SlideShare a Scribd company logo
Audit
Introduction
IT Audit Roles and Responsibilities
Independence and Staffing of Internal IT Audit
Internal Audit Program
Risk Assessment and Risk-Based Auditing
Audit Participation in Application Development, Acquisition, Conversions, and
Testing
Outsourcing Internal IT Audit
Third-Party Reviews of Technology Service Providers
Appendix A: Examination Procedures
Appendix B: Glossary
Appendix C: Laws Regulations
Business Continuity
Introduction
Board and Senior Management Responsibilities
Business Continuity Planning Process
Business Impact Analysis
Risk Assessment
Risk Management
Risk Monitoring and Testing
Other Policies, Standards and Processes
Summary
Appendix A: Examination Procedures
Appendix B: Glossary
Appendix C: Internal And External Threats
Appendix D: Pandemic Planning
Appendix E: Interdependencies
Appendix F: Business Impact Analysis Process
Appendix G: Business Continuity Plan Components
Appendix H: Testing Program - Governance and Attributes
Appendix I: Laws, Regulations, and Guidance
Appendix J: Strengthening the Resilience of Outsourced Technology Services
Development and Acquisition
Introduction
Project Management
Development Procedures
Acquisition
Maintenance
Appendix A: Examination Procedures
Appendix B: Glossary
E-Banking
Introduction
Board and Senior Management Responsibilities
Business Continuity Planning Process
Business Impact Analysis
Risk Assessment
Risk Management
Risk Monitoring and Testing
Other Policies, Standards and Processes
Summary
Appendix A: Examination Procedures
Appendix B: Glossary
Appendix C: Internal And External Threats
Appendix D: Pandemic Planning
Appendix E: Interdependencies
Appendix F: Business Impact Analysis Process
Appendix G: Business Continuity Plan Components
Appendix H: Testing Program - Governance and Attributes
Appendix I: Laws, Regulations, and Guidance
Appendix J: Strengthening the Resilience of Outsourced Technology Services
Information Security
Introduction
Security Process
Information Security Risk Assessment
Information Security Strategy
Security Controls Implementation
Security Monitoring
Security Process Monitoring and Updating
Appendix A: Examination Procedures
Appendix B: Glossary
Appendix C: Laws Regulations
Management
Introduction
Risk Overview
Roles and Responsibilities
IT Risk Management Process
Management Considerations for Technology
Appendix A: Examination Procedures
Appendix B: Laws, Regulations,and Guidance
Operations
Introduction
Roles and Responsibilities
Risk Identification
Risk Assessment
Risk Mitigation and Control Implementation
Risk Monitoring and Reporting
Appendix A: Examination Procedures
Appendix B: Glossary
Appendix C: Item Processing
Appendix D: Advanced Data Storage Solutions
Outsourcing Tech Services
Introduction
Board and Management Responsibilities
Risk Management
Related Topics
Appendix A: Examination Procedures
Appendix B: Laws, Regulations, and Guidance
Appendix C: Foreign-Based Third-Party Service Providers
Appendix D: Managed Security Service Providers
Retail Payment Systems
Introduction
Retail Payment Systems Overview
Payment Instruments, Clearing, and Settlement
Retail Payment Systems Risk Management
Appendix A: Examination Procedures
Appendix B: Glossary
Appendix C: Schematic of Retail Payments Access Channels Payments Method
Appendix D: Laws, Regulations, and Guidance
Supervision Tech Service Providers
Introduction
Supervisory Policy
Supervisory Programs
Roles and Responsibilities
Risk-Based Supervision
Appendix A: URSIT
Wholesale Payment Systems
Introduction
Interbank Payment and Messaging Systems
Securities Settlement Systems
Intrabank Payment and Messaging Systems
Wholesale Payment Systems Risk Management
Appendix A: Examination Procedures
Appendix B: Glossary
Appendix C: Laws, Regulations and Guidance
Appendix D: Legal Framework for Interbank Payment Systems
Appendix E: Fed Reserve Board Payment System Risk Policy: Day Overdrafts
Appendix F: Payment System Resiliency

More Related Content

Viewers also liked

0912905강소희 모션기말
0912905강소희 모션기말0912905강소희 모션기말
0912905강소희 모션기말flyss29
 
校园APP设计方案V1.6.2-2013级A班
校园APP设计方案V1.6.2-2013级A班校园APP设计方案V1.6.2-2013级A班
校园APP设计方案V1.6.2-2013级A班xiaolong zheng
 
slayers current cv
slayers current cvslayers current cv
slayers current cvSlayer Panga
 
AAA Driving & THC
AAA Driving & THCAAA Driving & THC
AAA Driving & THC
Paul Coelho, MD
 
Тартылыс құбылысы. Ауырлық күші
Тартылыс құбылысы. Ауырлық күшіТартылыс құбылысы. Ауырлық күші
Тартылыс құбылысы. Ауырлық күші
AsSad1972
 
QM-075-TQS管理實務
QM-075-TQS管理實務QM-075-TQS管理實務
QM-075-TQS管理實務handbook
 
тізбек бөлігі үшін ом заңы
тізбек бөлігі үшін ом заңытізбек бөлігі үшін ом заңы
тізбек бөлігі үшін ом заңы
Айбек Қуандықұлы
 
Cannabis Science & Policy Summit - Day 2 - Sterling
Cannabis Science & Policy Summit - Day 2 - SterlingCannabis Science & Policy Summit - Day 2 - Sterling
Cannabis Science & Policy Summit - Day 2 - Sterling
CannabisSummit
 
Cannabis Science & Policy Summit - Day 1 - Midgette
Cannabis Science & Policy Summit - Day 1 - MidgetteCannabis Science & Policy Summit - Day 1 - Midgette
Cannabis Science & Policy Summit - Day 1 - Midgette
CannabisSummit
 

Viewers also liked (9)

0912905강소희 모션기말
0912905강소희 모션기말0912905강소희 모션기말
0912905강소희 모션기말
 
校园APP设计方案V1.6.2-2013级A班
校园APP设计方案V1.6.2-2013级A班校园APP设计方案V1.6.2-2013级A班
校园APP设计方案V1.6.2-2013级A班
 
slayers current cv
slayers current cvslayers current cv
slayers current cv
 
AAA Driving & THC
AAA Driving & THCAAA Driving & THC
AAA Driving & THC
 
Тартылыс құбылысы. Ауырлық күші
Тартылыс құбылысы. Ауырлық күшіТартылыс құбылысы. Ауырлық күші
Тартылыс құбылысы. Ауырлық күші
 
QM-075-TQS管理實務
QM-075-TQS管理實務QM-075-TQS管理實務
QM-075-TQS管理實務
 
тізбек бөлігі үшін ом заңы
тізбек бөлігі үшін ом заңытізбек бөлігі үшін ом заңы
тізбек бөлігі үшін ом заңы
 
Cannabis Science & Policy Summit - Day 2 - Sterling
Cannabis Science & Policy Summit - Day 2 - SterlingCannabis Science & Policy Summit - Day 2 - Sterling
Cannabis Science & Policy Summit - Day 2 - Sterling
 
Cannabis Science & Policy Summit - Day 1 - Midgette
Cannabis Science & Policy Summit - Day 1 - MidgetteCannabis Science & Policy Summit - Day 1 - Midgette
Cannabis Science & Policy Summit - Day 1 - Midgette
 

Similar to FFIEC I.T. Booklets Topology

What is Employee Spend Management
What is Employee Spend ManagementWhat is Employee Spend Management
What is Employee Spend ManagementSean Goldie
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingThomas Donofrio
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
TCG Svcs Pres 2011
TCG Svcs Pres 2011TCG Svcs Pres 2011
TCG Svcs Pres 2011mcourton
 
Kansas Elsas Top-Cycle
Kansas Elsas Top-CycleKansas Elsas Top-Cycle
Kansas Elsas Top-Cycle
Philip Elsas
 
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overviewThierry Brunet
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
Laura Perry
 
1. Which of the following elements ensures a policy is enforceab
1. Which of the following elements ensures a policy is enforceab1. Which of the following elements ensures a policy is enforceab
1. Which of the following elements ensures a policy is enforceab
careyshaunda
 
Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto Series
Continuity Control
 
Mela Capital Group Fnma Qc V3
Mela Capital Group Fnma Qc V3Mela Capital Group Fnma Qc V3
Mela Capital Group Fnma Qc V3
Cindi Dixon
 
