NORTH AMERICA EMEA ASIA
All programs BankAudit 2013 InfoSec World Conference & Expo 2013 SuperStrategies Conference & Expo 2013 The Conference on Big Data Security
All programs The Audit Directors & Managers Symposium The MIS Audit Leadership Institute The MIS CAE Master's Program
 
     Conferences            >      Seminars            >      Symposia            >      Webinars      Online Self Study      Training Weeks      In-House Training      Certificate Programs>      Exhibiting Info      Ways to Save      Request Info      Event Downloads      White Papers      Call for Instructors      Contact MIS      Site Map
Internal Audit IT Audit Info Security
Internal Audit IT Audit Info Security
Auditing Business Application Systems - ITG103 
A Step-by-Step Guide to Auditing How Applications Transaction Activity, Controls, and Procedures are Managed
Learning Level: Basic
CPEs: 24 Fee: $2,150.00
Focus and Features Who Should Attend Agenda Register
Agenda

What You Will Learn:
1. Introduction to Business Application Systems
- types of automated business applications
- objectives of an application audit
- types of applications audits
- system environmental considerations
- application control ownership
- integrated auditing
- data vs. information

2. Business Application Transactions
- what is a transaction?
- transaction-based application auditing
- transaction life cycle
- application risk assessment factors
- establishing audit priorities

3. Top-Down Risk-Based Planning
- planning the application audit
- top-down, risk-based planning
- defining the business environment
- determining the application’s technical environment
- performing a business information risk assessment
- identifying key transactions
- developing a key transaction process flow
- evaluating and testing application controls

4. Data Input and Processing Models
- comparing pros/cons of input and processing models
- batch input/batch processing
- on-line input/batch processing
- on-line input/on-line processing
- real-time input/real-time processing

5. Application Controls
- business applications
- information objectives
- COSO: application controls
- business application auditing
- application transaction life cycle
- transaction origination
- logical security
- completeness and accuracy of input
- completeness and accuracy of processing
- completeness and accuracy of output
- output retention and disposal
- data file controls
- user review, balancing, reconciliation
- end-user documentation
- training
- segregation of duties
- business continuity planning
- Sarbanes-Oxley application control requirements

6. IT General Control Objectives and Risks
- IT general controls overview
- relationship between IT general controls and application controls
- COBIT™ and ISO-27002
- physical security
- environmental exposures
- logical security
- encryption
- systems development
- production change management
- disaster recovery and business continuity planning
- Sarbanes-Oxley IT general control requirements

7. Testing Application Controls
- testing automated and manual controls
- testing alternatives
- testing sample size
- sampling terminology
- negative assurance testing
- types of audit evidence
- functional/substantive testing
- computer assisted audit techniques (CAATs)
- data analysis: planning and data verification
- Sarbanes-Oxley: testing requirements and examples

8. Documenting Application Controls
- evaluating and documenting internal controls
- internal control questionnaires
- narratives
- flowcharts / process flows
- control matrix

9. End-User Computing
- growth of end user computing
- end user computing risks
- general IT control risks
- change control risks
- purchased applications risks
- spreadsheets: typical errors
- spreadsheet risk factors
- practical steps for evaluating spreadsheet controls

10. Auditing System Development Projects
- business risks
- audit’s primary goals
- costs to correct errors during system development
- traditional system development life cycle
- rapid application development
- internal audit involvement
-- advantages and challenges
-- qualifications of audit personnel
-- requirements of audit involvement
- internal audit objectives
-- assess project and product risks
-- assess user involvement

11. Executing Application Audits
- internal audit process
- objectives of an application audit
- application audit planning
- application risk assessment
- determining the audit scope
- obtaining planning information
- the planning memo
- audit programs
- auditing application controls
- testing application controls
- audit workpapers
- audit report
- integrated auditing

 
REGISTRATION QUESTIONS?
For questions about your registration, government and team discounts, or multiple registrations, please call Linda Ronconi at (508) 879-7999, ext. 501 or e-mail mis@misti.com.

IN-HOUSE SEMINARS
This seminar is available in-house. For more information about bringing this or other MIS seminars to your organization, please call Mimi Hatch at (410) 692-2465 or e-mail mhatch@misti.com.

 



Dates/Locations
April 22 - 24, 2013
Boston
July 16 - 18, 2013
San Francisco
October 2 - 4, 2013
New York