The January 1, 2018 implementation date for new accounting rules on revenue recognition is just around the corner, and the Public Company Accounting Oversight Board (PCAOB) has been issuing guidance to help companies prepare. The latest PCAOB...
Archive - October 2017
To Thrive, Utilities Must Have a Data Analytics Strategy and a Business Intelligence Plan
The big data revolution transforming industries worldwide is bearing fruit as companies improve their understanding and analysis of their information to increase efficiency, reduce costs, predict outcomes and enhance customer satisfaction. The...
Risk Culture Audits: Does Your Organization Walk the Talk?
Recently, there has been increased focus on the impact of culture on an organization’s business practices. My colleague Brian Christensen discussed culture in a May blog post titled “When bad things happen to good companies,” and culture was the key...
Inventory: The Key to Unlocking Integrated Business Planning and an SIOP Process
Properly implementing a fully integrated and comprehensive sales, inventory and operations planning (SIOP) process can deliver value that spans demand, supply and product management, while simultaneously driving financial discipline. Many are...
From Hurdle to Enabler: The Second Line’s Role in Innovation Is Evolving
Digital technologies are enabling new products and service channels, responding to changing customer demands, as well as driving efficiencies and creating competitive advantages. It is, therefore, essential that the second line functions of risk...
Equifax: What We’ve Learned a Month Later
To say that the Equifax breach has been thoroughly covered by the media may be an understatement. Pick a medium – TV, YouTube, LinkedIn, news websites, social media – it’s been covered upside, rightside, and backwards. With such voluminous coverage...
Digital Innovation: From Boardroom to Execution
Technology is evolving at an extraordinary pace; driving historic changes in consumer behavior and expectations globally. These changes are predicted to accelerate even more over the coming years as consumer preferences toward electronic channels...
Hunting for Hackers: Internal Audit’s Growing Role in Breach Detection
Information technology assets — and the ways criminals exploit them — keep evolving. Ransomware, for example, has changed the threat landscape by targeting operational rather than sensitive data. Criminals aren’t standing still and organizations...
Digital to the Core: Companies Must Have the Right People and Mindset to Succeed at Digital Transformation
A common mistake that companies make when pursuing digital transformation is viewing the process as a collection of technology projects, and not a business strategy that is shaped and driven by senior management and the board. They become so focused...
Security Advisory — Hackers Target Remote Email Access
As organizations look for workable ways to accommodate an increasingly mobile work force with remote access to email via internet and personal devices, hackers are using weaknesses in two of the most common email programs to breach internal networks...