Bring Your Own Device (BYOD) Security Audit/Assurance Program

  • 36m
  • ISACA
  • ISACA
  • 2012

IT audit and assurance professionals are expected to customize this document to the environment in which they are performing an assurance process. This document is to be used as a review tool and starting point. It may be modified by the IT audit and assurance professional; it is not intended to be a checklist or questionnaire. It is assumed that the IT audit and assurance professional has the necessary subject matter expertise required to conduct the work and is supervised by a professional with the Certified Information Systems Auditor (CISA) designation and/or necessary subject matter expertise to adequately review the work performed.

In this Book

  • Introduction
  • Using this Document
  • Controls Maturity Analysis
  • Assurance and Control Framework
  • Executive Summary of Audit/Assurance Focus
  • Audit/Assurance Program
  • Maturity Assessment
  • Maturity Assessment vs. Target Assessment

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.5 of 35 users Rating 4.5 of 35 users (35)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 1802 users Rating 4.5 of 1802 users (1802)
Rating 4.7 of 22 users Rating 4.7 of 22 users (22)
Rating 4.5 of 43 users Rating 4.5 of 43 users (43)