Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Audit Standards

Welcome to the Audit Standards topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
614 Members
0 Online
9117 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 14 total

Must be a Topic member to contribute
View All »
This is a "must read" describing the motives behind the perpetrators and the headaches you will face when your personal data is breached - and in today's climate it's more likely to be a when not if. http://www.scmagazine.com/this-time-its-personal-data-b...
Phil Green | 1/4/2016 3:30:18 AM | COMMENTS(3)
Results of a recent audit indicate there are some vulnerabilities that we would like to report to management.  However, making the results/recommendations public could provide information to others as to  how they might breach our systems.  I would apprec...
Patrolia | 1/4/2016 3:15:13 AM | COMMENTS(3)
Members of this forum might be interested in the following bi-monthly newsletter on "Tone at the Top" you can subscribe to for free with the Institute of Internal Auditors. https://na.theiia.org/periodicals/Pages/Tone-at-the-Top.aspx
Phil Green | 1/4/2016 3:01:18 AM | COMMENTS(1)
Hi Everybody, Hopefully everyone had a great xmas holiday with little to no snow!! I'm a new member and a new IT auditor that recently joined Great Lakes Higher Edu out in Madison WI. I have been trying to get myself up to...
Adam618 | 1/4/2016 2:57:44 AM | COMMENTS(3)
I'd like to ask your professional opinion. For IT Auditor, of course, it is a must to review SOC2 type 2 reports. However, would you consider it a must that an IT Security officer must review the same report and also would you have that as an audit findin...
Jelena622 | 12/29/2015 11:01:19 PM | COMMENTS(3)
Does anyone have any best practice documents they could share or thoughts on explaining having a separate IT audit functional area within an audit department.  Looking for best practice documentation to discuss/show why having a separate and dedicated IT ...
D | 7/14/2015 7:31:40 AM | COMMENTS(2)

Documents & Publications: 45 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 87 days ago
Posted by ISACA 326 days ago
Books
Posted by ISACA 328 days ago
Posted by ISACA 364 days ago
Posted by ISACA 399 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 4 total

Volume 1, 2016
by Graciela Braga, CGEIT, COBIT Foundation, CPA
IS and IT auditors, assurance professionals and assessors must comply with different professional standards and maintain and improve their own process work at the appropriate capability level to meet the assignment objective...
Volume 2, 2014
by John H. White, Ph.D., CISA, CPA
IT professionals must be aware of the recent, important changes in the COSO framework.
Volume 4, 2013
by Mukul Pareek, CISA, ACA, AICWA, PRM
As a risk manager, knowing the organization’s risk appetite means knowing how much risk the organization is comfortable bearing.
Volume 5, 2010
by Tommie W. Singleton, Ph.D., CISA, CGEIT, CITP, CMA, CPA
To mitigate the risks associated with access control, it is necessary to identify the risks associated with access controls and to assess the level of those risks.

Wikis: 2 total

Blog Posts: 1 total

Must be a Topic member to view blog posts
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments