sb-nz logo
Story image

ISACA adds credentials for cybersecurity audits

03 Oct 2018

Auditors are increasingly being required to audit cybersecurity processes, policies and tools to provide assurance that their enterprise has appropriate controls in place.

To help them acquire and prove these skills, ISACA - creators of the Certified Information Systems Auditor (CISA) certification - has introduced the new Cybersecurity Audit Certificate Program.

The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits.

It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.

“Information security has become critical to understanding an enterprise, its risk and its processes,” says executive search provider to Fortune 500 companies in the IT audit and GRC space Candor McGaw president Caitlin McGaw.

“To add increased value now, IT audit and GRC professionals have to build solid information security skills. This is the golden ticket to short-term success and long-term career sustainability.”

ISACA’s Cybersecurity Audit Certificate exam is bundled with the training of the candidate’s choice - a self-paced online course, a virtual instructor-led course or an in-person training workshop - which teaches more than a dozen skills, including:

  • Understanding security frameworks

  • Identify cyber and legal regulatory requirements to aid in compliance assessments

  • Identify weaknesses in cloud strategies and controls

  • Perform cybersecurity and third-party risk assessments

  • Identify the benefits and risks of containerisation

The bundle includes a study guide that introduces candidates to cybersecurity and audit’s role, cybersecurity governance, and cybersecurity operations.

The Cybersecurity Audit Certificate exam is online, remote-proctored and can be taken at the candidate’s convenience.

Candidates who pass the exam will receive a certificate and digital badge.

Story image
Google Cloud announces availability of zero trust platform BeyondCorp Enterprise
The platform directly replaces BeyondCorp Remote Access, which was brought to the market in April 2020 as Google’s first foray into the zero trust space.More
Story image
Check Point uncovers live Linux attack, urges users to take action
“What we have identified is a live and ongoing cyber attack campaign targeting specific Linux users."More
Story image
SASE vs zero trust – or the best of both worlds
Zero trust and SASE work together by converging a least-privilege access strategy with an architecture that simplifies how highly distributed users, BYOD, and cloud resources are secured.More
Story image
IronNet expands Asia Pacific presence with new strategic partnership
“The combination of M.Tech’s extensive network in Asia Pacific and our unparalleled expertise in threat intelligence and detection will help more enterprises across the region to proactively identify and take down known and unknown threats before they happen.”More
Story image
As digital transformation grows in A/NZ companies, misconceptions about their role in cloud security abound
While an 81% majority of A/NZ organisations are accelerating their digital transformation, a giant 99% of surveyed respondents say they believe their cloud security provider provides enough protection, according to a Trend Micro study. More
Story image
Demystifying 'zero trust' and its role in cybersecurity
The principle of ‘zero trust’ in cybersecurity is simple: Trust nothing, and verify everything.More