A data breach – whether caused by external bad actors or a trusted insider- can be disastrous, precipitating complex legal obligations, costly remediation, and long-lasting reputational damage. Cyberattacks and accidental misconfigurations are top concerns among boards, executive management, and other organizational stakeholders. Internal auditors are expected to assess an organization's defenses and its ability to recover should an event occur. Are you up for the challenge?
DESIGNED FOR
Those who have Fundamentals of IT Auditing or some previous IT auditing experience.
BENEFITS
Date(s) and Time:Nov 18, 19, 20, 21, 23 from 11:30 AM - 3:00 PM ET
This course examines various technology concepts that can be used to facilitate integrated auditing efforts within an organization, including:
- Auditing Operational Resiliency in Technology and Beyond
- Auditing the Automation Center of Excellence
- Auditing the Security Operations Center (SOC).
- Auditing Identity Access Management, Zero Trust, and Microsegmentation.
- Auditing the Cloud
- Auditing Mobile Computing and Connected Devices
- Auditing Social Media and Digital Presence
Other Date(s) and Time: Jul 30, Aug 1, 6, 8 from 12:30 PM - 4:50 PM ET
HIGHLIGHTS
Participants of this course will examine the connection between cybersecurity and network security, obtain greater insight into the pros and cons of technology insurance, and explore how to apply the audit process to key areas, including operational resilience, identity access manage, cloud computing, , mobile computing, cloud environments, and social media. Finally, the course explores common cyber-related frameworks, standards, and guidelines, and explains how to audit common cybersecurity solutions.
COURSE LEVEL
Intermediate
PREREQUISITES
None
ADVANCE PREPARATION
None