Robert-Parker-Panel-4

advertisement
Panel 4:
Accounting for Cybersecurity
Reporting and Attestation Issues
October 2, 2015
S-1
The Cybersecurity Issue
Increasing Board Concern
As a result of the widely publicized cyber attacks on major corporations and public
sector entities by hackers, criminals and foreign governments, cybersecurity is
gaining increasing attention by boards of directors, customers, business partners,
and regulators.
Causes Not Well Defined or Understood
Are these attacks due to a lack of standards, inadequate regulations,
managements' failures to adopt adequate countermeasures, lapses in monitoring
or a lack of satisfactory technical solutions?
Evaluating Cybersecurity Initiatives
Entities are currently in the process of evaluating their cybersecurity programs, and
are discussing options for communicating how they achieve their cybersecurity
objectives.
Independent Reporting
One key aspect of communicating the achievement of cybersecurity
objectives is the ability to provide assurance by way of a report on cybersecurity
from an independent assessor.
S controls
-2
The Cybersecurity Issue
The AICPA’s Response
The AICPA’s Assurance Services Executive Committee (ASEC) formed the ASEC
Cybersecurity Working Group to work in collaboration with the AICPA’s Auditing
Standards Board (ASB) in develop practitioner guidance for performing
examination-level attestation engagements related to cybersecurity.
Tools for the Profession
The working group will be responsible for identifying or developing suitable
measurement criteria and for developing a cybersecurity attestation guide, as well
as a supply chain/vendor management attestation guide, to provide performance
and reporting guidance for practitioners engaged to report on controls over
cybersecurity for an entity or portions of an entity (i.e. system(s), related
systems, operating unit or division).
Effective Reporting
A cybersecurity attestation report will provide useful information to users in
making decisions as stakeholders in the entity.
S-3
Cybersecurity Discussants
Chris Halterman, Partner EY
Chris Halterman is an Executive Director in the Advisory Services
practice of Ernst & Young LLP, with more than 26 years of
experience in the public accounting profession, focusing on IT
and process controls and information integrity. He leads EY’s
Advisory Service Organization Control Reporting practice
globally and in the Americas, with responsibility for developing
methodology, training, client service strategy, quality assurance
programs and market initiatives.
Chris is a member of the AICPA Assurance Services Executive Committee (ASEC)
and chairs the ASEC Trust/Information Integrity Task Force. In this role, he leads the
AICPA’s efforts to establish the criteria for evaluating the system security,
availability, processing integrity, confidentiality and privacy. In his role as Chair of
the ASEC task force, Chris speaks regularly on SOC 1 (formerly SSAE 16) and SOC 2
reports in the US and internationally He also serves as signing executive for a major
service organization’s SOC 1 and SOC 2 reports and performs quality review on
numerous other reports.
S-4
Cybersecurity Discussants
Graham Gal, University of Massachusetts
Graham Gal is an Associate Professor of Business Administration
at the Isenberg School of Management in the Department of
Accounting and Information Systems. His research interests
include business ontologies, specification of internal controls,
continuous monitoring, continuous reporting, organizational
security policies, and controls for sustainability reporting.
Dr. Gal has recently presented his work at the University of Vienna’s Value Modeling
and Business Ontologies symposium, the REA Workshop at CAISE, The University of
Melbourne, Marmara University’s Ethics, Fraud, Governance and Social Responsibility
Symposium, and Rutgers’ Continuous Reporting and Monitoring workshops. He has
published in a number of journals including;Journal of Emerging Technologies in
Accounting, Decision Sciences, Expert Systems Review, Expert Systems, Journal of
Information Systems, The Information Systems Control Journal, Advances in Accounting
Information Systems, The International Journal of Accounting Information Systems,
and The International Journal of Information Management. Dr. Gal is an associate editor
of the Journal of Emerging Technologies in Accounting and The International Journal of
Auditing Technology.
S-5
Cybersecurity Moderator
Robert G. Parker, Retired Deloitte Partner, UW-CISA
Robert Parker is a retired Deloitte Enterprise risk partner. He has
been involved with Information technology for many years, is a
Past International President of ISACA, has served on many AICPA
committees; SysTrust, Privacy Task Force and Top Tech Issues
and on many CPA Canada Committees; Privacy , the Information
Technology Management Advisory Committee, Year 2000
Committee and Database Auditing to name a few.
He is a member of the Board of Directors of the University of Waterloo Centre for
Information Integrity and Systems Assurance.
