Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Audit Guidelines

Welcome to the Audit Guidelines topic!

Collaborate, contribute, consume and create knowledge around topics such as Audit charter, independence (organisational and professional), engagement planning, Risk Assessment, sampling, reporting and follow-up activities.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1516 Members
2 Online
20637 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 47 total

Must be a Topic member to contribute
View All »
I want to know how to kick start my audit and security career. I have no experience so far. I think getting free intern ship is don't know where to get such internship.  Any advice for me?
Jacob551 | 2/6/2018 3:17:35 AM | COMMENTS(8)
I want to improve my Audit report writing skill. Need the group help to suggest the repository of sample IS Audit reports. Having a IT background , Audit report writing is a challenging skill for me. Please provide your valuable suggestions. Thanks in adv...
Rajani038 | 12/21/2017 1:22:52 PM | COMMENTS(1)
Hi Everyone,I want to create an  “audit recommendation checklist” that would work as quick quality review assessment that the In-charge Auditor or Audit Manager would perform by responding to some key questions in order to conclude on the existence of a d...
Valquiria Klingenhoff | 9/5/2017 11:19:02 PM | COMMENTS(1)
ISACA developed the IS Auditing Guideline for SDLC Review (G23) with a release date of March 2010. Is there a plan to either revise or replace this document with a more recent document that incorporates all the changes that happened since its release?
Rosalyn20 | 3/17/2017 10:51:57 AM | COMMENTS(5)
Can anyone please share with me their organizational document on "Deficiency Assessment Methodology" this document is used by Internal controls team to see what gaps identified in ITGC and ICFR testing are material and whether additional sample testing is...
Anita165 | 3/16/2017 1:53:27 PM | COMMENTS(1)
 Hello people. How do you determine whether to rely on the work of other experts ?
PRECIOUS785 | 3/14/2017 1:51:13 AM | COMMENTS(2)

Documents & Publications: 68 total

Must be a Topic member to contribute
View All »
Posted by ISACA 32 days ago
ISACA Guidelines
Posted by ISACA 46 days ago
Posted by ISACA 759 days ago
Posted by ISACA 829 days ago
Ways to address and resolve SOD conflicts for SOX compliance are presented in an easily implementable format. - By Bala Kaundinya, Risk Advisory Manager from Ernst & Young
Posted by Bala_Krishnan_CISA_CIPT_GRCP 983 days ago

Events & Online Learning: 7 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
1 Aug 2016
ISACA International Event
Chicago, IL, USA
4 Jun 2018
ISACA International Event
Philadelphia, PA, USA

Journal Articles: 78 total

Volume 6, 2015
by Ed Gelbstein, Ph.D.
An auditor will sooner or later be faced with two kinds of conflicts: conflict of interest and interpersonal conflict.
Volume 5, 2107
by Marianne Bradford, Ph.D., and Dave Henderson, Ph.D.
Although generalized audit software (GAS) has been shown to significantly improve the efficiency and effectiveness of audits, many auditors do not use this technology.
Volume 1, 2018
by ISACA Member and Certification Holder Compliance
An up-to-date listing of the current IT Audit and Assurance Standards, Guidelines, and Tools and Techniques
Volume 1, 2018
by Andrew Clark
With advances in computing power, the abundance of data storage and recent advances in algorithm design, machine learning is increasingly being utilized by corporations to...
Volume 6, 2017
by Abdullah Al-Mansour, Security+
The amount of data reviewed has changed the scope of an information security professional from an auditor to a data mining and analytics expert.
Volume 6, 2017
by Ian Cooke, CISA, CGEIT, CRISC, COBIT Assessor and Implementer, CFE, CPTE, DipFM, ITIL Foundation, Six Sigma Green Belt
As the uses, storage capabilities, power and proliferation of mobile devices have increased, so has the risk they pose to an enterprise.

Wikis: 2 total

Blog Posts: 5 total

Must be a Topic member to view blog posts
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
The Panama exposé is creating not just ripples, but tsunamis in financial and political circles. Many institutions/persons whose names have figured had to clarify that they have done nothing wrong legally. Even if such legally correct names are ignored, t...
Posted By : Vivek Mathker | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments