professional development courses

  • Professional Development Courses

    Our courses are designed to deliver highly focussed, practical training on an open enrollement basis, covering all professionals, industries and regions.

  • Training by Regional and Sector

    Courses can either isolate regional or sector differences or celebrate them through both course delivery and trainee participation

  • It takes the best to train the best

    We employ the best trainers from unrivalled access to the world's leading minds in all industries and regional markets. Carefully selected for their mix of practical experience, consultative background in a broad range of companies and proven training delivery. You need the best, we insist on it!

  • Our training philosophy

    Our expert trainers combine with our cutting edge course content to focus on delivering content through expert facilitation and dynamic presentations with relevant and transferable practical case studies bringing the theory to life.

Deploying IT Audits on a Strategic Level to Focus on the Business Threats that Matter

Organizations are increasingly looking towards technology to be the primary resource to reach customers, deliver new products and services, and to grow the business as a whole. This new emphasis carries with it severe risks and potentially devastating consequences for any organization that misuses technology. It has been estimated that 80% of business risks are now directly related to technology. It is vital for organizations to have controls in place not only to guard against potential breaches and identify where an organization is vulnerable, but also to identify what areas are to critical to an organization in order to meet its objectives and how might they be affected by either the use or misuse of technology.   The challenges of being an IT Audit leader are constantly changing and growing. Leaders must constantly consider whether and how they can improve risk awareness and the services of the IT Audit department to respond effectively to the issues that matter to the business as a whole. In order to be effective, IT Audit must deliver a balance of assurance and consulting that is valued by stakeholders while being knowledgeable on key trends and regulations that will impact the business.

Turning 'Theory' into 'Practice'?

A robust IT Audit function enables an organization meet its objectives not only by identifying where it is vulnerable and how it can protect itself from these threats, but it also identifies areas and ways that companies can better use technology to meet its objectives. A study conducted by McKinsey in 2012 concluded that “technology has become too embedded in the fabric of business – and too critical for competitive performance – to be left to the IT function alone.” It is vital for organizations to employ the IT Audit function on a strategic level so that the organization can meet its business objectives.

Who should attend?

SVP’s, VP’s, Directors and Senior Managers from cross- Industry organizations with responsibilities in: IT Audit, Integrated Audit, Internal Audit, IT Security, Certified Information System Auditors, Chief Information Security Officers, Compliance, Internal Controls

Key areas to be covered in the programme and documentation

Drive a Robust IT Audit Function by Leveraging Key Characteristics and Practices of High-Performing Groups

o    Identify the necessary criteria for a robust IT Audit framework

o    Determine the parameters of an effective IT Audit function

o    Develop a culture that allows IT Audit to function as an underlying service provider for all business goals

o    Understand what effective IT Audit leadership looks like

o    Determine your Governance Risk and Compliance maturity level

o    Get started with your IT Governance Risk and Compliance roadmap

Leverage IT Audit to Identify Emerging and Real Enterprise-Wide Risks

·         Learn why performing a risk assessment is not enough: What’s the real requirement around managing risk?

·         Understand how  IT risk assessments fit within a fully integrated risk assessment framework

·         Use assessments to identify emerging threats to business practices

·         Determine the risks that threaten business practices from failed or misused technology

Getting in the Driver Seat with IT Audit – Lead Transformation for Real Operational Effectiveness

o    How to identification and rationalization your controls

o    Stress testing strategic assumptions

o    Best Practice for building a consolidated controls framework

o    Owning your controls – Changing your conversations with the auditors

o    How  Risk Management Programs build  IT credibility

Structure Your IT Audit Function for Increased Effectiveness and Value to the Business

o    Implement  processes, controls, organization structure that assures an effective responses to emerging threats, risk, and regulatory requirements

§  Challenge existing silos that hinder an effective approach to Security and Audit

§  Recognize what processes are required to maintain an effective approach to audit

o    Utilize an integrated approach to cyber security that incorporates security operations, IT Audit and compliance functions

o    Implement effective business practices that enables collaboration between IT Audits and other key departments

o    Drive communications and a visible culture around IT GRC

Build Sustainable Compliance Models Integrated within Existing Structures

o    Integrate Governance Risk and Compliance with IT Service Management; why the sum is greater than the parts.

o    Performance-based controls design: How to use controls to improve operational efficiency

o    Implement IT Audit practices that maximize quality control without impeding business practices

o    Integrate IT Audit with existing GRC processes

o    Unify your controls framework to improve processes, and save time and money

o    Recognize the value of self-audits

Manage Third Party Controls

o    Manage controls associated with 3rd Party Providers (SaaS, Cloud, Hosting, Out-sourcing, Off-shoring)

o    Address your customer’s security and privacy requirements

Data Management and Security in IT Governance, Risk and Compliance

·         Recognize ingress and egress points for various types of data

·         Identify where your organization is vulnerable to potential data leaks

·         Learn why data privacy and security training is failing and what to do to correct it.

·         Understand the impact of data quality on IT Governance Risk and Compliance

Strategic Conversations for Enabling Senior Level Understanding and Support

·         Effectively engage key stakeholders and build relationships

·         Utilize Audit reports as communication vehicles to enable conversations that need to occur

·         Negotiate effective actions in response to IT Audit issues to drive change that matters

·         Understand how roles are changing within the board

·         Transform the conversation from “IT Risks” to “business risks”

·         Drive the link between IT Audits and total business strategy

·         Build business continuity and contingency plans

Define and Enable Resource Requirements Needed to Execute IT Governance, Risk, and Compliance

·         Identify the key investment you should expect to make?

·         Determine typical on-going costs

·         Plan and budget for IT Audit function and IT Governance Risk and compliance

Prepare for New Regulations that Will Impact Your Current Processes and Structures

·         Examine how the updates to the COSO Integrated Framework  will impact business practices

·         Identify which controls from the ISO 27000 best fit the company’s needs and enable it to meet its objectives

·         Recognize what entities will now be required to comply with new privacy regulations such as HIPAA HITECH

·         Understand what measures companies will have to implement to comply with new regulations

·         Determine the repercussions for violation of new regulations

Benefits to you

·         Link IT Audit to business strategy to meet company objectives

·         Leverage the key characteristics and practices of high performing groups to drive a robust IT Audit function

·         Enable IT Audit to function as an underlying service provider for business goals

·         Utilize IT Audits to identify emerging mission critical threats that organizations face

·         Transform IT Audit to enable real operational effectiveness

·         Explore the future of IT Audits

·         Structure the IT Audit function for increased effectiveness and value to the business

·         Drive strategic conversations enabling senior level understanding and support

·         Incorporate existing structures within IT audit to build sustainable compliance models

·         Define and enable resource requirements needed to execute IT Governance, Risk and Compliance

Assure compliance to new privacy laws such as HIPAA HITECH

Companies already benefiting include:

Duration of Course

2 Days Day Course

Course details

September 11th-12th, 2013 Chicago, IL

For more information about this course and how to register, please contact Emily Jones at or call 312.540.3000 ext 6714

Looking to train larger teams in this subject?


Quick Enquiry
Training need Input the below captcha code

Further information

UK Enquiries: +44 (0) 203 002 3057

Non-UK Enquiries: +420 (0)2 5570 7246

North American Enquiries: +1 312 540 3000 X6714 or


"This course will allow my company to develop its existing strategies to a much greater and hopefully profitable level."

Managing Director, Tarmac