journal header

Volume 3, 2016

This Week's Online-Exclusive Feature

Internet Security Audits for Government: An Overview of the Lessons Learned in the Netherlands
27 April 2016
Jeroen van Lewe, CISA, CEH, CIA, ECSA

The number of attacks on government web sites continues to increase. In June 2015, Canadian government web sites were hit by a large-scale cyberattack. In the Netherlands, large-scale cyberattacks on government web sites began in 2011. In 2012, the Dutch government decided to use IT audits as one of the remedies for this issue. This decision, and the compulsory approach for audit in the Netherlands, had a major impact on the IT audit profession. At the end of 2014, members of parliament raised questions regarding the value of the IT audits on government web sites when media outlets reported on vulnerabilities in web sites of municipalities. Read More >>

Indicates Online-Exclusive Content

 

 


This Week's Featured Author Blog

The Benefits of Effective SIEM Policy Development
2 May 2016
Aleksandr Kuznetcov, CISM

There is an imbalance between technical issues and process aspects related to security information and event management (SIEM). This gap is the root cause of some skepticism with and disappointment in SIEM.

Be aware that before implementing SIEM, it is necessary to establish the basis of the information security management system (ISMS), which includes considering the global management commitment, asset inventory and categorization, and risk assessment. Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Auditing IS/IT Risk Management, Part 2

Auditing IS/IT Risk Management, Part 1

Is There Such a Thing as a Bad IS Auditor? Part 2

Is There Such a Thing as a Bad IS Auditor? Part 1

Trust, but Verify

Auditors and Large Software Projects, Part 3

 

Full Journal Issues

Volume 3, 2015 Governance and Management of Enterprise IT (GEIT)

Volume 2, 2015 Opportunities and Challenges of New Technology

Volume 1, 2015 Analytics and Risk Intelligence

Volume 6, 2014 Cybersecurity

Volume 5, 2014 Mobile Devices

Volume 4, 2014 Governance and Management of Enterprise IT (GEIT)