[vc_row][vc_column][vc_single_image image=”2426″ img_size=”full” alignment=”center”][vc_empty_space][vc_custom_heading text=”Overview” font_container=”tag:h3|font_size:24|text_align:left|color:%23000000″ use_theme_fonts=”yes”][vc_column_text css=”.vc_custom_1532618841998{padding-top: 20px !important;padding-bottom: 15px !important;}”]
This is a 3-day class.
In this course, students will establish processes to ensure that information security measures align with established business needs.[/vc_column_text][ucaddon_uc_super_clean_tabs heading_active=”#ec1f35″ uc_items_data=”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” uc_fonts_data=”JTdCJTIydWNfaXRlbXNfYXR0cmlidXRlX3RpdGxlJTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJNb250c2VycmF0JTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJCb2xkJTIyJTJDJTIyZm9udC1zaXplJTIyJTNBJTIyMjBweCUyMiU3RCUyQyUyMnVjX2l0ZW1zX2F0dHJpYnV0ZV9jb250ZW50JTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJMYXRvJTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJOb3JtYWwlMjIlMkMlMjJmb250LXNpemUlMjIlM0ElMjIxNXB4JTIyJTJDJTIybGluZS1oZWlnaHQlMjIlM0ElMjIxZW0lMjIlMkMlMjJjb2xvciUyMiUzQSUyMiUyMzYyNjI2MiUyMiU3RCU3RA==”][vc_custom_heading text=”Course Outline” font_container=”tag:h3|font_size:24|text_align:left|color:%23000000″ use_theme_fonts=”yes” css=”.vc_custom_1532616682650{margin: 0px !important;border-width: 0px !important;padding: 0px !important;}”][vc_column_text css=”.vc_custom_1532618899419{padding-top: 20px !important;padding-bottom: 20px !important;}”]
1 Information Security Governance
- Develop an Information Security Strategy
- Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements
- Justify Investment in Information Security Identify Drivers Affecting the Organization
- Obtain Senior Management Commitment to Information Security
- Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels
2 Information Risk Management
- Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs
- Identify and Evaluate Risk Mitigation Strategies
- Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk
1 Information Security Program Development
- Develop Plans to Implement an Information Security Strategy Security Technologies and Controls
- Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions
- Identify Resources Needed for Information Security Program Implementation
- Develop Information Security Architectures Develop Information Security Policies
- Develop Information Security Awareness, Training, and Education Programs
- Develop Supporting Documentation for Information Security Policies
2 Information Security Program Implementation
- Integrate Information Security Requirements into Organizational Processes
- Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics
3 Information Security Program Management
- Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls
- Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance
- Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues
4 Incident Management and Response
- Develop an Information Security Incident Response Plan Establish an Escalation Process
- Develop a Communication Process Integrate an IRP
- Develop IRTs Test an IRP
- Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews
[/vc_column_text][/vc_column][/vc_row]