Académique Documents
Professionnel Documents
Culture Documents
MANAGEMENT
PRINCIPLES
11 - 14 SEPTEMBER 2017
KUALA LUMPUR
MALAYSIA
17 - 20 SEPTEMBER 2017
IT DUBAI
SERIES UNITED ARAB EMIRATES
BENEFITS OF ATTENDING He has trained Fortune 500 and Fortune 1000 companies
in the areas of information, system, and Internet security.
Course Participants will: He has worked with many international firms, and has the
Understand todays and tomorrows cybersecurity and cybercrime threats, issues, unique ability to explain very technical concepts in
simple-to-understand terms. Mr. Edmead is a sought after
and risks; how to set up policies, train users, create strategies, and implement author and lecturer for information security and
systems and tools to help protect data, information and peoples identities making information technology topics.
online working more secure
Mark works as an information security and regulatory
Manage the growing volume of confidential, sensitive business information and compliance consultant. He has:
data to protect, keep safe, and communicate securely against a backdrop of
increasing cyber threats, as well as privacy, legal, and compliance regulations
Conducted internal IT audits in the areas of critical
infrastructure/ systems and applications,
Develop strategies and ways of working to improve detection of cybersecurity Assessed and tested internal controls of critical
threats and improve information compliance
infrastructure platform systems (Windows, UNIX, IIS, SQL,
Understand the security-related international information compliance and Oracle)
regulations, including industry specific standards
Assessed and tested internal controls of various critical
Expand the expertise of personnel involved in developing skills and knowledge in financial applications.
the latest techniques, processes, and systems on cybersecurity
Prepared risk assessments and determined risks to
critical financial data systems and infrastructure
EXCLUSIVE:: PRE COURSE QUESTIONNAIRE & TAKEAWAYS components.
1.. An
1 An ex
exte
extensive
tens
nsiv
ive
e IT S
Sec
Security
eccur
urit
ityy Ar
Arch
Architecture
chit
itec
ectu
ture
re Q
Que
Questionnaire
uest
stio
ionn
nnai
aire
re that
ttha
hatt will
will help
h
hel
elpp you
you
Created test plans & processes and executed test plans.
evaluate your organizatii tii security
organizations it position.
iti Conducted reviews of existing systems and
2. Online access to course materials, case studies and other related items of the applications, ensuring appropriate security, management
and data integrity via control processes.
training seminar.
3. Take with you templates and worksheets to aid you in applying and putting Prepared written reports to all levels of management
into practice what you have learned from this workshop.
Participated in audit review panel sessions to address
results, conclusions and follow-up actions required.
2
DAY3 THREAT, RISK & VULNERABILITY
ASSESSMENT
We will discuss the vulnerabilities, threats, and risks to the system and
network environment. We will also discuss practical application of risk
assessment to an organization, how to conduct an assessment, and how
to use this information to improve the security posture.
Latest TESTIMONIALS
Vulnerability and Penetration testing
- Why performing vulnerability and penetration testing is important 1 Session well organized. The trainer is very
- Tools and techniques used in penetration testing conversant with the subject matter. Well delivered
- Review of sample penetration testing report and would definitely recommend to anyone else.
- How to correct problems identified in the vulnerability and penetration - Habil Mutende, Manager Information Security & Change
testing report Management, Central Bank of Kenya
3
CYBERSECURITY
MANAGEMENT REGISTRATION FORM
PRINCIPLES
Fax: +603 9205 7788
Tel: +603 9205 7772
11 - 14 SEPTEMBER 2017 Mobile: +6016 3326 360
KUALA LUMPUR
17 - 20 SEPTEMBER 2017 Email: kris@360bsigroup.com
DUBAI
360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia. 4