IT123: SABSA Foundation Training

Size: px
Start display at page:

Download "IT123: SABSA Foundation Training"

Transcription

1 IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8

2 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom framework and methodology to conceive, conceptualise, design, implement and manage security in a business-driven model. The term business-driven is the key to SABSA s power, and its acceptance. SABSA is all about empowering the organisation to do business as it needs and wants to do, while ensuring that it is secured and fully enabled. SABSA is an open and inclusive standard that readily integrates with other frameworks and tools such as ITIL, 17799/27000 series, COBIT and the like. It can be used as a compliance and governance framework for complex sets of standards. SABSA is used commonly as the security parallel and tool set for organisations using the world s leading IT Architecture Framework. Training Objectives: This 5-day Foundation Certificate program has been designed to provide participants with a thorough coverage of the knowledge required for the SABSA Foundation Level Certificate. It is structured in two modules: Module 01: Security Strategy & Planning Module 02: Security Service Management Security Strategy and Planning This module provides participants with a comprehensive understanding of how the SABSA framework delivers successful security strategy and architecture. Through a series of innovative presentations, case studies and workshops, you will develop the skills to use the most proven security architecture design and management processes and find out how to develop a comprehensive strategy for the creation of a security architecture that genuinely meets the needs of your organisation. By the end of the training, participants will be able to: Define enterprise security architecture, its role, objectives and benefits Describe the SABSA model, architecture matrix, service management matrix and terminology Describe SABSA principles, framework, approach and lifecycle Use business goals and objectives to engineer information security requirements Create a business attributes taxonomy Apply key architectural defence-in-depth concepts Explain security engineering principles, methods and techniques Use an architected approach to design an integrated compliance framework Describe and design appropriate policy architecture Define security architecture value proposition, measures and metrics IT123 Rev.002 CMCT COURSE OUTLINE Page 2 of 8

3 Security Service Management and Design This module leverages the strategy defined in Foundation Module One to create the roadmap to design, deliver and support a set of consistent and high-quality security services. Covering the good practice lifecycle, participants will find out how to design, deliver and support a comprehensive security services architecture that integrates fully and seamlessly with their existing IT management and business infrastructure and practices. By the end of the training, participants will be able to: Use SABSA to create a holistic framework to align and integrate standards Describe roles, responsibilities, decision-making and organisational structure Explain the integration of SABSA into a service management environment Define Security Services Describe the placement of security services within ICT Infrastructure Create a SABSA Trust Model Describe and model security associations intra-domain and inter-domain Explain temporal factors in security and sequence security services Determine an appropriate start-up approach for SABSA Architecture Apply SABSA Foundation level competencies to your own environment Training Designed for: This course is intended for CIO / CISO / CRO / CIRO, IT Strategists and Planners, IT Architects, IT Development Managers and Project Leaders, Software Managers and Architects, Computer / Information Security Managers, Advisors, Consultants & Practitioners, IT Line Managers, IT Service Delivery Managers, Risk Managers, Internal and External Auditors. Prerequisites: The SABSA Foundation Level certification neither requires nor assumes any experience in any branch of security. Training Program: DAY ONE: PRE-TEST MODULE 01: SECURITY STRATEGY & PLANNING This module provides participants with a comprehensive understanding of how the SABSA framework delivers successful security strategy and architecture. Through a series of innovative presentations, case studies and workshops, you will develop the skills to use the most proven security architecture design and management processes and find out how to develop a comprehensive strategy for the creation of a security architecture that genuinely meets the needs of your organisation: IT123 Rev.002 CMCT COURSE OUTLINE Page 3 of 8

4 The SABSA Framework Information Security Strategy, Benefits and Objectives Security: A Cultural Legacy as a Business Constraint Technical Legacy of Tactical Point Solutions Security Strategy, Tactics and Operations Critical Success Factors for Business, IT and Security Measuring and Prioritising Business Risk Enabling Business and Empowering Customers Adding Value to the Core Product Protecting Relationships and Leveraging Trust Introduction to SABSA Best Practice Information Security and its Role in the Modern Enterprise Enterprise Security Architecture: Definition and Principles The History of SABSA Development Introduction to the SABSA Model The Business View of Security: Contextual Architecture The Architect s View of Security: Conceptual Architecture The Designer s View of Security: Logical Architecture The Builder s View of Security: Physical Architecture The Tradesman s View of Security: Component Architecture The Service Manager s View of Security: Operational Architecture Traceability from Business Requirements to Deployed Solutions The SABSA Matrix and Service Management Matrix Information Security Strategy Business Requirements & How to Define Them Business Goals, Success Factors and Operational Risks Business Processes and the Need for Security Location Dependence of Enterprise Security Needs Organisation and Relationships Affecting Enterprise Security Time Dependency of Enterprise Security Collecting Enterprise Requirements for Security Creating a Business Attributes Profile Defining Control Objectives Strategic Concepts & How to Apply Them Managing Complexity Systems Engineering for Security Architectural Layering End-to-End Security Defence-in-Depth Models Security Domains Security Associations Trust Modelling Organisation & Workflow IT123 Rev.002 CMCT COURSE OUTLINE Page 4 of 8

5 Infrastructure Strategy Management Strategy DAY TWO: SABSA PRACTITIONER GUIDE The Strategy Programme & Architecture Delivery The SABSA Development Process The SABSA Lifecycle Strategy and Concept Phase Processes and Sub-processes Design Phase Processes and Sub-processes Implement Phase Processes and Sub-processes Manage and Measure Phase Processes and Sub-processes Top-down Decomposition of the SABSA Model Scope, Deliverables and Project Sequencing Managing the Strategic Programme Introduction to Return on Investment & Return of Value Defining the Benefits and Value Propositions Selling the Benefits Getting Sponsorship and Budget Building the Team Team Competency Assessment & Development Programme Planning and Management Fast Track Start-up Programmes Collecting the Information You Need Gaining Consensus on the Conceptual Architecture Strategic Architecture Governance, Compliance and Maintenance Identifying Quick Wins and Gaining Long Term Confidence MODULE 02: SECURITY SERVICE MANAGEMENT This module leverages the strategy defined in Foundation Module One to create the roadmap to design, deliver and support a set of consistent and high-quality security services. Covering the good practice lifecycle, participants will find out how to design, deliver and support a comprehensive security services architecture that integrates fully and seamlessly with their existing IT management and business infrastructure and practices: The SABSA Security Management Framework The SABSA Security Management Framework SABSA in the I.T. Lifecycle Using SABSA To Integrate Other Methods, Models & Standards SABSA and the ITIL Framework SABSA and CobIT SABSA and Project Management Standards SABSA and ISO Security Standards SABSA and IT Architecture IT123 Rev.002 CMCT COURSE OUTLINE Page 5 of 8

6 DAY THREE: The SABSA Security Policy and Risk Management Framework Security Policy Management Policy Principles Policy Content, Hierarchy & Architecture Security Policy Making Information & Systems Classification Third Party & Outsourcing Strategy & Policy Management Operational Risk Management The Meaning of Risk Risk Philosophy & Methodology Corporate Governance & Enterprise Risk Management Risk Measurement and Risk Assessment Risk Mitigation Risk Appetite Risk Management Tools Measuring Success of Risk Management The SABSA Integrated Assurance Management Framework Security Organisation & Responsibilities Security Governance Security Culture Development, Training & Awareness Ownership & Custody Service Provider & Customer Roles in Security Management Enterprise Audit & Review Framework Assurance of Operational Continuity Business Continuity Planning Contingency Planning Crisis Management Business Recovery Planning DAY FOUR: Systems Assurance Technical Assurance of Security Correctness & Completeness Managing the Assurance Process for Systems & Software Development Assuring Integrity and Acceptable Use of Systems & Software Principles of Multi-phased Testing Security Services Design Security Services Architecture Information as the Logical Representation of Business Logical Entities & Their Relationships Using Trust Models to Define Security Services Security Domains, Domain Definitions & Associations Security Processing Cycle IT123 Rev.002 CMCT COURSE OUTLINE Page 6 of 8

7 Security Infrastructure Services Security Rules, Practices & Procedures Security Mechanisms User Security Platform & Network Security Infrastructure for Service Delivery Technical Standards & Components Security Services Delivery & Support Operational Security Services Incident Management Incident Response Problem Management Change Management Continuity, Crisis & Recovery Management DAY FIVE: Security Administration & Management Security Service Management Security Mechanism Management Security Component Management System Management & Administration User Management & Administration Security Audit Management Security Operations Product Evaluation & Selection Security Services Performance Measurement Return on Investment & Return of Value Return on Investment Net Present Value Internal Rate of Return Defining Value Metrics Business Attributes & Return of Value Security Measures & Metrics Why Do We Need Measures & Metrics Measurement Approaches Defining Metrics Benchmarking Security Remedial Project Planning Maturity Models Applied to Security Course Conclusion POST-TEST and EVALUATION IT123 Rev.002 CMCT COURSE OUTLINE Page 7 of 8

8 Training Requirements: Hands-on practical sessions, equipment and software will be applied during the course if required and as per the client s request. Training Methodology: This interactive training course includes the following training methodologies as a percentage of the total tuition hours: 30% Lectures, Concepts, Role Play 30% Workshops & Work Presentations, Techniques 20% Based on Case Studies & Practical Exercises 20% Videos, Software & General Discussions Pre and Post Test Training Certificate(s): Internationally recognized certificate(s) will be issued to each participant who completed the course. Training Fees: As per the course location - This rate includes participant s manual, hand-outs, buffet lunch, coffee/tea on arrival, morning & afternoon of each day. Note: The 5% VAT (Value Added Tax), will be effective starting 01 st of January 2018 as per the new regulation from the UAE Government. The VAT applies for all quotation both for local and abroad. Training Timings: Daily Timings: 07:45-08:00 Morning Coffee / Tea 08:00-10:00 First Session 10:00-10:20 Recess (Coffee/Tea/Snacks) 10:20-12:20 Second Session 12:20-13:30 Recess (Prayer Break & Lunch) 13:30-15:00 Last Session For training registrations or in-house enquiries, please contact: Aisha Relativo: aisha@cmc-me.com Tel.: or Mob.: Training & Career Development Department IT123 Rev.002 CMCT COURSE OUTLINE Page 8 of 8

PM029: Project Management Professional (Preparation)

PM029: Project Management Professional (Preparation) PM029: Project Management Professional (Preparation) PM029 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: The overall aim of this course is to prepare participants for the Project Management

More information

IT081: Administering Microsoft SQL Server 2012

IT081: Administering Microsoft SQL Server 2012 IT081: Administering Microsoft SQL Server 2012 IT081 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: In this course, participants will gain the knowledge and skills to maintain a Microsoft

More information

IT088-3D: Advanced Microsoft Access

IT088-3D: Advanced Microsoft Access IT088-3D: Advanced Microsoft Access IT088-3D Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: Your training and experience using Microsoft Access has given you basic database management skills

More information

ME029: Certified Maintenance & Reliability Professional (CMRP)

ME029: Certified Maintenance & Reliability Professional (CMRP) ME029: Certified Maintenance & Reliability Professional (CMRP) ME029 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This interactive course covers Maintenance Reliability best practices

More information

IT092: Implementing CISCO Data Center Unified Fabric

IT092: Implementing CISCO Data Center Unified Fabric IT092: Implementing CISCO Data Center Unified Fabric IT092 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This intensive course covers all topics in the Cisco DCUFI v5 course, along with

More information

AL045: Laboratory Information Management System (LIMS)

AL045: Laboratory Information Management System (LIMS) AL045: Laboratory Information Management System (LIMS) AL045 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: A Laboratory Information Management System (LIMS) is computer software that is

More information

IE100: Siemens SIMATIC S7 Maintenance, Configuration & Troubleshooting

IE100: Siemens SIMATIC S7 Maintenance, Configuration & Troubleshooting IE100: Siemens SIMATIC S7 Maintenance, Configuration & Troubleshooting IE100 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This course introduces to a Siemens integrated automation system.

More information

IE102: SCADA Programming, Maintenance & Troubleshooting

IE102: SCADA Programming, Maintenance & Troubleshooting IE102: SCADA Programming, Maintenance & Troubleshooting IE102 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This course is designed to provide a thorough understanding of the fundamental

More information

EE076: Load Flow Analysis, Short Circuit Calculations & Protection Coordination

EE076: Load Flow Analysis, Short Circuit Calculations & Protection Coordination EE076: Load Flow Analysis, Short Circuit Calculations & Protection Coordination EE076 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: This course provides a comprehensive review of the fundamental

More information

IE156: ICS410: ICS/SCADA Security Essentials

IE156: ICS410: ICS/SCADA Security Essentials IE156: ICS410: ICS/SCADA Security Essentials IE156 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: In this five-day intensive training, participants will develop and reinforce a common language

More information

IE034: PLC & SCADA for Automation & Process Control

IE034: PLC & SCADA for Automation & Process Control IE034: PLC & SCADA for Automation & Process Control IE034 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: This course presents to give the participants the knowledge required in industrial

More information

PMP085 PMP Program: Planning and Implementing Project Management Office (PMO)

PMP085 PMP Program: Planning and Implementing Project Management Office (PMO) PMP085 PMP Program: Planning and Implementing Project Management Office (PMO) H.H. Sheikh Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: Over the last

More information

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA )

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA Title / definition SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA is a framework for developing risk-driven enterprise information security and information assurance architectures

More information

IT115: Oracle Database 12c Administration I

IT115: Oracle Database 12c Administration I IT115: Oracle Database 12c Administration I IT115 Rev.001 CMCT COURSE OUTLINE Page 1 of 12 Training Description: In this training, participants will focus on configuration on supported systems. Also, how

More information

IT Management Excellence. Contents are subject to change. For the latest updates visit Page 1 of 7

IT Management Excellence. Contents are subject to change. For the latest updates visit Page 1 of 7 IT Management Excellence Page 1 of 7 Why Attend Managing an IT function is very different from developing or supporting technical IT solutions. General management skills are helpful to the IT manager,

More information

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification COURSE BROCHURE COBIT5 FOUNDATION Training & Certification What is COBIT5? COBIT 5 (Control Objectives for Information and Related Technology) is an international open standard that defines requirements

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Managing, Improving and Securing an Enterprise Digital Service Portfolio itsm003 v.3.0 Agenda and Objectives What is

More information

SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION

SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SD? This comprehensive official ITIL lifecycle certification course will provide you with critical knowledge and practical guidance

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Securing, Managing and Improving the Online Services that Drive the Digital Enterprise itsm003 v.3.0 Agenda and Objectives

More information

ITIL Managing Across the Lifecycle Course

ITIL Managing Across the Lifecycle Course ITIL Managing Across the Lifecycle Course Duration: 5 Days Course Delivery: Classroom Language: English Course Overview ITIL 2011 edition is comprised of five core publications: Service Strategy, Service

More information

COBIT 5 Implementation

COBIT 5 Implementation COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical

More information

Certificate in Security Management

Certificate in Security Management Certificate in Security Management Page 1 of 6 Why Attend This course will provide participants with an insight into the fundamentals of managing modern and effective security operations. It will address

More information

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework. Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle

More information

EXIN Expert in IT Service Management based on ISO/IEC Preparation Guide

EXIN Expert in IT Service Management based on ISO/IEC Preparation Guide EXIN Expert in IT Service Management based on ISO/IEC 20000 Preparation Guide Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

