Actualiteit
Welkom op onze actualiteitspagina
Ontdek hier het laatste nieuws, bekendmakingen, en publicaties op het gebied van internal audit
Nieuws
Publicaties
As today's organizations become more reliant on digital technology and collect ever-larger volumes of data, the risks associated with unauthorized access and potential privacy breaches continue to grow. At the same time, the regulatory environment surrounding data protection and privacy is evolving, with governments and standard-setting organizations developing increasingly more comprehensive frameworks to safeguard personal identifiable information. As an IIA member, you can download the report here. Download Privacy and Data Protection part 1 here. Download Privacy and Data Protection part 2 here.
Cybersecurity poses a significant threat for organizations of any size. Indeed, a recent global survey of internal audit leaders by The Internal Audit Foundation found it ranks as the top risk in every region of the world. Internal audit is well-suited to play a key role in helping to manage cyber risks, but it must have the resources it needs to fulfill that role. Even as internal audit practitioners make strides to improve services in this ever-evolving risk area, new challenges arise. This three-part series on cybersecurity, sponsored by AuditBoard, explores: Staffing and Development for the Next Generation Artificial Intelligence – Cybersecurity Friend and Foe Cybersecurity Third-Party Risk Management As an IIA member, you can download the report here.
The world is becoming increasingly interconnected, and industry is no exception. Today, nearly every major business sector in some capacity relies on third parties. While there are many benefits to be had with this trend — particularly regarding efficiency, productivity, and better meeting sustainability commitments — there are also risks that must be accounted for. This Global Knowledge Brief, the final part of a three-part series on cybersecurity sponsored by AuditBoard, highlights just how significant cyber risks associated with third parties have become and addresses where internal auditors can fit into third-party cyber risk management. This report is for IIA members only and can be downloaded here. As an IIA member you can download part 1 here. As an IIA member you can download part 2 here.