Search
Filters
Close

Global Technology Audit Guide (GTAG) 15: Information Security Governance

Securing an organization's information is critical to protecting its ability to operate competitively and avoid reputational damage. This guide will lead you through the process of incorporating an audit of Information Security Governance.

PDF

$0.00
$25.00
//when a customer clicks 'Enter' button we submit the "add to cart" button (if visible)
$25.00

IIA members please LOGIN to download a FREE copy (PDF). 

Learn more about the value of an IIA Membership.

Non-members can add this item to your shopping cart to purchase a copy for download.

Please allow 48-72 hours after placing the order to receive an email containing the link and access code to download your purchased product.

Information is a significant component of most organizations’ competitive strategy either by the direct collection, management, and interpretation of business information or the retention of information for day-to-day business processing. Some of the more obvious results of information security (IS) failures include reputational damage, placing the organization at a competitive disadvantage, and contractual noncompliance. These impacts should not be underestimated.

This Global Technology Audit Guide (GTAG) provides a thought process to assist the chief audit executive (CAE) in incorporating an audit of Information Security Governance (ISG) into the overall audit plan, focusing on whether the organization’s ISG activity delivers the correct behaviors, practices, and execution of IS.
 
This GTAG will assist efforts to:
  1. Define ISG.
  2. Help internal auditors understand the right questions to ask and know what documentation is required.
  3. Describe the internal audit activity’s role in ISG.

Item Number: 10.1073

IIA members please LOGIN to download a FREE copy (PDF). 

Learn more about the value of an IIA Membership.

Non-members can add this item to your shopping cart to purchase a copy for download.

Please allow 48-72 hours after placing the order to receive an email containing the link and access code to download your purchased product.

Information is a significant component of most organizations’ competitive strategy either by the direct collection, management, and interpretation of business information or the retention of information for day-to-day business processing. Some of the more obvious results of information security (IS) failures include reputational damage, placing the organization at a competitive disadvantage, and contractual noncompliance. These impacts should not be underestimated.

This Global Technology Audit Guide (GTAG) provides a thought process to assist the chief audit executive (CAE) in incorporating an audit of Information Security Governance (ISG) into the overall audit plan, focusing on whether the organization’s ISG activity delivers the correct behaviors, practices, and execution of IS.
 
This GTAG will assist efforts to:
  1. Define ISG.
  2. Help internal auditors understand the right questions to ask and know what documentation is required.
  3. Describe the internal audit activity’s role in ISG.

Item Number: 10.1073