Critical Security Audit Considerations
This article will address specific policies, procedures, and methods related to the security portion of an information technology internal audit
Published on February 25, 2013
Information Management and Technology Assurance (IMTA) Membership
Membership in Information Management and Technology Assurance (IMTA) Division entitles you to premium content, resources, tools and networking opportunities you need to succeed.
Published on May 05, 2014
IMTA Audimation Services Benefits
The IT Section offers a premium discount offer to members of the IT Section for IDEA data analysis software and training courses.
Published on February 08, 2013
2010 Top Technology Initiatives Complete Listing
This page lists technology initiatives along with survey questions that were used in the 2010 TTI survey.
Published on February 19, 2013
Generally Accepted Privacy Principles in WebTrust Engagements
These frequently asked questions provide clarification on the application of GAPP,WebTrust Online Privacy and other Trust Services engagements.
Published on January 16, 2014
Business Continuity Management / Disaster Recovery Planning
This page offers tools pertaining to Business Continuity Management and Disaster Recovery Planning.
Published on January 13, 2014
August 11, 2010
August 11, 2010 Member Publication - IT News and Communications.
Published on May 04, 2012
FTC Identity Theft Resources for Businesses
The Federal Trade Commission (FTC) has compiled resources on how to protect personal information from identity theft.
Published on June 06, 2013
CITP Credential Program Benefits
This page details the wealth of benefits and resources CITPs have at their disposal.
Published on March 31, 2014
Generally Accepted Privacy Principles
The AICPA/CICA Privacy Task Force, developed the Generally Accepted Privacy Principles (GAPP). This document supersedes the AICPA/CICA Privacy Framework.
Published on January 22, 2014