Overview:
This course will provide overview of key cybersecurity security domains that CPA's should evaluate in an audit. It will provide an overview of each security domain, and an overview of how to evaluate and assess the sufficiency of the cybersecurity control. Examples of security domains that will be covered include: Change management Access management Data integrity This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Objectives:
After attending this presentation you will be able to...
- Understand how to scope an audit from a cybersecurity perspective
- Understand the cybersecurity controls that reside in key security domains
- Understand the cybersecurity controls that have significant implications to an audit
Major Topics:
The major topics that will be covered in this class include:
- The five key tenets of cybersecurity: Identify, Detect, Protect, Respond, Recover
- Review specific cybersecurity controls within each of the five cybersecurity tenets
- How to appropriately assess key cybersecurity controls
Major Topics:
The major topics that will be covered in this class include:
- The five key tenets of cybersecurity: Identify, Detect, Protect, Respond, Recover
- Review specific cybersecurity controls within each of the five cybersecurity tenets
- How to appropriately assess key cybersecurity controls
Designed For:
Anyone who is interested in understanding how to assess and evaluate cybersecurity controls.
Prerequisites:
General understanding of IT environments and technology