Technology


 

 

Application Testing: Not Just for IT Auditors, Pt 2Application Testing: Not Just for IT Auditors, Pt 29/29/2016 12:17:51 PMRybzc2NjE6QSLYDQmoHVHSkoOah4At6p8c7bf5d07e9e43178f045565d8d4e592https://secure-cf-c.ooyala.com/Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In this two-part series, Richard Fowler from Huntington Ingalls Industries discusses application controls and “easy wins” for those auditors just now venturing into the waters of IT Auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=tndzI0NjE67gpFHjAAb6PmYyxz887fGt" target="_blank">Click here to watch Part 1 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66106Application Testing: Not Just for IT Auditors, Pt 2

Cybersecurity: An Ounce of Prevention​​

Most Recent


 

 

Application Testing: Not Just for IT Auditors, Pt 1Application Testing: Not Just for IT Auditors, Pt 1tndzI0NjE67gpFHjAAb6PmYyxz887fGthttps://secure-cf-c.ooyala.com/tndzI0NjE67gpFHjAAb6PmYyxz887fGt/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Richard Fowler, senior audit specialist at Huntington Ingalls Industries, discusses application controls and “easy wins” for auditors just now venturing into the waters of IT auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p" target="_blank">Click here to watch Part 2 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66109Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3New Security Controls to Fight Modern Threats, Pt 3t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46https://secure-cf-c.ooyala.com/t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66113New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2New Security Controls to Fight Modern Threats, Pt 2NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJfhttps://secure-cf-c.ooyala.com/NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66114New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1New Security Controls to Fight Modern Threats, Pt 1FiYTR1NTE6VvIwchDkpSHLjIDohU4lhphttps://secure-cf-c.ooyala.com/FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66119New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2Proactively Managing the Cyber Threat Landscape, Pt 2BuNzBmNTE6xwDyX1r6062CNNh7z3utf5https://secure-cf-c.ooyala.com/BuNzBmNTE6xwDyX1r6062CNNh7z3utf5/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66130Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1Proactively Managing the Cyber Threat Landscape, Pt 1J4a3llNTE6C0YVy8wKjLmX4KD13Y80SUhttps://secure-cf-c.ooyala.com/J4a3llNTE6C0YVy8wKjLmX4KD13Y80SU/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66131Proactively Managing the Cyber Threat Landscape, Pt 1
2016 International Conference Speaker Preview: Iyad Mourtada2016 International Conference Speaker Preview: Iyad Mourtadal5MGtzMjE6QbNMbS-58KUizDIwiQYUhMhttps://secure-cf-c.ooyala.com/l5MGtzMjE6QbNMbS-58KUizDIwiQYUhM/heCDP4pTuni5z6vX4xMDoxOjBrO-I4W8In this 2016 International Conference session preview, Shannon Steffee, senior editor for Internal Auditor magazine, interviews Iyad Mourtada, managing director at OpenThinking in the United Arab Emirates. Mourtada will present two sessions at The IIA’s International Conference in New York. His first session, “The Future of Internal Auditing Beyond 2016,” will take place on Monday, July 18, and his second session, “The Future of Fraud,” will be held Tuesday, July 19. In his sessions, Mourtada will share his views on evolution of internal audit's role as we move through 2016 and beyond, and discusses potential changes in audit core competencies for the future. Mourtada also explores how fraudsters use technological advances to their advantage and how internal auditors can best prepare themselves to detect ever-progressing fraud. Watch now to get a sneak peek of these sessions and then register for the 2016 International Conference, July 17‒20, today at <a href="https://ic.globaliia.org/">ic.globaliia.org</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=662482016 International Conference Speaker Preview: Iyad Mourtada
Cybersecurity Auditing in an Unsecure WorldCybersecurity Auditing in an Unsecure WorldRjanQ2MDE69gd9K_kUArI-DmKnoXGNauhttps://secure-cf-c.ooyala.com/RjanQ2MDE69gd9K_kUArI-DmKnoXGNau/DLOokYc8UKM-fB9H4yMDoxOjBrO0ctNrIs your organization prepared in the event of a data breach? The IIA’s new course: Logging In: Auditing Cybersecurity in an Unsecure World, helps you develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Register now for The IIA’s new course, and become better prepared to tackle the threat of cybersecurity gaps. <a href="https://na.theiia.org/training/courses/Pages/Cybersecurity-Auditing-in-an-Unsecure-World.aspx">www.theiia.org/auditingcybersecurity</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66316Cybersecurity Auditing in an Unsecure World
Advancing Internal Audit’s Use of Technology, Pt 2Advancing Internal Audit’s Use of Technology, Pt 2ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoLhttps://secure-cf-c.ooyala.com/ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8In part 2 of this two-part series, three audit pros continue talking about overcoming the challenges that come with their efforts to build their technology usage and making the most of the benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu" target="_blank">Click here to watch Part 1</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66388Advancing Internal Audit’s Use of Technology, Pt 2
Advancing Internal Audit’s Use of Technology, Pt 1Advancing Internal Audit’s Use of Technology, Pt 1RvYWEyeDr8JDVZIFHilunAFLRoN1eQiuhttps://secure-cf-c.ooyala.com/RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In part 1 of a two-part series, three audit pros talk about how they have advanced the use of technology in their audit departments and the resulting benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL" target="_blank">Click here to watch Part 2</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66389Advancing Internal Audit’s Use of Technology, Pt 1
More on IT Auditing Processes, Part 3More on IT Auditing Processes, Part 3xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRvhttps://secure-cf-c.ooyala.com/xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRv/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Part 3 of our series from John Livingston, senior IT auditor for Medical Mutual of Ohio, on IT Auditing explores several issues: Configuration Management, or Keeping Track of IT Assets, and Dimensions of CMDB Design.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66649More on IT Auditing Processes, Part 3
Overcoming Data Analytics Implementation BarriersOvercoming Data Analytics Implementation Barriers9maWc0dzobzJBZ8_In4WCtAw8r6U1bvhhttps://secure-cf-c.ooyala.com/9maWc0dzobzJBZ8_In4WCtAw8r6U1bvh/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8A sophisticated data analytics program can be a powerful tool for good in the right hands, but it doesn’t come without a price. How do you convince your senior leadership that the program’s cost – in terms of money, people, time, training resources, and more – will be offset by the information it will provide to help the organization achieve its objectives?https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66668Overcoming Data Analytics Implementation Barriers
Getting the Most Out of Data AnalyticsGetting the Most Out of Data Analyticsd4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxqhttps://secure-cf-c.ooyala.com/d4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxq/rQqFhpGihXXoLKSn4xMDoxOjBrO-I4W8In part 1 of a two-part series, Corey Wells of Sunera discusses how CAEs see the value in data analytics, but may not always be fully aware of how to avail themselves to the highest and best use of the information. Onerous compliance regulations and increased levels of regulatory scrutiny make this a prime time to explore the possibilities.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66669Getting the Most Out of Data Analytics
Cybersecurity Part 2: The Upside and the DownsideCybersecurity Part 2: The Upside and the Downsides1eXZpdjpvZjbFO8lxRx9YfM413TJbKxhttps://secure-cf-c.ooyala.com/s1eXZpdjpvZjbFO8lxRx9YfM413TJbKx/MGngRNnbuHoiqTJH4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66681Cybersecurity Part 2: The Upside and the Downside
Cybersecurity Part 1: The Upside and the DownsideCybersecurity Part 1: The Upside and the Downsidex0ZmNndjoE06d1oQ62bQjoUS4IcnzSUchttps://secure-cf-c.ooyala.com/x0ZmNndjoE06d1oQ62bQjoUS4IcnzSUc/XzOTlMlQSGUnbGTX4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66684Cybersecurity Part 1: The Upside and the Downside
Internal Audit: Maximize the Big Data RevolutionInternal Audit: Maximize the Big Data RevolutionxrYmV4dDqW1SAchL5ocoK6-9JWwdDm0Lhttps://secure-cf-c.ooyala.com/xrYmV4dDqW1SAchL5ocoK6-9JWwdDm0L/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8Big data is such a big topic, it’s taken two installments on AuditChannel to cover it. Ankush Agarwal continues to offer his insights into how internal audit departments can take advantage of today’s plentiful tech resources to make us more valuable to our stakeholders.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66731Internal Audit: Maximize the Big Data Revolution
Change Management’s Impact on IT Audit, Part 5Change Management’s Impact on IT Audit, Part 5JrcDh0dDqcMAKgclp0JK_katJprs_h2mhttps://secure-cf-c.ooyala.com/JrcDh0dDqcMAKgclp0JK_katJprs_h2m/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8This installment concludes our series on multiple aspects of IT Auditing and covers additional phases of Change Management that John Livingston, senior IT auditor for Medical Mutual of Ohio, started in Part 4. Here he discusses the importance of prioritization and why analyzing unsuccessful changes is as important as studying the successful ones.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66739Change Management’s Impact on IT Audit, Part 5
Now Is the Time to Get Into the Analytics GameNow Is the Time to Get Into the Analytics GameNhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4Dhttps://secure-cf-c.ooyala.com/NhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4D/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Technology has never been so affordable or accessible so if you haven’t jumped into the deep end yet, now’s the time … it’s the Big Data Revolution. Ankush Agarwal of Exelon Corporation gives hints, tips, and tricks on the versatility and usefulness of building and deploying analytics to support internal audit and financial controls.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66744Now Is the Time to Get Into the Analytics Game
IT Auditing and Change Management, Part 4IT Auditing and Change Management, Part 4cwMnhmdDrm-tYMT1XoTpqzbYopXKshiihttps://secure-cf-c.ooyala.com/cwMnhmdDrm-tYMT1XoTpqzbYopXKshii/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Change Management is such a big topic, that this video only touches on a few of the elements John Livingston, senior IT auditor for Medical Mutual of Ohio, talked about in his conversation with The IIA. More to come in Part 5 of this ongoing series on issues within IT Auditing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66752IT Auditing and Change Management, Part 4
The Value of Problem Management in IT AuditingThe Value of Problem Management in IT Auditing1nbjAzdDrbAdaXRGXIGElcPRZItyJGQ9https://secure-cf-c.ooyala.com/1nbjAzdDrbAdaXRGXIGElcPRZItyJGQ9/Vx8lr-LI9TPdNKgn4xMDoxOjBrO-I4W8In part 1 of this series from John Livingston, senior IT auditor for Medical Mutual of Ohio, he delves into two topics of prime importance to IT auditors: Incidents and Problem Management. Stay tuned to other series installments including Problem Management Processes, the Risk Control Matrix, Configuration Management, and more.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66768The Value of Problem Management in IT Auditing
Problem Management and Risk ControlProblem Management and Risk Control45MmE1dDo3Ht3hHZiDJyJmf2v2LoW7pfhttps://secure-cf-c.ooyala.com/45MmE1dDo3Ht3hHZiDJyJmf2v2LoW7pf/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8In part 2 of this series from John Livingston, senior IT auditor for Medical Mutual of Ohio, he digs deeper into how Problem Management Processes and the Risk Control Matrix go hand-in-hand. One helps define potential negative business impacts, the other helps drill down to efforts that will mitigate potential outcomes.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66765Problem Management and Risk Control

Most Popular


 

 

Application Testing: Not Just for IT Auditors, Pt 2Application Testing: Not Just for IT Auditors, Pt 2Rybzc2NjE6QSLYDQmoHVHSkoOah4At6phttps://secure-cf-c.ooyala.com/Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In this two-part series, Richard Fowler from Huntington Ingalls Industries discusses application controls and “easy wins” for those auditors just now venturing into the waters of IT Auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=tndzI0NjE67gpFHjAAb6PmYyxz887fGt" target="_blank">Click here to watch Part 1 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66106Application Testing: Not Just for IT Auditors, Pt 2
Application Testing: Not Just for IT Auditors, Pt 1Application Testing: Not Just for IT Auditors, Pt 1tndzI0NjE67gpFHjAAb6PmYyxz887fGthttps://secure-cf-c.ooyala.com/tndzI0NjE67gpFHjAAb6PmYyxz887fGt/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Richard Fowler, senior audit specialist at Huntington Ingalls Industries, discusses application controls and “easy wins” for auditors just now venturing into the waters of IT auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p" target="_blank">Click here to watch Part 2 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66109Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3New Security Controls to Fight Modern Threats, Pt 3t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46https://secure-cf-c.ooyala.com/t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66113New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2New Security Controls to Fight Modern Threats, Pt 2NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJfhttps://secure-cf-c.ooyala.com/NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66114New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1New Security Controls to Fight Modern Threats, Pt 1FiYTR1NTE6VvIwchDkpSHLjIDohU4lhphttps://secure-cf-c.ooyala.com/FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66119New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2Proactively Managing the Cyber Threat Landscape, Pt 2BuNzBmNTE6xwDyX1r6062CNNh7z3utf5https://secure-cf-c.ooyala.com/BuNzBmNTE6xwDyX1r6062CNNh7z3utf5/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66130Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1Proactively Managing the Cyber Threat Landscape, Pt 1J4a3llNTE6C0YVy8wKjLmX4KD13Y80SUhttps://secure-cf-c.ooyala.com/J4a3llNTE6C0YVy8wKjLmX4KD13Y80SU/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66131Proactively Managing the Cyber Threat Landscape, Pt 1
2016 International Conference Speaker Preview: Iyad Mourtada2016 International Conference Speaker Preview: Iyad Mourtadal5MGtzMjE6QbNMbS-58KUizDIwiQYUhMhttps://secure-cf-c.ooyala.com/l5MGtzMjE6QbNMbS-58KUizDIwiQYUhM/heCDP4pTuni5z6vX4xMDoxOjBrO-I4W8In this 2016 International Conference session preview, Shannon Steffee, senior editor for Internal Auditor magazine, interviews Iyad Mourtada, managing director at OpenThinking in the United Arab Emirates. Mourtada will present two sessions at The IIA’s International Conference in New York. His first session, “The Future of Internal Auditing Beyond 2016,” will take place on Monday, July 18, and his second session, “The Future of Fraud,” will be held Tuesday, July 19. In his sessions, Mourtada will share his views on evolution of internal audit's role as we move through 2016 and beyond, and discusses potential changes in audit core competencies for the future. Mourtada also explores how fraudsters use technological advances to their advantage and how internal auditors can best prepare themselves to detect ever-progressing fraud. Watch now to get a sneak peek of these sessions and then register for the 2016 International Conference, July 17‒20, today at <a href="https://ic.globaliia.org/">ic.globaliia.org</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=662482016 International Conference Speaker Preview: Iyad Mourtada
Cybersecurity Auditing in an Unsecure WorldCybersecurity Auditing in an Unsecure WorldRjanQ2MDE69gd9K_kUArI-DmKnoXGNauhttps://secure-cf-c.ooyala.com/RjanQ2MDE69gd9K_kUArI-DmKnoXGNau/DLOokYc8UKM-fB9H4yMDoxOjBrO0ctNrIs your organization prepared in the event of a data breach? The IIA’s new course: Logging In: Auditing Cybersecurity in an Unsecure World, helps you develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Register now for The IIA’s new course, and become better prepared to tackle the threat of cybersecurity gaps. <a href="https://na.theiia.org/training/courses/Pages/Cybersecurity-Auditing-in-an-Unsecure-World.aspx">www.theiia.org/auditingcybersecurity</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66316Cybersecurity Auditing in an Unsecure World
Advancing Internal Audit’s Use of Technology, Pt 2Advancing Internal Audit’s Use of Technology, Pt 2ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoLhttps://secure-cf-c.ooyala.com/ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8In part 2 of this two-part series, three audit pros continue talking about overcoming the challenges that come with their efforts to build their technology usage and making the most of the benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu" target="_blank">Click here to watch Part 1</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66388Advancing Internal Audit’s Use of Technology, Pt 2
Advancing Internal Audit’s Use of Technology, Pt 1Advancing Internal Audit’s Use of Technology, Pt 1RvYWEyeDr8JDVZIFHilunAFLRoN1eQiuhttps://secure-cf-c.ooyala.com/RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In part 1 of a two-part series, three audit pros talk about how they have advanced the use of technology in their audit departments and the resulting benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL" target="_blank">Click here to watch Part 2</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66389Advancing Internal Audit’s Use of Technology, Pt 1
More on IT Auditing Processes, Part 3More on IT Auditing Processes, Part 3xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRvhttps://secure-cf-c.ooyala.com/xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRv/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Part 3 of our series from John Livingston, senior IT auditor for Medical Mutual of Ohio, on IT Auditing explores several issues: Configuration Management, or Keeping Track of IT Assets, and Dimensions of CMDB Design.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66649More on IT Auditing Processes, Part 3
Overcoming Data Analytics Implementation BarriersOvercoming Data Analytics Implementation Barriers9maWc0dzobzJBZ8_In4WCtAw8r6U1bvhhttps://secure-cf-c.ooyala.com/9maWc0dzobzJBZ8_In4WCtAw8r6U1bvh/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8A sophisticated data analytics program can be a powerful tool for good in the right hands, but it doesn’t come without a price. How do you convince your senior leadership that the program’s cost – in terms of money, people, time, training resources, and more – will be offset by the information it will provide to help the organization achieve its objectives?https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66668Overcoming Data Analytics Implementation Barriers
Getting the Most Out of Data AnalyticsGetting the Most Out of Data Analyticsd4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxqhttps://secure-cf-c.ooyala.com/d4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxq/rQqFhpGihXXoLKSn4xMDoxOjBrO-I4W8In part 1 of a two-part series, Corey Wells of Sunera discusses how CAEs see the value in data analytics, but may not always be fully aware of how to avail themselves to the highest and best use of the information. Onerous compliance regulations and increased levels of regulatory scrutiny make this a prime time to explore the possibilities.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66669Getting the Most Out of Data Analytics
Cybersecurity Part 2: The Upside and the DownsideCybersecurity Part 2: The Upside and the Downsides1eXZpdjpvZjbFO8lxRx9YfM413TJbKxhttps://secure-cf-c.ooyala.com/s1eXZpdjpvZjbFO8lxRx9YfM413TJbKx/MGngRNnbuHoiqTJH4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66681Cybersecurity Part 2: The Upside and the Downside
Cybersecurity Part 1: The Upside and the DownsideCybersecurity Part 1: The Upside and the Downsidex0ZmNndjoE06d1oQ62bQjoUS4IcnzSUchttps://secure-cf-c.ooyala.com/x0ZmNndjoE06d1oQ62bQjoUS4IcnzSUc/XzOTlMlQSGUnbGTX4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66684Cybersecurity Part 1: The Upside and the Downside
Internal Audit: Maximize the Big Data RevolutionInternal Audit: Maximize the Big Data RevolutionxrYmV4dDqW1SAchL5ocoK6-9JWwdDm0Lhttps://secure-cf-c.ooyala.com/xrYmV4dDqW1SAchL5ocoK6-9JWwdDm0L/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8Big data is such a big topic, it’s taken two installments on AuditChannel to cover it. Ankush Agarwal continues to offer his insights into how internal audit departments can take advantage of today’s plentiful tech resources to make us more valuable to our stakeholders.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66731Internal Audit: Maximize the Big Data Revolution
Change Management’s Impact on IT Audit, Part 5Change Management’s Impact on IT Audit, Part 5JrcDh0dDqcMAKgclp0JK_katJprs_h2mhttps://secure-cf-c.ooyala.com/JrcDh0dDqcMAKgclp0JK_katJprs_h2m/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8This installment concludes our series on multiple aspects of IT Auditing and covers additional phases of Change Management that John Livingston, senior IT auditor for Medical Mutual of Ohio, started in Part 4. Here he discusses the importance of prioritization and why analyzing unsuccessful changes is as important as studying the successful ones.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66739Change Management’s Impact on IT Audit, Part 5
Now Is the Time to Get Into the Analytics GameNow Is the Time to Get Into the Analytics GameNhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4Dhttps://secure-cf-c.ooyala.com/NhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4D/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Technology has never been so affordable or accessible so if you haven’t jumped into the deep end yet, now’s the time … it’s the Big Data Revolution. Ankush Agarwal of Exelon Corporation gives hints, tips, and tricks on the versatility and usefulness of building and deploying analytics to support internal audit and financial controls.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66744Now Is the Time to Get Into the Analytics Game
IT Auditing and Change Management, Part 4IT Auditing and Change Management, Part 4cwMnhmdDrm-tYMT1XoTpqzbYopXKshiihttps://secure-cf-c.ooyala.com/cwMnhmdDrm-tYMT1XoTpqzbYopXKshii/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Change Management is such a big topic, that this video only touches on a few of the elements John Livingston, senior IT auditor for Medical Mutual of Ohio, talked about in his conversation with The IIA. More to come in Part 5 of this ongoing series on issues within IT Auditing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66752IT Auditing and Change Management, Part 4
The Value of Problem Management in IT AuditingThe Value of Problem Management in IT Auditing1nbjAzdDrbAdaXRGXIGElcPRZItyJGQ9https://secure-cf-c.ooyala.com/1nbjAzdDrbAdaXRGXIGElcPRZItyJGQ9/Vx8lr-LI9TPdNKgn4xMDoxOjBrO-I4W8In part 1 of this series from John Livingston, senior IT auditor for Medical Mutual of Ohio, he delves into two topics of prime importance to IT auditors: Incidents and Problem Management. Stay tuned to other series installments including Problem Management Processes, the Risk Control Matrix, Configuration Management, and more.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66768The Value of Problem Management in IT Auditing

All​​

 

 

Application Testing: Not Just for IT Auditors, Pt 2Application Testing: Not Just for IT Auditors, Pt 2Rybzc2NjE6QSLYDQmoHVHSkoOah4At6phttps://secure-cf-c.ooyala.com/Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In this two-part series, Richard Fowler from Huntington Ingalls Industries discusses application controls and “easy wins” for those auditors just now venturing into the waters of IT Auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=tndzI0NjE67gpFHjAAb6PmYyxz887fGt" target="_blank">Click here to watch Part 1 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66106Application Testing: Not Just for IT Auditors, Pt 2
Application Testing: Not Just for IT Auditors, Pt 1Application Testing: Not Just for IT Auditors, Pt 1tndzI0NjE67gpFHjAAb6PmYyxz887fGthttps://secure-cf-c.ooyala.com/tndzI0NjE67gpFHjAAb6PmYyxz887fGt/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Richard Fowler, senior audit specialist at Huntington Ingalls Industries, discusses application controls and “easy wins” for auditors just now venturing into the waters of IT auditing. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=Rybzc2NjE6QSLYDQmoHVHSkoOah4At6p" target="_blank">Click here to watch Part 2 of the series.</a>https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66109Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3New Security Controls to Fight Modern Threats, Pt 3t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46https://secure-cf-c.ooyala.com/t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66113New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2New Security Controls to Fight Modern Threats, Pt 2NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJfhttps://secure-cf-c.ooyala.com/NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp" target="_blank">Click here to watch Part 1 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66114New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1New Security Controls to Fight Modern Threats, Pt 1FiYTR1NTE6VvIwchDkpSHLjIDohU4lhphttps://secure-cf-c.ooyala.com/FiYTR1NTE6VvIwchDkpSHLjIDohU4lhp/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this three-part series, RSM US LLP’s Daimon Geopfert discusses the evolution of cyber infiltrators; the perspective of an organization’s board; adoption of best practices for insurance purposes; and accountability in the public vs. private sector on security issues. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=NyMjh3NTE61zNgl_ng0l3b9vc8b1BOJf" target="_blank">Click here to watch Part 2 of the series.</a> <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=t5aWx5NTE68lkAgZ-FPN0njEHfPK0_46" target="_blank">Click here to watch Part 3 of the series.</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66119New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2Proactively Managing the Cyber Threat Landscape, Pt 2BuNzBmNTE6xwDyX1r6062CNNh7z3utf5https://secure-cf-c.ooyala.com/BuNzBmNTE6xwDyX1r6062CNNh7z3utf5/PE3O6Z9ojHeNSk7H4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66130Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1Proactively Managing the Cyber Threat Landscape, Pt 1J4a3llNTE6C0YVy8wKjLmX4KD13Y80SUhttps://secure-cf-c.ooyala.com/J4a3llNTE6C0YVy8wKjLmX4KD13Y80SU/AZ2ZgMjz0LFGHCPn4xMDoxOjBrO-I4W8In this two-part series, Deloitte Canada’s Nick Galletto discusses strategies for getting in front of those “actors” who seek breach your organization’s cyber defenses. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66131Proactively Managing the Cyber Threat Landscape, Pt 1
2016 International Conference Speaker Preview: Iyad Mourtada2016 International Conference Speaker Preview: Iyad Mourtadal5MGtzMjE6QbNMbS-58KUizDIwiQYUhMhttps://secure-cf-c.ooyala.com/l5MGtzMjE6QbNMbS-58KUizDIwiQYUhM/heCDP4pTuni5z6vX4xMDoxOjBrO-I4W8In this 2016 International Conference session preview, Shannon Steffee, senior editor for Internal Auditor magazine, interviews Iyad Mourtada, managing director at OpenThinking in the United Arab Emirates. Mourtada will present two sessions at The IIA’s International Conference in New York. His first session, “The Future of Internal Auditing Beyond 2016,” will take place on Monday, July 18, and his second session, “The Future of Fraud,” will be held Tuesday, July 19. In his sessions, Mourtada will share his views on evolution of internal audit's role as we move through 2016 and beyond, and discusses potential changes in audit core competencies for the future. Mourtada also explores how fraudsters use technological advances to their advantage and how internal auditors can best prepare themselves to detect ever-progressing fraud. Watch now to get a sneak peek of these sessions and then register for the 2016 International Conference, July 17‒20, today at <a href="https://ic.globaliia.org/">ic.globaliia.org</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=662482016 International Conference Speaker Preview: Iyad Mourtada
Cybersecurity Auditing in an Unsecure WorldCybersecurity Auditing in an Unsecure WorldRjanQ2MDE69gd9K_kUArI-DmKnoXGNauhttps://secure-cf-c.ooyala.com/RjanQ2MDE69gd9K_kUArI-DmKnoXGNau/DLOokYc8UKM-fB9H4yMDoxOjBrO0ctNrIs your organization prepared in the event of a data breach? The IIA’s new course: Logging In: Auditing Cybersecurity in an Unsecure World, helps you develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Register now for The IIA’s new course, and become better prepared to tackle the threat of cybersecurity gaps. <a href="https://na.theiia.org/training/courses/Pages/Cybersecurity-Auditing-in-an-Unsecure-World.aspx">www.theiia.org/auditingcybersecurity</a> https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66316Cybersecurity Auditing in an Unsecure World
Advancing Internal Audit’s Use of Technology, Pt 2Advancing Internal Audit’s Use of Technology, Pt 2ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoLhttps://secure-cf-c.ooyala.com/ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8In part 2 of this two-part series, three audit pros continue talking about overcoming the challenges that come with their efforts to build their technology usage and making the most of the benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu" target="_blank">Click here to watch Part 1</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66388Advancing Internal Audit’s Use of Technology, Pt 2
Advancing Internal Audit’s Use of Technology, Pt 1Advancing Internal Audit’s Use of Technology, Pt 1RvYWEyeDr8JDVZIFHilunAFLRoN1eQiuhttps://secure-cf-c.ooyala.com/RvYWEyeDr8JDVZIFHilunAFLRoN1eQiu/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8In part 1 of a two-part series, three audit pros talk about how they have advanced the use of technology in their audit departments and the resulting benefits. <a href="https://www.theiia.org/sites/auditchannel/Pages/video.aspx?v=ZubGEyeDov2KTq0aEAB73H3Hk1-FRWoL" target="_blank">Click here to watch Part 2</a> of the series. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66389Advancing Internal Audit’s Use of Technology, Pt 1
More on IT Auditing Processes, Part 3More on IT Auditing Processes, Part 3xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRvhttps://secure-cf-c.ooyala.com/xrdGlhdzorwEaLVb93qNsM3Qw7VnqBRv/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Part 3 of our series from John Livingston, senior IT auditor for Medical Mutual of Ohio, on IT Auditing explores several issues: Configuration Management, or Keeping Track of IT Assets, and Dimensions of CMDB Design.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66649More on IT Auditing Processes, Part 3
Overcoming Data Analytics Implementation BarriersOvercoming Data Analytics Implementation Barriers9maWc0dzobzJBZ8_In4WCtAw8r6U1bvhhttps://secure-cf-c.ooyala.com/9maWc0dzobzJBZ8_In4WCtAw8r6U1bvh/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8A sophisticated data analytics program can be a powerful tool for good in the right hands, but it doesn’t come without a price. How do you convince your senior leadership that the program’s cost – in terms of money, people, time, training resources, and more – will be offset by the information it will provide to help the organization achieve its objectives?https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66668Overcoming Data Analytics Implementation Barriers
Getting the Most Out of Data AnalyticsGetting the Most Out of Data Analyticsd4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxqhttps://secure-cf-c.ooyala.com/d4bWUydzrWPhAm_ADuZfBdUf5Rh7BNxq/rQqFhpGihXXoLKSn4xMDoxOjBrO-I4W8In part 1 of a two-part series, Corey Wells of Sunera discusses how CAEs see the value in data analytics, but may not always be fully aware of how to avail themselves to the highest and best use of the information. Onerous compliance regulations and increased levels of regulatory scrutiny make this a prime time to explore the possibilities.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66669Getting the Most Out of Data Analytics
Cybersecurity Part 2: The Upside and the DownsideCybersecurity Part 2: The Upside and the Downsides1eXZpdjpvZjbFO8lxRx9YfM413TJbKxhttps://secure-cf-c.ooyala.com/s1eXZpdjpvZjbFO8lxRx9YfM413TJbKx/MGngRNnbuHoiqTJH4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66681Cybersecurity Part 2: The Upside and the Downside
Cybersecurity Part 1: The Upside and the DownsideCybersecurity Part 1: The Upside and the Downsidex0ZmNndjoE06d1oQ62bQjoUS4IcnzSUchttps://secure-cf-c.ooyala.com/x0ZmNndjoE06d1oQ62bQjoUS4IcnzSUc/XzOTlMlQSGUnbGTX4xMDoxOjBrO-I4W8Cybersecurity is today’s hottest topic. In this video, three top internal audit executives discuss how they view it, how their companies deal with it, and what they think the future holds in terms of planning, prevention, response, and execution.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66684Cybersecurity Part 1: The Upside and the Downside
Internal Audit: Maximize the Big Data RevolutionInternal Audit: Maximize the Big Data RevolutionxrYmV4dDqW1SAchL5ocoK6-9JWwdDm0Lhttps://secure-cf-c.ooyala.com/xrYmV4dDqW1SAchL5ocoK6-9JWwdDm0L/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8Big data is such a big topic, it’s taken two installments on AuditChannel to cover it. Ankush Agarwal continues to offer his insights into how internal audit departments can take advantage of today’s plentiful tech resources to make us more valuable to our stakeholders.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66731Internal Audit: Maximize the Big Data Revolution
Change Management’s Impact on IT Audit, Part 5Change Management’s Impact on IT Audit, Part 5JrcDh0dDqcMAKgclp0JK_katJprs_h2mhttps://secure-cf-c.ooyala.com/JrcDh0dDqcMAKgclp0JK_katJprs_h2m/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8This installment concludes our series on multiple aspects of IT Auditing and covers additional phases of Change Management that John Livingston, senior IT auditor for Medical Mutual of Ohio, started in Part 4. Here he discusses the importance of prioritization and why analyzing unsuccessful changes is as important as studying the successful ones.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66739Change Management’s Impact on IT Audit, Part 5
Now Is the Time to Get Into the Analytics GameNow Is the Time to Get Into the Analytics GameNhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4Dhttps://secure-cf-c.ooyala.com/NhbTJzdDrLUF5VmKFOc0SjLZm_1tQw4D/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Technology has never been so affordable or accessible so if you haven’t jumped into the deep end yet, now’s the time … it’s the Big Data Revolution. Ankush Agarwal of Exelon Corporation gives hints, tips, and tricks on the versatility and usefulness of building and deploying analytics to support internal audit and financial controls.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66744Now Is the Time to Get Into the Analytics Game
IT Auditing and Change Management, Part 4IT Auditing and Change Management, Part 4cwMnhmdDrm-tYMT1XoTpqzbYopXKshiihttps://secure-cf-c.ooyala.com/cwMnhmdDrm-tYMT1XoTpqzbYopXKshii/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Change Management is such a big topic, that this video only touches on a few of the elements John Livingston, senior IT auditor for Medical Mutual of Ohio, talked about in his conversation with The IIA. More to come in Part 5 of this ongoing series on issues within IT Auditing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66752IT Auditing and Change Management, Part 4
The Value of Problem Management in IT AuditingThe Value of Problem Management in IT Auditing1nbjAzdDrbAdaXRGXIGElcPRZItyJGQ9https://secure-cf-c.ooyala.com/1nbjAzdDrbAdaXRGXIGElcPRZItyJGQ9/Vx8lr-LI9TPdNKgn4xMDoxOjBrO-I4W8In part 1 of this series from John Livingston, senior IT auditor for Medical Mutual of Ohio, he delves into two topics of prime importance to IT auditors: Incidents and Problem Management. Stay tuned to other series installments including Problem Management Processes, the Risk Control Matrix, Configuration Management, and more.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66768The Value of Problem Management in IT Auditing
Problem Management and Risk ControlProblem Management and Risk Control45MmE1dDo3Ht3hHZiDJyJmf2v2LoW7pfhttps://secure-cf-c.ooyala.com/45MmE1dDo3Ht3hHZiDJyJmf2v2LoW7pf/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8In part 2 of this series from John Livingston, senior IT auditor for Medical Mutual of Ohio, he digs deeper into how Problem Management Processes and the Risk Control Matrix go hand-in-hand. One helps define potential negative business impacts, the other helps drill down to efforts that will mitigate potential outcomes.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66765Problem Management and Risk Control
Getting to a Safer, More Secure Digital WorldGetting to a Safer, More Secure Digital World8wOGw0czpgrjzv6zirL_hVr8cOQkFZfmhttps://secure-cf-c.ooyala.com/8wOGw0czpgrjzv6zirL_hVr8cOQkFZfm/YUAndpMCbXk_9hvX4xMDoxOjBrO-I4W8“There is no doubt in my mind that we will get to a safer and more secure digital world.” So said Jeff Spivey, president, Security Risk Management, in his presentation at The IIA’s 2014 All Star Conference. How that will happen is up for grabs, but Spivey offers some insight on what it will take to get there.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66815Getting to a Safer, More Secure Digital World
Keys to the Kingdom: Attack & Penetration TestingKeys to the Kingdom: Attack & Penetration Testing03Z3BzbjpbIkT0DVa5OQj9Xh5v7bfsVuhttps://secure-cf-c.ooyala.com/03Z3BzbjpbIkT0DVa5OQj9Xh5v7bfsVu/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8“One of the most value-added activities that an internal audit department can undertake is to be able to demonstrate clearly where (the organization) is vulnerable.” Joe Murphy on cybersecurity risks and Attack & Penetration Testing.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=67043Keys to the Kingdom: Attack & Penetration Testing
Reducing Cybersecurity Risks: Internal Audit's RoleReducing Cybersecurity Risks: Internal Audit's RolelsbGJmbjq1izLBTwstStwtwFYI64j0Uthttps://secure-cf-c.ooyala.com/lsbGJmbjq1izLBTwstStwtwFYI64j0Ut/O0cEsGv5RdudyPNn4xMDoxOjBrO-I4W8Private and public sector organizations are facing increased risks of cyberattack. Robert Venczel discusses various ways internal auditors can reduce the cybersecurity risks in their organizations', including encrypting data and educating management.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=67048Reducing Cybersecurity Risks: Internal Audit's Role
Data Analytics: No Reason to Reinvent the WheelData Analytics: No Reason to Reinvent the Wheelw3N2pkbjoXROlBaf_DYAFBUIQtf8EJ5Rhttps://secure-cf-c.ooyala.com/w3N2pkbjoXROlBaf_DYAFBUIQtf8EJ5R/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8Small audit departments may not be able to afford all the bells and whistles that come with special software packages. But Marcus French suggests that you might have perfectly capable tools at your disposal already, if you just learn to look at them differently.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=67049Data Analytics: No Reason to Reinvent the Wheel
Integrating IT Into ERM: The Whole PictureIntegrating IT Into ERM: The Whole PicturekwZGlibjo2YQS1NEg3HHOvoXu07FBn4qhttps://secure-cf-c.ooyala.com/kwZGlibjo2YQS1NEg3HHOvoXu07FBn4q/YUAndpMCbXk_9hvX4xMDoxOjBrO-I4W8Xenia Ley Parker advises a big picture view when it comes to incorporating IT into ERM, requiring participation from all parties involved. It’s not easy to accomplish, but by integrating IT from the beginning, you get the genuine picture of the real risk to the enterprise.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=67052Integrating IT Into ERM: The Whole Picture
Internal Audit in 2020Internal Audit in 2020sycWpzdzph213ndAuzyhjkJSZ3oVP6dAhttps://secure-cf-c.ooyala.com/sycWpzdzph213ndAuzyhjkJSZ3oVP6dA/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8What will internal audit look like in 2020? In the December issue of IA magazine, seven leading internal auditors offer their 2020 visions of the future of the profession, which includes an increasing focus on risk management, governance, and technology issues. Look for the release of the December issue in your mailbox and on internalauditoronline.org beginning Dec. 1.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66540Internal Audit in 2020
Cisco's Audit TechnologyCisco's Audit TechnologypmcGpzdzpkgCuwKOb9aJbrSseNrHQltbhttps://secure-cf-c.ooyala.com/pmcGpzdzpkgCuwKOb9aJbrSseNrHQltb/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8Cisco CAE Tom Austin discusses how the company's internal audit function leverages analytics technology. In the June issue of Ia magazine, Austin and other technology industry CAEs discuss how internal audit works in fast-changing companies. Look for the June issue in your mailbox and on internalauditoronline.org beginning June 1.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66542Cisco's Audit Technology
Using Technology to Enhance Internal Audit's ValueUsing Technology to Enhance Internal Audit's Value5ta2pzdzoHR4zyhZR87beh0U9MqY5_smhttps://secure-cf-c.ooyala.com/5ta2pzdzoHR4zyhZR87beh0U9MqY5_sm/x0JBUkvnwpAy-qi34xMDoxOjBrO-I4W8Warren Stippich and Priya Sarjoo discuss how audit executives can rise to new challenges by effectively using technology. They also provide some of the results from the Chief Auditor Executive Survey given at GAM 2013. GRC technology usage is very slow to boot up. Corporations are moving towards business analytics, management, intelligence, and performance outside the internal audit function.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66568Using Technology to Enhance Internal Audit's Value
IT Auditing and Emerging TechnologyIT Auditing and Emerging TechnologyNkampzdzrKmJwwdS98fj9h-DGuI-PIK2https://secure-cf-c.ooyala.com/NkampzdzrKmJwwdS98fj9h-DGuI-PIK2/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Tichaona Zororo discusses the changing landscape for IT auditors. Emerging technology has become pervasive, changing the way business is being done. Companies are taking advantage of emerging technology such as cloud computing, big data, social media, bring your own device and mobility to build sustainable competitive advantages. IT Auditors, today more than ever, need to change from their traditional means of auditing and focus on this key emerging technology such as social media, big data, and bring your own device. Because that is where the risk lies.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66572IT Auditing and Emerging Technology
Starting a Data Analytics TeamStarting a Data Analytics Teams5ampzdzrQ7bv9erSaks6-e57JuQvZdDhttps://secure-cf-c.ooyala.com/s5ampzdzrQ7bv9erSaks6-e57JuQvZdD/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8Data analytics is important to a successful internal audit. Sahil Bhalla discusses how to start a data analytics program in your division. Bhalla provides three steps to getting started. Obtain buy-in, invest in dedicated resources and technology, and show small wins. Some data analytics tools include SAS, ACL, IDEA, and Access.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66573Starting a Data Analytics Team
Data Analytics and FraudData Analytics and FraudJ5Z2pzdzphFPSj5pmntwwuAvhvc_i-_1https://secure-cf-c.ooyala.com/J5Z2pzdzphFPSj5pmntwwuAvhvc_i-_1/XzOTlMlQSGUnbGTX4xMDoxOjBrO-I4W8Cleaning "dirty data" is one of five steps internal auditors can take to improve their use of data analytics to uncover fraud, says Stefan Sapundzhiev, head of internal audit, Directorate General, Internal Market and Services of the European Commission.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66583Data Analytics and Fraud
Coming to Grips With CybersecurityComing to Grips With CybersecurityJjbGRzcDpvRfJDCW0v04sY3ijkRJFjn2https://secure-cf-c.ooyala.com/JjbGRzcDpvRfJDCW0v04sY3ijkRJFjn2/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Cybersecurity is a never-ending battle. Pervez Bamji with Pitney Bowes outlines some preliminary steps and suggests some resources you may not have thought about to make sure your program is layered appropriately.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66983Coming to Grips With Cybersecurity
Rethink Your Approach to TechnologyRethink Your Approach to TechnologyVuMmFmMjE6pHt1t5yjjJryqWWKf79Hubhttps://secure-cf-c.ooyala.com/VuMmFmMjE6pHt1t5yjjJryqWWKf79Hub/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8Norman Marks, a technology evangelist, encourages internal auditors to refresh and rethink their approach to using technology to do their work.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66255Rethink Your Approach to Technology
Social Media: 3 Key Areas to AuditSocial Media: 3 Key Areas to AuditJnaGtzdzr-RuI2xkFuEu53RYpTfS9rJ6https://secure-cf-c.ooyala.com/JnaGtzdzr-RuI2xkFuEu53RYpTfS9rJ6/DLOokYc8UKM-fB9H4xMDoxOjBrO-I4W8Robert Berry, director of internal auditing for the University of North Florida, discusses three areas auditors should be assessing in audits of the organization's social media efforts.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66424Social Media: 3 Key Areas to Audit
5 Risks of Cloud Computing5 Risks of Cloud Computingt4Z2tzdzqaOadL2v8Pwm_3wdgSn1aSz9https://secure-cf-c.ooyala.com/t4Z2tzdzqaOadL2v8Pwm_3wdgSn1aSz9/E-HI8y-Omg85H4KX4xMDoxOjBrO-I4W8Matt Thompson, a managing director with Grant Thornton, discusses five risks associated with outsourcing to the cloud.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=664275 Risks of Cloud Computing
Key Challenges of a Fortune 500 CAEKey Challenges of a Fortune 500 CAEJyY2tzdzq1xDU7lHipg7CZKtd3eiO-Qjhttps://secure-cf-c.ooyala.com/JyY2tzdzq1xDU7lHipg7CZKtd3eiO-Qj/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8Kris Shellum-Allenson, discusses the challenges she has faced over the past year as vice president and CAE of Sears Holding Corp., including keeping up with the rapid growth of the company's e-commerce model, addressing risks around off-shoring, and using technology more proactively. https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66445Key Challenges of a Fortune 500 CAE
How Technology Will Impact Internal AuditingHow Technology Will Impact Internal AuditingVmY2tzdzq0SB-pQ7TUvR5y3_KYYta43Uhttps://secure-cf-c.ooyala.com/VmY2tzdzq0SB-pQ7TUvR5y3_KYYta43U/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8Torpey White, a partner with Elko & Associates, discusses how technology will change the audit profession in the coming years. For more on IT auditing, download The IIA's Global Technology Audit Guides (GTAG®), www.theiia.org/goto/IT.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66447How Technology Will Impact Internal Auditing
Leveraging Your Investment in TechnologyLeveraging Your Investment in Technologyw4YmtzdzqaVwcV7RLllcG1USY4jblLAChttps://secure-cf-c.ooyala.com/w4YmtzdzqaVwcV7RLllcG1USY4jblLAC/3Gduepif0T1UGY8H4xMDoxOjBrO-I4W8Scott Wilson, VP Professional Services, Pentana Inc. NA, discusses why many organizations are finding they cannot leverage their investment in technology to their satisfaction and presents the foundational aspect of effective implementation of technologies in the new computing era.https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=66454Leveraging Your Investment in Technology