Information Technology (IT) is a critical enabler of business. Assuring an enterprise’s governance, including risk management and control processes, requires auditors to understand the role of IT within their organizations and to develop adequate knowledge and skills to audit information technology (IT) systems as the line separating “IT,” and “non-IT” audits are beginning to disappear, except in the very technical IT domains.
This course is designed to give non-IT auditors and beginning Information security professionals an overview of the various considerations and aides in audit planning to gain a greater understanding of how to evaluate defined audit areas.
WHY SHOULD YOU ATTEND?
This webinar will assist those without technology experience in their pursuit of designing and executing audits which assess information security components. It is specially designed to meet the basic IT audit training needs of financial and operational auditors who assess IT risks, governance, management, and controls during their audits. The objective of this training is to provide the basic knowledge for non-IT auditors to allow them to perform a basic IT audit during a financial or an operational audit.
This course will also benefit the IT-auditors by enhancing their general and application controls understanding. During this webinar, you will acquire baseline knowledge for IT general and application control concepts and skills and their importance and relationship in your business processes. You will also learn the fundamentals of issues concerning IT controls, and the scope of addressable IT risks in today’s business environment.
AREA COVERED
- Information system (IS) audit concepts, risks, and concerns in the IT environment
- Globally recognized control frameworks for the audit of IT.
- Basics of how to perform an IT audit
- Auditing IT Governance
- Auditing IS acquisitions, developments, and implementations
- Auditing Business Continuity and Disaster Recovery
- Available IT/IS Audit tools
LEARNING OBJECTIVES
- Understand audit mandates, mission, objectives, and approaches to examining systems and IT infrastructure
- Understand the risks and audit concerns in the IT environment
- Identify globally recognized control frameworks for an audit of IT
- Acquire baseline conceptual knowledge of general IT controls and application IT controls
- Examine the role of IT governance and the connection to IT auditing
- Describe risk through effective IT audit risk profiling and management
- Learn the basics of how to perform an IT audit
- When to apply some basic IT audit tools and techniques
WHO WILL BENEFIT?
Business Services
Financial
Government
Insurance
Retail
This webinar will assist those without technology experience in their pursuit of designing and executing audits which assess information security components. It is specially designed to meet the basic IT audit training needs of financial and operational auditors who assess IT risks, governance, management, and controls during their audits. The objective of this training is to provide the basic knowledge for non-IT auditors to allow them to perform a basic IT audit during a financial or an operational audit.
This course will also benefit the IT-auditors by enhancing their general and application controls understanding. During this webinar, you will acquire baseline knowledge for IT general and application control concepts and skills and their importance and relationship in your business processes. You will also learn the fundamentals of issues concerning IT controls, and the scope of addressable IT risks in today’s business environment.
- Information system (IS) audit concepts, risks, and concerns in the IT environment
- Globally recognized control frameworks for the audit of IT.
- Basics of how to perform an IT audit
- Auditing IT Governance
- Auditing IS acquisitions, developments, and implementations
- Auditing Business Continuity and Disaster Recovery
- Available IT/IS Audit tools
- Understand audit mandates, mission, objectives, and approaches to examining systems and IT infrastructure
- Understand the risks and audit concerns in the IT environment
- Identify globally recognized control frameworks for an audit of IT
- Acquire baseline conceptual knowledge of general IT controls and application IT controls
- Examine the role of IT governance and the connection to IT auditing
- Describe risk through effective IT audit risk profiling and management
- Learn the basics of how to perform an IT audit
- When to apply some basic IT audit tools and techniques
Business Services
Financial
Government
Insurance
Retail
Speaker Profile
Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate — after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the …
Upcoming Webinars
Updated Metro 2®, e-OSCAR and the New Tougher FCRA/CFPB Com…
Conquer Toxic People - Learn To Protect Yourself And Get Yo…
Introduction to Generative AI for Accountants
Dealing With Difficult People In Life & Work
Surviving and Thriving Organizational Change and Loss: The …
Impact Assessment and Risk Management for Change Control
How to Write Effective Audit Observations: The Principles f…
Excel Deep Dive: Advanced Tips & Techniques – A 3-hour Work…
FDA Regulation of Artificial Intelligence/ Machine Learning
Coming Soon - New Minimum Salary Levels for Exempt Employee…
Marijuana: Compliance and Safety in the Workplace
Stressed Out: How to Handle Conflict, Difficult People and …
2025 Top Employment Regulations That Will Impact Employers!
How to Handle Workplace Conversations Around Politics and R…
Data Integrity: Compliance with 21 CFR Part 11, SaaS-Cloud,…
How to Give Corrective Feedback: The CARE Model - Eliminati…
Improving Employee Engagement & Retention Through Stay Inte…
SOPs - How to Write Them to Satisfy those Inspectors
Why EBITDA Doesn't Spell Cash Flow and What Does
Marketing to Medicare or Medicaid Beneficiaries - What You …
With Mandatory Paid Leave Gaining Ground Is It Time To Do A…
Human Error Reduction Techniques for Floor Supervisors
Documenting Misconduct that Will Stand Up in Court
Tattoos, hijabs, piercings, and pink hair: The challenges …
Trial Master File (TMF)/eTMF, & FDAs Draft Guidance for Ele…
Project Management for Non-Project Managers - How to commun…
OSHA Requirements for Supervisors, Project Leaders & HR - W…
Unlock Employee Loyalty: Stay Interviews Will Keep Them Eng…
Sunshine Act Reporting - Clarification for Clinical Research
FFIEC BSA/AML Examination Manual: What Compliance Officers …
Female to Female Hostility @Workplace: All you Need to Know
Humane Layoffs: How to Let People Go with Compassion and De…
Onboarding is NOT Orientation - How to Improve the New Empl…
Managing Toxic & Other Employees Who Have Attitude Issues
Building GMP Excellence: A Guide to Implementing Compliant …
Excel Power Skills: Master Functions, Formulas, and Macros …