This is the third of 3 posts; this post describes how I audited the auditors and my perspective on the whole thing.
Read the first post (background) and the second post (audit results).
This is the third of 3 posts; this post describes how I audited the auditors and my perspective on the whole thing.
Read the first post (background) and the second post (audit results).
Filed under ACL, Audit, Case Files, Data Analytics, Scripting (ACL)
Part 1 of an article at AuditNet notes that audit teams need to increase their use of technology, specifically data analytics, to continue adding value to their companies. The author contends that data analytics can provide more assurance at a lower cost than the traditional cyclical approach to auditing (while I noticed the author, John Verver, is a VP of ACL Services and has a vested interest in this, I agree with him).
Filed under ACL, Audit, Data Analytics
Is it really true that one person’s trash is another person’s cash or treasure? It depends. When was the last time a trash can near you contained anything like this?
Filed under Security, Security Scope, Written by Skyyler
Don Donzal, who created www.ethicalhacker.net and ChicagoCon (link now appears defunct), lists 10 ways for CISSPs to earn CPEs (Continuing Professional Education credits) and having fun doing it. Check out his entire article here. He wrote it in 2005, but it hasn’t aged much.
NOTE: I crossed through some of the links to now-defunct sites….remember, this was written in 2009….