ITM 5600 WEEK 6 ARTICLE SRIRAM

docx

School

University of the Fraser Valley *

*We aren’t endorsed by this school

Course

6352

Subject

Accounting

Date

Nov 24, 2024

Type

docx

Pages

2

Uploaded by jacklinecheruto

Report
ITM 5600 – Current Event Article Template Paste URL to article: https://www.sciencedirect.com/science/article/pii/S1467089521000506 Title of Article: Effectiveness of cybersecurity audit Author: Sergeja Slapničar, Tina Vuko, Marko Čular, Matej Drašček Date of Publication: March 2022 Brief summary of article: (no more than 150 words) This study develops a Cybersecurity Audit Index, which has three aspects: planning, performing, and reporting, to investigate the efficacy of internal cybersecurity audits. The goal of the study is to comprehend how the efficiency of cybersecurity audits relates to the sophistication of cyber risk management and the chance of a successful cyberattack. The study includes polling auditors and Chief Audit Executives from different nations and business sectors. The results show that the average score for the Cybersecurity Audit Index, which ranges from 0 to 100, varies considerably. Notably, reporting on the success of cyber risk management to the Company's Board of Directors has a smaller correlation than the preparation and execution phases of audits, which are substantially associated. The research supports a favorable relationship that exists between the Cybersecurity Audit Index and the level of cyber risk management maturity. Original commentary about article (50-250 words): This article explores the crucial topic of cybersecurity audits and examines how well they work to manage online dangers. The quality of internal cybersecurity audits is evaluated by the authors using a Cybersecurity Audit Index, a multidimensional tool including the preparation, execution, and reporting dimensions. Their research is motivated by the urgent requirement to comprehend how these audits affect an organization's capacity to effectively handle cyber risks. The substantial variation in the Cybersecurity Audit Index ratings among firms, which suggests that not all internal audit methods are equally effective in tackling cybersecurity concerns, is one of the study's most notable findings. The significance of using a well-thought-out strategy while conducting cybersecurity audits is shown by the strong relationship between the preparing and executing phases of audits. It is encouraging that audit effectiveness and the level of maturity in cyber risk management are positively correlated in the study. It emphasizes how essential internal audit services are to strengthening a company's overall risk management stance. Suggested list of publications to use as sources: You may deviate from this list, but you need to make sure you are referencing a quality reputable source. Reuters CSO Forbes Al Jazeera New York Times Washington Post Bleeping Computer The Wall Street Journal ZD Net
The Register Ars Technica The Guardian The Hacker News The Economist ISACA Journal Security Magazine Harvard Business Review Wired The Record TechCrunch CNN CNET Security Week Info Security Magazine BBC Associated Press Bloomberg Krebs on Security Vice LA Times Axios The Verge Cyber Scoop National Public Radio Politico Arxiv.org Information Security Professional Possible topics to discuss in original commentary: Who is the author and why are they credible on this topic? Or why are they not credible on this topic? How old is the article and why is it still considered relevant? What is the relationship of this content to the class material? Why was this article chosen? Can this subject be related to your personal experience somehow? Is there something that surprises you or is doubtful about what was said in the article?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help