IS Audit Basics: Auditing Cybersecurity (English)
- New search for: Cooke, Ian
- New search for: Cooke, Ian
In:
ISACA journal
;
2
;
7-11
;
2019
-
ISSN:
- Article (Journal) / Print
-
Title:IS Audit Basics: Auditing Cybersecurity
-
Contributors:Cooke, Ian ( author )
-
Published in:ISACA journal ; 2 ; 7-11
-
Publisher:
- New search for: Information Systems Audit and Control Association
-
Publication date:2019-01-01
-
Size:5 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.450285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.450285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: Do You Need a Disaster Recovery Plan...?Ross, Steven J. et al. | 2017
- 3
-
Information Security Matters: Disaster Recovery Management in the Multi-Modal EraRoss, Steven J. et al. | 2018
- 4
-
Information Security Matters: What Is Information Security Worth?Ross, Steven J. et al. | 2019
- 4
-
Information Security Matters: What Is the Value of Security?Ross, S.J. et al. | 2011
- 4
-
Looking Back: Information Security MattersRoss, S.J. et al. | 2014
- 4
-
Making Preparedness PayRoss, S.J. et al. | 2012
- 4
-
Information Security Matters: Weary Willie's Guide to Cyberrisk ManagementRoss, Steven J. et al. | 2016
- 4
-
Information Security Matters: CyberwhatsitRoss, Steven J. et al. | 2015
- 6
-
IT Audit Basics: Understanding the New SOC ReportsSingleton, T.W. et al. | 2011
- 6
-
Gates Corporation Makes Sales a Companywide Effort in the CloudBerridge, E. et al. | 2012
- 6
-
Information Security Matters: Shedding TiersRoss, S.J. et al. | 2014
- 6
-
IS Audit Basics: Innovation in the IT Audit ProcessCooke, Ian et al. | 2018
- 6
-
IS Audit Basics: The Auditors, IS/IT Policies and ComplianceGelbstein, Ed et al. | 2017
- 6
-
The NetworkQuinlan, George et al. | 2016
- 7
-
IS Audit Basics: Auditing CybersecurityCooke, Ian et al. | 2019
- 8
-
Changing Times and the Eternality of EthicsRaval, V. et al. | 2012
- 8
-
IS Audit Basics: Is There Such a Thing as a Bad IS Auditor?, Part 2Gelbstein, Ed et al. | 2016
- 10
-
Information Ethics: Is Information Technology Responsible for Corporate Crises?Raval, Vasant et al. | 2016
- 10
-
IS Audit Basics: Successful Audits Do Not Just HappenGelbstein, Ed et al. | 2015
- 10
-
Testing Controls Associated With Data TransfersSingleton, T.W. et al. | 2012
- 11
-
Enterprise Security for the Executive: Setting the Tone From the TopAxelrod, C.W. et al. | 2011
- 11
-
Information Ethics: The Piracy of PrivacyRaval, V. et al. | 2014
- 12
-
Mobile Application SecurityCano M., J.J. et al. | 2011
- 12
-
Information Ethics: Information Technology and Innovation EthicsRaval, Vasant et al. | 2015
- 12
-
The Practical Aspect: Third-party Risk ManagementRaval, Vasant / Shah, Samir et al. | 2017
- 13
-
Changing the Mind-set-Creating a Risk-conscious and Security-aware CulturePironti, J.P. et al. | 2012
- 13
-
A Cost-effective Approach for Sarbanes-Oxley-regulated Application Systems With Minimal IT Control AssuranceJegousse, L. et al. | 2011
- 13
-
Book Review: Data Privacy for the Smart GridKivisild, A. Krista et al. | 2016
- 14
-
Risk Management in Agile Projects ([non-Roman script word])Moran, Alan et al. | 2016
- 14
-
IS Audit Basics: Risk to Entities Regarding Data BreachesSingleton, T. et al. | 2014
- 14
-
Innovation Governance: What Is Innovation?Kelley, K. Brian et al. | 2019
- 15
-
Technology's Role in Enterprise Risk ManagementBayuk, Jennifer et al. | 2018
- 16
-
Book Review: The Soft Edge: Where Great Companies Find Lasting SuccessIppoliti, Dino et al. | 2015
- 17
-
Book Review: Governance of Enterprise IT Based on COBIT® 5: A Management GuidePrandini, Maria Patricia et al. | 2015
- 17
-
IT Scenario Analysis in Enterprise Risk ManagementFischer, U. et al. | 2011
- 17
-
Book Review: IT Strategic and Operational ControlsPrandini, M.P. et al. | 2014
- 18
-
Auditing Agile—A Brave New World ([non-Roman script word])Ee, Chong et al. | 2016
- 18
-
COBIT 5 Processes From a Systems Management PerspectiveSuer, M. / Cullens, C. / Brancato, D. et al. | 2014
- 18
-
Moving Toward Better Security for Today and TomorrowSaurbaugh, Mike et al. | 2019
- 18
-
How Analytics Will Transform Internal AuditKress, Robert E. / Hildebrand, Dave M. et al. | 2017
- 18
-
Internet of Things Offers Great Opportunities and Much RiskGonzalez, Marcelo Hector / Djurica, Jana et al. | 2015
- 20
-
Security Through Effective Penetration TestingTrull, J. et al. | 2012
- 21
-
Key Considerations When Evaluating ISRM Programs and CapabilitiesPironti, J.P. et al. | 2011
- 21
-
Is the TJ Hooper Case Relevant for Today's Information Security Environment?Tester, D. et al. | 2013
- 22
-
Applying a Technological Integration Decision Framework to Innovation GovernanceDavis, Robert E. et al. | 2018
- 22
-
The Role of the CISO and the Digital Security LandscapePutrus, Robert et al. | 2019
- 24
-
Using Standards to Create Effect in the BoardroomKoning, E. / Bikker, H. et al. | 2013
- 24
-
Creating Assurance in BlockchainSmith, A. Michael et al. | 2017
- 24
-
Strategic Alignment and E-health GovernanceBeratarbide, Elena / Kelsey, Thomas W. / Gil, Hermenegildo et al. | 2015
- 24
-
Essential Frameworks and Methodologies to Maximize the Value of ITRenard, Laurent et al. | 2016
- 25
-
Auditing Oracle Databases Using CAATsCooke, I. et al. | 2014
- 25
-
Strengthening Information Security GovernanceGelbstein, E. et al. | 2012
- 27
-
The Struggle for Privacy and the Survival of the Secured in the IT EcosystemSathiyamurthy, S. et al. | 2011
- 27
-
Agile AuditAlexiou, Spiros et al. | 2017
- 28
-
Governance, Risk and Compliance-Tying It All TogetherPierre-Louis, S. / Sanchez, R. / Shek, M. et al. | 2013
- 28
-
Cloud InsecuritiesWlosinski, Larry G. et al. | 2015
- 28
-
Information Security Architecture Gap Assessment and PrioritizationGhaznavi-Zadeh, Rassoul et al. | 2018
- 29
-
Auditing Cyberinsurance PolicyOlakunle, J. et al. | 2014
- 30
-
Sponsored Feature: Why Security Product Investments Are Not WorkingKeef, Sean et al. | 2019
- 31
-
Optimizing Software Development With Lean Value Chain AnalysisMani, Vimal et al. | 2016
- 31
-
Sharing or Controlling? Examining the Decision to Segregate Information Within the OrganizationFoerster, C.A. et al. | 2012
- 32
-
Stop Looking for the Purple Squirrel: What's Wrong With Today's Cybersecurity Hiring PracticesLee, Marcelle et al. | 2019
- 33
-
Selected COBIT 5 Processes for Essential Enterprise SecurityGreene, Fredric et al. | 2015
- 33
-
Critical Information Systems ProcessesYildirim, T. / Metin, B. et al. | 2014
- 34
-
Quick Fixes for Improving CyberdefensesAgarwala, Sanjiv et al. | 2016
- 34
-
Sponsored Feature: Centralized, Model-Driven Visibility Key to IT-OT Security ManagementDavidson, Ron et al. | 2018
- 34
-
Common Myths of Service Organization Controls (SOC) ReportsSeshadri, D. et al. | 2013
- 35
-
Value Assessment Tool for ICT Projects at the European CommissionDzhumalieva, S. / Noell, F. / Baudu, S. et al. | 2011
- 36
-
Mitigating the Risk of OSS-based DevelopmentGold, C. et al. | 2012
- 36
-
Dealing With Difficult DataHoesing, Michael T. et al. | 2017
- 36
-
Evaluating Information Security SolutionsAnderson, Kerry A. et al. | 2015
- 36
-
The Missing Link in Assessing Cyberrisk Factors Through Supply ChainsEitan, Ofir et al. | 2018
- 37
-
Application Security RiskShubhamangala, B. R. / Saha, Snehanshu et al. | 2016
- 37
-
ISO/IEC 27001:2005 Implementation and Certification-Doing It Again and AgainOdeshina, N. et al. | 2013
- 37
-
The Two Key Challenges of GDPR AdoptionSerres, Ramón et al. | 2019
- 37
-
The Effect of the COSO 2013 Update on IS ProfessionalsWhite, J.H. et al. | 2014
- 39
-
Corporate Responsibility, Retaining Top Management CommitmentDubey, N. et al. | 2013
- 40
-
A Case for a Partnership Between Information Security and Records Information ManagementAnderson, K.A. et al. | 2012
- 41
-
Another Win for Global Consumer Data RightsBrunswick, Dave et al. | 2019
- 41
-
A Practical Approach to Continuous Controls MonitoringVohradsky, David et al. | 2015
- 42
-
Internal Audit's Contribution to the Effectiveness of Information Security (Part 1)Steinbart, P.J. / Raschke, R. / Gal, G. / Dilla, W.N. et al. | 2014
- 42
-
Why Cyber Insurance Needs Probabilistic and Statistical Cyberrisk Assessments More Than EverAtluri, Indrajit et al. | 2018
- 43
-
Securing Merchant Environments Is Good, Securing the Credit Card Itself Is BetterAlaswad, A. et al. | 2013
- 45
-
An Introduction to ICT Continuity Based on BS 25777Hamidovic, H. et al. | 2011
- 45
-
Fundamental Concepts of IT Security AssuranceHarnidovic, H. et al. | 2012
- 45
-
Standardized Scoring for Security and Risk MetricsPareek, Mukul et al. | 2017
- 45
-
How to Increase Cybersecurity AwarenessNachin, Nipon / Tangmanee, Chatpong / Piromsopa, Krerk et al. | 2019
- 46
-
A Nontraditional Approach to Prioritizing and Justifying Cybersecurity InvestmentsPutrus, Robert et al. | 2016
- 47
-
Why Should Organizations Care About Professional Certifications?Smart, B. et al. | 2013
- 48
-
Why Computer Ethics Matters to Computer AuditingLee, W.W. et al. | 2014
- 48
-
Checking the Maturity of Security Policies for Information and CommunicationLyra, Mauricio Rocha et al. | 2015
- 51
-
How Root Cause Analysis Fits Into Various Audit TypesDurmisevic-Mutapcic, Amra et al. | 2019
- 52
-
Tools: Five Linux Distributions With Tools for AuditMoyle, Ed et al. | 2018
- 53
-
Aligning Information Security With Enterprise Risk Management Using ISO/IEC 27001:2013Mani, V. et al. | 2014
- 54
-
Help Source Q&ASubramaniam, Ganapathi et al. | 2015
- 54
-
Tools: Tools You May Already Have That Add Assurance ValueMoyle, Ed et al. | 2017
- 59
-
Standards, Guidelines, Tools and Techniques| 2015
- S1
-
ISACA Bookstore Supplement| 2015