Fc-Logo
  • About Us
    • Overview
    • FAQs
    • Instructor Bios
    • Management
  • Contact

 0758 845 4536

  • Training
    • Accountancy training
    • Software training
    • MTD
    • E-Learning
  • In-House Training
  • Workshops
  • Recruitment
  • Compliance training
    • Global banking & Financial Risk
    • Financial Crime Prevention
    • Combating the Financing of Terrorism
    • Governance, Risk & Regulatory Compliance
    • KYC and CDD
    • Anti Money Laundering
  • Meet the Team

 07588 454536

Questions? Call  07588 454536

  • Training
    • Accountancy training
    • Software training
    • MTD
    • E-Learning
  • In-House Training
  • Workshops
  • Recruitment
  • Compliance training
    • Global banking & Financial Risk
    • Financial Crime Prevention
    • Combating the Financing of Terrorism
    • Governance, Risk & Regulatory Compliance
    • KYC and CDD
    • Anti Money Laundering
  • About
    • Overview
    • FAQs
    • Instructor Bios
    • Management
  • Contact
InfoSec Insider
Are You Investing in the Right Cybersecurity Tools?
By Marcos Colón
October 23, 2018

NSS Labs CEO Vikram Phatak speaks with InfoSec Insider and offers up tips to up-and-coming security professionals on how to make smart and effective cybersecurity solution purchasing decisions. From blocking out buzzwords and marketing jargon to building a great team, here’s what you need to know.

InfoSec Insider
Why Data Privacy and Policy Training Matters
By Josue Ledesma
October 23, 2018

Data privacy and protection is an often underappreciated aspect of information security, but in many ways, it provides the foundational groundwork for a well-established security environment that offers internal and external reassurance. Here's why and how you should train up your team.

Internal Audit Insights
The IT Audit Checklist for Emerging Risks
By Sarah Swanson
October 22, 2018

Many organisations are still failing to effectively audit areas such as cloud security or even social media. So what areas should you be covering and why? This article answers questions tied to that topic. Here you'll find the top IT risks that consistently vex companies and protect your assets.

Internal Audit Insights
Using Histograms to Better Understand Data
By Hernan Murdock
October 22, 2018

Histograms are a very powerful tool to analyze data because they show the distribution of a continuous variable in a diagram and their appearance is similar to bar graphs. In this feature article, MISTI's Dr. Hernan Murdock explains how internal auditors can leverage them.

Internal Audit Insights
How to Make Findings and Recommendations More Persuasive
By Hernan Murdock
October 16, 2018

Persuasion is an important aspect of internal auditing that doesn’t receive enough attention or coverage. Internal auditing is done to verify that conditions and practices are as expected, and to identify opportunities for improvement within organizations.

InfoSec Insider
The New Regulatory Wrinkles for Data Protection You Should Know About
By Aaron Turner
October 16, 2018

We’ve seen the rules for data security change from relatively simple policies, such as simple access controls, to much more complex policy requirements with the implementation of GDPR. This article’s intended to cover three new perspectives that will influence data protection controls in the coming years.

Internal Audit Insights
Can Internal Auditors Perform Advisory Reviews While Remaining Independent?
By Nancy Luquette
October 11, 2018

Is serving as an advisor and maintaining internal audit’s essential responsibility of objectivity, free of management influence, possible? Spoiler alert: Yes. And it’s both necessary and crucial to the internal audit profession’s standing in any organization.

InfoSec Insider
Cryptocurrency Mining Malware and Cryptojacking: What to Know and How to Protect Your Organization (Part 2)
By Ed Moyle
October 10, 2018

On Tuesday InfoSec Insider kicked off a how-to video series that focuses on topics surrounding the challenges that our readers face on a daily basis. In this companion video, security expert Ed Moyle provides a deep dive on how you can protect your organization from cryptocurrency mining malware and cryptojacking.

Internal Audit Insights
How Internal Auditors Can Change How Audit Clients Listen to Them
By Jill Schiefelbein
October 09, 2018

In a perfect world, the client is receptive, understands each recommendation, and takes immediate corrective action. But we all know that perfect world doesn’t exist. In this informative feature, communications expert Jill Schiefelbein explains what internal auditors can do to make audit clients more receptive to their communication.

InfoSec Insider
Need a Concise Guide to Pen Testing? Here It Is.
By Jim Romeo
October 08, 2018

What's the best way to detect network risks and other vulnerabilities from cyber threats? If you guessed a pen test, then you're right. In this feature article, we've created a no-nonsense that answers pertinent questions about penetration testing.

InfoSec Insider
Cryptocurrency Mining Malware and Cryptojacking: What to Know and How to Protect Your Organisation
By Ed Moyle and Raef Meeuwisse
October 08, 2018

Security experts Ed Moyle and Raef Meeuwisse dissect the topic of cryptocurrency mining malware and cryptojacking; what it means to you as a security professional and how you can protect the enterprise from it.

Internal Audit Insights
Complex Fraud Scheme: Vendor Overbilling Part 2
By Leonard Vona
October 04, 2018

In this second installment of our two-part series on vendor overbilling, we look at how to use fraud data analytics designed to uncover a complex fraud scheme and the fraud audit procedures designed to provide credible evidence.

InfoSec Insider
Security Automation is Here. Now What?
By Marcos Colón
October 02, 2018

What's the best way to detect network risks and other vulnerabilities from cyber threats? If you guessed a pen test, then you're right. In this feature article, we've created a no-nonsense that answers pertinent questions about penetration testing.

Internal Audit Insights
Complex Fraud Scheme: Vendor Overbilling Part 1
By Leonard Vona
October 02, 2018

Fraud expert and MISTI instructor, Leonard Vona, selected a complex corruption scheme and a complex overbilling scheme to illustrate how fraud auditing can detect even the most complex schemes.

InfoSec Insider
Creating the Perfect Incident Response Playbook
By Marcos Colón
October 01, 2018

Arctic Wolf’s Sam McLane sits with InfoSec Insider at Black Hat, a security conference in the US, to discuss the major dos and don’ts when it comes to incident response, in addition to some misconceptions that some security practitioners may have on the topic

Internal Audit Insights
Common Audit Committee Questions on Cybersecurity
By Marcos Colón
October 01, 2018

Internal Audit Insights catches up with Yulia Gurman, Director of Internal Audit and Corporate Security at the Packaging Corporation of America on the common questions that audit committee members have tied to cybersecurity, and what IT auditors should prepare for.

InfoSec Insider
Social Mapper: The What, Why, and How
By Marcos Colón
September 30, 2018

InfoSec Insider catches up with Trustwave SpiderLabs Threat Intelligence Manager Karl Sigler on the company’s latest open source tool which enables penetration testers and red teasers to scrape social media data.

Internal Audit Insights
GRC at the Speed of Business
By Marcos Colón
September 20, 2018

Internal Audit Insights catches up with Ford Winslow, CEO of ICE Cybersecurity, to discuss what the “speed of business” has had on GRC controls, and what IT auditors should prepare for.

Internal Audit Insights
The Pareto Diagram: A Tool for Internal Audit to Focus on What Matters Most
By Hernan Murdock
August 30, 2018

As internal auditors increase their use of data analytics to better understand process characteristics, isolate issues and perform more accurate root cause analysis, the Pareto Diagram continues to grow as a useful tool for them.

Internal Audit Insights
The Dos and Don'ts of IT GRC in the Cloud
By Marcos Colón
August 23, 2018

IT audit expert Mark Thomas, president of Escoute Consulting, chats with Internal Audit Insights on the impact that cloud migration has had on the business, and shares the major Dos and Don'ts that IT auditors should know about GRC in the cloud.

InfoSec Insider
The State of Mobile Payments Security
By Aaron Turner
August 23, 2018

What is the bottom line from a security perspective when it comes to mobile payments? In the current state of the ecosystem, mobile security expert Aaron Turner offers up his take and advice on the topic.

Internal Audit Insights
How Internal Auditors Can Leverage the Balanced Scorecard
By Hernan Murdock
August 21, 2018

The balanced scorecard is a system used for planning and management to make sure business operations are aligned with the organization’s mission, vision, and strategy. In this  featured article, MISTI's Dr. Hernan Murdock explains how you can use it to your advantage.

Internal Audit Insights
Training the Internal Auditors of Tomorrow
By Karen Kroll
August 14, 2018

As the business world changes at an accelerating rate, auditors need to keep up or risk becoming irrelevant and unable to provide the insight that will allow their organizations to succeed. That means they’ll need to continually add to their skills and knowledge.

Internal Audit Insights
Innovation: The New Imperative for Internal Audit
By Terry Hatherell, Deloitte Global Internal Audit Leader
August 14, 2018

As organizations continue to evolve and innovate, new risks arise. Meanwhile, the larger business environment continues to change, often rapidly and in unexpected ways. This places new demands on the internal audit function.

InfoSec Insider
GDPR is Here...So What's Next?
By Heather Dean Bennington
August 14, 2018

GDPR was a major focus for many organizations this year. Whether it has been extensive business process mapping, understanding the purposes of personal data, or defining its scope. But now that it's here, what should security professionals focus on next?

Internal Audit Insights
Internal Audit Data Analysis Using Benford’s Law
By Hernan Murdock
August 09, 2018

Organizations are accumulating large amounts of data and internal auditors are rapidly increasing their mining for, and use of, these sizable data sets. This proliferation of data raises the question of how to extract meaning from it all.

InfoSec Insider
How Infosec Can Put More “Intelligence” into Operationalizing Threat Intelligence
By Marcos Colón
August 09, 2018

Threat intelligence expert Dave Ockwell-Jenner discusses how organizations have changed the way they approach threat intelligence, and provides the primary Dos and Don’ts associated with developing a successful threat intelligence program.

Internal Audit Insights
Leveraging Virtual Team Meetings: Four Tips for Success
By Jill Schiefelbein
August 07, 2018

With distributed workforces and flexible workstyles, virtual team meetings are becoming commonplace in the internal audit function. Many times, though, virtual meetings aren’t taken with the same level of seriousness as in-person meetings are.

InfoSec Insider
Mobile Privacy & Infosec Tips for Frequent Travelers
By Aaron Turner
August 03, 2018

Summer will be over before you know it and for many of you, it might be time to hit the road again for business travel. Before you pack up all of your devices, you might want to keep some of this advice in mind to ensure your data is secure.

Internal Audit Insights
What Risks Do Blockchain Present the Enterprise?
By Karen Kroll
August 02, 2018

As the number of blockchain implementations continues to grow, internal auditors will need to learn about both the promise and risk this technology offers. So what exactly is blockchain technology and what does it mean to you as an internal auditor? This article answers that question.

InfoSec Insider
How to Build Practical Cross-Training in Infosec
By Ed Moyle
July 31, 2018

Given the skills gap in information security, it's important for cybersecurity managers to diversify and expand the skill base of their team members. Here, we highlight how they can do it from a practical point of view.

InfoSec Insider
The Cyber Threat Alliance: Making Cybersecurity Collaboration Work
By Marcos Colón
July 26, 2018

The Cyber Threat Alliance’s Chief Analytic Officer Neil Jenkins provides update on the state of information sharing in 2018 and provides some insight on the steps security practitioners can take if they’re interested in sharing their threat data.

InfoSec Insider
Mobile Privacy & Infosec Tips for Frequent Travelers
By Aaron Turner
July 24, 2018

Summer will be over before you know it and for many of you, it might be time to hit the road again for business travel. Before you pack up all of your devices, you might want to keep some of this advice in mind to ensure your data is secure.

Internal Audit Insights
Privacy in 2023: What Internal Audit Can Expect
By Heather Dean Bennington
July 19, 2018

The European Union’s GDPR is officially in effect, but that’s likely not the last regulation that will be implemented that has an impact on the internal audit function. Here’s what you should consider five years from now.

Internal Audit Insights
The Internal Auditor’s Guide to Masterfully Speaking to Boards and Committees
By Jill Schiefelbein
July 18, 2018

The presentation skills that you were likely taught in high school and college in no way prepared you for the reality of delivering reports in front of boards and audit committees. This article is your crash-course in small group presentations and gives you two key areas to consider.

Internal Audit Insights
Rotational Auditing and Fishing
By Sarah Swanson
July 10, 2018

Rotational auditing has been a fishing hole for years. The pros and cons have been fished around too. And then fished around some more. Auditors have a way of fishing. But paddling deeper into audit's consulting water, rotational auditing could provide a venue for teaching risk awareness.

InfoSec Insider
First-Hand Experience in Developing a Threat Hunting Program
By Jessa Gramenz
July 10, 2018

Developing a threat hunting program may be challenging, but it doesn’t have to be. In this feature article, one subject matter expert provides us with a glimpse into her experience on the topic and what you can expect. 

InfoSec Insider
Threat Modeling: What, Why, and How?
By Adam Shostack
July 08, 2018

Threat modeling is essential to becoming proactive and strategic in your operational and application security. 

Internal Audit Insights
IT Audit Should Consider These Third-Party Risk Traps
By Marcos Colón
July 05, 2018

TalaTek’s Baan Alsinawi provides an update on the state of third-party risk management as it relates to IT auditors and sheds light on the hidden traps they should look out for as it relates to trusted business partners.

InfoSec Insider
How Hacked Elections Impacted the Security Industry
By Marcos Colón
July 05, 2018

CA Veracode’s Chris Wysopal discusses how the 2016 presidential election hack broadened the horizon on how security warriors think about defending their data and offers up advice on what they should consider when it comes to protecting sensitive information.

Internal Audit Insights
How IT Audit Can Break Down Communication Silos
By Marcos Colón
June 28, 2018

Escoute Consulting President Mark Thomas dives into the topic of communication challenges within the enterprise, why they exist among IT audit and cybersecurity, and the steps you can take to ensure those silos are broken down.

InfoSec Insider
Looking to Benefit from AI? Build Something!
By Marcos Colón
June 28, 2018

Cylance’s Colt Blackmore discusses why leveraging AI isn’t limited to purchasing an out-of-the-box solution and details the critical steps that security practitioners should take to successfully utilizing the technology to their organization’s advantage.

Internal Audit Insights
Using Key Performance and Key Risk Indicators to Provide Timely Assurance
By Hernan Murdock
June 26, 2018

Information drives modern organizations, so it is imperative that metrics be used that give management objective information. In this instructive article by MISTI's Dr. Hernan Murdock, he advises on how internal auditors can do just that.

InfoSec Insider
Cover Your Bases: Areas to Focus on in Your Information Security Strategy
By Marcos Colón
June 21, 2018

Trustwave’s Karl Sigler discusses the state of cyber threats in 2018 and suggests what areas of your security strategy you should focus on to take proactive steps in measurably reducing risk within the business.

Internal Audit Insights
Who Owns Risk at the End of the Day?
By Marcos Colón
June 21, 2018

Fastpath’s Keith Goldschmidt discusses who the real owners of risk are within the enterprise, but also offers up insight on what IT audit can do to help streamline communication and do their part in creating a “risk culture” within the business.

Internal Audit Insights
Developing Continuous Control Monitoring Procedures Without Losing Independence
By Hernan Murdock
June 19, 2018

When designing continuous auditing procedures, auditors and management must think through what the metrics are, and what thresholds would trigger the auditors’ desire to gain a better understanding of operational issues.

InfoSec Insider
Imagine If Security Solutions Understood Our Language?
By Vijay Dheap
June 19, 2018

It's up to security professionals to infer security significance of all the events security solutions report. The first step to arriving at an answer to this intractable problem is teaching our security tools to understand us. Advancements in Natural Language Processing could help.

Internal Audit Insights
DevOps: What IT Audit Needs to Know
By Marcos Colón
June 18, 2018

XebiaLabs’ Robert Stroud highlights what it is that IT audit needs to know about DevOps, why they should care, and offers up ways in which they can approach DevOps in a constructive manner that ultimately reduces risk in the organization.

Internal Audit Insights
Five Elements of an Effective Audit Planning Process
By Wade Brylow
June 17, 2018

After 25 years in internal audit, I have come to the conclusion that excellent audit planning is essential to ensuring an effective audit. What is a successful audit? A good measure is whether both audit management and the auditee feel good about the end results.

InfoSec Insider
The CISO of Yesterday, Today, and Tomorrow
By Marcos Colón
June 14, 2018

SAP CSO Justin Somaini discusses how the role of the CISO has evolved into what it is today, and what up and coming security leaders should prepare for once they take charge of a security program at a major organization.

InfoSec Insider
The Dark Web: What You Should Know and Why You Should Care
By Josue Ledesma
June 12, 2018

The dark web is one of those elusive subjects that can often get misinterpreted. We spoke to Reclamere's Connie Mastovich to get her expert take on what the dark web is, what risk it poses to companies, and how to protect yourself from it.

Internal Audit Insights
How Technology Impacts the Internal Auditor of Today
By Marcos Colón
June 07, 2018

Onspring’s Jason Rohlf discusses how technology has impacted the internal auditor of today, but also offers tips on how auditors can stay ahead of the curve, rather than play catchup.

InfoSec Insider
Why is DNS Underutilized as a Security Tool?
By Marcos Colón
June 07, 2018

Farsight CTO Merike Kaeo discusses why DNS is still be underutilized as a security tool today, shares some examples of lessons-learned that could apply to you, and provides steps you can take to ensure you’re taking advantage of your DNS infrastructure.

InfoSec Insider
How to Make Sense of Attack Patterns
By Josue Ledesma
June 05, 2018

In this featured post, we speak to TrustedSec Founder Dave Kennedy who offers up advice on how you can set up your security department’s defenses to respond and defend against common attacks.

Internal Audit Insights
Finding IT Help for your Business
By Sarah Swanson
May 31, 2018

According to MISTI’s annual Internal Audit Priorities Report, internal audit leaders are in need of hiring outside assistance for challenges they face surrounding IT security. Here, we share a few tips to help you find the best IT consultant for your needs.

Internal Audit Insights
Why Words, Not Numbers, Are the Internal Auditor’s Most Valuable Currency
By Jill Schiefelbein
May 29, 2018

Numbers and fancy charts are only able to tell part of the story for internal auditors. If you want your reports and your data to come alive for your clients, you need to make your words matter. Words, when it comes to driving action, are your most valuable currency. Here's why.

InfoSec Insider
From Trapping to Hunting: Intelligently Analyzing Anomalies to Detect Network Compromises
By Giovanni Vigna
May 24, 2018

Is your organization adequately equipped to identify anomalous patterns across the network? If you're doubtful, it may be time to try out alternative models that will help you detect previously unknown attacks.

InfoSec Insider
How to Speak the Business of Security Effectively
By Marcos Colón
May 24, 2018

Cisco's Edna Conway shares her insight on what infosec leaders can do to ensure that security becomes an active discussion about the way you operate within the business, rather than an added bolt-on feature.

Internal Audit Insights
From Corporate Cop to Trusted Advisor
By Hernan Murdock
May 24, 2018

Internal auditors have been working toward shedding the "corporate cop" label given to them within the enterprise. But what is a trusted advisor? What do they do and what behaviors are necessary to become a trusted advisor?

Internal Audit Insights
How to Audit Whistleblower Programs
By Hernan Murdock
May 22, 2018

The Sarbanes-Oxley Act of 2002 Section 301 requires publicly-traded companies to have a whistleblowing program.  But, how do we know if the program is effective? This article should help get you on your way.

Internal Audit Insights
How to Keep Millennials in Internal Audit
By Sarah Swanson
May 17, 2018

When salary is fixed and the perks are what a Gen Xer would like but maybe not a millennial (i.e., catered lunches, unlimited paid time off, yoga hour), how does an audit shop change their philosophy to cater to the younger crew? Below we explore different ways to motivate a millennial auditor.

InfoSec Insider
What is Attack Driven Development?
By Marcos Colón
May 17, 2018

Bugcrowd’s Keith Hoodlet outlines the importance of attack driven development and offers up the key steps security practitioners should take for this approach to have a positive impact on their overall security strategy.

InfoSec Insider
Crisis Communications in a Headline-Driven World
By Katherine Teitler
May 15, 2018

Media communication in the face of a cybersecurity incident often gets the shaft in favor of incident handling, but what you don't handle can come back to haunt you.

Internal Audit Insights
Looking to Improve Your Audit Cycle? Try This
By Karen Kroll
May 15, 2018

To continually operate more efficiently and add greater value to the business, internal audit has to boost its performance throughout each stage of the audit cycle. The guidelines below can help you improve the risk assessment, planning, execution, and reporting stages of the audit cycle.

Internal Audit Insights
How Internal Auditors Can Strategize for the Mundane, Part 2
By Sarah Swanson
May 14, 2018

We recently discussed the intersection of emotional intelligence and strategic intelligence. Here are some more common strategic areas to look at. One of these may be similar to your company, or maybe you have some additional strategic areas too. We’d love to hear about them.

InfoSec Insider
How Security Leaders Can Get Proactive with Their Comms Departments
By Marcos Colón
May 10, 2018

Uber’s Melanie Ensign discusses the relationship between the communications function and infosec teams and offers up some uncommon communication tips for security leaders that may have a skewed view of the communications department within their organization.

Internal Audit Insights
When Emotional Intelligence Meets Strategic Intelligence for Internal Auditors, Part 1
By Sarah Swanson
May 08, 2018

Infusing an audit with strategic intelligence can be a little uncomfortable. But a little stretch does an auditor (and the company) good. Here, we've provided a few tips to articulate the big picture to your team and your auditee.

InfoSec Insider
How the 'Fog of More' Bogs Down Infosec Pros
By Marcos Colón
May 03, 2018

Given the troves of education information, training, and technology available to security professionals, you’d think they’d be a step ahead of malicious actors. But this overabundance of information may actually be causing more harm than good. Here’s what one expert had to say about the “fog of more.”

InfoSec Insider
ISACA Workforce Development Report Highlights Need for More & More Qualified Security Employees
By Katherine Teitler
May 01, 2018

Cybersecurity staffing requires more than simply finding enough people to accomplish tasks.

Internal Audit Insights
Why Internal Auditors Should Lead with Their Relevancy and Value, Not Their Title
By Jill Schiefelbein
May 01, 2018

As an Internal Auditor what you do is NOT your title. It's NOT your longevity in the field. It's NOT a credential. However, as an internal auditor the question "What do you do?" typically doesn't receive a straightforward answer. Here we provide you with an activity that will get you thinking about what you DO, and help you communicate it effectively.

InfoSec Insider
How to Manage Your Security Post-Conference Inbox
By Katherine Teitler
April 24, 2018

Cybersecurity conferences often lead to inbox overload, but they don't have to if the onsite experience is managed correctly.

InfoSec Insider
Cybersecurity Executives Misalign Concerns with Actions
By Katherine Teitler
April 17, 2018

Cybersecurity teams seem to understand their biggest areas of challenge, yet the action to put effort behind remediating those problems falls short.

Internal Audit Insights
Essential Steps to Tackling Vendor Risk Management
By Sarah Swanson
April 16, 2018

Internal audit is positioned to help evaluate risk that arises from working with vendors. Here we outline steps for determining which vendors to audit and what to focus on during the audit.

InfoSec Insider
How to Proactively Hunt for Cyber Threats
By Marcos Colón
April 12, 2018

InfoSec Insider catches up with one threat expert who discusses why security professionals should consider a proactive threat hunting model, and outlines how they can take that approach.

Internal Audit Insights
How Internal Audit Can Streamline Processes Through RACI Charts
By Hernan Murdock
April 10, 2018

Effective communication, teamwork, and accountability are key ingredients of efficient programs, processes, and projects. Unfortunately, many organizations suffer due to a misunderstanding of who’s responsible for what. Here, Dr. Hernan Murdock details how RACI Charts can help internal auditors overcome these challenges.

Internal Audit Insights
How Internal Audit Can Benefit from Force Field Analysis
By Hernan Murdock
April 05, 2018

Auditors in search of a great decision-making tool to identify the forces for and against a course of action should look no further than Force Field Analysis. In this feature by MISTI's own Dr. Hernan Murdock, he details how internal audit can leverage this technique.

InfoSec Insider
Five Cyber Risks Your Organization is Likely to Encounter
By Katherine Teitler
April 03, 2018

Today's threat landscape is like a tentacled sea monster that security practitioners have to battle on a daily basis. In this feature story, we highlight the top five most likely cyber risks to organizations today.

InfoSec Insider
Privileged Identities: Who's Watching the Watchers?
By Katherine Teitler
March 08, 2018

Jonathan Sander addresses why security teams fail at controlling privileged identities, and what they should be doing that won't upset the apple cart.

InfoSec Insider
Key Questions to Ask Your Cybersecurity Recruiter
By Katherine Teitler
March 01, 2018

There is no question that the cybersecurity job market is hot, but not any old recruiter is suited to help you with your hiring needs.

InfoSec Insider
The Rise of the Virtual Cyber Security Leader
By Dominic Vogel
November 27, 2017

Learn why the virtual CISO is quickly becoming an attractive option for enterprises.

InfoSec Insider
DeMISTIfying Security: The Impacts of Security Assumptions
By Ed Moyle and Raef Meeuwisse
March 19, 2019

In this follow-up video, the DeMISTIfying Security experts discuss two recent containerisation-related issues and how the modern-day security warrior can venture into the unknown to effectively tackle challenges such as this.

Internal Audit Insights
Strategic Messaging and Influencing Skills: A Framework for Internal Auditors
By Jill Schiefelbein
March 19, 2019

Last month in an article about setting the stage for better decision-making we learned about four elements that you should be considering before you even form the words you want to say. This month it’s all about the messaging.

InfoSec Insider
Are Medical Devices Securely Managed Yet?
By Jim Romeo
March 14, 2019

Recent incidents illustrate the risks that healthcare networks are subject to in today's ever-expanding cybersecurity threat landscape. In particular, securing networked medical devices in this environment can be challenging. 

Internal Audit Insights
Co-Establishing the Need: Internal Audit’s Role in Getting Buy-in at the Client Level
By Jill Schiefelbein
March 14, 2019

One of the most overlooked, but essential, elements of the persuasive process is establishing a definite need in your to-be-persuaded-audience’s mind. In other words, how does the client know that they need what you have to offer? Here, we explore the topic.

Internal Audit Insights
The Many Benefits of Rotation Programs
By Hernan Murdock
March 12, 2019

As business processes become more complex, information more widely dispersed, and the risk environment more complicated, the need for internal auditors to adapt to this new environment becomes imperative. This is where rotation programs can really save the day.

InfoSec Insider
How Moving Away From Traditional Academia Has Changed Cybersecurity Education
By Paul Rohmeyer, Program Director MS Information Systems, Stevens Institute of Technology
March 12, 2019

Today, there are highly specialized training options offered both in-person and online in the form of meetups, webinars, formal courses, and in-house and external conferences. The attractiveness (cost, convenience, and specialty) of these alternative options has driven cybersecurity talent to steer towards education avenues outside of traditional academia.

Internal Audit Insights
How to Approach Internal Audit Recruitment
By Karen Kroll
March 07, 2019

The search for qualified, competent internal auditors remains a challenge for many audit departments. As internal audit leaders continue to struggle qualified additions to their teams, what areas should they be focusing on and what steps can they take? This feature story answers those questions.

InfoSec Insider
Why Your Cybersecurity Comms Need to Evolve
By Dawn Papandrea
March 07, 2019

When you’re talking information security among your peers, it sounds like a totally different language than the rest of your organization speaks. This puts infosec professionals in a bind. On the one hand, security vulnerabilities exist throughout the company. Yet you, alone, are carrying the burden of knowing just how serious it can get. That’s why it’s up to you to create an information security communication strategy.

InfoSec Insider
DeMISTIfying Security: The Top 3 Dangerous Security Assumptions
By Ed Moyle and Raef Meeuwisse
March 05, 2019

From steering clear of marketing buzz to the impact of misinformation, DeMISTIfying Security hosts Ed Moyle and Raef Meeuwisse point out the security assumptions that could be catastrophic to any security practitioner’s role.

Internal Audit Insights
Interested in Becoming an IT Auditor? Here’s What to Know and Do
By Heather Dean Bennington
March 05, 2019

So, what exactly does an IT auditor do? In this article, we provide a broad breakdown of an IT auditor's responsibilities, the necessary skills to become one, how an IT auditor interacts with other roles throughout their organisation, and more.

Internal Audit Insights
Why Symposiums Promote Collaborative Learning in Internal Audit
By Hernan Murdock
March 05, 2019

Internal auditors must engage in lifelong learning. They are increasingly participating in webinars, consuming online content, and listening to podcasts. While all of these actions are conducive to learning, there is another learning opportunity that many internal auditors and compliance professionals may not be familiar with: Symposiums.

InfoSec Insider
How to Manage Employee Mobile Device Risk in Your Organisation
By Josue Ledesma
February 28, 2019

In this article, we’ll go over what devices infosec departments should have an eye on and how to tackle the challenge of BYOD head-on. For an expert’s perspective, we spoke to Georgia Weidman, founder of Shevirah, a mobile and IoT testing company.

InfoSec Insider
How to Turbocharge Your Cybersecurity Awareness Training
By Jim Romeo
February 26, 2019

Cybersecurity awareness training is a critical component to your security hygiene. The most effective training programs are offered frequently and use available frameworks, focus points, tools, and tactics to build a culture where cybersecurity is embraced, not avoided or shunned.

Internal Audit Insights
Communication Skills for Junior Auditors: What to Know and Why
By Jill Schiefelbein
February 26, 2019

There are some common communication mistakes that junior auditors make. Lucky for you, this article is going to point these foibles out and show you how you can change the trajectory of your communication to show confidence, not self-consciousness.

InfoSec Insider
Confused on How to Implement Cybersecurity Policy Based on the NIST Security Framework? Read On.
By Jim Romeo
February 20, 2019

We understand that some security professionals may not have the easiest time implementing the NIST Security Framework. That’s why we’ve created the “missing manual” on getting it right in this latest InfoSec Insider post.

InfoSec Insider
DeMISTIfying Security: Getting a Jump on Zero Trust in Your Environment
By Ed Moyle
February 19, 2019

Last week the DeMISTIfying Security hosts explored the Zero Trust model. This follow-up segment takes things one step further as security veteran Ed Moyle explains how you can get a jump on kickstarting Zero Trust within your organization.

Internal Audit Insights
7 Things to Know About IT GRC in the Cloud
By Heather Bennington
February 19, 2019

In migrating to the cloud, many challenges are present, and perhaps one of the largest challenges is updating an organisation’s overall GRC program. Here, we've gathered a number of things that IT auditors should know about IT GRC in the cloud.

Internal Audit Insights
Auditing The Supply Chain in 2019: What to Know and Why
By Karen Kroll
February 19, 2019

Much internal audit work has focused on financial transactions and controls. Now, many auditors are adding supply chain audits to their responsibilities. In this feature article, we've broken down some of the common risks associated with supply chains.

InfoSec Insider
How to Get Started with Secrets Management
By Ed Moyle
February 14, 2019

The only thing worse than having a huge problem is having a huge problem and not realising it. Believe it or not, many organisations are in the latter boat right now. Specifically, many organisations are undergoing a proliferation of secrets at a scale and scope that eclipses the ability of mechanisms and controls they may have in place to keep them protected.

Internal Audit Insights
How Internal Audit Can Benefit From the Three Lines of Defence Model
By Hernan Murdock
February 12, 2019

The Three Lines of Defence Model provides a framework to clarify the involvement and alignment of multiple assurance providers acting on behalf of their client organisations. It has become increasingly common to have various risk and control professionals working side by side to help their organisations manage risk and increase the likelihood of achieving strategic and operational goals.

InfoSec Insider
2019 Cybersecurity Threat Trends: What Should Be on Your Radar (Part 2)
By Josue Ledesma
February 11, 2019

Last week we shared the first part of this two-part series on cyber threats in 2019. This week we wrap up the remainder of the insights we shared thanks to our conversation with subject matter expert Adrian Sanabria, VP of strategy and product at NopSec.

InfoSec Insider
Glimpsing Inside the Trojan Horse: An Insider Analysis of Emotet
By Max Heinemeyer
February 11, 2019

Emotet is a highly sophisticated malware with a modular architecture, installing its main component first before delivering additional payloads. In this contributed article, Darktrace's Max Heinemeyer, director of threat hunting, breaks down the threat.

Internal Audit Insights
Cybersecurity and Regulatory Changes in 2019
By Heather Bennington
February 07, 2019

As we work toward the thick of the year, we've compiled a list of which cybersecurity regulations could be impactful this year, some of the challenges that they could present, and the reasons behind some of the changes we've highlighted below.

InfoSec Insider
DeMISTIfying Security: Exploring the Zero Trust Model
By Ed Moyle and Raef Meeuwisse
February 05, 2019

In the latest edition of MISTI’s DeMISTIfying Security, Ed and Raef dissect the zero trust model. From the pros and cons, to the obstacles you may face rolling out this philosophical approach to security, this week’s segment will shed new light on this topic.

Internal Audit Insights
Fraud Investigation Reports vs. Audit Reports: What’s the difference?
By Sarah Swanson
February 05, 2019

As fraud investigations get folded into the internal audit department, some audit shops are tempted to frame a fraud report in the same format and tone as the audit report. The idea couldn’t be more wrong. Read on for ways to present a full and succinct fraud investigation report using report design, content, and tone.

InfoSec Insider
2019 Cybersecurity Threat Trends: What Should Be on Your Radar
By Josue Ledesma
January 31, 2019

InfoSec Insider caught up with one SME that helped us put together a list of the looming threats your company should keep an eye on and how organisations can defend themselves accordingly. Here's a look at what you should have on your radar.

Internal Audit Insights
How Internal Audit Can Get Innovative
By Hernan Murdock
January 31, 2019

In internal audit, the methodologies of the past may have made the organization successful, but there is no guarantee that those same procedures will lead to success in the future. In this featured article, MISTI's Dr. Hernan Murdock highlights some examples of ways that innovation can help internal auditors, but most importantly, outlines how they can get started.

Internal Audit Insights
Audit Writer’s Hub: Does Your Report Format Fit Your Needs?
By Sarah Swanson
January 29, 2019

Every company has a different way to communicate and a different report format to use. Well, there is no best way – each format has its pros and cons and you have to weigh the benefits of each format for your audience.

InfoSec Insider
The Thrill of the Hunt (Threat Hunting, That Is)
By Jim Romeo
January 29, 2019

The term threat hunting has been tossed around a lot, but what does it actually mean and can your cybersecurity playbook benefit from it? Many organisations are tapping into its benefits, so we've decided to provide you with a breakdown in this feature article.

Internal Audit Insights
How People Decide: Setting the Stage for Optimal Decision Making
By Jill Schiefelbein
January 24, 2019

Most advice people have regarding decision making is along the line of, “weigh your options”, “get outside advice from a trusted source”, or “look at the cost-benefit or ROI”. That advice is fine and dandy, but it ignores one key fact: If the stage on which the decision is made isn’t set appropriately, the decision may not be the best. Here are four steps to set the stage for productive conversations and more efficient decisions.

InfoSec Insider
Lessons Learned: How to Defend Your Organisation Against Social Engineering
By Josue Ledesma
January 24, 2019

Social engineering is unique in the cybersecurity world as its scope of influence can vary widely on the software, hardware, and even psychological level. In this article, we’ll cover social engineering attacks and help you learn from recent developments in the space.

InfoSec Insider
DeMISTIfying Security: To 2019 and Beyond!
By Ed Moyle and Raef Meeuwisse
January 22, 2019

In last week's segment, Ed and Raef discussed some of the major developments in infosec in 2018. This week, they take out their crystal ball and look into 2019, sharing their thoughts on what many practitioners could expect.

Internal Audit Insights
Privacy in the Age of Big Brother: What It Means for IT Audit
By Marcos Colón
January 22, 2019

Technology has impacted quite a lot, but privacy is likely what hits closest to home for everyone. Internal Audit Insights catches up with IHS Markit Internal Audit Director Tony Redlinger, who discusses what the state of privacy is today, and more importantly, what impact it has on the modern-day IT auditor.

InfoSec Insider
The State of Artificial Intelligence in 2019
By Marcos Colón
January 17, 2019

Artificial intelligence is found in homes across the globe, and it's also being leveraged by troves of organisations across the country. But how mature is the technology and how open should you be to adopting it as part of your security strategy? In this exclusive interview, we catch up with one expert who breaks it down for us.

Internal Audit Insights
Integrating Fraud Testing Into Your Audit Program: A Guide for Chief Auditors
By Leonard Vona
January 17, 2019

Fraud costs organisations millions of dollars each year. Simply Google the phrase “fraud scheme,” and you will discover more news stories than you have time to read. If auditors do not detect and stop a fraud scheme, they have cost their organisation real money. So, another question for you: Do you want to explain to your audit committee why your department did not detect a $63 million fraud?

Internal Audit Insights
Becoming a Risk Assessment Unicorn
By Steve DeSantis
January 15, 2019

You’ve read a bazillion articles on data analytics theory (ho-hum) in auditing. And we'll be the first to say that we've written a variety on this site. But this time around, let’s focus on how to actually use those data analytics in a single audit area: risk assessments. 

InfoSec Insider
DeMISTIfying Security: 2018 Year in Review
By Ed Moyle and Raef Meeuwisse
January 14, 2019

In the latest installment of InfoSec Insider’s DeMISTIfying Security series, security experts Ed Moyle and Raef Meeuwisse return to review the major breaches, developments, and takeaways that you can get from information security events in 2018.

Internal Audit Insights
Women in Internal Audit: Opportunities, Challenges, and More in 2019
By Marcos Colón
January 10, 2019

Internal Audit Insights catches up with Nancy Luquette, senior vice president and chief risk and audit executive at S&P Global, who shares her take on the state of women in internal audit in 2019 and the challenges many female practitioners face, but more importantly, how they can overcome them.

InfoSec Insider
How to Prepare for the Digital Transformation Era
By Marcos Colón
January 10, 2019

Like it or not, the digital transformation era is here. But what does that actually mean--and more importantly--what does that mean to you? We caught up with Zscaler's Business Value Consulting Leader, Jason Georgi, who broke it down for InfoSec Insider.

Internal Audit Insights
How Your Organisation Can Benefit from Internal Audit Rotation Programs
By Hernan Murdock
January 08, 2019

As business processes become more complex, information more widely dispersed, and the risk environment more complicated, the need for internal auditors to adapt to this new environment becomes imperative.

InfoSec Insider
How AI Can Prevent Dangerous Email Mistakes
By Marcos Colón
January 08, 2019

What's the state of artificial intelligence in the enterprise today? More importantly, how can the security and risk department benefit from its benefits to measurably reduce risk within the business? InfoSec Insider caught up with Neil Larkins, CTO at Egress Software, who breaks it down for us.

Internal Audit Insights
How Non-Technical Auditors Can Tackle IT Risks
By Marcos Colón
January 03, 2019

Internal Audit Insights caught up with Jami Shine, corporate and IT audit manager at Quiktrip Corp, who shared some proven advice on how non-technical auditors can overcome some of the challenges associated with IT risks.

InfoSec Insider
Cloud Security in 2019: What InfoSec Leaders Can Expect
By Marcos Colón
January 03, 2019

InfoSec Insider catches up with the Cloud Security Alliance's Jim Reavis, who shares what security leaders should be focusing on when it comes to cloud security in 2019. You'll want to take note of these insights and predictions.

InfoSec Insider
InfoSec Insider Top 10 in 2018
By Marcos Colón
January 01, 2019

As 2018 wraps up, InfoSec Insider looks back at some of the most popular articles we've produced for our loyal audience. From communicating security metrics to the board and making sense of attack patterns, to key areas that you should focus your cybersecurity strategy on, here's a list of the top 10 articles.

Internal Audit Insights
Internal Audit Insights Top 10 in 2018
By Marcos Colón
December 27, 2018

And just like that, another year has gone by. We've had a blast providing you with insights all throughout the year, covering audit report writing, project management, and coverage on emerging technology. Here we've compiled a list of the most read articles.

InfoSec Insider
The Cloud Security Dos and Donts Explained
By Marcos Colón
December 21, 2018

Security practitioners that are looking to migrate their business to the cloud in a successful manner have to consider quite a lot. That's why InfoSec Insider caught up with security leader and industry veteran Mark Arnold during this video interview where he quickly breaks down what you should and shouldn't be doing when it comes to the topic.

Internal Audit Insights
The Dos and Dont’s of Navigating Touchy Audit Interviews Through Language
By Marcos Colón
December 21, 2018

Communication's expert Jill Schiefelbein chats with Internal Audit Insights and offers up her take on what makes audit interviews so difficult for the modern-day internal auditor, and also offers up specific advise you can use during your next audit interview to ensure you're navigating those encounters effectively. 

InfoSec Insider
Know Your Inventory: A CISOs Guide to Asset Management
By Josue Ledesma
December 21, 2018

A CISO’s list of responsibilities are vast. They need to protect, defend, and identify any risks and potential attacks that may hit their company’s environment. However, knowing what needs protection is its own challenge.

Internal Audit Insights
The Three-Part Approach to Closing the Audit Plan
By Ernest Anunciacion
December 21, 2018

Effectively closing the audit plan and landing on specific action items to pursue can be a challenge. In this contributed article, Workiva's Ernest Anunciacion provides three steps to close this year's audit plan and prepare for next year.

Internal Audit Insights
Implementing Your Audit Department’s Top Technological Audit Practices
By Marcos Colón
December 18, 2018

Data analytics is being leveraged more than ever by internal audit departments, but for those that haven't jumped on the bandwagon yet, this interview with CVS Health's head of data analytics explains the benefits, challenges, and misconceptions tied to the technology.

Internal Audit Insights
How Internal Audit Can Improve the Organisation's Tone and Culture
By Hernan Murdock
December 18, 2018

The concept of “tone” plays a key role in the control environment of the organisation. While it is set at the top, it should cascade without distortion or gaps throughout the entire organisation.

InfoSec Insider
Are You Using These Best Practices to Build a Vendor Risk Management Program?
By Jim Romeo
December 18, 2018

Today's IT playing field implores a higher state of alertness, not only within your enterprise but also outside of it. However, when it comes security, not all vendors are created equal. Some very likely have inferior security hygiene and practices that can affect you big time. 

InfoSec Insider
The Blockchain Revealed: How InfoSec Can Benefit from the Protocol
By Marcos Colón
December 13, 2018

InfoSec Insider catches up with Debbie Hoffman, CEO of Symmetry Blockchain Advisors at the CSA Congress event, who clarifies what blockchain means to security leaders today, and any privacy implications they should be aware of.

Internal Audit Insights
Audit Writer’s Hub: Delete the Nothings and Get to Something
By Sarah Swanson
December 11, 2018

In this edition of the Audit Writer's Hub, we specifically tackle some of the pesky nothings – unimportant sentences, filler phrases, and negative phrasing – that creep into our writing and how to get rid of them.

InfoSec Insider
Leveraging Collaboration and SOAR to Secure Our Digital Future
By Cody Cornell
December 11, 2018

The idea behind collaborative security is to change the security and threat landscape from the daunting “one vs. many” to “many vs. many,” embracing the power of knowledge and collaboration to protect valuable data.

Internal Audit Insights
High-Impact Skills for Developing and Leading Your Audit Team
By Marcos Colón
December 06, 2018

MISTI’s Dr. Murdock shares what the status of the internal auditor is today, in addition providing some key audit leadership techniques that many up-and-coming audit leaders are commonly unaware of.

InfoSec Insider
Cybersecurity 101: How to Get Started in the Business (Part 2)
By Ed Moyle and Raef Meeuwisse
December 06, 2018

In this walkthrough, InfoSec Insider experts Ed Moyle and Raef Meeuwisse demonstrate one useful exercise that can aid security practitioners in getting a lay of the land in their organisation, serving as the perfect first step in ultimately measuring and reducing information security risks.

InfoSec Insider
Considerations for Cloud Service Providers on the Path to FedRAMP Accreditation
By Baan Alsinawi
December 04, 2018

The government has urged the private sector to offer agencies secure cloud solutions through the FedRAMP accreditation, which establishes baseline standards for security assessment, authorization, and continuous monitoring. Here, we provide six key considerations to help guide FedRAMP accreditation efforts.

InfoSec Insider
Cybersecurity 101: A Discussion on the Basics and Fundamentals
By Ed Moyle and Raef Meeuwisse
December 04, 2018

InfoSec Insider SMEs Ed Moyle and Raef Meeuwisse are back, but this time they're talking fundamentals. If you're an up-and-coming security warrior, you'll definitely want to heed this advice from the two infosec experts.

Internal Audit Insights
The Impact Selective Language Can Have on Your Audit Interviews
By Jill Schiefelbein
December 04, 2018

With increased access to cost-effective and user-efficient digital communication technologies that allow people to intentionally or spontaneously connect from any place, at any time, we have opportunities to collaborate like never before.

Internal Audit Insights
The Three Key Elements of Professional Scepticism
By Hernan Murdock
December 04, 2018

Professional scepticism is a critical component of an internal auditor's duty of care that applies throughout any engagement.  It's an attitude that includes a questioning mind and a critical assessment of the appropriateness and sufficiency of audit evidence. Here are the three key elements of scepticism you should know

.

Internal Audit Insights
The Low Down on Integrated Auditing
By Marcos Colón
November 29, 2018

In this video interview with Internal Audit Insights, Constance Snelling, director of IT risk at Jackson National Life, offers up the essential skills that are needed to be a successful IT auditor today and how this ties into performing an integrated audit.

Internal Audit Insights
Preparing for Robotic Process Automation: What Internal Auditors Need to Know
By Ed Williams & Venkatesh Krishnamoorthy
November 27, 2018

RPA, robotics, robots, bots … as internal auditors you have undoubtedly been hearing this terminology tossed around more and more. What exactly is it? Why is it such a hot topic? Here we answer those questions.

InfoSec Insider
An Open Source Intelligence (OSINT) Revolution, You Say?
By Jim Romeo
November 27, 2018

As a security practitioner, we're sure you've heard of the benefits that open source intelligence (OSINT). But what exactly is it and how can you leverage it as it relates to your current security strategy? This article answers that question and more.

Internal Audit Insights
GRC at the Speed of Business
By Marcos Colón
November 22, 2018

Internal Audit Insights catches up with Ford Winslow, CEO of ICE Cybersecurity, to discuss what the “speed of business” has had on GRC controls, and what IT auditors should prepare for.

Internal Audit Insights
How to Use Balanced Scorecards to Measure the Performance of Internal Audit Departments
By Hernan Murdock
November 19, 2018

The balanced scorecard is a system used to make sure business operations are aligned with the organization’s mission, vision, and strategy. Since it uses several measures to determine success, it helps those involved to balance what is achieved with how it is achieved. Here's how.

InfoSec Insider
Do you really need a penetration test?
By Ed Moyle
November 19, 2018

This will probably be a contentious point for some, but there are situations where a penetration test isn’t the best use of an organization’s resources. Here, we examine what is (and isn't) a pentest, and what its goals should be depending on your organization's needs.

InfoSec Insider
How to Communicate Threat Intelligence to the Board
By Marcos Colón
November 15, 2018

Cyber threats are top of mind for board members, but communicating cyber threat intelligence may not be the easiest task for security leaders. In this recent interview with Tim Callahan, senior vice president and global security officer at Aflac provides some helpful tips that could go a long way.

Internal Audit Insights
How to Create a Fraud Risk Statement for Your Fraud Audit Program
By Leonard Vona
November 15, 2018

There tends to be a fair amount of confusion when it comes to a fraud risk identification approach versus an experience-based approach but here we set out to create a list of universal definitions intended to clarify how and why you might use this approach.

Internal Audit Insights
Do DevOps and Compliance Go Hand in Hand?
By Marcos Colón
November 13, 2018

IT audit is only beginning to familiarize itself with DevOps as more organizations begin to deploy successful programs. But is it fair to say that DevOps and compliance go hand in hand? In this video interview with Atlassian Risk Futurist Guy Herbert, he gives his take on the topic.

Internal Audit Insights
4 Strategies to Head up Risk Management in your Company
By Sarah Swanson
November 13, 2018

As auditors, we all know that internal audit is uniquely positioned to understand where risks lay within an organization. But sometimes audit doesn’t get the opportunity to communicate the company’s risks to a broader audience. Here, we share a few ideas to help internal audit build bridges between knowing, communicating, and fixing risk in a company.

InfoSec Insider
How to Train Your Team (and Organisation) to Effectively Use Threat Intelligence
By Josue Ledesma
November 13, 2018

Threat intelligence has transformed the information security world for the better but it’s not always leveraged in the best way possible by organisations and departments. InfoSec Insider spoke to threat intel expert Karl Sigler to get a sense of how organisations can maximize threat intelligence for their organisation.

InfoSec Insider
What’s Next for IoT Security?
By Marcos Colón
November 08, 2018

InfoSec Insider catches up with Armis co-founders Yevgeny Dibrov and Nadir Izrael who discuss the current climate as it relates to IoT security, and offer up some dos and don’ts when it comes to connected devices within the enterprise.

Internal Audit Insights
Leveraging Virtual Team Meetings as Part of the Internal Audit Process
By Jill Schiefelbein
November 06, 2018

Many internal audit teams are not using video conferencing and virtual meetings to their advantage. When they're set up for success, research shows that virtual teams can be more effective in solving quick, simple problems than face-to-face teams.

InfoSec Insider
4 Things to Know About Penetration Testing & AI
By Min Pyo Hong, CEO and Founder, SEWORKS
November 05, 2018

Conducting penetration testing via simulated attacks on your organisation's network is the best way to help your business evaluate the strength of your network security protocols and identify any backdoors, weaknesses, and gaps between different security tools, and prioritise risk. This contributed article explains why.

InfoSec Insider
Common Application Vulnerabilities You Should Know About
By Marcos Colón
November 01, 2018

While patching vulnerabilities seems like a “low-hanging fruit” task for many security practitioners, it seems as though many still fail to do so. In this interview with application security expert Chris Eng, he highlights the common blind spots associated with vulnerability management.

Internal Audit Insights
Common Visual Cues that Could Send Your Audit Client the Wrong Message
By Jill Schiefelbein
November 01, 2018

As an internal auditor, it’s not just your words, it’s the absence of words or untimely words that could still convey a message to an audit client. It’s not only your actions, but it’s also the lack of action. All of these aspects result in communication. Communications expert Jill Schiefelbein explains more.

Internal Audit Insights
What Internal Auditors Should Know About Dirty Money Centres
By Veronica Morino, Asia Chernova, and Nigel Iyer
November 01, 2018

As Dirty Money Constellations continue to move from the “Islands of Shame” to the re-emerging epicentres of power, should we just be passive observers or is there something we can do?

Internal Audit Insights
Balancing the Risks of Today with an Eye on the Risks of Tomorrow
By Alec Arons
October 29, 2018

A great deal has changed over the years when it comes to risk, including the willingness and interest of CAE’s, Audit Committees and Boards to talk about risk. As part of the increase in dialogue relating to risk and risks on the horizon much has been written and discussed. Here, Experis's Alec Arons consolidates that information.

InfoSec Insider
So, How Strong Are Your Organisation's Passwords?
By Marcos Colón
October 25, 2018

Ntrepid Corporation’s Chief Scientist Lance Cottrell chats with InfoSec Insider and offers up the major dos and don’ts tied to password management, as well as pinpoints the significant weaknesses in some of the systems we’ve come to rely on heavily.

InfoSec Insider
Are You Investing in the Right Cybersecurity Tools?
By Marcos Colón
October 23, 2018

NSS Labs CEO Vikram Phatak speaks with InfoSec Insider and offers up tips to up-and-coming security professionals on how to make smart and effective cybersecurity solution purchasing decisions. From blocking out buzzwords and marketing jargon to building a great team, here’s what you need to know.

InfoSec Insider
Why Data Privacy and Policy Training Matters
By Josue Ledesma
October 23, 2018

Data privacy and protection is an often underappreciated aspect of information security, but in many ways, it provides the foundational groundwork for a well-established security environment that offers internal and external reassurance. Here's why and how you should train up your team.

Internal Audit Insights
The IT Audit Checklist for Emerging Risks
By Sarah Swanson
October 22, 2018

Many organisations are still failing to effectively audit areas such as cloud security or even social media. So what areas should you be covering and why? This article answers questions tied to that topic. Here you'll find the top IT risks that consistently vex companies and protect your assets.

Internal Audit Insights
Using Histograms to Better Understand Data
By Hernan Murdock
October 22, 2018

Histograms are a very powerful tool to analyze data because they show the distribution of a continuous variable in a diagram and their appearance is similar to bar graphs. In this feature article, MISTI's Dr. Hernan Murdock explains how internal auditors can leverage them.

Internal Audit Insights
How to Make Findings and Recommendations More Persuasive
By Hernan Murdock
October 16, 2018

Persuasion is an important aspect of internal auditing that doesn’t receive enough attention or coverage. Internal auditing is done to verify that conditions and practices are as expected, and to identify opportunities for improvement within organizations.

InfoSec Insider
The New Regulatory Wrinkles for Data Protection You Should Know About
By Aaron Turner
October 16, 2018

We’ve seen the rules for data security change from relatively simple policies, such as simple access controls, to much more complex policy requirements with the implementation of GDPR. This article’s intended to cover three new perspectives that will influence data protection controls in the coming years.

Internal Audit Insights
Can Internal Auditors Perform Advisory Reviews While Remaining Independent?
By Nancy Luquette
October 11, 2018

Is serving as an advisor and maintaining internal audit’s essential responsibility of objectivity, free of management influence, possible? Spoiler alert: Yes. And it’s both necessary and crucial to the internal audit profession’s standing in any organization.

InfoSec Insider
Cryptocurrency Mining Malware and Cryptojacking: What to Know and How to Protect Your Organization (Part 2)
By Ed Moyle
October 10, 2018

On Tuesday InfoSec Insider kicked off a how-to video series that focuses on topics surrounding the challenges that our readers face on a daily basis. In this companion video, security expert Ed Moyle provides a deep dive on how you can protect your organization from cryptocurrency mining malware and cryptojacking.

Internal Audit Insights
How Internal Auditors Can Change How Audit Clients Listen to Them
By Jill Schiefelbein
October 09, 2018

In a perfect world, the client is receptive, understands each recommendation, and takes immediate corrective action. But we all know that perfect world doesn’t exist. In this informative feature, communications expert Jill Schiefelbein explains what internal auditors can do to make audit clients more receptive to their communication.

InfoSec Insider
Need a Concise Guide to Pen Testing? Here It Is.
By Jim Romeo
October 08, 2018

What's the best way to detect network risks and other vulnerabilities from cyber threats? If you guessed a pen test, then you're right. In this feature article, we've created a no-nonsense that answers pertinent questions about penetration testing.

InfoSec Insider
Cryptocurrency Mining Malware and Cryptojacking: What to Know and How to Protect Your Organisation
By Ed Moyle and Raef Meeuwisse
October 08, 2018

Security experts Ed Moyle and Raef Meeuwisse dissect the topic of cryptocurrency mining malware and cryptojacking; what it means to you as a security professional and how you can protect the enterprise from it.

Internal Audit Insights
Complex Fraud Scheme: Vendor Overbilling Part 2
By Leonard Vona
October 04, 2018

In this second installment of our two-part series on vendor overbilling, we look at how to use fraud data analytics designed to uncover a complex fraud scheme and the fraud audit procedures designed to provide credible evidence.

InfoSec Insider
Security Automation is Here. Now What?
By Marcos Colón
October 02, 2018

What's the best way to detect network risks and other vulnerabilities from cyber threats? If you guessed a pen test, then you're right. In this feature article, we've created a no-nonsense that answers pertinent questions about penetration testing.

Internal Audit Insights
Complex Fraud Scheme: Vendor Overbilling Part 1
By Leonard Vona
October 02, 2018

Fraud expert and MISTI instructor, Leonard Vona, selected a complex corruption scheme and a complex overbilling scheme to illustrate how fraud auditing can detect even the most complex schemes.

InfoSec Insider
Creating the Perfect Incident Response Playbook
By Marcos Colón
October 01, 2018

Arctic Wolf’s Sam McLane sits with InfoSec Insider at Black Hat, a security conference in the US, to discuss the major dos and don’ts when it comes to incident response, in addition to some misconceptions that some security practitioners may have on the topic

Internal Audit Insights
Common Audit Committee Questions on Cybersecurity
By Marcos Colón
October 01, 2018

Internal Audit Insights catches up with Yulia Gurman, Director of Internal Audit and Corporate Security at the Packaging Corporation of America on the common questions that audit committee members have tied to cybersecurity, and what IT auditors should prepare for.

InfoSec Insider
Social Mapper: The What, Why, and How
By Marcos Colón
September 30, 2018

InfoSec Insider catches up with Trustwave SpiderLabs Threat Intelligence Manager Karl Sigler on the company’s latest open source tool which enables penetration testers and red teasers to scrape social media data.

Internal Audit Insights
GRC at the Speed of Business
By Marcos Colón
September 20, 2018

Internal Audit Insights catches up with Ford Winslow, CEO of ICE Cybersecurity, to discuss what the “speed of business” has had on GRC controls, and what IT auditors should prepare for.

Internal Audit Insights
The Pareto Diagram: A Tool for Internal Audit to Focus on What Matters Most
By Hernan Murdock
August 30, 2018

As internal auditors increase their use of data analytics to better understand process characteristics, isolate issues and perform more accurate root cause analysis, the Pareto Diagram continues to grow as a useful tool for them.

Internal Audit Insights
The Dos and Don'ts of IT GRC in the Cloud
By Marcos Colón
August 23, 2018

IT audit expert Mark Thomas, president of Escoute Consulting, chats with Internal Audit Insights on the impact that cloud migration has had on the business, and shares the major Dos and Don'ts that IT auditors should know about GRC in the cloud.

InfoSec Insider
The State of Mobile Payments Security
By Aaron Turner
August 23, 2018

What is the bottom line from a security perspective when it comes to mobile payments? In the current state of the ecosystem, mobile security expert Aaron Turner offers up his take and advice on the topic.

Internal Audit Insights
How Internal Auditors Can Leverage the Balanced Scorecard
By Hernan Murdock
August 21, 2018

The balanced scorecard is a system used for planning and management to make sure business operations are aligned with the organization’s mission, vision, and strategy. In this  featured article, MISTI's Dr. Hernan Murdock explains how you can use it to your advantage.

Internal Audit Insights
Training the Internal Auditors of Tomorrow
By Karen Kroll
August 14, 2018

As the business world changes at an accelerating rate, auditors need to keep up or risk becoming irrelevant and unable to provide the insight that will allow their organizations to succeed. That means they’ll need to continually add to their skills and knowledge.

Internal Audit Insights
Innovation: The New Imperative for Internal Audit
By Terry Hatherell, Deloitte Global Internal Audit Leader
August 14, 2018

As organizations continue to evolve and innovate, new risks arise. Meanwhile, the larger business environment continues to change, often rapidly and in unexpected ways. This places new demands on the internal audit function.

InfoSec Insider
GDPR is Here...So What's Next?
By Heather Dean Bennington
August 14, 2018

GDPR was a major focus for many organizations this year. Whether it has been extensive business process mapping, understanding the purposes of personal data, or defining its scope. But now that it's here, what should security professionals focus on next?

Internal Audit Insights
Internal Audit Data Analysis Using Benford’s Law
By Hernan Murdock
August 09, 2018

Organizations are accumulating large amounts of data and internal auditors are rapidly increasing their mining for, and use of, these sizable data sets. This proliferation of data raises the question of how to extract meaning from it all.

InfoSec Insider
How Infosec Can Put More “Intelligence” into Operationalizing Threat Intelligence
By Marcos Colón
August 09, 2018

Threat intelligence expert Dave Ockwell-Jenner discusses how organizations have changed the way they approach threat intelligence, and provides the primary Dos and Don’ts associated with developing a successful threat intelligence program.

Internal Audit Insights
Leveraging Virtual Team Meetings: Four Tips for Success
By Jill Schiefelbein
August 07, 2018

With distributed workforces and flexible workstyles, virtual team meetings are becoming commonplace in the internal audit function. Many times, though, virtual meetings aren’t taken with the same level of seriousness as in-person meetings are.

InfoSec Insider
Mobile Privacy & Infosec Tips for Frequent Travelers
By Aaron Turner
August 03, 2018

Summer will be over before you know it and for many of you, it might be time to hit the road again for business travel. Before you pack up all of your devices, you might want to keep some of this advice in mind to ensure your data is secure.

Internal Audit Insights
What Risks Do Blockchain Present the Enterprise?
By Karen Kroll
August 02, 2018

As the number of blockchain implementations continues to grow, internal auditors will need to learn about both the promise and risk this technology offers. So what exactly is blockchain technology and what does it mean to you as an internal auditor? This article answers that question.

InfoSec Insider
How to Build Practical Cross-Training in Infosec
By Ed Moyle
July 31, 2018

Given the skills gap in information security, it's important for cybersecurity managers to diversify and expand the skill base of their team members. Here, we highlight how they can do it from a practical point of view.

InfoSec Insider
The Cyber Threat Alliance: Making Cybersecurity Collaboration Work
By Marcos Colón
July 26, 2018

The Cyber Threat Alliance’s Chief Analytic Officer Neil Jenkins provides update on the state of information sharing in 2018 and provides some insight on the steps security practitioners can take if they’re interested in sharing their threat data.

InfoSec Insider
Mobile Privacy & Infosec Tips for Frequent Travelers
By Aaron Turner
July 24, 2018

Summer will be over before you know it and for many of you, it might be time to hit the road again for business travel. Before you pack up all of your devices, you might want to keep some of this advice in mind to ensure your data is secure.

Internal Audit Insights
Privacy in 2023: What Internal Audit Can Expect
By Heather Dean Bennington
July 19, 2018

The European Union’s GDPR is officially in effect, but that’s likely not the last regulation that will be implemented that has an impact on the internal audit function. Here’s what you should consider five years from now.

Internal Audit Insights
The Internal Auditor’s Guide to Masterfully Speaking to Boards and Committees
By Jill Schiefelbein
July 18, 2018

The presentation skills that you were likely taught in high school and college in no way prepared you for the reality of delivering reports in front of boards and audit committees. This article is your crash-course in small group presentations and gives you two key areas to consider.

Internal Audit Insights
Rotational Auditing and Fishing
By Sarah Swanson
July 10, 2018

Rotational auditing has been a fishing hole for years. The pros and cons have been fished around too. And then fished around some more. Auditors have a way of fishing. But paddling deeper into audit's consulting water, rotational auditing could provide a venue for teaching risk awareness.

InfoSec Insider
First-Hand Experience in Developing a Threat Hunting Program
By Jessa Gramenz
July 10, 2018

Developing a threat hunting program may be challenging, but it doesn’t have to be. In this feature article, one subject matter expert provides us with a glimpse into her experience on the topic and what you can expect. 

InfoSec Insider
Threat Modeling: What, Why, and How?
By Adam Shostack
July 08, 2018

Threat modeling is essential to becoming proactive and strategic in your operational and application security. 

Internal Audit Insights
IT Audit Should Consider These Third-Party Risk Traps
By Marcos Colón
July 05, 2018

TalaTek’s Baan Alsinawi provides an update on the state of third-party risk management as it relates to IT auditors and sheds light on the hidden traps they should look out for as it relates to trusted business partners.

InfoSec Insider
How Hacked Elections Impacted the Security Industry
By Marcos Colón
July 05, 2018

CA Veracode’s Chris Wysopal discusses how the 2016 presidential election hack broadened the horizon on how security warriors think about defending their data and offers up advice on what they should consider when it comes to protecting sensitive information.

Internal Audit Insights
How IT Audit Can Break Down Communication Silos
By Marcos Colón
June 28, 2018

Escoute Consulting President Mark Thomas dives into the topic of communication challenges within the enterprise, why they exist among IT audit and cybersecurity, and the steps you can take to ensure those silos are broken down.

InfoSec Insider
Looking to Benefit from AI? Build Something!
By Marcos Colón
June 28, 2018

Cylance’s Colt Blackmore discusses why leveraging AI isn’t limited to purchasing an out-of-the-box solution and details the critical steps that security practitioners should take to successfully utilizing the technology to their organization’s advantage.

Internal Audit Insights
Using Key Performance and Key Risk Indicators to Provide Timely Assurance
By Hernan Murdock
June 26, 2018

Information drives modern organizations, so it is imperative that metrics be used that give management objective information. In this instructive article by MISTI's Dr. Hernan Murdock, he advises on how internal auditors can do just that.

InfoSec Insider
Cover Your Bases: Areas to Focus on in Your Information Security Strategy
By Marcos Colón
June 21, 2018

Trustwave’s Karl Sigler discusses the state of cyber threats in 2018 and suggests what areas of your security strategy you should focus on to take proactive steps in measurably reducing risk within the business.

Internal Audit Insights
Who Owns Risk at the End of the Day?
By Marcos Colón
June 21, 2018

Fastpath’s Keith Goldschmidt discusses who the real owners of risk are within the enterprise, but also offers up insight on what IT audit can do to help streamline communication and do their part in creating a “risk culture” within the business.

Internal Audit Insights
Developing Continuous Control Monitoring Procedures Without Losing Independence
By Hernan Murdock
June 19, 2018

When designing continuous auditing procedures, auditors and management must think through what the metrics are, and what thresholds would trigger the auditors’ desire to gain a better understanding of operational issues.

InfoSec Insider
Imagine If Security Solutions Understood Our Language?
By Vijay Dheap
June 19, 2018

It's up to security professionals to infer security significance of all the events security solutions report. The first step to arriving at an answer to this intractable problem is teaching our security tools to understand us. Advancements in Natural Language Processing could help.

Internal Audit Insights
DevOps: What IT Audit Needs to Know
By Marcos Colón
June 18, 2018

XebiaLabs’ Robert Stroud highlights what it is that IT audit needs to know about DevOps, why they should care, and offers up ways in which they can approach DevOps in a constructive manner that ultimately reduces risk in the organization.

Internal Audit Insights
Five Elements of an Effective Audit Planning Process
By Wade Brylow
June 17, 2018

After 25 years in internal audit, I have come to the conclusion that excellent audit planning is essential to ensuring an effective audit. What is a successful audit? A good measure is whether both audit management and the auditee feel good about the end results.

InfoSec Insider
The CISO of Yesterday, Today, and Tomorrow
By Marcos Colón
June 14, 2018

SAP CSO Justin Somaini discusses how the role of the CISO has evolved into what it is today, and what up and coming security leaders should prepare for once they take charge of a security program at a major organization.

InfoSec Insider
The Dark Web: What You Should Know and Why You Should Care
By Josue Ledesma
June 12, 2018

The dark web is one of those elusive subjects that can often get misinterpreted. We spoke to Reclamere's Connie Mastovich to get her expert take on what the dark web is, what risk it poses to companies, and how to protect yourself from it.

Internal Audit Insights
How Technology Impacts the Internal Auditor of Today
By Marcos Colón
June 07, 2018

Onspring’s Jason Rohlf discusses how technology has impacted the internal auditor of today, but also offers tips on how auditors can stay ahead of the curve, rather than play catchup.

InfoSec Insider
Why is DNS Underutilized as a Security Tool?
By Marcos Colón
June 07, 2018

Farsight CTO Merike Kaeo discusses why DNS is still be underutilized as a security tool today, shares some examples of lessons-learned that could apply to you, and provides steps you can take to ensure you’re taking advantage of your DNS infrastructure.

InfoSec Insider
How to Make Sense of Attack Patterns
By Josue Ledesma
June 05, 2018

In this featured post, we speak to TrustedSec Founder Dave Kennedy who offers up advice on how you can set up your security department’s defenses to respond and defend against common attacks.

Internal Audit Insights
Finding IT Help for your Business
By Sarah Swanson
May 31, 2018

According to MISTI’s annual Internal Audit Priorities Report, internal audit leaders are in need of hiring outside assistance for challenges they face surrounding IT security. Here, we share a few tips to help you find the best IT consultant for your needs.

Internal Audit Insights
Why Words, Not Numbers, Are the Internal Auditor’s Most Valuable Currency
By Jill Schiefelbein
May 29, 2018

Numbers and fancy charts are only able to tell part of the story for internal auditors. If you want your reports and your data to come alive for your clients, you need to make your words matter. Words, when it comes to driving action, are your most valuable currency. Here's why.

InfoSec Insider
From Trapping to Hunting: Intelligently Analyzing Anomalies to Detect Network Compromises
By Giovanni Vigna
May 24, 2018

Is your organization adequately equipped to identify anomalous patterns across the network? If you're doubtful, it may be time to try out alternative models that will help you detect previously unknown attacks.

InfoSec Insider
How to Speak the Business of Security Effectively
By Marcos Colón
May 24, 2018

Cisco's Edna Conway shares her insight on what infosec leaders can do to ensure that security becomes an active discussion about the way you operate within the business, rather than an added bolt-on feature.

Internal Audit Insights
From Corporate Cop to Trusted Advisor
By Hernan Murdock
May 24, 2018

Internal auditors have been working toward shedding the "corporate cop" label given to them within the enterprise. But what is a trusted advisor? What do they do and what behaviors are necessary to become a trusted advisor?

Internal Audit Insights
How to Audit Whistleblower Programs
By Hernan Murdock
May 22, 2018

The Sarbanes-Oxley Act of 2002 Section 301 requires publicly-traded companies to have a whistleblowing program.  But, how do we know if the program is effective? This article should help get you on your way.

Internal Audit Insights
How to Keep Millennials in Internal Audit
By Sarah Swanson
May 17, 2018

When salary is fixed and the perks are what a Gen Xer would like but maybe not a millennial (i.e., catered lunches, unlimited paid time off, yoga hour), how does an audit shop change their philosophy to cater to the younger crew? Below we explore different ways to motivate a millennial auditor.

InfoSec Insider
What is Attack Driven Development?
By Marcos Colón
May 17, 2018

Bugcrowd’s Keith Hoodlet outlines the importance of attack driven development and offers up the key steps security practitioners should take for this approach to have a positive impact on their overall security strategy.

InfoSec Insider
Crisis Communications in a Headline-Driven World
By Katherine Teitler
May 15, 2018

Media communication in the face of a cybersecurity incident often gets the shaft in favor of incident handling, but what you don't handle can come back to haunt you.

Internal Audit Insights
Looking to Improve Your Audit Cycle? Try This
By Karen Kroll
May 15, 2018

To continually operate more efficiently and add greater value to the business, internal audit has to boost its performance throughout each stage of the audit cycle. The guidelines below can help you improve the risk assessment, planning, execution, and reporting stages of the audit cycle.

Internal Audit Insights
How Internal Auditors Can Strategize for the Mundane, Part 2
By Sarah Swanson
May 14, 2018

We recently discussed the intersection of emotional intelligence and strategic intelligence. Here are some more common strategic areas to look at. One of these may be similar to your company, or maybe you have some additional strategic areas too. We’d love to hear about them.

InfoSec Insider
How Security Leaders Can Get Proactive with Their Comms Departments
By Marcos Colón
May 10, 2018

Uber’s Melanie Ensign discusses the relationship between the communications function and infosec teams and offers up some uncommon communication tips for security leaders that may have a skewed view of the communications department within their organization.

Internal Audit Insights
When Emotional Intelligence Meets Strategic Intelligence for Internal Auditors, Part 1
By Sarah Swanson
May 08, 2018

Infusing an audit with strategic intelligence can be a little uncomfortable. But a little stretch does an auditor (and the company) good. Here, we've provided a few tips to articulate the big picture to your team and your auditee.

InfoSec Insider
How the 'Fog of More' Bogs Down Infosec Pros
By Marcos Colón
May 03, 2018

Given the troves of education information, training, and technology available to security professionals, you’d think they’d be a step ahead of malicious actors. But this overabundance of information may actually be causing more harm than good. Here’s what one expert had to say about the “fog of more.”

InfoSec Insider
ISACA Workforce Development Report Highlights Need for More & More Qualified Security Employees
By Katherine Teitler
May 01, 2018

Cybersecurity staffing requires more than simply finding enough people to accomplish tasks.

Internal Audit Insights
Why Internal Auditors Should Lead with Their Relevancy and Value, Not Their Title
By Jill Schiefelbein
May 01, 2018

As an Internal Auditor what you do is NOT your title. It's NOT your longevity in the field. It's NOT a credential. However, as an internal auditor the question "What do you do?" typically doesn't receive a straightforward answer. Here we provide you with an activity that will get you thinking about what you DO, and help you communicate it effectively.

InfoSec Insider
How to Manage Your Security Post-Conference Inbox
By Katherine Teitler
April 24, 2018

Cybersecurity conferences often lead to inbox overload, but they don't have to if the onsite experience is managed correctly.

InfoSec Insider
Cybersecurity Executives Misalign Concerns with Actions
By Katherine Teitler
April 17, 2018

Cybersecurity teams seem to understand their biggest areas of challenge, yet the action to put effort behind remediating those problems falls short.

Internal Audit Insights
Essential Steps to Tackling Vendor Risk Management
By Sarah Swanson
April 16, 2018

Internal audit is positioned to help evaluate risk that arises from working with vendors. Here we outline steps for determining which vendors to audit and what to focus on during the audit.

InfoSec Insider
How to Proactively Hunt for Cyber Threats
By Marcos Colón
April 12, 2018

InfoSec Insider catches up with one threat expert who discusses why security professionals should consider a proactive threat hunting model, and outlines how they can take that approach.

Internal Audit Insights
How Internal Audit Can Streamline Processes Through RACI Charts
By Hernan Murdock
April 10, 2018

Effective communication, teamwork, and accountability are key ingredients of efficient programs, processes, and projects. Unfortunately, many organizations suffer due to a misunderstanding of who’s responsible for what. Here, Dr. Hernan Murdock details how RACI Charts can help internal auditors overcome these challenges.

Internal Audit Insights
How Internal Audit Can Benefit from Force Field Analysis
By Hernan Murdock
April 05, 2018

Auditors in search of a great decision-making tool to identify the forces for and against a course of action should look no further than Force Field Analysis. In this feature by MISTI's own Dr. Hernan Murdock, he details how internal audit can leverage this technique.

InfoSec Insider
Five Cyber Risks Your Organization is Likely to Encounter
By Katherine Teitler
April 03, 2018

Today's threat landscape is like a tentacled sea monster that security practitioners have to battle on a daily basis. In this feature story, we highlight the top five most likely cyber risks to organizations today.

InfoSec Insider
Privileged Identities: Who's Watching the Watchers?
By Katherine Teitler
March 08, 2018

Jonathan Sander addresses why security teams fail at controlling privileged identities, and what they should be doing that won't upset the apple cart.

InfoSec Insider
Key Questions to Ask Your Cybersecurity Recruiter
By Katherine Teitler
March 01, 2018

There is no question that the cybersecurity job market is hot, but not any old recruiter is suited to help you with your hiring needs.

InfoSec Insider
The Rise of the Virtual Cyber Security Leader
By Dominic Vogel
November 27, 2017

Learn why the virtual CISO is quickly becoming an attractive option for enterprises.

InfoSec Insider
DeMISTIfying Security: The Impacts of Security Assumptions
By Ed Moyle and Raef Meeuwisse
March 19, 2019

In this follow-up video, the DeMISTIfying Security experts discuss two recent containerisation-related issues and how the modern-day security warrior can venture into the unknown to effectively tackle challenges such as this.

Internal Audit Insights
Strategic Messaging and Influencing Skills: A Framework for Internal Auditors
By Jill Schiefelbein
March 19, 2019

Last month in an article about setting the stage for better decision-making we learned about four elements that you should be considering before you even form the words you want to say. This month it’s all about the messaging.

InfoSec Insider
Are Medical Devices Securely Managed Yet?
By Jim Romeo
March 14, 2019

Recent incidents illustrate the risks that healthcare networks are subject to in today's ever-expanding cybersecurity threat landscape. In particular, securing networked medical devices in this environment can be challenging. 

Internal Audit Insights
Co-Establishing the Need: Internal Audit’s Role in Getting Buy-in at the Client Level
By Jill Schiefelbein
March 14, 2019

One of the most overlooked, but essential, elements of the persuasive process is establishing a definite need in your to-be-persuaded-audience’s mind. In other words, how does the client know that they need what you have to offer? Here, we explore the topic.

Internal Audit Insights
The Many Benefits of Rotation Programs
By Hernan Murdock
March 12, 2019

As business processes become more complex, information more widely dispersed, and the risk environment more complicated, the need for internal auditors to adapt to this new environment becomes imperative. This is where rotation programs can really save the day.

InfoSec Insider
How Moving Away From Traditional Academia Has Changed Cybersecurity Education
By Paul Rohmeyer, Program Director MS Information Systems, Stevens Institute of Technology
March 12, 2019

Today, there are highly specialized training options offered both in-person and online in the form of meetups, webinars, formal courses, and in-house and external conferences. The attractiveness (cost, convenience, and specialty) of these alternative options has driven cybersecurity talent to steer towards education avenues outside of traditional academia.

Internal Audit Insights
How to Approach Internal Audit Recruitment
By Karen Kroll
March 07, 2019

The search for qualified, competent internal auditors remains a challenge for many audit departments. As internal audit leaders continue to struggle qualified additions to their teams, what areas should they be focusing on and what steps can they take? This feature story answers those questions.

InfoSec Insider
Why Your Cybersecurity Comms Need to Evolve
By Dawn Papandrea
March 07, 2019

When you’re talking information security among your peers, it sounds like a totally different language than the rest of your organization speaks. This puts infosec professionals in a bind. On the one hand, security vulnerabilities exist throughout the company. Yet you, alone, are carrying the burden of knowing just how serious it can get. That’s why it’s up to you to create an information security communication strategy.

InfoSec Insider
DeMISTIfying Security: The Top 3 Dangerous Security Assumptions
By Ed Moyle and Raef Meeuwisse
March 05, 2019

From steering clear of marketing buzz to the impact of misinformation, DeMISTIfying Security hosts Ed Moyle and Raef Meeuwisse point out the security assumptions that could be catastrophic to any security practitioner’s role.

Internal Audit Insights
Interested in Becoming an IT Auditor? Here’s What to Know and Do
By Heather Dean Bennington
March 05, 2019

So, what exactly does an IT auditor do? In this article, we provide a broad breakdown of an IT auditor's responsibilities, the necessary skills to become one, how an IT auditor interacts with other roles throughout their organisation, and more.

Internal Audit Insights
Why Symposiums Promote Collaborative Learning in Internal Audit
By Hernan Murdock
March 05, 2019

Internal auditors must engage in lifelong learning. They are increasingly participating in webinars, consuming online content, and listening to podcasts. While all of these actions are conducive to learning, there is another learning opportunity that many internal auditors and compliance professionals may not be familiar with: Symposiums.

InfoSec Insider
How to Manage Employee Mobile Device Risk in Your Organisation
By Josue Ledesma
February 28, 2019

In this article, we’ll go over what devices infosec departments should have an eye on and how to tackle the challenge of BYOD head-on. For an expert’s perspective, we spoke to Georgia Weidman, founder of Shevirah, a mobile and IoT testing company.

InfoSec Insider
How to Turbocharge Your Cybersecurity Awareness Training
By Jim Romeo
February 26, 2019

Cybersecurity awareness training is a critical component to your security hygiene. The most effective training programs are offered frequently and use available frameworks, focus points, tools, and tactics to build a culture where cybersecurity is embraced, not avoided or shunned.

Internal Audit Insights
Communication Skills for Junior Auditors: What to Know and Why
By Jill Schiefelbein
February 26, 2019

There are some common communication mistakes that junior auditors make. Lucky for you, this article is going to point these foibles out and show you how you can change the trajectory of your communication to show confidence, not self-consciousness.

InfoSec Insider
Confused on How to Implement Cybersecurity Policy Based on the NIST Security Framework? Read On.
By Jim Romeo
February 20, 2019

We understand that some security professionals may not have the easiest time implementing the NIST Security Framework. That’s why we’ve created the “missing manual” on getting it right in this latest InfoSec Insider post.

InfoSec Insider
DeMISTIfying Security: Getting a Jump on Zero Trust in Your Environment
By Ed Moyle
February 19, 2019

Last week the DeMISTIfying Security hosts explored the Zero Trust model. This follow-up segment takes things one step further as security veteran Ed Moyle explains how you can get a jump on kickstarting Zero Trust within your organization.

Internal Audit Insights
7 Things to Know About IT GRC in the Cloud
By Heather Bennington
February 19, 2019

In migrating to the cloud, many challenges are present, and perhaps one of the largest challenges is updating an organisation’s overall GRC program. Here, we've gathered a number of things that IT auditors should know about IT GRC in the cloud.

Internal Audit Insights
Auditing The Supply Chain in 2019: What to Know and Why
By Karen Kroll
February 19, 2019

Much internal audit work has focused on financial transactions and controls. Now, many auditors are adding supply chain audits to their responsibilities. In this feature article, we've broken down some of the common risks associated with supply chains.

InfoSec Insider
How to Get Started with Secrets Management
By Ed Moyle
February 14, 2019

The only thing worse than having a huge problem is having a huge problem and not realising it. Believe it or not, many organisations are in the latter boat right now. Specifically, many organisations are undergoing a proliferation of secrets at a scale and scope that eclipses the ability of mechanisms and controls they may have in place to keep them protected.

Internal Audit Insights
How Internal Audit Can Benefit From the Three Lines of Defence Model
By Hernan Murdock
February 12, 2019

The Three Lines of Defence Model provides a framework to clarify the involvement and alignment of multiple assurance providers acting on behalf of their client organisations. It has become increasingly common to have various risk and control professionals working side by side to help their organisations manage risk and increase the likelihood of achieving strategic and operational goals.

InfoSec Insider
2019 Cybersecurity Threat Trends: What Should Be on Your Radar (Part 2)
By Josue Ledesma
February 11, 2019

Last week we shared the first part of this two-part series on cyber threats in 2019. This week we wrap up the remainder of the insights we shared thanks to our conversation with subject matter expert Adrian Sanabria, VP of strategy and product at NopSec.

InfoSec Insider
Glimpsing Inside the Trojan Horse: An Insider Analysis of Emotet
By Max Heinemeyer
February 11, 2019

Emotet is a highly sophisticated malware with a modular architecture, installing its main component first before delivering additional payloads. In this contributed article, Darktrace's Max Heinemeyer, director of threat hunting, breaks down the threat.

Internal Audit Insights
Cybersecurity and Regulatory Changes in 2019
By Heather Bennington
February 07, 2019

As we work toward the thick of the year, we've compiled a list of which cybersecurity regulations could be impactful this year, some of the challenges that they could present, and the reasons behind some of the changes we've highlighted below.

InfoSec Insider
DeMISTIfying Security: Exploring the Zero Trust Model
By Ed Moyle and Raef Meeuwisse
February 05, 2019

In the latest edition of MISTI’s DeMISTIfying Security, Ed and Raef dissect the zero trust model. From the pros and cons, to the obstacles you may face rolling out this philosophical approach to security, this week’s segment will shed new light on this topic.

Internal Audit Insights
Fraud Investigation Reports vs. Audit Reports: What’s the difference?
By Sarah Swanson
February 05, 2019

As fraud investigations get folded into the internal audit department, some audit shops are tempted to frame a fraud report in the same format and tone as the audit report. The idea couldn’t be more wrong. Read on for ways to present a full and succinct fraud investigation report using report design, content, and tone.

InfoSec Insider
2019 Cybersecurity Threat Trends: What Should Be on Your Radar
By Josue Ledesma
January 31, 2019

InfoSec Insider caught up with one SME that helped us put together a list of the looming threats your company should keep an eye on and how organisations can defend themselves accordingly. Here's a look at what you should have on your radar.

Internal Audit Insights
How Internal Audit Can Get Innovative
By Hernan Murdock
January 31, 2019

In internal audit, the methodologies of the past may have made the organization successful, but there is no guarantee that those same procedures will lead to success in the future. In this featured article, MISTI's Dr. Hernan Murdock highlights some examples of ways that innovation can help internal auditors, but most importantly, outlines how they can get started.

Internal Audit Insights
Audit Writer’s Hub: Does Your Report Format Fit Your Needs?
By Sarah Swanson
January 29, 2019

Every company has a different way to communicate and a different report format to use. Well, there is no best way – each format has its pros and cons and you have to weigh the benefits of each format for your audience.

InfoSec Insider
The Thrill of the Hunt (Threat Hunting, That Is)
By Jim Romeo
January 29, 2019

The term threat hunting has been tossed around a lot, but what does it actually mean and can your cybersecurity playbook benefit from it? Many organisations are tapping into its benefits, so we've decided to provide you with a breakdown in this feature article.

Internal Audit Insights
How People Decide: Setting the Stage for Optimal Decision Making
By Jill Schiefelbein
January 24, 2019

Most advice people have regarding decision making is along the line of, “weigh your options”, “get outside advice from a trusted source”, or “look at the cost-benefit or ROI”. That advice is fine and dandy, but it ignores one key fact: If the stage on which the decision is made isn’t set appropriately, the decision may not be the best. Here are four steps to set the stage for productive conversations and more efficient decisions.

InfoSec Insider
Lessons Learned: How to Defend Your Organisation Against Social Engineering
By Josue Ledesma
January 24, 2019

Social engineering is unique in the cybersecurity world as its scope of influence can vary widely on the software, hardware, and even psychological level. In this article, we’ll cover social engineering attacks and help you learn from recent developments in the space.

InfoSec Insider
DeMISTIfying Security: To 2019 and Beyond!
By Ed Moyle and Raef Meeuwisse
January 22, 2019

In last week's segment, Ed and Raef discussed some of the major developments in infosec in 2018. This week, they take out their crystal ball and look into 2019, sharing their thoughts on what many practitioners could expect.

Internal Audit Insights
Privacy in the Age of Big Brother: What It Means for IT Audit
By Marcos Colón
January 22, 2019

Technology has impacted quite a lot, but privacy is likely what hits closest to home for everyone. Internal Audit Insights catches up with IHS Markit Internal Audit Director Tony Redlinger, who discusses what the state of privacy is today, and more importantly, what impact it has on the modern-day IT auditor.

InfoSec Insider
The State of Artificial Intelligence in 2019
By Marcos Colón
January 17, 2019

Artificial intelligence is found in homes across the globe, and it's also being leveraged by troves of organisations across the country. But how mature is the technology and how open should you be to adopting it as part of your security strategy? In this exclusive interview, we catch up with one expert who breaks it down for us.

Internal Audit Insights
Integrating Fraud Testing Into Your Audit Program: A Guide for Chief Auditors
By Leonard Vona
January 17, 2019

Fraud costs organisations millions of dollars each year. Simply Google the phrase “fraud scheme,” and you will discover more news stories than you have time to read. If auditors do not detect and stop a fraud scheme, they have cost their organisation real money. So, another question for you: Do you want to explain to your audit committee why your department did not detect a $63 million fraud?

Internal Audit Insights
Becoming a Risk Assessment Unicorn
By Steve DeSantis
January 15, 2019

You’ve read a bazillion articles on data analytics theory (ho-hum) in auditing. And we'll be the first to say that we've written a variety on this site. But this time around, let’s focus on how to actually use those data analytics in a single audit area: risk assessments. 

InfoSec Insider
DeMISTIfying Security: 2018 Year in Review
By Ed Moyle and Raef Meeuwisse
January 14, 2019

In the latest installment of InfoSec Insider’s DeMISTIfying Security series, security experts Ed Moyle and Raef Meeuwisse return to review the major breaches, developments, and takeaways that you can get from information security events in 2018.

Internal Audit Insights
Women in Internal Audit: Opportunities, Challenges, and More in 2019
By Marcos Colón
January 10, 2019

Internal Audit Insights catches up with Nancy Luquette, senior vice president and chief risk and audit executive at S&P Global, who shares her take on the state of women in internal audit in 2019 and the challenges many female practitioners face, but more importantly, how they can overcome them.

InfoSec Insider
How to Prepare for the Digital Transformation Era
By Marcos Colón
January 10, 2019

Like it or not, the digital transformation era is here. But what does that actually mean--and more importantly--what does that mean to you? We caught up with Zscaler's Business Value Consulting Leader, Jason Georgi, who broke it down for InfoSec Insider.

Internal Audit Insights
How Your Organisation Can Benefit from Internal Audit Rotation Programs
By Hernan Murdock
January 08, 2019

As business processes become more complex, information more widely dispersed, and the risk environment more complicated, the need for internal auditors to adapt to this new environment becomes imperative.

InfoSec Insider
How AI Can Prevent Dangerous Email Mistakes
By Marcos Colón
January 08, 2019

What's the state of artificial intelligence in the enterprise today? More importantly, how can the security and risk department benefit from its benefits to measurably reduce risk within the business? InfoSec Insider caught up with Neil Larkins, CTO at Egress Software, who breaks it down for us.

Internal Audit Insights
How Non-Technical Auditors Can Tackle IT Risks
By Marcos Colón
January 03, 2019

Internal Audit Insights caught up with Jami Shine, corporate and IT audit manager at Quiktrip Corp, who shared some proven advice on how non-technical auditors can overcome some of the challenges associated with IT risks.

InfoSec Insider
Cloud Security in 2019: What InfoSec Leaders Can Expect
By Marcos Colón
January 03, 2019

InfoSec Insider catches up with the Cloud Security Alliance's Jim Reavis, who shares what security leaders should be focusing on when it comes to cloud security in 2019. You'll want to take note of these insights and predictions.

