BEST PRACTICES IN INFORMATION SECURITY MANAGEMENT

Content

Tenets of Information Security

  • Define Information Security and its key elements
  • Confidentially, Integrity and Availability
  • Map Compliance Requirements to Securing Information (CIA)
  • Identify Forms of Threat
  • List Common Enterprise Vulnerabilities

Managing Information Security in the Organization

  • Security Governance Lifecycle
  • Key Roles, Responsibilities and Interactions
  • Good Security Policy

IT Threats, Vulnerabilities and Attacks

  • Vulnerabilities in Client/Server Communication
  • Identify Physical, Technical and Social Forms of Security Threat
  • The Most Common Attacks
  • Common Examples of Social Engineering

Assessing Risk

  • Risk Management in Information Security
  • Business Impact Analysis from Risk Assessment
  • Quantitative and Qualitative Risk Analysis
  • Vulnerability Scanning
  • Tool Selection and Comparison Criteria

Technical and Physical Access Control

  • Access Control in Implementing Information Security
  • Authentication and Authorization in Access Control
  • Countermeasures by Strategy
  • The Importance of Patch Management
  • Physical Controls and Technical Countermeasures
  • Intrusion Prevention Systems
  • Virtual Private Networking Supports Security
  • Encryption and Security

FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Network Administrators, Risk Analysts, Decision Makers, Servers Managers, Information Security Architects, Network Engineers, Systems/Security Administrators, IT Development Managers and others who perform related functions.

 

DATE:            22nd – 23rd February, 2024

                         4th – 6th September, 2024

 

Category:

Objective

The information Security Management Workshop prepares you to look at your business through an information security lens and to develop and implement a comprehensive information security strategy that will help your business to stay competitive. It covers key security concepts, providing real -world examples of how to implement security measures and risk mitigation methods in your organization. Whether you are in management or have a technical role in security, this workshop is essential for the context you need to understand information security management including risk management, technical and management controls, legal framework, people and physical security, security standards and business continuity.

Reviews

There are no reviews yet.

Be the first to review “BEST PRACTICES IN INFORMATION SECURITY MANAGEMENT”

Your email address will not be published. Required fields are marked *

Shopping Cart