Cyber Security Programs and Roles

Field: Auditing | Delivery Method: Self Study | CPE Hours: 2.0

  Enroll in Course

Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function. Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways. As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.


Outside of being aware, organizations must begin to implement cyber risk management programs. This includes strategic risk assessments that evaluate aspects of your organization’s cyber presence. This segment will focus on components and roles for a cyber program.
Future segments will focus on building a cyber security risk assessment and dissecting the steps of the NIST cyber risk framework.


Lesson objectives:

  • Explore the internet history.
  • Identify the elements required of a cyber program.
  • Explore the categories of cyber security.
  • Identify the top 10 vulnerabilities per the Open Web Application Security Project (OWASP).
  • Explore the types/ categories of cyber threats.
  • Identify roles in a cyber risk management program.
  • Identify focus areas for cyber programs.
  • Explore basic components of the NIST framework.


Field: Auditing
CPE: 2.0
Delivery Method: Self-Study
Format: Video





Your Instructor


Lynn Fountain
Lynn Fountain

Consultant, CPA, CGMA, CRMA, MBA, Past Chief Audit Executive

Business Consultant, Trainer, Author


Ms. Fountain has over 40 years of experience spanning public accounting, industry accounting and consulting. Sixteen years of that experience has been in the field of internal audit, risk managment and process improvement. She is well adept to assist your organization evaluate business strategy, perform risk assessments, establish a Sarbanes-Oxley process, synergizing internal audit processes or perform process improvement projects.


As a past corporate executive Lynn has a passion for working with professionals to enhance their processes and provide leading edge education. She has authored and delivered hundreds of training courses for accounting, finance and audit professionals. Her training is filled with not just theory but real world application.


Ms. Fountain has authored three technical publications:

-Leading the Internal Audit Function 

-Raise the Red Flag

-Ethics and the Internal Auditor's political dilemma


Lynn is a recognized leader in the internal audit profession as well as a recognized business professional.  


Ms. Fountain obtained her BSBA from Pittsburg State University and her MBA from Washburn University in Kansas. She has active, current CPA, CGMA, and CRMA credentials.


https://www.lynnfountain.net/


Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 7 days and we will give you a full refund.

Get started now!