Page 545 - ITGC_Audit Guides
P. 545

Global Technology Audit Guide (GTAG)
            Written in straightforward business language to address a timely issue related to IT management, control, and security, the
            GTAG series serves as a ready resource for chief audit executives on different technology-associated risks and recommended
            practices.



                          Information Technology Controls:                     Managing and Auditing IT
                          Topics discussed include IT control                  Vulnerabilities: Among other topics,
                          concepts, the importance of IT controls,   Managing and Auditing  discusses the vulnerability management
                                                                       IT Vulnerabilities
                          the organizational roles and                         life cycle, the scope of a vulnerability
                          responsibilities for ensuring effective IT           management audit, and metrics to
                          controls, and risk analysis and                      measure vulnerability management
                          monitoring techniques.                               practices.

                          Change and Patch Management                          Information Technology Outsourcing:
                          Controls: Describes sources of change                Discusses how to choose the right IT
                   Change and Patch                                      )NFORMATION
                                                                         4ECHNOLOGY
                  Management Controls:   and their likely impact on business   outsourcing vendor and key outsourcing
                     Critical for                                       /UTSOURCING
                    Organizational
                          objectives, as well as how change and                control considerations from the client’s
                      Success
                          patch management controls help                       and service provider’s operation.
                          manage IT risks and costs and what
                          works and doesn’t work in practice.
                          Continuous Auditing: Addresses the                   Auditing Application Controls:
                          role of continuous auditing in today’s               Addresses the concept of application
                  Continuous Auditing:                                   Auditing
                 Implications for Assurance,  internal audit environment; the   Application   control and its relationship with general
                    Monitoring, and                                      Controls
                   Risk Assessment
                          relationship of continuous auditing,                 controls, as well as how to scope a risk-
                          continuous monitoring, and continuous                based application control review.
                          assurance; and the application and
                          implementation of continuous auditing.

                          Management of IT Auditing: Discusses                 Identity and Access Management:
                          IT-related risks and defines the IT audit            Covers key concepts surrounding identity
                                                                        Management
                 Management of IT Auditing  universe, as well as how to execute and   Identity and Access     and access management (IAM), risks
                          manage the IT audit process.                         associated with IAM process, detailed
                                                                               guidance on how to audit IAM processes,
                                                                               and a sample checklist for auditors.



                          Managing and Auditing Privacy Risks:                 Developing The IT Audit Plan:
                          Discusses global privacy principles and      Developing the     Provides step-by-step guidance on how to
                    Managing                                            IT Audit Plan  develop an IT audit plan, from
                   and Auditing  frameworks, privacy risk models and
                   Privacy Risks
                          controls, the role of internal auditors, top         understanding the business, defining the
                          10 privacy questions to ask during the               IT audit universe, and performing a risk
                          course of the audit, and more.                       assessment, to formalizing the IT audit
                                                                               plan.

















            Visit The IIA’s Web site at www.theiia.org/technology to download the entire series.
   540   541   542   543   544   545   546   547   548   549   550