TSC Business Continuity & Disaster Recovery Session

TSC Business Continuity & Disaster Recovery Session TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

ISO 27001:2013 certification

ISO 27001:2013 certification www.pwc.ch/cybersecurity ISO 27001:2013 certification Building confidence in your digital future Our approach to certification PwC offers a four-phase approach to help with your ISO 27001 project, using

More information

EXIN BCS SIAM TM Foundation Certification Training - Brochure

EXIN BCS SIAM TM Foundation Certification Training - Brochure EXIN BCS SIAM TM Foundation Certification Training - Brochure Understand How to Manage Multiple Service Providers to Achieve Common Goal Course Name : SIAM TM Foundation Training Certification Version

More information

Planning and Implementing ITIL in ICT Organisations

Planning and Implementing ITIL in ICT Organisations CCPM Solutions Experts in ICT Performance Supporting Your Business Planning and Implementing ITIL in ICT Organisations June 2012, Addis Ababa Content 1. Quick ITIL (Overview) 2. Case study (How not to

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

Exam Requirements v4.1

Exam Requirements v4.1 COBIT Foundation Exam Exam Requirements v4.1 The purpose of this document is to provide information to those interested in participating in the COBIT Foundation Exam. The document provides information

More information

Advanced Tester Certification Test Manager

Advanced Tester Certification Test Manager Home > Advanced Tester Certification Test Manager Advanced Tester Certification Test Manager Accredited training for the ISTQB Advanced Tester Certification Test Manager (CTAL- TM) certification. This

More information

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2

More information

Training Services TRAINING SERVICES. Translating Knowledge into Results

Training Services TRAINING SERVICES. Translating Knowledge into Results TRAINING SERVICES About Pink Elephant Pink Elephant is an international knowledge leader in the field of business innovation and business change. With advisory and IT services, Pink Elephant draws the

More information

COBIT 5 Assessor Certification Course

COBIT 5 Assessor Certification Course COBIT 5 Assessor Certification Course About COBIT 5.0 Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions and technology is becoming pervasive

More information

IT Consulting and Implementation Services

IT Consulting and Implementation Services PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

Integrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta

Integrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta Integrating ITIL and COBIT 5 to optimize IT Process and service delivery Johan Muliadi Kerta Measurement is the first step that leads to control and eventually to improvement. If you can t measure something,

More information

ITIL Service Lifecycle Strategy

ITIL Service Lifecycle Strategy ITIL Service Lifecycle Strategy Course Details Course Code: Duration: Notes: ITILSL-Str 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based

More information

IT100: Oracle Administration

IT100: Oracle Administration IT100: Oracle Administration IT100 Rev.001 CMCT COURSE OUTLINE Page 1 of 8 Training Description: Introduction to Oracle Administration and Management is a five-day course designed to provide Oracle professionals

More information

Achieving effective risk management and continuous compliance with Deloitte and SAP

Achieving effective risk management and continuous compliance with Deloitte and SAP Achieving effective risk management and continuous compliance with Deloitte and SAP 2 Deloitte and SAP: collaborating to make GRC work for you Meeting Governance, Risk and Compliance (GRC) requirements

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

ADVANCED MS. Access. H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E

ADVANCED MS. Access. H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E ADVANCED MS Access H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: This advanced Microsoft Access training course will build on your existing

More information

Learning Level Advance...

