IS AUDIT AND IT et RISK
Business units and the information technology (IT) function integrate cyber risk management into decision-making and daily operations and constitute an organization's first line of defense. The second line includes IT risk management officials who establish governance and oversight, monitor security operations, and take necessary actions.
The growing importance of IS in creating value for the company and its performance requires special attention to how IS and those who implement them consume and transform the company's resources.
This is why QUALISYS Consulting has set up a range of training courses in Information Systems Audit to train IS actors to better use IS to increase company revenue.
-
IT audit: concepts, approach and implementation
-
Performance and availability of information systems
-
Preparation for the CISA certification (Information Systems Auditor)
-
Preparation for the Certified Risk and Information System Control (CRISC) certification of ISACA.
The evolution of information and communication technologies, in particular with the development of the Internet, has meant that networks and information systems now play a crucial role in our society, whose security of our citizens is not is not marginalized.
Attacks are more and more frequent, so it is necessary to know how we can protect our confidential information. This is why it is important to develop capacities on cybersecurity and information security.
-
Raising awareness of new data protection rules
-
State of the art of Information Systems security État de l'art de la sécurité des Systèmes d'Information
-
Security awareness for decision makers
-
Master the analysis of IS risks
-
Information security governance in practice
-
PCI DSS : the Basics
-
CISSP - Security Certification Preparation
-
Preparation for CISM certification (Information Security Manager)
-
ISACA Cybersecurity Basics Certificate (Optional Exam)
-
CURSUS: Become an Information System Security Manager
Business continuity is more than ever at the heart of the concerns of companies and regulators. Well beyond the IT dimension to which it is too often confined, a Business Continuity Plan (BCP) is above all centered on the businesses, and aims to ensure the robustness of the company in the face of any type of operational risk. . Through our training, we take stock of the best practices allowing the implementation of a realistic and sustainable IT Continuity solution.
-
Develop a continuity and disaster recovery plan
-
IT recovery and continuity plan
-
Develop an IT backup plan