Upcoming Dates & Locations
What Every IT Risk Assessment Should Include - OAR686WEB
A risk assessment shows an organizations’ ability to maintain the confidentiality, integrity, and availability of information assets. Organizations are expected to have a demonstrated risk management process that includes asset identification and inventory, vulnerability and threat analysis, control inventory, risk assessment and response, monitoring, reporting and incident response and business continuity. This webinar provides the information you need to assess these dynamics.
Who Should Attend
Financial, Operational and Information Technology auditors and Audit management, Information Security, Project Managers and Risk Management professionals who need to know about the risk assessment process.
What You’ll Learn
You will learn the more common risk assessment and analysis requirements for meeting regulatory and industry requirements.
- Risk Management Strategy and Program Development
- The Risk Universe and it's Key Components
- Inherent Risk Concept and Assessment Techniques
- Scenario Analysis Development Fundamentals
- Regulatory Requirements for Assessments
- Conducting a Maturity Assessment (Gap between current and desired state)
- Tips to Conducting Third Party Assessments
- Risk Response Preparation and Execution Basics
- Assessment Follow-up
Why You Should Attend
You should attend because identifying, assessing, and examining the organization’s IT risk management practices are an integral part of internal auditors’ responsibilities.
MIS Training Institute is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org.