InfoSec Insider
InfoSec Insider Top 10 in 2018
By Marcos Colón
January 01, 2019

As 2018 wraps up, InfoSec Insider looks back at some of the most popular articles we've produced for our loyal audience. From communicating security metrics to the board and making sense of attack patterns, to key areas that you should focus your cybersecurity strategy on, here's a list of the top 10 articles.

Internal Audit Insights
Internal Audit Insights Top 10 in 2018
By Marcos Colón
December 27, 2018

And just like that, another year has gone by. We've had a blast providing you with insights all throughout the year, covering audit report writing, project management, and coverage on emerging technology. Here we've compiled a list of the most read articles.

InfoSec Insider
The Cloud Security Dos and Donts Explained
By Marcos Colón
December 21, 2018

Security practitioners that are looking to migrate their business to the cloud in a successful manner have to consider quite a lot. That's why InfoSec Insider caught up with security leader and industry veteran Mark Arnold during this video interview where he quickly breaks down what you should and shouldn't be doing when it comes to the topic.

Internal Audit Insights
The Dos and Dont’s of Navigating Touchy Audit Interviews Through Language
By Marcos Colón
December 21, 2018

Communication's expert Jill Schiefelbein chats with Internal Audit Insights and offers up her take on what makes audit interviews so difficult for the modern-day internal auditor, and also offers up specific advise you can use during your next audit interview to ensure you're navigating those encounters effectively. 

InfoSec Insider
Know Your Inventory: A CISOs Guide to Asset Management
By Josue Ledesma
December 21, 2018

A CISO’s list of responsibilities are vast. They need to protect, defend, and identify any risks and potential attacks that may hit their company’s environment. However, knowing what needs protection is its own challenge.

Internal Audit Insights
The Three-Part Approach to Closing the Audit Plan
By Ernest Anunciacion
December 21, 2018

Effectively closing the audit plan and landing on specific action items to pursue can be a challenge. In this contributed article, Workiva's Ernest Anunciacion provides three steps to close this year's audit plan and prepare for next year.

Internal Audit Insights
Implementing Your Audit Department’s Top Technological Audit Practices
By Marcos Colón
December 18, 2018

Data analytics is being leveraged more than ever by internal audit departments, but for those that haven't jumped on the bandwagon yet, this interview with CVS Health's head of data analytics explains the benefits, challenges, and misconceptions tied to the technology.

Internal Audit Insights
How Internal Audit Can Improve the Organisation's Tone and Culture
By Hernan Murdock
December 18, 2018

The concept of “tone” plays a key role in the control environment of the organisation. While it is set at the top, it should cascade without distortion or gaps throughout the entire organisation.

InfoSec Insider
Are You Using These Best Practices to Build a Vendor Risk Management Program?
By Jim Romeo
December 18, 2018

Today's IT playing field implores a higher state of alertness, not only within your enterprise but also outside of it. However, when it comes security, not all vendors are created equal. Some very likely have inferior security hygiene and practices that can affect you big time. 

InfoSec Insider
The Blockchain Revealed: How InfoSec Can Benefit from the Protocol
By Marcos Colón
December 13, 2018

InfoSec Insider catches up with Debbie Hoffman, CEO of Symmetry Blockchain Advisors at the CSA Congress event, who clarifies what blockchain means to security leaders today, and any privacy implications they should be aware of.

Internal Audit Insights
Audit Writer’s Hub: Delete the Nothings and Get to Something
By Sarah Swanson
December 11, 2018

In this edition of the Audit Writer's Hub, we specifically tackle some of the pesky nothings – unimportant sentences, filler phrases, and negative phrasing – that creep into our writing and how to get rid of them.

InfoSec Insider
Leveraging Collaboration and SOAR to Secure Our Digital Future
By Cody Cornell
December 11, 2018

The idea behind collaborative security is to change the security and threat landscape from the daunting “one vs. many” to “many vs. many,” embracing the power of knowledge and collaboration to protect valuable data.

Internal Audit Insights
High-Impact Skills for Developing and Leading Your Audit Team
By Marcos Colón
December 06, 2018

MISTI’s Dr. Murdock shares what the status of the internal auditor is today, in addition providing some key audit leadership techniques that many up-and-coming audit leaders are commonly unaware of.

InfoSec Insider
Cybersecurity 101: How to Get Started in the Business (Part 2)
By Ed Moyle and Raef Meeuwisse
December 06, 2018

In this walkthrough, InfoSec Insider experts Ed Moyle and Raef Meeuwisse demonstrate one useful exercise that can aid security practitioners in getting a lay of the land in their organisation, serving as the perfect first step in ultimately measuring and reducing information security risks.

InfoSec Insider
Considerations for Cloud Service Providers on the Path to FedRAMP Accreditation
By Baan Alsinawi
December 04, 2018

The government has urged the private sector to offer agencies secure cloud solutions through the FedRAMP accreditation, which establishes baseline standards for security assessment, authorization, and continuous monitoring. Here, we provide six key considerations to help guide FedRAMP accreditation efforts.

InfoSec Insider
Cybersecurity 101: A Discussion on the Basics and Fundamentals
By Ed Moyle and Raef Meeuwisse
December 04, 2018

InfoSec Insider SMEs Ed Moyle and Raef Meeuwisse are back, but this time they're talking fundamentals. If you're an up-and-coming security warrior, you'll definitely want to heed this advice from the two infosec experts.

Internal Audit Insights
The Impact Selective Language Can Have on Your Audit Interviews
By Jill Schiefelbein
December 04, 2018

With increased access to cost-effective and user-efficient digital communication technologies that allow people to intentionally or spontaneously connect from any place, at any time, we have opportunities to collaborate like never before.

Internal Audit Insights
The Three Key Elements of Professional Scepticism
By Hernan Murdock
December 04, 2018

Professional scepticism is a critical component of an internal auditor's duty of care that applies throughout any engagement.  It's an attitude that includes a questioning mind and a critical assessment of the appropriateness and sufficiency of audit evidence. Here are the three key elements of scepticism you should know

.

Internal Audit Insights
The Low Down on Integrated Auditing
By Marcos Colón
November 29, 2018

In this video interview with Internal Audit Insights, Constance Snelling, director of IT risk at Jackson National Life, offers up the essential skills that are needed to be a successful IT auditor today and how this ties into performing an integrated audit.

Internal Audit Insights
Preparing for Robotic Process Automation: What Internal Auditors Need to Know
By Ed Williams & Venkatesh Krishnamoorthy
November 27, 2018

RPA, robotics, robots, bots … as internal auditors you have undoubtedly been hearing this terminology tossed around more and more. What exactly is it? Why is it such a hot topic? Here we answer those questions.

InfoSec Insider
An Open Source Intelligence (OSINT) Revolution, You Say?
By Jim Romeo
November 27, 2018

As a security practitioner, we're sure you've heard of the benefits that open source intelligence (OSINT). But what exactly is it and how can you leverage it as it relates to your current security strategy? This article answers that question and more.

Internal Audit Insights
GRC at the Speed of Business
By Marcos Colón
November 22, 2018

Internal Audit Insights catches up with Ford Winslow, CEO of ICE Cybersecurity, to discuss what the “speed of business” has had on GRC controls, and what IT auditors should prepare for.

Internal Audit Insights
How to Use Balanced Scorecards to Measure the Performance of Internal Audit Departments
By Hernan Murdock
November 19, 2018

The balanced scorecard is a system used to make sure business operations are aligned with the organization’s mission, vision, and strategy. Since it uses several measures to determine success, it helps those involved to balance what is achieved with how it is achieved. Here's how.

InfoSec Insider
Do you really need a penetration test?
By Ed Moyle
November 19, 2018

This will probably be a contentious point for some, but there are situations where a penetration test isn’t the best use of an organization’s resources. Here, we examine what is (and isn't) a pentest, and what its goals should be depending on your organization's needs.

InfoSec Insider
How to Communicate Threat Intelligence to the Board
By Marcos Colón
November 15, 2018

Cyber threats are top of mind for board members, but communicating cyber threat intelligence may not be the easiest task for security leaders. In this recent interview with Tim Callahan, senior vice president and global security officer at Aflac provides some helpful tips that could go a long way.

Internal Audit Insights
How to Create a Fraud Risk Statement for Your Fraud Audit Program
By Leonard Vona
November 15, 2018

There tends to be a fair amount of confusion when it comes to a fraud risk identification approach versus an experience-based approach but here we set out to create a list of universal definitions intended to clarify how and why you might use this approach.

Internal Audit Insights
Do DevOps and Compliance Go Hand in Hand?
By Marcos Colón
November 13, 2018

IT audit is only beginning to familiarize itself with DevOps as more organizations begin to deploy successful programs. But is it fair to say that DevOps and compliance go hand in hand? In this video interview with Atlassian Risk Futurist Guy Herbert, he gives his take on the topic.

Internal Audit Insights
4 Strategies to Head up Risk Management in your Company
By Sarah Swanson
November 13, 2018

As auditors, we all know that internal audit is uniquely positioned to understand where risks lay within an organization. But sometimes audit doesn’t get the opportunity to communicate the company’s risks to a broader audience. Here, we share a few ideas to help internal audit build bridges between knowing, communicating, and fixing risk in a company.

InfoSec Insider
How to Train Your Team (and Organisation) to Effectively Use Threat Intelligence
By Josue Ledesma
November 13, 2018

Threat intelligence has transformed the information security world for the better but it’s not always leveraged in the best way possible by organisations and departments. InfoSec Insider spoke to threat intel expert Karl Sigler to get a sense of how organisations can maximize threat intelligence for their organisation.

InfoSec Insider
What’s Next for IoT Security?
By Marcos Colón
November 08, 2018

InfoSec Insider catches up with Armis co-founders Yevgeny Dibrov and Nadir Izrael who discuss the current climate as it relates to IoT security, and offer up some dos and don’ts when it comes to connected devices within the enterprise.

Internal Audit Insights
Leveraging Virtual Team Meetings as Part of the Internal Audit Process
By Jill Schiefelbein
November 06, 2018

Many internal audit teams are not using video conferencing and virtual meetings to their advantage. When they're set up for success, research shows that virtual teams can be more effective in solving quick, simple problems than face-to-face teams.

InfoSec Insider
4 Things to Know About Penetration Testing & AI
By Min Pyo Hong, CEO and Founder, SEWORKS
November 05, 2018

Conducting penetration testing via simulated attacks on your organisation's network is the best way to help your business evaluate the strength of your network security protocols and identify any backdoors, weaknesses, and gaps between different security tools, and prioritise risk. This contributed article explains why.

InfoSec Insider
Common Application Vulnerabilities You Should Know About
By Marcos Colón
November 01, 2018

While patching vulnerabilities seems like a “low-hanging fruit” task for many security practitioners, it seems as though many still fail to do so. In this interview with application security expert Chris Eng, he highlights the common blind spots associated with vulnerability management.

Internal Audit Insights
Common Visual Cues that Could Send Your Audit Client the Wrong Message
By Jill Schiefelbein
November 01, 2018

As an internal auditor, it’s not just your words, it’s the absence of words or untimely words that could still convey a message to an audit client. It’s not only your actions, but it’s also the lack of action. All of these aspects result in communication. Communications expert Jill Schiefelbein explains more.

Internal Audit Insights
What Internal Auditors Should Know About Dirty Money Centres
By Veronica Morino, Asia Chernova, and Nigel Iyer
November 01, 2018

As Dirty Money Constellations continue to move from the “Islands of Shame” to the re-emerging epicentres of power, should we just be passive observers or is there something we can do?

Internal Audit Insights
Balancing the Risks of Today with an Eye on the Risks of Tomorrow
By Alec Arons
October 29, 2018

A great deal has changed over the years when it comes to risk, including the willingness and interest of CAE’s, Audit Committees and Boards to talk about risk. As part of the increase in dialogue relating to risk and risks on the horizon much has been written and discussed. Here, Experis's Alec Arons consolidates that information.

InfoSec Insider
So, How Strong Are Your Organisation's Passwords?
By Marcos Colón
October 25, 2018

Ntrepid Corporation’s Chief Scientist Lance Cottrell chats with InfoSec Insider and offers up the major dos and don’ts tied to password management, as well as pinpoints the significant weaknesses in some of the systems we’ve come to rely on heavily.

Still Need Help ?

Let us now about your issue and a Professional will reach you out.

Harrow on the Hill

Sigma business centre, 7 Havelock Place, Harrow, London HA1 1LJ.
   020 3890 2973
0758 845 4536
   advisor@fctraining.co.uk

Mile End, East London

119 Hamlets Way, Mile End,
East London E3 4TY
   020 3790 8674
0758 845 4536
   advisor@fctraining.co.uk

Birmingham

83 Cobalt Square, Hagley Road, Birmingham, B16 8QG
   012 1295 9988
0758 845 4536
   advisor@fctraining.co.uk

Finchley Central

24-26 Arcadia Ave, Finchley Central, London, N3 2JU
   020 3790 8674
0758 845 4536
   advisor@fctraining.co.uk

© 2019 Future Connect Recruitment. Designed with by Future Connect Media