SlideShare a Scribd company logo
1 of 17
The Impact of Technology on the
Profession
ICAC/IFAC PAO MEETING
JUNE 22, 2017
Presented by Shawn M. Mahler, CA, CISA
Technology continues to impact the accounting profession in new and
challenging ways.
In my view, the profession can only be future ready if it embraces
technological advancement and the changes it brings to the global
marketplace while also adapting to the associated risks and threats with
continued advancement.
The number 1 threat in our current and future business reality is
Cybersecurity.
In 2016, the Chief Knowledge Officer of the Information System Audit and
Control Association, Dr. Ron Hale stated that cyberattacks are inevitable to
every organization. The data shows us that the answer is a bit unclear.
Cyberattacks are still pervasive. We are still experiencing many of the
same attack types that have plagued organizations for years.
2016 was a remarkable year for info security. There were
allegations of US election hacking, IT botnets, SWIFT banking
heists, Yahoo breach disclosures to the tune of 1.5 billion
passwords, and rampant ransomware incidents. With every story
playing out in the media
Cybersecurity incidents continue to rise. According to PwC’s Global
State of Information Security Survey 2015, attacks rose
internationally by 48 per cent in 2016 resulting in huge remedial and
reputational costs to the companies and governments concerned.
Despite clearing annual global statistic on the matter, the Caribbean
remains woefully unprepared, with governments and parts of the
private sector declining to take the matter seriously until subject to
an attack.
However, we only has to consider the enormous sums of money
transferred regularly through the region’s offshore financial centers,
the commercially sensitive documents held in registries and
lawyers’ offices, matters of national security and criminality that all
governments regularly engage with, the expansion of citizenship
programs, and the millions of daily commercial banking
transactions, to immediately see the dangers cybercrime poses to
small nations.
The past has proven the Caribbean is not immune to attacks.
While few Caribbean cases of DDoS or cybercrime ever become
public, because of the perceived reputational damage such as:
 theft from banks;
 the hacking of government websites in the Bahamas and St
Vincent by a group claiming to be supporters of ISIS;
 ransomware attacks on some Caribbean tax authorities
 the publication online of 1.3 million files from the Bahamas’
corporate registry.
These revealed not just the lack of appropriate security within
government portals, but the existence of outmoded IT systems and
software with the potential, some experts suggest, to have
compromised government’s internal communications.
They also highlighted the region’s vulnerability, and the absence of
local expertise or financial resources to address weaknesses,
leaving others to be invited in to provide the necessary technical
support and to remedy problems.
According to a joint study by the Center for Strategic Studies and
McAfee published earlier this year, Latin America and the
Caribbean (LAC) has become a new frontier for cyber-attacks and
crime at an estimated cost of around US$90 billion per year.
In trying to address what is a growing global threat, some
governments and companies are being proactive. Following the St
Vincent attack, for example, the St Lucia government has said it is
strengthening its cyber security and is encouraging collaboration at
a national, regional and international level.
The Bahamas has said that it recognizes the need for professional
monitoring, and Jamaica is utilizing international technical
assistance, is developing a national cyber security strategy, has
established a cyber incident response team, and has drafted
relevant laws.
Despite 2014 and 2015 reports on the subject produced by the
Organization of American States (OAS) the region has a very long
way to go, or that for the majority, the pace of the response is slow.
The OAS’s April 2015 ‘Report on Cyber security and critical
infrastructure in the Americas’ makes clear that the threat is moving
on and attacks on critical infrastructure increasingly represent a
serious new vulnerability for the region.
By this what is meant is that government’s databases and email
communications, national commercial banking and financial
systems, the control of the energy supply and other utilities, and
communications at a national and dedicated level, are now subject
to attack from cybercriminals seeking financial gain or by those
undertaking hostile political acts.
As governments encourage the growth of digitized knowledge-
based, services-oriented economies in which government and
connectivity are used to drive productivity and growth, the
suggestion is that despite hard pressed budgets, national cyber
security is now seen as a core cost for governments and just as
important as physical security. In response the OAS and IDB
reports on the state of cyber security in the region, CARICOM has
directed more spending on more proactive efforts such as
improving legislation and organizing national and regional response
team to cybersecurity.
Recent developments also demonstrate that there has to be closer
public sector-private sector co-operation of a kind not usual in much
of the Caribbean, to develop systems and secure forms of
information exchange as cyber security touches both the viability of
nations and individual enterprises.
The global survey on the state of cybersecurity indicates that both
public sector and private sector lack the expertise in properly
scoping cyber security in it risk management strategy.
The global survey also indicates that over 50% of cybercrimes are
motivated by financial gain. Another 37% of incidents are motivated
toward identity theft.
These glaring statistic exhibit the reason the accountancy
profession needs to adapt to the impact cybersecurity has on data
integrity.
The Global community of Cybersecurity experts all agree that the
impact on data integrity will increase.
Future prediction by one expert stated that “Trust in Systems will be
broken as bad guys move from exfiltration data to changing it.
Therefore, it is imperative that our industry moves a strategy to
counter the impacts of cybersecurity has on financial data.
Key strategies that PAO must adopt include:
1. Determine the skill set gaps of accounting professionals on cyber security risk
assessment and risk management and implement strategy.
2. Get involved as a key stakeholders in national cybersecurity forums
3. Get involved in legislative changes over cybersecurity
4. Develop and disseminate more audit guidance in the assessment of internal
control over financial systems in light of evolving cybersecurity threats.
5. Develop CPD events on cybersecurity on an annual basis

