steve gold, it expert on the business it guide
DESCRIPTION
Steve Gold, IT expert on the Business IT Guide. What are the most important IT skills that accountants need to have?. Steve Gold, Business/IT Security Journalist AccountingWEB event July 15, 2008. Agenda. Steve Gold - who on earth is this guy? IT skills needed by modern accountants - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Steve Gold, IT expert on the Business IT Guide](https://reader030.vdocuments.us/reader030/viewer/2022020111/5681301d550346895d959c62/html5/thumbnails/1.jpg)
100 Victoria StreetBristol BS1 6HZUnited Kingdom
a Sift Media publication
Steve Gold,IT expert on the Business IT Guide
![Page 2: Steve Gold, IT expert on the Business IT Guide](https://reader030.vdocuments.us/reader030/viewer/2022020111/5681301d550346895d959c62/html5/thumbnails/2.jpg)
What are the most important IT
skills that accountants need to have?
What are the most important IT
skills that accountants need to have?
Steve Gold, Business/IT Security Journalist
AccountingWEB event July 15, 2008
![Page 3: Steve Gold, IT expert on the Business IT Guide](https://reader030.vdocuments.us/reader030/viewer/2022020111/5681301d550346895d959c62/html5/thumbnails/3.jpg)
Agenda
Steve Gold - who on earth is this guy? IT skills needed by modern accountants Fraud and security threats – what’s
happening? How to protect you and your systems Lessons learned Further information
![Page 4: Steve Gold, IT expert on the Business IT Guide](https://reader030.vdocuments.us/reader030/viewer/2022020111/5681301d550346895d959c62/html5/thumbnails/4.jpg)
Audit security is a state of mind
IT threats are becoming hybridised and multi-vectored
Hackers are out to extract revenue from your organisation
So what are the main threats? Phishing Trojan horses Electronic eavesdropping Man-in-the-middle attacks
Fraud will always take the path of least resistance
![Page 5: Steve Gold, IT expert on the Business IT Guide](https://reader030.vdocuments.us/reader030/viewer/2022020111/5681301d550346895d959c62/html5/thumbnails/5.jpg)
Finjan IT threats report – July 15, 2008
The cybercrime world is continually evolving
Welcome to the world of crimeware
Similar to the legitimate business world, organisations are structured to supply their customers with a product or service while generating revenue.
With the transition from “hack for fame” to “cybercrime for profit”, the industry is seeing see the rise of well-structured and highly effective cybercrime organisations.
![Page 6: Steve Gold, IT expert on the Business IT Guide](https://reader030.vdocuments.us/reader030/viewer/2022020111/5681301d550346895d959c62/html5/thumbnails/6.jpg)
Business Challenges
How do you protect your systems from these threats?
Multiple layers of security
Out-sourced or in-house security?
Where does the audit function sit in this brave new world?
Is it necessary to program to be an effective auditor?
Good applications software is the key
![Page 7: Steve Gold, IT expert on the Business IT Guide](https://reader030.vdocuments.us/reader030/viewer/2022020111/5681301d550346895d959c62/html5/thumbnails/7.jpg)
Business Challenges
Virtual servers pose a major threat to your audit function
Virtual servers are cost-effective
Virtual servers improve IT and business efficiency
Conventional IT audit techniques do not apply to virtual servers
Behavioural analysis may be the key to virtual server security
![Page 8: Steve Gold, IT expert on the Business IT Guide](https://reader030.vdocuments.us/reader030/viewer/2022020111/5681301d550346895d959c62/html5/thumbnails/8.jpg)
Conventional techniques are still viable
Pattern analysis (digital signatures) may be the key
Conventional IT security software use digital signature searching
Every IT transaction has its own digital signature
Pattern searching/analysis is the key to effective security
Pattern analysis may well be the key to future audit software
![Page 9: Steve Gold, IT expert on the Business IT Guide](https://reader030.vdocuments.us/reader030/viewer/2022020111/5681301d550346895d959c62/html5/thumbnails/9.jpg)
Conclusions
IT security and fraud threats are constantly evolving
IT security and the audit function are inextricably linked
Good security and auditing software is the key to fraud control
“It isn’t rocket science”
![Page 10: Steve Gold, IT expert on the Business IT Guide](https://reader030.vdocuments.us/reader030/viewer/2022020111/5681301d550346895d959c62/html5/thumbnails/10.jpg)
Sources of further information
Online resources are the key
www.ITProPortal.com - one of the very first technology Web sites to launch in the UK back in 1999 and now one of the UK’s leading business and technology resources.
http://wm.businessitguide.com - provides you with all the information you need to make IT decisions that are right for your business. We can help you identify those issues which affect your business and recommend a clearly defined course of action.
www.infosecurity-magazine.com – Security and anti-fraud systems news, reviews and observations for today’s accountants and auditors (and not just for techies).