sb-nz logo
Story image

ISACA adds credentials for cybersecurity audits

03 Oct 2018

Auditors are increasingly being required to audit cybersecurity processes, policies and tools to provide assurance that their enterprise has appropriate controls in place.

To help them acquire and prove these skills, ISACA - creators of the Certified Information Systems Auditor (CISA) certification - has introduced the new Cybersecurity Audit Certificate Program.

The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits.

It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.

“Information security has become critical to understanding an enterprise, its risk and its processes,” says executive search provider to Fortune 500 companies in the IT audit and GRC space Candor McGaw president Caitlin McGaw.

“To add increased value now, IT audit and GRC professionals have to build solid information security skills. This is the golden ticket to short-term success and long-term career sustainability.”

ISACA’s Cybersecurity Audit Certificate exam is bundled with the training of the candidate’s choice - a self-paced online course, a virtual instructor-led course or an in-person training workshop - which teaches more than a dozen skills, including:

  • Understanding security frameworks

  • Identify cyber and legal regulatory requirements to aid in compliance assessments

  • Identify weaknesses in cloud strategies and controls

  • Perform cybersecurity and third-party risk assessments

  • Identify the benefits and risks of containerisation

The bundle includes a study guide that introduces candidates to cybersecurity and audit’s role, cybersecurity governance, and cybersecurity operations.

The Cybersecurity Audit Certificate exam is online, remote-proctored and can be taken at the candidate’s convenience.

Candidates who pass the exam will receive a certificate and digital badge.

Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More
Story image
Netlinkz revenue surges 846% as secure enterprise cloud technology gains traction
Executive chairman James Tsiolis believes this growth is the start of something much bigger.More
Story image
Acronis announces new security endpoint solution
The solution is an integration of data protection and cybersecurity which provides customers with effective endpoint protection in a landscape where the pointlessness of perimeter security is becoming more pronounced.More
Link image
How to better protect your organisation's most valuable asset - its data.
Data resilience strategies are becoming increasingly critical in relation to the skyrocketing value of data and the proliferation of malicious entities wishing to steal it.More
Link image
Webinar: Best practices for managing disparate security solutions
As budgets get more constrained, the emphasis shifts from merely finding threats to increased efficiency in managing security operations. Learn how to juggle a crowded field of solutions.More
Link image
Software engineer backs metrics mindset in DevOps
Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.More