CYBER SECURITY PROGRAM Strategies For Beginners

  • Created Date22 May, 2019
  • Views38
  • Likes1

Self-auditing of its cyber security program is one of the key means by which a company can manage its information security. This is because protection of an organization’s information is the real means to successful management and smooth operation.

A sound self-audit program serves core purposes: Firstly, it helps organizations keep their confidential information secure. Secondly, it also gives customers and stakeholders the confidence that the risk management system is trustworthy in safeguarding their interests and confidentiality. Finally, a self-audit is also a means to making sure that the company is compliant with the legal obligations set out by the regulatory authorities.

A 60-minute learning session from Traininng.com, a leading provider of professional training for all the areas of regulatory compliance, will help you gain thorough and proper understanding of how to implement a self-audit program that meets the requirements stated above.

it-security-program-image

The speaker at this webinar is Michael Redmond, Consultant, Speaker and Author. Dr. Redmond will show the ways by which organizations need to audit their program that will help them to establish, implement, operate, monitor, review, maintain and improve an information security management system. Please visit traininng.com to enroll for this session.

—————————————————————————————————————

In this cyber security program strategies for beginners, Dr. Redmond will offer learning on the guidelines and standards that should be referenced to determine if the organization has a security program that is robust enough to safeguard vital information assets. She will also explain how to audit ISO 27001 and Information/Cyber Security.

All the ways by which organizations can manage the security of their various assets such as intellectual property, financial information, and employee details entrusted to them by third parties through an effective auditing program that audits controls in tune with the ISO 27001 standard, will be taught at this session.

Dr. Redmond will offer valuable tips that are practical to implement. These tips will help participants gain solid understanding of how to face new challenges pertaining to information and/or cyber risks that keep cropping up from time to time. Dr. Redmond will impart the following learning objectives at this webinar:

  • Ways to audit your information security management system
  • Implementation tips on how long it takes to use tools
  • Important benefits and ways to present them to management
  • Documentation
  • Auditing in your organization
  • ISMS implementation framework
  • Key elements of ISO 27001
  • Get an overview of the audit implementation strategy.

She will cover the following areas at this session:

  • Risk assessment
  • Security policy
  • Organization of information security
  • Asset management
  • Human resources security
  • Physical and environmental security
  • Communications and operations management
  • Access control
  • Information systems acquisition, development, and maintenance
  • Information security incident management
  • Business continuity management

About the speaker: Dr. Michael Redmond is certified as a Lead Implementer in ISO 27001 Information Security Management, ISO 27035 Security Incident Response, ISO 22301 Business Continuity Management and ISO 21500 Project Management.

She was named on the list of “Women of Distinction for 2015” by Women of Distinction Magazine for her work in Cyber Security. She gets invited to speak on Cyber Security Incident Response and SIEM at various conferences.

Leave your comment

   Post Comment