Cybersecurity Participation
Open Discussion Following the Discussants’ Presentations
S-6
Opening Comments
Security continues to rank highly on nearly everyone’s list of concerns
ISSUES
AICPA – CPA Canada’s 25th Anniversary Top Tech Issues survey ranked
security
S-7
Source: AICPA-CPA Canada 25th Anniversary Top Tech Survey
CONFIDENCE
Opening Comments
Security breaches involving personal information – information about an
identifiable individual – are quickly becoming the norm
S-8
Source: AICPA-CPA Canada 25th Anniversary Top Tech Survey
Cybersecurity
CONFIDENCE
Dropdown Questions
S-9
Source: AICPA-CPA Canada 25th Anniversary Top Tech Survey
CONFIDENCE
Cybersecurity
S - 10
Source: AICPA-CPA Canada 25th Anniversary Top Tech Survey
CYBERSECURITY
S - 11
CYBERSECURITY
Source: http://www.idigitaltimes.com/10-largest-data-breaches-2014-sony-hack-not-one-them-403
S - 12
CYBERSECURITY
Source: http://www.idigitaltimes.com/10-largest-data-breaches-2014-sony-hack-not-one-them-403
S - 13
CYBERSECURITY
Source: http://www.idigitaltimes.com/10-largest-data-breaches-2014-sony-hack-not-one-them-403
S - 14
CYBERSECURITY
2015 Data Breaches
Anthem BlueCross BlueShield – 80 million patient records - February
Office Of Personnel Management – 21.5 Million May
Premera BlueCross BlueShield – 11.2 Million records
January
Office Of Personnel Management – 4.2 million records April
Ashley Madison - 25 gigabytes (no indication of how may of their over 40.8
million members were exposed ) – August
CareFirst BlueCross BlueShield – 1.1 million records May
Hacking Team - 1 million emails
July
Army National Guard - 850,000 records July
Penn State University – 18,000 February
S - 15
CYBERSECURITY
Data Breach Costs
By design, the data breach cases included in this research had a minimum value of
1,000 records and a maximum value of 100,000 records. As discussed, we do not
include data breach cases in excess of 100,000 records because this would affect the
findings and are not representative of the data breaches most companies experience.
S - 16
Cybersecurity
How many have this or a similar type of communication?
S - 17
USA adopting chip & signature and not chip & pin
Among those many options are three for the cardholder verification
method (CVM):
1) Chip and PIN - the most secure option because it requires the
cardholder to enter a personal identification number with each
purchase;
2) Chip and Signature - where the cardholder need only sign a
receipt; and,
3) Chip and Nothing - where, as the name implies, the cardholder
is not verified.
Likely motivation for not adopting Chip and Signature:
• Lack of desire to alter existing cardholder behavior by
introducing PINs with credit cards
• An attempt to limit the cost of EMV (Electronic Member
Verification) for merchants by not requiring the purchase of an
EMV-compliant PIN pad.
S - 18
Cybersecurity Participation
Open Discussion Following the Discussants’ Presentations
S - 19
Questions
Given the requirements for assessment criteria, is there a
plan in place to continually or periodically review the
technical information on cybersecurity and cyber
breaches and update the AICPA’s guidance material?
Assessment Criteria
Scope of Assessments
S - 20
Questions
A number of high profile cyber security breaches have
been successful by exploiting the “soft underbelly” of
an almost unrelated organization.
Organizations are allowing or welcoming the
perpetrators into their organization, sometimes
unwittingly and at times as trusted business partners.
Where do we go from here?
What do we have to do the get managements’ attention?
S - 21
Questions
What are the top 3 cybersecurity risks that
management must address?
S - 22
Questions
What impact has the “Internet of Things” had on
the way businesses address or should address
cybersecurity?
S - 23
Questions
Does BYOD significantly alter the Cybersecurity
requirements?
Does MDM (Mobile Device Management)
software do much to protect the organization?
S - 24
Questions
The media focuses on large security breaches
involving personal information; is this useful,
meaningful or appropriate?
What about SCADA controlled devices?
S - 25
Questions
Many organizations rely on the Fortress Model
whereby a strong and robust perimeter is
established and monitored using IDS (Intrusion
Detection Software) and IPS (Intrusion
Prevention Software) software.
What else would you recommend that
organizations do to strengthen their
Cybersecurity defences to lessen the risk of an
event occurring or, if one does occur, the
impact of the Cybersecurity breach?.
S - 26
Questions
The Ponemom Institute and others have frequently
identified internal data breaches as being more
prevalent than external cyber breaches, although fewer
records may be accessed; is management focusing
resources in the most appropriate area?
S - 27
Questions
Which is the most frequently adopted cybersecurity standard? (CobIT,
NIST, ISO, Industry, AICPA, etc.)
S - 28
Questions
What are the key failings that management should avoid in
ensuring that their organization is not a victim of a cyber
security breach? What is management not doing that they
should?
What are the key security controls that management should
implement and monitor to ensure that their organization is not a
victim of a cyber security breach?”
S - 29
Questions
Where should cybersecurity responsibility reside? (ISP,
Organization, Network Management, Data Owners, End
Users, Subject Data)
S - 30
Questions
Has the general public become too acclimated and now accepts
cyber security breaches as the norm?
Do you believe that users, customers and others will require a
Cybersecurity certificate before doing business with an organization?
S - 31
Questions
On a scale of 1 to 10 with 10 being excellent and 1 being nonexistent
or ineffective, where would you rank the existing technology based
tools designed to protect data in the event of a cyber-attack?
S - 32
Questions
Legislation, regulations and rules can only go so far in preventing
cyber-attacks;
Do they go far enough?
Where are they weak or non-existent?
Are the penalties severe enough?
Can they ever be effective?
How can we motivate management to do it better?
S - 33
Thank You For
Your
Interest and Participation
S - 34
S - 35
Download