Developing a Risk Management Framework for Cybersecurity in Financial Reporting

Authors

  • Piyushkumar Patel Accounting Consultant at Steelbro International Co., Inc, USA Author
  • Hetal Patel Manager- finance department at Jamaica hospital, USA Author

Keywords:

Cybersecurity, risk management framework

Abstract

Integrating cybersecurity into financial reporting has become essential in an increasingly digital world. As financial data is a prime target for cyber threats, financial institutions must develop robust frameworks to manage and mitigate risks associated with cyber incidents. This paper explores the development of a comprehensive risk management framework tailored to cybersecurity challenges in financial reporting. The framework addresses core areas such as identifying critical assets, assessing vulnerabilities, and establishing controls and response strategies. It emphasizes proactive threat monitoring and response planning to protect sensitive financial data and ensure reporting integrity. Key components include risk assessment, incident response, and compliance with regulatory standards such as the Sarbanes-Oxley Act, which mandates controls to safeguard financial data. The framework also outlines the importance of continuous monitoring and employee training, stressing that human error is a significant risk factor in cybersecurity. Additionally, it underscores collaboration between cybersecurity and financial reporting teams to foster a unified approach toward data protection and transparency. By applying this framework, financial institutions can enhance their resilience to cyber threats and ensure that financial reports remain accurate and reliable, upholding investor confidence and regulatory compliance. This paper provides a practical guide for financial institutions aiming to implement a cybersecurity risk management framework that aligns with industry best practices and regulatory expectations, addressing the unique intersection of cybersecurity and financial reporting.

Downloads

Download data is not yet available.

References

Philpott, D. R., & Gantz, S. D. (2012). FISMA and the risk management framework: the new practice of federal cyber security. Newnes.

Cohen, J., Krishnamoorthy, G., & Wright, A. (2017). Enterprise risk management and the financial reporting process: The experiences of audit committee members, CFO s, and external auditors. Contemporary Accounting Research, 34(2), 1178-1209.

Bozkus Kahyaoglu, S., & Caliyurt, K. (2018). Cyber security assurance process from the internal audit perspective. Managerial auditing journal, 33(4), 360-376.

Radziwill, N. M., & Benton, M. C. (2017). Cybersecurity cost of quality: Managing the costs of cybersecurity risk management. arXiv preprint arXiv:1707.02653.

Jacobs, P. C., von Solms, S. H., & Grobler, M. M. (2016). Towards a framework for the development of business cybersecurity capabilities. The Business & Management Review, 7(4), 51.

McCarthy, C., & Harnett, K. (2014). National institute of standards and technology (nist) cybersecurity risk management framework applied to modern vehicles (No. DOT HS 812 073). United States. Department of Transportation. National Highway Traffic Safety Administration.

Johnson, K. N. (2015). Cyber risks: Emerging risk management concerns for financial institutions. Ga. L. Rev., 50, 131.

Force, J. T. (2017). Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy (Discussion Draft) (No. NIST Special Publication (SP) 800-37 Rev. 2 (Draft)). National Institute of Standards and Technology.

Barrett, M., Marron, J., Pillitteri, V. Y., Boyens, J., Witte, G., & Feldman, L. (2017). The Cybersecurity Framework.

Goodwin, C., Nicholas, J. P., Bryant, J., Ciglic, K., Kleiner, A., Kutterer, C., ... & Sullivan, K. (2015). A framework for cybersecurity information sharing and risk reduction. Microsoft.

Force, J. T., & INITIATIVE, T. (2010). Guide for applying the risk management framework to federal information systems. NIST special publication, 800, 37.

Ralston, P. A., Graham, J. H., & Hieb, J. L. (2007). Cyber security risk assessment for SCADA and DCS networks. ISA transactions, 46(4), 583-594.

Trautman, L. J., & Altenbaumer-Price, K. (2010). The board's responsibility for information technology governance. J. Marshall J. Computer & Info. L., 28, 313.

Groves, S. (2003). The unlikely heroes of cyber security. Information Management, 37(3), 34.

Barnier, B. G. (2009). The New ISACA Risk IT Framework and Best Practice: Filling a Gap, Making Risk Management Easier and More Effective. EDPACS The EDP Audit, Control, and Security Newsletter, 40(1), 1-7.

Gade, K. R. (2018). Real-Time Analytics: Challenges and Opportunities. Innovative Computer Sciences Journal, 4(1).

Gade, K. R. (2017). Integrations: ETL vs. ELT: Comparative analysis and best practices. Innovative Computer Sciences Journal, 3(1).

Komandla, V. Transforming Financial Interactions: Best Practices for Mobile Banking App Design and Functionality to Boost User Engagement and Satisfaction.

Naresh Dulam. Snowflake: A New Era of Cloud Data Warehousing. Distributed Learning and Broad Applications in Scientific Research, vol. 1, Apr. 2015, pp. 49-72

Naresh Dulam. The Shift to Cloud-Native Data Analytics: AWS, Azure, and Google Cloud Discussing the Growing Trend of Cloud-Native Big Data Processing Solutions. Distributed Learning and Broad Applications in Scientific Research, vol. 1, Feb. 2015, pp. 28-48

Naresh Dulam. DataOps: Streamlining Data Management for Big Data and Analytics . Distributed Learning and Broad Applications in Scientific Research, vol. 2, Oct. 2016, pp. 28-50

Naresh Dulam. Machine Learning on Kubernetes: Scaling AI Workloads . Distributed Learning and Broad Applications in Scientific Research, vol. 2, Sept. 2016, pp. 50-70

Downloads

Published

15-07-2019

How to Cite

[1]
Piyushkumar Patel and Hetal Patel, “Developing a Risk Management Framework for Cybersecurity in Financial Reporting”, Distrib Learn Broad Appl Sci Res, vol. 5, pp. 1436–1451, Jul. 2019, Accessed: Dec. 31, 2024. [Online]. Available: https://dlabi.org/index.php/journal/article/view/267

Most read articles by the same author(s)

Similar Articles

1-10 of 168

You may also start an advanced similarity search for this article.