Auditing Information Security Management

  About the Author 

Robert E. Davis

Robert E. Davis, MBA, CISA, CICA

Robert E. Davis is an independent management audit consultant (currently associated with Robert Half Management Resources), as well as Pleier Corporation author.  His IT audit specializations include Control Objectives for Information and related Technology, Sarbanes-Oxley Act, and the Foreign Corrupt Practices Act.  Regarding information security and privacy, Robert is available to provide International Organization for Standardization-27000, Gramm-Leach-Bliley Act, and Basel II consulting.  His primary computer technology research interests are databases, operating systems, and distributed information systems processing. 

Recently, he has applied his expertise in assisting organizations in fulfilling U.S. Sarbanes-Oxley and Federal Information Security Management Act requirements as well as training professionals internationally.  

Since starting his career as an IT auditor, Robert has provided data security consulting and IT auditing services (from staff through senior management positions) to the United States Enrichment Corporation, Raytheon Company, United States Interstate Commerce Commission, Dow Jones & Company, Fidelity/First Fidelity (Wachovia) Corporations, and other organizations.

Some of his professional IT software and hardware experience includes MVS, UNIX, Windows, Oracle, Clarity, the International Money Management System, PERL, COBOL, PASCAL, DEC, IBM, Tandem, Compaq, and DELL.  

Robert graduated from Temple University and West Chester University of Pennsylvania with a Bachelor of Business Administration and Master of Business Administration degree, respectively.  While attending Temple University, his major areas of study were Business Law and Accounting.  He successfully completed the requirements for a Management Information Systems subject major at West Chester University.  

During his twenty-year professional involvement in education, Robert acquired postgraduate and professional technical licenses in computer science and computer systems technology.  

Robert has authored "Did IT Auditing Forget the Foreign Corrupt Practice Act" and "How Does Management Support Deploying IT Governance?" articles for IT AUDIT magazine and IT Governance, LTD; respectively.

Robert is a former ISACA-Philadelphia Chapter Board of Directors member and College Relations Chairman.  Robert has provided instruction to an Internet CISA study group, the Data Processing Management Association, and the ISACA-Philadelphia Chapter CISA Review Course.

Robert is a member of The Institute of Internal Auditors, ISACA, the American Association of University Professors, and The Institute for Internal Controls.  He is also a college computer science and mathematics instructor, having previously taught at Cheyney University and Bryant & Stratton College.  

Based on his accomplishments, Robert has been featured in Temple University's Fox School of Business Alumni Newsletter and The Institute for Internal Controls e-Newsletter.  Furthermore, he is a lifetime member of the Madison Who's Who Registry of Executives and Professionals.

Robert has authored 8 indispensable resources including the individual publications included in this combination available from Pleier Corporation:

These publications are also especially valuable references to prepare for related sections of the ISACA Certified Information Systems Auditors examination. 

Additional references and information is available at
Have CISA - Will Travel.

3 CDs  

Auditing Information Security Management

The 2010 AICPA Top Technology Initiatives Survey Results, as expected, ranked Information Security Management number as the most important initiative affecting IT strategy, investment and implementation in business organizations over the next 12 to 18 months.   - click for details.

The survey identified "Information Security Management" as including the people, processes and systems used to protect an organization’s information from both internal and external threats secured by:

          * Ensuring proper processes are in place to grant access only to authorized individuals or entities,

          * Preserving the confidentiality of, and restricting unauthorized access to, your organization’s information, and

          * Distinguishing which information is made available to those who are authorized and what they can do with that information.

Robert E. Davis' combination of 3 CD-ROMs provides auditors with tools and techniques to better address this most important issue of
"Information Security Management" in the titles of "IT Auditing: Information Security Governance", "IT Auditing: Information Assets Protection", and "IT Auditing: Assuring Information Assets Protection". 

Robert E. Davis shares his vast experince on these
3 CD-ROMs titles containing over 950 PowerPoint slides, 190-pages of administator / seminar leader guides, 85-pages of  participant guides, and 265-page publication.

Purchasers of this set of CD-ROM’s pay $50.00 less than purchasing these CD-ROM’s individually.

For details about “IT Auditing: Assuring Information Assets Protection” see

For details about “IT Auditing: Information Assets Protection” see

For details about "IT Auditing: Information Security Governance see

Order Online

Your feedback, concerning this product, should be sent to

Purchase Individual CD-ROM Titles
and Other Resources

If you like the quality of this CD-ROM publication check for additional resources.

Current Publications - Click the link to preview:

Print Order Form - PDF

Print Order Form - Word Document

Order Online

Thank you for purchasing a copy of the "IT Auditing: Assuring Information Assets Protection".

Please tell others about these resources.

Thank you.

Joseph R Pleier


Pleier Corporation