Learning Level Advance... Course Introduction The course uses a mixture of taught sessions, interactive group discussions, exercises, continuous assessment and examination to achieve its aims. The practical exercises are based

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements

Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements Summary This five-day intensive training course enables participants to develop the necessary expertise

More information

CBCI Certification Course (GPG)

CBCI Certification Course (GPG) CBCI Certification Course (GPG) 5 Days with Examination Course Description This course offers a solid description of the methods, techniques and approaches used by business continuity (BC) professionals

More information

Cybersecurity Protecting your crown jewels

Cybersecurity Protecting your crown jewels Cybersecurity Protecting your crown jewels Our cyber security services We view cybersecurity through a series of interconnected lenses. This rounded approach is designed to provide you with confidence:

More information

Managing IT Risk: The ISACA Risk IT Framework. 1 st ISACA Day, Sofia 15 October Charalampos (Haris)Brilakis, CISA

Managing IT Risk: The ISACA Risk IT Framework. 1 st ISACA Day, Sofia 15 October Charalampos (Haris)Brilakis, CISA Managing IT Risk: The ISACA Risk IT Framework Charalampos (Haris)Brilakis, CISA ISACA Athens Chapter BoD / Education Committee Chair Sr. Manager, Internal Audit, Eurobank (Greece) 1 st ISACA Day, Sofia

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

EXIN BCS SIAM Foundation. Preparation Guide. Edition

EXIN BCS SIAM Foundation. Preparation Guide. Edition EXIN BCS SIAM Foundation Preparation Guide Edition 201704 Copyright EXIN Holding B.V. and BCS, 2017. All rights reserved. EXIN is a registered trademark SIAM is a registered trademark No part of this publication

More information

Navigating the Clouds Fortifying ITIL for Cloud Governance

Navigating the Clouds Fortifying ITIL for Cloud Governance Navigating the Clouds Fortifying ITIL for Cloud Governance DECEMBER 2011 Cloud adoption promises to be an interesting journey for an enterprise with its luring benefits of on-demand models enabling faster

More information

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline Resiliency Model A Holistic Approach to Risk Management Discussion Outline Defining the Challenges and Solutions The Underlying Concepts of Our Approach Outlining the Resiliency Model (RM) Next Steps The

More information

ITIL Intermediate Service Design (SD) Certification Training - Brochure

ITIL Intermediate Service Design (SD) Certification Training - Brochure ITIL Intermediate Service Design (SD) Certification Training - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2

More information

PECB Certified ISO Lead Implementer

PECB Certified ISO Lead Implementer PECB Certified ISO 22301 Lead Implementer PECB Certified ISO 22301 Lead Implementer 5 Days with Examination Course Description This five day intensive course enables the participants to develop the necessary

More information

SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION

SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SO? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents. Successful implementation

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

San Francisco Chapter. Cassius Downs Network Edge LLC

San Francisco Chapter. Cassius Downs Network Edge LLC Cassius Downs Network Edge LLC ITIL History ITIL Books V3 Objectives Business Benefits of V3 V3 Changes Training & Certification V2 or V3? Summary 2 Version 1 31 books developed in the 1980 s Focus: Technology

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Leveraging COBIT to Implement Information Security

Leveraging COBIT to Implement Information Security DISCUSS THIS ARTICLE Leveraging COBIT to Implement Information By John Frisken, CA COBIT Focus 5 May 2015 In delivering IT security consulting services to large enterprises in Australia, particularly in

More information

CAPABILITY STATEMENT

CAPABILITY STATEMENT CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our

More information

ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure

ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure Gain Knowledge to Align IT Services to Business Needs US Course Name : CISSP Version : INVL_CISSP_BR_02_089_1.2

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

Manchester Metropolitan University Information Security Strategy

Manchester Metropolitan University Information Security Strategy Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History

More information

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning. AIPMO Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO Learning The Leading Standard and Certification for People Working in PMO Today Understand the Value of

More information

TOGAF days. Course description

TOGAF days. Course description TOGAF 9.1 5 days Course description TOGAF stands for The Open Group Architecture Framework It is the industry-standard methodology and framework for performing EA work and is used by thousands of Enterprise

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Nebraska CERT Conference

Nebraska CERT Conference Nebraska CERT Conference Security Methodology / Incident Response Patrick Hanrion Security Center of Excellence Sr. Security Consultant Agenda Security Methodology Security Enabled Business Framework methodology

More information

ISO Lead Auditor Training

ISO Lead Auditor Training ISO 22301 Lead Auditor Training Course Description Customers expect organizations to plan and prepare for unforeseen events. Through an effective Business Continuity Management System (BCMS) based on ISO

More information

INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook

INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES forebrook INFRASTRUCTURE ASSESSMENT SECURITY ASSESSMENT RISK ASSESSMENT VULNERABILITY ASSESSMENT PENETRATION

More information

ITIL : Professional Education Training. Innovative solutions for modern businesses.

