IT RISK MANAGEMENT AUDIT

Auditing IT Risks to Strengthen Governance, Cybersecurity, and Operational Resilience

[mawa_download_flyer course_id=%_ID%]

Course Schedule

Date Venue Fees (Face-to-Face)
10 – 14 Nov 2025 London – UK USD 3495 per delegate

Course Introduction

In the digital age, managing IT risk is essential for ensuring business continuity, protecting data, and complying with regulatory requirements. Organizations must identify, evaluate, and mitigate risks related to IT infrastructure, applications, cybersecurity, and third-party service providers.

This intensive training program equips auditors, IT risk professionals, and compliance teams with the tools and frameworks to assess IT risk management practices effectively. Participants will learn how to audit IT governance, controls, and risk responses in alignment with global standards such as COBIT, ISO 27005, and NIST.

Course Objectives

By the end of this course, participants will be able to:
• Identify, evaluate, and prioritize IT risks across systems and processes
• Conduct IT risk audits using a structured, risk-based approach
• Assess the effectiveness of IT governance and control frameworks
• Evaluate cybersecurity and third-party risk management practices
• Provide assurance and recommendations aligned with best practices and standards

Key Benefits of Attending

• Strengthen your audit approach to rapidly evolving IT risks
• Learn global IT risk frameworks and how to apply them in audit engagements
• Support organizational resilience through improved risk mitigation strategies
• Bridge the gap between technical controls and business risk management
• Enhance IT audit effectiveness in areas like cybersecurity, cloud, and data privacy

Intended Audience

This program is designed for:
• Internal and IT auditors
• IT risk and compliance officers
• Information security professionals
• Governance, risk, and control (GRC) specialists
• Managers responsible for IT strategy, operations, or oversight

Individual Benefits

Key competencies that will be developed include:
• IT risk assessment techniques and reporting
• Understanding of IT governance frameworks (e.g., COBIT, ISO, NIST)
• Evaluation of technical and process-level controls
• Cyber risk auditing and third-party risk management
• Skills to communicate findings to both technical and executive stakeholders

Organization Benefits

Upon completing the training course, participants will demonstrate:
• Improved identification and mitigation of technology-related risks
• Better integration of IT audit with enterprise risk management (ERM)
• Enhanced ability to assure IT resilience, compliance, and data integrity
• Reduced exposure to cyber threats and system vulnerabilities
• Stronger IT governance and strategic alignment

Instructional Methdology

The course follows a blended learning approach combining theory with practice:
Strategy Briefings – IT risk management frameworks, audit standards, and governance models
Case Studies – High-profile IT risk failures and audit investigations
Workshops – Risk assessments, control evaluations, and audit planning exercises
Peer Exchange – Shared experiences in IT risk auditing across sectors
Tools – IT risk audit checklists, scoring matrices, and reporting templates

Course Outline

Detailed 5-Day Course Outline

Training Hours: 7:30 AM – 3:30 PM
Daily Format: 3–4 Learning Modules | Coffee breaks: 09:30 & 11:15 | Lunch Buffet: 01:00 – 02:00


Day 1: IT Risk Landscape and Audit Fundamentals
Module 1: Understanding IT Risk Domains (07:30 – 09:30)
• Types of IT risks: operational, strategic, compliance, and cybersecurity
• Key IT risk sources: systems, processes, third parties, and users

Module 2: IT Risk Management Frameworks (09:45 – 11:15)
• Overview of ISO 27005, COBIT 2019, and NIST RMF
• ERM and IT risk integration

Module 3: Workshop – Building an IT Risk Register (11:30 – 01:00)
• Identify and categorize risks for a sample organization

Module 4: Peer Exchange – IT Risk Prioritization Challenges (02:00 – 03:30)
• Group discussion on risk tolerance and risk appetite


Day 2: Risk-Based IT Audit Planning
Module 5: Audit Planning and Scoping for IT Risk (07:30 – 09:30)
• Defining audit objectives, criteria, and engagement scope
• Mapping IT assets and risk exposures

Module 6: Control Frameworks and Audit Standards (09:45 – 11:15)
• ITGCs, application controls, and cybersecurity controls
• Using COBIT and NIST in audit execution

Module 7: Workshop – Risk-Based IT Audit Plan (11:30 – 01:00)
• Design an audit program for an IT risk scenario

Module 8: Case Study – Audit Failure and Oversight (02:00 – 03:30)
• Lessons learned from a high-profile IT breakdown


Day 3: Cybersecurity and Technical Control Evaluation
Module 9: Auditing Cybersecurity Risk Management (07:30 – 09:30)
• Controls for access, network security, malware, and incident response
• Reviewing security operations and monitoring tools

Module 10: Cloud, Remote Access, and Emerging Risks (09:45 – 11:15)
• Risks in SaaS, IaaS, BYOD, and hybrid environments
• Cloud security posture management

Module 11: Workshop – Evaluating Cybersecurity Controls (11:30 – 01:00)
• Score cybersecurity control effectiveness and identify gaps

Module 12: Peer Exchange – Cyber Risk and Audit Alignment (02:00 – 03:30)
• Sharing strategies to audit fast-changing threat landscapes


Day 4: Third-Party Risk and Incident Auditing
Module 13: Auditing Third-Party and Vendor Risks (07:30 – 09:30)
• Due diligence, SLAs, and contract compliance
• Risk transfer and monitoring

Module 14: Incident Management and Response Auditing (09:45 – 11:15)
• Assessing IR plans, breach response, and forensic readiness
• Lessons from real-world cyberattacks

Module 15: Workshop – Simulated Incident Audit (11:30 – 01:00)
• Audit a mock data breach response

Module 16: Group Discussion – Vendor Risk and Shared Accountability (02:00 – 03:30)
• Peer feedback on third-party governance practices


Day 5: Reporting, Follow-Up, and Audit Effectiveness
Module 17: Audit Findings and Risk Communication (07:30 – 09:30)
• Crafting impactful audit reports with actionable recommendations
• Linking technical issues to business impact

Module 18: Tracking Remediation and Audit Follow-Up (09:45 – 11:15)
• Remediation ownership, timelines, and verification

Module 19: Final Project – IT Risk Audit Presentation (11:30 – 01:00)
• Present audit results for a risk-based case scenario

Module 20: Wrap-Up, Feedback, and Certification (02:00 – 03:30)
• Course review, discussion, and certificate awarding

Certification

Participants will receive a Certificate of Completion in IT Risk Management Audit, validating their ability to assess, report, and support the mitigation of IT-related risks using global best practices and frameworks.

Register For The Course

"*" indicates required fields

Name*
Address*
Invoice
Name
Address
This field is for validation purposes and should be left unchanged.

Enquire About The Course

"*" indicates required fields

Name*
Address*

Run This Course InHouse

"*" indicates required fields

Name*
Address*