{"id":297,"date":"2023-11-26T02:49:34","date_gmt":"2023-11-26T02:49:34","guid":{"rendered":"https:\/\/horndigital.net\/ab\/?page_id=297"},"modified":"2023-11-26T19:03:55","modified_gmt":"2023-11-26T19:03:55","slug":"technology-auditing","status":"publish","type":"page","link":"https:\/\/horndigital.net\/index.php\/technology-auditing\/","title":{"rendered":"Technology auditing"},"content":{"rendered":"\n<p>Horn Digital Protect and enhance value through data and technology. We help organizations understand their key technology risks and how well they are mitigating and controlling those risks.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Telecommunication infrastructure <\/li>\n\n\n\n<li>Cybersecurity<\/li>\n\n\n\n<li>Cloud<\/li>\n\n\n\n<li>Data Governance &amp; Privacy<\/li>\n\n\n\n<li>Project Risk Advisory<\/li>\n\n\n\n<li>Technology Resilience<\/li>\n<\/ul>\n\n\n\n<p><strong>Our approach<\/strong><\/p>\n\n\n\n<p>We are experts in the identification and assessment of technology risks and controls. Our technology audit framework embraces an integrated and collaborative approach with IT management that reflects the next generation of internal auditing. We evaluate the governance and controls supporting an organization\u2019s priorities, infrastructure, and delivery approach.<\/p>\n\n\n\n<p>Different technology auditing services are available to our customers:-<\/p>\n\n\n\n<p><strong>Telecommunication &amp; IT Audit Services Performed<\/strong><\/p>\n\n\n\n<p>The services our specialists perform include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Telecom &amp; IT audit outsourcing and co-sourcing, covering all Telecom &amp; IT operational and business risk<\/li>\n\n\n\n<li>Penetration testing and assessments<\/li>\n\n\n\n<li>Internal and external network scans<\/li>\n\n\n\n<li>Social Engineering<\/li>\n\n\n\n<li>Risk Assessments<\/li>\n\n\n\n<li>Privacy Impact Assessments (PIA)<\/li>\n\n\n\n<li>Security Assessments, including disaster recovery and business continuity<\/li>\n\n\n\n<li>Integrated Telecom &amp; IT, financial, operational and compliance audits<\/li>\n\n\n\n<li>External auditor relationship management<\/li>\n\n\n\n<li>Telecom &amp; IT process reviews (access, change management, operations)<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Horn Digital Protect and enhance value through data and technology. We help organizations understand their key technology risks and how well they are mitigating and controlling those risks. Our approach We are experts in the identification and assessment of technology risks and controls. Our technology audit framework embraces an integrated and collaborative approach with IT &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-297","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/horndigital.net\/index.php\/wp-json\/wp\/v2\/pages\/297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/horndigital.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/horndigital.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/horndigital.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/horndigital.net\/index.php\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":5,"href":"https:\/\/horndigital.net\/index.php\/wp-json\/wp\/v2\/pages\/297\/revisions"}],"predecessor-version":[{"id":373,"href":"https:\/\/horndigital.net\/index.php\/wp-json\/wp\/v2\/pages\/297\/revisions\/373"}],"wp:attachment":[{"href":"https:\/\/horndigital.net\/index.php\/wp-json\/wp\/v2\/media?parent=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}