Remove some-thoughts-on-auditing-identity-and-access-management
article thumbnail

Some Thoughts on Auditing Identity and Access Management

Internal Audit 360

T he Institute of Internal Auditors regularly publishes useful Global Technology Audit Guides (GTAGs), available to members on their website under Standards and Guidance. As part of that effort, the IIA recently published a second edition of its guide, Auditing Identity and Access Management. 2 Where’s the risk?

article thumbnail

Department of Labor Cybersecurity Program Best Practices

Audit Board

Through both audits and best practice guidance, the Department of Labor (DOL) is encouraging businesses that sponsor retirement plans to pay attention to managing cybersecurity risk. Reliable Third-Party Audit of Security Controls. Tools and strategies for implementing these cybersecurity guidelines.

article thumbnail

Anticipating a Scandal: Is AI a Ticking Time Bomb for Companies?

Internal Audit 360

The causes of a corporate scandal are also far too predictable: failures in corporate governance, poor risk management, compliance failures, unreliable intelligence, inadequate security, insufficient resilience, ineffective controls, and failures by assurance providers. But what if we could do a “pre-mortem” investigation?