Information Technology (IT) is a critical enabler of business. Assuring an enterprise’s governance, including risk management and control processes, requires auditors to understand the role of IT within their organizations and to develop adequate knowledge and skills to audit information technology (IT) systems as the line separating “IT,” and “non-IT” audits are beginning to disappear, except in the very technical IT domains.
This course is designed to give non-IT auditors and beginning Information security professionals an overview of the various considerations and aides in audit planning to gain a greater understanding of how to evaluate defined audit areas.
WHY SHOULD YOU ATTEND?
This webinar will assist those without technology experience in their pursuit of designing and executing audits which assess information security components. It is specially designed to meet the basic IT audit training needs of financial and operational auditors who assess IT risks, governance, management, and controls during their audits. The objective of this training is to provide the basic knowledge for non-IT auditors to allow them to perform a basic IT audit during a financial or an operational audit.
This course will also benefit the IT-auditors by enhancing their general and application controls understanding. During this webinar, you will acquire baseline knowledge for IT general and application control concepts and skills and their importance and relationship in your business processes. You will also learn the fundamentals of issues concerning IT controls, and the scope of addressable IT risks in today’s business environment.
AREA COVERED
- Information system (IS) audit concepts, risks, and concerns in the IT environment
- Globally recognized control frameworks for the audit of IT.
- Basics of how to perform an IT audit
- Auditing IT Governance
- Auditing IS acquisitions, developments, and implementations
- Auditing Business Continuity and Disaster Recovery
- Available IT/IS Audit tools
LEARNING OBJECTIVES
- Understand audit mandates, mission, objectives, and approaches to examining systems and IT infrastructure
- Understand the risks and audit concerns in the IT environment
- Identify globally recognized control frameworks for an audit of IT
- Acquire baseline conceptual knowledge of general IT controls and application IT controls
- Examine the role of IT governance and the connection to IT auditing
- Describe risk through effective IT audit risk profiling and management
- Learn the basics of how to perform an IT audit
- When to apply some basic IT audit tools and techniques
WHO WILL BENEFIT?
Business Services
Financial
Government
Insurance
Retail
This webinar will assist those without technology experience in their pursuit of designing and executing audits which assess information security components. It is specially designed to meet the basic IT audit training needs of financial and operational auditors who assess IT risks, governance, management, and controls during their audits. The objective of this training is to provide the basic knowledge for non-IT auditors to allow them to perform a basic IT audit during a financial or an operational audit.
This course will also benefit the IT-auditors by enhancing their general and application controls understanding. During this webinar, you will acquire baseline knowledge for IT general and application control concepts and skills and their importance and relationship in your business processes. You will also learn the fundamentals of issues concerning IT controls, and the scope of addressable IT risks in today’s business environment.
- Information system (IS) audit concepts, risks, and concerns in the IT environment
- Globally recognized control frameworks for the audit of IT.
- Basics of how to perform an IT audit
- Auditing IT Governance
- Auditing IS acquisitions, developments, and implementations
- Auditing Business Continuity and Disaster Recovery
- Available IT/IS Audit tools
- Understand audit mandates, mission, objectives, and approaches to examining systems and IT infrastructure
- Understand the risks and audit concerns in the IT environment
- Identify globally recognized control frameworks for an audit of IT
- Acquire baseline conceptual knowledge of general IT controls and application IT controls
- Examine the role of IT governance and the connection to IT auditing
- Describe risk through effective IT audit risk profiling and management
- Learn the basics of how to perform an IT audit
- When to apply some basic IT audit tools and techniques
Business Services
Financial
Government
Insurance
Retail
Speaker Profile
Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate — after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the …
Upcoming Webinars
Understanding and Analyzing Financial Statements
Onboarding is Not Orientation: How to Improve Your New Hire…
Managing Toxic & Other Employees Who have Attitude Issues
Do's and Don'ts of Documenting Employee Behaviour, Performa…
Gossip-Free: Leadership Techniques to Quell Office Chatter
Outlook - Master your Mailbox - Inbox Hero Inbox Zero
Harassment, Bullying, Gossip, Confrontational and Disruptiv…
Excel & ChatGPT Synergy Masterclass: Unleashing Financial A…
Introduction to Microsoft Power BI Dashboards
Drive Recruiting Success with the Using Recruiting Metrics …
2025 EEOC & Employers: Investigating Claims of Harassment …
Impact Assessments For Supplier Change Notices
Mastering Job Descriptions: Legal and Practical Insights fo…
Effective Onboarding: How to Welcome, Engage, and Retain Ne…
What is in Store for Employers When Updating Employee Handb…
Designing Employee Experiences to Build a Culture of Compli…
Onboarding Best Practices for 2025: Proven Strategies to Po…
Accounting For Non Accountants : Debit, Credits And Financi…
Creating a Successful Job Rotation Program
The Anti-Kickback Statute: Enforcement and Recent Updates
FDA Compliance And Laboratory Computer System Validation
How To Create Psychological Safety in your Organization
Aligning Your HR Strategy with Your Business Strategy
Transforming Anger And Conflict Into Collaborative Problem …
How to Give Corrective Feedback: The CARE Model - Eliminati…
I-9 Audits: Strengthening Your Immigration Compliance Strat…
Zero Acceptance Sampling to Reduce Inspection Costs
Identifying, Managing, and Retaining High Potential Employe…
AI at Your Service: Enhancing Your Microsoft OfficeSkills w…
Why EBITDA Doesn't Spell Cash Flow and What Does
FDA Recommendations for Artificial Intelligence/Machine Lea…
Project Management for Non-Project Managers - How to commun…
Dealing With Difficult People In Life & Work
Developing and Implementing Quality Culture in the Organiza…
2-Hour Virtual Seminar on the 6 Most Common Problems in FDA…
Enhancing Pivot Tables with Images: Visualize Your Data Lik…
How to Write Effective Audit Observations: The Principles f…
How to Write Contracts for Procurement Professionals
Uplifting the Credibility of HR: How to Build the Credibili…
Strategic Interviewing & Selection: Getting the Right Talen…
Performance of Root Cause Analysis, CAPA, and Effectiveness…
FDA Audit Best Practices - Do's and Don'ts
Unlock Employee Loyalty: Stay Interviews Will Keep Them Eng…
How to Manage the Legal Landmine of the FMLA, ADA and Worke…
Excel Lookup Functions: VLOOKUP, HLOOKUP, and XLOOKUP Made …