journal header

Volume 4, 2018

This Week's Online-Exclusive Feature

Securing the SWIFT Infrastructure Across the Cyber Kill Chain

Securing the SWIFT Infrastructure Across the Cyber Kill Chain
11 July 2018
Vimal Mani, CISA, CISM, Six Sigma Black Belt

Cyberattacks are emerging faster than ever across the world. Banking and financial services have particularly become preferred targets for notorious hacker groups such as Anonymous, Carbanak Group, Metel and GCMAN, who attack the banking and financial services sector on an ongoing basis. After the high-profile Bangladesh Central Bank heist in 2016, SWIFT has become a preferred target for many global hacker groups. Even the famous Shadow Brokers group announced that it offers a monthly information delivery service based on data stolen from SWIFT service providers and central banks across the globe.

Figure 1 depicts the typical SWIFT architecture in a financial organization. Read More >>

Indicates Online-Exclusive Content

 

 


This Week's Featured Blog

Skills You Will Not Find on a Resume
25 June 2018
Kevin Alvero, CFE, Randy Pierson, CISA, and Wade Cassels, CISA, CIA, CFE, CRMA

In our recent Journal article about merging internal audit departments, we discussed a practical approaching to taking a skills inventory and then using that skills inventory as one of the primary inputs in making staffing decisions following a merger or acquisition.

In taking a skills inventory, however, it is important for audit management to not overlook critical skills that do not often show up on an auditor’s resume. Many of these can be just as important to the overall success of the department as subject matter expertise and technical skills. Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Add Value to What Is Valued

Auditing Data Privacy

Innovation in the IT Audit Process

Backup and Recovery

Auditing Mobile Devices

Doing More With Less

 

Full Journal Issues

Volume 4, 2017 Mobile Workforce

Volume 3, 2017 The Internet of Things

Volume 2, 2017 The Evolution of Audit

Volume 1, 2017 Cognitive Technology

Volume 6, 2016 Governance, Risk and Compliance

Volume 5, 2016 Cybersecurity


Sponsored Feature Articles

Centralized, Model-Driven Visibility Key to IT-OT Security Management

The AICPA’s New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key Stakeholders

Indicators of Exposure and Attack Surface Visualization