Technology


 

 

Addressing Resource Issues With ITAddressing Resource Issues With IT11/29/2018 3:46:10 PMIxNTFyZzE6zpyjLT4tRan5qHifj95Lhy25fa4687ddd4a7bb20f5b365516e6c9http://cf.c.ooyala.com/IxNTFyZzE6zpyjLT4tRan5qHifj95Lhy/promo367787990As the head of a small audit function, Alice Mariano and her team leverage technology extensively to perform day-to-day audit work. Mariano sheds light on how IT tools have helped her address internal audit’s resource challenges and reveals the types of tools she relies on most.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154526Addressing Resource Issues With IT

OnDemand Training

Most Recent


 

 

Small Department, Big ChallengeSmall Department, Big ChallengexkYjFyZzE62atjaL3gjQ96wutZBBBAHWhttp://cf.c.ooyala.com/xkYjFyZzE62atjaL3gjQ96wutZBBBAHW/promo367784399Alice Mariano describes the greatest technology challenge she and her team at North Carolina Farm Bureau Mutual Insurance have faced as a small audit function. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154525Small Department, Big Challenge
IT Skills for Today's AuditorsIT Skills for Today's AuditorsMwNzJyZzE6yLb85ct0vJV5268EnJG3Ishttp://cf.c.ooyala.com/MwNzJyZzE6yLb85ct0vJV5268EnJG3Is/promo367784075Insurance industry audit director Alice Mariano shares her thoughts on the type of technology expertise auditors need to possess, as well as accompanying nontechnology skills that she says are just as important.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154527IT Skills for Today's Auditors
Blockchain: Risks and OpportunitiesBlockchain: Risks and OpportunitiesV5bWJiZzE60UxBdtwSfHlfloBAKqDMSnhttp://cf.c.ooyala.com/V5bWJiZzE60UxBdtwSfHlfloBAKqDMSn/promo362326151Senior IT Auditor Scott Moore of Devon Energy examines risks associated with organizational use of blockchain, as well as potential benefits the technology may hold for internal auditing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154491Blockchain: Risks and Opportunities
Cybersecurity: Collaborative AssuranceCybersecurity: Collaborative AssurancexwbGJiZzE6h2ASgkOkxKDzja4kDQ7NmBhttp://cf.c.ooyala.com/xwbGJiZzE6h2ASgkOkxKDzja4kDQ7NmB/promo362326163Nathan Anderson, senior director, Internal Audit, at McDonald’s Corp., discusses internal audit’s partners in cybersecurity assurance.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154492Cybersecurity: Collaborative Assurance
Understanding BlockchainUnderstanding BlockchainZjOWczZzE6sMTENq1KnaOIpjPIHPjhP7http://cf.c.ooyala.com/ZjOWczZzE6sMTENq1KnaOIpjPIHPjhP7/promo359845194Scott Moore, senior IT auditor at Devon Energy, explains blockchain technology, its business applications, and what impact it might have on audit and assurance processes.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154482Understanding Blockchain
Cybersecurity: Threats and ExpertiseCybersecurity: Threats and ExpertisewwaGczZzE6ucB4IfXloSbaN9l6yCqY6Khttp://cf.c.ooyala.com/wwaGczZzE6ucB4IfXloSbaN9l6yCqY6K/promo359845456Nathan Anderson, senior director, Internal Audit, at McDonalds Corp., discusses the most significant cyber threats facing his organization and the types of expertise internal auditors need to address them.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154483Cybersecurity: Threats and Expertise
The State of Cybersecurity: Part 3The State of Cybersecurity: Part 3J1YTlxZDE6Ckk84jP1LlX8P4uAhIkbnphttps://secure-cf-c.ooyala.com/J1YTlxZDE6Ckk84jP1LlX8P4uAhIkbnp/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8Three experts share their thoughts on the effectiveness of today’s cybersecurity measures.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=152143The State of Cybersecurity: Part 3
The State of Cybersecurity: Part 1The State of Cybersecurity: Part 1dnbjhxZDE6Oaui4NLWNXFVQZSiF__JuGhttp://cf.c.ooyala.com/dnbjhxZDE6Oaui4NLWNXFVQZSiF__JuG/promo337966679Several experts discuss the gap between existing organizational cybersecurity and what ideally should be done to protect against today’s threats.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=152144The State of Cybersecurity: Part 1
The State of Cybersecurity: Part 2The State of Cybersecurity: Part 2hvM2t1ZDE6HOfkF41_BJHBWE184iMkjvhttp://cf.c.ooyala.com/hvM2t1ZDE6HOfkF41_BJHBWE184iMkjv/promo339347536Where does cybersecurity rank on the board’s agenda? Several experts weigh in, discussing the level of board engagement at their organization.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=152140The State of Cybersecurity: Part 2
Ethical Use of Data in the FutureEthical Use of Data in the FutureF4d2t2YzE6Y-HFVINKY8xsYBAfYmnXTJhttps://secure-cf-c.ooyala.com/F4d2t2YzE6Y-HFVINKY8xsYBAfYmnXTJ/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8CAEs discuss how they expect internal audit will address the ethical use of data in the future, especially in the areas of privacy and training.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153313Ethical Use of Data in the Future
Application Testing: Not Just for IT Auditors, Pt 2Application Testing: Not Just for IT Auditors, Pt 2Rybzc2NjE6QSLYDQmoHVHSkoOah4At6phttps://secure-cf-c.ooyala.com/Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In this two-part series, Richard Fowler from Huntington Ingalls Industries discusses application controls and “easy wins” for those auditors just now venturing into the waters of IT Auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=tndzI0NjE67gpFHjAAb6PmYyxz887fGt" target="_blank">Click here to watch Part 1 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153484Application Testing: Not Just for IT Auditors, Pt 2
Application Testing: Not Just for IT Auditors, Pt 1Application Testing: Not Just for IT Auditors, Pt 1tndzI0NjE67gpFHjAAb6PmYyxz887fGthttps://secure-cf-c.ooyala.com/tndzI0NjE67gpFHjAAb6PmYyxz887fGt/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Richard Fowler, senior audit specialist at Huntington Ingalls Industries, discusses application controls and “easy wins” for auditors just now venturing into the waters of IT auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p" target="_blank">Click here to watch Part 2 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153487Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3New Security Controls to Fight Modern Threats, Pt 3t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46https://secure-cf-c.ooyala.com/t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153491New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2New Security Controls to Fight Modern Threats, Pt 2NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJfhttps://secure-cf-c.ooyala.com/NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153492New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1New Security Controls to Fight Modern Threats, Pt 1FiYTR1NTE6VvIwchDkpSHLjIDohU4lhphttps://secure-cf-c.ooyala.com/FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153497New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2Proactively Managing the Cyber Threat Landscape, Pt 2BuNzBmNTE6xwDyX1r6062CNNh7z3utf5https://secure-cf-c.ooyala.com/BuNzBmNTE6xwDyX1r6062CNNh7z3utf5/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153508Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1Proactively Managing the Cyber Threat Landscape, Pt 1J4a3llNTE6C0YVy8wKjLmX4KD13Y80SUhttps://secure-cf-c.ooyala.com/J4a3llNTE6C0YVy8wKjLmX4KD13Y80SU/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153509Proactively Managing the Cyber Threat Landscape, Pt 1
2016 International Conference Speaker Preview: Iyad Mourtada2016 International Conference Speaker Preview: Iyad Mourtadal5MGtzMjE6QbNMbS-58KUizDIwiQYUhMhttps://secure-cf-c.ooyala.com/l5MGtzMjE6QbNMbS-58KUizDIwiQYUhM/heCDP4pTuni5z6vX4xMDoxOjBrO-I4W8In this 2016 International Conference session preview, Shannon Steffee, senior editor for Internal Auditor magazine, interviews Iyad Mourtada, managing director at OpenThinking in the United Arab Emirates. Mourtada will present two sessions at The IIA’s International Conference in New York. His first session, “The Future of Internal Auditing Beyond 2016,” will take place on Monday, July 18, and his second session, “The Future of Fraud,” will be held Tuesday, July 19. In his sessions, Mourtada will share his views on evolution of internal audit's role as we move through 2016 and beyond, and discusses potential changes in audit core competencies for the future. Mourtada also explores how fraudsters use technological advances to their advantage and how internal auditors can best prepare themselves to detect ever-progressing fraud. Watch now to get a sneak peek of these sessions and then register for the 2016 International Conference, July 17‒20, today at <a href="https://ic.globaliia.org/">ic.globaliia.org</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=1536262016 International Conference Speaker Preview: Iyad Mourtada
Cybersecurity Auditing in an Unsecure WorldCybersecurity Auditing in an Unsecure WorldRjanQ2MDE69gd9K_kUArI-DmKnoXGNauhttps://secure-cf-c.ooyala.com/RjanQ2MDE69gd9K_kUArI-DmKnoXGNau/DLOokYc8UKM-fB9H4yMDoxOjBrO0ctNrIs your organization prepared in the event of a data breach? The IIA’s new course: Logging In: Auditing Cybersecurity in an Unsecure World, helps you develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Register now for The IIA’s new course, and become better prepared to tackle the threat of cybersecurity gaps. <a href="https://na.theiia.org/training/courses/Pages/Cybersecurity-Auditing-in-an-Unsecure-World.aspx">www.theiia.org/auditingcybersecurity</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153694Cybersecurity Auditing in an Unsecure World
Advancing Internal Audit’s Use of Technology, Pt 2Advancing Internal Audit’s Use of Technology, Pt 2ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoLhttps://secure-cf-c.ooyala.com/ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8In part 2 of this two-part series, three audit pros continue talking about overcoming the challenges that come with their efforts to build their technology usage and making the most of the benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu" target="_blank">Click here to watch Part 1</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153766Advancing Internal Audit’s Use of Technology, Pt 2
Advancing Internal Audit’s Use of Technology, Pt 1Advancing Internal Audit’s Use of Technology, Pt 1RvYWEyeDr8JDVZIFHilunAFLRoN1eQiuhttps://secure-cf-c.ooyala.com/RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In part 1 of a two-part series, three audit pros talk about how they have advanced the use of technology in their audit departments and the resulting benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL" target="_blank">Click here to watch Part 2</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153767Advancing Internal Audit’s Use of Technology, Pt 1

Most Popular


 

 

Addressing Resource Issues With ITAddressing Resource Issues With ITIxNTFyZzE6zpyjLT4tRan5qHifj95Lhyhttp://cf.c.ooyala.com/IxNTFyZzE6zpyjLT4tRan5qHifj95Lhy/promo367787990As the head of a small audit function, Alice Mariano and her team leverage technology extensively to perform day-to-day audit work. Mariano sheds light on how IT tools have helped her address internal audit’s resource challenges and reveals the types of tools she relies on most.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154526Addressing Resource Issues With IT
Small Department, Big ChallengeSmall Department, Big ChallengexkYjFyZzE62atjaL3gjQ96wutZBBBAHWhttp://cf.c.ooyala.com/xkYjFyZzE62atjaL3gjQ96wutZBBBAHW/promo367784399Alice Mariano describes the greatest technology challenge she and her team at North Carolina Farm Bureau Mutual Insurance have faced as a small audit function. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154525Small Department, Big Challenge
IT Skills for Today's AuditorsIT Skills for Today's AuditorsMwNzJyZzE6yLb85ct0vJV5268EnJG3Ishttp://cf.c.ooyala.com/MwNzJyZzE6yLb85ct0vJV5268EnJG3Is/promo367784075Insurance industry audit director Alice Mariano shares her thoughts on the type of technology expertise auditors need to possess, as well as accompanying nontechnology skills that she says are just as important.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154527IT Skills for Today's Auditors
Blockchain: Risks and OpportunitiesBlockchain: Risks and OpportunitiesV5bWJiZzE60UxBdtwSfHlfloBAKqDMSnhttp://cf.c.ooyala.com/V5bWJiZzE60UxBdtwSfHlfloBAKqDMSn/promo362326151Senior IT Auditor Scott Moore of Devon Energy examines risks associated with organizational use of blockchain, as well as potential benefits the technology may hold for internal auditing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154491Blockchain: Risks and Opportunities
Cybersecurity: Collaborative AssuranceCybersecurity: Collaborative AssurancexwbGJiZzE6h2ASgkOkxKDzja4kDQ7NmBhttp://cf.c.ooyala.com/xwbGJiZzE6h2ASgkOkxKDzja4kDQ7NmB/promo362326163Nathan Anderson, senior director, Internal Audit, at McDonald’s Corp., discusses internal audit’s partners in cybersecurity assurance.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154492Cybersecurity: Collaborative Assurance
Understanding BlockchainUnderstanding BlockchainZjOWczZzE6sMTENq1KnaOIpjPIHPjhP7http://cf.c.ooyala.com/ZjOWczZzE6sMTENq1KnaOIpjPIHPjhP7/promo359845194Scott Moore, senior IT auditor at Devon Energy, explains blockchain technology, its business applications, and what impact it might have on audit and assurance processes.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154482Understanding Blockchain
Cybersecurity: Threats and ExpertiseCybersecurity: Threats and ExpertisewwaGczZzE6ucB4IfXloSbaN9l6yCqY6Khttp://cf.c.ooyala.com/wwaGczZzE6ucB4IfXloSbaN9l6yCqY6K/promo359845456Nathan Anderson, senior director, Internal Audit, at McDonalds Corp., discusses the most significant cyber threats facing his organization and the types of expertise internal auditors need to address them.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154483Cybersecurity: Threats and Expertise
The State of Cybersecurity: Part 3The State of Cybersecurity: Part 3J1YTlxZDE6Ckk84jP1LlX8P4uAhIkbnphttps://secure-cf-c.ooyala.com/J1YTlxZDE6Ckk84jP1LlX8P4uAhIkbnp/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8Three experts share their thoughts on the effectiveness of today’s cybersecurity measures.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=152143The State of Cybersecurity: Part 3
The State of Cybersecurity: Part 1The State of Cybersecurity: Part 1dnbjhxZDE6Oaui4NLWNXFVQZSiF__JuGhttp://cf.c.ooyala.com/dnbjhxZDE6Oaui4NLWNXFVQZSiF__JuG/promo337966679Several experts discuss the gap between existing organizational cybersecurity and what ideally should be done to protect against today’s threats.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=152144The State of Cybersecurity: Part 1
The State of Cybersecurity: Part 2The State of Cybersecurity: Part 2hvM2t1ZDE6HOfkF41_BJHBWE184iMkjvhttp://cf.c.ooyala.com/hvM2t1ZDE6HOfkF41_BJHBWE184iMkjv/promo339347536Where does cybersecurity rank on the board’s agenda? Several experts weigh in, discussing the level of board engagement at their organization.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=152140The State of Cybersecurity: Part 2
Ethical Use of Data in the FutureEthical Use of Data in the FutureF4d2t2YzE6Y-HFVINKY8xsYBAfYmnXTJhttps://secure-cf-c.ooyala.com/F4d2t2YzE6Y-HFVINKY8xsYBAfYmnXTJ/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8CAEs discuss how they expect internal audit will address the ethical use of data in the future, especially in the areas of privacy and training.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153313Ethical Use of Data in the Future
Application Testing: Not Just for IT Auditors, Pt 2Application Testing: Not Just for IT Auditors, Pt 2Rybzc2NjE6QSLYDQmoHVHSkoOah4At6phttps://secure-cf-c.ooyala.com/Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In this two-part series, Richard Fowler from Huntington Ingalls Industries discusses application controls and “easy wins” for those auditors just now venturing into the waters of IT Auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=tndzI0NjE67gpFHjAAb6PmYyxz887fGt" target="_blank">Click here to watch Part 1 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153484Application Testing: Not Just for IT Auditors, Pt 2
Application Testing: Not Just for IT Auditors, Pt 1Application Testing: Not Just for IT Auditors, Pt 1tndzI0NjE67gpFHjAAb6PmYyxz887fGthttps://secure-cf-c.ooyala.com/tndzI0NjE67gpFHjAAb6PmYyxz887fGt/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Richard Fowler, senior audit specialist at Huntington Ingalls Industries, discusses application controls and “easy wins” for auditors just now venturing into the waters of IT auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p" target="_blank">Click here to watch Part 2 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153487Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3New Security Controls to Fight Modern Threats, Pt 3t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46https://secure-cf-c.ooyala.com/t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153491New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2New Security Controls to Fight Modern Threats, Pt 2NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJfhttps://secure-cf-c.ooyala.com/NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153492New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1New Security Controls to Fight Modern Threats, Pt 1FiYTR1NTE6VvIwchDkpSHLjIDohU4lhphttps://secure-cf-c.ooyala.com/FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153497New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2Proactively Managing the Cyber Threat Landscape, Pt 2BuNzBmNTE6xwDyX1r6062CNNh7z3utf5https://secure-cf-c.ooyala.com/BuNzBmNTE6xwDyX1r6062CNNh7z3utf5/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153508Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1Proactively Managing the Cyber Threat Landscape, Pt 1J4a3llNTE6C0YVy8wKjLmX4KD13Y80SUhttps://secure-cf-c.ooyala.com/J4a3llNTE6C0YVy8wKjLmX4KD13Y80SU/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153509Proactively Managing the Cyber Threat Landscape, Pt 1
2016 International Conference Speaker Preview: Iyad Mourtada2016 International Conference Speaker Preview: Iyad Mourtadal5MGtzMjE6QbNMbS-58KUizDIwiQYUhMhttps://secure-cf-c.ooyala.com/l5MGtzMjE6QbNMbS-58KUizDIwiQYUhM/heCDP4pTuni5z6vX4xMDoxOjBrO-I4W8In this 2016 International Conference session preview, Shannon Steffee, senior editor for Internal Auditor magazine, interviews Iyad Mourtada, managing director at OpenThinking in the United Arab Emirates. Mourtada will present two sessions at The IIA’s International Conference in New York. His first session, “The Future of Internal Auditing Beyond 2016,” will take place on Monday, July 18, and his second session, “The Future of Fraud,” will be held Tuesday, July 19. In his sessions, Mourtada will share his views on evolution of internal audit's role as we move through 2016 and beyond, and discusses potential changes in audit core competencies for the future. Mourtada also explores how fraudsters use technological advances to their advantage and how internal auditors can best prepare themselves to detect ever-progressing fraud. Watch now to get a sneak peek of these sessions and then register for the 2016 International Conference, July 17‒20, today at <a href="https://ic.globaliia.org/">ic.globaliia.org</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=1536262016 International Conference Speaker Preview: Iyad Mourtada
Cybersecurity Auditing in an Unsecure WorldCybersecurity Auditing in an Unsecure WorldRjanQ2MDE69gd9K_kUArI-DmKnoXGNauhttps://secure-cf-c.ooyala.com/RjanQ2MDE69gd9K_kUArI-DmKnoXGNau/DLOokYc8UKM-fB9H4yMDoxOjBrO0ctNrIs your organization prepared in the event of a data breach? The IIA’s new course: Logging In: Auditing Cybersecurity in an Unsecure World, helps you develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Register now for The IIA’s new course, and become better prepared to tackle the threat of cybersecurity gaps. <a href="https://na.theiia.org/training/courses/Pages/Cybersecurity-Auditing-in-an-Unsecure-World.aspx">www.theiia.org/auditingcybersecurity</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153694Cybersecurity Auditing in an Unsecure World
Advancing Internal Audit’s Use of Technology, Pt 2Advancing Internal Audit’s Use of Technology, Pt 2ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoLhttps://secure-cf-c.ooyala.com/ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8In part 2 of this two-part series, three audit pros continue talking about overcoming the challenges that come with their efforts to build their technology usage and making the most of the benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu" target="_blank">Click here to watch Part 1</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153766Advancing Internal Audit’s Use of Technology, Pt 2

All​​

 

 

Addressing Resource Issues With ITAddressing Resource Issues With ITIxNTFyZzE6zpyjLT4tRan5qHifj95Lhyhttp://cf.c.ooyala.com/IxNTFyZzE6zpyjLT4tRan5qHifj95Lhy/promo367787990As the head of a small audit function, Alice Mariano and her team leverage technology extensively to perform day-to-day audit work. Mariano sheds light on how IT tools have helped her address internal audit’s resource challenges and reveals the types of tools she relies on most.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154526Addressing Resource Issues With IT
Small Department, Big ChallengeSmall Department, Big ChallengexkYjFyZzE62atjaL3gjQ96wutZBBBAHWhttp://cf.c.ooyala.com/xkYjFyZzE62atjaL3gjQ96wutZBBBAHW/promo367784399Alice Mariano describes the greatest technology challenge she and her team at North Carolina Farm Bureau Mutual Insurance have faced as a small audit function. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154525Small Department, Big Challenge
IT Skills for Today's AuditorsIT Skills for Today's AuditorsMwNzJyZzE6yLb85ct0vJV5268EnJG3Ishttp://cf.c.ooyala.com/MwNzJyZzE6yLb85ct0vJV5268EnJG3Is/promo367784075Insurance industry audit director Alice Mariano shares her thoughts on the type of technology expertise auditors need to possess, as well as accompanying nontechnology skills that she says are just as important.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154527IT Skills for Today's Auditors
Blockchain: Risks and OpportunitiesBlockchain: Risks and OpportunitiesV5bWJiZzE60UxBdtwSfHlfloBAKqDMSnhttp://cf.c.ooyala.com/V5bWJiZzE60UxBdtwSfHlfloBAKqDMSn/promo362326151Senior IT Auditor Scott Moore of Devon Energy examines risks associated with organizational use of blockchain, as well as potential benefits the technology may hold for internal auditing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154491Blockchain: Risks and Opportunities
Cybersecurity: Collaborative AssuranceCybersecurity: Collaborative AssurancexwbGJiZzE6h2ASgkOkxKDzja4kDQ7NmBhttp://cf.c.ooyala.com/xwbGJiZzE6h2ASgkOkxKDzja4kDQ7NmB/promo362326163Nathan Anderson, senior director, Internal Audit, at McDonald’s Corp., discusses internal audit’s partners in cybersecurity assurance.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154492Cybersecurity: Collaborative Assurance
Understanding BlockchainUnderstanding BlockchainZjOWczZzE6sMTENq1KnaOIpjPIHPjhP7http://cf.c.ooyala.com/ZjOWczZzE6sMTENq1KnaOIpjPIHPjhP7/promo359845194Scott Moore, senior IT auditor at Devon Energy, explains blockchain technology, its business applications, and what impact it might have on audit and assurance processes.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154482Understanding Blockchain
Cybersecurity: Threats and ExpertiseCybersecurity: Threats and ExpertisewwaGczZzE6ucB4IfXloSbaN9l6yCqY6Khttp://cf.c.ooyala.com/wwaGczZzE6ucB4IfXloSbaN9l6yCqY6K/promo359845456Nathan Anderson, senior director, Internal Audit, at McDonalds Corp., discusses the most significant cyber threats facing his organization and the types of expertise internal auditors need to address them.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154483Cybersecurity: Threats and Expertise
The State of Cybersecurity: Part 3The State of Cybersecurity: Part 3J1YTlxZDE6Ckk84jP1LlX8P4uAhIkbnphttps://secure-cf-c.ooyala.com/J1YTlxZDE6Ckk84jP1LlX8P4uAhIkbnp/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8Three experts share their thoughts on the effectiveness of today’s cybersecurity measures.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=152143The State of Cybersecurity: Part 3
The State of Cybersecurity: Part 1The State of Cybersecurity: Part 1dnbjhxZDE6Oaui4NLWNXFVQZSiF__JuGhttp://cf.c.ooyala.com/dnbjhxZDE6Oaui4NLWNXFVQZSiF__JuG/promo337966679Several experts discuss the gap between existing organizational cybersecurity and what ideally should be done to protect against today’s threats.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=152144The State of Cybersecurity: Part 1
The State of Cybersecurity: Part 2The State of Cybersecurity: Part 2hvM2t1ZDE6HOfkF41_BJHBWE184iMkjvhttp://cf.c.ooyala.com/hvM2t1ZDE6HOfkF41_BJHBWE184iMkjv/promo339347536Where does cybersecurity rank on the board’s agenda? Several experts weigh in, discussing the level of board engagement at their organization.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=152140The State of Cybersecurity: Part 2
Ethical Use of Data in the FutureEthical Use of Data in the FutureF4d2t2YzE6Y-HFVINKY8xsYBAfYmnXTJhttps://secure-cf-c.ooyala.com/F4d2t2YzE6Y-HFVINKY8xsYBAfYmnXTJ/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8CAEs discuss how they expect internal audit will address the ethical use of data in the future, especially in the areas of privacy and training.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153313Ethical Use of Data in the Future
Application Testing: Not Just for IT Auditors, Pt 2Application Testing: Not Just for IT Auditors, Pt 2Rybzc2NjE6QSLYDQmoHVHSkoOah4At6phttps://secure-cf-c.ooyala.com/Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In this two-part series, Richard Fowler from Huntington Ingalls Industries discusses application controls and “easy wins” for those auditors just now venturing into the waters of IT Auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=tndzI0NjE67gpFHjAAb6PmYyxz887fGt" target="_blank">Click here to watch Part 1 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153484Application Testing: Not Just for IT Auditors, Pt 2
Application Testing: Not Just for IT Auditors, Pt 1Application Testing: Not Just for IT Auditors, Pt 1tndzI0NjE67gpFHjAAb6PmYyxz887fGthttps://secure-cf-c.ooyala.com/tndzI0NjE67gpFHjAAb6PmYyxz887fGt/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Richard Fowler, senior audit specialist at Huntington Ingalls Industries, discusses application controls and “easy wins” for auditors just now venturing into the waters of IT auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p" target="_blank">Click here to watch Part 2 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153487Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3New Security Controls to Fight Modern Threats, Pt 3t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46https://secure-cf-c.ooyala.com/t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153491New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2New Security Controls to Fight Modern Threats, Pt 2NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJfhttps://secure-cf-c.ooyala.com/NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153492New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1New Security Controls to Fight Modern Threats, Pt 1FiYTR1NTE6VvIwchDkpSHLjIDohU4lhphttps://secure-cf-c.ooyala.com/FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153497New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2Proactively Managing the Cyber Threat Landscape, Pt 2BuNzBmNTE6xwDyX1r6062CNNh7z3utf5https://secure-cf-c.ooyala.com/BuNzBmNTE6xwDyX1r6062CNNh7z3utf5/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153508Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1Proactively Managing the Cyber Threat Landscape, Pt 1J4a3llNTE6C0YVy8wKjLmX4KD13Y80SUhttps://secure-cf-c.ooyala.com/J4a3llNTE6C0YVy8wKjLmX4KD13Y80SU/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153509Proactively Managing the Cyber Threat Landscape, Pt 1
2016 International Conference Speaker Preview: Iyad Mourtada2016 International Conference Speaker Preview: Iyad Mourtadal5MGtzMjE6QbNMbS-58KUizDIwiQYUhMhttps://secure-cf-c.ooyala.com/l5MGtzMjE6QbNMbS-58KUizDIwiQYUhM/heCDP4pTuni5z6vX4xMDoxOjBrO-I4W8In this 2016 International Conference session preview, Shannon Steffee, senior editor for Internal Auditor magazine, interviews Iyad Mourtada, managing director at OpenThinking in the United Arab Emirates. Mourtada will present two sessions at The IIA’s International Conference in New York. His first session, “The Future of Internal Auditing Beyond 2016,” will take place on Monday, July 18, and his second session, “The Future of Fraud,” will be held Tuesday, July 19. In his sessions, Mourtada will share his views on evolution of internal audit's role as we move through 2016 and beyond, and discusses potential changes in audit core competencies for the future. Mourtada also explores how fraudsters use technological advances to their advantage and how internal auditors can best prepare themselves to detect ever-progressing fraud. Watch now to get a sneak peek of these sessions and then register for the 2016 International Conference, July 17‒20, today at <a href="https://ic.globaliia.org/">ic.globaliia.org</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=1536262016 International Conference Speaker Preview: Iyad Mourtada
Cybersecurity Auditing in an Unsecure WorldCybersecurity Auditing in an Unsecure WorldRjanQ2MDE69gd9K_kUArI-DmKnoXGNauhttps://secure-cf-c.ooyala.com/RjanQ2MDE69gd9K_kUArI-DmKnoXGNau/DLOokYc8UKM-fB9H4yMDoxOjBrO0ctNrIs your organization prepared in the event of a data breach? The IIA’s new course: Logging In: Auditing Cybersecurity in an Unsecure World, helps you develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Register now for The IIA’s new course, and become better prepared to tackle the threat of cybersecurity gaps. <a href="https://na.theiia.org/training/courses/Pages/Cybersecurity-Auditing-in-an-Unsecure-World.aspx">www.theiia.org/auditingcybersecurity</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153694Cybersecurity Auditing in an Unsecure World
Advancing Internal Audit’s Use of Technology, Pt 2Advancing Internal Audit’s Use of Technology, Pt 2ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoLhttps://secure-cf-c.ooyala.com/ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8In part 2 of this two-part series, three audit pros continue talking about overcoming the challenges that come with their efforts to build their technology usage and making the most of the benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu" target="_blank">Click here to watch Part 1</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153766Advancing Internal Audit’s Use of Technology, Pt 2
Advancing Internal Audit’s Use of Technology, Pt 1Advancing Internal Audit’s Use of Technology, Pt 1RvYWEyeDr8JDVZIFHilunAFLRoN1eQiuhttps://secure-cf-c.ooyala.com/RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In part 1 of a two-part series, three audit pros talk about how they have advanced the use of technology in their audit departments and the resulting benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL" target="_blank">Click here to watch Part 2</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153767Advancing Internal Audit’s Use of Technology, Pt 1
