Information Technology Audit and Advisory

"In God we trust; all others we audit." – Unknown

IT Audit
Cyber Security Audit
Cloud Security Audit
Emerging Technology

Compliance

Overview

Leveraging technology and automation to deliver meaningful benefits to your organization can introduce additional challenges related to security, integrity, and control. At MJ, we recognize the importance of managing your business and regulatory concerns effectively.

Our IT Audit & Risk Advisory Services Practice is dedicated to safeguarding your organization’s information systems, ensuring compliance with regulatory standards, and providing insights to optimize IT controls, reduce costs, and enhance your competitive edge.

When you partner with MJ, you gain access to IT assurance professionals with decades of experience in IT consulting and auditing across various industries. This expertise is further reinforced by professional accreditations.

a blurry photo of a plane flying in the sky

Advisory Consulting Services

  • Gap Analysis & Risk Assessment

  • Policy & Process Development

  • Control Implementation & Monitoring

  • Internal Audits & Certification Readiness

ISO 27001 Implementation

Business Continuity & Disaster Recovery

NIST Cybersecurity Framework (CSF) Advisory

ISA/IEC 62443 Industrial Cybersecurity

  • Business Impact Analysis (BIA)

  • Continuity & Recovery Strategy Design

  • DR Site Planning & Testing

  • Crisis Management & Training

  • ICS/OT Risk & Vulnerability Assessments

  • Network Segmentation & Security Architecture

  • Secure Configuration & Patch Management

  • Policy & Compliance Guidance

  • Framework Gap Assessment

  • Cybersecurity Maturity Roadmap

  • Control Mapping & Implementation

  • Continuous Monitoring & Reporting

CERT‑IN Compliance & Advisory

  • CERT‑IN Readiness Assessment

  • Incident Response & Reporting Process Implementation

  • Annual Security Audits & Log Management Evaluation

  • Advisory on Cloud, IoT, AI, and Emerging Technology Compliance

Data Privacy & Protection Services

  • Data Protection Gap Analysis & Compliance Assessment

  • Privacy Policy & Data Handling Procedure Development

  • Personal Data Mapping & Risk Assessment

  • Data Breach Response Planning & Regulatory Notification

  • Compliance with GDPR, DPPR , and other regional privacy laws

  • Staff Awareness & Training Programs

Integrated Advisory & Governance

  • Cross-Framework Alignment (ISO 27001 + NIST CSF + CERT‑IN + Data Privacy)

  • Risk Management & Policy Development

  • Awareness & Training Programs

  • Continuous Improvement & Reporting

  • IT General Controls (ITGC) Assessment

    • Reviewing controls over data center operations, system software, and application software

    • Evaluating controls related to access management, change management, and backup and recovery

  • Application Controls Review

    • Assessing controls within specific applications to ensure data accuracy, completeness, and authorization

    • Evaluating input, processing, and output controls

  • Access Control Review

    • Assessing user access management and authentication mechanisms

    • Evaluating authorization processes and access rights

  • IT Infrastructure Review

    • Evaluating hardware and software configurations and management

    • Reviewing network architecture and security controls

    • Evaluating system configurations and patch management

  • Compliance and Regulatory Requirements

    • Evaluating compliance with IT-related regulations (e.g., GDPR, HIPAA, SOX,ISO, PCIDSS)

    • Assessing adherence to industry-specific standards and frameworks

    • Reviewing compliance with IT standards and best practices (e.g., ISO/IEC 27001, NIST)

  • IT Governance Assessment

    • Evaluating IT governance frameworks and structures

    • Assessing alignment of IT strategies with business objectives

  • Business Continuity and Disaster Recovery

    • Assessing business continuity and disaster recovery plans

    • Reviewing backup and recovery processes and their effectiveness

  • Cybersecurity Assessment

    • Evaluating cybersecurity policies, practices, and controls

    • Conducting vulnerability assessments and penetration testing

    • Reviewing incident response and management procedures

  • Cloud Computing Assessment

    • Evaluating security and compliance for cloud services and platforms

    • Reviewing cloud provider controls and agreements

  • Blockchain Technology Review

    • Evaluating the implementation and security of blockchain solutions

    • Assessing the effectiveness of blockchain governance and controls

    • Smart Contract Audit

  • OT / IoT Security Audit

    • Reviewing the security of Internet of Things devices and networks

    • OT Asset Management Audit

    • OT Network Security Audit

  • SoC Maturity Assessment

    • Maturity assessment of SOC capabilities by evaluating people, process, technology, and business aspects

  • ISMS Audits

    • Conducting internal audits to assess the effectiveness of the ISMS

    • Identifying non-conformities and areas for improvement

  • Third-Party Risk Assessment

    • Assessing the security posture of third-party vendors and partners

    • Reviewing third-party contracts and security controls

  • IT Audit Support and Advisory

    • Audit Preparation and Readiness

      • Assisting organizations in preparing for IT audits

      • Providing support during the audit process

    • Implementation of Audit Recommendations

      • Helping with the implementation of IT audit findings and recommendations

      • Monitoring progress and effectiveness of corrective actions

Our Approach

Reporting

  • Draft the Report

  • Management Review

  • Finalization the Report

  • Presenting the Report

  • Obtain Management Response

Planning

  • Understanding the Business

  • Defining the Audit Scope

  • Risk Assessment

  • Setting Objectives

  • Resource Allocation

  • Developing an Audit Plan

Fieldwork

  • Executing the Audit Plan

  • Document Review

  • Interviews and Observations

  • Testing and Validation

  • Identifying Issues

  • Communicating with Management

Analysis & Evaluation

  • Data Analysis

  • Evaluating Findings

  • Root Cause Analysis

  • Developing Recommendations

Follow-up

  • Monitoring Corrective Action

  • Follow-up Audit

  • Continuous Improvement

  • Reporting follow-up Results

Closure

  • Audit Documentation

  • Audit Debriefing

  • Feedback

  • Lessons learned

  • Report distribution

Our Team's experience with Global Companies

men and women wearing black and white graduation dress and mortar cap inside building

Our Specialists Hold Global Certifications

Contacts
Address

#1205 Queen Street West, Toronto, Canada

Canada | India | Oman | UAE | Australia | USA