IT Governance, Risk & Controls
The coronavirus pandemic has resulted in a realignment of company strategies to enable success during these disruptive times. Some of these decisions — such as the sudden shift to remote work due to stay-at-home orders — have created additional risk corporate boards must consider.
Here is a list of the steps your business should be doing at the absolute minimum when it comes to cybersecurity.
Although blockchain technology creates new risks, organizations also can use it to improve risk management and create better controls.
Tech experts weigh in on the steps firms can take to stay productive in the event of a cloud software outage.
The business risks associated with new technology seem almost endless. But a new resource can help auditors, management and audit committees discharge their responsibilities associated with those risks.
Cyber liability exposures and regulations impacting CPA firms’ duties to protect confidential information have evolved significantly in recent years.
A new tool can help board members understand what questions to ask in their oversight of cybersecurity risk management.
Shark Tank star and cybersecurity expert Robert Herjavec said CPAs have an important role to play as trusted advisers on cybersecurity.
Modern computing power, combined with software including Microsoft Excel, can produce advanced statistical models to analyze the risks of business opportunities.
The AICPA framework enables organizations to communicate and creates a new engagement for CPAs to report.
This Technology Workshop shows how to use Microsoft Excel to determine whether the numbers in a data set follow Benford’s curve or point to possible malfeasance.
AICPA proposals would guide design and evaluation of cyber risk management.
This column discusses the “silent killers” of technology risk that organizations must master to protect their business.
These steps can help close holes in your cybersecurity setup.
This column provides updates and adds perspective on SOC and reflects on changes in the reports and their attestation standards.
Chris Tarbell led FBI investigations that resulted in multiple high-profile cybercrime arrests. He shared his tips for cybersecurity during a presentation at the AICPA spring Council meeting.
See what CPAs can do to fight cybercriminals’ threat.
Vendors represent one of the highest risk areas in an organization’s cybersecurity structure.
Layers of defense should exist in an organization’s systems, with the most sensitive information protected by the most layers.
Internal auditors can play a pivotal role in managing technology risks ranging from cybersecurity to social media. The risks are ranked in a new report that shows how internal audit can help manage them.