Control List Identified for IT Department Control List Identified for IT Department Reviewed by Unknown on 6:05 AM Rating: 5
Mitigating The Risk Of Web Applications Mitigating The Risk Of Web Applications Reviewed by Unknown on 3:47 PM Rating: 5
Top 20 Preventive Controls To Password Attack Top 20 Preventive Controls To Password Attack Reviewed by Unknown on 3:45 PM Rating: 5
Control List Identified for IT Department Control List Identified for IT Department Reviewed by Unknown on 8:57 PM Rating: 5
Tutorial 05 (ITRM) How can we manage vendor's pen test effectively? Tutorial 05 (ITRM) How can we manage vendor's pen test effectively? Reviewed by Unknown on 8:13 PM Rating: 5
Tutorial 06 (ITICM) Effective IT Technical Controls Tutorial 06 (ITICM) Effective IT Technical Controls Reviewed by Unknown on 8:10 PM Rating: 5
(ITAM) How to establish an IT Audit Kick-off Meeting effectively? (ITAM) How to establish an IT Audit Kick-off Meeting effectively? Reviewed by Unknown on 8:07 PM Rating: 5
Mitigation Plan To Securing Web Browser Mitigation Plan To Securing Web Browser Reviewed by Unknown on 8:02 PM Rating: 5
Why audit finding Why audit finding Reviewed by Unknown on 7:56 PM Rating: 5
(ITG) How to avoid the audit finding (ITG) How to avoid the audit finding Reviewed by Unknown on 6:00 PM Rating: 5
How to Identify and avoid software piracy How to Identify and avoid software piracy Reviewed by Unknown on 5:58 PM Rating: 5
Why audit finding Why audit finding Reviewed by Unknown on 8:31 PM Rating: 5
How to build risk management awareness culture effectively How to build risk management awareness culture effectively Reviewed by Unknown on 1:20 AM Rating: 5
Top 15 Root Causes of the year Top 15 Root Causes of the year Reviewed by Unknown on 5:33 PM Rating: 5
Mitigation Plan To Securing Web Browser Mitigation Plan To Securing Web Browser Reviewed by Unknown on 5:50 PM Rating: 5
How to Identify and avoid software priracy How to Identify and avoid software priracy Reviewed by Unknown on 4:43 PM Rating: 5
(ITRM) Common Network Security Risks And Controls (ITRM) Common Network Security Risks And Controls Reviewed by Unknown on 4:46 AM Rating: 5
(ITRM) Principle Risks of Smart Phone Devices (ITRM) Principle Risks of Smart Phone Devices Reviewed by Unknown on 9:01 AM Rating: 5
(ITCM) Principle of Business Continuity and Disaster Recovery Timeline (ITCM) Principle of Business Continuity and Disaster Recovery Timeline Reviewed by Unknown on 6:09 AM Rating: 5
(ITSM) SDLC Security Governance (ITSM) SDLC Security Governance Reviewed by Unknown on 2:07 AM Rating: 5
(ITSM) SDLC Security Governance (ITSM) SDLC Security Governance Reviewed by Unknown on 9:30 PM Rating: 5
(ITG) How to avoid the audit finding (ITG) How to avoid the audit finding Reviewed by Unknown on 6:18 AM Rating: 5
(ITAM) How to establish an IT Audit Kick-off Meeting effectively? (ITAM) How to establish an IT Audit Kick-off Meeting effectively? Reviewed by Unknown on 1:30 AM Rating: 5
Top 20 Critical Security Controls To Prevent Cyber Threats Top 20 Critical Security Controls To Prevent Cyber Threats Reviewed by Unknown on 2:59 PM Rating: 5
(ITSM) How to secure software design effectively (ITSM) How to secure software design effectively Reviewed by Unknown on 6:55 AM Rating: 5
(ITG) How to avoid the audit finding (ITG) How to avoid the audit finding Reviewed by Unknown on 1:25 AM Rating: 5
(ITRM) Common Network Security Risks And Controls (ITRM) Common Network Security Risks And Controls Reviewed by Unknown on 6:51 AM Rating: 5
(ITRM) Common Network Security Risks And Controls (ITRM) Common Network Security Risks And Controls Reviewed by Unknown on 6:37 AM Rating: 5
(ITG) Protection strategy on data loss prevention DLP program (ITG) Protection strategy on data loss prevention DLP program Reviewed by Unknown on 7:08 AM Rating: 5
(ITG) Protection strategy on data loss prevention DLP program (ITG) Protection strategy on data loss prevention DLP program Reviewed by Unknown on 7:20 AM Rating: 5
Tutorial (ITSM) How can we prevent the logical bomb attack Tutorial (ITSM) How can we prevent the logical bomb attack Reviewed by Unknown on 5:53 AM Rating: 5
ITSM - Understanding common types of software flaws and its mitigation plan ITSM - Understanding common types of software flaws and its mitigation plan Reviewed by Unknown on 9:03 PM Rating: 5
(ITAM) How to address the audit scope of enterprise mail service effecti... (ITAM) How to address the audit scope of enterprise mail service effecti... Reviewed by Unknown on 9:20 PM Rating: 5
Tutorial 02 - (ITAM) Document Gathering Prior Conducting an IS Audit Tutorial 02 - (ITAM) Document Gathering Prior Conducting an IS Audit Reviewed by Unknown on 4:03 PM Rating: 5
Tutorial 06 (ITICM) Effective IT Technical Controls Tutorial 06 (ITICM) Effective IT Technical Controls Reviewed by Unknown on 3:57 PM Rating: 5
ITICM - Common Lapses In ATM and CDM Administration ITICM - Common Lapses In ATM and CDM Administration Reviewed by Unknown on 11:19 PM Rating: 5
ITAM - Overall of IT Audit Process ITAM - Overall of IT Audit Process Reviewed by Unknown on 4:00 PM Rating: 5

Effective IT Technical Controls

Unknown 2:47 PM
This video will show you how can auditor utilise the effective technical controls to the auditees/ managements by providing best audit recom...Read More
Effective IT Technical Controls Effective IT Technical Controls Reviewed by Unknown on 2:47 PM Rating: 5
Tutorial (ITSM) How can we prevent the logical bomb attack Tutorial (ITSM) How can we prevent the logical bomb attack Reviewed by Unknown on 5:59 AM Rating: 5
Tutorial 05 (ITRM) How can we manage vendor's pen test effectively? Tutorial 05 (ITRM) How can we manage vendor's pen test effectively? Reviewed by Unknown on 3:16 PM Rating: 5
Tutorial 10 (ITAM) What kind of log files that auditor need to be reviewed Tutorial 10 (ITAM) What kind of log files that auditor need to be reviewed Reviewed by Unknown on 12:49 PM Rating: 5
Tutorial 01 (ITSM) How can penetration tester address the concering area... Tutorial 01 (ITSM) How can penetration tester address the concering area... Reviewed by Unknown on 12:47 PM Rating: 5
Tutorial 01 - (ITCRM) Various Plans of Contingency Procedures Tutorial 01 - (ITCRM) Various Plans of Contingency Procedures Reviewed by Unknown on 5:11 AM Rating: 5
Tutorial 02 (ITCRM) IT Contingency Structure Tutorial 02 (ITCRM) IT Contingency Structure Reviewed by Unknown on 4:46 AM Rating: 5
Tutorial 09 - (ITAM) How can develop an IT audit roadmap Tutorial 09 - (ITAM) How can develop an IT audit roadmap Reviewed by Unknown on 12:59 PM Rating: 5
Tutorial 01 (ITICM) Delegation Authority Register Form Tutorial 01 (ITICM) Delegation Authority Register Form Reviewed by Unknown on 4:38 AM Rating: 5
Tutorial 01 - (ITCRM) Various Plans of Contingency Procedures Tutorial 01 - (ITCRM) Various Plans of Contingency Procedures Reviewed by Unknown on 5:22 AM Rating: 5
Tutorial 08 - (ITRM) IT Controls Categorization Tutorial 08 - (ITRM) IT Controls Categorization Reviewed by Unknown on 2:34 PM Rating: 5
Tutorial 03 - (ITAM) How can IT auditor add values to the business Tutorial 03 - (ITAM) How can IT auditor add values to the business Reviewed by Unknown on 4:18 AM Rating: 5
Tutorial 04 - (ITAM) Process Risk Mapping Tutorial 04 - (ITAM) Process Risk Mapping Reviewed by Unknown on 4:12 AM Rating: 5
Tutorial 05 - (ITRM) Quantitative And Qualitative Risk Assessment Pro & ... Tutorial 05 - (ITRM) Quantitative And Qualitative Risk Assessment Pro & ... Reviewed by Unknown on 4:07 AM Rating: 5
Tutorial 07 - (ITSM) Security Categorization of Management and Support I... Tutorial 07 - (ITSM) Security Categorization of Management and Support I... Reviewed by Unknown on 4:05 AM Rating: 5
Tutorial 02 - (ITAM) Document Gathering Prior Conducting an IS Audit Tutorial 02 - (ITAM) Document Gathering Prior Conducting an IS Audit Reviewed by Unknown on 2:54 AM Rating: 5
Tutorial 01 - (ITAM) Audit Scoring Evaluation Tutorial 01 - (ITAM) Audit Scoring Evaluation Reviewed by Unknown on 2:54 AM Rating: 5
Tutorial 03 - (ITGOV) How to inspire or motivate risk management awarene... Tutorial 03 - (ITGOV) How to inspire or motivate risk management awarene... Reviewed by Unknown on 2:53 AM Rating: 5
Tutorial 01 - (ITGOV) IT Engineer Vs IT Auditor Mindset On Full HA Function Tutorial 01 - (ITGOV) IT Engineer Vs IT Auditor Mindset On Full HA Function Reviewed by Unknown on 2:53 AM Rating: 5
Tutorial 02 - (ITGOV) Level Vs Multi Layer of Defense Tutorial 02 - (ITGOV) Level Vs Multi Layer of Defense Reviewed by Unknown on 2:51 AM Rating: 5

Network Security Risks And Controls

Unknown 2:35 AM
Failure to perform the vendor risk assessment Risk: Impact to IT projects, interrupt business operation. Control: Is to carry out th...Read More
Network Security Risks And Controls Network Security Risks And Controls Reviewed by Unknown on 2:35 AM Rating: 5
How to manage your Vendor's Pen Test [Outsource] effectively? How to manage your Vendor's Pen Test [Outsource] effectively? Reviewed by Unknown on 2:27 AM Rating: 5
Powered by Blogger.