IS Audit Basics: Affect What Is Next Now (English)
- New search for: Cooke, Ian
- New search for: Belt, Green
- New search for: Cullen, Martin
- New search for: Cooke, Ian
- New search for: Belt, Green
- New search for: Cullen, Martin
In:
ISACA journal
;
6
;
6-9
;
2018
-
ISSN:
- Article (Journal) / Print
-
Title:IS Audit Basics: Affect What Is Next Now
-
Contributors:
-
Published in:ISACA journal ; 6 ; 6-9
-
Publisher:
- New search for: Information Systems Audit and Control Association
-
Publication date:2018-01-01
-
Size:4 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.450285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.450285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: Cybersecurity for a Simple'' AuditorRoss, Steven J. et al. | 2015
- 3
-
Information Security Matters: How We Can SucceedRoss, Steven J. et al. | 2018
- 3
-
Information Security Matters: Information Security in ContextRoss, Steven J. et al. | 2017
- 4
-
Information Security Matters: Service Availability and Disaster RecoveryRoss, S.J. et al. | 2010
- 4
-
Information Security Matters: The G7 and Cyber SecurityRoss, Steven J. et al. | 2016
- 4
-
Information Security Matters: The Cost of CyberattacksRoss, S.J. et al. | 2012
- 4
-
Information Security Matters: Whiz Bang 2000Ross, Steven J. et al. | 2014
- 4
-
Information Security Matters: A Tide in the AffairsRoss, S.J. et al. | 2013
- 5
-
IS Audit Basics: Auditors and Large Software Projects, Part 3Gelbstein, Ed et al. | 2015
- 6
-
The NetworkStetz, Kathleen M. et al. | 2014
- 6
-
IS Audit Basics: Affect What Is Next NowCooke, Ian / Belt, Green / Cullen, Martin et al. | 2018
- 6
-
Information Ethics: Character Traits of an IT ProfessionalRaval, V. et al. | 2013
- 6
-
IS Audit Basics: Auditing Mobile DevicesCooke, Ian et al. | 2017
- 6
-
Cloud Computing: Leveraging the Cloud for Added ValueMarkey, S.C. et al. | 2012
- 7
-
IS Audit Basics: The Soft Skills Challenge, Part 6Gelbstein, Ed / Baldi, Stefano et al. | 2016
- 8
-
Information Ethics: Risk and ResponsibilityRaval, V. et al. | 2012
- 8
-
Information Ethics: An Alchemy of C3: Character, College and ComputersRaval, Vasant et al. | 2014
- 10
-
Information Ethics: Transparency and the IT ProfessionalRaval, Vasant et al. | 2015
- 10
-
The Practical Aspect: Why Worry About IoT?Raval, Vasant / Thaker, Ranjit D. et al. | 2018
- 10
-
Five Questions WithSebopeng, R.B. et al. | 2013
- 11
-
IS Audit Basics: The Core of IT AuditingSingleton, Tommie et al. | 2014
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Proper Segregation of Incompatible IT ActivitiesSingleton, T.W. et al. | 2012
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Data AnalyticsSingleton, T. et al. | 2013
- 12
-
Access Control, Security, and Trust: A Logical ApproachSpinelli, C. et al. | 2011
- 13
-
Book Review: Security, Audit and Control Features Oracle E-Business Suite, 3^r^d EditionBenmahbous, M. et al. | 2010
- 13
-
Green IT in Practice: How One Company Is Approaching the Greening of its ITMunongwa, B. et al. | 2011
- 14
-
Persistent Cross-interface AttacksSood, A.K. / Enbody, R.J. et al. | 2011
- 14
-
Cloud Computing: Cloud Computing as an Enabler of New Business Models and Start-upsSchouten, Angelique et al. | 2015
- 14
-
Information Ethics: Information Ethics in the Mid-21st CenturyRaval, Vasant et al. | 2016
- 14
-
The Practical Aspect: Challenges of Security Log ManagementRaval, Vasant / Verma, Saloni et al. | 2017
- 14
-
Criteria for Evaluating and Selecting Continuous Controls Monitoring SolutionsDutta, A. / Koritala, B. et al. | 2010
- 14
-
How Zero-trust Network Security Can Enable Recovery From CyberattacksBeck, Eric A. et al. | 2014
- 15
-
Book Review: The Web Application Hacker's Handbook Finding and Exploiting Security Flaws, 2^n^d EditionParekh, U. et al. | 2013
- 16
-
Future-Proofing a Career in Cybersecurity ([non-Roman script word])Saurbaugh, Mike et al. | 2018
- 16
-
Information Insecurity-Motivator of Corporate Compliance PracticeCano, J.J. et al. | 2013
- 17
-
Book Review: Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsRichardson, Andrew et al. | 2015
- 17
-
Data Governance for Privacy, Confidentiality and Compliance: A Holistic ApproachSalido, J. et al. | 2010
- 17
-
Demonstrating Due Diligence in the Management of Information SecurityGelbstein, E. et al. | 2012
- 18
-
The Criticality of Security in the Internet of ThingsHerold, Rebecca et al. | 2015
- 19
-
Digital Identity—Will the New Oil Create Fuel or Fire in Today's Economy?Blum, Dan et al. | 2017
- 19
-
Leveraging Industry Standards to Address Industrial Cybersecurity RiskAlcoforado, Ivan et al. | 2014
- 20
-
Is Artificial Intelligence a Career Path for You? ([non-Roman script word])Wlosinski, Larry G. et al. | 2018
