Building a successful audit analytics program is like climbing a staircase.
The staircase is a set of steps that consist of several items having increasing levels of maturity.
The staircase steps not only help you build your program, but enable you to measure that maturity.
As you view the staircase graphic, mentally insert the word “analytics” before each step.
Continue reading →
Like this:
Like Loading...
Filed under ACL, Audit, Data Analytics, How to..., Technology, Written by Skyyler
Tagged as acl, addin, alignment, analytic, Audit, automate, BI, chart, company, data, database, descriptive, diagnostic, download, education, engagement, enterprise, excel, Fuzzy Lookup, graphic, hardware, high risk, maturity, measure, menu, model, perform, pivot, power, predictive, prescriptive, program, query, software, staircase, strategic, tools, training, view, visual, visualization
ISC2.org, the organization that grants the CISSP certification, has a great, online, FREE global security resource guide.
No membership, certification, or log-in required!
Update 1-11-14: See Kim White’s comment below about availability of this resource. If it is made public, I will link to the new version. The “remove this post now” comment makes me wonder if it’s coming back for public consumption*. – Mack
Continue reading →
Like this:
Like Loading...
Filed under Audit, Free, Security
Tagged as association, CISSP, Conference, education, event, guide, isc2, links, magazine, organization, program, publication, resource, school, Security
If you’re looking for FREE audit work plans, AuditNet.org is probably your best bet.
You can get a free account that allows you to access a limited number of work plans, usually basic ones. A premium account gives you access to all content . See their Subscription Plans for more info, and note that they call work plans ‘audit templates’.
If you have an ACL support agreement, you may be able to access AuditNet for FREE!
Last time I looked, over 100 work plans were free, and a total of 2600 were available.
Continue reading →
Like this:
Like Loading...
Filed under ACL, Audit, Free, How to..., Security
Tagged as acl, Audit, AuditNet, free, jim kaplan, program, support center, work plan
The lead security study group (group 17) from the International Telecommunication Union provides a paper containing general suggestions for writing secure applications. In the paper, each item is hyperlinked to additional information.
Continue reading →
Like this:
Like Loading...
Filed under Security
Tagged as algorithm, application, boundary condition, buffer overflow, business, change management, code, complexity, cryptography, digital certificate, fuzzer, International Telcommunication Union, ITU, program, resource allocation, secure, Security, software, telecommunication, testing, vulnerabi, vulnerability