The following 575 items are listed by Content Data.
Blog
Self Assessment: Launching Here and Soaring Beyond
First Step: Use Self-Assessment Within the Internal Audit Department
The first and simplest way to use t...
Blog
The Best Way to Formulate and Execute Audit Procedures
Once a company forms an internal audit function, completes the risk assessment process and develops an inte...
Blog
The Three Components of a Successful Systems Design
What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...
Blog
Topic Spotlight: COSO
Download these COSO tools and keep them handy to assist with your audit projects.1. Monitoring Entity-...
Blog
Topic Spotlight: Entity-Level Control
Download these entity-level control tools and publications and keep them handy to assist with your aud...
Blog
Topic Spotlight: Fixed Assets
Establish consistent operating practices with the fixed asset best practices and resources in this blog pos...
Blog
What Is Internal Audit’s Role in Cybersecurity?
Corporations are always thinking about how to protect assets. A few of the white-collar crimes compani...
Blog
What is IT Audit?
It is common to find organizations investing more and more resources – money, time, staff, etc. – thes...
Blog
What Is IT Risk and How Should You Manage It?
What Is IT Risk?
Information technology (IT) risk is any potential threat to business data, critical syste...
Blog
What is Transaction Authenticity?
What Is Transaction Authenticity?
"Transaction authenticity" can be defined as the authentication of a par...
Blog
What You Need to Build Remarkable Partnerships With the IT Organization
The strength of the partnership between IT audit and the IT organization is a significant differe...