(From IIA Global Technology Audit Guide Auditing IT Projects). GTAG 28, 2, Project Plan and Approach, , Objective and scope, The scope of the project. Information for the audit program was also obtained as necessary from the Institute of Internal Auditor’s GTAG (Global Technology Audit Guide) #12 ( Auditing IT. Start studying GTAG Auditing IT Projects: Appendix A – Project Management. Learn vocabulary, terms, and more with flashcards, games, and other study.
|Published (Last):||21 March 2013|
|PDF File Size:||16.77 Mb|
|ePub File Size:||6.79 Mb|
|Price:||Free* [*Free Regsitration Required]|
Continuous control monitoring CCM. Management of security risk in information and information technology Establish and maintain a project management framework that defines the scope and boundaries of managing projects, as well as the method to be adopted and applied to each project undertaken.
Ltd starting July She gyag part of the Core Team of the first company who earned the BCM Certification in the Philippines wherein there were no non conformities cited by the 3rd party assessors.
Managing information security by applying standards. Currently, he is working as a Risk Management Executive in one of the leading health maintenance organizations HMO in the Philippines handling operational risk, information technology risk, data privacy, information security and consumer protection program.
Global Technology Audit Guide (GTAG) 12: Auditing IT Projects
He has more than six 6 years of working experience in information systems audit, internal audit, governance, risk management, compliance readiness assessments and business process reviews, across various industries, with specialization in the financial services sector.
Types of computer related damage, abuse, and fraud.
App A Objective 3: Security requirements during systems development and introduction. The difference that Internal Auditors should know about.
Committee Members and Chapter Leaders. Information security policy, and strategy. Cooperation by IT auditor in auditing business processes. Visit the IIA Bookstore for more information. Publications Internal Auditor Newsletters Blogs.
Prevention and handling of computer fraud and abuse. Ensure that the projects support the programme’s objectives.
Add to Calendar
Maintaining organisations in continuous operation. IIA internal audit standards. Plenary 1 – Auditing Smart Devices: The organization shall establish and maintain an operation and management organization… O Information Technology Controls The business case includes the following key components: Skip to main content. AIs should establish a general framework for management of major technology-related projects.
Prevention of abuse and fraud. Pg 8, Pg 20, Exam Obj 5. They can serve as a bridge between individual business units and the IT function, point out previously unidentified risks, and recommend controls for enhancing outcomes. Whether IT projects are developed in house or are co-sourced with third-party providers, they are filled with challenges that must be considered carefully to ensure success.
Robbie holds the following international qualifications: The concept of control and risk in information systems.
Establish and maintain project management standards. | Control Result | Unified Compliance
Security in the cloud. This Control directly supports the implied Control s: Information security regulation and procedures. The Institute of internal Auditors Philippines, Inc. Please enable scripts and reload this page. Typical information security risks. A glimpse of Change Management. She has helped a large commercial bank and software development houses to be CMMI compliant.
The methodology should cover, at a minimum, allocation of responsibilities,… 4. This is a past event. Continuity of IT services.
You may be trying projecst access this site from a secured browser on the server. Early involvement by internal auditors can help ensure positive results and the accompanying benefits.
Basic concepts of risk management.