This site uses cookies to store information on your computer. Some are essential to make our site work; others help us improve the user experience. By using the site, you consent to the placement of these cookies. Read our privacy policy to learn more.
These learning resources are designed to help you - whether working in a business or firm - establish and maintain proficiency in the areas of information and data management and analysis; IT risk and assurance services, including service organization controls (SOC) reporting; and information security and privacy, including the growing issue of cybersecurity.
Your location was detected based on your browser location. Update your profile to include a valid physical address.
Your location is based on your IP address. Update your profile to include a valid physical address or click the button below to use your browser to detect your location for this session.
Your location is based on data from your profile and is only visible to you. Click the button below to use your browser to detect your location for this session.
This article shows the steps organizations can follow to understand their organization’s IT system and its controls, and assess the effectiveness of those controls.
This article discusses modeling segregation of duties, the management of access controls, and more.
Your location was detected based on your browser location. Update your profile to include a valid physical address.
Your location is based on your IP address. Update your profile to include a valid physical address or click the button below to use your browser to detect your location for this session.
Your location is based on data from your profile and is only visible to you. Click the button below to use your browser to detect your location for this session.