Technology


 

 

GAM 2017 Speaker Preview – Steve SandersGAM 2017 Speaker Preview – Steve Sanders2/15/2017 8:18:09 PMc3OHlxOTE6bQctBYvSsIomLoZykWy67U8c7bf5d07e9e43178f045565d8d4e592https://secure-cf-c.ooyala.com/c3OHlxOTE6bQctBYvSsIomLoZykWy67U/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8Attending the 2017 General Audit Management (GAM) Conference is your chance to get ahead of the latest issues facing today’s executives in internal audit. Here Speaker Steve Sanders, vice president of Internal Audit, Computer Services, Inc., provides insight on how we are losing the cyber war, and it's due in large part to one major mistake in our thinking. Make sure you don’t miss his session, register for GAM 2017 today! <a href="https://na.theiia.org/training/conferences/GAM/Pages/GAM-Conference.aspx">www.theiia.org/GAM</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21865GAM 2017 Speaker Preview – Steve Sanders

Cybersecurity: An Ounce of Prevention​​​​​​

Most Recent


 

 

GAM 2017 Speaker Preview – Karl RiemGAM 2017 Speaker Preview – Karl Riemh1cXhxOTE6ACfwO39JpBpf7eZTAY6-ndhttps://secure-cf-c.ooyala.com/h1cXhxOTE6ACfwO39JpBpf7eZTAY6-nd/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Attending the 2017 General Audit Management (GAM) Conference is your chance to get ahead of the latest issues facing today’s executives in internal audit. Here Speaker Karl Riem, senior vice president and general auditor for the Federal Reserve Bank of Minneapolis, provides insights on how you can jump-start your work into continuous auditing and data analytics while applying the learnings from others. Make sure you don’t miss his session, register for GAM 2017 today! <a href="https://na.theiia.org/training/conferences/GAM/Pages/GAM-Conference.aspx">www.theiia.org/GAM</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21866GAM 2017 Speaker Preview – Karl Riem
Application Testing: Not Just for IT Auditors, Pt 2Application Testing: Not Just for IT Auditors, Pt 2Rybzc2NjE6QSLYDQmoHVHSkoOah4At6phttps://secure-cf-c.ooyala.com/Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In this two-part series, Richard Fowler from Huntington Ingalls Industries discusses application controls and “easy wins” for those auditors just now venturing into the waters of IT Auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=tndzI0NjE67gpFHjAAb6PmYyxz887fGt" target="_blank">Click here to watch Part 1 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21935Application Testing: Not Just for IT Auditors, Pt 2
Application Testing: Not Just for IT Auditors, Pt 1Application Testing: Not Just for IT Auditors, Pt 1tndzI0NjE67gpFHjAAb6PmYyxz887fGthttps://secure-cf-c.ooyala.com/tndzI0NjE67gpFHjAAb6PmYyxz887fGt/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Richard Fowler, senior audit specialist at Huntington Ingalls Industries, discusses application controls and “easy wins” for auditors just now venturing into the waters of IT auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p" target="_blank">Click here to watch Part 2 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21938Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3New Security Controls to Fight Modern Threats, Pt 3t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46https://secure-cf-c.ooyala.com/t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21942New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2New Security Controls to Fight Modern Threats, Pt 2NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJfhttps://secure-cf-c.ooyala.com/NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21943New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1New Security Controls to Fight Modern Threats, Pt 1FiYTR1NTE6VvIwchDkpSHLjIDohU4lhphttps://secure-cf-c.ooyala.com/FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21948New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2Proactively Managing the Cyber Threat Landscape, Pt 2BuNzBmNTE6xwDyX1r6062CNNh7z3utf5https://secure-cf-c.ooyala.com/BuNzBmNTE6xwDyX1r6062CNNh7z3utf5/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21959Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1Proactively Managing the Cyber Threat Landscape, Pt 1J4a3llNTE6C0YVy8wKjLmX4KD13Y80SUhttps://secure-cf-c.ooyala.com/J4a3llNTE6C0YVy8wKjLmX4KD13Y80SU/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21960Proactively Managing the Cyber Threat Landscape, Pt 1
2016 International Conference Speaker Preview: Iyad Mourtada2016 International Conference Speaker Preview: Iyad Mourtadal5MGtzMjE6QbNMbS-58KUizDIwiQYUhMhttps://secure-cf-c.ooyala.com/l5MGtzMjE6QbNMbS-58KUizDIwiQYUhM/heCDP4pTuni5z6vX4xMDoxOjBrO-I4W8In this 2016 International Conference session preview, Shannon Steffee, senior editor for Internal Auditor magazine, interviews Iyad Mourtada, managing director at OpenThinking in the United Arab Emirates. Mourtada will present two sessions at The IIA’s International Conference in New York. His first session, “The Future of Internal Auditing Beyond 2016,” will take place on Monday, July 18, and his second session, “The Future of Fraud,” will be held Tuesday, July 19. In his sessions, Mourtada will share his views on evolution of internal audit's role as we move through 2016 and beyond, and discusses potential changes in audit core competencies for the future. Mourtada also explores how fraudsters use technological advances to their advantage and how internal auditors can best prepare themselves to detect ever-progressing fraud. Watch now to get a sneak peek of these sessions and then register for the 2016 International Conference, July 17‒20, today at <a href="https://ic.globaliia.org/">ic.globaliia.org</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=220772016 International Conference Speaker Preview: Iyad Mourtada
Cybersecurity Auditing in an Unsecure World-Cybersecurity Auditing in an Unsecure World-RjanQ2MDE69gd9K_kUArI-DmKnoXGNauhttps://secure-cf-c.ooyala.com/RjanQ2MDE69gd9K_kUArI-DmKnoXGNau/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Is your organization prepared in the event of a data breach? The IIA’s new course: Logging In: Auditing Cybersecurity in an Unsecure World, helps you develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Register now for The IIA’s new course, and become better prepared to tackle the threat of cybersecurity gaps. https://na.theiia.org/training/courses/Pages/Logging-In-Auditing-Cybersecurity-in-an-Unsecure-World.aspx https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22145Cybersecurity Auditing in an Unsecure World-
