Training Institute

a Wholly Owned Division of AuditNet®

2013 IT Audit Webinar Training – via Practical Application

 

 

IT Audit Webinar Series


 

An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.

 

AuditNet® has joined forces with Richard Cascarino and Associates to bring you a structured learning curriculum for IT audit. The courses are designed to build on skills developed from prior knowledge or training. Auditors can choose between the complete series or pick and choose specific course depending on both needs as well as budgetary financial constraints.

 

About the Series

 

The IT Auditing Series is a 5 month series of 2-hour webinars.

 

The study program consists of 5 modules, spanning a broad range of topics and issues in the OIT Auditing field. The emphasis in all webinars is therefore on practical aspects, of Internal Auditing.
 

The course content is based upon ISACA Framework which has been accepted world-wide as the basis of skills and competencies required for all IT Auditors.
The webinars are presented by Richard E. Cascarino, MBA, CIA, CFE, CISA
 

Who should attend

The series is aimed primarily at auditors, both internal and external, who are beginning their career in Computer Auditing or who wish to understand the complexities and vulnerabilities of computer systems. The series builds rapidly to shorten the time period to productivity and effectiveness.

 

Webinar Leader

Richard Cascarino, CIA, CISM, CFE is a consultant and lecturer with over 28 years experience in IT Risk, Audit, Governance, Forensic, Internal and IT auditing education and author of the books Internal Auditing-an Integrated Approach and Auditor’s Guide to Information Systems Auditing and the forthcoming book Preventing Fraud – It Could Happen to You. He is also a contributing author to the Governance section of Finance: The Ultimate Resource and is a frequent speaker at IIA and ISACA courses and conferences.

 

He is a Past President of the IIA – South Africa and founded the African Region of the IIA Inc.

 

Richard is a computer and audit professional with over 35 years’ experience in designing, implementing, managing and auditing complex computer systems. In addition he has conducted extensive operational audits in a variety of business environments throughout the world. Richard is the Principal of Richard Cascarino & Associates and, in addition to being a regular speaker to National and International conferences, he has presented this series of courses throughout Africa, Europe, the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa, was the founding Regional Director of the Southern African Region of the IIA-Inc and is a member of both the ISACA and the Association of Certified Fraud Examiners. He is also the author of “Internal Auditing – an Integrated Approach” and “Auditor’s Guide to IT Auditing”.

 

 

 

Cost $79 (2.0 CPE) each or the complete series of 5 for $300 (10.0 CPE)

 

The 2013 Basic IT Audit Series Webinars are listed below. Auditors can sign up for one or more of these classes with CPE for a fee.  Additionally we are offering a Department Group price of $300 per class to train your entire staff with CPE or even better sign up your entire department for all the IT Audit Series for only $1399 and earn 10 CPE per auditors that attend, answer the polling questions in accordance with NASBA standards.
2013 IT Audit Webinar Series

 



1. Fundamentals of IT Auditing  January 23, 2013


The webinar covers basic concepts of computing, primary types of computer systems, the risks and controls and audit usage of computers. You will gain the confidence of understanding the jargon and knowing that questions you put to clients are addressing the real issues. The attendee will also realize the difference between jargon answers and evasive answers.

 

On using the knowledge you have gained, you will discover a greater level of acceptance by Information Technology staff and users due to your increased comprehension. This can be immediately translated into more effective and efficient audits and a greater contribution to the organization.

 

By the end of this webinar the attendee will be able to:

  • Understand the jargon of the computer world
  • Differentiate between types of systems and their major risk elements
  • Understand how computer systems are constructed and how this can influence the eventual running in the business environment
  • Utilize this knowledge to gain a greater acceptance by computer-literate auditees
  • Identify the role of the IS audit specialist
  • Identify potential areas for the audit use of computerized technology

Date: January 23, 2013
Time: 1:00 PM- 3:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded based on a 50-minute hour.

Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based

Recommended Category: Specialized Knowledge and Applications

Cost: $79 with CPE $0 without CPE

Group Pricing $300 for your entire staff WITH CPE

 

Register now by clicking the link below:
https://www2.gotomeeting.com/register/229506618

 

 

Webinar Contents
 

This two-hour webinar is designed to provide the participants with an in-depth knowledge and experience of:

  • Technology and audit
  • Control objectives and risks
  • Batch and on-line systems
  • Programming computers
  • Database systems
  • Computer risks and exposures
  • Computer security
  • Application systems and their development
  • Computer operations controls
2. Auditing Database Structures February 28, 2013

 

Today's IT auditor is increasingly being faced with a multiplicity of database management systems (DBMSs). Since each of these affects not only the control concerns of the IT systems due to the concentration of risk, but also the control and audit opportunities due to the increased control and audit tools, it has become critical that auditors understand their role and criticality.

 

This two-hour webinar is designed as an intermediate course to introduce auditors to the risks and exposures specific to a business operating in a Database Environment and indicates the unique control opportunities as well as the wide range of audit tools available.

 

By the end of this webinar the attendee will be able to:

 

Identify the differing types of database structures, their principal components, and the threats to them

Relate DBMS components to the operating system environment in which they operate

Identify potential control opportunities and select among control alternatives

Recognize vulnerabilities in multiple DBMS environments and make appropriate recommendations

Select the appropriate audit tool and technique to meet a given audit objective

 

Webinar content

The webinar will cover the following areas:

 

  • Database types

  • Sequential

  • Hierarchical

  • Network

  • Inverted File Structures

  • Relational Models

  • Control opportunities in a database environment

  • Database tools and techniques

  • Auditing IMS; IDMS; ADABAS; DB2; DATACOM; Oracle;Access

Date: February 28, 2013
Time: 1:00 PM- 3:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded based on a 50-minute hour.

Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based

Recommended Category: Specialized Knowledge and Applications

Cost: $79 with CPE $0 without CPE

Group Pricing $300 for your entire staff WITH CPE

 

 

Register now by clicking the link below:
https://www2.gotomeeting.com/register/536227994
 

 

 

 

3. Audit use of CAATs  March 21, 2013

In order to audit in today's complicated, computerized environment, the auditor must frequently utilize computer technology himself. This may take the form of auditing the computer applications themselves, utilizing computerized techniques to obtain information about non-computerized business areas and extracting and manipulating data from computerized systems. As such it becomes imperative that auditors be familiar with the types of computerized audit tools and techniques available, their advantages and disadvantages and be comfortable with their use.

 

This two-hour webinar is designed to give specialist IT auditors practical experience in both the selection of an appropriate CAAT as well as experience in running CAATs and interpreting results.

 

By the end of this webinar attendees will have an in-depth knowledge of:

  • The nature and usage of CAATS

  • Methods for determining the appropriate CAAT

  • Usage of differing types of CAAT

  • Interpretation of results

  • Verification of CAAT results

Webinar Content

 

The Webinar will cover the following areas:

  • System testing techniques

  • Computerized application systems

  • Non-computerized systems

  • CAAT types

  • Source code review

  • Use of Test Data

  • Parallel Simulation

  • Integrated Test Facilities

  • Snapshot Techniques

  • SCARF

  • Retrieval Software

  • Generalized Audit Software

  • Specialized Audit Software

  • Utility Software

  • ACL

  • IDEA

Date: March 21, 2013
Time: 11:00 AM- 1:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded based on a 50-minute hour.

Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based

Recommended Category: Specialized Knowledge and Applications

Cost: $79 with CPE  $0 without CPE

Group Pricing $300 for your entire staff WITH CPE

 

 

Register now by clicking the link below:
https://www2.gotomeeting.com/register/212277634

 

 

4.  Auditing Contingency Planning  April 18, 2013

Business has become increasingly dependent on computers to survive on a day-to-day basis. If these systems become unavailable for a significant period or if the integrity of the data they process is prejudiced, the very survival of the organizations which depend on them may be at serious risk. No busy manager likes to spend time contemplating the worst which could befall the company and anyway, disasters happen infrequently and always to someone else.

