You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Leaders across the globe have a common challenge they cannot ignore: CHANGE. This must be embraced and effectively managed to remain relevant and successful in a dynamic operating environment. Embracing change, including technological innovations, collaboration, and timely sharing of information, is paramount to the survival and success of everyone in an ever-changing environment. In times of rapid change, organizations are often forced to adjust their strategic plans. Stakeholders usually need assistance to effectively manage the risks, unprecedented at times, and to capitalize on the opportunities that usually come with change. Change management must be effectively executed to assist in ensuring the viability of the organization. This book provides advice and guidance to assist stakeholders in navigating the challenges and demands of change. It includes insights, measures, and tools that have contributed to my success as a leader in the internal audit profession for 27 years.
In this book, the author presents lessons learned from her extensive experience as a CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role. The book explains how to clarify management expectations for the internal audit and balance those expectations with the IIA Standards. It examines the concept of risk-based auditing and explains how to determine whether management and the internal audit team have the same objectives. It also looks at the internal auditor's role in corporate governance and fraud processes.
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book maps the CSF steps and activities to the methods defined in COBIT 5, extending the CSF objectives with practical and measurable activities that leverage operational risk understanding in a business context. This allows the ICT organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models.
This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera’s CRP experience as a trusted advisor who has taught thousands of professi...
John Taylor has been hired to transform the underperforming internal audit unit at InSports. The auditors are not reviewing what the audit committee and executive leadership consider essential for the organization’s success, their methodology is subpar, and their relationships with their clients are strained. The audit committee has been patient, but not anymore. Their mandate is clear: make clear improvements in one year or the function will be outsourced. This is the story of a visionary leader who needs a strategy to transform processes and deliver better results for stakeholders at all levels within the organization. The audit committee, all levels of management, and employees expect m...
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises’ advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today’s age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in ent...
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security...
In 1913, a strong spirit of independence, strength of family, and desire for growth prompted a group of central New Jersey settlers to break away from the large town of Piscataway and form the borough of Middlesex. This spirit was perpetuated throughout the 20th century, accelerating the growth of a true American small-town community. People of Middlesex Borough: 1950a2008 celebrates the growth of this very special town in the second half of the 20th century. During this time period, there were major developments: schools were built and expanded and new housing developments and apartment complexes spurred the growth of the population. Parks and sports fields were established, and community services grew while local groups nurtured an already strong sense of communal awareness and responsibility. Family values, patriotism, and neighborliness have long been a part of Middlesex Boroughas history, a tradition that continues today.
Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing pra
None