Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks Webinar training seminars presented by Online Compliance Panel register now on FindaSeminar.com

findaseminar logo balls FindaSeminar.com
event search registration and marketing services since 2002
Advanced Search
 
 

Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks Webinar  

 Email information about this seminar Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks Webinar by Online Compliance Panel to yourself your manager or associates Email this event... View and register for other training seminars like Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks Webinar by Online Compliance Panel on FindaSeminar.com Find similar training.. Find and register for other training seminars by Online Compliance Panel on FindaSeminar.com Other seminars from Online Compliance Panel

By:

Online Compliance Panel   

For:

Internal auditors, Financial institution counsel, Compliance officers, IT officers, risk managers, Vendor managers, Finance officers, Chief operations officers, Chief information officers, Persons responsible for electronic security

Cost:   

see Registration info for seminar cost, group discount etc.

Seminar Summary:

Financial institutions need to comply with the FFIEC's guidance on due diligence and managing third-party relationships. A significant compliance concern today is whether the third-party (a service organization) can protect the institution's sensitive data through proper information security and cybersecurity control programs.CPAs provide system and organization control (SOC) reporting for service organizations including SOC 1® engagements for internal controls over financial reports and SOC 2® engagements for information security. Since SOC 2® engagements are directed towards information security, the AICPA identified a need to also develop professional standards for CPAs related to growing cybersecurity risks. (see full course description)

 

 Seminar / Training class dates & locations

 
 SORT RESULTS BY:

 DATE

LOCATION

SELECTED VENUE DETAILS

Facility Name: 
Address:





Registration Information:

Event cost:  $
USD

class times and cancellation policy

 
 




 From 
 To 
 Click to register by Register by fax for Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks Webinar training seminar Register by mail for Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks Webinar training seminar Register by phone to attend Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks Webinar training seminar

Print payment approval request form Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks Webinar training seminar

Pre-Registration questions? Find answers in our registration FAQ or Request information about upcoming training seminars workshops and conferences in   and other cities listed on FindaSeminar.com Submit a support request

 
 

 

share this page 

print the agenda print agenda for the Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks Webinar seminar

 

 

Training Course Syllabus:


Objectives of the Presentation

In this informative webinar, we will cover:
Interpreting SOC 2® engagements and reports
Understanding SSAE 18 professional standards related to SOC 2® engagements including Concepts Common to All Attestation Engagements (AT-C section 105) and Examination Engagements (AT-C section 205)
Understanding AICPA´s updated Trust Services Criteria for SOC 2
How Trust Services Criteria align with COSO´s 2013 framework
How to identify cybersecurity risks using CPA SOC cybersecurity reports

Why Should you Attend

The objective of the AICPA´s cybersecurity reporting framework is to assist service organizations with communicating useful information regarding their cybersecurity risk-management programs to stakeholders and CPAs. In turn, CPAs can examine and report on the service organization´s cybersecurity risk management program so that financial institution management and regulators can rely on a service organization´s ability to maintain adequate security over financial institution sensitive data. This also includes compliance with the GLBA safeguards rule.

Together, SOC 2® engagements for information security and SOC cybersecurity risk assessments represent a needed evolution of AICPA professional standards to deal with the security risks that financial institutions face when contracting with service organizations.

Please join Gary Deutsch, CPA MBA, as he discusses how CPA prepared SOC 2® reports and reports on a service organization´s cybersecurity risk management program can be used to help management meet their regulatory requirements related to third-party relationships.

Seminar Summary:

Financial institutions need to comply with the FFIEC's guidance on due diligence and managing third-party relationships. A significant compliance concern today is whether the third-party (a service organization) can protect the institution's sensitive data through proper information security and cybersecurity control programs.CPAs provide system and organization control (SOC) reporting for service organizations including SOC 1® engagements for internal controls over financial reports and SOC 2® engagements for information security. Since SOC 2® engagements are directed towards information security, the AICPA identified a need to also develop professional standards for CPAs related to growing cybersecurity risks. (see full course description)

print this agenda print agenda for the Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks Webinar training seminar

 view dates and locations for this seminar

 

 

 

Custom Search