images

Ms. Barbara Bosche

IT Audit Consultant

Ms. Bosche is a graduate from Columbus State University, Columbus Georgia earning a Master’s Degree in Business Administration and a Bachelor’s degree in Accounting. Barbara has over 15 years of professional expertise in auditing, information technology audit, fraud investigations and accounting with numerous companies in the following industry sectors: financial services, healthcare, retail and manufacturing. Ms. Bosche holds three professional designations: Certified Internal Auditor (CIA), Certified Information Systems Auditor (CISA) and Certified Fraud Examiner (CFE).

Live-webinar by: Ms. Barbara Bosche

    • 60 mins May, 03 2024

      Essentials of IT Auditing for the Non-IT Auditor

      Information Technology

      In the fast-paced and technologically-driven world, we live in today, businesses heavily rely on Information Technology (IT) to sustain their operations. IT has evolved into a vital business enabler, forming the very foundation of modern enterprises and significantly expanding the digital footprint of data collection, processing, storage, and reporting.

      Within this digital landscape, businesses face a pressing challenge - ensuring the security of their IT systems and data. Confidentiality, integrity, and availability are the three critical areas that demand protection through proper safeguards and controls.

      Enter the world of IT Auditing - a crucial process that examines the controls put in place by management to prevent and detect risks in the IT infrastructure. The IT auditor's task is to assess the effectiveness of these controls, ensuring they function as intended.

      With so much at stake, the journey of IT Auditing promises to be a captivating exploration of modern business defenses and the ever-evolving landscape of technology.

Recorded-webinar by: Ms. Barbara Bosche

    • 60 mins

      How To Establish an Effective Chief Compliance Officer's (CCO) or Chief Risk Officer's (CRO) Function - Organization and Responsibilities

      Corporate Governance
    • 60 mins

      Integrating COBIT with COSO and Other Frameworks

      Information Technology

      Internal Control Frameworks have been developed by a variety of governing entities to provide organizations with a tool to build a foundation and strengthen internal controls. 

      In this informative session, the speaker will introduce COBIT (Control Objectives for Information and Related Technology) which is an Information Technology (IT) Governance framework developed by ISACA (Information Systems Audit and Control Association).  The underlying principle of COBIT is to assist organizations with establishing IT Governance starting with “tone at the top” and flowing downward into business units.  Overall, this methodology is outlined by ISACA through the following phases: meeting stakeholder needs, end-to-end coverage within the enterprise, organizational customization, dynamic homeostasis, enabling a holistic approach, and separating governance from management.

    • 60 mins

      Service Level Agreements (SLAs) - Preparation Guidelines for Effective SLAs

      Corporate Governance

      Service Level Agreements (SLAs) have become an important aspect of every company today. This is so primarily from the fact that most companies use some form of service provider in the course of their day-to-day operations. In order for this to happen, an agreement typically an SLA is created that describes the type of service that will be provided by the provider to the client/customer. More specifically, an SLA is a contract which formally defines the service being performed by the provider in addition to detailing various aspects like roles, responsibilities, quality, scope, payment terms and processes.

    • 60 mins

      Service Level Agreements (SLAs) - Preparation Guidelines for Effective SLAs

      Information Technology
    • 60 mins

      Service Level Agreements (SLAs) - Preparation Guidelines for Effective SLAs

      Corporate Governance

      Service Level Agreements (SLAs) have become an important aspect of every company today. This is so primarily from the fact that most companies use some form of the service provider in the course of their day-to-day operations. In order for this to happen, an agreement typically an SLA is created that describes the type of service that will be provided by the provider to the client/customer. More specifically, an SLA is a contract that formally defines the service being performed by the provider in addition to detailing various aspects like roles, responsibilities, quality, scope, payment terms, and processes.

    • 60 mins

      Proactive Incident Response: Crafting an Effective Incident Response Plan (IRP) To Protect Your Organization's Assets

      Information Technology

      Computer incidents occur daily and introduce risks to organizations.  Organizations need to mitigate risks imposed by incidents with guidelines known as an Incident Response Plan (IRP).  An IRP is developed to assist in responding to all incidents effectively and efficiently to protect the organization from financial, operational, and reputational damage.  It is important to understand that several different types of incidents exist with varying ranges of sensitivity requiring a reciprocated response that should be defined in the IRP.  

      This session will discuss the various types of incidents and steps for building an effective IRP for your organization.     

      By attending this webinar, you will gain a better understanding of how to create an effective incident response plan that meets your organization's unique needs and can help you quickly and efficiently respond to security incidents.

    • 60 mins

      Essentials of IT Auditing for the Non-IT Auditor

      Information Technology

      In today’s technological world, businesses are in dire need of Information Technology (IT) to sustain business operations.  As a result, IT has become a critical business enabler supporting the backbone of existence for businesses today which has increased the digital footprint of collecting, processing, storing, and reporting on data.  The major emphasis for any business as it relates to IT systems and data is to implement the proper safeguards (controls) that will protect the three critical areas of IT systems and data which are confidentiality, integrity, and availability.  The very basis of an IT Audit is to examine the controls implemented by management in response to preventing and/or detecting risks in the infrastructure and for the auditor to assess whether the controls implemented are working effectively as designed. 

    • 60 mins

      How To Establish an Effective Chief Compliance Officer's (CCO) or Chief Risk Officer's (CRO) Function - Organization and Responsibilities

      Corporate Governance

      This training will provide valuable knowledge on what companies need to do to establish an "effective" Compliance Office that leads to conceiving, developing and implementing successful GRC programs and provides top level coordinating leadership for governance, risk management and compliance issues across the enterprise.