A data breach can be disastrous, precipitating complex legal obligations, costly remediation, and long-lasting reputational damage. Cyberattacks are a top concern among boards, executive management, and other organizational stakeholders, and internal auditors are expected to assess an organization’s defenses and its ability to recover should an event occur.
Are you up to the challenge?
This course examines cybersecurity concepts that can be used to facilitate integrated auditing efforts within an organization. It examines the connection between cybersecurity and network security, provides greater insight into the pros and cons of technology insurance, and explores how to apply the audit process to social media, mobile, and cloud environments. Finally, the course explores common cyber-related frameworks, standards, and guidelines, and explains how to audit common cybersecurity solutions.