Secure and trustworthy IT underpins every organisation. IT internal audits help reveal weaknesses, reduce risk and ensure compliance with regulatory requirements – a preventative investment that keeps your IT under control.

 

 

Common Challenges Our Clients Have Faced – And We’ve Helped Solve

How to establish an effective
IT internal audit framework

How to meet regulatory obligations
with proportionate internal effort

How to prepare for and pass external audits
and inspections

How to effectively test IT processes and controls

How to use audit results to strengthen
IT governance and risk management

How to ensure independence
and objectivity of Internal Audit

How to implement regulatory
requirements efficiently

How to identify key IT and cyber security risks

How to address the most significant IT
and cyber risks

How to track remediation
and ensure timely implementation

   

How We Help

References

Audit under the Czech Act on Cybersecurity / NIS2

We designed an audit plan in accordance with ZoKB and mapped it to the company’s internally defined risks. Based on meetings with company representatives and document review, we assessed compliance with the individual sections and articles of the Act. We assigned severity and recommendations to each non-compliance, including a timeline and priority. All findings and recommendations were discussed with Internal Audit and the auditees.

DORA Gap Analysis (including relevant RTS)

We mapped the requirements of the DORA regulation, including the relevant regulatory technical standards (RTS), and divided them into logical units and areas of the client’s internal controls. Through interviews with selected employees and documentation review, we described the current state and compared it with the state required by the regulation. For the identified gaps, we set priorities and an action plan, and we also calculated maturity across the five basic DORA domains.

Risk Analysis Review

We reviewed the risk analysis methodology according to the requirements of DORA and the related RTS. We checked the client’s risk analysis, including the completeness of identified risks, verified the proposed remedial measures and their status. The output was a final report in accordance with DORA and applicable legislation.

COBIT-based Process Maturity Assessment

Using the maturity model of the COBIT framework, we assessed selected IT processes. After discussion and presentation to the company’s management, we defined the steps needed for the company to reach the desired level of maturity in the selected priority processes.

Contacts