{"id":3749,"date":"2021-10-21T20:38:04","date_gmt":"2021-10-21T20:38:04","guid":{"rendered":"https:\/\/avantgardenigeria.com\/?post_type=product&p=3749"},"modified":"2024-12-11T17:27:40","modified_gmt":"2024-12-11T17:27:40","slug":"information-and-security-controls","status":"publish","type":"product","link":"https:\/\/avantgardenigeria.com\/index.php\/product\/information-and-security-controls\/","title":{"rendered":"INFORMATION AND SECURITY CONTROLS"},"content":{"rendered":"
Objective<\/strong><\/p>\n Information security, it is now an issue for the entire enterprise, not just for security and IT teams.<\/p>\n Heightened attention to corporate governance, increasing reports of targeted attacks, more legislation and regulation, data leakage, BYOD, cloud and other cyber security problems are in the media daily and reports of companies battling the fall-out from breaches have enterprise executives focused on better protecting the business and its assets. But information security can be a minefield of potential disasters waiting to happen if not managed correctly and expertly, or if it\u2019s misaligned with business goals.<\/p>\n During this workshop, participants will gain an understanding of how to organize and oversee a risk -based enterprise information security program, drill down to the critical building blocks of information, explore the respective roles and responsibilities of the key players, discover industry best practice, legislation and professional standards based, take away sample security policies, security review checklists, a glossary of computing terminology and much more.<\/p>\n","protected":false},"excerpt":{"rendered":" Content<\/strong><\/p>\n Defining the Information Security Environment<\/strong><\/p>\n Security Management: Strategic Components<\/strong><\/p>\n Criteria for Secure Business Application<\/strong><\/p>\n Protecting the Network Perimeter: Network and Workstation Security<\/strong><\/p>\n Business Continuity Planning (BCP)<\/strong><\/p>\n\n
\n
\n
\n
\n