INFORMATION SECURITY COMPLIANCE & RISK MANAGEMENT
We are challenged with both securing our information assets and infrastructure as well as achieving full compliance with numerous legislations and regulations. Healthcare, financial, government and other verticals are required to constantly monitor their infrastructure to mitigate risks and vulnerabilities as well as ensure compliance with international standards and industry best practices.
Standards such as ISO 27001 or ISO 27002 are a requirement for organizations to comply with. A key objective for organizations worldwide is to integrate security best practices and be in compliance. Skilled professionals who understand regulatory compliance requirements and information security are valued across several industries, especially healthcare, financial and the government.
Learn to use tools to provide an overall approach to managing security risks in order to meet the business objectives.
Address the following areas:
· IT infrastructure and network security – rising from concerns about hackers, terrorists, cyber-criminals, insiders, outsiders, viruses, and so on
· Data integrity, confidentiality and privacy – rising from regulatory and market pressure around protecting personal (e.g. data protection legislation), and corporate data (e.g. fair disclosure regulations), as well as financial and operational data
· Business continuity – rising from concerns about the capability to continue in business after a natural or man-made disaster
· IT management – rising from concerns about project failure, poor IT operational performance, inadequate IT infrastructure, etc.
Who Should Attend:
· Top Management Representatives
· Security Professionals
· Risk Managers
· Staff responsible for compliance with laws and regulations
· Auditors
· Information Security Officers
· IT Managers/Directors
Case Study 1: Risk Analysis
Examine compliance mandates for risk analysis. Analyze how to conduct a comprehensive and thorough risk analysis to identify compliance and security deficiencies. Walk through core components of the resulting Corrective Action Plan (CAP) – your road-map for enabling a more resilient enterprise.
Case Study 2: Conducting a Business Impact Analysis (BIA)
Step through key activities that organizations must conduct to complete a comprehensive Business Impact Analysis (BIA). Understand critical processes for a BIA initiative and identify areas that must be addressed in a BIA Report.
Case Study 3: Sample Information Security Policy Templates
Step through key sections of critical information security templates in-class. Review sample policy types and organization.
No comments:
Post a Comment