Advancing Internal Audit’s Use of Technology, Pt 2Advancing Internal Audit’s Use of Technology, Pt 2ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoLhttps://secure-cf-c.ooyala.com/ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8In part 2 of this two-part series, three audit pros continue talking about overcoming the challenges that come with their efforts to build their technology usage and making the most of the benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu" target="_blank">Click here to watch Part 1</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22217Advancing Internal Audit’s Use of Technology, Pt 2
Advancing Internal Audit’s Use of Technology, Pt 1Advancing Internal Audit’s Use of Technology, Pt 1RvYWEyeDr8JDVZIFHilunAFLRoN1eQiuhttps://secure-cf-c.ooyala.com/RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In part 1 of a two-part series, three audit pros talk about how they have advanced the use of technology in their audit departments and the resulting benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL" target="_blank">Click here to watch Part 2</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22218Advancing Internal Audit’s Use of Technology, Pt 1
More on IT Auditing Processes, Part 3More on IT Auditing Processes, Part 3xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRvhttps://secure-cf-c.ooyala.com/xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRv/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Part 3 of our series from John Livingston, senior IT auditor for Medical Mutual of Ohio, on IT Auditing explores several issues: Configuration Management, or Keeping Track of IT Assets, and Dimensions of CMDB Design.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22478More on IT Auditing Processes, Part 3
Overcoming Data Analytics Implementation BarriersOvercoming Data Analytics Implementation Barriers9maWc0dzobzJBZ8_In4WCtAw8r6U1bvhhttps://secure-cf-c.ooyala.com/9maWc0dzobzJBZ8_In4WCtAw8r6U1bvh/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8A sophisticated data analytics program can be a powerful tool for good in the right hands, but it doesn’t come without a price. How do you convince your senior leadership that the program’s cost – in terms of money, people, time, training resources, and more – will be offset by the information it will provide to help the organization achieve its objectives?https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22497Overcoming Data Analytics Implementation Barriers
Getting the Most Out of Data AnalyticsGetting the Most Out of Data Analyticsd4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxqhttps://secure-cf-c.ooyala.com/d4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxq/rQqFhpGihXXoLKSn4xMDoxOjBrO-I4W8In part 1 of a two-part series, Corey Wells of Sunera discusses how CAEs see the value in data analytics, but may not always be fully aware of how to avail themselves to the highest and best use of the information. Onerous compliance regulations and increased levels of regulatory scrutiny make this a prime time to explore the possibilities.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22498Getting the Most Out of Data Analytics
Cybersecurity Part 2: The Upside and the DownsideCybersecurity Part 2: The Upside and the Downsides1eXZpdjpvZjbFO8lxRx9YfM413TJbKxhttps://secure-cf-c.ooyala.com/s1eXZpdjpvZjbFO8lxRx9YfM413TJbKx/MGngRNnbuHoiqTJH4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22510Cybersecurity Part 2: The Upside and the Downside
Cybersecurity Part 1: The Upside and the DownsideCybersecurity Part 1: The Upside and the Downsidex0ZmNndjoE06d1oQ62bQjoUS4IcnzSUchttps://secure-cf-c.ooyala.com/x0ZmNndjoE06d1oQ62bQjoUS4IcnzSUc/XzOTlMlQSGUnbGTX4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22513Cybersecurity Part 1: The Upside and the Downside
Internal Audit: Maximize the Big Data RevolutionInternal Audit: Maximize the Big Data RevolutionxrYmV4dDqW1SAchL5ocoK6-9JWwdDm0Lhttps://secure-cf-c.ooyala.com/xrYmV4dDqW1SAchL5ocoK6-9JWwdDm0L/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8Big data is such a big topic, it’s taken two installments on AuditChannel to cover it. Ankush Agarwal continues to offer his insights into how internal audit departments can take advantage of today’s plentiful tech resources to make us more valuable to our stakeholders.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22560Internal Audit: Maximize the Big Data Revolution
Change Management’s Impact on IT Audit, Part 5Change Management’s Impact on IT Audit, Part 5JrcDh0dDqcMAKgclp0JK_katJprs_h2mhttps://secure-cf-c.ooyala.com/JrcDh0dDqcMAKgclp0JK_katJprs_h2m/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8This installment concludes our series on multiple aspects of IT Auditing and covers additional phases of Change Management that John Livingston, senior IT auditor for Medical Mutual of Ohio, started in Part 4. Here he discusses the importance of prioritization and why analyzing unsuccessful changes is as important as studying the successful ones.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22568Change Management’s Impact on IT Audit, Part 5
Now Is the Time to Get Into the Analytics GameNow Is the Time to Get Into the Analytics GameNhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4Dhttps://secure-cf-c.ooyala.com/NhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4D/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Technology has never been so affordable or accessible so if you haven’t jumped into the deep end yet, now’s the time … it’s the Big Data Revolution. Ankush Agarwal of Exelon Corporation gives hints, tips, and tricks on the versatility and usefulness of building and deploying analytics to support internal audit and financial controls.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22573Now Is the Time to Get Into the Analytics Game
IT Auditing and Change Management, Part 4IT Auditing and Change Management, Part 4cwMnhmdDrm-tYMT1XoTpqzbYopXKshiihttps://secure-cf-c.ooyala.com/cwMnhmdDrm-tYMT1XoTpqzbYopXKshii/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Change Management is such a big topic, that this video only touches on a few of the elements John Livingston, senior IT auditor for Medical Mutual of Ohio, talked about in his conversation with The IIA. More to come in Part 5 of this ongoing series on issues within IT Auditing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22581IT Auditing and Change Management, Part 4

