img

Comprehensive Review and Audit of Information and Cyber Security Practices

This course explains the 'why', 'how', and 'what' of internal cybersecurity audits.It covers the preparation, conducting, and post-audit phases, and emphasizes the importance of the soft aspects of the audit. It also provides clear guidelines on what to do and what not to do for practical application by auditors

Sam Okenye | Author Level 5

0.0

What you will learn

  • Become a highly sought-after auditor by various units within the organization

Internal Audit serves as the cornerstone of governance and compliance within any organization, ensuring adherence to established policies, processes, and controls. The ever-evolving landscape of technology, including social, mobile, analytics, cloud, and IoT, has elevated cybersecurity posture to a critical component of enterprise resilience against cybersecurity threats.

The readiness to counter cybersecurity threats, and consequently, the organization's risk management capacity, is commensurate with factors such as threat, vulnerability, likelihood, and impact. The organization's risk management strategy in the context of cybersecurity threats hinges not only on the deployment of tools and technology but also on a robust framework of policies, processes, and controls.

In the realm of cybersecurity threat management, many medium and large organizations implement an Information Security Management System (ISMS) aligned with the ISO 27001 standard. These systems integrate cybersecurity policies, processes, controls, and guidelines. Following the implementation of the ISMS, it is imperative to conduct regular audits to validate compliance and enhance the system in response to emerging cyber threats. The audit ensures that the organization's cybersecurity strategy aligns with established processes and remains effective against current threat vectors.

Consequently, Cybersecurity Audit poses inherent challenges, with stakeholder management being a critical factor. Constructive discussions between the auditee and auditor are vital, with a focus on maintaining a characteristic conducive to a fruitful audit exercise.

This course elucidates the necessity of internal cybersecurity audits, detailing the 'why,' 'how,' and 'what' of the audit process. It covers the preparation, conducting, and post-audit phases, emphasizing the importance of the soft aspects of the audit. Clear guidelines on 'Do's and Don'ts' are provided for practical application by auditors.

Upon completion of the course, you will emerge as a highly sought-after auditor by various units within the organization.

img
No Discussion Found

0.0

0 Reviews

5
0
4
0
3
0
2
0
1
0
Meet Your Instructor

Instructor
0.0 Rating
1 Students
Author Level 5
16 Courses
About Instructor

Sam a professional teacher

video

₦ 180000.00 ₦ 230000.00

21.74% off
  • Course Duration
    2 h 13 m 1 s
  • Course Level
    Medium
  • Language
    English

Gift this course

Send this course as a gift to your friends

This Course Includes
  • 2 h 13 m 1 s Video Lectures
  • 0 Quizzes
  • 0 Assignments
  • 0 Downloadable Resources
  • Full Lifetime Access
  • Certificate of Completion