Professional Training

Cybersecurity Risks from an Audit Manager’s Perspective

ACI Learning, In Worldwide
Length
2 days
Next course start
Enquire for dates and prices See details
Course delivery
In Company
Length
2 days
Next course start
Enquire for dates and prices See details
Course delivery
In Company

Cybersecurity Risks from an Audit Manager’s Perspective

Cybersecurity Risks from an Audit Manager's Perspective

New regulations, increasing IT security threats and staff shortages challenge audit management to address the organization's IT risks. This course covers recent security breaches to put into perspective a strategy to help avoid devastating harm to the organization's reputation from these headline-making security breaches. This course provides working knowledge of IT terms and concepts; updates on new and emerging technologies affecting your business, and ways to establish a strategic response.

Upcoming start dates

1 start date available

Enquire for dates and prices

  • In Company
  • Worldwide

Suitability - Who should attend?

Internal audit seniors, managers and senior managers involved with identifying, assessing and reporting on the technology-related risks for their internal audit projects or for the internal audit risk assessment

Prerequisites

  • Fundamentals of Internal Auditing - OAG101
  • Equivalent Experience

Outcome / Qualification etc.

NASBA Certified CPE: 16 Credits Auditing

Information Security Certificate

What You'll learn

You will learn about a wide range of technologies, the challenges posed by technological change, and ways to provide assurance that IT risks are being adequately addressed.

Training Course Content

IT Risks:

  • update on recent security breaches
  • data breach commonalities
  • how hackers are hacking
  • IT risk definitions
  • information security objectives
  • IT audit engagement strategies
  • IT control categories

Basics of Information Technology - Battling the Buzzwords:

  • why learn about technology?
  • defining cyberspace & cybersecurity
  • Operating Systems (OS)
  • mainframe & client/server technology
  • middleware
  • virtualization / virtual servers
  • network environment

Logical Security Risks and Controls:

  • social media and social engineering
  • components of access control
  • user identification and authentication
  • authorization and user access controls
  • log management
  • patch management
  • vulnerability assessments
  • systems administrator / privileged access

Network Risks and Controls:

  • what is a “network”?
  • networking risks
  • LANs & WANs
  • network addressing
  • encryption
  • firewalls
  • Intrusion Detection Systems (IDS / IPS)
  • Virtual Private Networks (VPNs)
  • wireless
  • cloud computing

Database Risks and Controls:

  • Database Management Systems (DBMS)
  • database terminology
  • database risks
  • relational databases
  • database audit procedures

IT General Controls:

  • change management
  • business continuity / disaster recovery
  • physical security
  • environmental exposures

Auditing System Development Projects:

  • business risks
  • getting involved … how, when, who?
  • audit's coverage
  • auditing waterfall and RAD Projects
  • communicating audit's roles and results
  • audit staffing
  • audit resources

Assessing IT Governance:

  • what is IT governance?
  • IT governance risks
  • determining the IT governance audit scope
  • using COBIT® 2019 to assess IT governance

Audit and Control Frameworks and Standards:

  • IIA - Global Technology Audit Guides
  • COBIT®
  • ISO 27002 Security Standard
  • NIST Cybersecurity Framework
  • Center for Internet Security - 20 Critical Security Controls
  • FISMA (NIST 800-53) - Federal Information Security Modernization Act

Customer Outreach Award

customer-outreach-badge-2019

We believe that it should be easy for you to find and compare training courses. 

Our Customer Outreach Award is presented to trusted providers who are excellent at responding to enquiries, making your search quicker, more efficient and easier, too.

Ads