Now Reading
IAs are crucial in strengthening the control environment for Zero Trust
[vc_row thb_full_width=”true” thb_row_padding=”true” thb_column_padding=”true” css=”.vc_custom_1608290870297{background-color: #ffffff !important;}”][vc_column][vc_row_inner][vc_column_inner][vc_empty_space height=”20px”][thb_postcarousel style=”style3″ navigation=”true” infinite=”” source=”size:6|post_type:post”][vc_empty_space height=”20px”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]

IAs are crucial in strengthening the control environment for Zero Trust

Program Content:
Changing business models and advancements in technology have created an increasingly complex IT environment with fewer physical and virtual walls to protect an organization’s assets. Companies have to adapt their cyber defense strategies to keep up with the increasing cyber-attack surface. Secure operation with a distributed workforce and diminished perimeter protection is the basis of creating an environment that minimizes the damage caused by breaches, regardless of whether they are inside or outside the organization. The non-traditional security approach based on this model enforces controls and security mechanisms to move away from any implicit trust and instead rely upon the premise of “never trust, always verify,”” also known as Zero Trust. It is crucial to understand how companies adapt to a nontraditional work environment. This can be done through an internal audit and independent review.

Meet the Grant Thornton Internal Audit Cybersecurity Team on April 20th to learn more about the Zero Trust security model, and how it relates to the changing risk landscape.

The following topics will be discussed:

  • Understanding Zero Trust and why it is important to an organization in a complex IT environment
  • Zero trust brings together multiple cyber domains in order to better protect the IT environment and assets
  • How organizations approach Zero Trust security models to secure the perimeter
  • Auditors from top firms should use their audit plan to assess their Zero Trust program.

Learning objectives

  • Describe the changing work environment, and why it is important to adapt to a Zero Trust security system
  • The benefits of integrating multiple cyberdomains to improve security and asset protection
  • Define the role of IA in evaluating Zero Trust security models
  • Find the best practices for cyber resilience with Zero Trust
  • Demonstrate how you can enhance cyber programs using a combination of technical subjects and risk-based controls frameworks

Speakers:

  • Scott Peyton, Partner, Internal Audit Cybersecurity Practice Grant Thornton LLP
  • Vikrant RaiGrant Thornton LLP, Director, Internal Audit Cybersecurity Practice
  • Vishal TandonGrant Thornton LLP, Director, Cyber Risk, Digital Identity Management
  • Brook BuchananGrant Thornton LLP, Director, Internal Audit Cybersecurity Practice

Recommended Study Area:Management Services
Program Level:Overview
Prerequisite:Experience with audit planning and managing Cyber security risk through the audit program. Understanding of Cyber security threats and how they might impact/impair business operations. Digital Identity and Access Management Experience
Delivery MethodGroup – Internet

For any questions or difficulties with enrolling, please email technical support at [email protected]Or visit our Webcasting frequently asked questions page.

If you are having trouble viewing or listening to an event please review the event. Help guideIt provides minimum requirements as well as frequently asked questions.

CPE support can be reached via email at if you have any questions about CPE credit [email protected]You can also visit our webcast CPE information page.

View Comments (0)

Leave a Reply

Your email address will not be published.