
Cybersecurity isn’t just an IT problem. For internal auditors, it's a growing pressure point — one they’re expected to weigh in on, even if they don’t hold the technical keys. But with the introduction of the IIA’s new Cybersecurity Topical Requirement, that expectation is becoming an obligation.
So how can audit teams contribute meaningfully to cyber risk oversight when they’re not the ones managing firewalls or scanning for intrusions? The answer lies in something deceptively simple: better collaboration.
Cybersecurity is different from other enterprise risks. It’s fast-moving, highly technical, and, unlike most risks, you have to get it right every single time. The consequences of failure — financial, reputational, and operational — are often severe.
But for internal auditors, there’s a catch: we don’t own this risk. We’re supposed to provide objective assurance, but when it comes to cybersecurity, it’s hard to give assurance on things you can’t fully see or don’t fully understand. And that creates a knowledge and visibility gap that many audit teams struggle to close.
To help address this, the Institute of Internal Auditors has introduced a Cybersecurity Topical Requirement, which will become mandatory in 2026. It doesn't prescribe how to audit cybersecurity in detail — instead, it sets a baseline. It ensures that when internal audit says “we’ve audited cybersecurity,” that actually means something.
At a high level, the requirement asks auditors to:
Most functions are already doing parts of this — but documentation and consistency are where many fall short. That’s where the opportunity lies.
If audit is the third line of defense, the second is usually a combination of IT security, compliance and risk teams. And these relationships can be tense.
In some organizations, InfoSec teams are hesitant to let audit in. They say, “We’re already testing our own controls,” or “We know our systems better than anyone.” While those statements may be true, they miss the point. Independent validation isn’t a challenge to ownership, it’s a safeguard.
And when those walls stay up, real risks get missed. It’s only after a breach that both sides realize just how much they could’ve benefited from tighter coordination.
Audit and InfoSec don’t need to merge roles. But they do need to build trust, align on goals, and communicate regularly, not just after something goes wrong. High-performing audit teams are starting to shift left — getting involved earlier in the process, not just showing up after the incident or implementation.
This doesn’t mean taking over InfoSec’s job. It means:
This kind of partnership pays off. Not only does it improve cyber resilience, but it also gives internal audit more credibility with stakeholders — and a seat at the table in cyber discussions.
One of the biggest barriers between audit and InfoSec isn’t mindset, it’s infrastructure. These teams often work in different systems, with different data, using different terminology. That fragmentation slows everything down: risk identification, reporting, response and trust-building.
Technology isn’t a silver bullet, but it’s a powerful enabler. When audit and InfoSec can access the same risk data, track issues through shared dashboards, and automate low-level work, two big things happen:
What to look for in enabling technology:
For auditors, these tools help close the knowledge gap. You don’t need to be a security engineer to understand risk posture when analytics, audit plans and control testing are integrated. And for InfoSec, working alongside audit no longer feels like an extra burden — it’s part of a coordinated effort.
The right tooling also supports growing expectations around documentation and defensibility. If your audit team needs to demonstrate alignment with the IIA’s Cybersecurity Topical Requirement, having a system that tracks activities, links evidence and maps to frameworks makes that achievable.
Internal audit doesn’t need to become technical experts in penetration testing or endpoint detection. But they do need to understand the risk well enough to ask the right questions — and spot when something doesn’t add up.
That means:
The most effective audit leaders aren’t just checking boxes. They’re helping shape how their organizations invest in cyber controls and measure their maturity. And they’re doing it in partnership with InfoSec — not in isolation from it.
Cybersecurity is evolving fast, and so is internal audit. The gap between the two is no longer just a missed opportunity, it’s a liability. But with the right relationships, frameworks, and tools, audit can play a critical role in keeping organizations secure, compliant and resilient.
Explore how the right tools can help internal audit teams work smarter, close risk gaps faster, and prepare for evolving standards like the IIA’s Cybersecurity Topical Requirement.