This four-day event will guide you through the basics of establishing and managing an information security program in today’s business environment. This class will cover internal and external threats, effective security policies, contingency planning, legislation, regulations, employee privacy issues, awareness programs and more. You will learn about emerging security architectural issues and technologies to assist you, how they can affect computer security in your organization, and what you can do to provide a secure environment as technologies evolve.
Participants will learn the components of a comprehensive strategy, covering such critical areas as planning and managing a security program, getting the business more involved with information security, developing an enterprise security architecture, establishing identity and access control management and network perimeter protection, ensuring physical protection of your business and computing facilities, and complying with the legal and regulatory aspects of information security. The agenda will focus on risk analysis and business impact analysis (BIA) as tested methodologies for measuring the level of security risk and prioritizing information risk reduction in your organization. You are invited to bring your own information risk analysis evaluation criteria and targets, and explore how you can make best use of today’s techniques.
In addition, if you audit the security environment, this course will help you identify the essential elements that need to be developed and in place for your organization to maintain effective controls. Throughout the seminar videos, real-life scenarios and case studies will reinforce learning. You will leave this pragmatic course with a blueprint for building an effective information security program or for measuring an existing one.