Focus & Features

Based on the data gathered by cybersecurity company Imperva in 2021, 50% of the attacks are Data Leakage followed by Remote Code Execution and the numbers will continue to increase. The first and second lines of defense of various organizations are exhausted in analyzing risks and putting in controls to firm up the security posture.

But we must not forget that the role of the 3rd line of defense is crucial to continuously assess the effectiveness of the controls that are put in place. With the evolving technique, tactics and procedures of the adversaries, it is essential to understand, strategize and operationalize Zero Trust as a framework. as a discipline and strategy to combat the adversaries. But continuous assurance is essential, hence, auditors must be able to be equipped with the fundamentals of the Zero Trust and its applicability and learn how they can perform a complete review to help their respective organizations identify gaps that were not identified during the implementation of the Zero Trust.

Zero trust networking is a concept for secure network connectivity where the initial security posture has no implicit trust between different entities, regardless of whether they are inside or outside of the enterprise perimeter. Least-privilege access to networked capabilities is dynamically extended only after an assessment of the identity of the entity, the system and the context. The learnings from Zero Trust is not only confined with the technology and cybersecurity practitioners. It must be cascaded to the assurance and compliance people for them to effective provide assessment and certain level of assurance to the business..


  • Test the auditor's ability to do a case assessment and identify process and technology vulnerabilities and apply zero trust controls to address the risks

What You Will Learn

  • Continuation of Controls in ZT Framework
  • Quiz 3: Identification of controls versus sample scenarios
  • Key considerations in assessing effectiveness of controls on process and operations perspective
  • Emerging Technologies in ZT
  • Quiz 4: Case Study on how to assess an organization who has completed the implementation of ZT

Who Should Attend

IT Auditors, Beginners in IT Audit/IT Risks


Virtual set-up/via Zoom

See route

Contact us

For additional event or venue information, please email training@iia-p.orgYou can also reach us at +63 9409551

Sponsors and Partners