Map Compliance Requirements to Securing Information (CIA)
Identify Forms of Threat
List Common Enterprise Vulnerabilities
Managing Information Security in the Organization
Security Governance Lifecycle
Key Roles, Responsibilities and Interactions
Good Security Policy
IT Threats, Vulnerabilities and Attacks
Vulnerabilities in Client/Server Communication
Identify Physical, Technical and Social Forms of Security Threat
The Most Common Attacks
Common Examples of Social Engineering
Assessing Risk
Risk Management in Information Security
Business Impact Analysis from Risk Assessment
Quantitative and Qualitative Risk Analysis
Vulnerability Scanning
Tool Selection and Comparison Criteria
Technical and Physical Access Control
Access Control in Implementing Information Security
Authentication and Authorization in Access Control
Countermeasures by Strategy
The Importance of Patch Management
Physical Controls and Technical Countermeasures
Intrusion Prevention Systems
Virtual Private Networking Supports Security
Encryption and Security
FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Network Administrators, Risk Analysts, Decision Makers, Servers Managers, Information Security Architects, Network Engineers, Systems/Security Administrators, IT Development Managers and others who perform related functions.
The information Security Management Workshop prepares you to look at your business through an information security lens and to develop and implement a comprehensive information security strategy that will help your business to stay competitive. It covers key security concepts, providing real -world examples of how to implement security measures and risk mitigation methods in your organization. Whether you are in management or have a technical role in security, this workshop is essential for the context you need to understand information security management including risk management, technical and management controls, legal framework, people and physical security, security standards and business continuity.
Reviews
There are no reviews yet.
Be the first to review “BEST PRACTICES IN INFORMATION SECURITY MANAGEMENT” Cancel reply
Reviews
There are no reviews yet.