{"id":20214,"date":"2024-11-26T14:00:10","date_gmt":"2024-11-26T17:00:10","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=20214"},"modified":"2024-11-26T13:51:30","modified_gmt":"2024-11-26T16:51:30","slug":"information-technology-risk-and-controls","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/information-technology-risk-and-controls\/","title":{"rendered":"Information Technology Risk and Controls"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-20215\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2024\/11\/information-technology-risk-and-controls.jpg\" alt=\"Information Technology Risk and Controls\" width=\"145\" height=\"187\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2024\/11\/information-technology-risk-and-controls.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2024\/11\/information-technology-risk-and-controls-116x150.jpg 116w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>The Institute of Internal Auditors<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> The purpose of this GTAG is to explain IT risks and controls in a format that allows CAEs and internal auditors to understand and communicate the need for strong IT controls. It is organized to enable the reader to move through the framework for assessing IT controls and to address specific topics based on need. This GTAG provides an overview of the key components of IT control assessment with an emphasis on the roles and responsibilities of key constituents within the organization who can drive governance of IT resources.<br \/>\nSome readers already may be familiar with some aspects of this GTAG, but some segments will provide new perspectives on how to approach IT risks and controls. One goal of this GTAG, and others in the series, is that IT control assessment components can be used to educate others about what IT risk and controls are and why management and internal audit should ensure proper attention is paid to fundamental IT risks and controls to enable and sustain an effective IT control environment.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2024\/11\/information-technology-risk-and-controls.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Institute of Internal Auditors R\u00e9sum\u00e9: The purpose of this GTAG is to explain IT risks and controls in a format that allows CAEs and internal auditors to understand and communicate the need for strong IT controls. It is organized to enable the reader to move through the framework for assessing IT controls and to address specific topics based on need. This GTAG provides an overview of the key components&hellip; <\/p>\n","protected":false},"author":3,"featured_media":20215,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,19,20],"tags":[],"class_list":["post-20214","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-risco-e-perdas","category-seguranca-da-informacao"],"views":293,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/20214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=20214"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/20214\/revisions"}],"predecessor-version":[{"id":20216,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/20214\/revisions\/20216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/20215"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=20214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=20214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=20214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}