Every successful Information Security Program is built on 3 key elements. Decision-making risk management processes, clearly documented Information Security Policies, and an effective IT Audit Program. These elements work in conjunction with each other, feeding the next component information that continually improves the Information Security Program. The IT Risk Assessment process identifies key systems and information, threats against those systems, and helps management identify which controls are necessary to mitigate risk to an acceptable level. The controls have been selected in the risk assessment, are captured and solidified in the Information Security Policies. Which the bank then in turn implements to mitigate the identified risks. The IT Audit process comes in to identify two things; first are the controls which were established in the first two elements of the process and implemented in the organization, and second are the controls adequate for regulatory compliance and best practices.
A well-developed IT Audit Program will govern this process and provide the Board of Directors with assurances that the Information Security Program is implemented and working. This session will examine in more detail how the IT Audit Program integrates with the Information Security Program.
- Risk-based Audit Models
- Internal/External Audit Processes
- FFIEC IT Audit Requirements
- 6 Basic Audit Steps
- Engagement Letters
- Audit Workpapers
- Reporting and Exception Tracking
Who Should Attend?
Information Security Officer, IT Manager, Risk Officer, Internal Auditor, Directors, and Executives looking to improve processes for IT Auditing.
Please note: This site employs features that may cause unexpected behavior in older versions of Internet Explorer. If you experience a problem, try refreshing your screen. If this doesn't solve the problem, click on this link.
You may contact us by using the Online Chat button below.