IT Audit Work Plans
- AWS Security Audit Work Plan
- Microsoft Azure – IT Audit Work Plan
- IT Risk Assessment Work Plan
- IT Planning and Preparation
- A Comprehensive SOC 2 Audit Work Plan
IT Security Topics
- Zero Trust Architecture – Enhancing Network Security
- Software Development Life Cycle
- Mobile Device Management (MDM)
- Audit Logging and Network Monitoring
- IoT Security – Risk and Challenges
- Identity and Access Management (IAM)
- Configuration Management
Governance, Risk, and Compliance
- Six Crucial Compliance Frameworks
- IT Risk Assessment Methodologies
- Understanding Governance, Risk, and Compliance
- SOC 1 and SOC 2 Reports – Understanding the Differences
- Data Security and Privacy Governance
Information Security Policy and Procedure Guidance
- Wireless Communication Policy
- Vulnerability Management Policy
- Vendor Management Policy
- Security Awareness and Training Policy
- Remote Access Policy
- Physical Security Policy
- Internet Security Policy
- Code of Ethics Policy
- Equipment and Data Disposal Policy Guidance
- Encryption and Key Management Policy
- Email Usage Policy
- Data Retention Policy
- Privacy Policy for Confidential Data
- Data Classification Policy
- Change Control and Change Management – Policy Guidance
- Acceptable Use Policy
- Network Management – Policy Guidance
- Incident Response – Policy Guidance
Miscellaneous Security-Related Topics
- Understanding the Azure Shared Responsibility Model
- Understanding the AWS Shared Responsibility Model
- Top Vulnerabilities in Today’s Technology
- Password Construction and Protection
- Business Continuity and Contingency Planning
- Artificial Intelligence (AI) – Governance and Policy Guidance
Misunderstood Principles and Concepts in Information Technology