TABLE OF CONTENTS
Potential Users of Cybersecurity Information and Their Interests
Cybersecurity Risk Management Examination
Difference Between Cybersecurity and Information Security
Description of the Entity’s Cybersecurity Risk Management Program
The Entity’s Cybersecurity Objectives
Effectiveness of Controls Within the Entity’s Cybersecurity Risk Management Program
Overview of the Cybersecurity Risk Management Examination
Other Information About the Cybersecurity Risk Management Examination
Comparison of a Cybersecurity Risk Management Examination and a SOC 2 Engagement
Engagements Under the AICPA Consulting Standards
Quality in the Cybersecurity Risk Management Examination
2 Accepting and Planning a Cybersecurity Risk Management Examination
Get Guide: Reporting on an Entity's Cybersecurity Risk Management Program and Controls now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.