CU news Logo

 Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

6 Steps of an IT Audit Program

Date: Monday July 8th from 1:30 pm - 3:30 pm CT | Cost: $265 and 2.5 CE Credits

6 Steps of an IT Audit Program


Every successful Information Security Program is built on 3 key elements. It requires decision-making risk management processes, clearly documented Information Security Policies, and an effective IT Audit Program. These elements work in conjunction with each other, feeding the next component information that continually improves the Information Security Program. The IT Risk Assessment process identifies key systems and information, threats against those systems, and helps management identify which controls are necessary to mitigate risk to an acceptable level. The controls have been selected in the risk assessment and are captured and solidified in the Information Security Policies. These controls are then implemented by the CU to mitigate the actual risks. The IT Audit process comes in to validate that the identified controls are successfully implemented in the CU's daily operations and to also ensure they are adequate to address best practice and regulatory guidelines.

A well-developed IT Audit Program will govern this process and provide the Board of Directors with assurances that the Information Security Program is implemented and working. This session will examine in more detail how the IT Audit Program integrates with the Information Security Program.

What You Will Learn:

* Risk-based Audit Models
* FFIEC IT Audit Requirements
* Internal/External Audit Processes
* 6 Basic Audit Steps
* Engagement Letters
* Audit Workpapers
* Reporting and Exception Tracking

Who Should Attend: Information Security Officers, IT Workers, Risk Officers, Internal Auditors, Network Administrators, Compliance personnel, and anyone interested in securing their credit union.

Speaker: Chad Knutson is a Senior Information Security Consultant and serves as President of the SBS CyberSecurity out of Madison, SD. SBS is a leader in information security consulting for the financial industry in the US. Chad is a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA) and Certified in Risk and Information Security Controls (CRISC), and received his Bachelor of Science in Computer Information Systems and his Master of Science in Information Assurance with an emphasis in Banking and Finance Security from Dakota State University.

Webinar 1 Paid

Enter Your Name

Enter company position

Enter institution

Invalid Input

Invalid Input

Select a State

Invalid Input

Invalid Address

Invalid Input

Please select invoice method

If you are paying by credit card, please enter it below.

Invalid Input

Invalid Input

(mm/yyyy)

Invalid Input

(Found on the back of the card)

Invalid Input

Invalid Input

Select a State

Invalid Input

6 Steps of an IT Audit Program

Get Our Free Email Newsletter

Invalid Input

Invalid Input

Invalid Input

Invalid Email Address