SlideShare a Scribd company logo
1 of 11
CISA Certification Details
ISACA®
Pasitikėjimas informacinėmis sistemomis ir jų nauda
Laura Puodžiūnaitė
ISACA Lietuvos skyriaus narė
www.isaca.lt
www.isaca.org/cisa
What is a CISA?
• The CISA designation is a globally recognized certification for IS audit
control, assurance and security professionals. Being CISA-certified
showcases your audit experience, skills and knowledge, and
demonstrates you are capable to manage vulnerabilities, ensure
compliance and institute controls within the enterprise.
What is a CISA?
(continued)
• Confirms your knowledge and experience
• Quantifies and markets your expertise
• Demonstrates that you have gained and maintained the level of knowledge
required to meet the dynamic challenges of a modern enterprise
• Is globally recognized as the mark of excellence for the IS audit professional
• Combines the achievement of passing a comprehensive exam with
recognition of work and educational experience, providing you with
credibility in the marketplace.
• Increases your value to your organization
• Gives you a competitive advantage over peers when seeking job growth
• Helps you achieve a high professional standard through ISACA’s
requirements for continuing education and ethical conduct
• Enterprises demand IS audit
professionals that possess the
knowledge and expertise to help
them identify critical issues and
customize practices to support
trust in and value from
information systems.
• The skills and practices that CISA
promotes and evaluates are the
building blocks of success in the
field. Possessing the CISA
demonstrates proficiency and is
the basis for measurement in the
profession.
Why Become a CISA?
Why Become a CISA?
(continued)
Enhanced Knowledge and Skills
• To demonstrate your willingness to improve your technical
knowledge and skills
• To demonstrate to management your proficiency toward
organizational excellence
Career Advancement
• To obtain credentials that employers seek
• To enhance your professional image
Worldwide Recognition
• To be included with over 100,000 other professionals who
have gained the CISA designation worldwide
CISA in the Workplace
• Nearly 2,700 are employed in organizations as the CEO, CFO or
equivalent executive position.
• More than 2,300 serve as chief audit executives, audit partners or
audit heads.
• Over 2,400 serve as CIOs, CISOs, or chief compliance, risk or privacy
officers.
• Almost 8,900 are employed as security directors, managers or
consultants and related staff.
• More than 11,200 are employed as IT directors, managers,
consultants and related staff.
• Nearly 28,500 serve as audit directors, managers or consultants and
auditors (IT and non-IT).
• Over 9,400 are employed in managerial, consulting or related
positions in IT operations or compliance.
CISA Target Market
What is the CISA Target Market?
• IS/IT Auditors
• IS/IT Consultants
• IS/IT Audit Managers
• Security Professionals
• Non-IT Auditors
Domain 1 – The Process of Auditing Information Systems (14%)
Provide audit services in accordance with IT audit standards to assist the
organization in protecting and controlling information systems.
Domain 2 – Governance and Management of IT (14%)
Provide assurance that the necessary leadership and organization structure and
processes are in place to achieve objectives and to support the organization's
strategy.
Domain 3 – Information Systems Acquisition, Development, and
Implementation (19%)
Provide assurance that the practices for the acquisition, development, testing,
and implementation of information systems meet the organization’s strategies
and objectives.
CISA Job Practice Areas
(Effective 2011)
Domain 4 - Information Systems Operations, Maintenance and Support –
(23%)
Provide assurance that the processes for information systems operations,
maintenance and support meet the organization’s strategies and objectives.
Domain 5 - Protection of Information Assets – (30%)
Provide assurance that the organization’s security policies, standards,
procedures and controls ensure the confidentiality, integrity and availability of
information assets.
www.isaca.org/cisajobpractice
CISA Job Practice Areas
(Effective 2011) (continued)
Ačiū už dėmesį!
Daugiau informacijos apie organizuojamus ISACA sertifikacijų mokymus rasite
www.bka.lt
Susisiekite telefonu 8 5 2780502 arba el.paštu mokymai@bka.lt

More Related Content

What's hot

Information Security Management System
Information Security Management SystemInformation Security Management System
Information Security Management System
AGC Networks Ltd
 

What's hot (6)

Paul Ollerton, Sales and Marketing Director at Santia Consulting Ltd - Mainta...
Paul Ollerton, Sales and Marketing Director at Santia Consulting Ltd - Mainta...Paul Ollerton, Sales and Marketing Director at Santia Consulting Ltd - Mainta...
Paul Ollerton, Sales and Marketing Director at Santia Consulting Ltd - Mainta...
 
