This site uses cookies to store information on your computer. Some are essential to make our site work; others help us improve the user experience. By using the site, you consent to the placement of these cookies. Read our privacy policy to learn more.

Risk management & internal control

About this topic

Based on the CGMA Competency Framework, these resources allow you to focus on technical, business, people, leadership, and digital skills. All areas are underpinned by the need for ethics, integrity and professionalism. Log in and start learning today.

Manage your CPD record here.

Assess your skills

Take a self-assessment to evaluate your skills and find related learning activities.

Get started

7 Benefits of Cybersecurity Penetration Testing

This blog post shares seven benefits of this type of vulnerability assessment.

Article Governance Foundational

Building the crisis-ready board

This article suggests six key areas to focus on to make sure your company is as capable as possible of managing a crisis.

Article Risk response & reporting Advanced

The value of risk interviews as part of ERM strategy

This article describes risk interviews and discusses the value of such interviews.

Article Risk identification & assessment Intermediate

Human rights risks in the supply chain

This article describes what to look for when choosing a third-party supplier.

Article Risk management policies & procedures Intermediate

4 Critical Reasons Startups and Smaller Organizations Need Internal Control

This blog post outlines a few of the many significant benefits of a strong internal control system.

Article Internal control Foundational

How to be street smart when budgeting for security

This article provides 5 tips which will help organizations fit security spending into their budgets in a balanced way.

Article Information systems environment Foundational

Phishing Scams Target Tax Professionals

As cybercriminals become more sophisticated tax practitioners should take a number of steps to protect themselves and their clients. This article explains what to do.

Article Practice management & professional standards Foundational

How to manage third-party risk

This article explores the risks associated with outsourcing to third-party vendors and how to manage it.

Article Risk response & reporting Foundational

3 Steps to Mitigate and Respond to a Security Breach in the Cloud

This blog post presents three steps to take to address cloud computing security.

Article Information security & privacy Intermediate

Strategies for combating payroll fraud

This article shares tips on how to prevent and detect payroll fraud.

Article Risk identification & assessment Intermediate

5 Low- or No-Cost Ways for CPAs to Help Slam the Door on Cybercriminals

Cybersecurity is costly, and budgets are always limited This blog post discusses five simple steps CPAs can take to help protect data without breaking the bank.

Article Information security & privacy Intermediate

Keeping clients’ tax data secure

This article describes procedures preparers should take to help thwart identity thieves.

Article Identity theft & fraud Intermediate