IT & Cybersecurity Audit: Proven Audit Approaches for An Increasingly Complex Digital & Compliance Landscape (17 - 18 February 2025) St. Giles Boulevard Hotel, Kuala Lumpur

OVERVIEW


Cybersecurity and IT audit play crucial roles in protecting organizations from cyber threats and ensuring compliance with regulatory requirements. However, these areas pose several challenges in today's digital landscape.


Top 5 Cybersecurity & IT Audit CHALLENGES


  • Increasing complexity of cyber threats
  • Evolving regulatory requirements
  • Difficulty in assessing and managing IT risks
  • Increasing need for effective security controls
  • Auditing emerging technologies


What This Course Offers:


The 2-day IT & Cybersecurity Audit and Compliance course aims to address these challenges by equipping participants with the necessary knowledge and skills. By attending this course, participants can gain insights into audit and compliance frameworks, industry best  practices, and practical techniques to overcome these pain points, ultimately ensuring effective IT security governance and safeguarding digital assets.


5 PRACTICAL EXERCISES:


  • IT risk management case study
  • Selection of different types of IT/ cyber audits
  • Pros and cons of the different frameworks
  • IT audit planning memo
  • Audit planning on emerging technology or risk


SIGN UP   with us if you are MAD enough. MAD stands for “Making a Difference”. If your organization wants your employees to gain knowledge and skills necessary to effectively assess, evaluate, and manage the security and compliance aspects of information technology systems.


LEARNING OBJECTIVES

  • UNDERSTAND  the fundamentals of IT/Cybersecurity audit and compliance, including key concepts, principles, and terminology.
  • GAIN  insights into relevant regulatory frameworks and industry standards such as ISO 27001, NIST, PCI DSS, HiTrust.
  • DEVELOP  a systematic approach to conducting IT/Cybersecurity audits, risk assessments, and vulnerability assessments.
  • LEARN  to identify, assess, and manage IT security risks in alignment with business objectives and compliance requirements.
  • ACQUIRE  knowledge of audit methodologies, techniques, and tools for evaluating the security posture of IT systems and infrastructure.
  • UNDERSTAND  the role of compliance in IT security and develop strategies for ensuring adherence to applicable laws and regulations.
  • UNDERSTAND  the importance of continuous improvement and ongoing monitoring to maintain a secure and compliant IT environment.



Want to know more?

askmj@wtc-intl.com



Other Workshops:

February 25, 2025
OVERVIEW Have you noticed that nearly everything in life requires compromise and thus requires some degree of negotiation to get more of what you want and less of what you don’t want? Negotiation is a vital skill for professionals across every job function, whether it applies to partners, vendors, colleagues, employees, or recruits. Successful negotiation requires self-awareness, preparation, and practice. Our research team aims to produce principled and innovative leaders who improve the world . To make a difference, you must first be able to influence people. By understanding how to negotiate effectively, you can gain a competitive advantage, achieve business objectives, and effect change. In reality, NEGOTIATION occurs almost on an everyday basis and often in situation we do not even think about as a negotiation with our peer at workplace. When do you negotiate? • Negotiate on Minimising Costs • Negotiate Your Way Out of Adversity • Negotiate Solution Due to The Delays • Negotiate With Your Current and New Vendors • Negotiate With Customers That You Cannot afford to lose • Negotiate Financial Impact in multiple project management • Negotiate with your employees on employment performance and benefits • Negotiate For Better Collaboration Rather than Confrontation With Stakeholders (Internal and External Partners) Our Wise Negotiator content delivery is NOT your typical negotiation training. Firstly it is NOT just slide and tell. Secondly, you will engage in negotiations and receive feedback in the class . Beyond learning the frameworks and skills associated with negotiating, you will practice putting these new skills into action. You will also learn to understand, plan, and achieve your objectives in a variety of contexts by incorporating neurolinguistic programming (NLP) in negotiation process . Trainer will demonstrate the essence of Neuro-Linguistic Programming (NLP) techniques using a variety of learning modalities and NLP techniques. “It’s Not Just The Terms Of A Deal That Matter, But Also How The Parties Feel When They Walk Away.”
February 25, 2025
OVERVIEW Protect Your Business Against Expensive Malpractices and Fraudulent Behaviour The rise in contract management and the outsourcing of goods and services has created an increase in procurement fraud, which can occur at any stage of the contracting and procurement process. Appropriate controls, fraud prevention strategies and proper tendering processes are necessary in the fight against this fraud. It is important to remember that maintenance of financial controls remains critical in this age of digitalisation. Public and private sectors must continue to comply with legal responsibilities and related guidance on financial governance. It is essential that all staff maintain financial records and decision logs – regardless of any circumstances - so that audit trails are preserved . Procurement, finance, and payroll staff – as well as those who requisition or authorise the purchase of goods, services and works should familiarise themselves with the controls set out to prevent fraud , identify key parameters for auditors in assessing the risk of sub-optimal procurement, and how they should prioritise and conduct their audits to check if these risks have materialised, including the risk of fraud and corruption. Procurement fraud can occur through departmental purchasing of goods and services, as well as through contractual arrangements with external service providers. It can occur in many different ways. Fraud within the procurement life cycle is high risk and can result in recurring losses. You may be at risk due to fraudulent activities conducted by internal staff, collusion between internal staff and external service providers or external service provider or industry collusion. This workshop offers insight into the specific risks and possible management techniques in procurement in good or tough times. This 14 hours training programme would equip participants with the knowledge, skills, and techniques to deter, prevent, and detect various devastating types of fraud. Learn how to identify procurement fraud situations, uncover rogue operatives and threats and provide a higher level of transparency and control over all elements of your purchasing requirements.