Bring Your Own Device (BYOD) Security Audit/Assurance Program

  • 36m
  • ISACA
  • ISACA
  • 2012

IT audit and assurance professionals are expected to customize this document to the environment in which they are performing an assurance process. This document is to be used as a review tool and starting point. It may be modified by the IT audit and assurance professional; it is not intended to be a checklist or questionnaire. It is assumed that the IT audit and assurance professional has the necessary subject matter expertise required to conduct the work and is supervised by a professional with the Certified Information Systems Auditor (CISA) designation and/or necessary subject matter expertise to adequately review the work performed.

In this Book

  • Introduction
  • Using this Document
  • Controls Maturity Analysis
  • Assurance and Control Framework
  • Executive Summary of Audit/Assurance Focus
  • Audit/Assurance Program
  • Maturity Assessment
  • Maturity Assessment vs. Target Assessment

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.4 of 64 users Rating 4.4 of 64 users (64)