|
What is the main risks here ?
|
0
|
11 hours ago
by
Marat Kaisseov
|
|
Inherent risk with Github and Crowdstrike
|
2
|
14 hours ago
by
Aleksandr Zhuk
Original post by
Prosper Boah
|
|
Log recordings
|
4
|
yesterday
by
Johan Jacobsen
|
|
Resetting password
|
2
|
2 days ago
by
Dominic Pasqualino
Original post by
Marat Kasiviov
|
|
SQL Scripts demanded by the External IT Auditors
|
4
|
2 days ago
by
Rita Kobusinge
|
|
IT Audit of a FinTech - Risk Areas
|
8
|
3 days ago
by
Prosper Boah
|
|
Scheduled job
|
0
|
3 days ago
by
Marat Kasiviov
|
|
Cyber Controls at Sea
|
3
|
4 days ago
by
Ole Christian Olsen
Original post by
Farhan Ali
|
|
PSD2 Customer Authentication
|
3
|
4 days ago
by
Katrin Andersson
Original post by
Tanveer Bapari
|
|
Determining Implementation Dates
|
4
|
6 days ago
by
Vernice Stefano
Original post by
Dominic Pasqualino
|
|
Access: Application Control or ITGC
|
13
|
6 days ago
by
Vernice Stefano
Original post by
Laura Sears
|
|
Breach / Vulnerability Cost Calculator
|
4
|
7 days ago
by
Amedeo Maturo Senra
Original post by
Arnise Wormley
|
|
Who Should Own GRC (tool) within the Organization?
|
2
|
7 days ago
by
James (Jim) Horton
|
|
New Audit Reporting for Non-Public Companies
|
0
|
8 days ago
by
Yolanda Theophilus
|
|
Automated control
|
0
|
9 days ago
by
Marat Kasiviov
|
|
Managing Privately Labelled Credit Card data
|
0
|
10 days ago
by
Vikas Kumar
|
|
report provided from macro tool
|
0
|
10 days ago
by
Andrei Kam
|
|
IS Audit of BCP
|
4
|
12 days ago
by
Nalin Wijetilleke
Original post by
Manoj J
|
|
passing a note for improvement
|
4
|
13 days ago
by
Ronald Armstrong
Original post by
Marat Kaisseov
|
|
Business continuity management strategy guideline
|
4
|
15 days ago
by
Nalin Wijetilleke
Original post by
Erick Otieno
|
|
migrating from HTTP (non-secure) to HTTPS (secure)
|
4
|
16 days ago
by
Sven De Preter
Original post by
Vikram Raghuveer
|
|
Audit Digital Transformation
|
1
|
16 days ago
by
Ian Cooke
Original post by
Ruben Garduno
|
|
Healthcare Payer/Provider firms: HITRUST Cert. Questions
|
1
|
16 days ago
by
Ian Cooke
Original post by
Nick Dsouza
|
|
Oracle GRC Implementation
|
1
|
16 days ago
by
Ian Cooke
Original post by
Ghassan Elchehabi
|
|
access management review tool
|
2
|
20 days ago
by
Fabian Wuest
Original post by
Andrei Kam
|
|
Information Security Checklist for Software and Hardware Acquisition
|
4
|
21 days ago
by
Marko Jagodic
Original post by
JOHN LIEMWELL CABANERO
|
|
Cybersecurity Audit Certificate
|
2
|
22 days ago
by
Melissa Swartz
Original post by
Martin Li
|
|
POST IMPLEMENTATION REVIEW OF AN APPLICATION SYSTEM
|
2
|
23 days ago
by
Zulfiqar Kamal
Original post by
JOHN LIEMWELL CABANERO
|
|
Auditing Digital Platform
|
2
|
23 days ago
by
Albert Tan
|
|
IT audit for e-commerce
|
2
|
23 days ago
by
Jordan Novak
Original post by
Andrei Kam
|
|
Transport app installed on employee phones
|
3
|
25 days ago
by
Jordan Novak
Original post by
Vikram Raghuveer
|
|
HR Auditing.
|
4
|
27 days ago
by
Ozair Nagina
Original post by
Mohd Aidil Mohd Harith
|
|
Auditing Software Licenses
|
2
|
one month ago
by
Jordan Novak
Original post by
Ian Cooke
|
|
PCI Compliance
|
1
|
one month ago
by
James Scardelis
Original post by
Prasun Howli
|
|
Commercial Use of Cent OS
|
1
|
one month ago
by
Cyrus Makalinaw
Original post by
Ajit Rana
|
|
5 Biggest Concerns of IT Compliance and How to Address Them
|
2
|
one month ago
by
Salvador Rodriguez
Original post by
Yolanda Theophilus
|
|
IT Audit Universe
|
2
|
one month ago
by
NANGOOBI ROSE
Original post by
Tanveer Bapari
|
|
ISO 27001 ISMS documentation templates
|
4
|
one month ago
by
Ian Cooke
Original post by
Nick Dsouza
|
|
Industry Standard
|
10
|
one month ago
by
Shridhar Kuppannagari
Original post by
Robin Bonham
|
|
HiPAA/HITECH (Omnibus Rule) and HITRUST CSF v8.1
|
3
|
one month ago
by
David Mayberry
Original post by
James (Jim) Horton
|
|
Social Media Audit
|
2
|
one month ago
by
Farhan Ali
|
|
Mobile device management solution audit
|
2
|
one month ago
by
Vikram Raghuveer
|
|
FISMA compliance journey
|
3
|
one month ago
by
Troy Fine
Original post by
Nick Dsouza
|
|
DATA PROTECTION OFFICER
|
5
|
one month ago
by
Loren Saxton
Original post by
Latifat Ayodele
|
|
IT RISK MATRIX / IT RISK UNIVERSE
|
1
|
one month ago
by
Ian Cooke
Original post by
NANGOOBI ROSE
|
|
How to audit agile scrum methodology
|
6
|
one month ago
by
Fu Lai Li
|
|
ISO/IEC 27017:2015
|
2
|
one month ago
by
Nalin Wijetilleke
Original post by
James (Jim) Horton
|
|
Utilizing Data Analytics
|
7
|
one month ago
by
Richard Herchenreder
Original post by
Ronald Tortorello
|
|
Change Management IT hardware / Administración de Cambios de Infraestructura TI
|
4
|
one month ago
by
Salvador Rodriguez
Original post by
Jose Gutierrez Figueroa
|
|
RE: Customer Identity and Access Management Audit Program
|
1
|
one month ago
by
Ian Cooke
Original post by
Shaneel Lal
|