|
2025/12/02 to 2025/12/04
|
When:
|
2-4 December 2025 Registration starts at 8:15
|
Where:
|
Online via MS Teams South Africa
|
Presenter:
|
TM Consulting
|
Contact:
|
Project Coordinator: CPD and Events
neo@governanceacademy.co.za
011 609 1761 Ext 403
|
|
« Go to Upcoming Event List
|
|
Presenter/s: | TM Consulting | Duration: | 3 Days | CPD Hours: | 24 | Fees | ex VAT | incl VAT | | Member: | R 8 523.00 | R 9 802.00 | | Non-Member: | R 10 058.00 | R 11 567.00 | | Course Objective This course is designed for internal auditors involved in IT audits or those involved in audit activities that require an understanding of how to manage the impact of cybersecurity events on business risks. The objective is to provide auditors the ability to examine preventive, detective and corrective controls and how to apply the audit process to a cloud environment. Attendees will be exposed to the mobile environment and cyber standards, as well as learn how to audit common security solutions. The course will cover the following topics and concepts from an audit perspective: - Hacking and Cyber warfare
- Internet Security
- Personal data security and encryption
- Wireless Security and mobile security
- Digital Certificates/Identities
- Digital forensic and investigations
- Computer Security Incident Response Teams (CSIRTs)
- Legal Framework (South Africa)
- Cyber Security Governance
Course Outcome - Define cybersecurity from an audit perspective, including an understanding of its scope, limitations and how to measure effectiveness
| - Develop an understanding of cybersecurity concepts that can be used to facilitate integrated audit efforts within your organization
- Understand how to assess an organization’s cyber capabilities from an attacker perspective using threat modelling
- Identify the purpose of preventive, detective and corrective controls
- Understand cyber liability insurance and its impact on cybersecurity
- Understand cyber standards, state notification laws and how they affect an organization
- Assess cybersecurity risks and controls related to using cloud providers or third-party vendors
Who should attend? Those who need to understand and wish to undertake security audits. Level 1 | Entry or introductory level for those requiring a fundamental understanding of the subject. | Level 2 | Internal auditors who are already practicing internal audit and have a basic understanding of the subject. | | Please be advised of the event terms and conditions. Delegates are also requested to review the content and the levels of the courses presented before booking, to ensure they are attending the right course. |
|
|