Auditing IT: Identifying Exposures

Auditing IT: Identifying Exposures

Recent newspaper stories concerning identify theft and vital records exposure are causing concerns in boardrooms across the country. How could these things happen at SOX-compliant companies?

The answer is that the SOX effort focused primarily on applications and transactions. Testing at the operating system and database level focused primarily on general controls. The Auditing IT course is intended for auditors who now want to make the extra effort to ensure the systems and databases hosting SOX-compliant applications are secure. Using the Canaudit methodology, security is analyzed using a combination of scripts, tools and exploits to identify weaknesses before they can be exploited by an attacker.

Adobe_PDF_file_icon_32x32 Course Information | Auditing IT: Identifying Exposures