IS Security Matters: People Impacting Events (Englisch)
- Neue Suche nach: Ross, S.J.
- Neue Suche nach: Ross, S.J.
In:
INFORMATION SYSTEMS CONTROL JOURNAL
;
5
;
12-13
;
2009
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:IS Security Matters: People Impacting Events
-
Beteiligte:Ross, S.J. ( Autor:in )
-
Erschienen in:INFORMATION SYSTEMS CONTROL JOURNAL ; 5 ; 12-13
-
Verlag:
- Neue Suche nach: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION
-
Erscheinungsdatum:01.01.2009
-
Format / Umfang:2 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.4550285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.4550285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 5
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Information Security Matters: The Train of DangerRoss, Steven J et al. | 2011
- 4
-
Information Security Matters: Emo, Ergo SumRoss, Steven J et al. | 2013
- 4
-
Information Security Matters: Is Security a Wall or a Door?Ross, Steven J et al. | 2012
- 4
-
Information Security Matters: CyberCERTRoss, Steven J et al. | 2014
- 4
-
Information Security Matters: The Mayor and the SheriffRoss, Steven J et al. | 2010
- 5
-
Taking A Look Back: Who Is Melissa Chernobyl and Why Is She Doing These Terrible Things? Excerpted and reprinted from IS Audit & Control Journal, volume IV, 1999| 2009
- 5
-
Editorial - Issues & CommentsCangemi, Michael et al. | 2004
- 5
-
Guest Editorial: Extinction or Renewal -- The CIO at a CrossroadSarup, Deepak et al. | 2007
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, gives his account of this year's Annual General Meeting and the ISACA International Conference, which was held in Paris, France, in June 2001, and included the IT Governance Forum. He goes on to discuss the importance of IT governance and customer relationship management.| 2001
- 5
-
Editorial - Issue & CommentsCangemi, Michael et al. | 2005
- 5
-
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, discusses an acronym bandied about -- ASP. Application software providers base software utilization on usage, as opposed to wrestling with upgrades and new versions of softwareCangemi, Michael P. et al. | 2000
- 5
-
Guest Editorial: Running IT as a Business: IT Metrics Propel TransformationKress, Bob et al. | 2008
- 6
-
The NetworkBorton, Thomas et al. | 2014
- 6
-
Guest Editorial: The Three Lines of Defence Related to Risk GovernanceDoughty, Ken et al. | 2011
- 6
-
Cloud Computing: Cloud Storage — Bursting Through the HypeBarrasso, Rico et al. | 2012
- 6
-
Cloud Computing: Managing Data With a Streamlined SolutionSelway, Paul et al. | 2013
- 7
-
Guest Editorial: The IT Security Professional: Bright Spot in a Dreary EconomyFoote, David et al. | 2009
- 7
-
IT Audit Basics: Mitigating IT Risks for Logical AccessSingleton, Tommie W et al. | 2010
- 8
-
IS Security Matters - Loose Lips Sink ChipsRoss, Steven et al. | 2002
- 8
-
IS Security Matters - The Vanished PerimeterRoss, Steven J. et al. | 2003
- 8
-
Information Ethics: Where the Rubber Meets the RoadRaval, Vasant et al. | 2013
- 8
-
The Vanished PerimeterRoss, S. J. et al. | 2003
- 8
-
Information Ethics: Machine EthicsRaval, Vasant et al. | 2014
- 8
-
Loose Lips Sink ChipsRoss, S. et al. | 2002
- 9
-
IS Security Matters: Give 'em the New Razlle-DazzleRoss, Steven J. et al. | 2005
- 9
-
IS Security Matters: Automating ComplianceRoss, Steven J. et al. | 2007
- 9
-
Information Ethics: Ethics in COBIT 5Raval, Vasant et al. | 2012
- 9
-
Instant MessRoss, S. J. et al. | 2004
- 9
-
IS Security Matters: Give 'em the New Razzle-DazzleRoss, S. J. et al. | 2005
- 9
-
Book Review - E-Commerce Security -- Public Key Infrastructure: Good Practices for Secure Communications - The review discusses the concise and comprehensive manner in which book explains PKI, its relationship to e-commerce and its ability to mitigate certain risks.Bria, Ricardo et al. | 2001
- 9
-
IS Security Matters: Reliable SecurityRoss, Steven J. et al. | 2008
- 9
-
IS Security Matters - Instant MessRoss, Steven J. et al. | 2004
- 9
-
E-commerce Security-Public Key Infrastructure: Good Practices for Secure CommunicationsBria, R. et al. | 2001
- 9
-
Cloud Computing: Governance in the CloudKirkpatrick, Joseph et al. | 2011
- 10
-
IS Security Matters - What's Your Sign? - Steven J Ross, CISA, delves into what a signature, digital or otherwise, actually denotes and-or obligatesRoss, Steven J. et al. | 2000
- 10
-
Standards, Statements, Guidelines - ISACA Member and CISA Compliance| 2002
- 10
-
ISACA Member and CISA Compliance| 2002
- 10
-
What's Your Sign?Ross, S. J. et al. | 2000
- 11
-
Virtual Private Networking-New Issues For Network SecurityAbdullah, A. H. B. et al. | 2001
- 11
-
Book Review - Virtual Private Networking -- New Issues For Network Security - The review breaks down the book chapter by chapter. The reviewer describes the book as a guide covering the pre-implementation, implementation and post-implementation phases of a VPN project.Abdullah, Abdul Hamid Bin et al. | 2001
- 11
-
IS Security Matters: Downtime and Data LossRoss, Steven J. et al. | 2006
- 11
-
Audit of OutsourcingSayana, S. A. et al. | 2004
- 11
-
Five Questions With...Schperberg, Robert et al. | 2010
- 11
-
DB2 Audit GuidelineHauck, J. / Likogiorgos, S. / Toth, L. / Wong, B. et al. | 2003
- 11
-
Book Review - DB2 Audit Guideline -Hauck, Jeff et al. | 2003
- 11
-
IS Audit Basics: What Every IT Auditor Should Know About Computer-generated ReportsSingleton, Tommie et al. | 2014
- 11
-
IT Audit Basics: Auditing IT Risk Associated With Change Management and Application DevelopmentSingleton, Tommie W et al. | 2011
- 11
-
IT Audit Basics - Audit of OutsourcingSayana, S.Anantha et al. | 2004
- 12
-
Risks of Customer Relationship Management: A Security, Control and Audit ApproachBallance, C. et al. | 2003
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About FraudsSingleton, Tommie W. et al. | 2008
- 12
-
IT Governance - Applying IT Governance at Home: Oversight of a Computer AcquisitionLawton, Lynn et al. | 2002
- 12
-
IS Security Matters: People Impacting EventsRoss, Steven J. et al. | 2009
- 12
-
IS Audit Basics: What Every IT Auditor Should Know About Transforming Data for CAATsSingleton, Tommie et al. | 2013
- 12
-
Applying IT Governance at Home: Oversight of a Computer AcquisitionLawton, L. et al. | 2002
- 12
-
Book Review - Risks of Customer Relationship Management: A Security, Control and Audit ApproachBallance, Craigg et al. | 2003
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Auditing Social MediaSingleton, Tommie W et al. | 2012
- 13
-
Perspectives - Report from the Year 2000: IS Audit Recruitment - The president and founder of the world's largest IS audit recruiting firm describes what he sees on the horizon both for auditors and the corporations and organizations that wish to hire themTuck, Richard et al. | 2000
- 13
-
Book Review: Fraud 101: Techniques and Strategies for Understanding Fraud, 3rd EditionMichaelson, Gail et al. | 2010
- 13
-
Book Review: Carry On: Sound Advice From Schneier on SecurityPatricia Prandini, Maria et al. | 2014
- 13
-
IT Audit Basics: What Every IT Auditor Should Know About the New Risk Suite StandardsSingleton, Tommie W. et al. | 2007
