Stay connected: follow us on LinkedIn and explore more at
www.CherryHillAdvisory.com.

Subscribe now to join the Risk Register community:
Cybersecurity oversight has become a central concern for boards, regulators, and executive leadership teams. As organizations become more dependent on digital systems and interconnected vendors, cyber risk now sits alongside financial and operational risks as a key governance priority.
Recognizing this shift, the Institute of Internal Auditors introduced a Cybersecurity Topical Requirement as part of the updated Global Internal Audit Standards. The purpose of the requirement is not to turn internal audit into a technical security function. Instead, it provides a framework for evaluating whether cybersecurity is governed, managed, and controlled effectively within the organization.
The topical requirement organizes cybersecurity oversight into three core areas:
For internal audit teams, the challenge is translating those requirements into practical audit procedures. The checklist below provides a structured way to evaluate cybersecurity programs through the lens of the topical requirement.
The first area focuses on how cybersecurity is governed within the organization. Internal audit should evaluate whether leadership oversight, accountability, and policy structures support effective cybersecurity management.
A checklist for internal audit should include:
Evidence may include governance charters, board reporting materials, cybersecurity policies, and documentation of management oversight.
The second area focuses on how the organization identifies, assesses, and prioritizes cybersecurity risks. Internal audit should evaluate whether management has a structured process for identifying cyber threats, prioritizing exposures, and communicating risks to leadership.
A checklist for internal audit should include:
Evidence may include risk assessment documentation, cyber risk registers, escalation procedures, vendor risk reviews, and records of management oversight.
Cyber risk management also extends beyond internal systems. Many organizations rely heavily on vendors and technology partners, making third party exposure a critical component of the risk landscape, which may also be evaluated under the Third Party Risk Management Topical Requirement.
The third area evaluates the safeguards and operational controls designed to protect the organization’s systems and data.
Internal audit should evaluate whether cybersecurity controls are designed and implemented to protect systems, data, and technology infrastructure.
A checklist for internal audit should include:
When viewed collectively, these procedures allow internal audit teams to evaluate cybersecurity oversight across the three core areas outlined in the Cybersecurity Topical Requirement: governance, risk management, and controls.
Embedding these procedures within the internal audit plan allows organizations to assess cybersecurity risk in a structured and repeatable way. It also helps ensure that cybersecurity oversight receives the same level of documentation and scrutiny as other critical risk areas.
Cherry Hill Advisory works with internal audit leaders, audit committees, and executive teams to evaluate cybersecurity governance, strengthen risk oversight structures, and align audit programs with evolving professional standards.
We have a more detailed cybersecurity Topical Requirements audit checklist, which you can download to support your internal audit planning.
If you would like to assess your organization’s Topical Requirements readiness , we invite you to schedule a consultation with us.
Subscribe now to join the Risk Register community: