Course Objectives
At the end of this course the participants will be able to:
- Know the information as a source of competitive advantage.
- Know the needs for Decision Making.
- Limit Information Access.
- Make a Systematic evaluation of information system security.
Targeted Audience
- IT Practitioners.
- Cybersecurity Staff.
Day 1: Practical Issues
- The Security Situation.
- Security Strategic Issues.
- Industry Methodologies.
- Standards & Best Practices.
- Groups Excercise.
Day 2: Business Mapping of Operations to Identify Security Risks
- Flow Charts.
- How Secure is Your Computer?
- Security Fraud Prevention Practices.
- How safe is your computer system from Viruses?
- Hacking & fraud.
Day 3: Analysing
- Do you have a problem?
- How serious is it?
- What should you do?
- How to evaluate the risk?
- How to implement controls?
Day 4: Methodology for:
- How to identify information assets and controls?
- How to quantify risks, likely damage causes for concern?
- To Understand the responses to any threat, know which to use.
- Check your IT infrastructure - Identify weak links
- Review the success of key staff members in implementing controls
Unit 5: Clarify your vulnerability to outsiders and staff
- Providing an Action Plan to Preserve Data Security.
- Work Methods.
- Planning the Security System.
- Information Technology Security Standards Adoption.
- Implementing Computer Security Improvements.
PLACE: London (UK)
VENUE (TBC): INDUSTRIOUS (1 and 2, 245 Hammersmith Road Floors, London W6 8PW)
LANGUAGE: English