How to review vendors' cybersecurity risk
Vendors that work with an organization can create significant cybersecurity risk, so doing extensive due diligence regularly is important. Among other things, review vendors' security measures, financial health and incident-response plans. In addition, remember that vendors might be working with vendors of their own. CPA Insider
(9/7)
Other News
|
4 virtual reality products designed for business use
Virtual reality is making inroads in applications as diverse as designing health care facilities and providing clients a virtual tour of what a conceptual building -- or real one -- looks like. This article looks at four VR products designed for business use, including the Oculus Rift headset and a low-cost option from Google. CIO.com
(9/16)
Determining the ROI of Big Data
Big Data projects are becoming increasingly important, but predicting the return on investment is tough. In addition, some business units are bypassing the IT department, creating security and compliance issues. Chief information officers need to work with business units on Big Data projects and persuade them to start small. InformationWeek
(9/8)
Other News
|
Why CFOs need to focus on data privacy, security
Understanding the nuances of data privacy and data security is essential for financial executives as security issues increasingly become a key part of the due diligence process. This article looks at six best practices for CFOs to take a leading role in cybersecurity. CFO.com
(9/21)
Other News
|
How much information should execs share about cybersecurity?
Chief information security officers walk a fine line between providing too much information, which can tempt hackers, and providing too little, which can cause outcry among investors and the public. CISOs should make it clear that security is an evolving process without providing explicit details that invite breaches. Dark Reading
(9/21)
Other News
|
NLRB ruling could raise risk of IT outsourcing
A recent ruling by the National Labor Relations Board means companies can sometimes be held jointly liable for labor-law violations committed by service providers or staffing agencies they use. A joint-employer relationship can be established if a company exerts "indirect control over working conditions or if it reserves the authority to do so," the NLRB says. CIO.com
(9/21)
Other News
|
IMTA Community News & Events |
The IMTA Standing Ovation Recognition Program
The American Institute of CPAs established the IMTA Standing Ovation Recognition Program to recognize young CPAs in information management and technology assurance who are age 40 or younger and exhibit exemplary professional achievement. Recipients will be recognized with a press release, on the IMTA Section website, within the Practitioners Symposium and Tech+ Conference brochure and during the conference.
Learn how to manage privacy risk
Utilizing third-party services is often high-risk, since they may lead to data breaches, business disruptions or lost availability, system integrity and/or data corruption. The "Building Assurance: How to Manage Privacy Risk In-House and Downstream" webcast, scheduled for Oct. 13, will assist attendees in identifying common, third-party privacy risks and will offer attendees an effective approach to mitigate those risks. Presenters will provide an overview of SOC 2® reports and Generally Accepted Privacy Principles (GAPP).
Looking to upgrade or procure an ERP solution?
Join IMTA Executive Committee Member Robert Green CPA, CITP, CGMA, and Donny Shimamoto, CPA, CITP, CGMA, on Oct. 22 for an exclusive hour on proven strategies for ensuring successful ERP software evaluations. Presenters in the "Proven Strategies for Successful ERP Software Evaluations" webcast will offer participants actionable processes to undertake and points to consider during an ERP upgrade or replacement.
|
|
No legacy is so rich as honesty."
-- William Shakespeare, playwright and poet
|
|
|
| | |
|
Keep up to date with our e-briefs.
| |
| | |
| | |
|
| |
| | |
|
| |
| | |
|
The
Information Management and Technology Assurance Section
provides CPAs with a vast array of resources, tools and information about IT risk and IT assurance,
emerging IT trends, data analytics, business solutions and security and privacy in one convenient location.
The IMTA Section also provides special member benefits to IMTA Section members and CITP credential
holders including access to the annual Top Technology Initiatives Survey results and analysis and
free access to Safari Books Online.
About the CITP credential:
The AICPA offers the
Certified Information Technology Professional
credential exclusively to CPAs with the unique ability to bridge business and technology while meeting
the strict requirements for a CPA license, as well as additional training and experience in emerging IT
trends, IT risk and IT assurance, business solutions, data analytics and security and privacy. One of
the requirements to obtain the CITP credential is that a candidate pass the comprehensive examination.
The AICPA prepares the CITP examination for assessing candidates' understanding of the AICPA's CITP body
of knowledge as noted in its content specification outline. Build your credibility and distinguish yourself
from other professionals in the marketplace. Become a CITP and a trusted business adviser.
|
AICPA IMTA Section Resources |
|
|
|
|
Please contact one of our specialists for advertising opportunities,
editorial inquiries, job placements, or any other questions.
Mailing Address: SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
|
|
|