Global Technology Audit Guide (GTAG): Auditing Insider Threat Programs - eBook

Global Technology Audit Guide (GTAG): Auditing Insider Threat Programs - eBook
products.sku: 4050.PUB.BK04.00459.00.01
$25.00
products.price.withdiscount: $25.00

This Practice Guide is provided as a service to members of The IIA. To learn more about the value of an IIA membership, click here. 

This GTAG helps internal auditors understand insider threats and related risks by providing an overview of common dangers, key risks, and potential impacts.

Additionally, the guide presents examples of security frameworks from globally recognized and accepted sources including Carnegie Mellon University Software Engineering Institute, the National Institute of Standards and Technology (NIST), and the U.S. Intelligence and National Security Alliance (INSA), controls, and other resources that can help during the planning and execution of audit engagements. Organizations should base their choice of framework on their unique situation, weighing factors such as their industry, size, complexity, and applicability of the selected framework.

For organizations that already have insider threat programs, this guidance can help internal auditors design assurance engagements to assess the program’s effectiveness.

Item number 10.1301.dl

products.alsopurchased

Global Technology Audit Guide (GTAG) 4: Management of IT Auditing, 2nd Edition - eBook

Global Technology Audit Guide (GTAG) 4: Management of IT Auditing, 2nd Edition - eBook
$25.00

Auditing Insider Threats

The most harmful security threats organizations face today originate from trusted insiders, both malicious and negligent. Whether malicious or unintentional, insider threats often fail to receive the attention they deserve, considering the significance of the risks to which they expose the organization.

In the digital era, organizations must treat data as an organizational asset that must be protected from both outsiders and insiders. Organizations are tasked with detecting, countering, and responding to cybersecurity attacks. This is more challenging when threats come from within the organization.

$129.00