But who, precisely, are auditors? Who do they report to? Where does their power come from? But who, precisely, are auditors? Who do they report to? Where does their power come from? “Who audit reports to depends on the size of the company, and if it is publicly held,” says Sharon O’Bryan, a former auditor and CISO who has her own consultancy in Saint Charles, Ill.Typically, O’Bryan says, the audit function reports to the head of audit, who in turn reports to an audit committee, typically made up of the CEO, CFO, COO and other board members. “Historically, audit committees were staffed with board members who people either didn’t know what to do with, or because they didn’t have enough to do. They were rubber stamps.”But rubber stamps with authority: auditors’ clout, she says, comes from the imprimatur that they attach to financial statements. Consequently, “audit functions do, and did, inspire fear,” she says. “Some companies had a policy of firing people that had, say, three negative audit comments, which made their auditors unpopular. Yet the auditors were told: Come back with negative comments, or you’re fired. It was very endemic, especially in the financial service industry, where an attitude often prevailed of, There must be something going wrong, so go find it, damn it.”But changes are afoot. As technology encroaches more and more upon business life, observes O’Bryan, auditors have become reliant upon those whom they monitor. “The population of auditors hasn’t kept up with the skill set required to audit technology,” she asserts. “The security function, in essence, has been helping the audit function to audit it, which means that the independence of the audit function is questionable at best.” Related content news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe