Search Results

    Page  1 2 3
    Showing results 1 - 10 of 28
    Order by:


    Common Vulnerabilities and Exposures

    Overview Common Vulnerabilities and Exposures (CVE's) is a dictionary of publicly known information security vulnerabilities and exposures
    Published on March 13, 2013

    Service Organization Control Reporting

    Article Today, it is common for entities to outsource business tasks or functions to service organizations, even those that are core to an entity’s operations. Although user entities may rely on a service...
    Published on June 25, 2014

    Trust Services

    Overview Trust Services are defined as a set of professional assurance and advisory services based on a common framework to address the risks and opportunities of IT
    Published on January 16, 2014

    IMTA Resources for International Professionals

    Overview This page contains technology initiatives and resources available at the AICPA to address common technology issues that CPAs and business professionals encounter
    Published on August 25, 2014

    Frequently Asked Questions

    Article SAS 115 FAQs for IT Section members addresses the most common practitioner questions related to applying SAS No. 115. In addition, it provides links to additional resources that may help you in understanding and applying SAS No. 115
    Published on May 14, 2010

    SAS No. 115 Frequently Asked Questions

    Overview SAS 115 FAQs for IT Section members addresses the most common practitioner questions related to applying SAS No. 115. In addition, it provides links to additional resources that may help you in understanding and applying SAS No. 115
    Published on May 28, 2010

    Slide 1

    Webcast This webcast discusses how most cloud computing infrastructures consist of services delivered through common centers and the security and governance aspects associated with it
    Published on August 12, 2013

    Slide 1

    Presentation The session discusses how most cloud computing infrastructures consist of services delivered through common centers and the security and governance aspects associated with it
    Published on May 08, 2013

    Auditing Risk - A Practical Method Using the InfoSec Triangle

    Article This article offers a logical methodology to determine audit risk within an organization including a 360-degree observation of the InfoSec Triangle.
    Published on February 26, 2013

    Must-Keep Resolutions for Accountants Involved in a Systems Implementation Project

    Article This page highlights tips to successfully execute a systems implementation project.
    Published on January 08, 2014

    Page  1 2 3
    Showing results 1 – 10 of 28
    Show Results per page
    Copyright © 2006-2014 American Institute of CPAs.