CYBERSECURITY AUDITING IN THE 21st CENTURY WORLD

COURSE OVERVIEW

It’s no surprise, then, that cybersecurity is a hot topic and a major challenge in internal auditing today. And over “$5.4 million”, that’s the average cost of a data breach to a U.S.-based company. Cybersecurity is as much of a business risk as it is a security one, making it critical for internal auditors to develop the skill set needed to take on these challenges.

In this course, you will develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Developed with and facilitated by leading industry experts, this course will examine preventive, detective, and corrective controls, and how to apply the audit process to a cloud environment. You will also be exposed to the mobile environment and cyber standards, as well as learn how to audit common security solutions.

This course is designed for internal auditors involved in IT audits or those involved in audit activities that require an understanding of how to manage the impact of cybersecurity events on business risks.

Course Objectives:

During this training seminar, you will learn:
• Define cybersecurity from an audit perspective, including an understanding of its scope, limitations, and how to measure effectiveness.
• Identify the purpose of preventive, detective, and corrective controls.
• Understand cyber liability insurance and its impact on cybersecurity.
• Understand cyber standards, state notification laws, and how they affect an organization.
• Understand how to assess an organization’s cyber capabilities from an attacker perspective using threat modeling.
• Assess cybersecurity risks and controls related to using cloud providers or third-party vendors.

Who Should Attend?

• IT security and data protection professionals.
• Professionals working in IT, finance or administration who are seeking the role of IT auditor.
• System Administrators/Architects.
• Software Testers/Programmers.
• Server/Network Administrators.
• All Tier Technicians.
• Database Administrators.
• Security/Network Analysts.
• Security Network.
• Project Managers.
• SDLC Team Players.
• Internal Auditors.
• Communication Systems Manager.
• Network and System Support/Helpdesk Crew.
• Database/Record Managers.
• ICT Managers and Directors.
• Security Managers and Directors.
• Operations Mgnt Managers and Directors.
• CIOs and CTOs.

_____________________________________________

Experienced Trainers

We are registered with CIPRO, SARS and Services SETA institutions in South Africa. We are a level 3 BBBEE contributor.

Certification

Certificates signed by some of the most respected experts in their academic fields. Boosting your completion feeling.

Learn on the Job

Sciences and Technologies are moving fast in every domain. Keep your Job skills up to date with the market demand.

Image Gallery

Venues

Our Conference Venues are located in an extremely central area, with great access facilities and all the support infrastructures (Hotels, Guest-houses, Restaurants, Metro, Parking, etc).

Contact Us

Proactive Africa is committed to serving its clients with geniun dedication and love for the continent.

Address: P.o Box: 28336,
. Sunnyside, 0132
. Pretoria
Telephone:+27 12 405 0126
Cell:+27 73 066 4995
Cell:+27 84 474 1238
Cell:+27 84 474 1238
E-mail: info@proactiveafrica.com