INFORMATION SECURITY COMPLIANCE & RISK MANAGEMENT
November 16-17 We are challenged with both securing our information assets and infrastructure as well as achieving full compliance with numerous legislations and regulations. Healthcare, financial, government and other verticals are required to constantly monitor their infrastructure to mitigate risks and vulnerabilities as well as ensure compliance with international standards and industry best practices. Standards such as ISO 27001 or ISO 27002 are a requirement for organizations to comply with. A key objective for organizations worldwide is to integrate security best practices and be in compliance. Skilled professionals who understand regulatory compliance requirements and information security are valued across several industries, especially healthcare, financial and the government. Learn to use tools to provide an overall approach to managing security risks in order to meet the business objectives. Address the following areas: · IT infrastructure and network security - rising from concerns about hackers, terrorists, cyber-criminals, insiders, outsiders, viruses, and so on · Data integrity, confidentiality and privacy - rising from regulatory and market pressure around protecting personal (e.g. data protection legislation), and corporate data (e.g. fair disclosure regulations), as well as financial and operational data · Business continuity - rising from concerns about the capability to continue in business after a natural or man-made disaster · IT management - rising from concerns about project failure, poor IT operational performance, inadequate IT infrastructure, etc. Who Should Attend: · Top Management Representatives · Security Professionals · Risk Managers · Staff responsible for compliance with laws and regulations · Auditors · Information Security Officers · IT Managers/Directors Course Outline: 1. Threats and Vulnerabilities for Networked Organizations 2. Identifying Threats, Vulnerabilities and Impacts 3. Understanding the Technical and Non-technical Assessment 4. Applicable Regulatory Compliance and Security 5. Financial Services and Security · Technology and Security Impact Ø Security Architecture and Infrastructure · COBIT Security Baseline Ø Control Objectives Ø Security Domains 6. PCI DSS Requirements · Objective · Control Objectives · Defined Requirements · Critical References 7. ISO 27001/2 Standards · Introduction to ISO 27001 Ø Security Framework Requirements · ISO 27002 Standard · Scope · Key Clauses, Categories and Controls Ø Definition Ø Requirements 8. Business Continuity Planning (BCP) · Definition and Scope · Components of a Contingency Plan Ø Disaster Recovery Plan Ø Emergency Mode Operation Plan · Classification of Information · Classification of Threats · Types of Alternate Sites 9. Risk Management Analysis 10. General Requirements of PDCA Case Study 1: Risk Analysis Examine compliance mandates for risk analysis. Analyze how to conduct a comprehensive and thorough risk analysis to identify compliance and security deficiencies. Walk through core components of the resulting Corrective Action Plan (CAP) - your road-map for enabling a more resilient enterprise. Case Study 2: Conducting a Business Impact Analysis (BIA) Step through key activities that organizations must conduct to complete a comprehensive Business Impact Analysis (BIA). Understand critical processes for a BIA initiative and identify areas that must be addressed in a BIA Report. Case Study 3: Sample Information Security Policy Templates Step through key sections of critical information security templates in-class. Review sample policy types and organization. Training FEE: P 14,000 + Vat Training Package: Training Materials, Certificate of Completion, Meals (Lunch and AM/PM Snacks) Duration : 2 Days Time : 9:00 am to 5:00 pm Venue : Bitshield Training Room Unit 1602 Cityland 10 Tower 2 HV Dela Costa St., Salcedo Village, Makati City Note: Price is subject to change without prior notice. Minimum number of participants is required. REGISTER NOW Limited Seats Only!! ________________________________________ For reservation / inquiry please call usTel. 840.2612 Fax: 8938527 _____________________________________________ Look for Judy Or text / call 0926.1069134 j...@bitshieldsecurity.com Payment Details: Bank Deposit: Banco de Oro - Reposo Branch Account Name:Bitshield Security Consulting, Inc. Account No. 417800-9134Please fax deposit slip at 893 8527 or email scanned copy at j...@bitshieldsecurity.com If you have other concerns, please do not hesitate to contact us and we will be glad to assist you. Thank you very much and we are looking forward to have you as one of our attendees in the future. Truly yours,Judy Ann Raon | Sales Officer for TrainingBITSHIELD SECURITY CONSULTING, INC.Tel: (+632) 840-2612Fax: (+632) 893-8527 Mobile: +63926-1069134Email: j...@bitshieldsecurity.comURL: www.bitshieldsecurity.com "Protecting your information assets is our business" We practice ethical email distribution. Please accept our sincere apologies if you have received this e-mail in an unsolicited manner. If you don't want to receive from us, kindly reply with the subject "Unsubscribe" to sa...@bitshieldsecurity.com