KnowledgeLeader Blog

    What You Need to Build Remarkable Partnerships With the IT Organization

    Posted by Protiviti KnowledgeLeader on Thu, Mar 26, 2020 @ 05:15 PM

    The strength of the partnership between IT audit and the IT organization is a significant differentiator in the overall success of IT projects and IT audit effectiveness, our research shows.

    Read More

    Topics: IT Governance, IT Strategy, IT Risk, IT Controls

    Segregation of Duties: Key Facts You Need to Know

    Posted by Protiviti KnowledgeLeader on Thu, Mar 19, 2020 @ 04:45 PM

    Segregation of duties (SODs) is an important concept to internal control frameworks, financial reporting and regulatory compliance, including the Sarbanes-Oxley Act (SOX). It is a component of an effective control environment. The overall effectiveness of management’s internal controls depends on SoDs to a large extent. For effective internal controls, there needs to be an adequate division of responsibilities.

    Read More

    Topics: COSO, Internal Controls, IT Controls, Process-Level Control, Segregation of Duties

    Intelligence Automation: How to Get Started

    Posted by Protiviti KnowledgeLeader on Thu, Feb 20, 2020 @ 05:15 PM

    Discussions of robotic process automation (RPA) and artificial intelligence (AI) tend to follow separate tracks. This has been a function of the way these technologies have been marketed and sold. This is changing as companies realize that both RPA and AI are required to achieve any significant degree of end-to-end process automation.

    Read More

    Topics: IT Strategy, IT Controls, Robotic Process Automation, Machine Learning, Artificial Intelligence

    What Are the Benefits and Risks Associated With Data Integrity?

    Posted by Protiviti KnowledgeLeader on Tue, Jan 14, 2020 @ 12:00 PM

    Data integrity is the assurance that information can only be accessed or modified by those authorized to access the system. Measures taken to ensure integrity include controlling the physical environment of networked terminals and servers, restricting access to data, and maintaining rigorous authentication practices. Data integrity can also be threatened by environmental hazards, such as heat, dust and electrical surges.

    Read More

    Topics: IT Audit, IT Infrastructure, Cloud Computing, IT Risk, IT Controls, Data Security, Data Analytics, Performance Management/Measurement, Customer Satisfaction

    The 3 Components of a Successful Systems Design

    Posted by Protiviti KnowledgeLeader on Thu, Jun 07, 2018 @ 09:19 AM

    What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term design as used here refers to the entire scope of a project. A business system design is a collection of design documents and supporting materials which define the system functionality that supports one or more business processes and in the process, creates, retrieves, updates and deletes data.

    Read More

    Topics: IT Audit, IT Governance, IT Infrastructure, IT Strategy, IT Risk, IT Controls, Performance Management/Measurement

    What is Transaction Authenticity?

    Posted by Protiviti KnowledgeLeader on Thu, Feb 15, 2018 @ 03:57 PM

    What is Transaction Authenticity?

    Transaction authenticity can be defined as the authentication of a party’s (individual, organization) identity, to ensure that pending transactions and contractual agreements are legal and enforceable.

    Read More

    Topics: IT Audit, IT Infrastructure, Cloud Computing, IT Risk, IT Controls, Performance Management/Measurement

    Electronic Discovery Risks, Challenges and Procedures

    Posted by Protiviti KnowledgeLeader on Mon, Jul 17, 2017 @ 09:10 AM

    Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data for the purpose of using it as evidence in a legal case.

    Read More

    Topics: Laws & Regulations, IT Audit, IT Security, IT Controls, Investigations/Forensics

    What Is Internal Audit’s Role in Cyber Security?

    Posted by Protiviti KnowledgeLeader on Fri, Jun 09, 2017 @ 08:57 AM

    Corporations today are thinking about how to protect assets. A few of the white collar crime problems include hacking/intrusions (cyber vulnerability), insider/outsider trading (convergence of cyber and financial crimes), the Foreign Corrupt Practices Act (FCPA), spear fishing (email compromise) and economic espionage. They must consider the possibility of internal corruption or external corruption, and environmental factors such as culture and competition contributing to these crimes. As protection, organizations can use cyber security, pen testing and data loss prevention tactics.

    Read More

    Topics: Enterprise Risk Management, Internal Audit, Internal Controls, Risk Assessment, Cybersecurity, IT Controls

    Add a Comment:

    About KnowledgeLeader

    KnowledgeLeader, provided by Protiviti, is the premier resource for internal audit and risk management professionals.

    With over 1,400 customizable tools and 1,300 articles by industry experts, we offer the most comprehensive service on the market.

    For more information:

     Tour the Site

    Recent Posts

    Posts by Topic

    see all