logo-newlogo-newlogo-newlogo-new
  • Home
  • Blog
  • Audit Trail Academy
  • Advisory Services
  • Books
✕
  • Home
  • Chambers on Internal Audit
  • Uncategorized
  • 5 Risks That Should Be On the Internal Audit Radar – Now!

5 Risks That Should Be On the Internal Audit Radar – Now!

Changing Times, Changing Priorities: Are We Passing the Test?
April 7, 2014
Managing Perceptions: What Should Internal Auditors Say on the Elevator?
April 21, 2014
April 14, 2014

Generally speaking, I think internal auditors do a good job of assessing risks and developing risk-based audit plans. But there is always a danger that unfamiliar risks may be overlooked or that rapidly emerging risks will render even the best crafted audit plans obsolete. If you typically undertake risk assessments only once or twice a year, you may not have incorporated several risks that have suddenly burst onto the radar of management or the board of your organization.

Here are some areas that should be in our risk cross hairs in 2014:

1. Cybersecurity Frameworks. I know you’ve heard it before: Cybersecurity is a huge area of concern, ranking near the top of nearly every list of business risks for about a decade. But the risk levels are higher than ever this year, and because the dangers are growing rapidly, many believe that the National Institute of Standards and Technology (NIST) cybersecurity framework and other similar frameworks will soon become de facto standards for all companies.

Kroll’s Cybersecurity Forecast 2014 points out, “As new laws evolve that reflect the NIST guidelines and look more like the EU privacy directive, some U.S. companies will find themselves ill-prepared to effectively respond to the regulations.” Even where regulatory requirements are not changing, the pressure is on for conformance. According to Kroll, organizations that don’t follow suit may find themselves subject to shareholder lawsuits and other legal issues.

Audit committees understand that cybersecurity systems can fail anywhere, anytime. But if your company has not yet adopted an authoritative, rigorous cybersecurity framework, don’t be surprised if, one day soon, your committee asks why internal audit never recommended a framework. It’s simply a logical step.

2. COSO 2013 Readiness. Even if COSO is status quo at your organization, management still might find itself unprepared for the changes brought by COSO 2013. The core difference between “old COSO” and “new COSO” lies in widening the scope and applicability of the framework. Your management team might be struggling to fully understand the new requirements or important clarifications.

If we truly believe in a partnership with management, we must ensure that the transition to COSO 2013 is seamless. We all know that controls are management’s responsibility, but at many organizations, management relies on internal audit for advice about COSO. So, it’s better to head off a problem than to discover later on that management was not properly prepared.

In its fall 2013 Pulse of the Profession survey, The IIA’s Audit Executive Center noted that 45 percent of CAE respondents have overall responsibility for assessing and reporting on internal control, and 42 percent projected they will have overall responsibility for transition/adoption of the COSO 2013 framework. In addition, 38 percent indicated they would have overall project management responsibility for their organization’s transition/adoption of the COSO 2013 Internal Control–Integrated Framework.

3. Third-Party Risks. As I noted in a recent blog, internal auditors should be concerned about third-party risks. The days of a company’s suppliers or partners being well-known and trusted businesses on the same street or town are a distant memory.

For those in highly regulated industries, third-party risks are likely high on the to-do lists. That’s because regulators, such as the Office of Inspector General (OIG), the Office of the Comptroller of the Currency (OCC), and the Federal Financial Institutions Examination Council (FFIEC), are intensifying their focus on these risks. Meanwhile, various other regulatory groups are beginning to expect organizations to proactively identify potential third-party challenges. Your organization may be required to verify not only whether business providers are in compliance with regulations, but whether suppliers and partners have effective risk-management and incident-reporting systems firmly in place.

Not being under a regulatory microscope doesn’t mean a company’s third-party risks are less. Regulators simply may not be pointing out the risks.

Many auditors believe that tackling third-party audits is prohibitively time-consuming. In actuality, even a limited-scope audit can be surprisingly effective. A brief review of contracting procedures can quickly establish whether adequate risk assessment and due diligence are routinely performed in the selection of third parties; whether right-to-audit clauses and other important safeguards are built into standard contract templates; whether ongoing monitoring is performed; and whether the board is kept informed about significant third-party risks.

Keep in mind that management cannot “wash its hands” of risks merely by transferring responsibility outside the company. So, if you haven’t assessed this area recently, it’s probably well worth your time now.

4. Cloud Computing. I mentioned the growing dangers of cybersecurity and third-party risks, but cloud computing deserves special attention because it entails both of those risks – and more. In cloud computing, data is stored and processed via the Internet under the control of a third party. These outside providers face constant pressure to supply instant access to data and to build robust add-on capabilities. Unfortunately, providing new features, transparency, and instant accessibility can conflict with development of a security-rich cloud.

5. Mobile Technology. Of all the risks on this list, mobile technology may be evolving the fastest. And while the convenience afforded by going mobile is great, the risks can be surprisingly high. We tend to think of mobile devices simply as smartphones, but we carry around data in many other ways, on many types of devices, and each creates a set of challenges typically not found in traditional technology systems.

Smartphones and other handheld devices are susceptible to data theft because they rely on wireless networks. But that’s not all. Wireless headphones, microphones, and other devices that do not process or store information can bring risks, as well. Even a simple infrared device such as cordless computer keyboard or mouse can be exploited.​

I realize these are just a handful of risks based on new technology, how we do business and how we perform our work each day. There are likely many more not yet on my “risk radar.” So, in the interest of improving all of our risk assessments, let me know where else our attention should be focused. I look forward to your comments.

Share

Related posts

March 13, 2023

New IIA Report Is a Timely Benchmarking Resource for Internal Auditors


Read more
May 16, 2022

THE STAGGERING TOLL OF COVID RELIEF FRAUD: WHERE WERE THE THREE LINES?


Read more
February 3, 2022

To Live a Life in Color, You May Have to Change Channels


Read more

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

What’s Trending

03-20-23

New Report Reveals Surprising Insights from Internal Audit Executives


03-13-23

New IIA Report Is a Timely Benchmarking Resource for Internal Auditors


03-02-23

6 Things Audit Committee Members Often Won’t Say to Internal Audit


Read More

Archive

  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009

Contact Us

PO Box 1441
New Smyrna Beach, FL 32170

+1-407-463-9389
rchambers@richardchambers.com

About AuditBeacon.com

AuditBeacon.com is a resource center for internal auditors and risk professionals from around the world. In addition to more than 500 blogs authored by Richard Chambers, the site includes links to news and insights on internal audit and other information that illuminates the value of this important profession. AuditBeacon.com is provided as a service by Richard F. Chambers and Associates, LLC.

Copyright © 2023 Richard F. Chambers & Associates. All Rights Reserved.
  • Home
  • Blog
  • Audit Trail Academy
  • Advisory Services
  • Books