SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
Nova Gorica 29 November 2019
Introducing ISACA®’s
Cybersecurity Audit Certificate Program
INFOSEK - Luca Moroni - November 2019
Who I am
ISACA VENICE research team coordinator
✔ Research n.1: Vulnerability and Penetration Test. User’s guidelines about third party
penetration test.
✔ Research n.5: Cyber Security Awareness of N/E Italian Critical Infrastructures:
Scenarios and Guidelines for self-assessment
Member of ISACA VENICE Chapter Translation team
✔Securing Mobile Devices – ITA
Published white papers:
«Cybersecurity Risk Insurance»
«L’errore umano negli incidenti informatici e nella perdita dei dati sensibili»
Graduated in Computer Science (1989. Milan), CISA, ISO 27001 and ITIL V3 certified and other
tech certifications. Focused on Cybersecurity since 2000 and lecturer in some seminars about
this topic.
ISACA Venice Board Member, Founder IT CLUB FVG, Member Club Bit, AIP, AIPSI, Founder
Cyber Secuirty Angels Alliance.
Founder of the innovative company Via Virtuosa, which focuses on scouting and promotion of
expertises in Cybersecurity and IT governance in NE of Italy.
VIA VIRTUOSA
Luca Moroni
INFOSEK - Luca Moroni - November 2019
We are
authentic
We are
ONE
SERVING MORE THAN
450,000
ENGAGED
PROFESSIONALS
217 CHAPTERS
WORLDWIDE
135,000+
MEMBERS IN
188 COUNTRIES
7+
INDUSTRY-LEADING
CONFERENCES
1,000+
KNOWLEDGE ASSETS
PURPOSE:
Help you realize
the positive
potential of
technology
PROMISE:
Inspire confidence
that enables
innovation through
technology
INFOSEK - Luca Moroni - November 2019
ISACA
TAKE FULL ADVANTAGE OF YOUR MEMBER BENEFITS:
• Networking - that connects you to more than 135,000 IS/IT professionals in
over 188 countries, allow access to Webinars for up to 3 free CPE monthly!
• Discounts on ISACA Training and Meeting – improve your knowledge,
skills and professional, you can earn CPE towards maintaining your
certification
• ISACA® Journal and discounts on ISACA Bookstore - keep you current
on professional IS/IT trends, standards, guidance tools for best practices
• ISACA Newsletters - news electronically and for connect you to like-minded
professionals in your local area.
INFOSEK - Luca Moroni - November 2019
https://engage.isaca.org/venicechapter/home
ITALY
Milano Chapter
Rome Chapter
Venice Chapter
ISACA VENICE
INFOSEK - Luca Moroni - November 2019
Certifications
INFOSEK - Luca Moroni - November 2019
https://www.forbes.com/sites/loui
scolumbus/2019/08/28/top-10-
most-popular-cybersecurity-
certifications-in-
2019/#20dd18f9360e
INFOSEK - Luca Moroni - November 2019
Cybersecurity Audit Certificate
http://www.isaca.org/Education/on-demand-learning/Pages/cybersecurity-audit-
certificate-exam-and-certificate-details.aspx?utm_referrer=
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Know
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Know
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Know
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Know
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Know
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Know
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Know
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Know
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Knw
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Know
INFOSEK - Luca Moroni - November 2019
10 Things Auditors Should Know
INFOSEK - Luca Moroni - November 2019
Who Should Consider the
Cybersecurity Audit Certificate and
Training?
• IT audit professionals and enterprises who need additional guidance
on auditing cybersecurity
• Security professionals who need an understanding of the audit
process
• Risk and assurance professionals who need in-depth knowledge of
cyber-related risk and mitigating controls
• IT professionals who want to learn more about what an IT auditor
needs to consider when auditing cybersecurity
INFOSEK - Luca Moroni - November 2019
Cybersecurity Audit Certificate
Study Guide
INFOSEK - Luca Moroni - November 2019
Cybersecurity Audit Certificate
Online Course (Expiring 148d)
INFOSEK - Luca Moroni - November 2019
Cybersecurity Audit Certificate
Online Course
INFOSEK - Luca Moroni - November 2019
Cybersecurity Audit Certificate
Online Course
INFOSEK - Luca Moroni - November 2019
Cybersecurity Audit Certificate
Online Course
INFOSEK - Luca Moroni - November 2019
Sample Questions
1
2
3
4
INFOSEK - Luca Moroni - November 2019
Sample Questions
1
2
3
4
INFOSEK - Luca Moroni - November 2019
Sample Questions
1
2
3
4
INFOSEK - Luca Moroni - November 2019
Sample Questions
1
2
3
4
INFOSEK - Luca Moroni - November 2019
INFOSEK - Luca Moroni - November 2019
INFOSEK - Luca Moroni - November 2019
Exam
The Cybersecurity Audit Certificate exam is an online, remotely-
proctored exam – allowing you the flexibility of taking your exam at
your convenience.
The exam tests your knowledge in four key areas:
• Cybersecurity Technology Topics
• Cybersecurity and Audit’s Role
• Cybersecurity Governance
• Cybersecurity Operations
The exam includes 75 multiple-choice questions and the passing
score is 65% (+49 you pass) . You will be given 2 hours (120 minutes)
to complete the exam.
Questions
Give me a good luck for my exam.
Thanks
l.moroni@viavirtuosa.it

Más contenido relacionado

La actualidad más candente

Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Marc Vael
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTautomatskicorporation
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015Hildebrand Technology
 
Smart Cities – The Security Aspects
Smart Cities – The Security AspectsSmart Cities – The Security Aspects
Smart Cities – The Security AspectsPECB
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCimetrics Inc
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentPECB
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceIvanti
 
The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015Ollie Whitehouse
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017japijapi
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb GhallabFahmi Albaheth
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...Abhishek Goel
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 

La actualidad más candente (20)

Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Smart Cities – The Security Aspects
Smart Cities – The Security AspectsSmart Cities – The Security Aspects
Smart Cities – The Security Aspects
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch Intelligence
 
The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 

Similar a Infosek Luca Moroni Nova Gorica (SLO)

2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
[WSO2 Open Banking & Security Forum Mexico 2019] Walking the Tightrope: Balan...
[WSO2 Open Banking & Security Forum Mexico 2019] Walking the Tightrope: Balan...[WSO2 Open Banking & Security Forum Mexico 2019] Walking the Tightrope: Balan...
[WSO2 Open Banking & Security Forum Mexico 2019] Walking the Tightrope: Balan...WSO2
 
Internal Audit’s Contribution to the Effectiveness of Information Security Ma...
Internal Audit’s Contribution to the Effectiveness of Information Security Ma...Internal Audit’s Contribution to the Effectiveness of Information Security Ma...
Internal Audit’s Contribution to the Effectiveness of Information Security Ma...Gokhan Polat
 
Api more than payload (2021 Update)
Api more than payload (2021 Update)Api more than payload (2021 Update)
Api more than payload (2021 Update)Phil Wilkins
 
Drive More Value from your SOC Through Connecting Security to the Business
Drive More Value from your SOC Through Connecting Security to the BusinessDrive More Value from your SOC Through Connecting Security to the Business
Drive More Value from your SOC Through Connecting Security to the BusinessSplunk
 
API more than payload
API more than payloadAPI more than payload
API more than payloadPhil Wilkins
 
SOTIF Conference 2019 - APTIV, Toyota, Delphi Tech, Texas Instruments
SOTIF Conference 2019 - APTIV, Toyota, Delphi Tech, Texas InstrumentsSOTIF Conference 2019 - APTIV, Toyota, Delphi Tech, Texas Instruments
SOTIF Conference 2019 - APTIV, Toyota, Delphi Tech, Texas InstrumentsTorben Haagh
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM
 
ISO26262 Conference 2019
ISO26262 Conference 2019ISO26262 Conference 2019
ISO26262 Conference 2019Torben Haagh
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...IFG Network marcus evans
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyCYBERWISER .eu
 
Development of secure and qualitative applications delivered by improved and ...
Development of secure and qualitative applications delivered by improved and ...Development of secure and qualitative applications delivered by improved and ...
Development of secure and qualitative applications delivered by improved and ...ScaleFocus
 
QA Fest 2019. Ирина Бондарук. Breaking into information security
QA Fest 2019. Ирина Бондарук. Breaking into information securityQA Fest 2019. Ирина Бондарук. Breaking into information security
QA Fest 2019. Ирина Бондарук. Breaking into information securityQAFest
 
Global CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesGlobal CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesICT Watch
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...FinTech Belgium
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityNizar Ben Neji
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 

Similar a Infosek Luca Moroni Nova Gorica (SLO) (20)

EENA2019: Track2 session1 UK initiative to provide access to cybersecurity tr...
EENA2019: Track2 session1 UK initiative to provide access to cybersecurity tr...EENA2019: Track2 session1 UK initiative to provide access to cybersecurity tr...
EENA2019: Track2 session1 UK initiative to provide access to cybersecurity tr...
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
[WSO2 Open Banking & Security Forum Mexico 2019] Walking the Tightrope: Balan...
[WSO2 Open Banking & Security Forum Mexico 2019] Walking the Tightrope: Balan...[WSO2 Open Banking & Security Forum Mexico 2019] Walking the Tightrope: Balan...
[WSO2 Open Banking & Security Forum Mexico 2019] Walking the Tightrope: Balan...
 
Internal Audit’s Contribution to the Effectiveness of Information Security Ma...
Internal Audit’s Contribution to the Effectiveness of Information Security Ma...Internal Audit’s Contribution to the Effectiveness of Information Security Ma...
Internal Audit’s Contribution to the Effectiveness of Information Security Ma...
 
Api more than payload (2021 Update)
Api more than payload (2021 Update)Api more than payload (2021 Update)
Api more than payload (2021 Update)
 
Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
 
Drive More Value from your SOC Through Connecting Security to the Business
Drive More Value from your SOC Through Connecting Security to the BusinessDrive More Value from your SOC Through Connecting Security to the Business
Drive More Value from your SOC Through Connecting Security to the Business
 
API more than payload
API more than payloadAPI more than payload
API more than payload
 
SOTIF Conference 2019 - APTIV, Toyota, Delphi Tech, Texas Instruments
SOTIF Conference 2019 - APTIV, Toyota, Delphi Tech, Texas InstrumentsSOTIF Conference 2019 - APTIV, Toyota, Delphi Tech, Texas Instruments
SOTIF Conference 2019 - APTIV, Toyota, Delphi Tech, Texas Instruments
 
20180528 reflex presentation
20180528 reflex presentation20180528 reflex presentation
20180528 reflex presentation
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
 
ISO26262 Conference 2019
ISO26262 Conference 2019ISO26262 Conference 2019
ISO26262 Conference 2019
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
 
Development of secure and qualitative applications delivered by improved and ...
Development of secure and qualitative applications delivered by improved and ...Development of secure and qualitative applications delivered by improved and ...
Development of secure and qualitative applications delivered by improved and ...
 
QA Fest 2019. Ирина Бондарук. Breaking into information security
QA Fest 2019. Ирина Бондарук. Breaking into information securityQA Fest 2019. Ирина Бондарук. Breaking into information security
QA Fest 2019. Ирина Бондарук. Breaking into information security
 
Global CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesGlobal CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness Profiles
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the University
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 

Más de Luca_Moroni

La S nell'IoT sta per Security
La S nell'IoT sta per SecurityLa S nell'IoT sta per Security
La S nell'IoT sta per SecurityLuca_Moroni
 
LocandinaEventoTreVenezie-16dic22 (1).pdf
LocandinaEventoTreVenezie-16dic22 (1).pdfLocandinaEventoTreVenezie-16dic22 (1).pdf
LocandinaEventoTreVenezie-16dic22 (1).pdfLuca_Moroni
 
ADACI Cantina Soave - Luca Moroni CSA
ADACI Cantina Soave - Luca Moroni CSAADACI Cantina Soave - Luca Moroni CSA
ADACI Cantina Soave - Luca Moroni CSALuca_Moroni
 
Ciao Alexa, mi racconti perché non funziona più la mia azienda?
Ciao Alexa, mi racconti perché non funziona più la mia azienda?Ciao Alexa, mi racconti perché non funziona più la mia azienda?
Ciao Alexa, mi racconti perché non funziona più la mia azienda?Luca_Moroni
 
Sicurezza Cibernetica Nazionale, la consapevolezza delle Aziende nei Settori ...
Sicurezza Cibernetica Nazionale, la consapevolezza delle Aziende nei Settori ...Sicurezza Cibernetica Nazionale, la consapevolezza delle Aziende nei Settori ...
Sicurezza Cibernetica Nazionale, la consapevolezza delle Aziende nei Settori ...Luca_Moroni
 
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...Luca_Moroni
 
Strike mail+crossware per creare nuove opportunità commerciali 14 01
Strike mail+crossware per creare nuove opportunità commerciali 14 01Strike mail+crossware per creare nuove opportunità commerciali 14 01
Strike mail+crossware per creare nuove opportunità commerciali 14 01Luca_Moroni
 

Más de Luca_Moroni (7)

La S nell'IoT sta per Security
La S nell'IoT sta per SecurityLa S nell'IoT sta per Security
La S nell'IoT sta per Security
 
LocandinaEventoTreVenezie-16dic22 (1).pdf
LocandinaEventoTreVenezie-16dic22 (1).pdfLocandinaEventoTreVenezie-16dic22 (1).pdf
LocandinaEventoTreVenezie-16dic22 (1).pdf
 
ADACI Cantina Soave - Luca Moroni CSA
ADACI Cantina Soave - Luca Moroni CSAADACI Cantina Soave - Luca Moroni CSA
ADACI Cantina Soave - Luca Moroni CSA
 
Ciao Alexa, mi racconti perché non funziona più la mia azienda?
Ciao Alexa, mi racconti perché non funziona più la mia azienda?Ciao Alexa, mi racconti perché non funziona più la mia azienda?
Ciao Alexa, mi racconti perché non funziona più la mia azienda?
 
Sicurezza Cibernetica Nazionale, la consapevolezza delle Aziende nei Settori ...
Sicurezza Cibernetica Nazionale, la consapevolezza delle Aziende nei Settori ...Sicurezza Cibernetica Nazionale, la consapevolezza delle Aziende nei Settori ...
Sicurezza Cibernetica Nazionale, la consapevolezza delle Aziende nei Settori ...
 
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...
 
Strike mail+crossware per creare nuove opportunità commerciali 14 01
Strike mail+crossware per creare nuove opportunità commerciali 14 01Strike mail+crossware per creare nuove opportunità commerciali 14 01
Strike mail+crossware per creare nuove opportunità commerciali 14 01
 

Último

南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证kbdhl05e
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)oannq
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxJackieSparrow3
 
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 AvilableCall Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilabledollysharma2066
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做j5bzwet6
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ EscortsDelhi Escorts Service
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 

Último (9)

南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptx
 
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 AvilableCall Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 

Infosek Luca Moroni Nova Gorica (SLO)

