-
Financial statements audits
Financial statement audits
-
Compliance audits
Compliance audits
-
Compilations and reviews
Compilations and audit
-
Agreed-upon procedures
Agreed-upon procedures
-
Corporate and business tax
Our trusted teams can prepare corporate tax files and ruling requests, support you with deferrals, accounting procedures and legitimate tax benefits.
-
International tax
Our teams have in-depth knowledge of the relationship between domestic and international tax laws.
-
Tax compliance
Business Tax
-
Individual taxes
Individual taxes
-
Estate and succession planning
Estate and succession planning
-
Global mobility services
Through our global organisation of member firms, we support both companies and individuals, providing insightful solutions to minimise the tax burden for both parties.
-
Sales and use tax and indirect taxes
SUT/ VAT & indirect taxes
-
Tax incentives program
Tax incentives program
-
Transfer Pricing Study
The laws surrounding transfer pricing are becoming ever more complex, as tax affairs of multinational companies are facing scrutiny from media, regulators and the public
-
Business consulting
Our business consulting services can help you improve your operational performance and productivity, adding value throughout your growth life cycle.
-
Forensic and investigative services
At Grant Thornton, we have a wealth of knowledge in forensic services and can support you with issues such as dispute resolution, fraud and insurance claims.
-
Fraud and investigations
The commercial landscape is changing fast. An ever more regulated environment means organizations today must adopt stringent governance and compliance processes. As business has become global, organizations need to adapt to deal with multi-jurisdictional investigations, litigation, and dispute resolution, address the threat of cyber-attack and at the same time protect the organization’s value.
-
Dispute resolutions
Our independent experts are experienced in advising on civil and criminal matters involving contract breaches, partnership disputes, auditor negligence, shareholder disputes and company valuations, disputes for corporates, the public sector and individuals. We act in all forms of dispute resolution, including litigation, arbitration, and mediation.
-
Business risk services
We can help you identify, understand and manage potential risks to safeguard your business and comply with regulatory requirements.
-
Internal audit
We work with our clients to assess their corporate level risk, identify areas of greatest risk and develop appropriate work plans and audit programs to mitigate these risks.
-
Service organization reports
As a service organization, you know how important it is to produce a report for your customers and their auditors that instills confidence and enhances their trust in your services. Grant Thornton Advisory professionals can help you determine which report(s) will satisfy your customers’ needs and provide relevant information to your customers and customers’ auditors that will be a business benefit to you.
-
Transactional advisory services
Transactions are significant events in the life of a business – a successful deal that can have a lasting impact on the future shape of the organizations involved. Because the stakes are high for both buyers and sellers, experience, determination and pragmatism are required to bring deals safely through to conclusion.
-
Mergers and acquisitions
Globalization and company growth ambitions are driving an increase in M&A activity worldwide as businesses look to establish a footprint in countries beyond their own. Even within their own regions, many businesses feel the pressure to acquire in order to establish a strategic presence in new markets, such as those being created by rapid technological innovation.
-
Valuations
We can support you throughout the transaction process – helping achieve the best possible outcome at the point of the transaction and in the longer term.
-
Recovery and reorganization
We provide a wide range of services to recovery and reorganisation professionals, companies and their stakeholders.
By now, most senior-level executives have heard that either you have had a data breach or you just don’t know that you’ve had a data breach. Cyberattacks are now as much a part of doing business as taxes and financial statements and they are getting expensive. According to the 2015 U.S. Cost of a Data Breach Study by the Ponemon Institute, in 2014 there was an 11% increase in the total cost of a data breach, to a $217 average per lost or stolen record, a clear reminder that organizations need to make a priority of addressing cybersecurity risks. For those companies with audit committees, that subset of the board has seen its role expand as it works to identify key areas of risk. After all, cybersecurity risks are no different from any other kind of enterprise risk, and the audit committee’s charter is to understand a business and its objectives, then identify suitable ways to address risks that threaten the business or its goals.
That said, cybersecurity is a daunting arena, so audit committees should educate themselves about cyberrisks in the same fashion that they educated themselves about addressing risks as required by the Sarbanes-Oxley Act, drastic changes to a given market or product, or any major category of risk facing the enterprise. Specifically, audit committees should become aware of their obligations and ask probing questions about the control environment that may jeopardize those obligations.
The audit committee is uniquely positioned to assess risks that threaten the enterprise. Indeed, a proper contemplation of cybersecurity risk necessitates that it be treated like another category of enterprise risk. Put differently, audit committees should leverage existing protocols (such as enterprise risk assessments, risk analyses, training protocols, monitoring and reporting mechanisms, and the like) to ensure that these risks are adequately addressed. To illustrate just one of these points, the audit committee already interacts with the CFO regularly for other risk management discussions; it should continue to do so for cybersecurity risk. This is especially true, given that the CFO is (statistically speaking) the officer most commonly associated with leading cybersecurity efforts. (Grant Thornton LLP recently collaborated with the Financial Executives Research Foundation on a study focused on the CFO’s role in cybersecurity, which revealed that 38% of all cybersecurity initiatives are actually run by the CFO).
Prevention and incident response
While the primary cybersecurity consideration for any organization remains prevention, more and more companies recognize that a security compromise is eminently more likely than it used to be. Accordingly, being prepared to respond to a security compromise or breach is quickly becoming of equal importance. An audit committee can and should play a strong role in both prevention and incident response, but to do so require a certain level of baseline understanding combined with the ability to ask detailed questions to management about the processes and controls in place.
Basic fact-finding questions might include the following:
- Where is our sensitive data stored?
- Are we including payment information, health information, intellectual property, R&D, and customer and vendor information in our definition of sensitive data?
- What data leaves the company, how does the data leave, and to whom is it transmitted?
- Have we performed a vulnerability assessment to identify our information security exposures?
- Have we evaluated our third-party vendors and partners for exposure to sensitive data?
- Who is authorized to log into our network and from which platforms?
- What measure of insurance has the company secured, and which department(s) completed and reviewed those applications for coverage?
- What are our policies and procedures related to employees’ use of personal devices to access company systems and sensitive data?
- How does the organization educate its employees on their obligations related to the handling of sensitive information?
In terms of how well an organization is positioned to respond to a security incident, such as the protocols to follow if sensitive data is compromised, the audit committee should ask three basic questions to management to assess risks:
- Does the company have an incident response plan or program?
- If the answer is yes, has the company ever tested the plan (before it’s needed in a live-fire situation)?
- If that answer is a yes, what is the company doing to ensure that its plan remains current and adequate to the risk it faces as an industry and a regulated entity?
Within each of those questions are several nuances. Moreover, the answers to these questions allow for a proper series of follow-up questions related to insurance (i.e., insurable versus uninsurable), the treatment of third parties that handle sensitive data, the applicability of the attorney-client privilege, technology investments and ongoing management, policy and procedure considerations, training and awareness issues, and other key considerations. All these elements need to be aligned to enable a company to cope properly with cybersecurity risk.
Cybersecurity and the SEC
An audit committee needs to be conversant with any matters that might require disclosure in SEC filings, especially in light of the recent news that cybersecurity has been listed by the SEC as a top examination priority during 2015. Indeed, the SEC staff has stated that investors cannot make informed investment decisions without knowing about material actual or potential cyber threats facing a given registrant. Audit committees would do well to increase their scrutiny of cybersecurity in the following areas related to financial statement filings:
- Forms 10-K and 10-Q and other SEC filings regarding risk factors: If risks are deemed significant enough to make investment in a registrant speculative, they must become part of the disclosure regimen. Cybersecurity risks should be considered as a category within this regimen, and the SEC appears from recent decisions to be less accepting of generic risk statements in this area. Some care should be taken to delve into the probability of cyber incidents, the impact of such incidents if they were to occur and the level of preventive measures undertaken by the registrant to deal with the same.
- Management’s discussion and analysis portion: Registrants that do not outline what they are doing in this arena risk facing tough questions from regulators and potential litigants, especially if they are experiencing and defending against material cyberattacks and/or incurring material costs to prevent such attacks.
- The legal proceedings section of the Form 10-K: This area would have to include any material litigation or regulatory incidents related to cybersecurity incidents.
- Various other financial statement disclosures: Additional areas for consideration include but are not limited to remediation costs, reputational damage, liability for stolen information, increased preventive costs (insurance, technology investments and the like) and so on.
Newer issues: Insurance and the law
Issues regarding the topic of cybersecurity, like methods of cybersecurity, are ever-changing. The case law related to cyber insurance, for example, is still developing, yet a pattern is emerging that merits attention by organizations obtaining cyber insurance policies. Simply put, great care should be paid to the policy application itself, including any warranties presented to the underwriter that are related to internal controls in place to address information security. A recent court decision (Columbia Casualty Company v. Cottage Health System) highlights this issue clearly. There, an underwriter cited an exclusion that precludes coverage because of the policyholder’s “failure to follow minimum required practices.” According to the underwriter’s complaint, the defendant “permitted anonymous user access, thereby allowing electronic personal information to become available to the public via Google’s Internet search engine,” thereby voiding the coverage provided by the insurer.
The case reflects the care that companies must undertake to ensure that policy applications be scrutinized carefully for inaccuracies and misstatements. Any daylight between the warranties provided and facts that later reveal a deficient practice might result in a claim that falls outside of coverage.
In summation
With the SEC heightening its scrutiny of organizations’ cybersecurity processes and new technologies also creating new channels for cyberattacks, the need is greater than ever for audit committees to be a more integral part of cybersecurity management efforts. Involving the audit committee after a data breach severely limits its ability to add value to the process and puts the organization at a tremendous disadvantage. Cybersecurity risk has evolved to the level where it should be addressed every bit as seriously as any other substantial enterprise risk, such as a change to the regulatory environment or a sweeping industry mandate.