Learn how to deal with the challenges of increasing trade tensions and their potential impact on costs and your bottom line.
Learning Objectives
- Learning Outcomes
- Identify the key areas of information security, including strategy, policies and procedures, control environments and business continuity and disaster recovery.
- Determine the major threat vectors for systems, including cyber adversaries, the cybercrime economy and various types of attacks.
- Differentiate the various types of data analytics, the tools and procedures to perform an analysis and the methods of reporting and performance indicators.
- Differentiate the various forms of technology disruptors, including cloud technology, the Internet of Things, and artificial intelligence.
- Recognize the objectives, strategic planning, implementation, and management of the IT function within an organization as well as mitigation of risk.
- Differentiate various IT frameworks, including COSO and COBIT, and apply the integration of frameworks with IT assessments.
- Determine key control areas for IT assessments, including IT general controls, application, business process and change management controls.
- Identify the purposes for SOC reporting, the users of SOC reports and the responsibilities of user auditors.
Major Topics
The economic debate;Advantages and disadvantages of increasing trade tensions;Impact on global value chains;Potential winners of trade policies;Exposure to trade tensions;Building resilience;Risk appetite