Information security management remains chief technology concern.

PositionNews update

Information Security Management is expected to continue to have a powerful influence over business in 2007, according to the AICPA's 18th Annual Top Technology Initiatives survey conducted in Dec. 2006. For the fifth consecutive year, the survey identified information security as the technology initiative likely to have the greatest effect in the upcoming year (intbtech.aicpa.org/Resources/Top+Technology+Initiatives).

A related initiative, Identity and Access Management, jumped from sixth place in 2006 to second in 2007. Privacy Management also nudged its way up from fifth to fourth place, while four new initiatives made their debut in this year's top 10.

"This top technology survey provides the CPA's unique perspective regarding the impact of technology on financial management and the fulfillment of other fiduciary responsibilities, such as the safeguarding of business assets, oversight of business performance and compliance with regulatory requirements," said AICPA President and CEO Barry Melancon.

In addition to its Certified Information Technology Professional credential holders and IT Section members, the AICPA collaborated with the Information Technology Alliance and ISACA, as their members share similar perspectives on the top technologies impacting business today. More than 1,500 participants ranked the 30 technology initiatives they felt will have the most significant impact in the next 12 to 18 months.

The 10 most important technology initiatives for 2007 are (new items are described):

  1. Information Security Management

  2. Identity and Access Management

  3. Conforming to Assurance and Compliance Standards

  4. Privacy Management

  5. Disaster Recovery Planning and Business Continuity Management

  6. IT Governance

  7. Securing and Controlling Information Distribution (new): Protecting and controlling the distribution of digital data (i.e., enabling secure distribution and/or preventing illegal distribution and access to protected information).

  8. Mobile and Remote Computing (new): Technologies that enable users to securely connect to key...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT