Information Technology (IT) is a critical enabler of business. Assuring an enterprise’s governance, including risk management and control processes, requires auditors to understand the role of IT within their organizations and to develop adequate knowledge and skills to audit information technology (IT) systems as the line separating “IT,” and “non-IT” audits are beginning to disappear, except in the very technical IT domains.
This course is designed to give non-IT auditors and beginning Information security professionals an overview of the various considerations and aides in audit planning to gain a greater understanding of how to evaluate defined audit areas.
WHY SHOULD YOU ATTEND?
This webinar will assist those without technology experience in their pursuit of designing and executing audits which assess information security components. It is specially designed to meet the basic IT audit training needs of financial and operational auditors who assess IT risks, governance, management, and controls during their audits. The objective of this training is to provide the basic knowledge for non-IT auditors to allow them to perform a basic IT audit during a financial or an operational audit.
This course will also benefit the IT-auditors by enhancing their general and application controls understanding. During this webinar, you will acquire baseline knowledge for IT general and application control concepts and skills and their importance and relationship in your business processes. You will also learn the fundamentals of issues concerning IT controls, and the scope of addressable IT risks in today’s business environment.
AREA COVERED
- Information system (IS) audit concepts, risks, and concerns in the IT environment
- Globally recognized control frameworks for the audit of IT.
- Basics of how to perform an IT audit
- Auditing IT Governance
- Auditing IS acquisitions, developments, and implementations
- Auditing Business Continuity and Disaster Recovery
- Available IT/IS Audit tools
LEARNING OBJECTIVES
- Understand audit mandates, mission, objectives, and approaches to examining systems and IT infrastructure
- Understand the risks and audit concerns in the IT environment
- Identify globally recognized control frameworks for an audit of IT
- Acquire baseline conceptual knowledge of general IT controls and application IT controls
- Examine the role of IT governance and the connection to IT auditing
- Describe risk through effective IT audit risk profiling and management
- Learn the basics of how to perform an IT audit
- When to apply some basic IT audit tools and techniques
WHO WILL BENEFIT?
Business Services
Financial
Government
Insurance
Retail
This webinar will assist those without technology experience in their pursuit of designing and executing audits which assess information security components. It is specially designed to meet the basic IT audit training needs of financial and operational auditors who assess IT risks, governance, management, and controls during their audits. The objective of this training is to provide the basic knowledge for non-IT auditors to allow them to perform a basic IT audit during a financial or an operational audit.
This course will also benefit the IT-auditors by enhancing their general and application controls understanding. During this webinar, you will acquire baseline knowledge for IT general and application control concepts and skills and their importance and relationship in your business processes. You will also learn the fundamentals of issues concerning IT controls, and the scope of addressable IT risks in today’s business environment.
- Information system (IS) audit concepts, risks, and concerns in the IT environment
- Globally recognized control frameworks for the audit of IT.
- Basics of how to perform an IT audit
- Auditing IT Governance
- Auditing IS acquisitions, developments, and implementations
- Auditing Business Continuity and Disaster Recovery
- Available IT/IS Audit tools
- Understand audit mandates, mission, objectives, and approaches to examining systems and IT infrastructure
- Understand the risks and audit concerns in the IT environment
- Identify globally recognized control frameworks for an audit of IT
- Acquire baseline conceptual knowledge of general IT controls and application IT controls
- Examine the role of IT governance and the connection to IT auditing
- Describe risk through effective IT audit risk profiling and management
- Learn the basics of how to perform an IT audit
- When to apply some basic IT audit tools and techniques
Business Services
Financial
Government
Insurance
Retail
Speaker Profile
Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate — after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the …
Upcoming Webinars
Managing Toxic & Other Employees Who Have Attitude Issues
Effective Onboarding: How to Welcome, Engage, and Retain Ne…
Analytical Method Validation Under Good Laboratory Practic…
Do's and Don'ts of Documenting Employee Behaviour, Performa…
Sunshine Act Reporting - Clarification for Clinical Research
Onboarding New Hires: Leverage the Potential of Artificial …
Do's and Don'ts of Giving Effective Feedback for Performanc…
Tattoos, hijabs, piercings, and pink hair: The challenges …
Using Behavior Based Interviewing for Finding the Best Matc…
How to Document Employee Discussions and Why it is Important
Project Management for HR, Administrative Professionals, an…
Stressed Out: How to Handle Conflict, Difficult People and …
Harassment, Bullying, Gossip, Confrontational and Disruptiv…
Marketing to Medicare or Medicaid Beneficiaries - What You …
Understanding the Artificial Intelligence Landscape
Best Practices for Working With Vendors and Suppliers
Accounting For Non Accountants : Debit, Credits And Financi…
Principles & Practices for the Cybersecurity of Legacy Medi…
Independent Contractor vs. Employee New Rule Issued by The …
The Top Ten Excel Functions Everyone Should Know
Ultimate Persuasion Strategies! - Secret Influence Tools & …
Clinical Trial Systems: The Trial Master File (TMF) and Ele…
Dealing With Difficult People In Life & Work
Improving Employee Engagement & Retention Through Stay Inte…
Fair Lending in Q2 2024: new regulations, examinations, and…
FDA Regulation of Artificial Intelligence/ Machine Learning
Form 1099 Update 2024: Latest Forms, Rules and Reporting Re…
Coming Soon - New Minimum Salary Levels for Exempt Employee…
Beyond ‘Illegal’ Interview Questions: What Recruiters & Hir…
Bootcamp for New Managers and Supervisors: Avoid These 7 Mi…
Writing Techniques for Auditors and Risk Management Profess…
Coaching & Retaining Your Talent – Putting the WOW into Qua…
Outlook - Master your Mailbox - Inbox Hero Inbox Zero
Emotional Intelligence: Mastering the Emotions of Great Lea…
Building Fair Chance Hiring Policies in 2024
Effectively Handle Toxic People for Better Productivity and…
Third-Party Relationships: Risk Management: What All Bankin…
HR 101 - Bootcamp Basics for New Human Resource Professiona…
How to Manage and Resolve Conflict in the Workplace
Impact Assessments For Supplier Change Notices
Performance Management with Bottom-Line Results
How to Give Corrective Feedback: The CARE Model - Eliminati…
Human Error Reduction Techniques for Floor Supervisors
Credit Risk Discipline Tools - Implementing 14 Tools for Cr…
FDA Compliance And Laboratory Computer System Validation