Skip Ribbon Commands
Skip to main content
The Institute of Internal Auditors North AmericaBreadcrumb SeparatorLearning and EventsBreadcrumb SeparatorCoursesBreadcrumb SeparatorInternal Audit’s Guide to Ransomware
Course Description Course Outline Bring Us On Site  

Internal Audit’s Guide to Ransomware

Course Description

Print-friendly Course Description and Outline

Organizations have worked diligently for decades to protect data and information assets. Organizations deploy encryption technology, limit access, and physically and logically segment valuable, sensitive, and proprietary data and information assets in an effort to keep bad actors from viewing, stealing, altering, or destroying it. However, at the same time, the bad actors have improved their craft; they infiltrate and steal these assets by using the same technology designed to protect it.

One of the primary methods used to extort and humiliate organizations throughout the globe is to affect technology with ransomware, which is designed to deny a user or an organization access to files on their computers. By encrypting the files, and demanding a “ransom” payment for the decryption key, this malware places organizations in a position where paying the ransom is the easiest and least expensive way to regain access.

How can internal audit assist their organizations in defending themselves against bad actors who are using their own technology against them? How do we protect ourselves?

Who will benefit from this course?

This course is for internal audit leaders and internal auditors who wish to gain a basic understanding of ransomware.

Course Objectives

Using clear business language, this seminar is designed to familiarize internal auditors and internal audit leaders with ransomware facts and types, as well as the means to reduce threats and improve controls. In this seminar, we will:

  • Explore the origin of ransomware.
  • Recognize the characteristics of common and emerging ransomware variants.
  • Describe the primary ways ransomware is delivered.
  • Identify controls to reduce the possibility of infection.
  • Explore compensation controls to reduce the likelihood of infection by zero-day attacks.
  • Summarize the key components in a ransomware playbook.
  • Dramatize a ransomware prevention, detection, and response program audit.
  • Discuss how audit leaders can talk to their board of directors and other key stakeholders about ransomware and its impact.
Course Duration: 0.5 day(s)
CPEs Available: 4
Knowledge Level: Intermediate
Field of Study: Information Technology
P​articipants should come with knowledge of, and experience with the internal auditing process.
Advance Preparation: 
Delivery Method: eLearning (Group-Internet-Based); On-site Training (Group-Live); Seminar (Group-Live)

Origin of Ransomware

  • History Lesson.
  • Types and variants.


  • Methods of Exploitation.


  • Preventative controls.
  • Detective controls.
  • Compensating Controls.
  • Incident Response.
  • Ransomware and zero-day playbook considerations.

Auditing Ransomware Programs

  • Audit considerations.

Management Discussion Points

  • Discussions with boards of directors and key stakeholders.

​Most courses can be delivered through on-site training. You might be surprised that the organization leading the profession is just as committed to the delivery of affordable training.

Contact us by calling +1-407-937-1388 or send an e-mail to

Details and pricing
October 15,
Details and pricing
December 10,