Opportunities to Integrate Technology Into the Classroom. Presented by:

Size: px
Start display at page:

Download "Opportunities to Integrate Technology Into the Classroom. Presented by:"

Transcription

1 Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System

2 Discussion Topics Internal Audit Textbook Update First Internal Audit Class and Technology Approach to IT Audit Class Data Analytics Cybersecurity Program Questions 2

3 Internal Auditing: Assurance & Advisory Services, Fourth Edition

4 Revision History First Edition July 2007 Second Edition October 2009 Third Edition April 2013 Fourth Edition April 2017

5 Textbook Chapters Chapter 1: Introduction to Internal Auditing Chapter 2: The International Professional Practices Framework Chapter 3: Governance Chapter 4: Risk Management Chapter 5: Business Processes and Risk Chapter 6: Internal Control Chapter 7: Information Technology Risks and Controls Chapter 8: Risk of Fraud and Illegal Acts Chapter 9: Managing the Internal Audit Function Chapter 10: Audit Evidence & Workpapers Chapter 11: Data Analytics and Audit Sampling Chapter 12: Introduction to the Engagement Process Chapter 13: Conducting the Assurance Engagement Chapter 14: Communicating Assurance Engagement Outcomes Chapter 15: The Consulting Engagement Download the Table of Contents Below IA 4th Edition TOC.pdf

6 Case Studies Case Study 1: Auditing Entity-wide Controls Case Study 2: Auditing the Compliance and Ethics Program Case Study 3: Performing a Blended Consulting Engagement

7 Textbook Product Integration Check out the resources here: ACL Idea KnowledgeLeader TeamMate +

8 Significant Updates-3 rd Edition Integration of TeamMate and TeamMate Case Studies Addition of Value Proposition COSO Internal Control 2013 Updates to Standards, Implementation Guides, and Practice Guides(19 GTAGs) Inclusion of 3 Lines of Defense New material on Risk Management New technologies(i.e., cloud computing, smartphones) Expansion on Audit Management including combined assurance

9 Internal Auditing: Assurance & Advisory Services, 4th Edition What s new in the 4th Edition? TeamMate + and TeamMate Analytics an award-winning audit management system, has been integrated throughout the applicable textbook chapters. Specific case studies have been developed and are embedded at the end of chapter material to introduce the ways that TeamMate + can be used to streamline internal audit processes. Streamlined for student online access. Introduction of the KnowledgeLeader with case studies throughout the text. Access available to all faculty and students. Expanded instructor materials with 100 sample multiple choice questions, sample exam, along with expanded PowerPoint slides. Published by The Internal Audit Foundation Instructors interested in ordering a desk copy may contact The IIA Bookstore, powered by the Internal Audit Foundation, by at iiatextbook@theiia.org. Requests are limited to one per instructor and two per institution.

10 Significant Updates 4th Edition IPPF updates including Standards Internal Audit New Mission Statement Expansion of COSO Framework 2013 New Fraud Risk Management Guide Current Technology including Cybersecurity focus Data analytics added to Audit Sampling Chapter Integration of Protiviti KnowledgeLeader throughout TeamMate Hosting streamlined process Online distribution of material versus CD Expanded instructor material

11 for Universities Internal Auditing: Assurance & Consulting Services, Fourth Edition with TeamMate

12 Polling Question #2 Are you using TeamMate+ in the Internal Audit course this semester? Do you plan on using TeamMate+ sometime in the future?

13 How To Order The Textbook Instructors interested in ordering a desk copy may download and submit the Textbook 4th Edition Desk Copy Request Form. Requests are limited to one per instructor and two per institution. ISBN-13: For further information and Access to Instructor Material, contact iiatextbook@theiia.org

14 Internal Audit Class and Technology Options How much do you have time for? Chapter on IT Audit Chapter 7 Chapter on Data Analytics Chapter 11 (Focus on Audit Data Analytics Strategies) TeamMate Integration Hands on Technology (IDEA, ACL, TeamMate Analytics)

15 On to Technology.

16 Level of IT Understanding Business Auditors IT Auditors

17 What to call the a separate IT Audit class? Computer Audit Information System Audit Information Technology Audit Information Technology Audit and Risk Management Computer Audit and System Security: Compliance and Advisory Perspective 17

18 Course Objectives Prepare students to have a meaningful career as an IT Auditor: Technical Knowledge Analytical Ability Communication Skills Interpersonal Skills Pass professional certification exams CISA exams, CPA, and CIA.

19 What does a University IT Audit and Risk Management Course Objectives look like? 1. Be able to identify key information technology risks and how to mitigate those risks. 2. Be able to develop a control checklist and key audit steps related to technology risks. 3. Be able to distinguish key user technology risks and controls. 4. Be able identify the key content areas and have knowledge of all areas covered by the Certified Information Systems Audit (CISA) exam. 5. Identify sources for research of technology risks and apply those techniques to an overall research paper. 6. Learn those areas of technology risks that are currently of most concern to the IIA, AICPA, and ISACA. 7. Be able to distinguish and evaluate key application controls along with auditing of application controls. 8. Identify and evaluate risks in an e-business environment. 9. Understand how to adapt audit coverage to areas of advanced and emerging technologies. 19

20 First Day of Class Demystifying IT Audit Profile of class Certified Information Systems Auditor(CISA) possibility Encourage local ISACA participation 20

21 Definition of Information Technology Audit An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. 21

22 Some Reasonable Objectives for All Auditors Understand how technology fits into the overall business processes and its impact. Describe key risks and control techniques introduced by technology. Articulate the relationship between business transaction processing risks introduced by information technology risks. Find and interpret the leading sources of information related to technology control frameworks. Determine the significant technology issues to be considered as part of the review of a business unit. Integrate application controls as part of business unit audits. Understand the emerging technology risk issues.

23 Technology and Audit Infrastructure Audit Integrated Audit Use of Technology as Tool Audit Automation Data Analytics 23

24 Big Three Technology Risk Categories Information Security Business Continuity Change Management 24

25 Sample Syllabus

26 Chapter 7: Information Technology Risks and Controls 17 GTAGs published GTAG: IT Controls (Published in Mar 2005) 2 nd EDITION MARCH 2012 GTAG: Change and Patch Management Controls (Published in June 2005) 2 nd EDITION MARCH 2012 GTAG: Continuous Auditing (Published in Oct 2005) Update Coming Soon GTAG: Management of IT Auditing (Published in Mar 2006) 2 nd EDITION January 2013 GTAG: Information Technology Outsourcing (Published in Mar 2007) GTAG: Auditing Application Controls (Published in July 2007) 26

27 Chapter 7: Information Technology Risks and Controls GTAG: Identity and Access Management (Published in July 2007) GTAG: Auditing User Developed Applications (Published in June 2010) GTAG: Developing the IT Audit Plan (Published in July 2008) 17 GTAGs published GTAG: Auditing IT Projects (Published in March 2009) GTAG: Fraud Detection and Prevention in an Automated World (Published in December 2009) 27

28 Chapter 7: Information Technology Risks and Controls GTAG: Information Security Governance (Published in July 2010) 17 GTAGS published GTAG: Auditing Smart Devices (August 2016) GTAG: Data Analysis Technologies (Published in August 2011) GTAG: Assessing Cybersecurity Risk (September 2016) GTAG: Auditing IT Governance (Published in July 2012) GTAG: Understanding and Auditing Big Data (May 2017) 28

29 What Every Business Auditor Should Understand Related to IT Controls Global Technology Auditing Guide 1-2 nd Edition 29

30 Model IT Controls Curriculum IIA The IIA s Global Model Internal Audit Curriculum IT Auditing course Integrated Schools recognized as part of IAEP ISACA Model Curriculum Center/Academia/Pages/Programs-Aligned- with-model-curriculum-for-is-audit-and- Control.aspx

31 ISACA - Cobit 5-Another Approach 31

32 Example of Case Studies Exploring technology risk and IT audit Business tied to technology risk Social Media Experiential Learning

33 Certified Information Systems Auditor (CISA) Exam One part exam Exam three testing windows Integrate topics into class Provide access to local CISA review if available Improves student career potential immediately 33

34 Next Steps If you are teaching an IT Audit and Risk Management courses Great! Take advantage of various case studies Utilize resources available from the IIA and ISACA Cross list course Accounting and MIS Become a program recognized by ISACA 34

35 Use Of Technology As A Tool 35

36 A couple of Different Approach s to Audit Analytics - Integrate into Courses - Internal Audit/Operational Audit Course - Financial Audit Class - IT Audit Course - Other Courses - Separate Course in Audit Analytics - Course or Program in Data Analytics in MIS Program 36

