E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBMWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Research Abstract
E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
by IBM

> View this now

Published on: October 25, 2010
Type of content: EGUIDE
Format: Unknown
Length: 12 pages
Price: FREE

Overview:

Risk-based auditing is a broad topic, one that can be applied to many areas such as finance and information technology (IT). This e-guide focuses on risk-based auditing from an enterprise IT perspective. It covers the requirements for a risk-based audit and the steps necessary before, during and after an audit. Additionally, it discusses risk mitigation methods, and provides analysis for selecting controls and measuring control effectiveness. This e-guide offers a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.

> View Company Report
> View all content by this company
> Return to Search Results


         
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts