IT123: SABSA Foundation Training
|
|
- Brook Bryant
- 5 years ago
- Views:
Transcription
1 IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8
2 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom framework and methodology to conceive, conceptualise, design, implement and manage security in a business-driven model. The term business-driven is the key to SABSA s power, and its acceptance. SABSA is all about empowering the organisation to do business as it needs and wants to do, while ensuring that it is secured and fully enabled. SABSA is an open and inclusive standard that readily integrates with other frameworks and tools such as ITIL, 17799/27000 series, COBIT and the like. It can be used as a compliance and governance framework for complex sets of standards. SABSA is used commonly as the security parallel and tool set for organisations using the world s leading IT Architecture Framework. Training Objectives: This 5-day Foundation Certificate program has been designed to provide participants with a thorough coverage of the knowledge required for the SABSA Foundation Level Certificate. It is structured in two modules: Module 01: Security Strategy & Planning Module 02: Security Service Management Security Strategy and Planning This module provides participants with a comprehensive understanding of how the SABSA framework delivers successful security strategy and architecture. Through a series of innovative presentations, case studies and workshops, you will develop the skills to use the most proven security architecture design and management processes and find out how to develop a comprehensive strategy for the creation of a security architecture that genuinely meets the needs of your organisation. By the end of the training, participants will be able to: Define enterprise security architecture, its role, objectives and benefits Describe the SABSA model, architecture matrix, service management matrix and terminology Describe SABSA principles, framework, approach and lifecycle Use business goals and objectives to engineer information security requirements Create a business attributes taxonomy Apply key architectural defence-in-depth concepts Explain security engineering principles, methods and techniques Use an architected approach to design an integrated compliance framework Describe and design appropriate policy architecture Define security architecture value proposition, measures and metrics IT123 Rev.002 CMCT COURSE OUTLINE Page 2 of 8
3 Security Service Management and Design This module leverages the strategy defined in Foundation Module One to create the roadmap to design, deliver and support a set of consistent and high-quality security services. Covering the good practice lifecycle, participants will find out how to design, deliver and support a comprehensive security services architecture that integrates fully and seamlessly with their existing IT management and business infrastructure and practices. By the end of the training, participants will be able to: Use SABSA to create a holistic framework to align and integrate standards Describe roles, responsibilities, decision-making and organisational structure Explain the integration of SABSA into a service management environment Define Security Services Describe the placement of security services within ICT Infrastructure Create a SABSA Trust Model Describe and model security associations intra-domain and inter-domain Explain temporal factors in security and sequence security services Determine an appropriate start-up approach for SABSA Architecture Apply SABSA Foundation level competencies to your own environment Training Designed for: This course is intended for CIO / CISO / CRO / CIRO, IT Strategists and Planners, IT Architects, IT Development Managers and Project Leaders, Software Managers and Architects, Computer / Information Security Managers, Advisors, Consultants & Practitioners, IT Line Managers, IT Service Delivery Managers, Risk Managers, Internal and External Auditors. Prerequisites: The SABSA Foundation Level certification neither requires nor assumes any experience in any branch of security. Training Program: DAY ONE: PRE-TEST MODULE 01: SECURITY STRATEGY & PLANNING This module provides participants with a comprehensive understanding of how the SABSA framework delivers successful security strategy and architecture. Through a series of innovative presentations, case studies and workshops, you will develop the skills to use the most proven security architecture design and management processes and find out how to develop a comprehensive strategy for the creation of a security architecture that genuinely meets the needs of your organisation: IT123 Rev.002 CMCT COURSE OUTLINE Page 3 of 8
4 The SABSA Framework Information Security Strategy, Benefits and Objectives Security: A Cultural Legacy as a Business Constraint Technical Legacy of Tactical Point Solutions Security Strategy, Tactics and Operations Critical Success Factors for Business, IT and Security Measuring and Prioritising Business Risk Enabling Business and Empowering Customers Adding Value to the Core Product Protecting Relationships and Leveraging Trust Introduction to SABSA Best Practice Information Security and its Role in the Modern Enterprise Enterprise Security Architecture: Definition and Principles The History of SABSA Development Introduction to the SABSA Model The Business View of Security: Contextual Architecture The Architect s View of Security: Conceptual Architecture The Designer s View of Security: Logical Architecture The Builder s View of Security: Physical Architecture The Tradesman s View of Security: Component Architecture The Service Manager s View of Security: Operational Architecture Traceability from Business Requirements to Deployed Solutions The SABSA Matrix and Service Management Matrix Information Security Strategy Business Requirements & How to Define Them Business Goals, Success Factors and Operational Risks Business Processes and the Need for Security Location Dependence of Enterprise Security Needs Organisation and Relationships Affecting Enterprise Security Time Dependency of Enterprise Security Collecting Enterprise Requirements for Security Creating a Business Attributes Profile Defining Control Objectives Strategic Concepts & How to Apply Them Managing Complexity Systems Engineering for Security Architectural Layering End-to-End Security Defence-in-Depth Models Security Domains Security Associations Trust Modelling Organisation & Workflow IT123 Rev.002 CMCT COURSE OUTLINE Page 4 of 8
5 Infrastructure Strategy Management Strategy DAY TWO: SABSA PRACTITIONER GUIDE The Strategy Programme & Architecture Delivery The SABSA Development Process The SABSA Lifecycle Strategy and Concept Phase Processes and Sub-processes Design Phase Processes and Sub-processes Implement Phase Processes and Sub-processes Manage and Measure Phase Processes and Sub-processes Top-down Decomposition of the SABSA Model Scope, Deliverables and Project Sequencing Managing the Strategic Programme Introduction to Return on Investment & Return of Value Defining the Benefits and Value Propositions Selling the Benefits Getting Sponsorship and Budget Building the Team Team Competency Assessment & Development Programme Planning and Management Fast Track Start-up Programmes Collecting the Information You Need Gaining Consensus on the Conceptual Architecture Strategic Architecture Governance, Compliance and Maintenance Identifying Quick Wins and Gaining Long Term Confidence MODULE 02: SECURITY SERVICE MANAGEMENT This module leverages the strategy defined in Foundation Module One to create the roadmap to design, deliver and support a set of consistent and high-quality security services. Covering the good practice lifecycle, participants will find out how to design, deliver and support a comprehensive security services architecture that integrates fully and seamlessly with their existing IT management and business infrastructure and practices: The SABSA Security Management Framework The SABSA Security Management Framework SABSA in the I.T. Lifecycle Using SABSA To Integrate Other Methods, Models & Standards SABSA and the ITIL Framework SABSA and CobIT SABSA and Project Management Standards SABSA and ISO Security Standards SABSA and IT Architecture IT123 Rev.002 CMCT COURSE OUTLINE Page 5 of 8
6 DAY THREE: The SABSA Security Policy and Risk Management Framework Security Policy Management Policy Principles Policy Content, Hierarchy & Architecture Security Policy Making Information & Systems Classification Third Party & Outsourcing Strategy & Policy Management Operational Risk Management The Meaning of Risk Risk Philosophy & Methodology Corporate Governance & Enterprise Risk Management Risk Measurement and Risk Assessment Risk Mitigation Risk Appetite Risk Management Tools Measuring Success of Risk Management The SABSA Integrated Assurance Management Framework Security Organisation & Responsibilities Security Governance Security Culture Development, Training & Awareness Ownership & Custody Service Provider & Customer Roles in Security Management Enterprise Audit & Review Framework Assurance of Operational Continuity Business Continuity Planning Contingency Planning Crisis Management Business Recovery Planning DAY FOUR: Systems Assurance Technical Assurance of Security Correctness & Completeness Managing the Assurance Process for Systems & Software Development Assuring Integrity and Acceptable Use of Systems & Software Principles of Multi-phased Testing Security Services Design Security Services Architecture Information as the Logical Representation of Business Logical Entities & Their Relationships Using Trust Models to Define Security Services Security Domains, Domain Definitions & Associations Security Processing Cycle IT123 Rev.002 CMCT COURSE OUTLINE Page 6 of 8
7 Security Infrastructure Services Security Rules, Practices & Procedures Security Mechanisms User Security Platform & Network Security Infrastructure for Service Delivery Technical Standards & Components Security Services Delivery & Support Operational Security Services Incident Management Incident Response Problem Management Change Management Continuity, Crisis & Recovery Management DAY FIVE: Security Administration & Management Security Service Management Security Mechanism Management Security Component Management System Management & Administration User Management & Administration Security Audit Management Security Operations Product Evaluation & Selection Security Services Performance Measurement Return on Investment & Return of Value Return on Investment Net Present Value Internal Rate of Return Defining Value Metrics Business Attributes & Return of Value Security Measures & Metrics Why Do We Need Measures & Metrics Measurement Approaches Defining Metrics Benchmarking Security Remedial Project Planning Maturity Models Applied to Security Course Conclusion POST-TEST and EVALUATION IT123 Rev.002 CMCT COURSE OUTLINE Page 7 of 8
8 Training Requirements: Hands-on practical sessions, equipment and software will be applied during the course if required and as per the client s request. Training Methodology: This interactive training course includes the following training methodologies as a percentage of the total tuition hours: 30% Lectures, Concepts, Role Play 30% Workshops & Work Presentations, Techniques 20% Based on Case Studies & Practical Exercises 20% Videos, Software & General Discussions Pre and Post Test Training Certificate(s): Internationally recognized certificate(s) will be issued to each participant who completed the course. Training Fees: As per the course location - This rate includes participant s manual, hand-outs, buffet lunch, coffee/tea on arrival, morning & afternoon of each day. Note: The 5% VAT (Value Added Tax), will be effective starting 01 st of January 2018 as per the new regulation from the UAE Government. The VAT applies for all quotation both for local and abroad. Training Timings: Daily Timings: 07:45-08:00 Morning Coffee / Tea 08:00-10:00 First Session 10:00-10:20 Recess (Coffee/Tea/Snacks) 10:20-12:20 Second Session 12:20-13:30 Recess (Prayer Break & Lunch) 13:30-15:00 Last Session For training registrations or in-house enquiries, please contact: Aisha Relativo: aisha@cmc-me.com Tel.: or Mob.: Training & Career Development Department IT123 Rev.002 CMCT COURSE OUTLINE Page 8 of 8
PM029: Project Management Professional (Preparation)
PM029: Project Management Professional (Preparation) PM029 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: The overall aim of this course is to prepare participants for the Project Management
More informationIT081: Administering Microsoft SQL Server 2012
IT081: Administering Microsoft SQL Server 2012 IT081 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: In this course, participants will gain the knowledge and skills to maintain a Microsoft
More informationIT088-3D: Advanced Microsoft Access
IT088-3D: Advanced Microsoft Access IT088-3D Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: Your training and experience using Microsoft Access has given you basic database management skills
More informationME029: Certified Maintenance & Reliability Professional (CMRP)
ME029: Certified Maintenance & Reliability Professional (CMRP) ME029 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This interactive course covers Maintenance Reliability best practices
More informationIT092: Implementing CISCO Data Center Unified Fabric
IT092: Implementing CISCO Data Center Unified Fabric IT092 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This intensive course covers all topics in the Cisco DCUFI v5 course, along with
More informationAL045: Laboratory Information Management System (LIMS)
AL045: Laboratory Information Management System (LIMS) AL045 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: A Laboratory Information Management System (LIMS) is computer software that is
More informationIE100: Siemens SIMATIC S7 Maintenance, Configuration & Troubleshooting
IE100: Siemens SIMATIC S7 Maintenance, Configuration & Troubleshooting IE100 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This course introduces to a Siemens integrated automation system.
More informationIE102: SCADA Programming, Maintenance & Troubleshooting
IE102: SCADA Programming, Maintenance & Troubleshooting IE102 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This course is designed to provide a thorough understanding of the fundamental
More informationEE076: Load Flow Analysis, Short Circuit Calculations & Protection Coordination
EE076: Load Flow Analysis, Short Circuit Calculations & Protection Coordination EE076 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: This course provides a comprehensive review of the fundamental
More informationIE156: ICS410: ICS/SCADA Security Essentials
IE156: ICS410: ICS/SCADA Security Essentials IE156 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: In this five-day intensive training, participants will develop and reinforce a common language
More informationIE034: PLC & SCADA for Automation & Process Control
IE034: PLC & SCADA for Automation & Process Control IE034 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: This course presents to give the participants the knowledge required in industrial
More informationPMP085 PMP Program: Planning and Implementing Project Management Office (PMO)
PMP085 PMP Program: Planning and Implementing Project Management Office (PMO) H.H. Sheikh Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: Over the last
More informationSABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA )
SABSA Title / definition SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA is a framework for developing risk-driven enterprise information security and information assurance architectures
More informationIT115: Oracle Database 12c Administration I
IT115: Oracle Database 12c Administration I IT115 Rev.001 CMCT COURSE OUTLINE Page 1 of 12 Training Description: In this training, participants will focus on configuration on supported systems. Also, how
More informationIT Management Excellence. Contents are subject to change. For the latest updates visit Page 1 of 7
IT Management Excellence Page 1 of 7 Why Attend Managing an IT function is very different from developing or supporting technical IT solutions. General management skills are helpful to the IT manager,
More informationAccess Control and Physical Security Management. Contents are subject to change. For the latest updates visit
Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure
More informationISO/ IEC (ITSM) Certification Roadmap
ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank
More informationCOURSE BROCHURE. COBIT5 FOUNDATION Training & Certification
COURSE BROCHURE COBIT5 FOUNDATION Training & Certification What is COBIT5? COBIT 5 (Control Objectives for Information and Related Technology) is an international open standard that defines requirements
More informationDigital Service Management (DSM)
Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Managing, Improving and Securing an Enterprise Digital Service Portfolio itsm003 v.3.0 Agenda and Objectives What is
More informationSERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION
SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SD? This comprehensive official ITIL lifecycle certification course will provide you with critical knowledge and practical guidance
More informationDigital Service Management (DSM)
Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Securing, Managing and Improving the Online Services that Drive the Digital Enterprise itsm003 v.3.0 Agenda and Objectives
More informationITIL Managing Across the Lifecycle Course
ITIL Managing Across the Lifecycle Course Duration: 5 Days Course Delivery: Classroom Language: English Course Overview ITIL 2011 edition is comprised of five core publications: Service Strategy, Service
More informationCOBIT 5 Implementation
COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical
More informationCertificate in Security Management
Certificate in Security Management Page 1 of 6 Why Attend This course will provide participants with an insight into the fundamentals of managing modern and effective security operations. It will address
More informationCyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.
Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by
More informationEffective COBIT Learning Solutions Information package Corporate customers
Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides
More informationWHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.
Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle
More informationEXIN Expert in IT Service Management based on ISO/IEC Preparation Guide
EXIN Expert in IT Service Management based on ISO/IEC 20000 Preparation Guide Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied
More informationCertified Cyber Security Specialist
Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal
More informationTSC Business Continuity & Disaster Recovery Session
TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationISO 27001:2013 certification
www.pwc.ch/cybersecurity ISO 27001:2013 certification Building confidence in your digital future Our approach to certification PwC offers a four-phase approach to help with your ISO 27001 project, using
More informationEXIN BCS SIAM TM Foundation Certification Training - Brochure
EXIN BCS SIAM TM Foundation Certification Training - Brochure Understand How to Manage Multiple Service Providers to Achieve Common Goal Course Name : SIAM TM Foundation Training Certification Version
More informationPlanning and Implementing ITIL in ICT Organisations
CCPM Solutions Experts in ICT Performance Supporting Your Business Planning and Implementing ITIL in ICT Organisations June 2012, Addis Ababa Content 1. Quick ITIL (Overview) 2. Case study (How not to
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More informationExam Requirements v4.1
COBIT Foundation Exam Exam Requirements v4.1 The purpose of this document is to provide information to those interested in participating in the COBIT Foundation Exam. The document provides information
More informationAdvanced Tester Certification Test Manager
Home > Advanced Tester Certification Test Manager Advanced Tester Certification Test Manager Accredited training for the ISTQB Advanced Tester Certification Test Manager (CTAL- TM) certification. This
More informationITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure
ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2
More informationTraining Services TRAINING SERVICES. Translating Knowledge into Results
TRAINING SERVICES About Pink Elephant Pink Elephant is an international knowledge leader in the field of business innovation and business change. With advisory and IT services, Pink Elephant draws the
More informationCOBIT 5 Assessor Certification Course
COBIT 5 Assessor Certification Course About COBIT 5.0 Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions and technology is becoming pervasive
More informationIT Consulting and Implementation Services
PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from
More informationCertified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationFOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY
FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide
More informationIntegrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta
Integrating ITIL and COBIT 5 to optimize IT Process and service delivery Johan Muliadi Kerta Measurement is the first step that leads to control and eventually to improvement. If you can t measure something,
More informationITIL Service Lifecycle Strategy
ITIL Service Lifecycle Strategy Course Details Course Code: Duration: Notes: ITILSL-Str 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based
More informationIT100: Oracle Administration
IT100: Oracle Administration IT100 Rev.001 CMCT COURSE OUTLINE Page 1 of 8 Training Description: Introduction to Oracle Administration and Management is a five-day course designed to provide Oracle professionals
More informationAchieving effective risk management and continuous compliance with Deloitte and SAP
Achieving effective risk management and continuous compliance with Deloitte and SAP 2 Deloitte and SAP: collaborating to make GRC work for you Meeting Governance, Risk and Compliance (GRC) requirements
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More informationISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006
ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationADVANCED MS. Access. H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E
ADVANCED MS Access H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: This advanced Microsoft Access training course will build on your existing
More informationLearning Level Advance...
