TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Ponencia ia + it
1.
2.
3. RELACION
GESTION AI
IA + TI
AUDITORIAS
CERTIFICACION
•REDES SOCIALES
•PROYECTOS
ORGANIZACIÓN
•LA NUBE
4.
5.
6. Date
GTAG 17: Auditing IT Governance
GTAG 16: Data Analysis Technologies
July
2012
August
2011
GTAG 15: Information Security Governance
June
2010
GTAG 14: Auditing User-developed Applications
June
2010
GTAG 13: Fraud Prevention and Detection in an Automated World
Decem
ber
2009
GTAG 12: Auditing IT Projects
March
2009
GTAG 11: Developing the IT Audit Plan
January
2009
GTAG 10: Business Continuity Management
January
2009
GTAG 9: Identity and Access Management
January
2009
GTAG 8: Auditing Application Controls
January
2009
GTAG 7: Information Technology Outsourcing, 2nd Edition
June
2012
GTAG 6: Managing and Auditing IT Vulnerabilities
PLEASE NOTE: GTAG 6 has been deleted from the IPPF. Some of its
concepts are combined with the 2nd edition of GTAG 4.
DELETE
D
January
2013
GTAG 5: Managing and Auditing Privacy Risks
PLEASE NOTE: GTAG 5 has been replaced by the Auditing Privacy Risks, 2nd
Edition Practice Guide.
REPLAC
ED
July
2012
GTAG 4: Management of IT Auditing, 2nd Edition
January
2013
GTAG 3: Continuous Auditing: Implications for Assurance, Monitoring, and
Risk Assessment
Update
Coming
Soon
GTAG 2: Change and Patch Management Controls: Critical for
Organizational Success, 2nd Edition
GTAG 1: Information Technology Risk
March
2012
7. July 2012
August 2011
June 2010
June 2010
GTAG 17: Auditing IT Governance
GTAG 16: Data Analysis Technologies
GTAG 15: Information Security Governance
GTAG 14: Auditing User-developed Applications
Date
GTAG 13: Fraud Prevention and Detection in an Automated World
July
2012
GTAG 12: Auditing IT Projects
August
2011
GTAG 11: Developing the IT Audit Plan
June
2010
GTAG 10: Business Continuity Management
June
2010
8. IT AUDIT
•
•
Topics Covered Will Include:
• Risk Frameworks: Navigating the Alphabet Soup
• What Information Security Expects and Needs from Audit
• Auditing Cloud Computing and Outsourced Operations
• Conducting a Virtualization Security Assessment
• Measuring GRC Using Free Tools
• Top 10 Windows Security Controls and How to Correctly Collect Them
• Big Data: Access and Privacy Risks in the Hadoop Computing Environment
• Conducting an IT Fraud Risk Assessment
• Insider Threats: Lessons from the Trenches
• Leveraging GRC Technology as an Enterprise Solution
• How to Maintain Controls in a BYOD Environment
• Auditing IT Projects
Optional Workshops:
• Smart Device Threats
• How to Find Malware on a Network
• Security and Audit Considerations for Cloud-Based Services
• Combating Computer Fraud
• Managing the IT Audit Department
• Ethical Hacking DEMO
• Combating Computer Fraud