A data breach – whether caused by external bad actors or a trusted insider- can be disastrous, precipitating complex legal obligations, costly remediation, and long-lasting reputational damage. Cyberattacks and accidental misconfigurations are top concerns among boards, executive management, and other organizational stakeholders. Internal auditors are expected to assess an organization’s defenses and its ability to recover should an event occur.
Are you up for the challenge?
This course examines various technology concepts that can be used to facilitate integrated auditing efforts within an organization, including:
- Auditing Operational Resiliency in Technology and Beyond
- Auditing the Automation Center of Excellence
- Auditing the Security Operations Center (SOC).
- Auditing Identity Access Management, Zero Trust, and Microsegmentation.
- Auditing the Cloud
- Auditing Mobile Computing and Connected Devices
- Auditing Social Media and Digital Presence
Participants of this course will examine the connection between cybersecurity and network security, obtain greater insight into the pros and cons of technology insurance, and explore how to apply the audit process to key areas, including operational resilience, identity access manage, cloud computing, , mobile computing, cloud environments, and social media. Finally, the course explores common cyber-related frameworks, standards, and guidelines, and explains how to audit common cybersecurity solutions.
Keep scrolling to register!
Early bird discount offer available to members up to 6 weeks prior to course start date. Pricing will be reflected upon checkout.
Special Group Rate for 10+ Available
A special group rate is available for purchases of ten or more. To make a Group purchase or for more information on Group discounts, please get in touch with Group Services. Email: firstname.lastname@example.org
Pricing is per person and is in U.S. dollars.
Discounted rates applied during checkout.