29 Sep 2009 11:00 am Presenting Shreeraj Shah; Blueinfy Solutions, Founder and Director
Enterprise application source code, independent of languages and platforms, is a major source of vulnerabilities.
29 Sep 2009 12:00 pm Presenting Michael Juergens; Deloitte & Touche LLP, Principal
Compliance requirements and resource constraints have focussed IT Audit procedures on the bare essentials of IT controls.
Presenting Martin Holzke, Director & Author, SoftQualm
Even more businesses get involved in on or other form of auditing, whether its finance(Sarbanes-Oxley, SAS70 etc.) or quality (ISO 9000, Six Sigma etc.)related to mention only those two areas . . .
Presenting: Jason Keogh, CTO and Founder of iQuate
Traditional IT inventory and audit packages are invaluable for analyzing risk across the IT estate. In effect they widen the audit universe . . .