Recent trends show that Cyberthreats have increased significantly, nearly doubling over the last year. As companies have adopted new technology infrastructure to support the rapidly evolving business models, they face the continued threat of ransomware, data loss and other cyber threats that can significantly impact day-to-day business operations. While many organizations rely on threat prevention and monitoring technologies, they are not tuned to maximize their operating effectiveness, leaving companies with a false sense of security.
As companies place increased reliance on their cybersecurity capabilities, it’s important to consider not only the maturity of cybersecurity capabilities, but their true effectiveness in identifying and minimizing the impact of cybersecurity threats. Internal audit plays a crucial role in ensuring their organization is resilient against the cyber-attacks, such as ransomwares and data exfiltration, by going on the offense to test the operational effectiveness of their cybersecurity program. Leveraging advanced technical testing that moves beyond traditional pen tests, internal audit teams can leverage a suite of scenario based technical tests that demonstrate what a threat actor can do if they breach the company’s outer defenses.
Join the Grant Thornton Internal Audit Cybersecurity team on December 9th to discuss why and how internal audit can leverage advanced technical testing to demonstrate the operating effectiveness of their cybersecurity program.
The discussion will focus on:
- Evaluating the threat of ransomwares, understanding the impact to the organization and responding to emerging cyber threats
- Examples of how cyber programs can be enhanced by going on the offense combining technical cyber techniques with risk-based control frameworks
- Leading practices internal auditors can consider in their audit plan to evaluate their organization's cyber resiliency
- Cross-industry shift from program audits to technical control effectiveness testing to improve resilience against cyber-attacks
- Discussing internal audit’s role in the process of evaluating management’s response to correction action plans aligned with target state cyber-maturity plan
- Describe how to adapt and respond to emerging cyber-threats such as ransomwares
- Evaluate the threat of ransomwares
- Define IA's role in evaluating technical controls through risk-based frameworks
- Define audit plans and how they can strengthen cybersecurity programs through effective strategies
- Identify industry audit trends and shift from program audits to technical control effectiveness testing
- Describe leading practices on enhancing cyber resiliency
- Explain how to enhance cyber programs by combining technical cyber techniques with risk-based control frameworks and maturity plans
Recommended Field of Study:
- Scott Peyton, Partner, Internal Audit Cybersecurity Practice, Grant Thornton LLP
- Vikrant Rai, Director, Internal Audit Cybersecurity Practice, Grant Thornton LLP
Experience with audit planning and managing Cyber security risks through the audit program. Understanding of Cyber security risks and how they may impact/impair business operations
Group - Internet
If you have any questions or encounter any difficulties while enrolling, please contact technical support via email at webcastCOE@us.gt.com
, or visit our webcasting frequently asked questions page
If you are experiencing problems viewing or listening to an event, please review the event help guide
that provides minimum requirements and frequently asked questions.
If you have any questions regarding CPE credit, please contact CPE support via email at CPEEvents@us.gt.com
, or visit our webcast CPE information page