REGISTER

Internal Auditing

oktatn default Download

At Okta, we run compliance differently. Most organizations place compliance under either the legal or finance team, who don’t work with their security team to ensure those controls are implemented effectively. At Okta, we use security to drive compliance.

RSAlogoNEW1 pdf Download (4.48 MB)

RSA Archer Maturity Models guide organizations through the journey from baseline risk management to optimized processes that balance opportunities and risks. View the Maturity Model Snapshot to discover the stages of maturing your audit management processes.

www.lumension.com

Taxes are certainly not fun, but there is something worse: an audit. Combine the two in a risk and compliance scenario and you have the onerous "audit tax," a figurative term used to describe the expenses a company incurs when deploying resources and manpower to satisfy the burgeoning set of internal and external compliance and audit mandates.

John Wiley and Sons Ltd, Nov 2008, Pages: 152

Internal Audit Activity's Role in Governance, Risk and Control

The Wiley CIA Exam Review Focus Notes are developed for each of the four parts of the Certified Internal Auditor (CIA) exam sponsored by the Institute of Internal Auditors (IIA). The purpose of the focus notes is to digest and assimilate the vast amounts of knowledge, skills, and abilities (KSAs) tested on the CIA exam in a clear, concise, easy-to-read, and easy-to-use format.

IDERAtn pdf Download (2.15 MB)

SQL Server provides robust capabilities to monitor itself and it can be easy to be overwhelmed with the choices presented through catalog/dynamic management views, extended events, server side traces (for older versions of SQL Server), or performance counters. This is true on the security side as well. In this whitepaper we’ll present the top five items you should be auditing on all of your SQL Servers, and how to do them. Keeping an eye on these items will help you verify database security and access in your environment.

John Wiley and Sons Ltd, April 2007, Pages: 96

Quick and easy implementation and maintenance guide for ongoing Sarbanes-Oxley compliance

For most companies, achieving compliance to the Sarbanes-Oxley Act (SOX) has proven to be more challenging, and more costly, than initially anticipated. In many cases, initial and second-year compliance efforts were found to have strained company resources, causing a shift of focus away from such areas as internal audit in order to meet SOX requirements.

Learn about the financial institution safeguards included in the Gramm-Leach-Bliley Act (GLBA) and how your organization can institute an orderly set of compliance steps using an automated configuration audit and control solution.

Print Management provides a breakthrough answer to today's top business challenge: reducing overhead without harming productivity. Jim Salzer of DocuAudit Intl. shows how Print Management allows you to control documentation expenses by outsourcing the management of your current print environment.

See how this integrated out-of-the-box help desk, asset management and Change Management solution can help solve many IT help desk problems with ease.

Learn how Tripwire can help you deploy a comprehensive configuration assessment and control solution that: a) reduces the time and resources required to verify compliance and prepare for audits; and b) maintains continuous compliance by allowing IT to immediately identify any exceptions and trigger remediation of configurations that do not conform to policy.

Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.

Software Compliancy issues are time consuming and are an expensive undertaking. See how easy Software Compliance can be with Numara® Track-It! ®. Software License Management is included with the Numara® Track-It! ® Audit license at no extra cost!

Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top