08-14-2003, 12:52 AM
CISA is recognized worldwide, by all industries, as
the preferred designation for IS audit, control and security professionals.
Monetary aspects If we consider Middle East (as most of CA end up there).....CISA is getting 12-15k at the minimum.....
In paksitan, there is not much scope, as companies have yet to explore the idea of CISA.
As CPbian said that its not a very tough exam. Perhaps true....but passing exam is not very much that counts, to become a CISA (thatz getting a Certification), one has to complete 5 years of Computer Audit experience...... Our qualification and experience (CA) will qualify for 2/3 years..... and getting the remaining experience in Pakistan is a tough question indeed.
Min requirements..... Bachelors Degree....
Areas of study as under
Process-based Area
The IS Audit ProcessâConduct IS audits in accordance with generally accepted IS audit standards and guidelines to ensure
that the organizationâs information technology and business systems are adequately controlled, monitored and assessed.
Content Areas
1-Management, Planning and Organization of ISâEvaluate the strategy, policies, standards, procedures and related practices
for the management, planning and organization of IS.
2-Technical Infrastructure and Operational PracticesâEvaluate the effectiveness and efficiency of the organizationâs
implementation and ongoing management of technical and operational infrastructure to ensure that they adequately support
the organizationâs business objectives.
3-Protection of Information AssetsâEvaluate the logical, environmental and IT infrastructure security to ensure that it satisfies
the organizationâs business requirements for safeguarding information assets against unauthorized use, disclosure,
modification, damage or loss.
4-Disaster Recovery and Business ContinuityâEvaluate the process for developing and maintaining documented, communicated
and tested plans for continuity of business operations and IS processing in the event of a disruption.
5-Business Application System Development, Acquisition, Implementation and MaintenanceâEvaluate the methodology and
processes by which the business application system development, acquisition, implementation and maintenance are
undertaken to ensure that they meet the organizationâs business objectives.
6-Business Process Evaluation and Risk ManagementâEvaluate business systems and processes to ensure that risks are
managed in accordance with the organizationâs business objectives.
the preferred designation for IS audit, control and security professionals.
Monetary aspects If we consider Middle East (as most of CA end up there).....CISA is getting 12-15k at the minimum.....
In paksitan, there is not much scope, as companies have yet to explore the idea of CISA.
As CPbian said that its not a very tough exam. Perhaps true....but passing exam is not very much that counts, to become a CISA (thatz getting a Certification), one has to complete 5 years of Computer Audit experience...... Our qualification and experience (CA) will qualify for 2/3 years..... and getting the remaining experience in Pakistan is a tough question indeed.
Min requirements..... Bachelors Degree....
Areas of study as under
Process-based Area
The IS Audit ProcessâConduct IS audits in accordance with generally accepted IS audit standards and guidelines to ensure
that the organizationâs information technology and business systems are adequately controlled, monitored and assessed.
Content Areas
1-Management, Planning and Organization of ISâEvaluate the strategy, policies, standards, procedures and related practices
for the management, planning and organization of IS.
2-Technical Infrastructure and Operational PracticesâEvaluate the effectiveness and efficiency of the organizationâs
implementation and ongoing management of technical and operational infrastructure to ensure that they adequately support
the organizationâs business objectives.
3-Protection of Information AssetsâEvaluate the logical, environmental and IT infrastructure security to ensure that it satisfies
the organizationâs business requirements for safeguarding information assets against unauthorized use, disclosure,
modification, damage or loss.
4-Disaster Recovery and Business ContinuityâEvaluate the process for developing and maintaining documented, communicated
and tested plans for continuity of business operations and IS processing in the event of a disruption.
5-Business Application System Development, Acquisition, Implementation and MaintenanceâEvaluate the methodology and
processes by which the business application system development, acquisition, implementation and maintenance are
undertaken to ensure that they meet the organizationâs business objectives.
6-Business Process Evaluation and Risk ManagementâEvaluate business systems and processes to ensure that risks are
managed in accordance with the organizationâs business objectives.