A security breach is not only devastating to a company’s reputation but can also be very expensive. Over the past several years, the average cost of a data breach has been well over $3.5 million. During this security awareness training we will discuss strategies to increase security, influence behavior, mitigate risk and ensure compliance. We cover critical governance requirements and security methodologies to assist organizations to protect assets, prevent downtime and increase control awareness and adoption.
The Information Technology Governances are plentiful: Payment Card Industry Data Security Standard (PCI), Health Insurance Portability and Accountability Act (HIPAA), Cybersecurity Maturity Model Certification (CMMC), Health Information Trust Alliance Common Security Framework (HITRUST), Sarbanes Oxley, SSAE18 SOC2 for 3rd party service providers… the list goes on and on. During this course, we discuss NIST (National Institute of Standards and Technology) controls and how a single framework can be implemented to help ensure compliance with all corresponding governances.
Course Key Concepts: Compliance, Security, Cybersecurity, NIST, PCI, HIPAA, SOC2, CMMC, IT.
Learning Objectives
- Explore Information Technology Governances.
- Identify Commonalities amongst various Information Technology Governances.
- Discover how the NIST Cybersecurity Framework can be implemented to meet all your organizations’ IT governance requirements.
Included In Certifications
This course is included in the following Certification Programs:
10 CoursesInformation Technology Auditor Certification
- Understanding Information Technology Governance and the Application of NIST
- Performing a Security Risk Assessment
- Auditing Data Security IT Computer Controls
- Auditing Third Party Service Providers and Cloud Environments
- Auditing Automated Business and Financial Transaction Processes
- Auditing Logical Security and Logical Access Controls
- Auditing Change Management
- Auditing the Network
- The Importance of Incident Response, Disaster Recovery and Business Continuity Planning
- Information Technology Audit Summary
9 Reviews (29 ratings)
Reviews
Prerequisites
No advanced preparation or prerequisites are required for this course.