Anda belum login :: 27 Nov 2024 16:15 WIB
Home
|
Logon
Hidden
»
Administration
»
Collection Detail
Detail
Risky Business
Oleh:
Quinn, Lawrence Richter
Jenis:
Article from Bulletin/Magazine
Dalam koleksi:
Journal of Accountancy vol. 193 no. 6 (Jun. 2002)
,
page 65-72.
Topik:
BUSINESS
;
Risk Management
;
Internet Audit
Ketersediaan
Perpustakaan Pusat (Semanggi)
Nomor Panggil:
JJ85.14
Non-tandon:
1 (dapat dipinjam: 0)
Tandon:
tidak ada
Lihat Detail Induk
Isi artikel
It’s no secret why audit committees are examining their information technology systems and security risks for their companies: They have no choice. Amid more frequent virus and hacker attacks and concerns about cyberterrorism, boards are diligently gathering information on the subject. "Audit committees are beginning to see IT security as a challenge they can’t ignore,” says Stephen Head, CPA, senior security consultant in the enterprise security practice group of Royal & Sun Alliance Inc., Charlotte, North Carolina. Now is a perfect time for internal auditors to identify information risks and get board approval to protect their company’s financial viability by ensuring appropriate, cost-effective IT security controls are in place and working. “Boards want CPA s to be able to advise them on real and potential cybersecurity risks and what the best practices are for handling them,” says Head, who is also vice - president of the Information Systems Audit and Control Association (ISACA) in Rolling Meadows, Illinois, and serves on the AICPA information technology executive committee (see “Get Your Internal Controls Up and Running,” at the end of this article). Internal auditors can learn from the following “best practice” examples of how their counterparts addressed IT risk management at AT & T Corp., the Williams Cos., J. C. Penney Co. and Comdisco Inc.
Opini Anda
Klik untuk menuliskan opini Anda tentang koleksi ini!
Kembali
Process time: 0.015625 second(s)