Information management and technology
Discover a wealth of education, information and resources related to information management and technology. Apply filters to easily narrow results for specialty publications, professional development, Pivot Magazine articles, courses, webinars, blogs and more.
Filters
This guide will help you effectively report on controls for service organizations. Learn how to apply best practices in key service audit areas to ensure compliance with the appropriate standards.
Read about key messages heard at a recent symposium that explored the intersection of technology and ethics, and what that means for the way we do business, run our organizations and manage risk.
This bulletin provides valuable insights into five pressing cybersecurity and privacy themes directors must be aware of to help them oversee modern cyber risks.
June 10, 2019
CPA Canada and the Canadian Auditing and Assurance Standards Board (AASB) have collaborated with regulators, auditors and individuals in the crypto-asset industry to explore auditing approaches to respond to the risks in this evolving industry.
Access the latest versions of WebTrust principles and criteria and non-authoritative practitioner guidance, including illustrative assurance reports.
If the saying "organizations don't disrupt, people do" holds true, what are you doing to experience the benefits of acting differently?
The assurance profession needs to evolve in order to address challenges, seize opportunities and lead change in this era of ongoing disruption. Find recommended actions from experts to help advance the value and relevance of audit.
May 15, 2019
The use of audit data analytics (ADAs) is an important advancement in audit innovation. Learn about CPA Canada's recent initiative on the use of ADAs in Canada.
Find out what auditors from nine public accounting firms are saying about their experiences in applying data analytics to their financial statement audit engagements and how others can leverage their insights.
Learn how your organization can identify key business risks related to information integrity and how to design and implement enablers and controls focused on the objective of information integrity.