Auditing Cybersecurity Programs
Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. "Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" Sound familiar? Hundreds of Security, Compliance and Audit professionals ha...
Becoming an Awesome New Auditor!
So, you've accepted a new position as an Internal Auditor; congratulations, and welcome to our world! Internal Auditors provide an extremely important and unique function: to independently assess controls to balance risk that may impede the objectives of an organization. We are the "last line of defense" in organizations to report risk events. Please join us for this valuable in-person, interactive training and allow our expert instructors to...
Being an Audit Leader
Are your audit leadership skills working to get the job done? This in-person event is focused on helping attendees in mastering the skills necessary to efficiently lead audit teams. This course provides new leaders with the tools needed to effectively lead audit teams, while exploring the life cycle of an audit from an audit leader's perspective. "This course is not just for auditors or new audit leaders, it is for anyone who wants an understa...
Internal Audit Basic Training Workshop
Join us for a unique, interactive course that "walks you through" the Internal Audit process. "This course is not just for auditors or new auditors. It is for anyone who wants an understanding of the relationship between business objectives, risk, control, assessment and reporting." This comprehensive internal audit training course is for anyone who wants to have a strong base of knowledge and understanding of the essential audit and the perso...
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.