Hi [[ session.user.profile.firstName ]]

Leveraging NIST’s Publications to Build Cybersecurity Audit Programs

As a continuation to last month’s webinar where Jeff Sisolak discussed how to leverage the National Institute of Standards and Technology (NIST) library to assist in planning and development of audit strategy, this month’s topic will cover select NIST publications which provide details on how to assess cyber security controls.
Whether you are an IT Auditor, Audit department leader, business manager or just personally interested in understanding IT and Security best practices, this webinar will touch on specific actions to help assess related policies, practices and procedures. Armed with this information, risk and control assessments can be developed or enhanced to help organizations align with regulatory, professional and/or industry expectations for proper and secure information technology controls.
Recorded Mar 19 2020 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brad Barton, CISA, Century GRCS
Presentation preview: Leveraging NIST’s Publications to Build Cybersecurity Audit Programs

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Auditing Cloud Provider Recorded: May 21 2020 64 mins
    Rajiv Das, Principal Plante Moran Management Consulting
    Cloud migration is on the top of the “To-do List” for CIOs and CISOs for the current year, especially with the COVID-19 pandemic which has created a new norm of remote work for majority of the work force. Transition and reliability on the organizational compute, storage and network needs are shifting from on-premise to cloud.
    CISOs and Cybersecurity leaders have an important role to play in advising the business leaders/CIOs for the selection of an appropriate cloud provider and ensuring that they meet the cybersecurity needs for the organization. Cloud provider business agreements are time consuming to finalize, have multi-year obligations and hence they require appropriate due diligence.
    In this webinar, Rajiv will discuss the following aspects of auditing cloud provider:
    •Preparation for Cloud Provider audit
    •Organizational readiness for transition
    •Framework and key artifacts for auditing
    •What happens after audit?
  • ISACA Chapter Meeting Simplifying Policy: Information Security on One Page Recorded: May 20 2020 91 mins
    David Soubly, Principal, IT Security and Risk, ICEX (Intellectual Capital Exchange)
    Year at a Glance
    Charlie Murray, Vice President

    Nominations & Awards
    Keith Cheresko, Chairperson

    Webinar Topic and Speaker

    Simplifying Policy: Information Security on One Page
    David Soubly, Principal, IT Security and Risk, ICEX (Intellectual Capital Exchange)

    Why is information security policy so complex? What can we do about it? How many of you struggle to understand your company’s information security policy? How many are concerned that a policy manual meant to be read and understood by everyone is just too much to handle? How can we work to simplify information security policy, when the security industry itself introduces layers of complexity?

    We will explore these issues, discussing the journey toward simplicity and how challenging it is be “just simple enough.” We will learn about the various forms of “debt” that can create drag in an organization. We will uncover the foundations of data, information, and knowledge, and what this has to do with understanding information security.

    All of this will lead to a one-page information security policy, part of an ongoing quest to represent all of information security on one page, so that everyone gets it. You may not agree with the result, but the journey itself will be compelling.
  • VIRTUAL MAY CHAPTER MEETING Recorded: May 12 2020 139 mins
    Scott Darragh, Economist, State of Michigan Department of Treasury and Paul Traub, Senior Business Economist, Federal Reserve

    Scott Darragh, Economist, State of Michigan Department of Treasury

    Paul Traub, Senior Business Economist, Federal Reserve Bank of Chicago
    Dr. Joe Adams, CISSP, Cyber By Design, LLC
    Dr. Joe Adams joins us to address an important topic on hiring practices in light of the cybersecurity workforce gap. As the founder of the Michigan Cyber Range, Dr. Adams has significant experience in workforce development and training.

    The webinar discusses the huge gap between the supply and demand of qualified talent in the cyber security industry. This gap is estimated to be almost 3 million unfilled jobs around the world, with almost half a million of these in the US alone. The gap’s impact is most apparent as organizations struggle to keep up with increasing government regulations, system complexity, and expanding attack surface. Dr. Joe Adams will look at some of the causes of the gap and how companies can change their recruiting and retention policies to fill positions with the right people.

