Audit Careers 2010: The Swing of the Pendulum
Richard Tuck, CES, CPC, CIPC
The economic downturn of 2007-2010 has had a tremendous impact on auditors’ careers in comparison to other recessions.1 Using the analogy of a swinging pendulum, the auditor’s career has gone from one extreme to another.
Business Skills for the IT Audit and Assurance Professional
Robert G. Parker, CA•CISA, CMC, FCA
Knowledge of business strategy, enterprise mission and goals, and monitoring objectives and key milestones may assist IT audit and assurance professionals in focusing their audit to better meet management’s and board of directors’ expectations.
IT Risk Analysis—The Missing “A”
Eric J. Brown and William A. Yarberry Jr., CISA, CPA
An accurate assessment of IT risk is essential for the development of a relevant and cost-effective IT control environment. This article explores the concept that IT risk is also driven by the organization’s level of commitment to agile systems.
Numerous Opinions—Which Will Happen?
Get 20 experts in a room and ask them to prognosticate, and you will get 30 opinions. This seems to be the case with this year’s group of IT trend spotters. This summary recaps the findings of a number of the major IT trend spotters
Five Questions With...
Charan Kumar, CISA, CGEIT, CIA, CFE, FCA (India)
Kumar began his career in programming in various roles, including systems analysis, design and development.
Gan Subramaniam, CISA, CISM, CIA, CISSP, SSCP, CCNA, CCSA, ISO 27001 LA
How does a service level agreement (SLA) for Voice-over IP (VoIP) telephony differ from any other standard SLA?
Recovery in the Cloud
Steven J. Ross, CISA, MBCP, CISSP
Any organization planning to utilize cloud computing services should be well aware of the risks and should implement a robust control structure to counter them. Among the foremost risks is disruption of service, which includes both downtime and data loss.
IT Audits of Cloud and SaaS
Tommie W. Singleton, Ph.D., CISA, CITP, CMA, CPA
In recent months, cloud computing and Software as a Service have led the “bleeding edge” of IT. IT auditors need to understand these technologies, establish an approach for identifying the key risks and develop effectual audits of the technologies.
JOnline: Tackling Cybercrime: Divide and Conquer
Henk-Jan van der Molen
This article will analyze the malware situation and outline an economic model. Based on this model, the consequences of software diversification are described, with some recommendations to implement this security measure.
Construyendo su puente hacia el futuro
James Reed, FCIPD
Primero le daremos las malas noticias. El sector TI, luego de resistir muchas reducciones en el nivel de actividad económica, esta vez, sin lugar a dudas, ha sido golpeado.