A data breach – whether caused by external bad actors or a trusted insider can be disastrous, precipitating complex legal obligations, costly remediation, and long-lasting reputational damage. Cyberattacks and accidental misconfigurations are top concerns among boards, executive management, and other organizational stakeholders. Internal auditors are expected to assess an organization’s defenses and its ability to recover should an event occur.
Participants of this course will examine the connection between cybersecurity and network security, obtain greater insight into the pros and cons of technology insurance, and explore how to apply the audit process to key areas, including operational resilience, identity access manage, cloud computing, mobile computing, cloud environments, and social media. Finally, the course explores common cyber-related frameworks, standards, and guidelines, and explains how to audit common cybersecurity solutions.
This course examines various technology concepts that can be used to facilitate integrated auditing efforts within an organization, including: