Cybersecurity Risks from an Audit Manager’s Perspective
Cybersecurity Risks from an Audit Manager's Perspective
New regulations, increasing IT security threats and staff shortages challenge audit management to address the organization's IT risks. This course covers recent security breaches to put into perspective a strategy to help avoid devastating harm to the organization's reputation from these headline-making security breaches. This course provides working knowledge of IT terms and concepts; updates on new and emerging technologies affecting your business, and ways to establish a strategic response.
Upcoming start dates
Suitability - Who should attend?
Internal audit seniors, managers and senior managers involved with identifying, assessing and reporting on the technology-related risks for their internal audit projects or for the internal audit risk assessment
Prerequisites
- Fundamentals of Internal Auditing - OAG101
- Equivalent Experience
Outcome / Qualification etc.
NASBA Certified CPE: 16 Credits Auditing
Information Security Certificate
What You'll learn
You will learn about a wide range of technologies, the challenges posed by technological change, and ways to provide assurance that IT risks are being adequately addressed.
Training Course Content
IT Risks:
- update on recent security breaches
- data breach commonalities
- how hackers are hacking
- IT risk definitions
- information security objectives
- IT audit engagement strategies
- IT control categories
Basics of Information Technology - Battling the Buzzwords:
- why learn about technology?
- defining cyberspace & cybersecurity
- Operating Systems (OS)
- mainframe & client/server technology
- middleware
- virtualization / virtual servers
- network environment
Logical Security Risks and Controls:
- social media and social engineering
- components of access control
- user identification and authentication
- authorization and user access controls
- log management
- patch management
- vulnerability assessments
- systems administrator / privileged access
Network Risks and Controls:
- what is a “network”?
- networking risks
- LANs & WANs
- network addressing
- encryption
- firewalls
- Intrusion Detection Systems (IDS / IPS)
- Virtual Private Networks (VPNs)
- wireless
- cloud computing
Database Risks and Controls:
- Database Management Systems (DBMS)
- database terminology
- database risks
- relational databases
- database audit procedures
IT General Controls:
- change management
- business continuity / disaster recovery
- physical security
- environmental exposures
Auditing System Development Projects:
- business risks
- getting involved … how, when, who?
- audit's coverage
- auditing waterfall and RAD Projects
- communicating audit's roles and results
- audit staffing
- audit resources
Assessing IT Governance:
- what is IT governance?
- IT governance risks
- determining the IT governance audit scope
- using COBIT® 2019 to assess IT governance
Audit and Control Frameworks and Standards:
- IIA - Global Technology Audit Guides
- COBIT®
- ISO 27002 Security Standard
- NIST Cybersecurity Framework
- Center for Internet Security - 20 Critical Security Controls
- FISMA (NIST 800-53) - Federal Information Security Modernization Act
Customer Outreach Award
We believe that it should be easy for you to find and compare training courses.
Our Customer Outreach Award is presented to trusted providers who are excellent at responding to enquiries, making your search quicker, more efficient and easier, too.