Inside the Briefcase

How to Best Utilise Analytics in all its Forms

How to Best Utilise Analytics in all its Forms

Analytics is one of the most indispensable tools any...

2016 APM Reference Guide: Application Performance Monitoring

2016 APM Reference Guide: Application Performance Monitoring

IT Briefcase Analyst Report
This product guide allows you to...

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

with Mike Martin, nfrastructure
In this interview, Mike Martin,...

Unleash the Power of Global Content

Unleash the Power of Global Content

globeYour business depends on pushing accurate and dynamic content...

Clicking Away Your Right to Privacy

Clicking Away Your Right to Privacy

Before using any standard Internet service provider for e-mail...

The Growing Demand for IT Security Auditing

March 30, 2011 No Comments

Risk = Threats × Vulnerabilities × Impact

Security officers, risk management professionals and auditors must rely on the effectiveness of IT security. Security-related controls form a large part of the general controls structure, enabling organizations to rely on automated controls in applications such as financial reporting systems. Moreover, IT auditors and compliance professionals are often responsible for performing security audits in order to identify policy and regulatory compliance issues (e.g., Sarbanes-Oxley, Basel II Accord) and unacceptable risks.

This white paper describes the drivers for better IT security auditing, the problems with current approaches and how to automate IT security audits.

Download White Paper

Featured White Papers, SECURITY

Leave a Reply

(required)

(required)


ADVERTISEMENT

AnDevCon


American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange