Information technology security audit

Results: 1663



#Item
151Information technology audit / Companies listed on the New York Stock Exchange / Auditing / Computing / Audit / Internal audit / Database activity monitoring / Information security / Business / Computer security / McAfee / Security

Technology Blueprint Deliver Continuous Compliance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:50
152Data security / Business / Risk / Computer security / Internal control / Audit / Security controls / Accounting information system / Information technology audit process / Auditing / Accountancy / Information technology audit

THIRD PARTY REVIEW Department of Central Management Services Bureau of Communication and Computer Services July 2003

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2007-08-06 10:29:00
153Data security / Risk / Security / Computer security / Internal control / Security controls / Audit / Accounting information system / SOX 404 top–down risk assessment / Auditing / Accountancy / Information technology audit

THIRD PARTY REVIEW Department of Central Management Services Bureau of Communication and Computer Services July 2004

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2007-08-06 10:29:00
154Data security / Computer security / Security / Internal control / Audit / Security controls / Generally Accepted Auditing Standards / Information technology audit process / Auditing / Information technology audit / Risk

REPORT DIGEST INTRODUCTION DEPARTMENT OF CENTRAL MANAGEMENT SERVICES

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2007-08-06 10:29:00
155Risk / Business / Internal control / Audit / Internal audit / External auditor / Accounting information system / Information technology audit process / Information security audit / Auditing / Accountancy / Information technology audit

Microsoft Word - 1-report 2010 PDF.doc

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2010-07-07 18:15:00
156Cyberwarfare / Information technology audit / Software testing / Vulnerability / Internal control / Information technology management / Information security audit / Security controls / Auditing / Computer security / Data security

Microsoft Word - BCCS report 2008.doc

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2008-07-09 10:19:00
157Information technology audit / Computer security / Accountancy / Computing / Certified Information Security Manager / Information Systems Audit and Control Association / Certified Information Systems Auditor / CISA / Hong Kong Institute of Certified Public Accountants / Data security / Auditing / Professional accountancy bodies

2009 (1st) CISA / CISM Information Seminar The ISACA (Information Systems Audit and Control Association) Hong Kong Chapter is pleased to announce the following information seminar:

Add to Reading List

Source URL: www.isaca.org.hk

Language: English - Date: 2009-01-09 07:59:36
158Business / Statement on Auditing Standards No. 70: Service Organizations / Audit / Financial audit / Information technology controls / Internal control / Security controls / Information security / External auditor / Auditing / Accountancy / Risk

SCHOOL BOARD OF SEMINOLE COUNTY, FLORIDA MANAGEMENT LETTER For The Year Ended June 30, 2010 INDEPENDENT AUDITOR’S MANAGEMENT LETTER Chairman and Members of

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2011-10-10 16:37:50
159Risk management / Data security / Security / Actuarial science / Risk assessment / Information technology security audit / Audit / Information security management system / Business continuity / Risk / Management / Ethics

Case Study: County Wants Security Peace of Mind (Document NoSolutions For Advanced IT Services Altius Information Technologies, Inc. Dedicated to the advancement of IT services

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:33
160Computing / Computer crimes / Computer network security / United States v. Morris / Authorization / Computer fraud / Password / Computer security / Network security / Cybercrime / Information technology audit / Security

Microsoft Word - KERR-78_N_Y_U_L_Rev_1596-edit.doc

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 2004-03-11 11:21:35
UPDATE