Top concerns for audit executives? Cyber risks and data governance

As organizations continue to collect customer and employee data, chief audit executives (CAEs) are increasingly concerned about how to govern and protect it. Gartner conducted interviews and surveys from across its global network of client organization… Continue reading Top concerns for audit executives? Cyber risks and data governance

Six steps for implementing zero trust access

Modern organizations are no longer governed by fixed perimeters. In fact, the perimeter-based security model is disintegrating in a world where users work on their own devices from anywhere, and sensitive company data is stored in multiple cloud servic… Continue reading Six steps for implementing zero trust access

Key challenges impacting IT audit pros navigating an evolving risk landscape

Protiviti and ISACA surveyed 2,252 chief audit executives (CAEs), internal audit professionals and IT audit vice presidents and directors worldwide. Asked to identify their biggest technology challenges, IT audit leaders and professionals noted the fol… Continue reading Key challenges impacting IT audit pros navigating an evolving risk landscape

70% of presidential campaigns fail to provide adequate online privacy and security protections

An alarming 70% of the campaign websites reviewed in the OTA 2020 U.S. Presidential Campaign Audit failed to meet OTA’s privacy and security standards – potentially exposing visitors to unnecessary risks. Only seven (30%) of the analyzed campaigns made… Continue reading 70% of presidential campaigns fail to provide adequate online privacy and security protections

64% of IT decision makers have reported a breach in their ERP systems in the past 24 months

ERP applications are ‘critical’ to business operations, according to the IDC survey of 430 IT decision makers. ERP-related breach Sixty-four percent of the 191 decision makers surveyed whose organizations rely on SAP or Oracle E-Business Suite confirme… Continue reading 64% of IT decision makers have reported a breach in their ERP systems in the past 24 months

Being compliant with laws and regulations is not a guarantee against data breaches

Compliance is not a guarantee against data breaches. These are the results of the Advisera survey carried out with 605 respondents, coming from countries on five continents, from various industries, mostly from smaller and medium-size companies, and ac… Continue reading Being compliant with laws and regulations is not a guarantee against data breaches

How security programs and breach history influence company valuations

96% of cybersecurity professionals indicated that cybersecurity readiness factors into the calculation when they are assessing the overall monetary value of a potential acquisition target, a (ISC)2 survey reveals. (ISC)2 surveyed 250 U.S.-based profess… Continue reading How security programs and breach history influence company valuations

The use of SOX-specific solutions has more than doubled since last year

There’s a growing demand for advanced technologies to streamline Sarbanes-Oxley Act (SOX) compliance, according to a survey released by the SOX & Internal Controls Professionals Group and conducted in partnership with Workiva. The number of … Continue reading The use of SOX-specific solutions has more than doubled since last year

Cybersecurity, privacy and technologies still top challenges for IT audit teams and leaders

Cybersecurity, privacy and technologies—from mission-critical to digitally transformative—top the list of challenges IT audit teams and leaders grapple with every day, according to a study conducted by ISACA and Protiviti. An executive summary of the s… Continue reading Cybersecurity, privacy and technologies still top challenges for IT audit teams and leaders

Internal Audit and IT: Joining the Same Cybersecurity Team

Effective cybersecurity management requires cross-collaboration between multiple stakeholders, and becomes increasingly complex with larger organizations. Though technology can serve as a solution to mitigate security risk, oftentimes the solution… Continue reading Internal Audit and IT: Joining the Same Cybersecurity Team