By Jose Tabuena2015-06-30T15:00:00
Cyber-security is now a very real risk, with the potential for staggering costs and reputational harm. Cyber-security has another unusual feature as well: It falls into the realm of conscious harms, where companies must play a cat-and-mouse game to stay ahead of attackers. How do you build, maintain, and audit ...
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2015-07-14T11:30:00Z By Joe Mont
By now every compliance officer has already heard the warning that it’s a matter of when you suffer a cyber-security breach, not if. Then comes compliance with breach disclosure rules—and those demands are becoming as perplexing as the cyber-threat itself. Overwhelmed, compliance officers are seeking ways to navigate these demands ...
2026-01-22T17:36:00Z By Diana Mugambi CW guest columnist
For more than two decades, assurance and compliance frameworks have rested on a simple assumption: Material decisions are made by people. Post‑Sarbanes-Oxley Act (SOX) assurance reset worked because it aligned accountability with human behavior. That assumption shapes how internal controls are designed, how accountability is assigned, and how assurance is ...
2025-12-16T14:00:00Z Provided by Workiva
Join experts from KPMG, Cisco, and Workiva as they explore how audit, accounting, and finance professionals can leverage a technology mix of data analytics, gen AI, and other tools to ramp up efficiency and strengthen control effectiveness.
Site powered by Webvision Cloud