Super Early Bird Fee
Register and Pay
by 6 Jun ’19
Early Bird Fee
Register and Pay
by 5 Jul ’19
Regular Fee
Register and Pay
after 5 Jul ’19
Singapore-registered companies $2,027.65 (SGD) $2,241.65 (SGD) $2,455.65 (SGD)
Non Singapore-registered companies $1,895 (SGD) $2,095 (SGD) $2,295 (SGD)


Group Discount!
Enjoy 10% off when you register for 3 or more OR
For groups of 3, 4th comes for free

  1. Super Early Bird and Early Bird promotion: Discount will only be valid if payment is received by the stipulated date.
  2. Group discount only applies to registrations from the same company, attending the same event in the same country location. Delegates must register at the same time and be of the same billing source. Only a single invoice will be issued.
  3. Only corporate registrations will be accepted.
  4. Bank charges & taxes are to be borne by registrants, if applicable.
  5. Full payment is mandatory upon registration for admission to the event.
  6. Walk-in delegates will only be admitted on the basis of space availability at the event and with immediate full payment.
  7. Fee includes lunch, refreshments and event documentation.
  8. The organiser reserves the right to make any amendments that it deems to be in the interest of the event without any notice.
  9. Information provided will be used for event administration and updates on upcoming events. For more details, please visit:


A replacement is allowed if registered participants are unable to attend. For cancellations received in writing before 5 Jul 2019, a full refund will be given with a 10% administrative charge. For cancellations received in writing before 18 Jul 2019, a 50% refund will be given together with the event documentation. There will be no refunds for cancellations received after 18 Jul 2019 or “no show” participants. However participants will receive a copy of the event documentation.

Are you an Attractive Target to Cyber Hackers?

Cyber threats loom larger than ever before. As cybersecurity becomes a growing concern for the board, Internal Audit (IA) plays an integral role in providing an independent review of security measures. However, cybersecurity audit is not an annual tick-box exercise. The threat environment is ever-evolving. Internal controls must change and so must the audits of these controls.

Are your audit objectives aligned with your organisation’s cybersecurity goals?
Can you identify threats, vulnerabilities and determine impact severity?
Can you test the effectiveness of corrective and preventive controls?

Strengthen Cybersecurity Governance in your Organisation

Join this 2-day practical workshop to acquire the latest frameworks and approaches to identify, assess and manage cyber risks. Delve into today’s cyber threat landscape including key actors, motivations and implications for businesses. Compare the key components of cybersecurity control frameworks including COBIT 2019, NIST and ISO 27001. Learn how to conduct a cybersecurity risk assessment and determine the level of confidentiality, integrity and availability (CIA) controls. Find out how to plan and set the scope of a cybersecurity audit. Discover how to develop cybersecurity remediation plans and build a cybersecurity maturity model for your organisation.

Programme Highlights

    • Cyber threat landscape – trends and implications
    • Cyber risk management frameworks
    • Cybersecurity risk assessment
    • Auditing cybersecurity controls
    • Developing a cybersecurity risk response
    • Building a cybersecurity maturity model

    Unique Features

    • Newly released updates on COBIT 2019
    • Case studies and lessons learnt from recent cybersecurity incidents
    • Led by Allan Boardman, an authorised ISACA trainer from London
    • Experience a cyber incident and activation of an incidence response plan

    Benefits of Attending

    • Understand the role of risk management and internal audit in cybersecurity
    • Evaluate which cybersecurity control framework to leverage for your organisation
    • Find out how to set the risk assessment scope, including system boundaries and data
    • Identify threats and vulnerabilities based on your industry and motives of the attacker
    • Determine the likelihood of occurrence and the impact severity of cyber risks
    • Learn how to incorporate emerging risks into your cyber risk assessment process
    • Weigh the key considerations when planning and scoping a cybersecurity audit
    • Adopt the right cybersecurity audit approach based on the area of review
    • Align your audit objectives with your organisation’s cybersecurity goals
    • Examine the pitfalls to avoid when developing cybersecurity remediation plans
    • Ensure critical vulnerabilities are addressed within time frames during a cyber attack
    • Assess your cybersecurity maturity level using risk assessment and audit findings

Workshop Leader

Allan Boardman


CyberAdvisor.London Limited

Allan Boardman is an independent business advisor helping organisations manage their information, technology, cybersecurity and privacy risks. He started his career at Deloitte in Cape Town where he qualified as a Chartered Accountant before moving to London. He has held audit, risk, security and governance leadership positions at GSK, Morgan Stanley, JPMorgan, Goldman Sachs, PwC and KPMG.


He is a Past President of ISACA London Chapter and has served on ISACA International’s Board of Directors, Strategic Advisory Council, Leadership Development Committee and chaired its Credentialing and Career Management Board, CISM Certification Committee and Audit and Risk Committee. He currently serves on ISACA’s CGEIT Certification Working Group.


In 2014, Allan received the ISACA Chair’s Award which recognises an individual who has made an exceptional impact on ISACA or the business technology profession. In 2019, he received ISACA’s Eugene M. Frank Award for Meritorious Performance, which recognises an individual whose longstanding service in multiple roles, including key volunteer leadership positions, has contributed to ISACA’s global success. He is included in ISACA’s 2018 Top-rated Speakers list.

Who Should Attend

Senior level executives responsible for Internal Audit, Risk Management, Governance, Compliance, Cybersecurity



  • Registration: 8.30am • Workshop: 9.00am – 5.00pm
    Morning, afternoon refreshments & lunch will be served at appropriate intervals.

  • Session 1: Cyber Threat Landscape – Trends and Implications

    • Understanding cybersecurity today
    • Understanding the role of risk management and internal audit in cybersecurity
    • Fitting cybersecurity into your operations
    • A look into today’s cyber threat landscape:
      • Key threats
      • Actors and motivations
      • Implications for businesses
      • Emerging dilemmas

    Case studies: Lessons learnt from recent cybersecurity incidents

  • Session 2: Cyber Risk Management Frameworks

    • Key components and comparisons of cybersecurity control frameworks:
      • NIST Cybersecurity Framework
      • ISO 27001
      • COBIT 2019
    • Leveraging different cybersecurity control frameworks for your organisation

    Case studies: Examining the cybersecurity frameworks of real-life companies

  • Session 3: Cybersecurity Risk Assessment

    • Determining the level of confidentiality, integrity and availability (CIA) controls
    • Setting the risk assessment scope: System boundaries and data
    • Identifying threats based on your industry and motives of the attacker
    • Vulnerability identification
    • Existing control identification
    • Determining impact severity
    • Determining risk level: Likelihood of occurrence and the impact
    • Incorporating emerging risks into the risk assessment process

    Exercise: Conduct a cybersecurity risk assessment for your organisation

  • Session 4: Auditing Cybersecurity Controls

    • Planning for a cybersecurity audit: Key considerations
    • Setting the audit scope/area of review:
      • Governance
      • Risk
      • Management
      • Assurance
    • Approaches to adopt based on the area of review
    • Aligning audit objectives with cybersecurity goals
    • Testing your cybersecurity program based on level of maturity
    • Contracting the services of external auditors: Critical factors and pitfalls to avoid

    Hands-on exercise: Setting your cybersecurity audit objectives based on cybersecurity goals

  • Session 5: Developing a Cybersecurity Risk Response

    • Cybersecurity remediation plans: Critical success factors and pitfalls to avoid
    • Immediate steps to take when a cybersecurity incident strikes and follow-up actions
    • Ensuring critical vulnerabilities are addressed within time frames
    • Mitigating cybersecurity risks to an acceptable level

    Hands-on exercise: Experience a cyber incident and activation of incidence response plan

  • Session 6: Building a Cybersecurity Maturity Model

    • Comparison of different cybersecurity maturity models:
      • NIST
      • ISO 27001
      • COBIT 2019
    • Determining maturity scale and setting your maturity level
    • Leveraging risk assessment and audit findings in cybersecurity maturity assessment

    Case studies: Compare and contrast the cybersecurity maturity levels of real-life companies
    Hands-on exercise: Assessing your organisation’s cybersecurity maturity

*Case studies and scenarios will be designed to suit the attendees