Cyber Resource Center
Seeking Cyber Resources.
Finding Cyber Solutions.
Cybersecurity continues to be a pervasive challenge with 78% of audit leaders in the North American 2024 Pulse of Internal Audit Study ranking it high or very high risk in their organizations. Yet on average cybersecurity makes up only 10% of audit plans.
How are you managing cyber risks in your plan? We have the solutions for you.
2025 Cybersecurity Virtual Conference
This is a one-day virtual event taking place on October 16 that is designed to keep participants ahead of critical issues in data protection, privacy, and cybersecurity. The 2025 Cybersecurity Virtual Conference is a one-day conference specifically designed to ensure participants stay not only abreast, but a head of critical issues in data protection, data privacy and cybersecurity to become more responsive in their work.
Auditing the Cybersecurity Program Certificate
Be the critical barrier between a potential cyber-attack and your organization. This certificate program showcases fundamental competencies in 12 key areas that demonstrate the ability to effectively assess an organization’s cybersecurity governance, management practices, and program capabilities.
Don’t hide from cyber risk, seek the resources and find the solutions.
Certificate Programs
Instructor-Led Training
On Demand
Webinars
Podcasts
Global Guidance
- Auditing Cybersecurity Operations: Prevention and Detection
- Auditing Cyber Incident Response and Recovery
- Auditing Mobile Computing
- Auditing Network and Communications Management
- Auditing Business Applications
- IT Essentials for Internal Auditors
- Auditing Identity and Access Management
- Assessing Cybersecurity Risk: The Three Lines Model
- Understanding and Auditing Big Data
Thought Leadership
Latest Research from the Internal Audit Foundation
- From AI to Cyber-Deconstructing a Complex Technology Risk Landscape
- Demystifying AI: Internal Audit Use Cases for Applying New Technology
- Solving the riddle: Harnessing Generative AI for internal audit activities
- Privacy and Data Protection: Part 3