For this assignment, I attended the Accounting and Information Systems Networking Mixer in September. Before the panelists gave their presentations, there was a mixer where I spoke to various people in the fields of robotics accounting, robotics auditing, artificial intelligence, and MIS/technologies. These are not fields that I am interested in pursuing, but I thought it would be interesting to hear about. The panelists were Thomas Bartos, James Marino, and Dan Desko. Thomas Bartos is the chief financial officer of the artificial intelligence firm, Cognistx. James Marino is the process improvement consultant at PNC, as well as, the accounting and information systems adjunct instructor here at Chatham University. Dan Desko is an audit, security, and risk professional at Schneider Downs.
Dan Desko spoke about cybersecurity and the challenges that accompany the job. An article by Security Magazine suggests that human error may be the weakest link in the fight against cyber vulnerabilities. It was said by famous cryptographer Bruce Schneier that professionals attack people, not machines. According to the Cyber Risk Culture Survey, more than 90% of all successful corporate cyberattacks that occurred in 2017 happened because of employee error. Security lapses are not always a result of employees trying to sabotage the company. They are often a result of ignorance on the proper ways to protect themselves and their corporate network. In order to fix this issue, companies should enforce employee training and implement proper vetting protocols.
James Marino is the instructor for accounting and information systems at Chatham University. In our textbook, accounting is defined as the process of measuring and summarizing business activities, interpreting financial information, and communicating the results to management and other decision makers. Accounting is often referred to as “the language of business” because it communicates so much information to owners, managers, and investors. In the chapter about information systems in our textbook, the author describes a number of systems used for different reasons. Operations support systems are used by lower level managers that run day-to-day operations. There are also transaction processing systems that receive data and converts them into information for various users. These are just two examples of different information systems.
No comments:
Post a Comment