Across IT audit, internal controls, and governance,
we build audit environments where data speaks for itself
and systems prove their own integrity.
Regardless of industry or scale, the fundamental questions around IT controls remain the same.
K-SOX compliance scope keeps expanding, but we lack the in-house expertise to perform ITGC assessments — and the criteria to evaluate external specialists.
From SAP to YoungLimWon, Douzone, and UniERP — each system requires a different approach, and sample-based testing alone isn't enough for regulatory review readiness.
We can't identify which of the 67 inspection items are vulnerable, and we're concerned that gaps between policies and actual operations will lead to regulatory findings.
Embezzlement and misappropriation risks exist, but manual reviews can't cover the full population — we're left relying on after-the-fact detection.
We systematically verify access controls, change management, operations management, and security management across all domains. Instead of sampling, we analyze complete log populations and extract ERP system configurations directly to objectively demonstrate control effectiveness.
Full-population access log analysis, automated identification of privileged access & SoD violations
Complete automated reconciliation of migration history against approval records
Batch job execution log pattern analysis, automated failure & delay detection
Full database access attempt analysis, automated anomalous query filtering
Based on FSS (Financial Supervisory Service) IT audit guidelines, we design the complete framework for organizations to independently perform IT audits. Beyond policy development, we build self-sustaining audit capabilities through a 3-year phased internalization roadmap — eliminating dependency on external consultants.
GTI-led — Establish guidelines, execute first audit cycle, validate procedures
Joint operations — Coach internal auditors, co-execute second audit cycle
Independent operations — Full internal execution, GTI advisory support (2x/year)
Policies → Procedures → Operating Manuals, complete three-tier package
From IT committee structure and operations, segregation of duties, change management, to disaster recovery — we architect and institutionalize your organization's IT control framework. We deliver industry-specific designs that reflect regulatory requirements, not generic templates.
IT committee & council role separation, standardized decision-making framework
Comprehensive change management, DR, network & DB management guidelines
Open-source SCA tool operations, external IT service risk assessment
Asset inventory, classification tiers, and protection standards framework
We uncover what manual reviews miss — through automated full-population transaction reconciliation and pattern analysis. We verify cash flow integrity, proactively identify anomalous transactions, and prevent embezzlement and misappropriation risks before they materialize.
Posting Reconciliation — Verify completeness of fund transfers against general ledger
Counterparty Verification — Cross-validate payment recipients
Duplicate payments, time-of-day, day-of-week & Benford's Law multi-dimensional analysis
Full-population fraud detection + strengthened preventive internal controls
AI and cloud adoption, growing third-party IT risks, and regulators shifting from rules-based to principles-based oversight — these are the forces reshaping IT governance. Built on the COSO framework, GTI continuously advances its audit procedures to keep pace with this evolving landscape.
We analyze the entire population, not samples. Omission risk is eliminated at the source.
Configuration values and logs are extracted directly from ERP, DB, and OS. No reliance on interviews or documentation.
Repetitive verification procedures are automated — eliminating human error and increasing audit efficiency.
Statistical analysis and pattern recognition identify anomalies proactively, before they become issues.
Extract sample of N users from user list and verify manually
Automatically analyze full access logs to instantly identify anomalous access & privilege violations
Sample change requests and review documents one by one
Full-population reconciliation of migration history, automatic detection of unauthorized changes
Visual inspection of batch schedule listings
Full execution log analysis with automated detection of failure spikes & schedule deviations
Extract and review database account listings
Full access attempt log analysis with automated filtering of anomalous queries
Hands-on experience across diverse system environments.
A structured process that gives even first-time partners confidence. We maintain independence and execute NDAs upfront.
Scope, current state & timeline alignment; NDA execution
RCM review, test procedure design, role allocation
Evidence collection, system access, full-population data analysis
Client-format customized deliverables
Findings report, remediation recommendations, post-engagement support
The founder of GTI Audit brings extensive experience from Global Big 4 firm offices in the United States, Australia, and Korea — spanning financial audit, IT audit, internal controls review, internal audit, and fraud investigation.
In the U.S., the practice included financial services sector audits and IT-driven financial data verification for global asset managers, hedge funds, and insurance companies. This was complemented by ISAE 3402-based internal controls reviews and reporting for global manufacturing, IT, and logistics corporations.
In Korea, engagements covered internal accounting management system (K-SOX) reviews, financial data substantive audits, and business process & control effectiveness consulting for major listed companies across telecommunications, aviation, semiconductors, financial services, and energy. This included business process control activity reviews and management inspections of global investee entities.
In Australia, the work encompassed transaction integrity reviews, potential management and employee fraud detection, and control improvement consulting for global investment funds, national carriers, government agencies, and retail & industrial companies.
Drawing on this global field experience, GTI combines direct data verification and automated audit methodologies on top of the COSO framework, designing capability internalization through a three-tier package of Policies → Procedures → Operating Manuals.
Korean & US Certified Public Accountant
Information Systems Audit & Security
Certified Fraud Examiner
US · Australia · Korea — 3 countries
Built on deep IT controls expertise, our audit perspective extends across entire business processes — covering risk and control structures end to end.
Not theoretical consulting — our deliverables have been tested in real financial institutions and listed companies, surviving regulatory inspections.
We verify the entire population, not samples. Omission risk is eliminated at the source, and regulatory review readiness is secured.
We design the capability transfer roadmap from day one — so you don't stay dependent on GTI. Independent operations within three years is the goal.
We deliver differentiated audits that reflect the regulatory nuances and system environments of each industry — financial services, manufacturing, IT, retail, and beyond.
We collaborate as a partner that elevates audit quality. Structural safeguards for independence and confidentiality are built into every engagement.
Anonymized to protect client confidentiality.
Financial audit and IT-driven financial data verification for global asset managers, hedge funds, and major insurance companies. Applied financial services sector-specialized audit methodology.
Design and operating effectiveness review of internal controls for global automotive, gaming, and logistics companies under international audit standards, with formal report issuance.
Internal accounting management system review, financial data substantive audit, and business process & control effectiveness improvement consulting across diverse industries.
Transaction integrity review for global investment funds, national carriers, government agencies, and retail & industrial companies. Potential management and employee fraud detection and control improvement consulting.
Established IT self-audit management guidelines, mapped all FSS 67 inspection items, developed complete operating manuals and templates. Successfully passed subsequent regulatory inspection.
Full-population verification of ERP access controls and change management, application controls effectiveness testing, audit workpaper documentation and deficiency evaluation.
Regulatory trends, practical guides, and audit perspectives.
Analysis of major regulatory amendments and their impact on IT internal controls, with practical compliance strategies.
Priority-ranked breakdown of key regulatory inspection items with recommended initiation strategies.
Core diagnostic questions to evaluate your organization's readiness for an upcoming IT inspection.
The first meeting is complimentary. Share your current situation, and we'll propose the optimal approach.
Project inquiries, complimentary diagnostic assessments, partnership proposals — we welcome all conversations.
Systems & Process Audit specialists.
We build audit environments where systems prove their own integrity.
We offer a complimentary assessment covering 20 key items from the FSS 67-item IT audit checklist, plus a 1-hour expert review session. Select "Complimentary Assessment" in the form below.