Information Technology (IT) is a critical enabler of business. Assuring an enterprise’s governance, including risk management and control processes, requires auditors to understand the role of IT within their organizations and to develop adequate knowledge and skills to audit information technology (IT) systems as the line separating “IT,” and “non-IT” audits are beginning to disappear, except in the very technical IT domains.
This course is designed to give non-IT auditors and beginning Information security professionals an overview of the various considerations and aides in audit planning to gain a greater understanding of how to evaluate defined audit areas.
WHY SHOULD YOU ATTEND?
This webinar will assist those without technology experience in their pursuit of designing and executing audits which assess information security components. It is specially designed to meet the basic IT audit training needs of financial and operational auditors who assess IT risks, governance, management, and controls during their audits. The objective of this training is to provide the basic knowledge for non-IT auditors to allow them to perform a basic IT audit during a financial or an operational audit.
This course will also benefit the IT-auditors by enhancing their general and application controls understanding. During this webinar, you will acquire baseline knowledge for IT general and application control concepts and skills and their importance and relationship in your business processes. You will also learn the fundamentals of issues concerning IT controls, and the scope of addressable IT risks in today’s business environment.
AREA COVERED
- Information system (IS) audit concepts, risks, and concerns in the IT environment
- Globally recognized control frameworks for the audit of IT.
- Basics of how to perform an IT audit
- Auditing IT Governance
- Auditing IS acquisitions, developments, and implementations
- Auditing Business Continuity and Disaster Recovery
- Available IT/IS Audit tools
LEARNING OBJECTIVES
- Understand audit mandates, mission, objectives, and approaches to examining systems and IT infrastructure
- Understand the risks and audit concerns in the IT environment
- Identify globally recognized control frameworks for an audit of IT
- Acquire baseline conceptual knowledge of general IT controls and application IT controls
- Examine the role of IT governance and the connection to IT auditing
- Describe risk through effective IT audit risk profiling and management
- Learn the basics of how to perform an IT audit
- When to apply some basic IT audit tools and techniques
WHO WILL BENEFIT?
Business Services
Financial
Government
Insurance
Retail
This webinar will assist those without technology experience in their pursuit of designing and executing audits which assess information security components. It is specially designed to meet the basic IT audit training needs of financial and operational auditors who assess IT risks, governance, management, and controls during their audits. The objective of this training is to provide the basic knowledge for non-IT auditors to allow them to perform a basic IT audit during a financial or an operational audit.
This course will also benefit the IT-auditors by enhancing their general and application controls understanding. During this webinar, you will acquire baseline knowledge for IT general and application control concepts and skills and their importance and relationship in your business processes. You will also learn the fundamentals of issues concerning IT controls, and the scope of addressable IT risks in today’s business environment.
- Information system (IS) audit concepts, risks, and concerns in the IT environment
- Globally recognized control frameworks for the audit of IT.
- Basics of how to perform an IT audit
- Auditing IT Governance
- Auditing IS acquisitions, developments, and implementations
- Auditing Business Continuity and Disaster Recovery
- Available IT/IS Audit tools
- Understand audit mandates, mission, objectives, and approaches to examining systems and IT infrastructure
- Understand the risks and audit concerns in the IT environment
- Identify globally recognized control frameworks for an audit of IT
- Acquire baseline conceptual knowledge of general IT controls and application IT controls
- Examine the role of IT governance and the connection to IT auditing
- Describe risk through effective IT audit risk profiling and management
- Learn the basics of how to perform an IT audit
- When to apply some basic IT audit tools and techniques
Business Services
Financial
Government
Insurance
Retail
Speaker Profile
Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate — after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the …
Upcoming Webinars
How to Give Corrective Feedback: The CARE Model - Eliminati…
Why EBITDA Doesn't Spell Cash Flow and What Does
Improving Employee Engagement & Retention Through Stay Inte…
SOPs - How to Write Them to Satisfy those Inspectors
With Mandatory Paid Leave Gaining Ground Is It Time To Do A…
Documenting Misconduct that Will Stand Up in Court
Marketing to Medicare or Medicaid Beneficiaries - What You …
Human Error Reduction Techniques for Floor Supervisors
Project Management for Non-Project Managers - How to commun…
Tattoos, hijabs, piercings, and pink hair: The challenges …
Trial Master File (TMF)/eTMF, & FDAs Draft Guidance for Ele…
Sunshine Act Reporting - Clarification for Clinical Research
Humane Layoffs: How to Let People Go with Compassion and De…
FFIEC BSA/AML Examination Manual: What Compliance Officers …
Female to Female Hostility @Workplace: All you Need to Know
OSHA Requirements for Supervisors, Project Leaders & HR - W…
Unlock Employee Loyalty: Stay Interviews Will Keep Them Eng…
Conquer Toxic People - Learn To Protect Yourself And Get Yo…
Understanding the Artificial Intelligence Landscape
Establishing Appropriate Quality Metrics and Key Performanc…
Ultimate Persuasion Strategies! - Secret Influence Tools & …
Using High-Performance Coaching for Managers to Address Per…
Excel - 10 Key Worksheet Functions to Skyrocket Your Produc…
Is Your Culture Working For or Against Your Success? If You…
Red flags that can render your OSHA Safety Program Complete…
Utilizing HR Metrics to Illustrate & Improve Human Resource…
The Anti-Kickback Statute: Enforcement and Recent Updates
Onboarding is NOT Orientation - How to Improve the New Empl…
FDA Technology Modernization Action Plan (TMAP) and Impact …
How to Prepare For and Host a FDA Inspection and Respond to…
Excel - Pivot Tables - The Key To Modern Data Analysis and …
Managing Toxic & Other Employees Who Have Attitude Issues
Building GMP Excellence: A Guide to Implementing Compliant …
Excel Power Skills: Master Functions, Formulas, and Macros …