Bring Your Own Device (BYOD) Security Audit/Assurance Program
- 36m
- ISACA
- ISACA
- 2012
IT audit and assurance professionals are expected to customize this document to the environment in which they are performing an assurance process. This document is to be used as a review tool and starting point. It may be modified by the IT audit and assurance professional; it is not intended to be a checklist or questionnaire. It is assumed that the IT audit and assurance professional has the necessary subject matter expertise required to conduct the work and is supervised by a professional with the Certified Information Systems Auditor (CISA) designation and/or necessary subject matter expertise to adequately review the work performed.
In this Book
-
Introduction
-
Using this Document
-
Controls Maturity Analysis
-
Assurance and Control Framework
-
Executive Summary of Audit/Assurance Focus
-
Audit/Assurance Program
-
Maturity Assessment
-
Maturity Assessment vs. Target Assessment