Information Technology (IT) is a critical enabler of business. Assuring an enterprise’s governance, including risk management and control processes, requires auditors to understand the role of IT within their organizations and to develop adequate knowledge and skills to audit information technology (IT) systems as the line separating “IT,” and “non-IT” audits are beginning to disappear, except in the very technical IT domains.
This course is designed to give non-IT auditors and beginning Information security professionals an overview of the various considerations and aides in audit planning to gain a greater understanding of how to evaluate defined audit areas.
WHY SHOULD YOU ATTEND?
This webinar will assist those without technology experience in their pursuit of designing and executing audits which assess information security components. It is specially designed to meet the basic IT audit training needs of financial and operational auditors who assess IT risks, governance, management, and controls during their audits. The objective of this training is to provide the basic knowledge for non-IT auditors to allow them to perform a basic IT audit during a financial or an operational audit.
This course will also benefit the IT-auditors by enhancing their general and application controls understanding. During this webinar, you will acquire baseline knowledge for IT general and application control concepts and skills and their importance and relationship in your business processes. You will also learn the fundamentals of issues concerning IT controls, and the scope of addressable IT risks in today’s business environment.
AREA COVERED
- Information system (IS) audit concepts, risks, and concerns in the IT environment
- Globally recognized control frameworks for the audit of IT.
- Basics of how to perform an IT audit
- Auditing IT Governance
- Auditing IS acquisitions, developments, and implementations
- Auditing Business Continuity and Disaster Recovery
- Available IT/IS Audit tools
LEARNING OBJECTIVES
- Understand audit mandates, mission, objectives, and approaches to examining systems and IT infrastructure
- Understand the risks and audit concerns in the IT environment
- Identify globally recognized control frameworks for an audit of IT
- Acquire baseline conceptual knowledge of general IT controls and application IT controls
- Examine the role of IT governance and the connection to IT auditing
- Describe risk through effective IT audit risk profiling and management
- Learn the basics of how to perform an IT audit
- When to apply some basic IT audit tools and techniques
WHO WILL BENEFIT?
Business Services
Financial
Government
Insurance
Retail
This webinar will assist those without technology experience in their pursuit of designing and executing audits which assess information security components. It is specially designed to meet the basic IT audit training needs of financial and operational auditors who assess IT risks, governance, management, and controls during their audits. The objective of this training is to provide the basic knowledge for non-IT auditors to allow them to perform a basic IT audit during a financial or an operational audit.
This course will also benefit the IT-auditors by enhancing their general and application controls understanding. During this webinar, you will acquire baseline knowledge for IT general and application control concepts and skills and their importance and relationship in your business processes. You will also learn the fundamentals of issues concerning IT controls, and the scope of addressable IT risks in today’s business environment.
- Information system (IS) audit concepts, risks, and concerns in the IT environment
- Globally recognized control frameworks for the audit of IT.
- Basics of how to perform an IT audit
- Auditing IT Governance
- Auditing IS acquisitions, developments, and implementations
- Auditing Business Continuity and Disaster Recovery
- Available IT/IS Audit tools
- Understand audit mandates, mission, objectives, and approaches to examining systems and IT infrastructure
- Understand the risks and audit concerns in the IT environment
- Identify globally recognized control frameworks for an audit of IT
- Acquire baseline conceptual knowledge of general IT controls and application IT controls
- Examine the role of IT governance and the connection to IT auditing
- Describe risk through effective IT audit risk profiling and management
- Learn the basics of how to perform an IT audit
- When to apply some basic IT audit tools and techniques
Business Services
Financial
Government
Insurance
Retail
Speaker Profile
Dr. Robert E. Davis
Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate — after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the …
Upcoming Webinars
Treating Employees Like Adults: Discipline versus Empowerme…
7 Ways To Beat Burnout: Without Quitting Your Job
How to Write Procedures to Avoid Human Errors
Ethical Terminations: Navigating Employee Exits with Legal …
Understanding EBITDA – Definition, Formula & Calculation
Handbook Overhaul 2026: Compliance, OBBB Act & Beyond
FDA Proposes Framework to Advance Credibility of AI Models
Project Management for Non-Project Managers - Scheduling yo…
Data Integrity and Privacy: Compliance with 21 CFR Part 11,…
4-Hour Virtual Seminar on Hidden Secrets of Selling & Marke…
Validation Statistics for Non-Statisticians
Work Shouldn’t Feel Like A Soap Opera: Less Drama. More Foc…
Offboarding with Care: Conducting Legal & Ethical Employee …
The Alphabet Soup: When the FMLA, ADA, COBRA, and Workers' …
2-Hour Virtual Seminar on How to Conduct an Internal Harass…
Managing Toxic & Other Employees Who have Attitude Issues
Payments Fraud Detect & Prevent Check, ACH and P-Card Schem…
Reduce Stress in the Workplace: Effective Ways to Handle Co…
Language is Code - Intro to AI - Generative AI - ChatGPT an…
GROUPBY and PIVOTBY functions. Pivot table killers?
How to Prepare for a Regulatory Inspection: FDA, EMA, and N…
Excel - Reporting Simplified - Learn Pivot Tables from Scra…
The Power of Trust: Why It Should Matter to All Leaders & H…
California Meal and Rest Breaks: What You Don't Know Can Co…
How to Reduce Human Error in a GMP Manufacturing Floor
2-Hour Virtual Seminar on the 6 Most Common Problems in FDA…
Maximizing Productivity with ChatGPT: AI Solutions for HR, …
Excel - Pivot Tables - The Key To Modern Data Analysis and …
Re-imagine Finance & Accounting Made Simple. Three Webinars…
Form W-9 Compliance to Avoid Penalties: TIN Verification, B…
21 CFR Part 11 - Compliance for Electronic Records and Sign…
New EEOC Report: Workplace Harassment Prevention Not Workin…
Transforming Change and Conflict into Diverse-Inclusive-Col…
ChatGPT and Project Management: Leveraging AI for Project M…
Excel Power Skills: Master Functions, Formulas, and Macros …
Construction Lending And Real Credit Administration: Evalua…
Develop People Intelligence: Is Your Communication Style as…