Remove change-auditor
article thumbnail

Only big fines will change how the auditors audit

The Guardian Data Protection

Splitting a firm’s audit and consulting functions has merit but only large penalties will affect proper change •Watchdog finds work of Patisserie Valerie auditor unacceptable This time last year the Financial Reporting Council tried to read the riot act to the auditing industry.

article thumbnail

Best Practices Q&A: The importance of articulating how cybersecurity can be a business enabler

The Last Watchdog

It also covers the extension of security and privacy requirements to third-party partners and the ability to respond quickly and effectively to external questions from stakeholders such as customers, auditors, and regulators. LW: Cultural change is acutely difficult. You need to be partners in driving this.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The value of Key Rotation and Re-encryption.

Thales Cloud Protection & Licensing

To meet various compliance requirements and reduce the risk of your most sensitive data getting compromised you may want to consider changing the encryption key used to protect this data. Thales refers to this changing of encryption keys as “Key rotation” or “Rekey”. See link at the end of this blog for more details. Data Risk Factors.

article thumbnail

BT auditor highlights IT vulnerabilities in financial reporting

IT Governance

BT’s external auditor, KPMG, has issued an “adverse opinion” of the telecom giant’s internal financial reporting controls in another blow to its accounting credibility. The announcement comes three years after auditors discovered accounting irregularities in BT Italia, which wiped £530 million off the organisation’s market value.

IT 92
article thumbnail

RSAC insights: ‘CAASM’ tools and practices get into the nitty gritty of closing network security gaps

The Last Watchdog

This is the heavy lifting that’s easier said than done, especially in a massively-distributed, fast-changing operating environment. Then there’s the issue of having to change the behaviors of the asset owners, many of whom are stuck in a siloed mindset. The pressure bears down on security teams from two directions, Zheng says.

Security 240
article thumbnail

NYDFS Proposes Updated Second Amendment to Its Cybersecurity Regulation

Hunton Privacy

As a result of the initial 60-day comment period, the updated Amendment incorporates a number of changes, including the following: Definitions NYDFS clarified the thresholds for calculating when covered entities qualify as “Class A Companies,” which would be subject to heightened requirements.

article thumbnail

6 Ways Document Management Software Can Make Your Next Audit a Breeze

AIIM

That means the auditor is going to need to see a lot of paperwork. Regulations and guidelines change often, but with a document management system in place, it is no longer a hassle to get all your documentation updated quickly. No matter what industry you are in, audits are stressful. Makes It Effortless to Update Policies.