SlideShare a Scribd company logo
1 of 17
The Impact of Technology on the
Profession
ICAC/IFAC PAO MEETING
JUNE 22, 2017
Presented by Shawn M. Mahler, CA, CISA
Technology continues to impact the accounting profession in new and
challenging ways.
In my view, the profession can only be future ready if it embraces
technological advancement and the changes it brings to the global
marketplace while also adapting to the associated risks and threats with
continued advancement.
The number 1 threat in our current and future business reality is
Cybersecurity.
In 2016, the Chief Knowledge Officer of the Information System Audit and
Control Association, Dr. Ron Hale stated that cyberattacks are inevitable to
every organization. The data shows us that the answer is a bit unclear.
Cyberattacks are still pervasive. We are still experiencing many of the
same attack types that have plagued organizations for years.
2016 was a remarkable year for info security. There were
allegations of US election hacking, IT botnets, SWIFT banking
heists, Yahoo breach disclosures to the tune of 1.5 billion
passwords, and rampant ransomware incidents. With every story
playing out in the media
Cybersecurity incidents continue to rise. According to PwC’s Global
State of Information Security Survey 2015, attacks rose
internationally by 48 per cent in 2016 resulting in huge remedial and
reputational costs to the companies and governments concerned.
Despite clearing annual global statistic on the matter, the Caribbean
remains woefully unprepared, with governments and parts of the
private sector declining to take the matter seriously until subject to
an attack.
However, we only has to consider the enormous sums of money
transferred regularly through the region’s offshore financial centers,
the commercially sensitive documents held in registries and
lawyers’ offices, matters of national security and criminality that all
governments regularly engage with, the expansion of citizenship
programs, and the millions of daily commercial banking
transactions, to immediately see the dangers cybercrime poses to
small nations.
The past has proven the Caribbean is not immune to attacks.
While few Caribbean cases of DDoS or cybercrime ever become
public, because of the perceived reputational damage such as:
 theft from banks;
 the hacking of government websites in the Bahamas and St
Vincent by a group claiming to be supporters of ISIS;
 ransomware attacks on some Caribbean tax authorities
 the publication online of 1.3 million files from the Bahamas’
corporate registry.
These revealed not just the lack of appropriate security within
government portals, but the existence of outmoded IT systems and
software with the potential, some experts suggest, to have
compromised government’s internal communications.
They also highlighted the region’s vulnerability, and the absence of
local expertise or financial resources to address weaknesses,
leaving others to be invited in to provide the necessary technical
support and to remedy problems.
According to a joint study by the Center for Strategic Studies and
McAfee published earlier this year, Latin America and the
Caribbean (LAC) has become a new frontier for cyber-attacks and
crime at an estimated cost of around US$90 billion per year.
In trying to address what is a growing global threat, some
governments and companies are being proactive. Following the St
Vincent attack, for example, the St Lucia government has said it is
strengthening its cyber security and is encouraging collaboration at
a national, regional and international level.
The Bahamas has said that it recognizes the need for professional
monitoring, and Jamaica is utilizing international technical
assistance, is developing a national cyber security strategy, has
established a cyber incident response team, and has drafted
relevant laws.
Despite 2014 and 2015 reports on the subject produced by the
Organization of American States (OAS) the region has a very long
way to go, or that for the majority, the pace of the response is slow.
The OAS’s April 2015 ‘Report on Cyber security and critical
infrastructure in the Americas’ makes clear that the threat is moving
on and attacks on critical infrastructure increasingly represent a
serious new vulnerability for the region.
By this what is meant is that government’s databases and email
communications, national commercial banking and financial
systems, the control of the energy supply and other utilities, and
communications at a national and dedicated level, are now subject
to attack from cybercriminals seeking financial gain or by those
undertaking hostile political acts.
As governments encourage the growth of digitized knowledge-
based, services-oriented economies in which government and
connectivity are used to drive productivity and growth, the
suggestion is that despite hard pressed budgets, national cyber
security is now seen as a core cost for governments and just as
important as physical security. In response the OAS and IDB
reports on the state of cyber security in the region, CARICOM has
directed more spending on more proactive efforts such as
improving legislation and organizing national and regional response
team to cybersecurity.
Recent developments also demonstrate that there has to be closer
public sector-private sector co-operation of a kind not usual in much
of the Caribbean, to develop systems and secure forms of
information exchange as cyber security touches both the viability of
nations and individual enterprises.
The global survey on the state of cybersecurity indicates that both
public sector and private sector lack the expertise in properly
scoping cyber security in it risk management strategy.
The global survey also indicates that over 50% of cybercrimes are
motivated by financial gain. Another 37% of incidents are motivated
toward identity theft.
These glaring statistic exhibit the reason the accountancy
profession needs to adapt to the impact cybersecurity has on data
integrity.
The Global community of Cybersecurity experts all agree that the
impact on data integrity will increase.
Future prediction by one expert stated that “Trust in Systems will be
broken as bad guys move from exfiltration data to changing it.
Therefore, it is imperative that our industry moves a strategy to
counter the impacts of cybersecurity has on financial data.
Key strategies that PAO must adopt include:
1. Determine the skill set gaps of accounting professionals on cyber security risk
assessment and risk management and implement strategy.
2. Get involved as a key stakeholders in national cybersecurity forums
3. Get involved in legislative changes over cybersecurity
4. Develop and disseminate more audit guidance in the assessment of internal
control over financial systems in light of evolving cybersecurity threats.
5. Develop CPD events on cybersecurity on an annual basis

More Related Content

What's hot

Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systemsMohanraj V
 
Ppt 1 introduction to accounting
Ppt 1 introduction to accountingPpt 1 introduction to accounting
Ppt 1 introduction to accountingDr.Padma Shankar
 
Business communication in banking sector
Business communication in banking sectorBusiness communication in banking sector
Business communication in banking sectorLahore
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governanceShelly
 
2C2P-IDC-InfoBrief_AP241383IB.pdf
2C2P-IDC-InfoBrief_AP241383IB.pdf2C2P-IDC-InfoBrief_AP241383IB.pdf
2C2P-IDC-InfoBrief_AP241383IB.pdfRizkyAdiPoetra
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemVidhu Arora
 
Banking technology in india slide show
Banking technology in india   slide showBanking technology in india   slide show
Banking technology in india slide showLalit Sanagavarapu
 
Mis impact of information technology on business
Mis impact of information technology on businessMis impact of information technology on business
Mis impact of information technology on businessCyndhie DeLeon
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 
Transaction processing systems
Transaction processing systems Transaction processing systems
Transaction processing systems greg robertson
 
Computer in accounting
Computer in accountingComputer in accounting
Computer in accountingVivek Casillas
 

What's hot (20)

Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systems
 
Ppt 1 introduction to accounting
Ppt 1 introduction to accountingPpt 1 introduction to accounting
Ppt 1 introduction to accounting
 
Role of it in finance
Role of it in financeRole of it in finance
Role of it in finance
 
Business communication in banking sector
Business communication in banking sectorBusiness communication in banking sector
Business communication in banking sector
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
 
2C2P-IDC-InfoBrief_AP241383IB.pdf
2C2P-IDC-InfoBrief_AP241383IB.pdf2C2P-IDC-InfoBrief_AP241383IB.pdf
2C2P-IDC-InfoBrief_AP241383IB.pdf
 
Fintech
FintechFintech
Fintech
 
Executive Information System
Executive Information SystemExecutive Information System
Executive Information System
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Banking technology in india slide show
Banking technology in india   slide showBanking technology in india   slide show
Banking technology in india slide show
 
Mis impact of information technology on business
Mis impact of information technology on businessMis impact of information technology on business
Mis impact of information technology on business
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Management accounting
Management accountingManagement accounting
Management accounting
 
business data processing
business data processingbusiness data processing
business data processing
 
Mis lecture ppt
Mis lecture pptMis lecture ppt
Mis lecture ppt
 
Computerized accounting.
Computerized accounting.Computerized accounting.
Computerized accounting.
 
Transaction processing systems
Transaction processing systems Transaction processing systems
Transaction processing systems
 
Computer in accounting
Computer in accountingComputer in accounting
Computer in accounting
 

Similar to The Impact of Technology on the Profession

Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docxhallettfaustina
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Graeme Cross
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfTirthShah760404
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 

Similar to The Impact of Technology on the Profession (20)

Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 

More from International Federation of Accountants

Otros pronunciamientos: Información financiera según la base contable de efec...
Otros pronunciamientos: Información financiera según la base contable de efec...Otros pronunciamientos: Información financiera según la base contable de efec...
Otros pronunciamientos: Información financiera según la base contable de efec...International Federation of Accountants
 
Presentación de los Estados Financieros Estados de situación financiera, rend...
Presentación de los Estados Financieros Estados de situación financiera, rend...Presentación de los Estados Financieros Estados de situación financiera, rend...
Presentación de los Estados Financieros Estados de situación financiera, rend...International Federation of Accountants
 

More from International Federation of Accountants (20)

Closing Remarks International Women's Day 2024
Closing Remarks International Women's Day 2024Closing Remarks International Women's Day 2024
Closing Remarks International Women's Day 2024
 
IFAC Principios revisados de Gobierno Corporativo del G20 y de la OCDE
IFAC Principios revisados de Gobierno Corporativo del G20 y de la OCDEIFAC Principios revisados de Gobierno Corporativo del G20 y de la OCDE
IFAC Principios revisados de Gobierno Corporativo del G20 y de la OCDE
 
IFAC Presentación IGEP sobre OCDE-G20, Febrero 2024
IFAC Presentación IGEP sobre OCDE-G20, Febrero 2024IFAC Presentación IGEP sobre OCDE-G20, Febrero 2024
IFAC Presentación IGEP sobre OCDE-G20, Febrero 2024
 
Preparing for High Quality Sustainability assurance Engagements
Preparing for High Quality Sustainability assurance EngagementsPreparing for High Quality Sustainability assurance Engagements
Preparing for High Quality Sustainability assurance Engagements
 
Otros pronunciamientos: Información financiera según la base contable de efec...
Otros pronunciamientos: Información financiera según la base contable de efec...Otros pronunciamientos: Información financiera según la base contable de efec...
Otros pronunciamientos: Información financiera según la base contable de efec...
 
Otros pronunciamientos: Guías de Prácticas Recomendadas
Otros pronunciamientos: Guías de Prácticas RecomendadasOtros pronunciamientos: Guías de Prácticas Recomendadas
Otros pronunciamientos: Guías de Prácticas Recomendadas
 
Otros pronunciamientos: Marco conceptual
Otros pronunciamientos: Marco conceptualOtros pronunciamientos: Marco conceptual
Otros pronunciamientos: Marco conceptual
 
Adopción por primera vez de las NICSP de base de devengo
Adopción por primera vez de las NICSP de base de devengoAdopción por primera vez de las NICSP de base de devengo
Adopción por primera vez de las NICSP de base de devengo
 
Moneda Extranjera
Moneda ExtranjeraMoneda Extranjera
Moneda Extranjera
 
Presentación de la información presupuestaria
Presentación de la información presupuestariaPresentación de la información presupuestaria
Presentación de la información presupuestaria
 
Revelaciones de partes relacionadas
Revelaciones de partes relacionadasRevelaciones de partes relacionadas
Revelaciones de partes relacionadas
 
Estado de Flujos de Efectivo
Estado de Flujos de EfectivoEstado de Flujos de Efectivo
Estado de Flujos de Efectivo
 
Presentación de los Estados Financieros Estados de situación financiera, rend...
Presentación de los Estados Financieros Estados de situación financiera, rend...Presentación de los Estados Financieros Estados de situación financiera, rend...
Presentación de los Estados Financieros Estados de situación financiera, rend...
 
Combinaciones del sector público
Combinaciones del sector públicoCombinaciones del sector público
Combinaciones del sector público
 
Consolidación
ConsolidaciónConsolidación
Consolidación
 
Instrumentos financieros – Revelaciones
Instrumentos financieros – RevelacionesInstrumentos financieros – Revelaciones
Instrumentos financieros – Revelaciones
 
Instrumentos financieros – Cobertura y derivados
Instrumentos financieros – Cobertura y derivadosInstrumentos financieros – Cobertura y derivados
Instrumentos financieros – Cobertura y derivados
 
Instrumentos financieros – Conceptos básicos
Instrumentos financieros –  Conceptos básicos Instrumentos financieros –  Conceptos básicos
Instrumentos financieros – Conceptos básicos
 
Instrumentos financieros – Revelaciones
Instrumentos financieros –  Revelaciones Instrumentos financieros –  Revelaciones
Instrumentos financieros – Revelaciones
 
Instrumentos financieros – Coberturas y derivados
Instrumentos financieros – Coberturas y derivadosInstrumentos financieros – Coberturas y derivados
Instrumentos financieros – Coberturas y derivados
 

Recently uploaded

RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 

Recently uploaded (20)

RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 

The Impact of Technology on the Profession

  • 1. The Impact of Technology on the Profession ICAC/IFAC PAO MEETING JUNE 22, 2017 Presented by Shawn M. Mahler, CA, CISA
  • 2. Technology continues to impact the accounting profession in new and challenging ways. In my view, the profession can only be future ready if it embraces technological advancement and the changes it brings to the global marketplace while also adapting to the associated risks and threats with continued advancement. The number 1 threat in our current and future business reality is Cybersecurity. In 2016, the Chief Knowledge Officer of the Information System Audit and Control Association, Dr. Ron Hale stated that cyberattacks are inevitable to every organization. The data shows us that the answer is a bit unclear. Cyberattacks are still pervasive. We are still experiencing many of the same attack types that have plagued organizations for years.
  • 3. 2016 was a remarkable year for info security. There were allegations of US election hacking, IT botnets, SWIFT banking heists, Yahoo breach disclosures to the tune of 1.5 billion passwords, and rampant ransomware incidents. With every story playing out in the media
  • 4. Cybersecurity incidents continue to rise. According to PwC’s Global State of Information Security Survey 2015, attacks rose internationally by 48 per cent in 2016 resulting in huge remedial and reputational costs to the companies and governments concerned.
  • 5. Despite clearing annual global statistic on the matter, the Caribbean remains woefully unprepared, with governments and parts of the private sector declining to take the matter seriously until subject to an attack. However, we only has to consider the enormous sums of money transferred regularly through the region’s offshore financial centers, the commercially sensitive documents held in registries and lawyers’ offices, matters of national security and criminality that all governments regularly engage with, the expansion of citizenship programs, and the millions of daily commercial banking transactions, to immediately see the dangers cybercrime poses to small nations.
  • 6. The past has proven the Caribbean is not immune to attacks. While few Caribbean cases of DDoS or cybercrime ever become public, because of the perceived reputational damage such as:  theft from banks;  the hacking of government websites in the Bahamas and St Vincent by a group claiming to be supporters of ISIS;  ransomware attacks on some Caribbean tax authorities  the publication online of 1.3 million files from the Bahamas’ corporate registry.
  • 7. These revealed not just the lack of appropriate security within government portals, but the existence of outmoded IT systems and software with the potential, some experts suggest, to have compromised government’s internal communications. They also highlighted the region’s vulnerability, and the absence of local expertise or financial resources to address weaknesses, leaving others to be invited in to provide the necessary technical support and to remedy problems.
  • 8. According to a joint study by the Center for Strategic Studies and McAfee published earlier this year, Latin America and the Caribbean (LAC) has become a new frontier for cyber-attacks and crime at an estimated cost of around US$90 billion per year.
  • 9. In trying to address what is a growing global threat, some governments and companies are being proactive. Following the St Vincent attack, for example, the St Lucia government has said it is strengthening its cyber security and is encouraging collaboration at a national, regional and international level. The Bahamas has said that it recognizes the need for professional monitoring, and Jamaica is utilizing international technical assistance, is developing a national cyber security strategy, has established a cyber incident response team, and has drafted relevant laws.
  • 10. Despite 2014 and 2015 reports on the subject produced by the Organization of American States (OAS) the region has a very long way to go, or that for the majority, the pace of the response is slow. The OAS’s April 2015 ‘Report on Cyber security and critical infrastructure in the Americas’ makes clear that the threat is moving on and attacks on critical infrastructure increasingly represent a serious new vulnerability for the region.
  • 11. By this what is meant is that government’s databases and email communications, national commercial banking and financial systems, the control of the energy supply and other utilities, and communications at a national and dedicated level, are now subject to attack from cybercriminals seeking financial gain or by those undertaking hostile political acts.
  • 12. As governments encourage the growth of digitized knowledge- based, services-oriented economies in which government and connectivity are used to drive productivity and growth, the suggestion is that despite hard pressed budgets, national cyber security is now seen as a core cost for governments and just as important as physical security. In response the OAS and IDB reports on the state of cyber security in the region, CARICOM has directed more spending on more proactive efforts such as improving legislation and organizing national and regional response team to cybersecurity.
  • 13. Recent developments also demonstrate that there has to be closer public sector-private sector co-operation of a kind not usual in much of the Caribbean, to develop systems and secure forms of information exchange as cyber security touches both the viability of nations and individual enterprises.
  • 14. The global survey on the state of cybersecurity indicates that both public sector and private sector lack the expertise in properly scoping cyber security in it risk management strategy. The global survey also indicates that over 50% of cybercrimes are motivated by financial gain. Another 37% of incidents are motivated toward identity theft. These glaring statistic exhibit the reason the accountancy profession needs to adapt to the impact cybersecurity has on data integrity.
  • 15. The Global community of Cybersecurity experts all agree that the impact on data integrity will increase. Future prediction by one expert stated that “Trust in Systems will be broken as bad guys move from exfiltration data to changing it.
  • 16. Therefore, it is imperative that our industry moves a strategy to counter the impacts of cybersecurity has on financial data.
  • 17. Key strategies that PAO must adopt include: 1. Determine the skill set gaps of accounting professionals on cyber security risk assessment and risk management and implement strategy. 2. Get involved as a key stakeholders in national cybersecurity forums 3. Get involved in legislative changes over cybersecurity 4. Develop and disseminate more audit guidance in the assessment of internal control over financial systems in light of evolving cybersecurity threats. 5. Develop CPD events on cybersecurity on an annual basis