Most Popular


 

 

GAM 2017 Speaker Preview – Steve SandersGAM 2017 Speaker Preview – Steve Sandersc3OHlxOTE6bQctBYvSsIomLoZykWy67Uhttps://secure-cf-c.ooyala.com/c3OHlxOTE6bQctBYvSsIomLoZykWy67U/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8Attending the 2017 General Audit Management (GAM) Conference is your chance to get ahead of the latest issues facing today’s executives in internal audit. Here Speaker Steve Sanders, vice president of Internal Audit, Computer Services, Inc., provides insight on how we are losing the cyber war, and it's due in large part to one major mistake in our thinking. Make sure you don’t miss his session, register for GAM 2017 today! <a href="https://na.theiia.org/training/conferences/GAM/Pages/GAM-Conference.aspx">www.theiia.org/GAM</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21865GAM 2017 Speaker Preview – Steve Sanders
GAM 2017 Speaker Preview – Karl RiemGAM 2017 Speaker Preview – Karl Riemh1cXhxOTE6ACfwO39JpBpf7eZTAY6-ndhttps://secure-cf-c.ooyala.com/h1cXhxOTE6ACfwO39JpBpf7eZTAY6-nd/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Attending the 2017 General Audit Management (GAM) Conference is your chance to get ahead of the latest issues facing today’s executives in internal audit. Here Speaker Karl Riem, senior vice president and general auditor for the Federal Reserve Bank of Minneapolis, provides insights on how you can jump-start your work into continuous auditing and data analytics while applying the learnings from others. Make sure you don’t miss his session, register for GAM 2017 today! <a href="https://na.theiia.org/training/conferences/GAM/Pages/GAM-Conference.aspx">www.theiia.org/GAM</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21866GAM 2017 Speaker Preview – Karl Riem
Application Testing: Not Just for IT Auditors, Pt 2Application Testing: Not Just for IT Auditors, Pt 2Rybzc2NjE6QSLYDQmoHVHSkoOah4At6phttps://secure-cf-c.ooyala.com/Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In this two-part series, Richard Fowler from Huntington Ingalls Industries discusses application controls and “easy wins” for those auditors just now venturing into the waters of IT Auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=tndzI0NjE67gpFHjAAb6PmYyxz887fGt" target="_blank">Click here to watch Part 1 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21935Application Testing: Not Just for IT Auditors, Pt 2
Application Testing: Not Just for IT Auditors, Pt 1Application Testing: Not Just for IT Auditors, Pt 1tndzI0NjE67gpFHjAAb6PmYyxz887fGthttps://secure-cf-c.ooyala.com/tndzI0NjE67gpFHjAAb6PmYyxz887fGt/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Richard Fowler, senior audit specialist at Huntington Ingalls Industries, discusses application controls and “easy wins” for auditors just now venturing into the waters of IT auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p" target="_blank">Click here to watch Part 2 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21938Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3New Security Controls to Fight Modern Threats, Pt 3t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46https://secure-cf-c.ooyala.com/t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21942New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2New Security Controls to Fight Modern Threats, Pt 2NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJfhttps://secure-cf-c.ooyala.com/NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21943New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1New Security Controls to Fight Modern Threats, Pt 1FiYTR1NTE6VvIwchDkpSHLjIDohU4lhphttps://secure-cf-c.ooyala.com/FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21948New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2Proactively Managing the Cyber Threat Landscape, Pt 2BuNzBmNTE6xwDyX1r6062CNNh7z3utf5https://secure-cf-c.ooyala.com/BuNzBmNTE6xwDyX1r6062CNNh7z3utf5/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21959Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1Proactively Managing the Cyber Threat Landscape, Pt 1J4a3llNTE6C0YVy8wKjLmX4KD13Y80SUhttps://secure-cf-c.ooyala.com/J4a3llNTE6C0YVy8wKjLmX4KD13Y80SU/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21960Proactively Managing the Cyber Threat Landscape, Pt 1
2016 International Conference Speaker Preview: Iyad Mourtada2016 International Conference Speaker Preview: Iyad Mourtadal5MGtzMjE6QbNMbS-58KUizDIwiQYUhMhttps://secure-cf-c.ooyala.com/l5MGtzMjE6QbNMbS-58KUizDIwiQYUhM/heCDP4pTuni5z6vX4xMDoxOjBrO-I4W8In this 2016 International Conference session preview, Shannon Steffee, senior editor for Internal Auditor magazine, interviews Iyad Mourtada, managing director at OpenThinking in the United Arab Emirates. Mourtada will present two sessions at The IIA’s International Conference in New York. His first session, “The Future of Internal Auditing Beyond 2016,” will take place on Monday, July 18, and his second session, “The Future of Fraud,” will be held Tuesday, July 19. In his sessions, Mourtada will share his views on evolution of internal audit's role as we move through 2016 and beyond, and discusses potential changes in audit core competencies for the future. Mourtada also explores how fraudsters use technological advances to their advantage and how internal auditors can best prepare themselves to detect ever-progressing fraud. Watch now to get a sneak peek of these sessions and then register for the 2016 International Conference, July 17‒20, today at <a href="https://ic.globaliia.org/">ic.globaliia.org</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=220772016 International Conference Speaker Preview: Iyad Mourtada
Cybersecurity Auditing in an Unsecure World-Cybersecurity Auditing in an Unsecure World-RjanQ2MDE69gd9K_kUArI-DmKnoXGNauhttps://secure-cf-c.ooyala.com/RjanQ2MDE69gd9K_kUArI-DmKnoXGNau/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Is your organization prepared in the event of a data breach? The IIA’s new course: Logging In: Auditing Cybersecurity in an Unsecure World, helps you develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Register now for The IIA’s new course, and become better prepared to tackle the threat of cybersecurity gaps. https://na.theiia.org/training/courses/Pages/Logging-In-Auditing-Cybersecurity-in-an-Unsecure-World.aspx https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22145Cybersecurity Auditing in an Unsecure World-
Advancing Internal Audit’s Use of Technology, Pt 2Advancing Internal Audit’s Use of Technology, Pt 2ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoLhttps://secure-cf-c.ooyala.com/ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8In part 2 of this two-part series, three audit pros continue talking about overcoming the challenges that come with their efforts to build their technology usage and making the most of the benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu" target="_blank">Click here to watch Part 1</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22217Advancing Internal Audit’s Use of Technology, Pt 2
Advancing Internal Audit’s Use of Technology, Pt 1Advancing Internal Audit’s Use of Technology, Pt 1RvYWEyeDr8JDVZIFHilunAFLRoN1eQiuhttps://secure-cf-c.ooyala.com/RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In part 1 of a two-part series, three audit pros talk about how they have advanced the use of technology in their audit departments and the resulting benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL" target="_blank">Click here to watch Part 2</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22218Advancing Internal Audit’s Use of Technology, Pt 1
More on IT Auditing Processes, Part 3More on IT Auditing Processes, Part 3xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRvhttps://secure-cf-c.ooyala.com/xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRv/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Part 3 of our series from John Livingston, senior IT auditor for Medical Mutual of Ohio, on IT Auditing explores several issues: Configuration Management, or Keeping Track of IT Assets, and Dimensions of CMDB Design.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22478More on IT Auditing Processes, Part 3
Overcoming Data Analytics Implementation BarriersOvercoming Data Analytics Implementation Barriers9maWc0dzobzJBZ8_In4WCtAw8r6U1bvhhttps://secure-cf-c.ooyala.com/9maWc0dzobzJBZ8_In4WCtAw8r6U1bvh/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8A sophisticated data analytics program can be a powerful tool for good in the right hands, but it doesn’t come without a price. How do you convince your senior leadership that the program’s cost – in terms of money, people, time, training resources, and more – will be offset by the information it will provide to help the organization achieve its objectives?https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22497Overcoming Data Analytics Implementation Barriers
Getting the Most Out of Data AnalyticsGetting the Most Out of Data Analyticsd4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxqhttps://secure-cf-c.ooyala.com/d4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxq/rQqFhpGihXXoLKSn4xMDoxOjBrO-I4W8In part 1 of a two-part series, Corey Wells of Sunera discusses how CAEs see the value in data analytics, but may not always be fully aware of how to avail themselves to the highest and best use of the information. Onerous compliance regulations and increased levels of regulatory scrutiny make this a prime time to explore the possibilities.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22498Getting the Most Out of Data Analytics
Cybersecurity Part 2: The Upside and the DownsideCybersecurity Part 2: The Upside and the Downsides1eXZpdjpvZjbFO8lxRx9YfM413TJbKxhttps://secure-cf-c.ooyala.com/s1eXZpdjpvZjbFO8lxRx9YfM413TJbKx/MGngRNnbuHoiqTJH4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22510Cybersecurity Part 2: The Upside and the Downside
Cybersecurity Part 1: The Upside and the DownsideCybersecurity Part 1: The Upside and the Downsidex0ZmNndjoE06d1oQ62bQjoUS4IcnzSUchttps://secure-cf-c.ooyala.com/x0ZmNndjoE06d1oQ62bQjoUS4IcnzSUc/XzOTlMlQSGUnbGTX4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22513Cybersecurity Part 1: The Upside and the Downside
Internal Audit: Maximize the Big Data RevolutionInternal Audit: Maximize the Big Data RevolutionxrYmV4dDqW1SAchL5ocoK6-9JWwdDm0Lhttps://secure-cf-c.ooyala.com/xrYmV4dDqW1SAchL5ocoK6-9JWwdDm0L/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8Big data is such a big topic, it’s taken two installments on AuditChannel to cover it. Ankush Agarwal continues to offer his insights into how internal audit departments can take advantage of today’s plentiful tech resources to make us more valuable to our stakeholders.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22560Internal Audit: Maximize the Big Data Revolution
Change Management’s Impact on IT Audit, Part 5Change Management’s Impact on IT Audit, Part 5JrcDh0dDqcMAKgclp0JK_katJprs_h2mhttps://secure-cf-c.ooyala.com/JrcDh0dDqcMAKgclp0JK_katJprs_h2m/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8This installment concludes our series on multiple aspects of IT Auditing and covers additional phases of Change Management that John Livingston, senior IT auditor for Medical Mutual of Ohio, started in Part 4. Here he discusses the importance of prioritization and why analyzing unsuccessful changes is as important as studying the successful ones.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22568Change Management’s Impact on IT Audit, Part 5
Now Is the Time to Get Into the Analytics GameNow Is the Time to Get Into the Analytics GameNhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4Dhttps://secure-cf-c.ooyala.com/NhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4D/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Technology has never been so affordable or accessible so if you haven’t jumped into the deep end yet, now’s the time … it’s the Big Data Revolution. Ankush Agarwal of Exelon Corporation gives hints, tips, and tricks on the versatility and usefulness of building and deploying analytics to support internal audit and financial controls.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22573Now Is the Time to Get Into the Analytics Game

All​​

 

 

GAM 2017 Speaker Preview – Steve SandersGAM 2017 Speaker Preview – Steve Sandersc3OHlxOTE6bQctBYvSsIomLoZykWy67Uhttps://secure-cf-c.ooyala.com/c3OHlxOTE6bQctBYvSsIomLoZykWy67U/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8Attending the 2017 General Audit Management (GAM) Conference is your chance to get ahead of the latest issues facing today’s executives in internal audit. Here Speaker Steve Sanders, vice president of Internal Audit, Computer Services, Inc., provides insight on how we are losing the cyber war, and it's due in large part to one major mistake in our thinking. Make sure you don’t miss his session, register for GAM 2017 today! <a href="https://na.theiia.org/training/conferences/GAM/Pages/GAM-Conference.aspx">www.theiia.org/GAM</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21865GAM 2017 Speaker Preview – Steve Sanders
GAM 2017 Speaker Preview – Karl RiemGAM 2017 Speaker Preview – Karl Riemh1cXhxOTE6ACfwO39JpBpf7eZTAY6-ndhttps://secure-cf-c.ooyala.com/h1cXhxOTE6ACfwO39JpBpf7eZTAY6-nd/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Attending the 2017 General Audit Management (GAM) Conference is your chance to get ahead of the latest issues facing today’s executives in internal audit. Here Speaker Karl Riem, senior vice president and general auditor for the Federal Reserve Bank of Minneapolis, provides insights on how you can jump-start your work into continuous auditing and data analytics while applying the learnings from others. Make sure you don’t miss his session, register for GAM 2017 today! <a href="https://na.theiia.org/training/conferences/GAM/Pages/GAM-Conference.aspx">www.theiia.org/GAM</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21866GAM 2017 Speaker Preview – Karl Riem
Application Testing: Not Just for IT Auditors, Pt 2Application Testing: Not Just for IT Auditors, Pt 2Rybzc2NjE6QSLYDQmoHVHSkoOah4At6phttps://secure-cf-c.ooyala.com/Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In this two-part series, Richard Fowler from Huntington Ingalls Industries discusses application controls and “easy wins” for those auditors just now venturing into the waters of IT Auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=tndzI0NjE67gpFHjAAb6PmYyxz887fGt" target="_blank">Click here to watch Part 1 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21935Application Testing: Not Just for IT Auditors, Pt 2
Application Testing: Not Just for IT Auditors, Pt 1Application Testing: Not Just for IT Auditors, Pt 1tndzI0NjE67gpFHjAAb6PmYyxz887fGthttps://secure-cf-c.ooyala.com/tndzI0NjE67gpFHjAAb6PmYyxz887fGt/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Richard Fowler, senior audit specialist at Huntington Ingalls Industries, discusses application controls and “easy wins” for auditors just now venturing into the waters of IT auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p" target="_blank">Click here to watch Part 2 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21938Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3New Security Controls to Fight Modern Threats, Pt 3t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46https://secure-cf-c.ooyala.com/t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21942New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2New Security Controls to Fight Modern Threats, Pt 2NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJfhttps://secure-cf-c.ooyala.com/NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21943New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1New Security Controls to Fight Modern Threats, Pt 1FiYTR1NTE6VvIwchDkpSHLjIDohU4lhphttps://secure-cf-c.ooyala.com/FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21948New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2Proactively Managing the Cyber Threat Landscape, Pt 2BuNzBmNTE6xwDyX1r6062CNNh7z3utf5https://secure-cf-c.ooyala.com/BuNzBmNTE6xwDyX1r6062CNNh7z3utf5/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21959Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1Proactively Managing the Cyber Threat Landscape, Pt 1J4a3llNTE6C0YVy8wKjLmX4KD13Y80SUhttps://secure-cf-c.ooyala.com/J4a3llNTE6C0YVy8wKjLmX4KD13Y80SU/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=21960Proactively Managing the Cyber Threat Landscape, Pt 1
2016 International Conference Speaker Preview: Iyad Mourtada2016 International Conference Speaker Preview: Iyad Mourtadal5MGtzMjE6QbNMbS-58KUizDIwiQYUhMhttps://secure-cf-c.ooyala.com/l5MGtzMjE6QbNMbS-58KUizDIwiQYUhM/heCDP4pTuni5z6vX4xMDoxOjBrO-I4W8In this 2016 International Conference session preview, Shannon Steffee, senior editor for Internal Auditor magazine, interviews Iyad Mourtada, managing director at OpenThinking in the United Arab Emirates. Mourtada will present two sessions at The IIA’s International Conference in New York. His first session, “The Future of Internal Auditing Beyond 2016,” will take place on Monday, July 18, and his second session, “The Future of Fraud,” will be held Tuesday, July 19. In his sessions, Mourtada will share his views on evolution of internal audit's role as we move through 2016 and beyond, and discusses potential changes in audit core competencies for the future. Mourtada also explores how fraudsters use technological advances to their advantage and how internal auditors can best prepare themselves to detect ever-progressing fraud. Watch now to get a sneak peek of these sessions and then register for the 2016 International Conference, July 17‒20, today at <a href="https://ic.globaliia.org/">ic.globaliia.org</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=220772016 International Conference Speaker Preview: Iyad Mourtada
