In this chapter, we discussed various aspects of security awareness training and programs, security testing, and monitoring tools and techniques. We also learned to evaluate incident management policies and practices.
We also discussed how to evaluate evidence collection and the forensics process. Digital evidence can be used in legal proceedings provided it has been preserved in its original state. Evidence loses its integrity if the chain of custody is not maintained. The chain of custody refers to the process of identifying, preserving, analyzing, and presenting evidence in such a manner that it demonstrates the reliability and integrity of the evidence.
With this chapter, you have acquired the relevant skills and knowledge required to pass the CISA exam as well as perform IS audits. It is strongly recommended to refer the key aspects mentioned at the end of each topic and practice self-assessment questions in order to excel in the CISA exam.