SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
INFORMATION
TECHNOLOGY
RISK
MANAGEMENT &
LEADERSHIP

30 MARCH - 02 APRIL 2014
RADISSON BLU
DUBAI DEIRA CREEK
UNITED ARAB EMIRATES

IT
SERIES

COURSE OVERVIEW
Are you effectively securing your organization’s IT systems that store, process, or
transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and
being coordinated across all functional and business units?

YOUR INTERNATIONAL
COURSE FACILITATOR
Dr Mark T. Edmead
PhD, MBA, CISSP, CISA, COBIT

With the release IT Governance frameworks, requirements for risk management
and new international standards entering the market, the pressure is mounting
to ensure that all your IT risks are identified and the necessary action is taken – be
this to mitigate them, accept or ignore them. So, how safe is your IT system? What
are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management
process that protects the organization, not just its IT assets, and provides it with
the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking
preventive measures to reduce it to an acceptable level. It is critical that you
develop an effective risk management program that assesses and mitigates risks
within your IT systems and better manages these IT-related mission risks.

IT Transformational
Consultant
MTE Advisors
Mark T. Edmead is a successful technology entrepreneur
with over 28 years of practical experience in computer
systems architecture, information security, and project
management.
Mark excels in managing the tight-deadlines and ever
changing tasks related to mission-critical project
schedules. He has extensive knowledge in IT security, IT
and application audits, Internal Audit, IT governance,
including Sarbanes-Oxley, FDIC/FFIEC, and GLBA
compliance auditing.
Mr. Edmead understands all aspects of information
security and protection including access controls,
cryptography, security management practices, network
and Internet security, computer security law and
investigations, and physical security.

BENEFITS OF ATTENDING
Using a carefully selected case study, course participants will:

• Identify common IT project risks
• Learn how to assess threats and vulnerabilities to create a risk response strategy
• Understand what qualifies as risk with IT projects & the most common IT risk sources
• Qualify and quantify IT risks
• Learn the difference between negative and positive IT risks
• Develop an IT risk management plan
• Plan risk response methods for IT risks
• Create risk mitigation and contingency plans
• Monitor and control project risks
• Overcome resistance from stakeholders and team members

He has trained Fortune 500 and Fortune 1000 companies
in the areas of information, system, and Internet security.
He has worked with many international firms, and has the
unique ability to explain very technical concepts in
simple-to-understand terms. Mr. Edmead is a sought after
author and lecturer for information security and
information technology topics.
Mark works as an information security and regulatory
compliance consultant. He has:

• Conducted internal IT audits in the areas of critical
infrastructure/ systems and applications,
• Assessed and tested internal controls of critical
infrastructure platform systems (Windows, UNIX, IIS, SQL,
Oracle)
• Assessed and tested internal controls of various critical
financial applications.

EXCLUSIVE:
:

COURSE QUESTIONNAIRE & TAKEAWAYS

1. An extensive IT Security Architecture Questionnaire that will help you
An extensive Security Architecture Questionnaire that will help
extensive Security Architecture Questionnaire that
c
help
evaluate your organizati ’ security position.
organization’s
i ti
i
it
iti
2. FREE CoBIT 4.0 IT Governance Assessment Evaluation Spreadsheet
3. Take with you templates and worksheets to aid you in applying and putting
into practice what you have learned from this workshop.
4. FREE copy of course material, case studies, and other related items of the
training workshop

• Prepared risk assessments and determined risks to
critical financial data systems and infrastructure
c
components.
c
• Created test plans & processes and executed test plans.
• Conducted reviews of existing systems and
applications, ensuring appropriate security, management
a
and data integrity via control processes.
a

• Prepared written reports to all levels of management
• Participated in audit review panel sessions to address
results, conclusions and follow-up actions required.
r

Tel:
Tel: +6016 3326 360

Fax: +603 9205 7779

kris@360bsig oup.com
kr s@360bs group.com
kris@360bsigroup.com

1
COURSE
CONTENT
DAY1 IT RISK MANAGEMENT
LEADERSHIP WORKSHOP
IT Risk Management Leadership Workshop is a special one-day course
designed to teach information security professionals how to become an
effective information security manager. In addition, you will learn tips
and techniques that will increase your competence and confidence when
influencing information security in your organization.
Implementing IT Risk Management in an organization is a major effort.
This requires coordination with all departments. It requires interfacing
with individuals at all levels from technicians and programmers to
managers, directors, and C-level executives.
In this workshop you will learn how perform a stakeholder analysis,
outline the stakeholders required to accomplish your job, and how to
effectively navigate the possible roadblocks preventing you from
accomplishing your tasks. In addition, you will learn tips and techniques
that will increase your competence and confidence when influencing
and implementing information technology in your organization.

WHY THIS EVENT
The aim of this interactive workshop is to provide
you with the skills critical to IT Risk Management.
After attending this workshop, you will leave
fully armed with the knowledge needed
effectively secure your organization’s IT systems
& infrastructure. You will be able to establish an
effective risk management program to assess
and mitigate risk, and protect your IT assets.
The combination of interactive presentations,
hands-on exercises and open discussion groups
along with real case studies, ensures you will
obtain maximum value from attending.

Managing the IT Risk Management Process
- Creating an IT Risk Management framework
- Determining your critical success factors (CSF)
- Determining your key performance indicators (KPI)
- Challenges in managing the process
Understanding your Corporate Culture
- Understanding your organization’s trends, strategy and environment
- Tips, tricks, and trouble spots
- Developing a business continuity management culture
- Exercising, maintenance, and audit
Understanding your Stakeholders
- How to identify your key stakeholders
- Performing a stakeholder analysis
- Creating a stakeholder engagement communication plan
- Getting stakeholder engagement and support

DAY2 UNDERSTANDING THE NEED FOR
IT RISK MANAGEMENT
In this section we will discuss why is it important to consider information
technology risks and the impact if an assessment is not performed.
- Use of IT risk management in an organization
- The importance of IT risk management
- IT risk management and ownership
- What is risk assessment?
Establishing the context of risk in your business
- Why your organization needs IT risk management
- Consequences for inadequate or no IT risk management activities
- The benefits of implementing IT risk management

WHO SHOULD ATTEND
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Information Security Officers
Chief Technology Officers
IT Risk Managers
IT Security Managers
Compliance Officers
Program and Project Managers
IT Project Managers
IT Operation Managers

2
COURSE
CONTENT
DAY3 UNDERSTANDING IT SECURITY
FRAMEWORKS AND STANDARDS
An understanding of the various information technology frameworks
and standards, and the basics of information security is necessary to
better understand how to assess the risks associated with the security
implementation.
- ISO 27001
- COBIT IT Governance Framework
- NIST SP-800
Information security fundamentals
- Confidentiality, integrity, and availability
- Accountability, non-repudiation, identification
- Understanding information assurance
Developing an IT risk management strategy
- How to perform a high-level risk assessment
- Understanding your business risk appetite
- Establishing your criteria for risk acceptance
- Complying with industry, legal, and/or regulatory requirements

DAY4 UNDERSTANDING THE IMPACT OF
IT RISK TO YOUR ORGANIZATION
The risk “appetite” of an organization will vary depending on several
variables. It is critical to understand what is it that you are protecting and
the impact of a threat in the event it becomes real.
- How to identify tangible and intangible assets
- Determining the value of these assets
- Comparing asset value versus control mitigation costs
- Conducting a business impact analysis

Latest TESTIMONIALS
1

“I am impressed with the quality of teaching. I am
now more equipped to handle my job more
efficiently.”
- Okudo Anayo, ERM Financial Risk Manager, Asset Management
Corporation of Nigeria

2

“The course was very informative and an eye
opener on how to manage IT Risk in an
organization.”
- George Ochola, Manager - IT Risk, Equity Bank Limited

3

“A great & interactive course. It has enhanced my
knowledge regarding IT Risk Management. Dr.
Mark is an excellent trainer.”
- Yousif Ebrahim Faraj, Senior Lecturer, Bahrain Institute of Banking &
Finance (BIBF)

4

“The course was very interactive and informal.
There were many takeaways which will help me in
implementing Risk Management in my
organization and also help in procuring
management buy-in.”
- Aziz Ahmed, Head of IT, Wall Street Exchange Centre LLC

5

“This course covers all the essential knowledge on
IT Risk.”
- Abdullah Al-Nami, Senior Vice President for Operational Risk and MLC,
Riyad Bank

6

“The trainer well managed the interaction between
the participants and delivered the material very
professionally.”
- Adnane Ajroudi, Applications Manager, Dolphin Energy Ltd

Applying risk management controls
- Finding the right control to manage risk
- Using best practice frameworks
- How to manage residual risk
Implementing an IT risk monitoring process
- Performing periodic reviews
- How to reporting IT risk status
- Creating a risk reporting plan
The IT Risk Management Document
- Outline of the IT Risk Management document
- Keeping your document up-to-date
- Getting stakeholder support and acceptance

COURSE SCHEDULE
8.00
8.30
10.10 - 10.30
12.00 - 13.00
14.40 - 15.00
16.00

Registration & Coffee/Tea
Workshop commences
Morning coffee/tea
Lunch
Afternoon coffee/tea
End of day
3
INFORMATION
TECHNOLOGY
RISK
MANAGEMENT &
LEADERSHIP

REGISTRATION FORM
Fax: +603 9205 7779
Tel: +603 9205 7772
Mobile: +6016 3326 360

30 MARCH - 02 APRIL 2014
RADISSON BLU
DUBAI DEIRA CREEK
UAE

Email: kris@360bsigroup.com

DELEGATES
1

Name

IN-HOUSE TRAINING

:

360 BSI is passionate about providing strategic IT programs
and high potential training solutions across the region to build
personal competencies and organizational capability.

Name on tag :
Job Title :
Email

2

:

Mobile

:

Name

You will receive practical training from a professionally
qualified educator with over twenty years of teaching and
training experience.

:

Please feel free to mix-and-match topics from the areas listed
below to get the right training content for your staff. Other
topics may be available upon request.

Name on tag :

OTHER RELATED PUBLIC COURSES

Job Title :
Email
Mobile
3

:

Name

IT Governance
Service Oriented Architecture (SOA)
Business Continuity and Disaster Recovery
Preparing for the CISSP exam
Information Security Management Principles
IT Change Management
IT Project Management

:

:

Name on tag :
Job Title :
Email
Mobile

Hotel Contact Details:

:
:

For Room Reservation, contact for 360BSI corporate rates.
Telephone: 00971 4 2057105 Fax: 00971 4 2234698
E-mail: reservations.dxbza@radissonblu.com
Radisson BLU Hotel, Dubai Deira Creek
Baniyas Road, P.O. Box 476, Dubai, UAE

AUTHORIZATION

(This form is invalid without a signature)
Name
Job Title

:

Email

:

Tel :

(

General Information:

:

1
2
3
4
5

)

Cancellations/Substitutions

Organization :

Substitutions are welcome at any time. Please notify us at
least 2 working days prior to the event. All cancellations will
carry a 10% cancellation fee, once a registration form is
received. All cancellations must be in writing by fax or email
at least 2 weeks before the event date. Cancellations with
less than 2 weeks prior to the event date carry a 100% liability.
However, course materials will still be couriered to you.

Address :

Signature :

Registrations close ONE (1) week before the training dates.
The fees cover lunch, tea breaks, materials and certificate.
Official confirmation will be sent, once registration has been
received.
Participants will need to arrange their own accommodation.
Attire: Smart Casual

Date:

/

/

FEES

USD 2,995 per delegate
USD 8,085 - Special for Group of 3
USD 12,000 - Special for Group of 5
The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable
the client has to ensure that the taxes are paid on top of the investment fee paid for the course.
Compliance with the local tax laws is the responsibility of the client.

* Save up to 50% for In-house Training program

Thank you for your registration!

PAYMENT DETAILS
Payment is required within 5 days upon receipt of
the invoice.
Bank transfer:
360 BSI MIDDLE EAST LIMITED
Abu Dhabi Commercial Bank
Dubai Mall Branch, P.O.Box 49124 Dubai, U.A.E
Account No: 10065721319001
Swift No: ADCBAEAAXXX
IBAN No: AE780030010065721319001

All payments must be received prior to the event date

©

360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia.

www.360bsi.com/IT

4

Mais conteúdo relacionado

Mais procurados

Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk managementG3 intelligence Ltd
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...festival ICT 2016
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 StandardTharindunuwan9
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 

Mais procurados (20)

Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 

Destaque

Unit testing, UI testing and Test Driven Development in Visual Studio 2012
Unit testing, UI testing and Test Driven Development in Visual Studio 2012Unit testing, UI testing and Test Driven Development in Visual Studio 2012
Unit testing, UI testing and Test Driven Development in Visual Studio 2012Jacinto Limjap
 
Visual Studio ALM 2013 - Edition Comparison
Visual Studio ALM 2013 - Edition ComparisonVisual Studio ALM 2013 - Edition Comparison
Visual Studio ALM 2013 - Edition ComparisonSteve Lange
 
Application Lifecycle management Utilizando ferramentas Microsoft
Application Lifecycle management Utilizando ferramentas MicrosoftApplication Lifecycle management Utilizando ferramentas Microsoft
Application Lifecycle management Utilizando ferramentas MicrosoftLuís Cesar Teodoro
 
Visual Studio Team Services Extensions by Taavi Kõosaar (@melborp)
Visual Studio Team Services Extensions by Taavi Kõosaar (@melborp)Visual Studio Team Services Extensions by Taavi Kõosaar (@melborp)
Visual Studio Team Services Extensions by Taavi Kõosaar (@melborp).NET Crowd
 
What's new in Visual Studio 2013 & TFS 2013
What's new in Visual Studio 2013 & TFS 2013What's new in Visual Studio 2013 & TFS 2013
What's new in Visual Studio 2013 & TFS 2013Danijel Malik
 
Advanced Coded UI Testing
Advanced Coded UI TestingAdvanced Coded UI Testing
Advanced Coded UI TestingShai Raiten
 
Scaling Agile: SAFe with Visual Studio Team Foundation Server
Scaling Agile: SAFe with Visual Studio Team Foundation Server Scaling Agile: SAFe with Visual Studio Team Foundation Server
Scaling Agile: SAFe with Visual Studio Team Foundation Server InCycle Software
 
Agile project management with visual studio tfs 2013 - My presentation at Reg...
Agile project management with visual studio tfs 2013 - My presentation at Reg...Agile project management with visual studio tfs 2013 - My presentation at Reg...
Agile project management with visual studio tfs 2013 - My presentation at Reg...Om Prakash Bang
 

Destaque (10)

Unit testing, UI testing and Test Driven Development in Visual Studio 2012
Unit testing, UI testing and Test Driven Development in Visual Studio 2012Unit testing, UI testing and Test Driven Development in Visual Studio 2012
Unit testing, UI testing and Test Driven Development in Visual Studio 2012
 
Visual Studio ALM 2013 - Edition Comparison
Visual Studio ALM 2013 - Edition ComparisonVisual Studio ALM 2013 - Edition Comparison
Visual Studio ALM 2013 - Edition Comparison
 
Application Lifecycle management Utilizando ferramentas Microsoft
Application Lifecycle management Utilizando ferramentas MicrosoftApplication Lifecycle management Utilizando ferramentas Microsoft
Application Lifecycle management Utilizando ferramentas Microsoft
 
Visual Studio Team Services Extensions by Taavi Kõosaar (@melborp)
Visual Studio Team Services Extensions by Taavi Kõosaar (@melborp)Visual Studio Team Services Extensions by Taavi Kõosaar (@melborp)
Visual Studio Team Services Extensions by Taavi Kõosaar (@melborp)
 
What's new in Visual Studio 2013 & TFS 2013
What's new in Visual Studio 2013 & TFS 2013What's new in Visual Studio 2013 & TFS 2013
What's new in Visual Studio 2013 & TFS 2013
 
Advanced Coded UI Testing
Advanced Coded UI TestingAdvanced Coded UI Testing
Advanced Coded UI Testing
 
Scrum with VS2010
Scrum with VS2010  Scrum with VS2010
Scrum with VS2010
 
ASP.NET Web form
ASP.NET Web formASP.NET Web form
ASP.NET Web form
 
Scaling Agile: SAFe with Visual Studio Team Foundation Server
Scaling Agile: SAFe with Visual Studio Team Foundation Server Scaling Agile: SAFe with Visual Studio Team Foundation Server
Scaling Agile: SAFe with Visual Studio Team Foundation Server
 
Agile project management with visual studio tfs 2013 - My presentation at Reg...
Agile project management with visual studio tfs 2013 - My presentation at Reg...Agile project management with visual studio tfs 2013 - My presentation at Reg...
Agile project management with visual studio tfs 2013 - My presentation at Reg...
 

Semelhante a IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE

IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...360 BSI
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...cyberprosocial
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in ManufacturingWilliam McBorrough
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 

Semelhante a IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE (20)

IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 

Mais de 360 BSI

Information Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big DataInformation Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big Data360 BSI
 
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAEEffective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAEEffective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...360 BSI
 
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...360 BSI
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE360 BSI
 
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia360 BSI
 
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...360 BSI
 
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...360 BSI
 
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia360 BSI
 
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAEEffective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE360 BSI
 
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...360 BSI
 
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...360 BSI
 
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAEEffective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE360 BSI
 
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...Effective Communication, Presentation Skills & Report Writing 10-13 October 2...
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...360 BSI
 
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...360 BSI
 
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...360 BSI
 

Mais de 360 BSI (20)

Information Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big DataInformation Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big Data
 
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAEEffective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAEEffective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
 
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
 
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
 
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
 
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
 
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
 
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAEEffective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
 
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
 
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
 
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAEEffective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
 
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...Effective Communication, Presentation Skills & Report Writing 10-13 October 2...
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...
 
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...
 
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...
 

Último

Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 

Último (20)

Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 

IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE

  • 1. INFORMATION TECHNOLOGY RISK MANAGEMENT & LEADERSHIP 30 MARCH - 02 APRIL 2014 RADISSON BLU DUBAI DEIRA CREEK UNITED ARAB EMIRATES IT SERIES COURSE OVERVIEW Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information? Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units? YOUR INTERNATIONAL COURSE FACILITATOR Dr Mark T. Edmead PhD, MBA, CISSP, CISA, COBIT With the release IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to? The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission. Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks. IT Transformational Consultant MTE Advisors Mark T. Edmead is a successful technology entrepreneur with over 28 years of practical experience in computer systems architecture, information security, and project management. Mark excels in managing the tight-deadlines and ever changing tasks related to mission-critical project schedules. He has extensive knowledge in IT security, IT and application audits, Internal Audit, IT governance, including Sarbanes-Oxley, FDIC/FFIEC, and GLBA compliance auditing. Mr. Edmead understands all aspects of information security and protection including access controls, cryptography, security management practices, network and Internet security, computer security law and investigations, and physical security. BENEFITS OF ATTENDING Using a carefully selected case study, course participants will: • Identify common IT project risks • Learn how to assess threats and vulnerabilities to create a risk response strategy • Understand what qualifies as risk with IT projects & the most common IT risk sources • Qualify and quantify IT risks • Learn the difference between negative and positive IT risks • Develop an IT risk management plan • Plan risk response methods for IT risks • Create risk mitigation and contingency plans • Monitor and control project risks • Overcome resistance from stakeholders and team members He has trained Fortune 500 and Fortune 1000 companies in the areas of information, system, and Internet security. He has worked