journal header

Volume 3, 2018

This Week's Online-Exclusive Feature

Merging Internal Audit Departments

Merging Internal Audit Departments
23 May 2018
Kevin Alvero, CFE, Randy Pierson, CISA, and Wade Cassels, CISA, CIA, CFE, CRMA

As organizations try to keep up with rapid changes in technology, they are using acquisitions as a way to quickly develop entirely new lines of business or to simply close gaps in technological capability. According to Deloitte’s most recent mergers and acquisitions (M&A) trends report, “acquiring technology assets has surged in importance as a top strategic driver of M&A.”

This trend has significant implications for internal audit groups as they strive for high-level risk management, while simultaneously integrating new auditors and quality/compliance personnel from newly acquired organizations. Read More >>

Indicates Online-Exclusive Content

 

 


This Week's Featured Blog

Establishing a Triumvirate—Understanding the Interests for Enhancing Collaboration Between the CISO, the CIO and the CRO
21 May 2018
Ofir Eitan, CISM, CCSK, CTI

In one of my recently published ISACA Journal articles, “Clash of the Titans: How to Win the ‘Battle’ Between Information Security and IT Without Losing Anyone,” I pointed out some of the challenges the chief information security officer (CISO) faces when it comes to prioritizing information security interests over IT interests. Although my insights refer mainly to finding common ground with the IT and infrastructure departments, at times the CISO needs to find other resources and common interests with other units to either “finance” the CISO’s solutions or implement the CISO’s policies.

One of the CISO’s natural partners is the chief risk officer (CRO), and this partnership should be nurtured and adopted by all information security members as well. Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Auditing Data Privacy

Innovation in the IT Audit Process

Backup and Recovery

Auditing Mobile Devices

Doing More With Less

Audit Programs

 

Full Journal Issues

Volume 3, 2017 The Internet of Things

Volume 2, 2017 The Evolution of Audit

Volume 1, 2017 Cognitive Technology

Volume 6, 2016 Governance, Risk and Compliance

Volume 5, 2016 Cybersecurity

Volume 4, 2016 Mobile Apps


Sponsored Feature Articles

Centralized, Model-Driven Visibility Key to IT-OT Security Management

The AICPA’s New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key Stakeholders

Indicators of Exposure and Attack Surface Visualization