SlideShare a Scribd company logo
1 of 2
Download to read offline
ADVISORY
MHM (Mayer Hoffman McCann P.C.) is an independent CPA firm that is a member of Kreston International Limited, a global network of independent accounting firms.
Learn more at www.mhmcpa.com
Our roots run deep
As the world, organizations and individuals become increasingly more information technology and internet
dependent and inter-connected with other organizations and individuals, cybersecurity poses one of the
largest threats in the current operating environment.
AICPA Introduces the SOC Report for Cybersecurity
Extending beyond the information technology sphere,
information security incidents and data breaches are a
daily occurrence in the news and can do major damage to
operations. The recent WannaCry ransomware incident hit
hospitals in Great Britain, telecom providers in Spain and
major companies in China, the United States and several
other countries. It locked users out of critical systems,
grinding business—and in the case of the hospitals, patient
care—to a halt.
In this environment, organizations are required to focus
more attention on evaluating their Cybersecurity protocol
as part of their approach to risk management. At the
same, organizations are being asked to respond to
inquiries about their cybersecurity risk management from
their boards and executive management, and external
stakeholders, such as analysts, investors, business
partners, customers and regulators. In order to address
the needs for evaluation and assurance reporting on
Cybersecurity Risk Management for internal and external
stakeholders, the AICPA recently issued a new System and
Organization Controls for Cybersecurity report. Certified
public accountants (CPAs) will use the report to evaluate
entities’ cybersecurity risk management programs, similar
to the process used to evaluate an organization’s control
environments in SOC 1 and SOC 2 reports.
The SOC for Cybersecurity Report
As part of the report, CPAs will look at two elements: the
description of an entity’s cybersecurity risk management
program and the effectiveness of controls within that
program to achieve cybersecurity objectives.
Management will be asked to provide a description of
their cybersecurity risk management and information
security programs, and control environments, including
the assets or data protected by the program and the
processes the organization undertakes to protect the
assets from cybersecurity risks. The AICPA has provided
description criteria to assist management in preparing
the description and providing a common disclosure
framework that is designed to meet the information
needs of a board range of internal and external
stakeholders.
An organization’s management will also be asked to
provide an assertion, either at a point in time or for
a specified period of time to determine whether the
description meets the AICPA’s criteria. Management will
also include an assertion on the suitability of design
and operating effectiveness of its internal controls in
meeting its cybersecurity objectives. As part of the
examination, the CPA will evaluate the suitability of
design and operating effectiveness of the organization’s
controls either against the AICPA’s Trust Service
criteria or at the organization’s request against other
commonly acceptable control criteria, such as the NIST
Critical Information Cybersecurity Framework and ISO
27001/27002.
An audit professional then opines on whether
management’s cybersecurity protocol description meets
the AICPA’s criteria and whether cybersecurity controls
effectively achieve the AICPA’s or other commonly
accepted control criteria.
ADVISORY
MHM (Mayer Hoffman McCann P.C.) is an independent CPA firm that is a member of Kreston International Limited, a global network of independent accounting firms.
Learn more at www.mhmcpa.com
Our roots run deep
©Copyright2017.MayerHoffmamMcCannP.C.Allrightsreserved.
How Companies Can Use a Cybersecurity Report
A CPA-prepared report can be used to address concerns
and inquiries from boards of directors and C-level
management that your organization is taking the necessary
precautions to protect sensitive data and systems.
The report can also be used to help address the concerns
and inquiries from external stakeholders, such as analysts,
investors, business partners, and customers. Analysts and
investors will want to see protections for risks that could
disrupt an organization’s value and stock price. Business
partners and customers may want to see insights into
how your organizations’ controls marry up with theirs, and
whether they will need additional controls in place around
interactions with you. If there is an exchange of data taking
place, a business partner and customers may also want
to understand what logical security access protections are
in place to protect the business partner’s and customer’s
information. Regulators will want to see that you have
implement suitable and effective cybersecurity controls
and risk management practices to address their regulatory
requirements and oversight compliance guidance.
For More Information
To learn more about how to enhance your cybersecurity
protocol and incorporate it into your internal controls,
please contact us.

More Related Content

What's hot

Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachEMC
 
Healthcare Tech Profile 11.2016
Healthcare Tech Profile 11.2016Healthcare Tech Profile 11.2016
Healthcare Tech Profile 11.2016Tim Feldman
 
Risk Presentation
Risk Presentation Risk Presentation
Risk Presentation lneut03
 
CFPB-Compliance360_Datasheet
CFPB-Compliance360_DatasheetCFPB-Compliance360_Datasheet
CFPB-Compliance360_DatasheetGeoff Griffith
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Fameworklneut03
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Sharing Slides Training
 
HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?Redspin, Inc.
 
Document Management System Market Size, Trends & Analysis – Forecasts To 2025
Document Management System Market Size, Trends & Analysis – Forecasts To 2025Document Management System Market Size, Trends & Analysis – Forecasts To 2025
Document Management System Market Size, Trends & Analysis – Forecasts To 2025Yash Jain
 
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT SecurityRedspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT SecurityRedspin, Inc.
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsDoubleHorn
 
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosuresEY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosuresJulien Boucher
 
IDA DTU RiskLab How to validate your risk data
IDA DTU RiskLab How to validate your risk dataIDA DTU RiskLab How to validate your risk data
IDA DTU RiskLab How to validate your risk dataHernan Huwyler, MBA CPA
 

What's hot (12)

Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
Healthcare Tech Profile 11.2016
Healthcare Tech Profile 11.2016Healthcare Tech Profile 11.2016
Healthcare Tech Profile 11.2016
 
Risk Presentation
Risk Presentation Risk Presentation
Risk Presentation
 
CFPB-Compliance360_Datasheet
CFPB-Compliance360_DatasheetCFPB-Compliance360_Datasheet
CFPB-Compliance360_Datasheet
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?
 
Document Management System Market Size, Trends & Analysis – Forecasts To 2025
Document Management System Market Size, Trends & Analysis – Forecasts To 2025Document Management System Market Size, Trends & Analysis – Forecasts To 2025
Document Management System Market Size, Trends & Analysis – Forecasts To 2025
 
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT SecurityRedspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosuresEY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
 
IDA DTU RiskLab How to validate your risk data
IDA DTU RiskLab How to validate your risk dataIDA DTU RiskLab How to validate your risk data
IDA DTU RiskLab How to validate your risk data
 

Similar to AICPA Introduces the SOC Report for Cybersecurity

Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Mohammed J. Khan
 
CTPAT Highway Carriers MSC March 2020.pdf
CTPAT Highway Carriers MSC March 2020.pdfCTPAT Highway Carriers MSC March 2020.pdf
CTPAT Highway Carriers MSC March 2020.pdfAntonioCharnichartMa1
 
Cyber ANPR Regulatory Alert - October 2016
Cyber ANPR Regulatory Alert - October 2016Cyber ANPR Regulatory Alert - October 2016
Cyber ANPR Regulatory Alert - October 2016Ben-Ari Boukai
 
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)Richard Brooks
 
Captive Insurance Company eBook
Captive Insurance Company eBookCaptive Insurance Company eBook
Captive Insurance Company eBookGlenn Peake
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company Abdulrahman Alamri
 
Top Internal Audit Priorities for Financial Services Organizations, 2016
Top Internal Audit Priorities for Financial Services Organizations, 2016Top Internal Audit Priorities for Financial Services Organizations, 2016
Top Internal Audit Priorities for Financial Services Organizations, 2016jennyhollingworth
 
365 infographic-compliance
365 infographic-compliance365 infographic-compliance
365 infographic-compliance365 Data Centers
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016CBIZ, Inc.
 
McMahon & Associates Risk Management Strategy
McMahon & Associates Risk Management StrategyMcMahon & Associates Risk Management Strategy
McMahon & Associates Risk Management StrategyMatthew J McMahon
 
CIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdfCIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdfLBagger1
 
Quick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentQuick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentMayank Johri
 
IIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseIIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseKaspersky
 
COURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docxCOURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docxmarilucorr
 

Similar to AICPA Introduces the SOC Report for Cybersecurity (20)

Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
 
Your Third-Party Vendor's Risk Is Your Risk, Too
Your Third-Party Vendor's Risk Is Your Risk, Too Your Third-Party Vendor's Risk Is Your Risk, Too
Your Third-Party Vendor's Risk Is Your Risk, Too
 
Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
 
CTPAT Highway Carriers MSC March 2020.pdf
CTPAT Highway Carriers MSC March 2020.pdfCTPAT Highway Carriers MSC March 2020.pdf
CTPAT Highway Carriers MSC March 2020.pdf
 
Cyber ANPR Regulatory Alert - October 2016
Cyber ANPR Regulatory Alert - October 2016Cyber ANPR Regulatory Alert - October 2016
Cyber ANPR Regulatory Alert - October 2016
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)
 
Captive Insurance Company eBook
Captive Insurance Company eBookCaptive Insurance Company eBook
Captive Insurance Company eBook
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company
 
Top Internal Audit Priorities for Financial Services Organizations, 2016
Top Internal Audit Priorities for Financial Services Organizations, 2016Top Internal Audit Priorities for Financial Services Organizations, 2016
Top Internal Audit Priorities for Financial Services Organizations, 2016
 
Risk_Technology
Risk_TechnologyRisk_Technology
Risk_Technology
 
365 infographic-compliance
365 infographic-compliance365 infographic-compliance
365 infographic-compliance
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
McMahon & Associates Risk Management Strategy
McMahon & Associates Risk Management StrategyMcMahon & Associates Risk Management Strategy
McMahon & Associates Risk Management Strategy
 
CIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdfCIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdf
 
Quick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentQuick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk Assessment
 
IIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseIIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended Use
 
COURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docxCOURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docx
 

More from MHM (Mayer Hoffman McCann P.C.)

Webinar Slides: Changes to Lessor Accounting under the New Leasing Standard
Webinar Slides: Changes to Lessor Accounting under the New Leasing StandardWebinar Slides: Changes to Lessor Accounting under the New Leasing Standard
Webinar Slides: Changes to Lessor Accounting under the New Leasing StandardMHM (Mayer Hoffman McCann P.C.)
 
CBIZ & MHM Executive Education Series Webinar Overview - Q4 2018
CBIZ & MHM Executive Education Series Webinar Overview - Q4 2018CBIZ & MHM Executive Education Series Webinar Overview - Q4 2018
CBIZ & MHM Executive Education Series Webinar Overview - Q4 2018MHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: Third Quarter Accounting and Financial Reporting Issues Update
Webinar Slides: Third Quarter Accounting and Financial Reporting Issues UpdateWebinar Slides: Third Quarter Accounting and Financial Reporting Issues Update
Webinar Slides: Third Quarter Accounting and Financial Reporting Issues UpdateMHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: Your Guide to Adopting the New Revenue Recognition Standard
Webinar Slides: Your Guide to Adopting the New Revenue Recognition StandardWebinar Slides: Your Guide to Adopting the New Revenue Recognition Standard
Webinar Slides: Your Guide to Adopting the New Revenue Recognition StandardMHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: How Not-for-Profit Organizations Can Prepare for Revenue Reco...
Webinar Slides: How Not-for-Profit Organizations Can Prepare for Revenue Reco...Webinar Slides: How Not-for-Profit Organizations Can Prepare for Revenue Reco...
Webinar Slides: How Not-for-Profit Organizations Can Prepare for Revenue Reco...MHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: Now Arriving - Qualified Business Income Deduction Regulation...
Webinar Slides: Now Arriving - Qualified Business Income Deduction Regulation...Webinar Slides: Now Arriving - Qualified Business Income Deduction Regulation...
Webinar Slides: Now Arriving - Qualified Business Income Deduction Regulation...MHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: Eye on Washington - Quarterly Business Tax Update, Q2 2018
Webinar Slides: Eye on Washington - Quarterly Business Tax Update, Q2 2018Webinar Slides: Eye on Washington - Quarterly Business Tax Update, Q2 2018
Webinar Slides: Eye on Washington - Quarterly Business Tax Update, Q2 2018MHM (Mayer Hoffman McCann P.C.)
 
Public Companies Catch a Break with Leasing Standard Update
Public Companies Catch a Break with Leasing Standard UpdatePublic Companies Catch a Break with Leasing Standard Update
Public Companies Catch a Break with Leasing Standard UpdateMHM (Mayer Hoffman McCann P.C.)
 
How to Prepare Debt Covenants for Recent Changes to the Accounting for Debt I...
How to Prepare Debt Covenants for Recent Changes to the Accounting for Debt I...How to Prepare Debt Covenants for Recent Changes to the Accounting for Debt I...
How to Prepare Debt Covenants for Recent Changes to the Accounting for Debt I...MHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: Second Quarter Accounting and Financial Reporting Issues Update
Webinar Slides: Second Quarter Accounting and Financial Reporting Issues UpdateWebinar Slides: Second Quarter Accounting and Financial Reporting Issues Update
Webinar Slides: Second Quarter Accounting and Financial Reporting Issues UpdateMHM (Mayer Hoffman McCann P.C.)
 
Guidance Issued Regarding Contributions Made and Received for Not-for-Profit ...
Guidance Issued Regarding Contributions Made and Received for Not-for-Profit ...Guidance Issued Regarding Contributions Made and Received for Not-for-Profit ...
Guidance Issued Regarding Contributions Made and Received for Not-for-Profit ...MHM (Mayer Hoffman McCann P.C.)
 
FASB Simplifies Accounting for Non-employee Stock-based Compensation
FASB Simplifies Accounting for Non-employee Stock-based CompensationFASB Simplifies Accounting for Non-employee Stock-based Compensation
FASB Simplifies Accounting for Non-employee Stock-based CompensationMHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: Key International Tax Considerations
Webinar Slides: Key International Tax ConsiderationsWebinar Slides: Key International Tax Considerations
Webinar Slides: Key International Tax ConsiderationsMHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: The Latest on the New Partnership Audit Rules
Webinar Slides: The Latest on the New Partnership Audit RulesWebinar Slides: The Latest on the New Partnership Audit Rules
Webinar Slides: The Latest on the New Partnership Audit RulesMHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: Source Your Sales - A Multi-State Primer for Apportionment in...
Webinar Slides: Source Your Sales - A Multi-State Primer for Apportionment in...Webinar Slides: Source Your Sales - A Multi-State Primer for Apportionment in...
Webinar Slides: Source Your Sales - A Multi-State Primer for Apportionment in...MHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: Eye on Washington - Quarterly Business Tax Update Q1 2018
Webinar Slides: Eye on Washington - Quarterly Business Tax Update Q1 2018Webinar Slides: Eye on Washington - Quarterly Business Tax Update Q1 2018
Webinar Slides: Eye on Washington - Quarterly Business Tax Update Q1 2018MHM (Mayer Hoffman McCann P.C.)
 
Webinar Slides: AICPA Conference on Current SEC and PCAOB Developments Debrief
Webinar Slides: AICPA Conference on Current SEC and PCAOB Developments DebriefWebinar Slides: AICPA Conference on Current SEC and PCAOB Developments Debrief
Webinar Slides: AICPA Conference on Current SEC and PCAOB Developments DebriefMHM (Mayer Hoffman McCann P.C.)
 

More from MHM (Mayer Hoffman McCann P.C.) (20)

Webinar Slides: Changes to Lessor Accounting under the New Leasing Standard
Webinar Slides: Changes to Lessor Accounting under the New Leasing StandardWebinar Slides: Changes to Lessor Accounting under the New Leasing Standard
Webinar Slides: Changes to Lessor Accounting under the New Leasing Standard
 
CBIZ & MHM Executive Education Series Webinar Overview - Q4 2018
CBIZ & MHM Executive Education Series Webinar Overview - Q4 2018CBIZ & MHM Executive Education Series Webinar Overview - Q4 2018
CBIZ & MHM Executive Education Series Webinar Overview - Q4 2018
 
Webinar Slides: Third Quarter Accounting and Financial Reporting Issues Update
Webinar Slides: Third Quarter Accounting and Financial Reporting Issues UpdateWebinar Slides: Third Quarter Accounting and Financial Reporting Issues Update
Webinar Slides: Third Quarter Accounting and Financial Reporting Issues Update
 
Webinar Slides: Your Guide to Adopting the New Revenue Recognition Standard
Webinar Slides: Your Guide to Adopting the New Revenue Recognition StandardWebinar Slides: Your Guide to Adopting the New Revenue Recognition Standard
Webinar Slides: Your Guide to Adopting the New Revenue Recognition Standard
 
Webinar Slides: How Not-for-Profit Organizations Can Prepare for Revenue Reco...
Webinar Slides: How Not-for-Profit Organizations Can Prepare for Revenue Reco...Webinar Slides: How Not-for-Profit Organizations Can Prepare for Revenue Reco...
Webinar Slides: How Not-for-Profit Organizations Can Prepare for Revenue Reco...
 
Webinar Slides: Adoption of New Leasing Standards
Webinar Slides: Adoption of New Leasing StandardsWebinar Slides: Adoption of New Leasing Standards
Webinar Slides: Adoption of New Leasing Standards
 
Webinar Slides: Now Arriving - Qualified Business Income Deduction Regulation...
Webinar Slides: Now Arriving - Qualified Business Income Deduction Regulation...Webinar Slides: Now Arriving - Qualified Business Income Deduction Regulation...
Webinar Slides: Now Arriving - Qualified Business Income Deduction Regulation...
 
Webinar Slides: Eye on Washington - Quarterly Business Tax Update, Q2 2018
Webinar Slides: Eye on Washington - Quarterly Business Tax Update, Q2 2018Webinar Slides: Eye on Washington - Quarterly Business Tax Update, Q2 2018
Webinar Slides: Eye on Washington - Quarterly Business Tax Update, Q2 2018
 
Public Companies Catch a Break with Leasing Standard Update
Public Companies Catch a Break with Leasing Standard UpdatePublic Companies Catch a Break with Leasing Standard Update
Public Companies Catch a Break with Leasing Standard Update
 
How to Prepare Debt Covenants for Recent Changes to the Accounting for Debt I...
How to Prepare Debt Covenants for Recent Changes to the Accounting for Debt I...How to Prepare Debt Covenants for Recent Changes to the Accounting for Debt I...
How to Prepare Debt Covenants for Recent Changes to the Accounting for Debt I...
 
Webinar Slides: Second Quarter Accounting and Financial Reporting Issues Update
Webinar Slides: Second Quarter Accounting and Financial Reporting Issues UpdateWebinar Slides: Second Quarter Accounting and Financial Reporting Issues Update
Webinar Slides: Second Quarter Accounting and Financial Reporting Issues Update
 
Guidance Issued Regarding Contributions Made and Received for Not-for-Profit ...
Guidance Issued Regarding Contributions Made and Received for Not-for-Profit ...Guidance Issued Regarding Contributions Made and Received for Not-for-Profit ...
Guidance Issued Regarding Contributions Made and Received for Not-for-Profit ...
 
