Skip to Content

Internal Audit's Guide to Ransomware

Format: Online

Organizations have worked diligently for decades to protect data and information assets. Organizations deploy encryption technology, access limitations, and physically and logically segment valuable, sensitive, and proprietary data and information assets in an effort to keep bad actors from viewing, stealing, altering, or destroying it. However, at the same time, the bad actors have improved their craft; they infiltrate and steal these assets by using the same technology designed to protect it. 

One of the primary methods used to extort and humiliate organizations throughout the globe is to impact technology using ransomware, which is designed to deny a user or an organization access to files on their computers and servers. By encrypting the files, and demanding a “ransom” payment for the decryption key, this malware places organizations in a position where paying the ransom may be the easiest way to regain access.

How can internal audit assist their organizations in defending themselves against bad actors who are using their own technology against them? How can organizations protect themselves?

Keep scrolling to register!

Special Group Rate for 10+ Available
A special group rate is available for purchases of ten or more. To make a Group purchase or for more information on Group discounts, please get in touch with Group Services. 

Email: gettraining@theiia.org | Call:+1-407-937-1397

Pricing is per person and is in U.S. dollars.
Discounted rates applied during checkout.

Available Formats