Shadow IT is problematic in the best of circumstances. In the worst cases, it poses a massive cybersecurity risk to the entire organization.
Latest Content From MISTI
One telling sign of a maturing internal audit department is when the CAE proposes audit topics that are organizationally-focused around key projects and initiatives.
Enterprise security professionals have been lax in our demands for visibility into how cellular networks put our organizations at risk.
The high-publicity WannaCry attack has many companies reviewing their protections against ransomware and other cybersecurity attacks. Here we provide five preventative controls that IT auditors should ensure are functioning properly.
Unless you’ve been living under a rock, you’ve heard about the WannaCry Ransomware attack.
Aside from corporate data and proprietary intellectual property, employees are the greatest assets to companies.
Internal auditors with data analytics expertise can earn a premium and weild more influence in internal audit departments, but getting started may take some initiative and a little creativity.
Internal audit can provide assurance to their board and executive team whether or not a process is in place to manage risks of third parties maintaining critical data, and that third parties have their data protection controls in place.