Skip to Content

Internal Audit's Guide to Ransomware

Modality Type: Online

Organizations have worked diligently for decades to protect data and information assets. Organizations deploy encryption technology, access limitations, and physically and logically segment valuable, sensitive, and proprietary data and information assets in an effort to keep bad actors from viewing, stealing, altering, or destroying it. However, at the same time, the bad actors have improved their craft; they infiltrate and steal these assets by using the same technology designed to protect it. 

One of the primary methods used to extort and humiliate organizations throughout the globe is to impact technology using ransomware, which is designed to deny a user or an organization access to files on their computers and servers. By encrypting the files, and demanding a “ransom” payment for the decryption key, this malware places organizations in a position where paying the ransom may be the easiest way to regain access.

How can internal audit assist their organizations in defending themselves against bad actors who are using their own technology against them? How can organizations protect themselves?

Online:

  • May 16: 1:00 PM - 5:00 PM ET
  • June 17: 9:00 AM - 1:00 PM ET
  • July 29: 12:00 PM - 4:00 PM ET
  • August 26: 9:00 AM - 1:00 PM ET
  • September 9: 1:00 PM - 5:00 PM ET
  • October 14, 12:00 PM -4:00 PM ET
  • November 18: 9:00 AM - 1:00 PM ET
  • December 9: 12:00 PM - 4:00 PM ET

In-Person / Live Stream: IIA Headquarters / Orlando Metro

  • May 11: 1:30-5:30 PM ET
  • Aug 17: 1:30-5:30 PM ET
  • Nov 9: 1:30-5:30 PM ET

Member Rate: $359 USD
Non-Member Rate: $389 USD

Member rate will be applied at checkout.

Course Offerings