An Introduction to Digital Records Management
Haris Hamidovic, CIA
The main objective of this article is to introduce the field of management responsible for the efficient and systematic control of the creation, receipt, maintenance, use and disposition of records in an electronic environment.
IT Governance and Business-IT Alignment in SMEs
Steven De Haes, Ph.D., Rogier Haest and Wim Van Grembergen, Ph.D.
This article focuses on companies in the SME segment in the Netherlands & discusses findings on business-IT alignment and IT governance practices in organisations in this field.
Five Questions With...
Jose Luis Carrera Jr., CFE, CIA
Carrera has more than 19 years of international auditing and internal auditing experience, which he gained from his positions at RSM McGladrey & Pullen LLP, Singer Lewak Greenbaum & Goldstein, PwC, and Saudi Arabian Oil Company.
Gan Subramaniam, CISA, CISM, CCNA, CCSA, CIA, CISSP, SSCP, ISO 27001 LA
If we need to manage something effectively, we should be able to lay our hands on metrics relating to the same.
Service Availability and Disaster Recovery
Steven J. Ross, CISA, CISSP, MBCP
Any organization with a lot of data in use all of the time and that must be available shortly following a disruption must plan for recovery in advance of the aforementioned bad things.
Data Extraction, A Hindrance to Using CAATs
Tommie W. Singleton, Ph.D., CISA, CGEIT, CITP, CMA, CPA
This article will center on data extraction, focusing on the most efficient methods given the current state of features among the leading CAATs vendors.
JOnline: Book Review—Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions
Edited by Ramesh Subramanian, Ph.D. | Reviewed by Carlos Villamizar Rodriguez, CISA, CGEIT, BS 25999 LA, ISO 27001 LA
This book connects privacy and politics, offering a point-in-time review of recent developments in computer security.
JOnline: Emergency Access Controls in SAP Environments
Jose Espin, CISA, CISSP, MCP, SAP Certified Security Consultant
This article provides an overview of the tools and solutions to consider when establishing acceptable IT practices to address the challenge that emergency access to SAP environments poses.
JOnline: Information Security Automation: The Second Wave
David Ramirez, CISA, CISM, BS 7799 LA, CISSP, MCSE, QSA
This article presents a simplified approach to IT security management that allows IT auditors and information security professionals to discharge their responsibilities more efficiently.