Using Internal Processes and Controls to Encourage Operational and Financial Growth: An HBK Risk Advisory Services Webinar

Date June 13, 2022
Article Authors

Date: June 22, 2022

Time: 10:00 – 11:00 am ET

Host: William J. Heaven, CPA/CITP, CISA, CSCP, Senior Director, with guest Tyler Gargano, CFE, Director of HBK Risk, Compliance, and Controls

Our June 22 webinar, “Using Internal Processes and Controls to Encourage Operational and Financial Growth,” will feature a discussion of how management can access internal functions to create efficiencies and strengthen internal processes and controls.

We will cover:

  • Operational excellence
  • Internal controls/internal frameworks
  • Resource utilization
  • Industry trends
  • Reporting functions
  • Company culture

HBK Risk, Compliance, and Controls offers solutions ranging from operational guidance to full audit procedures. We work to solve the question of “what keeps you up at night?” In our June 22 webinar, we will discuss process and control issues companies of all sizes face and how to mitigate the related risks through internal tailored solutions.

Register today!

Speak to one of our professionals about your organizational needs

"*" indicates required fields



Cybersecurity Insurance: Consider Your Options

Date November 26, 2019
Article Authors

As a cybersecurity professional, I’m often asked by clients if they should buy cybersecurity insurance. My answer is “definitely,” but not without considerations. For one, you should determine the value of what you are trying to protect. And when evaluating a policy, ensure that you are clear on exactly what the policy covers—and maybe more importantly, what it doesn’t.

Cybersecurity insurance policies come in many forms, from a “quick” cyber policy, where applying requires you only to answer three or four questions, to a full-length application policy. The protection level and policy costs vary accordingly; quick policies may include multiple coverage exclusions or costly gaps. For example, lack of applying security patches may trigger an exclusion pertaining to your coverage. If you implement a recognized cybersecurity control framework, you will likely be able to find policies with more coverage at lower costs. This could also help lower your probability of later being denied coverage under your cyber insurance policy by inadvertently answering a crucial application question incorrectly.

A follow-up question I often get: Can I mitigate my business’s cyber-risk through a cyber policy, or should I implement cybersecurity controls to improve my cybersecurity posture?

I posed the question to Joseph Brunsman, author of multiple published cyber insurance articles, and a book on cyber insurance, he stated, “Cyber insurance is a crucial component – but arguably the last component – in the defensive posture of business. I would prefer, as would the regulators who can bring sizable fines and consent orders, cyber insurers, and attorneys who specialize in post-breach litigation, that businesses do everything in their power to avoid a breach. After that first breach occurs, insurance companies begin to take a hard look at internal cybersecurity postures. Increasingly insurers are demanding specific controls be implemented as a prerequisite to coverage. If businesses fail to adopt the correct posture, they could quickly find themselves with no recourse but to pay for every breach out of pocket. Taken as a whole, businesses need to consider their cybersecurity posture now; while it’s convenient, and before it’s mandatory.”

HBK Risk Advisory Services can help develop and implement a cybersecurity program that fits your organization’s risk appetite and budget. Our assessment will offer a road map for continual improvement through cost-effective solutions. Call us at 330-758-8613, or email me at wheaven@hbkcpa.com for more information or to schedule an assessment. As always, we’re happy to answer your questions and discuss your concerns.
Speak to one of our professionals about your organizational needs

"*" indicates required fields