- 13
-
Report from the Year 2000: IS Audit RecruitmentTuck, R. et al. | 2000
- 13
-
IT Audit Basics: Auditing IT Service DeliverySayana, S.Anantha et al. | 2005
- 14
-
Statutory Audit and IT GovernanceGuldentops, E. et al. | 2003
- 14
-
IT Audit Basics: IT and Privacy AuditsSingleton, Tommie W. et al. | 2009
- 14
-
Book Review: Information Technology Risk Management in Enterprise EnvironmentsKanhere, Vishnu et al. | 2010
- 14
-
IT Governance - Statutory Audit and IT GovernanceGuldentops, Erik et al. | 2003
- 14
-
Book Review: Using Social Media for Global SecurityChua, Joyce et al. | 2014
- 15
-
Book Review - Role-based Access Control (RBAC)Fuente, Reynaldo J.de la et al. | 2004
- 15
-
Role-based Access Control (RBAC)de la Fuente, R. J. et al. | 2004
- 15
-
IS Security Matters - Doctor's Orders - Steven J. Ross, CISA, examines the information security architecture laid out in the US Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implications. He asks the question: Should government in the security architecture business at all? He points out that if the law can be applied to healthcare, it can be applied to any industry and, for that matter, to any country.Ross, Steven J. et al. | 2001
- 15
-
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance| 2008
- 15
-
An Approach Toward Sarbanes-Oxley ITGC Risk AssessmentMehta, Arvind et al. | 2010
- 15
-
Book Reviews - The Audit Committee Handbook, Third Edition - Sarathy Emani, CISA, reviews this book which he describes as containing extensive coverage of statutory standards and guidelines designed for audit committeesEmani, Sarathy et al. | 2000
- 15
-
The Audit Committee Handbook, Third EditionEmani, S. et al. | 2000
- 15
-
Imperfect Technologies and Digital Hygiene - (part of the article not published in ASCII)Gelbstein, Ed et al. | 2014
- 15
-
Understanding the Core Concepts in COBIT 5De Haes, Steven et al. | 2013
- 16
-
IT Value: Val IT Framework 2.0 -- Adding Breadth and Depth to the Value Management Road MapThorp, John et al. | 2008
- 16
-
IT Audit Basics - Auditing General and Application ControlsSayana, S.Anantha et al. | 2002
- 16
-
Book Reviews - Investigating Computer-Related Crime - Also reviewed by Sarathy Emani, CISA, this book is described as being tailored specifically for corporate information systems professionals and investigators and offers a step-by-step approach to understanding and investigating security problemsEmani, Sarathy et al. | 2000
- 16
-
Investigating Computer-Related CrimeEmani, S. et al. | 2000
- 16
-
Auditing General and Application ControlsSayana, S. A. et al. | 2002
- 17
-
IT Governance and the Cloud: Principles and Practice for Governing Adoption of Cloud ComputingSpeed, Ron et al. | 2011
- 17
-
IT Audit Basics: What Every IT Auditor Should Know About Project Risk ManagementSingleton, Tommie W. et al. | 2006
- 17
-
IT Governance and OutsourcingParkes, H. et al. | 2004
- 17
-
IT Governance - IT Governance and OutsourcingParkes, Hugh et al. | 2004
- 18
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACA membership and the CISA(.) designation are outlined and the status of ISACA issuances noted.| 2001
- 18
-
Book Review: Handbook for Internal AuditorsKarin, Horst et al. | 2012
- 18
-
IT Governance: Using COBIT for IT Control Health Check-upRafeq, A. et al. | 2005
- 18
-
PLUS - Technical Q & A, HelpsourceLilly, Fred L. et al. | 2000
- 18
-
ISACA® Member and Certification Holder Compliance| 2003
- 19
-
Social Networks and Privacy — Threats and ProtectionNgambeket Ndiandukue, Guy-Hermann et al. | 2012
