Bruce Sussman, CPA
Adapting defensive tools to be used in an analytic, predictive mode is a key to facing cybersecurity challenges, according to Bruce Sussman, CPA, payment card industry global executive for AIG.
This site uses cookies to store information on your computer. Some are essential to make our site work; others help us improve the user experience. By using the site, you consent to the placement of these cookies. Read our privacy policy to learn more.
Adapting defensive tools to be used in an analytic, predictive mode is a key to facing cybersecurity challenges, according to Bruce Sussman, CPA, payment card industry global executive for AIG.
Shark Tank star and cybersecurity expert Robert Herjavec said CPAs have an important role to play as trusted advisers on cybersecurity.
CPAs who possess the appropriate expertise can perform new consulting and attest services for clients under a recently released AICPA framework. Developing expertise in this area is the key.
In this video, Lisa Traina, CPA/CITP, CGMA, Traina & Associates, a CapinCrouse company, discusses the future of cybersecurity, including straightforward ways that organizations can shrink their risk.
In this video, Lisa Traina, CPA/CITP, CGMA, Traina & Associates, a CapinCrouse company, explains why organizations should examine their understanding of cybersecurity threats and offers three ways that CPAs can enhance their organization’s security.
Blockchain could streamline how money moves between nations.
Key statistics illustrate the threats facing the accounting profession—and potential liability for firms if a breach occurs.
Our annual technology roundtable explores the importance of multifactor authentication and solutions for securing clients’ data in the cloud.
What should CPAs be doing to better protect their data and derive more value from the investments in technology? Find out from our panel of accounting technology experts.
Nick Graf, an ethical hacker with CNA, discusses all the cyber threats that go bump in the night and ways to prevent them from harming your business.
This column discusses five reasons finance executives should care about blockchain and its potential.
The framework gives an organization’s management criteria for explaining its cybersecurity risk management program and provides CPAs with guidance to be used in engagements to report on clients’ cybersecurity controls.
To launch Chrome’s incognito mode by default in Windows 10, create a shortcut on your Desktop and edit the shortcut’s command line as follows.
The decision of the IRS and some states to recommend—or, in a few cases, require—the use of driver’s license numbers as form of authentication on electronically filed personal tax returns has made them a higher-value target for hackers and other criminals.
These recently released publications can help jump-start CPA efforts to remain competitive in the evolving digitized environment.
Education and effective governance are keys to an effective cybersecurity policy, according to Steven J. Ursillo Jr., CPA/CITP, CGMA.
Defense from cyberattacks on a CPA firm’s fortress requires more than the IT cavalry.
The best measure you can take to secure your Gmail is to enable two-step verification.
AICPA proposals would guide design and evaluation of cyber risk management.
These 5 tips will help organizations fit security spending into their budgets in a balanced way.
SPONSORED REPORT
The challenges of the new lease accounting standard have been pervasive to say the least. In this free, independently-written report, you'll learn effective adoption strategies as well as resources for easing the transition to the new standard.
FEATURE
Return preparers must be ready for how the Tax Cuts and Jobs Act has modified many common features of individual and business returns.