1 Computer Auditing ( What is it, what skill set do you require & how much can you earn?) John Mitchell Academic Relations Director ISACA London Chapter.

Slides:



Advertisements
Similar presentations
PRESENTATION ON MONDAY 7 TH AUGUST, 2006 BY SUDHIR VARMA FCA; CIA(USA) FOR THE INSTITUTE OF INTERNAL AUDITORS – INDIA, DELHI CHAPTER.
Advertisements

Professionalism in IT - the UK perspective Susie Kay BCS Director of Professionalism.
Lesson 1: Introduction to IT Business and Careers
Empowering Nation by Quality Education “Empowering Nation by Quality Education” CYBER SECURITY Training For Student/Individual/Corporate.
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
Security and Personnel
Chartered Institute of Purchasing and Supply. The Management Development Unit (MDU) at London Metropolitan University is a leading provider of innovative.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-1 Chapter 7 CHAPTER 7 THE EFFECT OF INFORMATION TECHNOLOGY ON THE AUDIT.
Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T.
IS Audit Function Knowledge
Advanced Accounting Information Systems
Introduction to ICSA for the National Union of Company Secretaries Simon Osborne FCIS, Chief Executive, ICSA December 2014.
Internal Audit Process
Oracle Security and GRC Professional Development Program.
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
Views of Value and Competency How Stakeholder and Internal Auditor Perspectives Compare.
ISACA Wellington: 2014 Strategy. Background ISACA’s vision: Trust in, and value from, information and information systems ISACA’s mission: For professionals.
Chapter 2 Careers in Fraud Examination and Financial Forensics.
MPL EDUCATIONAL CONSULTANTS. CAREER OPTIONS IN ACCOUNTING & FINANCE.
Internal Auditing and Outsourcing
Certification and Training Presented by Sam Jeyandran.
Tver Branch of MESI The E-xcellence Project Разработчик 1 Irina Tretyakova, Director, Tver Branch of MESI
1 Jon Whitfield Agency CEO Head of Government Internal Audit.
© 2007 ISACA ® All Rights Reserved DAMA-NCR Chapter Meeting March 11, 2008.
1 Homologues Group Meeting Slovenia, October 2009 Republika SlovenijaEuropean Union Ljubljana, October 2009 Introduction to IT audits PART II IT.
Margaret J. Cox King’s College London
Professional Standards Committee and Frameworks for IT Audits
North London Branch 26th June 2002 ISEB Qualifications Mark Lovell Deputy Director (Examinations) The British Computer Society.
ISCB-SC - Saraswathi.S Saraswathi S PhD Student Iowa State University Ames, Iowa, USA Chairperson: ISCB-SC-RSG.
The Route to Chartered Membership A presentation to the London Branch
Chapter 1: Accounting Information Systems and the Accountant
Internal Audit’s Role in Compliance Laurisa Riggan, CPA, CHE Children’s Mercy Hospitals and Clinics September 26, 2000.
Revell Research Systems A Management and Technology Consulting Practice A Presentation Alastair Revell Managing Consultant Revell Research Systems.
OVERVIEW OF INFORMATION SYSTEM (IS) AUDITING NORHAFIZAH BINTI ABDUL MUDALIP YAP YONG TECK TAN YUAN JUE TAY QIU JIE GROUP MEMBER:
Chartered Institute of Personnel and Development We’re here to help you succeed in your career.
1 Chapter Nine Engineering Your Career. 2 Engineering Careers  Electrical and computer engineers find employment in: 1.Private industry. 2.Government.
Institute of Business Consulting British Computer Society Tony Ginda Membership Manager Sabrina Ahmed Professional Development Manager 15 May 2007.
Information Assurance Market Research June Executive Summary Small response rate (n=43) General low awareness of information security controls and.
Developing a Social Media Policy Manish Mandhyan, CRCM, CAMS.
BCS The Chartered Institute for IT Student Presentation 2009/10 2 About BCS? The UK’s leading professional body for those working in IT & communications.
1 ISA&D29-Oct ISA&D29-Oct-13 Systems Analyst: problem solver IT and Strategic Planning.
Professionalism in Computing An Overview Khurshid Ahmad, Prof. PhD, CEng., MBCS Department of Computing, University of Surrey, Guildford, Surrey.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Going further together Building and Effective IT Profession Charles Hughes President British Computer Society IFIP Workshop 25 August 2006.
Institute of Internal Auditors COBIT Presentation October 9, 2001.
ELECTRICAL ENGINEERS KENDALL HIMEL INTRO TO ENGINEERING 4TH.
Company: FirstGroup Position: IT Auditor or Senior IT Auditor Location: Cincinnati, OH About the Company : FirstGroup plc, headquartered in Aberdeen, Scotland,
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
IT and Network Organization Ecommerce. IT and Network Organization OPTIMIZING INTERNAL COLLABORATIONS IN NETWORK ORGANIZATIONS.
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
Chapter 9 The People in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe each of the.
Institute of Internal Auditors New Zealand IIA NZ Global and Local Happenings.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Internal Audit Agency Integrity + Professionalism INTERNAL AUDIT AGENCY ISACA Presentation 15 July, 2013 Alisa Hotel, ACCRA.
Internal Audit Quality Assessment Guide
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
2 Overview With active participation from individuals and chapters all over the world, the Information Systems Security Association (ISSA)
Copyright © 2011 Pearson Canada Inc. Auditing: The Art and Science of Assurance Engagements Chapter 2: The Public Accounting Profession.
MS in IT Auditing, Cyber Security, and Risk Assessment
Chartered Institute of Personnel and Development
Dr. Ir. Yeffry Handoko Putra
Chapter 1- Introduction
Master’s Degree Program in Business Compliance Assurance
Careers in IT.
Membership information for students and early career professionals
Membership information
IT Audit Capacity Building
Certified Information Technology Professional (CITP) Credential
ISACA IN 2019 Robin Lyons WHAT’S NEXT, NOW Technical Research Manager
Presentation transcript:

