Auditing Privacy Companies - Implementing Internal Controls

Speaker

Instructor: Richard Cascarino
Product ID: 702724

Location
  • Duration: 90 Min
This training on data security will provide the tools to design and implement effective IT control structures and audit programs to help comply with the current data privacy and confidentiality regulations.
RECORDED TRAINING
Last Recorded Date: Jun-2013

 

$149.00
1 Person Unlimited viewing for 6 month info Recorded Link and Ref. material will be available in My CO Section
(For multiple locations contact Customer Care)

$199.00
Downloadable file is for usage in one location only. info Downloadable link along with the materials will be emailed within 2 business days
(For multiple locations contact Customer Care)

 

 

Customer Care

Fax: +1-650-362-2367

Email: [email protected]

Read Frequently Asked Questions

Why Should You Attend:

With the growth of social media networking and use of computer systems in storing confidential data, non-compliance with privacy laws in various countries has led to record penalties. Management and auditors of organizations using cloud computing or other technologies to store confidential data/personal information of individuals have an obligation in terms of legislation to ensure the confidentiality as long as the data remains within their sphere of responsibility. Failure to do so can have major implications in terms of both reputational risk and even long-term survival of an organization. Internal audits play a vital role in ensuring corporate compliance and ongoing effectiveness of appropriate control structures.

This training will explain the methods to comply with current data privacy regulations. It will help the attendees in understanding and implementing an effective control structure and internal audit program within the organization. It will also discuss the auditor’s role in evaluating privacy control structures and the use of continuous monitoring in order to comply with privacy legislation.

Areas Covered in the Webinar:

This webinar will discuss the following topics:

  • Current privacy legislation.
  • Designing an effective control structure.
  • The effect on risk of developments within information technology.
  • The auditor's role in evaluating privacy control structures.
  • Implementing an effective audit program.
  • The use of continuous monitoring.

Who Will Benefit:

This webinar will be beneficial for the following personnel involved in the governance of organizations as required by national and international legislation:

  • Internal Auditors
  • External auditors
  • Senior management
  • Who assist the Board to demonstrate adequacy of governance procedures and internal control structures

Instructor Profile:

Richard Cascarino, is the Principal of Richard Cascarino & Associates, a highly successful audit training and consultancy company based in Colorado and Johannesburg. He is a regular speaker at National and International conferences and has presented courses throughout Africa, Europe, the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa and also a member of ISACA and the Association of Certified Fraud Examiners.

Richard was a member of the Audit Committee of the Department of Public Enterprises in South Africa and chairman of the Audit Committee of Gauteng cluster 2 (Premier's office, Shared Services and Health). He is the author of the "Auditor's Guide to IT Auditing" and the newly released “Corporate Fraud and Internal Control: A Framework for Prevention” both published by Wiley Publishing which is also used by universities worldwide.

Topic Background:

With the explosion of computer systems holding information of a private/confidential nature, the design and implementation of control structures in order to achieve privacy objectives have become critical in limiting the opportunities for corporate losses due to lawsuits and loss of trust. Recent notable cases of loss of confidential data have not only been due to employee carelessness but also hacktivist attacks. A Ponemon Institute and Symantec study showed that in 2011, 37% of cases involving data breaches were due to malicious attacks. Around 1.1 million identities were exposed per data breach, according to the Internet Security Threat Report Volume 17 released by Symantec in April 2012.

Follow us :

 

 

Refund Policy

Our refund policy is governed by individual products and services refund policy mentioned against each of offerings. However in absence of specific refund policy of an offering below refund policy will be effective.
Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange. Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time. On-Demand Recording purchases will not be refunded as it is available for immediate streaming. However if you are not able to view the webinar or you have any concern about the content of the webinar please contact us at below email or by call mentioning your feedback for resolution of the matter. We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email [email protected] call +1-888-717-2436 (Toll Free).

 

 

+1-888-717-2436

6201 America Center Drive Suite 240, San Jose, CA 95002, USA

Follow Us

facebook twitter linkedin youtube

 

Copyright © 2023 ComplianceOnline.com MetricStream
Our Policies: Terms of use | Privacy

PAYMENT METHOD: 100% Secure Transaction

payment method