37 Sample Course Syllabus

38 Cybersecurity Certificate Program Developed to meet the increasing need of risk management and technical personnel in the area of cybersecurity Joint program with business school and computer science engineering Program at the graduate level Individuals receive Certificate in Cybersecurity systems (CCSS) All students would take this core Cybersecurity Fundamentals course

39 Cyber Security Tracks Computer Science Track Cyber Security with Computer Science Emphasis Choose three (3) courses from: Information Security (CS 6324) Network Security (CS 6349) Data/App Security (CS 6348) One approved CS Elective in Cyber Security Systems Engineering Track Cyber Security with Systems Engineering Emphasis Choose three (3) courses from: Systems Engineering (SYSM 6301) CS 6324 or MIS 6330 One approved Cyber Security course from CS, IA, or IM track Students take a total of four courses (12 credit hours) consisting of one common fundamentals course and three other courses in one of four specified Tracks Certificate in Cyber Security Systems Cyber Security Fundamentals (course taken by all students) Remaining courses taken within a selected Track Track #1: Computer Science (CS) Track #2: Systems Engineering (SYSE) Track #3: Internal Audit (IA) Track #4: Information Management (IM) Internal Audit Track Cyber Security with Internal Audit Emphasis Take the following courses: IT Security (MIS 6330) Internal Audit (ACCT 6380) IT Audit & Risk Management (ACCT 6336) Information Management Track Cyber Security with Information Management Emphasis Take the following courses: IT Security (MIS 6330) Cloud Computing (MIS 6363) IT Audit & Risk Management (ACCT 6336)

40 Contact Information Mark Salamasick Executive Director of Audit The University of Texas System (512)

41

Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005

Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005 Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005 Instructor: Mark Salamasick, CIA, CISA, CSP Course Number: AIM 6380 Semester Hours: 3 Location: SOM

More information

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background

More information

Learning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019

Learning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019 Learning with the IIA Refreshing the profession: The New Internal Auditor Jan Olivier 6 February 2019 Contents title Qualifications framework CIA syllabus update Learning support Qualifications framework

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

CCSA, CFSA, CGAP Transition FAQs

CCSA, CFSA, CGAP Transition FAQs CCSA, CFSA, CGAP Transition FAQs July 2018 Frequently Asked Questions (FAQ) Q. How is the Certified Government Auditing Professional (CGAP) certification changing? A. The CGAP certification will be repositioned

More information

The CIA Challenge Exam. August 2018

The CIA Challenge Exam. August 2018 The CIA Challenge Exam August 2018 The IIA is committed to providing a clearly defined, professionally relevant suite of global certifications to support internal auditors as they progress through their

More information

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation

More information

Major Program Selection Information. Information Systems An enriching path of study and career

Major Program Selection Information. Information Systems An enriching path of study and career Major Program Selection Information Information Systems An enriching path of study and career BBA in Information Systems BBA-IS Our IS Alumni Chris Kam BBA(IS) Class of 2007 Graduate, HKUST Senior Manager,

More information

INCREASE YOUR CHANCES OF PASSING THE CIA EXAM

INCREASE YOUR CHANCES OF PASSING THE CIA EXAM INCREASE YOUR CHANCES OF PASSING THE CIA EXAM Sherri Lee Manager, Global Certifications, The IIA Daniel Lebel, CPA, CMA, CIA, CCSA, CFSA, CGAP, CRMA Chief Audit Executive, University of Quebec in Montreal

More information

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee

More information

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2014-2015 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of October 26, 2013 Computing

More information

MIS 5201 IT Audit Process Syllabus. Spring :30 pm 8:30 pm, Every Monday starting 1/22/2017 (Ref. to Schedule Section below for details)

MIS 5201 IT Audit Process Syllabus. Spring :30 pm 8:30 pm, Every Monday starting 1/22/2017 (Ref. to Schedule Section below for details) MIS 5201 IT Audit Process Syllabus Spring 2018 About the Instructor: Liang Yao (Liang.Yao@temple.edu) http://community.mis.temple.edu/lyao Phone: 856-905-4158 Office hours: Online or by appointment Class

More information

COPYRIGHTED MATERIAL. Index

COPYRIGHTED MATERIAL.   Index Index 2014 revised COSO framework. See COSO internal control framework Association of Certified Fraud Examiners (ACFE), 666 Administrative files workpaper document organization, 402 AICPA fraud standards

More information

Major Program Selection Information. Information Systems An enriching path of study and career

