All entries by this author


Mar 18th, 2015 | By | Category: Uncategorized

This page is currently under maintenance.

Substantive IT Security Audit using In-Depth Vulnerability Assessment Techniques, 5 Days

Mar 27th, 2012 | By | Category: Training

Many auditors find that doing substantive IT security audit is very challenging. Most of audit checklists are not comprehensive, do not provide the security reasons behind them and treat each checklist item as an independent issue. We strongly recommend this training for any auditors, IT professionals or IT security professionals who can not clearly answer […]