Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Audit Guidelines

Welcome to the Audit Guidelines topic!

Collaborate, contribute, consume and create knowledge around topics such as Audit charter, independence (organisational and professional), engagement planning, Risk Assessment, sampling, reporting and follow-up activities.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
614 Members
3 Online
9746 Visits

 Recent Discussions

Getting Started with IS Audit. Posted by daud.ndubula.
3 ways to tick off auditors: interesting article. Posted by Marc Vael.
Inflation of IT controls and the cost of Assurance. Posted by ronald.vanerven@versatel.nl.

Community Leader

MeeraV
NEW! Participate in Discussions Via Email. 

You can now respond to discussions by simply replying to the email alert. Just enable this feature in discussions on this topic. Learn more

Discussions: 11 total

Must be a Topic member to contribute
View All »
I am an ICT Administrator and now I need to change my career and work as an IS Auditor. I passed my CISA exam December last year. Now, I am thinking about getting started with this new career. Could someone provide me with a guide on how to go about this ...
daud.ndubula | 2/25/2014 4:42:53 AM | COMMENTS(1)
Avoid these common mistakes to improve your chances for a smooth compliance auditEricka Chickowski, Contributing EditorFunny thing about auditors: They're not machines. They're people -- people who are capable of pet peeves and whose emotions can color th...
Marc Vael | 1/11/2014 1:39:55 AM | COMMENTS(5)
We've moved, for some time now, into the information era. Companies being made and broken by their information housekeeping and this rises the need for more control and oversight (transparancy) in this information housekeeping. This is done through contro...
ronald.vanerven@versatel.nl | 12/11/2013 2:10:50 AM | COMMENTS(0)
I need some guidelines in auditing the effectiveness of patch management
Yvonia551 | 8/2/2013 4:04:33 AM | COMMENTS(1)
Hi there I would like some guidelines and criteria to follow before and after implementing a Database...
svimlesh | 6/19/2013 10:40:44 PM | COMMENTS(0)
To all Audit Guidelines topic members,The Audit Guidelines topic is undergoing some changes. At the suggestion of ISACA’s Communities Committee and with approval by the community topic leaders, we will merge Audit Guidelines with Audit Standards. This mer...
Tammie111 | 11/28/2012 3:15:12 PM | COMMENTS(1)

Documents & Publications: 73 total

Must be a Topic member to contribute
View All »
ICQs and Audit Programs
Posted by ISACA 12 days ago
ICQs and Audit Programs
Posted by ISACA 12 days ago
ICQs and Audit Programs
Posted by ISACA 12 days ago
Downloads
Posted by ISACA 22 days ago
Books
Posted by ISACA 49 days ago

Events & Online Learning: 4 total

11 Mar 2013
14 Oct 2013
ISACA International Event
Boston, MA, USA
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 120 total

Volume 2, 2014
by M. Faisal Naqvi, CISA, AMBCI, CISSP, ISO 27000 A, ISO 27000 MI
Auditing is not a one-time exercise, but rather it is a continuous and ongoing process no matter what system or provider is in use.
Volume 2, 2014
by John H. White, Ph.D., CISA, CPA
IT professionals must be aware of the recent, important changes in the COSO framework.
Volume 2, 2014
by Jide Olakunle, CISA, CISM, CISSP
Cyberattacks and the resulting security breaches are part of the rapidly expanding security threats organizations face.
Volume 2, 2014
by ISACA Member and Certification Holder Compliance
An up-to-date listing of the current IT Audit and Assurance Standards, Guidelines, and Tools and Techniques
Volume 1, 2014
by Derek Mohammed, Ph.D., CISA, CISM
To reduce the number of PII data security breaches, organizations must embrace the concept of auditing for regulatory compliance and security for PII so that issues can be addressed preemptively.
Volume 6, 2013
by Antonio Ramos, CISA, CISM, CRISC, CCSK
Security audits and certifications are necessary, but not sufficient, conditions to build up trust relationships in cyberspace.

Wikis: 2 total

Blog Posts: 4 total

Must be a Topic member to view blog posts
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
15 Jan 2014
Posted By : masarker | 1 comments
Grupos de Estudio para Acreditaciones de JUNIO, SEPTIEMBRE Y DICIEMBRE 2013. Para los que esten interesados en la presentación del exámen de certificación CISA y CISM  o para cualquiera que desee comenzar a prepararse para estas o las próximas pruebas, pu...
Posted By : Alexander Osorio | 0 comments
19 Oct 2010
Hi, Having tried cisa exam twice without success, i think there is more to just reading the manual and scoring 100% on the cisa practice test. Its high time the association let us in on the approach to answering their questions not just feeding us with co...
Posted By : Chinedu276 | 13 comments