Reading this on a mobile device? Try our optimized mobile version here:

February 7, 2013
Sign upForwardArchiveAdvertise
Brought to you by the American Institute of CPAs

  Tech Update 
  • Why more CIOs are adopting the public cloud: Chief information officers are becoming more interested in public cloud offerings, as seen by the State of the CIO Survey, which reported a 9-percentage-point increase in companies adopting such products. Reasons to adopt the public cloud include savings, scalability and process excellence. It is also quick to implement and reduces time to market. Computerworld/IDG News Service (1/18) LinkedInFacebookTwitterEmail this Story
SOC School: Conducting Successful Engagements
Get up to speed on Service Organization Control Reports. Attend SOC School on May 15-17 (Denver, CO) or on June 19-21 (Columbia, MD). You’ll gain a deeper understanding of SOC guidance, common issues, and will gain the foundational knowledge to effectively perform engagements. > Go to
  Emerging Trends 
  • Why companies are in-sourcing data management
    Big Data growth is prompting enterprises to move data in house, according to a study by Oracle and Quocirca. Companies are investing in data centers and are starting to handle even short-term capacity support. Another driver is increased coordination in the C-suite regarding data usage. Computerworld UK (1/29) LinkedInFacebookTwitterEmail this Story
  • BlackBerry 10 debuts to strong review
    BlackBerry, no longer Research In Motion, has unveiled the final version of BlackBerry 10. The operating system is a significant offering, with major changes in security and messaging. Reviews have been positive, citing a faster Web browser and an ability to separate work and personal use. Ars Technica (2/6) LinkedInFacebookTwitterEmail this Story
  Security Corner 
  • Survey: Big firms would consider voluntary cybersecurity rules
    Fortune 500 companies in financial services, communications, transportation and energy support voluntary cybersecurity standards, according to a Senate survey. The finding is at odds with the U.S. Chamber of Commerce's opposition, on the grounds that such standards could eventually become mandatory. "I think they were thinking, 'In theory, that sounds great,' " said Ann Beauchesne, the Chamber's vice president for national security. "In practice, it can be standards-driven compliance." The Wall Street Journal (1/30) LinkedInFacebookTwitterEmail this Story
  • Mobile and social present security threats to enterprises
    Advanced malware attacks are a significant security challenge for enterprises, says Chris Wood, Sourcefire's director for Australia and New Zealand. Businesses need to focus on solutions that address an attack before, during and after it occurs, he says. Social networks and increased use of mobile devices in the enterprise also have introduced risk. "Devices that have access to the enterprise need to be routinely updated with the latest security programs," Wood said. CSO/IDG News Service (1/15) LinkedInFacebookTwitterEmail this Story
  • Where most methods of mobile-device management fail to protect
    Most strategies for mobile-device management focus on the device instead of malware, even though malware is a greater threat than loss of the device, says Peter Gibbons, head of information security at Network Rail. He attributes that to the way the security industry has evolved, with its historic focus on anti-intrusion technology. Only lately have vendors focused on protecting data. Techworld (U.K.) (1/16) LinkedInFacebookTwitterEmail this Story
  Regulatory & Legislative 
  • Governments step up data requests on Internet users
    Governments worldwide are increasing requests for data from companies such as Twitter and Google. In most cases, these requests are filled. Both companies are pushing back against "invasive requests" by publishing the volume of government requests in transparency reports. San Francisco Chronicle (1/28) LinkedInFacebookTwitterEmail this Story
  IMTA Community News & Events 
  • Interactive IT Case Study for Accounting Professionals
    The AICPA Information Management and Technology Assurance Section has developed the Interactive IT Case Study for Accounting Professionals. The training provides an interactive environment to address top technology concerns that accounting professionals encounter and offers a snapshot of what professionals need to know. In this preview of the case study, the training user acts as a company's chief financial officer and CITP and decides to conduct an internal assessment of the business' vulnerability to organizational IT risk and explore emerging technology. Don't let cyberthreats keep you up at night. Access or be an IMTA member to utilize AICPA Top Technology Initiatives resources available to assist you. LinkedInFacebookTwitterEmail this Story
  • Resources are available to prepare for the CITP examination
    The Complete Guide to the CITP Body of Knowledge is available to accounting professionals interested in information management and technology assurance. This guide is an in-depth and comprehensive review of fundamental concepts of the CITP Body of Knowledge. It is designed not only to assist in a candidate's preparation for the CITP examination but also to enhance the user's knowledge base in the marketplace. The guide is also available as a self-study course through continuing professional education. Note: IMTA Section members and CITP credential holders receive an additional discount of as much as 32% off the AICPA member price on both products. Visit the CITP exam Web page for more resources to help you prepare. LinkedInFacebookTwitterEmail this Story
  AICPA News 
  • Registration is open for AICPA IT Audit Training Schools
    Attend the AICPA IT Audit Training School -- How to Identify and Manage IT Risk in Assurance Services, scheduled June 24 to 27 in Towson, Md. The IT Audit Training School was developed to help auditors, controllers and internal-audit staff better understand how IT affects financial reporting. The AICPA Advanced IT Audit School, scheduled Oct. 7 to 9 in Englewood, Colo., will provide a more advanced focus and technical proficiency on practical IT auditing techniques to apply to a business process, such as in a revenue or expense cycle, and fraud considerations. IMTA Section members and CITP credential holders save an additional $100 on each IT Audit Training School. LinkedInFacebookTwitterEmail this Story
Learn more about AICPA's IMTA Section ->Join the IMTA Section | Become a CITP | IMTA Section Events

Our business in life is not to succeed, but to continue to fail in good spirits."
--Robert Louis Stevenson,
Scottish novelist, poet and essayist

LinkedInFacebookTwitterEmail this Story

AICPA IMTA Section Resources

Subscriber Tools
Print friendly format | Web version | Search past news | Archive | Privacy policy

Contact AICPA
AICPA Service Center
220 Leigh Farm Road
Durham, NC 27707-8110
Phone: 888.777.7077
Fax: 800.362.5066
About the Information Management and Technology Assurance Section
The AICPA's Information Management and Technology Assurance Section supports CPAs with a focus in ensuring data reliability, relevance, and availability using technology. The use of technology also enables CPAs to manage financial information effectively. The IMTA Section resources provide valuable information to help members achieve profitability for their organizations and of their clients.

About the Certified Information Technology Professional Credential
The Certified Information Technology Professional credential distinguishes CPAs who leverage technology to provide expertise in information assurance, internal controls, business process improvement, data analytics, and enhanced business reporting.

 Recent InfoTech Update Issues:   Lead Editor:  Tom Anderson
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2013 SmartBrief, Inc.® Legal Information