ITIL : Professional Education Training. Innovative solutions for modern businesses. ITIL : 2011 Professional Education Training Innovative solutions for modern businesses www.syzygal.com The ITIL Service Lifecycle ITIL (IT INFRASTRUCTURE LIBRARY) is a best practice framework for IT Service

More information

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

ITIL 2011 Overview - 1 Day (English and French)

ITIL 2011 Overview - 1 Day (English and French) ITIL 2011 Overview - 1 Day (English and French) Course Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management (ITSM) by many Public &

More information

Wolfpack Cyber Academy Training Catalogue

Wolfpack Cyber Academy Training Catalogue Wolfpack Cyber Academy Training Catalogue IT GOVERNANCE I INFORMATION RISK I CYBERSECURITY I PRIVACY I FOUNDATION I INTERMEDIATE I ADVANCED 2017 WOLF PACK www.wolfpackrisk.com Contents About Wolfpack Information

More information

Business Architecture Implementation Workshop

Business Architecture Implementation Workshop Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in

More information

Enterprise GRC Implementation

Enterprise GRC Implementation Enterprise GRC Implementation Our journey so far implementation observations and learning points Derek Walker Corporate Risk Manager National Grid 1 Introduction to National Grid One of the world s largest

More information

IT Auditing and IT Fraud Detection

IT Auditing and IT Fraud Detection IT Auditing and IT Fraud Detection Page 1 of 7 Why Attend In today s world, IT fraud prevention and investigation have become an everyday part of corporate life and auditors must gain expertise in this

More information

ISO 55001: 2014 Asset Management System 5-Day Training Course (IAM Certified)

ISO 55001: 2014 Asset Management System 5-Day Training Course (IAM Certified) ISO 55001: 2014 Asset Management System 5-Day Training Course (IAM Certified) TÜV SÜD Introduction ISO 55001: 2014 is a newly released best practice standard for asset management. This standard helps to

More information

Fill in the attached registration Form and send to fax number or at

Fill in the attached registration Form and send to fax number or  at Information Security Workshop 7-10 April 2013, Gulf Hotel Key Learning Objectives: 1. Understand Information Security needs 2. Learn About Risk management Essentials 3. Understand Standards and Best Practices

More information

Compliance: How to Manage (Lame) Audit Recommendations

Compliance: How to Manage (Lame) Audit Recommendations Compliance: How to Manage (Lame) Audit Recommendations Brian V. Cummings Tata Consultancy Services Ltd brian.cummings@tcs.com Tuesday, August 9, 2011 1:30 p.m. Session 9221 Security & Compliance Risk Landscape

More information

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery. Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property

More information

Course Fees: 850 euro

Course Fees: 850 euro In conjuction with: Prishtinë: 19.02.2015. Offer: 2M Consulting & PECB, ISO 27001:2013 Lead Auditor Training Lecturer: Msc. CMC, Lekë Zogaj, Master ISO/IEC ISO 27001:2013 Convenient ISMS Lead Auditor Training

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

SECURITY TRAINING SECURITY TRAINING

SECURITY TRAINING SECURITY TRAINING SECURITY TRAINING SECURITY TRAINING Addressing software security effectively means applying a framework of focused activities throughout the software lifecycle in addition to implementing sundry security

More information

An Overview of TOGAF Version 9.1

An Overview of TOGAF Version 9.1 An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6

More information

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles

More information