping Based on Capability Alignment, Not Framework Coverage

Traditional scoping often begins with mapping controls to NIST, ISO, or regulatory standards. DVMS does not replace those frameworks, but it reframes how they are evaluated.

Instead of asking whether controls align with a framework, internal auditors can assess whether:

·       CPD balance is maintained

·       MVC capabilities are coherently aligned

·       Governance direction translates into operational design

·       Assurance evidence reliably reflects execution

Misalignment across these dimensions represents systemic risk.

For example:

·       If governance intent emphasizes resilience but Change and Execute capabilities are under-resourced, resilience will not materialize.

·       If Protect dominates without corresponding Innovate capability, adaptive capacity erodes.

·       If Assure lacks QO-QM discipline, leadership decisions rest on unstable evidence.

These alignment gaps are audit priorities because they threaten the organization’s ability to produce reliable digital value.

Designing Tests That Evaluate System Reliability

Once scoped, testing under DVMS moves beyond existence checks. Internal auditors evaluate whether the system can reliably perform.

Testing can examine:

·       Whether governance direction is operationally translated

·       Whether capability design reflects intended outcomes

·       Whether execution produces consistent results

·       Whether assurance evidence validates performance

·       Whether learning feeds back into innovation

Resilience becomes observable when capabilities perform under variability and stress. Internal audit can assess whether scenario exercises, incident response simulations, and operational disruptions reveal design weaknesses or confirm reliability. This is not a “closed-loop compliance” exercise. It is a systemic reliability evaluation.

Structuring Audit Reporting Around DVMS                             

Audit reporting aligned to DVMS can be organized by capability impact rather than control deficiency. Findings may be framed as:

·       Governance ambiguity affecting CPD balance

·       Weak Assure capability reduces outcome confidence

·       Design limitations constraining execution reliability

·       Change management friction inhibiting Protect effectiveness

·       Innovation gaps limiting adaptive resilience

This structure communicates risk in a language boards understand, reflecting the organization’s ability to reliably produce value. Rather than presenting isolated control gaps, the audit communicates how capability weaknesses affect Create, Protect, and Deliver outcomes.

Elevating Internal Audit’s Strategic Contribution

When the internal audit applies the DVMS approach, it transitions from verifying compliance to validating organizational reliability. It helps leadership understand:

·       Whether governance intent is actionable

·       Whether capabilities are coherent

·       Whether assurance evidence is decision-grade

·       Whether value and risk remain balanced

·       Whether the organization can adapt under pressure

In dynamic digital environments, this level of insight is what boards increasingly expect. The DVMS approach does not replace existing audit methodologies. It strengthens them by anchoring scoping and testing in how digital value is created and protected.

By aligning audit work with CPD, structuring the scope around the MVC capability sequence, and testing assurance through QO-QM logic, internal audit becomes a strategic contributor to resilience rather than a retrospective validator of controls.

That shift is not cosmetic. It reflects a deeper recognition that in the digital era, assurance is not about artifacts. It is about confidence in the organization’s ability to consistently create, protect, and deliver value, even under stress.

And that is precisely where internal audit can have its greatest impact.


Apr 10, 2026

6 min read

Cultivating Governance: The role of Internal Audit

Governance Gaps in Complex Organizations

As organizations expand, responsibilities become distributed across business units, shared services, technology platforms, and specialized risk functions. Decision rights may be documented, and reporting lines may appear clear on paper, yet ambiguity often emerges at operational transition points, especially where responsibilities shift between teams, systems, or governance layers.

The Gardener of Governance emphasizes the importance of clarity in roles and the ongoing reinforcement of oversight mechanisms. Governance retains its strength when authority, responsibility, and consequence remain aligned. When that alignment begins to drift, gaps tend to develop gradually rather than dramatically, highlighting the importance of continuous observation and evaluation.

 

Digitization adds further complexity. Automation enhances efficiency and consistency, while exception handling and override authority frequently sit outside core workflows. The boundary between automated control and human intervention therefore becomes an important governance touchpoint. It is at these intersections, between system and operator, between first line and oversight function, that accountability can blur.

Over time, incremental ambiguity accumulates. Sustained attention to governance coherence becomes essential in preventing risk concentration across these boundaries.


Internal Audit’s Governance Contribution

Internal Audit traditionally provides assurance over risk management and internal control; viewed through a governance perspective, its contribution extends into evaluating how accountability operates across the enterprise.

Through its reviews, Internal Audit examines whether decision rights align with operational responsibility, whether risk ownership corresponds to authority, and whether escalation pathways translate issues into timely action. This role aligns closely with the stewardship themes highlighted in The Gardener of Governance, which frames governance as a discipline requiring reinforcement and recalibration as conditions change.

Because Internal Audit operates across organizational silos, it can identify patterns that may remain invisible within individual functions. It sees how policies translate into behavior, how committees influence outcomes, and how governance forums drive, or fail to drive, corrective action. In doing so, Internal Audit provides boards and executive leadership with insight into governance effectiveness, offering a perspective that integrates structure, behavior, and consequence.

 

 Structuring the Internal Audit Review Scope to Reflect Governance Priorities

If Internal Audit contributes to governance cultivation, its review scopes must reflect governance dynamics as well as process mechanics. A governance informed scope deliberately incorporates accountability architecture into its design.

Internal Audit enhances governance by designing review scopes that integrate governance considerations with operational testing.

1.     Define Governance Boundaries Explicitly

Governance boundaries should be defined alongside process boundaries. Scoping conversations benefit from identifying which committees review outcomes, where key decisions are ratified, and who holds ultimate accountability for remediation. This approach connects transactional testing with oversight structures and ensures that governance touchpoints form part of the review narrative.

2.     Identify Accountability Transition Points

Accountability transition points warrant focused attention. Responsibility frequently shifts from automated control to manual intervention, from first line execution to oversight functions, and from issue identification to executive action. Evaluating how these handovers occur in practice provides meaningful insight into governance clarity.

3.     Evaluate Escalation Pathways

Escalation pathways merit examination as dynamic mechanisms rather than static documentation. Clear thresholds, timely decisions, and disciplined tracking of corrective actions reveal governance discipline in operation. Observing how issues progress through governance channels allows Internal Audit to assess whether oversight generates consequence.

4.     Align Scope with Board Level Risk Themes

Alignment with board level risk themes enhances strategic coherence. When audit scopes reflect priorities such as cyber resilience, regulatory exposure, operational continuity, or financial integrity, they reinforce the connection between governance oversight and operational review activity.

5.     Assess Governance Under Pressure

Governance assessment gains depth when viewed through the lens of organizational response under pressure. Examining how prior incidents were handled, how emergency decision rights were exercised, and how accountability was maintained during disruption offers valuable perspective on governance sustainability.

 

From Assurance to Stewardship

The gardening metaphor provides a useful lens for understanding governance maturity. Growth is continuous, and complexity expands as organizations evolve. Sustained cultivation preserves alignment between authority, responsibility, and oversight.

Organizational transformation, whether through digital integration, restructuring, or expansion, inevitably reshapes accountability frameworks. Periodic evaluation of these frameworks strengthens resilience and reinforces governance coherence.

Internal Audit contributes to this process by bringing visibility to areas where authority and responsibility diverge, highlighting concentrated risk at transition points, and assessing whether governance mechanisms translate deliberation into action. Through thoughtful scoping and systemic evaluation, it supports the conditions under which governance flourishes.


Conclusion

Governance represents an evolving system of accountability, decision making, and oversight that must adapt alongside organizational complexity. Structure establishes foundations; disciplined attention sustains effectiveness.

The Gardener of Governance underscores the importance of cultivation and stewardship within this evolving landscape Internal Audit supports that cultivation by examining how governance operates across complex, interdependent environments and by structuring its reviews to reflect accountability clarity, escalation effectiveness, and strategic alignment.

Through this governance centered lens, Internal Audit strengthens organizational resilience and sustains the integrity of oversight mechanisms that underpin long term performance.

 

Co-Engineer Operational Resilience: Implementers and Internal Auditors

In many organizations, “risk-based governance” has become synonymous with prioritizing artifacts. Leaders review top risks and key controls. Audit tests assess control effectiveness. Evidence is collected. Findings are issued. The cycle repeats.

Meanwhile, operational failures persist. Modern digital enterprises adapt under pressure. Systems behave differently during peak demand. Suppliers' performance characteristics shift. Incentives distort behavior. Change pipelines compress. What appears stable under normal conditions can degrade rapidly under stress.

After disruptions, organizations can often explain what happened. The more complex question is whether they possessed credible evidence beforehand that would have justified confidence or prompted corrective action.

Adding more artifacts does not close this gap. Increasing audit frequency does not close it. The gap closes only when assurance becomes a disciplined linkage among intent, outcomes, and operational evidence at critical boundaries.

Why Traditional Risk-Based Governance Drifts Toward Artifacts

Artifact drift happens for structural reasons.

First, artifacts scale. Policies, mappings, and attestations are easier to collect and store than operational evidence under pressure.

Second, incentives favor explainability. Governance forums reward clarity and completeness. Evidence that reveals uncertainty is uncomfortable. Over time, narrative confidence replaces tested confidence.

Third, audit cycles are retrospective. Independence and resource constraints encourage validation of what exists rather than shaping how assurance is generated. This protects objectivity but can reduce relevance in fast-changing environments.

None of this implies traditional methods are wrong. It means they are incomplete. Organizations need a complementary approach that keeps governance aligned with performance without compromising audit independence.

DVMS as an Operating Overlay

DVMS does not replace frameworks. It overlays them. It helps organizations test whether they can create, protect, and deliver digital value in a resilient manner.

In canonical order, DVMS demonstrates competence through seven capabilities: Govern, Assure, Plan, Design, Change, Execute, and Innovate. The overlay does not prescribe a structure. It asks whether capability outcomes are achieved.

For internal audit, this matters. DVMS provides a neutral lens for evaluating whether the organizational operating system can reliably achieve its intent. Audit need not enforce frameworks. It can assess whether evidence supports confidence in capability performance.

QO-QM Trees: Designing Assurance Instead of Collecting Metrics

Assurance fails when outcomes and measures are incoherent.

QO-QM (Question Outcome and Question Metric) translates leadership claims into measurable, testable structures. It is not a one-to-one pairing between the outcome and the metric. It is a tree.

A root outcome expresses a leadership claim. For example, “We can maintain critical service outcomes during disruption.” That root decomposes into branch outcomes that represent boundary behaviors. Each branch is supported by observable metrics tied to evidence sources and sampling routines.

The tree provides traceability. Metrics that do not support a branch do not belong in governance assurance, even if they are useful locally.

For audit, QO-QM trees clarify sufficiency. Evidence is evaluated not as isolated data but as structured support for a claim. Assurance shifts from validating artifacts to assessing whether the measurement design supports justified confidence.

Fit for Purpose and Fit for Use

Two complementary lenses strengthen assurance.

Fit for purpose asks whether the capability is designed appropriately. Are governance patterns, controls, and decision rights aligned to intent?

Fit for use asks whether the capability works under real conditions, under time pressure, with imperfect information.

Organizations often achieve one without the other. Policies may be well designed yet degrade in practice. Teams may develop effective workarounds that succeed locally but cannot scale or be governed.

DVMS-informed assurance must address both lenses. QO-QM trees enable this distinction. Upper branches often reflect expectations for fit-for-purpose design. Lower branches reveal fit-for-use behavior under operational stress.

Assurance becomes stronger when the connection is explicit.

The Implementer–Auditor Pairing Model

This model does not blur roles. It clarifies them.

The Implementer

Implementers design workflows, operate systems, configure controls, and manage dependencies. Their success metrics emphasize delivery and availability. Their risk is local optimization, improving a domain while cross-boundary risk accumulates.

The Auditor

Internal auditors evaluate whether governance and controls are effective. Their success metrics emphasize independence and credibility. Their risk is artifact focus, verifying what is easiest to inspect rather than what matters most under stress.

The Pairing Principle

In the pairing model, implementers and auditors co-engineer the QO-QM tree for a high-consequence boundary. Implementers propose metrics and instrumentation. Auditors challenge sufficiency, sampling integrity, and resistance to gaming.

Management remains responsible for operations. Audit retains independent evaluation authority. The benefit is profound. Evidence becomes a byproduct of work rather than an afterthought. Audit shifts from downstream inspector to assurance design partner. Leadership receives relevant, timely confidence grounded in performance evidence.

A Practical Six-Step Workflow

This workflow integrates into existing forums. No new bureaucracy is required.

1. Select a critical boundary and define a resilience claim.
Choose a boundary where failure has material consequences. Define the claim in testable language, such as “We can recover the service within X under Y conditions.”

2. Build the top of the QO-QM tree together.
Define the root outcome and two to four branch outcomes representing real behaviors. Auditors add value by asking what must be true and how it would be known.

3. Define metrics and evidence sources.
Implementers propose telemetry, logs, test results, incident patterns, and supplier signals. Auditors evaluate integrity and gaming resistance.

4. Agree on evidence quality criteria.
Specify sampling methods, tolerances, timeliness, and escalation triggers. Define how anomalies are handled. This prevents dashboard theater.

5. Embed assurance into existing routines.
Use operations reviews, change reviews, incident reviews, and risk forums. Review one branch at a time. The objective is decision, not reporting.

6. Close the loop.
Evidence drives change. Resample to validate improvement. Without resampling, assurance remains narrative. With it, governance becomes demonstrable.

What Changes for Internal Audit

The pairing model implies several shifts.

Audit planning becomes boundary-driven rather than solely framework-driven. High-consequence boundaries are prioritized.

Audit becomes evidence-literate. Evaluating telemetry, sampling methods, and behavior-driving metrics becomes as essential as validating documentation.

Audit reporting becomes decision-relevant. Findings tied to QO-QM branches clearly indicate which outcomes are at risk and why.

Independence remains intact through clear role separation. Audit helps define evidence sufficiency but does not operate controls. Audit retains the right to independently challenge and validate evidence streams.

Independence and Guardrails

Concerns about independence are legitimate if roles blur.

Guardrails include role clarity, transparency about audit involvement in evidence design, and formal retention of independent validation authority.

The pairing model is most appropriate for high-consequence boundaries where the quality of evidence materially affects leadership decisions. Lower-risk areas may remain suited to traditional audit approaches.

Properly structured, the model strengthens independence by improving the credibility of evidence.

What Leadership Gains

When implementers and auditors co-engineer assurance through DVMS and QO-QM, leadership gains tangible benefits.

Drift becomes visible earlier because evidence is collected during operations. Trade-offs become clearer because outcomes and tolerances are explicit. Accountability improves because boundary stewardship is defined. Resilience becomes measurable because recovery and learning loops are validated rather than assumed.

Governance credibility increases. Confidence is grounded in demonstrated performance rather than in the presence of artifacts. That is governing through assurance.

The Future of Internal Audit

Operational environments are changing faster, dependencies are deeper, and resilience expectations are higher. In that context, an audit’s value increases when it helps the organization build justified confidence through evidence.

DVMS provides the overlay linking intent to capability. QO-QM trees provide the discipline linking claims to measurable outcomes. The implementer–auditor pairing model operationalizes assurance without compromising independence.

This is not a call for audit to become management. It is a call for audit and management to co-engineer assurance so governance becomes demonstrable, defensible, and adaptive. In dynamic systems, resilience is not declared. It is evidenced.


How Internal Auditors Can Use the DVMS Approach to Strengthen Cyber Risk Scoping and Testing

Those activities remain necessary, but they are no longer sufficient. The real question facing internal audit today is not whether controls exist, but whether the organization’s digital work system can reliably create, protect, and deliver value under normal and stressed conditions.


The Digital Value Management System (DVMS) offers an approach that enables internal auditors to scope and test digital programs in alignment with how value and risk are produced in the organization.

Starting With the CPD Model: Create, Protect, Deliver

At the heart of DVMS is the CPD Model: Create, Protect, Deliver. Every digital initiative, including cybersecurity, ITSM, GRC, AI, and transformation programs, exists to support one or more of these three value-producing motions.

·       Create refers to innovation, growth, and the development of new capabilities.

·       Protect ensures value is safeguarded against threats, volatility, and failure.

·       Deliver ensures value is reliably produced and consumed as intended.

For internal auditors, CPD becomes a powerful lens for scoping. Rather than beginning with a framework checklist, auditors can start by asking:

·       What value is this program intended to create, protect, or deliver?

·       How does leadership define success?

·       Where does imbalance across CPD create systemic risk?

Cybersecurity, for example, often overemphasizes Protect at the expense of Create and Deliver. Internal audit can reveal whether protection mechanisms unintentionally constrain innovation or operational flow, or whether delivery pressures erode protective discipline. This CPD imbalance frequently exposes risk concentrations that control catalogs do not reveal. Scoping through CPD ensures the audit begins with the inseparability of value and risk, not with control enumeration.

Using the MVC Capability Overlay to Structure Scope

The DVMS Minimum Viable Capabilities (MVC) provide the operational overlay that translates CPD intent into execution.

·       Govern establishes direction, decision rights, and accountability.

·       Assure validates the reliability of the outcomes with credible evidence.

·       Plan and Design shape how value will be produced.

·       Change and Execute operationalize intent.

·       Innovate ensures adaptive capacity in dynamic environments.

These capabilities represent the organizational system required to sustain digital value production. Internal auditors provide a structured approach to scoping and segmenting testing. Instead of auditing “cybersecurity controls” as a monolith, internal auditors can ask:

·       Where in the MVC sequence is risk most concentrated?

·       Is governance intent clearly articulated and operationalized?

·       Does the Assure capability generate reliable evidence tied to outcomes?

·       Are Plan and Design producing resilient workflows?

·       Can Change and Execute perform under stress?

·       Does Innovate adapt based on learning?

This capability-based scoping often reveals that failures attributed to “control breakdowns” are actually design flaws, governance ambiguity, or weak assurance logic. By mapping audit scope to MVC, the internal audit evaluates the system rather than isolated components.

Reframing Assurance Through QO-QM Logic

In DVMS, assurance is not the accumulation of dashboards and artifacts. It is the disciplined validation of outcome reliability through Question Outcome and Question Metric logic.

A Question Outcome defines what leadership must know to determine whether value is being created, protected, or delivered.
A Question Metric defines the measurable indicator that answers that question.

Internal auditors can leverage QO-QM to evaluate whether the organization’s Assure capability is structurally sound. For example:

·       What outcome is leadership attempting to assure?

·       What question must be answered to validate that outcome?

·       What metric provides reliable evidence?

·       Is the metric complete, accurate, and decision-useful?

·       Is the evidence traceable to execution?

Many organizations generate extensive data, but cannot clearly articulate the outcome questions those metrics answer. When QO-QM linkage is weak, assurance becomes performative rather than substantive.

Internal audit can test whether assurance evidence supports board-level decision-making or merely serves to populate reports. This shift elevates audit from control validation to outcome validation.

Scoping Based on Capability Alignment, Not Framework Coverage

Traditional scoping often begins with mapping controls to NIST, ISO, or regulatory standards. DVMS does not replace those frameworks, but it reframes how they are evaluated.

Instead of asking whether controls align with a framework, internal auditors can assess whether:

·       CPD balance is maintained

·       MVC capabilities are coherently aligned

·       Governance direction translates into operational design

·       Assurance evidence reliably reflects execution

Misalignment across these dimensions represents systemic risk.

For example:

·       If governance intent emphasizes resilience but Change and Execute capabilities are under-resourced, resilience will not materialize.

·       If Protect dominates without corresponding Innovate capability, adaptive capacity erodes.

·       If Assure lacks QO-QM discipline, leadership decisions rest on unstable evidence.

These alignment gaps are audit priorities because they threaten the organization’s ability to produce reliable digital value.

Designing Tests That Evaluate System Reliability

Once scoped, testing under DVMS moves beyond existence checks. Internal auditors evaluate whether the system can reliably perform.

Testing can examine:

·       Whether governance direction is operationally translated

·       Whether capability design reflects intended outcomes

·       Whether execution produces consistent results

·       Whether assurance evidence validates performance

·       Whether learning feeds back into innovation

Resilience becomes observable when capabilities perform under variability and stress. Internal audit can assess whether scenario exercises, incident response simulations, and operational disruptions reveal design weaknesses or confirm reliability. This is not a “closed-loop compliance” exercise. It is a systemic reliability evaluation.

Structuring Audit Reporting Around DVMS                             

Audit reporting aligned to DVMS can be organized by capability impact rather than control deficiency. Findings may be framed as:

·       Governance ambiguity affecting CPD balance

·       Weak Assure capability reduces outcome confidence

·       Design limitations constraining execution reliability

·       Change management friction inhibiting Protect effectiveness

·       Innovation gaps limiting adaptive resilience

This structure communicates risk in a language boards understand, reflecting the organization’s ability to reliably produce value. Rather than presenting isolated control gaps, the audit communicates how capability weaknesses affect Create, Protect, and Deliver outcomes.

Elevating Internal Audit’s Strategic Contribution

When the internal audit applies the DVMS approach, it transitions from verifying compliance to validating organizational reliability. It helps leadership understand:

·       Whether governance intent is actionable

·       Whether capabilities are coherent

·       Whether assurance evidence is decision-grade

·       Whether value and risk remain balanced

·       Whether the organization can adapt under pressure

In dynamic digital environments, this level of insight is what boards increasingly expect. The DVMS approach does not replace existing audit methodologies. It strengthens them by anchoring scoping and testing in how digital value is created and protected.

By aligning audit work with CPD, structuring the scope around the MVC capability sequence, and testing assurance through QO-QM logic, internal audit becomes a strategic contributor to resilience rather than a retrospective validator of controls.

That shift is not cosmetic. It reflects a deeper recognition that in the digital era, assurance is not about artifacts. It is about confidence in the organization’s ability to consistently create, protect, and deliver value, even under stress.

And that is precisely where internal audit can have its greatest impact.


Governance, Risk, and Compliance (GRC) Audits: Strengthening the Backbone of Organizational Integrity

For internal auditors and risk and compliance professionals, understanding the full scope of GRC audits is critical. A GRC audit ensures that the frameworks and processes governing the organization are functioning efficiently, aligned with corporate objectives, and prepared to face both present and emerging challenges. But beyond the technicalities, it’s essential to remember that GRC audits must be about more than just meeting requirements; they must also embed integrity and ethical responsibility into the core of the organization.

What is GRC Auditing?

GRC auditing refers to the process of systematically evaluating the governance structures, risk management frameworks, and compliance programs of an organization. The aim is to ensure that governance is strong, risk is effectively managed, and that the organization complies with relevant laws and internal regulations. However, GRC auditing is more than just assessing policies and checklists. It digs deeper into how the organization’s culture, values, and strategies align with its risk appetite, regulatory demands, and long-term goals.

GRC audits offer a comprehensive lens to assess how well an organization is safeguarding its assets, managing its risk exposure, and ensuring that it adheres to both internal and external regulations. Conducting these audits properly ensures that risks are addressed before they become issues, that compliance is maintained consistently, and that governance structures reinforce ethical leadership and accountability at every level.


The Three Pillars of GRC

A GRC audit encompasses three distinct but interconnected pillars: governance, risk, and compliance. Each pillar contributes to the overall health and integrity of the organization:

1. Governance:

Governance refers to the systems, processes, and frameworks that direct and control an organization. It encompasses the policies and practices that ensure decision-making is transparent, accountable, and aligned with organizational objectives. Governance audits look at whether leadership roles are clearly defined, whether the decision-making process promotes accountability, and whether leadership is providing ethical oversight. Effective governance ensures that all actions within the organization are aligned with its mission, values, and strategic goals. []

In a GRC audit, governance assessment involves evaluating how effectively the organization’s governance frameworks function. Are leadership roles clear and consistent? Are decisions made transparently? How well does the board of directors oversee operations, strategy, and risk? Governance audits focus on ensuring that the organization’s ethical and strategic direction is reflected in its daily operations.

2. Risk Management:

Risk management is the cornerstone of organizational resilience. It involves identifying, assessing, and mitigating risks that could prevent the organization from achieving its objectives. A GRC audit assesses how well an organization is prepared for potential risks—both internal and external. Internal auditors examine the risk management framework, evaluate how risks are monitored, and assess whether risk mitigation strategies are properly implemented.

Risk audits aim to determine whether the organization's risk management practices align with its stated risk appetite and business objectives. Additionally, auditors examine the risk landscape to ensure that emerging risks—such as cybersecurity threats, regulatory changes, or operational disruptions—are appropriately addressed. Strong risk management programs not only protect the organization but also enable it to seize opportunities in a controlled manner.

3. Compliance:

Compliance refers to the organization’s adherence to applicable laws, regulations, and internal policies. It goes beyond mere legal requirements—effective compliance programs promote ethical behavior, ensure that regulatory obligations are met, and foster trust with stakeholders. Compliance audits evaluate whether the organization is keeping up with regulatory changes, whether employees are adequately trained on compliance protocols, and whether internal policies are consistently applied.

Compliance audits provide assurance that the organization is staying on the right side of the law. However, it’s not just about regulatory adherence—it’s about cultivating a culture of integrity and accountability where ethical behavior is encouraged and reinforced at every level. Organizations that prioritize compliance as part of their everyday operations are better positioned to maintain strong reputations and long-term success.

Traditional Challenges when Conducting a GRC Audit

While GRC audits are indispensable, they come with their fair share of challenges. Understanding these obstacles is essential for auditors and compliance professionals to conduct effective audits that generate valuable insights:


  • Siloed Operations: A major challenge for internal auditors during GRC audits is dealing with operational silos. In many organizations, governance, risk management, and compliance functions operate independently of each other, which can lead to inefficiencies and communication breakdowns. A GRC audit requires a holistic view of how these functions interact, but siloed operations often result in incomplete risk assessments and a failure to see the interconnections between governance, risk, and compliance.

  • Evolving Regulatory Landscape: Keeping up with rapidly changing laws and regulations is a constant challenge for organizations, particularly those operating in highly regulated industries like finance, healthcare, and energy. Compliance teams may struggle to ensure that new regulatory requirements are integrated into their processes, making it difficult for internal auditors to provide assurance that the organization is staying compliant.

  • Inconsistent Risk Appetite: An organization’s stated risk appetite might not always align with the way risks are actually managed. A disconnect between leadership’s risk tolerance and operational practices can hinder the effectiveness of a GRC audit. Auditors must ensure that risk management strategies reflect the organization’s risk appetite and that there is a clear understanding of risk at all levels of the organization.

  • Documentation Gaps: Effective GRC audits depend on comprehensive documentation of governance frameworks, risk assessments, and compliance efforts. However, many organizations struggle to maintain up-to-date documentation or lack clear record-keeping practices altogether. Without proper documentation, auditors may find it difficult to assess whether policies and controls are being implemented as intended.

  • Resistance to Change: Even when audits identify areas for improvement, organizations may resist implementing changes. This resistance can stem from a reluctance to disrupt established processes or a fear of revealing compliance failures. Internal auditors often face the challenge of persuading stakeholders that audit findings and recommendations will strengthen the organization in the long run.


Key Steps in Conducting a GRC Audit

A well-planned and executed GRC audit provides actionable insights that improve an organization’s governance, risk management, and compliance practices. To ensure success, internal auditors must adopt a methodical approach that integrates both the technical and human elements of GRC auditing.

The key to a successful GRC audit lies in thorough preparation. Before diving into the audit itself, internal auditors must clearly define the scope, objectives, and desired outcomes. This involves discussions with key stakeholders, gathering initial data, and ensuring a shared understanding of the audit’s goals. Framing the audit’s scope with the organization’s unique challenges in mind ensures that the audit delivers meaningful and relevant recommendations.


  • Understanding the Business Context: Every GRC audit begins with understanding the broader context in which the organization operates. Auditors must familiarize themselves with the organization’s industry, competitive landscape, regulatory environment, and strategic goals. This understanding is essential for tailoring the audit to address the unique risks and opportunities the organization faces. Without a clear view of the business environment, auditors may miss critical governance, risk, or compliance issues.

  • Evaluating Governance Structures: A critical component of GRC audits is the assessment of governance structures. This step involves reviewing leadership roles, decision-making processes, board oversight, and organizational accountability. Auditors evaluate how well governance practices align with the company’s strategic objectives. For example, are roles and responsibilities clearly defined? Does leadership provide adequate oversight? Are ethical considerations embedded in decision-making processes?

  • Assessing Risk Management Practices: Risk management practices play a central role in any GRC audit. Auditors examine how risks are identified, assessed, and mitigated. A key part of this step is evaluating whether the organization's risk appetite matches its risk management approach. Additionally, auditors assess the organization's ability to adapt to emerging risks such as cybersecurity threats, market fluctuations, or regulatory changes. The goal is to ensure that risk management practices are not only reactive but also proactive.

  • Testing Compliance Controls: Compliance is not just about following rules—it's about fostering a culture of ethical behavior and accountability. During the audit, auditors examine the organization’s compliance controls, assess whether they align with applicable laws and regulations, and test whether employees are properly trained on compliance protocols. Compliance audits should also evaluate how well internal policies are enforced and whether there are mechanisms in place to detect and address non-compliance.

  • Providing Recommendations: A successful GRC audit doesn’t just identify gaps—it offers actionable recommendations to address them. Internal auditors must communicate their findings clearly and work with stakeholders to develop a plan for implementing changes. This step involves not only presenting findings but also discussing potential solutions, guiding the organization toward strengthening its governance, risk management, and compliance functions.


Three Examples of Successful GRC Audits

Real-world examples of successful GRC audits demonstrate the tangible impact these audits can have on an organization’s resilience, governance, and ethical standing. Here are three examples of large public corporations that leveraged GRC audits to drive positive change:

1. Walmart – Strengthening Supply Chain Risk Management

Walmart, one of the world’s largest retailers, operates an extensive global supply chain. After facing several compliance challenges related to labor practices and environmental regulations, Walmart conducted a comprehensive GRC audit of its supplier governance and compliance processes. The audit revealed critical gaps in supplier monitoring, particularly in regions with heightened regulatory risks.

As a result of the GRC audit, Walmart implemented a more stringent supplier governance framework, introduced real-time monitoring of supplier compliance, and strengthened its due diligence processes. The audit also led to the creation of a centralized compliance management system, enabling Walmart to reduce supply chain risks and enhance corporate accountability. These improvements not only mitigated compliance risks but also bolstered Walmart’s reputation as a responsible and sustainable corporation.

2. JPMorgan Chase – Governance Overhaul After the ‘London Whale’ Incident

In 2012, JPMorgan Chase incurred significant trading losses due to a series of high-risk trades, commonly referred to as the "London Whale" incident. Following this high-profile event, the bank conducted a thorough GRC audit that focused on governance and risk management practices. The audit revealed that a lack of oversight, fragmented risk reporting, and communication breakdowns contributed to the failure to manage the risks involved.

As a result of the audit, JPMorgan Chase strengthened its governance frameworks by enhancing board oversight, increasing transparency in decision-making, and improving risk reporting mechanisms. The audit also prompted the bank to revamp its risk management structures, ensuring that risk mitigation strategies were integrated into the broader strategic framework. These improvements have significantly bolstered the bank’s governance, helping to rebuild trust with stakeholders and regulators.

3. Microsoft – Enhancing Global Compliance and Anti-Corruption Efforts

As a global technology giant, Microsoft operates in multiple jurisdictions with varying regulatory requirements. Following a GRC audit focused on anti-corruption and compliance practices, Microsoft discovered gaps in its third-party vendor relationships, especially in regions with heightened corruption risks. The audit highlighted weaknesses in vendor due diligence, contract management, and monitoring processes.

In response to the findings, Microsoft launched a comprehensive global compliance program designed to address these vulnerabilities. The program included enhanced due diligence for third-party vendors, improved training on anti-corruption laws, and the implementation of a global compliance monitoring system. These initiatives not only reduced Microsoft’s compliance risks but also reinforced the company’s commitment to ethical business practices worldwide.

Humanizing GRC Audits: It’s About More Than Policies and Procedures

While GRC audits are often seen as technical exercises, they also have a deeply human dimension. Organizations are made up of people, and the effectiveness of governance, risk management, and compliance practices depends on how well individuals within the company understand and commit to these principles.

Internal auditors must consider the organization's culture and behavior when conducting a GRC audit. Are leaders setting the right tone from the top? Are employees empowered to speak up when they see something wrong? By focusing on the human side of GRC, auditors can help build a culture of accountability, integrity, and trust that transcends compliance checklists.

Conclusion

Governance, Risk, and Compliance (GRC) audits are essential to maintaining an organization’s integrity, protecting it from risks, and ensuring adherence to regulations. For internal auditors and risk & compliance professionals, GRC audits provide a unique opportunity to assess the structures, practices, and culture that drive organizational success.

By conducting thorough, thoughtful GRC audits, auditors help organizations not only navigate today’s challenges but also build a strong foundation for long-term resilience. Whether identifying weaknesses, providing recommendations, or fostering a culture of compliance, GRC audits are key to ensuring that organizations remain competitive, ethical, and well-governed in an increasingly complex business environment.

CIA Exam 2a - The NFL "Two-Minute Warning" and the Mentor Mode

Then came the first "Try Again" result. Then the second. And then... a few more. I was always agonizingly close to the magic 600 points. My evaluations showed good results in almost every topic, yet success eluded me. I was frantically chasing the result, but the harder I ran, the further it seemed to get.

In the NFL, when a team is slightly behind and the clock is ticking (only 2 minutes left), the "Two-Minute Warning" can help, if they find a new key/tactic, start a fresh attack even from their own 1-yard line, and think rather than fluster. It was my "Two-Minute Warning".

The Audit of my Failures

I sat down and analyzed what went wrong. I had the knowledge, so why was I failing?

1. The Repetition Trap: I had reviewed the same practice questions so many times that the correct answers popped into my head involuntarily. I was scoring 95% on practice tests, but I wasn't in practicing logic, I tested only my memory. 

2. Environmental Risk: On one occasion, I spent the night before the exam in a room with no AC during a heatwave. I walked into the center sleep-deprived and "slow-cooked."

3. The Panic Freeze: I forgot the lesson from Bratislava. Instead of staying relaxed, I let the pressure paralyze me.

The Final Drive: Switching to "Mentor Mode"

I decided to change my tactics completely. There was no need to rush. I slowed down and adopted what I call Mentor Mode:

1. I reviewed significantly fewer questions, but much more thoroughly.
For every single question, I spent for at least 90 seconds during practice with the exception of mock exams. 

2. I didn't just pick the answer; I explained to an imaginary audience exactly why the correct answer was right and why the other three were wrong.

3. The day before the final attempt, I chose total mental relaxation. I spent the day diving into The Hunger Games: The Ballad of Songbirds and Snakes, comparing the book to the movie. It was the perfect distraction to prevent the "Panic Freeze."

After my two-minute warning, it was time for the final drive for Part 2. Details come soon.



CIA Exam 2b - The Final Drive and the "Mentor Mode" in Action

As someone who usually gets more nervous as the day progresses, I needed a plan for the morning. I made a firm decision: Zero studying. Instead, I went back to my distraction—researching the mystery of Lucy Gray from The Hunger Games. I spent the morning reading book chapters and scrolling through fan forums. I didn't find the answer to her fate, but I found something better: mental peace.

The Budapest Final Drive

I had a light lunch and headed to the Pearson Vue center in Budapest. The usual "panic-freeze" was missing. I acknowledged the possibility of failing again—it was a reality, after all—but I decided: "It’s not the end of the world. If I fail, I'll deal with it then. Right now, I just have 100 questions to solve."

The "Mentor" at the Desk

During the exam, I didn't just pick answers; I acted as a mentor. For every question:

 - I thought through all options.

- I mentally explained why the correct one stood out and why the others were wrong ones.

- I checked the clock only at key milestones (Question 25, 50, 75, and 90) to ensure a steady pace—neither rushing nor dragging. I finished with exactly 2 minutes left on the clock.

The Victory

The exam administrator, who had handed me several "Failed" reports in the past, looked at the printer, then at me, and smiled. He was genuinely happy for me.

Result: PASSED.

The "two-minute warning" attack was successful. The "Try Again" loop was broken. I had one final mountain to climb: Part 3.



CIA Exam 3 - The Summer Final, the "Sky Falling," and a Dutch Toast

I took the "Mentor Mode" and refined it into a sustainable rhythm:

- 5 days of deep work: Theory first, then questions in Mentor Mode.

- 1 day of light revision: Maximum 2-3 hours.

- 1 day of total relaxation: Pure mental recovery.

This tactic is a recommendation from several CIA mentors. 

I also changed my logistics strategy: I stopped booking months in advance. I waited until I felt ready, then booked just one week before. Because the Budapest center was closed for the summer, I headed back to where it all began: Bratislava.

The Cooling Strategy 

This time, I was a master of "Environmental Risk." I ensured my accommodation had high-performance air conditioning—no more "sauna rooms." Even when the train was "only" 70 minutes late, I didn't care. I was in Bratislava.

I spent the afternoon letting Bratislava carry me away. A walk, the UFO tower, and total relaxation. But as I returned to my accommodation in the evening, the sky turned black.

The Becherovka Intervention 

Just 40 meters from my room, "the sky fell." A massive summer downpour trapped me under a small 4x4 meter shelter. I wasn't alone; a Dutch university student couple was already there, hiding from the storm.

We started talking. When I told them I was there for a major exam the next day, they gave me the best advice possible: "Don't study now!" They even offered me a shot of Becherovka to seal the deal. We laughed, the rain stopped, and I went to bed perfectly relaxed.

The Final Result 

The exam itself was a replay of my successful Part 2 tactics. I acted as a mentor to myself for every question, maintaining a steady pace. I finished with exactly 1 minute left on the clock.

When I stepped out of the building, the biggest surprise was waiting for me: The Dutch couple. They remembered the time and place from our conversation in the rain, and they were there to cheer for me.

Result: PASSED. Certification: COMPLETE.

Final Lesson Learned:

Success in the CIA journey (and in auditing) is a balance. When I passed, I didn't just have the necessary knowledge—I had the necessary mental state. I was relaxed, calm, and open to the world.

Do you have any CIA or other exam survival stories? Share them in the comments below!

Another CIA series is coming soon. Stay tuned!



Certified Internal Auditor exam is a Practical test - Part 4. Traps to avoid

You’ll notice that many MCQs appear across multiple question banks—perhaps with slightly different wording or explanations. That’s why using different sources can be helpful. But beware: when you see the same question for the second time and again and again, your brain may instantly recognize the correct answer—without thinking.

This is an especially common trap if someone fails an exam and prepares for the retake using the same sources. As you can see in the title, the CIA exam isn’t a memory test. So, if you find yourself recognizing the answers, what should you do? The solution is to switch from passive recall to active reflection:

- Don’t just answer in 5–10 seconds. Ignore the recognition and force yourself to start fresh.

- Take time with each question. Ask yourself: Why is the correct option correct? Why are the others definitively wrong?

This reflective approach helps you discover the underlying patterns, logic structures, and decision-making tools that are essential for the CIA’s scenario-driven questions. In a future post, I’ll share how I got into this trap and how I could overcome this mistake.

Conclusion: The Shift in Perspective

The success of the CIA exam hinges not on simple memorization, but on the ability to apply internal audit logic and standards in real-world scenarios. Instead of trying to memorize thousands of questions, focus on reflective learning: for every question, understand why the correct option is correct and why the others are definitively wrong. This shift in perspective will not only help you pass the exam, but also prepare you to become a thoughtful and practical internal auditor.

Pictures are generated by Gemini AI.



Reach the global Internal Audit community with published articles

Reach the global Internal Audit community with published articles

Reach the global Internal Audit community with published articles

Internal Audit industry news and coverage across the areas of banking, funds, insurance, payments, cryptocurrencies and fintech.

Submit an article

Documentation lies at the heart of internal audits, particularly in the area of data protection. While strong controls and processes are vital, auditors rely on documentation to validate whether these practices are consistent, effective, and sustainable. Preparing robust documentation strategies is therefore one of the most critical steps in audit readiness.

The foundation of documentation is a well-structured policy framework. Organizations should ensure that their data protection policies are current, clearly written, and accessible. These policies must cover data classification, access management, incident response, retention, and disposal. Preparing with documented updates demonstrates that the organization not only establishes but also regularly reviews its controls.

Equally important are records of compliance activities. For instance, training logs, risk assessments, breach reports, and vendor due diligence files all provide concrete evidence of compliance. Maintaining these in a centralized and easily retrievable repository ensures auditors can validate claims efficiently.

Data processing registers form another key area. Internal auditors will expect to see detailed records of what personal data is collected, where it is stored, who has access, and how long it is retained. Preparing such registers in advance not only aids audits but also ensures readiness for regulatory inspections.

Change management documentation is often overlooked but highly relevant. Organizations that implement new systems, migrate to cloud platforms, or alter processes must maintain records of privacy assessments, approval workflows, and testing results. Preparing with these records demonstrates a proactive stance toward risk management.

