This site uses cookies to store information on your computer. Some are essential to make our site work; others help us improve the user experience. By using the site, you consent to the placement of these cookies. Read our privacy policy to learn more.

Technical

Information Security Governance Logo aicpa

  $179.00 - 229.00 |   CPE: 11.5 |   AICPA |   27 Sep 2018 |   Computer Science |   AICPA Store
The essential competencies you need to understand information security strategies.
Who Will Benefit
  • Auditors
  • Accounting professionals
  • Technology employees
  • Leaders & Executives
  • Technology Managers
  • Anyone with responsibilities in finance
  • Policy administrators
  • IT staff
  • CPAs interested in the CITP credential
Key Topics
  • Elements of security policy
  • Organizational risk assessment
  • Identity and access management
  • Logical and physical access controls
  • Network and system security controls
  • Buiness continuity planning
  • Disaster recovery
Learning Objectives
  • Recognize and differentiate information security policies and strategies to guide the development of standards and procedures, in alignment with organizational goals and objectives.
  • Identify and analyze risk management processes and procedures to ensure compliance with applicable security, privacy laws and regulations.
  • Identify and differentiate among the four types of access control: identification, authentication, authorization, and accountability.
  • Identify logical and physical access controls necessary to safeguard critical systems and information pursuant to compliance requirements.
  • Identify incident response processes for detecting and responding to security risks.
  • Determine the proper steps to implement comprehensive business continuity, disaster recovery, and incident response plans.

Information security governance is an essential part of any organization or firm's cybersecurity strategy. This CPE course will provide participants with the knowledge and tools needed to maintain an effective framework for information security governance. You will also recognize the policies, controls and countermeasure procedures to ensure proper control and compliance over confidentiality, availability and information.

Please note: If you are seeking the CITP credential this course provides essential competencies on the learning pathway towards understanding information security strategies to help guide and maintain access control polices and procedures in alignment with organizational objectives and compliance requirements.

Topics covered:
  • Management accounting: Technical: Risk management & internal control: Risk management policies & procedures, Foundational

Comments/Reflections