Defining the Information Security Environment

  • The attributes of an Information Security Program
  • Threats to Information Security and Areas of Vulnerability
  • Important Regulatory Requirements for Data Protection and Privacy
  • Essential Information Requirements
  • Current Treads and Concerns in Information Security

Security Management: Strategic Components

  • Organizational Aspects: Roles and Responsibilities
  • The Security Management Cycle
  • Security Risk Assessment and Management
  • Essential Security Policies, Standards and Procedures
  • Information Classification and Valuation
  • Evaluating Awareness Programs

Criteria for Secure Business Application

  • Information Security’s Role in System Development Life Cycle (SDLC)
  • Audit Issues for Identity and Access Control Management
  • Cryptography: Key Management and Applications

Protecting the Network Perimeter: Network and Workstation Security

  • Firewalls
  • Instruction Detection and Incident Response
  • Virtual Private Networks
  • Wireless and Mobile Device Security

Business Continuity Planning (BCP)

  • Roles and Responsibilities
  • Defining BCP Management
  • The Business Impact Analysis (BIA)

FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Network Administrators, Systems/ Security Administrators, IT Development Managers and others who perform related functions.

DATE:             15th – 17th May, 2024

                          13th – 15th November, 2024




Information security, it is now an issue for the entire enterprise, not just for security and IT teams.

Heightened attention to corporate governance, increasing reports of targeted attacks, more legislation and regulation, data leakage, BYOD, cloud and other cyber security problems are in the media daily and reports of companies battling the fall-out from breaches have enterprise executives focused on better protecting the business and its assets. But information security can be a minefield of potential disasters waiting to happen if not managed correctly and expertly, or if it’s misaligned with business goals.

During this workshop, participants will gain an understanding of how to organize and oversee a risk -based enterprise information security program, drill down to the critical building blocks of information, explore the respective roles and responsibilities of the key players, discover industry best practice, legislation and professional standards based, take away sample security policies, security review checklists, a glossary of computing terminology and much more.


There are no reviews yet.


Your email address will not be published. Required fields are marked *

Shopping Cart