Cybersecurity Auditing in an Unsecure World-Cybersecurity Auditing in an Unsecure World-RjanQ2MDE69gd9K_kUArI-DmKnoXGNauhttps://secure-cf-c.ooyala.com/RjanQ2MDE69gd9K_kUArI-DmKnoXGNau/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Is your organization prepared in the event of a data breach? The IIA’s new course: Logging In: Auditing Cybersecurity in an Unsecure World, helps you develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Register now for The IIA’s new course, and become better prepared to tackle the threat of cybersecurity gaps. https://na.theiia.org/training/courses/Pages/Logging-In-Auditing-Cybersecurity-in-an-Unsecure-World.aspx https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22145Cybersecurity Auditing in an Unsecure World-
Advancing Internal Audit’s Use of Technology, Pt 2Advancing Internal Audit’s Use of Technology, Pt 2ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoLhttps://secure-cf-c.ooyala.com/ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8In part 2 of this two-part series, three audit pros continue talking about overcoming the challenges that come with their efforts to build their technology usage and making the most of the benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu" target="_blank">Click here to watch Part 1</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22217Advancing Internal Audit’s Use of Technology, Pt 2
Advancing Internal Audit’s Use of Technology, Pt 1Advancing Internal Audit’s Use of Technology, Pt 1RvYWEyeDr8JDVZIFHilunAFLRoN1eQiuhttps://secure-cf-c.ooyala.com/RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In part 1 of a two-part series, three audit pros talk about how they have advanced the use of technology in their audit departments and the resulting benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL" target="_blank">Click here to watch Part 2</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22218Advancing Internal Audit’s Use of Technology, Pt 1
More on IT Auditing Processes, Part 3More on IT Auditing Processes, Part 3xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRvhttps://secure-cf-c.ooyala.com/xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRv/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Part 3 of our series from John Livingston, senior IT auditor for Medical Mutual of Ohio, on IT Auditing explores several issues: Configuration Management, or Keeping Track of IT Assets, and Dimensions of CMDB Design.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22478More on IT Auditing Processes, Part 3
Overcoming Data Analytics Implementation BarriersOvercoming Data Analytics Implementation Barriers9maWc0dzobzJBZ8_In4WCtAw8r6U1bvhhttps://secure-cf-c.ooyala.com/9maWc0dzobzJBZ8_In4WCtAw8r6U1bvh/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8A sophisticated data analytics program can be a powerful tool for good in the right hands, but it doesn’t come without a price. How do you convince your senior leadership that the program’s cost – in terms of money, people, time, training resources, and more – will be offset by the information it will provide to help the organization achieve its objectives?https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22497Overcoming Data Analytics Implementation Barriers
Getting the Most Out of Data AnalyticsGetting the Most Out of Data Analyticsd4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxqhttps://secure-cf-c.ooyala.com/d4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxq/rQqFhpGihXXoLKSn4xMDoxOjBrO-I4W8In part 1 of a two-part series, Corey Wells of Sunera discusses how CAEs see the value in data analytics, but may not always be fully aware of how to avail themselves to the highest and best use of the information. Onerous compliance regulations and increased levels of regulatory scrutiny make this a prime time to explore the possibilities.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22498Getting the Most Out of Data Analytics
Cybersecurity Part 2: The Upside and the DownsideCybersecurity Part 2: The Upside and the Downsides1eXZpdjpvZjbFO8lxRx9YfM413TJbKxhttps://secure-cf-c.ooyala.com/s1eXZpdjpvZjbFO8lxRx9YfM413TJbKx/MGngRNnbuHoiqTJH4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22510Cybersecurity Part 2: The Upside and the Downside
Cybersecurity Part 1: The Upside and the DownsideCybersecurity Part 1: The Upside and the Downsidex0ZmNndjoE06d1oQ62bQjoUS4IcnzSUchttps://secure-cf-c.ooyala.com/x0ZmNndjoE06d1oQ62bQjoUS4IcnzSUc/XzOTlMlQSGUnbGTX4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22513Cybersecurity Part 1: The Upside and the Downside
Internal Audit: Maximize the Big Data RevolutionInternal Audit: Maximize the Big Data RevolutionxrYmV4dDqW1SAchL5ocoK6-9JWwdDm0Lhttps://secure-cf-c.ooyala.com/xrYmV4dDqW1SAchL5ocoK6-9JWwdDm0L/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8Big data is such a big topic, it’s taken two installments on AuditChannel to cover it. Ankush Agarwal continues to offer his insights into how internal audit departments can take advantage of today’s plentiful tech resources to make us more valuable to our stakeholders.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22560Internal Audit: Maximize the Big Data Revolution
Change Management’s Impact on IT Audit, Part 5Change Management’s Impact on IT Audit, Part 5JrcDh0dDqcMAKgclp0JK_katJprs_h2mhttps://secure-cf-c.ooyala.com/JrcDh0dDqcMAKgclp0JK_katJprs_h2m/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8This installment concludes our series on multiple aspects of IT Auditing and covers additional phases of Change Management that John Livingston, senior IT auditor for Medical Mutual of Ohio, started in Part 4. Here he discusses the importance of prioritization and why analyzing unsuccessful changes is as important as studying the successful ones.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22568Change Management’s Impact on IT Audit, Part 5
Now Is the Time to Get Into the Analytics GameNow Is the Time to Get Into the Analytics GameNhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4Dhttps://secure-cf-c.ooyala.com/NhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4D/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Technology has never been so affordable or accessible so if you haven’t jumped into the deep end yet, now’s the time … it’s the Big Data Revolution. Ankush Agarwal of Exelon Corporation gives hints, tips, and tricks on the versatility and usefulness of building and deploying analytics to support internal audit and financial controls.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22573Now Is the Time to Get Into the Analytics Game
IT Auditing and Change Management, Part 4IT Auditing and Change Management, Part 4cwMnhmdDrm-tYMT1XoTpqzbYopXKshiihttps://secure-cf-c.ooyala.com/cwMnhmdDrm-tYMT1XoTpqzbYopXKshii/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Change Management is such a big topic, that this video only touches on a few of the elements John Livingston, senior IT auditor for Medical Mutual of Ohio, talked about in his conversation with The IIA. More to come in Part 5 of this ongoing series on issues within IT Auditing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22581IT Auditing and Change Management, Part 4
The Value of Problem Management in IT AuditingThe Value of Problem Management in IT Auditing1nbjAzdDrbAdaXRGXIGElcPRZItyJGQ9https://secure-cf-c.ooyala.com/1nbjAzdDrbAdaXRGXIGElcPRZItyJGQ9/Vx8lr-LI9TPdNKgn4xMDoxOjBrO-I4W8In part 1 of this series from John Livingston, senior IT auditor for Medical Mutual of Ohio, he delves into two topics of prime importance to IT auditors: Incidents and Problem Management. Stay tuned to other series installments including Problem Management Processes, the Risk Control Matrix, Configuration Management, and more.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22597The Value of Problem Management in IT Auditing
Problem Management and Risk ControlProblem Management and Risk Control45MmE1dDo3Ht3hHZiDJyJmf2v2LoW7pfhttps://secure-cf-c.ooyala.com/45MmE1dDo3Ht3hHZiDJyJmf2v2LoW7pf/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8In part 2 of this series from John Livingston, senior IT auditor for Medical Mutual of Ohio, he digs deeper into how Problem Management Processes and the Risk Control Matrix go hand-in-hand. One helps define potential negative business impacts, the other helps drill down to efforts that will mitigate potential outcomes.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22594Problem Management and Risk Control
Getting to a Safer, More Secure Digital WorldGetting to a Safer, More Secure Digital World8wOGw0czpgrjzv6zirL_hVr8cOQkFZfmhttps://secure-cf-c.ooyala.com/8wOGw0czpgrjzv6zirL_hVr8cOQkFZfm/YUAndpMCbXk_9hvX4xMDoxOjBrO-I4W8“There is no doubt in my mind that we will get to a safer and more secure digital world.” So said Jeff Spivey, president, Security Risk Management, in his presentation at The IIA’s 2014 All Star Conference. How that will happen is up for grabs, but Spivey offers some insight on what it will take to get there.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22644Getting to a Safer, More Secure Digital World
Keys to the Kingdom: Attack & Penetration TestingKeys to the Kingdom: Attack & Penetration Testing03Z3BzbjpbIkT0DVa5OQj9Xh5v7bfsVuhttps://secure-cf-c.ooyala.com/03Z3BzbjpbIkT0DVa5OQj9Xh5v7bfsVu/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8“One of the most value-added activities that an internal audit department can undertake is to be able to demonstrate clearly where (the organization) is vulnerable.” Joe Murphy on cybersecurity risks and Attack & Penetration Testing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22872Keys to the Kingdom: Attack & Penetration Testing
Reducing Cybersecurity Risks: Internal Audit's RoleReducing Cybersecurity Risks: Internal Audit's RolelsbGJmbjq1izLBTwstStwtwFYI64j0Uthttps://secure-cf-c.ooyala.com/lsbGJmbjq1izLBTwstStwtwFYI64j0Ut/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8Private and public sector organizations are facing increased risks of cyberattack. Robert Venczel discusses various ways internal auditors can reduce the cybersecurity risks in their organizations', including encrypting data and educating management.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22877Reducing Cybersecurity Risks: Internal Audit's Role
Data Analytics: No Reason to Reinvent the WheelData Analytics: No Reason to Reinvent the Wheelw3N2pkbjoXROlBaf_DYAFBUIQtf8EJ5Rhttps://secure-cf-c.ooyala.com/w3N2pkbjoXROlBaf_DYAFBUIQtf8EJ5R/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8Small audit departments may not be able to afford all the bells and whistles that come with special software packages. But Marcus French suggests that you might have perfectly capable tools at your disposal already, if you just learn to look at them differently.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22878Data Analytics: No Reason to Reinvent the Wheel
Integrating IT Into ERM: The Whole PictureIntegrating IT Into ERM: The Whole PicturekwZGlibjo2YQS1NEg3HHOvoXu07FBn4qhttps://secure-cf-c.ooyala.com/kwZGlibjo2YQS1NEg3HHOvoXu07FBn4q/YUAndpMCbXk_9hvX4xMDoxOjBrO-I4W8Xenia Ley Parker advises a big picture view when it comes to incorporating IT into ERM, requiring participation from all parties involved. It’s not easy to accomplish, but by integrating IT from the beginning, you get the genuine picture of the real risk to the enterprise.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22881Integrating IT Into ERM: The Whole Picture
Internal Audit in 2020Internal Audit in 2020sycWpzdzph213ndAuzyhjkJSZ3oVP6dAhttps://secure-cf-c.ooyala.com/sycWpzdzph213ndAuzyhjkJSZ3oVP6dA/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8What will internal audit look like in 2020? In the December issue of IA magazine, seven leading internal auditors offer their 2020 visions of the future of the profession, which includes an increasing focus on risk management, governance, and technology issues. Look for the release of the December issue in your mailbox and on internalauditoronline.org beginning Dec. 1.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22369Internal Audit in 2020
