Month: February 2014

Back to basics in IT risk assessment

The Trusted Professional, Feb. 2014 Information technology has taken a starring role in the risk assessment process that accompanies the planning, execution and conclusion of the audit, now that the capturing, processing, storing and reporting of information have become almost exclusively computerized. Given how central its use is, it’s always a good idea to review […]