2025从人工智能到网络安全解构复杂的技术风险格局研究报告(英文版)-44正式版_第1页
2025从人工智能到网络安全解构复杂的技术风险格局研究报告(英文版)-44正式版_第2页
2025从人工智能到网络安全解构复杂的技术风险格局研究报告(英文版)-44正式版_第3页
2025从人工智能到网络安全解构复杂的技术风险格局研究报告(英文版)-44正式版_第4页
2025从人工智能到网络安全解构复杂的技术风险格局研究报告(英文版)-44正式版_第5页
已阅读5页,还剩39页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

FROMAITOCYBER—DECONSTRUCTINGACOMPLEXTECHNOLOGYRISKLANDSCAPEAssessingtheresultsofthe12thAnnualGlobalInternalAuditPerspectivesonTopTechnologyRisksSurveyfromProtivitiandTheInstituteofInternalAuditorsGLOBALINTERNALAUDITTABLEOFCONTENTS03

09Toptechnologythreats,organizationalpreparednessandITauditproficiencyExecutivesummaryandkeyfindings18

21WhycybersecurityanddatastandoutUseoftechnologytoolsasmostsignificantconcerns24

28OurcalltoactionfortechnologyauditleadersandteamsAcloserlookatAIandITaudit31

39Appendix—fullglobalresultsDemographicsProtivitiandTheIIA01ExecutivesummaryandkeyfindingsProtivitiandTheIIACybersecurity.Dataprivacyandgovernance.Artificialintelligence(AI).Third-partyrisk.Asnotedinthekeyfindings,cybersecurityisviewedasthemostsignificanttechnologythreat.Databreachestopthelistofperceivedcybersecurity-relatedthreats,largelyduetoincreasedconcernsaroundransomwareattacks.Inaddition,ourresearchrevealsthegreatestperceivedrisksassociatedwithAIare,byaconsiderablemargin,securityandprivacyissues,underscoringthedominanceofcybersecurityasacriticalchallenge.Atfirstglance,theresultsofthisyear’sGlobalInternalAuditPerspectivesonTopTechnologyRisksSurveypaintafamiliarpictureoftheprimarytechnologythreatsfacedbyorganizationsworldwideandtheirreadinesstotacklethem.However,adeeperlookrevealsnuancedlayersthatdepicttoday’sandtomorrow’schallengesindifferenthuesanddimensions.Moreimportant,thefindingshighlightthestrategiesandtoolsthatareprovingmosteffectivefortechnologyauditorstoaddressthesechallenges.Beyondcyberissues,AIisrapidlybecomingacriticalareafortechnologyauditors.DespiteAI’sgrowinginfluence,proficiencyinAI-relatedauditingremainslow,highlightingtheurgentneedforauditgroupstobolstertheirknowledgeofAIrisks,includingethical,operationalandreputationalchallenges.Factorssuchasauditfrequencystandoutinthesurveyresults.Internalauditfunctionsthatperformsixormoretechnologyauditsannually,referredtoashigh-frequencyITauditinggroups,perceivethethreatlandscapeandtheiroverallpreparednessinamuchdifferentlight—atopicweexplorefurtherinouranalysis.Theresultsnotonlyreinforcesometrendsfromprioryears,butalsorevealemergingrisktrendsthattechnologyauditorsmustanticipatetoremainrelevant.Thereisgreaterinterestinnewapproachestoaddressthechangingrisklandscape,andthereisanelevatedlevelofmaturityinsomeorganizations,whichsignalswhatistocomeforthetechnologyauditprofession.ProtivitiandTheIIAAuditfrequencyisamongseveralimportantindicatorsfortechnologyauditfunctionsastheynavigateadynamicbusinesslandscapethatisbeingshapedcontinuallybyexponentialgrowthintechnologieslikegenerativeAIandtheconcurrentemergenceofnewsecurity,privacyanddata-relatedchallenges.theanalysissupportingourconclusions.Ourcalltoaction(seepage28)summarizesthekeyactivitiesauditgroupsshouldundertaketoensuretheirtechnologyauditfunctionscontinuetodelivervalueandremainrelevanttotheirorganizations.Lastly,theAppendixcontainsacomprehensiveoverviewoftheglobalsurveyresults.Inthefollowingpages,wepresentthekeyfindingsfromthesurvey,thecompletesetofrisksanddefinitions,andTop5technologyrisks*Figure168%CybersecurityDataprivacy&complianceDatagovernance&integrityThirdparties/vendors61%53%50%47%Cloudcomputing10%20%30%40%50%60%70%80%90%100%*Percentagesreflectthenumberofrespondentswhoratedthethreata4or5ona5-pointscale,where1indicates“Nothreatatall”and5indicates“Significantthreat.”ProtivitiandTheIIA5OurkeyfindingsGlobalInternalAuditStandardsTMCybersecurityisthetoptechnologythreat—Notonlydocyberconcernsstandoutasthetopthreat,buttheseconcernsareevengreateramongorganizationsconductingtechnologyauditsmorefrequently,aswellasamongthoseusingcybersecurityandAI-basedtoolstosupportthetechnologyauditdepartment.Thesemorematureorganizationsalsoexpressedthehighestlevelofpreparednesstohandlethisrisk(Standard9.1UnderstandingGovernance,RiskManagement,andControlProcesses).Dataconcernsareprevalent—Dataprivacyandcomplianceaswellasdatagovernanceandintegrityrankamongthetoptechnologyrisksorganizationsface,and52%viewdatabreachesandleaksofsensitiveinformationasposingthegreatestcybersecurity-relatedthreats.InJanuary2024,TheInstituteofInternalAuditorspublishedanupdatedversionoftheGlobalInternalAuditStandards™(“theStandards”).ThesestandardsareamandatorycomponentoftheInternationalProfessionalPracticesFramework(IPPF),whichfacilitatestheconsistentdevelopment,interpretation,andapplicationofinternalauditingknowledge,therebyenhancingtheprofession.Applicablestandardsarereferencedthroughoutthispublication,withfurtherinformationavailableviaTheIIA’swebsite:/NewStandards.Higherfrequencyoftechnologyauditsdrivesbetterperformance—Conductingmoretechnologyauditsannually(forpurposesofanalyzingthissurvey’sresults,definedassixormore—seepage8)drivesaclearerunderstandingofthethreatlandscapeandcontributestoimprovedorganizationalpreparednessandtechnologyauditproficiencytohandlethesethreats.Conversely,organizationswithlowerauditfrequencymayfaceblindspotsintheirriskmanagementefforts,underscoringtheimportanceofregularandthoroughauditing(Standards9.4InternalAuditPlan;13.2EngagementRiskAssessment).AIisbeginningtoinfluencetechnologyauditing—WhileAIisnotviewedasasignificantshort-termtechnologyconcern,mostrespondents(59%)viewadvancedAIsystemsasposingsignificantriskstotheirorganizationsinthenexttwotothreeyears.Further,theuseofAI-basedtoolsintechnologyauditingisassociatedwithelevatedconcernsaboutvariousthreats,includingcybersecurityanddataprivacy,andalsodriveshigherlevelsofperceivedorganizationalpreparednesstohandlesuchthreats(Standard10.3TechnologyResources).ProtivitiandTheIIA6AboutoursurveyProtivitipartneredwithTheInstituteofInternalAuditors(TheIIA)toconductits12thannualGlobalInternalAuditPerspectivesonTopTechnologyRisksSurveyinthesecondquarterof2024.Theobjectiveofthisannualsurveyistoexplorethetoptechnologyrisksorganizationsface,asperceivedbytechnologyauditleadersandprofessionals.Additionally,itexploresthepractices,processesandtoolsemployedtohelpenterprisesidentify,assess,manageandmitigatetheserisks.Atotalof1,246executivesandprofessionals,includingchiefauditexecutives(CAEs)andinformationtechnology(IT)auditdirectors,completedthesurveythisyear.Datagovernance&integrity—Risksrelatedtomaintainingaccurate,consistentandreliableenterprisewidedata.IoT(InternetofThings)—Risksfromvulnerabilitiesinconnecteddevicesandnetworksleadingtopotentialbreaches.ITmanagement—Risksassociatedwithattracting,retaininganddevelopingskilledITpersonnelorganizationwide,impactingoperationalefficiencyandinnovationcapacity.Regulatorycompliance—Risksrelatedtoadheringtoindustry-specificDefinitionsofsurvey-assessedtechnologyrisksregulationsgoverningtechnologyuse.Inthisyear’ssurvey,weassessed13technologyrisksthatorganizationsface.Belowisthelistofthesetechnologyrisks,alongwiththeirrespectivedefinitions.Softwaredevelopment—Risksassociatedwithmodernsoftwaredevelopmentanddeployment,suchasDevOps,continuousintegrationandcontinuousdelivery(CI\CD),andcontainerization.AI&machinelearning(includinggenerativeAI)—Risksfromethicalconcerns,securitybreaches,andoperationalissuesinAI/MLapplications,includinglargelanguagemodelslikeGPT.Technicaldebt&aginginfrastructure—Risksfromoutdatedsystemsleadingtoinefficiencies,vulnerabilitiesandcostlyfutureupdates.Cloudcomputing—Risksofdatabreaches,lossofdatacontrol,andnon-Technologyresiliency—Risksassociatedwithmaintainingadaptabilityandcomplianceincloud-basedsolutions.recoverycapabilitiesinthefaceofITdisruptionsoroutages.Cybersecurity—Risksfromunauthorizedaccess,disruptionordestructionofThirdparties/vendors—Risksrelatedtothesecurity,reliabilityandresilienceinformation,systemsornetworks.ofthirdparties.Dataprivacy&compliance—RisksinprotectingpersonaldataandkeepingupwithTransformations&systemimplementations—Risksinvolvingmajorbusinessorevolvingdataprotectionregulations.ITchanges,includingdisruptions,unmetrequirements,dataloss,etc.ProtivitiandTheIIA7EvaluatingtechnologyauditfrequencySimilartotheanalysisconductedinthe2023study,ametricexaminedinthisyear’ssurveyishowoftenorganizationsconducttechnologyaudits.Thesurveyresponseswerecategorizedintotwodistinctgroups:High-frequencyITauditing—OrganizationsthatconductsixormoretechnologyauditsperyearLow-frequencyITauditing—OrganizationsthatconductfiveorfewertechnologyauditsperyearThesehigh-andlow-frequencyITauditinggroupsarereferencedthroughoutthereport.AsillustratedinFigure2below,themajority(71%)ofrespondentsindicatethattheirorganizationsperformfiveorfewertechnologyauditsperyear.Figure213%13%Lessthan1ITaudit1to2ITaudits30%28%3to5ITaudits16%6to12ITauditsMorethan12ITaudits10%20%30%40%50%Low-frequencyITauditingHigh-frequencyITauditing"Unsure"responsesnotshown.ProtivitiandTheIIA02Toptechnologythreats,organizationalpreparednessandITauditproficiencyProtivitiandTheIIAPerceivedthreatoftechnologyrisksinnext12monthsCyberanddatastandout:Technologyauditorsshouldbewell-acquaintedwiththetop-ratedtechnologyrisksinthisyear’ssurvey,whichincludecybersecurity,dataprivacyandgovernance,thirdparties,andcloudcomputing.(allrespondents)*Table120242023YOYtrendsCybersecurity68%61%53%50%47%44%43%74%58%55%60%50%41%52%Threatlevelsaredown,preparednesslevelsareup…forsome:Theyear-over-yeartrendindicatesamoderatedecreaseinperceivedtechnology-relatedthreatsandanincreaseinpreparednessamongorganizationstomanagetheserisks,withjusttwoareas—dataprivacyandcompliance,andregulatorycompliance—showingyear-over-yearincreasesinperceivedthreatlevels.Giventhebroadattentionontechnology-relatedthreatsoverthepastyear,manycompanieslikelyhavematuredtheirriskmanagementprograms.Thisincludesenhancingcybersecuritymeasures,resultinginperceptionsofDataprivacy&complianceDatagovernance&integrityThirdparties/vendorsCloudcomputingRegulatorycomplianceITtalentmanagementTransformations&systemimplementations43%55%Technologyresiliency36%33%29%44%43%36%Technicaldebt&aginginfrastructureSoftwaredevelopmentdecreasingthreatlevelsandincreasingorganizationalpreparedness.Additionally,moreorganizationsareadoptingadvancedtechnologiestosupportthreatdetectionresponse(seeFigure16).AI&machinelearning(includinggenerativeAI)28%22%28%29%IoT*Percentagesreflectthenumberofrespondentswhoratedthethreata4or5ona5-pointscale,where1indicates“Nothreatatall”and5indicates“Significantthreat.”ProtivitiandTheIIA10本报告来源于三个皮匠报告站(),由用户Id:673421下载,文档Id:608226,下载日期:2025-02-10threatlevelsof,asshowninTable1,essingtheresultssuchasthosethatdtools,aswellasuencyITauditfunctions,oupsoftenperceiveadscapewhileviewingtomitigatetheserisks.smightperceivealogy-relatedrisks.partyandvendorrisklogyauditteams,asighwhilethelevelofuatethisissuearentyear-over-yeardropintethisrisk(seeTable3).ProtivitiandTheIIA11CommentaryOurfindingsrevealseveralkeydifferentiatorsforITauditfunctionstoimproveperformanceanddelivergreatervaluetotheenterprise.Asobservedinlastyear’sstudy,thefrequencyoftechnologyauditsperformedannuallyrevealssignificantdifferencesinhowITauditleadersandteamsperceivethreatsandassesstheorganization’spreparednesstomanagethem.Thisisparticularlyevidentinareassuchascybersecurity,regulatorycompliance,dataprivacyandcompliance,anddatagovernanceandintegrity.Thesedifferencessuggestthathigh-frequencyITauditinggroupsmayhaveabetterunderstandingoftheserisksandthethreatstheyposetotheorganization.concernforleadership,organizationsarededicatingmoreresourcesandattentiontoenhancingtheirdefenses,resultinginstrongeroverallsecuritypostures.Further,notabledifferencesareobservedamongorganizationsthatusecybersecuritytools(orassesstheoutputsoftheirusebythebusiness),aswellasAIandmachinelearningtools,tosupporttheirITauditingactivities.ThissuggeststhatthesetoolsarevaluableassetsinhelpingITauditteamsidentifyspecifictechnologythreatsandunderstandtheorganization’slevelofpreparednesstomanagethem.Byleveragingthesetools,ITauditteamscanscanentirenetworksandidentifygapsinnearreal-time.Asaresult,theybecomemoresecurityconsciousandaware,enablingthemtodevelopabetterappreciationofallthreats.However,itisimportantfortechnologyauditteamstopartnerwiththeITorganizationtounderstandhowthesetoolsarebeingusedthroughouttheenterpriseandtooptimizewaysfortheinternalauditfunctiontoleveragethem(Standards13.4EvaluationCriteria;13.5EngagementResources,13.6WorkProgram).Muchofthisisunderstandable.Internalauditfunctionsthatperformtechnologyauditsmorefrequentlyarenaturallyexpectedtohavemoreconcernsaboutthetechnologyrisklandscape.However,thesedifferencesarenotvisibleacrossalltechnologyrisks.Asnotedearlier,twotechnologyriskshaveincreasedyearoveryearintermsofperceivedthreattotheorganization:dataprivacyandcompliance,andregulatorycompliance(seeTable1).Thecontributingfactorstothisupticklikelyincludeevolvingregulationsandtheincreasingcomplexityofdatagovernance.Businessleadersneedtoupgradetheirdataprivacyandgovernanceframeworkscontinuouslytoensurecomplianceremainsatoppriority.Thesefindingscertainlyraiseseveralimportantquestions.Forexample,whatmightorganizationsthatarenotutilizingcybersecurityorAItools,orconductingtechnologyauditsfrequently,bemissingintheirtechnologyauditsandriskcoverage?Additionally,cybersecurityremainsasignificanttechnologythreat,driveningreatpartbyelevatedconcernsaboutransomwareattacks.However,theperceivedlevelofpreparednessforcybersecurityisrising,with63%ofrespondentsindicatingtheirorganizationsarewell-preparedtohandlecyberthreats(seeTable2).Thisprogressreflectsnotonlythegrowingadoptionofadvancedcybersecuritytools—suchasvulnerabilityscannersandthreatintelligenceplatforms—butalsotheincreasingprioritizationofcybersecurityattheboardlevel.AscybersecuritybecomesastrategicInregardtothird-partyriskmanagement,thesignificantgapbetweenperceivedthreatlevelandtheorganization’spreparednesstohandlethisrisksuggestscompaniesrecognizethird-partyandvendorrisksasamajorthreatbutbelievetheyareunderpreparedtomanagethemeffectively.Thiscouldbeduetothecomplexitiesinvolvedinmanagingthird-partyrelationshipsandthepotentialcascadingeffectsofvendorvulnerabilitiesontheorganization.It’salsopossiblethat,atleastinsomeorganizations,thereisnoclearlydefinedownerofthird-partyriskmanagement.ProtivitiandTheIIA“Theseareremarkablydynamictimesfororganizations,notonlyduetorapidlychangingmarketconditionsbutalsoresultingfromongoingtechnologytransformation,ledbytherapidriseofgenerativeAI.Internalauditteamsneedtokeeppacewiththechangestheirorganizationscontinuetoundergo.Moreimportantly,theyneedtoembracetheuseofemergingtechnologieslikegenerativeAIandadvancedanalyticsintheirowninternalauditpracticesastheyhelptoidentifyandaddressthemostcriticaltechnologyriskstheirorganizationsface.”Perceivedleveloforganizationalpreparednesstohandletechnologyrisksinnext12months(allrespondents)*Table2Cybersecurity63%57%55%47%47%44%39%38%37%36%34%21%17%55%53%45%42%35%25%36%35%45%30%35%26%14%RegulatorycomplianceDataprivacy&complianceCloudcomputingDatagovernance&integrityITtalentmanagementTransformations&systemimplementationsSoftwaredevelopmentTechnologyresiliencyThirdparties/vendorsTechnicaldebt&aginginfrastructureIoT–AngeloPoulikakosManagingDirector,GlobalLeader,TechnologyAuditandAdvisory,ProtivitiAI&machinelearning(includinggenerativeAI)*Percentagesreflectthenumberofrespondentswhoratedtheorganization’slevelofpreparednessa4or5ona5-pointscale,where1indicates“Notpreparedatall”and5indicates“Extremelyprepared.”ProtivitiandTheIIA13Perceivedthreatoftechnologyrisksinnext12months—Perceivedthreatoftechnologyrisksinnext12months—perspectivesamongITauditgroupsthatusecybersecuritytoolsperspectivesamongITauditgroupsthatuseAItools**Figure4Figure5CybersecurityCybersecurity76%58%Dataprivacy&complianceDataprivacy&compliance68%53%40%50%60%70%80%UsecybersecuritytoolsDonotusecybersecuritytoolsUseAItoolsDonotuseAItools*Percentagesreflectthenumberofrespondentswhoratedthethreata4or5ona5-pointscale,where1indicates“Nothreatatall”and5indicates“Significantthreat.”Seepage35forfullsurveyresultsonuseoftools,technologiesanddeliverymethods.*Percentagesreflectthenumberofrespondentswhoratedthethreata4or5ona5-pointscale,where1indicates“Nothreatatall”and5indicates“Significantthreat.”Seepage35forfullsurveyresultsonuseoftools,technologiesanddeliverymethods.ProtivitiandTheIIA14Perceivedleveloforganizationalpreparednesstohandletechnologyrisksinnext12months—perspectivesOrganizationsthataudperceptionofriskamonghigh-frequencyITauditinggroups*Thisyear’sfindings,aswellIncreasedfrequencyoftechunderstandingofkeytechnoandcompliance,anddatagFigure6Cybersecurity79%Severalfactorscouldexplain—isincreasedawarenessanfrequently,organizationsarecontrolweaknessesthatmigbecomemoreattunedtothetheirperceptionofriskheightheremaybeculturalfactorsauditsgenerallyhaveastron57%Regulatorycompliance72%52%Datagovernance&integrityThesurveyindicatesthat4technologyauditsannuallygapinriskdetectionandmmaylackthereal-timeinsigthreats,underscoringthentechnologyauditstoenhan60%42%10%20%30%40%50%60%70%80%High-frequencyITauditingLow-frequencyITauditing*Percentagesreflectthenumberofrespondentswhoratedtheorganization’slevelofpreparednessa4or5ona5-pointscale,where1indicates“Notpreparedatall”and5indicates“Extremelyprepared.”ProtivitiandTheIIA“Cybersecuritycontinuestobeamajorconcernformostorganizations.Whilemanyinternalauditorsdonotfocusexclusivelyoninformationtechnology,itisbecomingincreasinglyimportantthattheyareawareofcyber-relatedrisks.Thereisanelementofcybersecurityinmostbusinessprocesses,highlightingtheneedforinternalauditorstoidentifycyberrisksduringtheengagementriskassessment.”PerceivedlevelofITauditteamproficiencytoevaluatetechnologyriskseffectivelyinnext12months(allrespondents)*Table3Cybersecurity58%56%55%45%41%39%39%38%34%33%31%17%13%53%52%54%49%34%31%44%47%35%48%42%22%14%Dataprivacy&complianceRegulatorycomplianceDatagovernance&integrityCloudcomputingITtalentmanagementTransformations&systemimplementationsTechnologyresiliency–GeorgeBarhamDirectorofStandardsandProfessionalGuidance,TheIIASoftwaredevelopmentThirdparties/vendorsTechnicaldebt&aginginfrastructureIoTAI&machinelearning(includinggenerativeAI)*PercentagesreflectthenumberofrespondentswhoratedtheirITauditteam’sproficiencylevela4or5ona5-pointscale,where1indicates“Notatallproficient”and5indicates“Extremelyproficient.”ProtivitiandTheIIA16ComparingperceivedthreatswithorganizationalpreparednessandtechnologyauditproficiencyThegapsbetweentheperceivedthreatofAIandmachinelearningandthelevelsofpreparednessandproficiencyareparticularlyconcerninggiventherapidadoptionofAItechnologiesacrossindustries.OrganizationsmaybeembracingAIwithoutfullyunderstandingtheassociatedrisksordevelopingthenecessarycontrolstomitigatethem.Thisleavesthemvulnerabletopotentialethical,securityandoperationalchallengesthatcouldarisefromAIuse.Thereisanoteworthyandinsightfulconnectionbetweenhoworganizationsperceivevarioustechnologyrisksandtheircorrespondinglevelsofpreparednessandproficiencyinmanagingtheseriskswithintheirtechnologyauditfunctions.Themostsignificantgapsareintheareasofthird-party/vendorrisks,andAIandmachinelearning,includinggenerativeAI.Thepercentagesbelowreflectthenumberofrespondentswhoratedthelevelofthreat,organizationalpreparednessortechnologyauditfunctionproficiencya4or5ona5-pointscale—seeFigures13,14and15intheAppendixfordetails,includingdefinitionsofscalesforperceivedthreat,organizationalpreparednessandtechnologyauditproficiency.Perceivedthreatlevelvs.ITauditproficiency—topthree*Figure7Thirdparties/vendors3Thirdparties/vendors:Perceivedthreat:50%•••28%Organizationalpreparedness:36%Technologyauditproficiency:33%AI&machinelearning(includinggenerativeAI)13%Manyorganizationsmaylackthenecessaryframeworksorexpertisetomonitorandcontroltherisksassociatedwithexternalvendorseffectively.Thesegapshighlightpotentialvulnerabilitiesinthesupplychain,whereafailuretomanagethird-partyrisksadequatelycouldleadtosignificantdisruptionsorsecuritybreaches.Cybersecurity10%20%30%40%50%60%70%AIandmachinelearning(includinggenerativeAI):Perceivedthreat:28%PerceivedthreatlevelITauditproficiency•••Organizationalpreparedness:17%Technologyauditproficiency:13%*Percentagesreflectthenumberofrespondentswhoratedthisthreata4or5ona5-pointscale,where1indicates“Nothreatatall”and5indicates“Significantthreat,”andthenumberofrespondentswhoratedtheirITauditteam’sproficiencylevela4or5ona5-pointscale,where1indicates“Notatallproficient”and5indicates“Extremelyproficient.”ProtivitiandTheIIA1703WhycybersecurityanddatastandoutasmostsignificantconcernsProtivitiandTheIIAWhat’stopofmind:ChiefconcernsforITauditleadersandteamsthisyearincludecybersecurityandanumberofdata-relatedissues—privacy,compliance,governanceandintegrity(seeTable1).Intermsofareasofcybersecurityperceivedtoposethegreatestrisks,databreachesandleaksofsensitiveinformationstandout,byfar,asthemostsignificant.Followingthese,third-partyandsupplychainrisks,alongwithcloudserviceprovidersecurityweaknesses,arethenextmostworrisomeissues(seeFigure8).requirements,organizationsmustfileanincidentreportwithinfourbusinessdaysofthecompany’smaterialitydeterminationregardingacyberincident.Organizationsmustprovideinsightintohowthecybersecurityriskmanagementfunctionsareintegratedintobroaderriskmanagementsystemsandprocesses,suchasriskreportingandmonitoringprocessesusedinconjunctionwiththeenterpriseriskmanagementprocess.Similarly,theNetworkandInformationSecurityDirective2(NIS2)intheEuropeanUnionhasexpandedthescopeoftheoriginaldirectivetoenhancecybersecurityacrosstheentireEuropeanregionbyunifyingnationallawswithcommonminimumrequirements.Underlyingregulatoryfactors:It’sunderstandabletofindtheseissuesamongthetoptechnologyrisks,giventheregulatoryattentiontheycontinuetodrawandtheincreasedlevelsofpreparednesstomanagethem.IntheUnitedStates,forexample,thenewcybersecuritydisclosurerulesfromtheSecuritiesandExchangeCommission(SEC)haveplacedaspotlightonbeingmorediligentandmindfulregardingcyberrisks.TherulesincreasereportinganddisclosurerequirementsforcompaniesregisteredwiththeSEC.Amongthe52%oftechnologyauditleadersseedatabreachesandleaksofsensitiveinformationasamajorrisktotheirorganizationinthecomingyear.ProtivitiandTheIIA19CommentaryAscyberthreatactorscontinuetoenhancethesophisticationoftheirattackmethods,ITauditteamsmustalsocontinuetoupskilltheirtechniquestohelpmanagementidentifyrelevantrisks.Itwillbeincreasinglydifficulttokeeppacewithoutsupportfromcybertoolingandothertechnology-enabledtactics.Ofnote,theuseoftoolssuchasvulnerabilityscannersandintrusiondetectionsystemsdoesnotalleviaterisklevels—infact,theymayrevealpreviouslyunknownrisksandvulnerabilities.Therehavebeensituationswhereanorganization,afteremployingthreatdetectiontechnology,realizedtheywere“flyingblind”priortousingthem.Anotherimportantpoint:Privatelyheldcompaniesmayalsoseevalueinenhancingtheirincidentidentification,evaluationandremediationpracticesthroughgreateruseoftechnologytoolsbytheITauditfunction,eveniftheyarenotsubjecttothesamepublicdisclosurerequirements.AscyberthreatathesophisticatioITauditteamsmtheirtechniquesrelevantrisks.ItkeeppacewithouandothertechnoAlso,asorganizationsincreasinglyrelyondata-drivendecision-making,technologyauditfunctionsmustevolvetoprovidemorerigorousassessmentsofdatagovernanceframeworks,verifyingthatdataintegrityismaintainedacrossbothinternalprocessesandthi

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论