Auditing Risk - A Practical Method Using the InfoSec Triangle
This article offers a logical methodology to determine audit risk within an organization including a 360-degree observation of the InfoSec Triangle.
Published on February 26, 2013
Auditing a Business Reporting System Implementation
This webcast will provide information about how financial auditors can conduct a post-implementation audit of a business reporting system.
Published on August 02, 2011
Considerations in Risk-Based Auditing
Considerations in Risk-Based Auditing is a strategic overview intended to provide readers with detailed, practical, specific and non-authoritative guidance when implementing the technology-related aspects of the eight Statements of Auditing Standards...
Published on November 18, 2011
GTAG 3 - Continuous Auditing Implications for Assurance, Monitoring, and Risk Assessment
Guidance for chief audit executives (CAEs) on how to implement an ideal strategy combining continuous auditing and continuous monitoring solutions to address challenges of compliance
Published on June 26, 2008
Glossary of Risk-Based Auditing Terms
A glossary of risk-based auditing terminology used in the Information Technology Considerations in Risk-Based Auditing Web Seminars and Discussion Papers
Published on February 03, 2010
Statement on Auditing Standards
These AICPA IMTA resources help support CPAs in achieving a level of quality when providing assurance services.
Published on April 10, 2013
GTAG 8 - Auditing Application Controls
Information for CAEs on application controls and their benefits, the role of internal auditors, performing a risk assessment, application control review scoping, approaches and other considerations, suggested tests, and more.
Published on September 20, 2007
GTAG 6 - Managing & Auditing IT Vulnerabilities
A guide developed to help CAEs pose the correct questions to IT security staff when assessing the effectiveness of their vulnerability management processes. Recommendations for practices and further details provided.
Published on February 04, 2010
CAATTs Identifies Potentially Fraudulent Activities
This case study explores how Computer Assisted Auditing Tools and Techniques (CAATTs) enables you to discover fraud in a very short timeframe
Published on March 18, 2013
How CAATTs Identifies Potentially Fraudulent Activities
This case study explores how Computer Assisted Auditing Tools and Techniques enabled him to discover fraud in a very short timeframe – all thanks to technology
Published on March 04, 2013