Browse Topics
Artificial Intelligence
Auditing Culture
Career & Leadership Development
Certification
COVID Resources
Cybersecurity
Data Analytics
Fraud & Ethics
Fundamentals
Governance
Risk Management
Talent Management
Trusted Advisor
Login
It looks like your browser does not have JavaScript enabled. Please turn on JavaScript and try again.
It looks like your browser does not have JavaScript enabled. Please turn on JavaScript and try again.
The Complexities of Third-party Risk
The Complexities of Third-party Risk
153815
NiZWtzdzpS86-dFGxAXndSpYnmePKEP4
8c7bf5d07e9e43178f045565d8d4e592
Bill Watts, a partner with Crowe Horwath, says three main complexities are driving third-party risk today. He addresses those issues and discusses the key areas in which internal audit should focus to provide a value added role in addressing this risk.
https://house-fastly.us-east-1.ooyala.com/NiZWtzdzpS86-dFGxAXndSpYnmePKEP4/eolv1L8ZdYrFVOcH4xMDoxOjBrO-I4W8
https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153815
The Complexities of Third-party Risk
You May Also Be Interested In
Practical Enterprise Risk Management: Getting to the Truth
What is in the EHS Auditor's Toolbox?
Third-party Risk: Part 1
Risk Awareness for Public Sector Auditors
Establishing a Risk Management Program in the Public Sector
A Call for Responsible Deregulation
Proactive Approaches to Governance and Risk in the Public Sector
Financial Services Audit Center Sound Bite on Root Cause
Financial Services Audit Center Preview on Combined Assurance
Streamlining the Annual Risk Assessment Process, Pt 3
Streamlining the Annual Risk Assessment Process, Pt 2
Streamlining the Annual Risk Assessment Process, Pt 1
Managing and Overseeing Risk in a Merger Environment
Application Testing: Not Just for IT Auditors, Pt 2
Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1
Is Your PCI Compliance Really Keeping You Safe?, Pt 3
Is Your PCI Compliance Really Keeping You Safe?, Pt 2
Is Your PCI Compliance Really Keeping You Safe?, Pt 1
Fraud in the Health Care System Pt 2
Fraud in the Health Care System Pt 1
Internal Audit and Environmental, Health and Safety
Risk Management: Everyone's Responsibility, Pt 2
Risk Management: Everyone's Responsibility, Pt 1
Performing Project “Health” Checks, Pt 2
Performing Project “Health” Checks, Pt 1
Auditing Third-party Risk, Part 3
Auditing Third-party Risk, Part 2
Auditing Third-party Risk, Part 1
Cybersecurity Auditing in an Unsecure World
Public Sector Audit Pros: Invest in Yourself
The Effects of Culture on Organizational Ethics
How to Jump-Start Continuous Monitoring, pt 3
How to Jump-Start Continuous Monitoring, pt 2
How to Jump-Start Continuous Monitoring, pt 1
CBOK 2015: Challenges for Public Sector Auditors
Internal Audit’s Impact on Cybersecurity, Part 2
Internal Audit’s Impact on Cybersecurity, Part 1
CBOK 2015 – Internal Audit's Role in the Expanding Landscape of Risk
Internal Audit in Transition, Part 3
Internal Audit in Transition, Part 2
Internal Audit in Transition, Part 1
The MDM-GRC-ERM Puzzle
4 Phases of Auditing Construction Projects
The Fraudit
The Challenge of ERM
5 Risks of Cloud Computing
5 Guiding Principles to Auditing ERM
Key Challenges of a Fortune 500 CAE
Managing Third-party Risk
Tools for Managing the Organization's Reputational Risk
The Marriage of Internal Audit and Risk Management
Social Media: 3 Key Areas to Audit
7 Keys to Increasing CAE Value
Public vs. Private Sector Internal Auditing
Introducing The IIA's CRMA Certification
Comments
Please enable JavaScript to view the
comments powered by Disqus.
comments powered by
Disqus