Course Introduction The course uses a mixture of taught sessions, interactive group discussions, exercises, continuous assessment and examination to achieve its aims. The practical exercises are based
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationImplementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements
Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements Summary This five-day intensive training course enables participants to develop the necessary expertise
More informationCBCI Certification Course (GPG)
CBCI Certification Course (GPG) 5 Days with Examination Course Description This course offers a solid description of the methods, techniques and approaches used by business continuity (BC) professionals
More informationCybersecurity Protecting your crown jewels
Cybersecurity Protecting your crown jewels Our cyber security services We view cybersecurity through a series of interconnected lenses. This rounded approach is designed to provide you with confidence:
More informationManaging IT Risk: The ISACA Risk IT Framework. 1 st ISACA Day, Sofia 15 October Charalampos (Haris)Brilakis, CISA
Managing IT Risk: The ISACA Risk IT Framework Charalampos (Haris)Brilakis, CISA ISACA Athens Chapter BoD / Education Committee Chair Sr. Manager, Internal Audit, Eurobank (Greece) 1 st ISACA Day, Sofia
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationEXIN BCS SIAM Foundation. Preparation Guide. Edition
EXIN BCS SIAM Foundation Preparation Guide Edition 201704 Copyright EXIN Holding B.V. and BCS, 2017. All rights reserved. EXIN is a registered trademark SIAM is a registered trademark No part of this publication
More informationNavigating the Clouds Fortifying ITIL for Cloud Governance
Navigating the Clouds Fortifying ITIL for Cloud Governance DECEMBER 2011 Cloud adoption promises to be an interesting journey for an enterprise with its luring benefits of on-demand models enabling faster
More informationDefining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline
Resiliency Model A Holistic Approach to Risk Management Discussion Outline Defining the Challenges and Solutions The Underlying Concepts of Our Approach Outlining the Resiliency Model (RM) Next Steps The
More informationITIL Intermediate Service Design (SD) Certification Training - Brochure
ITIL Intermediate Service Design (SD) Certification Training - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2
More informationPECB Certified ISO Lead Implementer
PECB Certified ISO 22301 Lead Implementer PECB Certified ISO 22301 Lead Implementer 5 Days with Examination Course Description This five day intensive course enables the participants to develop the necessary
More informationSERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION
SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SO? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents. Successful implementation
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationSan Francisco Chapter. Cassius Downs Network Edge LLC
Cassius Downs Network Edge LLC ITIL History ITIL Books V3 Objectives Business Benefits of V3 V3 Changes Training & Certification V2 or V3? Summary 2 Version 1 31 books developed in the 1980 s Focus: Technology
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationLeveraging COBIT to Implement Information Security
DISCUSS THIS ARTICLE Leveraging COBIT to Implement Information By John Frisken, CA COBIT Focus 5 May 2015 In delivering IT security consulting services to large enterprises in Australia, particularly in
More informationCAPABILITY STATEMENT
CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our
More informationITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure
ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure Gain Knowledge to Align IT Services to Business Needs US Course Name : CISSP Version : INVL_CISSP_BR_02_089_1.2
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationRisk Advisory Academy Training Brochure
Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty
More informationManchester Metropolitan University Information Security Strategy
Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History
More informationAssociation for International PMOs. Expert. Practitioner. Foundation PMO. Learning.
AIPMO Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO Learning The Leading Standard and Certification for People Working in PMO Today Understand the Value of
More informationTOGAF days. Course description
TOGAF 9.1 5 days Course description TOGAF stands for The Open Group Architecture Framework It is the industry-standard methodology and framework for performing EA work and is used by thousands of Enterprise
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationNebraska CERT Conference
Nebraska CERT Conference Security Methodology / Incident Response Patrick Hanrion Security Center of Excellence Sr. Security Consultant Agenda Security Methodology Security Enabled Business Framework methodology
More informationISO Lead Auditor Training
ISO 22301 Lead Auditor Training Course Description Customers expect organizations to plan and prepare for unforeseen events. Through an effective Business Continuity Management System (BCMS) based on ISO
More informationINFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook
INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES forebrook INFRASTRUCTURE ASSESSMENT SECURITY ASSESSMENT RISK ASSESSMENT VULNERABILITY ASSESSMENT PENETRATION
More informationITIL : Professional Education Training. Innovative solutions for modern businesses.
ITIL : 2011 Professional Education Training Innovative solutions for modern businesses www.syzygal.com The ITIL Service Lifecycle ITIL (IT INFRASTRUCTURE LIBRARY) is a best practice framework for IT Service
More information"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary
Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL
More informationITIL 2011 Overview - 1 Day (English and French)
ITIL 2011 Overview - 1 Day (English and French) Course Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management (ITSM) by many Public &
More informationWolfpack Cyber Academy Training Catalogue
Wolfpack Cyber Academy Training Catalogue IT GOVERNANCE I INFORMATION RISK I CYBERSECURITY I PRIVACY I FOUNDATION I INTERMEDIATE I ADVANCED 2017 WOLF PACK www.wolfpackrisk.com Contents About Wolfpack Information
More informationBusiness Architecture Implementation Workshop
Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in
More informationEnterprise GRC Implementation
Enterprise GRC Implementation Our journey so far implementation observations and learning points Derek Walker Corporate Risk Manager National Grid 1 Introduction to National Grid One of the world s largest
More informationIT Auditing and IT Fraud Detection
IT Auditing and IT Fraud Detection Page 1 of 7 Why Attend In today s world, IT fraud prevention and investigation have become an everyday part of corporate life and auditors must gain expertise in this
More informationISO 55001: 2014 Asset Management System 5-Day Training Course (IAM Certified)
ISO 55001: 2014 Asset Management System 5-Day Training Course (IAM Certified) TÜV SÜD Introduction ISO 55001: 2014 is a newly released best practice standard for asset management. This standard helps to
More informationFill in the attached registration Form and send to fax number or at
Information Security Workshop 7-10 April 2013, Gulf Hotel Key Learning Objectives: 1. Understand Information Security needs 2. Learn About Risk management Essentials 3. Understand Standards and Best Practices
More informationCompliance: How to Manage (Lame) Audit Recommendations
Compliance: How to Manage (Lame) Audit Recommendations Brian V. Cummings Tata Consultancy Services Ltd brian.cummings@tcs.com Tuesday, August 9, 2011 1:30 p.m. Session 9221 Security & Compliance Risk Landscape
More informationSecurity In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.
Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property
More informationCourse Fees: 850 euro
In conjuction with: Prishtinë: 19.02.2015. Offer: 2M Consulting & PECB, ISO 27001:2013 Lead Auditor Training Lecturer: Msc. CMC, Lekë Zogaj, Master ISO/IEC ISO 27001:2013 Convenient ISMS Lead Auditor Training
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationThe Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA
The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,
More informationROLE DESCRIPTION IT SPECIALIST
ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head
More informationSECURITY TRAINING SECURITY TRAINING
SECURITY TRAINING SECURITY TRAINING Addressing software security effectively means applying a framework of focused activities throughout the software lifecycle in addition to implementing sundry security
More informationAn Overview of TOGAF Version 9.1
An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6
More informationGOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI
GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles
More information