Major Program Selection Information. Information Systems An enriching path of study and career Major Program Selection Information Information Systems An enriching path of study and career BBA in Information Systems BBA-IS Our IS Alumni Benjamin Huber BBA(IS) Class of 2016 Graduate, HKUST Security

More information

Exploring Emerging Cyber Attest Requirements

Exploring Emerging Cyber Attest Requirements Exploring Emerging Cyber Attest Requirements With a focus on SOC for Cybersecurity ( Cyber Attest ) Introductions and Overview Audrey Katcher Partner, RubinBrown LLP AICPA volunteer: AICPA SOC2 Guide Working

More information

2018 CALENDAR OF ACTIVITIES

2018 CALENDAR OF ACTIVITIES 2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals

More information

CISA EXAM PREPARATION - Weekend Program

CISA EXAM PREPARATION - Weekend Program CISA EXAM PREPARATION - Weekend Program THE CISA QUALIFICATION: CERTIFICATION PREPARATION COURSE SYLLABUS PT. RIALACHAS TATHYA PRAYUKTI Menara Palma 12th Floor Jalan HR Rasuna Said Blok X2 Kav 6 Jakarta,

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Memphis Chapter. President s Message. This annual event is designed to provide students with a Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students

More information

Auditing and assurance

Auditing and assurance Auditing and assurance Higher School of Economics, ICEF Lecturer: Anna Pirozhkova Seminars: Tatiana Shurchkova Contacts +7 (916) 468 33 99 (Anna), ann.pirozhkova@gmail.com Target audience 4th Year students.

More information

Accounting Major (Last Revised 03/2019)

Accounting Major (Last Revised 03/2019) Accounting Major (Last Revised 03/2019) Required Business Core (39 hours) Credit ECON 1041 Principles of Macroeconomics ECON 1051 Principles of Microeconomics (ECON 1041) ECON 1011 Statistics for Business

More information

RISK MANAGEMENT Education and Certification

RISK MANAGEMENT Education and Certification RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities

More information

Exam Requirements v4.1

Exam Requirements v4.1 COBIT Foundation Exam Exam Requirements v4.1 The purpose of this document is to provide information to those interested in participating in the COBIT Foundation Exam. The document provides information

More information

Accounting Major (Last Revised 2/2018)

Accounting Major (Last Revised 2/2018) Accounting Major (Last Revised 2/2018) Required Business Core (39 hours) Credit ECON 1041 Principles of Macroeconomics ECON 1051 Principles of Microeconomics (ECON 1041) ECON 1011 Statistics for Business

More information

Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET

Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET 1 st National Meeting on Improving Education and Training For Chinese Nuclear Power Industry Personnel

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

We would like to announce to you a number of upcoming changes to the Certified Internal Auditor Exam:

We would like to announce to you a number of upcoming changes to the Certified Internal Auditor Exam: Dear Institute Leaders, We would like to announce to you a number of upcoming changes to the Certified Internal Auditor Exam: 1. As the result of findings from a Job Analysis Study (JAS) for the Certified

More information

How to Become a CMA (Certified Management Accountant) May 10, 2017

How to Become a CMA (Certified Management Accountant) May 10, 2017 How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements

More information

Certification. What: Who: Where:

Certification. What: Who: Where: Certification What: Certification is a process by which the Wisconsin Technical College System Office evaluates the occupational, academic, and teaching experience of district employees to determine his/her

More information

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 Jeff Hemphill Partner and Central Region Leader, Risk Advisory Services Brian Kirkpatrick Managing Director, Risk Advisory

More information

ERO Compliance Enforcement Authority Staff Training

ERO Compliance Enforcement Authority Staff Training ERO Compliance Enforcement Authority Staff Training Vision Comprehensive ERO CEA staff training program that promotes high quality and consistency in the conduct of audits The methods to accomplish the

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

INTERNAL CONTROL, CORPORATE GOVERNANCE AND RISK MANAGEMENT

INTERNAL CONTROL, CORPORATE GOVERNANCE AND RISK MANAGEMENT The seminars included in the present 2018 Тraining and Еvent Catalogue are grouped into following thematic areas: AUDIT FUNDAMENTALS MANAGEMENT OF INTERNAL AUDIT ACTIVITIES INTERNAL CONTROL, CORPORATE

More information

Guide To Internal Auditing Iatf Store

Guide To Internal Auditing Iatf Store GUIDE TO INTERNAL AUDITING IATF 16949 STORE PDF - Are you looking for guide to internal auditing iatf 16949 store Books? Now, you will be happy that at this time guide to internal auditing iatf 16949 store

More information

Integrated Assurance Embracing The Three Lines of Defense

Integrated Assurance Embracing The Three Lines of Defense Integrated Assurance Embracing The Three Lines of Defense Stanley Y. Chang, Ph.D. CPA (Texas), CIA, CMA, CCSA, CGAP, CGFM, CRMA Chief Operating Officer, Marcum, Bernstein & Pinchuk, LLP 1 Stanley Chang,

More information

ISACA Enterprise. Solutions and Resources

ISACA Enterprise. Solutions and Resources ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the

More information

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities Risk Based IT Auditing Master Class Unlocking your World to a Sea of Opportunities The Digital World Information Technology has developed into a nerve center of every organisation. It has become an intrinsic

More information

IS Audit and Assurance Guideline 2002 Organisational Independence

IS Audit and Assurance Guideline 2002 Organisational Independence IS Audit and Assurance Guideline 2002 Organisational Independence The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards

More information

Seminar Marketing Toolkit - Orlando

Seminar Marketing Toolkit - Orlando We are excited to have you as partner and providing training opportunities in your market. Please use the following marketing toolkit to market these opportunities and earn CAP points! Please contact bill.stewart@theiia.org

More information

HYDERABAD CHAPTER OF ISACA FIFTEENTH ANNUAL REPORT

HYDERABAD CHAPTER OF ISACA FIFTEENTH ANNUAL REPORT Dear Members, It is my privilege and honor to present the 15 th Annual Report of the Hyderabad for the year. 1. FINANCIAL RESULTS Rs.in lakhs Particulars 2013 14 Income 9.84 8.96 Surplus 2.31 2.56 Investments(Bank

More information

ISACA Cincinnati Chapter March Meeting

ISACA Cincinnati Chapter March Meeting ISACA Cincinnati Chapter March Meeting Recent and Proposed Changes to SOC Reports Impacting Service and User Organizations. March 3, 2015 Presenters: Sayontan Basu-Mallick Lori Johnson Agenda SOCR Overview

More information

ACCOUNTING. Iowa State University

ACCOUNTING. Iowa State University Iowa State University 2016-2017 1 ACCOUNTING For undergraduate curriculum in business, major in The curriculum in accounting is accredited by AACSB International, the Association to Advance Collegiate

More information

Syllabus Course: MIS Foundation of Information Systems Fall Semester, Credit Hours

Syllabus Course: MIS Foundation of Information Systems Fall Semester, Credit Hours Syllabus Course: MIS 2749-001 Foundation of Information Systems Fall Semester, 2015 3.0 Credit Hours Instructor: Cindricka L. Arrington Phone: 901-598-3093 E-mail: carrngtn@memphis.edu Office: Virtual

More information

Updated Frequently Asked Questions (FAQ) on Revision of ZICA Accountancy Programme

Updated Frequently Asked Questions (FAQ) on Revision of ZICA Accountancy Programme Updated Frequently Asked Questions (FAQ) on Revision of ZICA Accountancy Programme 1. Question: Why has Institute revised the curriculum of the ZiCA Accountancy programme? Answer: In order to comply with

More information

WHICH SOC REPORT IS RIGHT FOR YOUR CLIENT?

WHICH SOC REPORT IS RIGHT FOR YOUR CLIENT? CPAs & ADVISORS STRATEGIC ALLIANCE WEBINAR SERIES WHICH SOC REPORT IS RIGHT FOR YOUR CLIENT? June 20, 2017 Cindy Boyle TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when they are provided

More information

Tools & Techniques I: New Internal Auditor

Tools & Techniques I: New Internal Auditor About This Course Tools & Techniques I: New Internal Auditor Course Description Learn the basics of auditing at the new internal auditor level. This course provides an overview of the life cycle of an

More information

ISO LEAD AUDITOR TRAINING

ISO LEAD AUDITOR TRAINING FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 22301 LEAD AUDITOR TRAINING & CERTIFICATION (Business Continuity Management) Master the Audit of Business Continuity Management System (BCMS) based on ISO

More information

MIS5205 IT Service Delivery and Support Fall 2016

MIS5205 IT Service Delivery and Support Fall 2016 1 About the Instructor: MIS5205 IT Service Delivery and Support Fall 2016 Liang Yao (Liang.Yao@temple.edu) http://community.mis.temple.edu/lyao Phone: 856-905-4158 Office hours: Online or by appointment

More information

2018 IT Academy Program. December 2017

2018 IT Academy Program. December 2017 2018 IT Academy Program December 2017 2016 VMware Inc. All rights reserved. Agenda Program Improvements for 2018 Why the change? New learning path and course details Timeline Summary of changes What s

More information

Certified Information Systems Auditor Training and Certification

Certified Information Systems Auditor Training and Certification Certified Information Systems Auditor Training and Certification Course Description Certified Information Systems Auditor (CISA) Training designation is a globally recognized certification for IS audit

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

2016 Global Council. Celebrating the Past Inspiring the Future. globaliia.org

2016 Global Council. Celebrating the Past Inspiring the Future. globaliia.org 2016 Global Council Celebrating the Past Inspiring the Future 1996-2016 Global Forum - 1996-1998 - 2000-2002 Global Council - Annually since 2004 - Codified in the Bylaws - provide input into the strategic

More information

Cia Part 3 Study Guide Uscitp

Cia Part 3 Study Guide Uscitp We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with cia part 3 study guide

More information

CPA Exam and Licensure Information and FAQs

CPA Exam and Licensure Information and FAQs CPA Exam and Licensure Information and FAQs 1 CPA Exam and Licensure Information and FAQs July 2016 Dr. Gary Colbert, Director of Accounting Programs, University of Colorado Denver 1 Education and experience

More information

Tips to Successfully Passing the GRC Professional Certification Exam

Tips to Successfully Passing the GRC Professional Certification Exam Tips to Successfully Passing the GRC Professional Certification Exam Jason Lee Mefford (c) Mefford Multimedia LLC, All Rights Reserved Page 1 of 7 Tips to Successfully Passing the GRC Professional Certification

More information

ALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE

ALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE ALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE CHAPTER 30-X-4 EXAMINATIONS, QUALIFICATIONS OF CANDIDATES, APPLICATIONS, PASSING GRADES, CONDITIONED SUBJECTS, TRANSFER OF CREDITS, ISSUANCE

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

SSAE 18 & new SOC approach to compliance. Moderator Name: Patricio Garcia Managing Partner ControlCase Attestation Services

SSAE 18 & new SOC approach to compliance. Moderator Name: Patricio Garcia Managing Partner ControlCase Attestation Services SSAE 18 & new SOC approach to compliance Moderator Name: Patricio Garcia Managing Partner ControlCase Attestation Services Agenda 1. SSAE 18 overview 2. SOC 2 + 3. 2017 Trust Services Criteria SSAE 18

More information

Health Education Community Health Education

Health Education Community Health Education + Master of Science Program Health Education Community Health Education CECH 2014 Primary Faculty: Keith King, PhD, MCHES 513-556-3859 keith.king@uc.edu I. Program Overview The Master of Science (MS) in

More information

Brink s Modern Internal Auditing. Eighth Edition

Brink s Modern Internal Auditing. Eighth Edition Brink s Modern Internal Auditing Eighth Edition The Wiley Corporate F&A series provides information, tools, and insights to corporate professionals responsible for issues affecting the profitability of

More information

COBIT 5 Foundation Certification Training Course - Brochure

COBIT 5 Foundation Certification Training Course - Brochure COBIT 5 Foundation Certification Training Course - Brochure The Next Level of IT Security Governance Course Name : COBIT 5 Foundation Version : INVL_Cobit5_BR_02_081_1.1 Course ID : ITSG-130 www.invensislearning.com

More information

Preparing for the CPA Exam October 24, 2017

Preparing for the CPA Exam October 24, 2017 Preparing for the CPA Exam October 24, 2017 Slides available on the Accounting Department Homepage Emily Carroll 16 (Deloitte Advisory Services) Michael Paiva 17 (EY Assurance Services) Marco Oriella 17

More information

Hong Kong Institute of Certified Public Accountants Practising Certificate ("PC") Business Assurance

Hong Kong Institute of Certified Public Accountants Practising Certificate (PC) Business Assurance Hong Kong Institute of Certified Public Accountants Practising Certificate ("PC") Business Assurance Examinable Auditing Standards December 2017 Session and June 2018 session This document contains the

More information

Become an IIA Exam Author!

Become an IIA Exam Author! Become an IIA Exam Author! Information Session May 28, 12.00-1.00pm What s in it for me? Become a part of exclusive global team of writers, experts in their field of Internal Audit and Risk Management,

More information

OF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011

OF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011 INTERNATIONAL FEDERATION OF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011 HISTORY OF THE IIA 1941 Founded in New York City 1944 First chapter outside the US chartered in Toronto 1948 First chapters outside

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help

More information

Course Syllabus MIS Foundation of Information Systems Spring Semester, Credit Hours

Course Syllabus MIS Foundation of Information Systems Spring Semester, Credit Hours Course Syllabus MIS 2749-503 Foundation of Information Systems Spring Semester, 2016 3.0 Credit Hours Instructor: E-mail: Office Hours: Dr. Mark Doran pmdoran@memphis.edu Office Hours by appointment. Course

More information

ITIL v3. Qualification & Certification scheme. itsmf International The IT Service Management Forum 1

ITIL v3. Qualification & Certification scheme. itsmf International The IT Service Management Forum 1 ITIL v3 Qualification & Certification scheme 1 ITIL v3 Certification scheme The ITIL v3 scheme Scope Approach Features of each new certification level Transition scheme Certification scheme structure 2

More information

Course Syllabus MIS Foundation of Information Systems Spring Semester, Credit Hours. (Last updated: 1/16/2016)

Course Syllabus MIS Foundation of Information Systems Spring Semester, Credit Hours. (Last updated: 1/16/2016) Course Syllabus MIS 2749-004 Foundation of Information Systems Spring Semester, 2016 3.0 Credit Hours (Last updated: 1/16/2016) Instructor: Dr. Wade Jackson, Associate Professor Phone1: 901-678-4550 E-mail:

More information

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours.

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours. Present 5th May - Chennai Internal auditing today: Beginning Auditor Tools and Techniques 6 CPE hours www.achromicpoint.com About the Seminar To become a successful auditor, a strong base of knowledge

More information

ALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE

ALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE ALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE CHAPTER 30-X-4 EXAMINATIONS, QUALIFICATIONS OF CANDIDATES, APPLICATIONS, PASSING GRADES, CONDITIONED SUBJECTS, TRANSFER OF CREDITS, ISSUANCE

More information

Lahore University of Management Sciences. ACCT 250 Auditing Spring Semester 2018

Lahore University of Management Sciences. ACCT 250 Auditing Spring Semester 2018 Lahore University of Management Sciences ACCT 250 Auditing Spring Semester 2018 Instructor Syed Zain ul Abideen / Waqar Ali Room No. SDSB room no. 442, 422 Office Hours TBA Email syed.zain@lums.edu.pk;

More information

Course Syllabus MIS Foundation of Information Systems Spring Semester, Credit Hours

Course Syllabus MIS Foundation of Information Systems Spring Semester, Credit Hours Course Syllabus MIS 2749-007 Foundation of Information Systems Spring Semester, 2016 3.0 Credit Hours Instructor: Vicki R. Robertson E-mail: vrobrtsn@memphis.edu Course Overview This course is an introduction

More information

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway. Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY

STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY INFORMATION TECHNOLOGY GENERAL CONTROLS INFORMATION SYSTEMS AUDIT JANUARY 2016 EXECUTIVE SUMMARY PURPOSE

More information

Janice Sipior, Villanova Joe Valacich, Washington State. Panelists:

Janice Sipior, Villanova Joe Valacich, Washington State. Panelists: Heikki Topi Topi, Bentley Janice Sipior, Villanova Joe Valacich, Washington State Ryan T T. Wright Wright, Washington State Panelists: University University University University Introductions Status update

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

Professional Certifications

Professional Certifications ASSOCIATION OF GOVERNMENT ACCOUNTANTS REGIONAL PDT Professional Certifications Becker Continuing Professional Education 1 Becker Continuing Professional Education Lillian S. Grose, CPA, MBA Assistant Professor

More information

Maintenance of Competency; Continuing Professional Education (CPE)

Maintenance of Competency; Continuing Professional Education (CPE) FULL TEXT of CPE rules adopted 09/20/2015 Chapter 13. Maintenance of Competency; Continuing Professional Education (CPE) 1301. Basic Requirements A. Each certificate holder shall participate in a minimum

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

FOUNDATIONS OF INFORMATION SYSTEMS MIS 2749 COURSE SYLLABUS Fall, Course Title and Description

FOUNDATIONS OF INFORMATION SYSTEMS MIS 2749 COURSE SYLLABUS Fall, Course Title and Description FOUNDATIONS OF INFORMATION SYSTEMS MIS 2749 COURSE SYLLABUS Fall, 2013 Instructor s Name: Vicki Robertson E-mail: vrobrtsn@memphis.edu Course Title and Description Foundations of Information Systems. (3

More information

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY Information Technology Security Course Syllabus Spring 2018 ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L

More information

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions DISCLAIMER: The contents of this publication do not necessarily reflect the position or opinion of the American

More information

Volume 2014, Number 4. Volunteers Needed!

Volume 2014, Number 4. Volunteers Needed! Volume 2014, Number 4 Volunteers Needed! Volunteering for NJ ISACA is a great opportunity to expand your professional contacts and your IT knowledge base. NJ ISACA needs talented professionals like you

More information

Accounting Ethics and Auditing

Accounting Ethics and Auditing Accounting Ethics and Auditing Only three percent of adults have career-boosting professional certifications you can be one of them. And you can earn while meeting Colorado CPA licensure requirements including

More information

CPA (U) COURSE 2014/2015

CPA (U) COURSE 2014/2015 1 CPA (U) COURSE 2014/2015 Certified Public Accountants of Uganda [(CPA(U)] Course The CPA (U) Course is designed to produce competent professional accountants, capable of making a positive contribution

More information

Taking the Mystery Out of Counting CPE. Opening Remarks

Taking the Mystery Out of Counting CPE. Opening Remarks Taking the Mystery Out of Counting CPE Kristen Kociolek Assistant Director U.S. Government Accountability Office Harriet Richardson City Auditor Palo Alto, CA Opening Remarks MODERATOR R. Kinney Poynter

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

CPA National Accreditation Standards for the ACAF Program and Applied Courses. Effective: May 19, 2017

CPA National Accreditation Standards for the ACAF Program and Applied Courses. Effective: May 19, 2017 CPA National Accreditation Standards for the ACAF Program and Applied Courses Effective: May 19, 2017 CPA Canada Advanced Certificate in Accounting and Finance (ACAF) 2017 Chartered Professional Accountants

More information

ACCOUNTING (ACCT) Kent State University Catalog

ACCOUNTING (ACCT) Kent State University Catalog Kent State University Catalog 2018-2019 1 ACCOUNTING (ACCT) ACCT 23020 INTRODUCTION TO FINANCIAL ACCOUNTING 3 Credit (Equivalent to ACTT 11000) Introduction to the basic concepts and standards underlying

More information

I am pleased to confirm that the following exemptions will be granted to your Bachelor of Accounting (Hons) graduates.

I am pleased to confirm that the following exemptions will be granted to your Bachelor of Accounting (Hons) graduates. 15 February 2016 Dr. Yu Sing Ong PTD64888,15KM, Jalan Skudai P.O. Box 76 81300 Skudai Johor Malaysia Dear Dr Yu Advance with CIMA Bachelor of (Hons) Thank you for your programme submission on 22 January

More information

Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs

Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs Purpose This document contains the mandatory Continuing Professional Education (CPE) requirements

More information

BSc/MSci Professional Accounting in Business Programme Structure

BSc/MSci Professional Accounting in Business Programme Structure BSc/MSci Professional Accounting in Business Programme Structure BSc/MSci Professional Accounting in Business This programme is a gateway into the accountancy profession. It has two core aims: to enable

More information

HITRUST CSF: One Framework

HITRUST CSF: One Framework HITRUST CSF: One Framework Leveraging the HITRUST CSF to Support ISO, HIPAA, & NIST Implementation and Compliance, and SSAE 16 SOC Reporting Dr. Bryan Cline, CISSP-ISSEP, CISM, CISA, CCSFP, HCISPP Senior

More information

DoD Financial Management Certification Program

DoD Financial Management Certification Program DoD Management Certification Program DoD Office of Workforce Management March 2012 Agenda Background Key Goals Overall Approach DoD FM Enterprise-wide Competencies Overall Framework Course Hours to Meet

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

Continuing Professional Education Policy: Requirements for Certification and Qualification Programs. (formerly known as Administrative Directive #4)

Continuing Professional Education Policy: Requirements for Certification and Qualification Programs. (formerly known as Administrative Directive #4) Continuing Professional Education Policy: Requirements for Certification and Qualification Programs (formerly known as Administrative Directive #4) IIA Professional Certification Board November 2017 Contents

More information