NORTH AMERICA EMEA ASIA
All programs BankAudit 2013 InfoSec World Conference & Expo 2013 SuperStrategies Conference & Expo 2013 The Conference on Big Data Security
All programs The Audit Directors & Managers Symposium The MIS Audit Leadership Institute The MIS CAE Master's Program
 
     Conferences            >      Seminars            >      Symposia            >      Webinars      Online Self Study      Training Weeks      In-House Training      Certificate Programs>      Exhibiting Info      Ways to Save      Request Info      Event Downloads      White Papers      Call for Instructors      Contact MIS      Site Map
Internal Audit IT Audit Info Security
Internal Audit IT Audit Info Security
Planning, Scoping, and Executing Integrated Audits - ITG220 
Developing and Implementing a Successful Integrated Auditing Strategy
Learning Level: Intermediate
CPEs: 24 Fee: $2,150.00
Focus and Features Who Should Attend Agenda Register
Agenda

What You Will Learn
1. Integrating IT Risks into the Internal Audit Process
- integrated auditing resources
- control ownership
- IT risk assessment
- defining integrated auditing
- integrated IT and enterprise control focus
- integrated audit risk focus
- using COSO
- IT control categories
- enterprise risk coverage
- integrated auditing best practices

2. Auditing Business Application Systems
- application audit objectives
- what is a transaction?
- transaction risk analysis
- transaction life cycle

3. Top-Down Risk Based Planning
- planning the application audit
- defining the business environment
- determining the application’s technical environment
- performing a business information risk assessment
- identifying key transactions
- developing a key transaction process flow
- evaluating application controls

4. Auditing Application Controls
- embedded vs. configurable application controls
- transaction origination and authorization
- completeness and accuracy of input
- error handling
- interface balancing
- completeness and accuracy of processing
- completeness and accuracy of output
- output retention and disposal
- end-user computing

5. Testing and Documenting Application Controls
- testing automated and manual controls
- testing alternatives
- determining sample size
- computer assisted audit tools
- data analysis
- documenting business application processes
- internal control questionnaires (ICQ)
- narratives
- flowcharts and process flows
- risk-control matrix

6. User Access Controls
- fraud risk studies
- information security management
- information classification
- access control components
- authentication
- password risks and controls
- tokens, smart cards, biometrics
- authorizations
- conflict matrix
- managing privileged authority
- managing user accounts audit trail
- security monitoring and administration
- single-sign on (SSO)
- distributed client server applications
- remote access
- sensitive data on mobile workstations and devices
- terminations and transfers
- social engineering

7. Change Management
- change management risks
- interpreting and compiling source code
- change management process
- change requests
- testing changes
- implementation approval
- program migration
- contingency plans
- system documentation
- executable and source code integrity
- emergency changes
- changes to vendor supplied source code
- library control software
- distributed systems
- version control
- change management audit steps

8. Disaster Recovery and Business Continuity Planning
- disaster recovery planning (DRP)
- business continuity planning (BCP)
- business impact analysis (BIA)
- recovery point objectives (RPO)
- recovery time objectives (RTO)
- application recovery priority
- continuity plans and procedures
- off-site data storage
- auditing DRP and BCP

9. Database Management Systems
- relational databases
- database terminology
- DBMS risks and controls
- database recovery
- DBMS audit steps

10. Operating Systems
- types of operating system software
- operating system risks
- operating system integrity controls
- privileged access security controls
- software parameters
- patch management
- operating system audit steps

11. Auditing Outsourced IT Operations
- outsourcing risks
- offshore outsourcing risks
- ensuring strong contractual agreements
- right to audit
- SAS-70 reports
- relationship monitoring
- audit focus areas

 
REGISTRATION QUESTIONS?
For questions about your registration, government and team discounts, or multiple registrations, please call Linda Ronconi at (508) 879-7999, ext. 501 or e-mail mis@misti.com.

IN-HOUSE SEMINARS
This seminar is available in-house. For more information about bringing this or other MIS seminars to your organization, please call Mimi Hatch at (410) 692-2465 or e-mail mhatch@misti.com.

 



Dates/Locations
March 11 - 13, 2013
San Francisco
June 10 - 12, 2013
New York
December 9 - 11, 2013
Orlando