Auditing a Business Reporting System Implementation
This webcast will provide information about how financial auditors can conduct a post-implementation audit of a business reporting system.
Published on August 02, 2011
GTAG 3 - Continuous Auditing Implications for Assurance, Monitoring, and Risk Assessment
Guidance for chief audit executives (CAEs) on how to implement an ideal strategy combining continuous auditing and continuous monitoring solutions to address challenges of compliance
Published on June 26, 2008
Considerations in Risk-Based Auditing
Considerations in Risk-Based Auditing is a strategic overview intended to provide readers with detailed, practical, specific and non-authoritative guidance when implementing the technology-related aspects of the eight Statements of Auditing Standards...
Published on November 18, 2011
Statement on Auditing Standards
These AICPA IMTA resources help support CPAs in achieving a level of quality when providing assurance services.
Published on October 07, 2014
GTAG 6 - Managing & Auditing IT Vulnerabilities
A guide developed to help CAEs pose the correct questions to IT security staff when assessing the effectiveness of their vulnerability management processes. Recommendations for practices and further details provided.
Published on February 04, 2010
GTAG 8 - Auditing Application Controls
Information for CAEs on application controls and their benefits, the role of internal auditors, performing a risk assessment, application control review scoping, approaches and other considerations, suggested tests, and more.
Published on September 20, 2007
CAATTs Identifies Potentially Fraudulent Activities
This case study explores how Computer Assisted Auditing Tools and Techniques (CAATTs) enables you to discover fraud in a very short timeframe
Published on March 18, 2013
CAATTs Ideal for Efficient Audits
With new issued and revised auditing standards and audit risk standards, this article explores the renewed emphasis on risk identification and certain key financial statement areas and assertions
Published on February 05, 2013
How CAATTs Identifies Potentially Fraudulent Activities
This case study explores how Computer Assisted Auditing Tools and Techniques enabled him to discover fraud in a very short timeframe – all thanks to technology
Published on March 04, 2013
GTAG 4 - Management of IT Auditing
Posted with permission from the Institute of Internal Auditors, this document explores how to define IT strategy, evaluate IT-related risk, execute IT Audit, and manage the IT Audit function.
Published on November 13, 2012