E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security

Cover

Risk-based auditing is a broad topic, one that can be applied to many areas such as finance and information technology (IT). This e-guide focuses on risk-based auditing from an enterprise IT perspective. It covers the requirements for a risk-based audit and the steps necessary before, during and after an audit. Additionally, it discusses risk mitigation methods, and provides analysis for selecting controls and measuring control effectiveness. This e-guide offers a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.

Vendor:
IBM
Posted:
03 Nov 2010
Published:
25 Oct 2010
Format:
PDF
Length:
12 Page(s)
Type:
eGuide
Language:
English
Already a Bitpipe member? Login here

Download this eGuide!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor