Your Guide to SEC Cybersecurity Compliance with NIST 800-53

Your Guide to SEC Cybersecurity Compliance with NIST 800-53 In the ever-evolving digital landscape, cybersecurity has risen to the forefront of concerns for organizations around the globe. Achieving security compliance is not just about ticking boxes but about ensuring the integrity and confidentiality of sensitive information. As a renowned consulting firm with expertise in cybersecurity, […]

Your Guide to SEC Cybersecurity Compliance with NIST 800-53 Read More »

Top 10 Security Risks with Artificial Intelligence (AI) Systems

Top 10 security risks auditors should focus on when performing an audit over Artificial Intelligence (AI) Systems:  Data breaches and unauthorized access: AI systems rely heavily on vast amounts of data. It is crucial to ensure that adequate security measures are in place to protect the data from breaches, such as unauthorized access, hacking, or

Top 10 Security Risks with Artificial Intelligence (AI) Systems Read More »

Cart

9 Simple Steps to Protect your Financial Credit and Identity

Freeze your credit with Equifax, Experian and TransUnion.  NerdWallet has a great article with step-by-step instructions for freezing your account and unfreezing your account (when applying for a loan or new credit card).  Placing a credit freeze does not affect your credit score and it is free for you and your children, as is lifting

9 Simple Steps to Protect your Financial Credit and Identity Read More »

Auditing Active Directory

Auditing Active Directory   Click for 10% off through Illumeo   Active Directory Security Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data. First, this course takes you through the architecture of Active Directory. We discuss methodologies for identifying Forests and auditing Domains, Organizational Units and Groups. Next, you learn how

Auditing Active Directory Read More »

Auditing Change Management

Auditing Change Management   Click for 10% off through Illumeo   IT Change Management Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data. A robust change management process provides management with assurance only authorized and tested changes to systems and infrastructures are implemented. As such, the audit or compliance professional must have a solid understanding of the corresponding

Auditing Change Management Read More »

Auditing Logical Security and Logical Access Controls

Auditing Logical Security and Logical Access Controls   Click for 10% off through Illumeo   Logical Security Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data.  Logical Security Controls are comprised of tactics such as utilizing restricting user access, limiting administrative privileges, enforcing strong passwords and encrypting data.  In this course

Auditing Logical Security and Logical Access Controls Read More »

Auditing Information Technology (IT) General Controls

Auditing Information Technology (IT) General Controls   Click for 10% off through Illumeo   IT Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data.  IT Controls are comprised of tactics such as utilizing strong passwords, encrypting laptops and backing up files.  In this course you will learn how to ensure proper

Auditing Information Technology (IT) General Controls Read More »

Security Information Event Management (SIEM) – A Cybersecurity Solution to Preventing Phishing, Ransomware and Data Breaches

Security Information Event Management (SIEM) – A Cybersecurity Solution to Preventing Phishing, Ransomware and Data Breaches   Click for 10% off through Illumeo   Security information and event management (SIEM) is an approach to security management that seeks to provide a complete view of an organization’s information technology security. This course provides participants with an

Security Information Event Management (SIEM) – A Cybersecurity Solution to Preventing Phishing, Ransomware and Data Breaches Read More »

Performing a Security Assessment

Performing a Security Assessment   Click for 10% off through Illumeo   To stay safe, organizations need to maintain a deep understanding of developing threats and their own security posture. Rarely are the necessary resources actually fully dedicated.  In this course we show you what a security assessment and its various components are. This course takes

Performing a Security Assessment Read More »

Shopping Cart