KL: Great point, guys. It's very clear that the need is to make sure that that audit committee, those boards are educated and where we can is having that expertise sitting amongst them. When we think about the increasing sophistication of cyber threats and the growing importance of data privacy, there's a lot to keep up with in terms of the information, the understanding, the guidance. What would you guys suggest to internal audit teams on how to best stay abreast of this information, the trends, the regulations, the best practices? Any thoughts that you can share?
AH: Yeah, there's a lot of different resources, ISACA. There's a number of organizations where they will send you weekly, monthly, depending on your preference, different cybersecurity attacks. What are some of those zero-day vulnerabilities that are coming out? What are some high risk bulletins and things and trainings that you can attend? So I think putting together just an annual security awareness training and education program specific to the internal auditor's role is really a key part of planning that too. A lot of people follow Twitter, podcasts, like we're doing today, but lots of resources out there. Joe, what do you have to add there?
JS: I often offer a lunch and learn or a similar format to that where if the organization has a particular concern, we can spend some focused time on that. Like data privacy is a very good example, very volatile, moving very quickly. Every month or so, there's a few more States that are signing these data privacy regulations into law or they're in evaluation from a cross chamber perspective. So really, the other avenue or format I've used there is really a lunch and learn just to communicate a specific topic.
KL: This is obviously an internal audit podcast. So we're talking about cybersecurity through the lens of the third line of defense. I know, Joe, you and I have had a number of conversations on how do we move beyond the third line to make sure that this is embedded throughout the organization. Do you guys have any client examples or stories that you'd want to share on how you've seen something that started through internal audit kind of expand beyond that third line of defense?
JS: Well, it might sound cliché, but it really is going back to being that trusted partner. A lot of times they first, they reach out to us for a very specific need. They have a technology they don't understand. They have a very specific concern. But through us bringing in subject matter expertise and really showing them that we bring in the power of the firm or that we really understand internal audit, that tends to expand us into being added to the table during the enterprise risk management updates, the annual internal audit, risk assessment updates. So it really is just showing that this is a value add. In the past, internal audit tended to get put in a bucket where we're the police, we're the cops, we're here kind of in a got you mentality, and now we really need to show we're value add, and we're helping them with the leverage for additional budget for tolling they might need, staffing needs, really pointing out more of the day-to-day needs of the organization.
AH: Yeah, those are really great examples. One thing that I love to see too is when we come to a new organization and you can see how their internal audit function as it relates to cybersecurity and that partnership with the CISO and IT has grown over that time so that they do have that collaboration because of some of those activities. Being in front of them, sharing data, meeting with the audit committee, being part of that overall internal audit planning, and taking into consideration the business needs, the business risks, and what's going on from a regulatory and trend standpoint.
JS: And Autumn, just to add to that, it's coming to the table with insight to the organization. So when we're talking to the CIO, the CISO, they don't want our findings to be communicated in a vacuum. To really add value through internal audit, we need to understand the change in the organization, the movement of the organization, what is the true risk, and not just assign a generic risk for whatever area that is under review. So it's really collaboration throughout the process, in planning, in fieldwork, all the way through reporting. Are we understanding the organization? Are we aligned with the true risk and the true need of what we're trying to facilitate here?
KL: As practitioners, I'm sure you guys have had a number of opportunities to work with a variety of clients. I think one of my favorite things about the job is when we can share our successes and the types of value that we've added. If you guys have any examples or favorite stories to share, feel free to do so.
JS: Katie, one of the items I'm most proud of is we had an internal audit client where we were in a co-sourced arrangement. They were doing over 10 audits a year with a pretty considerable team. They had five or six individuals completely dedicated to internal audit. And we were really in a co-sourced arrangement, just adding subject matter expertise where needed. But as we kind of nurtured that relationship and strengthened that relationship, the internal audit director actually reached out to me for a review of their own internal audit process. So we did an internal audit around how they execute internal audit. So the risk assessment process, how they document work papers, how do they sample, how do they identify risk within the organization. We went through reporting templates. We went through how do they survey the C-suite and executives to get their feedback in internal audit. So that was extremely rewarding to me to understand that the client valued my input enough to make them be the auditee, for us to actually audit their process. So that was certainly memorable and rewarding to me, Katie.
KL: Autumn, anything you'd like to share?
AH: Yeah, those are definitely proud moments when you have a client. I just had one also recently where wrapping up audit committee presentation, we have been doing a number of audits for a couple years. We've built out trend analysis and data for them and shared some benchmarking data. And really just hearing the feedback and seeing the internal audit leader be complimented by the audit committee members and being reached out directly afterwards saying, "You know what? You've really helped us evolve our maturity. We're doing some things here that we were not doing a few years ago. We have more visibility now. We have a better understanding, and we're starting to talk about cybersecurity more frequently now because of this." I mean, those are definitely proud moments and big reason why I love doing what I do.
KL: Thank you to RSM's Autumn Hurley and Joe Strain for their insights. And thank you to our listeners for joining us today.