This series will help you see eye to eye with your IT department as you discover the ways in which IT controls can help your organization’s finance activities. Our professionals discuss:
Each quarter, a new webcast will be introduced with each presentation for viewing at your convenience.
Our first session starts with an introduction of IT and internal controls. During this session, our professionals explain the background on the areas we have considered "key" for an IT control environment, they talk through the source of industry standards and best practice, and discuss where to start before evaluating the key IT controls.
View part 1, Understanding key IT security controls >
Properly managing changes to Information Technology (IT) is important for every single organization (no matter the size or complexity). This represents the second segment of a four part IT security controls webinar series. In this segment, our professionals provide:
As a result, we hope you will be able to better understand the benefits of having an effective change management process and the risks associated with an ineffective change management process.
View part 2, Change management >
Appropriately managing access to IT systems is a critical first layer of defense. This webinar represents the third segment of a four-part IT security controls webinar series. In this segment, our professionals provide an explanation of authentication and password controls. In addition, they walkthrough appropriate controls surrounding user account management including setting up users within a system, modifying their access, terminating their access and reviewing access rights within the systems on a regular basis. The presentation will conclude with the importance of monitoring for access violations. Throughout this session, viewers will begin to understand the importance of "least privilege" and "segregation of duties" when it comes to users within an IT system.
View part 3, System security >
Our last webinar in this series provides an explanation of the IT area – IT Operations. This session covers the IT control areas of data backups, physical security, use of external service providers and batch (automated) job scheduling/processing. All of these controls are critical in the operation of an effective IT environment. Most companies have most of the elements of these four areas in place; however, many companies do not fully implement these controls with regards to SSAE16 formal reviews and proactive backup restoration testing for example. During this session, you will learn about the fuller extent of implementing these operational controls.
View part 4: IT operational controls >
*CPE credit will not be provided with this series. Each segment will be 30-45 minutes in length.
This webinar series is for YOU if: