View Blogs

Why IS Audit is important

Be the first person to like this.
What you need to know?? In an age of rapid change, innovation and technology is everywhere and data dominates our lives. The audit must reflect this shift if it’s to stay relevant and bring key stakeholders the value they are looking for. Audit committees, regulators, standards setters and investors have told us that they are looking for more than a statutory audit. They are looking for audits that provide greater clarity of metrics and improved assurance around the governance and culture at play in an organization. Through our use of technology we go broader and deeper to unlock greater insight from the data that’s available – helping ...
0 comments
Be the first person to like this.
Top 5 Ways to Handle a Data Breach With data breaches occurring regularly, people have become desensitised to them. This isn’t good, since the protection of data has never been more important. Not only are business required to announce that a data breach has occurred, they are also obligated to pay fines due to regulations in accordance with GDPR. What is a data breach? Why do data breaches happen? How to recover after a data breach  Stop the breach Assess the damage Notify those affected Security audit Update your recovery plan to prepare for future attacks Top 10 ways to protect your company against a data breach ...
0 comments
Be the first person to like this.
K. Harisaiprasad CISA, Associate Consultant, Mahindra SSG, New Delhi, India | Posted at 3:02 PM by ISACA News | Category:   Security   |   Permalink   |   Email this Post   |   Comments (1) Transport Layer Security (TLS) is a cryptographic protocol for protecting privacy and data integrity of information (logins, passwords, credit card numbers, personal correspondence etc.,) between two communicating applications. It encrypts data traveling between internet hosts, including mail servers, VPN, SIP for voice, video and messaging applications. Its current version is 1.3, following the previous version, 1.2. With TLS, ...
0 comments
2 people like this.
K. Harisaiprasad, CISA, APP, ISO 27001 Lead Auditor, Associate Consultant, Mahindra SSG, India | Posted at 2:44 PM by ISACA News | Category:   Certification   |   Permalink   |   Email this Post   |   Comments (0) The Information Security Management Systems Certification (ISO 27001:2013) helps organizations   prove they are managing the security of clients’ and stakeholders’ information , and can generate the need for three types of vendors: certification body, internal audit and implementation. The certification body (CB) is an organization accredited by a recognized accrediting body (UKAS, ANAB, etc.,) for its competence ...
0 comments
1 person likes this.
A Look at CIS Controls Version 7.1 K. Harisaiprasad CISA, APP, Associate Consultant, Mahindra SSG, India      | Posted at 2:58 PM by ISACA News | Category:   Security   |   Permalink   |   Email this Post   |   Comments (3) CIS Controls Version 7.1, released in April 2019, was developed by Center for Internet Security (CIS), which consists of a community of IT experts.   CIS Controls   has a set of 20 prioritized controls, divided into three categories as basic, foundational and organizational, which are also termed as Implementation Group (IG) IG1, basic; IG2 – IG1, foundational; and IG3 – IG2, organizational. ...
0 comments