The coronavirus pandemic has resulted in a realignment of company strategies to enable success during these disruptive times. Some of these decisions — such as the sudden shift to remote work due to stay-at-home orders — have created additional risk corporate boards must consider.
IT Risk Management
Here is a list of the steps your business should be doing at the absolute minimum when it comes to cybersecurity.
Tech experts weigh in on the steps firms can take to stay productive in the event of a cloud software outage.
Cyber liability exposures and regulations impacting CPA firms’ duties to protect confidential information have evolved significantly in recent years.
A new tool can help board members understand what questions to ask in their oversight of cybersecurity risk management.
Shark Tank star and cybersecurity expert Robert Herjavec said CPAs have an important role to play as trusted advisers on cybersecurity.
The AICPA framework enables organizations to communicate and creates a new engagement for CPAs to report.
AICPA proposals would guide design and evaluation of cyber risk management.
This column discusses the “silent killers” of technology risk that organizations must master to protect their business.
These steps can help close holes in your cybersecurity setup.
See what CPAs can do to fight cybercriminals’ threat.
Vendors represent one of the highest risk areas in an organization’s cybersecurity structure.
Layers of defense should exist in an organization’s systems, with the most sensitive information protected by the most layers.
Internal auditors can play a pivotal role in managing technology risks ranging from cybersecurity to social media. The risks are ranked in a new report that shows how internal audit can help manage them.
The digital sun will never set, which means that digital threats to business and government will only grow in the future, Tom Ridge said Friday.
Although web-connected products and the “internet of things” provide opportunities for transformative growth, they also may carry substantial risks.
Companies rarely use technology to effectively identify risks beyond those related to business and transaction processing in financial and operating system internal controls. This article provides techniques to expand the scope of an organization’s risk management processes—in a way that may help some identify hidden risks before they emerge as full-blown crises.