More on IT Auditing Processes, Part 3More on IT Auditing Processes, Part 3xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRvhttps://secure-cf-c.ooyala.com/xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRv/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Part 3 of our series from John Livingston, senior IT auditor for Medical Mutual of Ohio, on IT Auditing explores several issues: Configuration Management, or Keeping Track of IT Assets, and Dimensions of CMDB Design.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154027More on IT Auditing Processes, Part 3
Overcoming Data Analytics Implementation BarriersOvercoming Data Analytics Implementation Barriers9maWc0dzobzJBZ8_In4WCtAw8r6U1bvhhttps://secure-cf-c.ooyala.com/9maWc0dzobzJBZ8_In4WCtAw8r6U1bvh/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8A sophisticated data analytics program can be a powerful tool for good in the right hands, but it doesn’t come without a price. How do you convince your senior leadership that the program’s cost – in terms of money, people, time, training resources, and more – will be offset by the information it will provide to help the organization achieve its objectives?https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154046Overcoming Data Analytics Implementation Barriers
Getting the Most Out of Data AnalyticsGetting the Most Out of Data Analyticsd4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxqhttps://secure-cf-c.ooyala.com/d4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxq/rQqFhpGihXXoLKSn4xMDoxOjBrO-I4W8In part 1 of a two-part series, Corey Wells of Sunera discusses how CAEs see the value in data analytics, but may not always be fully aware of how to avail themselves to the highest and best use of the information. Onerous compliance regulations and increased levels of regulatory scrutiny make this a prime time to explore the possibilities.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154047Getting the Most Out of Data Analytics
Cybersecurity Part 2: The Upside and the DownsideCybersecurity Part 2: The Upside and the Downsides1eXZpdjpvZjbFO8lxRx9YfM413TJbKxhttps://secure-cf-c.ooyala.com/s1eXZpdjpvZjbFO8lxRx9YfM413TJbKx/MGngRNnbuHoiqTJH4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154059Cybersecurity Part 2: The Upside and the Downside
Cybersecurity Part 1: The Upside and the DownsideCybersecurity Part 1: The Upside and the Downsidex0ZmNndjoE06d1oQ62bQjoUS4IcnzSUchttps://secure-cf-c.ooyala.com/x0ZmNndjoE06d1oQ62bQjoUS4IcnzSUc/XzOTlMlQSGUnbGTX4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154062Cybersecurity Part 1: The Upside and the Downside
Internal Audit: Maximize the Big Data RevolutionInternal Audit: Maximize the Big Data RevolutionxrYmV4dDqW1SAchL5ocoK6-9JWwdDm0Lhttps://secure-cf-c.ooyala.com/xrYmV4dDqW1SAchL5ocoK6-9JWwdDm0L/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8Big data is such a big topic, it’s taken two installments on AuditChannel to cover it. Ankush Agarwal continues to offer his insights into how internal audit departments can take advantage of today’s plentiful tech resources to make us more valuable to our stakeholders.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154108Internal Audit: Maximize the Big Data Revolution
Change Management’s Impact on IT Audit, Part 5Change Management’s Impact on IT Audit, Part 5JrcDh0dDqcMAKgclp0JK_katJprs_h2mhttps://secure-cf-c.ooyala.com/JrcDh0dDqcMAKgclp0JK_katJprs_h2m/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8This installment concludes our series on multiple aspects of IT Auditing and covers additional phases of Change Management that John Livingston, senior IT auditor for Medical Mutual of Ohio, started in Part 4. Here he discusses the importance of prioritization and why analyzing unsuccessful changes is as important as studying the successful ones.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154116Change Management’s Impact on IT Audit, Part 5
Now Is the Time to Get Into the Analytics GameNow Is the Time to Get Into the Analytics GameNhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4Dhttps://secure-cf-c.ooyala.com/NhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4D/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Technology has never been so affordable or accessible so if you haven’t jumped into the deep end yet, now’s the time … it’s the Big Data Revolution. Ankush Agarwal of Exelon Corporation gives hints, tips, and tricks on the versatility and usefulness of building and deploying analytics to support internal audit and financial controls.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154121Now Is the Time to Get Into the Analytics Game
IT Auditing and Change Management, Part 4IT Auditing and Change Management, Part 4cwMnhmdDrm-tYMT1XoTpqzbYopXKshiihttps://secure-cf-c.ooyala.com/cwMnhmdDrm-tYMT1XoTpqzbYopXKshii/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Change Management is such a big topic, that this video only touches on a few of the elements John Livingston, senior IT auditor for Medical Mutual of Ohio, talked about in his conversation with The IIA. More to come in Part 5 of this ongoing series on issues within IT Auditing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154129IT Auditing and Change Management, Part 4
The Value of Problem Management in IT AuditingThe Value of Problem Management in IT Auditing1nbjAzdDrbAdaXRGXIGElcPRZItyJGQ9https://secure-cf-c.ooyala.com/1nbjAzdDrbAdaXRGXIGElcPRZItyJGQ9/Vx8lr-LI9TPdNKgn4xMDoxOjBrO-I4W8In part 1 of this series from John Livingston, senior IT auditor for Medical Mutual of Ohio, he delves into two topics of prime importance to IT auditors: Incidents and Problem Management. Stay tuned to other series installments including Problem Management Processes, the Risk Control Matrix, Configuration Management, and more.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154145The Value of Problem Management in IT Auditing
Problem Management and Risk ControlProblem Management and Risk Control45MmE1dDo3Ht3hHZiDJyJmf2v2LoW7pfhttps://secure-cf-c.ooyala.com/45MmE1dDo3Ht3hHZiDJyJmf2v2LoW7pf/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8In part 2 of this series from John Livingston, senior IT auditor for Medical Mutual of Ohio, he digs deeper into how Problem Management Processes and the Risk Control Matrix go hand-in-hand. One helps define potential negative business impacts, the other helps drill down to efforts that will mitigate potential outcomes.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154142Problem Management and Risk Control
Getting to a Safer, More Secure Digital WorldGetting to a Safer, More Secure Digital World8wOGw0czpgrjzv6zirL_hVr8cOQkFZfmhttps://secure-cf-c.ooyala.com/8wOGw0czpgrjzv6zirL_hVr8cOQkFZfm/YUAndpMCbXk_9hvX4xMDoxOjBrO-I4W8“There is no doubt in my mind that we will get to a safer and more secure digital world.” So said Jeff Spivey, president, Security Risk Management, in his presentation at The IIA’s 2014 All Star Conference. How that will happen is up for grabs, but Spivey offers some insight on what it will take to get there.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154192Getting to a Safer, More Secure Digital World
Keys to the Kingdom: Attack & Penetration TestingKeys to the Kingdom: Attack & Penetration Testing03Z3BzbjpbIkT0DVa5OQj9Xh5v7bfsVuhttps://secure-cf-c.ooyala.com/03Z3BzbjpbIkT0DVa5OQj9Xh5v7bfsVu/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8“One of the most value-added activities that an internal audit department can undertake is to be able to demonstrate clearly where (the organization) is vulnerable.” Joe Murphy on cybersecurity risks and Attack & Penetration Testing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154420Keys to the Kingdom: Attack & Penetration Testing
Reducing Cybersecurity Risks: Internal Audit's RoleReducing Cybersecurity Risks: Internal Audit's RolelsbGJmbjq1izLBTwstStwtwFYI64j0Uthttps://secure-cf-c.ooyala.com/lsbGJmbjq1izLBTwstStwtwFYI64j0Ut/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8Private and public sector organizations are facing increased risks of cyberattack. Robert Venczel discusses various ways internal auditors can reduce the cybersecurity risks in their organizations', including encrypting data and educating management.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154425Reducing Cybersecurity Risks: Internal Audit's Role
Data Analytics: No Reason to Reinvent the WheelData Analytics: No Reason to Reinvent the Wheelw3N2pkbjoXROlBaf_DYAFBUIQtf8EJ5Rhttps://secure-cf-c.ooyala.com/w3N2pkbjoXROlBaf_DYAFBUIQtf8EJ5R/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8Small audit departments may not be able to afford all the bells and whistles that come with special software packages. But Marcus French suggests that you might have perfectly capable tools at your disposal already, if you just learn to look at them differently.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154426Data Analytics: No Reason to Reinvent the Wheel
Integrating IT Into ERM: The Whole PictureIntegrating IT Into ERM: The Whole PicturekwZGlibjo2YQS1NEg3HHOvoXu07FBn4qhttps://secure-cf-c.ooyala.com/kwZGlibjo2YQS1NEg3HHOvoXu07FBn4q/YUAndpMCbXk_9hvX4xMDoxOjBrO-I4W8Xenia Ley Parker advises a big picture view when it comes to incorporating IT into ERM, requiring participation from all parties involved. It’s not easy to accomplish, but by integrating IT from the beginning, you get the genuine picture of the real risk to the enterprise.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=154429Integrating IT Into ERM: The Whole Picture
Internal Audit in 2020Internal Audit in 2020sycWpzdzph213ndAuzyhjkJSZ3oVP6dAhttps://secure-cf-c.ooyala.com/sycWpzdzph213ndAuzyhjkJSZ3oVP6dA/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8What will internal audit look like in 2020? In the December issue of IA magazine, seven leading internal auditors offer their 2020 visions of the future of the profession, which includes an increasing focus on risk management, governance, and technology issues. Look for the release of the December issue in your mailbox and on internalauditoronline.org beginning Dec. 1.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153918Internal Audit in 2020
Cisco's Audit TechnologyCisco's Audit TechnologypmcGpzdzpkgCuwKOb9aJbrSseNrHQltbhttps://secure-cf-c.ooyala.com/pmcGpzdzpkgCuwKOb9aJbrSseNrHQltb/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8Cisco CAE Tom Austin discusses how the company's internal audit function leverages analytics technology. In the June issue of Ia magazine, Austin and other technology industry CAEs discuss how internal audit works in fast-changing companies. Look for the June issue in your mailbox and on internalauditoronline.org beginning June 1.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153920Cisco's Audit Technology