Page 26 - Finanancial Management_2022
P. 26

LEARNING RESOURCES
                                                                             “The board, along with key IT personnel,
                                                                             [needs] to explore potential risks from
                                                                             known adversaries. This means acting
                          Cybersecurity Applications Certificate + Unlimited CPE  with as much fidelity as possible.” The
                          Empower yourself to implement a sound cybersecurity risk   threat-modelling stage involves
                          management programme that will help your organisation   simulating attacks from start to finish, and
                          avoid cyberattacks and recover quickly when they do occur.  cycling through response and mitigation
                                                                             options using red (attack) and blue
                               BUNDLE                                        (defence) teams. The board should be
                                                                             present for big technical exercises.
                                                                               “Technical exercises should be followed
                          Cybersecurity Practical Applications Certificate Program  by tabletop exercises” in which
                                                                             organisations discuss the outcome of
                          Empower yourself to implement a sound cybersecurity risk   simulations and examine their response,
                          management programme that will help your organisation   Maigre said. “Tabletop exercises should
                          avoid cyberattacks and recover quickly when they do occur.  look at four areas,” she said. “First, time

                               COURSE                                        — how much time is needed to make
                                                                             decisions in the event of an attack?
                                                                             Second, transparency — how much of
                                                                             what has happened would you reveal to
                          Cybersecurity Risk Management                      stakeholders and when? Third, authority
                          Covers key cybersecurity policies, controls, and procedures   — who are the key decision-makers, and
                          as part of a cybersecurity risk management programme.  under what circumstances can or should
                                                                             you delegate or escalate certain tasks?
                          Find this course in the AICPA store and the CGMA store.  Fourth, based on the results of the first
                               COURSE                                        three steps, is our current response
                                                                             framework useful?”
                                                                               Throughout these discussions the
                                                                             board should be asking questions about
                          Reporting on an Entity’s Cybersecurity Risk Management
                          Program and Controls: Attestation Guide            the likelihood of attacks, the impact of
                                                                             information sharing with stakeholders,
                          When you’re examining a cybersecurity risk management   and where key responsibilities lie. “Many
                          programme and its controls, look to this authoritative guide   companies are equipped with the
                          for interpretive guidance. Includes a framework for providing   technology to respond to a cyberattack, but
                          stakeholders with useful, credible information about the   they can fail on governance,” Maigre said.
                          effectiveness of an entity’s cybersecurity efforts.  That is where an engaged board can make

                               PUBLICATION                                   a difference.
                                                                               Ultimately, Seth said, this is an area that
                                                                             is only going to grow in importance.
                                                                             “Attacks are increasing, ransomware is
                          SOC for Cybersecurity Certificate                  growing in sophistication, and there is a
                          Learn how to perform SOC for Cybersecurity attestation   lot of regulation coming. Companies
                          examinations using the AICPA’s new cybersecurity risk   cannot be ready for a cyberattack if the
                          management reporting framework. Earn this certificate and   board is not ready, too. It’s as simple as
                          be amongst the first to showcase your knowledge about the   that.” Maigre agreed and added: “The board
                          AICPA’s profession-wide approach to cybersecurity.  has to understand that these are no longer
                                                                             rogue individuals out for a quick payday.
                               WEBCAST                                       They are criminal enterprises —
                                                                             businesses in their own right. Cybercrime
                                                                             is big-game hunting now, and you need to
                                                                             be prepared.”   ■


          Test                             with board members, as well as helping
          Testing can also help educate the board,   them to understand that they have a key   Felicity Hawksley is a freelance writer
          demonstrate the need for additional   role to play”.                 based in the UK. To comment on this
          budget, and increase security. Maigre said   Maigre recommended that companies
          that “as well as highlighting security   take a two-step approach to testing. “First,   article or to suggest an idea for
          needs, war games and tabletop exercises   the company needs to threat-model and   another article, contact Drew Adamek
          can help to build meaningful relationships   undertake technical exercises,” she said.   at Andrew.Adamek@aicpa-cima.com.
          24  I  FM MAGAZINE  I  February 2022
   21   22   23   24   25   26   27   28   29   30   31