Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Name: David "Dave" Kim Emily Davis

Age: 38 39

Education: Master's in Accounting from the University of Illinois at Urbana-ChampaignCybersecurity from Georgia Tech, B.S. in Accounting Computer Science from Indiana University of Maryland

Professional Background:

  • 1215+ years of experience in public accounting, focusing on audit and assurance services for large commercial and public sector organizationsIT security, with a focus on threat detection, incident response, and vulnerability management.

  • Focus areas: Leading audit teams, managing client relationships, developing audit plans, executing audit procedures, and reviewing workpapersCybersecurity strategy, security operations, risk management, compliance, and security awareness training.

  • Previous roles: Audit IT Security Manager at a Big Four accounting firm, Senior Associate at a national accounting firm, Staff Accountant at a regional accounting firmlarge financial institution, Security Analyst at a cybersecurity consulting firm, Security Engineer at a technology company.

  • Special certifications or skills: Certified Public Accountant (CPAInformation Systems Security Professional (CISSP), Certified Internal Auditor Ethical Hacker (CIACEH), Project Management Professional (PMPSANS GIAC certifications (e.g., GCIH, GCIA)

Industry: Accounting and Audit Varies depending on the organization's focus

Responsibilities:

  • Plan and execute audit engagements, overseeing the work of audit teams and ensuring adherence to professional standards and deadlines.

  • Manage client relationships, addressing client concerns and questions, and providing updates on audit progress.

  • Review audit work papers for accuracy, completeness, and compliance with auditing standards.

  • Identify and assess audit risks and control deficiencies, and develop recommendations for improvement.

  • Mentor and develop junior audit staff, providing guidance and feedback on their work.

Goals:

  • Deliver high-quality audit services that meet or exceed client expectations and regulatory requirements.

  • Build strong relationships with clients and colleagues, fostering trust and collaboration.

  • Develop and mentor a high-performing audit team.

  • Advance within the firm and take on increasing levels of responsibility.

Challenges:

  • Balancing multiple audit engagements with tight deadlines and competing priorities.

  • Managing and motivating audit teams, especially during busy season.

  • Staying up-to-date on evolving auditing standards and regulatory requirements.

  • Communicating complex audit findings and recommendations to clients in a clear and concise manner.

Motivations:

  • Solving complex problems and uncovering the "truth" behind financial information.

  • Helping organizations improve their internal controls and financial reporting processes.

  • Building a successful career in public accounting and becoming a trusted advisor to clients.

  • Mentoring and developing junior audit staff and contributing to their professional growth.

Tech-Savviness:

  • Proficient in using audit software, data analytics tools, and collaboration platforms.

  • Comfortable with leveraging technology to automate audit procedures and streamline workflows.

  • Open to exploring new technologies that can enhance audit efficiency and effectiveness.

Behavioral Traits:

  • Detail-oriented and organized, with a strong focus on accuracy and quality.

  • Analytical and critical thinker, able to identify potential risks and weaknesses in financial information.

  • Excellent communicator and collaborator, able to build rapport with clients and team members.

  • Decisive and able to manage multiple priorities effectively.

Sources of Information:

  • Professional auditing standards and guidelines (e.g., PCAOB, AICPA).

  • Industry publications and research on audit and compliance (e.g., The Journal of Accountancy, Compliance Week).

  • Regulatory updates and guidance from relevant agencies (e.g., SEC, PCAOB).

  • Networking with other audit professionals and attending industry events.

Quote:

...

  • Develop and implement the organization's cybersecurity strategy and policies.

  • Oversee security operations, including threat monitoring, incident response, and vulnerability management.

  • Manage security tools and technologies, such as firewalls, intrusion detection systems, and endpoint protection.

  • Conduct regular security assessments and audits.

  • Develop and deliver security awareness training to employees.

Goals:

  • Protect the organization's critical assets and sensitive data from cyber threats.

  • Detect and respond to security incidents quickly and effectively.

  • Build a strong security culture within the organization.

  • Stay ahead of emerging threats and vulnerabilities.

  • Maintain compliance with relevant security standards and regulations.

Challenges:

  • Keeping up with the rapidly evolving threat landscape and sophisticated attack techniques.

  • Balancing security needs with business requirements and user experience.

  • Securing adequate resources and budget for cybersecurity initiatives.

  • Attracting and retaining skilled cybersecurity professionals.

Motivations:

  • Protecting the organization's reputation and customer trust.

  • Making a real difference in preventing cyberattacks and mitigating their impact.

  • Building a high-performing security team that is respected and trusted.

  • Staying at the forefront of cybersecurity innovation and best practices.

Tech-Savviness:

  • Highly tech-savvy with deep expertise in cybersecurity tools, technologies, and methodologies.

  • Proficient in using various security information and event management (SIEM) systems, threat intelligence platforms, and vulnerability scanners.

  • Able to analyze complex security data and identify potential threats.

Behavioral Traits:

  • Proactive and vigilant, always looking for ways to improve the organization's security posture.

  • Analytical and problem-solving mindset, able to quickly assess and respond to security incidents.

  • Strong communicator, able to explain technical security concepts to non-technical stakeholders.

  • Collaborative and team-oriented, able to work effectively with other IT and business teams.

Sources of Information:

  • Threat intelligence feeds and cybersecurity news sources.

  • Industry reports and research on cybersecurity trends and best practices.

  • Security conferences and workshops.

  • Networking with other cybersecurity professionals.

Quote:

"Cybersecurity is not just about technology; it's about people, processes, and a culture of security awareness. By working together, we can create a resilient security posture that protects our organization from even the most sophisticated threats."