Incident documentation is also crucial. Even organizations with strong defenses face occasional data breaches or near misses. Preparing with detailed incident reports, root cause analyses, and remediation evidence shows auditors that lessons are learned and improvements applied.

To streamline preparation, organizations should establish standardized templates for documenting compliance activities. This consistency reduces errors, saves time, and ensures uniform quality across departments. Automating document management with compliance software can further reduce the administrative burden while improving accuracy.

Finally, organizations should conduct internal reviews of documentation before the audit begins. Verifying completeness, clarity, and accessibility ensures that evidence supports audit findings effectively. It also prevents delays that could arise from missing or disorganized records.

In conclusion, effective documentation strategies transform audit preparation from a reactive scramble into a proactive process. By maintaining policies, compliance records, processing registers, incident logs, and standardized templates, organizations strengthen their data protection audits and build resilience against regulatory scrutiny.

Documentation lies at the heart of internal audits, particularly in the area of data protection. While strong controls and processes are vital, auditors rely on documentation to validate whether these practices are consistent, effective, and sustainable. Preparing robust documentation strategies is therefore one of the most critical steps in audit readiness.

The foundation of documentation is a well-structured policy framework. Organizations should ensure that their data protection policies are current, clearly written, and accessible. These policies must cover data classification, access management, incident response, retention, and disposal. Preparing with documented updates demonstrates that the organization not only establishes but also regularly reviews its controls.

Equally important are records of compliance activities. For instance, training logs, risk assessments, breach reports, and vendor due diligence files all provide concrete evidence of compliance. Maintaining these in a centralized and easily retrievable repository ensures auditors can validate claims efficiently.

Data processing registers form another key area. Internal auditors will expect to see detailed records of what personal data is collected, where it is stored, who has access, and how long it is retained. Preparing such registers in advance not only aids audits but also ensures readiness for regulatory inspections.

Change management documentation is often overlooked but highly relevant. Organizations that implement new systems, migrate to cloud platforms, or alter processes must maintain records of privacy assessments, approval workflows, and testing results. Preparing with these records demonstrates a proactive stance toward risk management.

Incident documentation is also crucial. Even organizations with strong defenses face occasional data breaches or near misses. Preparing with detailed incident reports, root cause analyses, and remediation evidence shows auditors that lessons are learned and improvements applied.

To streamline preparation, organizations should establish standardized templates for documenting compliance activities. This consistency reduces errors, saves time, and ensures uniform quality across departments. Automating document management with compliance software can further reduce the administrative burden while improving accuracy.

Finally, organizations should conduct internal reviews of documentation before the audit begins. Verifying completeness, clarity, and accessibility ensures that evidence supports audit findings effectively. It also prevents delays that could arise from missing or disorganized records.

In conclusion, effective documentation strategies transform audit preparation from a reactive scramble into a proactive process. By maintaining policies, compliance records, processing registers, incident logs, and standardized templates, organizations strengthen their data protection audits and build resilience against regulatory scrutiny.

Documentation lies at the heart of internal audits, particularly in the area of data protection. While strong controls and processes are vital, auditors rely on documentation to validate whether these practices are consistent, effective, and sustainable. Preparing robust documentation strategies is therefore one of the most critical steps in audit readiness.

The foundation of documentation is a well-structured policy framework. Organizations should ensure that their data protection policies are current, clearly written, and accessible. These policies must cover data classification, access management, incident response, retention, and disposal. Preparing with documented updates demonstrates that the organization not only establishes but also regularly reviews its controls.

Equally important are records of compliance activities. For instance, training logs, risk assessments, breach reports, and vendor due diligence files all provide concrete evidence of compliance. Maintaining these in a centralized and easily retrievable repository ensures auditors can validate claims efficiently.

Data processing registers form another key area. Internal auditors will expect to see detailed records of what personal data is collected, where it is stored, who has access, and how long it is retained. Preparing such registers in advance not only aids audits but also ensures readiness for regulatory inspections.

Change management documentation is often overlooked but highly relevant. Organizations that implement new systems, migrate to cloud platforms, or alter processes must maintain records of privacy assessments, approval workflows, and testing results. Preparing with these records demonstrates a proactive stance toward risk management.

Incident documentation is also crucial. Even organizations with strong defenses face occasional data breaches or near misses. Preparing with detailed incident reports, root cause analyses, and remediation evidence shows auditors that lessons are learned and improvements applied.

To streamline preparation, organizations should establish standardized templates for documenting compliance activities. This consistency reduces errors, saves time, and ensures uniform quality across departments. Automating document management with compliance software can further reduce the administrative burden while improving accuracy.

Finally, organizations should conduct internal reviews of documentation before the audit begins. Verifying completeness, clarity, and accessibility ensures that evidence supports audit findings effectively. It also prevents delays that could arise from missing or disorganized records.

In conclusion, effective documentation strategies transform audit preparation from a reactive scramble into a proactive process. By maintaining policies, compliance records, processing registers, incident logs, and standardized templates, organizations strengthen their data protection audits and build resilience against regulatory scrutiny.

2 min read

About Internal Audit Review

A multidisciplinary review board providing independent, forward-thinking guidance alongside leadership to enhance audit quality, anticipate emerging risks, and drive organizational resilience.

Newsletter

Subscribe now to get timely updates and in-depth insights designed to keep you ahead of the curve.

© 2026

All Rights Reserved

About Internal Audit Review

A multidisciplinary review board providing independent, forward-thinking guidance alongside leadership to enhance audit quality, anticipate emerging risks, and drive organizational resilience.

Newsletter

Subscribe now to get timely updates and in-depth insights designed to keep you ahead of the curve.

© 2026

All Rights Reserved

About Internal Audit Review

A multidisciplinary review board providing independent, forward-thinking guidance alongside leadership to enhance audit quality, anticipate emerging risks, and drive organizational resilience.

Newsletter

Subscribe now to get timely updates and in-depth insights designed to keep you ahead of the curve.

© 2026

All Rights Reserved