Information technology security audit

Results: 1663



#Item
61(ISC)² / Education / Safety / Professional certification / Security engineering / CBK / Information technology security audit / Corey Schou / Data security / Security / Certified Information Systems Security Professional

The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish holistic sec

Add to Reading List

Source URL: www.isc2.org

Language: English - Date: 2015-03-03 17:07:04
62Actuarial science / Business / Risk management / Security / Internal audit / Finance / Audit / Enterprise risk management / Information technology audit process / Auditing / Management / Risk

FINANCE AND TREASURY How to handle financial risk – a brief guide for directors “Risk comes from not knowing what you’re doing.” – Warren Buffet

Add to Reading List

Source URL: www.cpaaustralia.com.au

Language: English
63SekChek Classic / Risk / SekChek Local / Computing / Security / Attack Surface Analyzer / Computer security / Computer-aided audit tools / Information technology audit

SekChek Features: Compare SekChek Local & Classic Tools 1-3 The following table compares the features of the Classic SekChek tool and SekChek Local. It will

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-02-01 10:39:03
64Risk / Information technology management / Computer-aided audit tools / Certified Information Security Manager / Internal audit / Audit / Information technology audit process / Information Systems Audit and Control Association / Auditing / Information technology audit / Accountancy

INFORMATION SYSTEMS AUDITOR – HR/ISAJob Purpose Reporting to the Chief Manager, Internal Audit, Risk & Compliance, and the holder will undertake reviews of the NKCC’s ICT infrastructure and provide assura

Add to Reading List

Source URL: newkcc.co.ke

Language: English - Date: 2015-02-10 12:33:38
65Risk / Ethics / Management / Information technology audit / Enterprise risk management / Security / Corporate governance of information technology / Moodle / Corporate governance / Actuarial science / Auditing / Business

Syllabus ACC 626 Enterprise Risk Management: Assurance of Corporate Governance Winter 2013

Add to Reading List

Source URL: www2.aaahq.org

Language: English - Date: 2014-10-06 10:30:29
66Crime prevention / National security / Information technology audit / Computer-aided audit tools / SekChek Local / Information security / Password / Vulnerability / Email / Security / Computer security / Computing

 Product and Service Overview What is SekChek? SekChek® is a family of automated security analysis and benchmarking tools initially designed for use by audit firms and their clients. It measures computer security ag

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-02-01 07:39:47
67Actuarial science / Auditing / Risk assessment / Information technology audit / Audit / Information security / Information technology audit process / SOX 404 top–down risk assessment / Risk / Management / Security

INTOSAIAuditing IT Service Management RISK ASSESSMENT

Add to Reading List

Source URL: www.intosaiitaudit.org

Language: English - Date: 2013-01-30 23:56:55
68Cyberwarfare / Computer law / Federal Information Security Management Act / Information technology audit / Security controls / Information security / Certification and Accreditation / Vulnerability / NIST Special Publication 800-53 / Computer security / Security / Data security

Board of Governors of the Federal Reserve System AUDIT OF THE BOARD’S INFORMATION SECURITY PROGRAM OFFICE OF INSPECTOR GENERAL

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2015-01-21 10:09:23
69Computer network security / Information technology audit / Computer security / Data security

DATASHEET Track your users and your data. As threats to data security grow, governments and trade groups are adopting strict standards to ensure protection of sensitive data, much of which is stored

Add to Reading List

Source URL: static.helpsystems.com

Language: English - Date: 2013-04-16 12:08:09
70Management / Ethics / Auditing / Data security / Information technology audit / Information Systems Audit and Control Association / Risk management / Risk factor / Professional certification / Risk / Security / Actuarial science

Microsoft Word - CGEIT.doc

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2012-11-28 20:01:03
UPDATE