Cisco's Audit TechnologyCisco's Audit TechnologypmcGpzdzpkgCuwKOb9aJbrSseNrHQltbhttps://secure-cf-c.ooyala.com/pmcGpzdzpkgCuwKOb9aJbrSseNrHQltb/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8Cisco CAE Tom Austin discusses how the company's internal audit function leverages analytics technology. In the June issue of Ia magazine, Austin and other technology industry CAEs discuss how internal audit works in fast-changing companies. Look for the June issue in your mailbox and on internalauditoronline.org beginning June 1.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22371Cisco's Audit Technology
Using Technology to Enhance Internal Audit's ValueUsing Technology to Enhance Internal Audit's Value5ta2pzdzoHR4zyhZR87beh0U9MqY5_smhttps://secure-cf-c.ooyala.com/5ta2pzdzoHR4zyhZR87beh0U9MqY5_sm/x0JBUkvnwpAy-qi34xMDoxOjBrO-I4W8Warren Stippich and Priya Sarjoo discuss how audit executives can rise to new challenges by effectively using technology. They also provide some of the results from the Chief Auditor Executive Survey given at GAM 2013. GRC technology usage is very slow to boot up. Corporations are moving towards business analytics, management, intelligence, and performance outside the internal audit function.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22397Using Technology to Enhance Internal Audit's Value
IT Auditing and Emerging TechnologyIT Auditing and Emerging TechnologyNkampzdzrKmJwwdS98fj9h-DGuI-PIK2https://secure-cf-c.ooyala.com/NkampzdzrKmJwwdS98fj9h-DGuI-PIK2/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Tichaona Zororo discusses the changing landscape for IT auditors. Emerging technology has become pervasive, changing the way business is being done. Companies are taking advantage of emerging technology such as cloud computing, big data, social media, bring your own device and mobility to build sustainable competitive advantages. IT Auditors, today more than ever, need to change from their traditional means of auditing and focus on this key emerging technology such as social media, big data, and bring your own device. Because that is where the risk lies.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22401IT Auditing and Emerging Technology
Starting a Data Analytics TeamStarting a Data Analytics Teams5ampzdzrQ7bv9erSaks6-e57JuQvZdDhttps://secure-cf-c.ooyala.com/s5ampzdzrQ7bv9erSaks6-e57JuQvZdD/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Data analytics is important to a successful internal audit. Sahil Bhalla discusses how to start a data analytics program in your division. Bhalla provides three steps to getting started. Obtain buy-in, invest in dedicated resources and technology, and show small wins. Some data analytics tools include SAS, ACL, IDEA, and Access.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22402Starting a Data Analytics Team
Data Analytics and FraudData Analytics and FraudJ5Z2pzdzphFPSj5pmntwwuAvhvc_i-_1https://secure-cf-c.ooyala.com/J5Z2pzdzphFPSj5pmntwwuAvhvc_i-_1/XzOTlMlQSGUnbGTX4xMDoxOjBrO-I4W8Cleaning "dirty data" is one of five steps internal auditors can take to improve their use of data analytics to uncover fraud, says Stefan Sapundzhiev, head of internal audit, Directorate General, Internal Market and Services of the European Commission.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22412Data Analytics and Fraud
Coming to Grips With CybersecurityComing to Grips With CybersecurityJjbGRzcDpvRfJDCW0v04sY3ijkRJFjn2https://secure-cf-c.ooyala.com/JjbGRzcDpvRfJDCW0v04sY3ijkRJFjn2/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Cybersecurity is a never-ending battle. Pervez Bamji with Pitney Bowes outlines some preliminary steps and suggests some resources you may not have thought about to make sure your program is layered appropriately.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22812Coming to Grips With Cybersecurity
Rethink Your Approach to TechnologyRethink Your Approach to TechnologyVuMmFmMjE6pHt1t5yjjJryqWWKf79Hubhttps://secure-cf-c.ooyala.com/VuMmFmMjE6pHt1t5yjjJryqWWKf79Hub/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8Norman Marks, a technology evangelist, encourages internal auditors to refresh and rethink their approach to using technology to do their work.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22084Rethink Your Approach to Technology
Social Media: 3 Key Areas to AuditSocial Media: 3 Key Areas to AuditJnaGtzdzr-RuI2xkFuEu53RYpTfS9rJ6https://secure-cf-c.ooyala.com/JnaGtzdzr-RuI2xkFuEu53RYpTfS9rJ6/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Robert Berry, director of internal auditing for the University of North Florida, discusses three areas auditors should be assessing in audits of the organization's social media efforts.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22253Social Media: 3 Key Areas to Audit
5 Risks of Cloud Computing5 Risks of Cloud Computingt4Z2tzdzqaOadL2v8Pwm_3wdgSn1aSz9https://secure-cf-c.ooyala.com/t4Z2tzdzqaOadL2v8Pwm_3wdgSn1aSz9/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8Matt Thompson, a managing director with Grant Thornton, discusses five risks associated with outsourcing to the cloud.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=222565 Risks of Cloud Computing
Key Challenges of a Fortune 500 CAEKey Challenges of a Fortune 500 CAEJyY2tzdzq1xDU7lHipg7CZKtd3eiO-Qjhttps://secure-cf-c.ooyala.com/JyY2tzdzq1xDU7lHipg7CZKtd3eiO-Qj/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8Kris Shellum-Allenson, discusses the challenges she has faced over the past year as vice president and CAE of Sears Holding Corp., including keeping up with the rapid growth of the company's e-commerce model, addressing risks around off-shoring, and using technology more proactively. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=22274Key Challenges of a Fortune 500 CAE