2.1 Introduction This chapter addresses the myriad potential avenues for a control environment to be compromised and for an area of risk or investigation to be identified, either proactively or reactively, by a corporate. It also highlights key developments and Read More …