Tax & Accounting Update: FASB News
Tax & Accounting Update: FASB News
Tax & Accounting Update: FASB News
FASB News
AICPA News
PCAOB News
The panel featured Douglas Bloom, JD, director of the cybersecurity and privacy and financial
crimes unit at PricewaterhouseCoopers; Chris Halterman, CPA, executive director of advisory
services and Ernst & Young LLP; and Amy Park, CPA, partner at Deloitte and Touche LLP.
Patrick McNamee, CPA, former deputy chief auditor at the PCAOB’s Office of the Chief
Auditor, moderated the panel. The following is an edited and condensed summary of the
panel discussion. The views expressed are the panelists’ own personal views and not
necessarily those of their employers or those employers’ boards, management, or staff.
McNamee began by citing a New York Times story about the potential for quantum computing
to completely disrupt current encryption technology. Bloom then discussed the state of
cybersecurity in general. The three main security threats are currently compromised email,
ransomware, and foreign sabotage. Of the latter, he said that “nation-states are aiming at
doing damage either for economic reasons or for political reasons. That has become far more
prevalent and has become a problem for private industry battling very sophisticated actors.”
Halterman, who chaired the AICPA working group on cyber-security, said that the group used
the Statement of Financial Accounting Concepts (SFAC) as a guideline for how management
should report on its cybersecurity risk management efforts. “What are the qualitative
characteristics of that information, in terms of relevance, faithful representation, materiality,
and comparability? … Management should describe its program, but that description should
be free from material misstatement. And there may be a need for an auditor to examine and
report on management’s assertion about the effectiveness of its controls. The cybersecurity
framework, which he likened to the COSO internal control framework, is available on the
AICPA website.
Halterman also touched on how System and Organization Control (SOC) reporting for
cybersecurity differs from SOC 2 reporting. “SOC 2 is formulated to answer the questions of
a customer about what controls you have in place, and are those operating individually. That
generally relates to only a single system or a limited number of systems. SOC for
cybersecurity relates to the enterprise taken as a whole, and to a different set of decisions.
Also, SOC 2 is a restricted use report, and the goal behind SOC for cybersecurity was to
provide a report for general use.”