Dr. Robert E. Davis

Area Of Expertise : IT
25 Years Of Experience
Training Industry : Multi Industry

Dr. Robert E. Davis, MBA, DBA, CISA, CICA (an invited Golden Key and Delta Mu Delta member) obtained a Bachelor of Business Administration degree in Accounting and Business Law and a Master of Business Administration degree in Management Information Systems from Temple and West Chester University; respectively. In addition, during his twenty years of involvement in education, Robert acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Robert also obtained the Certified Information Systems Auditor (CISA) certificate — after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the Certified Internal Controls Auditor (CICA) certificate by the Institute for Internal Controls. Robert was awarded the Doctor of Business Administration degree specializing in Information Systems Management by Walden University. 

Since starting his career as an information systems (IS) auditor, Robert has provided data security consulting and IS auditing services to the United States Securities and Exchange Commission, United States Enrichment Corporation, Raytheon Company, United States Interstate Commerce Commission, Dow Jones & Company and Fidelity/First Fidelity (Wells Fargo) corporations as well as other organizations; in staff through management positions.
 

22 results Found
Live Webinar

On The Alert: Software License Audit Readiness

There are numerous global, regional as well as national laws and regulations focusing on information assets protection that require professional consideration. Notably, at the global level, the World Intellectual Property Organization and t ...

  • Intermediate
  • 60 Mins
  • Jul 15, 2020
Live Webinar

Why Management System Audit Programs Should Utilize ISO 19011:2018

Individual audit objectives and practices vary considerably from entity to entity, and there are many kinds of practitioners in audit-related activities, such as external auditors, internal auditors, self-assessment evaluators, quality revi ...

  • Basic & Intermediate & Advanced
  • 60 Mins
  • Jul 29, 2020
Recorded Webinar

How ISO/IEC 27001 Can Help Achieve CCPA Compliance

Organizations had until 1 January 2020 to comply with the CCPA. Although there is no confirmed direct relationship between the CCPA requirements and information security, the tasks, activities, processes and system changes needed for CCPA c ...

  • Basic & Intermediate
  • 60 Mins
Recorded Webinar

Managerial Primer for Ensuring Information Security

Usually, a formal ISG program is required to promote information assets safeguarding. ISG programs should ensure the Control Objectives for Information and related Technology (COBIT) framework confidentiality, integrity, availability, compl ...

  • Basic & Intermediate
  • 60 Mins
Recorded Webinar

How ISO/IEC 27001 Can Help Achieve CCPA Compliance

Organizations had until 1 January 2019 to comply with the CCPA. Although there is no confirmed direct relationship between the CCPA requirements and information security, the tasks, activities, processes and system changes needed for CCPA c ...

  • Basic & Intermediate
  • 60 Mins
On-Demand Webinar

Essentials of IT Auditing for the Non-IT Auditor

Information Technology (IT) is a critical enabler of business. As computing power has advanced, enterprises have become increasingly dependent on technology to carry out their operational requirements and to collect, process, maintain and r ...

  • Basic & Intermediate
  • 60 Mins
Recorded Webinar

On the alert: Software License Audit Readiness

There are numerous global, regional as well as national laws and regulations focusing on information assets protection that require professional consideration. Notably, at the global level, the World Intellectual Property Organization and t ...

  • Intermediate
  • 60 Mins
On-Demand Webinar

Guidelines for Performing a Corporate-Wide Internal IT Audit Risk Assessment

Performing a corporate-wide Risk Assessment can seem like a daunting task for an organization. In reality, it can be done using a template and brainstorming with internal auditors, certified fraud examiners and business unit leaders through ...

  • Basic & Intermediate & Advanced
  • 90 Mins
Recorded Webinar

Developing and Implementing a Business Continuity Audit Program

Business continuity has been generally defined as a comprehensive managed effort to prioritize key business processes identifying significant threats to normal operations that permit planning strategies for ensuring effective and efficient ...

  • Basic & Intermediate & Advanced
  • 90 Mins
Recorded Webinar

IT Auditing: How to Apply Analytical Procedures for Meaningful Analysis

Information systems necessitate a high degree of reliability and integrity, considering the effect on decisions. This condition is a result of the constant need to extract system-generated information as opposed to manually created informat ...

  • Basic & Intermediate
  • 60 Mins