FASB Simplifies Accounting for Non-employee Stock-based Compensation
FASB Simplifies Accounting for Non-employee Stock-based CompensationFASB Simplifies Accounting for Non-employee Stock-based Compensation
FASB Simplifies Accounting for Non-employee Stock-based Compensation
 
Changes Coming to Consolidation Guidance
Changes Coming to Consolidation GuidanceChanges Coming to Consolidation Guidance
Changes Coming to Consolidation Guidance
 
Webinar Slides: Key International Tax Considerations
Webinar Slides: Key International Tax ConsiderationsWebinar Slides: Key International Tax Considerations
Webinar Slides: Key International Tax Considerations
 
Webinar Slides: The Latest on the New Partnership Audit Rules
Webinar Slides: The Latest on the New Partnership Audit RulesWebinar Slides: The Latest on the New Partnership Audit Rules
Webinar Slides: The Latest on the New Partnership Audit Rules
 
Webinar Slides: Source Your Sales - A Multi-State Primer for Apportionment in...
Webinar Slides: Source Your Sales - A Multi-State Primer for Apportionment in...Webinar Slides: Source Your Sales - A Multi-State Primer for Apportionment in...
Webinar Slides: Source Your Sales - A Multi-State Primer for Apportionment in...
 
Webinar Slides: Eye on Washington - Quarterly Business Tax Update Q1 2018
Webinar Slides: Eye on Washington - Quarterly Business Tax Update Q1 2018Webinar Slides: Eye on Washington - Quarterly Business Tax Update Q1 2018
Webinar Slides: Eye on Washington - Quarterly Business Tax Update Q1 2018
 
Characteristics of an Effective Audit Committee
Characteristics of an Effective Audit CommitteeCharacteristics of an Effective Audit Committee
Characteristics of an Effective Audit Committee
 
Webinar Slides: AICPA Conference on Current SEC and PCAOB Developments Debrief
Webinar Slides: AICPA Conference on Current SEC and PCAOB Developments DebriefWebinar Slides: AICPA Conference on Current SEC and PCAOB Developments Debrief
Webinar Slides: AICPA Conference on Current SEC and PCAOB Developments Debrief
 

Recently uploaded

WhatsApp đź“ž Call : 9892124323 âś…Call Girls In Chembur ( Mumbai ) secure service
WhatsApp đź“ž Call : 9892124323  âś…Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp đź“ž Call : 9892124323  âś…Call Girls In Chembur ( Mumbai ) secure service
WhatsApp đź“ž Call : 9892124323 âś…Call Girls In Chembur ( Mumbai ) secure servicePooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceanilsa9823
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Call US đź“ž 9892124323 âś… Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US đź“ž 9892124323 âś… Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US đź“ž 9892124323 âś… Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US đź“ž 9892124323 âś… Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spiritegoetzinger
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Malad Call Girl in Services 9892124323 | â‚ą,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | â‚ą,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | â‚ą,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | â‚ą,4500 With Room Free DeliveryPooja Nehwal
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
Top Rated Pune Call Girls Viman Nagar âźź 6297143586 âźź Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar âźź 6297143586 âźź Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar âźź 6297143586 âźź Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar âźź 6297143586 âźź Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Pooja Nehwal
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 

Recently uploaded (20)

WhatsApp đź“ž Call : 9892124323 âś…Call Girls In Chembur ( Mumbai ) secure service
WhatsApp đź“ž Call : 9892124323  âś…Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp đź“ž Call : 9892124323  âś…Call Girls In Chembur ( Mumbai ) secure service
WhatsApp đź“ž Call : 9892124323 âś…Call Girls In Chembur ( Mumbai ) secure service
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
Call US đź“ž 9892124323 âś… Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US đź“ž 9892124323 âś… Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US đź“ž 9892124323 âś… Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US đź“ž 9892124323 âś… Kurla Call Girls In Kurla ( Mumbai ) secure service
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Malad Call Girl in Services 9892124323 | â‚ą,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | â‚ą,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | â‚ą,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | â‚ą,4500 With Room Free Delivery
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
Top Rated Pune Call Girls Viman Nagar âźź 6297143586 âźź Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar âźź 6297143586 âźź Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar âźź 6297143586 âźź Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar âźź 6297143586 âźź Call Me For Genuine Sex...
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 

