0% found this document useful (0 votes)
109 views1 page

Cybersecurity Questionnaire

This document discusses cybersecurity procedures and controls. It asks 5 questions to better understand how the organization detects unauthorized access, assesses cybersecurity risks, responds to email compromise attacks, and ensures internal controls and employee security for hybrid work setups. The questions aim to evaluate how cybersecurity incidents could impact financial reporting and how the organization manages significant risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views1 page

Cybersecurity Questionnaire

This document discusses cybersecurity procedures and controls. It asks 5 questions to better understand how the organization detects unauthorized access, assesses cybersecurity risks, responds to email compromise attacks, and ensures internal controls and employee security for hybrid work setups. The questions aim to evaluate how cybersecurity incidents could impact financial reporting and how the organization manages significant risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Cybersecurity

Introduction: We understand that your IT system possess highly sensitive information based on the survey that we have
gathered, however, there were some issues that we would wish to further understand by helping us answer the following queries
below:

1. Do you have certain procedures to detect and prevent unauthorized /unwanted users that had been subject to a
cybersecurity incident that could impact the integrity of financial information used in the financial reporting process?

2. Do you have risk assessment process to evaluate the cybersecurity risks across the entity which might have significant
risks to financial reporting and how do you manage those risks?

3. How do you identify, assesses, and responds to risks related to attacks perpetrated through business e-mail comprise
(BEC) scams or spoofing or phishing routines?

4. What is your assessment on the internal accounting controls in light of risks arising from cyber-related frauds (e.g. BEC
scams, spoofing, phishing etc.?

5. What are security measures for employees that have a hybrid set-up (work from home and traditional set-up)?

You might also like