Risk Advisory Academy Training Brochure

Similar documents
Cyber Security is it a boardroom issue?

INTELLIGENCE DRIVEN GRC FOR SECURITY

Emerging Technologies The risks they pose to your organisations

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

Security and Privacy Governance Program Guidelines

Are we breached? Deloitte's Cyber Threat Hunting

Cyber Espionage A proactive approach to cyber security

Achieving effective risk management and continuous compliance with Deloitte and SAP

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

Cyber Risk Services Going beyond limits

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

THE POWER OF TECH-SAVVY BOARDS:

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

Real estate predictions 2017 What changes lie ahead?

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

How Secure is Blockchain? June 6 th, 2017

Cybersecurity and the role of internal audit An urgent call to action

Cybersecurity. Securely enabling transformation and change

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Cyber Security Incident Response Fighting Fire with Fire

SOC for cybersecurity

Continuous protection to reduce risk and maintain production availability

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Deloitte Discovery Caribbean & Bermuda Countries Guide

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Deloitte Forensic Caribbean & Bermuda Countries Guide

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

The New Healthcare Economy is rising up

Securing Your Digital Transformation

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Turning Risk into Advantage

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice

Cybersecurity and the Board of Directors

Cybersecurity and the role of internal audit An urgent call to action

A Framework for Managing Crime and Fraud

Course List & Pricing Crest Advisory Africa

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

NERC Staff Organization Chart Budget 2019

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities

Driving Global Resilience

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Cybersecurity Fortification Initiative (CFI) infrastructure whitepaper

BUSINESS CONTINUITY MANAGEMENT

Cyber crisis management: Readiness, response, and recovery

BHConsulting. Your trusted cybersecurity partner

NERC Staff Organization Chart Budget 2019

Assessing cyber risk Critical questions for the board and the C-suite. Cyber Risk

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

Heading Text. Manage your Organization s Governance, Risks, and Compliance Requirements and Transform your Business Potential with SAP GRC

#DeloitteInnovation: In-Time Uncover the Potential of SAP HANA

CFOs in a new global environment Sandy Cockrell, Deloitte

DATACENTER SERVICES DATACENTER

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Protecting your data. EY s approach to data privacy and information security

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

locuz.com SOC Services

Adopting SSAE 18 for SOC 1 reports

NERC Staff Organization Chart Budget 2018

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

GDPR Update and ENISA guidelines

Contact us What makes us different Dinesh Anand Our offices Forensic Bangalore Kolkata Cutting-edge technology to deliver more efficiently Services

Avanade s Approach to Client Data Protection

Storming ahead 2017 Hot Topics for IT Internal Audit in Financial Services. An Internal Audit viewpoint

Global Statement of Business Continuity

Building and Testing an Effective Incident Response Plan

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

A new approach to Cyber Security

Achieving third-party reporting proficiency with SOC 2+

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

CYBER SOLUTIONS & THREAT INTELLIGENCE

Course List & Pricing Crest Advisory Africa

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting

IT Consulting and Implementation Services

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Cybersecurity Protecting your crown jewels

On the board s agenda US Cyber risk in the boardroom: Accelerating from acceptance to action

BHConsulting. Your trusted cybersecurity partner

COBIT 5 With COSO 2013

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

#DeloitteInnovation: In-Time How efficiently do you use your SAP HANA?

Position Description IT Auditor

TSC Business Continuity & Disaster Recovery Session

In-House Training Training Calendar

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

SAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010

From Dabbling to Doing The Age of the Intuitive Enterprise

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

Short courses presented by the NWU Programme in Forensic Accountancy

Run the business. Not the risks.

CCISO Blueprint v1. EC-Council

Transcription:

Academy Brochure

2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty from the boardroom to the network. The trainings will equip you to create sustainable information systems ensuring the confidentiality, integrity, availability, usability and reliability in the short, medium and long term. Our non exhaustive courses and high-level curriculum are Cyber Security Fundamentals 3 Cyber Threat Assessment 5 Cyber Incident Response 5 Secure Application Coding Techniques 3 Secure Development of Mobile Applications 3 Secure Application Development 3 Cyber Security for Executives 1 Cyber Security Awareness Session for Board and Executives 2 Hours Leading Practices Alignment Our training courses for business and IT leading practices alignment, are designed to help you achieve process and technology compliance against leading practices, and transform the Enterprise IT capabilities to meet worldwide standards. COSO Enterprise Risk Management Framework 2 BASEL II and III Compliance Requirements 4 COBIT 5 Curriculum Foundation 2 COBIT 5 Curriculum Implementation 2 COBIT 5 (Foundation and Implementation) 3 COBIT 5 Lead Assessor 3 ISO 20000 Foundation / ITIL Foundation 3 ISO 20000 Practitioner / ITIL Practitioner 5 ISO 22301 Lead Implementer / Lead Auditor 5 PMP Certification 5 Certified CMMI Associate 2 CMMI Lead Appraiser 5 TOGAF 5 OHSAS 18001:2007 Lead Auditor 2 ISO 9001:2015 Auditor 5

Academy Brochure 3 Process Transformation Our process transformation trainings are designed to provide the right set of capabilities and information to fine tune your organizational processes to meet with the growing business needs and provide you with a competitive edge, while balancing with your compliance needs. Incident Management for Organization Wide Resiliency 2 Physical Security Management 4 Building Resilient Organizations (Business Continuity and Disaster Recovery Planning) 2 IT Governance, Risk and Compliance Management 3 IT Change Management and Project Management 3 Occupational Health and Safety Management Awareness Session 3 Third Party Relationship Management 5 Principles of Risk Management and Risk Culture 5 The Risk Management Process 5 Measurement and Assessment of Business Risk-Compliance and Operational Risk 2 Minimizing contract risk and increasing contract compliance 5 Developing an Effective Risk Appetite 5 Resilient Internal Control Environment 2 Measuring and Managing Operational Risk 5

4 Academy Brochure Professional and Personal Growth Our personality development trainings are equipped to provide you with unique skill sets that will support individual and team growth within organizations. Our trainings are studded with practical examples and case studies that will provide learning grounds to understand what successful professionals and organizations have done across the world. Managing Self 2 Managing Others 2 Managing the Business 3 Effective Negotiation Techniques 2 Communicating Effectively 2 Change Fundamentals 2 Microsoft Excel Skills 3 Managing Diversity at Workplace 2 Business Writing, and Presentation Skills 2 Effective Performance Management Practices 3 Risk Based Audit s Our Risk Based Audit training programs are developed to inculcate organizations with appropriate controls based outlook, and develop capabilities for controls testing and assurance. Our trainings will help you strengthen your overall controls posture and mitigate risks to business and IT organization. Risk Based Internal Audit 4 Internal Audit Analytics 3 Use of Audit Tools in Performing Internal Audit Engagement 2 Risk Based IT Audit 4 IT Auditing (Basic/Advanced) 5 Deloitte CISO Academy Information Security Planning and Budgeting Information Security Technology and Management Controls Governance Risk Compliance & Privacy Cloud and Mobile Security Considerations Third Party Risk Management Cyber Threat Intelligence and Analytics Incident Management and Digital Forensics Security Operations Optimization Enterprise Security Architecture Security Metrics and Balanced Score Card

Academy Brochure 5 Data Analytics Data Analytics /Business Analytics trainings are equipped to enable organizations inculcate the practice of capturing, managing and analysing data to drive business strategy and performance. Our trainings include a range of approaches and solutions, from looking backward to evaluating what happened in the past, to forward-looking scenario planning and predictive modelling. Data Visualization using Qlikview or Tableau 5 Business Intelligence and Analytics Concepts 3 Implementing a Data Warehouse 4 Internal Audit Analytics 5 Navigating Big Data 5 SQL Basics and advanced classes 3 Introduction to data science and predictive analytics 6 Data analysis using ACL 3 Fraud Management and Forensics Fraud and Corruption are on the increase both globally and locally and no organization is immune to the threat. The most relevant question is how an organization responds to this. Our Fraud Management and Forensics trainings are designed to provide you with an all-encompassing end-to-end approach which incorporates elements of detection, response and prevention. Our trainings also cover the proactive and reactive steps organizations can take to protect from the threats related to fraud, theft, corruption etc. Fraud 101 2 Common Fraud Schemes 2 Fraud Risk Management 3 Conducting an Investigation 2 Evidence Gathering and Forensic Report Writing 2 Anti-Bribery and Corruption 3 Anti-Money Laundering 2 Using ACL for Fraud Detection and Continuous Monitoring 2 IT Forensics Techniques, Tools and Technologies 3

6 Academy Brochure s for Board of Directors As the business landscape is rapidly evolving, Boards are faced with non-conventional challenges and issues that need timely and relevant actions. Our trainings for Board of Directors are internationally tried and tested programs that will refresh the skills of Board members to meet current and upcoming legal, regulatory, business and stakeholder needs. Board Audit Committee 2 Board Risk Committee 2 Corporate Governance and Board Evaluation Best Practices 3 Crisis Management for Boards 2 Women in Board Room Program (every Friday and Saturday for prescheduled weeks) A three-part series for senior female executives focusing on hot topics in governance, providing governance training, and leading practices in board search efforts 2 Deloitte Super Directors Program Cyber security Board s oversight of management s cyber-attack mitigation and response plans Innovation Innovating in the age of disruption Strategy Overseeing guiding strategic direction Responsible tax Tax mitigation in times of increased scrutiny Activism and engagement Creating a meaningful two-way dialog with shareholders Talent and succession Managing talent in the new world of work Crisis management Is your board prepared for impending crises? Proactive Engagement Opportunity to build stronger relationships

Academy Brochure Facility Office Address 8th Floor Civic Towers Plot GA 1, Ozumba Mbadiwe Avenue Victoria Island, Lagos Contact Anthony Olukoju Partner aolukoju@deloitte.com.ng +234 (1) 904 1739 Tope Aladenusi Partner taladenusi@deloitte.com.ng +234 (1) 904 1730 Yomi Ibosiola Associate Director yibosiola@deloitte.com.ng +234 (1) 904 1895 Beulah Adeoye Associate Director badeoye@deloitte.com.ng +234 (1) 904 1929 Sireesha Dandu Manager sidandu@deloitte.com.ng +234 (0) 909 642 0419 7

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global ) does not provide services to clients. Please see www.deloitte.com/about for a more detailed description of DTTL and its member firms. Akintola Williams Deloitte, a member firm of Deloitte Touche Tohmatsu Limited, is a professional services organization that provides audit, tax, consulting, business process-as-a-service, corporate finance, and risk advisory services. Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries and territories, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte s more than 225,000 professionals are committed to becoming the standard of excellence. 2016. For information, contact Akintola Williams Deloitte. All rights reserved. DeloitteNigeria Deloitte-Nigeria