AICPA Introduces the SOC Report for Cybersecurity

  • 1. ADVISORY MHM (Mayer Hoffman McCann P.C.) is an independent CPA firm that is a member of Kreston International Limited, a global network of independent accounting firms. Learn more at www.mhmcpa.com Our roots run deep As the world, organizations and individuals become increasingly more information technology and internet dependent and inter-connected with other organizations and individuals, cybersecurity poses one of the largest threats in the current operating environment. AICPA Introduces the SOC Report for Cybersecurity Extending beyond the information technology sphere, information security incidents and data breaches are a daily occurrence in the news and can do major damage to operations. The recent WannaCry ransomware incident hit hospitals in Great Britain, telecom providers in Spain and major companies in China, the United States and several other countries. It locked users out of critical systems, grinding business—and in the case of the hospitals, patient care—to a halt. In this environment, organizations are required to focus more attention on evaluating their Cybersecurity protocol as part of their approach to risk management. At the same, organizations are being asked to respond to inquiries about their cybersecurity risk management from their boards and executive management, and external stakeholders, such as analysts, investors, business partners, customers and regulators. In order to address the needs for evaluation and assurance reporting on Cybersecurity Risk Management for internal and external stakeholders, the AICPA recently issued a new System and Organization Controls for Cybersecurity report. Certified public accountants (CPAs) will use the report to evaluate entities’ cybersecurity risk management programs, similar to the process used to evaluate an organization’s control environments in SOC 1 and SOC 2 reports. The SOC for Cybersecurity Report As part of the report, CPAs will look at two elements: the description of an entity’s cybersecurity risk management program and the effectiveness of controls within that program to achieve cybersecurity objectives. Management will be asked to provide a description of their cybersecurity risk management and information security programs, and control environments, including the assets or data protected by the program and the processes the organization undertakes to protect the assets from cybersecurity risks. The AICPA has provided description criteria to assist management in preparing the description and providing a common disclosure framework that is designed to meet the information needs of a board range of internal and external stakeholders. An organization’s management will also be asked to provide an assertion, either at a point in time or for a specified period of time to determine whether the description meets the AICPA’s criteria. Management will also include an assertion on the suitability of design and operating effectiveness of its internal controls in meeting its cybersecurity objectives. As part of the examination, the CPA will evaluate the suitability of design and operating effectiveness of the organization’s controls either against the AICPA’s Trust Service criteria or at the organization’s request against other commonly acceptable control criteria, such as the NIST Critical Information Cybersecurity Framework and ISO 27001/27002. An audit professional then opines on whether management’s cybersecurity protocol description meets the AICPA’s criteria and whether cybersecurity controls effectively achieve the AICPA’s or other commonly accepted control criteria.
  • 2. ADVISORY MHM (Mayer Hoffman McCann P.C.) is an independent CPA firm that is a member of Kreston International Limited, a global network of independent accounting firms. Learn more at www.mhmcpa.com Our roots run deep ©Copyright2017.MayerHoffmamMcCannP.C.Allrightsreserved. How Companies Can Use a Cybersecurity Report A CPA-prepared report can be used to address concerns and inquiries from boards of directors and C-level management that your organization is taking the necessary precautions to protect sensitive data and systems. The report can also be used to help address the concerns and inquiries from external stakeholders, such as analysts, investors, business partners, and customers. Analysts and investors will want to see protections for risks that could disrupt an organization’s value and stock price. Business partners and customers may want to see insights into how your organizations’ controls marry up with theirs, and whether they will need additional controls in place around interactions with you. If there is an exchange of data taking place, a business partner and customers may also want to understand what logical security access protections are in place to protect the business partner’s and customer’s information. Regulators will want to see that you have implement suitable and effective cybersecurity controls and risk management practices to address their regulatory requirements and oversight compliance guidance. For More Information To learn more about how to enhance your cybersecurity protocol and incorporate it into your internal controls, please contact us.