Now in its 10th successive year, MIS Training Institute’s Audit, Risk & Governance Africa conference, which included the 5th Fraud, Corruption & Investigations Africa Summit and Cyber Crime Africa Summit, is renowned for its continued support and capacity building of Africa’s Audit and Governance community. 

Read more... 

The more things change, the more they stay the same, or so it seems. Naive users share their passwords with the world, senior managers expose printed confidential material to the gaze of the news media, systems stay unpatched and vulnerable to hackers for months or years, while more than half the population continues to visit dodgy websites that serve up all manner of malware infections. 

Read more... 

MISTI are pleased to be working with (ISC)² for their upcoming annual Security Congress EMEA this October in Munich.

Building on the success of the first EMEA Congress and from suggestions from our members and community, the second Annual (ISC)² Security Congress EMEA will offer attendees six tracks of member presentations, together with panel discussions, keynotes and interactive sessions to inform and update all those involved in IT and information security - whatever their skill level and specialism.

Find out more...

You want be to secure, you need to be PCI DSS compliant. Too many companies see these as two different goals, and maybe even have different departments and people looking at them. Or worse still, they treat PCI DSS compliance as a box to be ticked, involving the least amount of time, money and effort possible. This way lies madness!

Read more...

Find out more about one of our instructors. Jenny Rayner works with directors, senior managers, internal auditors and risk managers to help them embrace best practice in governance, risk management and assurance.

Find out about Jenny

Hello from MISTI!

I am very excited to introduce the newest feature of the MISTI website – our “blog”. Here you will gain an insight into not just MISTI – but also, compelling,  valuable resources and information for Internal Auditing, Risk Management, Fraud and Corruption and Information Security.

Read More...

It seems that hardly a day goes by without news coverage of a high-profile data breach or successful attack. All these organisations employ security teams that do their best to secure their IT environment, although some organisations may lack the necessary focus on security or simply don't provide sufficient budget. Nevertheless, why do all these data breaches occur? One reason may be that too many security teams concentrate on protective measures alone.

Read More...

 

Event Search

MIS|TI Tweets

Please choose your region

Submit
Select a Region
United States
United Kingdom/Ireland
Africa
Americas
Asia-Pacific
Europe
Middle East

By continuing to use misti.com you will be agreeing to the website Terms and Conditions, the Privacy Policy, and the Use of cookies while using the website.