More Related Content

What's hot

What is FinTech- Technology in Finance
What is FinTech- Technology in Finance  What is FinTech- Technology in Finance
What is FinTech- Technology in Finance Mobcoder
 
#FinTech Regulation Overview co-presented
#FinTech Regulation Overview co-presented #FinTech Regulation Overview co-presented
#FinTech Regulation Overview co-presented CFTE
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 
Oppurtunities for Fintech in India
Oppurtunities for Fintech in IndiaOppurtunities for Fintech in India
Oppurtunities for Fintech in IndiaFintech Nxt
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud programchris75308
 
2021: The second wave of Fintech Disruption: Trends to watch out
2021: The second wave of Fintech Disruption: Trends to watch out2021: The second wave of Fintech Disruption: Trends to watch out
2021: The second wave of Fintech Disruption: Trends to watch outIndusNetMarketing
 
Block chain technology and its applications
Block chain technology and its applications Block chain technology and its applications
Block chain technology and its applications ABHISHEK JAIN
 
Differences between NEFT, RTGS & IMPS
Differences between NEFT, RTGS & IMPSDifferences between NEFT, RTGS & IMPS
Differences between NEFT, RTGS & IMPSAkash Behl
 
Fintech and Transformation of the Financial Services Industry
Fintech and Transformation of the Financial Services IndustryFintech and Transformation of the Financial Services Industry
Fintech and Transformation of the Financial Services IndustryRobin Teigland
 
Banking as a Service (download)
Banking as a Service (download)Banking as a Service (download)
Banking as a Service (download)Chris Skinner
 
Compliance framework
Compliance frameworkCompliance framework
Compliance frameworkManoj Agarwal
 
Digital banking
Digital banking Digital banking
Digital banking VIPIN KP
 
Mis fintech PRESENTATION for mba (revolution of online payment )
Mis fintech PRESENTATION for mba (revolution of online payment )Mis fintech PRESENTATION for mba (revolution of online payment )
Mis fintech PRESENTATION for mba (revolution of online payment )Pratiksha Tiwari
 
Payment Reconciliation
Payment ReconciliationPayment Reconciliation
Payment ReconciliationOliviaSmith160
 

What's hot (20)

Role of IT in Business
Role of IT in BusinessRole of IT in Business
Role of IT in Business
 
What is FinTech- Technology in Finance
What is FinTech- Technology in Finance  What is FinTech- Technology in Finance
What is FinTech- Technology in Finance
 
Types of E-Commerce
Types of E-CommerceTypes of E-Commerce
Types of E-Commerce
 
E-money
E-moneyE-money
E-money
 
#FinTech Regulation Overview co-presented
#FinTech Regulation Overview co-presented #FinTech Regulation Overview co-presented
#FinTech Regulation Overview co-presented
 
Corruption
CorruptionCorruption
Corruption
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Oppurtunities for Fintech in India
Oppurtunities for Fintech in IndiaOppurtunities for Fintech in India
Oppurtunities for Fintech in India
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud program
 
The Fintechs
The FintechsThe Fintechs
The Fintechs
 
2021: The second wave of Fintech Disruption: Trends to watch out
2021: The second wave of Fintech Disruption: Trends to watch out2021: The second wave of Fintech Disruption: Trends to watch out
2021: The second wave of Fintech Disruption: Trends to watch out
 
Block chain technology and its applications
Block chain technology and its applications Block chain technology and its applications
Block chain technology and its applications
 
Differences between NEFT, RTGS & IMPS
Differences between NEFT, RTGS & IMPSDifferences between NEFT, RTGS & IMPS
Differences between NEFT, RTGS & IMPS
 
Fintech and Transformation of the Financial Services Industry
Fintech and Transformation of the Financial Services IndustryFintech and Transformation of the Financial Services Industry
Fintech and Transformation of the Financial Services Industry
 
E-banking
E-banking E-banking
E-banking
 
Banking as a Service (download)
Banking as a Service (download)Banking as a Service (download)
Banking as a Service (download)
 
Compliance framework
Compliance frameworkCompliance framework
Compliance framework
 
Digital banking
Digital banking Digital banking
Digital banking
 
Mis fintech PRESENTATION for mba (revolution of online payment )
Mis fintech PRESENTATION for mba (revolution of online payment )Mis fintech PRESENTATION for mba (revolution of online payment )
Mis fintech PRESENTATION for mba (revolution of online payment )
 
Payment Reconciliation
Payment ReconciliationPayment Reconciliation
Payment Reconciliation
 

Similar to The Impact of Technology on the Profession

Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docxhallettfaustina
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Graeme Cross
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfTirthShah760404
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 

Similar to The Impact of Technology on the Profession (20)

Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 

More from International Federation of Accountants

Otros pronunciamientos: Información financiera según la base contable de efec...
Otros pronunciamientos: Información financiera según la base contable de efec...Otros pronunciamientos: Información financiera según la base contable de efec...
Otros pronunciamientos: Información financiera según la base contable de efec...International Federation of Accountants
 
Presentación de los Estados Financieros Estados de situación financiera, rend...
Presentación de los Estados Financieros Estados de situación financiera, rend...Presentación de los Estados Financieros Estados de situación financiera, rend...
Presentación de los Estados Financieros Estados de situación financiera, rend...International Federation of Accountants
 

More from International Federation of Accountants (20)

Closing Remarks International Women's Day 2024
Closing Remarks International Women's Day 2024Closing Remarks International Women's Day 2024
Closing Remarks International Women's Day 2024
 
IFAC Principios revisados de Gobierno Corporativo del G20 y de la OCDE
IFAC Principios revisados de Gobierno Corporativo del G20 y de la OCDEIFAC Principios revisados de Gobierno Corporativo del G20 y de la OCDE
IFAC Principios revisados de Gobierno Corporativo del G20 y de la OCDE
 
IFAC Presentación IGEP sobre OCDE-G20, Febrero 2024
IFAC Presentación IGEP sobre OCDE-G20, Febrero 2024IFAC Presentación IGEP sobre OCDE-G20, Febrero 2024
IFAC Presentación IGEP sobre OCDE-G20, Febrero 2024
 
Preparing for High Quality Sustainability assurance Engagements
Preparing for High Quality Sustainability assurance EngagementsPreparing for High Quality Sustainability assurance Engagements
Preparing for High Quality Sustainability assurance Engagements
 
Otros pronunciamientos: Información financiera según la base contable de efec...
Otros pronunciamientos: Información financiera según la base contable de efec...Otros pronunciamientos: Información financiera según la base contable de efec...
Otros pronunciamientos: Información financiera según la base contable de efec...
 
