Skip to Content

Identity Access Management, Zero Trust, and Microsegmentation for Auditors

Format: Online

Organizations of all types are becoming more vulnerable to cyber threats due to their increasing reliance on computers, networks, programs and applications, social media, and data. Security breaches can negatively impact organizations and their customers — both in tangible financial terms and negative impacts on organizational reputation. Global connectivity and accessibility to information by users outside the organization increase risk beyond what has been historically addressed by IT general and application controls. Organizations’ reliance on information systems and the development of new technologies render traditional evaluations of IT general and application controls insufficient to provide assurance over cybersecurity.


Cybersecurity identity access management refers to the technologies, processes, and practices designed to protect an organization’s information assets — computers, networks, programs, and data — from unauthorized access. With the frequency and severity of cyberattacks on the rise, there is a significant need for improved cybersecurity risk management.
In addition, “zero trust” and “micro-segmentation” have become universally accepted information security risk management tactics. In the past two years, several market factors have driven a surge in zero trust security and micro-segmentation initiatives.

Keep scrolling to register!

Special Group Rate for 10+ Available
A special group rate is available for purchases of ten or more. To make a Group purchase or for more information on Group discounts, please get in touch with Group Services. 

Email: gettraining@theiia.org | Call:+1-407-937-1397

Pricing is per person and is in U.S. dollars.
Discounted rates applied during checkout.

Available Formats