Audit and Assurance

Search this Discussion

1 to 50 of 723 threads (2K total posts)
Thread Subject Replies Last Post
workflow documentation guideline
0 35 minutes ago by Bancroft Hunter
Configuration Management
1 4 hours ago by
Original post by Tanveer Bapari
Study: Internal audits become decisive in the "Era of Continuous Transformation"
0 16 hours ago by Yolanda Theophilus
Data Management Audit/Information sharing Audit checklist
0 5 days ago by NANGOOBI ROSE
Website Audit
3 5 days ago by Juan Pablo Barriga Sapiencia
Original post by Albert Tan
Oracle EBS Setup Options
1 6 days ago by Alexandre Ossipov
Original post by Ozair Nagina
Effective Briefing Techniques for Audit Report
0 7 days ago by Jody Howard
audit report template
0 7 days ago by Noni Makhonjwa
Data Access Controls Audit
10 7 days ago by Matthew Pearson
PCI Requirements for Employee Package Service
4 7 days ago by Chris Soucek
Experience with HITRUST certification journey
4 8 days ago by Pamela (Pam) Nigro
Original post by Nick Dsouza
Audit in accordance with Shared Assessments' SIG SCA?
3 9 days ago by James Arnold
Original post by Nick Dsouza
Oracle Cloud Fusion Implementation
0 11 days ago by Leslie Thompson
Auditing Citrix and Sharepoint
4 11 days ago by Ozair Nagina
Looking for an Audit Program?
5 11 days ago by Yolanda Theophilus
Original post by Ian Cooke
Security information and event management - SIEM
5 11 days ago by Ian Cooke
Original post by Marat Kaisseov
GDPR Tool - Wishlist
1 11 days ago by Ian Cooke
Original post by Philip Green
Standard 1204 Materiality
6 13 days ago by Jason Gordon
Original post by TETANG Lancelot
Auditing system interface /application program interface
16 14 days ago by Ashraf Al Khaiat, MBA, CISA
Original post by Albert Tan
NIST 800-171 in Mobile Telecom governance
1 19 days ago by Ian Cooke
Original post by Perry Jurancich
Activity Directory
4 20 days ago by Tanveer Bapari
Data governance risk control matrix
1 21 days ago by Ian Cooke
Original post by Wuraola Bucknor
ISACA Audit Programs for NIST CSF (new Supply Chain. . .)
1 21 days ago by Ian Cooke
Original post by Vernice Stefano
Use of Microsoft Flow for System User Access Reviews (UARs)
1 21 days ago by Ian Cooke
Original post by Ramon Regan
How Strong Is Your Board's Risk Management?
0 22 days ago by Yolanda Theophilus
Audit Management Workflow/System
6 24 days ago by Igor Yezhov
Original post by Ivan Boh
Data Management Audit
2 24 days ago by Igor Yezhov
Original post by NANGOOBI ROSE
SOC 1 Audit Checklist
4 24 days ago by Adam Prebola
Original post by Alicia Haskin
Reporting lines \ structure
8 25 days ago by Ian Cooke
Original post by Jagdeep Gill
GDPR risk impact assessment
10 25 days ago by Richard Pais
Original post by Wuraola Bucknor
Things Auditors Can Improve On
1 26 days ago by Sven De Preter
Original post by Yolanda Theophilus
IT Auditor Career
9 26 days ago by Godfrey Wasswa Denis
Original post by James McIntyre
Developer access to test environments
2 26 days ago by Ian Cooke
Original post by Hazel Grant
Splunk review and ensuring the integrity
6 26 days ago by Ian Cooke
Original post by Marat Kaisseov
Ethical Hacking / Vulnerability Validation
4 27 days ago by Pavel Gromenkov
Original post by Chris Ward
IT Governance review
5 29 days ago by Philip Bernaerts
Original post by Thomas Miller
Operational user having admin rights
11 29 days ago by James Strange
Original post by Alexandra Avram
Corporate Governance
0 29 days ago by Jacob Njeru
Audit/threat Reports for Security Operations Centre (SOC)
1 one month ago by Vilius Benetis
Original post by Anastasia Parboo
Audit Prog- Transfer Pricing and Related Parties
5 one month ago by Hong Zhang
Original post by Simbarashe Chizanga
Vulnerability management
2 one month ago by Philip Licata
Original post by Michael Aranha
ISMS Internal audit
3 one month ago by Leon Mattear
Terminated employees with AD access
5 one month ago by Indumathy Narayanan Karimanasseri
Original post by Alan Sasse
Audit Charter
14 one month ago by TETANG Lancelot
Original post by Nangoobi Veronica
ISACA Audit Programs are not free for members anymore?
4 one month ago by Melissa Swartz
Original post by Ashraf Al Khaiat, MBA, CISA
IT Controls by Organization Size
2 one month ago by Michelle Botelho
PCI DSS experts to rely or not to rely
9 one month ago by Russell Fairchild
Original post by Marat Kaisseov
SSAE 18 - What is the difference between SSAE 16 and SSAE 18?
1 one month ago by Ian Cooke
Original post by Francisco Morales Gortarez
PCI DSS what does it cover
3 one month ago by Ian Cooke
Original post by Marat Kaisseov
Endpoint Device Audit Tools
5 one month ago by Agueda Monteiro Tavares
Original post by John Patrick