Why?

An ongoing comprehensive and effective risk-based IT Audit program is not only a financial institution regulatory requirement, but also an essential component of a successful risk management strategy.


How?

Your Aptum consultant will help your organization achieve this need by working with your team to develop and execute a robust risk-based IT Audit program. This incremental, customizable, and scalable process will ensure a program tailored to your organization, not a standardized one size fits all approach.


Objectives

The IT Audit scope will be developed based upon your organization’s risk profile and will focus on the following aspects:

• Identification and evaluation of risks
• Assessment of and adherence to established and expected policies, procedures, and controls
• Compliance with applicable laws, regulations, regulatory guidance, and industry best practices

The IT Audit can be completed on or off site to meet your needs.


Communication

Ongoing communications will occur from scoping, throughout the audit, and after the report has been delivered. All results will be discussed with the appropriate management members prior to the conclusion of the audit. An easily readable report will be provided containing detailed results and relevant recommendations to improve your oversight, operations, and security posture.


Partnership

Aptum is based on and committed to a true partnership where we believe that when you succeed, we succeed. This means we value and provide the same level of service to all clients regardless of size, services provided, and potential for additional services. We are committed to delivering exceptional quality and service to assist with your continued success. As such, we assure that all aspects of your service will be performed by experienced, certified professionals located in the United States.


Other Risk Management Services

With the ever-evolving cybersecurity threat landscape, an IVA is a key component of a robust risk management program and information security program testing requirements. An IVA assists management with understanding the effectiveness of cybersecurity practices and controls from internal threats by identifying, quantifying, and prioritizing vulnerabilities.

Learn more

With the ever-evolving cybersecurity threat landscape, a PVA is critical to a robust risk management program and information security program test requirements. A PVA assists management with understanding the effectiveness of cybersecurity practices and controls from external threats by identifying, quantifying, and prioritizing vulnerabilities.

Learn more

Confidentiality of account holder information is a critical function of your organization. Threats to the security of such information come in many forms. As organizations continue to evolve the methods in which they communicate with account holders, the policies, procedures, and controls of these methods need to be assessed. One such communication method is through online chat communications between your employees and account holders. Therefore, ongoing chat impersonation tests are a key component to a robust risk management strategy and information security program testing requirements.

Learn more

Confidentiality of account holder information is a critical function of your organization. Threats to the security of such information come in many forms. One such threat is through unauthorized requests made through telephone contact with your employees. Therefore, ongoing pretext calling tests are a key component to a robust risk management strategy and information security program testing requirements.

Learn more

Securing your organization not only involves technical security measures but also physical security measures. Unauthorized access to your facilities could compromise sensitive organization and account holder information as well as put at risk electronic compromise through the installation of devices or malicious systems. In addition, unauthorized physical access could result in destruction or inaccessibility of physical devices. Therefore, ongoing tests attempting to gain physical access to your facilities are a key component to a robust risk management strategy and information security program testing requirements.

Learn more