1 Computer Auditing ( What is it, what skill set do you require & how much can you earn?) John Mitchell Academic Relations Director ISACA London Chapter LHS © John Mitchell

LHS © John Mitchell 2 Confusion then, confusion now! "On two occasions, I have been asked by members of Parliament, 'Pray, Mr. Babbage, if you put into the machine wrong figures, will the right answers come out?' I am not able to rightly apprehend the kind of confusion of ideas that could provoke such a question." Charles Babbage ( )

LHS © John Mitchell 3 What is It? n An objective & independent service to management providing: –assurance on the reliability of the IT governance processes –quality assurance of developments –help build controls into systems –provide risk management advice –conduct special investigations –computer forensics

LHS © John Mitchell 4 Why is it Important? n IT is becoming a top priority for executive management n Increased access to and use of computers n Growing concern for data security due to proliferation of technology n Increased systems complexity n Increasing statutory and regulatory compliance requirements n Growth in computer crime

LHS © John Mitchell 5 Technology Developments 1970 to Present n Single batch program n Batch Multi-tasking n On-line retrieval n Real-time update n Stand alone PCs n Networking n File servers & distributed processing n Internet, Intranet & Extranet n Palm Devices n Phone devices n Implants

LHS © John Mitchell 6 IT Responsibilities Hardware Base Software (Operating System & DBMS) Network Application Software Data User Processes IT Processes

LHS © John Mitchell 7 Traditional Audit Responsibilities Hardware Base Software (Operating System & DBMS) Network Application Software Data Computer Audit Financial Audit User Processes IT Processes

LHS © John Mitchell 8 Type of Work n Infrastructure reviews n Application reviews n Pre-implementation reviews n Security reviews n Network control reviews n IT risk management n Advisory roles n Training n Data integrity assurance n IT governance assurance n Control design advice

LHS © John Mitchell 9 Why Do It? n Permits a fast, high-level understanding of the entity and industry n Exposure to senior-level management n Transportable disciplines n Growth market n Networking opportunities n Potential travel

LHS © John Mitchell 10 Skill Set Required n In-depth knowledge of IT & IS n Business knowledge n Risk management knowledge n Interviewing skills n Good written & oral communication n Excellent analytical ability n Investigative skills n Project management skills n Documentation skills n Knowledge of the law n Social skills

LHS © John Mitchell 11 What Qualifications? Not mandatory, but the options are: –Certified Information Systems Auditor (CISA) –Qualification in Computer Audit (QiCA) –Member of the British Computer Society (MBCS) –Diplomas in Internal Auditing (PIIA, MIIA, CIA) –Certified Information System Security Practitioner (CISSP) –Certified Information Security Manager (CISM) –Chartered Software Engineer (CEng) –BSc/MSc in Computer Science or Computer Security Smarty Pants ££££

LHS © John Mitchell 12 Different Aspects/ Different Skills

LHS © John Mitchell 13 Career Progression? n Director of IT n Director of Internal Audit n Project manager n Consultancy n Academia n Forensic computing n Law enforcement n Money launderer?

LHS © John Mitchell 14 Tools n Computer Assisted Audit Techniques (CAATs) n Control Objectives for IT (CobiT) n Information Security Management Standard (ISO 17799) n Firewall/Network penetration software n Development methods (e.g. PRINCE)

LHS © John Mitchell 15 CobiT n Control Objectives for IT n Produced by the Information Systems Audit & Control Association (ISACA) n International open standard n Used by over 30,000 auditors n

LHS © John Mitchell 16 CobiT n Planning & Organisation n Acquisition & Implementation n Delivery & Support n Monitoring

LHS © John Mitchell 17 Professional Support n Information Systems Audit & Control Association (ISACA) n BCS Information Risk Management & Audit Specialist Group (BCS-IRMA) n IT Faculty of the Institute of Chartered Accountants

LHS © John Mitchell 18 ISACA n Founded in 1969 n Facilitates a free exchange of audit techniques and problem-solving approaches among members n Promotes increased awareness of IT Governance and IS controls n Provides membership opportunities for students as well as experienced practitioners

LHS © John Mitchell 19 Local Support n Local chapter - London n Third largest in the world (circa 900 members) n 10 free monthly meetings per year n Networking opportunities n Low cost seminars and conferences n Publications þ Monthly newsletter þ Quarterly award winning magazine þ Award winning web site n Reduced student member rate (£32)

LHS © John Mitchell 20 What Can You Earn? n Partner of Big 4 - £350,000+ n Senior IT Auditor in London: £30,000 - £90,000 n Middle East: £50,000 - £150,000

LHS © John Mitchell 21 Further Information

LHS © John Mitchell 22 Questions? John Mitchell Academic Relations LHS Business Control 47 Grangewood Potters Bar Hertfordshire EN6 1SL England Tel: +44 (0) Fax: + 44 (0)