10

Ponencia ia + it

Embed Size (px)

DESCRIPTION

 

Citation preview

  • 1. RELACION GESTION AIIA + TI AUDITORIAS CERTIFICACIONREDES SOCIALES PROYECTOS ORGANIZACIN LA NUBE

2. Date GTAG 17: Auditing IT Governance GTAG 16: Data Analysis TechnologiesJuly 2012 August 2011GTAG 15: Information Security GovernanceJune 2010GTAG 14: Auditing User-developed ApplicationsJune 2010GTAG 13: Fraud Prevention and Detection in an Automated WorldDecem ber 2009GTAG 12: Auditing IT ProjectsMarch 2009GTAG 11: Developing the IT Audit PlanJanuary 2009GTAG 10: Business Continuity ManagementJanuary 2009GTAG 9: Identity and Access ManagementJanuary 2009GTAG 8: Auditing Application ControlsJanuary 2009GTAG 7: Information Technology Outsourcing, 2nd EditionJune 2012GTAG 6: Managing and Auditing IT Vulnerabilities PLEASE NOTE: GTAG 6 has been deleted from the IPPF. Some of its concepts are combined with the 2nd edition of GTAG 4.DELETE D January 2013GTAG 5: Managing and Auditing Privacy Risks PLEASE NOTE: GTAG 5 has been replaced by the Auditing Privacy Risks, 2nd Edition Practice Guide.REPLAC ED July 2012GTAG 4: Management of IT Auditing, 2nd EditionJanuary 2013GTAG 3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk AssessmentUpdate Coming SoonGTAG 2: Change and Patch Management Controls: Critical for Organizational Success, 2nd Edition GTAG 1: Information Technology RiskMarch 2012 3. July 2012August 2011 June 2010June 2010GTAG 17: Auditing IT Governance GTAG 16: Data Analysis TechnologiesGTAG 15: Information Security Governance GTAG 14: Auditing User-developed ApplicationsDateGTAG 13: Fraud Prevention and Detection in an Automated WorldJuly 2012GTAG 12: Auditing IT ProjectsAugust 2011GTAG 11: Developing the IT Audit PlanJune 2010GTAG 10: Business Continuity ManagementJune 2010 4. IT AUDIT Topics Covered Will Include: Risk Frameworks: Navigating the Alphabet Soup What Information Security Expects and Needs from Audit Auditing Cloud Computing and Outsourced Operations Conducting a Virtualization Security Assessment Measuring GRC Using Free Tools Top 10 Windows Security Controls and How to Correctly Collect Them Big Data: Access and Privacy Risks in the Hadoop Computing Environment Conducting an IT Fraud Risk Assessment Insider Threats: Lessons from the Trenches Leveraging GRC Technology as an Enterprise Solution How to Maintain Controls in a BYOD Environment Auditing IT Projects Optional Workshops: Smart Device Threats How to Find Malware on a Network Security and Audit Considerations for Cloud-Based Services Combating Computer Fraud Managing the IT Audit Department Ethical Hacking DEMO Combating Computer Fraud