Abstract:
1. What is a SOC Audit
2. Overview of the suite of SOC Audits
3. What is Cybersecurity
4. Security and IT Control Frameworks
5. Why Cybersecurity attestation
6. SOC for Cyberdecurity vs SOC2 Audits
7. Core functions within a Cybersecurity risk management program
8. Readiness assessment for SOC for Cybersecurity
9. The SOC for Cybersecurity audit engagement
10. Questions and Answers
Speaker: Sumit K. Pal, CISA, CGEIT, CRISC
Sumit is a senior IT audit professional with over 25 years of experience in internal audit and IT/Cybersecurity matters, software engineering and executive management industry. His experience includes:
- Systems and Organization Controls Audits (SOC 1SM, SOC 2SM, SOC 3SM, SOC for Cybersecurity)
- Data Analytics/Data Mining
- Consultation, implementation guidance and project execution using Computer Aided Audit Techniques (CAAT) tools, including ACL and IDEA
- Royalty/IP Audits
Sumit has worked with both public and private companies in a range of industries, including financial services, not-for-profit organizations, manufacturing, real estate, wholesale and distribution, consumer goods, software, technology, life science, professional services, media and others.