    This webinar is designed not only for the CAEs but all members of the Board of Directors for both private and public companies.
  • Avoiding data breaches and risk from misconfigurations before it is too late Recorded: Apr 15 2020 55 mins
    Eric Wing, Senior Sales Engineer, Trend Micro
    Cloud misconfigurations are a leading cause of data breaches and security risks within AWS. With an ever-expanding number of new services, the complexity of securing and configuring your AWS environment is always increasing. Security practices are often ignored or overlooked. In this session we will look at common configuration mistakes, the risks that they pose and ways to identify and mitigate these risks.
    This session will include looking at operational responsibility of services such as EC2, EKS, S3, Lambda and how a Cloud Security Posture Management System (CSPM) can be used to monitor and automate security around these services. Deploying to an AWS well architecture framework and compliance to governance such as CIS, HIPPA, NIST, PCI, and GDPR.
    Tim Sackett, SHRM-SCP, SPHR, President of HRU Technical Resources
    A month ago, we were all begging for talent. Any warm body that could come close to doing the job we were ready to talk to. Now, a few weeks later the entire industry might have been flipped upside down. The reality is, for Internal Auditors, the demographics are still not on our side! We will still need a robust recruiting and talent attraction strategy to fill the jobs and skill shortages we have currently, and that are increasing as more and more talent retire.
    Tim Sackett, is an expert in talent acquisition technology, recruiting execution, and author of the best-selling book the Talent Fix. In this session he will show us what world class organizations are doing to attract talent to the most hard to fill jobs across the world, and how some simple changes can have a huge impact in how we communicate to potential talent in getting them to want to come to work for you.
    Right now is when we prepare for hiring what’s next. Great organizations increase their talent during difficult times, so that they can take advantage of the upswing like no one else. Having the right tech stack and strategy in place will make all the difference.
  • Leveraging NIST’s Publications to Build Cybersecurity Audit Programs Recorded: Mar 19 2020 56 mins
    Brad Barton, CISA, Century GRCS
    As a continuation to last month’s webinar where Jeff Sisolak discussed how to leverage the National Institute of Standards and Technology (NIST) library to assist in planning and development of audit strategy, this month’s topic will cover select NIST publications which provide details on how to assess cyber security controls.
    Whether you are an IT Auditor, Audit department leader, business manager or just personally interested in understanding IT and Security best practices, this webinar will touch on specific actions to help assess related policies, practices and procedures. Armed with this information, risk and control assessments can be developed or enhanced to help organizations align with regulatory, professional and/or industry expectations for proper and secure information technology controls.
  • Seeing the Risk Management Forest for the Trees Recorded: Feb 19 2020 63 mins
    Jeff Sisolak, CISM, CISA
    The National Institute of Standards and Technology or NIST has issued a comprehensive library of special publications related to cyber security, risk, and their own risk management framework. The framework is compulsory for Federal systems but also gaining popularity in commercial enterprises because they are free, ubiquitous, and often necessary for doing business with government entities anyway. However, the sheer volume of this body of work can be daunting. While thoroughness and precision can be an asset, it can also make it difficult to see the forest for the trees.
    This presentation will define the foundational elements of any meaningful cyber security risk management program using the NIST Special Publications (SP) as a guide, with an emphasis on what it means for the internal auditor. It will cover the more common documents such as 800-37, and 800-53. It will cover more obscure documents such as SP 800-18, SP 800-60 vol. I & II, and other related documents not published by NIST. It will conclude with tips and techniques for any cyber security risk management audit program, regardless of the actual framework in use.
  • Building a Vulnerability Management Program Recorded: Jan 16 2020 60 mins
    Erik Wille, Director, Information Security – Penske Automotive Group
    Join Erik in talking about building a thriving vulnerability management program that focuses on improving business risk through refocusing efforts on the vulnerabilities that matter most.
    Vulnerability Management is one of the most important, but least sexy, components of an Information Security program coming in at number 3 on the CIS Top 20. Despite its criticality, many organizations fail to get a program off the ground leading to low hanging fruit for attackers. Overwhelming volumes of vulnerabilities, lack of asset visibility and missing foundational components to support a vulnerability program are just a couple of reasons programs fail.
    Erik will take this time to offer ideas on how to build a sound foundation for and standup a program along with where to focus your time to avoid boiling the ocean.
  • IIA Detroit Chapter Ethics Webinar Recorded: Nov 20 2019 122 mins
    Stephen W. Blann, CPA, CGFM, CGMA
    Every day we are faced with ethical dilemmas. They are not all big, earth-shattering decisions between right and wrong… but every ethical decision we face carries a consequence. From behavioral ethics to technical ethics to codes of professional conduct, this session will explore ethical behavior in the workforce, and the critical role that accountability professional play in upholding the public trust.
  • To FAIR or not? A Risk Assessment Discussion Recorded: Oct 29 2019 61 mins
    David Elfering
    There are several ways to get the risk assessment wrong. If the risk is considered a “thing”, and not a “quantity”, we probably got it wrong. Werner Enterprises adopted the FAIR (Factor Analysis of Information Risk) framework to perform quantitative risk assessment of information security and operational risk.
    Dave will walk the audience through their process of adopting FAIR, what worked, what didn’t and the lessons learned as they go through their risk management journey.
  • Following the Digital Investigative Trail. How Digital "Currency" is Exposing Recorded: Sep 26 2019 61 mins
    Bill Hickman and Peter L. Mansmann
    With the widespread adoption of social media sites and phone-based apps, users are leaving data trails everywhere. Often the companies behind these tools do not charge fees to the end users to use their software. Instead the payment method is the collection and reuse of the end user data gathered by the software applications. This data is in turn sold to data aggregators or directly to other companies that sell other products and services. As the data migrates further away from the end user, it is more widely available and less likely to remain in the ownership and control of the originator of the data. More and more often an investigation starts with internet-based searches to identify and analyze this data. The trend will continue to move in this direction.

    Internal Auditors can benefit greatly from understanding how to best integrate this new wealth of information in their audits and investigations. The future of both audits and investigations will need to rely more on technology but cannot neglect the impact and role of the “human element”. Points of particular interest include:

    •Personal assistants (Siri, google home, Alexa),
    •Analytics applied to social media sites,
    •Check in features showing real time locations,
    •The trend towards this data going directly to the public cloud, and
    •Data enablement on more everyday devices.
  • PROMOTING CIVILITY IN THE WORKPLACE Recorded: May 17 2019 121 mins
    We live in contentious times in which divisiveness not only drives people to engage in antisocial and unethical behavior, but creates tremendous risk for organizational cultures and reputations.

    In this free webinar, Don Levonius shares some unique insights on promoting civility in the workplace with a focus on ethics.
  • Digital Transformation and Internal Audit Recorded: Feb 15 2019 59 mins
    Shahn Alware & Michael Wolf
    Digital Transformation is a mandate and companies are adopting methodologies like Agile, XP, and Lean to push the envelope on faster delivery and at the same time continuously improve the product capabilities. This rapid uptrend has given rise to Business and IT embracing DevOps practices such as Continuous Integration, Continuous Delivery, and Site Reliability Engineering. Let's explore the challenges Internal Audit is facing and ways to enable the organization to achieve its objectives.
  • Assessing Cyber Risk - Challenges and Solutions Recorded: Dec 14 2018 60 mins
    STEPHEN HEAD - Experis Finance: Director of IT Risk Advisory Services
    Managing cyber risk in today’s digital environment is extremely challenging, whether your organization is public, private or governmental. In response to the growing frequency and severity of cyber-attacks, many organizations have decided it’s time to focus more of their efforts on cyber risk, starting with a cyber risk assessment. This approach to proactively dealing with the risk of cyber-attacks increases the organization’s awareness of the potential impacts and costs, and enables them to take actions that reduce the overall risk to the organization, minimize the impact of cyber-attacks, and more predictably ensure the continuity of essential services.

