SlideShare uma empresa Scribd logo
1 de 34
Copyright © 2015 ITpreneurs. All rights reserved.
#ITpreneursLIVE Go-To-Market
CISSP, CISM and CRISC:
Help your Clients Raise
the Information Security
Bar
Copyright © 2015 ITpreneurs. All rights reserved.
Welcome
Deborah Burton
Channel Marketing Manager
Copyright © 2015 ITpreneurs. All rights reserved.
Low Barrier & High Impact:
How ITpreneurs can help increase revenues and save costs
Stay on the Cutting-Edge
Access a Comprehensive Library
Enjoy Convenience
Save content Costs by up to 80%
● No Content Development Costs
● No Content Maintenance Costs
● Lower costs with increased usage
● 1000+ Titles
● Across most IT Domains
● 12 Languages
● Anytime, Anywhere ordering
● Marketing Support
● Exam Services
● Accreditation
● Trainer Services
● First to Market
● Consistent Quality
● Various Delivery Formats
● Always Up-to-Date
● Partner Enablement
Copyright © 2015 ITpreneurs. All rights reserved.
Webinar: Help Your Clients
Raise the information
Security Bar
Copyright © 2015 ITpreneurs. All rights reserved.
Today’s Speakers
Moderator:
Connie Tai
Marketing Manager, ITpreneurs
Presenter:
Miroslaw Dabrowski
IT Consultant, Agile Coach, Trainer, Courseware Author
ASL BiSL Foundation Ambassador Poland; OBASHI Ambassador Programme Leader
Copyright © 2015 ITpreneurs. All rights reserved.
Agenda
Copyright © 2015 ITpreneurs. All rights reserved.
● The Evolving Information Security Training Landscape
● CISSP, CISM, CRISC - Some of the highest
in-demand information security framework
● Go-To-Market Strategies
● Advantages of Using ITpreneurs Materials
● How to get started
Today You Will Learn
Copyright © 2015 ITpreneurs. All rights reserved.
Information Security
Landscape
Copyright © 2015 ITpreneurs. All rights reserved.
Information & Network & Cyber Security
NIST definitions:
Information Security (not just IT Security):
Protecting information and information
systems to provide (aka CIA triad):
1) confidentiality
2) integrity
3) availability of information
Network Security:
The protection of all data that leaves or
enters the local PC or local server from the
network.
Cybersecurity:
The ability to protect or defend the use of
cyberspace from cyber attacks.
Information Security
Network Security
Cyber Security
Anything Security-related
in the cyber realm
Anything involving security
of information systems
regardless of realm
Copyright © 2015 ITpreneurs. All rights reserved.
According to the UK National Audit Office, it could take up to 20 years to
address the current skills gap. (Source: The Guardian, 26 September 2013)
47% of organizations say that the number of employees dedicated to
network security is inadequate in some, most, or all cases. (Source:
Network World September 2014)
86% of respondents see a global cybersecurity skills gap - and 92% of
those planning to hire more cybersecurity professionals this year say they
expect to have difficulty finding a skilled candidate (Source: ISACA Global
Cybersecurity Report January 2015)
Alarming Data on InfoSec Skills Shortage
Copyright © 2015 ITpreneurs. All rights reserved.
Skills in Demand in the Coming Years
Source: Robert Half Technology 2013, 2014 & 2015 IT Salary Guides
Copyright © 2015 ITpreneurs. All rights reserved.
Founded in 1969 as the EDP Auditors Association
Since 1978, CISA has been a globally accepted standard of competency among
IS audit, control, assurance and security professionals
More than 120,000 members in over 180 countries
More than 200 chapters worldwide
More than 100,000 people certified
ISACA
Copyright © 2015 ITpreneurs. All rights reserved.
ISACA
CISA CISM CRISC CGEIT
Career Path
Lead IT Auditor Chief (Information) Security
Officer (CSO / CISO)
Chief Risk Officer
(CRO)
Chief Information Officer
(CIO)
Focus IT Audit Information Security Risk Management IT Governance
Work Performed
Provide assurance by
conducting audits and
assessments of information
systems
Oversee, direct and
manage information
security activities
Identify, evaluate and
manage risk through the
development,
implementation and
maintenance of information
systems controls
Define, establish, maintain
and manage a framework
of IT governance
Requirements
Submit verified evidence of
a minimum of 5 years of
verifiable IS audit, control
or security experience
(substitutions available)
Submit verified evidence of
a minimum of 5 years of
information security
management work
experience (covering 3 of
the 4 job practice domains
Submit verified evidence of
a minimum of 3 years of
risk and information
systems controls
experience (covering 3 of
the 5 job practice domains)
Submit verified evidence of
the 5 years experience
requirements as defined by
the CGEIT Job Practice
Additional requirements
● Adhere to the ISACA Code of Professional Ethics
● Comply with the CGEIT Continuing Education Policy
Copyright © 2015 ITpreneurs. All rights reserved.
Founded in 1988 as Consortium
Since 1998, CISSP has been a globally accepted standard of competency
among Information Security
More than 70,000 members in over 140 countries
More than 100,000 people certified
ISC2
Copyright © 2015 ITpreneurs. All rights reserved.
Globally recognized standard of achievement Common Body of Knowledge
For experienced professionals in the computer security field. Candidates must
have five years of direct full-time professional security work experience in two or
more of the ten domains of the (ISC)² CISSP CBK
CISSP
CISSP holders often hold job functions including
● Security Consultant
● Security Manager
● IT Director/Manager
● Security Auditor
● Security Architect
● Security Analyst
● Security Systems Engineer
● Chief Information Security Officer
● Director of Security
● Network Architect
Copyright © 2015 ITpreneurs. All rights reserved.
The CISSP exam is based on the following 10 domains:
● Access Control
● Telecommunications and Network Security
● Information Security Governance and Risk Management
● Software Development Security
● Cryptography
● Security Architecture and Design
● Operations Security
● Business Continuity and Disaster Recovery Planning
● Legal, Regulations, Investigations, and Compliance
● Physical (Environmental) Security
CISSP Certification Proves a Mastery of IT
Security and Information Assurance
Copyright © 2015 ITpreneurs. All rights reserved.
Why do people always refer to this standard when they talk about information
security framework?
The ISO 27000 family of standards helps organizations keep information assets
secure. Using this family of standards will help your organization manage the
security of assets such as financial information, intellectual property, employee
details or information entrusted to you by third parties. ISO/IEC 27001 is the
best-known standard in the family providing requirements for an information
security management system (ISMS). (Source: www.iso.org)
ISO/IEC 27001:2013 Standard
Copyright © 2014 ITpreneurs. All rights reserved.
Go-To-Market
Strategies
Copyright © 2015 ITpreneurs. All rights reserved.
● Protect business assets and repair vulnerabilities
● Be compliant with regulatory requirements
● Build trust with customers to ensure business success
● Corporate Reputation
Key Drivers for Information Security Training
Copyright © 2014 ITpreneurs. All rights reserved.
Who are you talking to? Understanding
different Stakeholders’ Perspective
and so should your sales pitch…...
• More than 3,000
companies in the U.S.
were victims of a
cyberattack last year,
costing an estimated
$445 billion - how
well-protected are we
against operational
and reputational
damage from cyber
attacks?
• Have we aligned our
cybersecurity strategy to
our risk appetite and the
overall risk environment.
• Cyber attacks can invite
greater regulatory scrutiny,
which in turn increases
organizational costs - Have
we addressed this risk
properly?
CEO CIO/CISO CFO
• I want security to support
the business objectives
• Challenges to find qualified
staff to build the team to
meet requirements and
performance standards
Decision criteria vary…
Copyright © 2014 ITpreneurs. All rights reserved.
When you talk to individual learners ...
Employers look to certifications as measure of excellence and quality. Get
certified pays off in increased in salary. Among the top-paying certifications:
● Certified in Risk and Information Systems Control (CRISC) $119,227
● Certified Information Security Manager (CISM) $118,348
● Certified Information Systems Security Professional (CISSP) $110,603
Source: 2015 IT Skills and Salary Survey conducted by Global Knowledge and Windows IT Pro
Copyright © 2014 ITpreneurs. All rights reserved.
On the pyramid of needs among IT organizations, what will
be the resistance to invest in cyber security or information
security training?
What if the maturity of the IT organization is low - should
information security be put on the top of the list?
Potential Barriers
Copyright © 2014 ITpreneurs. All rights reserved.
Open-enrollment vs In-house training
Positioning Your Training Offering
Copyright © 2015 ITpreneurs. All rights reserved.
Advantages of using
ITpreneurs
Courseware
Copyright © 2015 ITpreneurs. All rights reserved.
● ISACA does not provide official examination Syllabus
● ISACA exam scope is updated yearly with publishing new Review Manuals
each year
● Based on changes and trends in the market, ISACA updates it’s certification
scope
● ITPreneurs pays close attention to those changes
ISACA and ISC2 Exams are Pragmatic
Copyright © 2015 ITpreneurs. All rights reserved.
No software license, no installation required. Available via web browser
Interactive Mind Maps from ISACA portfolio
Copyright © 2015 ITpreneurs. All rights reserved.
Get Started:
www.itpreneurs.com
Copyright © 2015 ITpreneurs. All rights reserved.
Available Soon ...
ISC2 CISSP Exam Prep - 5 Days
ISACA CISA Exam Prep - 4 Days
ISACA CISM Exam Prep - 4 Days
ISACA CRISC Exam Prep - 4 Days
ISACA CGEIT Exam Prep - 4 Days
Copyright © 2014 ITpreneurs. All rights reserved.
Intermediate
Level
(applied skills)
Best Practices // Methods Technology // Tools
Foundation
Level
(common
knowledge)
Cyber
Resilience
Foundation
EXIN Info
Security
Foundation
CISSP
Information Security Portfolio
Secure
Coding
Foundation
Cyber
Security
Portfolio
EXIN Info
Security
Advanced
ISO 27001
Foundation
CISACISM
Ethical
Hacking
Foundation
Data
Privacy
Officer
ISO 27001
Lead
Implement.
ISO 27001
Lead
Auditor
Cyber
Resilience
Practitioner
CCSK
Foundation
Risk
Portfolio
Although the Contents contained herein are provided under the highest professional standards in the generation of these forecasts, ITpreneurs does not guarantee the
accuracy or completeness of any information contained herein.
Copyright © 2014 ITpreneurs. All rights reserved.
Intermediate
Level
(applied skills)
Best Practices // Methods Technology // Tools
Foundation
Level
(common
knowledge)
Cyber
Resilience
Foundation
EXIN Info
Security
Foundation
CRISC
COBIT 5
Auditor
CGEIT
Risk & Governance Portfolio
Information
Security
Portfolio
CISACISM
ISO 22301
Foundation
Open Group
FAIR
ISO 22301
Lead
Auditor
ISO 22301
Lead
Implement.
COBIT 5
Implement.
M_o_R
Foundation
COBIT 5
Foundation
ISO 31000
Foundation
Oceans99
Simulation
Governance
of Info Sec
workshop
Although the Contents contained herein are provided under the highest professional standards in the generation of these forecasts, ITpreneurs does not
guarantee the accuracy or completeness of any information contained herein.
Although the Contents contained herein are provided under the highest professional standards in the generation of these forecasts, ITpreneurs does not guarantee the
accuracy or completeness of any information contained herein.
Copyright © 2015 ITpreneurs. All rights reserved.
How You Can Get Started 1/2
Partner
A Full Service
Partner
B Use Your own trainer
Partner
C Only use our Courseware
Courseware Exams Services Trainers
Courseware Exams Services
Courseware Exams
Copyright © 2015 ITpreneurs. All rights reserved.
How You Can Get Started 2/2
Visit the ITpreneurs.com Website
Review the Product of Interest
Get in touch either through the Contact
Form, send us an email, or call!
Copyright © 2015 ITpreneurs. All rights reserved.
Q&A
Copyright © 2015 ITpreneurs. All rights reserved.
+31 107.110.260
marketing@itpreneurs.com
Contact Us
Connie Tai
Products & Solutions Marketing
ITpreneurs | Rotterdam | The Netherlands

Mais conteúdo relacionado

Mais procurados

Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Global Business Events
 
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?PECB
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdfAkhil Kumar
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Cdpse course content infosec train
Cdpse course content infosec trainCdpse course content infosec train
Cdpse course content infosec trainShivamSharma909
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITShivamSharma909
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
CISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersCISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersNUS-ISS
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceChristian F. Nissen
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdSabrina Chan
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOisc2-hellenic
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security TestingPECB
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - KloudlearnKloudLearn
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015Paul Hogan
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesControlCase
 

Mais procurados (20)

Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdf
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Cdpse course content infosec train
Cdpse course content infosec trainCdpse course content infosec train
Cdpse course content infosec train
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
Resume-DPITVlinkedin
Resume-DPITVlinkedinResume-DPITVlinkedin
Resume-DPITVlinkedin
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
CISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersCISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security Leaders
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 

Destaque

How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Examkoidis
 
Presentatie internationaal humanisme
Presentatie internationaal humanismePresentatie internationaal humanisme
Presentatie internationaal humanismeAdri Martens
 
ISACA Certification Brochure directed at Consulting Firms
ISACA Certification Brochure directed at Consulting FirmsISACA Certification Brochure directed at Consulting Firms
ISACA Certification Brochure directed at Consulting FirmsCaroline Bombart
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?Phil Agcaoili
 
PMP Certification Trends May 2012
PMP Certification Trends May 2012PMP Certification Trends May 2012
PMP Certification Trends May 2012projectation
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
An introduction to the CISSP certification for self study groups
An introduction to the CISSP certification for self study groupsAn introduction to the CISSP certification for self study groups
An introduction to the CISSP certification for self study groupsTomas Ericsson
 
Business information systems in your career
Business information systems in your careerBusiness information systems in your career
Business information systems in your careerProf. Othman Alsalloum
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
Memória de aula 05 segurança e auditoria de sistemas - organizando a segurança
Memória de aula 05   segurança e auditoria de sistemas - organizando a segurançaMemória de aula 05   segurança e auditoria de sistemas - organizando a segurança
Memória de aula 05 segurança e auditoria de sistemas - organizando a segurançaPaulo Garcia
 

Destaque (16)

How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Exam
 
Final
FinalFinal
Final
 
Presentatie internationaal humanisme
Presentatie internationaal humanismePresentatie internationaal humanisme
Presentatie internationaal humanisme
 
ISACA Certification Brochure directed at Consulting Firms
ISACA Certification Brochure directed at Consulting FirmsISACA Certification Brochure directed at Consulting Firms
ISACA Certification Brochure directed at Consulting Firms
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
 
PMP Certification Trends May 2012
PMP Certification Trends May 2012PMP Certification Trends May 2012
PMP Certification Trends May 2012
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Top 9 Certifications
Top 9 CertificationsTop 9 Certifications
Top 9 Certifications
 
An introduction to the CISSP certification for self study groups
An introduction to the CISSP certification for self study groupsAn introduction to the CISSP certification for self study groups
An introduction to the CISSP certification for self study groups
 
Business information systems in your career
Business information systems in your careerBusiness information systems in your career
Business information systems in your career
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Memória de aula 05 segurança e auditoria de sistemas - organizando a segurança
Memória de aula 05   segurança e auditoria de sistemas - organizando a segurançaMemória de aula 05   segurança e auditoria de sistemas - organizando a segurança
Memória de aula 05 segurança e auditoria de sistemas - organizando a segurança
 
Zachman Framework graphics v3.0
Zachman Framework graphics v3.0Zachman Framework graphics v3.0
Zachman Framework graphics v3.0
 
TRIO BC/DR
TRIO BC/DRTRIO BC/DR
TRIO BC/DR
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 

Semelhante a How Training and Consulting Companies Can Position CISSP, CISM and CRISC

IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Protect Intellectual Property While Offshore Outsourcing
Protect Intellectual Property  While Offshore OutsourcingProtect Intellectual Property  While Offshore Outsourcing
Protect Intellectual Property While Offshore OutsourcingR Systems International
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationITpreneurs
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationKoenig Solutions Ltd.
 
Meeting your Compliance objectives with ease and without incurring a high cost
 Meeting your Compliance objectives with ease and without incurring a high cost  Meeting your Compliance objectives with ease and without incurring a high cost
Meeting your Compliance objectives with ease and without incurring a high cost Mithi Software Technologies Pvt Ltd
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationSyed Azher
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?PECB
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure GeneralCaroline Bombart
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdfControlCase
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 

Semelhante a How Training and Consulting Companies Can Position CISSP, CISM and CRISC (20)

IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Protect Intellectual Property While Offshore Outsourcing
Protect Intellectual Property  While Offshore OutsourcingProtect Intellectual Property  While Offshore Outsourcing
Protect Intellectual Property While Offshore Outsourcing
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
CobiT Foundation Free Training
CobiT Foundation Free TrainingCobiT Foundation Free Training
CobiT Foundation Free Training
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
Meeting your Compliance objectives with ease and without incurring a high cost
 Meeting your Compliance objectives with ease and without incurring a high cost  Meeting your Compliance objectives with ease and without incurring a high cost
Meeting your Compliance objectives with ease and without incurring a high cost
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
Microtek learning
Microtek learningMicrotek learning
Microtek learning
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
CGI Final
CGI FinalCGI Final
CGI Final
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure General
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 

Mais de ITpreneurs

CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things FoundationITpreneurs
 
TOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneursTOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneursITpreneurs
 
How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...ITpreneurs
 
The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)ITpreneurs
 
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps SkillsITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps SkillsITpreneurs
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 
Step by Step Guide
Step by Step Guide Step by Step Guide
Step by Step Guide ITpreneurs
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersITpreneurs
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramITpreneurs
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Enterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursEnterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursITpreneurs
 
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...ITpreneurs
 
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...ITpreneurs
 
[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).ITpreneurs
 
EC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramEC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramITpreneurs
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?ITpreneurs
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsITpreneurs
 
ITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs
 
10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneursITpreneurs
 

Mais de ITpreneurs (20)

CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things Foundation
 
TOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneursTOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneurs
 
How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...
 
The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)
 
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps SkillsITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Step by Step Guide
Step by Step Guide Step by Step Guide
Step by Step Guide
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking Careers
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst Program
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Enterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursEnterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneurs
 
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
 
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
 
[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).
 
EC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramEC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU Program
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
 
ITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs Corporate Brochure
ITpreneurs Corporate Brochure
 
10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs
 

Último

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

How Training and Consulting Companies Can Position CISSP, CISM and CRISC

  • 1. Copyright © 2015 ITpreneurs. All rights reserved. #ITpreneursLIVE Go-To-Market CISSP, CISM and CRISC: Help your Clients Raise the Information Security Bar
  • 2. Copyright © 2015 ITpreneurs. All rights reserved. Welcome Deborah Burton Channel Marketing Manager
  • 3. Copyright © 2015 ITpreneurs. All rights reserved. Low Barrier & High Impact: How ITpreneurs can help increase revenues and save costs Stay on the Cutting-Edge Access a Comprehensive Library Enjoy Convenience Save content Costs by up to 80% ● No Content Development Costs ● No Content Maintenance Costs ● Lower costs with increased usage ● 1000+ Titles ● Across most IT Domains ● 12 Languages ● Anytime, Anywhere ordering ● Marketing Support ● Exam Services ● Accreditation ● Trainer Services ● First to Market ● Consistent Quality ● Various Delivery Formats ● Always Up-to-Date ● Partner Enablement
  • 4. Copyright © 2015 ITpreneurs. All rights reserved. Webinar: Help Your Clients Raise the information Security Bar
  • 5. Copyright © 2015 ITpreneurs. All rights reserved. Today’s Speakers Moderator: Connie Tai Marketing Manager, ITpreneurs Presenter: Miroslaw Dabrowski IT Consultant, Agile Coach, Trainer, Courseware Author ASL BiSL Foundation Ambassador Poland; OBASHI Ambassador Programme Leader
  • 6. Copyright © 2015 ITpreneurs. All rights reserved. Agenda
  • 7. Copyright © 2015 ITpreneurs. All rights reserved. ● The Evolving Information Security Training Landscape ● CISSP, CISM, CRISC - Some of the highest in-demand information security framework ● Go-To-Market Strategies ● Advantages of Using ITpreneurs Materials ● How to get started Today You Will Learn
  • 8. Copyright © 2015 ITpreneurs. All rights reserved. Information Security Landscape
  • 9. Copyright © 2015 ITpreneurs. All rights reserved. Information & Network & Cyber Security NIST definitions: Information Security (not just IT Security): Protecting information and information systems to provide (aka CIA triad): 1) confidentiality 2) integrity 3) availability of information Network Security: The protection of all data that leaves or enters the local PC or local server from the network. Cybersecurity: The ability to protect or defend the use of cyberspace from cyber attacks. Information Security Network Security Cyber Security Anything Security-related in the cyber realm Anything involving security of information systems regardless of realm
  • 10. Copyright © 2015 ITpreneurs. All rights reserved. According to the UK National Audit Office, it could take up to 20 years to address the current skills gap. (Source: The Guardian, 26 September 2013) 47% of organizations say that the number of employees dedicated to network security is inadequate in some, most, or all cases. (Source: Network World September 2014) 86% of respondents see a global cybersecurity skills gap - and 92% of those planning to hire more cybersecurity professionals this year say they expect to have difficulty finding a skilled candidate (Source: ISACA Global Cybersecurity Report January 2015) Alarming Data on InfoSec Skills Shortage
  • 11. Copyright © 2015 ITpreneurs. All rights reserved. Skills in Demand in the Coming Years Source: Robert Half Technology 2013, 2014 & 2015 IT Salary Guides
  • 12. Copyright © 2015 ITpreneurs. All rights reserved. Founded in 1969 as the EDP Auditors Association Since 1978, CISA has been a globally accepted standard of competency among IS audit, control, assurance and security professionals More than 120,000 members in over 180 countries More than 200 chapters worldwide More than 100,000 people certified ISACA