  • 1. Nova Gorica 29 November 2019 Introducing ISACA®’s Cybersecurity Audit Certificate Program
  • 2. INFOSEK - Luca Moroni - November 2019 Who I am ISACA VENICE research team coordinator ✔ Research n.1: Vulnerability and Penetration Test. User’s guidelines about third party penetration test. ✔ Research n.5: Cyber Security Awareness of N/E Italian Critical Infrastructures: Scenarios and Guidelines for self-assessment Member of ISACA VENICE Chapter Translation team ✔Securing Mobile Devices – ITA Published white papers: «Cybersecurity Risk Insurance» «L’errore umano negli incidenti informatici e nella perdita dei dati sensibili» Graduated in Computer Science (1989. Milan), CISA, ISO 27001 and ITIL V3 certified and other tech certifications. Focused on Cybersecurity since 2000 and lecturer in some seminars about this topic. ISACA Venice Board Member, Founder IT CLUB FVG, Member Club Bit, AIP, AIPSI, Founder Cyber Secuirty Angels Alliance. Founder of the innovative company Via Virtuosa, which focuses on scouting and promotion of expertises in Cybersecurity and IT governance in NE of Italy. VIA VIRTUOSA Luca Moroni
  • 3. INFOSEK - Luca Moroni - November 2019 We are authentic We are ONE SERVING MORE THAN 450,000 ENGAGED PROFESSIONALS 217 CHAPTERS WORLDWIDE 135,000+ MEMBERS IN 188 COUNTRIES 7+ INDUSTRY-LEADING CONFERENCES 1,000+ KNOWLEDGE ASSETS PURPOSE: Help you realize the positive potential of technology PROMISE: Inspire confidence that enables innovation through technology
  • 4. INFOSEK - Luca Moroni - November 2019 ISACA TAKE FULL ADVANTAGE OF YOUR MEMBER BENEFITS: • Networking - that connects you to more than 135,000 IS/IT professionals in over 188 countries, allow access to Webinars for up to 3 free CPE monthly! • Discounts on ISACA Training and Meeting – improve your knowledge, skills and professional, you can earn CPE towards maintaining your certification • ISACA® Journal and discounts on ISACA Bookstore - keep you current on professional IS/IT trends, standards, guidance tools for best practices • ISACA Newsletters - news electronically and for connect you to like-minded professionals in your local area.
  • 5. INFOSEK - Luca Moroni - November 2019 https://engage.isaca.org/venicechapter/home ITALY Milano Chapter Rome Chapter Venice Chapter ISACA VENICE
  • 6. INFOSEK - Luca Moroni - November 2019 Certifications
  • 7. INFOSEK - Luca Moroni - November 2019 https://www.forbes.com/sites/loui scolumbus/2019/08/28/top-10- most-popular-cybersecurity- certifications-in- 2019/#20dd18f9360e
  • 8. INFOSEK - Luca Moroni - November 2019 Cybersecurity Audit Certificate http://www.isaca.org/Education/on-demand-learning/Pages/cybersecurity-audit- certificate-exam-and-certificate-details.aspx?utm_referrer=
  • 9. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Know
  • 10. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Know
  • 11. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Know
  • 12. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Know
  • 13. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Know
  • 14. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Know
  • 15. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Know
  • 16. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Know
  • 17. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Knw
  • 18. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Know
  • 19. INFOSEK - Luca Moroni - November 2019 10 Things Auditors Should Know
  • 20. INFOSEK - Luca Moroni - November 2019 Who Should Consider the Cybersecurity Audit Certificate and Training? • IT audit professionals and enterprises who need additional guidance on auditing cybersecurity • Security professionals who need an understanding of the audit process • Risk and assurance professionals who need in-depth knowledge of cyber-related risk and mitigating controls • IT professionals who want to learn more about what an IT auditor needs to consider when auditing cybersecurity
  • 21. INFOSEK - Luca Moroni - November 2019 Cybersecurity Audit Certificate Study Guide
  • 22. INFOSEK - Luca Moroni - November 2019 Cybersecurity Audit Certificate Online Course (Expiring 148d)
  • 23. INFOSEK - Luca Moroni - November 2019 Cybersecurity Audit Certificate Online Course
  • 24. INFOSEK - Luca Moroni - November 2019 Cybersecurity Audit Certificate Online Course
  • 25. INFOSEK - Luca Moroni - November 2019 Cybersecurity Audit Certificate Online Course
  • 26. INFOSEK - Luca Moroni - November 2019 Sample Questions 1 2 3 4
  • 27. INFOSEK - Luca Moroni - November 2019 Sample Questions 1 2 3 4
  • 28. INFOSEK - Luca Moroni - November 2019 Sample Questions 1 2 3 4
  • 29. INFOSEK - Luca Moroni - November 2019 Sample Questions 1 2 3 4
  • 30. INFOSEK - Luca Moroni - November 2019
  • 31. INFOSEK - Luca Moroni - November 2019
  • 32. INFOSEK - Luca Moroni - November 2019 Exam The Cybersecurity Audit Certificate exam is an online, remotely- proctored exam – allowing you the flexibility of taking your exam at your convenience. The exam tests your knowledge in four key areas: • Cybersecurity Technology Topics • Cybersecurity and Audit’s Role • Cybersecurity Governance • Cybersecurity Operations The exam includes 75 multiple-choice questions and the passing score is 65% (+49 you pass) . You will be given 2 hours (120 minutes) to complete the exam.
  • 33. Questions Give me a good luck for my exam. Thanks l.moroni@viavirtuosa.it