Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Audit Guidelines

Welcome to the Audit Guidelines topic!

Collaborate, contribute, consume and create knowledge around topics such as Audit charter, independence (organisational and professional), engagement planning, Risk Assessment, sampling, reporting and follow-up activities.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
732 Members
0 Online
10836 Visits

 Recent Discussions

DR plan Audit. Posted by AHMED359.
IS auditing and Evidence acceptance. Posted by Mohamed AR.
3 ways to tick off auditors: interesting article. Posted by Marc Vael.

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

MeeraV

MeeraV

Badge: Social

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 17 total

Must be a Topic member to contribute
View All »
I appreciate a help to find a guideline to review the organization DR plan, So I can have specific points to check it will be better if I have a reference/template anyone can share to use as a guideline. thanks,
AHMED359 | 10/27/2014 2:33:24 AM | COMMENTS(0)
I need to know to which extent the auditor can request an evidence of a control and refuse it as it's no clear enough, and what he should do if he can't verify this evidence, while the customer is not accepting the nonconformity
Mohamed AR | 10/1/2014 7:56:35 AM | COMMENTS(4)
Avoid these common mistakes to improve your chances for a smooth compliance auditEricka Chickowski, Contributing EditorFunny thing about auditors: They're not machines. They're people -- people who are capable of pet peeves and whose emotions can color th...
Marc Vael | 9/18/2014 6:43:03 AM | COMMENTS(7)
I am an ICT Administrator and now I need to change my career and work as an IS Auditor. I passed my CISA exam December last year. Now, I am thinking about getting started with this new career. Could someone provide me with a guide on how to go about this ...
daud.ndubula | 9/1/2014 4:32:29 AM | COMMENTS(3)
Greetings Everyone... Can any one give me some guidelines regarding auditing accounting / financial systems and what to look for within those systems.. any suggested guidelines or audit programs ? Thank you Ashraf
Ashraf.kh | 8/30/2014 11:26:14 AM | COMMENTS(2)
I am trying to determine whether IT general controls should be tested in the systems that capture and store audit evidence.  It has been my observation that reports that are used to make audit selections are tested for completeness and accuracy, especiall...
aak111 | 8/30/2014 5:59:23 AM | COMMENTS(0)

Documents & Publications: 70 total

Must be a Topic member to contribute
View All »
ISACA Guidelines
Posted by ISACA 14 days ago
ISACA Guidelines
Posted by ISACA 15 days ago
ICQs and Audit Programs
Posted by ISACA 72 days ago
ICQs and Audit Programs
Posted by ISACA 72 days ago
ICQs and Audit Programs
Posted by ISACA 72 days ago
ICQs and Audit Programs
Posted by ISACA 72 days ago

Events & Online Learning: 9 total

Journal Articles: 121 total

Volume 5, 2014
by ISACA Member and Certification Holder Compliance
An up-to-date listing of the current IT Audit and Assurance Standards, Guidelines, and Tools and Techniques
Volume 3, 2014
by Martin Schultz, CISA, CIA, Alexander Ruehle, CISA, CIA, and Nick Gehrke, Ph.D., CISA
Most approaches to process audits are antiquated and far from best utilizing the auditor’s capabilities or the potential of existing enterprise resource planning (ERP) data.
Volume 2, 2014
by M. Faisal Naqvi, CISA, AMBCI, CISSP, ISO 27000 A, ISO 27000 MI
Auditing is not a one-time exercise, but rather it is a continuous and ongoing process no matter what system or provider is in use.
Volume 2, 2014
by John H. White, Ph.D., CISA, CPA
IT professionals must be aware of the recent, important changes in the COSO framework.
Volume 2, 2014
by Jide Olakunle, CISA, CISM, CISSP
Cyberattacks and the resulting security breaches are part of the rapidly expanding security threats organizations face.
Volume 1, 2014
by Derek Mohammed, Ph.D., CISA, CISM
To reduce the number of PII data security breaches, organizations must embrace the concept of auditing for regulatory compliance and security for PII so that issues can be addressed preemptively.

Wikis: 2 total

Blog Posts: 2 total

Must be a Topic member to view blog posts
23 Oct 2014
Posted By : masarker | 4 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments