Uploaded by Errabelly Anudeep

Chapter 2 - CISA & CISM Certifications

advertisement
Overview of
CISA & CISM Certifications
Objectives






Certification overview
Benefits of certifications
How to obtain the CISA and CISM certifications
Personal side of certifications
Applying certifications to real-world scenarios
Explanation of the technical audit process
2
Certifications





Generally voluntary
Require passing a written exam
Can take years to obtain experience
Employers may view as benchmark of knowledge
Opinions are divided on value of certification


Worker may have “studied only to pass the exam”
Some certifications substantially improve workers’ salaries
and career prospects
Throughout this presentation, think of
certifications that apply to your profession
3
Top Technical Certification
Source: Indeed Career Guide










Project Management Professional (PMP)
Certified Scrum Master (CSM)
AWS Certified Solutions Architect – Associate
AWS Certified Developer – Associate
Certified Information Security Manager (CISM)
Certified Ethical Hacker (CEH)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Certified Information Systems Auditor (CISA)
Google Certified Professional Cloud Architect
4
Top Finance Certification
Source: Indeed Career Guide











Certified Financial Planner (CFP)
Certified Management Accountant (CMA)
Certified Investment Management Analyst (CIMA)
Certified Public Accountant (CPA)
Chartered Financial Consultant (ChFC)
Personal Financial Specialist (PFS)
Certified Treasury Professional (CTP)
Certified Government Financial Manager (CGFM)
Certified Healthcare Financial Professional (CHFP)
Certified International Investment Analyst (CIIA)
Chartered Financial Analyst (CFA)
5
What are the CISA and CISM Certifications?

Certified Information Systems Auditor (CISA)


Standard for those who audit, control, monitor and assess an
organization’s information technology and business systems
Certified Information Security Manager (CISM)

Standard for those who design, build and manage enterprise
information security programs

Generally more managerial and operational than technical
CISA & CISM certifications are offered through ISACA
(Information Systems Audit and Control Association)
www.isaca.org
6
Certifications Salary and Market Competiveness

CISA & CISM holders can earn a pay premium increase of
10% to 15% of base salary
(Source: IT Skills and Certifications Pay Index (ITSCPI) report from Foote Partners)

Simple search on Indeed, CareerBuilder, Dice, and other
job sites reveal hundreds of job opportunities for those
that hold a CISA, CISM, and other credentials




IT Auditor
Security Architect
IT Risk and Security Analyst
Compliance Manager
7
Benefits of Earning CISA or CISM Certification






Quantifies and markets your expertise
Demonstrates that you have knowledge necessary to
evaluate information technology system controls
Is globally recognized as an IS audit professional
Provides you with credibility in the marketplace
Increases your value to the organization
Gives you a competitive advantage over peers when seeking
job opportunity and growth
8
Why do employers hire someone with a CISA or
CISM credential?


Certification holders are good indicators of proficiency in
their profession
Provide the enterprise with a certification for IT assurance
that is recognized by multinational clients, lending
credibility to the enterprise
A certification simply shows the
individual goes the extra mile!
9
CISA Certification Process

Successfully pass five areas of the CISA certification exam:





The process of Auditing Information Systems
Governance and Management of IT
Information Systems Acquisition, Development, and Implementation
Information Systems Operations, Maintenance, and Support
Protection of Information Assets

A minimum of 3-5 years of IS auditing, control, or security work
experience depending on level of formal education

Adhere to Continuing Professional Education (CPE) program

Adhere to Code of Professional Ethics
10
CISM Certification Process

Successfully pass four areas of the CISM exam:





Information Security Governance
Information Risk Management and Compliance
Information Security Development and Management
Information Security Incident Management
Minimum of five years of information security work experience

Various experience substitutions apply such as:


CISA, CISSP and several other certification holders
Post-graduate degree in information security or related field

Adhere to Continuing Professional Education (CPE) program

Adhere to Code of Professional Ethics
11
How Certifications Helped Me in My Own Career

Living in a small (big) town – Tulsa, Oklahoma

About to lose job through layoffs

Working as a manager in telecommunications industry that was
reducing massive number of jobs
12
How Certifications Helped Me in My Own Career

Knew that I needed to differentiate myself from other candidates
in the job market. My differentiators include:



Formal education (college degree)
Interpersonal skills and appearance
Aptitude and attitude
13
How Certifications Helped Me in My Own Career


Found a new job but vowed to become more marketable going
forward
Studied for the CISA



Failed the first time; passed the second
Passed CISM on first try
My career – Part II



Owned and operated a successful IT consulting business from
2006 to 2016
I’m convinced that CISA & CISM credentials made a difference with
earning credibility and ultimately – the consulting project!
Speaking at public events
14
Next few slides focus on applying the CISA & CISM
certifications to real-world situations
15
Recent Security Breaches – Could They Have
Been Prevented?







Equifax – 143 million American consumers affected
Ashley Madison – 35 million identities
JP Morgan Chase – 76 million households affected
Home Depot – 56 million credit cards due to malware
Target – 40 million credit cards and personal customer
records due to malware
Veteran Affairs – 26 million records exposed that were stored
on a stolen laptop
Facebook – 6 million records shared due to software bug
The list is endless!
16
How does a company reduce the risk of a
security breach?
Answer:
Start with a Technical Audit or
Risk Assessment
17
Developing an Audit Plan



Research the business environment from a technical
perspective
Identify areas that should be audited
Perform a risk assessment of auditable areas



Perform independent risk assessment annually
Be flexible with the audit universe and adjust audits as necessary
Pinpoint the audits based on:



Level of risk
Senior management and operation management requests
General observations
18
Developing an Audit Plan
Mandated
Risk Assessed
H
Risk Impact
High
Total Audit
Universe
Consider alternative
audit approach
Low
L
Risk Likelihood
H
Key Considerations



Perform risk assessment on all audit subjects
Select audits from the high, medium and low quadrants with the bulk of the
audits going to the high-risk areas
Consider the Control Self Assessment approach to the low-risk areas
19
Information Technology Audit Example

IT General Controls
IT General Controls Review
Meet with management
Determine what they consider the most vulnerable risk in their
organization
Design the IT audit to cover the following areas:
Logical and Physical Security Controls
1. Logical Access Security Administration
a. Login ID and Password Controls
b. Privileged User Account Administration
c. Employee Access Authorization and Termination Processes
d. Security Awareness and Training
2. Antivirus Protection
3. E-mail Security Controls (i.e., spam, data protection, etc)
4. Preliminary Vulnerability and Port Scan Assessment
5. Computer Physical Access Controls
6. Data Center Controls
a. UPS/Emergency Power Backup
b. Fire suppression, detectors, alarms
7. Disaster Recovery and Business Continuity Review
1441 South Carson Avenue
Tulsa, OK 74103
P (918) 582-1873 F (918) 582-4716
magnir.com
20
Information Security Audit Example

Cloud Risk Assessment
Information Security Risk Assessment Process Example
Send risk assessment questionnaire to application cloud provider
 Ask that the questionnaire be completed by the department most knowledgeable and
responsible for application security controls
 Ask that the questionnaire be completed as thoroughly as possible
 Ask that the questionnaire be returned by a certain date
Receive the questionnaire from provider
Evaluate the questionnaire responses. The Information Security Risk Assessment reviews
sixteen specific areas of security pertaining to the application. These areas include:




Description of Services to Be Provided
Data Management and Protection
Data Classification
Information Lifecycle



Cryptographic Services
Customer Authentication, Access Control, and Audit
Restricting Unauthorized Access, and Audit




Supplier-Employee Authentication, Access Control, Audit, and Backup Security



Devices and Procedures Used for Virus Detection and Cleansing
Process for System Hardening (i.e. Fine Tuning the Security Controls)
Change Management Process



Documented Business Continuity and Disaster Recovery Plans
Security Training and Certifications


Third-Party Contracts
Third Party Audits
Procedures for Computer Incident Response Team Capability
Devices and Procedures for Intrusion Detection
Administrative Process for Applying Patches and Upgrades
Security Policy
After reviewing the security controls, a report is provided to management and is typically
used as 1) part of the selection process and 2) documentation that controls were reviewed.
1632 South Denver Avenue
Tulsa, OK 74103
P (918) 582-1873 F (918) 582-4716
magnir.com
21
Audit Report Example

Example eDiscovery Audit Report
Example eDiscovery Readiness Assessment Report
Outline
 Title Page
 Table of Content
 Executive Summary
 Introduction
 Review Objectives
 Findings and Recommendations
 Estimated Cost of eDiscovery Preparedness
 Conclusion
~~~~~
Findings and Recommendations
The items listed below were identified during the review as strengths,
opportunities and areas of improvement…..
Strengths
S.1 The personnel assigned to xyz department appear
professional, knowledgeable, and detail oriented in
performing duties involving records management.
S.2 Documentation of existing processes….
Weaknesses
Note: All identified risks are listed from highest risk to lowest risk.
22
Testimonials

The benefit—the main benefit of the CISA certification in my case—has been to be
recognized, not only locally in my country, but at an international level, as a professional
with knowledge and skills, able to give an opinion and to audit all the areas related to IT.
Ana Virginia Escalante, CISA, CGEIT, Vice President, SIIAS, SA

The value of CISA is its instant recognition that you are a professional IS auditor. There's no
need for an auditor or someone who doesn't know you to question your credentials—you
have a CISA, so your credentials are understood! Michael A. Howard, CISA

I decided to pursue the CISA certification because I found that an undergrad degree
typically is not enough and the CISA designation allows me to set myself apart from other
IT auditors. From what I’ve seen in the workforce, the CISA is the gold standard for IT audit
professionals. John Pouey, CISA, CISA

Once I became certified, I immediately noticed a difference in [the credibility I receive] from
the business community— the CISA is proof that I passed a rigorous examination of IT
auditing and controls. Vincent Chan, CISA, CGEIT
23
1441 South Carson Avenue., Suite 101, Tulsa, OK 74119
24
Download