SECURITY MANAGEMENT IN ICT ENVIRONMENT

Content

Information Security Management Policy

  • What is Information Security?
  • Why is Information Security Needed?
  • Establishing Security Requirements
  • Assessing Security Risks
  • Selecting Controls
  • Information Security Starting Point
  • Critical Success Factors

Asset and Organizational Security

  • Information Security Infrastructure
  • Accountability for Assets
  • Information Classification
  • Security of Third Party Access

Communications and Operations Management

  • Operational Procedures and Responsibilities
  • System Planning and Acceptance
  • Protection against Malicious Software
  • Network Management
  • Media Handling and Security
  • Exchanges of Information and Software

Access Control

  • Business Requirement for Access Control
  • User Access Management and Responsibilities
  • Network Access Control
  • Operating System Access Control
  • Monitoring System Access and Use

Systems Development and Maintenance

  • Security Requirements of Systems
  • Security in Application Systems
  • Cryptographic Controls
  • Security of System Files
  • Security in Development and Support Processes

Physical and Environmental Security

  • Secure Areas
  • Equipment Security
  • General Controls
  • Responding to Security Incidents and Malfunctions
  • Security Personnel Training

FOR WHOM: CIOs, IT Department Managers, IT Executives, Heads of Departments, Business Managers, System Administrators, Security Personnel, Database Administrators, IT Professionals and anyone responsible for ensuring securing enterprises’ assets and business continuity of an organization’s systems.

 

DATE:               21st – 23rd February, 2024

                            4th – 6th September, 2024

 

Category:

Objective

Security awareness is about understanding, valuing and participating in your organization’s security. Participants will gain a solid understanding goals, threats and defenses. Additionally, participants learn about technical and social engineering dangers so that they are able to recognize and avoid these dangers.

Reviews

There are no reviews yet.

Be the first to review “SECURITY MANAGEMENT IN ICT ENVIRONMENT”

Your email address will not be published. Required fields are marked *

Shopping Cart