Cyber security assurance process from the internal audit perspective

dc.authoridBozkus Kahyaoglu, Sezer/0000-0003-2865-3399
dc.authorwosidBozkus Kahyaoglu, Sezer/AAB-1091-2020
dc.contributor.authorKahyaoglu, Sezer Bozkus
dc.contributor.authorCaliyurt, Kiymet
dc.date.accessioned2024-06-12T10:59:05Z
dc.date.available2024-06-12T10:59:05Z
dc.date.issued2018
dc.departmentTrakya Üniversitesien_US
dc.description.abstractPurpose - The purpose of this study is to analyze the cybersecurity assurance approaches to determine the key issues and weaknesses within the internal audit and risk management perspective. Organizations increasingly rely on digital data to drive their growth and they are interconnected in a complex web to a multitude of stakeholders. Design/methodology/approach - In this paper, cybersecurity is defined, and cybersecurity assurance model is explained based on the relevant literature. In addition, the role of internal auditing is introduced within this new business landscape. Finally, recommendations are made to provide best practices for stakeholders. Findings - There are four major cyber-focused standards and frameworks in the current literature, namely, Control Objectives for Information and Related Technology, International Organization for Standardization, The American Institute of Certified Public Accountants and National Institute of Standards and Technology. In addition, there are many mechanisms in existence and operation currently which support cybersecurity assurance to prevent major threats. These include risk assessment, risk treatment, risk management, security assurance and auditing. Research limitations/implications - Cyber risk is not something that can be avoided; instead, it must be managed. Hence, it is very important to maintain formal documentation on related cyber controls. Internal audit should be an integral part of cybersecurity assurance process, as internal audit have a unique position to look across organizations. The contribution of internal audit also provides comfort to the Board and Audit Committee. Practical implications - A model is introduced how the internal audit and information security functions could work together to support organizations accomplish a cost-effective level of information security. The key issues and approaches are explained for how to become a trusted cybersecurity advisor and a sample cybersecurity awareness program checklist is provided at Appendix 1. Social implications - Considering cybersecurity threats grow with speed, complexity, and impact, organizations are no longer satisfied with an answer to a question like are we secure? instead, they need the answer for such a question like how to give a reasonable assurance that our business will be secure enough?. In that respect, the role of internal audit is discussed based on the relevant literature and the current condition of the business environment. Originality/value - A model is introduced how the internal audit and information security functions could work together to support organizations accomplish a cost-effective level of information security. The key issues and approaches are explained for how to become a trusted cybersecurity advisor and a sample cybersecurity awareness program checklist is provided at Appendix 1.en_US
dc.identifier.doi10.1108/MAJ-02-2018-1804
dc.identifier.endpage376en_US
dc.identifier.issn0268-6902
dc.identifier.issn1758-7735
dc.identifier.issue4en_US
dc.identifier.scopus2-s2.0-85047271138en_US
dc.identifier.scopusqualityQ1en_US
dc.identifier.startpage360en_US
dc.identifier.urihttps://doi.org/10.1108/MAJ-02-2018-1804
dc.identifier.urihttps://hdl.handle.net/20.500.14551/20297
dc.identifier.volume33en_US
dc.identifier.wosWOS:000434380300003en_US
dc.identifier.wosqualityQ3en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherEmerald Group Publishing Ltden_US
dc.relation.ispartofManagerial Auditing Journalen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectCybersecurityen_US
dc.subjectAssuranceen_US
dc.subjectInternal Auditingen_US
dc.subjectCyber Risken_US
dc.subjectInformation Securityen_US
dc.titleCyber security assurance process from the internal audit perspectiveen_US
dc.typeArticleen_US

Dosyalar