Joseph Carson of Thycotic, the author of the book “Cybersecurity for Dummies” wrote a free version of his text as a guide for the general public. The AICPA obviously had a specific target market for an article it published: “Top 20” article: Top 20 Cybersecurity Checklist for accountants. Compare what you learned in Carson’s text to the AICPA’s “Top 20” Cybersecurity Checklist.
See the correct hyperlink for the AICPA Checklist below (updated March 24, 2020):
https://www.aicpa.org/content/dam/aicpa/interestareas/privatecompaniespracticesection/qualityservicesdelivery/informationtechnology/downloadabledocuments/top-22-cyber-checklist.pdf
Discuss similarities and differences between these two. Also consider approaches offered in 2018 SANS Security Awareness Report available online at SANS Institute.org.
Joseph Carson of Thycotic, the author of the book “Cybersecurity for Dummies” wrote a free version of his text as a guide for the general public. The AICPA obviously had a specific target market for an article it published: “Top 20” article: Top 20 Cybersecurity Checklist for accountants. Compare what you learned in Carson’s text to the AICPA’s “Top 20” Cybersecurity Checklist.
See the correct hyperlink for the AICPA Checklist below (updated March 24, 2020):
spracticesection/qualityservi
cesdelivery/informationtechnology/downloadabledocuments/top
–
22
–
cyber
–
checklist.pdf
Discuss similarities and differences between these two. Also consider approaches offered in 2018 SANS
Security Awareness Report available online at SANS Institute.org.
Joseph Carson of Thycotic, the author of the book “Cybersecurity for Dummies” wrote a free version of his text as a guide for the general public. The AICPA obviously had a specific target market for an article it published: “Top 20” article: Top 20 Cybersecurity Checklist for accountants. Compare what you learned in Carson’s text to the AICPA’s “Top 20” Cybersecurity Checklist.
See the correct hyperlink for the AICPA Checklist below (updated March 24, 2020):
https://www.aicpa.org/content/dam/aicpa/interestareas/privatecompaniespracticesection/qualityservicesdelivery/informationtechnology/downloadabledocuments/top-22-cyber-checklist.pdf
Discuss similarities and differences between these two. Also consider approaches offered in 2018 SANS
Security Awareness Report available online at SANS Institute.org.