Information Security and Internal Audit Working
1 / 1

Information Security and Internal Audit Working

Author : luanne-stotts | Published Date : 2025-06-16

Description: Information Security and Internal Audit Working Together Copyright Copyright Paul Lepkowski 2011 This work is the intellectual property of the author Permission is granted for this material to be shared for noncommercial educational

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Information Security and Internal Audit Working" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:Information Security and Internal Audit Working:
Information Security and Internal Audit Working Together Copyright Copyright Paul Lepkowski 2011. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. Summary There are many ways whereby both Information Security and Internal Audit departments can work together. This session explores the successful model that Rochester Institute of Technology (RIT) has used to drive several IT security audits. Session Outcomes At the end of the session, an audience member would be able to: Identify the steps needed to utilize both audit and information security departments in an audit Design a plan for their next IT security audit Implement their next IT security audit in a more efficient manner Topics Areas of discussion include: Using Infosec resources to complement audit resources Handling the politics of both groups working together Audit planning Technical interpretation and advisement Vulnerability and penetration testing Benefits of this relationship will be explored in-depth About the Speaker Paul Lepkowski Enterprise Information Security Lead Engineer Rochester Institute of Technology (RIT) Certifications: CISSP, GIAC-GPEN Experience: 19 years in both network engineering and security Worked in both university and corporate environments Specializations Network and systems security Vulnerability assessment Penetration testing Private Information (PI) protection Professional Organizations ISSA Rochester Infragard – Vice President IEEE Audit Role Provide technical assistance regarding all aspects of IT audits to RIT Internal Audit Special Acknowledgment Elisa Cockburn, CPA Senior Internal Auditor RIT’s Institute Audit, Compliance, and Advisement Specializes in accounting and information systems auditing MBA in MIS Member of Association of Colleges and University Auditors (ACUA), Institute of Internal Auditors (IIA), and Information Systems Control and Audit Association (ISACA) About RIT Rochester Institute of Technology Founded in 1829 Rochester, NY 17,500 active students 11th largest private university in US 3,600 faculty and staff Undergraduate and graduate level Information Security programs Organizational Considerations At RIT - separate and independent groups: Board of Directors – Audit Committee Chief Financial Officer Internal Audit Global Risk Management Information and Technology Services (ITS) Information Security Office (ISO) The Problem Often the internal audit department does not have the time, technical expertise, or budget to properly handle IT security audits. Audit groups consist of a

Download Document

Here is the link to download the presentation.
"Information Security and Internal Audit Working"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

Internal Audit Process Open Topic Jimmy Nolan Internal Audit Services FAITH  INTEGRATION IN INTERNAL AUDIT AND COMPLIANCE FUNCTIONS OF PRIVATE UNIVERSITIES JOB STANDARDISATION: INTERNAL AUDIT JOBS Internal Audit Considerations for Cybersecurity Risks Posed by Vendors A SWOT ANALYSIS OF DIRECTORATE OF INTERNAL AUDIT AND RECOMMENDATION FOR PROPELLING WEALTH A Team Approach to Internal Audit IIA-CFSA : Certified Internal Auditor - Part 1, The Internal Audit Activity\'s Role Understand and Manage Risks by Using Internal Controls ISACA Cybersecurity Audit Certification Exam: Sample Questions and Answers ISACA Cybersecurity Audit Certification Exam Questions and Answers PDF The impacts of the use of data analytics and the performance of consulting activities PEM PAL  IA COP Audit in Practice Working Group  Introduction to the audit cycle