top of page
Auditing and Improving Cybersecurity Programs - In-Person

Auditing and Improving Cybersecurity Programs - In-Person

Unlock the Secrets of Cybersecurity: A Comprehensive Computer Security Auditor Training Event


In a world where digital realms are intertwined with every facet of our lives, the shield of cybersecurity stands as the guardian of our most precious assets. It's not just about protecting data; it's about safeguarding trust, integrity, and the very essence of our professional and personal existence.


Recognizing the criticality of this domain, we've meticulously crafted "Auditing and Improving  Cybersecurity Programs," an in-person CPE seminar designed to illuminate the path for the cybersecurity auditor who stands on the front lines of computer security auditing.


Why This CPE Training Seminar Is Unmissable


Embark on a journey, across various cities, diving deep into the heart of computer security auditing. Our Monday to Wednesday sessions, running from 9:00 a.m. to 5:00 p.m., are not just meetings; they're a sanctuary for growth, learning, and empowerment of cybersecurity auditors. With 24 CPE credits on offer, this CPE seminar is an unparalleled opportunity to not only enhance your auditor knowledge of auditing computer security but also to elevate your career in the realm of cybersecurity auditing.


What You Will Discover


Our CPE event on being abetter cybersecurity auditor is a beacon for those seeking to:

  • Unravel the intricate relationship between risk, control, and audits, laying the groundwork for a robust cybersecurity framework.
  • Delve into the core attributes of an effective Cybersecurity Program, understanding what sets apart the good from the exceptional.
  • Navigate the treacherous waters of Insider and Outsider threats, developing strategies to assess and mitigate the computer security risks.
  • Master the art of Account Management, ensuring a balance between accessibility and security.
  • Explore methods to limit Privileged accounts, a crucial step in fortifying your cybersecurity defenses.
  • Decode the stages of a Cybersecurity attack, gaining insights into the mind of an attacker to better defend against them.
  • Harness tools and techniques for continuous monitoring of security events, keeping your finger on the pulse of your cybersecurity health.
  • Identify actionable methods to remediate security vulnerabilities, turning insights into impactful actions.


Why It Matters


In today’s interconnected world, the importance of having effective cybersecurity auditing skills cannot be overstated. It's a field that demands continuous learning, adaptability, and an unyielding commitment to excellence. Whether you're an IT professional, a cybersecurity auditor, or a leader within your organization's computer security auditing area, understanding the nuances of cybersecurity is essential. This CPE event offers you a unique opportunity to not only learn from seasoned experts but also to connect with peers who share your passion and drive for securing the digital frontier.


Your Path to Mastery


Join us on this enlightening journey to mastering cybersecurity auditing. Through immersive discussions, hands-on exercises, and real-world case studies, you'll emerge not just with deeper knowledge, but with practical skills and strategies that can be immediately applied to your work. This seminar is more than a learning experience; it's a stepping stone to becoming a vanguard of cybersecurity auditing, ready to face the challenges of today and tomorrow with confidence and skill.


Secure Your Spot


With spaces limited and demand high, we encourage you to secure your spot at the earliest. This is your chance to embark on a journey that promises not just growth, but transformation. Be part of "Auditing and Improving Cybersecurity Programs" and take the first step towards securing not just your future, but the future of the world of the cybersecurity auditor.

  • Details on Event Presentation

    The sessions will be as follows:

    Monday – 9:00 a.m. to 5:00 p.m.

    Tuesday - 9:00 a.m. to 5:00 p.m.

    Wednesday - 9:00 a.m. to 4:00 p.m.

    Offered in-person in various cites each month on Monday-Wednesdays in sessions.

    NASBA Program Disclosure

    Program Level of Understanding: Intermediate

    Prerequisites: Basic understanding of auditing and IT security

    Advance Preparation: None

    Delivery Format: On-site Training (Group-Live); Seminar (Group-Live)

    NASBA Field(s) of Study: "Auditing" and "Information Technology"

    CPE Credits: 24, based on 50 minutes of instruction per hour

  • CPE Event Highlights

    • Deep Dive into Cybersecurity Auditor Best Practices: Gain an in-depth understanding of the essential components that constitute a robust Cybersecurity Program. Learn how to critically evaluate the effectiveness of an information security program and apply best practices in real-world computer security scenarios.

    • Risk, Control, and Audit Dynamics: Explore the intricate relationship between risk management, control measures, and computer security auditing processes. Understand how these elements interplay to fortify cybersecurity defenses.

    • Blueprint of an Effective Cybersecurity Program: Uncover the core features that define a successful Cybersecurity Program. From strategic planning to execution, learn what makes a cybersecurity framework resilient.

    • Insider vs. Outsider Threats: Assess the landscape of cybersecurity threats, distinguishing between the risks posed by insiders and outsiders. Equip the cybersecurity auditor with strategies to assure the mitigate these threats effectively.

    • Account Management Processes: Delve into the critical processes of Account Management, focusing on how to safeguard against unauthorized access and ensure user accountability.

    • Privileged Account Limitations: Determine practical methods to manage and restrict Privileged accounts, minimizing the risk of security breaches through elevated access.

    • Anatomy of a Cyber Attack: Identify the stages of a Cybersecurity attack, gaining insights into the attacker’s mindset and methodologies. This knowledge is crucial for preemptive defense and response strategies.

    • Continuous Monitoring Techniques: Learn about the tools and techniques essential for continuous monitoring of security events. Stay one step ahead by detecting and addressing vulnerabilities in real time.

    • Vulnerability Remediation Methods: Acquire the skills to identify and remediate security vulnerabilities, enhancing the resilience of cybersecurity infrastructures against potential threats.

  • Learning Objectives

    • Learn the relationship between risk, control, and audits

    • Understand the core features of an effective Cybersecurity Program

    • Assess the risks posed by Insider and Outsider threats

    • Identify the processes of Account Management

    • Determine methods to limit Privileged accounts

    • Identify the stages of a Cybersecurity attack

    • Learn the tools and techniques for continuous monitoring of security events

    • Identify methods to remediate security vulnerabilities

  • Key Issues on the Agenda

    Introduction Section 1 Introduction and Learning Objectives
    Section 2 Overview, Definitions and Concepts: Internal Control and Auditing
    Section 3 Components of Cybersecurity Programs
    Section 4 Internal Control and Cybersecurity Frameworks
    Section 5 AICPA Cybersecurity Risk Assessments
    Section 6 Security Certifications
    Section 7 Security and Privacy Laws and Regulations
    Section 8 Breach Disclosure Requirements
    Section 9 Understanding the Mission of the Organization
    Section 10 Tone at the Top - The Auditor's Influence
    Section 11 The Role of the CSO/ CISO
    Section 12 Evaluating a Cybersecurity Risk Assessment
    Section 13 Security Policy Development, Administration and Auditing
    Section 14 Data Classification and Protection Methods
    Section 15 Protecting the Physical Equipment
    Section 16 Assessing Controls in Network Components
    Section 17 Account Authentication
    Section 18 Controlling Your Endpoints
    Section 19 DevOps Application Security
    Section 20 Configuration Management
    Section 21 Asset Audits
    Section 22 Vendor Management
    Section 23 Command, Communication and Control
    Section 24 Testing the Controls
    Section 25 Corrective Action Plans
    Section 26 Case Study: Anatomy of an Attack
    Section 27 Countermeasures
    Section 28 Summary and Wrap-Up

  • Summary of the Subject Matter

    The Auditing and Improving Your Cybersecurity Program CPE training event is a comprehensive program designed to help professionals improve their knowledge and skills in the field of cybersecurity auditing. Hosted by Dave Marshall, CCS founder, this event provides participants with a deep dive into the latest techniques and best practices for auditing cybersecurity programs.


    Throughout the training, attendees will have the opportunity to interact with an industry expert and network with other professionals in the cybersecurity field. The CPE event is designed for individuals working in IT, internal audit, risk management, and compliance roles. It is also designed for anyone looking to improve their knowledge and skills in cybersecurity auditing.

    Attendees will learn about the fundamental concepts of cybersecurity and how to assess the effectiveness of cybersecurity programs and controls. The program covers topics such as risk management, security governance, incident management, and compliance with industry standards and regulations.


    The event is aimed at professionals who work in cybersecurity, IT, audit, risk management, and compliance roles. It is also ideal for individuals looking to improve their knowledge and skills in the field of cybersecurity auditing. The training is delivered by experienced instructors who have a deep understanding of the industry and the latest trends and developments.


    In this CPE training session, the instructor possesses a significant amount of experience in the industry and is well versed in the latest trends and developments in the field of cybersecurity. The training is approved for Continuing Professional Education (CPE) credits, making it a valuable investment for individuals looking to maintain their professional certifications, i.e. CIA, CISA, CPA and CFE.

bottom of page