The Sarbanes-Oxley (SOX) Act of 2002 codified how enterprises must report and audit their financial information. According to Protiviti’s “2017 Sarbanes-Oxley Compliance Survey,” 72 percent of the companies surveyed had revenues of $1 billion or more in the past year. Furthermore, 78 percent of these organizations went beyond the requirement for the second year of SOX compliance, as reported by Help Net Security.

The Shifting SOX Compliance Landscape

The survey queried 468 chief audit executives, internal auditors and finance leaders in U.S.-based public companies across several industries. Respondents noted that Public Company Accounting Oversight Board (PCAOB) audit requirements, new revenue recognition standards and cybersecurity concerns were the main factors driving SOX compliance efforts.

As a result of the PCAOB’s stricter reporting requirements, compliance activities have grown more stringent over the past year. Seventy-five percent of those surveyed indicated that external auditors have become more demanding as a result of the new standard. Meanwhile, 64 percent noted an increased focus on evaluating deficiencies.

A new revenue recognition accounting standard will take effect in the next fiscal year, which will lead to additional shifts in the compliance process. Because of this, 26 percent of respondents pointed to an increased emphasis on testing controls for revenue recognition policies.

Cybersecurity Comes Into Focus

The survey also revealed a heightened level of awareness around cybersecurity, which led to more time and resources dedicated to compliance practices. Of the organizations that released security disclosures in 2016, nearly one-third increased the hours spent on SOX compliance by 16 percent.

No matter the size of the organization, the number of hours devoted to compliance rose roughly 60 percent last year. However, the report found that costs were going down even as the hours rose. Protiviti attributed this to the growth of external service providers, which caused associated costs to show up in business unit accounts rather than direct SOX compliance accounts.

SOX is no incidental regulation for businesses. In fact, it directly affects financial results. Hours devoted to compliance efforts may level off as an organization gains experience, but efforts will always need tweaking at the compliance landscape inevitably shifts over time.

More from

Security Awareness Training 101: Which Employees Need It?

4 min read - To understand why you need cybersecurity awareness training, you must first understand employees' outsized roles in security breaches. “People remain — by far — the weakest link in an organization’s cybersecurity defenses,” noted Verizon on the release of their 2022 Data Breach Investigations Report (DBIR). They elaborate that 25% of all breaches covered in the report were the result of social engineering attacks, and when you add human errors and misuse of privilege, the human element accounts for 82% of…

4 min read

Beyond Requirements: Tapping the Business Potential of Data Governance and Security

3 min read - Doom and gloom. Fear, uncertainty and doubt. The "stick" versus the "carrot". What do these concepts have in common? They have often provided the primary motivation for organizations’ data governance and security strategies. For the enterprise, this mindset has perpetuated the idea that data governance, data security and data privacy are reactive cost centers existing due to externally imposed requirements or mandates. Yet, what if data governance and security practices could upend the prevailing paradigm and demonstrate direct business value?…

3 min read

Protecting Against Remote Monitoring and Management Phishing

3 min read - You use remote monitoring and management (RMM) software to closely monitor your cyber environment and keep your organization safe. But now cyber criminals are specifically targeting these tools, causing legitimate software to become a vulnerability. This is the latest type of attack in an increase in a recent trend of disruptive software supply chain attacks. The Cybersecurity and Infrastructure Security Agency (CISA) recently released an alert about the malicious use of legitimate remote monitoring and management (RMM) software. Last fall,…

3 min read

Secure-by-Design: Which Comes First, Code or Security?

4 min read - For years, developers and IT security teams have been at loggerheads. While developers feel security slows progress, security teams assert that developers sacrifice security priorities in their quest to accelerate production. This disconnect results in flawed software that is vulnerable to attack. While advocates for speed and security clash, consumers must often pay the price when threat actors strike. 48% of developers admitted they were still shipping code with vulnerabilities in 2022. It’s clearly time for a change. Many believe…

4 min read