IT & Cybersecurity Audit: Proven Audit Approaches for An Increasingly Complex Digital & Compliance Landscape (17 - 18 February 2025) St. Giles Boulevard Hotel, Kuala Lumpur

OVERVIEW


Cybersecurity and IT audit play crucial roles in protecting organizations from cyber threats and ensuring compliance with regulatory requirements. However, these areas pose several challenges in today's digital landscape.


Top 5 Cybersecurity & IT Audit CHALLENGES


  • Increasing complexity of cyber threats
  • Evolving regulatory requirements
  • Difficulty in assessing and managing IT risks
  • Increasing need for effective security controls
  • Auditing emerging technologies


What This Course Offers:


The 2-day IT & Cybersecurity Audit and Compliance course aims to address these challenges by equipping participants with the necessary knowledge and skills. By attending this course, participants can gain insights into audit and compliance frameworks, industry best  practices, and practical techniques to overcome these pain points, ultimately ensuring effective IT security governance and safeguarding digital assets.


5 PRACTICAL EXERCISES:


  • IT risk management case study
  • Selection of different types of IT/ cyber audits
  • Pros and cons of the different frameworks
  • IT audit planning memo
  • Audit planning on emerging technology or risk


SIGN UP   with us if you are MAD enough. MAD stands for “Making a Difference”. If your organization wants your employees to gain knowledge and skills necessary to effectively assess, evaluate, and manage the security and compliance aspects of information technology systems.


LEARNING OBJECTIVES

  • UNDERSTAND  the fundamentals of IT/Cybersecurity audit and compliance, including key concepts, principles, and terminology.
  • GAIN  insights into relevant regulatory frameworks and industry standards such as ISO 27001, NIST, PCI DSS, HiTrust.
  • DEVELOP  a systematic approach to conducting IT/Cybersecurity audits, risk assessments, and vulnerability assessments.
  • LEARN  to identify, assess, and manage IT security risks in alignment with business objectives and compliance requirements.
  • ACQUIRE  knowledge of audit methodologies, techniques, and tools for evaluating the security posture of IT systems and infrastructure.
  • UNDERSTAND  the role of compliance in IT security and develop strategies for ensuring adherence to applicable laws and regulations.
  • UNDERSTAND  the importance of continuous improvement and ongoing monitoring to maintain a secure and compliant IT environment.



Want to know more?

askmj@wtc-intl.com



Other Workshops:

September 29, 2025
OVERVIEW Protect Your Business Against Expensive Malpractices and Fraudulent Behaviour The rise in contract management and the outsourcing of goods and services has created an increase in procurement fraud, which can occur at any stage of the contracting and procurement process. Appropriate controls, fraud prevention strategies and proper tendering processes are necessary in the fight against this fraud. It is important to remember that maintenance of financial controls remains critical in this age of digitalisation. Public and private sectors must continue to comply with legal responsibilities and related guidance on financial governance. It is essential that all staff maintain financial records and decision logs – regardless of any circumstances - so that audit trails are preserved . Procurement, finance, and payroll staff, as well as those who requisition or authorise the purchase of goods, services and works should familiarise themselves with the controls set out to prevent fraud , identify key parameters for auditors in assessing the risk of sub-optimal procurement, and how they should prioritise and conduct their audits to check if these risks have materialised, including the risk of fraud and corruption. Procurement fraud can occur through departmental purchasing of goods and services, as well as through contractual arrangements with external service providers. It can occur in many different ways. Fraud within the procurement life cycle is high risk and can result in recurring losses. You may be at risk due to fraudulent activities conducted by internal staff, collusion between internal staff and external service providers or external service provider or industry collusion. This workshop offers insight into the specific risks and possible management techniques in procurement in good or tough times. This 14 hours training programme would equip participants with the knowledge, skills, and techniques to deter, prevent, and detect various devastating types of fraud. JOIN US to learn how to identify procurement fraud situations, uncover rogue operatives and threats and provide a higher level of transparency and control over all elements of your purchasing requirements.
The Power of Training Need Analysis To Drive Success: 
Identifying and Addressing Key Training Needs
By Rentech Solutions September 29, 2025
Join us for "The Power of Training Needs Analysis to Drive Success". Learn to identify and address key training needs, boost organizational performance. HRD Corp claimable course. Register now!