Robert E. Davis
Services Offered
Subject Matter Expertise
Most Recent Book Title
Auditing Information and Cyber Security Governance
Book Description
A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
Additional Book Titles
IT Auditing Using a System Perspective; Assuring IT Legal Compliance (Assurance Services Book 1); Assuring IT Governance (Assurance Services Book 2); Assuring Information Security (Assurance Services Book 3); IT Auditing: An Adaptive System; IT Auditing: Assuring Information Assets Protection;
Location (city/state/country)
Author bio
Dr. Robert E. Davis, CISA, CICA unique qualifications encompass over 30 years of internal control practice and scholarship experience. Dr. Davis obtained a Bachelor of Business Administration, a Master of Business Administration, and a Doctor of Business Administration from Temple, West Chester, and Walden University, respectively. He acquired the Certified Information Systems Auditor (CISA) and the Certified Internal Controls Auditor (CICA) certificates. Dr. Davis received Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology and accepted invitations to join the Delta Mu Delta International Honor Society as well as the Golden Key International Honour Society. Moreover, Dr. Davis has provided data security consulting and information systems auditing services to highly regarded government agencies and corporations of various employee sizes.

Dr. Davis authored articles addressing IT issues for ITAudit Magazine, ISACA Journal, TechTarget, and IT Governance, LTD, as well as a chapter discussing continuous auditing for Bloomsbury Information. Dr. Davis has written workbooks and other instructional material for Boson Software and Pleier Corporation. He also peer-reviewed "Comparing eSCM-SP v2 and COBIT" technical report and five chapters of "Effective Auditing for Corporates: Key Developments in Practice and Procedures." Additionally, Dr. Davis is a former ISACA-Philadelphia Chapter Board of Directors' member and Chairman of College Relations.

His past teaching experience includes positions with Temple University, in the Master of Science in IT Auditing and Cyber-Security program, and the undergraduate programs at Bryant & Stratton College and Cheyney University. He has served as a Temple University Master of Science in IT Auditing and Cyber-Security Advisory Councilmen and CISA in Residence. Regarding training individuals in the information systems audit processes, he provided onsite instruction to the Data Processing Management Association, ISACA-Philadelphia Chapter CISA Review Course participants, 3rd Annual Securasia Congress delegates, the Delaware Valley Chapter of the Information Systems Security Association members, and BNAI/Jiangsu Conference attendees. Dr. Davis currently presents webinars for Compliance IQ, Compliance Online, Ijona Services, and Online Compliance Panel registrants and is an Institute for Internal Controls Advisory Board member.
Professional Speaker Topics
IT Auditing, Information Security Governance, IT Compliance, Information Systems Management, Information Systems Risk Management, Information Systems Auditing
Favorite Quote or Personal Motto

Considering what is at stake politically, economically and technically for most organizations; usually justifying IT governance deployment based on one viewpoint narrows suitability and expected benefits.

  • "A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." – Ronald W. Hull, author, poet, and former professor and university administrator

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.