  • 13. Copyright © 2015 ITpreneurs. All rights reserved. ISACA CISA CISM CRISC CGEIT Career Path Lead IT Auditor Chief (Information) Security Officer (CSO / CISO) Chief Risk Officer (CRO) Chief Information Officer (CIO) Focus IT Audit Information Security Risk Management IT Governance Work Performed Provide assurance by conducting audits and assessments of information systems Oversee, direct and manage information security activities Identify, evaluate and manage risk through the development, implementation and maintenance of information systems controls Define, establish, maintain and manage a framework of IT governance Requirements Submit verified evidence of a minimum of 5 years of verifiable IS audit, control or security experience (substitutions available) Submit verified evidence of a minimum of 5 years of information security management work experience (covering 3 of the 4 job practice domains Submit verified evidence of a minimum of 3 years of risk and information systems controls experience (covering 3 of the 5 job practice domains) Submit verified evidence of the 5 years experience requirements as defined by the CGEIT Job Practice Additional requirements ● Adhere to the ISACA Code of Professional Ethics ● Comply with the CGEIT Continuing Education Policy
  • 14. Copyright © 2015 ITpreneurs. All rights reserved. Founded in 1988 as Consortium Since 1998, CISSP has been a globally accepted standard of competency among Information Security More than 70,000 members in over 140 countries More than 100,000 people certified ISC2
  • 15. Copyright © 2015 ITpreneurs. All rights reserved. Globally recognized standard of achievement Common Body of Knowledge For experienced professionals in the computer security field. Candidates must have five years of direct full-time professional security work experience in two or more of the ten domains of the (ISC)² CISSP CBK CISSP CISSP holders often hold job functions including ● Security Consultant ● Security Manager ● IT Director/Manager ● Security Auditor ● Security Architect ● Security Analyst ● Security Systems Engineer ● Chief Information Security Officer ● Director of Security ● Network Architect
  • 16. Copyright © 2015 ITpreneurs. All rights reserved. The CISSP exam is based on the following 10 domains: ● Access Control ● Telecommunications and Network Security ● Information Security Governance and Risk Management ● Software Development Security ● Cryptography ● Security Architecture and Design ● Operations Security ● Business Continuity and Disaster Recovery Planning ● Legal, Regulations, Investigations, and Compliance ● Physical (Environmental) Security CISSP Certification Proves a Mastery of IT Security and Information Assurance
  • 17. Copyright © 2015 ITpreneurs. All rights reserved. Why do people always refer to this standard when they talk about information security framework? The ISO 27000 family of standards helps organizations keep information assets secure. Using this family of standards will help your organization manage the security of assets such as financial information, intellectual property, employee details or information entrusted to you by third parties. ISO/IEC 27001 is the best-known standard in the family providing requirements for an information security management system (ISMS). (Source: www.iso.org) ISO/IEC 27001:2013 Standard
  • 18. Copyright © 2014 ITpreneurs. All rights reserved. Go-To-Market Strategies
  • 19. Copyright © 2015 ITpreneurs. All rights reserved. ● Protect business assets and repair vulnerabilities ● Be compliant with regulatory requirements ● Build trust with customers to ensure business success ● Corporate Reputation Key Drivers for Information Security Training
  • 20. Copyright © 2014 ITpreneurs. All rights reserved. Who are you talking to? Understanding different Stakeholders’ Perspective and so should your sales pitch…... • More than 3,000 companies in the U.S. were victims of a cyberattack last year, costing an estimated $445 billion - how well-protected are we against operational and reputational damage from cyber attacks? • Have we aligned our cybersecurity strategy to our risk appetite and the overall risk environment. • Cyber attacks can invite greater regulatory scrutiny, which in turn increases organizational costs - Have we addressed this risk properly? CEO CIO/CISO CFO • I want security to support the business objectives • Challenges to find qualified staff to build the team to meet requirements and performance standards Decision criteria vary…
