Professional Documents
Culture Documents
IT SERIES
24 - 27 NOVEMBER 2013 RADISSON BLU DUBAI DEIRA CREEK UNITED ARAB EMIRATES
COURSE OVERVIEW
Part 1: Successful Information Security Manager/Leadership Workshop (Day 1) Effective Leadership from the management team is a key feature of a positive information security culture as it determines how everybody else in the organization will view and act upon safety issues. Managing information security and managing information security teams is sometimes a challenge in many organizations. Maintaining strong information security is one of the major challengers in todays world and it requires strong leadership and management skills. Although many think that leaders are born, not made, anyone can be a better leader. Part 2: IT Architecture Security (Day 2-4) With the rapid growth & development of the internet, organizations are taking advantage of the new opportunities available. Likewise, unscrupulous individuals are also exploiting the situation to collect & steal data from companies & their customers. Information security is therefore critical for today's modern business models. Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats. Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program. This intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
BENEFITS OF ATTENDING
Course Participants will:
Master the tools & techniques for effective information & network security. Discover how to create a complete & sustainable IT security architecture. Gain knowledge on how to develop sound security policy together with your
security architecture.
Learn how to perform smart security risk assessment within your organization. Learn how to perform an IT governance assessment using CoBIT 4.0. Gain valuable insights on implementing a proactive & robust security management
system.
Conducted internal IT audits in the areas of critical infrastructure/ systems and applications, Assessed and tested internal controls of critical infrastructure platform systems (Windows, UNIX, IIS, SQL, Oracle) Assessed and tested internal controls of various critical financial applications. Prepared risk assessments and determined risks to critical financial data systems and infrastructure components. Created test plans & processes and executed test plans. Conducted reviews of existing systems and
applications, ensuring appropriate security, management and data integrity via control processes.
Learn how to detect & prevent information security breaches due to inadequate IT
security awareness within the organization.
EXCLUSIVE: :
1. An An ex exte extensive tens nsiv ive e IT S Sec Security ec cur urit ity y Ar Arch Architecture chit itec ectu ture re Q Que Questionnaire uest stio ionn nnai aire re that t tha hat t will will help h hel elp p you you evaluate your organizati organizations i ti i security it position. iti 2. FREE CD containing course materials, case studies and other related items of the training seminar. 3. Take with you templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop. 4. FREE CoBIT 4.0 IT Governance Assessment Evaluation Spreadsheet
Prepared written reports to all levels of management Participated in audit review panel sessions to address
results, conclusions and follow-up actions required.
kris@360bsigroup.com
COVERAGE
IT Security Concepts & Principles Roles & Responsibilities Security Awareness Layered Security approach Security Policy Implementation Risk & Vulnerability Assessment Threat Identification Penetration testing IT Network & System Security IT Security Architecture Security Design & Maintenance Security Control Frameworks ISO 27001 Security Standard Laws & regulations
Latest TESTIMONIALS
1
S Session Session i well well ll organized. orga or g nize ized d. The The trainer t tra rain iner er i is sv very er conversant with the subject matter. Well delivered and would definitely recommend to anyone else.
- Habil Mutende, Manager Information Security & Change Management, Central Bank of Kenya
Excellent presentation, excellent attitude to answer our questions & to share his experience.
- Senior Manager, IT Department, Deloitte
The programme is good for IT professionals... [who] would like to setup ISO function or improve ISO. - G. Ramgopal, Head IT Security, Bank Muscat Oman I have used Mark in key roles with high visibility clients. Without hesitation I would highly recommend Mark for any and all IT audit engagements. His professionalism, deep knowledge, and results oriented work style are deeply valued by not only myself, but more importantly by the all those who are lucky enough to use his services. - Russ Aebig, Director at Artesient We have used Mark Edmead on several projects in the past few years including SOX readiness for publicly traded companies and IT vulnerability assessments for major financial institutions. He always delivers professional and detail-oriented workpapers on-time and within budget. Mark is highly recommended and we will continue to use him on other projects. - Brenda Piazza, Director at CBIZ MHM
COURSE SCHEDULE
8.00 8.30 10.10 - 10.30 12.00 - 13.00 14.40 - 15.00 16.00 Registration & Coffee/Tea Workshop commences Morning coffee/tea Lunch Afternoon coffee/tea End of day
REGISTRATION FORM
Fax: +603 9205 7779 Tel: +603 9205 7772
DELEGATES
1
IN-HOUSE TRAINING
360 BSI is passionate about providing strategic IT programs and high potential training solutions across the region to build personal competencies and organizational capability. You will receive practical training from a professionally qualified educator with over twenty years of teaching and training experience. Please feel free to mix-and-match topics from the areas listed below to get the right training content for your staff. Other topics may be available upon request.
Name
: : :
Name
: : :
Name
AUTHORIZATION
(This form is invalid without a signature) Name Job Title Email Tel : Address : : : : ( )
General Information:
1 2 3 4 5
Registrations close ONE (1) week before the training dates. The fees cover lunch, tea breaks, materials and certificate. Official confirmation will be sent, once registration has been received. Participants will need to arrange their own accommodation. Attire: Smart Casual
Organization :
Cancellations/Substitutions
Substitutions are welcome at any time. Please notify us at least 2 working days prior to the event. All cancellations will carry a 10% cancellation fee, once a registration form is received. All cancellations must be in writing by fax or email at least 2 weeks before the event date. Cancellations with less than 2 weeks prior to the event date carry a 100% liability. However, course materials will still be couriered to you.
Signature :
Date:
FEES
PAYMENT DETAILS
Payment is required within 5 days upon receipt of the invoice.
Bank transfer: 360 BSI MIDDLE EAST LIMITED Abu Dhabi Commercial Bank Dubai Mall Branch, P.O.Box 49124 Dubai, U.A.E Account No: 10065721319001 Swift No: ADCBAEAAXXX IBAN No: AE780030010065721319001
USD 2,995 per delegate USD 8,085 - Special for Group of 3 USD 12,000 - Special for Group of 5
The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable the client has to ensure that the taxes are paid on top of the investment fee paid for the course. Compliance with the local tax laws is the responsibility of the client.
360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia.