ABSTRACT

Data privacy and security will be a primary concern for most people, with cyber-security training to be provided by educators to guide primary school children through to technology users within business. With the pending introduction of quantum computers, business leaders should already be planning for the replacement of hardware, software, and services that use public-key algorithms, so that the information is protected from future attacks. With cryptography being the foundation of digital trust, any threat to cryptography can result in unauthorized access to sensitive information, lack of control over connected devices and, potentially, significant dangers to organizational integrity. Information technology (IT) auditing has been a critical element of internal auditing for several decades. Traditionally, IT auditors examine and evaluate an organization's information technology infrastructure, applications, policies, and operations (and this remains important). The proposed IT audit program of work is usually considered by the audit committee when the chief audit executive presents the forward audit plan.