ComplianceOnline

Auditing Information Security - Evaluating the Effectiveness of Your Information Security Program

Instructor: Dan Swanson
Product ID: 700258
Training Level: Intermediate

recorded version

$249.00
1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section

Training CD

$500.00
One CD is for usage in one location only.
(For multiple locations contact Customer Care)
CD and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-963-2556

Email: customercare@complianceonline.com

Read Frequently Asked Questions

This IT compliance training will show you how to evaluate the Effectiveness your information security program audit.

Description

The information security program is a critical component of every organization’s risk management effort, providing the means to protect the organization’s information and other critical assets

This Webinar will show you how to audit your information security program.

  • The information security program is a critical component of every organization’s risk management effort, providing the means to protect the organization’s information and other critical assets.
  • A well-managed business unit (and/or program) has robust plans, procedures, goals, objectives, trained staff, performance reporting, and ongoing improvement efforts. The audit team will look for evidence that the information security program is well organized and well managed. The security program must also specifically mitigate risks in satisfying key business objectives, and this traceability must be clear.
  • Your information security audit should confirm that key risks to the organization are being identified, monitored, and controlled; that key controls are operating effectively and consistently; and that management and staff have the ability to recognize and respond to new threats and risks as they arise.
  • Audits and reviews of your information security program and its management advance the goal of program oversight and ensuring continuous improvement and success.
Areas Covered in the seminar:
  • Webinar overview
  • Seminar objectives
  • Audit scope
  • What is the goal?
  • Planning efforts
  • The general audit steps
  • Audit risk assessment
  • Audit objectives
  • Audit approach
  • What auditors like to see
  • Audit testing
  • Issues to watch out for
  • Other considerations
  • The audit report
  • Lessons learned
  • Next steps
  • Further recommended readings
Who Will Benefit:
  • CISOs
  • CIOs
  • Senior IT Managers
  • Chief Audit Executives
  • IT Auditors
  • Executive Management with oversight responsibilities for security
  • Risk Managers

Instructor Profile
Dan Swanson CMA, CIA, CISA, CISSP, CAP President and CEO, Dan Swanson & Associates is a 24-year internal audit veteran, who most recently was director of professional practices at the Institute of Internal Auditors. Prior to the IIA, Swanson was an independent management consultant for over 10 years Swanson has completed more than 50 IT preparedness audits – (over the course of way too many years).Swanson recently led the writing of the OCEG internal audit guide for use in audits of compliance & ethics programs (www.oceg.org)and participated in the COSO small business task force efforts to provide guidance for smaller public companies regarding internal control over financial reporting (www.coso.org) .The author of more than 75 articles on internal auditing and other management topics, Swanson is currently a freelance writer, an independent management consultant, and regular columnist for Compliance Week and IT Compliance Institute (ITCI).

Follow us :
ComplianceOnline Banking Summit 2016 | Risk Management and Data Security - 80390SEM
ComplianceOnline Medical Device Summit 2017

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed
    Loading