Auditor checklists are tools, but not just for the auditor. Hackers and fraudsters have access to these same checklists and quickly learn their way around standards and practices imposed by the auditor. Efforts are needed to excel beyond the minimum auditing standards. Learn how hackers and fraudsters are able to learn and avoid common IT security controls using examples that can be understood by those without IT expertise. The objective is to show how auditors and governmental accountants the various methods being used against their clients and governments so they can expand their testing and controls to deter abuses.
Email Address: | |
Password: |