journal header

Volume 1, 2016

This Week's Online-Exclusive Feature

Security in the Payment Card Industry: The Importance of Data Integrity
10 February 2016
Mark Johnston

In July 2015, CVS became the latest company to fall victim to an apparent breach, this one involving credit card data obtained via its web site for ordering and processing photos. The alleged breach happened through the third-party company that hosts

As of this writing, CVS has declined to say how many customers may be affected, but the point stands: One stolen credit card number is one too many. Consumers are not held liable for fraudulent activities on their credit card; however, such activity can make consumers feel helpless. Read More >>

Indicates Online-Exclusive Content



This Week's Featured Author Blog

When It Comes to Changing IA, Do Not Let Perfection Be the Enemy of the Good Enough
8 February 2016
Bob Kress

I compare notes with internal audit (IA) colleagues in other companies from time to time, and whenever the topic turns to adapting the internal audit function to the digital era, I hear a consistent theme: “This is such a big challenge. Where do we even begin?”

The fear of getting started is understandable. Transformation is a significant challenge. There are a lot of moving parts, and they are all in motion at the same time. Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

Is There Such a Thing as a Bad IS Auditor? Part 1

Trust, but Verify

Auditors and Large Software Projects, Part 3

The Soft Skills Challenge, Part 3: Dealing With Conflict

Auditors and Large Software Projects, Part 2

Auditors and Large Software Projects, Part 1


Full Journal Issues

Volume 1, 2015 Analytics and Risk Intelligence

Volume 6, 2014 Cybersecurity

Volume 5, 2014 Mobile Devices

Volume 4, 2014 Governance and Management of Enterprise IT (GEIT)

Volume 3, 2014 Big Data

Volume 2, 2014 The IS Audit Transformation