Fraud and corruption are all around us. As internal auditors, if we're so heavy handed with the few “sinners” we catch, won’t the large majority who didn't get caught breath a huge sigh of relief and just try even harder to stay hidden?
Latest Content From MISTI
Infosec Insider learns how practitioners from across the cybersecurity industry came into their current security role.
Between varied audiences and modern communication standards (dense information in few words), internal auditors must make sure they’re writing to their end audience.
There are many reasons organizations don’t back up systems correctly, but are any of them good reasons?
TLS is the cornerstone of secure communications for networked communications, but are you implementing and maintaining it correctly?
As internal auditors apply risk-based auditing techniques to their reviews and increase their focus on the needs of customers to achieve organizational aims, it is essential to gain a panoramic understanding of the process. The SIPOC diagram can help.
Security awareness works, so why isn't it helping our enterprise become more secure?
People talk about a risk event as if it is obvious what it is and what it means. But that's certainly not always the case.
Security pros act incredulous when they hear of a delayed breach disclosure, but is it wrong?
Few things can derail the audit committee’s perception, confidence, and trust of internal audit faster and more profoundly than ineffective communications to and from the internal audit function.
Whether the organization as a whole is onboard or not, corporate audit needs to develop and embrace programs designed to meet the needs of a changing workforce if they are to attract and retain top talent.