August 20th, 2021 by Admin
Why are we issuing this Consultation Paper?
This Consultation Paper (CP) seeks public comment on our proposals for regulating Security Tokens. These proposals are designed to provide a regulatory regime for activities relating to Investments that:
a)are a digital representation of rights and obligations, created, stored and capable of being transferred electronically – using distributed ledger technology (DLT) or similar technology; and (more…)
August 20th, 2021 by Admin
As we all are aware about that the season of Statutory Bank Audits is on its verge. It’s the time when
professionals are getting the straps of their boots ready to have a crisp walk. I thought it desirable to
pen down a few things, which are basic and my experience of Bank Audits and having worked in
banking industry post qualification and experiences with two of the big banks (StanC and Axis Bank)
and having done the Statutory Bank Audits of PSU Banks.
August 20th, 2021 by Admin
In this 2020 edition of our annual review of issues affecting audit committees during the year‑end audit cycle, we summarize key developments for audit committees to consider. With the changing risk landscape, the audit committee’s
role continues to grow more demanding and complex amid the pandemic and a dynamic and fluid business environment.
This report will assist audit committees as they proactively address recent and upcoming developments in financial reporting, tax, the regulatory landscape and risk management.
The Securities and Exchange Commission (SEC or the Commission) staff continues to encourage audit committees to maintain the right “tone at the top” to create an environment and culture that supports the integrity of the financial reporting process. Additionally, stakeholders are requiring businesses to provide more disclosures for a variety of reasons.
August 19th, 2021 by Admin
Defining and communicating your Board’s Information Risk Regime is central to your organisation’s overall cyber security strategy. The National Cyber Security Centre recommends you review this regime – together with the nine associated security areas described below, in order to protect your business against the majority of cyber attacks.
August 19th, 2021 by Admin
The expectations for the year 2020 are massive, as major world events underscore mounting geopolitical tensions. The United States will elect a president, Tokyo will host the Olympics, and renewable energy is anticipated to outcompete fossil fuels. Likewise, this time of economic uncertainty and increased competition across industry is contributing to the rise of digital transformation. Unprecedented innovations have been promised to us. Commercial space programs will take us to Mars, we will control devices with microchips implanted in our brains, and cars will be fully autonomous. Whether the above will come to fruition, one thing is for certain: the transformational benefits of next-generation technology are here.
Leaders are investing in digital transformation to increase competitive advantages, drive operational efficiencies, and grow market share. Leading-edge technology companies are manufacturing products faster, advancing logistics processes, and filling talent gaps. Alongside this rapidly scaling digitalization is organizational convergence. Enterprises are aggressively expanding through mergers and acquisitions, and evolving across geographical markets and industry. All the while, threat actors continue to challenge innovative security systems, uncovering gaps and slipping into the globally connected landscape the world is constructing. Organizations that prepare for uncertainty and approach their digital transformation with a security-focused mindset will be better positioned to survive this increasingly hostile connected ecosystem.
Today’s leaders must approach their security challenges with the same imagination, agility, and tenacity as their adversaries.
Unless otherwise indicated, Copyrights and Intellectual Property Rights of the documents, reports in this section of the website are under ownership of the original authors. Readers and Users of the information in the form of documents, reports and requested to comply with More..