Tech Talk: Cybersecurity Risk, Controls, and Best Practices for Internal Audit
Tell a Friend About This EventTell a Friend
 

6/7/2022
When: 1:00 PM
Where: United States
Contact: info@ahia.org
(856) 554-1083

« Go to Upcoming Event List  

 
Tuesday, June 7, 2022
1:00 - 2:00 pm ET
(12:00 - 1:00 pm CT/11:00 am - 12:00 pm MT/10:00 - 11:00 am PT)
 
 
 
Please Note: Registration will now close one day prior to the live event. NO REGISTRATIONS FOR THIS EVENT WILL BE ACCEPTED AFTER June 6 at 3:00 PM Eastern Time.   
 
Presented by:
Joseph Horowitz, CISA, CDPSE, CIA, CRMA - Director of Audit, Stetson Cybergroup
 
Webinar Description:

In this session, we will discuss the intent of the NIST Cybersecurity Control Framework (NIST CSF) and how the framework is the most comprehensive to follow to comply with all regulatory requirements. We will discuss the importance of performing annual cybersecurity Risk Assessments and Gap Analysis to identify weaknesses, and how internal audit can also support organizations in the cybersecurity fight against “bad actors”. We will also discuss how the CIS18 best practice cybersecurity controls map to the NIST CSF and how internal audit can incorporate some of those controls into annual audit testing to provide value and ensure the organization is addressing and mitigating cybersecurity risks. Join us to learn why organizations should not rely solely on their Information Technology department to determine the best path to cybersecurity and why cybersecurity insurance is not the silver bullet when combating threat actors. Overall, we will discuss how creating a culture of cybersecurity is the best method to protect organizations from threats and mitigate technology and non-technology risks.

Learning Objectives:
Following this discussion, participants will be able to:
 
  1. Discuss the intent of the NIST Cybersecurity Control Framework (NIST CSF) and how the framework is the most comprehensive to follow to comply with all regulatory requirements.
  2. Summarize the Center for Internet Security’s (CIS) 18 Critical Controls and how they serve as a best practice controls for the NIST CSF to address cybersecurity risks. 
  3. Explain why organizations should not rely solely on their Information Technology department to determine the best path to cybersecurity, and why cybersecurity insurance is not the silver bullet when combating threat actors.
  4. Describe how creating a culture of cybersecurity is the best method to protect organizations from threats and mitigate technology and non-technology risks.
Cost: 
Members - COMPLIMENTARY (You MUST be a current member to take advantage of this benefit.)
 
Program Level: All
Field of Study: Information Technology
Prerequisites: None
Delivery Method: Group Internet Based
CPE Credits: 1 CPE credit
 
Please Note: If you wish to receive continuing professional education credits for participating in the discussion, you are required to register and pay the registration fees (if applicable). You will also be required to answer 3 of the 4 questions asked online during the discussion to qualify for CPE credit.
 
 
Please Note: Registration will now close one day prior to the live event.  NO REGISTRATIONS FOR THIS EVENT WILL BE ACCEPTED AFTER June 6 at 3:00 pm Eastern Time.
 
TO REGISTER: Please click the link at the top left corner of this page, under the AHIA logo, that says "Registration" or click HERE to Register Now!
 
 
My alt text

Get in Touch

19 Mantua Rd.
Mount Royal, NJ 08061 USA

Email:info@ahia.org
Phone: (856) 554-1083
Fax: (856) 423-3420

Stay Social