Most of us first became aware of blockchain the cloud-based distributed general ledger as a technology associated with bitcoin. Today blockchain is emerging with extraordinary implications for firm growth.
At the most recent AICPA Blockchain Symposium, I talked with three pioneers in the field. As a former auditor, I was especially interested in how blockchain is disrupting the traditional audit function. These explorers have embraced this brave new technology, even as guidelines are still being formulated. I was curious, like many of you, about what its like to audit the blockchain.
I interviewed Andr Sterley, digital asset group leader for Mazars USA in New York; Andries Verschelden, the partner who leads the blockchain practice at Armanino in San Francisco; and Jagruti Solanki, an assurance partner at Aprio in Atlanta specializing in technology and blockchain.
These pioneers have a couple things in common. They were all born outside the U.S. and all had a strong internal motivation to master blockchain technology. An Aha! moment for me was finding out that the blockchain is a subledger. I could get my head wrapped around auditing a subledger. Yet its very different in that it represents a single set of books, housed in the cloud, which serves as a historical repository for every cryptocurrency-based transaction.
A personal journey
South Africa native Andr Sterley, who had always wanted to live and work in the U.S., moved from Mazars South Africa to join Mazars USA in their New York City office in 2014. During the move, parts of his life were on both continents, and Andr found that conventional means of making cross-border payments were slow, costly and inefficient. He started studying bitcoin, thinking it might be an alternative to methods like MoneyGram and Western Union.
Andrs intellectual curiosity grew beyond his own needs. After an in-depth exploration he conducted experiments with a few transactions. It took seconds, versus the days in more traditional methods, plus it was quite inexpensive. Andr saw the potential immediately and concluded that crypto assets and blockchain technology presented an enormous potential business opportunity. Since then, he has become something of a LinkedIn blockchain personality, providing entertaining content and commentary.
By early 2018, he was able to offer services to his first Mazars USA client a business in need of an external financial statement audit. Andr described the need to develop cryptography skills: Auditors were never taught cryptography, the functional discipline combining computer science and locking things digitally. This includes techniques derived from algorithms to secure information in ways that are hard to decipher. But now I had to rely on cryptography and had to get educated, to know that what I was evaluating could be relied upon.
Also, since blockchain is a universal ledger, a transactions historical record can be visible to all parties who have permission to access the blockchain. Imagine grain bushels on a boat, coming in and out of various locations, with the entire record chained together. This becomes the central source of truth, eliminating the necessity for traditional confirmations and reconciliations.
Instead, typical questions to be answered are: Was this particular transaction authorized? Did it go to the right address? Were the parties to the transaction related?
Leveraging a passion
Andries Verscheldens career choice was not a surprise. His father Frans was managing partner of the Moore Stephens (now Moore) firm in Brussels, Belgium. In 2017 Andries merged the interim CFO business he was leading with Armanino, a leading Moore member based out of California. Andries was drawn to the firm for its relentless focus on innovation. He went on to lead the firms entire outsourcing business.
Increasingly fascinated by blockchain and the growing use of cryptocurrencies, Andries expressed his interest to managing partner Matt Armanino, who was impressed by his passion and enthusiasm. Having been involved in helping clients since 2014 with blockchain services, in 2019 Armanino upped its strategic investment in blockchain. The firm made the equally strategic decision to put Andries in charge of the practice. He entered the arrangement with the understanding that blockchain would not be just another industry offering, but one that could fundamentally change the profession, the business model and client expectations.
How revolutionary would that change be? Extremely! Andries described to me the intriguing fact that the majority of digital assets today have no underlying real world asset associated with them. They are series of ones and zeros that only live in this blockchain world, and have the ability to instantaneously transfer value around the world in a direct (peer-to-peer), secure way. He said, Basically, youre being asked to do audits on something that is purely digital in nature, but is known to have value. Ponder that for a moment!
Also of note is the fact that existing enterprise resource planning systems are not set up to integrate with blockchain transactions. In a client situation, this creates a mixed bag of digital assets (like bitcoin) and non-digital assets (like greenbacks) living in different systems. The challenge is reconciling the two with existing tools such as Excel. Luckily, a number of new software startups are closing this gap. Examples are Lukka, Ledgible, Softledger and Blox.
Early adopter
Born in India and raised in Oman, Jagruti Solanki (pictured) is an audit partner at Aprio in Atlanta. All things considered, shes an old hand at blockchain, having served her first client in 2013 when Bitcoin was selling for $200. She recalls with a smile her response (Youre crazy!) when her husband suggested investing. Then it hit $20,000 and I thought I was the crazy one, she added.
Always up for a challenge, this tech-minded auditor made clear her interest in getting involved. Like Andr and Andries, she jumped in with both hands and feet, learning as she went about the risks and the upside potential.
Traditionally, blockchains have been operated publicly. And while private blockchain applications are growing, including among large retailers like Walmart, Jagruti noted the reluctance, even fear, on the part of some accounting firms to get involved.
Thats because they see auditing companies using blockchain technology as carrying a high risk. One contributing factor is that there is currently an absence of definitive standards for auditing the blockchain.
As a result, said Jagruti, theres a considerable amount of judgment involved. Firms that wish to get involved in blockchain should have a culture that is welcoming to technology and has significant trust in its leaders. Whats more, she said, there is not yet a checklist for auditors in this space.
The path forward
Andries noted, I wish there were a clearer roadmap, but we arent there yet. As a result, those CPAs working with blockchain have a sharing community, learning from each other and making the journey together. The AICPA has been instrumental in facilitating this evolution.
I asked the three experts how they would proceed vis vis blockchain if they were managing partners at their respective firms. Aprios Solanki recommended moving boldly forward without fear, and bringing your clients along with you. She believes the spoils will go to the proactive, not to those who rest on the sidelines waiting and watching.
All three explorers concurred that training to get firm members comfortable with the technology is a high priority. Mazars Sterley suggested building blockchain into your strategic planning for the future. Start thinking about what you will offer and how you will get up to speed. Survey clients to gauge their level of understanding and interest.
Armaninos Verschelden weighed in, calling blockchain a trustless, utopian world that disrupts perceptions of traditional trust and value in the CPA domain, like the production of quarterly or annual financial statements.
Armanino recently released the worlds first real-time audit capability, Trustexplorer. It is a tool that utilizes blockchain technology to continuously collect audit evidence. It enables users to generate an audit report over balances that are never older than 30 seconds, on demand when the end user needs it. The technology reminds me of streaming on demand versus how we accessed audio/video in years past.
Our explorers agreed that its essential to ask the tough questions, i.e., will your culture support adoption of blockchain? How forward-looking is your firm? Are members locked into compliance mode, or are they ready to break out and innovate?
As you consider adopting blockchain as a strategic technology, note that its viewed as a plus by young accounting professionals and could even become a recruitment tool. Offering it may also win you points from tech-forward clients, and those whose trust in established financial institutions and structures has eroded over the years.
Said Verschelden, We are providing trust today. But our trust-providing function will change dramatically and the value that we are bringing cant be the way its always been through quarterly reports.
Much remains to be known about the role and impact of blockchain in the future. But there is no doubt that it will continue to migrate from the perimeter into the mainstream of our profession. And our pioneers will continue to chart the course in delivering on-the-ground, real-life experiences.
See original here:
Pathways to Growth: 'Chain' reaction - Accounting Today
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]