In today’s global economy, every organization has a mission. In this digital era, as organizations critically depend upon information technology (IT) systems to process their information for better support of their missions, risk management plays a critical role in protecting an organization’s information assets, and therefore its mission, from IT-related risk.
This seminar provides attendees with a general overview of basic fraud concepts, as well as a review of specific areas such as statutes and standards related to the recording, reporting, and prosecution of fraudulent activities, internal auditor responsibilities in the audit for fraud, and fraud detection and prevention techniques.
Also addressed during this seminar is the classification of frauds, investigation techniques, and fraud within information technology.
The objective of this seminar is to provide practical and immediately usable information to professionals on how to protect both data and infrastructure from the ravages of electronic terrorism and associated cyber crimes. Once only a topic for made-for-television thrillers, cyber terrorism has captured global front page headlines and reported top news stories from every facet of commerce.
Traditional forensics professionals use fingerprints, DNA typing, and ballistics analysis to make their case. Infosec professionals have to develop new tools for collecting, examining and evaluating data in an effort to establish intent, culpability, motive, means, methods and loss resulting from e-crimes. This overview seminar will introduce the attendee to the broad field of cyber forensics and present the various tools and techniques designed to maintain control over organizational assets, digital or otherwise. This seminar covers computer forensics theory and methodology.
In today's evolving virtual markets and highly complex, global corporate environments, information technology professionals, operational, financial, and IT auditors must all work together in helping to establish, implement and secure organizational infrastructure from both internal and external threats.
We can argue that it is not a matter of whether cloud computing will become ubiquitous—because the economic forces are inescapable—but rather what can we do to assess enterprise governance, risk assessment and development of strong internal controls, in the implementation and management of ever increasing cloud computing environments.
An Information Technology (IT) Auditor and Information Security (Info Sec) Professional are really both pursuing the same goals but through different terminology. The IT auditor evaluates for the presence of “controls” whereas Info Sec professional pursues the implementation of “security”. It is essential that both end users and IT professionals understand the process of IT Audit and the concepts of risk and control associated with critical business applications, those applications essential to the daily operational functionality of the enterprise.
This seminar will provide detailed workshop discussion and case studies on key information security areas. We will focus on practical development and implementation of processes to manage governance, risk and compliance areas relating to information security within the enterprise.
This seminar will show how the enterprise can manage and control Mobile technology and the current BYOD (Bring Your Own Device) mindset using the processes and key practices of COBIT 5. Attendees will learn the key elements of mobile technology governance including risks, controls and techniques for protecting the enterprise in this environment.
This seminar will provide detailed workshop discussion and case studies on auditing cloud computing. Attendees will learn the fundamental elements of cloud computing, the business risks and potential benefits and how to ensure governance in this environment.
The course focuses on a gaining a practical understanding of cloud computing and using the appropriate tools and processes to ensure overall enterprise governance and compliance with best practices.