The controller's role encompasses many traditional responsibilities. The breadth and depth of the controller skill set has expanded and will continue to expand as the business world evolve. In years-gone-by, the concept of information technology and cybersecurity were left to our IT professionals. However, with the prevalent threat that exists in these areas, it is now one of the components of the controller’s skill set that should be in their toolbox.
DESIGNED FOR
Audit partners/managers (external audit), Internal audit leaders and staff, SOC 1/SOC 2 and assurance practitioners, IT audit and technology risk professionals, Risk advisory/consulting professionals serving cloud-focused clients
BENEFITS
- Identify common cloud security risks and misconfigurations that traditional audit programs frequently overlook
- Understand why periodic, point-in-time audits are insufficient for cloud environments and how continuous change introduces audit gaps
- Explain how Cloud Security Posture Management (CSPM) tools support continuous risk identification, control validation, and audit evidence collection
- Apply practical techniques to modernize cloud audit programs, aligning audit, security, and risk teams around continuous assurance
HIGHLIGHTS
- Cloud Audit Blindspots
- Continuous Change Gaps
- CSPM-Enabled Assurance
- Risk-Based Prioritization
- Audit Program Modernization
PREREQUISITES
Basic cloud computing, cloud security risks, and audit techniques, including using tools like Cloud Security Posture Management (CSPM)
ADVANCE PREPARATION
None