Вы находитесь на странице: 1из 3

IIA Malaysia e-techline

April 2017 Issue 02/17

CBOK: Stakeholders Advice to the Chief Audit Document a clear development plan to address
Executive the most important gaps in capabilities.
Discuss with executive management and board
This Global Internal Audit Common Body of Knowledge members the self-assessment findings and the
(CBOK) Stakeholders report offers key insights into development plans. Solicit approval and consent.
what audit committees (ACs) and management look for Seek out a mentor (internal or external) who is in
in heads of audit. a senior leadership position.

According to the survey of over 1,100 board members, Action items for a CAE to balance competing priorities:
Chief Executive Officers (CEOs) and Chief Financial Develop strong relationships with stakeholders of
Officers (CFOs) from 23 countries, they want chief all types and levels.
audit executives (CAEs) who exhibit strong business Do not hesitate to take positions when they are
acumen, have demonstrated leadership skills and can needed.
manage competing priorities, as well as influence Stay grounded in professional obligations.
organisational culture, as summarised below: Build excellent interpersonal skills to be ready for
use when they are critical.
1. Exhibit strong business acumen, including
knowledge of the industry, the ability to under- Action items for a CAE to promote change in
stand business strategy, and the insight to organisational culture:
understand and assess risks.
Discuss with stakeholders the culture desired for
2. Demonstrate leadership skills, technical the organisation to help ensure the desired
competence, innovation, and relational culture is defined and agreed-upon.
competence with audit staff and stakeholders. Assess the culture of the internal audit (IA)
function to ensure it models the culture desired
3. Manage competing priorities, demands, and
for the entire organisation.
conflicts within the organisation, including
Embrace the role of educator and change agent,
communication with all areas of the organisation
each of which gives the ability to the CAE to
with objectivity and integrity.
improve the organisations culture.
4. Seek to influence the culture of the organisation. Confirm with stakeholders that IA is viewed not
Modeling right behaviour and thinking, inspiring only as an enforcer of rules, but also as a valued
discussion, and acting as a change agent is crucial contributor to the improvement of the
to helping improve organisational culture. organisation and its culture.

Action items for a CAE to gain business acumen: Conclusion


Identify the essentials to the success of The role of the CAE is challenging it requires
organisation - its industry, the external competencies, motives, skills, and specific levels
environment, the chosen strategies and business, of integrity not often required of other executive
and the risks related to those strategies and roles.
business.
Assess level of business acumen based on the A unique feature of the CAE role is the reporting
essentials identified. If necessary, develop a plan structure and the multitude of stakeholders whom
to spend the time and effort with those in the they serve. It is important that the reporting
organisation who can help the CAE think more like structure include measures that will reduce any
a business leader. adverse impact on the independence and the
Engage with stakeholders as a business leader, not objectivity of the CAE.
a technical auditor. Address issues from their point The advice in this report comes from a large group
of view, communicating with them using language of global stakeholders. Each CAE should engage
that they understand. with their own stakeholders to explore where they
excel and where they can improve to bring value
Action items for a CAE to develop essential capabilities: to the role and to the organisation.
Perform a self-assessment of capabilities against
those expected by stakeholders. Reference:
Solicit input from stakeholders on performance in http://theiia.mkt5790.com/CBOK_2015_Stakeholder_Advic
the CAE role; ask them to identify the areas in e_CAE
which the CAE should improve.

1
IIA Malaysia e-techline
April 2017 Issue 02/17

The Security Intelligence Center - Next Steps: Slightly over 50% of respondents reported that
Beyond Response to Anticipation their organisations use threat intelligence and
Joint research by Internal Audit Foundation and analytics tools, while nearly 65% said that they use
event collection tools (Exhibit 3).
Crowe Horwath
These responses suggest that organisations have
As cyberattacks grow in frequency, severity, and begun to implement the functions associated with
a SOC even if they have not yet taken the steps to
complexity, cybersecurity professionals are urging
establish a formal center.
organisations to move beyond a defensive and reactive
approach to a more proactive approach, allowing for
the prediction and anticipation of cybersecurity
threats.

A Quick Poll survey of 130 CAEs in North America was


conducted to ask specific questions about the use of
security operations centers (SOCs) as part of
cybersecurity strategies. The survey results also suggest
that some conclusions can be drawn about CAEs
general levels of involvement in monitoring and
reviewing their SOC operations.

This report is intended to help cybersecurity


professionals, CAEs, and other stakeholders to explore
broader issues and to answer two questions:
1. How can organisations move beyond merely
reacting and responding to cybersecurity incidents
and instead start to identify, anticipate, and actively
defend against known and emerging threats?
2. What role can CAEs play in encouraging and
facilitating this shift from a reactive to a proactive
stance?
The Current State: Security Operations Centers and
the Use of Intelligence Tools
SOC Usage and Characteristics
While a number of organisations have established
formal SOCs to help manage cybersecurity risk,
there are still significant opportunities for audit
executives to become more actively engaged in this
area. 35% of respondents said that their
organisations had already established a formal
SOC; another 10% were considering it (Exhibit 1).
Speaking in general terms, the survey suggests that
SOCs tend to be moderately sized departments
within the larger information security functions.
About 4 out of 10 organisations reported 5 or fewer
full-time equivalent employees (FTEs) attached to
their SOCs (Exhibit 2).
Cybersecurity Tool Use
CAEs were asked about their use of the 3 general
types of cybersecurity tools: threat-intelligence
gathering tools, event collection tools, and
analytics tools.

2
IIA Malaysia e-techline
April 2017 Issue 02/17

The Role of Internal Audit (IA)


Tone at the Top February 2017
The survey responses suggest a number of areas in
This issue covers the disclosure about compensation
which IA have opportunities to improve and
paid to CEOs, CFOs and other high-ranking executive
increase their contribution in this area, particularly officers of public companies. While such disclosure
in helping to pave the way for the establishment of provides transparency into this sensitive topic, it also
a SOC or in elevating a SOC to a Security raises concern among shareholders and employees
Intelligence Centre (SIC). when the CEO receives excessive compensation
IAs role in cybersecurity can be considered within although the companys performance is down.
the context of the broad data security functions Such concerns create risks to the enterprise and
outlined in the organisations cybersecurity highlights the need for internal audit to assess
framework. As the third line of defence, IA is executive compensation packages.
responsible for providing senior management and
the board with independent assurance that Reference:
needed activities are being performed by the first https://global.theiia.org/knowledge/Public%20Documents/
two lines of defence: 1) the lines of business; and 2017-Feb-TaT.pdf
2) the risk management team.
Some areas where IA can provide assurance are: KPMG 2017 Global Audit Committee Pulse
Pursue specific steps that relate to their Survey
entities SOC and general security operations. Is Everything under Control: Audit Committee
Many of these are closely related to the Challenges and Priorities
actions recommended in the Internal Audit
Foundation Core Report, Navigating This global survey, conducted between August to
Technologys Top 10 Risks: Internal Audits October 2016, offers insights that ACs worldwide can
Role. use to benchmark its responsibilities and practices,
http://theiia.mkt5790.com/Navigating_Technology and strengthen its oversight.
s_Top_10_Risks
The survey identifies six key areas of priorities for ACs,
Help the organisation advance toward the
as below:
establishment of a mature SIC by verifying that
1. Risk management is a top concern for ACs.
cybersecurity intelligence tools are up-to-
2. Internal audit can maximise its value to the
date, with current patches and upgrades
organisation by focusing on key areas of risk and
installed. IA can also review the training and
the adequacy of the companys risk management
credentials of SOC analysts to confirm up-to-
processes generally.
date qualifications.
3. Tone at the top, culture and short-termism are
Review the overall level of information major challenges and may need more attention.
security awareness and preparedness, and 4. CFO succession planning and bench strength in the
elevating that awareness organisation-wide. finance organisation continue to be weak spots.
One of the most effective ways to do this is by 5. Two key financial reporting issues may need a
advocating for effective cybersecurity more prominent place on AC agendas:
awareness training. Implementation of new accounting standards and
non-GAAP financial measures.
The Global Technology Audit Guide (GTAG) 17: 6. AC effectiveness hinges on understanding the
Auditing IT Governance, offers extensive business.
additional information to IA to fulfill their
responsibilities in providing assurance and
consulting services for IT governance. Reference:
https://global.theiia.org/standards- https://home.kpmg.com/content/dam/kpmg/xx/pdf/2017/
guidance/recommended-guidance/practice-
01/2017-global-audit-committee-pulse-survey-global-non-
guides/Pages/GTAG17.aspx
interactive.pdf

Reference:

http://theiia.mkt5790.com/Cybersecurity

Вам также может понравиться