2020 was full of significant disruption. In 2021, it is more critical than ever to be aware of the most pressing risks on which IT auditors should focus, including the threat from increasing implementation of new technologies, and the changing landscape of emerging risks. As companies navigate this change, IT internal audit has become more relevant than ever to make sure IT risk is both assessed and addressed to identifying opportunities to adopt emerging technologies and automation, focusing attention to cyber security and information security, adapting to business change, and building resilient core IT operations and critical infrastructure.
Risk assessment on the growing use of Cloud Technologies in the organization should be given attention by identifying the implementation strategy of Cloud Technologies, security features, governance, and Implementation Methods of Cloud Technologies.
Almost all business sectors invest in technologies such as robotic process automation, big data, predictive analysis, cognitive systems, natural language processing, machine learning, and artificial intelligence (AI) to automate existing systems. Expansion of automation functions and data integration between systems requires risk assessment to ensure information accuracy and data integrity.
Organizations are increasingly relying on suppliers (Third Parties) for system maintenance and delivery of information to customers. Failures or delays by third parties cause damaging an organization’s reputation quickly and have significant operational and cost implications. Assessment of third-party functions and risks in information technology management is essential to ensure that the organization’s operations are uninterrupted, information security is preserved and the dissemination of information to customers is accurate.
There is still a shortage of skilled and trained cybersecurity professionals to protect intellectual property and sensitive data. The reduction in trained manpower and increased implementation of automation functions as well as cloud technologies lead to increased cybersecurity risks.
Data is now an organizational priority. Irregular integrity controls and data protection have a major impact on organizational management and risk loss of property, loss of reputation, increased costs and legal action.
The expansion of new work models remotely using existing system capabilities during the period opens the door to cyber fraud, data misuse, cyber fraud and misappropriation if information technology security procedures or procedures based on new work models are not established, not updated and not channelled to the entire employee in the organization.
Article prepared by : Mr. Mohd Azis Bin Abdullah
Date of Input: 14/04/2021 | Updated: 14/04/2021 | nurmiera
Tingkat 2,
Blok F, Bangunan Sekolah Perniagaan dan Ekonomi(SPE),
Jalan Persiaran Tulang Daing,
Universiti Putra Malaysia,
43400 Serdang.