 

This two-hour webinar puts Computer Disaster Recover Planning firmly in its place as part of the Corporate Survival Program and highlights the auditor's role in ensuring the viability of the corporate Contingency Plan.

 

Webinar Objectives

 

The objectives of the webinar are to provide attendees with the tools and techniques needed in their own environments to:

  • Assess the corporate risks

  • Identify their audit strategies

  • Establish their priorities

  • Develop their Audit Plan

  • Evaluate and test their Corporate Disaster Recovery Plan

Webinar Content

 

The Webinar will cover the following areas:

  • What is a Disaster?

  • What is a Disaster Recovery Plan?

  • Who is Accountable?

  • What are the Options?

  • What is the cost?

  • How can a C.P. be tested?

  • What is Management's Role?

  • What is the User's Role?

  • What is the Information Services Role?

  • What is the Internal Auditor's Role?

Date: April 18, 2013

Time: 11:00 am - 1:00 pm
CPE: 2 Credits are available for attending the seminar which are awarded based on a 50-minute hour.

Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based

Recommended Category: Specialized Knowledge and Applications

Cost: $79 with CPE $0 without CPE

Group Pricing $300 for your entire staff WITH CPE

 

 

Register now by clicking the link below:
https://www2.gotomeeting.com/register/979376482

 

 

5. IT Fraud and Countermeasures May 23, 2013

 

IT fraud is presently a major growth area within our corporations.  This two-hour webinar is designed to assist auditors and management in the design and implementation of an IT architecture which minimizes the possibilities of fraud and maximizes the probability of detecting fraud.

 

By the end of this webinar the attendee will be able to :

  • Distinguish between the varying types of computer fraud, their nature and effect

  • Identify likely fraud indicators

  • Audit for computer fraud

  • Establish a Corporate Risk Profile

  • Structure an anti-fraud security environment

  • Distinguish between fraud and forensic auditing

  • Identify the requirements to ensure that audit evidence is acceptable as legal evidence

  • Identify the requirement and effect of reporting sensitive issues

Webinar Content

 

The webinar will cover the following areas:

  • The nature of computer fraud

  • The Corporate risk profile

  • Computer fraud techniques

  • Why computer fraud and who commits it?

  • Fraud auditing

  • Fraud awareness

  • EDI and fraud

  • The expectation gap

  • Forensic auditing

  • Sources of evidence and audit tools

  • Legal evidence

  • Reporting sensitive issues

Date: May 23, 2013
Time: 11:00 AM- 1:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded based on a 50-minute hour.

Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based

Recommended Category: Specialized Knowledge and Applications

Cost: $79 with CPE $0 without CPE

Group Pricing $300 for your entire staff WITH CPE

 

 

Register now by clicking the link below:
https://www2.gotomeeting.com/register/415075282


2013 IT Audit Webinar Series

 


Advanced IT Audit Series (Check Back Soon as we update the schedule for the following Webinars)

 

The Advanced IT Auditing Series is a 5 month series of 2-hour webinars.

 

The study program consists of 5 modules, spanning a broad range of topics and issues in the OIT Auditing field. The emphasis in all webinars is therefore on practical aspects, of Internal Auditing.
 

The course content is based upon ISACA Framework which has been accepted world-wide as the basis of skills and competencies required for all IT Auditors.
The webinars are presented by Richard E. Cascarino, MBA, CIA, CFE, CISA
 

Who should attend

The series is aimed primarily at auditors, both internal and external, who are beginning their career in Computer Auditing or who wish to understand the complexities and vulnerabilities of computer systems. The series builds rapidly to shorten the time period to productivity and effectiveness.

 

Webinar Leader

Richard Cascarino, CIA, CISM, CFE is a consultant and lecturer with over 28 years experience in IT Risk, Audit, Governance, Forensic, Internal and IT auditing education and author of the books Internal Auditing-an Integrated Approach and Auditor’s Guide to Information Systems Auditing and the forthcoming book Preventing Fraud – It Could Happen to You. He is also a contributing author to the Governance section of Finance: The Ultimate Resource and is a frequent speaker at IIA and ISACA courses and conferences.

 

He is a Past President of the IIA – South Africa and founded the African Region of the IIA Inc.

 

 

Richard is a computer and audit professional with over 35 years’ experience in designing, implementing, managing and auditing complex computer systems. In addition he has conducted extensive operational audits in a variety of business environments throughout the world. Richard is the Principal of Richard Cascarino & Associates and, in addition to being a regular speaker to National and International conferences, he has presented this series of courses throughout Africa, Europe, the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa, was the founding Regional Director of the Southern African Region of the IIA-Inc and is a member of both the ISACA and the Association of Certified Fraud Examiners. He is also the author of Internal Auditing – an Integrated ApproachAuditor’s Guide to IT Auditing and Corporate Fraud and Internal Control.

 

 

 

Cost $79 (2.0 CPE) each or the complete series of 5 for $300 (10.0 CPE)

 

Advanced IT Audit Webinar Series



1. Risk Analysis for Auditors

 

Objectives

 

Those planning Internal Auditing department activities face the recurrent task of allocating expected resources to an apparently ever-expanding universe of demands. One means to focus limited resources in a structured way is the use of appropriate risk analysis techniques.

 

This webinar provides auditors and audit management with a structured approach to risk management and internal risk assessment; risks in computerized systems and the use of computerized risk assessment tools are also addressed.

The module is designed to provide the participants with an in-depth knowledge of:

            Risk and its nature in a corporate environment

            Risk analysis and Internal Auditing

            The use of Risk-based auditing as an integrated approach

            Risks within computer systems

            Electronic trading risks

            The IT Risk-based audit approach

            Risk and materiality

            A structured approach to audit risk evaluation

            How to sell Risk-based audits

 

Webinar Contents

 

Webinar contents will include:

 

            The nature of risk

            Internal risk assessment - a framework

            Risk-based auditing - an integrated approach

            Risks in Financial Services Industries

            Computer risks and fraud

            Reducing the risks in electronic interchanges

            The IT Risk-based audit approach

            Audit risk prioritization

            Risk and materiality

            The structured risk approach

            Implementing the approach

            Selling management on risk

 

Who should attend?

 

The webinar is aimed primarily at auditors, both internal and external, who utilize or wish to utilize a risk-based audit approach.

 

Date: TBD
Time: 1:00 PM- 3:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded based on a 50-minute hour.

Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based

Recommended Category: Specialized Knowledge and Applications

Cost: $79 with CPE $0 without CPE

Group Pricing $300 for your entire staff WITH CPE

 

 

2. Securing the Internet

 

Webinar Objectives

 

This webinar is designed to provide the participants with an in-depth knowledge of the risks as well as the benefits of Internet connection.

Participants will learn of the tools and information sources available on the internet as well as the uses to which these might be put.

 

Webinar Content

 

Webinar contents will include:

            Defining the Internet

            Internet Threats

            Protection Strategies

            Internet security and privacy

            Use of Digital Certificates

            Client-side Security

            Downloading threats

            Firewalling and encryption

            Formulating an Internet security plan

 

Who Should Attend

 

The webinar is aimed primarily at computer auditors who are working in an Internet-connected environment and need to determine the adequacy and effectiveness of the security environment.

 

 

Date: TBD
Time: 1:00 PM- 3:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded based on a 50-minute hour.

Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based

Recommended Category: Specialized Knowledge and Applications

Cost: $79 with CPE $0 without CPE

Group Pricing $300 for your entire staff WITH CPE

 

 

 

 

3. IT Security Reviews

Webinar Objectives

 

Management, ever conscious of the company's reliance on the computer (both micro and mainframe), is increasingly looking to the auditor to address the risks in this environment. Many auditors are unfamiliar with the risk areas and control opportunities available. The module concentrates on logical security, the control mechanisms available to enforce logical security, and audit approaches, tools and techniques to carry out such reviews.

The objectives of the module are:

            To familiarize auditors with computer risk areas and security mechanisms.

            To provide auditors with an understanding of the building blocks of operational environments and operating systems.

            To provide auditors with an appropriate methodology for reviewing computer security.

Webinar Content

 

Webinar contents will include:

 

            Computer risk areas

            Criteria for effective security

            Computer operations

            Applications security

            Change control

            Control over viruses

            The "ACCESS" model

            Tailoring the Operating System

            Auditing operating environments

           

           

           

           

           

           

            The role of security packages: RACF, ACF2, TOP SECRET

            The internet and Firewalls

 

Who Should Attend

 

The webinar is aimed primarily at auditors, both internal and external, who are auditing advanced operating system environment.

 

Date: TBD
Time: 1:00 PM- 3:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded based on a 50-minute hour.

Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based

Recommended Category: Specialized Knowledge and Applications

Cost: $79 with CPE $0 without CPE

Group Pricing $300 for your entire staff WITH CPE

 

 

4.  Performance Auditing of the IT Function

Webinar Objectives

 

A major component of all corporate budgets in the 2010s is the IT departmental expenditure. The primary reason for this is the potential contribution which the IT function can make to the competitiveness and bottom-line performance of the corporation.

 

Auditing in this area has traditionally been reserved for the specialist IT auditor.

In this webinar, participants will be introduced to the VFM techniques they require to permit a generalist auditor to evaluate the economy, efficiency and effectiveness of the IT function.

 

The objectives of the webinar are:

            To familiarize auditors with the Key Performance Areas within IT

            To introduce them to a VFMA methodology to determine whether the IT resources are being optimized

            To provide delegates with a complete VFMA audit plan for the IT function

 

Webinar Content

 

The webinar will address:

 

            Background and objectives of VFMA

            Operational auditing methods and techniques

            Major operational areas in IT

            Risks and control opportunities

            Economy of resource utilization

            Efficiency determination of the key performance areas

            The quantification of effectiveness

            Implementing the VFMA audit programmer

            Performing the audit and following-up

 

Who should attend?

 

The webinar is aimed primarily at auditors who have to comment on the performance of the IT function.

 

Date: TBD
CPE: 2 Credits are available for attending the seminar which are awarded based on a 50-minute hour.

Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based

Recommended Category: Specialized Knowledge and Applications

Cost: $79 with CPE $0 without CPE

Group Pricing $300 for your entire staff WITH CPE

 

 

5. Managing the IT Audit Function

 

Webinar Objectives

 

IT Audit has developed into a maze of specialties with technical specialists requiring ever more specialized training.

This webinar is designed to assist audit management to refocus their IS audit's efforts by identifying high-impact audit areas and sourcing the resources required to carry out the audit plan.

 

The module is designed to provide the participants with knowledge of:

            The Scope of IT Audit

            Narrowing the perspective

            Objective setting

            Staffing and recruiting

            The use of audit automation

            Skills and training

            Measuring effectiveness

            The role of the Specialist

Webinar Contents

 

The webinar will cover the following areas:

 

            The IT audit mission

            The IT audit process

            Organization of the IT audit function

            Setting priorities

            Cost effectiveness in IT auditing

            The role of the specialist

            Recruiting and training staff

            Retaining and motivating staff

            Career planning for IT auditors

            Working Relationships

 

Who should attend?

 

The webinar is aimed primarily at in-charge auditors who have to manage an IT Auditing Function.

 

 

Date: TBD
Time: 1:00 PM- 3:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded based on a 50-minute hour.

Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based

Recommended Category: Specialized Knowledge and Applications

Cost: $79 with CPE $0 without CPE

Group Pricing $300 for your entire staff WITH CPE

 

 



AuditNet LLC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org.