Applying the Three Lines Model In the Public Sector
This release shows the alignment of governance structures in the public sector to The IIA’s Three Lines Model.
Cybersecurity attacks are increasing as the tools for detecting and exploiting vulnerabilities in networked systems and devices become increasingly sophisticated or commoditized. Threatening technologies and methods are advanced by criminal enterprises, state-sponsored hackers, and others with malicious intentions.
Intended to serve as a practical, step-by-step approach for internal audit leaders, this guide summarizes the standards, staffing, and resources needed to successfully plan and implement or improve an internal audit activity in the public sector.
Intended to serve as a practical, step-by-step approach for internal audit leaders, this guide summarizes the standards, staffing, and resources needed to successfully plan and implement or improve an internal audit activity in the public sector.