COMPANY PROFILE
COMPANY PROFILECOMPANY PROFILE
COMPANY PROFILE
 
Adaptive RiskPro
Adaptive RiskProAdaptive RiskPro
Adaptive RiskPro
 
Information Security Management System
Information Security Management SystemInformation Security Management System
Information Security Management System
 
Deegit Overview
Deegit OverviewDeegit Overview
Deegit Overview
 
10 Benefits of Implementing ISO/IEC 20000 in an Organization
10 Benefits of Implementing ISO/IEC 20000 in an Organization10 Benefits of Implementing ISO/IEC 20000 in an Organization
10 Benefits of Implementing ISO/IEC 20000 in an Organization
 

Similar to CISA sertifikacija

538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
ssuserde23af
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurance
a3virani
 
Asis 2013 april updates
Asis 2013 april updatesAsis 2013 april updates
Asis 2013 april updates
Peggy OConnor
 
SABPP - HR Standards - HR Africa 2013
SABPP - HR Standards - HR Africa 2013SABPP - HR Standards - HR Africa 2013
SABPP - HR Standards - HR Africa 2013
SABPP
 
Phakamo Business Profile 2015
Phakamo Business Profile 2015Phakamo Business Profile 2015
Phakamo Business Profile 2015
Lucas Ledwaba
 

Similar to CISA sertifikacija (20)

538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
CISM sertifikacija
CISM sertifikacijaCISM sertifikacija
CISM sertifikacija
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurance
 
Microsoft 365 Governance Risk and Compliance Maturity model | MM4M365 practit...
Microsoft 365 Governance Risk and Compliance Maturity model | MM4M365 practit...Microsoft 365 Governance Risk and Compliance Maturity model | MM4M365 practit...
Microsoft 365 Governance Risk and Compliance Maturity model | MM4M365 practit...
 
Certified Information System Auditor- CISA
Certified Information System Auditor- CISACertified Information System Auditor- CISA
Certified Information System Auditor- CISA
 
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdfInfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
 
CISA Certification : How To Prepare For The Exam?
CISA Certification : How To Prepare For The Exam?CISA Certification : How To Prepare For The Exam?
CISA Certification : How To Prepare For The Exam?
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure General
 
ISACA certification programme 2010
ISACA certification programme 2010ISACA certification programme 2010
ISACA certification programme 2010
 
Data Protection: An Approach to Privacy
Data Protection: An Approach to PrivacyData Protection: An Approach to Privacy
Data Protection: An Approach to Privacy
 
ASIS International: Join Us!
ASIS International: Join Us!ASIS International: Join Us!
ASIS International: Join Us!
 
About ASIS International
About ASIS InternationalAbout ASIS International
About ASIS International
 
CRISC sertifikacija
CRISC sertifikacijaCRISC sertifikacija
CRISC sertifikacija
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
Auditing as a profession
Auditing as a professionAuditing as a profession
Auditing as a profession
 
Asis 2013 april updates
Asis 2013 april updatesAsis 2013 april updates
Asis 2013 april updates
 
SABPP - HR Standards - HR Africa 2013
SABPP - HR Standards - HR Africa 2013SABPP - HR Standards - HR Africa 2013
SABPP - HR Standards - HR Africa 2013
 
Phakamo Business Profile 2015
Phakamo Business Profile 2015Phakamo Business Profile 2015
Phakamo Business Profile 2015
 

More from BKA (Baltijos kompiuteriu akademija)

More from BKA (Baltijos kompiuteriu akademija) (9)

ISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
ISACA sertifikacijos - profesionalumo įrodymas, D. JakimavičiusISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
ISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
 
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
 
Kibernetinė sauga. Vadovo požiūris. R.Lečickis
Kibernetinė sauga. Vadovo požiūris. R.LečickisKibernetinė sauga. Vadovo požiūris. R.Lečickis
Kibernetinė sauga. Vadovo požiūris. R.Lečickis
 
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.GlemžaIT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
 
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. JakimavičiusIT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
 
ITIL. Kodėl jis reikalingas Jūsų įmonei?
ITIL. Kodėl jis reikalingas Jūsų įmonei?ITIL. Kodėl jis reikalingas Jūsų įmonei?
ITIL. Kodėl jis reikalingas Jūsų įmonei?
 