- 20
-
Continuous Auditing and Reporting-The Fourth World SymposiumWilliams, P. et al. | 2002
- 20
-
IT Governance: IS Auditing and Information Privacy Governance: A Natural FitZoladz, Chris et al. | 2008
- 20
-
Helpsource Q & ALilly, Fred L. et al. | 2001
- 20
-
IT Value: What Is in Our IT Portfolios?Guldentops, Erik et al. | 2007
- 20
-
Commentary - Continuous Auditing and Reporting -- The Fourth World SymposiumWilliams, Paul et al. | 2002
- 20
-
Seven Ways SMEs Can Benefit From GRC SolutionsWilhelms, Dan et al. | 2010
- 20
-
Global PerspectivesTowfigh, Orang et al. | 2005
- 20
-
The Value of Big Data Analytics to the BusinessMohapatra, Biswajit et al. | 2014
- 21
-
Identify, Govern and Manage IT Risk, Part 2: Risk IT Framework StructureFischer, Urs et al. | 2009
- 21
-
IT Value: Value Management -- Responding to the Challenge of ValueThorp, John et al. | 2006
- 21
-
IT Audit Basics - Approach to Auditing Network SecuritySayana, S.Anantha et al. | 2003
- 21
-
Approach to Auditing Network SecuritySayana, S. A. et al. | 2003
- 21
-
Your IT Applications Inventory is all in Your Head-An Observation Related to IT Governance ToolsHamaker, S. et al. | 2000
- 21
-
Perspectives - Your IT Applications Inventory is all in Your Head -- An Observation Related to IT Governance Tools - This article takes a concrete approach to IT governance and cites tangible examples to augment it with specific tools. Ms. Hamaker's article was inspired by her attendance at the first IT Governance Forum held in Denver, CO, USA in July of 1999Hamaker, Stacey et al. | 2000
- 22
-
Book Review: Stepping Through the IS Audit, 2^n^d Edition By J. L. Bayuk, CISA, CISMAxelrod, C. W. et al. | 2005
- 22
-
A Case for a Process-based Approach to GRCRamanathan, S et al. | 2010
- 22
-
Book Review: Stepping Through the IS Audit, 2nd EditionBayuk, J.L. et al. | 2005
- 23
-
Book Review: Implementing Information Technology Governance: Models, Practices and CasesFuente, Reynaldo J.de la et al. | 2008
- 23
-
Using COBIT 5 for Data Breach PreventionNicho, Mathew et al. | 2013
- 23
-
Book Review: Surviving Security -- How to Integrate People, Process and Technology, 2nd EditionAndress, Amanda et al. | 2005
- 23
-
The Auditor's Role in IT Governance Daniel Ramos, CISA, CPA, discusses the evolution of the auditor s role and the key position which the auditor has in building a mature IT governance environment that is aligned with the business objectives and supportive of the stakeholders needs| 2001
- 23
-
Book Review: Surviving Security-How to Integrate People, Process and Technology, 2^n^d Edition By Amanda Andress, CISA, CISSP, CPA, SSCPTsang-Reveche, C. et al. | 2005
- 23
-
IT Governance - The Auditor's Role in IT Governance - Daniel Ramos, CISA, CPA, discusses the evolution of the auditor's role and the key position which the auditor has in building a mature IT governance environment that is aligned with the business objectives and supportive of the stakeholders needs.Ramos, Daniel et al. | 2001
- 23
-
IT General and Application Controls: The Model of InternalizationPalmas, Emanuele et al. | 2011
- 24
-
Documentation Standards for E-commerce OrganisationsLubbe, Sam et al. | 2003
- 24
-
The Global Status of Electronic Signature LegislationShue, Lily et al. | 2002
- 24
-
Book Review: OS/390-z/OS: Security, Audit and Control Features By Peter Thingsted, CISAVillegas, M. O. et al. | 2005
- 24
-
Global Perspectives: Recent Changes in the Roles of the Board and the C-suite -- An Oceania PerspectiveDodds, Rupert et al. | 2006
- 24
-
IT Governance Global Status ReportSteuperaert, Dirk et al. | 2004
- 24
-
Meeting PCI DSS When Using a Cloud Service ProviderAhmed, Adesanya et al. | 2012
- 24
-
Book Review: OS-390-z-OS: Security, Audit and Control FeaturesThingsted, Peter et al. | 2005
- 25
-
Book Review: The Handbook of Fraud DeterrenceKanhere, Vishnu et al. | 2008
- 25
-
IT Governance: Shifting Governance Roles and Responsibilities: Improving Management Reporting as Part of Corporate and IT GovernanceParkes, Hugh et al. | 2006
- 26
-
IT Governance: IT Governance -- Challenges in Implementation From an Asian PerspectiveRamanathan, S. et al. | 2007
- 26
-
Tackling the Subversive SpreadsheetButler, R. J. et al. | 2001
- 26
-
Perspective - Tackling the Subversive Spreadsheet - The author attempts to address the risks of errors in spreadsheets by providing one organization's experience. He discusses the benefits H.M. Customs & Excise realized after it developed the SPACE (Spreadsheet Auditing Customs & Excise) methodology for risk assessing and spreadsheet testingButler, Raymond J. et al. | 2001
- 27
-
Database Security, Compliance and AuditGrand, Charles Le et al. | 2008
- 27
-
Group-Wide Implementation of CoBIT FrameworkWiderkehr, B. J. et al. | 2000
- 27
-
Secure and Practical Smart Card ApplicationsSrinivasan, S. et al. | 2003
- 27
-
Crossword PuzzleMellor, Myles et al. | 2009
- 27
-
The Price of Mobility - (part of the article not published in ASCII)Emmanuel Yu, William et al. | 2014
- 27
-
Analyzing IT Value Management at KLM Through the Lens of Val ITDe Haes, Steven et al. | 2011
- 27
-
Case Study - Group-Wide Implementation of COBIT Framework - The author describes ways that his employer, the Swiss Life-Rentenanstalt, uses COBIT to achieve its corporate goalsWiederkehr, Bruno J. et al. | 2000
- 28
-
Auditing and Certification of a Public Key InfrastructureKoorn, Ronald et al. | 2002
- 28
-
Book Review: Effective Project Management -- Traditional, Adaptive, ExtremeWysocki, Robert K. et al. | 2007
- 28
-
Sarbanes-Oxley and IT OutsourcingShue, Lily et al. | 2004
- 28
-
Risk-based Approach to IT Systems Life Cycle and Change ControlJegousse, Loic et al. | 2010
- 28
-
Capability Maturity Models and Outsourcing: A Case for Sourcing Risk ManagementMcKinney, Charles et al. | 2005
- 28
-
Book Review: Effective Project Management-Traditional, Adaptive, Extreme By Robert K. WysockiRafeq, A. et al. | 2007
- 29
-
Demonstrating the Value of COBIT and Val IT IT Governance PracticesDe Haes, Steven et al. | 2009
- 31
-
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted| 2000
- 31
-
Managing the Risks of Outsourcing in a Post-Sarbanes WorldBenvenuto, Nick et al. | 2004
- 31
-
Empirical Research Into Val IT Supports the Use of COBITSchaafsma, Siep et al. | 2007
- 31
-
Cloud Risk — 10 Principles and a Framework for AssessmentVohradsky, David et al. | 2012
- 31
-
Managing Data Integrity and Accuracy Effectively: The Case for Data Analysis SoftwareLobb, R. et al. | 2001
- 31
-
Manage Requirements Volatility to Manage Risks in IS Development ProjectsSakthivel, Sachidanandam et al. | 2010
- 31
-
A COBIT Approach to Regulatory Compliance and Defensible DisposalLuellig, Lorrie et al. | 2013
- 31
-
Privacy Assurance for BYODChaudhary, Ashwin et al. | 2014
- 31
-
Perspective - Managing Data Integrity and Accuracy Effectively: The Case for Data Analysis Software - The author discusses the need for technology that bridges gaps and allows connections across business units and between disparate technologies. gives one organization's account of the use of ACL to help analyze its business practices.Lobb, Rich et al. | 2001
- 32
-
Audit Trails in an E-commerce EnvironmentBlanco, Luis et al. | 2002
- 33
-
Features - The Changing Role of IS Audit Among the Big Five US-Based Accounting Firms - Survey results spur thought on the swift evolution of the IS audit professionBagranoff, Nancy A. et al. | 2000
- 33
-
The IT Balanced Scorecard RevisitedCram, Alec et al. | 2007
- 33
-
The Changing Role of IS Audit Among the Big Five US-Based Accounting FirmsBagranoff, N. A. / Vendrzyk, V. P. et al. | 2000
- 33
-
Assessing and Preventing Risks from E-mail System UseBraswell, Daniel E. et al. | 2003
- 34
-
Case Study: Reducing the Cost of Sarbanes-Oxley Compliance Through Common ControlsPfister, John J. et al. | 2006
- 34
-
Eliminating Today's Costly Outsourcing Operations ChallengesBrasche, Randy et al. | 2004
- 34
-
Ports and Port Scanning: An Introduction - An awareness of ports and their use is important to auditors, if they are understand and assist an organization in deploying and using an effective intrusion detection system. This article provides auditors an introduction to what ports are and how they are used to determine Internet connection nerabilities.Moody, Bob et al. | 2001
- 34
-
J-SOX Challenge: Efforts to Comply With the New Japanese RegulationUehara, Kazuhiro et al. | 2008
- 34
-
Ports and Port Scanning: An IntroductionMoody, B. et al. | 2001
- 35
-
ln-memory Computing — Evolution, Opportunity and RiskEmmanuel Yu, William et al. | 2013
- 35
-
Outsourcing -- A Risk Management PerspectiveBenvenuto, Nicholas A. et al. | 2005
- 35
-
FISMA 2010: What It Means for IT Security ProfessionalsModi, Tarak et al. | 2010
- 35
-
Beyond BYOD — Can I Connect My Body to Your Network?Pozza, Giuliano et al. | 2014
- 35
-
The Impact of Governance on Identity Management ProgramsEtges, Rafael et al. | 2011
- 36
-
Risk Management Strategies for Offshore Application and Systems DevelopmentBakalov, Rudy et al. | 2004
- 36
-
The Importance of Being Secure: The ROI of Web Site SecurityLeonard, Ken et al. | 2003
- 36
-
Do You Have a Departmental Writing Manual?Feierman, Joanne et al. | 2009
- 37
-
Commentary: Annus Horribilis 2005 -- The Year of Our Discontent: The Fall of the Imperial CEOSarup, Deepak et al. | 2006
- 37
-
If Compliance Is So Critical, Why Are We Still Failing Audits? How to Minimize Failure and Make the Audit Process EasierBakman, Alex et al. | 2007
- 37
-
Risk Management in IT ProjectsGaulke, Markus et al. | 2002
- 38
-
Features - The Impact of Higher Education and Professional Certification on the Careers of Information Systems and Non-Information Systems Auditors - Meeting changes in the audit profession requires preparation and this article examines some of the ways to achieve promotability within one's career trackWier, Benson et al. | 2000
- 38
-
The Impact of Higher Education and Professional Certification on the Careers of Information Systems and Non-Information Systems AuditorsWier, B. / Hunton, J. E. / Beeler, J. D. et al. | 2000
- 38
-
Control Issues of Using Corporate Web Sites for Public DisclosureWong, Antonio et al. | 2008
- 39
-
Apache Security Controls and AuditingMookhey, K.K. et al. | 2003
- 39
-
Manage What Is Known and What Is Not KnownFu, Zhiwei et al. | 2014
- 39
-
A Risk-based Approach to Segregation of Duties: Partnering IT and the Business to Meet the Challenges of Global Regulatory ComplianceAdolphson, Michael et al. | 2009
- 39
-
A Framework for Estimating ROI of Automated Internal ControlsDutta, Angsuman et al. | 2011
- 40
-
Solving the Identity and Access Management ConundrumThanjavur Ravindran, Srikanth et al. | 2013
- 40
-
Top Three Potential Risks With Outsourcing Information SystemsWright, Catherine et al. | 2004
- 41
-
Solving the Puzzle of IT for Sarbanes-Oxley: IT's Role in Sarbanes-Oxley ComplianceRozek, Paul et al. | 2008
- 41
-
Presenting Penetration Test Results to Management - Management is routinely bombarded with reports, including penetration reports. Without clear directions and guidelines, a security report on the result of a penetration test may not get the attention it deserves. The article provides guidelines of how to best awaken management regarding the importance of the test and the consequences of not taking action.Leiman, Amin et al. | 2001
- 41
-
Presenting Penetration Test Results to ManagementLeiman, A. et al. | 2001
- 41
-
Optimising Returns from IT-related Business InvestmentsWilliams, Paul et al. | 2005
- 41
-
The Technological Auditor: How Automation Is Changing Auditors' RolesKumar, Parimal et al. | 2006
- 41
-
Auditor Due Care in E-commerceWakefield, Robin et al. | 2002
- 41
-
Giving Sustainability to COBIT P09Prisca, Vítor et al. | 2010
- 42
-
Tips and Strategies to Protect Laptops and the Sensitive Data They ContainLivingston, John et al. | 2007
- 42
-
Beyond the Looking Glass: IT Auditors and Client CommunicationsEe, Chong et al. | 2009
- 42
-
Applying CobiT® Framework in Change ManagementKulkarni, M. et al. | 2003
- 42
-
Applying COBIT(R) Framework in Change ManagementKulkarni, Madhav et al. | 2003
- 42
-
How Strong Is Strong User Authentication?Campi, Alessandro et al. | 2012
- 43
-
Implementation of ERP Systems: Accounting and Auditing ImplicationsBae, Benjamin B. et al. | 2004
- 43
-
Continuous Auditing: Is It Fantasy or Reality?ISACA Standards Board et al. | 2002
- 43
-
Features - What Recruiters and Staffing Agencies Say about Trends in IS Auditing - This feature comprises views garnered from the field and promotes thought to the question: "IS Auditing and the 21st Century: Are We Prepared?"| 2000
- 43
-
Tools, Techniques and Tips for IT Auditors: Strategies for Complying With Section 404Grenough, Jerry et al. | 2006
- 43
-
What Recruiters and Staffing Agencies Say about Trends in IS Auditing| 2000
- 43
-
Continuous Auditing: Is It Fantasy or Reality? ISACA Standards Board| 2002
- 44
-
How to Measure Security From a Governance PerspectiveVolchkov, Andrej et al. | 2013
- 44
-
Electronically Stored Information and CyberforensicsMarcella Jr, Albert J. et al. | 2008
- 45
-
The Significance of the Dodd-Frank ActMarks, Larry et al. | 2011
- 45
-
Beyond Segregation of Duties: IT Audit's Role in Assessing User Access Control RisksHare, Jeffrey T. et al. | 2009
- 45
-
Use of the Balanced Scorecard for IT Risk ManagementKapur, Rajesh et al. | 2010
- 45
-
Harnessing IT for Secure, Profitable UseGuldentops, E. et al. | 2001
- 45
-
Harnessing IT for Secure, Profitable Use - The growing dependence of most organisations on their information systems, coupled with the risks, benefits and opportunities that IT carries, made IT governance an increasingly critical facet of overall governance. Within the IT governance debate, information security issues are taking prominent place.Guldentops, Erik et al. | 2001
- 45
-
A Hacker Breaks In -- Lessons Learned From a True StoryWenming, Zhu et al. | 2007
- 46
-
PLUS - CPE Quiz #72Oringel, Joey et al. | 2000
- 46
-
Building the IT Organization Balanced ScorecardGold, R. S. et al. | 2003
- 46
-
Commentary - Building the IT Organization Balanced ScorecardGold, Robert S. et al. | 2003
- 46
-