Otros pronunciamientos: Guías de Prácticas Recomendadas
Otros pronunciamientos: Guías de Prácticas RecomendadasOtros pronunciamientos: Guías de Prácticas Recomendadas
Otros pronunciamientos: Guías de Prácticas Recomendadas
 
Otros pronunciamientos: Marco conceptual
Otros pronunciamientos: Marco conceptualOtros pronunciamientos: Marco conceptual
Otros pronunciamientos: Marco conceptual
 
Adopción por primera vez de las NICSP de base de devengo
Adopción por primera vez de las NICSP de base de devengoAdopción por primera vez de las NICSP de base de devengo
Adopción por primera vez de las NICSP de base de devengo
 
Moneda Extranjera
Moneda ExtranjeraMoneda Extranjera
Moneda Extranjera
 
Presentación de la información presupuestaria
Presentación de la información presupuestariaPresentación de la información presupuestaria
Presentación de la información presupuestaria
 
Revelaciones de partes relacionadas
Revelaciones de partes relacionadasRevelaciones de partes relacionadas
Revelaciones de partes relacionadas
 
Estado de Flujos de Efectivo
Estado de Flujos de EfectivoEstado de Flujos de Efectivo
Estado de Flujos de Efectivo
 
Presentación de los Estados Financieros Estados de situación financiera, rend...
Presentación de los Estados Financieros Estados de situación financiera, rend...Presentación de los Estados Financieros Estados de situación financiera, rend...
Presentación de los Estados Financieros Estados de situación financiera, rend...
 
Combinaciones del sector público
Combinaciones del sector públicoCombinaciones del sector público
Combinaciones del sector público
 
Consolidación
ConsolidaciónConsolidación
Consolidación
 
Instrumentos financieros – Revelaciones
Instrumentos financieros – RevelacionesInstrumentos financieros – Revelaciones
Instrumentos financieros – Revelaciones
 
Instrumentos financieros – Cobertura y derivados
Instrumentos financieros – Cobertura y derivadosInstrumentos financieros – Cobertura y derivados
Instrumentos financieros – Cobertura y derivados
 
Instrumentos financieros – Conceptos básicos
Instrumentos financieros –  Conceptos básicos Instrumentos financieros –  Conceptos básicos
Instrumentos financieros – Conceptos básicos
 
Instrumentos financieros – Revelaciones
Instrumentos financieros –  Revelaciones Instrumentos financieros –  Revelaciones
Instrumentos financieros – Revelaciones
 
Instrumentos financieros – Coberturas y derivados
Instrumentos financieros – Coberturas y derivadosInstrumentos financieros – Coberturas y derivados
Instrumentos financieros – Coberturas y derivados
 

Recently uploaded

KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGpriyakumari801827
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...pujan9679
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...pr788182
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 

Recently uploaded (20)

KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 

The Impact of Technology on the Profession

  • 1. The Impact of Technology on the Profession ICAC/IFAC PAO MEETING JUNE 22, 2017 Presented by Shawn M. Mahler, CA, CISA
  • 2. Technology continues to impact the accounting profession in new and challenging ways. In my view, the profession can only be future ready if it embraces technological advancement and the changes it brings to the global marketplace while also adapting to the associated risks and threats with continued advancement. The number 1 threat in our current and future business reality is Cybersecurity. In 2016, the Chief Knowledge Officer of the Information System Audit and Control Association, Dr. Ron Hale stated that cyberattacks are inevitable to every organization. The data shows us that the answer is a bit unclear. Cyberattacks are still pervasive. We are still experiencing many of the same attack types that have plagued organizations for years.
  • 3. 2016 was a remarkable year for info security. There were allegations of US election hacking, IT botnets, SWIFT banking heists, Yahoo breach disclosures to the tune of 1.5 billion passwords, and rampant ransomware incidents. With every story playing out in the media
  • 4. Cybersecurity incidents continue to rise. According to PwC’s Global State of Information Security Survey 2015, attacks rose internationally by 48 per cent in 2016 resulting in huge remedial and reputational costs to the companies and governments concerned.
  • 5. Despite clearing annual global statistic on the matter, the Caribbean remains woefully unprepared, with governments and parts of the private sector declining to take the matter seriously until subject to an attack. However, we only has to consider the enormous sums of money transferred regularly through the region’s offshore financial centers, the commercially sensitive documents held in registries and lawyers’ offices, matters of national security and criminality that all governments regularly engage with, the expansion of citizenship programs, and the millions of daily commercial banking transactions, to immediately see the dangers cybercrime poses to small nations.
  • 6. The past has proven the Caribbean is not immune to attacks. While few Caribbean cases of DDoS or cybercrime ever become public, because of the perceived reputational damage such as:  theft from banks;  the hacking of government websites in the Bahamas and St Vincent by a group claiming to be supporters of ISIS;  ransomware attacks on some Caribbean tax authorities  the publication online of 1.3 million files from the Bahamas’ corporate registry.
  • 7. These revealed not just the lack of appropriate security within government portals, but the existence of outmoded IT systems and software with the potential, some experts suggest, to have compromised government’s internal communications. They also highlighted the region’s vulnerability, and the absence of local expertise or financial resources to address weaknesses, leaving others to be invited in to provide the necessary technical support and to remedy problems.
  • 8. According to a joint study by the Center for Strategic Studies and McAfee published earlier this year, Latin America and the Caribbean (LAC) has become a new frontier for cyber-attacks and crime at an estimated cost of around US$90 billion per year.
  • 9. In trying to address what is a growing global threat, some governments and companies are being proactive. Following the St Vincent attack, for example, the St Lucia government has said it is strengthening its cyber security and is encouraging collaboration at a national, regional and international level. The Bahamas has said that it recognizes the need for professional monitoring, and Jamaica is utilizing international technical assistance, is developing a national cyber security strategy, has established a cyber incident response team, and has drafted relevant laws.
  • 10. Despite 2014 and 2015 reports on the subject produced by the Organization of American States (OAS) the region has a very long way to go, or that for the majority, the pace of the response is slow. The OAS’s April 2015 ‘Report on Cyber security and critical infrastructure in the Americas’ makes clear that the threat is moving on and attacks on critical infrastructure increasingly represent a serious new vulnerability for the region.
  • 11. By this what is meant is that government’s databases and email communications, national commercial banking and financial systems, the control of the energy supply and other utilities, and communications at a national and dedicated level, are now subject to attack from cybercriminals seeking financial gain or by those undertaking hostile political acts.
  • 12. As governments encourage the growth of digitized knowledge- based, services-oriented economies in which government and connectivity are used to drive productivity and growth, the suggestion is that despite hard pressed budgets, national cyber security is now seen as a core cost for governments and just as important as physical security. In response the OAS and IDB reports on the state of cyber security in the region, CARICOM has directed more spending on more proactive efforts such as improving legislation and organizing national and regional response team to cybersecurity.
  • 13. Recent developments also demonstrate that there has to be closer public sector-private sector co-operation of a kind not usual in much of the Caribbean, to develop systems and secure forms of information exchange as cyber security touches both the viability of nations and individual enterprises.
  • 14. The global survey on the state of cybersecurity indicates that both public sector and private sector lack the expertise in properly scoping cyber security in it risk management strategy. The global survey also indicates that over 50% of cybercrimes are motivated by financial gain. Another 37% of incidents are motivated toward identity theft. These glaring statistic exhibit the reason the accountancy profession needs to adapt to the impact cybersecurity has on data integrity.
  • 15. The Global community of Cybersecurity experts all agree that the impact on data integrity will increase. Future prediction by one expert stated that “Trust in Systems will be broken as bad guys move from exfiltration data to changing it.
  • 16. Therefore, it is imperative that our industry moves a strategy to counter the impacts of cybersecurity has on financial data.
  • 17. Key strategies that PAO must adopt include: 1. Determine the skill set gaps of accounting professionals on cyber security risk assessment and risk management and implement strategy. 2. Get involved as a key stakeholders in national cybersecurity forums 3. Get involved in legislative changes over cybersecurity 4. Develop and disseminate more audit guidance in the assessment of internal control over financial systems in light of evolving cybersecurity threats. 5. Develop CPD events on cybersecurity on an annual basis