Protiviti Thought Leadership Roundup – August 25, 2014

August 25, 2014

Welcome to the first edition of my Thought Leadership Roundup.  As I noted earlier, this post will occur on Monday’s and capture recent thought leadership publications of interest as well as highlight relevant upcoming webinars.  I encourage you to click on the titles to view more information:

Link: The Protiviti View on IT Audit Coverage

Information technology is pervasive to today’s businesses.  Protiviti’s recent IT Audit Benchmark found that IT Audit coverage is lacking at many organizations because a comprehensive IT Audit risk assessment is not being completed or not comprehensive enough to understand IT risks.

Link: Internal Auditing Around the World: 10th anniversary edition

To celebrate the tenth anniversary of Internal Auditing Around the World, we asked internal audit executives from some of the world’s leading organizations to look back on the evolution of their function during the past decade, in addition to weighing in on what the future may hold for the internal audit profession.

At their core, these engaging accounts of internal audit’s evolution tend to cover a number of major transitions: from the shadows of Sarbanes-Oxley compliance to the frontiers of enterprise risk management (ERM), from tactical practitioners to strategic business partners, from internal controls and financial audits to risk management and governance, and from assurance-only to assurance and advisory.

Today’s leading internal audit functions are moving beyond relevance to the type of strategic leadership that brings about and sustains impactful improvements. The future auditor will conduct even greater levels of collaboration, wield more powerful technology, and assume an even sharper risk focus while taking on a greater leadership role, as well.

Link: Cybersecurity at the board level: Is your intellectual property and sensitive information leakproof?

Many companies have implemented mechanisms to prevent employees from sharing intellectual property outside of the organization, but these same organizations use insecure email and other tools to share information with it’s board of directors.  This article on The Protiviti View blog provides a perspective into how organizations can respond to these challenges.