Loading Events

« All Events

  • This event has passed.

IA’s role in reviewing a cyber threat intelligence program

December 8, 2022 @ 2:00 pm - 3:00 pm EST

Free
Grant Thornton CPE Webinars

Participants of the free live webinar will be eligible for 1 CPE credit.

Register

The complexity placed on security and risk officers to protect their organizations from cybersecurity threats continue to rise with the reports of breaches. Agility in technology platform capabilities, security frameworks, and sophisticated attacks poses a challenge to organizations on how to prioritize resources towards the protection of relevant threats and reduce security risks. Threat intelligence programs are emerging, in all sizes of organizations, to manage this complexity through defined detection and response capabilities using analytics-based controls and automation. Risk management is evolving through cyber threat intelligence programs that provide insight into the intent and capabilities of threat actors, including tools, techniques, and procedures (TTPs) that identify emerging and prevalent trends in order to help organizations make informed decisions and deploy proactive measures in a timely manner.

 

Join the Grant Thornton Internal Audit Cybersecurity team on December 8th for a webcast to discuss how internal audit can more effectively assess their organization’s cyber threat intelligence program.

 

The discussion will focus on:

Emerging threats and the changing cyber risk landscape
Cyber threat intelligence program components and how these capabilities can be evaluated through risk-based control frameworks
Leading practices internal auditors can consider in evaluating cyber threat intelligence program components
How to build a cyber threat intelligence program to maximize cybersecurity controls and optimize resiliency against cyber-attacks
The outcomes of a well-defined cyber threat intelligence program and how it can provide advanced protection against the rising threat landscape

Date and time
Thursday December 08, 2022 02:00 PM — 03:00 PM ET

 

Recommended CPE credits 1

 

Learning objectives
Recognizing and responding to the emerging threat landscape
Identify cyber threat intelligence program components and how can these capabilities be evaluated through risk-based control frameworks
Define internal audit’s role in evaluating cyber threat intelligence program components
Describe leading practices internal auditors can consider in evaluating cyber threat intelligence program components
Demonstrate how to build a cyber threat intelligence program to maximize cybersecurity controls and optimize resiliency against cyber attacks
Describe the outcomes of a well-defined cyber threat intelligence program and how it can provide advanced protection against the rising threat landscape

Leave a Reply

Subscribe Here