Toby DeRoche Toby DeRoche

Network Architecture and Security Auditing

Network architecture remains a critical component of technology risk, even as traditional perimeters dissolve and cloud adoption accelerates. While identity has become a primary control plane, networks still define trust boundaries, constrain lateral movement, and influence how quickly incidents can spread. Weak network design or ineffective network security controls can magnify the impact of compromised credentials, misconfigurations, or malicious activity.

Advanced IT auditing evaluates networks not as static diagrams, but as dynamic environments that shape how risk propagates across systems and users.

Read More
Toby DeRoche Toby DeRoche

AI-Driven Cybersecurity Risks

Cybersecurity risk is evolving faster than most audit plans. The biggest shift is not the appearance of entirely new threats, but the speed, scale, and autonomy with which existing threats are now executed. Artificial intelligence, automation, and advanced social engineering are compressing attack timelines and exposing gaps in traditional control frameworks.

Read More
Toby DeRoche Toby DeRoche

AI Is Going to Complicate SOX

The rapid deployment of artificial intelligence in corporate environments is creating conditions that resemble the environment that existed before the reforms introduced by the Sarbanes-Oxley Act. Before SOX, financial reporting systems often relied on assumptions about how spreadsheets, reconciliations, and internal processes worked. Controls existed, but many were informal, undocumented, or inconsistently tested. SOX forced organizations to abandon that mindset. Nothing could be assumed. Controls had to be documented, tested, and repeatedly validated to demonstrate that financial reporting was reliable.

Read More
Toby DeRoche Toby DeRoche

Cybersecurity Threats and Technical Control Testing

Cybersecurity risk has become one of the most visible and consequential technology risks organizations face. High-profile breaches, ransomware incidents, and supply chain attacks have demonstrated that even well-funded security programs can fail. For advanced IT auditors, the challenge is not simply understanding cybersecurity concepts, but evaluating whether technical controls are effective against realistic threats.

Advanced IT auditing approaches cybersecurity through a threat-informed lens. Rather than testing controls in isolation, auditors assess whether controls meaningfully reduce the likelihood or impact of the threats most relevant to the organization.

Read More
Toby DeRoche Toby DeRoche

Auditing the Future: Five Realities That Will Redefine IT Audit

IT auditors have traditionally been rewarded for identifying what went wrong. That capability remains essential, but it is no longer sufficient. As technology evolves faster than control frameworks, the value of audit will increasingly come from anticipating what could go wrong before risks fully materialize. The future of IT audit will be shaped by five emerging realities that distinguish forward-looking auditors from those relying on legacy approaches.

Read More
Toby DeRoche Toby DeRoche

Implications from the EU AI Act

Artificial intelligence is moving from experimentation to embedded business infrastructure. Regulators have taken notice. The European Union Artificial Intelligence Act, commonly referred to as the EU AI Act, is the world’s first comprehensive regulatory framework governing the use of AI. While it is an EU regulation, its reach extends well beyond Europe and directly impacts many of the organizations that internal auditors serve.

Read More
Toby DeRoche Toby DeRoche

Bridging the Gap Between InfoSec and IT Audit: From Misalignment to Measurable Assurance

Information Security and IT Audit teams are often described as partners, yet in many organizations, they operate more like parallel functions. They share high-level goals like protecting information, reducing risk, and supporting governance, but approach them with different languages, incentives, and success metrics. The result is a persistent disconnect that weakens both cybersecurity outcomes and audit assurance.

This gap is not caused by lack of skill or effort on either side. It is structural, and if it is not addressed intentionally, it leads to audits that check boxes without improving security, and security programs that struggle to demonstrate value to executives and boards.

Read More
Toby DeRoche Toby DeRoche

Arguing Audit Findings May Not Mean Disagreement

For many auditors, arguments over audit findings feel like an impasse. An argument can signal resistance, delay, or an attempt to weaken the report. In practice, however, disagreement is a normal and often healthy part of governance. Mature risk management environments allow space for challenge, judgment, and differing perspectives.

The key question is not whether disagreement occurs, but how it is handled and negotiated.

Read More
Toby DeRoche Toby DeRoche

The Future of Cybersecurity Is Humans vs AI

Cybersecurity has always been a contest between attackers and defenders. For decades, that contest was largely human versus human. Skilled attackers probed systems, and skilled defenders built controls, investigated alerts, and responded to incidents. That balance is now breaking.

The next era of cybersecurity is not human versus human. It is humans versus artificial intelligence.

Recent reporting highlights a turning point. AI is no longer just a defensive tool used by security teams. It is now actively being used by attackers to scale, automate, and adapt attacks at a speed and sophistication that traditional security models were never designed to handle. This shift fundamentally changes what “good security” looks like.

Read More
Toby DeRoche Toby DeRoche

Why Auditors Feel Bullied

Audit conflicts don’t come from “stupid questions”—they come from pressure, power dynamics, and misunderstandings. This article explains how empathy improves auditor–auditee relationships and leads to better audits.

Read More
Toby DeRoche Toby DeRoche

Consistently Managing Change Controls

A practical guide to consistently managing change controls, covering key risks, expected controls, SDLC requirements, and audit-ready testing steps to strengthen ITGC and prevent system failures.

Read More
Toby DeRoche Toby DeRoche

We Need Synergy in IT SOX Compliance

Sarbanes-Oxley (SOX) compliance requires more than just checking financial controls. It demands a seamless partnership between IT and business process auditors. Yet, many organizations still operate these functions in silos, leading to inefficiencies, compliance gaps, and even audit failures because no one has a complete view of the SOX program. Organizations must foster synergy between IT and business process auditors to ensure a robust SOX program. Luckily, we have a solution.

Read More
Toby DeRoche Toby DeRoche

Building Operational Resilience in the Corporate Environment: A Practical Guide

Operational resilience has become a board-level priority. Customers expect uninterrupted service. Regulators expect strong controls. Investors expect stability. In this environment, disruptions — whether caused by cyberattacks, supply chain failures, natural disasters, system outages, or vendor failures — can harm revenue, damage brand reputation, and weaken market confidence.

Read More
Toby DeRoche Toby DeRoche

The Governance Problem in Cybersecurity

Cybersecurity without governance will fail. Organizations have responded to cyber threats for years by investing in more tools—firewalls, endpoint detection, SIEM solutions, and AI-powered threat intelligence. Yet, data breaches and security failures continue to rise. Why? Cybersecurity is often treated as an IT issue rather than a governance issue.

Read More
Toby DeRoche Toby DeRoche

Data Loss Prevention - A Simple Guide

Data Loss Prevention (DLP) is one of the most misunderstood cybersecurity topics.
It sounds complex, expensive, and “too advanced” especially for small businesses, and many teams think it’s only relevant to large enterprises.

Read More
Toby DeRoche Toby DeRoche

Vendor Risk and SOC 1 Report Requirements

By proactively refining SOC 1 report management and vendor risk processes, organizations can effectively mitigate risks, streamline compliance efforts, and maintain strong audit outcomes. The time to adapt these enhanced processes is now—before unexpected audit findings emerge.

Read More
Toby DeRoche Toby DeRoche

Internal Audit’s Key Risk Areas for 2026

As organizations enter 2026, internal audit functions are operating in an environment defined by accelerating change, uncertainty, and heightened expectations. Traditional risk areas have not disappeared, but they are being reshaped by digital disruption, geopolitical volatility, regulatory expansion, and rising stakeholder demands. Internal audit is expected not only to provide assurance, but to help organizations anticipate what comes next and build resilience before disruption occurs. Recent industry analysis highlights a set of risk areas that should shape internal audit planning over the next several years. These risks require a more agile, forward-looking audit approach that balances established assurance responsibilities with emerging threats that are evolving faster than annual audit cycles.

Read More
Toby DeRoche Toby DeRoche

Top 5 Cybersecurity Risks

Cybersecurity in 2026 is entering a new phase—one defined by identity-based attacks, AI-driven threat actors, and the accelerating complexity of digital ecosystems. Advisory and accounting firms across the Big 4 consistently highlight a similar set of emerging risks, each shaped by geopolitical pressure, rapid technology adoption, and widening gaps in governance.

Read More
Toby DeRoche Toby DeRoche

Access Management - User Access Reviews

User Access Reviews (UARs) are one of the most important identity governance controls in any cybersecurity program. They help prevent privilege creep, detect stale or risky accounts, and reduce the effectiveness of any cyberattack. They are also one of the most common controls that have issues in design and execution.

Read More