Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 47, 2013 - Issue 6
557
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

IT Auditing for Modern Technology Management

Pages 1-14 | Published online: 06 Jun 2013
 

Abstract

IT Audit, Security, Compliance, and Assurance professionals work in some of the most challenging areas of technology risk. And today's technologies put a different spin on IT auditing as new technology tools cross traditional boundaries and engender new risks. The Cloud, Social Computing, Mobile Computing, BYOD, Big Data, and Business Intelligence all call for the IT auditor to take an enterprise view of related risks and opportunities.

A company that thrives by being early to deliver new services via technology must regard technology controls as the enablers of those services. That means: Information security controls must no longer be classified as “overhead” but new and incremental costs must be included in the assessments of the costs and benefits for new technology initiatives. Auditors must assess the relationships between an enterprise and its customers, vendors, business associates, stakeholders, regulators, and even competitors. They must understand how new technologies fit into enterprise strategies and objectives, and ensure the new controls provide ongoing evidence that they function effectively, consistently, and continuously across the enterprise.

Notes

1. Stateless, http://whatis.techtarget.com/definition/stateless One description of Stateful and Stateless as applied in programming.

2. See: Erickson, T. (2013). Social computing: What is it and where did it come from?: Social Computing. In Soegaard, Mads and Dam, Rikke Friis (Eds.), The Encyclopedia of Human-Computer Interaction,2nd Ed. Aarhus, Denmark: The Interaction Design Foundation. Retrieved from http://www.interaction-design.org/encyclopedia/social_computing.html

3. SEC says social media OK for company announcements if investors are alerted. Retrieved fromhttp://www.sec.gov/news/press/2013/2013-51.htm?goback=%2Egde_95089_member_229600755,

4. The Institute of Internal Auditors, Inc. Retrieved from www.theiia.org/periodicals (Click on Tone at the Top).

10. See Securing mobile devices, a 2010 white paper. Retrieved from http://www.isaca.org/

11. See note 1.

12. American Society of Clinical Oncology, CancerLinQ—Building a transformation in cancer care. Retrieved from http://www.asco.org/institute-quality/cancerlinq

13. American Society of Clinical Oncology, ASCO completes prototype for CancerLinQ™, marking first demonstration of a “Learning Health System” to transform cancer care,” March 27, 2013. Retrieved from http://www.asco.org/press-center/asco-completes-prototype-cancerlinq%E2%84%A2-marking-first-demonstration-%E2%80%9Clearning-health

14. Kim, G., Behr, K., & Spafford, G. (2013). The Phoenix Project: A novel about IT, DevOps, and helping your business win.Portland, OR: IT Revolution Press, info@itrevolution,net.

15. International Standards for the Professional Practice of Internal Auditing, The Institute of Internal Auditors. Retrieved from www.theiia.org (click on Professional Guidance).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.