(From IIA Global Technology Audit Guide Auditing IT Projects). GTAG 28, 2, Project Plan and Approach, , Objective and scope, The scope of the project. Information for the audit program was also obtained as necessary from the Institute of Internal Auditor’s GTAG (Global Technology Audit Guide) #12 ( Auditing IT. Start studying GTAG Auditing IT Projects: Appendix A – Project Management. Learn vocabulary, terms, and more with flashcards, games, and other study.

Author: Digis Mezim
Country: Great Britain
Language: English (Spanish)
Genre: Relationship
Published (Last): 25 October 2014
Pages: 289
PDF File Size: 10.88 Mb
ePub File Size: 3.27 Mb
ISBN: 172-6-30173-381-8
Downloads: 71806
Price: Free* [*Free Regsitration Required]
Uploader: Shara

Computer fraud in the Penal Code Btk. Mynt is joint venture of Globe Telecom and Alibaba Group. IIA internal audit standards. The concept of control and risk in information systems. Back Establish and maintain project management standards. Global Public Sector Insights.

Global Technology Audit Guide (GTAG) 12: Auditing IT Projects

The concept, dimensions, and basic principles of security. Management of security risk in information and information technology Establish and maintain a project management framework that defines the scope and boundaries of managing projects, as well as the method to be adopted and applied to each project undertaken.

This Control has the following implementation support Control s: Official information systems audit standards, and guidelines.

Types of computer related damage, abuse, and fraud. Prevention and handling of computer fraud and abuse. The groundwork of information system audit. Please enable scripts and reload this page. Managing information security by applying standards. Issuing the audit report. Information systems audit in the ministries.


A glimpse of Change Management. The organization shall establish and maintain an operation and management organization… Gatg He has more than six 6 years of working experience in information systems audit, internal audit, governance, risk management, compliance readiness assessments and business process reviews, across various industries, with specialization in the financial services sector. Visit the IIA Bookstore for more information.

Front page News Browsing. Management of security risk in information and information technology The organization should use Project Projecte techniques to verify that information technology security requirements are adequately addressed. Standards, and recommendations concerning IT security. Plenary 2 – Business Continuity Management. She has helped a large commercial bank and software development houses to be CMMI compliant. He has significant and well-balanced technical and management skills as well as vendor and end-user experience; having worked for top-tier global organizations such as IBM Philippines and Sun Microsystems projevts the earlier part of his career and with UNILAB United Laboratories Inc.

Committee Members and Chapter Leaders. Key project management risks. The role of audit.

Handling extraordinary security events incidents. This will be a diverse group of delegates coming from a wide range of industries. This is a past event. Always an outstanding performer in all the companies he worked for, Frank was considered prominent talent who is constantly at the top of his game and always masters the field that he is working on — as proven by his certifications in key technologies and standards.


Establish and maintain project management standards. | Control Result | Unified Compliance

The framework and supporting method should be integrated with the programme management processes. Continuity of IT services. The fundamentals of internal audit.

Friday, May 25, This Control directly supports the implied Control s: Establish and maintain a system design project management framework. Currently, he is working as a Risk Management Executive in one of the leading health maintenance organizations HMO in the Philippines handling operational risk, information technology risk, data privacy, orojects security and consumer protection program.

Add to Calendar

Basic concepts of risk management. The process of information systems audit. The methodology should cover, at a minimum, allocation of responsibilities,… 4. His areas of expertise and focus include helping organizations modernize and embrace digital shift and gtaag, including giving advice on the right technology assets and models to consider and implement, redesign of enterprise processes in preparation for technology transformation, software licensing strategy and management, gtab governance and risk management, cybersecurity and forensic services, among others.

The frameworks of business continuity management. Information security policy, and strategy. Information systems audit types.