A Little Bit of History Repeating Itself — Nolan's Stages Theory and the Modern IS AuditorHollyhead, Andy et al. | 2012
- 47
-
Sarbanes-Oxley and Business Process Outsourcing RiskMusaji, Yusuf et al. | 2005
- 47
-
Conflict ResolutionMusaji, Yusuf et al. | 2002
- 47
-
The Soul Searching That Comes With Sole-SourcingBostick, John et al. | 2007
- 48
-
SAS 70 for Sarbanes-Oxley ComplianceCoe, Martin et al. | 2006
- 49
-
Payment Card Industry Data Security Standard in the Real WorldDrew, Doug et al. | 2008
- 49
-
Overview of Principal IT Evaluation Models: Tools For IT AuditorsKimpton, C. / Martin, D. et al. | 2001
- 49
-
10 Things to Consider When Offshoring OperationsTrivedi, Tejus et al. | 2007
- 49
-
Help Source - Help Source Q&ASubramaniam, B.Ganapathi et al. | 2004
- 49
-
Leading Change and Transformation in Information SecuritySimiyu Masika, John et al. | 2014
- 50
-
Plus - Crossword PuzzleMellor, Myles et al. | 2012
- 50
-
IS Audit and Security Professionals: An Emerging Role in a Changing World OrderKanhere, Sujata et al. | 2009
- 51
-
Streamline ISO 27001 Implementation: Reducing the Time and Effort Required for ComplianceRamirez, David et al. | 2006
- 51
-
CPE Quiz #90, based on volume 3, 2003Oringel, Joe et al. | 2003
- 51
-
Merger and Acquisition: Effective Information Security Depends on Strategic Security MetricsGattiker, Urs E. et al. | 2007
- 51
-
Overview of Principal IT Evaluation Models: Tools For IT Auditors - As part of a government-wide performance audit of activities related to electronic service delivery in Quebec, research was conducted to identify and analyze evaluation tools used in Canada and in other countries for evaluating and auditing the activities in various areas of information technology. This paper provides a summary of the, surveys's results.Kimpton, Clarence et al. | 2001
- 51
-
CPE Quiz #84, Based on Volume 3, 2002Oringel, Joey et al. | 2002
- 51
-
CPE Quiz - CPE Quiz #96, based on volume 3, 2004Oringel, Joe et al. | 2004
- 52
-
Offshore Application Development Done RightBakalov, Rudy et al. | 2005
- 52
-
Assessing and Managing IT Operational and Service Delivery RiskCopley, Jonathan et al. | 2014
- 53
-
The Top 10 Compliance Project Challenges and OpportunitiesChandola, Tarun et al. | 2008
- 53
-
Embedding Policy Governance Within Business ProcessesMohanty, Bapi et al. | 2006
- 53
-
CPE Quiz #144 - Based on Volume 3, 2012Totade, Smita et al. | 2012
- 53
-
CPE Quiz #132 Based on Volume 3, 2010Rafeq, A et al. | 2010
- 53
-
CPE QUIZ #150 - Based on Volume 3, 2013Totade, Smita et al. | 2013
- 53
-
CPE Quiz #138 - Based on Volume 3, 2011Totade, Smita et al. | 2011
- 54
-
Revised ISACA Model Curriculum for IS Audit and ControlSummers, Scott et al. | 2009
- 54
-
CE Quiz # 78, Based on Volume 3, 2001Oringel, Joey et al. | 2001
- 55
-
Standards, Guidelines, Tools and Techniques| 2012
- 55
-
Standards, Guidelines, Tools and Techniques: ISACA Member and Certification Holder Compliance| 2010
- 57
-
CPE Quiz #156 - Based on Volume 3, 2014 — Big DataTotade, Smita et al. | 2014
- 59
-
CPE Quiz #102 - Based on Volume 3, 2005Khan, Kamal et al. | 2005
- 59
-
CPE Quiz #107 - Based on Volume 2, 2006Khan, Kamal et al. | 2006
- 59
-
CPE Quiz #114 - Based on Volume 3, 2007Chan, Sally et al. | 2007
- 59
-
CPE Quiz #126 - Based on Volume 3, 2009Rafeq, A. et al. | 2009
- 59
-
CPE Quiz #120 - Based on Volume 3, 2008Rafeq, A. et al. | 2008
-
ISACA Bookstore Supplement| 2012
-
ISACA Bookstore - ISACA Bookstore Price List Supplement| 2004
-
PLUS - ISACA Bookstore Price List| 2000
-
ISACA Bookstore Price List Supplement| 2005
-
PLUS - ISACA Bookstare Offerings| 2000