Search
Filters
Close

Global Technology Audit Guide (GTAG): Assessing Cybersecurity Risk

Organizations of all types are becoming more vulnerable to cyber threats due to their increasing reliance on computers, networks, programs and applications, social media, and data.

PDF

$0.00
$25.00
//when a customer clicks 'Enter' button we submit the "add to cart" button (if visible)
$25.00

Roles of the Three Lines of Defense

 In response to such emerging risks, CAEs are challenged to ensure management has implemented both preventive and detective controls. CAEs must also create a clear internal audit approach to assess cybersecurity risk and management’s response capabilities, with a focus on shortening response time.

 

Assessing Cybersecurity Risk: Roles of the Three Lines of Defense, was designed to help internal auditors develop competence in providing assurance over cybersecurity risks.  This guide discusses the internal audit activity’s role in cybersecurity; explores emerging risks and threats faced by all three lines of defense; and presents a straightforward approach to assessing cybersecurity risks and controls.

 

 

 

 

 

Item Number: 10.1232.dl

Roles of the Three Lines of Defense

 In response to such emerging risks, CAEs are challenged to ensure management has implemented both preventive and detective controls. CAEs must also create a clear internal audit approach to assess cybersecurity risk and management’s response capabilities, with a focus on shortening response time.

 

Assessing Cybersecurity Risk: Roles of the Three Lines of Defense, was designed to help internal auditors develop competence in providing assurance over cybersecurity risks.  This guide discusses the internal audit activity’s role in cybersecurity; explores emerging risks and threats faced by all three lines of defense; and presents a straightforward approach to assessing cybersecurity risks and controls.

 

 

 

 

 

Item Number: 10.1232.dl