with many international firms, and has the unique ability to explain very technical concepts in simple-to-understand terms. Mr. Edmead is a sought after author and lecturer for information security and information technology topics. Mark works as an information security and regulatory compliance consultant. He has: • Conducted internal IT audits in the areas of critical infrastructure/ systems and applications, • Assessed and tested internal controls of critical infrastructure platform systems (Windows, UNIX, IIS, SQL, Oracle) • Assessed and tested internal controls of various critical financial applications. EXCLUSIVE: : COURSE QUESTIONNAIRE & TAKEAWAYS 1. An extensive IT Security Architecture Questionnaire that will help you An extensive Security Architecture Questionnaire that will help extensive Security Architecture Questionnaire that c help evaluate your organizati ’ security position. organization’s i ti i it iti 2. FREE CoBIT 4.0 IT Governance Assessment Evaluation Spreadsheet 3. Take with you templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop. 4. FREE copy of course material, case studies, and other related items of the training workshop • Prepared risk assessments and determined risks to critical financial data systems and infrastructure c components. c • Created test plans & processes and executed test plans. • Conducted reviews of existing systems and applications, ensuring appropriate security, management a and data integrity via control processes. a • Prepared written reports to all levels of management • Participated in audit review panel sessions to address results, conclusions and follow-up actions required. r Tel: Tel: +6016 3326 360 Fax: +603 9205 7779 kris@360bsig oup.com kr s@360bs group.com kris@360bsigroup.com 1
  • 2. COURSE CONTENT DAY1 IT RISK MANAGEMENT LEADERSHIP WORKSHOP IT Risk Management Leadership Workshop is a special one-day course designed to teach information security professionals how to become an effective information security manager. In addition, you will learn tips and techniques that will increase your competence and confidence when influencing information security in your organization. Implementing IT Risk Management in an organization is a major effort. This requires coordination with all departments. It requires interfacing with individuals at all levels from technicians and programmers to managers, directors, and C-level executives. In this workshop you will learn how perform a stakeholder analysis, outline the stakeholders required to accomplish your job, and how to effectively navigate the possible roadblocks preventing you from accomplishing your tasks. In addition, you will learn tips and techniques that will increase your competence and confidence when influencing and implementing information technology in your organization. WHY THIS EVENT The aim of this interactive workshop is to provide you with the skills critical to IT Risk Management. After attending this workshop, you will leave fully armed with the knowledge needed effectively secure your organization’s IT systems & infrastructure. You will be able to establish an effective risk management program to assess and mitigate risk, and protect your IT assets. The combination of interactive presentations, hands-on exercises and open discussion groups along with real case studies, ensures you will obtain maximum value from attending. Managing the IT Risk Management Process - Creating an IT Risk Management framework - Determining your critical success factors (CSF) - Determining your key performance indicators (KPI) - Challenges in managing the process Understanding your Corporate Culture - Understanding your organization’s trends, strategy and environment - Tips, tricks, and trouble spots - Developing a business continuity management culture - Exercising, maintenance, and audit Understanding your Stakeholders - How to identify your key stakeholders - Performing a stakeholder analysis - Creating a stakeholder engagement communication plan - Getting stakeholder engagement and support DAY2 UNDERSTANDING THE NEED FOR IT RISK MANAGEMENT In this section we will discuss why is it important to consider information technology risks and the impact if an assessment is not performed. - Use of IT risk management in an organization - The importance of IT risk management - IT risk management and ownership - What is risk assessment? Establishing the context of risk in your business - Why your organization needs IT risk management - Consequences for inadequate or no IT risk management activities - The benefits of implementing IT risk management WHO SHOULD ATTEND Vice Presidents, Directors, General Managers Chief Information Officers Chief Information Security Officers Chief Technology Officers IT Risk Managers IT Security Managers Compliance Officers Program and Project Managers IT Project Managers IT Operation Managers 2
  • 3. COURSE CONTENT DAY3 UNDERSTANDING IT SECURITY FRAMEWORKS AND STANDARDS An understanding of the various information technology frameworks and standards, and the basics of information security is necessary to better understand how to assess the risks associated with the security implementation. - ISO 27001 - COBIT IT Governance Framework - NIST SP-800 Information security fundamentals - Confidentiality, integrity, and availability - Accountability, non-repudiation, identification - Understanding information assurance Developing an IT risk management strategy - How to perform a high-level risk assessment - Understanding your business risk appetite - Establishing your criteria for risk acceptance - Complying with industry, legal, and/or regulatory requirements DAY4 UNDERSTANDING THE IMPACT OF IT RISK TO YOUR ORGANIZATION The risk “appetite” of an organization will vary depending on several variables. It is critical to understand what is it that you are protecting and the impact of a threat in the event it becomes real. - How to identify tangible and intangible assets - Determining the value of these assets - Comparing asset value versus control mitigation costs - Conducting a business impact analysis Latest TESTIMONIALS 1 “I am impressed with the quality of teaching. I am now more equipped to handle my job more efficiently.” - Okudo Anayo, ERM Financial Risk Manager, Asset Management Corporation of Nigeria 2 “The course was very informative and an eye opener on how to manage IT Risk in an organization.” - George Ochola, Manager - IT Risk, Equity Bank Limited 3 “A great & interactive course. It has enhanced my knowledge regarding IT Risk Management. Dr. Mark is an excellent trainer.” - Yousif Ebrahim Faraj, Senior Lecturer, Bahrain Institute of Banking & Finance (BIBF) 4 “The course was very interactive and informal. There were many takeaways which will help me in implementing Risk Management in my organization and also help in procuring management buy-in.” - Aziz Ahmed, Head of IT, Wall Street Exchange Centre LLC 5 “This course covers all the essential knowledge on IT Risk.” - Abdullah Al-Nami, Senior Vice President for Operational Risk and MLC, Riyad Bank 6 “The trainer well managed the interaction between the participants and delivered the material very professionally.” - Adnane Ajroudi, Applications Manager, Dolphin Energy Ltd Applying risk management controls - Finding the right control to manage risk - Using best practice frameworks - How to manage residual risk Implementing an IT risk monitoring process - Performing periodic reviews - How to reporting IT risk status - Creating a risk reporting plan The IT Risk Management Document - Outline of the IT Risk Management document - Keeping your document up-to-date - Getting stakeholder support and acceptance COURSE SCHEDULE 8.00 8.30 10.10 - 10.30 12.00 - 13.00 14.40 - 15.00 16.00 Registration & Coffee/Tea Workshop commences Morning coffee/tea Lunch Afternoon coffee/tea End of day 3
  • 4. INFORMATION TECHNOLOGY RISK MANAGEMENT & LEADERSHIP REGISTRATION FORM Fax: +603 9205 7779 Tel: +603 9205 7772 Mobile: +6016 3326 360 30 MARCH - 02 APRIL 2014 RADISSON BLU DUBAI DEIRA CREEK UAE Email: kris@360bsigroup.com DELEGATES 1 Name IN-HOUSE TRAINING : 360 BSI is passionate about providing strategic IT programs and high potential training solutions across the region to build personal competencies and organizational capability. Name on tag : Job Title : Email 2 : Mobile : Name You will receive practical training from a professionally qualified educator with over twenty years of teaching and training experience. : Please feel free to mix-and-match topics from the areas listed below to get the right training content for your staff. Other topics may be available upon request. Name on tag : OTHER RELATED PUBLIC COURSES Job Title : Email Mobile 3 : Name IT Governance Service Oriented Architecture (SOA) Business Continuity and Disaster Recovery Preparing for the CISSP exam Information Security Management Principles IT Change Management IT Project Management : : Name on tag : Job Title : Email Mobile Hotel Contact Details: : : For Room Reservation, contact for 360BSI corporate rates. Telephone: 00971 4 2057105 Fax: 00971 4 2234698 E-mail: reservations.dxbza@radissonblu.com Radisson BLU Hotel, Dubai Deira Creek Baniyas Road, P.O. Box 476, Dubai, UAE AUTHORIZATION (This form is invalid without a signature) Name Job Title : Email : Tel : ( General Information: : 1 2 3 4 5 ) Cancellations/Substitutions Organization : Substitutions are welcome at any time. Please notify us at least 2 working days prior to the event. All cancellations will carry a 10% cancellation fee, once a registration form is received. All cancellations must be in writing by fax or email at least 2 weeks before the event date. Cancellations with less than 2 weeks prior to the event date carry a 100% liability. However, course materials will still be couriered to you. Address : Signature : Registrations close ONE (1) week before the training dates. The fees cover lunch, tea breaks, materials and certificate. Official confirmation will be sent, once registration has been received. Participants will need to arrange their own accommodation. Attire: Smart Casual Date: / / FEES USD 2,995 per delegate USD 8,085 - Special for Group of 3 USD 12,000 - Special for Group of 5 The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable the client has to ensure that the taxes are paid on top of the investment fee paid for the course. Compliance with the local tax laws is the responsibility of the client. * Save up to 50% for In-house Training program Thank you for your registration! PAYMENT DETAILS Payment is required within 5 days upon receipt of the invoice. Bank transfer: 360 BSI MIDDLE EAST LIMITED Abu Dhabi Commercial Bank Dubai Mall Branch, P.O.Box 49124 Dubai, U.A.E Account No: 10065721319001 Swift No: ADCBAEAAXXX IBAN No: AE780030010065721319001 All payments must be received prior to the event date © 360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia. www.360bsi.com/IT 4