Auditing Cyber Incident Response and Recovery

Auditing Cyber Incident Response and Recovery

Cybersecurity attacks are increasing as the tools for detecting and exploiting vulnerabilities in networked systems and devices become increasingly sophisticated or commoditized. Threatening technologies and methods are advanced by criminal enterprises, state-sponsored hackers, and others with malicious intentions.

An organization’s stakeholders rely on independent, objective, and competent assurance services to verify whether cyber incident response and recovery controls are well-designed and effectively and efficiently implemented. The internal audit activity adds value to the organization when it provides such services in conformance with the Standards and with references to widely accepted control frameworks, particularly those used by the organization’s IT-IS functions.

IIA Norge bruker informasjonskapsler slik at du automatisk kan logge inn på nettsiden. Vi bruker Googles informasjonskapsler for å analysere aktiviteter på nettsiden. Vi kan derfor også se hvordan nettssiden brukes og hvilke funksjoner du finner interessante. Du kan du endre preferansene dine under 'Innstillinger for informasjonskapsler' om du ønsker.

Les mer om informasjonskapsler i vår cookie policy eller ta en titt på vår personvernerklæring for å se hvordan vi håndterer dine personopplysninger.

Cookie preferanser