Page 369 - ITGC_Audit Guides
P. 369

Executive Summary

                   In  the  digital  era,  organizations  must  treat  data  the  same  way  they  would  treat  cash:  as  an
                   organizational  asset  that  must  be  protected  from  insiders  and  outsiders  alike.  Protecting  the
                   organization’s digital assets from catastrophic data breaches should no longer be viewed as the
                   responsibility of information technology (IT) management only. Senior management and the board
                   are  ultimately  accountable  for  managing  the  organization’s  risks  to  levels  that  enable  the
                   organization to achieve its objectives.


                   Whether  malicious  or  unintentional,  insider  threats  often  fail  to  receive  the  attention  they
                   deserve, considering the significance of the risks to which they expose the organization. The key
                   risks associated with insider threats include sabotage, theft of  organizational data, espionage,
                   fraud, and criminal acts. Additionally, research trends indicate that the insider threat landscape
                   is growing as organizations become more dependent on information systems (IS), automated
                   processes, web-based applications, digitally transmitted data, and cloud-based data storage.

                   Organizations are realizing that investments in technology are only part of the solution; it is equally
                   important to assess whether their governance and management controls (e.g., IS policies, training,
                   and awareness campaigns) are capable of addressing insider threats.

                   Internal auditors are well positioned to help senior management and the board recognize the
                   importance of implementing or strengthening an insider threat program and to help organizations
                   improve their governance, risk management, and control processes related to insider threats.




































                         www.theiia.org                                      Auditing Insider Threat Programs   2
   364   365   366   367   368   369   370   371   372   373   374