Mela Capital Group Fnma Qc V2
Mela Capital Group Fnma Qc V2Mela Capital Group Fnma Qc V2
Mela Capital Group Fnma Qc V2
Cindi Dixon
 
Exin ex0 100 - itil foundations v3 (1)
Exin ex0 100 - itil foundations v3 (1)Exin ex0 100 - itil foundations v3 (1)
Exin ex0 100 - itil foundations v3 (1)
BaskarRS
 
Jzanzig auditing ch 13 lecture
Jzanzig auditing ch 13 lectureJzanzig auditing ch 13 lecture
Jzanzig auditing ch 13 lecturecasahiljain1992
 
The Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdfThe Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdf
Fiyona Nourin
 
DISA 3-qbank with exp.docx
DISA 3-qbank with exp.docxDISA 3-qbank with exp.docx
DISA 3-qbank with exp.docx
CAVEDPRAKASHPALIWAL
 
DISA 3-qbank with exp.docx
DISA 3-qbank with exp.docxDISA 3-qbank with exp.docx
DISA 3-qbank with exp.docx
CAVEDPRAKASHPALIWAL
 
Process Measurement - BPM Roundtable QLD
Process Measurement - BPM Roundtable QLDProcess Measurement - BPM Roundtable QLD
Process Measurement - BPM Roundtable QLD
Leonardo Consulting
 
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docxChapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
mccormicknadine86
 

Similar to FFIEC I.T. Booklets Topology (20)

What is Employee Spend Management
What is Employee Spend ManagementWhat is Employee Spend Management
What is Employee Spend Management
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet Banking
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
TCG Svcs Pres 2011
TCG Svcs Pres 2011TCG Svcs Pres 2011
TCG Svcs Pres 2011
 
Kansas Elsas Top-Cycle
Kansas Elsas Top-CycleKansas Elsas Top-Cycle
Kansas Elsas Top-Cycle
 
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overview
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
1. Which of the following elements ensures a policy is enforceab
1. Which of the following elements ensures a policy is enforceab1. Which of the following elements ensures a policy is enforceab
1. Which of the following elements ensures a policy is enforceab
 
Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto Series
 
Mela Capital Group Fnma Qc V3
Mela Capital Group Fnma Qc V3Mela Capital Group Fnma Qc V3
Mela Capital Group Fnma Qc V3
 
Mela Capital Group Fnma Qc V2
Mela Capital Group Fnma Qc V2Mela Capital Group Fnma Qc V2
Mela Capital Group Fnma Qc V2
 
Exin ex0 100 - itil foundations v3 (1)
Exin ex0 100 - itil foundations v3 (1)Exin ex0 100 - itil foundations v3 (1)
Exin ex0 100 - itil foundations v3 (1)
 
Jzanzig auditing ch 13 lecture
Jzanzig auditing ch 13 lectureJzanzig auditing ch 13 lecture
Jzanzig auditing ch 13 lecture
 
The Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdfThe Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdf
 
RISE's Training Catalog
RISE's Training CatalogRISE's Training Catalog
RISE's Training Catalog
 
DISA 3-qbank with exp.docx
DISA 3-qbank with exp.docxDISA 3-qbank with exp.docx
DISA 3-qbank with exp.docx
 
DISA 3-qbank with exp.docx
DISA 3-qbank with exp.docxDISA 3-qbank with exp.docx
DISA 3-qbank with exp.docx
 
Process Measurement - BPM Roundtable QLD
Process Measurement - BPM Roundtable QLDProcess Measurement - BPM Roundtable QLD
Process Measurement - BPM Roundtable QLD
 
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docxChapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
 
Presentation_IA Focus
Presentation_IA FocusPresentation_IA Focus
Presentation_IA Focus
 

More from Jason Rusch - CISSP CGEIT CISM CISA GNSA

NIST sp800 53-v4 Topology
NIST sp800 53-v4 TopologyNIST sp800 53-v4 Topology
NIST sp800 53-v4 Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
ISO.IEC 27001 27002-2013
ISO.IEC 27001 27002-2013ISO.IEC 27001 27002-2013
ISO.IEC 27000 Series Map
ISO.IEC 27000 Series MapISO.IEC 27000 Series Map
Cobit v5 High Level Controls Topology
Cobit v5 High Level Controls TopologyCobit v5 High Level Controls Topology
Cobit v5 High Level Controls Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
Cobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance TopologyCobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
GLBA Topology
GLBA TopologyGLBA Topology
HIPAA Topology
HIPAA TopologyHIPAA Topology
ISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 TopologyISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
PCI-DSS DESV Topology
PCI-DSS DESV TopologyPCI-DSS DESV Topology
DATA PROTECTION LAWS OF THE WORLD
DATA PROTECTION LAWS OF THE WORLDDATA PROTECTION LAWS OF THE WORLD
DATA PROTECTION LAWS OF THE WORLD
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
Common Security Framework Summary
Common Security Framework SummaryCommon Security Framework Summary
Common Security Framework Summary
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
Information_Governance_Risk_Compliance_Frameworks (v5)
Information_Governance_Risk_Compliance_Frameworks (v5)Information_Governance_Risk_Compliance_Frameworks (v5)
Information_Governance_Risk_Compliance_Frameworks (v5)
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
SOX Titles Topology
SOX Titles TopologySOX Titles Topology
ITIL v3 Topology
ITIL v3 TopologyITIL v3 Topology
HITRUST CSF Topology
HITRUST CSF TopologyHITRUST CSF Topology
HIPAA Topology
HIPAA TopologyHIPAA Topology
GLBA Topology
GLBA TopologyGLBA Topology
COSO ERM Topology
COSO ERM TopologyCOSO ERM Topology
Octave Topology
Octave TopologyOctave Topology

More from Jason Rusch - CISSP CGEIT CISM CISA GNSA (20)

NIST sp800 53-v4 Topology
NIST sp800 53-v4 TopologyNIST sp800 53-v4 Topology
NIST sp800 53-v4 Topology
 
CSA v4 Topology
CSA v4 TopologyCSA v4 Topology
CSA v4 Topology
 
ISO.IEC 27001 27002-2013
ISO.IEC 27001 27002-2013ISO.IEC 27001 27002-2013
ISO.IEC 27001 27002-2013
 
ISO.IEC 27000 Series Map
ISO.IEC 27000 Series MapISO.IEC 27000 Series Map
ISO.IEC 27000 Series Map
 
Cobit v5 High Level Controls Topology
Cobit v5 High Level Controls TopologyCobit v5 High Level Controls Topology
Cobit v5 High Level Controls Topology
 
Cobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance TopologyCobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance Topology
 
GLBA Topology
GLBA TopologyGLBA Topology
GLBA Topology
 
HIPAA Topology
HIPAA TopologyHIPAA Topology
HIPAA Topology
 
ISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 TopologyISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 Topology
 
PCI-DSS DESV Topology
PCI-DSS DESV TopologyPCI-DSS DESV Topology
PCI-DSS DESV Topology
 
DATA PROTECTION LAWS OF THE WORLD
DATA PROTECTION LAWS OF THE WORLDDATA PROTECTION LAWS OF THE WORLD
DATA PROTECTION LAWS OF THE WORLD
 
Common Security Framework Summary
Common Security Framework SummaryCommon Security Framework Summary
Common Security Framework Summary
 
Information_Governance_Risk_Compliance_Frameworks (v5)
Information_Governance_Risk_Compliance_Frameworks (v5)Information_Governance_Risk_Compliance_Frameworks (v5)
Information_Governance_Risk_Compliance_Frameworks (v5)
 
SOX Titles Topology
SOX Titles TopologySOX Titles Topology
SOX Titles Topology
 
ITIL v3 Topology
ITIL v3 TopologyITIL v3 Topology
ITIL v3 Topology
 
HITRUST CSF Topology
HITRUST CSF TopologyHITRUST CSF Topology
HITRUST CSF Topology
 
HIPAA Topology
HIPAA TopologyHIPAA Topology
HIPAA Topology
 
GLBA Topology
GLBA TopologyGLBA Topology
GLBA Topology
 
COSO ERM Topology
COSO ERM TopologyCOSO ERM Topology
COSO ERM Topology
 
Octave Topology
Octave TopologyOctave Topology
Octave Topology
 

Recently uploaded

Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
Colin R. Turner
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
egoetzinger
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
DOT TECH
 
G20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summitG20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summit
rohitsaxena882511
 
Globalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdfGlobalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdf
VohnArchieEdjan
 