- 20
-
Data Integrity-Information Security's Poor RelationGelbstein, E. et al. | 2011
- 20
-
Security Labeling of IT Services Using a Rating MethodologyRamos, A. et al. | 2013
- 21
-
Performance Measurement Metrics for IT GovernanceBakshi, Sunil et al. | 2016
- 21
-
Lack of Privacy Awareness in Social NetworksSrinivasan, S. et al. | 2012
- 22
-
Governance, Risk, Compliance and a Big Data Case StudyPearce, Guy et al. | 2017
- 24
-
An Integrated Risk Assessment Program-A Cliche or a Need?Azam, S.F. et al. | 2013
- 24
-
Show Me the Money! Three Ways to Better Partner With FinanceBarnier, B.G. et al. | 2010
- 25
-
Bridging the Gap Between Access and Security in Big DataMattsson, Ulf T. et al. | 2014
- 25
-
Back to the Future in Device SecurityRotman, Doron / Kypreos, Chris / Pipes, Sarah et al. | 2015
- 26
-
Preventive Technical Controls for Application SecuritySethi, R. / Foroughi, E. et al. | 2012
- 26
-
Technology Risk Measurement and ReportingPareek, M. et al. | 2011
- 27
-
Leading Information SecurityJulisch, K. et al. | 2013
- 28
-
Effective Strategies for Creating and Maintaining a Diverse and Inclusive IT Audit TeamBalderas, Julie / Fareeduddin, Asim / Richards, Femi / Sarmad, Ruwel / Wall, Jack et al. | 2018
- 29
-
An Introduction to Digital Records ManagementHamidovic, H. et al. | 2010
- 29
-
The Changing Face of CybersecurityHayes, S. / Shore, M. / Jakeman, M. et al. | 2012
- 29
-
Assessing Security ControlsDubsky, Lance et al. | 2016
- 29
-
Auditing Big Data in EnterprisesAl-Mansour, Abdullah et al. | 2017
- 30
-
Data Owners' Responsibilities When Migrating to the CloudGelbstein, Ed / Polic, Viktor et al. | 2014
- 31
-
Doing Business in India Requires Digital ComplianceVaidya, A. et al. | 2013
- 32
-
Choosing the Most Appropriate Data Security Solution for an OrganizationMattsson, U. et al. | 2011
- 33
-
Delivering Personal Data Protection Compliance on a Global ScaleKabanov, Ilya et al. | 2016
- 33
-
Internet of Things—The Fate We Make for OurselvesSeaman, Jim et al. | 2015
- 33
-
A Risk-Based Management Approach to Third-Party Data Security, Risk and CompliancePutrus, Robert et al. | 2017
- 35
-
Building a Business Case for Records ManagementStrait, C. et al. | 2010
- 36
-
From Here to Maturity—Managing the Information Security Life CycleAnderson, Kerry A. et al. | 2014
- 37
-
SME Cybersecurity and the Three Little PigsHan, D.R. et al. | 2012
- 37
-
Growing a Cybersecurity CareerCasesa, Philip et al. | 2018
- 37
-
Revisiting the Human Factor in Organizational Information Security ManagementGuo, K.H. et al. | 2013
- 38
-
IT Governance and Business-IT Alignment in SMEsDe Haes, S. / Haest, R. / Van Grembergen, W. et al. | 2010
- 38
-
Developing a Unified Approach to Information Security in Business Associate RelationshipsOverly, M.R. / Howell, C.T. / Scarano, R.M. et al. | 2011
- 38
-
Revising Cybersecurity Skills for EnterprisesIvanovs, Ivo / Deruma, Sintija et al. | 2015
- 39
-
Enhancing the Audit Follow-up Process Using COBIT 5Cooke, Ian et al. | 2016
- 41
-
Defining the Chief Digital Officer Using COBIT 5Catarino, João / Rosa, Isabel / da Silva, Miguel Mira et al. | 2018
- 42
-
A Sustainable and Efficient Way to Meet Client's Growing Security ExpectationsKulkami, B. et al. | 2013
- 42
-
Making the SoA an Information Security Governance ToolGnana, Daniel et al. | 2017
- 42
-
A Business-Integrated Approach to Incident ResponseMukundhan, Hari et al. | 2015
- 43
-
Using Scenario Analysis for Managing Technology RiskPareek, M. et al. | 2012
- 44
-
Auditing Oracle DatabaseRahman, Muhammad Mushfiqur et al. | 2014
- 45
-
A Higher Level of Governance-Monitoring IT Internal ControlsGarber, M. et al. | 2010
- 46
-
Auditing Global Compliance of Data Protection MechanismsLehmann, D. / van Vonderen, F. et al. | 2011
- 46
-
The Criticality of Mobile Device ManagementAhmed, A. et al. | 2013
- 47
-
Advanced Data Analytics for IT AuditorsAlexiou, Spiros et al. | 2016
- 47
-
Real-life Risk TheoryBrottmann, Mette / Agnoletti, Klaus / Pedersen, Morten Als / Madsen, Ronnie Lykke / Krumbak, Michael Rosendal / Ahrends, Thor et al. | 2015
- 48
-
Evasive Malware TricksKolbitsch, Clemens et al. | 2017
- 49
-
A Heightened Sense of AwarenessCassels, Wade / Alvero, Kevin / Pierson, Randy et al. | 2018
- 49
-
Preparing for HTML5 Capabilities and ThreatsZhang, H. et al. | 2012
- 50
-
Risk and Ethics in CyberspaceLee, Wanbil W. et al. | 2015
- 51
-
The Information Security FunctionCano, Jeimy J. et al. | 2014
- 52
-
The AICPA's New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key StakeholdersHerrygers, Sandra / Kumar, Gaurav / Schaeffer, Jeff et al. | 2017
- 54
-
Tools: Skill Acquisition in a Rapidly Evolving WorkplaceLyons, Robin et al. | 2018