Changing business models and advancements in technology have created an increasingly complex IT environment with fewer physical and virtual walls to protect an organization’s assets. Because of this, the cyber-attack surface has continued to expand, forcing companies to look towards adapting their approach to cyber defense. The concept of secure operation with a distributed workforce and diminished perimeter security drives the design of an environment that is based around containing and minimizing the damage that can be done by a breach whether it is initiated from within or outside an organization. The non-traditional security approach based on this model enforces controls and security mechanisms to move away from any implicit trust and instead rely upon the premise of “never trust, always verify,"" also known as Zero Trust. As companies adapt to a non-traditional work environment, it is important to understand the shift in control environment from a traditional ""implicit trust"" to a Zero Trust model through an independent review by internal audit.
Join the Grant Thornton Internal Audit Cybersecurity team on April 20th to discuss and understand a Zero Trust security model and how it aligns to the changing risk landscape.
The discussion will focus on:
- Understanding what Zero Trust is and why it is important for an organization with a complex IT environment
- How zero trust brings together multiple cyber domains to better secure the IT environment and assets
- How organizations are approaching a Zero Trust security model to secure the perimeter
- Leading practices internal auditors should consider in their audit plan to evaluate their organization's Zero Trust program
- Describe the changing work environment and importance of adapting to a Zero Trust security model
- Illustrate benefits of integrating multiple cyber domains to better secure IT environment and assets
- Define IA's role in evaluating Zero Trust security model
- Identify leading practices on enhancing cyber resiliency with Zero Trust
- Demonstrate how to enhance cyber programs by combining technical subjects with risk-based control frameworks
Please note: CPE credits are not awarded for webcast replay.
Recommended Field of Study:
- Scott Peyton, Partner, Internal Audit Cybersecurity Practice, Grant Thornton LLP
- Vikrant Rai, Director, Internal Audit Cybersecurity Practice, Grant Thornton LLP
- Vishal Tandon, Director, Cyber Risk, Digital Identity Management, Grant Thornton LLP
- Brook Buchanan, Director, Internal Audit Cybersecurity Practice, Grant Thornton LLP
Experience with audit planning and managing Cyber security risks through the audit program. Understanding of Cyber security risks and how they may impact/impair business operations. Experience with Digital Identity and Access Management
Group - Internet
If you have any questions or encounter any difficulties while enrolling, please contact technical support via email at webcastCOE@us.gt.com
, or visit our webcasting frequently asked questions page
If you are experiencing problems viewing or listening to an event, please review the event help guide
that provides minimum requirements and frequently asked questions.