|
2025/12/02 to 2025/12/04
|
When:
|
2-4 December 2025 Registration starts at 8:15
|
Where:
|
Definitive Conferencing Corner of Definitive Lane & Kruin street Harmelia Isando, Gauteng 1619 South Africa
|
Presenter:
|
TM Consulting
|
Contact:
|
Project Coordinator: CPD and Events
neo@governanceacademy.co.za
011 609 1761 Ext 403
|
|
« Go to Upcoming Event List
|
|
Presenter/s: | TM Consulting | Duration: | 3 Days | CPD Hours: | 24 | Fees | ex VAT | incl VAT |
| Member: | R9 928.00 | R11 417.00 |
| Non-Member: | R11 463.00 | R13 182.00 | | Course Objective This course is designed for internal auditors involved in IT audits or those involved in audit activities that require an understanding of how to manage the impact of cybersecurity events on business risks. The objective is to provide auditors the ability to examine preventive, detective and corrective controls and how to apply the audit process to a cloud environment. Attendees will be exposed to the mobile environment and cyber standards, as well as learn how to audit common security solutions. The course will cover the following topics and concepts from an audit perspective: - Hacking and Cyber warfare
- Internet Security
- Personal data security and encryption
- Wireless Security and mobile security
- Digital Certificates/Identities
- Digital forensic and investigations
- Computer Security Incident Response Teams (CSIRTs)
- Legal Framework (South Africa)
- Cyber Security Governance
| Course Outcome - Define cybersecurity from an audit perspective, including an understanding of its scope, limitations and how to measure effectiveness
- Develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization
- Understand how to assess an organization’s cyber capabilities from an attacker perspective using threat modelling
- Identify the purpose of preventive, detective and corrective controls
- Understand cyber liability insurance and its impact on cybersecurity
- Understand cyber standards, state notification laws and how they affect an organization
- Assess cybersecurity risks and controls related to using cloud providers or third-party vendors
Who should attend? Level 1 | Entry or introductory level for those requiring a fundamental understanding of the subject. | | Please be advised of the event terms and conditions. Delegates are also requested to review the content and the levels of the courses presented before booking, to ensure they are attending the right course. |
|
|