3 Steps Audit Committees Can Take To Enhance Cybersecurity

Serge Jorgensen
6/9/2025
3 Steps Audit Committees Can Take To Enhance Cybersecurity

See how audit committees can help strategically improve cybersecurity oversight to protect business interests amid rising digital threats.

Cybersecurity incidents have reached staggering levels, with the annual impact estimated to reach $10.5 trillion in 2025. In the current threat environment, cybersecurity requires strategic oversight and governance from the highest levels of an organization, including audit committees.

As the frequency and sophistication of cyberattacks continue to escalate, audit committees can be involved in oversight, which requires a delicate balance of risk mitigation, budget allocation, and return on investment. During its recent “Financial Services Audit Committee Overview” webinar, the Crowe team covered three ways audit committees can enhance their cybersecurity oversight to better protect business interests.

Listen to the full session
Financial Services Audit Committee Overview

1. Understand the who, why, and how of the cyberthreat environment

Threat actors are groups or individuals that seek to exploit security loopholes and cause digital harm, and they come in many forms. Nation-state actors might engage in cyber espionage and sabotage to advance geopolitical agendas. Organized crime actors, often as well-funded and skilled as nation-states, might use ransomware, fraud, or data theft to increase their financial reserves. With hacking tools and services increasingly accessible, even individual fraudsters can cause significant damage to an organization. The rise of AI and machine learning allows threat actors to automate attacks and adapt to defenses more rapidly.

In this environment, audit committees need to grasp the spectrum of threats facing their organization, from commodity malware to targeted attacks, as well as how those threats could affect the organization’s financial performance, intellectual property, and reputation. This knowledge is essential to guide strategic decisions related to cybersecurity investments and risk management.

2. Advocate for layered core cybersecurity controls

No single solution to cybersecurity challenges exists, but organizations can significantly reduce their risk by fully implementing a set of core controls that provide a layered defense against common threats. Audit committees can advocate adopting a comprehensive strategy with a measured, integrated, and risk-based approach to these controls. The strategy should include implementation of preventive measures and concepts such as these:

  • Endpoint detection and response (EDR) monitors end-user devices like laptops and mobile phones to identify, block, and alert users about malicious activity. As remote work has expanded the attack surface, risk-aware EDR deployments have become increasingly important to prevent compromised devices from serving as entry points for attackers.
  • Multifactor authentication (MFA) adds an extra layer of protection beyond passwords, requiring users to provide a second form of verification, such as a code from a mobile app or a biometric scan. MFA makes it harder for attackers to gain unauthorized access to accounts and systems, but many single-factor authentication and non-Active Directory-integrated routes still exist that must be identified and carefully monitored. Once in a network, threat actors routinely exploit current accounts and passwords. Security of these accounts is less about password change frequency or strength and more about detection of potential misuse and the subsequent response.
  • Regular data backups remain crucial to help organizations recover in the event of a ransomware attack or other disruption. Beyond just backups, the restoration process and reintegration of systems and applications should be tested to accurately predict restoration processes and time frames.
  • An incident response plan (IRP) can help minimize the impact of a successful cyberattack. The plan should define clear roles and responsibilities, communication protocols, and step-by-step procedures for containing an incident, investigating the cause, and restoring normal operations. A strong IRP supporting aggressive containment measures provides tools to help the security team respond quickly and effectively.
  • Security-by-design solutions build cybersecurity into the fabric of the network (for example, segmentation) or product (for example, logging and monitoring) itself, offering added protections that can complement other controls, improve efficiency, and reduce integration complexity.

Sophisticated threat actors are adept at finding and exploiting gaps in defenses, so even a small number of missing controls or misconfigurations can exacerbate the impact of a cyberattack. Audit committees should request evidence sufficient to identify the gaps and to verify that cybersecurity controls are not only present but deployed comprehensively across the enterprise, properly implemented, and regularly tested.

3. Facilitate cross-functional cooperation

Strong cybersecurity doesn’t happen in a vacuum; it takes cross-functional teamwork among a variety of departments, including IT, security, finance, legal, leadership, and the various business units. As the primary stewards of financial integrity and risk management in an organization, audit committees are uniquely positioned to help align cybersecurity with broader business objectives, allocate adequate resources to protect critical assets, and foster an environment of shared responsibility and collective vigilance.

Collaboration can enhance and fortify an organization’s cybersecurity posture by bringing together diverse perspectives from across the business. IT and security teams offer an extensive technical background as well as a deep understanding of the threat landscape. Finance and audit professionals contribute their combination of risk management experience and financial oversight. And legal departments provide necessary guidance to help make sure cybersecurity measures align with regulatory requirements.

This united approach allows organizations to establish a comprehensive cybersecurity strategy that balances risk mitigation, operational efficiency, and business objectives. However, this strategy is not a “one and done” exercise. To be truly effective, businesses should use these cross-functional teams to regularly review the core controls and make needed adjustments, which can help them stay ahead of emerging threats.

As the frequency and sophistication of cyberattacks continue to rise, organizations must be diligent about taking steps to mitigate risks and protect their operations, reputation, and financial stability. Audit committees play a vital role in this effort by providing oversight and guidance to support giving cybersecurity the attention and resources it requires.

Contact us

Our team works hard to demystify cybersecurity and help our clients understand what they can do to improve their security posture. Contact us today to find out more about our pragmatic, customized approach.

Serge Jorgensen
Serge Jorgensen
Principal, Cyber Consulting; Office Managing Principal, Sarasota and Tallahassee