{"id":12403,"date":"2024-05-17T20:01:00","date_gmt":"2024-05-17T20:01:00","guid":{"rendered":"https:\/\/aiia.al\/?p=12403"},"modified":"2025-04-08T09:58:51","modified_gmt":"2025-04-08T09:58:51","slug":"it-audit-and-the-role-ofinternal-auditors","status":"publish","type":"post","link":"https:\/\/aiia.al\/index.php\/2024\/05\/17\/it-audit-and-the-role-ofinternal-auditors\/","title":{"rendered":"IT AUDIT AND THE ROLE OFINTERNAL AUDITORS"},"content":{"rendered":"\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>Whether you are in IT area or not, you often hear about Cloud computing, Cybersecurity, Internet of Things, and all sorts of tech trending terms, wondering what they exactly mean. As the rapid moving world of information and technology encompasses every business process, it is inevitable to not get triggered and involved by its dynamic.<\/p>\n\n\n\n<p>Information Technology is a critical enabler of business. In today\u2019s world, company operation is no longer possible without the use of IT. Assuring an enterprise\u2019s governance, including risk management and control processes, requires auditors to understand the role of IT within their organizations and to develop adequate knowledge and skills to audit IT systems as the line separating \u201cIT,\u201d and \u201cnon-IT\u201d audits are beginning to dissolve.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Course objective<\/h2>\n\n\n\n<p>Participants will become familiar with IT audit function, IT frameworks, most relevant IT processes and particular audit tests. Moreover, they will become aware of current key risks and how to address them, focusing mainly in cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Target audience<\/h2>\n\n\n\n<p>This course has been designed for Non-IT Auditors who are willing to execute a list of basic tasks and know their definition like IT Governance (e.g. IT Projects, Resource and Portfolio Management) or IT Security (User Access Review, Incident Management, BCM\/DR, IT Risk Management), Agile Management (Manifest breakdown).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Content<\/h2>\n\n\n\n<p><strong><u>Day 1<\/u><\/strong><strong><\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">IT Audit function<\/h4>\n\n\n\n<ul>\n<li>Terminology<\/li>\n\n\n\n<li>Objectives<\/li>\n\n\n\n<li>Qualifications<\/li>\n\n\n\n<li>IT Audit methods<\/li>\n\n\n\n<li>IT Audit Universe<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Regulations, Standards &amp; Best Practices (IT &amp; IT Security)<\/h4>\n\n\n\n<ul>\n<li>GDPR<\/li>\n\n\n\n<li>NIS 2 or DORA<\/li>\n\n\n\n<li>EBA Guidelines<\/li>\n\n\n\n<li>ITIL<\/li>\n\n\n\n<li>ISO<\/li>\n\n\n\n<li>COBIT<\/li>\n\n\n\n<li>NIST etc.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">IT Processes &amp; Basic Audit Tests<\/h4>\n\n\n\n<ul>\n<li>Selection of IT Processes<\/li>\n\n\n\n<li>Basic Audit Tests<\/li>\n<\/ul>\n\n\n\n<p><strong><u>Day 2<\/u><\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>IT Risks 2023<\/strong><\/p>\n\n\n\n<ul>\n<li>Current research results<\/li>\n\n\n\n<li>Risk outlook<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Process of an attack &amp; examples<\/h2>\n\n\n\n<ul>\n<li>Structure of an attack<\/li>\n\n\n\n<li>Techniques<\/li>\n\n\n\n<li>3 examples<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">IT Security Controls &amp; Basic Audit tests<\/h4>\n\n\n\n<ul>\n<li>Selection of IT Security Controls<\/li>\n\n\n\n<li>Basic Audit Tests<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">INSTRUCTOR BIO<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"434\" height=\"419\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/aiia.al\/wp-content\/uploads\/2024\/05\/Screenshot_3.png\" alt=\"\" class=\"wp-image-12404 lazyload\" style=\"width:249px;height:auto\" data-sizes=\"auto\" data-srcset=\"https:\/\/aiia.al\/wp-content\/uploads\/2024\/05\/Screenshot_3.png 434w, https:\/\/aiia.al\/wp-content\/uploads\/2024\/05\/Screenshot_3-300x290.png 300w, https:\/\/aiia.al\/wp-content\/uploads\/2024\/05\/Screenshot_3-20x19.png 20w\" sizes=\"(max-width: 434px) 100vw, 434px\" \/><\/figure>\n\n\n\n<p>Gerhard Schreihans is Head of Audit IT &amp; Data Analytics at UNIQA Insurance Group AG and previously held the same position at UniCredit Bank Austria AG.<\/p>\n\n\n\n<p>In addition to this he founded the IT Audit Consulting Company Aubotics to provide tailor-made IT &amp; cybersecurity trainings as well as consulting services for Internal Audit functions. Gerhard has an<\/p>\n\n\n\n<p>academic background in business informatics and holds certifications like CISA, CISSP, CRISC and CDPSE.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Whether you are in IT area or not, you often hear about Cloud computing, Cybersecurity, Internet of Things, and all sorts of tech trending terms, wondering what they exactly mean. As the rapid moving world of information and technology encompasses every business process, it is inevitable to not get triggered and involved by its [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12405,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[66],"tags":[],"_links":{"self":[{"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/posts\/12403"}],"collection":[{"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/comments?post=12403"}],"version-history":[{"count":1,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/posts\/12403\/revisions"}],"predecessor-version":[{"id":12406,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/posts\/12403\/revisions\/12406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/media\/12405"}],"wp:attachment":[{"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/media?parent=12403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/categories?post=12403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/tags?post=12403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}