Search Results

    Page  1 2 3 4
    Showing results 1 - 10 of 38
    Order by:


    CITP Credential Referral Program

    Overview This page contains information about the CITP credential referral program.
    Published on May 19, 2014

    CITP State Society Outreach - 2009 Results

    Overview We are expanding a communication pathway between the AICPA's CITP Committee and Information Technology Committees at the state level and inform the professional community further about the Certified Information Technology Professional (CITP) Credential.
    Published on May 09, 2013

    Information Management and Technology Assurance (IMTA) Resources

    Overview The Information Management and Technology Assurance (IMTA) Resource Center helps members provides comprehensive tools and access to the latest information in the field.
    Published on April 24, 2014

    2012 Top Technology Initiatives

    Overview This year, the 2012 AICPA Top Technology Initiative survey included a new methodology intended to explore IT issues in more depth.
    Published on May 01, 2013

    How ISO 27002 Relates to GAPPs Security for Privacy Principle

    Executive Summary This mapping document provides users of ISO 27002 with an understanding of how information security management criteria relate to privacy requirements of GAPP.
    Published on January 16, 2014

    IT Governance

    Article This article defines Information Technology (IT) Governance as a concept associated with a holistic approach to the management of IT.
    Published on March 04, 2013

    October2008IT Chair Letter

    Article What an incredible three years it?s been! So much has happened in the world of technology and the world around us! Advancements in technology have positively impacted organizations of all sizes, and across all aspects of the profession, is helping to transform the profession and how each of us complete
    Published on May 09, 2013

    Frequently Asked Questions About Privacy Services

    FAQ This article presents a series of frequently asked questions regarding privacy and privacy services.
    Published on January 16, 2014

    Service Organization Control Reporting

    Article Today, it is common for entities to outsource business tasks or functions to service organizations, even those that are core to an entity’s operations. Although user entities may rely on a service organization to perform outsourced tasks or functions, the user entity still retains responsibility (and the risks associated) for
    Published on June 25, 2014

    Auditing Risk - A Practical Method Using the InfoSec Triangle

    Article This article offers a logical methodology to determine audit risk within an organization including a 360-degree observation of the InfoSec Triangle.
    Published on February 26, 2013

    Page  1 2 3 4
    Showing results 1 – 10 of 38
    Show Results per page
    Copyright © 2006-2014 American Institute of CPAs.