    This webinar will provide participants with a high-level overview of assessing cyber risk and explore the following:
    •Threats and root causes of breaches
    •The changing regulatory landscape
    •Security frameworks and tools
    •Practical ways to assess your risk and organizational exposure
    •Key elements of a successful cyber risk management program
  • Auditing Smarter – Not Harder Recorded: Oct 18 2018 61 mins
    Sajay Rai, CPA, CISSP, CISM
    Technology is omnipresent. Technology is helping businesses work faster, smarter and become more innovative. But the same technology is introducing more security risks. Organizations are deploying security technologies to mitigate the security risks and implement continuous monitoring of these risks. Audit departments within organizations are planning to conduct more technology audits than ever before. They are looking to automate their audits. They are looking for newer, smarter audit tools. But before we go any further to identify any new tools, let’s look at the same continuous monitoring tools already deployed within the organizations, which could help the auditors as well.
    The session will discuss the following areas:
    •Asset Inventory
    •Security Information Event Management
    •Identity and Access Management
    •Network Security
    •Mobile Device Management
  • Understanding the FCPA: Recent Trends and Considerations Recorded: Apr 18 2018 60 mins
    Scott Stringer and Amy Slevinski – Baker Tilly
    The Foreign Corrupt Practices Act (FCPA) was enacted in 1977 making it illegal to make payments to foreign government officials for the purpose of obtaining or keeping business. The anti-bribery provisions of the FCPA require maintenance of accurate books and records as well as an adequate system of internal controls. Please join this webinar to gain an overview of the FCPA, discuss recent enforcement trends throughout the years, and understand how the Department of Justice (DOJ) and the Securities and Exchange Commission (SEC) considers a company’s existing compliance program when assessing penalties. The webinar will cover common methodologies and frameworks for identifying possible gaps in existing compliance programs, common pitfalls and considerations when assessing and remediating anti-bribery and anti-corruption compliance gaps, highlighting areas where internal audit practitioners can contribute to a company's anti-corruption monitoring efforts.
  • Enterprise Risk Management in the Age of Business Transformation Recorded: Mar 28 2018 60 mins
    Dr. Mohan Tanniru
    Business transformation in the 21 st century has organizations extending their value chain into
    customer decision making, as they design and deliver “digital services” using advanced
    information technology. Such transformations need organizations to run at a faster speed to
    explore new value creating opportunities and still keep running their daily operations at regular
    speed. So, organizations may need two different organizational structures and governance models
    to manage both faster and regular speeds to isolate risks, including strategic (e.g. brand reputation),
    compliance (e.g. data security and integrity), operational and technical risks that surface when
    working with many unproven technologies, external partners, and evolving customer expectations.
    This presentation will look at strategies to address these risks.
  • Internal Audit and Board Alignment Recorded: Feb 21 2018 55 mins
    Dr. Raj Aggarwal, CFA, Ancora Trust
    Dr. Raj Aggarwal is back to address an important topic on the alignment of internal audit and the board. As a board member, Dr. Aggarwal gets to see both sides, internal audit interaction with the board, and the board expectations of the internal audit function.
    Dr. Aggarwal will expand on the recent article of Board Matters in IIA’s Internal Auditor magazine and share his experiences related to the exchanges of the board and the internal audit.
    This webinar is designed not only for the CAEs but all members of the internal audit function and the Board of Directors for both private and public companies.
  • Understanding the Role of Cyber Insurance in Managing Cyber Risks Recorded: Jan 16 2018 57 mins
    Taras Shalay
    12.00 Noon (eastern) to 1.00 pm (eastern)
    One CPE Credit
    Presenter: Taras Shalay
    In this webinar, Taras will introduce the different coverages available under the cyber insurance and de-mystify the various coverages and terms. In addition, Taras will discuss how the cyber insurance can play a key role in managing the overall cyber risk within an organization.
    By the end of this webinar, participants should be able to:
    • Explain the various terms associated with cyber insurance
    • Understand whether a given policy addresses their cyber risks
    • Examine their own cyber risk policy
    Bio: Taras Shalay
    With 10 years of underwriting and brokerage experience in Professional Liability, Executive Lines and Cyber Liability, Taras has a unique specialization in the insurance industry.
    Taras’ extensive Cyber Liability experience allows him to easily explain the complexities of a Cyber Liability policy, as well as the various different coverage’s available to his clients that may or may not fit their insurance needs. Taras’ main focus is to identify the key exposures for his clients and provide the best available solutions in this quick changing market environment.
    Taras also has a decade of experience with Directors’ & Officers Liability, Employment Practices Liability, Fiduciary Liability, Crime, and Errors and Omissions.
    Taras Shalay is a 2006 graduate of Western Michigan University with a Master’s degree in Economics, where he was also awarded with graduate student of the year in his department.
Live Chapter meeting on internal auditing, risk management and control
Lively topics for new and seasoned internal auditors, students and others are presented montlhly between September and May.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Leveraging NIST’s Publications to Build Cybersecurity Audit Programs
  • Live at: Mar 19 2020 4:00 pm
  • Presented by: Brad Barton, CISA, Century GRCS
  • From:
Your email has been sent.
or close