Search Results

    Page  1 2 3
    Showing results 1 - 10 of 24
    Order by:


    Red Flags Rule Overview

    Federal Law Under the Red Flags Rules, financial institutions and creditors must develop and implement a written Identity Theft Prevention Program.
    Published on March 07, 2013

    GTAG 10 - Business Continuity Management

    Guide Information helping CAEs understand the Business Continuity Management (BCM) program, risks, and controls and preparing them with information for executive & board-level discussion. Includes disaster recovery planning
    Published on October 23, 2012

    CAATTs Ideal for Efficient Audits

    Article This article highlights renewed emphasis on risk identification, evaluation of controls, and certain key financial statement areas and assertions.
    Published on March 04, 2013

    CAATTs Ideal for Efficient Audits

    Article With new issued and revised auditing standards and audit risk standards, this article explores the renewed emphasis on risk identification and certain key financial statement areas and assertions.
    Published on February 05, 2013

    IT Governance

    Overview IT governance is a framework that ensures that technology decisions are made in support of the business' goals and objectives.
    Published on March 04, 2013

    IT News January 19, 2011

    Newsletter The IT Newsletter is a venue to communite to the members of the IT Community. It provides an overview of the latest topics pertaining to the profession.
    Published on February 06, 2011

    Performing an Audit of Internal Control in an Integrated Audit

    Overview The Center for Audit Quality (CAQ) has developed a new practical pointers reference source for public company auditors that provides lessons learned from integrated audits of internal control over financial reporting (ICFR).
    Published on February 27, 2013

    IT Assurance Services Guidance

    Guide The guidance set forth provides the CPA with direction and best practices towards improving information quality and managing information risk.
    Published on April 25, 2013

    Common Vulnerabilities and Exposures

    Overview Common Vulnerabilities and Exposures (CVE's) is a dictionary of publicly known information security vulnerabilities and exposures.
    Published on March 13, 2013

    CITP Credential Usage FAQ

    FAQ The CITP Credential FAQ captures general inquiries about the usage of the CITP credential.
    Published on January 23, 2013

    Page  1 2 3
    Showing results 1 – 10 of 24
    Show Results per page
    Copyright © 2006-2014 American Institute of CPAs.