What is Transaction Authenticity?
What Is Transaction Authenticity?"Transaction authenticity" can be defined as the authentication of a party’s (individual, organization) identity, to ensure that ...
Natural Disasters: How to Efficiently Leverage Lessons Learned
Perhaps no disaster in recent history has done more to show the need for strong business continuity and disaster recovery planning than the Japan earthquake and t...
Five Important Questions on How to Effectively Keep Pace With Change
We all know that change is inevitable, but what can an organization do to keep its strategies and risk management capabilities on the same course as the ever-chan...
Self Assessment: Launching Here and Soaring Beyond
First Step: Use Self-Assessment Within the Internal Audit DepartmentThe first and simplest way to use the self-assessment process is to use it in determining your...
Is Your Strategy Focused on Digital Transformation?
The digital revolution currently taking place is transforming our world. Over the next few years, many organizations will need to undertake radical change program...
Best Practices for Developing Strong Public Relations
Are you using strong strategic communication processes that build great relationships between your organization and the public?Public relations has gained importa...
What is IT Performance Risk?
Performance is defined as the throughput of business transactions compared to user needs, expectations or requirements. IT performance risk is the risk that a com...
Where to Look for Digital Risk
Many auditors are asking themselves the same legitimate question: With so much happening, where do we start? Advancements in technology and data have been s...
Consider the Distinguishing Characteristics of Risk
Making Your Risk Assessments Count: Consider the Distinguishing Characteristics of RiskTraditional risk assessment approaches don’t often address the unique risk ...
Social Media Risk: What it Means to Your Risk Profile
Social Media Risk: What it Means to Your Risk ProfileSocial media platforms and applications have been implemented rapidly by most organizations over the past dec...