We are registered with CIPRO, SARS and Services SETA institutions in South Africa. We are a level 3 BBBEE contributor.
CYBERSECURITY AUDITING IN THE 21st CENTURY WORLD
COURSE OVERVIEW
It’s no surprise, then, that cybersecurity is a hot topic and a major challenge in internal auditing today. And over “$5.4 million”, that’s the average cost of a data breach to a U.S.-based company. Cybersecurity is as much of a business risk as it is a security one, making it critical for internal auditors to develop the skill set needed to take on these challenges.
In this course, you will develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization. Developed with and facilitated by leading industry experts, this course will examine preventive, detective, and corrective controls, and how to apply the audit process to a cloud environment. You will also be exposed to the mobile environment and cyber standards, as well as learn how to audit common security solutions.
This course is designed for internal auditors involved in IT audits or those involved in audit activities that require an understanding of how to manage the impact of cybersecurity events on business risks.
Course Objectives:
During this training seminar, you will learn:
• Define cybersecurity from an audit perspective, including an understanding of its scope, limitations, and how to measure effectiveness.
• Identify the purpose of preventive, detective, and corrective controls.
• Understand cyber liability insurance and its impact on cybersecurity.
• Understand cyber standards, state notification laws, and how they affect an organization.
• Understand how to assess an organization’s cyber capabilities from an attacker perspective using threat modeling.
• Assess cybersecurity risks and controls related to using cloud providers or third-party vendors.
Who Should Attend?
• IT security and data protection professionals.
• Professionals working in IT, finance or administration who are seeking the role of IT auditor.
• System Administrators/Architects.
• Software Testers/Programmers.
• Server/Network Administrators.
• All Tier Technicians.
• Database Administrators.
• Security/Network Analysts.
• Security Network.
• Project Managers.
• SDLC Team Players.
• Internal Auditors.
• Communication Systems Manager.
• Network and System Support/Helpdesk Crew.
• Database/Record Managers.
• ICT Managers and Directors.
• Security Managers and Directors.
• Operations Mgnt Managers and Directors.
• CIOs and CTOs.
_____________________________________________
Experienced Trainers
Cores Values
- RELIABILITY: Becoming one of the leading Training Institutes
- EFFICIENCY: Dedicated to a work well done
- PARTNERSHIP: Working together with all Organizations to achieve common objectives
- SELF-MOTIVATIONA: Passion to empower
- EMPOWERMENT: Enabling Governments, both public and private Organizations in decision making leading to Services delivery.
- EXCELLENCE: Excellence in innovations in contemporary and promotion of knowledge acquisition, development and dissemination.
- RESPONSIVENESS: PP responds to timely felt expressed by both Public & Private needs towards Economic, Social development
- PERFORMING: Aiming Optimal results, value for money and ensuring Return on Asset(ROA or ROI)
Objectives
- Develop skills, knowledge and Capacity of Organizations through training/Workshop/Conference & Consultancy in Governance, Management, Bookkeeping, Monitoring, Information Technology, Procurement, Financial Planning and all other fields.
Implement expansion courses which develop skills in various fields . Assist both Public and Private Sector Organizations to grow their productions and expand their services.









