Impact of COVID-19 on Enterprise Security Controls - ITG223

Description

The COVID-19 pandemic has resulted in many employees working from home. The transition from working in the office to working at home was abrupt with minimal time to establish a strategy for a secure telecommuting environment. As a result, there is solid evidence of a significant increase in cyberattacks focused on employees working from home in order to penetrate enterprise networks.

During this two-day seminar we will review the short-term and long-term security and control challenges and discuss a strategy to address the key risk areas.

Audit’s charter is to assess risk and provide an independent opinion to Management and Board of Directors. Enterprise information security risks have significantly increased due to COVID-19. Should Audit alter their 2020-21 audit plans to instead address this new information security risk environment?

Specific control references to globally recognized security & control resources will be included in the discussion of control focus areas.

What You Will Learn:

  • Describe and assess the top security threats and exposures caused by the COVID pandemic
  • Identify key frameworks and other resources with useful information to help protect organizations
  • Examine workplace dynamics impacting work from home risks and control
  • Assess core IT Infrastructure controls, cloud computing, change management practices and network security protocols
  • Evaluate the governance implications of the new COVID world caused by increasing work from home arrangements

Prerequisite: IT Auditing and Controls (ITG101) or IT Audit School (ITG121) or equivalent experience. Familiarity with IT technology and IT control terminology and concepts is assumed


Advanced Preparation: None
Learning Level: Intermediate
Field: Auditing
Delivery Method: Group Live

What you will learn

1. COVID-19 Risk Assessment and Audit Planning
  • COVID-19 related security threats, risks and exposures
  • Identifying immediate, short-term and long-term information security risks
  • Review of recent security incidents including increased phishing, ransomware attacks and targeting home work environments
  • Risks with employees and auditors working remotely from home
  • Review of potential security concerns for home working environments including authentication, VPNs, encryption, computer access protection, etc.
  • Risks associated with videoconferencing and file sharing tools and services
  • Risk of attacks on internet facing web applications / servers
  • Risk of increased employee fraud and abuse
2. Audit and Security Resources
  • NIST Cybersecurity Framework
  • Center for Internet Security 20 Controls
  • FISMA – NIST 800-53
  • OWASP - Open Web Application Security Project
 
3. Addressing Working from Home (WFH) Risks
  • Advantages of working from home
  • Risks of working from home
  • Determining appropriate WFH controls
  • WFH security awareness training
  • Company provisioned, centrally managed PC for WFH employees
  • Virtual desktop (VDI) environments
  • End point patch management
  • End point security
  • Virtual Private Networks (VPNs)
  • Wireless
 
4. Assessing Remote Collaboration / Meeting Options
  • Determining the optimal / secure meeting option
  • Google Meet
  • GoToMeeting
  • Microsoft Teams
  • Skype (Microsoft)
  • WebEx Meetings / Teams (Cisco)
  • Zoom
  • Others
 
5. Assessing long term risks and controls
  • Establishing timing baseline for returning to office locations
  • Defining what the “New World” will look like
  • Assessing risks with returning to office locations
  • Will employees still be working from home?
  • Determining long term risks
6. User Access Security in the New World
  • Social media and social engineering risks
  • User access risks and controls
  • Authentication and authorization controls
  • Addressing potential employee fraud and abuse
 
7. Core IT Infrastructure Control Assessments
  • Privileged access monitoring
  • Log management / threat detection
  • Distributed applications / middleware
  • Vulnerability assessments
  • Database risks and controls
  • Addressing SQL injection attacks
 
8. Change Management
  • Change Management
  • Patch Management
  • Security Configuration Management (SCM)
 
9. Network Perimeter Security
  • Network risk analysis
  • Establishing network hardware / software inventory
  • Ransomware attacks
  • End point security
  • Threat and vulnerability management
  • Firewalls and perimeter security
  • DMZ and web server / application security
  • Intrusion Detection Systems (IDS / IPS)
 
10. Cloud Computing
  • Assessing cloud computing risks in the new world
 
11. IT Governance in the New World
  • Defining IT Governance
  • IT Governance risks
  • IT Governance components
  • Information Security Governance
  • IIA - IT Governance Audit Considerations
  • ISACA - IT Governance Audit Considerations

Further information

ACI Learning
Provider:
ACI Learning
Duration:
2 Days
Locations:
Amsterdam, Atlanta, Ga, Bandar Seri Begawan, Boston, Ma, Burlington, Ma, Cape Town, Charlotte, Nc, Chicago, Il, Dallas, Tx, Denver, Co, Dubai, Dublin, Dublin, Oh, Hong Kong, Houston, Tx, Las Vegas, Nv, London, Manila, New York, Ny, Oman, Orlando, Fl, Philadelphia, Pa, San Antonio, San Diego, Ca, San Francisco, Ca, Seattle, Wa, Singapore, Virtual Training Room Only, Washington, Dc

Contact Information

ACI Learning

6855 S. Havana St.
Suite 230
Centennial
80112 USA

Locations