ISACA

Location
3701 Algonquin Road, Suite 1010, Rolling Meadows, IL
Website
https://www.isaca.org
More Events

Upcoming ISACA Events

ITAF 5: The Evolving Role of Audit in the Digital Enterprise

Apr 14, 2026

Virtual / Online

ISACA

It has been six years since the IT Audit Framework (ITAF) was last updated, and the operating environment has changed significantly. Technology now executes transactions, connects organizations through third-party ecosystems, and increasingly makes decisions through automation and AI. As a result, audit teams face new questions: Can automated outcomes be trusted? Who owns third-party risk? Why wasn’t audit involved earlier?

ITAF 5 reflects these expectations.

This session translates the framework into practice, explaining how assurance expands beyond traditional control testing to evaluating system-driven outcomes. Participants will learn how to adapt audit approaches and provide forward-looking risk insight while maintaining independence.

Learning Objectives:

  • Why the Framework Changed: Explain how ITAF 5 reflects the shift to digitally enabled business operations and evolving assurance expectations
  • Where Risk Now Lives: Identify how risk moves from manual processes to system configurations, integrations, third-party platforms, and automated decisions
  • What Auditors Must Learn: Recognize the evolving skills auditors need, including evaluating automated and AI-driven outcomes and collaborating across technical and business teams
  • How Audit Must Adapt: Describe how audit functions should modernize their approach through analytics, continuous assurance, and supporting technology tools

Apr 16, 2026

Virtual / Online

Access risk and control models designed for single ERP environments no longer reflect how modern enterprises operate at scale. As organizations expand across procurement, HR, finance, and other line-of-business applications, access governance becomes distributed, business-owned, and increasingly complex. This session examines how enterprise-wide access risk evolves across ERP and critical business systems in real-world operating environments, and why traditional controls such as segregation of duties, user access reviews, and privileged access processes struggle to keep pace. Attendees will gain insight into how access governance must adapt to support modern governance and assurance expectations across the enterprise.

May 14, 2026

Virtual / Online

Has the focus of Data Access Governance really changed in the face of an AI powered economy? Fundamentally the tried-and-true process of Data Access Governance requires a metered and prescriptive approach. During this discussion we will unpack the blocking and tackling of a solid Identity focused, Data Access Governance program that can help security practitioners navigate choppy waters.
View all