  • 21. Copyright © 2014 ITpreneurs. All rights reserved. When you talk to individual learners ... Employers look to certifications as measure of excellence and quality. Get certified pays off in increased in salary. Among the top-paying certifications: ● Certified in Risk and Information Systems Control (CRISC) $119,227 ● Certified Information Security Manager (CISM) $118,348 ● Certified Information Systems Security Professional (CISSP) $110,603 Source: 2015 IT Skills and Salary Survey conducted by Global Knowledge and Windows IT Pro
  • 22. Copyright © 2014 ITpreneurs. All rights reserved. On the pyramid of needs among IT organizations, what will be the resistance to invest in cyber security or information security training? What if the maturity of the IT organization is low - should information security be put on the top of the list? Potential Barriers
  • 23. Copyright © 2014 ITpreneurs. All rights reserved. Open-enrollment vs In-house training Positioning Your Training Offering
  • 24. Copyright © 2015 ITpreneurs. All rights reserved. Advantages of using ITpreneurs Courseware
  • 25. Copyright © 2015 ITpreneurs. All rights reserved. ● ISACA does not provide official examination Syllabus ● ISACA exam scope is updated yearly with publishing new Review Manuals each year ● Based on changes and trends in the market, ISACA updates it’s certification scope ● ITPreneurs pays close attention to those changes ISACA and ISC2 Exams are Pragmatic
  • 26. Copyright © 2015 ITpreneurs. All rights reserved. No software license, no installation required. Available via web browser Interactive Mind Maps from ISACA portfolio
  • 27. Copyright © 2015 ITpreneurs. All rights reserved. Get Started: www.itpreneurs.com
  • 28. Copyright © 2015 ITpreneurs. All rights reserved. Available Soon ... ISC2 CISSP Exam Prep - 5 Days ISACA CISA Exam Prep - 4 Days ISACA CISM Exam Prep - 4 Days ISACA CRISC Exam Prep - 4 Days ISACA CGEIT Exam Prep - 4 Days
  • 29. Copyright © 2014 ITpreneurs. All rights reserved. Intermediate Level (applied skills) Best Practices // Methods Technology // Tools Foundation Level (common knowledge) Cyber Resilience Foundation EXIN Info Security Foundation CISSP Information Security Portfolio Secure Coding Foundation Cyber Security Portfolio EXIN Info Security Advanced ISO 27001 Foundation CISACISM Ethical Hacking Foundation Data Privacy Officer ISO 27001 Lead Implement. ISO 27001 Lead Auditor Cyber Resilience Practitioner CCSK Foundation Risk Portfolio Although the Contents contained herein are provided under the highest professional standards in the generation of these forecasts, ITpreneurs does not guarantee the accuracy or completeness of any information contained herein.
  • 30. Copyright © 2014 ITpreneurs. All rights reserved. Intermediate Level (applied skills) Best Practices // Methods Technology // Tools Foundation Level (common knowledge) Cyber Resilience Foundation EXIN Info Security Foundation CRISC COBIT 5 Auditor CGEIT Risk & Governance Portfolio Information Security Portfolio CISACISM ISO 22301 Foundation Open Group FAIR ISO 22301 Lead Auditor ISO 22301 Lead Implement. COBIT 5 Implement. M_o_R Foundation COBIT 5 Foundation ISO 31000 Foundation Oceans99 Simulation Governance of Info Sec workshop Although the Contents contained herein are provided under the highest professional standards in the generation of these forecasts, ITpreneurs does not guarantee the accuracy or completeness of any information contained herein. Although the Contents contained herein are provided under the highest professional standards in the generation of these forecasts, ITpreneurs does not guarantee the accuracy or completeness of any information contained herein.
  • 31. Copyright © 2015 ITpreneurs. All rights reserved. How You Can Get Started 1/2 Partner A Full Service Partner B Use Your own trainer Partner C Only use our Courseware Courseware Exams Services Trainers Courseware Exams Services Courseware Exams
  • 32. Copyright © 2015 ITpreneurs. All rights reserved. How You Can Get Started 2/2 Visit the ITpreneurs.com Website Review the Product of Interest Get in touch either through the Contact Form, send us an email, or call!
  • 33. Copyright © 2015 ITpreneurs. All rights reserved. Q&A
  • 34. Copyright © 2015 ITpreneurs. All rights reserved. +31 107.110.260 marketing@itpreneurs.com Contact Us Connie Tai Products & Solutions Marketing ITpreneurs | Rotterdam | The Netherlands