Annual Conference 2014

Resource Type: 
Annual Conference
AttachmentSize
ACUIA Conference Pocket Schedule 2014.pdf977.82 KB
ACUIA Conference Program 2014.pdf9.77 MB
One-Day 2 - Auditing 101.pdf5.64 MB
One-Day 3 - Regulatory Compliance Overview and Update.pdf10.62 MB
Gen-Ses 4 - ERM The New Frontier.pdf319.9 KB
Gen-Ses 5 - Our Industry-A Look At Today.pdf2.82 MB
Gen-Ses 6 - NCUA Update and Outlook.pdf1.41 MB
Gen-Ses 8 - CyberSecurity Framework.pdf848.47 KB
1A - How Internal Audit Can Help Promote Effective ERM.pdf1.18 MB
1B - Social Engineering Audit.pdf649.58 KB
1C - Best Practices for a Highly Effective IA Function.pdf1.01 MB
1D - What Happens When the Devil Knocks on Your Door.pdf3.15 MB
2A - Incident Response and Forensic Prepardness.pdf1.19 MB
2B - Supervisory Committee Expectations of IA.pdf538.51 KB
2C - Fraud Investigations From A-Z.pdf1.78 MB
2D - ALLL Current Expected Credit Loss Model.pdf764.27 KB
3A - Roles and Responsibilities of the Supervisory Committee.pdf843.5 KB
3B - Fraud Prevention and Detection.pdf1.21 MB
3C - Branch Audit Best Practices.pdf892.26 KB
3C - A. RCU Branch Risk Assessment - Template.xlsx21.4 KB
3C - B. RCU Quarterly Branch Control Checklist - Template.doc205 KB
3C - C. Quarterly Control Attestation of Controls.doc29 KB
3C - D. RCU Branch Audit Program - Template.doc138.5 KB
3C - E. RCU 2013 Branch Audit Detail Report - Example.doc74 KB
3C - F. RCU 2013 Branch Audit Executive Summary - Example.doc70.5 KB
3C - G. Status of Recommendations.doc37 KB
3D - Risk Assessment for GLBA DDoS Intenet Banking etc.pdf3.53 MB
4A - Top 10 IT Security Hot Spots.pdf244.58 KB
4B - Risk Governance.pdf1.88 MB
4C - Performing Effective MBL Reviews.pdf509.97 KB
4D - Analyzing The Strengths and Weaknesses of the SSAE No 16.pdf177.13 KB
5A - Third Party Vendor Management.pdf388.36 KB
5B - Supervisory Committee Best Practices.pdf1.15 MB
5D - Auditing the NCUA 5300 Call Report.pdf778.93 KB