




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
FROMAITOCYBER—DECONSTRUCTINGACOMPLEXTECHNOLOGYRISKLANDSCAPEAssessingtheresultsofthe12thAnnualGlobalInternalAuditPerspectivesonTopTechnologyRisksSurveyfromProtivitiandTheInstituteofInternalAuditorsGLOBALINTERNALAUDITTABLEOFCONTENTS03
09Toptechnologythreats,organizationalpreparednessandITauditpro?ciencyExecutivesummaryandkey?ndings18
21WhycybersecurityanddatastandoutUseoftechnologytoolsasmostsigni?cantconcerns24
28OurcalltoactionfortechnologyauditleadersandteamsAcloserlookatAIandITaudit31
39Appendix—fullglobalresultsDemographicsProtivitiandTheIIA01Executivesummaryandkey?ndingsProtivitiandTheIIACybersecurity.Dataprivacyandgovernance.Artificialintelligence(AI).Third-partyrisk.Asnotedinthekeyfindings,cybersecurityisviewedasthemostsignificanttechnologythreat.Databreachestopthelistofperceivedcybersecurity-relatedthreats,largelyduetoincreasedconcernsaroundransomwareattacks.Inaddition,ourresearchrevealsthegreatestperceivedrisksassociatedwithAIare,byaconsiderablemargin,securityandprivacyissues,underscoringthedominanceofcybersecurityasacriticalchallenge.Atfirstglance,theresultsofthisyear’sGlobalInternalAuditPerspectivesonTopTechnologyRisksSurveypaintafamiliarpictureoftheprimarytechnologythreatsfacedbyorganizationsworldwideandtheirreadinesstotacklethem.However,adeeperlookrevealsnuancedlayersthatdepicttoday’sandtomorrow’schallengesindifferenthuesanddimensions.Moreimportant,thefindingshighlightthestrategiesandtoolsthatareprovingmosteffectivefortechnologyauditorstoaddressthesechallenges.Beyondcyberissues,AIisrapidlybecomingacriticalareafortechnologyauditors.DespiteAI’sgrowinginfluence,proficiencyinAI-relatedauditingremainslow,highlightingtheurgentneedforauditgroupstobolstertheirknowledgeofAIrisks,includingethical,operationalandreputationalchallenges.Factorssuchasauditfrequencystandoutinthesurveyresults.Internalauditfunctionsthatperformsixormoretechnologyauditsannually,referredtoashigh-frequencyITauditinggroups,perceivethethreatlandscapeandtheiroverallpreparednessinamuchdifferentlight—atopicweexplorefurtherinouranalysis.Theresultsnotonlyreinforcesometrendsfromprioryears,butalsorevealemergingrisktrendsthattechnologyauditorsmustanticipatetoremainrelevant.Thereisgreaterinterestinnewapproachestoaddressthechangingrisklandscape,andthereisanelevatedlevelofmaturityinsomeorganizations,whichsignalswhatistocomeforthetechnologyauditprofession.ProtivitiandTheIIAAuditfrequencyisamongseveralimportantindicatorsfortechnologyauditfunctionsastheynavigateadynamicbusinesslandscapethatisbeingshapedcontinuallybyexponentialgrowthintechnologieslikegenerativeAIandtheconcurrentemergenceofnewsecurity,privacyanddata-relatedchallenges.theanalysissupportingourconclusions.Ourcalltoaction(seepage28)summarizesthekeyactivitiesauditgroupsshouldundertaketoensuretheirtechnologyauditfunctionscontinuetodelivervalueandremainrelevanttotheirorganizations.Lastly,theAppendixcontainsacomprehensiveoverviewoftheglobalsurveyresults.Inthefollowingpages,wepresentthekeyfindingsfromthesurvey,thecompletesetofrisksanddefinitions,andTop5technologyrisks*Figure168%CybersecurityDataprivacy&complianceDatagovernance&integrityThirdparties/vendors61%53%50%47%Cloudcomputing10%20%30%40%50%60%70%80%90%100%*Percentagesreflectthenumberofrespondentswhoratedthethreata4or5ona5-pointscale,where1indicates“Nothreatatall”and5indicates“Significantthreat.”ProtivitiandTheIIA5OurkeyfindingsGlobalInternalAuditStandardsTMCybersecurityisthetoptechnologythreat—Notonlydocyberconcernsstandoutasthetopthreat,buttheseconcernsareevengreateramongorganizationsconductingtechnologyauditsmorefrequently,aswellasamongthoseusingcybersecurityandAI-basedtoolstosupportthetechnologyauditdepartment.Thesemorematureorganizationsalsoexpressedthehighestlevelofpreparednesstohandlethisrisk(Standard9.1UnderstandingGovernance,RiskManagement,andControlProcesses).Dataconcernsareprevalent—Dataprivacyandcomplianceaswellasdatagovernanceandintegrityrankamongthetoptechnologyrisksorganizationsface,and52%viewdatabreachesandleaksofsensitiveinformationasposingthegreatestcybersecurity-relatedthreats.InJanuary2024,TheInstituteofInternalAuditorspublishedanupdatedversionoftheGlobalInternalAuditStandards?(“theStandards”).ThesestandardsareamandatorycomponentoftheInternationalProfessionalPracticesFramework(IPPF),whichfacilitatestheconsistentdevelopment,interpretation,andapplicationofinternalauditingknowledge,therebyenhancingtheprofession.Applicablestandardsarereferencedthroughoutthispublication,withfurtherinformationavailableviaTheIIA’swebsite:/NewStandards.Higherfrequencyoftechnologyauditsdrivesbetterperformance—Conductingmoretechnologyauditsannually(forpurposesofanalyzingthissurvey’sresults,definedassixormore—seepage8)drivesaclearerunderstandingofthethreatlandscapeandcontributestoimprovedorganizationalpreparednessandtechnologyauditproficiencytohandlethesethreats.Conversely,organizationswithlowerauditfrequencymayfaceblindspotsintheirriskmanagementefforts,underscoringtheimportanceofregularandthoroughauditing(Standards9.4InternalAuditPlan;13.2EngagementRiskAssessment).AIisbeginningtoinfluencetechnologyauditing—WhileAIisnotviewedasasignificantshort-termtechnologyconcern,mostrespondents(59%)viewadvancedAIsystemsasposingsignificantriskstotheirorganizationsinthenexttwotothreeyears.Further,theuseofAI-basedtoolsintechnologyauditingisassociatedwithelevatedconcernsaboutvariousthreats,includingcybersecurityanddataprivacy,andalsodriveshigherlevelsofperceivedorganizationalpreparednesstohandlesuchthreats(Standard10.3TechnologyResources).ProtivitiandTheIIA6AboutoursurveyProtivitipartneredwithTheInstituteofInternalAuditors(TheIIA)toconductits12thannualGlobalInternalAuditPerspectivesonTopTechnologyRisksSurveyinthesecondquarterof2024.Theobjectiveofthisannualsurveyistoexplorethetoptechnologyrisksorganizationsface,asperceivedbytechnologyauditleadersandprofessionals.Additionally,itexploresthepractices,processesandtoolsemployedtohelpenterprisesidentify,assess,manageandmitigatetheserisks.Atotalof1,246executivesandprofessionals,includingchiefauditexecutives(CAEs)andinformationtechnology(IT)auditdirectors,completedthesurveythisyear.Datagovernance&integrity—Risksrelatedtomaintainingaccurate,consistentandreliableenterprisewidedata.IoT(InternetofThings)—Risksfromvulnerabilitiesinconnecteddevicesandnetworksleadingtopotentialbreaches.ITmanagement—Risksassociatedwithattracting,retaininganddevelopingskilledITpersonnelorganizationwide,impactingoperationalefficiencyandinnovationcapacity.Regulatorycompliance—Risksrelatedtoadheringtoindustry-specificDefinitionsofsurvey-assessedtechnologyrisksregulationsgoverningtechnologyuse.Inthisyear’ssurvey,weassessed13technologyrisksthatorganizationsface.Belowisthelistofthesetechnologyrisks,alongwiththeirrespectivedefinitions.Softwaredevelopment—Risksassociatedwithmodernsoftwaredevelopmentanddeployment,suchasDevOps,continuousintegrationandcontinuousdelivery(CI\CD),andcontainerization.AI&machinelearning(includinggenerativeAI)—Risksfromethicalconcerns,securitybreaches,andoperationalissuesinAI/MLapplications,includinglargelanguagemodelslikeGPT.Technicaldebt&aginginfrastructure—Risksfromoutdatedsystemsleadingtoinefficiencies,vulnerabilitiesandcostlyfutureupdates.Cloudcomputing—Risksofdatabreaches,lossofdatacontrol,andnon-Technologyresiliency—Risksassociatedwithmaintainingadaptabilityandcomplianceincloud-basedsolutions.recoverycapabilitiesinthefaceofITdisruptionsoroutages.Cybersecurity—Risksfromunauthorizedaccess,disruptionordestructionofThirdparties/vendors—Risksrelatedtothesecurity,reliabilityandresilienceinformation,systemsornetworks.ofthirdparties.Dataprivacy&compliance—RisksinprotectingpersonaldataandkeepingupwithTransformations&systemimplementations—Risksinvolvingmajorbusinessorevolvingdataprotectionregulations.ITchanges,includingdisruptions,unmetrequirements,dataloss,etc.ProtivitiandTheIIA7EvaluatingtechnologyauditfrequencySimilartotheanalysisconductedinthe2023study,ametricexaminedinthisyear’ssurveyishowoftenorganizationsconducttechnologyaudits.Thesurveyresponseswerecategorizedintotwodistinctgroups:High-frequencyITauditing—OrganizationsthatconductsixormoretechnologyauditsperyearLow-frequencyITauditing—OrganizationsthatconductfiveorfewertechnologyauditsperyearThesehigh-andlow-frequencyITauditinggroupsarereferencedthroughoutthereport.AsillustratedinFigure2below,themajority(71%)ofrespondentsindicatethattheirorganizationsperformfiveorfewertechnologyauditsperyear.Figure213%13%Lessthan1ITaudit1to2ITaudits30%28%3to5ITaudits16%6to12ITauditsMorethan12ITaudits10%20%30%40%50%Low-frequencyITauditingHigh-frequencyITauditing"Unsure"responsesnotshown.ProtivitiandTheIIA02Toptechnologythreats,organizationalpreparednessandITauditpro?ciencyProtivitiandTheIIAPerceivedthreatoftechnologyrisksinnext12monthsCyberanddatastandout:Technologyauditorsshouldbewell-acquaintedwiththetop-ratedtechnologyrisksinthisyear’ssurvey,whichincludecybersecurity,dataprivacyandgovernance,thirdparties,andcloudcomputing.(allrespondents)*Table120242023YOYtrendsCybersecurity68%61%53%50%47%44%43%74%58%55%60%50%41%52%Threatlevelsaredown,preparednesslevelsareup…forsome:Theyear-over-yeartrendindicatesamoderatedecreaseinperceivedtechnology-relatedthreatsandanincreaseinpreparednessamongorganizationstomanagetheserisks,withjusttwoareas—dataprivacyandcompliance,andregulatorycompliance—showingyear-over-yearincreasesinperceivedthreatlevels.Giventhebroadattentionontechnology-relatedthreatsoverthepastyear,manycompanieslikelyhavematuredtheirriskmanagementprograms.Thisincludesenhancingcybersecuritymeasures,resultinginperceptionsofDataprivacy&complianceDatagovernance&integrityThirdparties/vendorsCloudcomputingRegulatorycomplianceITtalentmanagementTransformations&systemimplementations43%55%Technologyresiliency36%33%29%44%43%36%Technicaldebt&aginginfrastructureSoftwaredevelopmentdecreasingthreatlevelsandincreasingorganizationalpreparedness.Additionally,moreorganizationsareadoptingadvancedtechnologiestosupportthreatdetectionresponse(seeFigure16).AI&machinelearning(includinggenerativeAI)28%22%28%29%IoT*Percentagesreflectthenumberofrespondentswhoratedthethreata4or5ona5-pointscale,where1indicates“Nothreatatall”and5indicates“Significantthreat.”ProtivitiandTheIIA10本報(bào)告來(lái)源于三個(gè)皮匠報(bào)告站(),由用戶Id:673421下載,文檔Id:608226,下載日期:2025-02-10threatlevelsof,asshowninTable1,essingtheresultssuchasthosethatdtools,aswellasuencyITauditfunctions,oupsoftenperceiveadscapewhileviewingtomitigatetheserisks.smightperceivealogy-relatedrisks.partyandvendorrisklogyauditteams,asighwhilethelevelofuatethisissuearentyear-over-yeardropintethisrisk(seeTable3).ProtivitiandTheIIA11CommentaryOurfindingsrevealseveralkeydifferentiatorsforITauditfunctionstoimproveperformanceanddelivergreatervaluetotheenterprise.Asobservedinlastyear’sstudy,thefrequencyoftechnologyauditsperformedannuallyrevealssignificantdifferencesinhowITauditleadersandteamsperceivethreatsandassesstheorganization’spreparednesstomanagethem.Thisisparticularlyevidentinareassuchascybersecurity,regulatorycompliance,dataprivacyandcompliance,anddatagovernanceandintegrity.Thesedifferencessuggestthathigh-frequencyITauditinggroupsmayhaveabetterunderstandingoftheserisksandthethreatstheyposetotheorganization.concernforleadership,organizationsarededicatingmoreresourcesandattentiontoenhancingtheirdefenses,resultinginstrongeroverallsecuritypostures.Further,notabledifferencesareobservedamongorganizationsthatusecybersecuritytools(orassesstheoutputsoftheirusebythebusiness),aswellasAIandmachinelearningtools,tosupporttheirITauditingactivities.ThissuggeststhatthesetoolsarevaluableassetsinhelpingITauditteamsidentifyspecifictechnologythreatsandunderstandtheorganization’slevelofpreparednesstomanagethem.Byleveragingthesetools,ITauditteamscanscanentirenetworksandidentifygapsinnearreal-time.Asaresult,theybecomemoresecurityconsciousandaware,enablingthemtodevelopabetterappreciationofallthreats.However,itisimportantfortechnologyauditteamstopartnerwiththeITorganizationtounderstandhowthesetoolsarebeingusedthroughouttheenterpriseandtooptimizewaysfortheinternalauditfunctiontoleveragethem(Standards13.4EvaluationCriteria;13.5EngagementResources,13.6WorkProgram).Muchofthisisunderstandable.Internalauditfunctionsthatperformtechnologyauditsmorefrequentlyarenaturallyexpectedtohavemoreconcernsaboutthetechnologyrisklandscape.However,thesedifferencesarenotvisibleacrossalltechnologyrisks.Asnotedearlier,twotechnologyriskshaveincreasedyearoveryearintermsofperceivedthreattotheorganization:dataprivacyandcompliance,andregulatorycompliance(seeTable1).Thecontributingfactorstothisupticklikelyincludeevolvingregulationsandtheincreasingcomplexityofdatagovernance.Businessleadersneedtoupgradetheirdataprivacyandgovernanceframeworkscontinuouslytoensurecomplianceremainsatoppriority.Thesefindingscertainlyraiseseveralimportantquestions.Forexample,whatmightorganizationsthatarenotutilizingcybersecurityorAItools,orconductingtechnologyauditsfrequently,bemissingintheirtechnologyauditsandriskcoverage?Additionally,cybersecurityremainsasignificanttechnologythreat,driveningreatpartbyelevatedconcernsaboutransomwareattacks.However,theperceivedlevelofpreparednessforcybersecurityisrising,with63%ofrespondentsindicatingtheirorganizationsarewell-preparedtohandlecyberthreats(seeTable2).Thisprogressreflectsnotonlythegrowingadoptionofadvancedcybersecuritytools—suchasvulnerabilityscannersandthreatintelligenceplatforms—butalsotheincreasingprioritizationofcybersecurityattheboardlevel.AscybersecuritybecomesastrategicInregardtothird-partyriskmanagement,thesignificantgapbetweenperceivedthreatlevelandtheorganization’spreparednesstohandlethisrisksuggestscompaniesrecognizethird-partyandvendorrisksasamajorthreatbutbelievetheyareunderpreparedtomanagethemeffectively.Thiscouldbeduetothecomplexitiesinvolvedinmanagingthird-partyrelationshipsandthepotentialcascadingeffectsofvendorvulnerabilitiesontheorganization.It’salsopossiblethat,atleastinsomeorganizations,thereisnoclearlydefinedownerofthird-partyriskmanagement.ProtivitiandTheIIA“Theseareremarkablydynamictimesfororganizations,notonlyduetorapidlychangingmarketconditionsbutalsoresultingfromongoingtechnologytransformation,ledbytherapidriseofgenerativeAI.Internalauditteamsneedtokeeppacewiththechangestheirorganizationscontinuetoundergo.Moreimportantly,theyneedtoembracetheuseofemergingtechnologieslikegenerativeAIandadvancedanalyticsintheirowninternalauditpracticesastheyhelptoidentifyandaddressthemostcriticaltechnologyriskstheirorganizationsface.”Perceivedleveloforganizationalpreparednesstohandletechnologyrisksinnext12months(allrespondents)*Table2Cybersecurity63%57%55%47%47%44%39%38%37%36%34%21%17%55%53%45%42%35%25%36%35%45%30%35%26%14%RegulatorycomplianceDataprivacy&complianceCloudcomputingDatagovernance&integrityITtalentmanagementTransformations&systemimplementationsSoftwaredevelopmentTechnologyresiliencyThirdparties/vendorsTechnicaldebt&aginginfrastructureIoT–AngeloPoulikakosManagingDirector,GlobalLeader,TechnologyAuditandAdvisory,ProtivitiAI&machinelearning(includinggenerativeAI)*Percentagesreflectthenumberofrespondentswhoratedtheorganization’slevelofpreparednessa4or5ona5-pointscale,where1indicates“Notpreparedatall”and5indicates“Extremelyprepared.”ProtivitiandTheIIA13Perceivedthreatoftechnologyrisksinnext12months—Perceivedthreatoftechnologyrisksinnext12months—perspectivesamongITauditgroupsthatusecybersecuritytoolsperspectivesamongITauditgroupsthatuseAItools**Figure4Figure5CybersecurityCybersecurity76%58%Dataprivacy&complianceDataprivacy&compliance68%53%40%50%60%70%80%UsecybersecuritytoolsDonotusecybersecuritytoolsUseAItoolsDonotuseAItools*Percentagesreflectthenumberofrespondentswhoratedthethreata4or5ona5-pointscale,where1indicates“Nothreatatall”and5indicates“Significantthreat.”Seepage35forfullsurveyresultsonuseoftools,technologiesanddeliverymethods.*Percentagesreflectthenumberofrespondentswhoratedthethreata4or5ona5-pointscale,where1indicates“Nothreatatall”and5indicates“Significantthreat.”Seepage35forfullsurveyresultsonuseoftools,technologiesanddeliverymethods.ProtivitiandTheIIA14Perceivedleveloforganizationalpreparednesstohandletechnologyrisksinnext12months—perspectivesOrganizationsthataudperceptionofriskamonghigh-frequencyITauditinggroups*Thisyear’s?ndings,aswellIncreasedfrequencyoftechunderstandingofkeytechnoandcompliance,anddatagFigure6Cybersecurity79%Severalfactorscouldexplain—isincreasedawarenessanfrequently,organizationsarecontrolweaknessesthatmigbecomemoreattunedtothetheirperceptionofriskheightheremaybeculturalfactorsauditsgenerallyhaveastron57%Regulatorycompliance72%52%Datagovernance&integrityThesurveyindicatesthat4technologyauditsannuallygapinriskdetectionandmmaylackthereal-timeinsigthreats,underscoringthentechnologyauditstoenhan60%42%10%20%30%40%50%60%70%80%High-frequencyITauditingLow-frequencyITauditing*Percentagesreflectthenumberofrespondentswhoratedtheorganization’slevelofpreparednessa4or5ona5-pointscale,where1indicates“Notpreparedatall”and5indicates“Extremelyprepared.”ProtivitiandTheIIA“Cybersecuritycontinuestobeamajorconcernformostorganizations.Whilemanyinternalauditorsdonotfocusexclusivelyoninformationtechnology,itisbecomingincreasinglyimportantthattheyareawareofcyber-relatedrisks.Thereisanelementofcybersecurityinmostbusinessprocesses,highlightingtheneedforinternalauditorstoidentifycyberrisksduringtheengagementriskassessment.”PerceivedlevelofITauditteamproficiencytoevaluatetechnologyriskseffectivelyinnext12months(allrespondents)*Table3Cybersecurity58%56%55%45%41%39%39%38%34%33%31%17%13%53%52%54%49%34%31%44%47%35%48%42%22%14%Dataprivacy&complianceRegulatorycomplianceDatagovernance&integrityCloudcomputingITtalentmanagementTransformations&systemimplementationsTechnologyresiliency–GeorgeBarhamDirectorofStandardsandProfessionalGuidance,TheIIASoftwaredevelopmentThirdparties/vendorsTechnicaldebt&aginginfrastructureIoTAI&machinelearning(includinggenerativeAI)*PercentagesreflectthenumberofrespondentswhoratedtheirITauditteam’sproficiencylevela4or5ona5-pointscale,where1indicates“Notatallproficient”and5indicates“Extremelyproficient.”ProtivitiandTheIIA16ComparingperceivedthreatswithorganizationalpreparednessandtechnologyauditproficiencyThegapsbetweentheperceivedthreatofAIandmachinelearningandthelevelsofpreparednessandproficiencyareparticularlyconcerninggiventherapidadoptionofAItechnologiesacrossindustries.OrganizationsmaybeembracingAIwithoutfullyunderstandingtheassociatedrisksordevelopingthenecessarycontrolstomitigatethem.Thisleavesthemvulnerabletopotentialethical,securityandoperationalchallengesthatcouldarisefromAIuse.Thereisanoteworthyandinsightfulconnectionbetweenhoworganizationsperceivevarioustechnologyrisksandtheircorrespondinglevelsofpreparednessandproficiencyinmanagingtheseriskswithintheirtechnologyauditfunctions.Themostsignificantgapsareintheareasofthird-party/vendorrisks,andAIandmachinelearning,includinggenerativeAI.Thepercentagesbelowreflectthenumberofrespondentswhoratedthelevelofthreat,organizationalpreparednessortechnologyauditfunctionproficiencya4or5ona5-pointscale—seeFigures13,14and15intheAppendixfordetails,includingdefinitionsofscalesforperceivedthreat,organizationalpreparednessandtechnologyauditproficiency.Perceivedthreatlevelvs.ITauditproficiency—topthree*Figure7Thirdparties/vendors3Thirdparties/vendors:Perceivedthreat:50%???28%Organizationalpreparedness:36%Technologyauditproficiency:33%AI&machinelearning(includinggenerativeAI)13%Manyorganizationsmaylackthenecessaryframeworksorexpertisetomonitorandcontroltherisksassociatedwithexternalvendorseffectively.Thesegapshighlightpotentialvulnerabilitiesinthesupplychain,whereafailuretomanagethird-partyrisksadequatelycouldleadtosignificantdisruptionsorsecuritybreaches.Cybersecurity10%20%30%40%50%60%70%AIandmachinelearning(includinggenerativeAI):Perceivedthreat:28%PerceivedthreatlevelITauditproficiency???Organizationalpreparedness:17%Technologyauditproficiency:13%*Percentagesreflectthenumberofrespondentswhoratedthisthreata4or5ona5-pointscale,where1indicates“Nothreatatall”and5indicates“Significantthreat,”andthenumberofrespondentswhoratedtheirITauditteam’sproficiencylevela4or5ona5-pointscale,where1indicates“Notatallproficient”and5indicates“Extremelyproficient.”ProtivitiandTheIIA1703Whycybersecurityanddatastandoutasmostsigni?cantconcernsProtivitiandTheIIAWhat’stopofmind:ChiefconcernsforITauditleadersandteamsthisyearincludecybersecurityandanumberofdata-relatedissues—privacy,compliance,governanceandintegrity(seeTable1).Intermsofareasofcybersecurityperceivedtoposethegreatestrisks,databreachesandleaksofsensitiveinformationstandout,byfar,asthemostsignificant.Followingthese,third-partyandsupplychainrisks,alongwithcloudserviceprovidersecurityweaknesses,arethenextmostworrisomeissues(seeFigure8).requirements,organizationsmustfileanincidentreportwithinfourbusinessdaysofthecompany’smaterialitydeterminationregardingacyberincident.Organizationsmustprovideinsightintohowthecybersecurityriskmanagementfunctionsareintegratedintobroaderriskmanagementsystemsandprocesses,suchasriskreportingandmonitoringprocessesusedinconjunctionwiththeenterpriseriskmanagementprocess.Similarly,theNetworkandInformationSecurityDirective2(NIS2)intheEuropeanUnionhasexpandedthescopeoftheoriginaldirectivetoenhancecybersecurityacrosstheentireEuropeanregionbyunifyingnationallawswithcommonminimumrequirements.Underlyingregulatoryfactors:It’sunderstandabletofindtheseissuesamongthetoptechnologyrisks,giventheregulatoryattentiontheycontinuetodrawandtheincreasedlevelsofpreparednesstomanagethem.IntheUnitedStates,forexample,thenewcybersecuritydisclosurerulesfromtheSecuritiesandExchangeCommission(SEC)haveplacedaspotlightonbeingmorediligentandmindfulregardingcyberrisks.TherulesincreasereportinganddisclosurerequirementsforcompaniesregisteredwiththeSEC.Amongthe52%oftechnologyauditleadersseedatabreachesandleaksofsensitiveinformationasamajorrisktotheirorganizationinthecomingyear.ProtivitiandTheIIA19CommentaryAscyberthreatactorscontinuetoenhancethesophisticationoftheirattackmethods,ITauditteamsmustalsocontinuetoupskilltheirtechniquestohelpmanagementidentifyrelevantrisks.Itwillbeincreasinglydifficulttokeeppacewithoutsupportfromcybertoolingandothertechnology-enabledtactics.Ofnote,theuseoftoolssuchasvulnerabilityscannersandintrusiondetectionsystemsdoesnotalleviaterisklevels—infact,theymayrevealpreviouslyunknownrisksandvulnerabilities.Therehavebeensituationswhereanorganization,afteremployingthreatdetectiontechnology,realizedtheywere“flyingblind”priortousingthem.Anotherimportantpoint:Privatelyheldcompaniesmayalsoseevalueinenhancingtheirincidentidentification,evaluationandremediationpracticesthroughgreateruseoftechnologytoolsbytheITauditfunction,eveniftheyarenotsubjecttothesamepublicdisclosurerequirements.AscyberthreatathesophisticatioITauditteamsmtheirtechniquesrelevantrisks.ItkeeppacewithouandothertechnoAlso,asorganizationsincreasinglyrelyondata-drivendecision-making,technologyauditfunctionsmustevolvetoprovidemorerigorousassessmentsofdatagovernanceframeworks,verifyingthatdataintegrityismaintainedacrossbothinternalprocessesandthi
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 治療急性血栓栓塞性肌
- 二零二五版油茶山林承包合同書
- 個(gè)人自有財(cái)產(chǎn)抵押合同書
- 傳統(tǒng)與現(xiàn)代交織銀飾制作技藝的教育推廣
- 區(qū)塊鏈技術(shù)打造透明高效的供應(yīng)鏈體系
- 晉中市高考復(fù)習(xí)研討會(huì)企業(yè)與產(chǎn)業(yè)復(fù)習(xí)中應(yīng)注意的幾個(gè)問(wèn)題
- 2025至2031年中國(guó)密封閥片行業(yè)投資前景及策略咨詢研究報(bào)告
- 2025年度湖南興湘資本管理有限公司招聘6人筆試參考題庫(kù)附帶答案詳解
- 從科技視角看公共健康管理的未來(lái)趨勢(shì)及挑戰(zhàn)探討報(bào)告
- 超市店長(zhǎng)的述職報(bào)告(7篇)
- GB/T 17689-2008土工合成材料塑料土工格柵
- mRNA差別顯示技術(shù)解讀課件
- A320防火系統(tǒng)簡(jiǎn)介解析課件
- 商品豬場(chǎng)保育舍飼養(yǎng)作業(yè)指導(dǎo)書
- 2023統(tǒng)編版高中歷史必修中外歷史綱要上重點(diǎn)知識(shí)點(diǎn)歸納總結(jié)(復(fù)習(xí)必背)
- 適航法規(guī)基礎(chǔ)培訓(xùn)
- 《復(fù)數(shù)的概念》復(fù)數(shù)(數(shù)系的擴(kuò)充和復(fù)數(shù)的概念)課件
- 機(jī)械基礎(chǔ) 第2版全書電子教案
- 信息系統(tǒng)網(wǎng)絡(luò)安全應(yīng)急預(yù)案
- 【圖文】GB8624-2012建筑材料及制品燃燒性能分級(jí)(精)
- 缺血性腦卒中患者血壓管理之路
評(píng)論
0/150
提交評(píng)論