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdfTumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Henry Tapper
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
DOT TECH
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
DOT TECH
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
DOT TECH
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
DOT TECH
 
Seminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership NetworksSeminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership Networks
GRAPE
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
obyzuk
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 
Patronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptcPatronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptc
AbdulNasirNichari
 
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
University of Calabria
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 

Recently uploaded (20)

Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
 
G20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summitG20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summit
 
Globalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdfGlobalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdf
 
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdfTumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
 
Seminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership NetworksSeminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership Networks
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 
Patronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptcPatronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptc
 
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 

FFIEC I.T. Booklets Topology

  • 1. Audit Introduction IT Audit Roles and Responsibilities Independence and Staffing of Internal IT Audit Internal Audit Program Risk Assessment and Risk-Based Auditing Audit Participation in Application Development, Acquisition, Conversions, and Testing Outsourcing Internal IT Audit Third-Party Reviews of Technology Service Providers Appendix A: Examination Procedures Appendix B: Glossary Appendix C: Laws Regulations Business Continuity Introduction Board and Senior Management Responsibilities Business Continuity Planning Process Business Impact Analysis Risk Assessment Risk Management Risk Monitoring and Testing Other Policies, Standards and Processes Summary Appendix A: Examination Procedures Appendix B: Glossary Appendix C: Internal And External Threats Appendix D: Pandemic Planning Appendix E: Interdependencies Appendix F: Business Impact Analysis Process Appendix G: Business Continuity Plan Components Appendix H: Testing Program - Governance and Attributes Appendix I: Laws, Regulations, and Guidance Appendix J: Strengthening the Resilience of Outsourced Technology Services Development and Acquisition Introduction Project Management Development Procedures Acquisition Maintenance Appendix A: Examination Procedures Appendix B: Glossary E-Banking Introduction Board and Senior Management Responsibilities Business Continuity Planning Process Business Impact Analysis Risk Assessment Risk Management Risk Monitoring and Testing Other Policies, Standards and Processes Summary Appendix A: Examination Procedures Appendix B: Glossary Appendix C: Internal And External Threats Appendix D: Pandemic Planning Appendix E: Interdependencies Appendix F: Business Impact Analysis Process Appendix G: Business Continuity Plan Components Appendix H: Testing Program - Governance and Attributes Appendix I: Laws, Regulations, and Guidance Appendix J: Strengthening the Resilience of Outsourced Technology Services Information Security Introduction Security Process Information Security Risk Assessment Information Security Strategy Security Controls Implementation Security Monitoring Security Process Monitoring and Updating Appendix A: Examination Procedures Appendix B: Glossary Appendix C: Laws Regulations Management Introduction Risk Overview Roles and Responsibilities IT Risk Management Process Management Considerations for Technology Appendix A: Examination Procedures Appendix B: Laws, Regulations,and Guidance Operations Introduction Roles and Responsibilities Risk Identification Risk Assessment Risk Mitigation and Control Implementation Risk Monitoring and Reporting Appendix A: Examination Procedures Appendix B: Glossary Appendix C: Item Processing Appendix D: Advanced Data Storage Solutions Outsourcing Tech Services Introduction Board and Management Responsibilities Risk Management Related Topics Appendix A: Examination Procedures Appendix B: Laws, Regulations, and Guidance Appendix C: Foreign-Based Third-Party Service Providers Appendix D: Managed Security Service Providers Retail Payment Systems Introduction Retail Payment Systems Overview Payment Instruments, Clearing, and Settlement Retail Payment Systems Risk Management Appendix A: Examination Procedures Appendix B: Glossary Appendix C: Schematic of Retail Payments Access Channels Payments Method Appendix D: Laws, Regulations, and Guidance Supervision Tech Service Providers Introduction Supervisory Policy Supervisory Programs Roles and Responsibilities Risk-Based Supervision Appendix A: URSIT Wholesale Payment Systems Introduction Interbank Payment and Messaging Systems Securities Settlement Systems Intrabank Payment and Messaging Systems Wholesale Payment Systems Risk Management Appendix A: Examination Procedures Appendix B: Glossary Appendix C: Laws, Regulations and Guidance Appendix D: Legal Framework for Interbank Payment Systems Appendix E: Fed Reserve Board Payment System Risk Policy: Day Overdrafts Appendix F: Payment System Resiliency