COBIT sertifikacija
COBIT sertifikacijaCOBIT sertifikacija
COBIT sertifikacija
 
CGEIT sertifikacija
CGEIT sertifikacijaCGEIT sertifikacija
CGEIT sertifikacija
 
ISACA Lietuva. Asociacija, sertifikacijos ir mokymai
ISACA Lietuva. Asociacija, sertifikacijos ir mokymaiISACA Lietuva. Asociacija, sertifikacijos ir mokymai
ISACA Lietuva. Asociacija, sertifikacijos ir mokymai
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 

CISA sertifikacija

  • 1.
  • 2. CISA Certification Details ISACA® Pasitikėjimas informacinėmis sistemomis ir jų nauda Laura Puodžiūnaitė ISACA Lietuvos skyriaus narė www.isaca.lt www.isaca.org/cisa
  • 3. What is a CISA? • The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to manage vulnerabilities, ensure compliance and institute controls within the enterprise.
  • 4. What is a CISA? (continued) • Confirms your knowledge and experience • Quantifies and markets your expertise • Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise • Is globally recognized as the mark of excellence for the IS audit professional • Combines the achievement of passing a comprehensive exam with recognition of work and educational experience, providing you with credibility in the marketplace. • Increases your value to your organization • Gives you a competitive advantage over peers when seeking job growth • Helps you achieve a high professional standard through ISACA’s requirements for continuing education and ethical conduct
  • 5. • Enterprises demand IS audit professionals that possess the knowledge and expertise to help them identify critical issues and customize practices to support trust in and value from information systems. • The skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA demonstrates proficiency and is the basis for measurement in the profession. Why Become a CISA?
  • 6. Why Become a CISA? (continued) Enhanced Knowledge and Skills • To demonstrate your willingness to improve your technical knowledge and skills • To demonstrate to management your proficiency toward organizational excellence Career Advancement • To obtain credentials that employers seek • To enhance your professional image Worldwide Recognition • To be included with over 100,000 other professionals who have gained the CISA designation worldwide
  • 7. CISA in the Workplace • Nearly 2,700 are employed in organizations as the CEO, CFO or equivalent executive position. • More than 2,300 serve as chief audit executives, audit partners or audit heads. • Over 2,400 serve as CIOs, CISOs, or chief compliance, risk or privacy officers. • Almost 8,900 are employed as security directors, managers or consultants and related staff. • More than 11,200 are employed as IT directors, managers, consultants and related staff. • Nearly 28,500 serve as audit directors, managers or consultants and auditors (IT and non-IT). • Over 9,400 are employed in managerial, consulting or related positions in IT operations or compliance.
  • 8. CISA Target Market What is the CISA Target Market? • IS/IT Auditors • IS/IT Consultants • IS/IT Audit Managers • Security Professionals • Non-IT Auditors
  • 9. Domain 1 – The Process of Auditing Information Systems (14%) Provide audit services in accordance with IT audit standards to assist the organization in protecting and controlling information systems. Domain 2 – Governance and Management of IT (14%) Provide assurance that the necessary leadership and organization structure and processes are in place to achieve objectives and to support the organization's strategy. Domain 3 – Information Systems Acquisition, Development, and Implementation (19%) Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organization’s strategies and objectives. CISA Job Practice Areas (Effective 2011)
  • 10. Domain 4 - Information Systems Operations, Maintenance and Support – (23%) Provide assurance that the processes for information systems operations, maintenance and support meet the organization’s strategies and objectives. Domain 5 - Protection of Information Assets – (30%) Provide assurance that the organization’s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets. www.isaca.org/cisajobpractice CISA Job Practice Areas (Effective 2011) (continued)
  • 11. Ačiū už dėmesį! Daugiau informacijos apie organizuojamus ISACA sertifikacijų mokymus rasite www.bka.lt Susisiekite telefonu 8 5 2780502 arba el.paštu mokymai@bka.lt