Businesses are experiencing more, and more costly, incidents of fraud, compliance breaches and cyberattacks but are not doing enough to protect themselves, KPMG says in its 2022 Fraud Outlook report, A Triple Threat Across the Americas. The report recommends five steps companies can take to mitigate the risk of losses to this "triple threat" of dangers.
IT Governance, Risk & Controls
Major changes can be difficult to implement at any time but especially during a pandemic. Here are some lessons learned from a successful system implementation.
The COSO enterprise risk management framework can help leaders manage risks associated with their AI strategies.
CFOs need to gain perspective on how to handle the accounting, tax, internal control, and risk management challenges of cryptoasset transactions.
Cyberattackers remain unrelenting in adapting tactics to exploit human and technological vulnerabilities.
The coronavirus pandemic has resulted in a realignment of company strategies to enable success during these disruptive times. Some of these decisions — such as the sudden shift to remote work due to stay-at-home orders — have created additional risk corporate boards must consider.
Here is a list of the steps your business should be doing at the absolute minimum when it comes to cybersecurity.
Although blockchain technology creates new risks, organizations also can use it to improve risk management and create better controls.
Tech experts weigh in on the steps firms can take to stay productive in the event of a cloud software outage.
The business risks associated with new technology seem almost endless. But a new resource can help auditors, management and audit committees discharge their responsibilities associated with those risks.
Cyber liability exposures and regulations impacting CPA firms’ duties to protect confidential information have evolved significantly in recent years.
A new tool can help board members understand what questions to ask in their oversight of cybersecurity risk management.
Shark Tank star and cybersecurity expert Robert Herjavec said CPAs have an important role to play as trusted advisers on cybersecurity.
Modern computing power, combined with software including Microsoft Excel, can produce advanced statistical models to analyze the risks of business opportunities.
The AICPA framework enables organizations to communicate and creates a new engagement for CPAs to report.
This Technology Workshop shows how to use Microsoft Excel to determine whether the numbers in a data set follow Benford’s curve or point to possible malfeasance.
AICPA proposals would guide design and evaluation of cyber risk management.
This column discusses the “silent killers” of technology risk that organizations must master to protect their business.
These steps can help close holes in your cybersecurity setup.
This column provides updates and adds perspective on SOC and reflects on changes in the reports and their attestation standards.