The road to reliable internal control and CyberSecurity compliance can be very treacherous, full of potholes and rocks…and many forks to ponder. Compliance requirements come from all directions, shapes, and sizes…not to mention heightened attention to the protection of payment card data, personally identifiable information (PII), identity theft, and security breach disclosure legislation. Logical access controls represent the single most significant security safeguard to protect valuable data from unauthorized access…and the most common area of important audit findings by internal and external auditors.
In this widely applicable workshop, we will provide a framework for consistent and effective auditing of logical access controls. Case studies will be used to demonstrate real examples of common access controls and data collection methods for operating systems, database servers, and other software environments, emphasizing free and/or low-cost audit software procedures. Attendees will receive sample work programs and checklists that can be used to perform effective logical access audits in any context.
- Key risks and compliance requirements associated with logical access control
- Key building blocks of logical access control
Locating typical logical access control points in infrastructure and applications
- Industry best practices for logical access controls
- Tools and techniques for auditing logical access controls
Questions? Contact us
Phone: +1 (781) 784-4390
Fax: +1 (781) 253-2066
Email: fill out form below